The latest OS-X Malware
From Slashdot: http://it.slashdot.org/article.pl?sid=04/10/23/0229241
A couple of "news" websites are waking up to the malware script that has been around for a while. The script is available and it is public domain knowledge. With access to the password of an administrator, this script can replicate itself on mounted volumes and do damage.
PEBKAC?
A couple of "news" websites are waking up to the malware script that has been around for a while. The script is available and it is public domain knowledge. With access to the password of an administrator, this script can replicate itself on mounted volumes and do damage.
PEBKAC?
Comments
Originally posted by talksense101
From Slashdot: http://it.slashdot.org/article.pl?sid=04/10/23/0229241
A couple of "news" websites are waking up to the malware script that has been around for a while. The script is available and it is public domain knowledge. With access to the password of an administrator, this script can replicate itself on mounted volumes and do damage.
PEBKAC?
Welcome to last week. As we learned last week, the Opener script cannot replicate itself. You make it sound as though this script can capture an administrative password and proceed to wreck havoc on its own. Actually, the administrative password must be entered from the keyboard every time it is run. MacOS X is based on BSD, a powerful Unix variant. Every time someone discovers that the power of Unix can be used for harm, they run to the Internet screaming that viruses have come to the Mac. Well, it just isn't so.
Thanks for the heads up though.
There is another thread on the same subject. Please lock this one.