I doubt that they're that dumb aswell, but there's every chance some tool is trying hard to make it look that way
Can someone tell me how to check and see if I have this virus?
Thanks for your reply. May I ask for further explanation as to why? I am just curious. If you aren't in the mood, I understand. Or even if you can link me to any webpages with further info. that would be appreciated. Thank you!
I didn't see any replies so I'll just give a simple one. Despite the name, Java and Java Script have nothing in common. So there is no correlation between the two as far as any kind of vulnerability.
Yes, I read all that 12 hours ago. Your impressive quotations did not in any way answer my question into how it infects every app.
This in effect will inject binary2 into every application launched by the infected user.
Does any one actually have this malware? I think the 600,000 number is complete BS
No worries man, I didn't think you were being a douche or anything. Thanks for the reply and I will definitely do some reading up on wikipedia etc.![]()
If I knew that, I'd be a security researcher. But I trust them when they say
When I bought my Mac I remember Apple having a series of ads (the "Hello I'm a Mac..." ones) where the 'PC' had a cold and the 'Mac' said he can't get viruses. It was one of the reasons I went for a Mac.
Has that changed or were Apple stretching the truth?
In this case it can.
Flashback will prompt you for your Admin password, if you provide it it infects you one way.
If you don't provide it, it will infect you a different way. Not providing the password doesn't protect you.
Logged in as admin on Leopard, it does not prompt for a password. It does on Snow Leopard (and I assume Lion).It shouldn't. The Aplications folder has, to my knowledge, always been read-write-execute (rwx) for group Admin and r-x for Others. So, either you are already logged in to an admin account or you've changed the privileges for the Applications folder to rwx for Others.
For user accounts, i.e. non-admin, one should not be able to write to /Applications.
As I said earlier, it appears to depend on which OS version you're running.Mmm. Just tried this. As soon as I tried to copy the folder I got a prompt telling me that I needed to authenticate.
It's a trojan, quite different from a virus. The instructions for checking for it and removing it are here.Can someone tell me how to check and see if I have this virus?
The article has clearly stated that you need to use Terminal, which involves commands and some deep knowledge of what you're doing, for Flashback's removal.
In Windows, you just need to use Windows Malicious Software Removal Tool or a decent anti-virus, which involves 1 or 2 clicks.
Yea, it's gotta be very hard to click things. I mean, typing commands in Terminal must be simpler.
I know that MacRumors is an Apple oriented place, where Apple lovers come to discuss things about Apple's product. But, posts like the one I quoted make it look like a fanboy place, not an Apple technology discussion place.
No, as long as you practice safe computing.Ok with all this talk of virus, malware, trojan, blah blah blah, is there a need for an anti-virus for my mac? I dont want a dissertation on the subject at hand just a simple yes or no. Im a normal user who is careful which websites to visit and is careful on what is installed.
No, as long as you practice safe computing.
No, they don't.Macs like all computers do need maintenance software, however.
No, they don't.
What maintenance software are you referring to?If you wish to pick apart vocabulary rather than common sense then need, no but should, absolutely.
Semi-short answer:
Javascript is a scripting language built in to the browser (the browser supplies the runtime engine) to interact with page elements on the client/user end (it allows remoting and other advanced techniques as well, just keeping this simple...)
For example, you click a button and a Javascript is triggered that looks for values in a couple of text inputs to validate a form or registration. Javascript can move objects, dynamically change properties like color or size.
Java is a full tilt programming language (and framework) on top of which you can build complete client applications, that can read/write files, etc., just like any application you install. The browser implementation is supposed to keep it sandboxed _in_ the browser with a set of rules that limits what it can do outside the browsers. Java apps can be sent down the same connection as the browser, where theyre stored locally, and then executed in the constraints of the browser.
A simple example is a ticker (the left-to-right scrolling text widgets). That can be implemented by sending a small Java app along with the page markup, then the app is call the app from the page (by using simple HTML markup), and it shows up inline with the other HTML.
The exploit is leveraging a bug in the Java runtime (its like an external program that runs java apps), thats allowing a browser based applet, to access system resources like its running as a standalone client application. So basically they send a Java applet downstream with the other markup, its triggered (this is all OK so far), prompts you, but then proceed to do something that the browser sandbox/container should not allow (filesystem access for injecting code, reading files, etc.)
Its potentially the same problem with Flash. An external runtime engine thats _supposed_ to have limitations when invoked from within a browser. Way back when people were using Active X, it also had this problem, A/X was a runtime container that was supposed to limit system access that was implemented in Internet Explorer (by MS).
So much for Macs not needing antivirus.
It was on this very site that I read a thread with user after user after user commenting that antivirus was not necessary on a mac because they are immune. Oh well.