Тёмный

What Kinds of Files Can Be Viruses? 

ThioJoe
Подписаться 3,1 млн
Просмотров 240 тыс.
50% 1

Sponsored: Protect yourself from malware, scams and fraud with Bitdefender Total Security! Check it out Here: www.bitdefender.com/media/htm...
▼ Time Stamps: ▼
0:00 - Intro
0:54 - File Categories
1:12 - Executables
1:36 - Libraries
2:08 - Scripts
2:37 - Documents Containing Scripts
3:05 - Archives
3:19 - A Good Thing Indeed
4:37 - Specific Files to Watch Out For
4:55 - Executable File Extensions
6:02 - Script File Extensions
6:40 - Very Good Tip
8:01 - Shortcut Files
8:59 - Library File Extensions
9:20 - Archive File Extensions
10:37 - Document Extensions
12:10 - Extra Note About Office Files
13:13 - Final Advice
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Merch ⇨ teespring.com/stores/thiojoe
⇨ / thiojoe
⇨ / thiojoe
⇨ / thiojoetv
My Gear & Equipment ⇨ kit.co/ThioJoe
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

Наука

Опубликовано:

 

19 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 660   
@ThioJoe
@ThioJoe 9 месяцев назад
Corrections & Notes: • The JS file is actually JScript, not Javascript
@yoyoyonono
@yoyoyonono 9 месяцев назад
Jscript is just JavaScript (ecmascript technically but who's counting)
@random_person618
@random_person618 9 месяцев назад
​@@yoyoyononoI am counting 😂
@WiluckGD
@WiluckGD 9 месяцев назад
​@@random_person6181. 2. 3. 4.
@encycl07pedia-
@encycl07pedia- 9 месяцев назад
"Run" is the past participle of "run." "Ran" is the simple past of "run." "I have ran" is wrong. The more you know, the less you don't.
@RealLava
@RealLava 9 месяцев назад
WHAT
@wakaneut
@wakaneut 9 месяцев назад
Making file extension hidden by default is one of the worst mistakes MS did.
@CoolAsFreya
@CoolAsFreya 9 месяцев назад
This got me the other day at university, was using windows server virtual machines to make a simple web server, couldn't figure out why index.html wasn't working until I remembered stupid hidden file extensions... and it was actually index.html.txt 😫
@user-uz8vg8sp7v
@user-uz8vg8sp7v 9 месяцев назад
not in the 90s
@Mario583a
@Mario583a 9 месяцев назад
To be fair, most people when they would rename a file, they would include the extension and later get upset that Word would be unable to read their Invoice Tax 1996 as there was no association for that Invoice Tax 1996.doc file.
@pythonify.
@pythonify. 9 месяцев назад
many* not worst
@KatyaAbc575
@KatyaAbc575 9 месяцев назад
@@Mario583aWindows litterally warns you that you should not rename the file extension. Do people just ignore that pop up???
@random_person618
@random_person618 9 месяцев назад
I want to add a fact in your point that "sometimes hackers may hide the malicious files so that you can't see them by default." Even after you enable the "Show hidden files" option, sometimes they may hide it as a system file (by setting the -h and -s attribute to it). So if you're skeptical about such an item, make sure to enable the "Show hidden operating system files" as well.
@cycrothelargeplanet
@cycrothelargeplanet 9 месяцев назад
Showing OS protected files is kinda risky though
@random_person618
@random_person618 9 месяцев назад
@@cycrothelargeplanet No it isn't risky if you know what you're doing. If that is for destroying a Windows installation, then it's bad otherwise it's not if you want to hunt malware down.
@swayingGrass
@swayingGrass 9 месяцев назад
@@random_person618 "it isn't risky if you know what you're doing", I mean... duh!
@random_person618
@random_person618 9 месяцев назад
@@swayingGrass Well I'd like to say this to @cycroplanet.
@swayingGrass
@swayingGrass 9 месяцев назад
​@@random_person618No, I'm saying that is basically the same as saying "get gud so you're not bad" in a game. It doesn't address the concern, i.e. what is there to know so it won't be dangerous.
@DerLung
@DerLung 9 месяцев назад
I absolutely don't understand why file extentions aren't shown by default in windows. It's not annoying and soooo important and also useful (for example if you have two files of different type (like a word document and a pdf export of it) with the same name and have to find the right one by icon)
@ThioJoe
@ThioJoe 9 месяцев назад
Yea for real
@myfloor622
@myfloor622 9 месяцев назад
probably because it looks smoother
@Lofote
@Lofote 9 месяцев назад
For beginners they cant easily disable files by o erwriting file types. Pros usually use different programs than explorer, so they dont card, for the rest you can enable it
@DerLung
@DerLung 9 месяцев назад
@@Lofote do you mean accidentaly overwriting the file extention when renaming a file? That‘s not that much of a problem becauee the extention doesn‘t get highlighted when renaming
@crosssans9984
@crosssans9984 9 месяцев назад
well you can select it manually after you press 'rename' and people who just got windows and don't know what file extensions do could just rename the whole thing and remove the extensions@@DerLung
@gFamWeb
@gFamWeb 9 месяцев назад
The fact that "Hide File Extensions" is SILL on by default baffles me.
@gFamWeb
@gFamWeb 9 месяцев назад
STILL* lol
@crosssans9984
@crosssans9984 9 месяцев назад
tf is sill
@crosssans9984
@crosssans9984 9 месяцев назад
oh ok cool@@gFamWeb
@RealUniCat
@RealUniCat 9 месяцев назад
He misspelled "still"@@crosssans9984
@jerelull9629
@jerelull9629 9 месяцев назад
Microsoft doesn't care, so takes the easiest, often least secure, path. I retired 15 years ago, so have been able to go MS-free even though I got pretty good at resurrecting MS work stations by then, taking less than a week to bring my machine back from the dead pretty regularly. I could have gotten more than 50% more coding done if it hadn't been for MS trashing itself every few weeks. I got pretty good about doing my thinking and design while waiting for various recovery/restore and re-install programs to do their work. Meanwhile, a 15 year-old Mac with Intel CPUs & GPUs cooked itself and trashed the internal HDD. Once I got the HDD to the point of alive, it took just an hour to restore the backup and have my Mac back up to where it had been before, including passwords on sites I didn't remember wanting to access.
@Kierownik223
@Kierownik223 9 месяцев назад
Fun fact, in older versions of Windows the .msp files were used by Microsoft Paint.
@KryzysX
@KryzysX 9 месяцев назад
I don't believe that!
@dsihacks
@dsihacks 9 месяцев назад
@@KryzysX It's true
@ExploringNew1
@ExploringNew1 9 месяцев назад
MicroSoft Paint, makes sense
@random_person618
@random_person618 9 месяцев назад
I knew that. Good for me
@enderjed2523
@enderjed2523 9 месяцев назад
And .MSA files were used for Microsoft Agent
@evanbelcher
@evanbelcher 9 месяцев назад
Also worth mentioning, file extensions are just labels, and they can be manipulated at will regardless of the underlying data. So you might run a .cmd file or something, but the rest of the payload may be contained in a file with extension .docx exactly like a normal document, when really it's just a .dll with the extension changed.
@Ultrajuiced
@Ultrajuiced 8 месяцев назад
True, but Windows won't run it by default in a way that the malicious content comes into effect. If not Windows itself is vulnerable.
@xavvvvxd
@xavvvvxd 4 месяца назад
Windows uses the file extension to figure out what kind of file a file is, whereas Linux distros use the actual contents. I'm actually not too sure if Windows will allow you to link a non-DLL/LIB file.
@TheAndroidGingerbreadGuy
@TheAndroidGingerbreadGuy 9 месяцев назад
He may not be a OneDrive synced file, but never fails to upload 💯
@tfr
@tfr 9 месяцев назад
You can uninstall onedrive but you can’t uninstall thiojoe
@TheAndroidGingerbreadGuy
@TheAndroidGingerbreadGuy 9 месяцев назад
​@@tfrthats right
@xXVibrantSnowXx
@xXVibrantSnowXx 9 месяцев назад
Who uses OneDrive? Lmao
@Lofote
@Lofote 9 месяцев назад
​@@xXVibrantSnowXxmany
@Lofote
@Lofote 9 месяцев назад
​@@tfryou cant install him in the first place :-D
@markanderson2155
@markanderson2155 9 месяцев назад
I think the main thing or key from this is don't download things willy-nilly over the internet, use extreme caution with links in email, texting, IM's etc. Always exercise caution with attachments. Only go to reputable trustworthy sources with a careful eye. As much as I like open sources that's where you really have to be careful because of too many hands accessing the source code. But that does not mean that someone can't still attach or inject a malicious code to a paid licensed version either. Buyer/ end user beware! You are your own first line of defense, watch dog and security. Pay attention to everything, because you really have to. All the more reason to have backups should one slip past you, in hopes that you can recover. Thanks for the video Theo.
@sontapaa11jokulainen94
@sontapaa11jokulainen94 9 месяцев назад
What's an IM?
@ThatOneRobloxDev
@ThatOneRobloxDev 9 месяцев назад
You also have ".jar" which is an executable java application. It's basically an executable version of a zip file, where java classes are stored within. Any code that is inside a ".jar" file will be executed and ran when you execute it.
@cvk4488
@cvk4488 8 месяцев назад
Yea, especially the games which use .jar, .dll files which can be played by the bat file
@FriedMonkey362
@FriedMonkey362 6 месяцев назад
Java isn't a windows default program tho
@LetsArctix
@LetsArctix 4 месяца назад
Yes, I got some kind of malware trough a jar file. (Minecraft mod) It executet a powershell script which would have downloaded a RAT from github, fortunally that was blocked and the jar file itself „just“ stole my minecraft session token.
@Freddy_Guy
@Freddy_Guy 9 месяцев назад
I just love how ThioJoe makes the highest quality tech content on the platform He doesn't resort to clickbait or becoming a Linus clone He has his own style and I literally can't find anyone who makes similar content and at the same level of quality Keep up the good work
@deathtidegame
@deathtidegame 9 месяцев назад
@@MasterCraft_48 he's dunking unoriginal people that clone linus' content
@MasterCraft_48
@MasterCraft_48 9 месяцев назад
@@deathtidegame im stupid nvm...
@just.nobody
@just.nobody 9 месяцев назад
Yep. Love him. Most people bring up his past videos. Bruh he changed. He is great with the information he provides. Very organised
@TheBenSanders
@TheBenSanders 9 месяцев назад
@@just.nobodyI do miss Joe’s old troll videos though lmao
@Ness199X
@Ness199X 9 месяцев назад
Bro forgot the windows 9 video 💀💀💀💀💀 edit: nvm that was linus who did thay
@LuigiMordelAlaume
@LuigiMordelAlaume 9 месяцев назад
Also, docx, xlsx, pptx, etc are actually encoded as zip files. If you change the extension to zip you can see the bundle of files. This can be exploited, unknown office files should be opened in zip explorers before office.
@MechPaul
@MechPaul 9 месяцев назад
I work in the antimalware industry! More common than changing file extensions or default programs for opening files, we edit local machine group policy to prevent execution on specific file types within a folder that we dedicate to malware. Also, to preserve file names to the extent possible (and to prevent execution and changing default program associations), we just add underscores to file extensions (.exe_, .js_, .scr_). I understand that given the sponsor you wouldn’t show how to edit defender settings, but you could have gone over how to use bitdefender to better protect yourself. Antiviruses have similar settings.
@MechPaul
@MechPaul 9 месяцев назад
@@Biwiyejowjs tarballs are essentially a zip file without any compression. They're just as safe as any other container (7z, zip, rar)
@Gauley_
@Gauley_ 9 месяцев назад
Thanks for having captions, sometimes i have to watch without audio like if my bluetooth headphones run out of battery, helps alot!
@JosephNFS
@JosephNFS 9 месяцев назад
You know it will be a good day when ThioJoe uploads.
@MeowChristodoulos
@MeowChristodoulos 9 месяцев назад
True.
@charleshines2142
@charleshines2142 9 месяцев назад
Sometimes it does take one slip up. If you ever run a file that closes and doesn't seem to do anything there is a chance that depending on where it came from it may steal passwords and other things and send them to some random person who you most likely never met or knew existed.
@Ultrajuiced
@Ultrajuiced 8 месяцев назад
Win+R, ipconfig. Omg hacked. 😝
@aaaaaaaaaaaaaaaaaaaaaaa935
@aaaaaaaaaaaaaaaaaaaaaaa935 9 месяцев назад
Conclusion: literally anything can be malware
@avishjha4030
@avishjha4030 9 месяцев назад
Something I was literally wondering about only a couple hours back when downloading an MP3 like the old days. Great timing!
@fightingtable
@fightingtable 9 месяцев назад
ThioJoe I really appreciate you adding subtitles to your videos, they are very useful
@filipjukelson7144
@filipjukelson7144 9 месяцев назад
Basicly all files
@faenethlorhalien
@faenethlorhalien 9 месяцев назад
One type of annoying virus that I got back in 2001 was )and it was called redbot or redcode or redsomething, it got very spread back then...) that the file would arrive to you as a DOUBLE extension file, but Windows (2000 or xp or 98 or me or whatever you used) would only show you the LAST one, hiding the second to last extension which was the actual extension. So, the OS would show you it was a JPG, for instance, and mark it with the icon of a picture, but when you tried to open it, it was actually a VB script and it WOULD ATTEMPT TO RUN IT as a VB script, instead of failing to open it as a JPG, and then you were fucked. That virus would scour through your Outlook contact and sent mail list and send itself to everyone. I had to send SO MANY apology mails to people because of it!
@portablecollector
@portablecollector 9 месяцев назад
CMD,ZIP,BAT and EXE are the ones to usually be thought of, no idea it went this deep!
@minix07
@minix07 9 месяцев назад
Respect for having good captions and chapters
@neoqueto
@neoqueto 9 месяцев назад
You shouldn't ever fully trust any file type really. If your picture viewer has a vulnerability, a hacker can take advantage of it by embedding malicious code to something like a JPEG. Video files, image files, sound files, game data files (it's not too uncommon for cracked games to have functions in them that allow them to load external files from the game directory and those are the real malware). Even text files aren't universally safe because theoretically a text editor (or its part, like a syntax highlighting library) can be susceptible to some kind of code injection.
@henrikpersson5420
@henrikpersson5420 8 месяцев назад
I got a virus through a pdf loaded in an open source pdf book reader. Ironically a programming textbook
@tzarg
@tzarg 9 месяцев назад
always love and appreciate those proper subtitles!
@nutherefurlong
@nutherefurlong 9 месяцев назад
Thanks for this. Might be good to revisit PDFs some day since the landscape seems to have changed. Like a lot of people read in-browser now, with stuff like Firefox's built in browser that I guess approaches reading differently, but I don't feel like there's strong confidence in what are the preferred routes for using those files
@keithmonahan3788
@keithmonahan3788 9 месяцев назад
Thanks for the excellent video TJ ! Very well done as always. Clear, concise and to the point. Please keep up the amazing work. For I appreciate your content. !! 👍👍 ⭐️⭐️⭐️⭐️⭐️
@danikrimm99
@danikrimm99 9 месяцев назад
Important note: Windows can include meta characters into filenames, for example a right-to-left character. This can lead to characters in filenames being displayed in unusual orders. A common filename this is used in is something like nice-arcs.jpg is acutally a src file, not a jpg
@coolulder
@coolulder 9 месяцев назад
There are also xlsb files that can contain macros. It is the same as xlsm but instead of the XML format it is saved as Microsoft's Binary type.
@zafkeilgaming1280
@zafkeilgaming1280 9 месяцев назад
nice drop bro, appreciate the warnings :) this stuff is really important. Your video helped me explain how to keep my parents safe and your videos helped us a lot in general really
@centuribejewelian
@centuribejewelian 9 месяцев назад
Just get Linux and don't worry about any of this.
@zafkeilgaming1280
@zafkeilgaming1280 9 месяцев назад
my parents have used windows 8, 10 and 11 and i dont have the heart to force them to switch (also would get my ass whupped for trying)@@centuribejewelian
@justas1600
@justas1600 9 месяцев назад
​@@centuribejewelianyeah a nice idea to let old people/parents that don't know a lot about computers use linux....😂
@SotraEngine4
@SotraEngine4 9 месяцев назад
It may be that Linux may be safer. Or it could be that the user base pf Linux are safer
@TheGodOfAllThatWas
@TheGodOfAllThatWas 9 месяцев назад
I wish you had mentioned in the summary at the end that technically at some level ANY file can become an issue if the program that opens it is ubiquitous enough and has a bug. This used to be a big problem although (maybe) DEP solved it back in the xp/vista days when MS had a bug that let a JPG run code (The GDI+ JPEG parsing vulnerability published in September 2004). With the amount of layers that need to fail for it to be an issue I wouldn't worry about it TOO much as long as you keep up to date on your updates. But it is a good reminder to keep up to date on your updates if nothing else.
@henke37
@henke37 9 месяцев назад
DEP is a mitigation, not a solution. It makes the task more challenging for the attacker, it doesn't remove the vulnerability.
@TheGodOfAllThatWas
@TheGodOfAllThatWas 9 месяцев назад
@@henke37 True. Which is why I feel he should have mentioned it in the video. It's a layer that tries to solve the issue of accidentally running bad code. Like the mark of the web (that he mentions in the video), UAC, windows defender, and remembering to keep up to date on your updates are all layers. But even with all these layers it's (maybe) just one bug away from being an issue.
@SunsetArchon
@SunsetArchon 9 месяцев назад
Thank you. I was just thinking about this very question earlier this week.
@XShadowCatzX
@XShadowCatzX 9 месяцев назад
I’m surprised you didn’t mention .jar files. I’ve heard they have been used a ton by hackers/viruses and every time I download one my pc tells me it could be dangerous and I have to manually tell it to keep the file every time.
@underrated6902
@underrated6902 9 месяцев назад
.jar files are .zip files in disguise, optionally with some metadata (as a file in the archive itself) for the Java Virtual Machine.
@XShadowCatzX
@XShadowCatzX 9 месяцев назад
@@underrated6902 The only reason I really know about them is because they are used for Minecraft mods. Other than that I haven’t really seen them used.
@jongeduard
@jongeduard 9 месяцев назад
In fact, these things like jar files, but also msi files and certain kinds of cab files are all just archive types with a file association, which makes them exacutable. Note that jar files do not work on every system, because Java needs to be installed for them, which is not the default, and even msi and cab need Windows Installer to be there, but which is normally the case. All these are normal archive types and don't have a PE header like exe or dll and are never executable by themselves. Self executing archives do also exist however, which contain a full PE application binary followed by the actual archive behind it as a payload. The application simply has the task of unpacking the actual archive, which may be in the form of an installer like approach, but it can also be an application that automatically unpacks the archive into a temporary location and starts another application that was packed inside the archive.
@mega_gamer93
@mega_gamer93 9 месяцев назад
@@underrated6902 ???? no they aren't. They are self containing (except for the JVM) java programs. They are nothing alike zip files, which is an archive format that uses compression
@jongeduard
@jongeduard 9 месяцев назад
​@@mega_gamer93 Yes they are. Jar files are just ZIP archives, with compiled class files inside it and a META-INF directory containing a MANIFEST.MF text file with extra information. Very simple. The trick is that the Windows registry has a java -jar command pre associated with the jar file extension. A thing created by the installer of the Java runtime environment.
@TrineDaely
@TrineDaely 9 месяцев назад
Thank you for being a stable voice in this wilderness.
@ivans.935
@ivans.935 9 месяцев назад
Thanks for a thorough review. I wonder, if one has common sense, does one needs to run an antivirus software at all? I mean, there are huge privacy concerns - an antivirus runs all the time, has access to all of your files. Who knows what it’s doing with all that information…
@Reed_Peer
@Reed_Peer 9 месяцев назад
I love how his recent videos are all genuine and not satire like his old videos back in 2015-2017
@johnpatrickadem6294
@johnpatrickadem6294 9 месяцев назад
for example, i can *literally* rename *"executable.exe"* to *_"executable.txt"_* _(or any other file extension)_ and still be able to *run it* under *command prompt* by normal means, the "executable.txt" will be opened in notepad because it has the .txt extension which windows will interpret it as a "text file" (even viewable in the preview pane in explorer)
@Lofote
@Lofote 9 месяцев назад
But then the code that is executed is not insde that file
@johnpatrickadem6294
@johnpatrickadem6294 9 месяцев назад
@@Lofote what do you mean by that?
@Lofote
@Lofote 9 месяцев назад
@@johnpatrickadem6294 the exe is directly loaded into memory for the cpu to execute. So it contains cpu executable instructions, the txt will trigger notepad or a different program to read and parse
@johnpatrickadem6294
@johnpatrickadem6294 9 месяцев назад
hmm, four replies but only three replies, seems legit...
@cycrothelargeplanet
@cycrothelargeplanet 9 месяцев назад
​@@LofoteWhat does that mean
@yhfhdcf
@yhfhdcf 9 месяцев назад
literally every comment is "can we give a moment to appreciate how much work thiojoe puts into his videos"
@Ironyum99
@Ironyum99 9 месяцев назад
becuase they are all true!
@williamdrum9899
@williamdrum9899 5 месяцев назад
I remember when I learned that changing the file extension has nothing to do with what the file is, and you can freely change it back without ruining it. It was like The Matrix
@MonochromeWench
@MonochromeWench 9 месяцев назад
DLLs can be a lot more dangerous than may be immediately obvious, you don't even need to directly do anything for there to be a problem. A malicious dll file in your download directory might be inadvertently used by some exe in your downloads that you run later, this is very dangerous if the exe is an installer running elevated calls into a malicious dll by accident. This is one reason why auto download exploits are a problem as the malicious file might cause trouble later even if it doesn't immediately cause a problem. You should never leave untrusted dlls in locations where programs might be run from. This can also be a problem with the temp directory so it is a good idea to clean out your temp directory regularly. Dlls in temp can be a general problem even if not malicious as poorly coded installers might leave dlls in the temp dir that interfere with other installers that also want to run from the temp directory. The Installers and dlls in temp problem is mostly an issue with older installers. More modern ones are coded better to try and avoid the temp dll problem. Microsoft over time has attempted to mitigate dll attacks but the solutions are not perfect.
@noahhill8483
@noahhill8483 6 месяцев назад
Nice video, I would however have added one extra thing to talk about the shortcuts. Inside a shortcut you aren't just limited to running other files, but you could make the shortcut point to something like 'C:\Program Files (x86)\[some web browser like IE]\*.exe [some website]/virus.bat' and then even without that file being on your system, that shortcut will download the file using Internet Explorer. With some extra editing via Notepad I think you might also be able to include the bad code right in the file without the use of other files or programs. Stay safe lol. Great video Thio
@WarriorRev6300
@WarriorRev6300 9 месяцев назад
This is the video we didn't know we need but needed.
@JohnGoard
@JohnGoard 8 месяцев назад
Thanks Joe I did not know of all of these file extensions.
@ianm00n
@ianm00n 8 месяцев назад
I didn't know all of these, good video!
@jongeduard
@jongeduard 9 месяцев назад
You did not mention HTA files, which are HTML applications. Although if I am right these don't work on modern Windows versions anymore, but on a bit older versions they worked and they are are basically just like VBS and JS files, because they have unrestricted system acces via VBScript or JScript, but then embeded in an HTML code and opening with a real window a bit like Electron applications do today, but then using Internet Explorer as their engine instead, since we are talking about a really old technology.
@petefrancisco3267
@petefrancisco3267 9 месяцев назад
HTML files or .txt ... I mean txt files can be executable...
@fafardh
@fafardh 9 месяцев назад
The correct answer to "Which Kinds of Files Can Be Viruses?" (the title of the video at the time of this writing) is actually: "Any file that can be opened." The files listed in this video are merely the ones that can perform malicious actions on their own, i.e. without tricking the program opening them into doing things it's not intended to. I think that's important to keep in mind, because failing to do so may lead to letting one's guard down at the wrong moment.
@mgord9518
@mgord9518 9 месяцев назад
Some files can even infect your computer without being opened with the right vulnerability. Pretty sure it's been patched but Windows Explorer had a real nasty vulnerability that would allow ACE via rich text documents being thumbnailed.
@fafardh
@fafardh 9 месяцев назад
@@mgord9518 That's correct. Files don't necessarily have to be explicitly opened by the user. Some applications may automatically open a file without user intervention (e.g. by Windows Explorer for the purpose of generating thumbnail as you mentioned). I hadn't really thought of that, but you're right: that's also opening the file and therefore a potential attack surface.
@maxgafner6503
@maxgafner6503 9 месяцев назад
That's great, sobriety can be something really difficult especially if you have a previous addiction. Stay safe
@ziefty
@ziefty 9 месяцев назад
This guy always has good videos for years now
@ultradarkbeast
@ultradarkbeast 9 месяцев назад
I already known all these but i wasn't sure. Thanks ❤
@mohammed_02
@mohammed_02 9 месяцев назад
this is gonna filled with information thank you so much
@curtisw0234
@curtisw0234 9 месяцев назад
Any file can be a virus if opened by a program with an exploit
@iluvpandas2755
@iluvpandas2755 Месяц назад
Thankfully most exploits are tightly kept secrets.
@iluvpandas2755
@iluvpandas2755 Месяц назад
I do not think the Chinese goverment will use their malware to infect a random person on the internet
@phizc
@phizc 9 месяцев назад
12:55 the zip file itself can't store the "mark of the web", but if the zip file has that mark, all extracted files will inherit it if you use Windows' built in extractor. 7Zip among others doesn't mark the extracted files, so you should still be careful. The mark of the web is actually an alternate data stream on the file called "Zone.Identifier". It's text data and you can even open it in notepad. The easiest is to use the command prompt. Notepad my-downloaded-file.zip:Zone.Identifier
@liforra
@liforra 5 месяцев назад
The more you know
@Arlus
@Arlus 9 месяцев назад
Congrats on 3 mil!
@koopatroopa6882
@koopatroopa6882 9 месяцев назад
Translate: Congratulations on 3 thousand! 🤦
@Arlus
@Arlus 9 месяцев назад
@@koopatroopa6882 hes at 3 mil subs lmfao
@darkfall7250
@darkfall7250 9 месяцев назад
For archived files, its pretty much unlimited. you are able to make a compressed folder and rename the 'zip' to just about anything, you just need a tool like 7zip, or winrar to open it.
@ThexBorg
@ThexBorg 9 месяцев назад
Hey Joe, have you done a video on the 'Hosts' file in many operating systems and some devices? It's quite handy and a lot of sites publish custom Hosts files to block online content and ads. A free alternative to spending money on ad blocking software.
@ThexBorg
@ThexBorg 9 месяцев назад
Hosts file can be edited as admin and retains those changes and will not revert unless prompted. It is a root level DNS resolver pathway, not only on WinOS, but on MacOS and AndroidOS amongst many others. The only platform that locks out the user is iOS.
@vladislavkaras491
@vladislavkaras491 9 месяцев назад
Great information, thanks!
@PowerStar004
@PowerStar004 9 месяцев назад
Today I learned why ps1 game isos don't use ".ps1" as an extension.
@crosssans9984
@crosssans9984 9 месяцев назад
lol
@KryzysX
@KryzysX 9 месяцев назад
Good video. Thank you for protecting us, soldier!
@TheRouteShow
@TheRouteShow 9 месяцев назад
pls make video on long-term personal data storage tips like mdisc etc...
@donbrunodelamancha1927
@donbrunodelamancha1927 9 месяцев назад
Thank you for all your content, as it is unassailable and very valued. So I pose the question: are use system, mechanic, ultimate for both virus, malware, system maintenance combination, suit. I know Bit Defender is a superior program for defense and monitoring, can you recommend a program for system maintenance that can be integrated into Bit Defender?
@thahrimdon
@thahrimdon 9 месяцев назад
ThioJoe always dropping videos on my shower thoughts
@cheeseparis1
@cheeseparis1 9 месяцев назад
Thanks for these warnings! Did Windows patched the ability to have the actual extension _before_ the dot?
@comaiscool
@comaiscool 9 месяцев назад
Education is the best preventative, Thank you for sharing and informing.
@endercrafto3
@endercrafto3 9 месяцев назад
Thanks proper subtitles
@mattcon700
@mattcon700 9 месяцев назад
this is really good to know Thanks!!!!!!! :D
@emoaf8555
@emoaf8555 9 месяцев назад
Informative and to the point
@miomip
@miomip 9 месяцев назад
I would probably add jar files to the list purely because of how common it is to have the jdk installed. And for those who aren't familiar with the jdk or its executable, the jar file. Jar files are a combined executable and library, which is used in Java, Android, and Kotlin development. In other words, it's everywhere and can on a lot of devices (especially phones) run without you downloading the jdk manually.
@mgord9518
@mgord9518 9 месяцев назад
Build once, infect anywhere
@Norman_Fleming
@Norman_Fleming 9 месяцев назад
You should just assume ANY kind of file can be an exploit. Remember image formats can exploit weaknesses in the rendering programs. Etc
@jboblk
@jboblk 9 месяцев назад
This guy used to trick me into taping batteries on my ethernet cable, now hes helping everybody out
@camm344
@camm344 9 месяцев назад
thanks for putting timestamps (i skipped the sponsor)
@thewisefromwest6941
@thewisefromwest6941 9 месяцев назад
I asked this on reddit, thanks for video
@9xGPU
@9xGPU 9 месяцев назад
Don't open a random powershell script
@LydiaReiko
@LydiaReiko 9 месяцев назад
dont open a random file*
@cheddars2
@cheddars2 8 месяцев назад
Our lecturer showed us just how nuts a simple word macro is. Full remote access with some social engineering, and made stronger via obfuscation. Crazy.
@WolfkunDotInfo
@WolfkunDotInfo 9 месяцев назад
Fun fact. I had set the poweshell limitation i saw in his poweshell video and it breaks visual studio installer. It gives a completely arbitrary error, so if you are failing to install or upgrade visual studio after applying poweshell security settings, remove themand retry. It is to bad as it is easy to do a simple bat file that can temporarily clear and reset (run as admin) which means ms could have done the same since vs installer also requires admin.
@Insightfill
@Insightfill 9 месяцев назад
I remember a great Win XP SP0 exploit where just hovering the mouse over an MP3 file could get you infected due to malformed ID3 tags and the mouse tip. Good times.
@Pohie
@Pohie 9 месяцев назад
This guy’s merch is top notch
@gergelyvarju6679
@gergelyvarju6679 9 месяцев назад
I would add a 6th and a 7th category. If an attacker knows that you use some outdated piece if software (including OS components) with a security hole allowing an attacker to execute any code it can be used to deliver malware. It can be a targeted attack specific to you, or can target everyone who is a registered user on a web page (forum, etc) about the outdated piece of software. I have also seen malicious code in source code form. Targeting people who would copy lots of code from questionable sources to their own solutions.
@bartegggg
@bartegggg 9 месяцев назад
it was very helpful, thank you
@RenTheFen
@RenTheFen 9 месяцев назад
Literally what everyone using a computer should know!! I didn’t even know some of these!!!
@jefflolson
@jefflolson 9 месяцев назад
What widget/s are you using to monitor system resources on your desktop?
@CNWPlayer
@CNWPlayer 9 месяцев назад
PROPER SUBTITLES nice
@fizixx
@fizixx 9 месяцев назад
Thanks Joe!
@nakotaapache4674
@nakotaapache4674 9 месяцев назад
Nice Allaround.
@DrakiniteOfficial
@DrakiniteOfficial 9 месяцев назад
Windows' built in zip archive extraction code should probably add that "mark of the web" to files that are extracted from a zip file which also has that mark of the web.
@Jazzhog
@Jazzhog 9 месяцев назад
How would I know if there is a gremlin or more lurking in my W10 Pro making me nutty-nuts? Lately I've been dealing with craziness. I'm working on my PC, all seems good and all of a sudden, multiple tabs start to open, shit start blinking and I can't seem to stop it. Finally, I have to shut down by pressing the button, wait several minutes, start it up. And sometimes It wont let me sign in so I have to do it again! Finally I'm able to do some work for a while and it starts all over again. I have 3 local accounts and I've signed in to each one and the issue is still on-going. Any suggestions ?
@Insightfill
@Insightfill 9 месяцев назад
9:29 Love the zip-bomb and 7zip-bomb exploits. Nothing like a tiny file that unpacks into a few petabytes to ruin your day.
@IWAC
@IWAC 8 месяцев назад
hey quick question have you ever heard of .nodes? i just remember that while some discord server was being raided one of the raiders sent a .nodes file with obvious virus name. i never saw .nodes so i wanted to see what it is but found nothing only .node and no i dont have the file since i was not familiar with that file and decided to not get it on some pendrive
@kitkat_03101
@kitkat_03101 9 месяцев назад
Nice 👍
@Oreo108GD
@Oreo108GD 9 месяцев назад
Yes, VBS 😅 ive created some loops myself and got scared of my own virus
@crosssans9984
@crosssans9984 9 месяцев назад
why. just why
@Xnoob545
@Xnoob545 9 месяцев назад
I made a bat forkbomb and waited too long to kill it and froze my laptop
@Oreo108GD
@Oreo108GD 9 месяцев назад
lol 😅@@Xnoob545
@zerotwoisreal
@zerotwoisreal 9 месяцев назад
i made a program that repeatedly rickrolls you
@Oreo108GD
@Oreo108GD 9 месяцев назад
because its funny (it wasnt public i just made it for myself)@@crosssans9984
@pem
@pem 9 месяцев назад
yoo twin this fye
@kirkoneill1387
@kirkoneill1387 9 месяцев назад
Do a video explaining the origins of file extension types. Like how they chose or came up with executable, png, jpeg batch, etc etc.
@simontay4851
@simontay4851 6 месяцев назад
All file extensions are abbreviations of words. PNG stands for Portable Network Graphics. JPEG is Joint Photographic Experts Group.
@kirkoneill1387
@kirkoneill1387 6 месяцев назад
@@simontay4851 interesting!
@demonking2526
@demonking2526 6 месяцев назад
I have Bitdefender. It's been protecting me for years. Another note is always keep the software up to date in case of vulnerability
@snarkykat
@snarkykat 9 месяцев назад
How do you view scripts that are embedded into .PDF documents? I occasionally get .PDFs in emails and then a popup from Norton saying that it stripped out a script from the document
@iirekm
@iirekm 6 месяцев назад
In certain situations (e.g. software with buffer overflows, script injection volnurabilities, bugs causing denial of service, not checking input file size), ANY file (image, audio, video, ...) opened in such a program can be dangerous (although of course it's less common).
@nealforreals2098
@nealforreals2098 9 месяцев назад
You're an Angel. Thank you.
@75rxREDSTONE
@75rxREDSTONE 9 месяцев назад
Can you explain Drive-by Downloads in the next video? Back in 2011 when I was a child visiting any link, one time something started, some tmp files appeared on Desktop, and the PC gave me a BSOD
@0znzw
@0znzw 9 месяцев назад
i love the video!, i have a question (its not related to the video but yeah) do you know what \\?\ is?
@deleted-something
@deleted-something 9 месяцев назад
wow, Thanks!
@FriedMonkey362
@FriedMonkey362 9 месяцев назад
Man, you totally opened up so many cool possibilities thanks for the inspiration!
@oglothenerd
@oglothenerd Месяц назад
As a Linux user, I really don't have to worry. Because... Linux makes you give the file a permission that allows it to execute.
Далее
10 Computer Security Myths to Stop Believing
15:57
Просмотров 647 тыс.
Are You Using the WRONG Image Format?
16:20
Просмотров 758 тыс.
Yangi uylanganlar😂😂😂
01:01
Просмотров 754 тыс.
How A Steam Bug Deleted Someone’s Entire PC
11:49
Просмотров 896 тыс.
What's inside a .EXE File?
8:27
Просмотров 411 тыс.
How to Catch A Hacker In Your Computer
17:05
Просмотров 263 тыс.
10 Computer Mistakes Most People Make
14:07
Просмотров 102 тыс.
ESET Review 2024: Tested in depth vs Malware
15:00
Просмотров 35 тыс.
What Are Those Other Weird QR Codes?
16:10
Просмотров 902 тыс.
Main filter..
0:15
Просмотров 7 млн
WWDC 2024 - June 10 | Apple
1:43:37
Просмотров 10 млн