www.bleepingcomputer.com
Open in
urlscan Pro
104.20.59.209
Public Scan
URL:
https://www.bleepingcomputer.com/forums/t/574487/is-it-possible-for-a-virus-to-be-embedded-in-a-image/
Submission: On January 19 via manual from US — Scanned from DE
Submission: On January 19 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOMPOST https://www.bleepingcomputer.com/forums/index.php?app=core&module=search&do=search&fromMainBar=1
<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&module=search&do=search&fromMainBar=1" method="post" id="search-box">
<fieldset>
<label for="main_search" class="hide">Search</label>
<a href="https://www.bleepingcomputer.com/forums/index.php?app=core&module=search&search_in=forums" title="Advanced Search" accesskey="4" rel="search" id="adv_search" class="right">Advanced</a>
<span id="search_wrap" class="right">
<input type="text" id="main_search" name="search_term" class="" size="17" tabindex="100" placeholder="Search...">
<span class="choice ipbmenu clickable" id="search_options" style="">This topic</span>
<ul id="search_options_menucontent" class="ipbmenu_content ipsPad" style="display: none; position: absolute; z-index: 9999;">
<li class="title" style="z-index: 10000;"><strong style="z-index: 10000;">Search section:</strong></li>
<li class="special" style="z-index: 10000;">
<label for="s_topic" title="This topic" style="z-index: 10000;">
<input type="radio" name="search_app" value="forums:topic:574487" class="input_radio" id="s_topic" checked="checked" style="z-index: 10000;"><strong style="z-index: 10000;">This topic</strong>
</label>
</li>
<li class="app" style="z-index: 10000;"><label for="s_forums" title="Forums" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_forums" value="forums" style="z-index: 10000;">Forums</label></li>
<li class="app" style="z-index: 10000;"><label for="s_members" title="Members" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_members" value="members" style="z-index: 10000;">Members</label></li>
<li class="app" style="z-index: 10000;"><label for="s_core" title="Help Files" style="z-index: 10000;"><input type="radio" name="search_app" class="input_radio" id="s_core" value="core" style="z-index: 10000;">Help Files</label></li>
<li class="app" style="z-index: 10000;">
<label for="s_calendar" title="Calendar" style="z-index: 10000;">
<input type="radio" name="search_app" class="input_radio" id="s_calendar" value="calendar" style="z-index: 10000;">Calendar </label>
</li>
</ul>
<input aria-label="Search the forum" type="submit" class="submit_input clickable" value="">
</span>
</fieldset>
</form>
POST https://www.bleepingcomputer.com/forums/index.php?
<form id="modform" method="post" action="https://www.bleepingcomputer.com/forums/index.php?">
<input type="hidden" name="app" value="forums">
<input type="hidden" name="module" value="moderate">
<input type="hidden" name="section" value="moderate">
<input type="hidden" name="do" value="postchoice">
<input type="hidden" name="f" value="45">
<input type="hidden" name="t" value="574487">
<input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
<input type="hidden" name="st" value="">
<input type="hidden" name="page" value="">
<input type="hidden" value="" name="selectedpidsJS" id="selectedpidsJS">
<input type="hidden" name="tact" id="tact" value="">
</form>
POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=global§ion=login&do=process
<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&do=process" method="post" id="login">
<input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
<input type="hidden" name="referer" value="https://www.bleepingcomputer.com/forums/t/574487/is-it-possible-for-a-virus-to-be-embedded-in-a-image/">
<h3>Sign In</h3>
<div class="ipsBox_notice">
<ul class="ipsList_inline">
<li>
<a href="https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&serviceClick=twitter" class="ipsButton_secondary"><img src="https://www.bleepingcomputer.com/forums/public/style_images/master/loginmethods/twitter.png" alt="Twitter"> Use Twitter</a>
</li>
</ul>
</div>
<br>
<div class="ipsForm ipsForm_horizontal">
<fieldset>
<ul>
<li class="ipsField">
<div class="ipsField_content"> Need an account? <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=register" title="Register now!">Register now!</a>
</div>
</li>
<li class="ipsField ipsField_primary">
<label for="ips_username" class="ipsField_title">Username</label>
<div class="ipsField_content">
<input id="ips_username" type="text" class="input_text" name="ips_username" size="30" tabindex="0">
</div>
</li>
<li class="ipsField ipsField_primary">
<label for="ips_password" class="ipsField_title">Forum Password</label>
<div class="ipsField_content">
<input id="ips_password" type="password" class="input_text" name="ips_password" size="30" tabindex="0"><br>
<a href="https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=lostpass" title="Retrieve password">I've forgotten my password</a>
</div>
</li>
<li class="ipsField ipsField_checkbox">
<input type="checkbox" id="inline_remember" checked="checked" name="rememberMe" value="1" class="input_check" tabindex="0">
<div class="ipsField_content">
<label for="inline_remember">
<strong>Remember me</strong><br>
<span class="desc lighter">This is not recommended for shared computers</span>
</label>
</div>
</li>
<li class="ipsField ipsField_checkbox">
<input type="checkbox" id="inline_invisible" name="anonymous" value="1" class="input_check" tabindex="0">
<div class="ipsField_content">
<label for="inline_invisible">
<strong>Sign in anonymously</strong><br>
<span class="desc lighter">Don't add me to the active users list</span>
</label>
</div>
</li>
<li class="ipsPad_top ipsForm_center desc ipsType_smaller">
<a rel="nofollow" href="https://www.bleepingcomputer.com/forums/privacypolicy/">Privacy Policy</a>
</li>
</ul>
</fieldset>
<div class="ipsForm_submit ipsForm_center">
<input type="submit" class="ipsButton" value="Sign In" tabindex="0">
</div>
</div>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may access more detailed information and change your preferences before consenting or to refuse consenting. Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to this website only. You can change your preferences at any time by returning to this site or visit our privacy policy. MORE OPTIONSAGREE * Sign In * Create Account Search Advanced This topic * Search section: * This topic * Forums * Members * Help Files * Calendar * * View New Content * Forum Rules * BleepingComputer.com * Forums * Members * Tutorials * Startup List * Virus Removal * Downloads * Uninstall List * Welcome Guide * More 1. BleepingComputer.com 2. → Security 3. → General Security Javascript Disabled Detected You currently have javascript disabled. Several functions may not work. Please re-enable javascript to access full functionality. Register a free account to unlock additional features at BleepingComputer.com Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site. Click here to Register a free account now! or read our Welcome Guide to learn how to use this site. Latest News: Windows Server 2019 OOB update fixes reboots, Hyper-V, ReFS bugs Featured Deal: Get 40% off this bundle of popular Mac utilities and tools IS IT POSSIBLE FOR A VIRUS TO BE EMBEDDED IN A IMAGE? Started by SuperSapien64 , Apr 26 2015 05:51 PM * Page 1 of 3 * 1 * 2 * 3 * Next * Please log in to reply 32 replies to this topic #1 SUPERSAPIEN64 SuperSapien64 * * Members * 1,937 posts * OFFLINE * Gender:Male * Local time:11:16 PM Posted 26 April 2015 - 05:51 PM This one question which I've always pondered about can a virus be embedded in a image (jpg,gif,png,etc)? I know a worm could but what about a Trojan or other malware? Part of the reason I ask is because my brother has a bunch of images on his Android phone and I would like to know the chances of him becoming infected with malware from the images he downloaded? Avatar/Icon by https://www.deviantart.com/dablim/gallery * Back to top -------------------------------------------------------------------------------- BC ADBOT (LOGIN TO REMOVE) * * BleepingComputer.com * * Register to remove ads PLAY Top Articles Video Settings Full Screen About Connatix V146288 Read More Read More Read More Read More Read More Read More Windows Server 2019 OOB update fixes reboots,Hyper‑V, ReFS bugs 1/1 Skip Ad Continue watching after the ad Visit Advertiser website GO TO PAGE -------------------------------------------------------------------------------- #2 MINXY MOO Minxy Moo * * Members * 19 posts * OFFLINE * Gender:Female * Local time:06:16 AM Posted 26 April 2015 - 06:04 PM I think anything you download can have a virus attached to it. I'm no expert though! * Back to top -------------------------------------------------------------------------------- #3 AURA Aura Bleepin' Special Ops * * Malware Response Team * 19,707 posts * OFFLINE * Gender:Male * Local time:01:16 AM Posted 26 April 2015 - 06:04 PM Hi SuperSapien64 Yes, it's possible for a malware to be embedded in a picture file. Or it's possible for a picture file to be specially crafted in order to be infected. Someone explained that concept in the thread below, if you want to take a look at it. This looks new and slipped by the Gmail filters this morning. I guess that one of our Security Experts here like Didier or Mike could tell you more about that practice Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM. * Back to top -------------------------------------------------------------------------------- #4 SUPERSAPIEN64 SuperSapien64 * Topic Starter * * Members * 1,937 posts * OFFLINE * Gender:Male * Local time:11:16 PM Posted 26 April 2015 - 09:08 PM Aura., on 26 Apr 2015 - 11:04 PM, said: > Hi SuperSapien64 > > Yes, it's possible for a malware to be embedded in a picture file. Or it's > possible for a picture file to be specially crafted in order to be infected. > Someone explained that concept in the thread below, if you want to take a look > at it. > > This looks new and slipped by the Gmail filters this morning. > > I guess that one of our Security Experts here like Didier or Mike could tell > you more about that practice Yes I'm aware of that method it can be used with almost any media or document file like a PDF for example. But I'm curious if its possible to script malicious code the same its possible for a text file to have malicious scripts since PNG,GIF and TIFs all support transparent layers wouldn't be possible to embed code in the transparent layers and exploiting variabilities in a operating system? I hope I'm not opening Pandora's box by mentioning this concept. Edited by SuperSapien64, 26 April 2015 - 09:09 PM. Avatar/Icon by https://www.deviantart.com/dablim/gallery * Back to top -------------------------------------------------------------------------------- #5 AURA Aura Bleepin' Special Ops * * Malware Response Team * 19,707 posts * OFFLINE * Gender:Male * Local time:01:16 AM Posted 26 April 2015 - 09:11 PM Yes its possible to have an image embedded with malicious code that will be executed by the program in which it could be open. See the reply to this question here: http://security.stackexchange.com/questions/55061/can-malware-be-attached-to-an-image Security Updates are being released for programs that could be exploited by these methods, so its a threat that exists and is considered as dangerous by software' authors. Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM. * Back to top -------------------------------------------------------------------------------- #6 QUIETMAN7 quietman7 Bleepin' Gumshoe * * Global Moderator * 59,027 posts * OFFLINE * Gender:Male * Location:Virginia, USA * Local time:12:16 AM Posted 26 April 2015 - 09:21 PM Quote > There are some cases where pictures can in fact carry viruses, but once again > even that is extremely rare. Typically, a virus-carrying picture must be > created by someone with malicious intent, so they're not going to infect > existing photos. When they first appeared they were placed on websites so that > visitors would be infected...The other picture-related vector for virus > propagation is a picture that's not a picture...there's nothing that says a > ".jpg" file needs to actually contain a picture...Depending on how it's done, > and how up to date your system is, it's possible for a virus to masquerade as > a picture. If you attempt to view the picture, you get a virus instead. Can a virus be transmitted in a picture? Quote > ...digital steganography...Malware authors can employ this technique to > conceal malicious code in otherwise normal looking media files like images, > without arousing any suspicion...digital steganography means that even > everyday images encountered on the web are not above suspicion... How Digital Steganography Hides Malware Attackers are resourceful individuals but they typically look for methods that offer a stealthy way to distribute malware to a wide range of Internet users. Image files are not really an effective way to accomplish that goal because in an image format malicious code cannot be easily executed and distributed. While there have been proof-of-concept virus reports of such infections, they are rare and certainly not widespread. What we more commonly see is a disguised malicious executable containing viral code which has been created and renamed .jpg so that it masquerades as a picture. . . Windows Insider MVP 2017-2020 Microsoft MVP Reconnect 2016 Microsoft MVP Consumer Security 2007-2015 Member of UNITE, Unified Network of Instructors and Trusted Eliminators If I have been helpful & you'd like to consider a donation, click * Back to top -------------------------------------------------------------------------------- #7 WHITE HAT MIKE White Hat Mike * * Members * 312 posts * OFFLINE * Gender:Male * Location:::1 * Local time:01:16 AM Posted 27 April 2015 - 07:13 AM SuperSapien64, on 27 Apr 2015 - 02:08 AM, said: > > > Aura., on 26 Apr 2015 - 11:04 PM, said: > > > Hi SuperSapien64 > > > > Yes, it's possible for a malware to be embedded in a picture file. Or it's > > possible for a picture file to be specially crafted in order to be infected. > > Someone explained that concept in the thread below, if you want to take a > > look at it. > > > > This looks new and slipped by the Gmail filters this morning. > > > > I guess that one of our Security Experts here like Didier or Mike could > > tell you more about that practice > > Yes I'm aware of that method it can be used with almost any media or document > file like a PDF for example. But I'm curious if its possible to script > malicious code the same its possible for a text file to have malicious scripts > since PNG,GIF and TIFs all support transparent layers wouldn't be possible to > embed code in the transparent layers and exploiting variabilities in a > operating system? > > I hope I'm not opening Pandora's box by mentioning this concept. > > Extremely unlikely, especially today. Theoretically, it's possible, but a true image file that delivers malicious content is unlikely; I don't think this is something that you should be concerned about or spend much time pondering. However, attackers can and do use images for many different things. For example, embedding an [invisible] image into a website or an e-mail with a source URL of an attacker's web page along with unique parameters to identify the user. Often used for statistical purposes, and for tracking targets. An example of steganography could be an attacker planting payload code / other instructions within an image, then obfuscating/encrypting/or encoding the image, only to deobfuscate/decrypt/decode it upon the page's loading and extract the planting code/instructions from the source. Information Security Engineer | Penetration Tester | Forensic Analyst CipherTechs.com * Back to top -------------------------------------------------------------------------------- #8 DIDIER STEVENS Didier Stevens * * BC Advisor * 2,986 posts * OFFLINE * Gender:Not Telling * Local time:06:16 AM Posted 27 April 2015 - 09:35 AM SuperSapien64, on 26 Apr 2015 - 10:51 PM, said: > This one question which I've always pondered about can a virus be embedded in > a image (jpg,gif,png,etc)? I know a worm could but what about a Trojan or > other malware? Part of the reason I ask is because my brother has a bunch of > images on his Android phone and I would like to know the chances of him > becoming infected with malware from the images he downloaded? I'm a bit confused by your statement. You say a worm can, but you wonder about a virus or trojan. I call all malicious software malware. Typically, a virus is defined as malware that propagates but needs user interaction to propagate. A worm, on the other hand, propagates but does not need user interaction. What is your example of a worm that propagates via embedding in images? Didier Stevens http://blog.DidierStevens.com http://DidierStevensLabs.com SANS ISC Senior Handler Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2022 If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages. Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0" * Back to top -------------------------------------------------------------------------------- #9 RP88 rp88 * * Members * 3,445 posts * OFFLINE * Gender:Not Telling * Local time:05:16 AM Posted 27 April 2015 - 12:37 PM From what I've heard, in the cases of steganography the image is not actually dangerous in the normal sense, you could download the image without risk BUT if you run any exe files by the image's evil author then those exe files, will find that image and use it's code to inform themselves of what to do next. The virus arrives in two parts, an executable part (which might execute by driveby, by exploiting a program or by tricking the user into running it) and an image (which secretly holds instrcutions for the executing part). That means the executing part can't set off antivirus scanners because it isn't doing anything malicious (it's just following orders to "find the image example.jpg, read the steganographic code hidden in it and then do what that code tells it"), the malicious orders are hidden within the image, but they can't do anything without the executable running and reading the malicious instrcutions. In the case of images designed to exploit software, and then run malicious code themselves, the image is dangerous alone, because it is able to execute itself, due to bugs in the software which is used to open it. Theoretically it should be impossible for an image to be a virus, images are non-executable code, they don't give instructions telling computers what to do, they should just get read by image viewing software and then the image viewing program turns their code into a pattern on screen. BUT because nobody's programming is ever perfect all real world image viewing programs have a chance of having flaws in their code, mistakes in their design meaning that it is possible for certain codes to cause them to act strangely. Think of an image viewing program as being a black box, in goes a string of data read from the image file, out comes a pattern of pixels on screen, and what if this box had a mistake in it's design that if the code "d0dgy-c0d3" ever gets read in the input string of data then the box decides to treat all further instructions as being orders for actions, not just code for pixels. An attacker could make a specially crafted image file with the code "d0dgy-c0d3" in it's data somewhere and after that a series of malicious instructions. Then when the data of the image file goes into the black box of the software it reads the pixels as usual, then it reads the code "d0dgy-c0d3" and after that it treats ubsequent code as executable rather than as beng the pixels of an image, and the attacker now has whatever code he wrote after the line "d0dgy-c0d3" running as an executable on the victims computer. This is why image viewing/editing software needs updates every so often to patch it and stop malicious images from being able to run code. If you look back over the description pages of security updates which windows has released over the last few months you'll notice some of them are to deal with specially crafted jpg ad png images, those updates are designed to make sure that image viewing programs within windows and IE do not treat code that confuses them as being executable. Fortunately, because it is much harder for attackers to find the necesary bugs in image viewing programs than it is for them to spread viruses by tricking people into running exe files which the user thinks are images (see next paragraph), this sort of attack is fairly rare. The other thing to consider is images wth faked double extensions. Imagine a file called picture1.jpg.exe , most users would not see the second extension because (unless you change it's setting to "display full file extensions even for known file types" within folder options, you should change this setting now)windows would only show the first extension. On top of that many users might not even realise the significance of different file extension types, so even if they did see this they might not realise that the file is dangerous. The second extension is the real extension, but as most users would only see the first, and might even then not realise what it means, users would open the exe file thinking it was a picture, and get a horrible shock when it turned out to be a program in disguise. In the case of your brother's phone I think images are the least likely way for it to get infected, more probable causes are: drivebys and malvertising, malicious apps (pretending to be legitimate) which somehow snuck into the relevant app store, malicious apps(pretending to be legitimate) sideloaded from outside the app store, a virus getting onto it when it was plugged into an infected device via connection cable. Even though images are not a likely way for the virus to have arrived I would still suggest it is not safe to copy the images off of the phone onto a computer because although the images might be perfectly safe the act of connecting a potentially infected phone to a computer might well be enough for the phone to infect the computer by autorun/autoplay type methods. Edited by rp88, 27 April 2015 - 12:42 PM. Back on this site, for a while anyway, been so busy the last year. My systems:2 laptops, intel i3 processors, windows 8.1 installed on the hard-drive and linux mint 17.3 MATE installed to USB * Back to top -------------------------------------------------------------------------------- #10 SUPERSAPIEN64 SuperSapien64 * Topic Starter * * Members * 1,937 posts * OFFLINE * Gender:Male * Local time:11:16 PM Posted 28 April 2015 - 05:11 PM In other words its impractical from both a developmental and strategical standpoint. And methods like steganography would be more commonly used in espionage so the average user doesn't have to be concerned with this. Thanks for explaining this in detail I feel a lot more relaxed about this and it helps eliminate possibilities for any Trojans (excluding freeware apps) on my brothers smartphone. Avatar/Icon by https://www.deviantart.com/dablim/gallery * Back to top -------------------------------------------------------------------------------- #11 QUIETMAN7 quietman7 Bleepin' Gumshoe * * Global Moderator * 59,027 posts * OFFLINE * Gender:Male * Location:Virginia, USA * Local time:12:16 AM Posted 28 April 2015 - 05:16 PM You're welcome on behalf of the Bleeping Computer community. If you have not done so already, you may want to read: Answers to common security questions - Best Practices for Safe Computing . . Windows Insider MVP 2017-2020 Microsoft MVP Reconnect 2016 Microsoft MVP Consumer Security 2007-2015 Member of UNITE, Unified Network of Instructors and Trusted Eliminators If I have been helpful & you'd like to consider a donation, click * Back to top -------------------------------------------------------------------------------- #12 GMER99 Gmer99 * * Members * 75 posts * OFFLINE * Gender:Male * Location:Europe * Local time:07:16 AM Posted 28 April 2015 - 05:23 PM If you download that image from torrents or your winrar archive is infected when you unzip the files you could have a hidden virus in that image !!! Avoid torrents and avoid windows with a bunch of crap software to install after windows is installed , those all in one software comes with hidden viruses you will never suspect ...Cyber criminals hide backdoors in those software so they will know fast if your pc is calling them to be ready for attack. * Back to top -------------------------------------------------------------------------------- #13 AURA Aura Bleepin' Special Ops * * Malware Response Team * 19,707 posts * OFFLINE * Gender:Male * Local time:01:16 AM Posted 28 April 2015 - 05:24 PM Quote > avoid windows with a bunch of crap software to install after windows is > installed You mean, OEM preinstalled version of Windows by manufacturers? Security Administrator | Sysnative Windows Update Senior Analyst | Malware Hunter | @SecurityAura My timezone UTC-05:00 (East. Coast). If I didn't reply to you within 48 hours, please send me a PM. * Back to top -------------------------------------------------------------------------------- #14 QUIETMAN7 quietman7 Bleepin' Gumshoe * * Global Moderator * 59,027 posts * OFFLINE * Gender:Male * Location:Virginia, USA * Local time:12:16 AM Posted 28 April 2015 - 05:41 PM The practice of using any torrent, file sharing, peer-to-peer (P2P) program or visiting such sites is a security risk which can make your system susceptible to a smörgåsbord of malware infections, remote attacks, exposure of personal information, and identity theft. * File Sharing (P2P), Torrents, Keygens, Cracks, Warez, and Pirated Software are a Security Risk . . Windows Insider MVP 2017-2020 Microsoft MVP Reconnect 2016 Microsoft MVP Consumer Security 2007-2015 Member of UNITE, Unified Network of Instructors and Trusted Eliminators If I have been helpful & you'd like to consider a donation, click * Back to top -------------------------------------------------------------------------------- #15 SUPERSAPIEN64 SuperSapien64 * Topic Starter * * Members * 1,937 posts * OFFLINE * Gender:Male * Local time:11:16 PM Posted 28 April 2015 - 07:25 PM quietman7, on 28 Apr 2015 - 10:41 PM, said: > The practice of using any torrent, file sharing, peer-to-peer (P2P) program or > visiting such sites is a security risk which can make your system susceptible > to a smörgåsbord of malware infections, remote attacks, exposure of personal > information, and identity theft. > > * File Sharing (P2P), Torrents, Keygens, Cracks, Warez, and Pirated Software > are a Security Risk > > Even Linux or Android can become infested with malware when using P2P clients which is why I always uninstall them on Linux. But makes me wonder why do they even come pre-installed on so many Linux distros? Avatar/Icon by https://www.deviantart.com/dablim/gallery * Back to top -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- * Page 1 of 3 * 1 * 2 * 3 * Next Back to General Security * * * * * * * * * * 1 USER(S) ARE READING THIS TOPIC 0 members, 1 guests, 0 anonymous users Reply to quoted posts Clear 1. BleepingComputer.com 2. → Security 3. → General Security 4. Privacy Policy 5. Rules · * * Help Advertise | About Us | Terms of Use | Privacy Policy | Sitemap | Chat | RSS Feeds | Contact Us Tech Support Forums | Virus Removal Guides | Downloads | Tutorials | The Computer Glossary | Uninstall List | Startups | The File Database © 2004-2022 All Rights Reserved Bleeping Computer LLC . Site Changelog Community Forum Software by IP.Board SIGN IN * Use Twitter * Need an account? Register now! * Username * Forum Password I've forgotten my password * Remember me This is not recommended for shared computers * Sign in anonymously Don't add me to the active users list * Privacy Policy JUMP TO PAGE JUMP TO PAGE