Welcome to the MacNN Forums.

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

You are here: MacNN Forums > Software - Troubleshooting and Discussion > macOS > The first Mac OS X "virus" is a clever Trojan

The first Mac OS X "virus" is a clever Trojan
Thread Tools
- - e r i k - -
Posting Junkie
Join Date: May 2001
Location: Brisbane, Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 02:40 AM
 
MacRumors.com reports:
On the evening of the 13th, an unknown user posted a link to a file on MacRumors Forums claiming to be the latest Leopard Mac OS X 10.5 screenshots. The file was named "latestpics.tgz"

The resultant file decompresses into what appears to be a standard JPEG icon in Mac OS X but is actually a compiled Unix executable in disguise. An initial disassembly (from original discussion thread) reveals evidence that the application is a virus or was designed to give that impression. Routines listed include:

_infect:
_infectApps:
_installHooks:
_copySelf:

The exact consequences of the application are unclear, but according to the users that originally executed the application have noted that it appears to self propogate:
If anyone remembers last night, when lasthope spread that picture that opened in terminal. I just turned on my other computer and it said it had an incoming file, from my computer, which was the latest pics file. Any help. I have already secure deleted it off of my harddrive, but how do i know that it will not come back.

Andrew Welch who had done some of the initial disassembly is posting updates to this thread.

According to the initial investigation, the application uses Spotlight to find the other applications on the infected machine and subsequently inserts a stub of code into each application executable.
Oh well. It was bound to happen sooner or later. Yes it is "just" a Trojan, requiring a user to click on it. But what's worse is that it seems not to need permissions to execute.

[ fb ] [ flickr ] [] [scl] [ last ] [ plaxo ]
     
Severed Hand of Skywalker
Addicted to MacNN
Join Date: Apr 2001
Location: The bottom of Cloud City
Status: Offline
Reply With Quote
Feb 16, 2006, 03:18 AM
 
Funny how we get the first virus 30 days after Apple goes intel.

"Ahhhhhhhhhhhhhhhh"
     
Catfish_Man
Mac Elite
Join Date: Aug 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 03:24 AM
 
Third trojan, not first virus, actually. People always forget about the one that pretended to be an MS Office installer, and the one that pretended to be an mp3 file. Also, this "virus" only runs on PPC Macs...
     
- - e r i k - -  (op)
Posting Junkie
Join Date: May 2001
Location: Brisbane, Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 03:24 AM
 
Funny how that is a coincidental, not causal, relationship.

[ fb ] [ flickr ] [] [scl] [ last ] [ plaxo ]
     
- - e r i k - -  (op)
Posting Junkie
Join Date: May 2001
Location: Brisbane, Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 03:27 AM
 
The one who pretended to be an mp3-file was only a proof-of-concept that was never released and ironically never proved to work either.

Perhaps people forgot about the MS Office-installer since it was only released on a warez-site and had really weak social engineering. A ~512KB MS Office-installer? People that got that only got what they deserved.

[ fb ] [ flickr ] [] [scl] [ last ] [ plaxo ]
     
Catfish_Man
Mac Elite
Join Date: Aug 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 03:41 AM
 
Originally Posted by - - e r i k - -
The one who pretended to be an mp3-file was only a proof-of-concept that was never released and ironically never proved to work either.

Perhaps people forgot about the MS Office-installer since it was only released on a warez-site and had really weak social engineering. A ~512KB MS Office-installer? People that got that only got what they deserved.
Oh, definitely. I'm not saying either of the previous two trojans were threats, just pointing out their existence. This is certainly more serious.
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 03:44 AM
 
Originally Posted by Catfish_Man
Third trojan, not first virus, actually. People always forget about the one that pretended to be an MS Office installer, and the one that pretended to be an mp3 file. Also, this "virus" only runs on PPC Macs...
what about Rosetta?
     
Catfish_Man
Mac Elite
Join Date: Aug 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 03:49 AM
 
Originally Posted by moonmonkey
what about Rosetta?
Good question. Any volunteers?
     
Tiranis
Fresh-Faced Recruit
Join Date: Feb 2006
Status: Offline
Reply With Quote
Feb 16, 2006, 03:50 AM
 
Originally Posted by moonmonkey
what about Rosetta?
Nope, it seems to fail on the Intel Macs, the people didn't post why, but it doesn't work. I would still urge you not to experiment with it though, you never know—those people might have lied (hopefully not). Better safe than sorry.

In any case—if you run an admin account and launched this—you needed the "wake-up call", if you ran a managed account and launched this, then entered the root password—you needed the "wake-up call". Otherwise you're safe.

Seriously, although I've already used this on another forum, would you take a pill if a complete stranger offered it to you on the street and claimed it to be a candy?
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 04:06 AM
 
Jesus, its all going off, tons of people have launched this, people claim its propogating through iChat too.

The mainstream press are going to be all over this tomorrow.
     
monkeybrain
Mac Elite
Join Date: Nov 2001
Location: Dark Side of the Moon
Status: Offline
Reply With Quote
Feb 16, 2006, 05:44 AM
 
So does anyone know what it does yet? Let's hope it does no actual harm, other than cause worry.

Apple is no doubt on this already.
     
CharlesS
Posting Junkie
Join Date: Dec 2000
Status: Offline
Reply With Quote
Feb 16, 2006, 05:53 AM
 
The Andrew Welch post that the OP linked to contains some information on what it does. What I'm worried about is the Bonjour aspect of it - hopefully this just means it sends files via iChat/Bonjour and not that someone found a security hole in Bonjour that would allow a remote exploit without user intervention...

Ticking sound coming from a .pkg package? Don't let the .bom go off! Inspect it first with Pacifist. Macworld - five mice!
     
analogika
Posting Junkie
Join Date: Feb 2005
Location: 888500128
Status: Offline
Reply With Quote
Feb 16, 2006, 06:06 AM
 
Originally Posted by Severed Hand of Skywalker
Funny how we get the first virus 30 days after Apple goes intel.
Yeah - seeing as it only runs on PPC, I'd say somebody's desperate to get his little bit in before it's too late...


you moron.
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 06:08 AM
 
Originally Posted by monkeybrain
So does anyone know what it does yet? Let's hope it does no actual harm, other than cause worry.

Apple is no doubt on this already.

Apparently it picks the most recent four applications that you used (depending on permissions) and adds the code into those apps. From what I can tell it renders the apps useless as well as infectious.

It seems to take advantage of the fact that different apps are installed with different permissions.

I may be wrong, but it doesn't look harmless.

*It really deserves an Apple Design Award for Best Mac OS X Tiger Technology Adoption*
( Last edited by moonmonkey; Feb 16, 2006 at 06:23 AM. )
     
ism
Grizzled Veteran
Join Date: Sep 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 06:45 AM
 
Been thinking about this: http://forums.macrumors.com/showpost...&postcount=148

There is only so much you can do to avoid social engineering tricks. Most people aren't going to check every file they download.

For the paranoid, you could use a folder action on your desktop to unset the executable flag of files added there (by unzipping a downloaded archive, etc):

Code:
on adding folder items to this_folder after receiving added_items do shell script "cd ~/Desktop; chmod -R ugo-x *" end adding folder items to
That isn't great since it recursively sets all desktop files instead of just the ones that have been added, but it's a start.
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 07:25 AM
 
Originally Posted by ism
Been thinking about this: http://forums.macrumors.com/showpost...&postcount=148

There is only so much you can do to avoid social engineering tricks. Most people aren't going to check every file they download.

For the paranoid, you could use a folder action on your desktop to unset the executable flag of files added there (by unzipping a downloaded archive, etc):

Code:
on adding folder items to this_folder after receiving added_items do shell script "cd ~/Desktop; chmod -R ugo-x *" end adding folder items to
That isn't great since it recursively sets all desktop files instead of just the ones that have been added, but it's a start.

Wont this kill any downloaded app?
please explain?
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 07:43 AM
 
Reading the details of Andrew Welch's post, it installs something into /Library/Input Managers/ which is how it injects its code into your apps. Could this be prevented by altering the permissions on that folder or by locking it?
     
Philip J. Fry
Mac Enthusiast
Join Date: Jul 2005
Location: Planet Express
Status: Offline
Reply With Quote
Feb 16, 2006, 08:23 AM
 
Originally Posted by JKT
Reading the details of Andrew Welch's post, it installs something into /Library/Input Managers/ which is how it injects its code into your apps. Could this be prevented by altering the permissions on that folder or by locking it?

Common sense claims that we should know better than to look for 10.5 'Leopard' screenshots anyway, esp. since Steve hasn't mentioned it since last June.
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 08:29 AM
 
Originally Posted by JKT
Reading the details of Andrew Welch's post, it installs something into /Library/Input Managers/ which is how it injects its code into your apps. Could this be prevented by altering the permissions on that folder or by locking it?
This seems like a great idea, can someone (who knows what they are talking about) comment on the viability of this?
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 08:46 AM
 
Originally Posted by Philip J. Fry
Common sense claims that we should know better than to look for 10.5 'Leopard' screenshots anyway, esp. since Steve hasn't mentioned it since last June.
Yes, I know this (though one thing that is far from common is sense, as they say). I'm just thinking of the script-kiddies who will copy-cat this thing. If it is as simple a fix as preventing Input Managers from being installed without explicit permission (even if you are running as admin which is probably what 99% of OS X users are doing) then this is something Apple could do immediately to close this hole, much like the change of permissions for the Widgets folder.
     
Millennium
Clinically Insane
Join Date: Nov 1999
Status: Offline
Reply With Quote
Feb 16, 2006, 08:55 AM
 
Actually, if this can infect apps, then it's a true virus. It spreads the old-fashioned way: from app to app instead of directly from machine to machine. What many people call 'viruses' today are actually worms.
You are in Soviet Russia. It is dark. Grue is likely to be eaten by YOU!
     
ShotgunEd
Mac Elite
Join Date: Nov 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 08:57 AM
 
Originally Posted by moonmonkey
Wont this kill any downloaded app?
please explain?
It would, but if you trust the source, then you can unzip the app to somewhere other than the desktop, and besides, most apps come on disk images.
     
Geobunny
Mac Elite
Join Date: Oct 2000
Location: Edinburgh, Scotland
Status: Offline
Reply With Quote
Feb 16, 2006, 09:26 AM
 
MacRumours have removed the link from their story (fair enough I suppose!). Can someone please forward me the file or tell me where I can download it please. I need to pull it apart and upload it to www.clamav.net so that ClamXav will be able to fish it out.

Thanks
ClamXav - the free virus scanner for Mac OS X | Geobunny learns to fly
     
moonmonkey
Professional Poster
Join Date: Jan 2001
Location: Australia
Status: Offline
Reply With Quote
Feb 16, 2006, 09:34 AM
 
Originally Posted by Geobunny
MacRumours have removed the link from their story (fair enough I suppose!). Can someone please forward me the file or tell me where I can download it please. I need to pull it apart and upload it to www.clamav.net so that ClamXav will be able to fish it out.

Thanks

Speak to Moki about this, he has a copy.
     
Geobunny
Mac Elite
Join Date: Oct 2000
Location: Edinburgh, Scotland
Status: Offline
Reply With Quote
Feb 16, 2006, 09:36 AM
 
Thanks, moonmonkey, will do.
ClamXav - the free virus scanner for Mac OS X | Geobunny learns to fly
     
Horsepoo!!!
Banned
Join Date: Jun 2003
Status: Offline
Reply With Quote
Feb 16, 2006, 10:26 AM
 
What's funny is that people on Intel-based Macs are immune to it.
     
Chuckit
Clinically Insane
Join Date: Oct 2001
Location: San Diego, CA, USA
Status: Offline
Reply With Quote
Feb 16, 2006, 11:13 AM
 
Originally Posted by Tiranis
Nope, it seems to fail on the Intel Macs, the people didn't post why, but it doesn't work.
Looks like it uses a code-injection technique, which just won't work in Rosetta (for once the plugin problem is helpful).

By the way, I always open downloaded files by right-clicking and doing Open With…. Much less danger of the OS interpreting that as "Execute this virus please."
Chuck
___
"Instead of either 'multi-talented' or 'multitalented' use 'bisexual'."
     
torifile
Mac Elite
Join Date: Jan 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 11:15 AM
 
If this uses the four most recent apps, what if you turned set your most recent apps to be displayed in the Apple menu to zero? I don't know if that's how it's getting its info, but it could be an easy work around to this type of exploit.
     
monkeybrain
Mac Elite
Join Date: Nov 2001
Location: Dark Side of the Moon
Status: Offline
Reply With Quote
Feb 16, 2006, 11:17 AM
 
Originally Posted by torifile
If this uses the four most recent apps, what if you turned set your most recent apps to be displayed in the Apple menu to zero? I don't know if that's how it's getting its info, but it could be an easy work around to this type of exploit.
But maybe it's using Spotlight to find the recent apps, since you can set up a Smart Folder to find recent app/documents or whatever.
     
ism
Grizzled Veteran
Join Date: Sep 2001
Status: Offline
Reply With Quote
Feb 16, 2006, 11:57 AM
 
Originally Posted by moonmonkey
Wont this kill any downloaded app?
please explain?
I see shotgunEd answered this for you.

In addition:

Downloaded apps, etc don't need/shouldn't be executable (zip files, dmgs, etc). This script would just ensure that if you unzipped an archive it would set everything to be unexecutable. If the file you clicked on was a true image it'd still open. But if it was a trojan, it wouldn't run.

This doesn't help with disk images though. Can't see what could be done about that, i.e. if you decide to open the 'image' from the disk image. To play safe you'd want to copy it to the desktop, etc.

This is a more efficient Applescript (only targets added items not all can be applied to any folder):

Code:
on adding folder items to this_folder after receiving added_items repeat with i from 1 to count added_items tell (info for (item i of added_items)) to set item_name to name set path_display to quoted form of the POSIX path of ((this_folder as string) & item_name) do shell script "/bin/chmod ugo-x " & path_display end repeat end adding folder items to
Formatting sucks, hope you can figure it out
     
Severed Hand of Skywalker
Addicted to MacNN
Join Date: Apr 2001
Location: The bottom of Cloud City
Status: Offline
Reply With Quote
Feb 16, 2006, 12:21 PM
 
Originally Posted by analogika
Yeah - seeing as it only runs on PPC, I'd say somebody's desperate to get his little bit in before it's too late...


you moron.

I think you are the moron as it was sarcasm but you were too stupid to pick up on it

So don't lose any more hair over it

"Ahhhhhhhhhhhhhhhh"
     
analogika
Posting Junkie
Join Date: Feb 2005
Location: 888500128
Status: Offline
Reply With Quote
Feb 16, 2006, 12:28 PM
 
Don't tell me you've come out of the closet regarding the Big Switch?


Say it ain't so!





Oh, the humanity!
     
betasp
Forum Regular
Join Date: Sep 2004
Status: Offline
Reply With Quote
Feb 16, 2006, 01:00 PM
 
It requires the user to enter the admin password before it can do anything, otherwise the install fails. OSXs inherit security is doing what it is supposed to do, users are not!
     
TheSpaz
Grizzled Veteran
Join Date: Nov 2003
Status: Offline
Reply With Quote
Feb 16, 2006, 01:36 PM
 
I think this whole thing is funny. I don't feel threatened yet. I would be very suspicious about any file that I had to type in my password to open... Why would you need a password to view screenshots anyways?
     
Chuckit
Clinically Insane
Join Date: Oct 2001
Location: San Diego, CA, USA
Status: Offline
Reply With Quote
Feb 16, 2006, 01:38 PM
 
It requires a password to run? Worst. Virus. EVAR.
Chuck
___
"Instead of either 'multi-talented' or 'multitalented' use 'bisexual'."
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 02:01 PM
 
Er... no it doesn't if you are running as an Admin account, which is what 99% of Mac users will be doing as that is the type of account you first create when you install OS X.
     
kman42
Professional Poster
Join Date: Sep 2000
Location: San Francisco
Status: Offline
Reply With Quote
Feb 16, 2006, 02:29 PM
 
Even admins have to enter an admin password on installing applications.

Can someone explain how this file exploits iChat? I read somewhere that it sends itself to all iChat buddies. Does the recipient have to accept the file as one does when someone normally sends a file via iChat?

kman
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 02:34 PM
 
Good grief... will people please look at the facts. This is why this thing has been able to spread - it doesn't need you to type in your password if you are running an admin account as you already have read/write access to the folder it installs into and executes from (InputManagers don't need a password to be installed). This is one of the big security issues with it. It will only ask for a password if you are running a non-admin account which is going to be the minority of Mac users.
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 02:37 PM
 
Originally Posted by kman42
Even admins have to enter an admin password on installing applications.

Can someone explain how this file exploits iChat? I read somewhere that it sends itself to all iChat buddies. Does the recipient have to accept the file as one does when someone normally sends a file via iChat?

kman
Yes they do and yes they need to unzip the file to execute it. So, yes, you need to be ignorant to do it, but the majority of computer users are ignorant, so it will be possible for it to spread. If not this particular version, then others that use better social engineering, unless Apple successfully closes the security holes that it exposes.
     
kman42
Professional Poster
Join Date: Sep 2000
Location: San Francisco
Status: Offline
Reply With Quote
Feb 16, 2006, 02:42 PM
 
JKT-Which is it? Your last two posts seem to contradict one another. Does an admin have to enter a password to install this or not? I'm not trying to be belligerent, just understand how it works. I run as an admin most of the time and I always have to enter my password before installing an application. Is this virus/trojan/malware different?

kman
     
moodymonster
Mac Elite
Join Date: Sep 2003
Location: London
Status: Offline
Reply With Quote
Feb 16, 2006, 02:45 PM
 
The poster's name was lasthope. The exploit doesn't do too much - it seems more like a warning than really malicious.

However the same method could be used for something malicious - deleting your documents folder etc - you don't need to authenticate to delete your own stuff. So if something gets in and runs using your permissions, it can do whatever you can do in your account.
     
moodymonster
Mac Elite
Join Date: Sep 2003
Location: London
Status: Offline
Reply With Quote
Feb 16, 2006, 02:49 PM
 
Originally Posted by kman42
JKT-Which is it? Your last two posts seem to contradict one another. Does an admin have to enter a password to install this or not? I'm not trying to be belligerent, just understand how it works. I run as an admin most of the time and I always have to enter my password before installing an application. Is this virus/trojan/malware different?

kman
Unless the app is installed through an installer, you don't usually need to authorise it. OS X does ask you the first time you run an app whether you want to run it for the first time or not - only if you open the app via document linked to be opened by that app.

If you are running in a non admin account and drag an app into the apps folder, it will ask for an admin password.
( Last edited by moodymonster; Feb 16, 2006 at 02:58 PM. )
     
JKT
Professional Poster
Join Date: Jan 2002
Location: London, UK
Status: Offline
Reply With Quote
Feb 16, 2006, 02:51 PM
 
Originally Posted by kman42
JKT-Which is it? Your last two posts seem to contradict one another. Does an admin have to enter a password to install this or not? I'm not trying to be belligerent, just understand how it works. I run as an admin most of the time and I always have to enter my password before installing an application. Is this virus/trojan/malware different?

kman
If you are running in your Admin account you do not have to enter your password for this malware to do its business. If you are running in a non-admin account you do. The default account on Macs is an Admin account. Read Moki's dissection of what it is and does here - although I would disagree with his assertion that it would not affect most users as the majority will be running as Admin accounts and not as non-Admin.
     
moodymonster
Mac Elite
Join Date: Sep 2003
Location: London
Status: Offline
Reply With Quote
Feb 16, 2006, 02:57 PM
 
At the moment if you open a document that links to a never-before-used app, OS X asks if you want to run the app. Maybe it needs something like this for any new app. That way, if you open a file thinking it's a file, but it's actually and app, you'll get a warning so you can think "It's a pic, not an app, what's going on?"
     
Pierre B.
Grizzled Veteran
Join Date: Feb 2003
Status: Offline
Reply With Quote
Feb 16, 2006, 02:59 PM
 
Originally Posted by JKT
Er... no it doesn't if you are running as an Admin account, which is what 99% of Mac users will be doing as that is the type of account you first create when you install OS X.
And this is why I am wondering how Apple still lets users have as default account the admin one. Apple should have already changed this. The installation procedure should install the admin account, but when this finishes, it should open a dialog asking the user to create his normal user account. The dialog should explain briefly why this is the recommended account for everyday work and why it is not a good idea to run an admin account for daily tasks. It's that simple.
     
Apfhex
Mac Elite
Join Date: Dec 2000
Location: Northern California
Status: Offline
Reply With Quote
Feb 16, 2006, 03:45 PM
 
Originally Posted by JKT
(InputManagers don't need a password to be installed)
Which I think they absolutely should require (I'm thinking of the SmartCrashReporter—however harmless it may be—that Daring Fireball had an article on a few weeks ago).

Originally Posted by moodymonster
At the moment if you open a document that links to a never-before-used app, OS X asks if you want to run the app. Maybe it needs something like this for any new app. That way, if you open a file thinking it's a file, but it's actually and app, you'll get a warning so you can think "It's a pic, not an app, what's going on?"
Yeah... I thought that was the entire POINT of that feature?! I guess not, but I agree.
Mac OS X 10.5.0, Mac Pro 2.66GHz/2 GB RAM/X1900 XT, 23" ACD
esdesign
     
SirCastor
Professional Poster
Join Date: Jan 2001
Location: Salt Lake City, UT USA
Status: Offline
Reply With Quote
Feb 16, 2006, 04:10 PM
 
Originally Posted by Pierre B.
And this is why I am wondering how Apple still lets users have as default account the admin one. Apple should have already changed this. The installation procedure should install the admin account, but when this finishes, it should open a dialog asking the user to create his normal user account. The dialog should explain briefly why this is the recommended account for everyday work and why it is not a good idea to run an admin account for daily tasks. It's that simple.
Yeah, but do you know how annoying it is for a power user to be stuck with an account that doesn't allow you to do anything? I guess for the majority of users, that's probably the best solution, but for things I do, I don't think I could stand it.
2008 iMac 3.06 Ghz, 2GB Memory, GeForce 8800, 500GB HD, SuperDrive
8gb iPhone on Tmobile
     
theolein
Addicted to MacNN
Join Date: Feb 2001
Location: zurich, switzerland
Status: Offline
Reply With Quote
Feb 16, 2006, 04:14 PM
 
Originally Posted by moodymonster
At the moment if you open a document that links to a never-before-used app, OS X asks if you want to run the app. Maybe it needs something like this for any new app. That way, if you open a file thinking it's a file, but it's actually and app, you'll get a warning so you can think "It's a pic, not an app, what's going on?"
This is not true for command line executables which will run in the terminal when double clicked without asking for permission.


This had to happen sooner or later. I'm mainly surprised it took so long. Symantec, McAffee and others are going to be overjoyed.
weird wabbit
     
Chuckit
Clinically Insane
Join Date: Oct 2001
Location: San Diego, CA, USA
Status: Offline
Reply With Quote
Feb 16, 2006, 04:14 PM
 
In a normal user account, you can still do most stuff, and if you need to do more, you can authenticate as an admin.
Chuck
___
"Instead of either 'multi-talented' or 'multitalented' use 'bisexual'."
     
theolein
Addicted to MacNN
Join Date: Feb 2001
Location: zurich, switzerland
Status: Offline
Reply With Quote
Feb 16, 2006, 04:38 PM
 
symantec and MyAffee have given it a name: OSX/Leap-A

http://securityresponse.symantec.com...sx.leap.a.html
weird wabbit
     
 
 
Forum Links
Forum Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Top
Privacy Policy
All times are GMT -4. The time now is 11:13 PM.
All contents of these forums © 1995-2017 MacNN. All rights reserved.
Branding + Design: www.gesamtbild.com
vBulletin v.3.8.8 © 2000-2017, Jelsoft Enterprises Ltd.,