1 00:00:00,320 --> 00:00:02,960 Speaker 1: Brought to you by the reinvented two thousand twelve Camray. 2 00:00:03,240 --> 00:00:08,800 Speaker 1: It's ready. Are you get in touch with technology with 3 00:00:08,920 --> 00:00:14,400 Speaker 1: tex Stuff from how stuff works dot com. Hello, everybody, 4 00:00:14,440 --> 00:00:17,080 Speaker 1: welcome to tech stuff. My name is Chris Polette. I'm 5 00:00:17,120 --> 00:00:19,840 Speaker 1: an editor here at how stuff works dot com, and today, 6 00:00:19,840 --> 00:00:23,279 Speaker 1: sitting next to me, as usual, is senior writer Jonathan Strickland. 7 00:00:23,280 --> 00:00:28,159 Speaker 1: Hey there, um, Today we're gonna talk about again the 8 00:00:28,360 --> 00:00:32,120 Speaker 1: shady side of computing. Yes, it seems we talked about 9 00:00:32,159 --> 00:00:33,879 Speaker 1: this a lot. It turns out that, well, it's more 10 00:00:33,920 --> 00:00:37,200 Speaker 1: in a pretty big shady side. Well, you know, Okay, 11 00:00:37,280 --> 00:00:38,839 Speaker 1: Well let's look at it this way. We can talk 12 00:00:38,840 --> 00:00:41,519 Speaker 1: about the all the easy stuff and then we go, hey, 13 00:00:41,560 --> 00:00:44,440 Speaker 1: everything's working normally. Well, that's got it for today. Yeah, 14 00:00:44,440 --> 00:00:48,400 Speaker 1: that's true. That's a pretty short So we're going to 15 00:00:48,440 --> 00:00:51,920 Speaker 1: talk We talked once before about computer viruses. Actually a 16 00:00:51,920 --> 00:00:54,520 Speaker 1: couple of times before we've talked about computer viruses, and 17 00:00:54,840 --> 00:00:58,440 Speaker 1: today we wanted to talk about a specific pair of 18 00:00:58,480 --> 00:01:03,840 Speaker 1: trojans that recently attacked a computing system that, for a 19 00:01:03,920 --> 00:01:08,119 Speaker 1: very long time was seen as practically unassailable. That's true. 20 00:01:08,120 --> 00:01:12,760 Speaker 1: We're talking about the Macintosh and Honestly, you might be 21 00:01:12,800 --> 00:01:15,880 Speaker 1: surprised to know this, but the very very first virus 22 00:01:16,400 --> 00:01:19,600 Speaker 1: was written by somebody named Rich Scranta, and he actually 23 00:01:19,880 --> 00:01:22,360 Speaker 1: created this as a practical joke when he was in 24 00:01:22,400 --> 00:01:25,920 Speaker 1: the ninth grade for his apple to computer lab at school. 25 00:01:26,280 --> 00:01:28,000 Speaker 1: And it was just a very simple thing that every 26 00:01:28,000 --> 00:01:29,600 Speaker 1: once in a while and put up a message on 27 00:01:29,640 --> 00:01:32,720 Speaker 1: the when the computer would boot up saying essentially, this 28 00:01:32,880 --> 00:01:35,000 Speaker 1: is a virus. I mean I could read the whole thing, 29 00:01:35,040 --> 00:01:38,080 Speaker 1: but um, just kind of a novelty thing. He did 30 00:01:38,080 --> 00:01:39,880 Speaker 1: it to test the theory that it could be done. 31 00:01:39,920 --> 00:01:42,520 Speaker 1: And now viruses are more than twenty five years old, 32 00:01:42,880 --> 00:01:47,280 Speaker 1: but they have gotten significantly more malicious. Right, Yeah, there, 33 00:01:47,319 --> 00:01:50,920 Speaker 1: there there are still viruses that are just jokes, you know. 34 00:01:50,960 --> 00:01:53,240 Speaker 1: There's still viruses that go around where all it is 35 00:01:53,240 --> 00:01:55,320 Speaker 1: is just something that messes with you and makes you 36 00:01:55,320 --> 00:01:58,760 Speaker 1: think you're going crazy because your computer is not acting right. Um, 37 00:01:58,840 --> 00:02:02,520 Speaker 1: but those are you know, those are annoying, But those 38 00:02:02,520 --> 00:02:04,160 Speaker 1: aren't the ones that make the news. The ones that 39 00:02:04,200 --> 00:02:05,720 Speaker 1: make the news are the ones, of course, that cause 40 00:02:05,840 --> 00:02:09,400 Speaker 1: billions and billions of dollars worth of damages when people 41 00:02:09,680 --> 00:02:12,680 Speaker 1: and corporations, when their systems just completely crash and no 42 00:02:12,680 --> 00:02:16,000 Speaker 1: one communicates with anyone else. That's true. And there are 43 00:02:16,040 --> 00:02:17,560 Speaker 1: a couple of things we need to point out before 44 00:02:17,560 --> 00:02:20,079 Speaker 1: you get in in deep. We need to point out 45 00:02:20,120 --> 00:02:22,360 Speaker 1: that you were mentioning that we were going to discuss 46 00:02:22,360 --> 00:02:24,920 Speaker 1: two trojans, and we should point out the difference in 47 00:02:24,919 --> 00:02:27,680 Speaker 1: a trojan and a virus. I think um the virus 48 00:02:27,960 --> 00:02:33,680 Speaker 1: is a self replicating program. Um it um basically will copy. 49 00:02:33,800 --> 00:02:36,119 Speaker 1: For example, it will copy information from your address book. 50 00:02:36,120 --> 00:02:38,720 Speaker 1: It will send itself to other people in your email 51 00:02:38,800 --> 00:02:41,240 Speaker 1: message saying hey, you need to open this file. It's urgent. 52 00:02:41,560 --> 00:02:43,840 Speaker 1: And when you do, you load it into your computer, 53 00:02:43,919 --> 00:02:47,080 Speaker 1: which then you know, propagates and continues to do. A 54 00:02:47,080 --> 00:02:51,480 Speaker 1: trojan doesn't replicate by itself. UM. It's something that maybe 55 00:02:51,480 --> 00:02:54,760 Speaker 1: somebody would say, do you have any viruses on your computer? 56 00:02:54,840 --> 00:02:57,160 Speaker 1: Download this and find out now, And you download it 57 00:02:57,160 --> 00:02:59,400 Speaker 1: and you install it, and lo and behold. It's not 58 00:02:59,520 --> 00:03:02,600 Speaker 1: a virus protection program. It is, in need, a trojan horse, 59 00:03:02,760 --> 00:03:05,960 Speaker 1: and it gets in and messages with your computer. Both 60 00:03:05,960 --> 00:03:08,640 Speaker 1: are kinds of malware which you know mouth being bad, 61 00:03:08,960 --> 00:03:11,720 Speaker 1: dangerous software. And of course it's called a trojan after 62 00:03:11,760 --> 00:03:14,680 Speaker 1: the trojan horse, which you know, we all have heard 63 00:03:14,720 --> 00:03:18,000 Speaker 1: of it. You know, lots of soldiers hidd inside the 64 00:03:18,000 --> 00:03:20,079 Speaker 1: trojan horse. It was pulled into Troy. They all popped 65 00:03:20,080 --> 00:03:22,520 Speaker 1: out and then they started causing a ruckus as soldiers 66 00:03:22,520 --> 00:03:25,480 Speaker 1: are want to do. Now, the trojans on your computer, 67 00:03:25,760 --> 00:03:28,040 Speaker 1: same sort of thing. Hopefully they're not on your computer, 68 00:03:28,120 --> 00:03:29,919 Speaker 1: but the trojans that could be on your computer, same 69 00:03:29,919 --> 00:03:33,440 Speaker 1: sort of thing. It's a packet that has inside it 70 00:03:33,680 --> 00:03:37,080 Speaker 1: something nasty, and it can be a virus. So a 71 00:03:37,120 --> 00:03:40,080 Speaker 1: trojan can deliver a virus which could then self replicate, 72 00:03:40,440 --> 00:03:42,320 Speaker 1: or it could be something else. And one of the 73 00:03:42,440 --> 00:03:45,840 Speaker 1: more prevalent trojan attacks, or at least one of the 74 00:03:45,880 --> 00:03:49,000 Speaker 1: ones that gets the most news, are the kind that's 75 00:03:49,000 --> 00:03:53,640 Speaker 1: set up butt nets, and these are programs the trojans. 76 00:03:53,760 --> 00:03:57,640 Speaker 1: These trojans carry programs that give a remote user access 77 00:03:58,040 --> 00:04:01,880 Speaker 1: to the core of your work computer. So suddenly someone 78 00:04:02,120 --> 00:04:04,920 Speaker 1: somewhere else, possibly on the other side of the world, 79 00:04:05,520 --> 00:04:10,520 Speaker 1: can make your computer do things. And if they're clever enough, 80 00:04:10,560 --> 00:04:12,560 Speaker 1: they can make them do things. Make your computer do things, 81 00:04:12,560 --> 00:04:14,480 Speaker 1: and you don't. You're not even aware that your computer 82 00:04:14,560 --> 00:04:17,760 Speaker 1: is acting abnormally. Well, if you were, then they could 83 00:04:17,880 --> 00:04:20,080 Speaker 1: do something about it, or at least stop it. Yeah, 84 00:04:20,080 --> 00:04:23,320 Speaker 1: at least turn your computer off if nothing else. But 85 00:04:23,320 --> 00:04:25,720 Speaker 1: but yeah, if IF they're clever. And the reason why 86 00:04:25,720 --> 00:04:27,800 Speaker 1: I say if is a lot of these programs tend 87 00:04:27,839 --> 00:04:32,320 Speaker 1: to be propagated by people who themselves are not great programmers. 88 00:04:32,880 --> 00:04:36,760 Speaker 1: They tend to grab script from other websites and use them, 89 00:04:36,800 --> 00:04:40,400 Speaker 1: and they're called script kiddies. Um, but let's get to 90 00:04:40,480 --> 00:04:43,480 Speaker 1: the specifics of the Mac trojans that we wanted to 91 00:04:43,520 --> 00:04:46,279 Speaker 1: talk about now. For a very long time, MAX have 92 00:04:46,440 --> 00:04:50,880 Speaker 1: been seen as sort of, uh, much more safe than PCs, right, 93 00:04:50,920 --> 00:04:54,279 Speaker 1: They're they're seen as you know, people are very proud. 94 00:04:54,279 --> 00:04:56,080 Speaker 1: They'll say, I don't have to worry about viruses. I 95 00:04:56,240 --> 00:04:59,760 Speaker 1: use a Mac. That's true. Um, this is a principle, 96 00:05:00,000 --> 00:05:04,000 Speaker 1: which is it has a at least a rhyming name. 97 00:05:04,080 --> 00:05:09,000 Speaker 1: Security through obscurity. Basically, why bother writing viruses for the 98 00:05:09,040 --> 00:05:11,760 Speaker 1: Mac crowd, because they're only ten or so of them 99 00:05:11,760 --> 00:05:14,480 Speaker 1: out there, right, so they don't even bother. And and 100 00:05:14,600 --> 00:05:17,720 Speaker 1: on top of that, the Mac operating system and on 101 00:05:17,880 --> 00:05:21,719 Speaker 1: hardware is a closed system. It's not like PCs where 102 00:05:21,760 --> 00:05:23,400 Speaker 1: you can you know, you can get a circuit board 103 00:05:23,440 --> 00:05:26,120 Speaker 1: from one place and you can get memory from another place. 104 00:05:26,680 --> 00:05:29,640 Speaker 1: Max are an all in one package that you get 105 00:05:29,680 --> 00:05:32,800 Speaker 1: from Apple, and you can upgrade and everything. But for 106 00:05:32,880 --> 00:05:35,960 Speaker 1: the most part, it's a closed system. So again, security 107 00:05:36,000 --> 00:05:38,919 Speaker 1: through obscurity. It's not something that is widely understood. Not 108 00:05:39,000 --> 00:05:41,479 Speaker 1: people don't don't sit there and do a lot of 109 00:05:41,520 --> 00:05:43,839 Speaker 1: Mac hacks. I mean there are people who do them, 110 00:05:43,960 --> 00:05:47,359 Speaker 1: but there are fewer than the PC hacks. That's true. 111 00:05:47,520 --> 00:05:51,200 Speaker 1: That's true. Um. And for a long time that that 112 00:05:51,560 --> 00:05:54,800 Speaker 1: people in the Mac crowd of sort of speaking as 113 00:05:54,839 --> 00:05:58,039 Speaker 1: someone who is a Mac user more often than not. Um, 114 00:05:58,480 --> 00:06:02,239 Speaker 1: you know, we're sort of under that mindset. We're saying, hey, 115 00:06:02,360 --> 00:06:05,240 Speaker 1: I don't really need to spend seventy five dollars on 116 00:06:05,320 --> 00:06:09,640 Speaker 1: a piece of antivirus software because my computer is safe. Um. 117 00:06:09,640 --> 00:06:12,680 Speaker 1: And Apple explains that, you know, they think that their 118 00:06:12,760 --> 00:06:15,680 Speaker 1: system is safe. They're not really particularly concerned about it, 119 00:06:15,920 --> 00:06:18,880 Speaker 1: except not too long ago. A few months ago, they 120 00:06:18,920 --> 00:06:21,400 Speaker 1: actually had a page up on their website and everybody 121 00:06:21,720 --> 00:06:24,440 Speaker 1: took notice of the fact that they were saying, well, 122 00:06:24,560 --> 00:06:27,720 Speaker 1: maybe you should install some antivirus software. Probably wouldn't be 123 00:06:27,760 --> 00:06:31,159 Speaker 1: a bad idea, and that which kind of deviates from there. Well, 124 00:06:31,240 --> 00:06:34,200 Speaker 1: the OS ten operating system is a very secure system. 125 00:06:34,240 --> 00:06:36,000 Speaker 1: You don't really need to worry about viruses. It's a 126 00:06:36,000 --> 00:06:38,640 Speaker 1: selling point, it's a marketing point for them to UH 127 00:06:38,720 --> 00:06:40,800 Speaker 1: to say how secure it is, right, And I think 128 00:06:40,800 --> 00:06:44,560 Speaker 1: this is sort of the price of popularity UM. Mac 129 00:06:44,680 --> 00:06:49,160 Speaker 1: sales UH increased significantly over two thousand and eight before 130 00:06:49,240 --> 00:06:53,880 Speaker 1: the economic downturn, which affected all computer sales. But they're 131 00:06:53,920 --> 00:06:56,400 Speaker 1: up to a of market share now, right, so, and 132 00:06:56,440 --> 00:06:59,680 Speaker 1: that's significant. So now that there are more Mac users 133 00:06:59,720 --> 00:07:03,080 Speaker 1: out there, there's more of an incentive for someone who 134 00:07:03,160 --> 00:07:05,719 Speaker 1: wants to create malware to create it for the Mac 135 00:07:05,800 --> 00:07:09,440 Speaker 1: because now they have a significant population they can affect. Now, 136 00:07:09,480 --> 00:07:12,920 Speaker 1: before if you were like, well, if people have PCs 137 00:07:12,960 --> 00:07:15,080 Speaker 1: and one person has a Mac, it makes more sense 138 00:07:15,080 --> 00:07:17,320 Speaker 1: for me to program something for the ninety people because 139 00:07:17,320 --> 00:07:19,600 Speaker 1: I'm gonna get more hits that way. But if the 140 00:07:19,680 --> 00:07:22,480 Speaker 1: population of computer users gets high enough, then it totally 141 00:07:22,520 --> 00:07:25,200 Speaker 1: makes sense. Okay, well I'm gonna switch gears because these 142 00:07:25,240 --> 00:07:28,440 Speaker 1: people not only are there more of them, but they 143 00:07:28,480 --> 00:07:30,920 Speaker 1: have been lulled into a false sense of security and 144 00:07:30,920 --> 00:07:34,560 Speaker 1: I can take advantage of that. That's true now. The 145 00:07:34,560 --> 00:07:38,000 Speaker 1: the Trojans that hit in January of two thousand nine 146 00:07:38,120 --> 00:07:43,160 Speaker 1: that affect max effect a very specific subset of Mac users, 147 00:07:43,600 --> 00:07:47,920 Speaker 1: and I like to call them the naughty ones. So, 148 00:07:48,120 --> 00:07:51,360 Speaker 1: in other words, right now, if using a Mac is 149 00:07:51,400 --> 00:07:53,760 Speaker 1: still very safe, I should I'm gonna go out and 150 00:07:53,800 --> 00:07:56,120 Speaker 1: say it right now, using a Mac. If you're using 151 00:07:56,120 --> 00:07:59,760 Speaker 1: a Mac and you're being a law abiding, um, you know, 152 00:08:00,320 --> 00:08:03,440 Speaker 1: upstanding citizen on the web, then you're going to be 153 00:08:03,480 --> 00:08:08,440 Speaker 1: pretty safe using a Mac. But if you're a filthy, dirty, 154 00:08:08,480 --> 00:08:12,840 Speaker 1: pirate yar and you're trying to steal software from the Mac, 155 00:08:13,200 --> 00:08:16,640 Speaker 1: you might be in for a nasty surprise. That's true. 156 00:08:16,760 --> 00:08:19,720 Speaker 1: Um and all started with a suite of software that 157 00:08:20,080 --> 00:08:22,440 Speaker 1: those of you who are not Mac users may not 158 00:08:22,520 --> 00:08:25,840 Speaker 1: be familiar with. It's called I Work. Um, it's a collection, 159 00:08:26,000 --> 00:08:29,480 Speaker 1: it's it's not really a A and Microsoft Office killer. 160 00:08:29,880 --> 00:08:32,040 Speaker 1: But there are three applications that are part of the suite. 161 00:08:32,640 --> 00:08:36,720 Speaker 1: Pages which is a you know, word processing program, Keynote, 162 00:08:36,720 --> 00:08:40,680 Speaker 1: which is a presentation program, and Numbers, which is a 163 00:08:40,800 --> 00:08:44,840 Speaker 1: spreadsheet program. And uh, oddly enough, these are very much 164 00:08:44,920 --> 00:08:48,360 Speaker 1: like three of the major applications in Office. But um, 165 00:08:49,120 --> 00:08:52,120 Speaker 1: there was a pirate ID version going around, a broken 166 00:08:52,240 --> 00:08:55,040 Speaker 1: version that people were starting to download, and uh, it 167 00:08:55,120 --> 00:08:58,280 Speaker 1: contained more than just a copy of I work, it 168 00:08:58,360 --> 00:09:02,480 Speaker 1: also contained a trojan horse and so this was propagated 169 00:09:02,480 --> 00:09:06,839 Speaker 1: along or spread along bit torrent. So people using bit 170 00:09:06,880 --> 00:09:11,760 Speaker 1: torrent to download a pirated copy of I work um 171 00:09:11,760 --> 00:09:14,840 Speaker 1: received a trojan that installed as part of the eye 172 00:09:14,880 --> 00:09:21,760 Speaker 1: work Services installation process. And um it gave someone no 173 00:09:21,840 --> 00:09:24,079 Speaker 1: one's really sure who at this point, as when we're 174 00:09:24,120 --> 00:09:31,600 Speaker 1: recording this root access to the victimized computer. And that's 175 00:09:31,640 --> 00:09:34,160 Speaker 1: that's a bad thing. That's what you can build a 176 00:09:34,200 --> 00:09:37,199 Speaker 1: bot net or a zombie computer army out of are 177 00:09:37,280 --> 00:09:41,520 Speaker 1: these computers that have a compromised root access system. It 178 00:09:41,559 --> 00:09:44,640 Speaker 1: means that someone else can then sort of fiddle with 179 00:09:44,679 --> 00:09:48,080 Speaker 1: your computer and make it do things like UM distributed 180 00:09:48,120 --> 00:09:51,600 Speaker 1: denial of service attacks or spreading spam, that kind of thing. 181 00:09:51,640 --> 00:09:56,000 Speaker 1: That's sort of what most zombie computer armies are are 182 00:09:56,600 --> 00:09:59,720 Speaker 1: used for. Yeah, the name of this one actually is 183 00:10:00,120 --> 00:10:06,000 Speaker 1: OS ten dot Trojan dot ice services dot A catchy Yeah. Yeah, 184 00:10:06,040 --> 00:10:08,360 Speaker 1: well they all are. They have these fancy names. And 185 00:10:08,400 --> 00:10:13,040 Speaker 1: it also depends on which, uh, which anti virus authority 186 00:10:13,080 --> 00:10:15,600 Speaker 1: you're talking to, because at least on the PC side, 187 00:10:15,840 --> 00:10:18,440 Speaker 1: usually each one has its own name for the each 188 00:10:18,520 --> 00:10:21,200 Speaker 1: virus that is even more confusing. But in this case, yes, 189 00:10:21,840 --> 00:10:24,240 Speaker 1: yep and uh, it's known to bury parts of itself 190 00:10:24,320 --> 00:10:26,559 Speaker 1: very deep in the system. UM. As a matter of fact, 191 00:10:26,600 --> 00:10:29,040 Speaker 1: the experts say that if you've got this on there 192 00:10:29,080 --> 00:10:31,679 Speaker 1: on your machine, it's probably best to do a clean 193 00:10:31,800 --> 00:10:36,040 Speaker 1: installation of your operating system and just format your hard 194 00:10:36,080 --> 00:10:41,000 Speaker 1: drive again again. Back up your computer, right. It's always important. 195 00:10:41,040 --> 00:10:43,400 Speaker 1: We say it over and over, and you think we're joking. 196 00:10:43,440 --> 00:10:46,240 Speaker 1: We're not joking. Not that I do it myself. I'm 197 00:10:46,240 --> 00:10:48,640 Speaker 1: guilty of not doing I have been known to go 198 00:10:48,760 --> 00:10:53,839 Speaker 1: a long time between backups, and it has in the past. 199 00:10:54,640 --> 00:10:57,920 Speaker 1: I've I've become legendary in the office for having some 200 00:10:58,040 --> 00:11:02,000 Speaker 1: hissy fits when I've had problems with my computer. Yep, yep, 201 00:11:02,200 --> 00:11:07,080 Speaker 1: manly hissy fits. I should add, if you say so, okay, um, 202 00:11:07,160 --> 00:11:09,679 Speaker 1: And then you know that this happened, uh, I guess 203 00:11:09,720 --> 00:11:11,839 Speaker 1: technically it was late two thousand eight when it started 204 00:11:11,840 --> 00:11:13,240 Speaker 1: to show up, but you know, it was the holiday, 205 00:11:13,280 --> 00:11:14,800 Speaker 1: so we waited to be worried about it until the 206 00:11:14,800 --> 00:11:17,439 Speaker 1: new year, and the whole the whole eye work O 207 00:11:17,559 --> 00:11:21,760 Speaker 1: nine didn't even really come out until UM Macworld that's true, 208 00:11:21,880 --> 00:11:25,600 Speaker 1: but which was immediately after writing year, so yeah, exactly. Um, 209 00:11:25,679 --> 00:11:29,040 Speaker 1: but there was a variant that showed up not too 210 00:11:29,080 --> 00:11:32,439 Speaker 1: long afterward. I just call it B. Just call it B. Yeah. 211 00:11:32,520 --> 00:11:34,520 Speaker 1: Well it's the blah blah blah blah blah blah blah 212 00:11:34,840 --> 00:11:37,080 Speaker 1: B instead of A. Okay, I mean, I don't have 213 00:11:37,080 --> 00:11:38,600 Speaker 1: it written down in front. Un Lets you get away 214 00:11:38,600 --> 00:11:41,800 Speaker 1: with that as you're you're right. So this is a 215 00:11:41,880 --> 00:11:44,320 Speaker 1: second trojan, very similar to the first one. Um, but 216 00:11:44,400 --> 00:11:48,319 Speaker 1: this one was attached to pirated versions of Adobe Photoshop 217 00:11:48,440 --> 00:11:55,120 Speaker 1: c S four for Apple, So again an illegal uh 218 00:11:55,280 --> 00:11:59,440 Speaker 1: application and pirated application. It's is the one that's carrying 219 00:11:59,480 --> 00:12:01,640 Speaker 1: this trojan. And if you went out and you bought 220 00:12:01,679 --> 00:12:04,360 Speaker 1: a copy of Adobe Photoshop c S four, you're fine. 221 00:12:04,400 --> 00:12:07,120 Speaker 1: I mean, that's that's a legitimate copy. It's not carrying 222 00:12:07,160 --> 00:12:09,800 Speaker 1: anything dangerous. It's only for the people who are saying, hey, 223 00:12:09,880 --> 00:12:11,640 Speaker 1: I want this, but I don't want to shell out 224 00:12:11,720 --> 00:12:14,040 Speaker 1: the you know, several hundred dollars it's gonna cost me 225 00:12:14,440 --> 00:12:17,720 Speaker 1: to buy this program, so I'm just gonna steal it. Well, 226 00:12:17,920 --> 00:12:19,440 Speaker 1: they're the ones who are paying the price right now, 227 00:12:19,480 --> 00:12:23,600 Speaker 1: because they're the ones who had their computers infected. So, uh, 228 00:12:23,640 --> 00:12:25,720 Speaker 1: if you were a a Mac user, the first and 229 00:12:25,760 --> 00:12:27,760 Speaker 1: most important thing you should know about all this is 230 00:12:28,040 --> 00:12:30,760 Speaker 1: you're not completely immune from viruses. There's there, you know, 231 00:12:30,880 --> 00:12:33,800 Speaker 1: no operating system. Even an Apple spokesperson said this, no 232 00:12:33,920 --> 00:12:37,840 Speaker 1: operating system is a hundred percent safe. There there's always 233 00:12:37,880 --> 00:12:41,120 Speaker 1: some vulnerability. And you know, of course, the manufacturers, the 234 00:12:41,160 --> 00:12:45,800 Speaker 1: software manufacturers. Microsoft is famous for patching on regular intervals 235 00:12:46,360 --> 00:12:51,560 Speaker 1: UM and Apple does sends out intervals patches to UM. 236 00:12:51,600 --> 00:12:53,640 Speaker 1: The thing is, you know, you need to be aware 237 00:12:53,679 --> 00:12:56,760 Speaker 1: that it can happen. And investing in any virus software 238 00:12:57,040 --> 00:13:00,240 Speaker 1: isn't really a bad idea. Yeah, it's expensive and there's 239 00:13:00,280 --> 00:13:04,480 Speaker 1: not a lot of free anty virus software. UM I 240 00:13:04,520 --> 00:13:08,160 Speaker 1: would be wary, especially of downloading anything that has a 241 00:13:08,200 --> 00:13:11,760 Speaker 1: pop up window. Yeah that's a bad sign. Yeah, but 242 00:13:12,040 --> 00:13:14,480 Speaker 1: you know, of course, Norton samantechmates makes a Norton anty 243 00:13:14,520 --> 00:13:18,160 Speaker 1: virus for Macintosh, and uh Antigo, which also does is 244 00:13:18,200 --> 00:13:20,920 Speaker 1: the the organization that finds a lot of the Mac 245 00:13:21,040 --> 00:13:24,040 Speaker 1: viruses and issues alerts. UM offers its virus barrier, and 246 00:13:24,120 --> 00:13:29,040 Speaker 1: both of them offer a dual platform version of the software. 247 00:13:29,080 --> 00:13:31,559 Speaker 1: Because some people who are using Intel based Macintosh is 248 00:13:31,600 --> 00:13:35,600 Speaker 1: are running both Windows and Macintosh operating systems on their machines. Yeah, 249 00:13:35,640 --> 00:13:38,720 Speaker 1: it's called using creating a virtual machine yep, yep, or 250 00:13:39,120 --> 00:13:44,400 Speaker 1: in dual boot boots. Um, but yeah we should. Antigo 251 00:13:44,440 --> 00:13:48,200 Speaker 1: actually said that in January that at least twenty thousand 252 00:13:48,240 --> 00:13:53,200 Speaker 1: people had downloaded that I Work O nine installer. So 253 00:13:54,080 --> 00:13:58,679 Speaker 1: that's twenty people who had their computers infected by a trojan. 254 00:13:58,760 --> 00:14:01,200 Speaker 1: And that's just the I Work and that's not including 255 00:14:01,280 --> 00:14:04,200 Speaker 1: the Photoshop one. I don't have any any figures on that. 256 00:14:04,360 --> 00:14:06,000 Speaker 1: I didn't I didn't see any fresh numbers on that. 257 00:14:06,000 --> 00:14:08,240 Speaker 1: That was actually fairly close to when we uh, when 258 00:14:08,240 --> 00:14:12,000 Speaker 1: we are recording the podcast now, so new hard numbers there, 259 00:14:12,559 --> 00:14:15,360 Speaker 1: um it is. There's also a possibility to that you 260 00:14:15,400 --> 00:14:19,680 Speaker 1: can run a foul of some malicious websites and some 261 00:14:19,800 --> 00:14:22,360 Speaker 1: of the runtime operating systems. You know, there are a 262 00:14:22,400 --> 00:14:24,880 Speaker 1: cross platform you know, if there is a virus that 263 00:14:24,960 --> 00:14:28,640 Speaker 1: operates on them, you can you could possibly have some 264 00:14:28,920 --> 00:14:32,000 Speaker 1: problems with that too. So always good to be very 265 00:14:32,000 --> 00:14:34,640 Speaker 1: conscious of what you do, no matter what operating system 266 00:14:34,680 --> 00:14:38,120 Speaker 1: you're on. Now, sad to say, if your computer has 267 00:14:38,200 --> 00:14:41,840 Speaker 1: been compromised, Let's say that you are a fine upstanding person, 268 00:14:41,880 --> 00:14:45,640 Speaker 1: but your little brother decided he wanted a copy of 269 00:14:45,800 --> 00:14:48,760 Speaker 1: I work for some reason. Perhaps he's starting a new 270 00:14:48,800 --> 00:14:51,360 Speaker 1: lemonade stand and he needs to have a spreadsheet tracking 271 00:14:51,360 --> 00:14:54,960 Speaker 1: all his sales, or a nice presentation. But of course 272 00:14:55,000 --> 00:14:57,440 Speaker 1: you know you didn't download it. Of course we would 273 00:14:57,440 --> 00:14:59,320 Speaker 1: never suggest such a thing. But let's say that your 274 00:14:59,320 --> 00:15:02,160 Speaker 1: computer gets a acted by it. You can find a 275 00:15:02,240 --> 00:15:06,320 Speaker 1: trojan removal tool supplied by Secure Mac if you if 276 00:15:06,360 --> 00:15:08,920 Speaker 1: you need that service, if if you know that your 277 00:15:08,960 --> 00:15:12,200 Speaker 1: computer has been compromised, UM, I recommend that you get 278 00:15:12,240 --> 00:15:16,520 Speaker 1: this trojan removal tool so that you can take take 279 00:15:16,560 --> 00:15:18,760 Speaker 1: care of that problem, because the longer you leave it, 280 00:15:18,800 --> 00:15:20,800 Speaker 1: the more likely your computer will be used in some 281 00:15:20,880 --> 00:15:24,680 Speaker 1: really nasty denial of service tech or spam at tech 282 00:15:24,840 --> 00:15:27,920 Speaker 1: or whatever. I mean. For all we know, the person 283 00:15:27,920 --> 00:15:30,520 Speaker 1: who is who designed this trojan did so just to 284 00:15:30,600 --> 00:15:32,760 Speaker 1: prove a point. We don't know that there was any 285 00:15:32,760 --> 00:15:36,640 Speaker 1: malicious intent, but we don't know that there's not either. 286 00:15:37,160 --> 00:15:39,680 Speaker 1: That's that's true. It's almost like that the virus I 287 00:15:39,920 --> 00:15:42,280 Speaker 1: mentioned earlier, the elk cloner, which was the very very 288 00:15:42,280 --> 00:15:44,760 Speaker 1: first thing. It was sort of a proof of concept 289 00:15:44,840 --> 00:15:47,440 Speaker 1: thing and and in in this case a practical joke 290 00:15:47,520 --> 00:15:51,080 Speaker 1: than an actual problem. But you know, you'll notice if 291 00:15:51,120 --> 00:15:54,120 Speaker 1: your computer is starting to run more slowly. UM, if 292 00:15:54,160 --> 00:15:57,840 Speaker 1: you're having trouble you know, with the general operations of 293 00:15:57,920 --> 00:16:00,480 Speaker 1: stuff just doesn't work the way it did. UM, you 294 00:16:00,560 --> 00:16:02,680 Speaker 1: might have reason to, uh, to believe that there is 295 00:16:02,720 --> 00:16:07,360 Speaker 1: a evil entity lurking within your hard drive. Right if 296 00:16:07,360 --> 00:16:08,960 Speaker 1: you look and see that there's a there are a 297 00:16:09,000 --> 00:16:11,560 Speaker 1: lot of packets going across your home network and yet 298 00:16:11,640 --> 00:16:14,800 Speaker 1: nothing is downloading at the moment, that's a good indication 299 00:16:14,880 --> 00:16:17,960 Speaker 1: something's going on. You know. My favorite, uh, my favorite 300 00:16:18,040 --> 00:16:21,000 Speaker 1: macvirus of all time has to be the the Honor 301 00:16:21,040 --> 00:16:24,560 Speaker 1: System virus UM, the one that basically went around saying, well, 302 00:16:24,840 --> 00:16:26,480 Speaker 1: you know, we're not going to write a virus for 303 00:16:26,480 --> 00:16:29,080 Speaker 1: your Macintosh. Please delete your entire hard driving. Forward this 304 00:16:29,120 --> 00:16:33,240 Speaker 1: to all your friends. Yeah, so this is a good 305 00:16:33,760 --> 00:16:35,720 Speaker 1: We we've pretty much kind of drawn the line between 306 00:16:35,720 --> 00:16:39,080 Speaker 1: hackers who might show you that it's possible to create 307 00:16:39,200 --> 00:16:43,400 Speaker 1: a virus in in order to boost security. UM. Hackers 308 00:16:43,440 --> 00:16:46,640 Speaker 1: often will do that. They'll they'll find security flaws and 309 00:16:46,680 --> 00:16:50,240 Speaker 1: they'll publicize them in the hopes that someone will address 310 00:16:50,280 --> 00:16:53,800 Speaker 1: those flaws. And fix it, whereas crackers are the kind 311 00:16:53,880 --> 00:16:57,480 Speaker 1: of hackers who will exploit it for their own you know, 312 00:16:57,840 --> 00:17:00,880 Speaker 1: means that's true. And they're all so tasty with soup 313 00:17:01,120 --> 00:17:04,960 Speaker 1: they are. That's a good that's a good stopping point. 314 00:17:05,880 --> 00:17:08,560 Speaker 1: So we're gonna wrap things up before we go. I 315 00:17:08,600 --> 00:17:10,480 Speaker 1: thought it would be nice if we gave a shout 316 00:17:10,520 --> 00:17:13,520 Speaker 1: out to a sister podcast of ours. It's brand new. 317 00:17:13,600 --> 00:17:18,400 Speaker 1: It just started publishing um February really and it's called 318 00:17:18,560 --> 00:17:22,159 Speaker 1: stuff Mom Never told you. And it's a sort of 319 00:17:22,160 --> 00:17:25,280 Speaker 1: a you know, a feminine perspective on various articles that 320 00:17:25,320 --> 00:17:29,000 Speaker 1: appear on our site. And I highly recommend it um 321 00:17:29,040 --> 00:17:34,200 Speaker 1: in a masculine way. Excellent. Yea, all right, And if 322 00:17:34,200 --> 00:17:36,679 Speaker 1: you want to learn more about computer viruses and computer 323 00:17:36,800 --> 00:17:39,479 Speaker 1: topics in general, you can check out dozens of articles 324 00:17:39,480 --> 00:17:42,200 Speaker 1: that we have live right now at how stuff works 325 00:17:42,240 --> 00:17:44,640 Speaker 1: dot com. And we'll talk to you again really soon 326 00:17:46,000 --> 00:17:48,399 Speaker 1: for more on this and thousands of other topics. Is 327 00:17:48,440 --> 00:17:55,080 Speaker 1: it how stuff works dot com, brought to you by 328 00:17:55,119 --> 00:17:58,600 Speaker 1: the reinvented two thousand twelve camera. It's ready, are you