Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment I am one too (Score 2) 172

I found out early this morning that i had the malware. Deleted the executable and the startup plist file. I had not updated my os in a few months. So I did that. I am now backing up vital files for a reinstall. Sigh. Right before Yosemite goes final. So installs, installs. Backups, backups. Etc. I had a pirated a copy of photoshop cc 2014 from pirate bay. (yeah i am utterly broke and unemployed, and i had launched it only once to export one file to a specific format). And as far as i can see right now that is the only app that has the same'ish timestamp (in my apps folder) as the javaW binary from the lib/app support/javaW/ folder. In my case 31st of aug. So i have been compromised for about a month. I had the security settings set to Mac apps and identified developers only. So not completely opted out of the sandbox. I am tech/dev savvy, but not hacker-good. Is there a command for terminal that can show me every binary that has been updated since that date? so i can see if i should kill processes whilst fixing my system? Could google it but thought why not ask the "nice people" at slashdot. I lurked here for years. Posted a few comments, got called a retard for my non-native drunken-english, and never posted again until now. If you wan't to make up for it. Help me out :)

Slashdot Top Deals

EARTH smog | bricks AIR -- mud -- FIRE soda water | tequila WATER

Working...