Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
If Gatekeeper has been configured by the user to execute all software regardless of source, the malware then downloads and runs the backdoor component which is executed at every reboot, replaces the Mach-O executable that the user clicked on with a decoy graphic or text file, and opens the decoy document in Preview.

OK. How do you know if Gatekeeper has been configured properly so this does not occur?

3 posted on 07/08/2016 4:45:14 PM PDT by Chgogal (Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Chgogal

Thank you, I have the same question.


4 posted on 07/08/2016 4:50:01 PM PDT by rdl6989
[ Post Reply | Private Reply | To 3 | View Replies ]

To: Chgogal

And I found this in answer to our question.

https://support.apple.com/en-us/HT202491


5 posted on 07/08/2016 4:51:11 PM PDT by rdl6989
[ Post Reply | Private Reply | To 3 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson