To: Swordmaker
If Gatekeeper has been configured by the user to execute all software regardless of source, the malware then downloads and runs the backdoor component which is executed at every reboot, replaces the Mach-O executable that the user clicked on with a decoy graphic or text file, and opens the decoy document in Preview. OK. How do you know if Gatekeeper has been configured properly so this does not occur?
3 posted on
07/08/2016 4:45:14 PM PDT by
Chgogal
(Obama "hung the SEALs out to dry, basically exposed them like a set of dog balls..." CMH)
To: Chgogal
Thank you, I have the same question.
4 posted on
07/08/2016 4:50:01 PM PDT by
rdl6989
To: Chgogal
5 posted on
07/08/2016 4:51:11 PM PDT by
rdl6989
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson