<div dir="ltr">Yes, yes it does.<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Wed, May 26, 2021 at 12:51 PM Andrew Howlett <<a href="mailto:andrew@howlett.net">andrew@howlett.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="auto">When I read this my first reaction is "what a great idea." Does this make me a bad person?</div><div class="gmail_extra"><br><div class="gmail_quote">On May 26, 2021 11:36 a.m., Remi Gauvin <<a href="mailto:remi@georgianit.com" target="_blank">remi@georgianit.com</a>> wrote:<br type="attribution"><blockquote style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><p dir="ltr">This is not related to linux or FOSS, other than an opportunity for snug
<br>
elitism since it doesn't really affect us. But I just noticed in my
<br>
junk mail folder, for the first time, a .exe (presumably malicious)
<br>
packed inside a .iso file.
<br>
<br>
Windows now mounts iso files when you 'open' them, and since Windows by
<br>
default hides file extensions, this is even easier for users to fall
<br>
prey. Presumably, putting the exe in a zip file is an old trick now,
<br>
and most security software aggressively check them.. is anyone watching
<br>
out for iso?
<br>
<br>
_______________________________________________
<br>
Group mailing list
<br>
<a href="mailto:Group@bglug.ca" target="_blank">Group@bglug.ca</a>
<br>
<a href="http://bglug.ca/mailman/listinfo/group_bglug.ca" target="_blank">http://bglug.ca/mailman/listinfo/group_bglug.ca</a>
<br>
</p>
</blockquote></div><br></div>_______________________________________________<br>
Group mailing list<br>
<a href="mailto:Group@bglug.ca" target="_blank">Group@bglug.ca</a><br>
<a href="http://bglug.ca/mailman/listinfo/group_bglug.ca" rel="noreferrer" target="_blank">http://bglug.ca/mailman/listinfo/group_bglug.ca</a><br>
</blockquote></div>