Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

You get what you pay for. -- Gabriel Biel


aus+uk / uk.comp.sys.mac / Re: How to identify a Virtual Machine image.

SubjectAuthor
* How to identify a Virtual Machine image.David Brooks
+* Re: How to identify a Virtual Machine image.FromTheRafters
|`* Re: How to identify a Virtual Machine image.David Brooks
| `* Re: How to identify a Virtual Machine image.FromTheRafters
|  +* Re: How to identify a Virtual Machine image.Steve Carroll
|  |`* Re: How to identify a Virtual Machine image.David Brooks
|  | +* Re: How to identify a Virtual Machine image.Steve Carroll
|  | |`- Re: How to identify a Virtual Machine image.David Brooks
|  | `* Re: How to identify a Virtual Machine image.Wolffan
|  |  `* Re: How to identify a Virtual Machine image.David Brooks
|  |   +* Re: How to identify a Virtual Machine image.Wolffan
|  |   |`- Re: How to identify a Virtual Machine image.Wolffan
|  |   `* How to identify a Virtual Machine image.David Brooks
|  |    `- ETRECHECK reports ......David Brooks
|  `* Re: How to identify a Virtual Machine image.David Brooks
|   `* Re: How to identify a Virtual Machine image.Commander Kinsey
|    `* Re: How to identify a Virtual Machine image.David Brooks
|     +* Re: How to identify a Virtual Machine image.nospam
|     |`* Re: How to identify a Virtual Machine image.David Brooks
|     | +* Re: How to identify a Virtual Machine image.nospam
|     | |`* Re: How to identify a Virtual Machine image.David Brooks
|     | | `- Re: How to identify a Virtual Machine image.nospam
|     | +* Re: How to identify a Virtual Machine image.Wolffan
|     | |`* Re: How to identify a Virtual Machine image.David Brooks
|     | | `- Re: How to identify a Virtual Machine image.Wolffan
|     | `* Re: How to identify a Virtual Machine image.Bob Campbell
|     |  +- Re: How to identify a Virtual Machine image.David Brooks
|     |  `- Re: How to identify a Virtual Machine image.Wolffan
|     `* Re: How to identify a Virtual Machine image.Commander Kinsey
|      +* Re: How to identify a Virtual Machine image.nospam
|      |`* Re: How to identify a Virtual Machine image.David Brooks
|      | `* Re: How to identify a Virtual Machine image.nospam
|      |  `* Re: How to identify a Virtual Machine image.Wolffan
|      |   `- Re: How to identify a Virtual Machine image.nospam
|      `* Re: How to identify a Virtual Machine image.Wolffan
|       `* Re: How to identify a Virtual Machine image.David Brooks
|        +* Re: How to identify a Virtual Machine image.Wolffan
|        |`* Re: How to identify a Virtual Machine image.Commander Kinsey
|        | `* Re: How to identify a Virtual Machine image.Wolffan
|        |  +* Re: How to identify a Virtual Machine image.David Brooks
|        |  |`- Re: How to identify a Virtual Machine image.Wolffan
|        |  `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |   `* Re: How to identify a Virtual Machine image.David Brooks
|        |    `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |     `* Re: How to identify a Virtual Machine image.David Brooks
|        |      `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |       `* Re: How to identify a Virtual Machine image.David Brooks
|        |        `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |         `* Re: How to identify a Virtual Machine image.Wolffan
|        |          `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |           `* Re: How to identify a Virtual Machine image.David Brooks
|        |            `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |             `* Re: How to identify a Virtual Machine image.David Brooks
|        |              `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |               `* Re: How to identify a Virtual Machine image.David Brooks
|        |                `* Re: How to identify a Virtual Machine image.Commander Kinsey
|        |                 `* Re: How to identify a Virtual Machine image.David Brooks
|        |                  `- Re: How to identify a Virtual Machine image.Commander Kinsey
|        `* Re: How to identify a Virtual Machine image.Commander Kinsey
|         `* Re: How to identify a Virtual Machine image.David Brooks
|          +* Re: How to identify a Virtual Machine image.Snit
|          |`* Re: How to identify a Virtual Machine image.David Brooks
|          | `* Re: How to identify a Virtual Machine image.Snit
|          |  `* Re: How to identify a Virtual Machine image.David Brooks
|          |   +* Re: How to identify a Virtual Machine image.nospam
|          |   |`* Re: How to identify a Virtual Machine image.David Brooks
|          |   | `* Re: How to identify a Virtual Machine image.nospam
|          |   |  `* Re: How to identify a Virtual Machine image.David Brooks
|          |   |   +- Re: How to identify a Virtual Machine image.David Brooks
|          |   |   `* Re: How to identify a Virtual Machine image.nospam
|          |   |    +* Re: How to identify a Virtual Machine image.Dirk T. Verbeek
|          |   |    |+* Re: How to identify a Virtual Machine image.nospam
|          |   |    ||`* Re: How to identify a Virtual Machine image.Mike Easter
|          |   |    || `- Re: How to identify a Virtual Machine image.nospam
|          |   |    |`* Re: How to identify a Virtual Machine image.Wolf K
|          |   |    | `- Re: How to identify a Virtual Machine image.David Brooks
|          |   |    `* Re: How to identify a Virtual Machine image.David Brooks
|          |   |     `* Re: How to identify a Virtual Machine image.nospam
|          |   |      `* Re: How to identify a Virtual Machine image.David Brooks
|          |   |       +- Re: How to identify a Virtual Machine image.nospam
|          |   |       `- Re: How to identify a Virtual Machine image.Wolffan
|          |   +* Re: How to identify a Virtual Machine image.Commander Kinsey
|          |   |`* Re: How to identify a Virtual Machine image.David Brooks
|          |   | `- Re: How to identify a Virtual Machine image.Commander Kinsey
|          |   `* Re: How to identify a Virtual Machine image.Snit
|          |    +- Re: How to identify a Virtual Machine image.David Brooks
|          |    `* Re: How to identify a Virtual Machine image.Commander Kinsey
|          |     +* Re: How to identify a Virtual Machine image.David Brooks
|          |     |+* Re: How to identify a Virtual Machine image.nospam
|          |     ||+* Re: How to identify a Virtual Machine image.David Brooks
|          |     |||`* Re: How to identify a Virtual Machine image.nospam
|          |     ||| `* Re: How to identify a Virtual Machine image.David Brooks
|          |     |||  `* Re: How to identify a Virtual Machine image.nospam
|          |     |||   `* Re: How to identify a Virtual Machine image.David Brooks
|          |     |||    `* Re: How to identify a Virtual Machine image.nospam
|          |     |||     `* Re: How to identify a Virtual Machine image.nospam
|          |     |||      `* Re: How to identify a Virtual Machine image.David Brooks
|          |     |||       `* Re: How to identify a Virtual Machine image.nospam
|          |     |||        `- Re: How to identify a Virtual Machine image.David Brooks
|          |     ||`- Re: How to identify a Virtual Machine image.Snit
|          |     |`* Re: How to identify a Virtual Machine image.Snit
|          |     `* Re: How to identify a Virtual Machine image.Snit
|          `* Re: How to identify a Virtual Machine image.Commander Kinsey
`* Re: How to identify a Virtual Machine image.Commander Kinsey

Pages:12345678910111213141516171819202122
How to identify a Virtual Machine image.

<0KLLJ.14705$TXc5.8652@fx14.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5915&group=uk.comp.sys.mac#5915

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!feeder1.feed.usenet.farm!feed.usenet.farm!peer03.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!fx14.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 69
Message-ID: <0KLLJ.14705$TXc5.8652@fx14.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 08:34:04 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 08:34:03 +0000
X-Received-Bytes: 4086
 by: David Brooks - Sun, 6 Feb 2022 08:34 UTC

On 05/02/2022 19:42, Kelly Phillips wrote:
> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>
>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>
>>>> When one looks at an image on a screen, how can one tell that it's being
>>>> shown by the REAL operating system ...... or being displayed on a
>>>> VIRTUAL machine screen?
>>>
>>> If "one" is not an idiot, then it's entirely straightforward and
>>> obvious. However, if "one" is an idiot, then all bets are off.
>>
>> [....]
>>
>> So, let's be clear.
>>
>> YOU claim "it's entirely straightforward and
>> obvious" yet you cannot describe HOW.
>>
>> Is that right?
>
> No, and it's obvious that snit is pulling your strings.

This has absolutely nothing to do with Snit.

> A VM host is an application. You know when you're running it. Inside
> that application, a guest OS (VM) is another application. You know when
> you're running it. I see no possibility for confusion, but to be fair,
> I'm not the idiot computer user that you are.
>
> Don't take my word for it, though. VMware, the obvious leader in that
> space, has a free version of VMware Fusion that you can download and
> install on your ??-inch iMac. Fusion is your VM host application. Run
> that and use its capabilities to install one or more VM guests. Now run
> your guest. Do you see any scenario where you wouldn't be able to tell
> the difference between your VM guest and your host OS? I think not, but
> every time I think I've found the basement of your technical skills, you
> surprise me by digging another level down.

Interesting, but VMWare is not available from my Apple App Store.
https://ibb.co/n7MdLF1

What I'm getting at is that it was once suggested to me that it is
possible for a VM to be installed on a computer WITHOUT the knowledge of
the user AND without a hacker having physical access to the machine itself.

Once done, the 'BotMaster' could subsequently control what the user of
the computer is shown on his/her screen.

Snit appears to agree with me that it might be impossible for the
computer user to actually KNOW whether of not they are viewing true or
false information.

Does that help you to understand?

Do you know HOW one could ascertain whether or not a computer had been
compromised in this manner?

You might wonder how such a circumstance could come about. I suggest
that naively downloading and installing appropriate software would be a
possible route. Most computer users have no idea what actually happens
when they install software onto their machines.

--
Kind regards,
David

Re: How to identify a Virtual Machine image.

<sto2lv$8if$1@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5918&group=uk.comp.sys.mac#5918

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: erra...@nomail.afraid.org (FromTheRafters)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 06 Feb 2022 03:59:24 -0500
Organization: Peripheral Visions
Lines: 68
Message-ID: <sto2lv$8if$1@dont-email.me>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
Reply-To: erratic.howard@gmail.com
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 6 Feb 2022 08:59:44 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="bbc82f61fa43e5c7741c55888c696c87";
logging-data="8783"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19u21q8IkGFNK9VELaLpufzrJpauuCZXHw="
Cancel-Lock: sha1:fW2YNTfjv7I1iScNjpC1bD3an28=
X-Newsreader: MesNews/1.08.06.00-gb
X-ICQ: 1701145376
 by: FromTheRafters - Sun, 6 Feb 2022 08:59 UTC

on 2/6/2022, David Brooks supposed :
> On 05/02/2022 19:42, Kelly Phillips wrote:
>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>
>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>
>>>>> When one looks at an image on a screen, how can one tell that it's being
>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>> VIRTUAL machine screen?
>>>>
>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>
>>> [....]
>>>
>>> So, let's be clear.
>>>
>>> YOU claim "it's entirely straightforward and
>>> obvious" yet you cannot describe HOW.
>>>
>>> Is that right?
>>
>> No, and it's obvious that snit is pulling your strings.
>
> This has absolutely nothing to do with Snit.
>
>> A VM host is an application. You know when you're running it. Inside
>> that application, a guest OS (VM) is another application. You know when
>> you're running it. I see no possibility for confusion, but to be fair,
>> I'm not the idiot computer user that you are.
>>
>> Don't take my word for it, though. VMware, the obvious leader in that
>> space, has a free version of VMware Fusion that you can download and
>> install on your ??-inch iMac. Fusion is your VM host application. Run
>> that and use its capabilities to install one or more VM guests. Now run
>> your guest. Do you see any scenario where you wouldn't be able to tell
>> the difference between your VM guest and your host OS? I think not, but
>> every time I think I've found the basement of your technical skills, you
>> surprise me by digging another level down.
>
> Interesting, but VMWare is not available from my Apple App Store.
> https://ibb.co/n7MdLF1
>
> What I'm getting at is that it was once suggested to me that it is possible
> for a VM to be installed on a computer WITHOUT the knowledge of the user AND
> without a hacker having physical access to the machine itself.
>
> Once done, the 'BotMaster' could subsequently control what the user of the
> computer is shown on his/her screen.
>
> Snit appears to agree with me that it might be impossible for the computer
> user to actually KNOW whether of not they are viewing true or false
> information.
>
> Does that help you to understand?
>
> Do you know HOW one could ascertain whether or not a computer had been
> compromised in this manner?
>
> You might wonder how such a circumstance could come about. I suggest that
> naively downloading and installing appropriate software would be a possible
> route. Most computer users have no idea what actually happens when they
> install software onto their machines.

https://publik.tuwien.ac.at/files/pub-inf_5317.pdf

Re: How to identify a Virtual Machine image.

<eJNLJ.38712$sga6.25324@fx10.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5922&group=uk.comp.sys.mac#5922

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx10.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <sto2lv$8if$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 76
Message-ID: <eJNLJ.38712$sga6.25324@fx10.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 10:49:46 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 10:49:46 +0000
X-Received-Bytes: 4480
 by: David Brooks - Sun, 6 Feb 2022 10:49 UTC

On 06/02/2022 08:59, FromTheRafters wrote:
> on 2/6/2022, David Brooks supposed :
>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>
>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>
>>>>>> When one looks at an image on a screen, how can one tell that it's
>>>>>> being
>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>> VIRTUAL machine screen?
>>>>>
>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>
>>>> [....]
>>>>
>>>> So, let's be clear.
>>>>
>>>> YOU claim "it's entirely straightforward and
>>>> obvious" yet you cannot describe HOW.
>>>>
>>>> Is that right?
>>>
>>> No, and it's obvious that snit is pulling your strings.
>>
>> This has absolutely nothing to do with Snit.
>>
>>> A VM host is an application. You know when you're running it. Inside
>>> that application, a guest OS (VM) is another application. You know when
>>> you're running it. I see no possibility for confusion, but to be fair,
>>> I'm not the idiot computer user that you are.
>>>
>>> Don't take my word for it, though. VMware, the obvious leader in that
>>> space, has a free version of VMware Fusion that you can download and
>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>> that and use its capabilities to install one or more VM guests. Now run
>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>> the difference between your VM guest and your host OS? I think not, but
>>> every time I think I've found the basement of your technical skills, you
>>> surprise me by digging another level down.
>>
>> Interesting, but VMWare is not available from my Apple App Store.
>> https://ibb.co/n7MdLF1
>>
>> What I'm getting at is that it was once suggested to me that it is
>> possible for a VM to be installed on a computer WITHOUT the knowledge
>> of the user AND without a hacker having physical access to the machine
>> itself.
>>
>> Once done, the 'BotMaster' could subsequently control what the user of
>> the computer is shown on his/her screen.
>>
>> Snit appears to agree with me that it might be impossible for the
>> computer user to actually KNOW whether of not they are viewing true or
>> false information.
>>
>> Does that help you to understand?
>>
>> Do you know HOW one could ascertain whether or not a computer had been
>> compromised in this manner?
>>
>> You might wonder how such a circumstance could come about. I suggest
>> that naively downloading and installing appropriate software would be
>> a possible route. Most computer users have no idea what actually
>> happens when they install software onto their machines.
>
> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf

EXCELLENT - I will study later. Thank you.

Have YOU any suggestion of HOW I can check my iMac? Are you familiar
with Knock Knock?

Re: How to identify a Virtual Machine image.

<stofv9$7gc$1@dont-email.me>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5925&group=uk.comp.sys.mac#5925

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: erra...@nomail.afraid.org (FromTheRafters)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 06 Feb 2022 07:46:12 -0500
Organization: Peripheral Visions
Lines: 84
Message-ID: <stofv9$7gc$1@dont-email.me>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1>
Reply-To: erratic.howard@gmail.com
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 6 Feb 2022 12:46:34 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="bbc82f61fa43e5c7741c55888c696c87";
logging-data="7692"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18yMChvCfp6jVBjoUdFpjkmg2vbQPBTz6s="
Cancel-Lock: sha1:BhQv/rzK/Sq2ZGsgMetkAsY0MoQ=
X-Newsreader: MesNews/1.08.06.00-gb
X-ICQ: 1701145376
 by: FromTheRafters - Sun, 6 Feb 2022 12:46 UTC

David Brooks wrote on 2/6/2022 :
> On 06/02/2022 08:59, FromTheRafters wrote:
>> on 2/6/2022, David Brooks supposed :
>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>
>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>
>>>>>>> When one looks at an image on a screen, how can one tell that it's
>>>>>>> being
>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>> VIRTUAL machine screen?
>>>>>>
>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>
>>>>> [....]
>>>>>
>>>>> So, let's be clear.
>>>>>
>>>>> YOU claim "it's entirely straightforward and
>>>>> obvious" yet you cannot describe HOW.
>>>>>
>>>>> Is that right?
>>>>
>>>> No, and it's obvious that snit is pulling your strings.
>>>
>>> This has absolutely nothing to do with Snit.
>>>
>>>> A VM host is an application. You know when you're running it. Inside
>>>> that application, a guest OS (VM) is another application. You know when
>>>> you're running it. I see no possibility for confusion, but to be fair,
>>>> I'm not the idiot computer user that you are.
>>>>
>>>> Don't take my word for it, though. VMware, the obvious leader in that
>>>> space, has a free version of VMware Fusion that you can download and
>>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>>> that and use its capabilities to install one or more VM guests. Now run
>>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>>> the difference between your VM guest and your host OS? I think not, but
>>>> every time I think I've found the basement of your technical skills, you
>>>> surprise me by digging another level down.
>>>
>>> Interesting, but VMWare is not available from my Apple App Store.
>>> https://ibb.co/n7MdLF1
>>>
>>> What I'm getting at is that it was once suggested to me that it is
>>> possible for a VM to be installed on a computer WITHOUT the knowledge of
>>> the user AND without a hacker having physical access to the machine
>>> itself.
>>>
>>> Once done, the 'BotMaster' could subsequently control what the user of the
>>> computer is shown on his/her screen.
>>>
>>> Snit appears to agree with me that it might be impossible for the computer
>>> user to actually KNOW whether of not they are viewing true or false
>>> information.
>>>
>>> Does that help you to understand?
>>>
>>> Do you know HOW one could ascertain whether or not a computer had been
>>> compromised in this manner?
>>>
>>> You might wonder how such a circumstance could come about. I suggest that
>>> naively downloading and installing appropriate software would be a
>>> possible route. Most computer users have no idea what actually happens
>>> when they install software onto their machines.
>>
>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>
> EXCELLENT - I will study later. Thank you.
>
> Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
> Knock Knock?

No. You have a habit of asking questions where you have little chance
of understanding the answers. You asked something general and I
answered something specific, that is a 'surreptitiously installed' VM
(like a full featured rootkit type of malware) could be detectable, in
some cases, by software. My linked answer was about how malware can
detect malware analyst's VMs from within said VMs.

Re: How to identify a Virtual Machine image.

<stopdo$ub7$2@fretwizzer.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5931&group=uk.comp.sys.mac#5931

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!fretwizzer.eternal-september.org!.POSTED!not-for-mail
From: "Steve C...@noSPAM.none (Steve Carroll)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 6 Feb 2022 15:27:52 -0000 (UTC)
Organization: Down Under
Lines: 24
Message-ID: <stopdo$ub7$2@fretwizzer.eternal-september.org>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1>
<cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
Reply-To: noSPAM.none
Injection-Date: Sun, 6 Feb 2022 15:27:52 -0000 (UTC)
Injection-Info: fretwizzer.eternal-september.org; posting-host="bfa0eb9573c45ef33ffa90d063f1693a";
logging-data="31079"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19EDrBAYFtRj5JW2ezNxBrUtrR30glzTRbKo64KDXSxuQ=="
User-Agent: slrn/1.0.3 (Darwin)
Cancel-Lock: sha1:ZKQp2B8O6eMuFKznp/EWRBWd7VQ=
 by: Steve Carroll - Sun, 6 Feb 2022 15:27 UTC

On 2022-02-06, FromTheRafters <erratic@nomail.afraid.org> wrote:

(snip)

>>>> You might wonder how such a circumstance could come about. I suggest that
>>>> naively downloading and installing appropriate software would be a
>>>> possible route. Most computer users have no idea what actually happens
>>>> when they install software onto their machines.
>>>
>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>
>> EXCELLENT - I will study later. Thank you.
>>
>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
>> Knock Knock?
>
> No. You have a habit of asking questions where you have little chance
> of understanding the answers. You asked something general and I
> answered something specific, that is a 'surreptitiously installed' VM
> (like a full featured rootkit type of malware) could be detectable, in
> some cases, by software. My linked answer was about how malware can
> detect malware analyst's VMs from within said VMs.

+1

Re: How to identify a Virtual Machine image.

<XMSLJ.10927$EjU2.10622@fx07.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5932&group=uk.comp.sys.mac#5932

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!fx07.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<stopdo$ub7$2@fretwizzer.eternal-september.org>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <stopdo$ub7$2@fretwizzer.eternal-september.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 33
Message-ID: <XMSLJ.10927$EjU2.10622@fx07.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 16:35:03 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 16:35:02 +0000
X-Received-Bytes: 2967
 by: David Brooks - Sun, 6 Feb 2022 16:35 UTC

On 06/02/2022 15:27, Steve Carroll wrote:
> On 2022-02-06, FromTheRafters <erratic@nomail.afraid.org> wrote:
>
> (snip)
>
>>>>> You might wonder how such a circumstance could come about. I suggest that
>>>>> naively downloading and installing appropriate software would be a
>>>>> possible route. Most computer users have no idea what actually happens
>>>>> when they install software onto their machines.
>>>>
>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>
>>> EXCELLENT - I will study later. Thank you.
>>>
>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
>>> Knock Knock?
>>
>> No. You have a habit of asking questions where you have little chance
>> of understanding the answers. You asked something general and I
>> answered something specific, that is a 'surreptitiously installed' VM
>> (like a full featured rootkit type of malware) could be detectable, in
>> some cases, by software. My linked answer was about how malware can
>> detect malware analyst's VMs from within said VMs.
>
> +1

Just suppose, Steve, that you visited a website and downloaded some
software onto your Apple computer and then installed it.

Assume, in doing so, you inadvertently installed a "rootkit type of
malware" onto your computer. If you were still able to use your computer
to achieve your chosen tasks, how would YOU ever detect that you were
hosting a spy within, as it were?

Re: How to identify a Virtual Machine image.

<stov43$9sp$1@fretwizzer.eternal-september.org>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5933&group=uk.comp.sys.mac#5933

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!fretwizzer.eternal-september.org!.POSTED!not-for-mail
From: "Steve C...@noSPAM.none (Steve Carroll)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 6 Feb 2022 17:05:07 -0000 (UTC)
Organization: Down Under
Lines: 48
Message-ID: <stov43$9sp$1@fretwizzer.eternal-september.org>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1>
<cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<stopdo$ub7$2@fretwizzer.eternal-september.org>
<XMSLJ.10927$EjU2.10622@fx07.ams1>
Reply-To: noSPAM.none
Injection-Date: Sun, 6 Feb 2022 17:05:07 -0000 (UTC)
Injection-Info: fretwizzer.eternal-september.org; posting-host="368cb0c60c9af85ed56671651f8b7f7d";
logging-data="10137"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+xTRP3KoNu0/ve7D4P2hpVfKOFgBkhK2TuPxoqOdKoKA=="
User-Agent: slrn/1.0.3 (Darwin)
Cancel-Lock: sha1:UftGdQHohQw31QE/xKiKQVKOQzA=
 by: Steve Carroll - Sun, 6 Feb 2022 17:05 UTC

On 2022-02-06, David Brooks <Davidb_tj@{REMOVESPAM}me.com> wrote:
> On 06/02/2022 15:27, Steve Carroll wrote:
>> On 2022-02-06, FromTheRafters <erratic@nomail.afraid.org> wrote:
>>
>> (snip)
>>
>>>>>> You might wonder how such a circumstance could come about. I suggest that
>>>>>> naively downloading and installing appropriate software would be a
>>>>>> possible route. Most computer users have no idea what actually happens
>>>>>> when they install software onto their machines.
>>>>>
>>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>>
>>>> EXCELLENT - I will study later. Thank you.
>>>>
>>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
>>>> Knock Knock?
>>>
>>> No. You have a habit of asking questions where you have little chance
>>> of understanding the answers. You asked something general and I
>>> answered something specific, that is a 'surreptitiously installed' VM
>>> (like a full featured rootkit type of malware) could be detectable, in
>>> some cases, by software. My linked answer was about how malware can
>>> detect malware analyst's VMs from within said VMs.
>>
>> +1
>
> Just suppose, Steve, that you visited a website and downloaded some
> software onto your Apple computer and then installed it.
>
> Assume, in doing so, you inadvertently installed a "rootkit type of
> malware" onto your computer. If you were still able to use your computer
> to achieve your chosen tasks, how would YOU ever detect that you were
> hosting a spy within, as it were?

I've been over this with you, if you recall, I even pointed out the
malware (via npm) that went undetected by ClamX's engine. I've been far
more 'affected' by YOUR paranoia ;)

I don't spend a lot of time thinking about 'what ifs', but were there a
'what if' I was as concerned about as you seem to be, I'd spend the time
to learn about it, as opposed to asking the same questions over and over
from the same groups of people. As I've pointed out in the past, there
are means available for you to detect (and be alerted to) when something
is being installed. Are they 'Snit-level' easy? No. Short of that, you
can run a scan after every session where you've dl'd something. If
you're that worried, the best solution is to never keep sensitive data
on your computer.

Re: How to identify a Virtual Machine image.

<0001HW.27B04C6B02D7EA35700000B5238F@news.supernews.com>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5934&group=uk.comp.sys.mac#5934

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 06 Feb 2022 12:35:23 -0600
Date: Sun, 06 Feb 2022 13:35:23 -0500
From: akwolf...@zoho.com (Wolffan)
Organization: The Pack
Mime-Version: 1.0
User-Agent: Hogwasher/5.24
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Message-ID: <0001HW.27B04C6B02D7EA35700000B5238F@news.supernews.com>
Subject: Re: How to identify a Virtual Machine image.
Newsgroups: alt.computer.workshop, uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <stopdo$ub7$2@fretwizzer.eternal-september.org> <XMSLJ.10927$EjU2.10622@fx07.ams1>
Lines: 55
X-Trace: sv3-xsLmfqyQyD6eSnij7orTJNiReWT3lAYP+4tRgPc428vcpFZF34T6szkeUMxAMh0kPnLz3AUhBwZkx7/!iJHFBo4vbRn2G7HhOnSDBXiGWSDqlK+1osGqrYM4NJqNvDMhk/2N27a2NCAY03ktOvrpGn94gr7m!KdWzL8HafdlyXpPJ0IJA/rJS
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 4293
 by: Wolffan - Sun, 6 Feb 2022 18:35 UTC

On 2022 Feb 06, David Brooks wrote
(in article <XMSLJ.10927$EjU2.10622@fx07.ams1>):

> On 06/02/2022 15:27, Steve Carroll wrote:
> > On 2022-02-06, FromTheRafters<erratic@nomail.afraid.org> wrote:
> >
> > (snip)
> >
> > > > > > You might wonder how such a circumstance could come about. I suggest
> > > > > > that
> > > > > > naively downloading and installing appropriate software would be a
> > > > > > possible route. Most computer users have no idea what actually happens
> > > > > > when they install software onto their machines.
> > > > >
> > > > > https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
> > > >
> > > > EXCELLENT - I will study later. Thank you.
> > > >
> > > > Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
> > > > Knock Knock?
> > >
> > > No. You have a habit of asking questions where you have little chance
> > > of understanding the answers. You asked something general and I
> > > answered something specific, that is a 'surreptitiously installed' VM
> > > (like a full featured rootkit type of malware) could be detectable, in
> > > some cases, by software. My linked answer was about how malware can
> > > detect malware analyst's VMs from within said VMs.
> >
> > +1
>
> Just suppose, Steve, that you visited a website and downloaded some
> software onto your Apple computer and then installed it.
>
> Assume, in doing so, you inadvertently installed a "rootkit type of
> malware" onto your computer.

you’re an idiot. the number of rootkits available for Macs is very low.
Most of them have problems with XProtect or SIP or both. Apple has
specifically addressed in November 2021 one strain which could bypass SIP.
Unless and until new SIP bypasses are developed, any rootkit can’t be
installed if you have SIP turned on.
> If you were still able to use your computer
> to achieve your chosen tasks, how would YOU ever detect that you were
> hosting a spy within, as it were?

Sophos and MalwareBytes both detected rootkits. Even those which bypass SIP
or which are installed because some idiot has turned SIP off.

There are also at least two command-line tools available from Git which not
merelt detect but remove rootkits. As you’re massively incompetent, you
dpn’t know how to use those tools. Hint: you can get the source code and
compile them yourself. Well, I could. You’re an idiot. If you have the
source, you can inspect it and see what each line does and will _know_
what’s in there.

Re: How to identify a Virtual Machine image.

<I7WLJ.14707$TXc5.3565@fx14.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5935&group=uk.comp.sys.mac#5935

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!news.freedyn.de!newsreader4.netcologne.de!news.netcologne.de!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!fx14.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <stofv9$7gc$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 96
Message-ID: <I7WLJ.14707$TXc5.3565@fx14.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 20:24:08 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 20:24:08 +0000
X-Received-Bytes: 5369
 by: David Brooks - Sun, 6 Feb 2022 20:24 UTC

On 06/02/2022 12:46, FromTheRafters wrote:
> David Brooks wrote on 2/6/2022 :
>> On 06/02/2022 08:59, FromTheRafters wrote:
>>> on 2/6/2022, David Brooks supposed :
>>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>
>>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>
>>>>>>>> When one looks at an image on a screen, how can one tell that
>>>>>>>> it's being
>>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>>> VIRTUAL machine screen?
>>>>>>>
>>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>>
>>>>>> [....]
>>>>>>
>>>>>> So, let's be clear.
>>>>>>
>>>>>> YOU claim "it's entirely straightforward and
>>>>>> obvious" yet you cannot describe HOW.
>>>>>>
>>>>>> Is that right?
>>>>>
>>>>> No, and it's obvious that snit is pulling your strings.
>>>>
>>>> This has absolutely nothing to do with Snit.
>>>>
>>>>> A VM host is an application. You know when you're running it. Inside
>>>>> that application, a guest OS (VM) is another application. You know
>>>>> when
>>>>> you're running it. I see no possibility for confusion, but to be fair,
>>>>> I'm not the idiot computer user that you are.
>>>>>
>>>>> Don't take my word for it, though. VMware, the obvious leader in that
>>>>> space, has a free version of VMware Fusion that you can download and
>>>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>>>> that and use its capabilities to install one or more VM guests. Now
>>>>> run
>>>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>>>> the difference between your VM guest and your host OS? I think not,
>>>>> but
>>>>> every time I think I've found the basement of your technical
>>>>> skills, you
>>>>> surprise me by digging another level down.
>>>>
>>>> Interesting, but VMWare is not available from my Apple App Store.
>>>> https://ibb.co/n7MdLF1
>>>>
>>>> What I'm getting at is that it was once suggested to me that it is
>>>> possible for a VM to be installed on a computer WITHOUT the
>>>> knowledge of the user AND without a hacker having physical access to
>>>> the machine itself.
>>>>
>>>> Once done, the 'BotMaster' could subsequently control what the user
>>>> of the computer is shown on his/her screen.
>>>>
>>>> Snit appears to agree with me that it might be impossible for the
>>>> computer user to actually KNOW whether of not they are viewing true
>>>> or false information.
>>>>
>>>> Does that help you to understand?
>>>>
>>>> Do you know HOW one could ascertain whether or not a computer had
>>>> been compromised in this manner?
>>>>
>>>> You might wonder how such a circumstance could come about. I suggest
>>>> that naively downloading and installing appropriate software would
>>>> be a possible route. Most computer users have no idea what actually
>>>> happens when they install software onto their machines.
>>>
>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>
>> EXCELLENT - I will study later. Thank you.
>>
>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar
>> with Knock Knock?
>
> No. You have a habit of asking questions where you have little chance of
> understanding the answers. You asked something general and I answered
> something specific, that is a 'surreptitiously installed' VM (like a
> full featured rootkit type of malware) could be detectable, in some
> cases, by software. My linked answer was about how malware can detect
> malware analyst's VMs from within said VMs.

OK - Details here:- https://objective-see.com/products/knockknock.html

I appreciate your input, FTR. Thank you. :-)

--
David

Re: How to identify a Virtual Machine image.

<op.1g6tu6aumvhs6z@ryzen.lan>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5937&group=uk.comp.sys.mac#5937

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!news.freedyn.de!newsreader4.netcologne.de!news.netcologne.de!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx13.ams1.POSTED!not-for-mail
Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: CK1...@nospam.com (Commander Kinsey)
Message-ID: <op.1g6tu6aumvhs6z@ryzen.lan>
User-Agent: Opera Mail/1.0 (Win32)
X-Antivirus: AVG (VPS 220206-8, 6/2/2022), Outbound message
X-Antivirus-Status: Clean
Lines: 69
X-Complaints-To: abuse(at)newshosting.com
NNTP-Posting-Date: Sun, 06 Feb 2022 21:26:58 UTC
Organization: Newshosting.com - Highest quality at a great price! www.newshosting.com
Date: Sun, 06 Feb 2022 21:26:56 -0000
X-Received-Bytes: 4505
 by: Commander Kinsey - Sun, 6 Feb 2022 21:26 UTC

On Sun, 06 Feb 2022 08:34:03 -0000, wrote:

> On 05/02/2022 19:42, Kelly Phillips wrote:
>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>
>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>
>>>>> When one looks at an image on a screen, how can one tell that it's being
>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>> VIRTUAL machine screen?
>>>>
>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>
>>> [....]
>>>
>>> So, let's be clear.
>>>
>>> YOU claim "it's entirely straightforward and
>>> obvious" yet you cannot describe HOW.
>>>
>>> Is that right?
>>
>> No, and it's obvious that snit is pulling your strings.
>
> This has absolutely nothing to do with Snit.
>
>> A VM host is an application. You know when you're running it. Inside
>> that application, a guest OS (VM) is another application. You know when
>> you're running it. I see no possibility for confusion, but to be fair,
>> I'm not the idiot computer user that you are.
>>
>> Don't take my word for it, though. VMware, the obvious leader in that
>> space, has a free version of VMware Fusion that you can download and
>> install on your ??-inch iMac. Fusion is your VM host application. Run
>> that and use its capabilities to install one or more VM guests. Now run
>> your guest. Do you see any scenario where you wouldn't be able to tell
>> the difference between your VM guest and your host OS? I think not, but
>> every time I think I've found the basement of your technical skills, you
>> surprise me by digging another level down.
>
> Interesting, but VMWare is not available from my Apple App Store.
> https://ibb.co/n7MdLF1
>
> What I'm getting at is that it was once suggested to me that it is
> possible for a VM to be installed on a computer WITHOUT the knowledge of
> the user AND without a hacker having physical access to the machine itself.
>
> Once done, the 'BotMaster' could subsequently control what the user of
> the computer is shown on his/her screen.
>
> Snit appears to agree with me that it might be impossible for the
> computer user to actually KNOW whether of not they are viewing true or
> false information.
>
> Does that help you to understand?
>
> Do you know HOW one could ascertain whether or not a computer had been
> compromised in this manner?
>
> You might wonder how such a circumstance could come about. I suggest
> that naively downloading and installing appropriate software would be a
> possible route. Most computer users have no idea what actually happens
> when they install software onto their machines.

I have used (for a laugh after it was used on me for a laugh) "back orifice". You can remotely control someone else's computer. Someone remotely printed the entire manual for a computer game on every laser printer at my work overnight. I tried the trick on a friend in Canada, but accidentally opened the door for anyone to control his machine. He didn't like that.

Re: How to identify a Virtual Machine image.

<op.1g6tw2bomvhs6z@ryzen.lan>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5938&group=uk.comp.sys.mac#5938

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!feeder1.feed.usenet.farm!feed.usenet.farm!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx13.ams1.POSTED!not-for-mail
Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
<sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1>
<stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: CK1...@nospam.com (Commander Kinsey)
Message-ID: <op.1g6tw2bomvhs6z@ryzen.lan>
User-Agent: Opera Mail/1.0 (Win32)
X-Antivirus: AVG (VPS 220206-8, 6/2/2022), Outbound message
X-Antivirus-Status: Clean
Lines: 95
X-Complaints-To: abuse(at)newshosting.com
NNTP-Posting-Date: Sun, 06 Feb 2022 21:28:05 UTC
Organization: Newshosting.com - Highest quality at a great price! www.newshosting.com
Date: Sun, 06 Feb 2022 21:28:04 -0000
X-Received-Bytes: 5537
 by: Commander Kinsey - Sun, 6 Feb 2022 21:28 UTC

On Sun, 06 Feb 2022 20:24:08 -0000, wrote:

> On 06/02/2022 12:46, FromTheRafters wrote:
>> David Brooks wrote on 2/6/2022 :
>>> On 06/02/2022 08:59, FromTheRafters wrote:
>>>> on 2/6/2022, David Brooks supposed :
>>>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>
>>>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>>
>>>>>>>>> When one looks at an image on a screen, how can one tell that
>>>>>>>>> it's being
>>>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>>>> VIRTUAL machine screen?
>>>>>>>>
>>>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>>>
>>>>>>> [....]
>>>>>>>
>>>>>>> So, let's be clear.
>>>>>>>
>>>>>>> YOU claim "it's entirely straightforward and
>>>>>>> obvious" yet you cannot describe HOW.
>>>>>>>
>>>>>>> Is that right?
>>>>>>
>>>>>> No, and it's obvious that snit is pulling your strings.
>>>>>
>>>>> This has absolutely nothing to do with Snit.
>>>>>
>>>>>> A VM host is an application. You know when you're running it. Inside
>>>>>> that application, a guest OS (VM) is another application. You know
>>>>>> when
>>>>>> you're running it. I see no possibility for confusion, but to be fair,
>>>>>> I'm not the idiot computer user that you are.
>>>>>>
>>>>>> Don't take my word for it, though. VMware, the obvious leader in that
>>>>>> space, has a free version of VMware Fusion that you can download and
>>>>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>>>>> that and use its capabilities to install one or more VM guests. Now
>>>>>> run
>>>>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>>>>> the difference between your VM guest and your host OS? I think not,
>>>>>> but
>>>>>> every time I think I've found the basement of your technical
>>>>>> skills, you
>>>>>> surprise me by digging another level down.
>>>>>
>>>>> Interesting, but VMWare is not available from my Apple App Store.
>>>>> https://ibb.co/n7MdLF1
>>>>>
>>>>> What I'm getting at is that it was once suggested to me that it is
>>>>> possible for a VM to be installed on a computer WITHOUT the
>>>>> knowledge of the user AND without a hacker having physical access to
>>>>> the machine itself.
>>>>>
>>>>> Once done, the 'BotMaster' could subsequently control what the user
>>>>> of the computer is shown on his/her screen.
>>>>>
>>>>> Snit appears to agree with me that it might be impossible for the
>>>>> computer user to actually KNOW whether of not they are viewing true
>>>>> or false information.
>>>>>
>>>>> Does that help you to understand?
>>>>>
>>>>> Do you know HOW one could ascertain whether or not a computer had
>>>>> been compromised in this manner?
>>>>>
>>>>> You might wonder how such a circumstance could come about. I suggest
>>>>> that naively downloading and installing appropriate software would
>>>>> be a possible route. Most computer users have no idea what actually
>>>>> happens when they install software onto their machines.
>>>>
>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>
>>> EXCELLENT - I will study later. Thank you.
>>>
>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar
>>> with Knock Knock?
>>
>> No. You have a habit of asking questions where you have little chance of
>> understanding the answers. You asked something general and I answered
>> something specific, that is a 'surreptitiously installed' VM (like a
>> full featured rootkit type of malware) could be detectable, in some
>> cases, by software. My linked answer was about how malware can detect
>> malware analyst's VMs from within said VMs.
>
> OK - Details here:- https://objective-see.com/products/knockknock.html

Oh but Macs don't get viruses. That's what I remember being told....

Re: How to identify a Virtual Machine image.

<BiYLJ.788264$YlU2.85744@fx08.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5939&group=uk.comp.sys.mac#5939

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!fx08.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <op.1g6tu6aumvhs6z@ryzen.lan>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <op.1g6tu6aumvhs6z@ryzen.lan>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 83
Message-ID: <BiYLJ.788264$YlU2.85744@fx08.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 22:52:17 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 22:52:17 +0000
X-Received-Bytes: 4816
 by: David Brooks - Sun, 6 Feb 2022 22:52 UTC

On 06/02/2022 21:26, Commander Kinsey wrote:
> On Sun, 06 Feb 2022 08:34:03 -0000,  wrote:
>
>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>
>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>
>>>>>> When one looks at an image on a screen, how can one tell that it's
>>>>>> being
>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>> VIRTUAL machine screen?
>>>>>
>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>
>>>> [....]
>>>>
>>>> So, let's be clear.
>>>>
>>>> YOU claim "it's entirely straightforward and
>>>> obvious" yet you cannot describe HOW.
>>>>
>>>> Is that right?
>>>
>>> No, and it's obvious that snit is pulling your strings.
>>
>> This has absolutely nothing to do with Snit.
>>
>>> A VM host is an application. You know when you're running it. Inside
>>> that application, a guest OS (VM) is another application. You know when
>>> you're running it. I see no possibility for confusion, but to be fair,
>>> I'm not the idiot computer user that you are.
>>>
>>> Don't take my word for it, though. VMware, the obvious leader in that
>>> space, has a free version of VMware Fusion that you can download and
>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>> that and use its capabilities to install one or more VM guests. Now run
>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>> the difference between your VM guest and your host OS? I think not, but
>>> every time I think I've found the basement of your technical skills, you
>>> surprise me by digging another level down.
>>
>> Interesting, but VMWare is not available from my Apple App Store.
>> https://ibb.co/n7MdLF1
>>
>> What I'm getting at is that it was once suggested to me that it is
>> possible for a VM to be installed on a computer WITHOUT the knowledge of
>> the user AND without a hacker having physical access to the machine
>> itself.
>>
>> Once done, the 'BotMaster' could subsequently control what the user of
>> the computer is shown on his/her screen.
>>
>> Snit appears to agree with me that it might be impossible for the
>> computer user to actually KNOW whether of not they are viewing true or
>> false information.
>>
>> Does that help you to understand?
>>
>> Do you know HOW one could ascertain whether or not a computer had been
>> compromised in this manner?
>>
>> You might wonder how such a circumstance could come about. I suggest
>> that naively downloading and installing appropriate software would be a
>> possible route. Most computer users have no idea what actually happens
>> when they install software onto their machines.
>
> I have used (for a laugh after it was used on me for a laugh) "back
> orifice".  You can remotely control someone else's computer.  Someone
> remotely printed the entire manual for a computer game on every laser
> printer at my work overnight.  I tried the trick on a friend in Canada,
> but accidentally opened the door for anyone to control his machine.  He
> didn't like that.

You're a bit of a bad lad!!! ;-)

I'm quite fond of TeamViewer. Have you tried it?

https://www.teamviewer.com/en/

Re: How to identify a Virtual Machine image.

<op.1g6xy3g3mvhs6z@ryzen.lan>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5940&group=uk.comp.sys.mac#5940

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news1.tnib.de!feed.news.tnib.de!news.tnib.de!news.uzoreto.com!newsfeed.xs4all.nl!newsfeed9.news.xs4all.nl!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer02.ams1!peer.ams1.xlned.com!news.xlned.com!fx06.ams1.POSTED!not-for-mail
Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
<op.1g6tu6aumvhs6z@ryzen.lan> <BiYLJ.788264$YlU2.85744@fx08.ams1>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: CK1...@nospam.com (Commander Kinsey)
Message-ID: <op.1g6xy3g3mvhs6z@ryzen.lan>
User-Agent: Opera Mail/1.0 (Win32)
X-Antivirus: AVG (VPS 220206-8, 6/2/2022), Outbound message
X-Antivirus-Status: Clean
Lines: 87
X-Complaints-To: abuse(at)newshosting.com
NNTP-Posting-Date: Sun, 06 Feb 2022 22:55:43 UTC
Organization: Newshosting.com - Highest quality at a great price! www.newshosting.com
Date: Sun, 06 Feb 2022 22:55:41 -0000
X-Received-Bytes: 5198
 by: Commander Kinsey - Sun, 6 Feb 2022 22:55 UTC

On Sun, 06 Feb 2022 22:52:17 -0000, wrote:

> On 06/02/2022 21:26, Commander Kinsey wrote:
>> On Sun, 06 Feb 2022 08:34:03 -0000, wrote:
>>
>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>
>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>
>>>>>>> When one looks at an image on a screen, how can one tell that it's
>>>>>>> being
>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>> VIRTUAL machine screen?
>>>>>>
>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>
>>>>> [....]
>>>>>
>>>>> So, let's be clear.
>>>>>
>>>>> YOU claim "it's entirely straightforward and
>>>>> obvious" yet you cannot describe HOW.
>>>>>
>>>>> Is that right?
>>>>
>>>> No, and it's obvious that snit is pulling your strings.
>>>
>>> This has absolutely nothing to do with Snit.
>>>
>>>> A VM host is an application. You know when you're running it. Inside
>>>> that application, a guest OS (VM) is another application. You know when
>>>> you're running it. I see no possibility for confusion, but to be fair,
>>>> I'm not the idiot computer user that you are.
>>>>
>>>> Don't take my word for it, though. VMware, the obvious leader in that
>>>> space, has a free version of VMware Fusion that you can download and
>>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>>> that and use its capabilities to install one or more VM guests. Now run
>>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>>> the difference between your VM guest and your host OS? I think not, but
>>>> every time I think I've found the basement of your technical skills, you
>>>> surprise me by digging another level down.
>>>
>>> Interesting, but VMWare is not available from my Apple App Store.
>>> https://ibb.co/n7MdLF1
>>>
>>> What I'm getting at is that it was once suggested to me that it is
>>> possible for a VM to be installed on a computer WITHOUT the knowledge of
>>> the user AND without a hacker having physical access to the machine
>>> itself.
>>>
>>> Once done, the 'BotMaster' could subsequently control what the user of
>>> the computer is shown on his/her screen.
>>>
>>> Snit appears to agree with me that it might be impossible for the
>>> computer user to actually KNOW whether of not they are viewing true or
>>> false information.
>>>
>>> Does that help you to understand?
>>>
>>> Do you know HOW one could ascertain whether or not a computer had been
>>> compromised in this manner?
>>>
>>> You might wonder how such a circumstance could come about. I suggest
>>> that naively downloading and installing appropriate software would be a
>>> possible route. Most computer users have no idea what actually happens
>>> when they install software onto their machines.
>>
>> I have used (for a laugh after it was used on me for a laugh) "back
>> orifice". You can remotely control someone else's computer. Someone
>> remotely printed the entire manual for a computer game on every laser
>> printer at my work overnight. I tried the trick on a friend in Canada,
>> but accidentally opened the door for anyone to control his machine. He
>> didn't like that.
>
> You're a bit of a bad lad!!! ;-)
>
> I'm quite fond of TeamViewer. Have you tried it?
>
> https://www.teamviewer.com/en/

I used to use that at home for my 6 garage machines. I can't remember why I stopped, something went wrong with it and I changed to Remote Utilities.

Re: How to identify a Virtual Machine image.

<op.1g6x2vximvhs6z@ryzen.lan>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5941&group=uk.comp.sys.mac#5941

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!2.eu.feeder.erje.net!feeder.erje.net!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!fx06.ams1.POSTED!not-for-mail
Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
<op.1g6tu6aumvhs6z@ryzen.lan> <BiYLJ.788264$YlU2.85744@fx08.ams1>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: CK1...@nospam.com (Commander Kinsey)
Message-ID: <op.1g6x2vximvhs6z@ryzen.lan>
User-Agent: Opera Mail/1.0 (Win32)
X-Antivirus: AVG (VPS 220206-8, 6/2/2022), Outbound message
X-Antivirus-Status: Clean
Lines: 87
X-Complaints-To: abuse(at)newshosting.com
NNTP-Posting-Date: Sun, 06 Feb 2022 22:57:59 UTC
Organization: Newshosting.com - Highest quality at a great price! www.newshosting.com
Date: Sun, 06 Feb 2022 22:57:57 -0000
X-Received-Bytes: 5370
 by: Commander Kinsey - Sun, 6 Feb 2022 22:57 UTC

On Sun, 06 Feb 2022 22:52:17 -0000, wrote:

> On 06/02/2022 21:26, Commander Kinsey wrote:
>> On Sun, 06 Feb 2022 08:34:03 -0000, wrote:
>>
>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>
>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>
>>>>>>> When one looks at an image on a screen, how can one tell that it's
>>>>>>> being
>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>> VIRTUAL machine screen?
>>>>>>
>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>
>>>>> [....]
>>>>>
>>>>> So, let's be clear.
>>>>>
>>>>> YOU claim "it's entirely straightforward and
>>>>> obvious" yet you cannot describe HOW.
>>>>>
>>>>> Is that right?
>>>>
>>>> No, and it's obvious that snit is pulling your strings.
>>>
>>> This has absolutely nothing to do with Snit.
>>>
>>>> A VM host is an application. You know when you're running it. Inside
>>>> that application, a guest OS (VM) is another application. You know when
>>>> you're running it. I see no possibility for confusion, but to be fair,
>>>> I'm not the idiot computer user that you are.
>>>>
>>>> Don't take my word for it, though. VMware, the obvious leader in that
>>>> space, has a free version of VMware Fusion that you can download and
>>>> install on your ??-inch iMac. Fusion is your VM host application. Run
>>>> that and use its capabilities to install one or more VM guests. Now run
>>>> your guest. Do you see any scenario where you wouldn't be able to tell
>>>> the difference between your VM guest and your host OS? I think not, but
>>>> every time I think I've found the basement of your technical skills, you
>>>> surprise me by digging another level down.
>>>
>>> Interesting, but VMWare is not available from my Apple App Store.
>>> https://ibb.co/n7MdLF1
>>>
>>> What I'm getting at is that it was once suggested to me that it is
>>> possible for a VM to be installed on a computer WITHOUT the knowledge of
>>> the user AND without a hacker having physical access to the machine
>>> itself.
>>>
>>> Once done, the 'BotMaster' could subsequently control what the user of
>>> the computer is shown on his/her screen.
>>>
>>> Snit appears to agree with me that it might be impossible for the
>>> computer user to actually KNOW whether of not they are viewing true or
>>> false information.
>>>
>>> Does that help you to understand?
>>>
>>> Do you know HOW one could ascertain whether or not a computer had been
>>> compromised in this manner?
>>>
>>> You might wonder how such a circumstance could come about. I suggest
>>> that naively downloading and installing appropriate software would be a
>>> possible route. Most computer users have no idea what actually happens
>>> when they install software onto their machines.
>>
>> I have used (for a laugh after it was used on me for a laugh) "back
>> orifice". You can remotely control someone else's computer. Someone
>> remotely printed the entire manual for a computer game on every laser
>> printer at my work overnight. I tried the trick on a friend in Canada,
>> but accidentally opened the door for anyone to control his machine. He
>> didn't like that.
>
> You're a bit of a bad lad!!! ;-)
>
> I'm quite fond of TeamViewer. Have you tried it?
>
> https://www.teamviewer.com/en/

Another one is Classroom Spy. A teacher had a weird shaped room where he couldn't see some of the pupils. He didn't tell them he could see their screens. He'd place a message on their screen to scare the shit out of them if they weren't working. He liked a good joke, he once told a boy to stop masticating (which means chewing), the boy covered his private parts and shouted "I wasn't!"

Re: How to identify a Virtual Machine image.

<YnYLJ.38735$sga6.36975@fx10.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5942&group=uk.comp.sys.mac#5942

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!feeder1.feed.usenet.farm!feed.usenet.farm!newsfeed.xs4all.nl!newsfeed9.news.xs4all.nl!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx10.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <op.1g6tw2bomvhs6z@ryzen.lan>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 104
Message-ID: <YnYLJ.38735$sga6.36975@fx10.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 22:58:00 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 22:58:00 +0000
X-Received-Bytes: 5972
 by: David Brooks - Sun, 6 Feb 2022 22:58 UTC

On 06/02/2022 21:28, Commander Kinsey wrote:
> On Sun, 06 Feb 2022 20:24:08 -0000,  wrote:
>
>> On 06/02/2022 12:46, FromTheRafters wrote:
>>> David Brooks wrote on 2/6/2022 :
>>>> On 06/02/2022 08:59, FromTheRafters wrote:
>>>>> on 2/6/2022, David Brooks supposed :
>>>>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>
>>>>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>>>
>>>>>>>>>> When one looks at an image on a screen, how can one tell that
>>>>>>>>>> it's being
>>>>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>>>>> VIRTUAL machine screen?
>>>>>>>>>
>>>>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>>>>
>>>>>>>> [....]
>>>>>>>>
>>>>>>>> So, let's be clear.
>>>>>>>>
>>>>>>>> YOU claim "it's entirely straightforward and
>>>>>>>> obvious" yet you cannot describe HOW.
>>>>>>>>
>>>>>>>> Is that right?
>>>>>>>
>>>>>>> No, and it's obvious that snit is pulling your strings.
>>>>>>
>>>>>> This has absolutely nothing to do with Snit.
>>>>>>
>>>>>>> A VM host is an application. You know when you're running it. Inside
>>>>>>> that application, a guest OS (VM) is another application. You know
>>>>>>> when
>>>>>>> you're running it. I see no possibility for confusion, but to be
>>>>>>> fair,
>>>>>>> I'm not the idiot computer user that you are.
>>>>>>>
>>>>>>> Don't take my word for it, though. VMware, the obvious leader in
>>>>>>> that
>>>>>>> space, has a free version of VMware Fusion that you can download and
>>>>>>> install on your ??-inch iMac. Fusion is your VM host application.
>>>>>>> Run
>>>>>>> that and use its capabilities to install one or more VM guests. Now
>>>>>>> run
>>>>>>> your guest. Do you see any scenario where you wouldn't be able to
>>>>>>> tell
>>>>>>> the difference between your VM guest and your host OS? I think not,
>>>>>>> but
>>>>>>> every time I think I've found the basement of your technical
>>>>>>> skills, you
>>>>>>> surprise me by digging another level down.
>>>>>>
>>>>>> Interesting, but VMWare is not available from my Apple App Store.
>>>>>> https://ibb.co/n7MdLF1
>>>>>>
>>>>>> What I'm getting at is that it was once suggested to me that it is
>>>>>> possible for a VM to be installed on a computer WITHOUT the
>>>>>> knowledge of the user AND without a hacker having physical access to
>>>>>> the machine itself.
>>>>>>
>>>>>> Once done, the 'BotMaster' could subsequently control what the user
>>>>>> of the computer is shown on his/her screen.
>>>>>>
>>>>>> Snit appears to agree with me that it might be impossible for the
>>>>>> computer user to actually KNOW whether of not they are viewing true
>>>>>> or false information.
>>>>>>
>>>>>> Does that help you to understand?
>>>>>>
>>>>>> Do you know HOW one could ascertain whether or not a computer had
>>>>>> been compromised in this manner?
>>>>>>
>>>>>> You might wonder how such a circumstance could come about. I suggest
>>>>>> that naively downloading and installing appropriate software would
>>>>>> be a possible route. Most computer users have no idea what actually
>>>>>> happens when they install software onto their machines.
>>>>>
>>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>>
>>>> EXCELLENT - I will study later. Thank you.
>>>>
>>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar
>>>> with Knock Knock?
>>>
>>> No. You have a habit of asking questions where you have little chance of
>>> understanding the answers. You asked something general and I answered
>>> something specific, that is a 'surreptitiously installed' VM (like a
>>> full featured rootkit type of malware) could be detectable, in some
>>> cases, by software. My linked answer was about how malware can detect
>>> malware analyst's VMs from within said VMs.
>>
>> OK - Details here:- https://objective-see.com/products/knockknock.html
>
> Oh but Macs don't get viruses.  That's what I remember being told....

Sadly, I don't believe that is true. However, Apple does appear to
'monitor' ALL Apple computers connected to the Internet and can control
ALL of them whenever urgent action is required - that my belief anyway.

Re: How to identify a Virtual Machine image.

<060220221800536189%nospam@nospam.invalid>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5943&group=uk.comp.sys.mac#5943

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nos...@nospam.invalid (nospam)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 06 Feb 2022 18:00:53 -0500
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <060220221800536189%nospam@nospam.invalid>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="22e9f4a30e440625a8fb26be46de35e8";
logging-data="31634"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/+o0oI9wRzjoPyaXMkXf1m"
User-Agent: Thoth/1.9.0 (Mac OS X)
Cancel-Lock: sha1:K7z5nxnJnyTKB0BRBcL2osZqo+Y=
 by: nospam - Sun, 6 Feb 2022 23:00 UTC

In article <YnYLJ.38735$sga6.36975@fx10.ams1>, David Brooks
<Davidb_tj@{REMOVESPAM}me.com> wrote:

> However, Apple does appear to
> 'monitor' ALL Apple computers connected to the Internet and can control
> ALL of them whenever urgent action is required - that my belief anyway.

tin foil, aisle 4.

you must also believe the earth is flat and the moon landing was faked.

Re: How to identify a Virtual Machine image.

<2CYLJ.25159$fIV5.11079@fx12.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5944&group=uk.comp.sys.mac#5944

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!newsfeed.xs4all.nl!newsfeed8.news.xs4all.nl!feeder1.feed.usenet.farm!feed.usenet.farm!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!fx12.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan>
<YnYLJ.38735$sga6.36975@fx10.ams1> <060220221800536189%nospam@nospam.invalid>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <060220221800536189%nospam@nospam.invalid>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 24
Message-ID: <2CYLJ.25159$fIV5.11079@fx12.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Sun, 06 Feb 2022 23:13:02 UTC
Organization: blocknews - www.blocknews.net
Date: Sun, 6 Feb 2022 23:13:02 +0000
X-Received-Bytes: 2274
 by: David Brooks - Sun, 6 Feb 2022 23:13 UTC

On 06/02/2022 23:00, nospam wrote:
> In article <YnYLJ.38735$sga6.36975@fx10.ams1>, David Brooks
> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>
>> However, Apple does appear to
>> 'monitor' ALL Apple computers connected to the Internet and can control
>> ALL of them whenever urgent action is required - that my belief anyway.
>
> tin foil, aisle 4.
>
> you must also believe the earth is flat and the moon landing was faked.

THIS was installed by Apple recently with *NO* input from me:-

XProtectPlistConfigData:

Version: 2155
Source: Apple
Install Date: 04/02/2022, 14:30

==========================================

Explain

Re: How to identify a Virtual Machine image.

<op.1g60t4r1mvhs6z@ryzen.lan>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5945&group=uk.comp.sys.mac#5945

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!feeder1.feed.usenet.farm!feed.usenet.farm!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx11.ams1.POSTED!not-for-mail
Content-Type: text/plain; charset=iso-8859-15; format=flowed; delsp=yes
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
References: <op.1gzldqlemvhs6z@ryzen.lan> <op.1gzrib17mvhs6z@ryzen.lan>
<j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad>
<j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan>
<j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1>
<sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1>
<stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1>
<op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: CK1...@nospam.com (Commander Kinsey)
Message-ID: <op.1g60t4r1mvhs6z@ryzen.lan>
User-Agent: Opera Mail/1.0 (Win32)
X-Antivirus: AVG (VPS 220206-8, 6/2/2022), Outbound message
X-Antivirus-Status: Clean
Lines: 108
X-Complaints-To: abuse(at)newshosting.com
NNTP-Posting-Date: Sun, 06 Feb 2022 23:57:31 UTC
Organization: Newshosting.com - Highest quality at a great price! www.newshosting.com
Date: Sun, 06 Feb 2022 23:57:30 -0000
X-Received-Bytes: 6296
 by: Commander Kinsey - Sun, 6 Feb 2022 23:57 UTC

On Sun, 06 Feb 2022 22:58:00 -0000, wrote:

> On 06/02/2022 21:28, Commander Kinsey wrote:
>> On Sun, 06 Feb 2022 20:24:08 -0000, wrote:
>>
>>> On 06/02/2022 12:46, FromTheRafters wrote:
>>>> David Brooks wrote on 2/6/2022 :
>>>>> On 06/02/2022 08:59, FromTheRafters wrote:
>>>>>> on 2/6/2022, David Brooks supposed :
>>>>>>> On 05/02/2022 19:42, Kelly Phillips wrote:
>>>>>>>> On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
>>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>>
>>>>>>>>> On 05/02/2022 06:17, Kelly Phillips wrote:
>>>>>>>>>> On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
>>>>>>>>>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>>>>>>>>>
>>>>>>>>>>> When one looks at an image on a screen, how can one tell that
>>>>>>>>>>> it's being
>>>>>>>>>>> shown by the REAL operating system ...... or being displayed on a
>>>>>>>>>>> VIRTUAL machine screen?
>>>>>>>>>>
>>>>>>>>>> If "one" is not an idiot, then it's entirely straightforward and
>>>>>>>>>> obvious. However, if "one" is an idiot, then all bets are off.
>>>>>>>>>
>>>>>>>>> [....]
>>>>>>>>>
>>>>>>>>> So, let's be clear.
>>>>>>>>>
>>>>>>>>> YOU claim "it's entirely straightforward and
>>>>>>>>> obvious" yet you cannot describe HOW.
>>>>>>>>>
>>>>>>>>> Is that right?
>>>>>>>>
>>>>>>>> No, and it's obvious that snit is pulling your strings.
>>>>>>>
>>>>>>> This has absolutely nothing to do with Snit.
>>>>>>>
>>>>>>>> A VM host is an application. You know when you're running it. Inside
>>>>>>>> that application, a guest OS (VM) is another application. You know
>>>>>>>> when
>>>>>>>> you're running it. I see no possibility for confusion, but to be
>>>>>>>> fair,
>>>>>>>> I'm not the idiot computer user that you are.
>>>>>>>>
>>>>>>>> Don't take my word for it, though. VMware, the obvious leader in
>>>>>>>> that
>>>>>>>> space, has a free version of VMware Fusion that you can download and
>>>>>>>> install on your ??-inch iMac. Fusion is your VM host application.
>>>>>>>> Run
>>>>>>>> that and use its capabilities to install one or more VM guests. Now
>>>>>>>> run
>>>>>>>> your guest. Do you see any scenario where you wouldn't be able to
>>>>>>>> tell
>>>>>>>> the difference between your VM guest and your host OS? I think not,
>>>>>>>> but
>>>>>>>> every time I think I've found the basement of your technical
>>>>>>>> skills, you
>>>>>>>> surprise me by digging another level down.
>>>>>>>
>>>>>>> Interesting, but VMWare is not available from my Apple App Store.
>>>>>>> https://ibb.co/n7MdLF1
>>>>>>>
>>>>>>> What I'm getting at is that it was once suggested to me that it is
>>>>>>> possible for a VM to be installed on a computer WITHOUT the
>>>>>>> knowledge of the user AND without a hacker having physical access to
>>>>>>> the machine itself.
>>>>>>>
>>>>>>> Once done, the 'BotMaster' could subsequently control what the user
>>>>>>> of the computer is shown on his/her screen.
>>>>>>>
>>>>>>> Snit appears to agree with me that it might be impossible for the
>>>>>>> computer user to actually KNOW whether of not they are viewing true
>>>>>>> or false information.
>>>>>>>
>>>>>>> Does that help you to understand?
>>>>>>>
>>>>>>> Do you know HOW one could ascertain whether or not a computer had
>>>>>>> been compromised in this manner?
>>>>>>>
>>>>>>> You might wonder how such a circumstance could come about. I suggest
>>>>>>> that naively downloading and installing appropriate software would
>>>>>>> be a possible route. Most computer users have no idea what actually
>>>>>>> happens when they install software onto their machines.
>>>>>>
>>>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>>>
>>>>> EXCELLENT - I will study later. Thank you.
>>>>>
>>>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar
>>>>> with Knock Knock?
>>>>
>>>> No. You have a habit of asking questions where you have little chance of
>>>> understanding the answers. You asked something general and I answered
>>>> something specific, that is a 'surreptitiously installed' VM (like a
>>>> full featured rootkit type of malware) could be detectable, in some
>>>> cases, by software. My linked answer was about how malware can detect
>>>> malware analyst's VMs from within said VMs.
>>>
>>> OK - Details here:- https://objective-see.com/products/knockknock.html
>>
>> Oh but Macs don't get viruses. That's what I remember being told....
>
> Sadly, I don't believe that is true. However, Apple does appear to
> 'monitor' ALL Apple computers connected to the Internet and can control
> ALL of them whenever urgent action is required - that my belief anyway.

And you don't see that as a problem?!? Your own property can be controlled by a company? Oh god....

Re: How to identify a Virtual Machine image.

<060220221859538611%nospam@nospam.invalid>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5946&group=uk.comp.sys.mac#5946

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nos...@nospam.invalid (nospam)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 06 Feb 2022 18:59:53 -0500
Organization: A noiseless patient Spider
Lines: 20
Message-ID: <060220221859538611%nospam@nospam.invalid>
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1> <060220221800536189%nospam@nospam.invalid> <2CYLJ.25159$fIV5.11079@fx12.ams1>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="22e9f4a30e440625a8fb26be46de35e8";
logging-data="5300"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/4fCtcl4bODZlmsKTgEJ6L"
User-Agent: Thoth/1.9.0 (Mac OS X)
Cancel-Lock: sha1:Kg9bnz8GTVAcioSpJSMLewWwHxw=
 by: nospam - Sun, 6 Feb 2022 23:59 UTC

In article <2CYLJ.25159$fIV5.11079@fx12.ams1>, David Brooks
<Davidb_tj@{REMOVESPAM}me.com> wrote:

>
>
> THIS was installed by Apple recently with *NO* input from me:-

false. it was due to input from you.

> XProtectPlistConfigData:
>
> Version: 2155
> Source: Apple
> Install Date: 04/02/2022, 14:30
>
> ==========================================
>
> Explain

the reason is simple: you're stupid.

Re: How to identify a Virtual Machine image.

<060220221859558688%nospam@nospam.invalid>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5947&group=uk.comp.sys.mac#5947

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nos...@nospam.invalid (nospam)
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
Subject: Re: How to identify a Virtual Machine image.
Date: Sun, 06 Feb 2022 18:59:55 -0500
Organization: A noiseless patient Spider
Lines: 11
Message-ID: <060220221859558688%nospam@nospam.invalid>
References: <op.1gzldqlemvhs6z@ryzen.lan> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1> <op.1g60t4r1mvhs6z@ryzen.lan>
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="22e9f4a30e440625a8fb26be46de35e8";
logging-data="5300"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19ifKtIaxKmpZ4DrMJys+md"
User-Agent: Thoth/1.9.0 (Mac OS X)
Cancel-Lock: sha1:eSZiHra/BRGQgOYIitaB98lfcUU=
 by: nospam - Sun, 6 Feb 2022 23:59 UTC

In article <op.1g60t4r1mvhs6z@ryzen.lan>, Commander Kinsey
<CK1@nospam.com> wrote:

> >
> > Sadly, I don't believe that is true. However, Apple does appear to
> > 'monitor' ALL Apple computers connected to the Internet and can control
> > ALL of them whenever urgent action is required - that my belief anyway.
>
> And you don't see that as a problem?!? Your own property can be controlled by a company? Oh god....

it's bullshit.

Re: How to identify a Virtual Machine image.

<0001HW.27B0CC4002F5E079700000A4C38F@news.supernews.com>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5948&group=uk.comp.sys.mac#5948

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 06 Feb 2022 21:40:48 -0600
Date: Sun, 06 Feb 2022 22:40:48 -0500
From: akwolf...@zoho.com (Wolffan)
Organization: The Pack
Mime-Version: 1.0
User-Agent: Hogwasher/5.24
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Message-ID: <0001HW.27B0CC4002F5E079700000A4C38F@news.supernews.com>
Subject: Re: How to identify a Virtual Machine image.
Newsgroups: alt.computer.workshop, uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1> <060220221800536189%nospam@nospam.invalid> <2CYLJ.25159$fIV5.11079@fx12.ams1>
Lines: 30
X-Trace: sv3-XivJAV5GUCQEJma8PESo5EB6e54nFnEEKn30TOcAZ7Y1IuL240o9m+rNh7Aw6ScYkzMrrZAxW0OwD0x!wW8ym7cfUe1ubf98DQb/waug1PeI2qNdfZxEAmQorvaADtDRQmlD/iTXafGaX/iUu3uzXtYR1jDs!813CrsTbQCrL3WIJD25XjFUX
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 2728
 by: Wolffan - Mon, 7 Feb 2022 03:40 UTC

On 2022 Feb 06, David Brooks wrote
(in article <2CYLJ.25159$fIV5.11079@fx12.ams1>):

> On 06/02/2022 23:00, nospam wrote:
> > In article<YnYLJ.38735$sga6.36975@fx10.ams1>, David Brooks
> > <Davidb_tj@{REMOVESPAM}me.com> wrote:
> >
> > > However, Apple does appear to
> > > 'monitor' ALL Apple computers connected to the Internet and can control
> > > ALL of them whenever urgent action is required - that my belief anyway.
> >
> > tin foil, aisle 4.
> >
> > you must also believe the earth is flat and the moon landing was faked.
>
> THIS was installed by Apple recently with *NO* input from me:-
>
> XProtectPlistConfigData:
>
> Version: 2155
> Source: Apple
> Install Date: 04/02/2022, 14:30
>
> ==========================================
>
> Explain

it’sa security update. you had to install it from softwre update. you’re
an idiot.

Re: How to identify a Virtual Machine image.

<0001HW.27B0CD1502F61237700000A4C38F@news.supernews.com>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5949&group=uk.comp.sys.mac#5949

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 06 Feb 2022 21:44:20 -0600
Date: Sun, 06 Feb 2022 22:44:21 -0500
From: akwolf...@zoho.com (Wolffan)
Organization: The Pack
Mime-Version: 1.0
User-Agent: Hogwasher/5.24
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Message-ID: <0001HW.27B0CD1502F61237700000A4C38F@news.supernews.com>
Subject: Re: How to identify a Virtual Machine image.
Newsgroups: alt.computer.workshop, uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net> <6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan> <QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com> <9mqLJ.166371$_5r7.75311@fx09.ams1> <j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com> <0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me> <eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me> <I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan> <YnYLJ.38735$sga6.36975@fx10.ams1> <op.1g60t4r1mvhs6z@ryzen.lan>
Lines: 120
X-Trace: sv3-C2KqwDDM84gwenLJ6NSXNyrryvbtiIWsTNZyQ9ffa3fMUivulH08TIxvFk/Q/zdeIC5j8y5j1bsbOpd!jbNPKAUxwf2LXdAd7V1+iaVlvf2GZ/aNLp6ojen8waSiTK6Zh4cPQ6g1BCOP+dB8VO4aQ8Z7hOkc!YxWJTpIydCzp/zIY/+9jTMYL
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 7818
 by: Wolffan - Mon, 7 Feb 2022 03:44 UTC

On 2022 Feb 06, Commander Kinsey wrote
(in article <op.1g60t4r1mvhs6z@ryzen.lan>):

> On Sun, 06 Feb 2022 22:58:00 -0000, wrote:
>
> > On 06/02/2022 21:28, Commander Kinsey wrote:
> > > On Sun, 06 Feb 2022 20:24:08 -0000, wrote:
> > >
> > > > On 06/02/2022 12:46, FromTheRafters wrote:
> > > > > David Brooks wrote on 2/6/2022 :
> > > > > > On 06/02/2022 08:59, FromTheRafters wrote:
> > > > > > > on 2/6/2022, David Brooks supposed :
> > > > > > > > On 05/02/2022 19:42, Kelly Phillips wrote:
> > > > > > > > > On Sat, 5 Feb 2022 08:15:00 +0000, David Brooks
> > > > > > > > > <Davidb_tj@{REMOVESPAM}me.com> wrote:
> > > > > > > > >
> > > > > > > > > > On 05/02/2022 06:17, Kelly Phillips wrote:
> > > > > > > > > > > On Fri, 4 Feb 2022 22:20:31 +0000, David Brooks
> > > > > > > > > > > <Davidb_tj@{REMOVESPAM}me.com> wrote:
> > > > > > > > > > >
> > > > > > > > > > > > When one looks at an image on a screen, how can one tell that
> > > > > > > > > > > > it's being
> > > > > > > > > > > > shown by the REAL operating system ...... or being displayed on a
> > > > > > > > > > > > VIRTUAL machine screen?
> > > > > > > > > > >
> > > > > > > > > > > If "one" is not an idiot, then it's entirely straightforward and
> > > > > > > > > > > obvious. However, if "one" is an idiot, then all bets are off.
> > > > > > > > > >
> > > > > > > > > > [....]
> > > > > > > > > >
> > > > > > > > > > So, let's be clear.
> > > > > > > > > >
> > > > > > > > > > YOU claim "it's entirely straightforward and
> > > > > > > > > > obvious" yet you cannot describe HOW.
> > > > > > > > > >
> > > > > > > > > > Is that right?
> > > > > > > > >
> > > > > > > > > No, and it's obvious that snit is pulling your strings.
> > > > > > > >
> > > > > > > > This has absolutely nothing to do with Snit.
> > > > > > > >
> > > > > > > > > A VM host is an application. You know when you're running it. Inside
> > > > > > > > > that application, a guest OS (VM) is another application. You know
> > > > > > > > > when
> > > > > > > > > you're running it. I see no possibility for confusion, but to be
> > > > > > > > > fair,
> > > > > > > > > I'm not the idiot computer user that you are.
> > > > > > > > >
> > > > > > > > > Don't take my word for it, though. VMware, the obvious leader in
> > > > > > > > > that
> > > > > > > > > space, has a free version of VMware Fusion that you can download and
> > > > > > > > > install on your ??-inch iMac. Fusion is your VM host application.
> > > > > > > > > Run
> > > > > > > > > that and use its capabilities to install one or more VM guests. Now
> > > > > > > > > run
> > > > > > > > > your guest. Do you see any scenario where you wouldn't be able to
> > > > > > > > > tell
> > > > > > > > > the difference between your VM guest and your host OS? I think not,
> > > > > > > > > but
> > > > > > > > > every time I think I've found the basement of your technical
> > > > > > > > > skills, you
> > > > > > > > > surprise me by digging another level down.
> > > > > > > >
> > > > > > > > Interesting, but VMWare is not available from my Apple App Store.
> > > > > > > > https://ibb.co/n7MdLF1
> > > > > > > >
> > > > > > > > What I'm getting at is that it was once suggested to me that it is
> > > > > > > > possible for a VM to be installed on a computer WITHOUT the
> > > > > > > > knowledge of the user AND without a hacker having physical access to
> > > > > > > > the machine itself.
> > > > > > > >
> > > > > > > > Once done, the 'BotMaster' could subsequently control what the user
> > > > > > > > of the computer is shown on his/her screen.
> > > > > > > >
> > > > > > > > Snit appears to agree with me that it might be impossible for the
> > > > > > > > computer user to actually KNOW whether of not they are viewing true
> > > > > > > > or false information.
> > > > > > > >
> > > > > > > > Does that help you to understand?
> > > > > > > >
> > > > > > > > Do you know HOW one could ascertain whether or not a computer had
> > > > > > > > been compromised in this manner?
> > > > > > > >
> > > > > > > > You might wonder how such a circumstance could come about. I suggest
> > > > > > > > that naively downloading and installing appropriate software would
> > > > > > > > be a possible route. Most computer users have no idea what actually
> > > > > > > > happens when they install software onto their machines.
> > > > > > >
> > > > > > > https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
> > > > > >
> > > > > > EXCELLENT - I will study later. Thank you.
> > > > > >
> > > > > > Have YOU any suggestion of HOW I can check my iMac? Are you familiar
> > > > > > with Knock Knock?
> > > > >
> > > > > No. You have a habit of asking questions where you have little chance of
> > > > > understanding the answers. You asked something general and I answered
> > > > > something specific, that is a 'surreptitiously installed' VM (like a
> > > > > full featured rootkit type of malware) could be detectable, in some
> > > > > cases, by software. My linked answer was about how malware can detect
> > > > > malware analyst's VMs from within said VMs.
> > > >
> > > > OK - Details here:- https://objective-see.com/products/knockknock.html
> > >
> > > Oh but Macs don't get viruses. That's what I remember being told....
> >
> > Sadly, I don't believe that is true. However, Apple does appear to
> > 'monitor' ALL Apple computers connected to the Internet and can control
> > ALL of them whenever urgent action is required - that my belief anyway.
>
> And you don't see that as a problem?!? Your own property can be controlled by
> a company? Oh god....

it’dbe a problem if it were true. as he’s incredibly stupid and is, as
usual, utterly wrong, it’s not a problem.

Apple does not, and cannot possibly, monitor all Apple computers connected to
the internet. Only massively paranoid idiots would think that Apple could or
would do any such thing. Oh. Wait. Our David is a massively paranoid idiot.

Re: How to identify a Virtual Machine image.

<tv6dnaisU-ZpA53_nZ2dnUU7-L3NnZ2d@supernews.com>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5950&group=uk.comp.sys.mac#5950

  copy link   Newsgroups: uk.comp.sys.mac alt.computer.workshop
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!buffer1.nntp.dca1.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sun, 06 Feb 2022 22:24:20 -0600
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:O309nFECNS/s0WOhB/SdHgufosY=
Newsgroups: uk.comp.sys.mac,alt.computer.workshop
Subject: Re: How to identify a Virtual Machine image.
Content-Type: text/plain; charset=UTF-8
Mime-Version: 1.0
Content-Transfer-Encoding: 8bit
From: non...@none.none (Bob Campbell)
References: <op.1gzldqlemvhs6z@ryzen.lan>
<j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan>
<j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad>
<j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan>
<j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com>
<op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1>
<cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1>
<sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1>
<stofv9$7gc$1@dont-email.me>
<I7WLJ.14707$TXc5.3565@fx14.ams1>
<op.1g6tw2bomvhs6z@ryzen.lan>
<YnYLJ.38735$sga6.36975@fx10.ams1>
<060220221800536189%nospam@nospam.invalid>
<2CYLJ.25159$fIV5.11079@fx12.ams1>
Message-ID: <tv6dnaisU-ZpA53_nZ2dnUU7-L3NnZ2d@supernews.com>
Date: Sun, 06 Feb 2022 22:24:20 -0600
Lines: 30
X-Trace: sv3-UEFsYyZZzDQbhQfTfgCKWhiHqPBbxqaGHPKonTKTyGYCnhwFRzA9mVt4Um27Ngw1RKn0PTVPcd8x22Z!jRoZYyT2r945ug3gW3rxnf2ufAg0t9CLAPc4G60MBicBD4fMVhceCGWuB5Vkt65DCQluAqJ2TP/X!j1RFIgqGLA==
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 2789
 by: Bob Campbell - Mon, 7 Feb 2022 04:24 UTC

David Brooks <Davidb_tj@{REMOVESPAM}me.com> wrote:
> On 06/02/2022 23:00, nospam wrote:
>> In article <YnYLJ.38735$sga6.36975@fx10.ams1>, David Brooks
>> <Davidb_tj@{REMOVESPAM}me.com> wrote:
>>
>>> However, Apple does appear to
>>> 'monitor' ALL Apple computers connected to the Internet and can control
>>> ALL of them whenever urgent action is required - that my belief anyway.
>>
>> tin foil, aisle 4.
>>
>> you must also believe the earth is flat and the moon landing was faked.
>
>
> THIS was installed by Apple recently with *NO* input from me:-
>
> XProtectPlistConfigData:
>
> Version: 2155
> Source: Apple
> Install Date: 04/02/2022, 14:30
>
> ==========================================
>
> Explain
>

Do you ever get tired of being massively stupid? Why aren’t you ashamed
and embarrassed by posting such absurd drivel?

Re: How to identify a Virtual Machine image.

<nV5MJ.59198$HbQ4.7711@fx02.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5952&group=uk.comp.sys.mac#5952

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac alt.comp.freeware
Path: i2pn2.org!i2pn.org!news.uzoreto.com!newsfeed.xs4all.nl!newsfeed7.news.xs4all.nl!feeder1.feed.usenet.farm!feed.usenet.farm!peer03.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx02.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac,alt.comp.freeware
References: <op.1gzldqlemvhs6z@ryzen.lan> <j60oqeF743jU1@mid.individual.net>
<op.1gzrib17mvhs6z@ryzen.lan> <j60s5kF7mgiU1@mid.individual.net>
<cdTKJ.9118$t2Bb.5492@fx98.iad> <j62fu5Fh6btU1@mid.individual.net>
<op.1g1eq0l8mvhs6z@ryzen.lan> <j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<stopdo$ub7$2@fretwizzer.eternal-september.org>
<XMSLJ.10927$EjU2.10622@fx07.ams1>
<stov43$9sp$1@fretwizzer.eternal-september.org>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <stov43$9sp$1@fretwizzer.eternal-september.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 95
Message-ID: <nV5MJ.59198$HbQ4.7711@fx02.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Mon, 07 Feb 2022 09:48:03 UTC
Organization: blocknews - www.blocknews.net
Date: Mon, 7 Feb 2022 09:48:03 +0000
X-Received-Bytes: 5588
 by: David Brooks - Mon, 7 Feb 2022 09:48 UTC

On 06/02/2022 17:05, Steve Carroll wrote:
> On 2022-02-06, David Brooks <Davidb_tj@{REMOVESPAM}me.com> wrote:
>> On 06/02/2022 15:27, Steve Carroll wrote:
>>> On 2022-02-06, FromTheRafters <erratic@nomail.afraid.org> wrote:
>>>
>>> (snip)
>>>
>>>>>>> You might wonder how such a circumstance could come about. I suggest that
>>>>>>> naively downloading and installing appropriate software would be a
>>>>>>> possible route. Most computer users have no idea what actually happens
>>>>>>> when they install software onto their machines.
>>>>>>
>>>>>> https://publik.tuwien.ac.at/files/pub-inf_5317.pdf
>>>>>
>>>>> EXCELLENT - I will study later. Thank you.
>>>>>
>>>>> Have YOU any suggestion of HOW I can check my iMac? Are you familiar with
>>>>> Knock Knock?
>>>>
>>>> No. You have a habit of asking questions where you have little chance
>>>> of understanding the answers. You asked something general and I
>>>> answered something specific, that is a 'surreptitiously installed' VM
>>>> (like a full featured rootkit type of malware) could be detectable, in
>>>> some cases, by software. My linked answer was about how malware can
>>>> detect malware analyst's VMs from within said VMs.
>>>
>>> +1
>>
>> Just suppose, Steve, that you visited a website and downloaded some
>> software onto your Apple computer and then installed it.
>>
>> Assume, in doing so, you inadvertently installed a "rootkit type of
>> malware" onto your computer. If you were still able to use your computer
>> to achieve your chosen tasks, how would YOU ever detect that you were
>> hosting a spy within, as it were?
>
> I've been over this with you, if you recall, I even pointed out the
> malware (via npm) that went undetected by ClamX's engine. I've been far
> more 'affected' by YOUR paranoia ;)

I'm not sure that I DO recall .... and I was wondering hard about "npm"
- until this morning!

https://www.theregister.com/2022/02/03/npm_malware_report/

> I don't spend a lot of time thinking about 'what ifs', but were there a
> 'what if' I was as concerned about as you seem to be, I'd spend the time
> to learn about it, as opposed to asking the same questions over and over
> from the same groups of people. As I've pointed out in the past, there
> are means available for you to detect (and be alerted to) when something
> is being installed. Are they 'Snit-level' easy? No. Short of that, you
> can run a scan after every session where you've dl'd something. If
> you're that worried, the best solution is to never keep sensitive data
> on your computer.

Spend a little time explaining. Suppose someone visits the
www.clamXav.com website and is taken in by the fancy graphics and 'Free'
offer.

They choose to 'Download' the product. Once the Installer.pkg is shown
in 'Downloads' - HOW should they check it?

Assuming they use a 'tool' for the purpose, how would an average user
have any idea what each item actually does?

OK - they decide to install ClamXav anyway. If it (malware) is capable
of making itself invisible to another AV scanner (say Malwarebytes) HOW
would the user know that anything was amiss?

I have read the response here: MID <stpolt$k15$1@gioia.aioe.org>

Much as I would have liked to have learned the necessary skills to
examine a machine myself, life was/is too short. I agree with what
LegionX/Dustin Cook has said .....

"Once that machine is booted clean and someone goes looking who
knows what they are doing - you're going to get caught. And
removed. And studied. Then automated systems will hunt you down
with little to no user interaction required. Welcome to the real
world."

The trouble is ..... *nobody has done that*! (AFAIK)

Are YOU capable of doing that?

Just to be clear, I'm not bothered one iota for myself. I care about
gullible folk who may have no idea that they are being taken-in by
snake-oil.

HTH

--
David

Re: How to identify a Virtual Machine image.

<Eq6MJ.48230$hye7.4287@fx11.ams1>

  copy mid

https://www.novabbs.com/aus+uk/article-flat.php?id=5953&group=uk.comp.sys.mac#5953

  copy link   Newsgroups: alt.computer.workshop uk.comp.sys.mac
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!news-out.netnews.com!news.alt.net!fdc2.netnews.com!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!fx11.ams1.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
Gecko/20100101 Thunderbird/91.5.1
Subject: Re: How to identify a Virtual Machine image.
Content-Language: en-GB
Newsgroups: alt.computer.workshop,uk.comp.sys.mac
References: <op.1gzldqlemvhs6z@ryzen.lan> <op.1gzrib17mvhs6z@ryzen.lan>
<j60s5kF7mgiU1@mid.individual.net> <cdTKJ.9118$t2Bb.5492@fx98.iad>
<j62fu5Fh6btU1@mid.individual.net> <op.1g1eq0l8mvhs6z@ryzen.lan>
<j63a53Fm2bqU1@mid.individual.net>
<6n0pvg1gu5n4993n84s21f0i83fhktgmgd@4ax.com> <op.1g26ticzmvhs6z@ryzen.lan>
<QEhLJ.14806$5Ta3.832@fx05.ams1> <cc5svgt88il6n8cseja4gutknegm3as8ph@4ax.com>
<9mqLJ.166371$_5r7.75311@fx09.ams1>
<j2ktvghd1gqp2cjhtn9ce0r32p7a95dtn4@4ax.com>
<0KLLJ.14705$TXc5.8652@fx14.ams1> <sto2lv$8if$1@dont-email.me>
<eJNLJ.38712$sga6.25324@fx10.ams1> <stofv9$7gc$1@dont-email.me>
<I7WLJ.14707$TXc5.3565@fx14.ams1> <op.1g6tw2bomvhs6z@ryzen.lan>
<YnYLJ.38735$sga6.36975@fx10.ams1> <op.1g60t4r1mvhs6z@ryzen.lan>
<060220221859558688%nospam@nospam.invalid>
From: Davidb...@{REMOVESPAM}me.com (David Brooks)
In-Reply-To: <060220221859558688%nospam@nospam.invalid>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 20
Message-ID: <Eq6MJ.48230$hye7.4287@fx11.ams1>
X-Complaints-To: abuse@blocknews.net
NNTP-Posting-Date: Mon, 07 Feb 2022 10:23:32 UTC
Organization: blocknews - www.blocknews.net
Date: Mon, 7 Feb 2022 10:23:31 +0000
X-Received-Bytes: 2159
 by: David Brooks - Mon, 7 Feb 2022 10:23 UTC

On 06/02/2022 23:59, nospam wrote:
> In article <op.1g60t4r1mvhs6z@ryzen.lan>, Commander Kinsey
> <CK1@nospam.com> wrote:
>
>>>
>>> Sadly, I don't believe that is true. However, Apple does appear to
>>> 'monitor' ALL Apple computers connected to the Internet and can control
>>> ALL of them whenever urgent action is required - that my belief anyway.
>>
>> And you don't see that as a problem?!? Your own property can be controlled by a company? Oh god....
>
> it's bullshit.

It's true.

Like the majority of users, I'm sure, all I have done is tick the boxes,
as shown here:-

https://ibb.co/Zd7fdVy

Pages:12345678910111213141516171819202122
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor