Both exe and com files are executable files. The difference is that an exe is relocatable (can load ans run from different memory addresses, while a true com file must load at the memory adress as it was created. We used to say that com was a short for Copy Of Memory. Old memories coming back 😊
btw with very weird setup, .lnk files (windows shortcuts) can self contain .hta files, which can contain Visual Basic scripts, which can contain malware. So even if its not a .pif and it is a shortcut it can still contain malware
Yes most definately. Its a file that packs up an executable or exe equivelent and a shortcut into it.The shortcut referances the exe within itself and executes the previously modified exe. The shortcut could have any executable file within it and can be named any thing and can even impersonate another file type (dot as a comma and you miss it) never click on a blank cover without inspection.
Nice observation I didn't notice it. I didn't know the calculator he was referencing was a built in application. He is probably still righ though and decided to use a non-built in application or an application both computers dont have.
Well you shouldn't open any files even images from unverified sources as malware/spyware/ransomware can be stenographically hidden into these files by embedding code instead of insignificant pixels in a large image/video. Most antiviruses fail to detect these malicious scripts because ngl finding scripts embedded in a high resolution image or an hour long video is a pain in the arse. btw awesome video as always.
They still can infect your hard drive even when it's not mounted. But to make life easier for the viruses, almost every boot CD mounts the drives' partitions automatically.
Pls pin my comment 🤫
hm
this man will become famous one day mark my words
🤯
Why so? He knows nothing.
@@GoodWill-s8j what are you talking about ur name is GoodWIll broski
Both exe and com files are executable files. The difference is that an exe is relocatable (can load ans run from different memory addresses, while a true com file must load at the memory adress as it was created. We used to say that com was a short for Copy Of Memory. Old memories coming back 😊
At 4:13 you can see that windows handles PIF files the same way as EXE files. That explains why it is working
btw with very weird setup, .lnk files (windows shortcuts) can self contain .hta files, which can contain Visual Basic scripts, which can contain malware. So even if its not a .pif and it is a shortcut it can still contain malware
K, .bat files also can be.cmd
there's also powershell scripts
also I remember how Linus Media Group got hacked by a malformed PDF file or something
1:33 "why woman kill" XD
I feel like .pif is one of the worst here
Yes most definately. Its a file that packs up an executable or exe equivelent and a shortcut into it.The shortcut referances the exe within itself and executes the previously modified exe. The shortcut could have any executable file within it and can be named any thing and can even impersonate another file type (dot as a comma and you miss it) never click on a blank cover without inspection.
4:40 it still runs because the other computer have an calculator...
Nice observation I didn't notice it. I didn't know the calculator he was referencing was a built in application. He is probably still righ though and decided to use a non-built in application or an application both computers dont have.
Also .pif maybe .lnk eg shourtcut, shortcuts also don’t have visible file extensions
i cant wait to not use the .pif extension
🔥 keep up the good work
Well you shouldn't open any files even images from unverified sources as malware/spyware/ransomware can be stenographically hidden into these files by embedding code instead of insignificant pixels in a large image/video. Most antiviruses fail to detect these malicious scripts because ngl finding scripts embedded in a high resolution image or an hour long video is a pain in the arse.
btw awesome video as always.
New editing style!!! (Yippee)
yay
But honestly it may catch seizure due to its 3D rotation movement, maybe reduce the spinny movement in the video?
Part 2
try the piff file on linux see if it has metadata or something of the sort
Fire content (for real again) 🗣🗣🗣🗣🗣💥💥💯💯💯🔥🔥🔥🔥
So they are all exe from inside
I can open it with a debugger using a Knoppix Boot-CD. Nobody can hack a Boot-CD.
yet...................
Just make sure that your regular harddrive is not connected ^^
They still can infect your hard drive even when it's not mounted. But to make life easier for the viruses, almost every boot CD mounts the drives' partitions automatically.
@GoodWill-s8j There is no hard drive on the Knoppix-PC. Knoppix use a RAM drive only.
There are UEFI exploits. So yes, they could.
I didn't know about all that, just know about scr files. Good video.
Part 2 ❤
Underated as hell 😭 glad I discovered ur channel
Another fire video
awesome as always:)🔥🔥❤❤
Part 2 plz this is fun
i subscribed,REMEMBER ME!!!
epic video!!
17 seconds 🔥
Hi
❤❤❤❤❤
❤❤
early gang
🔥🫦