Win / Conspiracies
Conspiracies
Communities Topics Log In Sign Up
Sign In
Hot
All Posts
Settings
All
Profile
Saved
Upvoted
Hidden
Messages

Your Communities

General
AskWin
Funny
Technology
Animals
Sports
Gaming
DIY
Health
Positive
Privacy
News
Changelogs

More Communities

frenworld
OhTwitter
MillionDollarExtreme
NoNewNormal
Ladies
Conspiracies
GreatAwakening
IP2Always
GameDev
ParallelSociety
Privacy Policy
Terms of Service
Content Policy
DEFAULT COMMUNITIES • All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Conspiracies Conspiracy Theories & Facts
hot new rising top

Sign In or Create an Account

24
posted 1 year ago by NumbaZero 1 year ago by NumbaZero +25 / -1
54 comments share
54 comments share save hide report block hide replies
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (54)
sorted by:
▲ 1 ▼
– SomniaVelociusQuam 1 point 1 year ago +2 / -1

Anti-virus software works by having a database of known malicious code to reference against, if it's not known it's not defended against.

permalink parent save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 1 year ago +1 / -0

It is a very old file. I don't think any PDF Zero-days remain that way for a decade.

permalink parent save report block reply
▲ 1 ▼
– SomniaVelociusQuam 1 point 1 year ago +2 / -1

It doesn't matter what you think, I'm telling you the truth you can research it for yourself if you like.

permalink parent save report block reply
▲ 1 ▼
– SuicideTruthbomber 1 point 1 year ago +1 / -0

I just did some research. If you would like to download Python tools to detech Javascript and embedded objects in a PDF, you can do it.

If you have some other meaning for malcious, like malicious ideas or an ulterior, then you should tell us.

permalink parent save report block reply
▲ 1 ▼
– SomniaVelociusQuam 1 point 1 year ago +1 / -0

I'm well aware that pdfs can be weaponized that's why I said malicious. edit: I don't believe such a thing as malicious information exists, what someone does with the information may be malicious but the information itself is just information

permalink parent save report block reply

GIFs

Conspiracies Wiki & Links

Conspiracies Book List

External Digital Book Libraries

Mod Logs

Honor Roll

Conspiracies.win: This is a forum for free thinking and for discussing issues which have captured your imagination. Please respect other views and opinions, and keep an open mind. Our goal is to create a fairer and more transparent world for a better future.

Community Rules: <click this link for a detailed explanation of the rules

Rule 1: Be respectful. Attack the argument, not the person.

Rule 2: Don't abuse the report function.

Rule 3: No excessive, unnecessary and/or bullying "meta" posts.

To prevent SPAM, posts from accounts younger than 4 days old, and/or with <50 points, wont appear in the feed until approved by a mod.

Disclaimer: Submissions/comments of exceptionally low quality, trolling, stalking, spam, and those submissions/comments determined to be intentionally misleading, calls to violence and/or abuse of other users here, may all be removed at moderator's discretion.

Moderators

  • Doggos
  • axolotl_peyotl
  • trinadin
  • PutinLovesCats
  • clemaneuverers
  • C
Message the Moderators

Terms of Service | Privacy Policy

2025.03.01 - nxltw (status)

Copyright © 2024.

Terms of Service | Privacy Policy