![]() Unless you know for sure that someone had hijacked the YouTube or Tumblr servers on the day you downloaded the files, you don't realistically need to worry about it getting infected by them. Typically it is only Windows that is vulnerable to the type of attacks used by malware that is contained in an image or video file, and it is because of the way Windows handles both security access and multimedia with a connected system.Īll in all your Mac should be fine if you move your older files to it. While this does not mean you should stop caring about keeping your computer safe (because it is still possible for a Mac to get infected), as long as you don't enter your password into random prompts saying a program you didn't launch wants to modify your system you should be fine. Unix is very secure, and generally hard to infect with malware. Which brings me to the second point.ī.) Macs run macOS, which is built on Unix. Though there is always technically the possibility that their severs could be hijacked, it is very unlikely that it happened during the specific time you were downloading files. Also seeing as both of these sites use HTTPS (Secure HyperText Transfer Protocol) it would not be possible for someone else to slip malware into either the file as you were downloading it or the page when you were connecting. As far as files from Tumblr go you can probably safely assume the majority of posters on Tumblr do not have the knowledge how, or a reason to inject malware into a picture they are posting. While it is possible for a downloader extension to infect that video file, it is quite unlikely for it to happen in practice. Owlswipe's comment is not correct in saying you cannot download files from YouTube, you can do so both through YouTube Red, as well as downloader extensions (which by the way are not illegal).Īll a YouTube downloader extension does is use a program (often times wget, or something similar) to make a copy of the video file that is referenced in the html for that video's page. A.) there is a question of whether or not the files themselves contain any malicious code, which is hypothetically possible, but not likely. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |