<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Daemonf</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Daemonf"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Daemonf"/>
		<updated>2026-04-19T16:07:17Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45899</id>
		<title>Talk:1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45899"/>
				<updated>2013-08-05T23:09:25Z</updated>
		
		<summary type="html">&lt;p&gt;Daemonf: Formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LNK and ZDA...Link and Zelda? [[Special:Contributions/76.64.65.200|76.64.65.200]] 13:43, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
http://www.ip-tracker.org/locator/ip-lookup.php?ip=65.222.202.53, some place in the USA. Looks random, but still...&lt;br /&gt;
&lt;br /&gt;
The IP address 65.222.202.53 geolocates to a Starbucks just outside the beltway in Washington. DC.&lt;br /&gt;
&lt;br /&gt;
Someone mentioned you see the word Hackers as well as a pirated movie... In fact the pirated movie is the 1995 movie named Hackers. Edited it to make the reference clear.{{unsigned|Sonofaresiii}}&lt;br /&gt;
&lt;br /&gt;
I am missing DMG or other &amp;quot;Mac&amp;quot; suspect executable{{unsigned|145.64.134.242}}&lt;br /&gt;
&lt;br /&gt;
WRBT.OBJ.O.H WhiteRabbit.obj from Jurassic Park. Not sure about the O.H [[User:Andym|Andym]] ([[User talk:Andym|talk]]) 14:56, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fixed .O.H - these are file extensions with C compilers and C headers, respectively.[[User:blackhatm|BlackHatm]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.tar.gz stands for tarred and gzipped (archive) files; here .co. was introduced to make it look like a domain name&lt;br /&gt;
.obj can also be a http://en.wikipedia.org/wiki/Relocatable_Object_Module_Format&lt;br /&gt;
cia-bin is a play on cgi-bin   Sebastian --[[Special:Contributions/178.26.118.249|178.26.118.249]] 15:06, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
After the reference to the FBI in the (currently) final paragraph I was thinking of adding something like the following:&lt;br /&gt;
:This would also 'explain' the initial directory structure of &amp;quot;/PUB/CIA-BIN/ETC&amp;quot;, something like an FTP /pub/ directory for publicly open files, and conflating the CIA with /cgi-bin/ as a somewhat common location for {{w|Common Gateway Interface|dynamic web-pages}}, then /etc/ which is another Linux/Unix directory reference, strangely stored underneath a doubley-referenced 'tilde' directory, what with ~foo as the root directory generally redirecting to the home directory for user &amp;quot;foo&amp;quot;.  These are all usually lower-case (and case-sensitive), but if the INIT.DLL has anthing to do with it it might mean it's an uppercase-dominated and yet actually case-insensitive Windows-based system, with that Windows Dynamically Linked Library as a dynamic responder.&lt;br /&gt;
...but I've rushed that and it looks messy/may have errors in it, so feel free to clean it up if it inspires you.  Or not... [[Special:Contributions/178.98.215.19|178.98.215.19]] 16:34, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think [SCR] actually refers to a screener.{{unsigned|83.160.118.125}}&lt;br /&gt;
&lt;br /&gt;
&amp;gt; Agreed. The capitalization and brackets are the standard formatting in pirated movie titles, and before a movie release, Screeners (much better quality than theater cams) are excellent bait on fake downloads. Updated in the wiki. [[User:Daemonf|Daemonf]] ([[User talk:Daemonf|talk]]) 23:09, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Of course, if the user is on Windows, the only extension that matters is the last one which is &amp;quot;.exe&amp;quot; - an executable. [[User:Hax|Hax]] ([[User talk:Hax|talk]]) 16:43, 5 August 2013 (UTC)&lt;/div&gt;</summary>
		<author><name>Daemonf</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45898</id>
		<title>Talk:1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45898"/>
				<updated>2013-08-05T23:08:24Z</updated>
		
		<summary type="html">&lt;p&gt;Daemonf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LNK and ZDA...Link and Zelda? [[Special:Contributions/76.64.65.200|76.64.65.200]] 13:43, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
http://www.ip-tracker.org/locator/ip-lookup.php?ip=65.222.202.53, some place in the USA. Looks random, but still...&lt;br /&gt;
&lt;br /&gt;
The IP address 65.222.202.53 geolocates to a Starbucks just outside the beltway in Washington. DC.&lt;br /&gt;
&lt;br /&gt;
Someone mentioned you see the word Hackers as well as a pirated movie... In fact the pirated movie is the 1995 movie named Hackers. Edited it to make the reference clear.{{unsigned|Sonofaresiii}}&lt;br /&gt;
&lt;br /&gt;
I am missing DMG or other &amp;quot;Mac&amp;quot; suspect executable{{unsigned|145.64.134.242}}&lt;br /&gt;
&lt;br /&gt;
WRBT.OBJ.O.H WhiteRabbit.obj from Jurassic Park. Not sure about the O.H [[User:Andym|Andym]] ([[User talk:Andym|talk]]) 14:56, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fixed .O.H - these are file extensions with C compilers and C headers, respectively.[[User:blackhatm|BlackHatm]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.tar.gz stands for tarred and gzipped (archive) files; here .co. was introduced to make it look like a domain name&lt;br /&gt;
.obj can also be a http://en.wikipedia.org/wiki/Relocatable_Object_Module_Format&lt;br /&gt;
cia-bin is a play on cgi-bin   Sebastian --[[Special:Contributions/178.26.118.249|178.26.118.249]] 15:06, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
After the reference to the FBI in the (currently) final paragraph I was thinking of adding something like the following:&lt;br /&gt;
:This would also 'explain' the initial directory structure of &amp;quot;/PUB/CIA-BIN/ETC&amp;quot;, something like an FTP /pub/ directory for publicly open files, and conflating the CIA with /cgi-bin/ as a somewhat common location for {{w|Common Gateway Interface|dynamic web-pages}}, then /etc/ which is another Linux/Unix directory reference, strangely stored underneath a doubley-referenced 'tilde' directory, what with ~foo as the root directory generally redirecting to the home directory for user &amp;quot;foo&amp;quot;.  These are all usually lower-case (and case-sensitive), but if the INIT.DLL has anthing to do with it it might mean it's an uppercase-dominated and yet actually case-insensitive Windows-based system, with that Windows Dynamically Linked Library as a dynamic responder.&lt;br /&gt;
...but I've rushed that and it looks messy/may have errors in it, so feel free to clean it up if it inspires you.  Or not... [[Special:Contributions/178.98.215.19|178.98.215.19]] 16:34, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think [SCR] actually refers to a screener.{{unsigned|83.160.118.125}}&lt;br /&gt;
&amp;gt; Agreed. The capitalization and brackets are the standard formatting in pirated movie titles, and before a movie release, Screeners (much better quality than theater cams) are excellent bait on fake downloads. Updated in the wiki.&lt;br /&gt;
&lt;br /&gt;
Of course, if the user is on Windows, the only extension that matters is the last one which is &amp;quot;.exe&amp;quot; - an executable. [[User:Hax|Hax]] ([[User talk:Hax|talk]]) 16:43, 5 August 2013 (UTC)&lt;/div&gt;</summary>
		<author><name>Daemonf</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45897</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45897"/>
				<updated>2013-08-05T23:03:56Z</updated>
		
		<summary type="html">&lt;p&gt;Daemonf: Due to the brackets and capitalization, it is much more likely that [SCR] refers to a pirated screener dvd than a windows screensaver.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogue shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53] with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, {{w|Hackers (film)|Hackers}}, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious.&lt;br /&gt;
&lt;br /&gt;
The {{w|URL}} contains the path &amp;quot;~tilde/pub/cia-bin/etc&amp;quot;. The first part is a public folder of an user named tilde, &amp;quot;cgi-bin&amp;quot; is a common folder on a Web-Server for server side executables ([[Randall]] jokes with the name), and &amp;quot;etc&amp;quot; is a standard folder for configuration files. The program &amp;quot;init.dll&amp;quot; isn't executable at all, it's a {{w|Windows Dynamic Link Library}} which can't be run standalone. The question mark indicates the start of a parameter list, in this case we have only one named &amp;quot;FILE&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Save&amp;quot; button is disabled, you still only can click the &amp;quot;Cancel&amp;quot; button. Maybe this will be different on a secure https connection.&lt;br /&gt;
&lt;br /&gt;
The content of the parameter is shown here: &lt;br /&gt;
* {{w|AUTOEXEC.BAT}} - a file which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the {{w|OSX}} operating system ({{w|URL_encoding#Character_data|%20}} is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical {{w|Installer#Installer|installer}}&lt;br /&gt;
* {{w|RAR}} - a compressed archive file type&lt;br /&gt;
* {{w|INI_file|INI}} - a configuration file type&lt;br /&gt;
* {{w|Tar_(computing)|TAR}} - a file archive popular in UNIX and UNIX-like operating systems. TAR has been mentioned [[1168:_tar|before]].&lt;br /&gt;
* DOÇX - {{w|docx}} is an Office Open XML file, i.e. a word processing format used by Microsoft Word 2007 and above, but has no cedilla (¸)&lt;br /&gt;
* PHPHPHP - a play on {{w|PHP}} files, a kind of server-based web page file type. PHP is a recursive abbreviation (&amp;quot;PHP: Hypertext Preprocessor&amp;quot;)&lt;br /&gt;
* {{w|XHTML}} - another web page file type&lt;br /&gt;
* TML - stands for Transducer Markup Language, an XML based markup language that specifies how to capture, time-tag and describe sensor data&lt;br /&gt;
* XTL - another play on {{w|XHTML}}?&lt;br /&gt;
* TXXT - a play on {{w|Text_file|TXT}} file types&lt;br /&gt;
* 0DAY - a reference to a {{w|zero-day exploit}}&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* {{w|EXE}} - an executable file type used by Microsoft Windows&lt;br /&gt;
* [SCR] - a tag used by movie pirates to denote a 'Screener', the DVD copy of films given to critics prior to theater relase. Usually the highest quality available at this time, rare, and therefor good bait for a virus laden download&lt;br /&gt;
* {{w|Lisp (programming language)|LISP}} - programming language&lt;br /&gt;
* {{w|Windows_Installer|MSI}} - an installation file used by Microsoft Installer&lt;br /&gt;
* {{w|.lnk|LNK}} - an extension used by Microsoft Windows for shortcuts. The extension is normally hidden to the user.&lt;br /&gt;
* LNK, ZDA, GNN - references to {{w|Link_(The_Legend_of_Zelda)|Link}}, {{w|Princess_Zelda|Zelda}}, and {{w|Ganon|Ganon}}, important characters from {{w|The_Legend_of_Zelda|The Legend of Zelda}} video game franchise&lt;br /&gt;
* {{w|White_Rabbit#Television_and_films|WRBT OBJ}} - A reference to the line of code Dennis Nedry used in {{w|Jurassic Park (film)|Jurassic Park}} to shut down key systems&lt;br /&gt;
* {{w|Object_file|O}} - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* {{w|Header_file|H}} - The file extension of a header file in C code.&lt;br /&gt;
* {{w|SWF}} - Shockwave Flash file type&lt;br /&gt;
* {{w|Dpkg|DPKG}} - The Debian package management, although the package files use the file suffix &amp;quot;.deb&amp;quot;&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* {{w|ZIP_%28file_format%29|ZIP}} - compressed archive file type&lt;br /&gt;
* CO - looks like a {{w|List_of_Internet_top-level_domains|top-level domain}}. Many countries use .co.''tld'' in front of their main TLD, e.g. ''.co.uk''. ''.co.gz'' doesn't exist.&lt;br /&gt;
* {{w|Gzip|GZ}} - a compressed file using GNU zip&lt;br /&gt;
* {{w|A.out|A.OUT}} - Default filename when creating an executable on Linux or other UNIX-like operating systems if none was specified for the compiler.&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. Changing &amp;quot;http&amp;quot; to &amp;quot;https&amp;quot; is a common suggestion to improve security when browsing the web from an insecure network (such as a public wifi hotspot) to avoid surveillance or hijacking to a malicious website; Google automatically switches to https for all mail accounts and is starting to do so with searches. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=__AUTOEXEC.BAT.MY%20OSX%20DOCUMENTS-INSTALL.EXE.RAR.INI.TAR.DOÇX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS_(1995)_BLURAY_CAM-XVID.EXE.TAR.[SCR].LISP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.H.SWF.DPKG.APP.ZIP.TAR.TAR.CO.GZ.A.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Daemonf</name></author>	</entry>

	</feed>