<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tarmakkkk</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tarmakkkk"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Tarmakkkk"/>
		<updated>2026-04-18T10:28:55Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45929</id>
		<title>Talk:1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45929"/>
				<updated>2013-08-06T12:01:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tarmakkkk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LNK and ZDA...Link and Zelda? [[Special:Contributions/76.64.65.200|76.64.65.200]] 13:43, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
http://www.ip-tracker.org/locator/ip-lookup.php?ip=65.222.202.53, some place in the USA. Looks random, but still... - Actually this IP hosted some javascript that exploited some FF17 weaknesses on Windows NT during the last LEA TOR raid.&lt;br /&gt;
&lt;br /&gt;
The IP address 65.222.202.53 geolocates to a Starbucks just outside the beltway in Washington. DC.&lt;br /&gt;
&lt;br /&gt;
Someone mentioned you see the word Hackers as well as a pirated movie... In fact the pirated movie is the 1995 movie named Hackers. Edited it to make the reference clear.{{unsigned|Sonofaresiii}}&lt;br /&gt;
&lt;br /&gt;
I am missing DMG or other &amp;quot;Mac&amp;quot; suspect executable{{unsigned|145.64.134.242}}&lt;br /&gt;
&lt;br /&gt;
WRBT.OBJ.O.H WhiteRabbit.obj from Jurassic Park. Not sure about the O.H [[User:Andym|Andym]] ([[User talk:Andym|talk]]) 14:56, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Fixed .O.H - these are file extensions with C compilers and C headers, respectively.[[User:blackhatm|BlackHatm]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.tar.gz stands for tarred and gzipped (archive) files; here .co. was introduced to make it look like a domain name&lt;br /&gt;
.obj can also be a http://en.wikipedia.org/wiki/Relocatable_Object_Module_Format&lt;br /&gt;
cia-bin is a play on cgi-bin   Sebastian --[[Special:Contributions/178.26.118.249|178.26.118.249]] 15:06, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
After the reference to the FBI in the (currently) final paragraph I was thinking of adding something like the following:&lt;br /&gt;
:This would also 'explain' the initial directory structure of &amp;quot;/PUB/CIA-BIN/ETC&amp;quot;, something like an FTP /pub/ directory for publicly open files, and conflating the CIA with /cgi-bin/ as a somewhat common location for {{w|Common Gateway Interface|dynamic web-pages}}, then /etc/ which is another Linux/Unix directory reference, strangely stored underneath a doubley-referenced 'tilde' directory, what with ~foo as the root directory generally redirecting to the home directory for user &amp;quot;foo&amp;quot;.  These are all usually lower-case (and case-sensitive), but if the INIT.DLL has anthing to do with it it might mean it's an uppercase-dominated and yet actually case-insensitive Windows-based system, with that Windows Dynamically Linked Library as a dynamic responder.&lt;br /&gt;
...but I've rushed that and it looks messy/may have errors in it, so feel free to clean it up if it inspires you.  Or not... [[Special:Contributions/178.98.215.19|178.98.215.19]] 16:34, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think [SCR] actually refers to a screener.{{unsigned|83.160.118.125}}&lt;br /&gt;
&lt;br /&gt;
&amp;gt; Agreed. The capitalization and brackets are the standard formatting in pirated movie titles, and before a movie release, Screeners (much better quality than theater cams) are excellent bait on fake downloads. Updated in the wiki. [[User:Daemonf|Daemonf]] ([[User talk:Daemonf|talk]]) 23:09, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
Of course, if the user is on Windows, the only extension that matters is the last one which is &amp;quot;.exe&amp;quot; - an executable. [[User:Hax|Hax]] ([[User talk:Hax|talk]]) 16:43, 5 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
I edited the line on the 'save' button being greyed out.  This doesn't change with HTTPS, but is instead a modern browser feature preventing a user from agreeing indiscriminately or with a mistaken click. I hope I didn't step on anybody's toes. [[Special:Contributions/72.29.184.195|72.29.184.195]] 00:12, 6 August 2013 (UTC)&lt;br /&gt;
:That's incorrect, the web server can identify if it's a secure connection or not and render the content of the page depending on this.--[[User:Dgbrt|Dgbrt]] ([[User talk:Dgbrt|talk]]) 06:48, 6 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
What is the joke?That the prescence of a huge number of extensions makes this file extremely suspicious?And the punch is that he is suggesting a secure connection to download this file?--[[Special:Contributions/117.194.199.185|117.194.199.185]] 01:24, 6 August 2013 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;...CO - looks like a top-level domain. Many countries use .co.tld in front of their main TLD, e.g. .co.uk....&amp;quot;  Aha!  I always thought co.uk meant &amp;quot;Cornwall, United Kingdom.&amp;quot;  And I couldn't figure out why all their domains were mediated through Cornwall.  Every day, I meet a new opportunity to feel clueless...{{unsigned|24.79.13.247}}&lt;/div&gt;</summary>
		<author><name>Tarmakkkk</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45928</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45928"/>
				<updated>2013-08-06T11:59:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tarmakkkk: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogue shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53], an IP adress that hosted javascript malware during a recent attack on the TOR anonymity network, with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, {{w|Hackers (film)|Hackers}}, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious.&lt;br /&gt;
&lt;br /&gt;
The {{w|URL}} contains the path &amp;quot;~tilde/pub/cia-bin/etc&amp;quot;. The first part is a public folder of a user named tilde (which is also the name for the ~ symbol), &amp;quot;cgi-bin&amp;quot; is a common folder on a Web-Server for server side executables ([[Randall]] jokes with the name), and &amp;quot;etc&amp;quot; is a standard folder for configuration files - normally never accessible through a webserver. The program &amp;quot;init.dll&amp;quot; isn't executable at all, it's a {{w|Windows Dynamic Link Library}} which can't be run standalone, and is rarely referenced in URLs (even though such syntax is still being employed, even on [https://www.google.com/search?q=site:edu+filetype:dll reputable websites]). The question mark indicates the start of a parameter list, in this case we have only one named &amp;quot;FILE&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Note that the username &amp;quot;tilde&amp;quot; is the name of the ~ symbol.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Save&amp;quot; button is disabled, you still only can click the &amp;quot;Cancel&amp;quot; button. Many browsers(Internet Explorer and Firefox) will leave &amp;quot;Save&amp;quot; greyed out for a small period of time to force you to review the prompt, and prevent accidentally clicking a download popped up without direct request, but usually only a couple of seconds.  The fact it is greyed out may indicate the user may still make a flash decision on this nearly indecipherable download.&lt;br /&gt;
&lt;br /&gt;
The content of the parameter is shown here: &lt;br /&gt;
* __ (underscore underscore) - used in the C programming language to denote that a symbol is really not for public consumption&lt;br /&gt;
* {{w|AUTOEXEC.BAT}} - a file which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the {{w|OSX}} operating system ({{w|URL_encoding#Character_data|%20}} is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical {{w|Installer#Installer|installer}}&lt;br /&gt;
* {{w|RAR}} - a compressed archive file type&lt;br /&gt;
* {{w|INI_file|INI}} - a configuration file type&lt;br /&gt;
* {{w|Tar_(computing)|TAR}} - a file archive popular in UNIX and UNIX-like operating systems. TAR has been mentioned [[1168:_tar|before]].&lt;br /&gt;
* DOÇX - {{w|docx}} is an Office Open XML file, i.e. a word processing format used by Microsoft Word 2007 and above, but has no cedilla (¸)&lt;br /&gt;
* PHPHPHP - a play on {{w|PHP}} files, a kind of server-based web page file type. PHP is a recursive abbreviation (&amp;quot;PHP: Hypertext Preprocessor&amp;quot;)&lt;br /&gt;
* {{w|XHTML}} - another web page file type&lt;br /&gt;
* TML - stands for Transducer Markup Language, an XML based markup language that specifies how to capture, time-tag and describe sensor data&lt;br /&gt;
* XTL - another play on {{w|XHTML}}?&lt;br /&gt;
* TXXT - a play on {{w|Text_file|TXT}} file types&lt;br /&gt;
* 0DAY - a reference to a {{w|zero-day exploit}}&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* {{w|EXE}} - an executable file type used by Microsoft Windows&lt;br /&gt;
* [SCR] - a tag used by movie pirates to denote a '{{w|Screener}}', the DVD copy of films given to critics prior to theater relase. Usually the highest quality available at this time, rare, and therefor good bait for a virus laden download. &amp;quot;{{w|.scr}}&amp;quot; is also the extension for screen saver files, realy just an exe file with a different extension and one of the classical ways to distribute infected files &lt;br /&gt;
* {{w|Lisp (programming language)|LISP}} - programming language&lt;br /&gt;
* {{w|Windows_Installer|MSI}} - an installation file used by Microsoft Installer&lt;br /&gt;
* {{w|.lnk|LNK}} - an extension used by Microsoft Windows for shortcuts. The extension is normally hidden to the user.&lt;br /&gt;
* LNK, ZDA, GNN - references to {{w|Link_(The_Legend_of_Zelda)|Link}}, {{w|Princess_Zelda|Zelda}}, and {{w|Ganon|Ganon}}, important characters from {{w|The_Legend_of_Zelda|The Legend of Zelda}} video game franchise&lt;br /&gt;
* {{w|White_Rabbit#Television_and_films|WRBT OBJ}} - A reference to the line of code Dennis Nedry used in {{w|Jurassic Park (film)|Jurassic Park}} to shut down key systems&lt;br /&gt;
* {{w|Object_file|O}} - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* {{w|Header_file|H}} - The file extension of a header file in C code.&lt;br /&gt;
* {{w|SWF}} - Shockwave Flash file type&lt;br /&gt;
* {{w|Dpkg|DPKG}} - The Debian package management, although the package files use the file suffix &amp;quot;.deb&amp;quot;&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* {{w|ZIP_%28file_format%29|ZIP}} - compressed archive file type&lt;br /&gt;
* CO - looks like a {{w|List_of_Internet_top-level_domains|top-level domain}}. Many countries use .co.''tld'' in front of their main TLD, e.g. ''.co.uk''. ''.co.gz'' doesn't exist.&lt;br /&gt;
* {{w|Gzip|GZ}} - a compressed file using GNU zip&lt;br /&gt;
* {{w|A.out|A.OUT}} - Default filename when creating an executable on Linux or other UNIX-like operating systems if none was specified for the compiler.&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. Changing &amp;quot;http&amp;quot; to &amp;quot;https&amp;quot; is a common suggestion to improve security when browsing the web from an insecure network (such as a public wifi hotspot) to avoid surveillance or hijacking to a malicious website; Google automatically switches to https for all mail accounts and is starting to do so with searches. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=__AUTOEXEC.BAT.MY%20OSX%20DOCUMENTS-INSTALL.EXE.RAR.INI.TAR.DOÇX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS_(1995)_BLURAY_CAM-XVID.EXE.TAR.[SCR].LISP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.H.SWF.DPKG.APP.ZIP.TAR.TAR.CO.GZ.A.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Tarmakkkk</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45927</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45927"/>
				<updated>2013-08-06T11:56:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tarmakkkk: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogue shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53], a URL related to an attack on the TOR network by law enforcement with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, {{w|Hackers (film)|Hackers}}, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious.&lt;br /&gt;
&lt;br /&gt;
The {{w|URL}} contains the path &amp;quot;~tilde/pub/cia-bin/etc&amp;quot;. The first part is a public folder of a user named tilde (which is also the name for the ~ symbol), &amp;quot;cgi-bin&amp;quot; is a common folder on a Web-Server for server side executables ([[Randall]] jokes with the name), and &amp;quot;etc&amp;quot; is a standard folder for configuration files - normally never accessible through a webserver. The program &amp;quot;init.dll&amp;quot; isn't executable at all, it's a {{w|Windows Dynamic Link Library}} which can't be run standalone, and is rarely referenced in URLs (even though such syntax is still being employed, even on [https://www.google.com/search?q=site:edu+filetype:dll reputable websites]). The question mark indicates the start of a parameter list, in this case we have only one named &amp;quot;FILE&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Note that the username &amp;quot;tilde&amp;quot; is the name of the ~ symbol.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Save&amp;quot; button is disabled, you still only can click the &amp;quot;Cancel&amp;quot; button. Many browsers(Internet Explorer and Firefox) will leave &amp;quot;Save&amp;quot; greyed out for a small period of time to force you to review the prompt, and prevent accidentally clicking a download popped up without direct request, but usually only a couple of seconds.  The fact it is greyed out may indicate the user may still make a flash decision on this nearly indecipherable download.&lt;br /&gt;
&lt;br /&gt;
The content of the parameter is shown here: &lt;br /&gt;
* __ (underscore underscore) - used in the C programming language to denote that a symbol is really not for public consumption&lt;br /&gt;
* {{w|AUTOEXEC.BAT}} - a file which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the {{w|OSX}} operating system ({{w|URL_encoding#Character_data|%20}} is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical {{w|Installer#Installer|installer}}&lt;br /&gt;
* {{w|RAR}} - a compressed archive file type&lt;br /&gt;
* {{w|INI_file|INI}} - a configuration file type&lt;br /&gt;
* {{w|Tar_(computing)|TAR}} - a file archive popular in UNIX and UNIX-like operating systems. TAR has been mentioned [[1168:_tar|before]].&lt;br /&gt;
* DOÇX - {{w|docx}} is an Office Open XML file, i.e. a word processing format used by Microsoft Word 2007 and above, but has no cedilla (¸)&lt;br /&gt;
* PHPHPHP - a play on {{w|PHP}} files, a kind of server-based web page file type. PHP is a recursive abbreviation (&amp;quot;PHP: Hypertext Preprocessor&amp;quot;)&lt;br /&gt;
* {{w|XHTML}} - another web page file type&lt;br /&gt;
* TML - stands for Transducer Markup Language, an XML based markup language that specifies how to capture, time-tag and describe sensor data&lt;br /&gt;
* XTL - another play on {{w|XHTML}}?&lt;br /&gt;
* TXXT - a play on {{w|Text_file|TXT}} file types&lt;br /&gt;
* 0DAY - a reference to a {{w|zero-day exploit}}&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* {{w|EXE}} - an executable file type used by Microsoft Windows&lt;br /&gt;
* [SCR] - a tag used by movie pirates to denote a '{{w|Screener}}', the DVD copy of films given to critics prior to theater relase. Usually the highest quality available at this time, rare, and therefor good bait for a virus laden download. &amp;quot;{{w|.scr}}&amp;quot; is also the extension for screen saver files, realy just an exe file with a different extension and one of the classical ways to distribute infected files &lt;br /&gt;
* {{w|Lisp (programming language)|LISP}} - programming language&lt;br /&gt;
* {{w|Windows_Installer|MSI}} - an installation file used by Microsoft Installer&lt;br /&gt;
* {{w|.lnk|LNK}} - an extension used by Microsoft Windows for shortcuts. The extension is normally hidden to the user.&lt;br /&gt;
* LNK, ZDA, GNN - references to {{w|Link_(The_Legend_of_Zelda)|Link}}, {{w|Princess_Zelda|Zelda}}, and {{w|Ganon|Ganon}}, important characters from {{w|The_Legend_of_Zelda|The Legend of Zelda}} video game franchise&lt;br /&gt;
* {{w|White_Rabbit#Television_and_films|WRBT OBJ}} - A reference to the line of code Dennis Nedry used in {{w|Jurassic Park (film)|Jurassic Park}} to shut down key systems&lt;br /&gt;
* {{w|Object_file|O}} - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* {{w|Header_file|H}} - The file extension of a header file in C code.&lt;br /&gt;
* {{w|SWF}} - Shockwave Flash file type&lt;br /&gt;
* {{w|Dpkg|DPKG}} - The Debian package management, although the package files use the file suffix &amp;quot;.deb&amp;quot;&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* {{w|ZIP_%28file_format%29|ZIP}} - compressed archive file type&lt;br /&gt;
* CO - looks like a {{w|List_of_Internet_top-level_domains|top-level domain}}. Many countries use .co.''tld'' in front of their main TLD, e.g. ''.co.uk''. ''.co.gz'' doesn't exist.&lt;br /&gt;
* {{w|Gzip|GZ}} - a compressed file using GNU zip&lt;br /&gt;
* {{w|A.out|A.OUT}} - Default filename when creating an executable on Linux or other UNIX-like operating systems if none was specified for the compiler.&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. Changing &amp;quot;http&amp;quot; to &amp;quot;https&amp;quot; is a common suggestion to improve security when browsing the web from an insecure network (such as a public wifi hotspot) to avoid surveillance or hijacking to a malicious website; Google automatically switches to https for all mail accounts and is starting to do so with searches. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=__AUTOEXEC.BAT.MY%20OSX%20DOCUMENTS-INSTALL.EXE.RAR.INI.TAR.DOÇX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS_(1995)_BLURAY_CAM-XVID.EXE.TAR.[SCR].LISP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.H.SWF.DPKG.APP.ZIP.TAR.TAR.CO.GZ.A.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Tarmakkkk</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45926</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45926"/>
				<updated>2013-08-06T11:56:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tarmakkkk: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogue shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53], a URL related to an attack on CHild Porn related Crime on the TOR network by law enforcement with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, {{w|Hackers (film)|Hackers}}, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious.&lt;br /&gt;
&lt;br /&gt;
The {{w|URL}} contains the path &amp;quot;~tilde/pub/cia-bin/etc&amp;quot;. The first part is a public folder of a user named tilde (which is also the name for the ~ symbol), &amp;quot;cgi-bin&amp;quot; is a common folder on a Web-Server for server side executables ([[Randall]] jokes with the name), and &amp;quot;etc&amp;quot; is a standard folder for configuration files - normally never accessible through a webserver. The program &amp;quot;init.dll&amp;quot; isn't executable at all, it's a {{w|Windows Dynamic Link Library}} which can't be run standalone, and is rarely referenced in URLs (even though such syntax is still being employed, even on [https://www.google.com/search?q=site:edu+filetype:dll reputable websites]). The question mark indicates the start of a parameter list, in this case we have only one named &amp;quot;FILE&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Note that the username &amp;quot;tilde&amp;quot; is the name of the ~ symbol.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Save&amp;quot; button is disabled, you still only can click the &amp;quot;Cancel&amp;quot; button. Many browsers(Internet Explorer and Firefox) will leave &amp;quot;Save&amp;quot; greyed out for a small period of time to force you to review the prompt, and prevent accidentally clicking a download popped up without direct request, but usually only a couple of seconds.  The fact it is greyed out may indicate the user may still make a flash decision on this nearly indecipherable download.&lt;br /&gt;
&lt;br /&gt;
The content of the parameter is shown here: &lt;br /&gt;
* __ (underscore underscore) - used in the C programming language to denote that a symbol is really not for public consumption&lt;br /&gt;
* {{w|AUTOEXEC.BAT}} - a file which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the {{w|OSX}} operating system ({{w|URL_encoding#Character_data|%20}} is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical {{w|Installer#Installer|installer}}&lt;br /&gt;
* {{w|RAR}} - a compressed archive file type&lt;br /&gt;
* {{w|INI_file|INI}} - a configuration file type&lt;br /&gt;
* {{w|Tar_(computing)|TAR}} - a file archive popular in UNIX and UNIX-like operating systems. TAR has been mentioned [[1168:_tar|before]].&lt;br /&gt;
* DOÇX - {{w|docx}} is an Office Open XML file, i.e. a word processing format used by Microsoft Word 2007 and above, but has no cedilla (¸)&lt;br /&gt;
* PHPHPHP - a play on {{w|PHP}} files, a kind of server-based web page file type. PHP is a recursive abbreviation (&amp;quot;PHP: Hypertext Preprocessor&amp;quot;)&lt;br /&gt;
* {{w|XHTML}} - another web page file type&lt;br /&gt;
* TML - stands for Transducer Markup Language, an XML based markup language that specifies how to capture, time-tag and describe sensor data&lt;br /&gt;
* XTL - another play on {{w|XHTML}}?&lt;br /&gt;
* TXXT - a play on {{w|Text_file|TXT}} file types&lt;br /&gt;
* 0DAY - a reference to a {{w|zero-day exploit}}&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* {{w|EXE}} - an executable file type used by Microsoft Windows&lt;br /&gt;
* [SCR] - a tag used by movie pirates to denote a '{{w|Screener}}', the DVD copy of films given to critics prior to theater relase. Usually the highest quality available at this time, rare, and therefor good bait for a virus laden download. &amp;quot;{{w|.scr}}&amp;quot; is also the extension for screen saver files, realy just an exe file with a different extension and one of the classical ways to distribute infected files &lt;br /&gt;
* {{w|Lisp (programming language)|LISP}} - programming language&lt;br /&gt;
* {{w|Windows_Installer|MSI}} - an installation file used by Microsoft Installer&lt;br /&gt;
* {{w|.lnk|LNK}} - an extension used by Microsoft Windows for shortcuts. The extension is normally hidden to the user.&lt;br /&gt;
* LNK, ZDA, GNN - references to {{w|Link_(The_Legend_of_Zelda)|Link}}, {{w|Princess_Zelda|Zelda}}, and {{w|Ganon|Ganon}}, important characters from {{w|The_Legend_of_Zelda|The Legend of Zelda}} video game franchise&lt;br /&gt;
* {{w|White_Rabbit#Television_and_films|WRBT OBJ}} - A reference to the line of code Dennis Nedry used in {{w|Jurassic Park (film)|Jurassic Park}} to shut down key systems&lt;br /&gt;
* {{w|Object_file|O}} - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* {{w|Header_file|H}} - The file extension of a header file in C code.&lt;br /&gt;
* {{w|SWF}} - Shockwave Flash file type&lt;br /&gt;
* {{w|Dpkg|DPKG}} - The Debian package management, although the package files use the file suffix &amp;quot;.deb&amp;quot;&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* {{w|ZIP_%28file_format%29|ZIP}} - compressed archive file type&lt;br /&gt;
* CO - looks like a {{w|List_of_Internet_top-level_domains|top-level domain}}. Many countries use .co.''tld'' in front of their main TLD, e.g. ''.co.uk''. ''.co.gz'' doesn't exist.&lt;br /&gt;
* {{w|Gzip|GZ}} - a compressed file using GNU zip&lt;br /&gt;
* {{w|A.out|A.OUT}} - Default filename when creating an executable on Linux or other UNIX-like operating systems if none was specified for the compiler.&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. Changing &amp;quot;http&amp;quot; to &amp;quot;https&amp;quot; is a common suggestion to improve security when browsing the web from an insecure network (such as a public wifi hotspot) to avoid surveillance or hijacking to a malicious website; Google automatically switches to https for all mail accounts and is starting to do so with searches. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=__AUTOEXEC.BAT.MY%20OSX%20DOCUMENTS-INSTALL.EXE.RAR.INI.TAR.DOÇX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS_(1995)_BLURAY_CAM-XVID.EXE.TAR.[SCR].LISP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.H.SWF.DPKG.APP.ZIP.TAR.TAR.CO.GZ.A.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Tarmakkkk</name></author>	</entry>

	</feed>