this post was submitted on 02 Apr 2026
146 points (98.7% liked)

Technology

83342 readers
2761 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 16 comments
sorted by: hot top controversial new old
[–] orioler25@lemmy.world 2 points 9 hours ago

Damn, if only there was a way to like, prevent write permissions of a particular program and/or user so that this couldn't happen.

[–] danh2os@piefed.social 11 points 16 hours ago (1 children)

This is what some viruses and malware do as well.

[–] Peruvian_Skies@sh.itjust.works 4 points 8 hours ago* (last edited 8 hours ago)

Some other viruses and malware.

[–] WhiskyTangoFoxtrot@lemmy.world 8 points 16 hours ago (1 children)

Adobe's name is mud right now.

[–] everett@lemmy.ml 2 points 15 hours ago

I see what you did there.

[–] Kazumara@discuss.tchncs.de 6 points 15 hours ago

I remember editing the hosts file to prevent an online license check after applying a crack for Adobe back when I was a child. Seems Adobe decided it is payback time lol.

[–] tias@discuss.tchncs.de 25 points 21 hours ago* (last edited 21 hours ago) (1 children)

Adobe has no scruples.

I used to work for a full-disk encryption vendor in the 2000s, and one customer had an issue where the machine would BSOD sometimes if both our product and Adobe Acrobat were installed. It seemed a mystery or just a red herring - what on Earth did Acrobat do that could trigger a kernel-mode crash?

Turned out that every hour or so, Acrobat would be reading and writing back the master boot record (containing the OS bootstrap code and partition table) on the primary hard drive. The bug was ours (to unlock the hard drive keys at boot we had to put different data there and redirect I/O after Windows started, and this redirection code would crash once in a blue moon), but Adobe has no business mucking about with this extremely sensitive data.

[–] Dojan@pawb.social 4 points 10 hours ago (1 children)

That is bananas. What was Acrobat doing with the MBR?

[–] tias@discuss.tchncs.de 3 points 9 hours ago* (last edited 9 hours ago)

I suspect it was part of some stupid copy protection scheme.

[–] Wispy2891@lemmy.world 34 points 1 day ago (1 children)

Probably making sure that the sweet telemetry reaches their server after the URL got included in some blocklist. Solves nothing as who included the URL, now will include the IP address.

[–] ExLisper@lemmy.curiana.net 14 points 1 day ago (1 children)

If you're using any DNS based blockers and the IP is in the hosts file it will still resolve, right? To block IP you would have to setup some completely different solution like a firewall.

[–] Wispy2891@lemmy.world 7 points 23 hours ago (1 children)

Right, it won't ask the DNS server to resolve it, the solution requires a much more expensive blocking on firewall

[–] phoenixz@lemmy.ca 0 points 16 hours ago (2 children)

Unless you run a pihole server

No, a machine won’t even contact the pihole if it finds the address in its hosts file. Hosts is step 0 for DNS, so if it finds something there it doesn’t even bother with contacting an external server (like a pihole).

[–] Wispy2891@lemmy.world 2 points 15 hours ago

i realized that the problem with an hosts file is the the system will completely bypass the dns server and directly contact the address. There is the need of something that enforces an IP address blocklist at the router level like opnsense

[–] pHr34kY@lemmy.world 12 points 1 day ago

This is no different to the meta pixel localhost listener exploit.