<?xml version="1.0" encoding="UTF-8"?>
<!-- Generated on Tue, 12 May 2026 18:56:47 +0800 -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <atom:link href="https://psteamcommunity.yuanyoumao.com/groups/DoNotClick" rel="self" type="application/rss+xml" />
    <title>Do Not Click RSS Feed</title>
    <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick]]></link>
    <description><![CDATA[Events and Announcements for Do Not Click]]></description>
    <language>en-us</language>
    <generator>Steam Community RSS</generator>
    <item>
      <title>Attention! We may have a new phishing scam!</title>
      <description>This is not yet verified and I'm waiting for a response from steam moderation.&lt;br&gt;&lt;br&gt;I recieved a message that appears to be a steam phishing website.&lt;br&gt;&lt;br&gt;&lt;br&gt;The account asked me to go to this website and vote for them in a tournament.&lt;br&gt;&lt;br&gt;I checked the website in a virtualized enviroment and it has what appears to be a fake steam login window. The window tries to look like another window in your browser but the difference is it cannot go outside the bounds of the website.&lt;br&gt;&lt;br&gt;You can drag it around the website but not OUTSIDE the website.&lt;br&gt;&lt;br&gt;The website asks for your username and password.&lt;br&gt;&lt;br&gt;At this time I recommend you DO NOT enter any information and do not click any links.&lt;br&gt;&lt;br&gt;If you have entered information then contact steam support asap to report your account may be compromised.&lt;br&gt;&lt;br&gt;This may turn out to be nothing but for now I'll treat it as phishing.&lt;br&gt;</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/5632298429339547128]]></link>
      <pubDate>Sat, 17 Jul 2021 20:09:00 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/5632298429339547128</guid>
    </item>
    <item>
      <title>(UPDATE) Valve is saying they have no confirmed cases of RCE</title>
      <description>Valve says they are investigating and believe the source code leak to be the leaked source from 2018.&lt;br&gt;&lt;br&gt;RCE and API claims MAY have been fabricated by forum users.&lt;br&gt;&lt;br&gt;Valve are still investigating but are giving the ok to play source games.</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/2238795419569516376]]></link>
      <pubDate>Wed, 22 Apr 2020 23:09:08 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/2238795419569516376</guid>
    </item>
    <item>
      <title>Attention! New Remote Execution Exploit has been found for source games!</title>
      <description>(SEE UPDATE ANNOUNCEMENT REGARDING THIS ISSUE)&lt;br&gt;&lt;br&gt;&lt;span class=&quot;bb_strike&quot;&gt;It is recommended not to play source games until valve gives the ok on if it's been patched!&lt;br&gt;&lt;br&gt;This exploit allows hackers to execute code on your computer through the game itself. This can result in any form of malware being injected into your system.&lt;br&gt;&lt;br&gt;It is currently unknown what source games are affected. We do have confirmed reports that TF2 and CS:go are vulnerable to the exploit.&lt;br&gt;&lt;br&gt;Play at your own risk to your computer and your accounts!&lt;/span&gt;</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/2238795419569322753]]></link>
      <pubDate>Wed, 22 Apr 2020 21:51:58 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/2238795419569322753</guid>
    </item>
    <item>
      <title>Attention peeps! New scam is up on steam!</title>
      <description>This scam tells you:&lt;br&gt;1 free csgo skin for new users! Go to &amp;lt;malware link&amp;gt; and take the skin you want.&lt;br&gt;&lt;br&gt;&lt;br&gt;Inform your friends not to fall for this scam! It hijacks, steals your account, steals your inventory items, and other malicious activity.&lt;br&gt;&lt;br&gt;If you or your friend has been hijacked you should follow these instructions ASAP to avoid losing your inventory items or getting VAC banned by hijackers.&lt;br&gt;&lt;br&gt;&lt;a class=&quot;bb_link&quot; href=&quot;https://psteamhelp.yuanyoumao.com/en/wizard/HelpWithAccountStolen&quot; target=&quot;_blank&quot; rel=&quot;&quot; &gt;https://psteamhelp.yuanyoumao.com/en/wizard/HelpWithAccountStolen&lt;/a&gt;&lt;br&gt;&lt;br&gt;You can also go to the infected friends profile, click the report icon, and choose reason: &lt;br&gt;&lt;br&gt;----&lt;br&gt;&amp;quot;They are involved in theft, scamming, fraud, or other malicious activity&amp;quot;&lt;br&gt;&lt;br&gt;&amp;quot;Their account seems to have been compromised&amp;quot;&lt;br&gt;&lt;br&gt;&amp;quot;Submit this account for review&amp;quot;&lt;br&gt;&lt;br&gt;Include details telling why you think your friend has been hacked and submit.&lt;br&gt;----&lt;br&gt;&lt;br&gt;&lt;br&gt;I haven't been able to get ahold of the malware steam hijacker so I don't know what it includes. I do know it locks you out of your account, steals your account items, and sends malware url to friends through direct message to attempt to infect them as well.&lt;br&gt;&lt;br&gt;Inform your friends and stay vigilant peeps.</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/1842475480784041055]]></link>
      <pubDate>Fri, 20 Mar 2020 00:00:16 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/1842475480784041055</guid>
    </item>
    <item>
      <title>Attention peeps! We got a new scam malware that offers a free skin tutorial!</title>
      <description>This new scam not only steals money but also installs malware to your computer and sends messages to all your friends as a chain mail. Beware of any links offering free skins INCLUDING friends you trust!</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/1692692109779778925]]></link>
      <pubDate>Sun, 20 Jan 2019 12:26:43 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/1692692109779778925</guid>
    </item>
    <item>
      <title>Invite all of your friends to this group!</title>
      <description>You might help someone avoid getting haxored!</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078324784187]]></link>
      <pubDate>Sun, 18 Jan 2015 20:13:45 +0000</pubDate>
      <author>Smoocher</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078324784187</guid>
    </item>
    <item>
      <title>Knowing your URLs</title>
      <description>I already covered some of URLs in my guide to XSS but I decided to go more indepth on this one.&lt;br&gt;&lt;br&gt;Note: I'm going to copy some of the other guide to this one just to save some time but I will go over them in more detail.&lt;br&gt;&lt;br&gt;&lt;br&gt;What is a URL? &lt;br&gt;&lt;br&gt;URL is short for Uniform Resource Locator. When you type a website such as &amp;quot; h ttp://my_awesome_site_domain:80/images?name=someguy&amp;amp;icecream=delicious#killstreak&amp;quot; you are typing a protocol then a domain name followed by the port, resource path, URL parameters, and a fragment identifier. This whole thing put together is a URL: &lt;br&gt;&lt;br&gt;protocol:                 &lt;a class=&quot;bb_link&quot; href=&quot;https://psteamcommunity.yuanyoumao.com/linkfilter/?u=http%3A%2F%2F&quot; target=&quot;_blank&quot; rel=&quot; noopener&quot; &gt;http://&lt;/a&gt;&lt;br&gt;&lt;br&gt;This tells us what kind of protocol we are going to use to connect to the server. This space can also indicate how to use the following information. Protocol may not be the best name for this as sometimes it uses things other than a protocol but... I like the name and I'm sticking with it.&lt;br&gt;&lt;br&gt;domain name:              my_awesome_site_domain&lt;br&gt;&lt;br&gt;I put domain name here however a better name would have been &amp;quot;address&amp;quot; as a domain name isn't the only thing that can go in this area. Another example of something that can go here is an IP Address. The most commonly used IP address is a IPv4 (4 bytes (8 bits per byte) meaning 32 bits in total). A byte can have 256 unique possible values so each number in the ip address can range from 0 to 255. (255.255.255.255) is the largest possible IPv4 address. IPv4 will always have 4 numbers and 3 periods seperating the numbers. Keep in mind that the address ends when you reach a &amp;quot;:&amp;quot; or a &amp;quot;/&amp;quot; character. A less commonly known fact is that ip addresses can be written in hexidecimal format. IE: 0xC0.0xA8.0x1.0x1 would be equal to (192.168.1.1) which is in most cases the default gateway.&lt;br&gt;&lt;br&gt;&lt;br&gt;port:                     :80&lt;br&gt;&lt;br&gt;The port is a 2 byte (16 bit) number that indicates where to send the information when it arrives on the network. The default port for http is 80. The port is actually used everytime you go to a webpage whether you set it yourself or not. If you go to pretty much any site and append a :80 after the address (before the &amp;quot;/&amp;quot; character) you can see that it takes you to the main webpage as it would have normally.&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;resource path:            /images&lt;br&gt;&lt;br&gt;The resource path is information sent to the server to tell us what we want from it. In a simple case &amp;quot;/images&amp;quot; would take us to a directory (folder) when used. In more advanced cases it can lead us where ever the server operator wants us to go. More about this later.&lt;br&gt;&lt;br&gt;&lt;br&gt;URL Parameter:            ?name=someguy&amp;amp;icecream=delicious&lt;br&gt;&lt;br&gt;We already went over URL parameters so we will skip it.&lt;br&gt;&lt;br&gt;&lt;br&gt;Fragment Identifier:      #killstreak&lt;br&gt;&lt;br&gt;This is a bit complicated to explain all of its functions and you don't really need to know most of it so we'll gloss over it. Basically the most common purpose of the fragment identifier is to point to an element's id in an html format. Keep in mind that things like &amp;quot;.asp&amp;quot; and &amp;quot;.php&amp;quot; also use html format. The difference is that asp and php runs code on the server side before sending a modified html page where as a html page is sent as is. Keep in mind that custom server code can make even a html document dynamic with the right code so don't take this as a guarantee that this is how things will work but for the most part this is how things work. Whoops.. went off track.. Ahem... Anyways by assigning an element a unique id we can tell the page to automatically scroll to the point where that element starts. The fragment identifier is not sent to the server and is just used as a guide for the client.&lt;br&gt;&lt;br&gt;&lt;br&gt;So we already went over most of this in XSS.. Why are we bring it up again?&lt;br&gt;&lt;br&gt;In XSS we went over the basics of URLs but in this guide I will also be going over how the server processes the URL and why you shouldn't assume you're safe because the extension leads to an image file or video (or anything else for that matter).&lt;br&gt;&lt;br&gt;Lets take this link for example:&lt;br&gt;&lt;br&gt;h ttp://MY_TOTALLY_LEGIT_WEBSITE_DOMAIN_GOES_HERE/images/screenshot.png&lt;br&gt;&lt;br&gt;Using a normal http server this would tell the server to look for resource &amp;quot;/images/screenshot.png&amp;quot; and send it to the client or take us to a 404 errorcode page if the resource was not found.&lt;br&gt;&lt;br&gt;However.. Using a more advanced http server we can do more with what happens when we send the data back.&lt;br&gt;&lt;br&gt;For instance:&lt;br&gt;&lt;br&gt;Lets say if the resource is not found on the server we redirect to a page saying that it wasn't found on the server. If we change the &amp;quot;not found&amp;quot; page that it redirects to we have changed what data is sent to the client. Using this method hackers are easily able to make fake URLs that redirect to other websites or resources to download.&lt;br&gt;&lt;br&gt;&lt;br&gt;Now Lets say we force the webpage to always send the same redirect no matter what resource is sent to the server by us. Using this as an example we have redirected the client even if a valid resource was found.&lt;br&gt;&lt;br&gt;Using either of these techniques we can turn a harmless image file:&lt;br&gt;&lt;br&gt;h ttp://MY_TOTALLY_LEGIT_WEBSITE_DOMAIN_GOES_HERE/images/screenshot.png&lt;br&gt;&lt;br&gt;Into a redirect that downloads an SCR file with malicious code.&lt;br&gt;&lt;br&gt;-----------------------------------------------------------------&lt;br&gt;&lt;br&gt;In this guide I have gone more in depth with URLs and how server resources are processed server side. You should never trust a website (or any URL) to send you to the resource file equal to the one you are sending to it and I hope this has helped you understand the reasons behind it. ALWAYS check the URL and the file extension before you download or use anything on the site.&lt;br&gt;&lt;br&gt;&lt;br&gt;If you find any mistakes please let me know.&lt;br&gt;&lt;br&gt;(UPDATE) Fixed a sentence that didn't make sense.</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078321882886]]></link>
      <pubDate>Sun, 18 Jan 2015 01:24:11 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078321882886</guid>
    </item>
    <item>
      <title>Have you read it?</title>
      <description>Joining the group is all well and good but if you don't actually read the information given then being in this group won't help you much.&lt;br&gt;&lt;br&gt;That being said I'm curious how many of you actually read PART 1 through PART 4.&lt;br&gt;&lt;br&gt;If you have then click the little &amp;quot;Rate up&amp;quot; button under this post and if you haven't then click the down vote button.&lt;br&gt;&lt;br&gt;Thank you.&lt;br&gt;&lt;br&gt;</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078313950062]]></link>
      <pubDate>Thu, 15 Jan 2015 22:04:27 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248030078313950062</guid>
    </item>
    <item>
      <title>File Extensions - Things you should know - PART 2</title>
      <description>Continuing our list:&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.jpg&lt;br&gt;.jpeg&lt;br&gt;.jif&lt;br&gt;.jfi&lt;br&gt;.jfif&lt;br&gt;.jpe&lt;br&gt;-------&lt;br&gt;Displays images in a compressed image format. (I had no idea what it stood for so I looked it up) Short for Joint Photographic Experts Group. Normally a legit file however hackers were able to construct a malicious header into the file that would execute in the kernel when the file was opened in an image viewer. I'm unaware if microsoft has patched this exploit however I'm guessing they did. (maybe?)&lt;br&gt;&lt;br&gt;--------------------------------------------------&lt;br&gt;&lt;br&gt;This was just a short list on what some file extensions are and what they do. This is not a complete list.. however I'd be here for months if I were to do that.&lt;br&gt;&lt;br&gt;&lt;br&gt;Before I end this guide I would like to go over one more thing. Hidden extensions.&lt;br&gt;&lt;br&gt;By default on your computer most extensions are hidden from view meaning that &amp;quot;Apple.jpg&amp;quot; would show as &amp;quot;Apple&amp;quot; and &amp;quot;Apple.jpg.exe&amp;quot; would show as &amp;quot;Apple.jpg&amp;quot;. The second example &amp;quot;Apple.jpg&amp;quot; appears as a harmless jpg file however the hidden exe extension means it will execute machine code when executed.&lt;br&gt;&lt;br&gt;So how do we avoid this?&lt;br&gt;&lt;br&gt;(These instructions are for Win7 64b OS so instructions may be slightly different for other windows OS)&lt;br&gt;&lt;br&gt;1. Go to (Start)&lt;br&gt;&lt;br&gt;2. Click &amp;quot;Computer&amp;quot; (Or &amp;quot;My Computer&amp;quot; depending on OS)&lt;br&gt;&lt;br&gt;3. While on the new window that popped up press your alt key (Next to spacebar) once.&lt;br&gt;&lt;br&gt;&lt;b&gt;Warning: Do not change any other settings in this next window. Not my fault if you break something.&lt;/b&gt;&lt;br&gt;&lt;br&gt;4. Go to &amp;quot;Tools&amp;quot; and &amp;quot;Folder Options&amp;quot;&lt;br&gt;&lt;br&gt;5. Click &amp;quot;View&amp;quot; at the top.&lt;br&gt;&lt;br&gt;6. Under &amp;quot;Advanced settings&amp;quot; Uncheck &amp;quot;Hide extensions for known file types&amp;quot;.&lt;br&gt;&lt;br&gt;Note: DO NOT uncheck the &amp;quot;Hide protected operating system files&amp;quot; check box by accident.&lt;br&gt;&lt;br&gt;7. Click &amp;quot;Apply&amp;quot; and &amp;quot;OK&amp;quot; to save the settings or click &amp;quot;Cancel&amp;quot; to cancel any changes you made.&lt;br&gt;&lt;br&gt;&lt;br&gt;After completing these instructions you should now always (Except for acouple file types under certain conditions) see the extension at the end of the filename. If you are still unsure you can right click the file and go to properties. At the top in the first tab you should see the type of file and the program used to open it with.&lt;br&gt;&lt;br&gt;&lt;br&gt;---------------------------------------------------&lt;br&gt;&lt;br&gt;In this guide we talked about file extensions and how to handle them. There is lots of information that could have been added to this but I left them out to avoid confusing people... and because I'm tired of typing....... and because I'm hungry...... However with the information I have provided here you should be much more able to intelligently handle files by extension types.&lt;br&gt;&lt;br&gt;(If you spot any mistakes be sure to let me know)</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248029538997749163]]></link>
      <pubDate>Mon, 12 Jan 2015 19:50:14 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248029538997749163</guid>
    </item>
    <item>
      <title>File Extensions - Things you should know - PART 1</title>
      <description>Alot of malware now adays is actually recieved from the user actually downloading the malware file and executing it. The main reason for this is they don't understand what the file extensions mean and the risks for running the files. In this post I will go over what file extensions are, how they work, and how a file should be treated based off of what the file extension is.&lt;br&gt;&lt;br&gt;So first things first.&lt;br&gt;&lt;br&gt;What is a file extension?&lt;br&gt;&lt;br&gt;A file extension is a suffix on the file name that tells the computer what program is required to run this specific file. This suffix will always be seperated by a &amp;quot;.&amp;quot; character from what I've seen. Keep in mind that a period &lt;b&gt;&lt;u&gt;CANNOT&lt;/u&gt;&lt;/b&gt; be apart of the file extension itself. If more than one period character appear in the filename only the period farthest to the right will be used.&lt;br&gt;&lt;br&gt;Some examples before we go on:&lt;br&gt;&lt;br&gt;1.  MyApple.jpg&lt;br&gt;&lt;br&gt;For 1 we can see there is only one period so we take the period and everything to the right of the period as our extension. In this case our name would be &amp;quot;MyApple&amp;quot; and the extension would be &amp;quot;.jpg&amp;quot;  .&lt;br&gt;&lt;br&gt;2.  MyApple.jpg.exe&lt;br&gt;&lt;br&gt;For 2 we can see &amp;quot;.jpg&amp;quot; again however.. In this example it is not the last period in the name so it is ignored so in this case our name would be &amp;quot;MyApple.jpg&amp;quot; and our extension would be &amp;quot;.exe&amp;quot;.&lt;br&gt;&lt;br&gt;This is very important to remember so keep it in mind.&lt;br&gt;&lt;br&gt;------------------------------------------------------&lt;br&gt;&lt;br&gt;How does a file extension work?&lt;br&gt;&lt;br&gt;I won't be going indepth with this but I'll go over the basics. Lets say we have a file called &amp;quot;snikagotpwned.txt&amp;quot;.&lt;br&gt;&lt;br&gt;When you install windows or install software that has a new extension you will be adding new extensions to your system registry. &lt;b&gt;The registry is a place that mostly stores important information required for your system to run correctly so don't change anything inside without knowing what you're doing first. We won't be going over the registry here but it is still an important bit of information to know.&lt;/b&gt;&lt;br&gt;&lt;br&gt;Upon opening the file &amp;quot;snikagotpwned.txt&amp;quot; our system would search our registry values for the &amp;quot;.txt&amp;quot; extension and what is used to open it.&lt;br&gt;&lt;br&gt;This file would be opened in notepad on a windows operating system (default setting). Notepad does not use a file format and just displays all file bytes from the file to the notepad program. Using notepad you can open pretty much every file on your computer for viewing however I don't recommend doing so as that is not its purpose and it may cause notepad or your computer to stop responding depending on your build and the size of the file you are trying to open.&lt;br&gt;&lt;br&gt;Notepad is one of the few programs that does not actually use a format however since most do use formats we will look alittle into why we need formats.&lt;br&gt;&lt;br&gt;Lets say we have a file with the following contents:&lt;br&gt;&lt;br&gt;WAITEMILYGOHOME&lt;br&gt;&lt;br&gt;Now obviously we know what the file says so we don't need a format right? If we were to split the words it would look something like this:&lt;br&gt;WA&lt;br&gt;ITEM&lt;br&gt;ILY&lt;br&gt;GOH&lt;br&gt;OME&lt;br&gt;&lt;br&gt;Oh? You got something different?&lt;br&gt;&lt;br&gt;Ok lets look at another example:&lt;br&gt;&lt;br&gt;69527741&lt;br&gt;&lt;br&gt;Lets split these numbers into pieces giving us our numbers. Obviously the numbers would be:&lt;br&gt;&lt;br&gt;695 27 7 41&lt;br&gt;&lt;br&gt;&lt;br&gt;Confused yet? So is your computer.&lt;br&gt;&lt;br&gt;Without anything telling it how the data is collected and what type they are your computer is just as confused as you are right now and that is why we need a file format.&lt;br&gt;&lt;br&gt;&lt;br&gt;Now lets look at the first example again with a file format. In actual files this would be done differently because files are written in bytes but for the sake of this example it will get my point across.&lt;br&gt;&lt;br&gt;&lt;br&gt;Ok so our example was:&lt;br&gt;WAITEMILYGOHOME&lt;br&gt;&lt;br&gt;Lets set this up with a format. First how many different parts did we get when we split it previously?&lt;br&gt;&lt;br&gt;5 parts. So we will set the first position in the file to indicate how many parts we will be reading. Currently we will look like this. (Keep in mind that I am using &amp;lt;&amp;gt; to indicate a number. It will only take up one position in the file):&lt;br&gt;&lt;br&gt;&amp;lt;5&amp;gt;WAITEMILYGOHOME&lt;br&gt;&lt;br&gt;Ok so now we know that we have 5 parts to split... However we still do not know in what way we need to split the parts. For that we need the next part of our file format. This will return the amount of characters in this part. It will look something like this:&lt;br&gt;&lt;br&gt;&amp;lt;5&amp;gt; &amp;lt;2&amp;gt;WA &amp;lt;4&amp;gt;ITEM &amp;lt;3&amp;gt;ILY &amp;lt;3&amp;gt;GOH &amp;lt;3&amp;gt;OME&lt;br&gt;&lt;br&gt;I put some spaces to make it easier to understand. &amp;quot;WA&amp;quot; is two characters so we put a 2 before it to indicate the next 2 characters are for our first part. Now we get the next number for the next part. 4 is our number so we will read 4 characters. Using this file format we can understand that:&lt;br&gt;&amp;lt;5&amp;gt;&amp;lt;2&amp;gt;WA&amp;lt;4&amp;gt;ITEM&amp;lt;3&amp;gt;ILY&amp;lt;3&amp;gt;GOH&amp;lt;3&amp;gt;OME&lt;br&gt;&lt;br&gt;splits into:&lt;br&gt;&lt;br&gt;WA&lt;br&gt;ITEM&lt;br&gt;ILY&lt;br&gt;GOH&lt;br&gt;OME&lt;br&gt;&lt;br&gt;&lt;br&gt;This is the best way I can explain it for now without going into bits, binary, and bytes so we'll leave it at this.&lt;br&gt;&lt;br&gt;&lt;br&gt;Ok so now we know what a file extension is, how a file extension works, what a file format is, and why/how a file format works. Next we will go over..&lt;br&gt;&lt;br&gt;&lt;br&gt;How files should be treated based on their file extensions.&lt;br&gt;---------&lt;br&gt;.exe&lt;br&gt;---------&lt;br&gt;The most common file extension used for malware is &amp;quot;.exe&amp;quot;. &amp;quot;exe&amp;quot; is short for executeable and indicates we want to execute machine code on the system. We won't be going into any of that here.&lt;br&gt;&lt;br&gt;&lt;br&gt;---------&lt;br&gt;.com&lt;br&gt;---------&lt;br&gt;Executes machine code. Pretty much same thing as &amp;quot;.exe&amp;quot; with slight differences. Hackers used this extension to confuse users into thinking they were webpages.&lt;br&gt;&lt;br&gt;&lt;br&gt;---------&lt;br&gt;.scr&lt;br&gt;---------&lt;br&gt;Executes machine code. Pretty much same thing as &amp;quot;.exe&amp;quot; with slight differences. The main purpose of this file extension was to indicate a screen saver however it is just as effective at executing machine code as exe and com.&lt;br&gt;&lt;br&gt;&lt;br&gt;--------&lt;br&gt;.vbs&lt;br&gt;--------&lt;br&gt;Executes source script code. Short for Visual Basic Script. If you are downloading a file with this extension there is a high probability it is malware but not always.&lt;br&gt;&lt;br&gt;&lt;br&gt;--------&lt;br&gt;.vbe&lt;br&gt;--------&lt;br&gt;Executes encoded script code. Short for Visual Basic Encoded Script. If you are downloading a file with this extension there is a high probability it is malware but not always.&lt;br&gt;&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.wsf&lt;br&gt;-------&lt;br&gt;Executes source script code. Short for Windows Script File. If you are downloading a file with this extension there is a high probability it is malware but not always.&lt;br&gt;&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.bat&lt;br&gt;.btm&lt;br&gt;.cmd&lt;br&gt;-------&lt;br&gt;Executes source script code. Short for Batch. If you are downloading a file with one of these  file extensions there is a high probability it is malware but not always.&lt;br&gt;&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.swf&lt;br&gt;-------&lt;br&gt;Executes a flash file. Short for Shockwave Flash. Most of the time this kind of file is executed inside of the browser itself instead of being downloaded by your consent but their are occurrences where it is. This is one of the most common file types you see when visiting a webpage now adays. Hackers use swf to attempt URL Hijacking exploits to change your webpage to either a malicious URL or a phishing URL so always be aware of what website you are on. XSS is also not uncommon using swf.&lt;br&gt;&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.pdf&lt;br&gt;-------&lt;br&gt;Displays documents that may include different fonts, pictures, and other things used for making your document look pretty. Short for Portable Document Format. Using a buffer overflow exploit the hackers were able to turn this file type into an instant low access for your system. Adobe claims they have patched this vulnerablity however I still recommend that you disable the browser addon that starts pdf automatically when it is viewed.&lt;br&gt;&lt;br&gt;&lt;br&gt;-------&lt;br&gt;.rtf&lt;br&gt;-------&lt;br&gt;Displays documents. Short for Rich Text Format. Using a buffer overflow exploit the hackers were able to execute malicious win32 machine code when this file was opened into microsoft word. Microsoft claims to have patched this vulnerability years ago however I still don't recommend downloading a file with this format unless if you know what it is.&lt;br&gt;&lt;br&gt;(Continued in part 2)</description>
      <link><![CDATA[https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248029538997739144]]></link>
      <pubDate>Mon, 12 Jan 2015 19:46:22 +0000</pubDate>
      <author>[FoRcE]army_guy3</author>
      <guid isPermaLink="true">https://psteamcommunity.yuanyoumao.com/groups/DoNotClick/announcements/detail/248029538997739144</guid>
    </item>
  </channel>
</rss>