this post was submitted on 03 Nov 2025
        
      
      988 points (98.1% liked)
      memes
    17906 readers
  
      
      3065 users here now
      Community rules
1. Be civil
No trolling, bigotry or other insulting / annoying behaviour
2. No politics
This is non-politics community. For political memes please go to !politicalmemes@lemmy.world
3. No recent reposts
Check for reposts when posting a meme, you can only repost after 1 month
4. No bots
No bots without the express approval of the mods or the admins
5. No Spam/Ads/AI Slop
No advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.
A collection of some classic Lemmy memes for your enjoyment
Sister communities
- !tenforward@lemmy.world : Star Trek memes, chat and shitposts
 - !lemmyshitpost@lemmy.world : Lemmy Shitposts, anything and everything goes.
 - !linuxmemes@lemmy.world : Linux themed memes
 - !comicstrips@lemmy.world : for those who love comic stories.
 
        founded 2 years ago
      
      MODERATORS
      
    you are viewing a single comment's thread
view the rest of the comments
    view the rest of the comments
Use EICAR test strings as passwords so when the password is stored as plain text the antivirus software will delete the file.
Sadly it wouldn't work if found in a CSV file with other records:
They actually thought it through, huh?
For some reason that surprises me from the AV vendors
Dude makes a whole binary of a virus his password.
Doesn't have to be a binary file, toss the string in a txt file and the AV still throws a fit.
According to wikipedia it has to be at the beginning of the test file or it won't work.
01001000 01100101 01101100 01101100 01101111 00101100 00100000 01110100 01101000 01101001 01110011 00100000 01101001 01110011 00100000 01101110 01101111 01110100 00100000 01100001 00100000 01110011 01110100 01110010 01101001 01101110 01100111 00100000 01101111 01100110 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100000 01110100 01101000 01100001 01110100 00100000 01110100 01101111 01110100 01100001 01101100 01101100 01111001 00100000 01110111 01101111 01101110 00100111 01110100 00100000 01101001 01101110 01100110 01100101 01100011 01110100 00100000 01111001 01101111 01110101 01110010 00100000 01110000 01101000 01101111 01101110 01100101 00100000 01101111 01110010 00100000 01100011 01101111 01101101 01110000 01110101 01110100 01100101 01110010 00100000 01110111 01101001 01110100 01101000 00100000 01100110 01110101 01110010 01110010 01111001 00100000 01110000 01101111 01110010 01101110 00101110 00100000 01010100 01101000 01100001 01110100 00100000 01101001 01110011 00100000 01100001 01101100 01101100 00101110 00101110 00101110 00100000 01000100 01101111 01101110 00100111 01110100 00100000 01100011 01101000 01100101 01100011 01101011 00100000 01101001 01101110 01110100 01100101 01110010 01101110 01100001 01101100 00100000 01110011 01110100 01101111 01110010 01100001 01100111 01100101 00101110 00100000 01010100 01101000 01100001 01101110 01101011 00100000 01111001 01101111 01110101 00100000 01111000 01101111 01111000 01101111
What is an EICAR test string?
https://en.wikipedia.org/wiki/EICAR_test_file
I am really liking this place.
A specific string of text that you can use to test your AV without actually grabbing a virus.
Unfortunately there is significant overlap between plain-text-password-servers and servers that can't be bothered to use antivirus. Also, the string may not work if it's not at the start of the file. AV often doesn't process the whole file for efficiency purposes.
It's not about the password on the server where you want to log in, it's about CSV files stored on the machine of the cybercrook who wants to use the passwords to steal people's identities.
Unless you're the only one in the dump, no :c
unfortunately, nearly all AV abides by the “cannot be larger than 68 bytes” rule