<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ronf89</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ronf89"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Ronf89"/>
		<updated>2026-04-17T08:51:09Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45856</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45856"/>
				<updated>2013-08-05T15:05:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ronf89: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogues shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53] with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, Hackers, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious. The &amp;quot;.LNK&amp;quot; extension is the windows extension for a shortcut (the extension is normally hidden to the user), whereas &amp;quot;.LNK.ZDA.GNN&amp;quot; extensions are references to Link, Zelda, and Ganon, important characters from the Legend of Zelda video game franchise.&lt;br /&gt;
&lt;br /&gt;
The file seems to be an executable, but other file types referenced include:&lt;br /&gt;
* AUTOEXEC.BAT - which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the OSX operating system (%20 is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical installer&lt;br /&gt;
* RAR - a compressed archive file type&lt;br /&gt;
* INI - a settings file type&lt;br /&gt;
* TAR - a concatenated file type&lt;br /&gt;
* DOÇX - looks like a Microsoft Word file type, but isn't&lt;br /&gt;
* PHPHPHP - a play on PHP files, a kind of server-based web page file type&lt;br /&gt;
* XHTML - another web page file type&lt;br /&gt;
* TML - stands for Transducer Markup Language, an XML based markup language that specifies how to capture, time-tag and describe sensor data&lt;br /&gt;
* XTL - another play on XHTML?&lt;br /&gt;
* TXXT - a play on TXT file types&lt;br /&gt;
* 0DAY - a reference to a zero-day exploit&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* EXE - an executable file type&lt;br /&gt;
* [SCR] - a Windows screensaver&lt;br /&gt;
* LISP - the programming language [https://en.wikipedia.org/wiki/Lisp_(programming_language)]&lt;br /&gt;
* MSI - an installer file type&lt;br /&gt;
* WRBT - ???&lt;br /&gt;
* OBJ - a universal 3D modeling file format&lt;br /&gt;
* O - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* H - The file extension of a header file in C code.&lt;br /&gt;
* SWF - Shockwave Flash file type&lt;br /&gt;
* DPKG - Debian package file type&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* ZIP - compressed archive file type&lt;br /&gt;
* CO.GZ - looks like a [http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains top-level domain] for an unknown country but isn't&lt;br /&gt;
* A.OUT - Default filename when creating an executable on linux with gcc [http://www.cprogramming.com/gcc.html]&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=--AUTOEXEX.BAT.MY%20OSX%20DOCUMENTS-INSTANLL.EXE.RAR.INI.TAR.DOCX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS_(1995)_BLURAY-CAM_XVID.EXE.TAR.[SCR].LISTP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.SWF.DPKG.APP.ZIP.TAR.CO.GZ.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Ronf89</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45850</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45850"/>
				<updated>2013-08-05T15:00:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ronf89: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogues shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53] with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, Hackers, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious. The &amp;quot;.LNK&amp;quot; extension is the windows extension for a shortcut (the extension is normally hidden to the user), whereas &amp;quot;.LNK.ZDA.GNN&amp;quot; extensions are references to Link, Zelda, and Ganon, important characters from the Legend of Zelda video game franchise.&lt;br /&gt;
&lt;br /&gt;
The file seems to be an executable, but other file types referenced include:&lt;br /&gt;
* AUTOEXEC.BAT - which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the OSX operating system (%20 is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical installer&lt;br /&gt;
* RAR - a compressed archive file type&lt;br /&gt;
* INI - a settings file type&lt;br /&gt;
* TAR - a concatenated file type&lt;br /&gt;
* DOÇX - looks like a Microsoft Word file type, but isn't&lt;br /&gt;
* PHPHPHP - a play on PHP files, a kind of web page file type&lt;br /&gt;
* XHTML - another web page file type&lt;br /&gt;
* TML - possibly a compromise between xhtml, html, shtml, etc?&lt;br /&gt;
* XTL - another play on XHTML?&lt;br /&gt;
* TXXT - a play on TXT file types&lt;br /&gt;
* 0DAY - a reference to a zero-day exploit&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* EXE - an executable file type&lt;br /&gt;
* [SRC] - a source file&lt;br /&gt;
* LISP - the programming language [https://en.wikipedia.org/wiki/Lisp_(programming_language)]&lt;br /&gt;
* MSI - an installer file type&lt;br /&gt;
* WRBT - ???&lt;br /&gt;
* OBJ - a universal 3D modeling file format&lt;br /&gt;
* O - The extension for a linker file, an intermediary created when compiling C code.&lt;br /&gt;
* H - The file extension of a header file in C code.&lt;br /&gt;
* SWF - Shockwave Flash file type&lt;br /&gt;
* DPKG - Debian package file type&lt;br /&gt;
* APP - an application on Mac OS X operating system&lt;br /&gt;
* ZIP - compressed archive file type&lt;br /&gt;
* CO.GZ - looks like a [http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains top-level domain] for an unknown country but isn't&lt;br /&gt;
* A.OUT - Default filename when creating an executable on linux with gcc [http://www.cprogramming.com/gcc.html]&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=--AUTOEXEX.BAT.MY%20OSX%20DOCUMENTS-INSTANLL.EXE.RAR.INI.TAR.DOCX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS-(1995)-BLURAY-CAM_XVID.EXE.TAR.[SCR].LISTP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.SWF.DPKG.APP.ZIP.TAR.CO.GZ.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Ronf89</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45842</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45842"/>
				<updated>2013-08-05T14:55:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ronf89: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogues shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53] with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, Hackers, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious. The &amp;quot;.LNK.ZDA.GNN&amp;quot; extensions are references to Link, Zelda, and Ganon, important characters from the Legend of Zelda video game franchise.&lt;br /&gt;
&lt;br /&gt;
The file seems to be an executable, but other file types referenced include:&lt;br /&gt;
* AUTOEXEC.BAT - which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTS - referencing the OSX operating system (%20 is a representation of a space in a URL, i.e. it reads as &amp;quot;MY OSX DOCUMENTS&amp;quot;).&lt;br /&gt;
* INSTALL.EXE - a typical installer&lt;br /&gt;
* RAR - a compressed archive file type&lt;br /&gt;
* INI - a settings file type&lt;br /&gt;
* TAR - a concatenated file type&lt;br /&gt;
* DOÇX - looks like a Microsoft Word file type, but isn't&lt;br /&gt;
* PHPHPHP - a play on PHP files, a kind of web page file type&lt;br /&gt;
* XHTML - another web page file type&lt;br /&gt;
* TML - possibly a compromise between xhtml, html, shtml, etc?&lt;br /&gt;
* XTL - another play on XHTML?&lt;br /&gt;
* TXXT - a play on TXT file types&lt;br /&gt;
* 0DAY - a reference to a zero-day exploit&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* EXE - an executable file type&lt;br /&gt;
* [SRC] - a source file&lt;br /&gt;
* LISP - the programming language&lt;br /&gt;
* MSI - an installer file type&lt;br /&gt;
* WRBT - ???&lt;br /&gt;
* OBJ - a universal 3D modeling file format&lt;br /&gt;
* O.H - ???&lt;br /&gt;
* SWF - Shockwave Flash file type&lt;br /&gt;
* DPKG - Debian package file type&lt;br /&gt;
* APP - generic application file type?&lt;br /&gt;
* ZIP - compressed archive file type&lt;br /&gt;
* CO.GZ - looks like a [[http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains top-level domain]] for an unknown country but isn't&lt;br /&gt;
* A.OUT - Default filename when creating an executable on linux with gcc [http://www.cprogramming.com/gcc.html]&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=--AUTOEXEX.BAT.MY%20OSX%20DOCUMENTS-INSTANLL.EXE.RAR.INI.TAR.DOCX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS-(1995)-BLURAY-CAM_XVID.EXE.TAR.[SCR].LISTP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.SWF.DPKG.APP.ZIP.TAR.CO.GZ.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Ronf89</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45839</id>
		<title>1247: The Mother of All Suspicious Files</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1247:_The_Mother_of_All_Suspicious_Files&amp;diff=45839"/>
				<updated>2013-08-05T14:53:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ronf89: /* Explanation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1247&lt;br /&gt;
| date      = August 5, 2013&lt;br /&gt;
| title     = The Mother of All Suspicious Files&lt;br /&gt;
| image     = the_mother_of_all_suspicious_files.png&lt;br /&gt;
| titletext = Better change the URL to 'https' before downloading.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
The save dialogues shows a download from [http://www.utrace.de/?query=65.222.202.53 65.222.202.53] with a very long file title. Many of the extensions used inside there indicate executable code. You also see common download syntax for a pirated movie, Hackers, likely included to appear malicious to anyone skimming but is actually a movie about hackers, making it a benign reference rather than malicious. The &amp;quot;.LNK.ZDA.GNN&amp;quot; extensions are references to Link, Zelda, and Ganon, important characters from the Legend of Zelda video game franchise.&lt;br /&gt;
&lt;br /&gt;
The file seems to be an executable, but other file types referenced include:&lt;br /&gt;
* AUTOEXEC.BAT - which is automatically run during startup on Windows/DOS operating systems.&lt;br /&gt;
* MY%20OSX%20DOCUMENTES - referencing the OSX operating system.&lt;br /&gt;
* INSTALL.EXE - a typical installer&lt;br /&gt;
* RAR - a compressed archive file type&lt;br /&gt;
* INI - a settings file type&lt;br /&gt;
* TAR - a concatenated file type&lt;br /&gt;
* DOÇX - looks like a Microsoft Word file type, but isn't&lt;br /&gt;
* PHPHPHP - a play on PHP files, a kind of web page file type&lt;br /&gt;
* XHTML - another web page file type&lt;br /&gt;
* TML - possibly a compromise between xhtml, html, shtml, etc?&lt;br /&gt;
* XTL - another play on XHTML?&lt;br /&gt;
* TXXT - a play on TXT file types&lt;br /&gt;
* 0DAY - a reference to a zero-day exploit&lt;br /&gt;
* HACK.ERS_(1995)_BLURAY_CAM-XVID - a reference to the 1995 Hackers movie, but pirated movies would either be a BlurayRIP/DVDRIP or CAM, but not both at the same time unless you used a camera to recored the Blueray movie as it played?&lt;br /&gt;
* EXE - an executable file type&lt;br /&gt;
* [SRC] - a source file&lt;br /&gt;
* LISP - the programming language&lt;br /&gt;
* MSI - an installer file type&lt;br /&gt;
* WRBT - ???&lt;br /&gt;
* OBJ - An universal 3D modeling file format&lt;br /&gt;
* O.H - ???&lt;br /&gt;
* SWF - Shockwave Flash file type&lt;br /&gt;
* DPKG - Debian package file type&lt;br /&gt;
* APP - generic application file type?&lt;br /&gt;
* ZIP - compressed archive file type&lt;br /&gt;
* CO.GZ - looks like a [[http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains top-level domain]] for an unknown country but isn't&lt;br /&gt;
* A.OUT - Default filename when creating an executable on linux with gcc [http://www.cprogramming.com/gcc.html]&lt;br /&gt;
&lt;br /&gt;
The title text suggests changing from http to https, as if encrypting a suspicious file before downloading it is somehow better than downloading it unencrypted.  http (Hyper Text Transfer Protocol) and https (Hyper Text Transfer Protocol - Secure) are the two common protocols for getting web pages and web downloads. http is the simple download, whereas https adds an SSL encryption layer so the item being downloaded cannot be viewed unencrypted by anyone except the end recipient. The end recipient will still get whatever nasties were in the original, however - encrypting it doesn't change the content at all.&lt;br /&gt;
&lt;br /&gt;
The IP address referenced in the comic, 65.222.202.53, is currently being used by the shellcode of a Javascript 0-day exploit for the Tor Browser Bundle being run by the FBI to phone home over the clearnet and de-anonymize visitors to websites on Freedom Hosting that are serving child pornography. [http://www.reddit.com/r/onions/comments/1jmrta/founder_of_the_freedom_hosting_arrested_held/]&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[A save dialogue popup with an alert sign.]&lt;br /&gt;
:Warning!&lt;br /&gt;
:This type of file can harm your computer! Are your sure you want to download: &amp;lt;nowiki&amp;gt;http://65.222.202.53/~TILDE/PUB/CIA-BIN/ETC/INIT.DLL?FILE=--AUTOEXEX.BAT.MY%20OSX%20DOCUMENTS-INSTANLL.EXE.RAR.INI.TAR.DOCX.PHPHPHP.XHTML.TML.XTL.TXXT.0DAY.HACK.ERS-(1995)-BLURAY-CAM_XVID.EXE.TAR.[SCR].LISTP.MSI.LNK.ZDA.GNN.WRBT.OBJ.O.SWF.DPKG.APP.ZIP.TAR.CO.GZ.OUT.EXE&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:[Two buttons:]&lt;br /&gt;
:Cancel Save&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
[[Category:Comics with color]]&lt;br /&gt;
[[Category:Computers]]&lt;/div&gt;</summary>
		<author><name>Ronf89</name></author>	</entry>

	</feed>