09-06-2024, 03:36 PM
Default permissions on ANY file created on any microsoft platform are u=rwx,g=rwx,o=rwx (anybody can read, write and execute the file (search, if a directory/folder). That is what you received on the CD, and loaded on your MacOS machine. That README file was an executable shell script; when you double-clicked it, it was opened and EXECUTED (see permissions above). Not a good choice when dealing with any non-MacOS file.
As Diana said, you could right-click and OPEN the file in a text editor (TextEdit.app is default) and read the contents before committing the execution. I have some idea what went on, but the shell script could have modified/replaced/removed itself before exiting. The same behavior is exhibited by many of the exploits seen in the wild on most non-MacOS/Unix/Linux (looking at YOU micro$oft).
If you feel like copy/pasting the script into a reply, I could take a look at it.
(P.S. I hope the calcium scoring results were OK for you, regardless)
As Diana said, you could right-click and OPEN the file in a text editor (TextEdit.app is default) and read the contents before committing the execution. I have some idea what went on, but the shell script could have modified/replaced/removed itself before exiting. The same behavior is exhibited by many of the exploits seen in the wild on most non-MacOS/Unix/Linux (looking at YOU micro$oft).
If you feel like copy/pasting the script into a reply, I could take a look at it.
(P.S. I hope the calcium scoring results were OK for you, regardless)