miss margo got a update. only felt appropriate to take some cute pictures to show of her new look 🤠
@pixelevia
miss margo got a update. only felt appropriate to take some cute pictures to show of her new look 🤠
@pixelevia
leila decided she wanted to really step out of her comfort zone today, so again choose to ignore everyone and read.
too much choice apparently = frustration 😤
@pixelevia
a photoshoot felt appropriate to commemorate their date together <3
@pixelevia
On May 3rd, Google released 8 new top-level domains (TLDs) -- these are new values like .com, .org, .biz, domain names. These new TLDs were made available for public registration via any domain registrar on May 10th.
Usually, this should be a cool info, move on with your life and largely ignore it moment.
Except a couple of these new domain names are common file type extensions: ".zip" and ".mov".
This means typing out a file name could resolve into a link that takes you to one of these new URLs, whether it's in an email, on your tumblr blog post, a tweet, or in file explorer on your desktop.
What was previously plain text could now resolve as link and go to a malicious website where people are expecting to go to a file and therefore download malware without realizing it.
Folk monitoring these new domain registrations are already seeing some clearly malicious actors registering and setting this up. Some are squatting the domain names trying to point out what a bad idea this was. Some already trying to steal your login in credentials and personal info.
This is what we're seeing only 12 days into the domains being available. Only 5 days being publicly available.
What can you do? For now, be very careful where you type in .zip or .mov, watch what website URLs you're on, don't enable automatic downloads, be very careful when visiting any site on these new domains, and do not type in file names without spaces or other interrupters.
I'm seeing security officers for companies talking about wholesale blocking .zip and .mov domains from within the company's internet, and that's probably wise.
Be cautious out there.
A malicious actor sets up a page with an auto-downloader squatting on a domain name that matches a common zip file name like photos DOT zip. This website is set up to start an auto downloader upon being visited, downloading a zip file with the same name as the URL which contains malicious software (virus, worm, keylogger, etc).
Scenario.
Someone you know well sends you an email or text with promised photos attached. The email even reads something like this.
Because .zip is now a TLD, that plain text is automatically formatted into a link to malicious actor's website without them having to send you anything.
Folk with family with iPhones or iPads that are sent multiple photos in one go might be familiar with iCloud's tendency to automatically compile them into zip file for the sender and less savvy tech users have trouble NOT doing that.
These same less savvy users, or even just someone just not thinking in the moment, will click that .zip link, not realizing it isn't the the same as clicking on the promised attachment.
They download a file that matches the name they expected. They open it because they were expecting that file and it's from a trusted source. Except the file they downloaded isn't the one that was sent by their trusted source and now they have malware.
Another Scenario.
An IT person tries to send you an email with instructions on how to resolve a problem with a commonly used filename like install-repair DOT zip or to install new software like microsoft-office DOT zip.
The email may start with instructions of where to go get the legitimate file to do the install or repair, but now a line later in the instructions is also has a link to a .zip URL. A user, already frazzled by IT problems, may click it to ensure they have the right file. Again, they download malicious code from a squatting website or it prompts them with a fake login and now the squatting website has stolen their login credentials for a legitimate site. All due to an expected email from a trusted source.
Above you can see microsoft-office DOT zip is already out there with a fake Microsoft login screen waiting to steal your credentials.
These risks are already out there now because the TLD has been activated.
Plain text on old post are already being resolved into links to the new websites.
Here you can see a tweet from 2021, long before .zip was a domain name, now resolves that plan text into a clickable link. You'll start seeing this everywhere, and malicious actors do not have to lift a finger to send it to you.
Yes, a lot of users aren't going to click that, but a lot of folk will. Whomever is squatting on photos DOT zip domain name has made a one time payment to have access to anyone that ever sees that file name typed out.
In an example of an existing squatter site, clientdocs DOT zip is exactly one such pre-setup .zip domain name that initiates an automatic download. This one may be harmless, but the set ups are already out there and waiting to catch folk.
It's an unnecessary and risky can of worms that's been opened up.
Holy Unforced Errors, Batman.
This is about to be very important in the sims community, given how many mods and cc are formatted as .zip files and what an issue malware and data collection can already be. Anyone using .zip mods should be on the lookout for this ASAP, and if possible protest Google doing this.
Tagging some other sims blogs I know to spread it around if you want!
I’m at work rn and it’s dead so I will be answering these. Thanks for tagging me @pixelatedpretties and @hazely-sims!
contestant number one, leila brower <3
many thanks to my absolute darlin’ @pixelevia for this gorgeous lady!
leila’s traits:
also we need to take a moment to appreciate that mel really pulled through for me with this challenge. she gave me four sims to choose from?! how’d I get so lucky! another reason why I just love her sm!! ♡
Kodi & Dylan Foster-Horne
Can you tell I got WAY ahead of myself making Margo & Leo’s children🤠.
day one seemed like a good day to change my game settings so everyone can have high free will, and just sit back and watch the chaos unfold…
(it started with a fire breaking out on their home lot.. they can’t even go home?? they’re trapped inside the campsite?🤠)
leila, kody & nellie all decided to toast some marshmallows which was kinda wholesome!!
.. kody was the only one to burnt his
@pixelevia @smallsimmer
Did u know that TheSims3 has on an algorithm that provides colors that are visually appealing to the eye? After selecting the palette of your choice, click on the color to receive improved variations. This has been here since 2009!! Check the video and share <3
What?!
It’s been 14 years, and ts3 is still genius. Periodt.
Whoa
Mai's apartment, brought to you by Create-a-Style Tool.
Flower delivery 🌸🌼
@pixelevia
Introducing my lovely bachelorette, Nellie Meyer!
I’ve had Nel sat in my game for a LONG time. She recently got an update and she is in desperate need of some loving.
I figured the best way to do this was to host a bachelorette challenge to help her find her one true love!
It’s only going to be small (6 slots) as I have limited free time and don’t want to abandon it halfway through lol
Pls send me a message / comment if you want to send a sim over to participate! Nellie is open is either male or female counterparts, so the ball is in your court!
** also pls if you’re sending a sim, send them as a package file and link me their necessary genetic cc, thnks xx **
1. reserved for @pixelevia 🤠
2. @smallsimmer
4.
5.
6.
I will update this post as and when they’re filled <3
Bestie is hosting a BC! You guys should join!!
Kodi Foster-Horne
@pixelevia
They hit it off so well Leo walked Margo home.
He wanted to make sure she got home safe... and it gave him an opportunity to ask her on a date. (っ◔◡◔)っ ❤
Margo & Leo spent the whole evening talking & getting to know one another.
Sometimes unexpected company can be the best company (¬‿¬)
@pixelevia