I’ve told qbit to exclude those files and many other extensions from someone’s helpful comment on here previously, but the stack keeps on grabbing and seeding them, which the latter I’m a little unhappy about sharing malware.
While all the boxes on my network have no sign of Windows to get exploited it does worry me about another family members arrr stack because there is a Windows laptop down there, but thankfully not used for media consumption.
Help?
edit: big thanks to [email protected] for pointing me in line separators instead of comma separated exclusions!
According to some posts online you should use pattern matching to exclude filetypes. “*.ink” should match any file ending in “ink”. Exclusions should be separated by a newline.
Separated by a newline
You brilliant person got it in one! Love you 😘
https://files.catbox.moe/tda0my.jpg
Now I haven’t tested which of the line separated ones blocked it, but the wildcard *.lnk didn’t work when they were comma separated but do when line separated.have tested, and these are the most common so far I’ve seen*.lnk
*.scr
*.arj
*.zipx
*.exe
*.cmd
*.msi
*.bat
*.scf
Again, 👌
Aye, I have them all from that previous discussion about it but noticed it wasn’t working because noobie here didn’t think of line separators.
I wonder if there’s a way of making qbit notifying users they need to be that way 🤔