

Packages offered here are subject to distribution rights, which means they may need to reach out further to the internet to the official locations to download files at runtime.įortunately, distribution rights do not apply for internal use. If you are an organization using Chocolatey, we want your experience to be fully reliable.ĭue to the nature of this publicly offered repository, reliability cannot be guaranteed.

This includes video or movies downloaded from torrent sites or websites that promote pirated content, or even shared by someone on a pen drive (since you can't make out whether the source of download for that file is trustworthy). Sure, vulnerabilities exist, but what to do when you desperately need to play a video? If you wish to stay safe, just don't play video files from untrusted sources and you're pretty much good to go. Image Courtesy: Reuters VLC Vulnerability: How To Stay Safe? Something similar has happened with VLC in the past as well, but this time the situation seems more grave. VLC has been working on a fix to this glitch for a few weeks now. Surprisingly, no hacker has taken advantage of this glitch as of now.

This issue was spotted on the latest versions of VLC running on Windows, Linux and Unix-based systems. So if you're someone who downloads videos or movies illegally using torrentsor through other untrusted sources (which you shouldn't be doing in the first place), you sit right in the centre of the crosshairs.

How Hacker Gains Access Through VLC Player?Īccording to the discovery by CERT-Bund, a malicious MKV video file is all a hacker needs to gain access to one's computer.
