this post was submitted on 09 Jul 2023
1 points (100.0% liked)

linuxmemes

20686 readers
925 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
top 11 comments
sorted by: hot top controversial new old
[–] 14th_cylon@lemm.ee 0 points 1 year ago (1 children)

it probably wasn't very secure network if anyone can join and cause this. so instead of being misogynistic moron, you could spend some more time on improving your security.

[–] bleistift2@feddit.de 0 points 1 year ago (1 children)

So now it’s misogynistic to identify a girl on a picture or an unnamed person in an anecdote as “she”?

[–] 14th_cylon@lemm.ee 0 points 1 year ago* (last edited 1 year ago) (2 children)

no, it is misogynistic to draw a picture where she is the incompetent user causing problem and he is the brave security engineer whom she has to beg for forgiveness.

when it is in fact his shitty security that is root of the problem, because users will be users, no matter what gender. so it is the "hero" of this magnum opus who is really the incompetent one. do you understand how laughingly pathetic that is? bragging about your "secure network" when one user with windows can burn it to the ground?

[–] emergencyfood@sh.itjust.works 0 points 1 year ago (1 children)

Sir this is a meme.

And this meme format has a girl, hence 'she'.

[–] 14th_cylon@lemm.ee 0 points 1 year ago (1 children)

that doesn't change single word in my argument

[–] bleistift2@feddit.de 0 points 1 year ago

Your argument is based on at least two shaky assumptions.

[–] bleistift2@feddit.de 0 points 1 year ago

he is the brave security engineer

You made that up. OP never said they were male.

she has to beg for forgiveness.

You made that up, too.

users will be users

They will be. And in this case the offending user appears to be female. They are allowed to touch computers these days, didn’t you know?

[–] vulnerability@lemmy.ml 0 points 1 year ago (2 children)

I ain't no IT expert but what are some things a vulernable windows computer can do?

[–] bleistift2@feddit.de 0 points 1 year ago* (last edited 1 year ago)

In general, a compromised system may be running any software the attacker might find useful, including, but not limited to:

  • keyloggers to find passwords that are in use in the company
  • software to copy sensitive files to a remote server
  • software to encrypt the system itself or (if the computer has access to other machines on the network) other computers
  • produce documents (think, mail) that purport to have been created by the user of the corrupted machine.
[–] JoeKrogan@lemmy.world 0 points 1 year ago* (last edited 1 year ago) (1 children)

The users tend to be less tech savvy than Linux users so they tend to not have adblockers and or allow arbitrary JavaScript from any page to run and or they are running trojanized software because the uploader was "trusted".

Due to market share they are the biggest target.

Untrusted devices should be on an isolated subnet or if you have the time only devices that need to talk to each other should be on the same subnet.

[–] bleistift2@feddit.de 0 points 1 year ago* (last edited 1 year ago)

In an ecosystem where the solution to every problem is “Download this piece of software someone wrote because the standard Windows utilities are worse than useless and don’t provide this basic functionality”, you can’t really blame the users for running every script they encounter uncritically.