this post was submitted on 09 Jul 2023
367 points (92.8% liked)

linuxmemes

21304 readers
1918 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 1 year ago
    MODERATORS
     
    top 26 comments
    sorted by: hot top controversial new old
    [–] crossover@lemmy.world 40 points 1 year ago (1 children)

    Guest network on a separate VLAN is the way to go.

    [–] daFRAKKINpope@lemmy.world 5 points 1 year ago

    This is the way.

    [–] vulnerability@lemmy.ml 16 points 1 year ago (3 children)

    I ain't no IT expert but what are some things a vulernable windows computer can do?

    [–] bleistift2@feddit.de 27 points 1 year ago* (last edited 1 year ago)

    In general, a compromised system may be running any software the attacker might find useful, including, but not limited to:

    • keyloggers to find passwords that are in use in the company
    • software to copy sensitive files to a remote server
    • software to encrypt the system itself or (if the computer has access to other machines on the network) other computers
    • produce documents (think, mail) that purport to have been created by the user of the corrupted machine.
    [–] JoeKrogan@lemmy.world 17 points 1 year ago* (last edited 1 year ago) (1 children)

    The users tend to be less tech savvy than Linux users so they tend to not have adblockers and or allow arbitrary JavaScript from any page to run and or they are running trojanized software because the uploader was "trusted".

    Due to market share they are the biggest target.

    Untrusted devices should be on an isolated subnet or if you have the time only devices that need to talk to each other should be on the same subnet.

    [–] bleistift2@feddit.de 20 points 1 year ago* (last edited 1 year ago) (1 children)

    In an ecosystem where the solution to every problem is “Download this piece of software someone wrote because the standard Windows utilities are worse than useless and don’t provide this basic functionality”, you can’t really blame the users for running every script they encounter uncritically.

    [–] JoeKrogan@lemmy.world 15 points 1 year ago

    I don't blame them, as you say it is the software ecosystem itself.

    [–] Sneptaur@pawb.social 11 points 1 year ago

    Windows PCs often carry viruses that can try to compromise other parts of your network. They are also a privacy concern in a big way especially after windows 10.

    [–] redditcunts@lemmy.world 12 points 1 year ago (1 children)

    I see we are still living in 1999.

    [–] InterestFreeBread@lemmy.srcfiles.zip 5 points 1 year ago (1 children)

    my joints are telling me otherwise

    [–] redditcunts@lemmy.world 2 points 1 year ago

    I went on a trampoline with my kid and my knees are still shaking 2 days later....

    [–] vicfic@iusearchlinux.fyi 5 points 1 year ago (1 children)

    Well block all Microsoft website on your routers firewall

    [–] Pfnic@feddit.ch 5 points 1 year ago

    Well I don't see what the problem is…

    [–] mod_pp@lemmy.world 3 points 1 year ago

    You must have winshit nightmares.

    [–] nilclass@discuss.tchncs.de 1 points 1 year ago

    Call me dumb, but... to me that just sounds like an insecure network, labeled "secure" as long as someone physically guards all the ethernet ports

    load more comments
    view more: next ›