Skip to content

[Opinion] Unending ransomware attacks are a symptom, not the sickness

Technology
4 4 0
  • 12 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 43 Stimmen
    7 Beiträge
    0 Aufrufe
    X
    https://torrentfreak.com/internet-backbone-provider-hurricane-electric-sues-movie-companies-over-ridiculous-piracy-allegations-200612/ Hurricane Electric gets my vote.
  • 121 Stimmen
    4 Beiträge
    0 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]
  • Microsoft Teams will soon block screen capture during meetings

    Technology technology
    30
    300 Stimmen
    30 Beiträge
    0 Aufrufe
    D
    Well, 'proven wrong' is a bit of a stretch. 'will soon block screen capture' doesn't leave a lot of wiggle room, but also isn't that crazy to read into it that maybe it would block screen capture on the presenters screen... especially if you grant that it might only have control over the teams portion of the screen. I've had it black out windows on my own machine even when not presenting. But further than that, it's not fair to say everything has to be read only from the most or the least charitable viewpoints. Context is a thing and if you're even a little bit familiar with the history of software enshittification, it's reasonable to assume that an uncharitable reading is fair without assuming the app will now melt your computer for spare parts if you try something that is disallowed. 'As shitty as we can get away with' might be a good rule of thumb.
  • 588 Stimmen
    77 Beiträge
    1 Aufrufe
    F
    When a Lemmy instance owner gets a legal request from a foreign countries government to take down content, after they’re done shitting themselves they’ll take the content down or they’ll have to implement a country wide block on that country, along with not allowing any citizens of that country to use their instance no matter where they are located. Block me, I don’t care. You’re just proving that you can’t handle the truth and being challenged with it.
  • Are We All Becoming More Hostile Online?

    Technology technology
    31
    1
    212 Stimmen
    31 Beiträge
    2 Aufrufe
    A
    Back in the day I just assumed everyone was lying. Or trying to get people worked up, and we called them trolls. Learning how to ignore the trolls, and not having trust for strangers on the internet, coupled with the ability to basically not care what random people said is a lost art. Somehow people forgot to give other the people this memo, including the "you don't fucking join social networks as your self". Anonymity makes this all work. Eternal September newbies just didn't get it.
  • 42 Stimmen
    7 Beiträge
    0 Aufrufe
    B
    Yesterday on reddit I saw a photo a patient shot over the shoulder of his doctor of his computer monitor. It had ChadGPT full with diagnosis requests. https://www.reddit.com/r/ChatGPT/comments/1keqstk/doctor_using_chatgpt_for_a_visit_due_to_knife_cut/
  • Microsoft's AI Secretly Copying All Your Private Messages

    Technology technology
    4
    1
    0 Stimmen
    4 Beiträge
    0 Aufrufe
    S
    Forgive me for not explaining better. Here are the terms potentially needing explanation. Provisioning in this case is initial system setup, the kind of stuff you would do manually after a fresh install, but usually implies a regimented and repeatable process. Virtual Machine (VM) snapshots are like a save state in a game, and are often used to reset a virtual machine to a particular known-working condition. Preboot Execution Environment (PXE, aka ‘network boot’) is a network adapter feature that lets you boot a physical machine from a hosted network image rather than the usual installation on locally attached storage. It’s probably tucked away in your BIOS settings, but many computers have the feature since it’s a common requirement in commercial deployments. As with the VM snapshot described above, a PXE image is typically a known-working state that resets on each boot. Non-virtualized means not using hardware virtualization, and I meant specifically not running inside a virtual machine. Local-only means without a network or just not booting from a network-hosted image. Telemetry refers to data collecting functionality. Most software has it. Windows has a lot. Telemetry isn’t necessarily bad since it can, for example, help reveal and resolve bugs and usability problems, but it is easily (and has often been) abused by data-hungry corporations like MS, so disabling it is an advisable precaution. MS = Microsoft OSS = Open Source Software Group policies are administrative settings in Windows that control standards (for stuff like security, power management, licensing, file system and settings access, etc.) for user groups on a machine or network. Most users stick with the defaults but you can edit these yourself for a greater degree of control. Docker lets you run software inside “containers” to isolate them from the rest of the environment, exposing and/or virtualizing just the resources they need to run, and Compose is a related tool for defining one or more of these containers, how they interact, etc. To my knowledge there is no one-to-one equivalent for Windows. Obviously, many of these concepts relate to IT work, as are the use-cases I had in mind, but the software is simple enough for the average user if you just pick one of the premade playbooks. (The Atlas playbook is popular among gamers, for example.) Edit: added explanations for docker and telemetry