396
submitted 1 year ago by [email protected] to c/[email protected]
top 26 comments
sorted by: hot top controversial new old
[-] [email protected] 44 points 1 year ago

Guest network on a separate VLAN is the way to go.

[-] [email protected] 5 points 1 year ago

This is the way.

[-] [email protected] 18 points 1 year ago

I see we are still living in 1999.

[-] [email protected] 5 points 11 months ago

my joints are telling me otherwise

[-] [email protected] 2 points 11 months ago

I went on a trampoline with my kid and my knees are still shaking 2 days later....

[-] [email protected] 17 points 1 year ago

I ain't no IT expert but what are some things a vulernable windows computer can do?

[-] [email protected] 31 points 1 year ago* (last edited 1 year ago)

In general, a compromised system may be running any software the attacker might find useful, including, but not limited to:

  • keyloggers to find passwords that are in use in the company
  • software to copy sensitive files to a remote server
  • software to encrypt the system itself or (if the computer has access to other machines on the network) other computers
  • produce documents (think, mail) that purport to have been created by the user of the corrupted machine.
[-] [email protected] 20 points 1 year ago* (last edited 1 year ago)

The users tend to be less tech savvy than Linux users so they tend to not have adblockers and or allow arbitrary JavaScript from any page to run and or they are running trojanized software because the uploader was "trusted".

Due to market share they are the biggest target.

Untrusted devices should be on an isolated subnet or if you have the time only devices that need to talk to each other should be on the same subnet.

[-] [email protected] 23 points 1 year ago* (last edited 1 year ago)

In an ecosystem where the solution to every problem is “Download this piece of software someone wrote because the standard Windows utilities are worse than useless and don’t provide this basic functionality”, you can’t really blame the users for running every script they encounter uncritically.

[-] [email protected] 15 points 1 year ago

I don't blame them, as you say it is the software ecosystem itself.

[-] [email protected] 14 points 1 year ago

Windows PCs often carry viruses that can try to compromise other parts of your network. They are also a privacy concern in a big way especially after windows 10.

[-] [email protected] 7 points 1 year ago

Well block all Microsoft website on your routers firewall

[-] [email protected] 11 points 1 year ago
[-] [email protected] 5 points 1 year ago

Well I don't see what the problem is…

[-] [email protected] 3 points 1 year ago

You must have winshit nightmares.

[-] [email protected] 1 points 11 months ago

Call me dumb, but... to me that just sounds like an insecure network, labeled "secure" as long as someone physically guards all the ethernet ports

load more comments
view more: next ›
this post was submitted on 09 Jul 2023
396 points (92.7% liked)

linuxmemes

19717 readers
511 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS