You're right, that sounds better than the average HR rep.
r00ty
The activities the program is said to engage in include constantly resetting the user's web browser homepage to bonzi.com without the user's permission, prompting and tracking various information about the user, installing a toolbar, and serving advertisements
Looks to me like they taught Microsoft well in this area.
Yeah. But they'll likely make Azure Recall running on their own AI hardware. You'll have to opt out (on every windows update) of their ad driven free model that uses your data to target ads, and sell your overall profile on.
Well the malware authors of yore could have gotten away with it, so long as they attached their malware to an even slightly useful program, added an EULA that was 40 pages long and on one of those pages mentioned the malware and had no way to use the software without agreement.
I remember moving to mumble from teams peak because it allowed pretty cool levels of configuration.
Back in the late 00s and early 00s I was doing world of warcraft raiding. I had the server setup to have one key for main raid and another to talk to only officers. Quite useful especially in bigger raids.
Also as I recall for any remotely large ts server you needed to pay. The self hosted one was always gimped. Mumble you could self host with no limits.
This would only happen if you tried to delid the quantum CPU. So, not only is it bricked, but you also voided the warranty!
https://sh.itjust.works/pictrs/image/496be8dc-fb62-4965-ba27-30335cfbb0ee.jpeg
Can't trust curses these days. If you want something done, you gotta do it yourself.
Yes, I don't agree with the no way to mitigate statement.
I suspect on windows the only real defence is something like.
- Check if the network has suspicious multiple routes setup from the DHCP
- If so, either use the IP/Mask/Gateway with manual IP config (to not receive the CIDR routes) or steer clear of an at best questionable network entirely.
- Maybe use the windows firewall to block all traffic outbound EXCEPT from the firewall program (with perhaps exceptions for local networks as per below linux example). For whatever reason the windows firewall doesn't seem to have a way to specify an interface. But you can specify a program.
I did look for some way to control Window's handling of DHCP options. But it seems there isn't anything obvious to limit this otherwise. I do not know if the windows firewall has this kind of fine-grained control with its own fire
For linux, I used to have my own blackout firewall rules. That only allowed the specific LAN range (for mobile use you could include all RFC1918 ranges) and the specific VPN IP out of the internet facing interface. Only the VPN interface could otherwise access the internet.
If no-one pirated any Sony game do you think they would.
A) Lower the price of the game to maintain their existing profit margin.
B) Set a lower price that increases their margin.
C) Keep the higher price and just make a fuck ton more money.
I would agree. It's useful to know all the parts of a GNU/Linux system fit together. But the maintenance can be quite heavy in terms of security updates. So I'd advise to do it as a project, but not to actually make real use of unless you want to dedicate time going forwards to it.
For a compiled useful experience gentoo handles updates and doing all the work for you.
Pretty sure I read this book a few years ago. It was called Jennifer government.
Kinda on brand though somehow.