partyparrot@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 1 year agomalwar(ul)elemmy.blahaj.zoneimagemessage-square15fedilinkarrow-up1576arrow-down10
arrow-up1576arrow-down1imagemalwar(ul)elemmy.blahaj.zonepartyparrot@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 1 year agomessage-square15fedilink
minus-squarewifi enyabled cat@beehaw.orglinkfedilinkarrow-up12·1 year agoits not uncommon for work computers to completely dosable usb storage capabilities, so plug them in your personal computer if thats the case for you :3
minus-squareCephalonKappa@discuss.tchncs.delinkfedilinkarrow-up4·1 year agoThat wont stop most attacks tho. A lot of them work by pretending to be a keyboard and typing out the exploit in a cmd prompt.
minus-squareHyggyldy@sffa.communitylinkfedilinkEnglisharrow-up3·1 year agoApparently our systems send an alert to IT and I think we get a call if an unapproved device is plugged in.
its not uncommon for work computers to completely dosable usb storage capabilities, so plug them in your personal computer if thats the case for you :3
That wont stop most attacks tho. A lot of them work by pretending to be a keyboard and typing out the exploit in a cmd prompt.
Apparently our systems send an alert to IT and I think we get a call if an unapproved device is plugged in.