this post was submitted on 09 Nov 2023
1348 points (98.7% liked)

Memes

45689 readers
701 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 0 points 1 year ago (8 children)

Time? You just set it to scan every host on your Active Directory. It's like a ten minute setup and spits out a report when you're done.

Yeah, you're definitely the guy they hate but don't get paid enough to fight. Security risks users are usually too much of a pain to deal with so we just tell our supervisors that you'll end up ransomware'ing the company one day and let them handle it from there if they care enough.

[–] [email protected] 3 points 1 year ago (7 children)

Well, IMO the real security problem is forcing all the people who want to be part of Montreal's largest university to give all their personal data to a shitty, delinquent, soulless company like Microsoft. The stupid 2FA application is also a huge discriminating factor, preventing anyone who doesn't have a compatible phone from studying at our university. But now MS have the phone # of 98% of our community. Did you know that the ms 365 suite has literally been banned from academic institutions in Germany, due to security concerns? On our side, we pay millions every year to this company for dysfunctional services for which free, secure alternatives exist. Universities shouldn't be on their knees to big business, that's what I think, and no, I don't feel any guilt about using secure open-source software.

[–] [email protected] 0 points 1 year ago (6 children)

It's not secure if the user installing the software doesn't understand network security at all (which you don't, and admitted) you seem to think security is an issue with your personal data being harvested whereas I'm talking about actual security like threat actors hacking into your storage arrays to encrypt or steal information.

But it's fine, I'll take my ten years doing security analysis and network engineering and go. Clearly you're an IT expert since you can install Linux.

This place is full of people like you, who think they understand the way things work but are focused on big scawy Microsoft meanwhile installing god knows fucking what from god knows fucking where. I use Linux and love it, but script kiddies like you are the bain of actual IT professionals existence.

load more comments (5 replies)
load more comments (5 replies)
load more comments (5 replies)