RagingNerdoholic

joined 2 years ago
[–] RagingNerdoholic@lemmy.ca 92 points 2 years ago* (last edited 2 years ago) (4 children)

Well, would you look at that, it's playing out exactly the same as every other technological advancement ever. Instead of using it to reduce employee workloads and maintain an equilibrium of output, it exploits them by brute-forcing increased productivity with no changes to compensation and the capitalists hoard even more of the profits for themselves.

[–] RagingNerdoholic@lemmy.ca 55 points 2 years ago (23 children)

Windows 11 is just Windows 10 with rounded corners, shittier menus, and even more spyware.

[–] RagingNerdoholic@lemmy.ca 2 points 2 years ago

He looks like Matt Berry's grumpy twin.

[–] RagingNerdoholic@lemmy.ca 1 points 2 years ago

It's better to run your own server anyway, and it's pretty easy to setup if you have tech experience.

[–] RagingNerdoholic@lemmy.ca 1 points 2 years ago

Absolutely. Use an efficient disk imager that can take incremental snapshots and you can keep backups for months or years without needing a ton of storage.

[–] RagingNerdoholic@lemmy.ca 1 points 2 years ago

I ran it June before the appocalypse

[–] RagingNerdoholic@lemmy.ca 2 points 2 years ago

If it ends up not being the culprit, kinda yeah. I'm just saying, try some less disruptive troubleshooting first.

[–] RagingNerdoholic@lemmy.ca 2 points 2 years ago (1 children)

I can't believe Dwight didn't go for it, she's a straight up hottie

[–] RagingNerdoholic@lemmy.ca 0 points 2 years ago* (last edited 2 years ago)

True, but I would confirm a device is compromised before nuking the OS, not just do it willy-nilly because maybe it could be. A better way to phrase what OP is asking is: what are some ways to troubleshoot this without making a ton of potentially unnecessary work for myself?

...to which I would say, run a netstat on any systems that you can, check those IP's against WHOIS and/or traceroute. Anything that traces to Eastern Europe, Russia, China, most of SEA is a red flag. Dig a little deeper with Wireshark or Glasswire to inspect some actual packets for suspicious content. I think there's a network logger that can trace the process using a given connection, but the name eludes me).

Find your smoking gun, then torch the OS.

[–] RagingNerdoholic@lemmy.ca 5 points 2 years ago

I think you meant Britnied Speared.

view more: ‹ prev next ›