Lorem ipsum

      • shortwavesurfer@monero.town
        link
        fedilink
        English
        arrow-up
        9
        ·
        8 months ago

        Why not relegate Windows to a VirtualBox environment? That way you can just turn it off when you’re not using it and not need to reboot. You can use the guest additions and everything to get your proper native screen resolution and pass through USB devices etc.

      • AmbiguousProps@lemmy.today
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        8 months ago

        You can also get a KVM (and second machine) and keep them fully seperate that way. Some rootkits may still be able to infect both of your installs if you dual boot. Just depends on your paranoia level.

  • ivn@jlai.lu
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    8 months ago

    This is the first time you noticed you caught a malware. I wouldn’t be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.

  • Entropywins@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    8 months ago

    You can be the most diligent, tech-savvy, cyber warfare general of nato and all it takes is one second of not thinking and a click…

    • Sabata11792@kbin.social
      link
      fedilink
      arrow-up
      4
      ·
      8 months ago

      I totally never accidentally fell for the spam awareness email at Monday at 8am before my caffeine to hangover ratio was balanced while being the admin.

  • cmnybo
    link
    fedilink
    English
    arrow-up
    9
    ·
    8 months ago

    Was it an actual zip file that managed to exploit some vulnerability in the program that opened it or was it something like “filename.zip.exe” and windows hid the .exe part?

  • IllNess@infosec.pub
    link
    fedilink
    English
    arrow-up
    5
    ·
    8 months ago

    Thanks for sharing. Sorry that happened to you and hope you got everything back in order.

    Was it an .exe file that looked like a zip file that you opened? Or was there an executable in the zip file?

  • Bipta@kbin.social
    link
    fedilink
    arrow-up
    4
    ·
    8 months ago

    This might have been avoidable using a software firewall that doesn’t defacto allow outbound connections.

    That’s a big maybe.

  • Quacksalber@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    ·
    8 months ago

    And here I am, emailing password protected zip files to people when the documents are not to be scanned by my mail provider.

  • Habahnow@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 months ago

    Wait so you were logged into sensitive accounts? If you weren’t, then your accounts wouldn’t have been as compromised?