not_IO@lemmy.blahaj.zone to Technology@lemmy.worldEnglish · 2 months agopublic services of an entire german state switches from Microsoft to open source (Libreoffice, Linux, Nextcloud, Thunderbird)euro-stack.comexternal-linkmessage-square253linkfedilinkarrow-up11.57Karrow-down19file-textcross-posted to: [email protected]
arrow-up11.56Karrow-down1external-linkpublic services of an entire german state switches from Microsoft to open source (Libreoffice, Linux, Nextcloud, Thunderbird)euro-stack.comnot_IO@lemmy.blahaj.zone to Technology@lemmy.worldEnglish · 2 months agomessage-square253linkfedilinkfile-textcross-posted to: [email protected]
minus-squaretempest@lemmy.calinkfedilinkEnglisharrow-up53·2 months agoThe hacker community it’s very focused on Linux since most servers in the world run it. The fly by night script kiddies and botnet creators definitely prefer end user systems though.
minus-squareTja@programming.devlinkfedilinkEnglisharrow-up10arrow-down3·2 months agoThis right here. Linux security is so good that the easiest way to break in is via Phishing someone with a windows laptop.
minus-squareLv_InSaNe_vL@lemmy.worldlinkfedilinkEnglisharrow-up2·1 month agoYeah exactly. Nobody actually “hacks” anymore. They just send Pam in accounting a funny email
minus-squareMangoCats@feddit.itlinkfedilinkEnglisharrow-up2·1 month agoThe old jibe was that Windows users are so gullible that they’re just easier to phish.
minus-squareMangoCats@feddit.itlinkfedilinkEnglisharrow-up1·1 month agoThe easiest hacks use social engineering. Much more social to exploit in the end-user arena.
The hacker community it’s very focused on Linux since most servers in the world run it. The fly by night script kiddies and botnet creators definitely prefer end user systems though.
This right here. Linux security is so good that the easiest way to break in is via Phishing someone with a windows laptop.
Yeah exactly. Nobody actually “hacks” anymore. They just send Pam in accounting a funny email
The old jibe was that Windows users are so gullible that they’re just easier to phish.
The easiest hacks use social engineering. Much more social to exploit in the end-user arena.