Hi everyone! I’ve recently got my first ever Mac, it’s a MacBook Air M1 (16 GB). My question is about malware, viruses and things like that. So, I’ve managed to create a VM of a MacBook Air M1 (8GB) with the same OS as the main machine on an external SSD, not logged into Apple and no personal information saved, not even accessibility to the keychain. My plan for this was to run suspicious apps, visit suspicious sites, basic stuff. The main machine is connected to the iCloud Private Relay, the VM isn’t. My question is: if this virtual machine was to be hacked, infected by something or gained remote access or something, could the main machine be effected in any way? Could I be affected by any means?

4
4

When I’m working from home with the company laptop (has Cisco software and everything) and I use my own personal iPhone (with private relay) as a hotspot, can the employer see what I do on my phone? Like browsing social media, watching videos and stuff

12
2

I had an argument with an IT professor I know regarding passwords and security. I was mad about my in-laws having a weak WPA1 protected router and the stock password while I insist on having WPA3 and a very strong passphrase. Well, the discussion continued and later he said something to the point of “everything tries to guess your password, so I don’t have any where it is possible, because the programs don’t know what to do if there isn’t one“ What are your opinions about this?

7
10
A question about the CCleaner
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    FinancesDrone98
    Now 100%

    Yes… the part of the course I am at right now is about encryption on windows. I just skipped how they expained encrypting your HDD with veracrypt… that’s sad… windows itself lets you encrypt stuff natively…

    Edit: now they encrypt it with bitlocker… like a whole 10 minutes of showing that…

    1
  • A question about the CCleaner
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    FinancesDrone98
    Now 100%

    Yeah I’m not going to use it. I used it once back in the days, but never since because it fucked up everything. It’s just, I paid for a cyber security course that’s all about how you can be safe, and then they throw NordVPN and CCleaner onto you in 2023 and I just… I’ve learned a lot about networking and security in this course and then that?

    2
  • Hello world! It's me again with a question! So, I remember back in the days of WinXP and Vista when we had the CCleaner or CCCleaner. I recently watched a YouTube video about some guy stating that it is so good and the best thing you can use today. If I recall correctly, didn’t they get compromised like 7 times already and switched owners a couple of times? Same guy talked about NordVPN being so cool and stuff but a friend of mine found some software of them on his server, I don’t remember what kind, probably some tracker or adware, and since the incident happened around the time everyone started to get sponsored by them, I don’t really trust VPNs.

    15
    13
    Learnable Programming (Blog from 2012)
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    FinancesDrone98
    Now 100%

    I love the use of the female pronouns instead of he/she. Makes the text easier to read without triggering feminists. Anyway, I’m about halfway through and had to say this: This is the problem with nearly everything. You’re just told what and how it does but not why. I recently had a data-protection schooling at work and made some notes. Like they tell you that “social engineers“ manipulate you into giving them data (not to stick usb sticks you don’t know from some people into your PC, all the stuff you’re familiar with) but not how they obtain data.

    5
  • IBM’s generative AI tool aims to refactor ancient COBOL code for its mainframes
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    FinancesDrone98
    Now 100%

    I mostly use A.I. to translate. ChatGPT gets that done it gets it done pretty good, especially when you say “translate this mandarin text into English. I don’t care if it is somewhat inaccurate, just do it as best as you can.“

    1
  • A question about passwords | characters used in them
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    FinancesDrone98
    Now 100%

    My mother’s password for everything got compromised recently. I told her to think of a sentence that will never happen and to write it down and store it somewhere safe.

    She remembered it instantly.

    Oh, and I made her a password manager

    3
  • Why do so many companies and people say that your password has to be so long and complicated, just to have restrictions? I am in the process of changing some passwords (I have peen pwnd and it’s the password I use for use-less-er sites) and suddenly they say “password may contain a maximum of 15 characters“… I mean, 15 is long but it’s nothing for a password manager. And then there’s the problem with special characters like äàáâæãåā ñ ī o ė ß ÿ ç just to name a few, or some even won’t let you type a [space] in them. Why is that? Is it bad programming? Or just a symptom of copy-pasta?

    85
    63
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearFI
    Now
    6 28

    FinancesDrone98

    programming.dev