• lmmarsano@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    41 minutes ago

    I own you!
    take ownership & full access of all resources
    threat actor exploits a vulnerable application that is (1) running as you to (2) access resources it doesn’t need: they commandeer your system

    how did that happen?

    🤔

    • Shardikprime@lemmy.world
      cake
      link
      fedilink
      arrow-up
      1
      arrow-down
      2
      ·
      31 minutes ago

      I don’t know what’s the hate with edge, it works wonderfully for an average user, it’s fully configurable with add-ons and handles security policies really well

      The AI integration might be a bit over the top but nothing you can’t disable in your side

      Really I don’t see why you guys pile on so much on it

    • b000rg@midwest.social
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 hour ago

      Can you delete Xbox games installed by another administrator? I ran into that problem a few years ago because I reinstalled W10 and had it keep “personal files” which apparently included my Xbox games. I couldn’t touch them at all, but I had W10 Home. I wonder if my problem could’ve been mitigated more easily than a full wipe of the drive? 🤔

      • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 @pawb.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        58 minutes ago

        I’m pretty sure I can. It just takes a little more effort actually going into the permissions tab of the files because Windows doesn’t have an equivalent to CHMOD AFAIK.

        Though, I am pretty sure you can do those basic permission options without Pro or Enterprise. You just need to be on an administrator account. Other things, like messing with actual system files, requires the Group Policy Editor.

        • floquant@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          1
          ·
          55 minutes ago

          On any Windows system based on the NT kernel (XP+), there’s an additional access level above “Administrator”: NT Authority\SYSTEM. Some malware can make files hidden or write protected even to Administrator, and afaik there isn’t a legitimate way to obtain that authority

  • Passerby6497@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    7 hours ago

    My work laptop had a pop-up from an application that basically said “we couldn’t restart last time, so you e got 15 minutes until we reboot your computer” with no way to cancel or prevent the reboot.

    Me: the fuck you are

    * proceeds to kill the service and process from admin command line*

    Get fucked fortinet, I’ll reboot when I’m gods damned ready

  • GreenKnight23@lemmy.world
    link
    fedilink
    arrow-up
    17
    ·
    7 hours ago

    had a friend that was having problems with his PC and windows kept bitching about he didn’t have permissions. he ripped out the harddrive with it still powered on and threw it off his balcony into the lake screaming, “I fucking own you!”

    epic moment in my life to witness such an event.

    • Cort@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      6 hours ago

      Lol, I had arch tell me that literally last night while I was updating Nvidia drivers. Just reopened dolphin as admin and deleted what I needed to.

  • Zink@programming.dev
    link
    fedilink
    arrow-up
    10
    ·
    8 hours ago

    Ah ah ah! You didn’t say the magic word!

    sudo edit the file!

    Ah ah ah! You didn’t say the secret word right after!

  • chonglibloodsport@lemmy.world
    link
    fedilink
    arrow-up
    10
    arrow-down
    2
    ·
    7 hours ago

    Think about this: let’s say you run a program. Do you want that program to be able to take over the computer and read all your files from now on and send the data to a remote third party?

    Probably not.

    Permissions were created to stop programs from doing that. By running most software without admin permissions you limit the scope of the damage the software can cause. Software you trust even less should be run with even fewer permissions than a normal user account.

    The system is imperfect though. A capability-based system is better. It allows the user to control which specific features of the operating system a running program is allowed to access. For example, a program may request access to location services in order to access your GPS coordinates. You can deny this to prevent the program from tracking you without otherwise preventing the software from running.

    • dbx12@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      2 hours ago

      You forgot the fact that there might be other people using the same computer and they shouldn’t be able to access the others files.

      • chonglibloodsport@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        2 hours ago

        No I didn’t. Most computers on the planet (phones, tablets, laptops) have only 1 user. The whole multi-user system isn’t obviously useful for these computers.

        Everyone knows that multiple user accounts need permissions to prevent users from accessing each other’s files. I didn’t bring it up because it was too obvious.