Linuxmemed@lemmy.world to linuxmemes@lemmy.world · 1 year agoI didn't do anythinglemmy.worldimagemessage-square2fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1imageI didn't do anythinglemmy.worldLinuxmemed@lemmy.world to linuxmemes@lemmy.world · 1 year agomessage-square2fedilink
minus-squareauwa@lemmy.mllinkfedilinkarrow-up1·1 year agoI ain’t no IT expert but what are some things a vulernable windows computer can do?
minus-squarebleistift2@feddit.delinkfedilinkEnglisharrow-up1·edit-21 year agoIn general, a compromised system may be running any software the attacker might find useful, including, but not limited to: keyloggers to find passwords that are in use in the company software to copy sensitive files to a remote server software to encrypt the system itself or (if the computer has access to other machines on the network) other computers produce documents (think, mail) that purport to have been created by the user of the corrupted machine.
I ain’t no IT expert but what are some things a vulernable windows computer can do?
In general, a compromised system may be running any software the attacker might find useful, including, but not limited to: