F5F Stay Refreshed Software Operating Systems Checking the USB installation process. Could it be a potential threat?

Checking the USB installation process. Could it be a potential threat?

Checking the USB installation process. Could it be a potential threat?

Pages (2): Previous 1 2
S
Salty_Cactus1
Member
205
03-06-2023, 01:31 PM
#11
In reality, the process involves a toolkit that executes a script during installations.
S
Salty_Cactus1
03-06-2023, 01:31 PM #11

In reality, the process involves a toolkit that executes a script during installations.

C
CelticGila
Senior Member
454
03-09-2023, 03:43 PM
#12
Absolutely, that's correct—I chose "highly unlikely" to convey the intended meaning more precisely.
C
CelticGila
03-09-2023, 03:43 PM #12

Absolutely, that's correct—I chose "highly unlikely" to convey the intended meaning more precisely.

L
lobetta333
Member
164
03-25-2023, 11:38 AM
#13
It's a completely customized solution. You're absolutely right—it's similar to using two condoms, which isn't ideal or reliable. It just feels like a bad comparison. Avoid this approach, as it could fail.
L
lobetta333
03-25-2023, 11:38 AM #13

It's a completely customized solution. You're absolutely right—it's similar to using two condoms, which isn't ideal or reliable. It just feels like a bad comparison. Avoid this approach, as it could fail.

W
WiWeetaa
Member
65
03-25-2023, 12:52 PM
#14
Grasp the essence of connection
W
WiWeetaa
03-25-2023, 12:52 PM #14

Grasp the essence of connection

L
LolaLouie
Senior Member
742
03-25-2023, 02:01 PM
#15
It's accurate. I've encountered some extremely dangerous malware in the secure, isolated lab at my former university, and I've come across many more severe examples in security articles and websites. Some of these creations are truly remarkable—like a phoenix that can almost rewrite itself.
L
LolaLouie
03-25-2023, 02:01 PM #15

It's accurate. I've encountered some extremely dangerous malware in the secure, isolated lab at my former university, and I've come across many more severe examples in security articles and websites. Some of these creations are truly remarkable—like a phoenix that can almost rewrite itself.

G
gamb1no
Member
226
03-27-2023, 09:51 AM
#16
On a Linux distribution, you can use a secure burner to copy the image. This approach helps because Linux’s reputation for safety comes from several factors: most malicious creators avoid targeting it due to its low popularity (around 43), a Windows virus would struggle to understand Linux’s kernel structure, and even if it managed to run, it wouldn’t be able to cause significant harm because it lacks root privileges or the necessary credentials. Most users are educated, tech-savvy, and cautious about granting unauthorized access.
G
gamb1no
03-27-2023, 09:51 AM #16

On a Linux distribution, you can use a secure burner to copy the image. This approach helps because Linux’s reputation for safety comes from several factors: most malicious creators avoid targeting it due to its low popularity (around 43), a Windows virus would struggle to understand Linux’s kernel structure, and even if it managed to run, it wouldn’t be able to cause significant harm because it lacks root privileges or the necessary credentials. Most users are educated, tech-savvy, and cautious about granting unauthorized access.

Pages (2): Previous 1 2