• 0 Posts
  • 27 Comments
Joined 2 years ago
cake
Cake day: July 16th, 2023

help-circle

  • evatronic@lemm.eetoAsklemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    2
    ·
    11 months ago

    I tend to do my primary shopping at a place where you bag your own. The order is generally produce and bulk items first (it tends to be the bulk of the purchase), then frozen things, boxed/canned things, and finally squishy things like bread, eggs, and uh, delicious Hostess fruit pies.







  • Devices that are no longer supported and kept up to date with security updates contain known, but unpatched, vulnerabilities. Some of them are software based, but some are a function of the hardware itself. Connect these to a network, manage to do something that gets them compromised, and you’ve given bad actors a foothold on your network.

    Because most networks, especially home networks, tend to be configured in a way that trusts local network traffic more than external traffic, such a foothold can further compromise your systems. Very few people have the resources, or technical know-how to properly segregate potentially dangerous or vulnerable devices on a network.

    That’s what.