You are viewing a single thread.
View all comments View context
3 points

I honestly don’t know much about how that works. I’ve just managed to sync outlook emails to Thunderbird with the Exchange protocol or something. I get taken to my organisation page once every two weeks or so, for the 2FA, and everything works just fine. I’ll just play dumb if IT ever ask me question but so far so good.

permalink
report
parent
reply
3 points

You know we can detect every application you have through tools like Nessus, right? Your IT guys are either morons or they just let you get away with it because it’s easier than hearing people pitch a fit about software they’re not allowed to use.

permalink
report
parent
reply
5 points

Both scenarios are fine with me. I don’t care if they’re incompetent or just don’t care, as long as I can use my softwares. But I doubt they would have the time to scan every staff’s laptop to see what applications we use. They also said it was mandatory for all the students and teachers to use the stupid 2FA Microsoft app on our phone, but I’ve been using Keepass on desktop without problems (and even shown it to some students). Next step, I’m gonna install Fedora Asahi Remix on the M1 mac they provided me.

permalink
report
parent
reply
1 point

They also said it was mandatory for all the students and teachers to use the stupid 2FA Microsoft app on our phone, but I’ve been using Keepass on desktop without problems (and even shown it to some students).

Yeah if they’re just using the MS app for OTP generation, there’s no reason to use that specific application. Keepass is perfectly fine.

Asahi is pretty great. Only issue for me personally is the lack of speaker support. Audio works fine through headphone jack or bluetooth though.

permalink
report
parent
reply
0 points

Time? You just set it to scan every host on your Active Directory. It’s like a ten minute setup and spits out a report when you’re done.

Yeah, you’re definitely the guy they hate but don’t get paid enough to fight. Security risks users are usually too much of a pain to deal with so we just tell our supervisors that you’ll end up ransomware’ing the company one day and let them handle it from there if they care enough.

permalink
report
parent
reply

Memes

!memes@lemmy.ml

Create post

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

Community stats

  • 9K

    Monthly active users

  • 12K

    Posts

  • 264K

    Comments