partyparrot@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 1 year agomalwar(ul)elemmy.blahaj.zoneimagemessage-square16fedilinkarrow-up1651arrow-down10
arrow-up1651arrow-down1imagemalwar(ul)elemmy.blahaj.zonepartyparrot@lemmy.blahaj.zone to 196@lemmy.blahaj.zone · 1 year agomessage-square16fedilink
minus-squareCephalonKappa@discuss.tchncs.delinkfedilinkarrow-up4·1 year agoThat wont stop most attacks tho. A lot of them work by pretending to be a keyboard and typing out the exploit in a cmd prompt.
That wont stop most attacks tho. A lot of them work by pretending to be a keyboard and typing out the exploit in a cmd prompt.