this post was submitted on 19 Oct 2024
389 points (97.1% liked)
Technology
60116 readers
3324 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
IT here, Plesse don't involve us... We don't want to to deal with this bs either
IT here, Yes, by all means involve me. I will buy a second monitor and plug it into a known box that is no business going anywhere. I will then block, at the network firewall level, any outbound traffic to anything that thing talks to. If it uses its own MAC address at the head end I will then collect and publish every connection that thing tries to make outside to a blacklist and provide it to the public.
Sounds way more interesting than most IT work as well. I'd definitely rather do some investigative work like this than a typical parade of password resets, email assistance, and software installations.
Hands you a random laptop.
"The thing doesn't work."
Refuses to elaborate and leaves.
It and I appear to have the same thing wrong with us. I'm not working on it.