| ▲ | bakugo 6 hours ago |
| I don't know why that comment is being interpreted as a request for alternatives. They are clearly asking if their machine is compromised. |
|
| ▲ | egl2020 6 hours ago | parent | next [-] |
| yes, that's my question: am I compromised? What should I do? |
| |
| ▲ | davorak 5 hours ago | parent [-] | | Standard answer to a potentially compromised machine is to start with a factory reset machine and add the software and data you need to do your work/use the machine. Do not take executables from the compromised machine and use them any where since they too could be compromised. There are more steps you can take to ensure greater safety. The above is the minimum a I do for myself and what the minimum IT department and my company executes. | | |
|
|
| ▲ | opan 5 hours ago | parent | prev [-] |
| I agree this is probably not the place to list alternatives, but listing them elsewhere (top level comment?) in this thread would probably be good. |