• partial_accumen@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      8 hours ago

      Well then you’re still respotfor pointing people to it somehow.

      There’s no need to point it out. Hundreds of hacker scanners are running all the time across the internet looking for unpatched Operating Systems with known exploits. These are automatic by the hackers because the flaws are well documented.

      Imagine being told that there is one person in the world that will give you a million dollars cash and the only thing you need to do is ask them to give you the money. Now, imagine you have the phone numbers for every single person. It is trivially easy to set up a computer script that will go through the entire list and send each phone number a txt message asking them to give you the money. You’d start up this process and never have to revisit it except to check ever few weeks if someone responded that they’ll give you the money.

      This is how the hacker exploit scripts work. So for my example above, if I wanted my Windows XP computer hacked, I just need to leave it unpatched and plug it into the internet without any firewall. The hacking literally takes only 10 minutes for your Windows XP computer to be hacked.

      • just_another_person@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        8 hours ago

        Totally not how that works.

        Like you think “hackers” are just scanning the entire Internet like in Matrix world and stumbling on stuff?

        Lelz