安装 Steam
登录
|
语言
繁體中文(繁体中文)
日本語(日语)
한국어(韩语)
ไทย(泰语)
български(保加利亚语)
Čeština(捷克语)
Dansk(丹麦语)
Deutsch(德语)
English(英语)
Español-España(西班牙语 - 西班牙)
Español - Latinoamérica(西班牙语 - 拉丁美洲)
Ελληνικά(希腊语)
Français(法语)
Italiano(意大利语)
Bahasa Indonesia(印度尼西亚语)
Magyar(匈牙利语)
Nederlands(荷兰语)
Norsk(挪威语)
Polski(波兰语)
Português(葡萄牙语 - 葡萄牙)
Português-Brasil(葡萄牙语 - 巴西)
Română(罗马尼亚语)
Русский(俄语)
Suomi(芬兰语)
Svenska(瑞典语)
Türkçe(土耳其语)
Tiếng Việt(越南语)
Українська(乌克兰语)
报告翻译问题
So you don't.
microsoft is your proof.
you are right, you are no expert and the proof you wanted is microsoft, go ask them about it.
They will target the computers that hold more important data, and these will be running Windows 10, because of the muh security myth. So even if W10 have less holes than W7, it would still be the main target.
From a single user perspective, you are more safe running W7 with a good anti-virus and anti-rootkit, then the mess of bloatware that is W10. Remember the more complex the system, the more vulnerable it is.
YOU made the claim. You can't just say "Microsoft" as that is just evidence of you saying a word.
Evidence must be germane to your claim. So please do demosntrate HOW this backs up your claim. Saying one word can never do that.
so it still hasnt sunk in yet? deal with the facts and move on.
microsoft
I don't think you understand, if they can get access on target PC they wouldn't care what OS it using as long they can take any info from you, and if it a office, or company that more reason to wanting access to it, so yeah not sure if actually spend more than a second to think about this.
so you are telling me that you need a link to win 7 ESU, just so you can have me "prove myself"?
nah, do your own work and stop being lazy.
https://www.theverge.com/2023/6/27/23775117/microsoft-windows-11-cloud-consumer-strategy
That's not how it works.
Hackers knock all the doors, hoping for some to open, hoping there's something valuable inside (or simply to zombify your machine for their own purposes)
Your fallacy is assuming the l33t h4x0rz are sitting their behind their keyboards and are trying to manually hack the world; one system at a time. And are valuing their targets a priori, based on what data they can find.
A very classic house-burgling take on things.
But in practice, it doesn't work that way.
What happens in practice is that on one particular unfortunate morning, you will happen to open up one of your regularly trusted web sites to read something - but someone managed to break into their CMS and drop some exploit code there. Or maybe that site loads an ad off an ad network that let some malicious stuff slip through.
You don't know it yet. But you've just been drive-by infected.
The malware finds its way back out, and comes knocking to a command & control server.
The C&C server registers it and the malware drops some system specs so the C&C server knows what it bagged.
Ooh! Great. A full blown Intel CPU rather than the low-power ARM trash in those easily compromised IoT devices. So that one gets sorted in the "high value" pile for being sold on or rented out as part of a botnet.
You know how legit enterprises rent computing capacity in large commercial cloud environments, like Google Cloud; Amazon Web Services; or Microsoft Azure? Well; botnets for hire is how criminal organizations and 'lesser' hackers and script kiddies do it.
Maybe at some point, some criminals decide they're going to buy access to the botnet to install key loggers on the machines; steal credentials; etc. Maybe they'll deploy ransomware and encrypt your files. Or maybe one day in the future you get to deal with some very, very uncomfortable questions from the FBI (or your regional equivalent), on why your system was found serving out child pornography on the dark web. Full-fledged desktop systems tend to have big hard drives with lots of slack to them, where no regular user is going to notice a few GB of space going missing - after all.