this post was submitted on 01 Oct 2025
1212 points (99.4% liked)
linuxmemes
27540 readers
2197 users here now
Hint: :q!
Sister communities:
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
- Understand the difference between a joke and an insult.
- Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
- Don't get baited into back-and-forth insults. We are not animals.
- Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
- Bigotry will not be tolerated.
3. Post Linux-related content
- Including Unix and BSD.
- Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of
sudo
in Windows. - No porn, no politics, no trolling or ragebaiting.
4. No recent reposts
- Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
5. 🇬🇧 Language/язык/Sprache
- This is primarily an English-speaking community. 🇬🇧🇦🇺🇺🇸
- Comments written in other languages are allowed.
- The substance of a post should be comprehensible for people who only speak English.
- Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
6. (NEW!) Regarding public figures
We all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations. - Keep discussions polite and free of disparagement.
- We are never in possession of all of the facts. Defamatory comments will not be tolerated.
- Discussions that get too heated will be locked and offending comments removed.
Please report posts and comments that break these rules!
Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Does it need administrator access to install? If I can weasel that onto my work desktop without having to contact our support that would be great.
It might work in WSLg otherwise?
Please don't bypass work restrictions
In some companies the restrictions are just knobs that were turned for the fun of it.
We do cloud native and they blocked WSL suddenly.
You can't use Docker/Podman without WSL. So everyone had to bypass the restriction in order to be productive.
While I don't think people should bypass work restrictions either, I get the frustration. One job I was at had some setting forcing browsers to always close tabs on close and reopen the homepage on open which was the intranet landing page. It was a pain.
Sometimes it is done for compliance. It is all about the CYA (cover your ass)
If somebody can easily bypass work restrictions, they probably aren't enforced or implemented properly.
That excuse won't stop them from being fired. Just because you can does not mean you should.
Knowledge is knowing how to bypass work restrictions. Wisdom is knowing not to.
Just because I shouldn't doesn't mean I shouldn't.
IT admins (and those involved in a company's security) should be fired for deploying under-configured or misconfigured Windows installations on computers.
Microsoft in general should be fired from computers - their security is absolute garbage.
I kinda want to see you argue this one. With pop-corn.
There is a high skill level needed to configure Windows properly in enterprise settings. Regardless, I wouldn't be working for an organization that trusts any Microsoft software.
Keep your popcorn ready though, it's only a matter of time before Microsoft loses the security battle - unless Microsoft makes gigantic strides in a more sustainable direction.
Irrelevant. The defense of "they should do better" will do jack to prevent the firing of someone that willfully circumvented company policy.
I think their performance is relevant. Why would an employee be able to easily run an unknown binary from the internet to begin with? If the systems were properly configured to block this, there would be no issue. If I were an executive, I would absolutely be looking at my IT team in this case.
If the employee went entirely out of their way to run an unknown binary, bypassing OS-level restrictions, and sidestepping established procedures - then the employee should be fired.
You really are not familiar with the concepts of company policy and liability, are you? Whether there is an effective technical restriction in place is relevant to the question "can you run the thing". It is irrelevant for the question "did you circumvent company policy?" and, subsequently, to the blame/firing that comes from it.
This is the exact same discussion people keep having about "government can't block VPN" or "encryption can't be broken" when the idea of a law forcing backdoors in services floats around. Sure, you can still use encryption, technically. But if there's a law that say "encryption too strong to be broken is illegal", then you'll get arrested all the same, effective technical restriction or not.
I'm well-aware of how corporate policy, liability, and hierarchy works - the issue with your take is that you act like the IT team is innocent to somebody higher up on the ladder. My issue isn’t with the concept of policy itself (and the enforcement thereof) and the issue of liability, but with the misplaced absolution of IT teams from any responsibility when things go wrong.
IT teams are essentially the secret police in companies. I'm aware of how they usually function. I've heard many first-hand accounts from those behind the big screens making sure Bob doesn't watch porn or that somebody doesn't do something unauthorized with company computers. I'm unimpressed and it's frankly a dystopian twist of what IT actually should be; which is best serving a company's technical needs collaboratively - not roleplaying as the NSA.
It effectively shouldn't be possible for Bob to watch porn on company devices/internet. It shouldn't be possible or desirable for somebody to skirt policy to run binaries (even on a whim) for software they feel that they require for maximum productivity. There should be reasonable, timely, and accessible procedures for employees to request necessary software to be deployed.
If I recall correctly in another part of the thread, a user discussed a group of employees (including themselves) needing WSL for job duties and it being blocked without notice. This is an example of sheer incompetence of the IT team - blocking necessary software and failing to maintain/establish timely and accessible procedures to contest a block as an employee who needs specific software to function in their job.
Required software should never be blocked - so who is at fault? Who caused the most damage to the company? The people attempting to work? Or the people who have no idea what they're doing; making employees feel they need to completely disregard them to function in their duties - the people sabotaging operations?
You're free to fantasize about the little guy as the only one getting disciplined in these scenarios. I'm sure most corporate environments do work like that, but it just protects incompetency - unless, again, the employee went out of their way to run the binary in an abnormal way or otherwise had less than ideal intentions.
Never said I would, but if I can install it on my work desktop via the Microsoft Store without the need of administration privileges then what’s the harm?
KDE has a proven track record and I’ve already got KDE connect on my work desktop to send files from my phone to the desktop without any issues from up top, plus I’ve spoken with my IT & Managers and got the ok for a Linux distro, but they do make the point of “what if someone else uses your computer” which is fair and is why I’m hesitant for them to switch me to a Linux work station, was thinking dual booting but not sure due to Windows history of wiping EFi boot partitions.
why would anyone else use your computer? honest question. and do they need access to your local files, or just a machine?
My environment is very much mixed in with shop workers, fitters or welders sit and eat lunch at people’s desk on their breaks, my desk is a common one as I’ve gone in on overtime shifts with people using my desk phone.
and yes, we have two lunch rooms.
That sounds like a security nightmare...
The company is probably to cheap to actually do security correctly. (Until they are ransomwared or need to get cyber insurance)
I used to work a food service job that had computerized touchscreen scales for weighing out products and printing out labels for them.
I learned that particular model was running an OS vaguely labeled as "Linux", and it was on an ARM-based system. My biggest regret in that job was abstaining from trying to get Doom running on it.
Please bypass work restrictions.
Fine I will just install Linux on my work laptop. Actually curious how long I could work like that before anyone noticed.