This, in the end it comes down to actually vetting the code one is using, which we know far too many "Developers" these days do not do, as noted they literally just copy and paste random code some person on github posted and go on about there day.. then weeks later wonder how their company got...
Not surprising at all...test it in one market, see how it goes then force it on the world...
Microsoft stoops to new low with ads in Windows 11, as PC Manager tool suggests your system needs ‘repairing’ if you don’t use Bing...
As noted, confirm how you created your boot media, and make sure when you have UEFI enabled, you also have USB options enabled / showing.
What motherboard do you have?
Ya, this is one place if you can do it, since re-running cables in walls can be a PIA!
Moving to a new house, and before I reno the basement, plan to run fiber to as many rooms as I can along side cat cabling - this will be our forever home now until we retire to where ever, so do it right now...
Run linux, LUKS2 encrypted...I have had my house broken into once before and computers stolen, so now, go ahead, steal it, you are not getting a dam thing off it!
Why not do it? most theft are ones of opportunity, no one thinks there house will be broken into and robbed, until it happens. You...
Or any public wifi or open network. I could go to a starbucks, connect to their wifi and run a DHCP server and exploit this, pending on how they have their wifi network set up and if secure (not likely)
you basically need to be on a comprimised network that has a DHCP server running on it that is specifically configured to not allow the main DHCP server towork right.
Very VERY VERy wrong... sadly :( Look at all these major breaches, usually comes down to no MFA enabled (ChangeHealth card) or admin using crap passwords, or other elevated users using personal devices and getting infected with info-stealers.
Because they are the same idiots who just copy and paste random code from github repo's because they really have no business being a developer. Some of these malicious actors are sneaky and do copy other projects and use URLs close or names the same and they know most people do not pay any...