Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How much corporate garbage on it, though?


2 hours on a M1 is beyond corporate garbage. It's like they try to use as much power as possible, perhaps more than one process is stuck in an infinite loop.


Sounds like a shit EDR that's constantly scanning every file


First tool all files every hour. Virus scan on file change. Second tool scans also but I don't yet know the frequency.


Out of curiosity, and aside from Teams which I'm already sadly familiar with, what software is it that you're talking about? Company I work for was just bought by some megacorp, but I'm still using my own 2019 13" MBP for now.


Mcafee and VMware carbon black can fully consume a computer.


Ask your IT why they're not using JAMF Protect and maybe some light reporting like splunk.

Carbon Black probably needs some adjustments, or they need to spec laptops better. That sounds pretty intense and unnecessary.


IT is 300-600 people who report to no one in particular.

With those tools running, builds take over an hour if they complete at all. With the tools disabled, builds complete in under a minute.


Not OP, but here is one... checkpoint.com https://en.wikipedia.org/wiki/Check_Point

Horrid piece of software. I don't know when this sort of office-abuse became the norm but it makes me very sour about our industry as a whole.


My company has some McAfee and Palo Alto stuff and the cyvera cloud backup software which scans every file every 4 hours but then triggers the other software because of access attempts. Some of these are suites so its 3-4 diferent things (firewall, dlp, antivirus, ...)


> Palo Alto stuff

Fuck this company, one of my wife’s jobs is BYOD but requires GlobalProtect for their VPN. After the software has been running for a few hours, even disconnected, it just starts chewing CPU cycles and grinds her M1 MacBook to a halt.

The only way to terminate it is via `defaults write` command in the terminal. It’s basically malware.


Sometimes you can work around it and just use the native VPN or TunnelBlick. Did this at a previous corporate gig where the software they used wasn't even available for macs. Gotta be lucky though. By this I mean that usually VPN software just has a default config for some VPN protocol, and if you can find out what that is, you might be able to input the same config and credentials into the TunnelBlick or network settings


Symantec, Microsoft Defender (this shit is insane), Netskope and ZScaler


Msft defender on mac!?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: