Comment Re:Lack of regulation, that is how (Score 1) 57
Quite possibly. Cars are large enough investments that some customization is already baked into the manufacturing process.
Quite possibly. Cars are large enough investments that some customization is already baked into the manufacturing process.
Gotcha!
Well, yes. In the end, all that will make people move away from RedHat. Like is currently happening with VmWare. And, come to think of it, Microsoft is trying essentially the same thing with Windows, but more stealthily and slower.
Essentially doing huge damage for a much smaller profit increase. One of the better definitions of "evil".
I will echo what you posted by saying the greatest risk to most Linux systems are users and SysAdmins. I have personal experience with that last one having once borked one of my own systems.
Indeed. Just as the worst IT security risks on Linux are SysAdmins and users as well.
I think what happened on my system is that they deferred all writes and with all the idiots trying ssh logins the log-queue backed up, thus stopping the respective sshd childs. When I tried to reboot, the admin tool told me "locked (backup)". At least my ticket got processed within a few minutes. Hence not a Linux issue but a SysAdmin screwing up. At least now I know my secondary DNS and MTA actually work in a real-world outage
Where do you get that from? All the signs like interruption of services and outages are there. Service restoration is still in progress. THis clearly was a Ransomware attack with additional data exfiltration.
Indeed. And we absolutely need at least large enterprises to finally have good IT security. With _personal_ consequences for screwing up.
Opps. The line in the middle should have been quoted.
"Ransomware" already includes a "breach" (or how else did the malware get in?), hence the wording is entirely correct.
Are we just being sloppy with language, or does calling it ransomware give companies cover to avoid penalties and responsibilities associated with breaches?
Neither. What allows the ones responsible for bad IT security and bad BCM/DR preparation and, worse, paying ransom, to walk away is US law.
Ransomware works because too many greedy assholes are not prepared, pay and then make this attack profitable. Hence attackers can upgrade, get more and better people and tools and make the problem even worse.
It is high time that the assholes responsible for bad IT security and missing or bad BCM and DR preparation at these companies are held responsible _personally_. It is also high time that paying ransom gets classified as financing crime (and hence a criminal act), because it clearly is.
I had a hard frozen sshd two days ago on a Linux VM, but I think my hoster may have screwed up there and sabotaged the filesystem doing a backup (which I did not tell them to do and which I am not paying for). Apache was still up on the box though. Fixed by reboot. Other than that, the last freeze I had on anything Linux was when I told the kernel a wrong memory size on the kernel commandline about 10 years ago.
I expect Nissan USA has quite different conditions than Nissan Europe.
Definitely, but not only. The other applications are gaming, simulated vacations, concerts, etc.
Keep asking in bad faith and keep being called an ass for it.
It was already really bad before IBM bought them. You mean it got _worse_?
But there are things in my life that ain't for sale. One of them is me.
Same here. Making a lot of money? Nice. But having intact personal integrity and honor? Priceless.
Saliva causes cancer, but only if swallowed in small amounts over a long period of time. -- George Carlin