An earlier generation of this malware used Windows built-in crypto, I think Elcomsoft put out a tool to extract the keys back out of the repository and decrypt the files yourself. Are newer versions of the ransomware using their own keys or encryption engines?
Slashdot videos: Now with more Slashdot!
So, subjects in photographs other than the rightsholder now have veto power over when those works are displayed? We're just a couple court cases for anyone tagged in an unflattering Facebook photo to demand it be deleted from the Internet entirely, not just untagged.
Fair 'nuff, there are many hams out there who've been in the game much longer than I have.
I've always known HT to be "handheld transceiver", none of this "handie-talkie" nonsense.
VCs like Mr. Graham here have a vested interest in driving down the wages of U.S. employees so they can extract a greater amount of value from the companies they invest in. Those exceptional programmers who are missing from the pipeline are choosing to go into finance and other professions where they can make huge sums of cash with their natural talent because anti-competitive and anti-worker agreements between tech companies, such as the recent and absolutely massive "anti-poaching" agreements, have suppressed wages to the point where good talent is choosing to go elsewhere.
If they want more talented programmers in the United States, then pay them more. The petroleum industry suffered a shortage of talent a while ago, raised their wages, and now there's no shortage of petroleum engineers and other related roles. It's disingenuous at best to continue to assert that immigration rules are causing a tech shortage. It's simple laws of supply and demand: tech companies aren't willing to pay tech workers enough to make it worth their while. Letting in cheaper foreign laborers to drive the prices down further for everyone is only good for two groups of people: CEOs, and venture capitalists.
Yup. My HP 16500A logic analyzer from the '80s has that kind of touchscreen panel.
And how does that even work, anyway? Don't we have an embargo against Cuba - and yet we're leasing some of their land for our black site? Or, was the Bay of Pigs more successful of an operation than we thought and we've been occupying them secretly ever since?
Really, Facebook should add a feature that let's anyone in a photo veto its entire publication on the site. They already have great facial recognition algorithms - I should be able to completely remove a photo of me that my friend posted, instead of just removing the tag.
Once everyone is used to this, they'll introduce "limited content inspections" to ensure devices don't contain "Terrorist materials" before boarding. Any device which the passenger refuses to unlock and hand over for inspection won't be permitted to fly.
Yes. The tech industry's entire business model is flawed, because the massive profits being delivered are dependent on uncompensated overtime, illegal collusion and wage fixing, and H-1B abuse.
How long was the attack taking place? What kind of Internet connection does Sony Pictures have? To ex-filtrate 100 TB of data is going to take a while, no matter how you cut it. My guess is that number is significantly inflated.
I had the same issue and it did take quite a bit of digging to nail down. Comcast Business with 5 static IPs, same setup as yours.
1. Make sure your reverse DNS entries are correctly configured such that the domain of your reverse DNS lookup will match the domain your messages are claiming to be from. dashed-ip.sea.wa.comcast.net will generate spam warnings on many mail servers if your server claims to be mail.joecorp.com. Call Support and they will update it for you on the phone within a couple of minutes. Also make sure you're not in a residential IP block.
2. Make sure you're not actually an open relay or otherwise allowing unauthenticated senders to generate outbound messages. I was using MailEnable, and had it misconfigured such that it wasn't actually doing the authentication I had selected. This got me blacklisted quickly. A few bounce messages had links to the blacklists themselves to submit appeals; they'd dutifully take me off each time but I'd get re-added automatically. It took a few weeks of trial and error to get this one fixed. I know you say you're not...and I thought I wasn't either, having specifically taken steps to disable open relaying. But it turns out I didn't quite get it the first time, and was still relaying messages without authentication.
I'd imagine issue (1) may be a big contributor to your problems, personally.
What's the power consumption of the server? Depending on the load, you might be well-suited to pick up a small ARM-based system (or more than one) if the loads are somewhat light. Personal web server/file server/LDAP/etc. doesn't need a lot of horsepower and there's a good chance you might be burning extra electricity unnecessarily.
I think that'd be a pretty major undertaking; once the devices are "bricked" by setting their ID to 0, the OS can no longer communicate with that device. Seems like it'd be pretty tough to push a patch that way, unless they fix the USB stack to allow guest devices = 0.
I remember reading somewhere that most pornography can't be copyrighted, because "obscene materials" aren't eligible for copyright protection. Is that still true?