Forgot your password?

Comment: Re:who not whom. (Score 1, Offtopic) 209

by ttucker (#47577677) Attached to: Ask Slashdot: When Is It Better To Modify the ERP vs. Interfacing It?

Submitter should use smaller words. He's trying to swim in the deep end ("whom", "wrought") when he's barely ready for the kiddy pool.

Amazingly, even in light of this new information, nobody cares. Nobody even cares that you are an asshole. Nobody cares. Just, go back to your basement.

Comment: Re: Angler PC malware? (Score 1) 122

by ttucker (#47506331) Attached to: Critroni Crypto Ransomware Seen Using Tor for Command and Control

No need. I have this newfangled feature called "sources.list."

That file barely tells you where the repositories are. The main question still remains, where did the programs actually come from, who compiled them, and why do you trust any of the parties involved?

I trust the Ubuntu repositories much more than any app store, but the principle is similar... they could conceivably contain malicious code.

Comment: Re:Angler PC malware? (Score 1) 122

by ttucker (#47496971) Attached to: Critroni Crypto Ransomware Seen Using Tor for Command and Control

Well unless you have configured your *nix box to automatically privilege and run windows executables somehow, using a real OS is probably sufficient to stop this attack.

You are trying to say that users needing to type chmod +x ./ , is sufficient protection to prevent end users from running things they shouldn't....

Ransomware is not prevalent in Linux, but again, it is absurdly naive to think that it couldn't, or that the OS is doing much to prevent it. Again, end user education is key, regardless of OS. Implying to under-informed users that OSX is magically secure against cryptoware, is a recipe for disaster.

Comment: Re:Angler PC malware? (Score 4, Insightful) 122

by ttucker (#47495929) Attached to: Critroni Crypto Ransomware Seen Using Tor for Command and Control

How is it you manages to not once mention Microsoft Windows in that whole article? How does the Critroni ransomware get onto the victim’s PC in the first place?

Most of this shit is installed by tricking the user with phishing style emails and general social engineering to download attachments. Certainly zero day stuff is a goldmine for malware, but under-informed end users are much more consistently available. The stuff that cryto ransom software holds hostage is heavily concentrated in the user's home directory, so no privilege escalation is required. It is good to be proud of your operating system of choice, but it is smug to think that Linux/OSX/BSD/Solaris will do anything technical to protect from such an attack.

Comment: Re:They used to build them in Renton (Score 1) 187

by ttucker (#47388637) Attached to: Train Derailment Dumps Two 737 Fuselages Into Clark Fork River

Hiring workers that can read costs more. Considering none of the workers I dealt with at their plant in SC were able to read, of course they're cheaper. Hiring drooling moron six grade drop-outs is cheaper. Of course what isn't cheaper is all of the rework that is done. Because of the difficult job required due to the massive mistakes made by the idiots in SC, the rework must all be done by union workers. They are the only people in the world skilled enough to successfully fix the problems.

Sounds like they need to hire a Slashdot Anonymous Coward to be the CEO!

Help! I'm trapped in a PDP 11/70!