Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

BOFH excuse #114: electro-magnetic pulses from French above ground nuke testing.


comp / comp.os.linux.advocacy / Re: Microslop Crowdstrike Clusterfuck

SubjectAuthor
* Microslop Crowdstrike ClusterfuckFarley Flud
`* Re: Microslop Crowdstrike ClusterfuckJoel
 `* Re: Microslop Crowdstrike ClusterfuckStéphane CARPENTIER
  +* Re: Microslop Crowdstrike ClusterfuckJoel
  |`* Re: Microslop Crowdstrike ClusterfuckCrudeSausage
  | `* Re: Microslop Crowdstrike ClusterfuckJoel
  |  `- Re: Microslop Crowdstrike ClusterfuckCrudeSausage
  +- Re: Microslop Crowdstrike ClusterfuckRonB
  +* Re: Microslop Crowdstrike Clusterfuckrbowman
  |`- Re: Microslop Crowdstrike ClusterfuckLawrence D'Oliveiro
  `- Re: Microslop Crowdstrike ClusterfuckDFS

1
Subject: Microslop Crowdstrike Clusterfuck
From: Farley Flud
Newsgroups: comp.os.linux.advocacy
Organization: UsenetExpress - www.usenetexpress.com
Date: Sat, 20 Jul 2024 18:36 UTC
From: ff@linux.rocks (Farley Flud)
Subject: Microslop Crowdstrike Clusterfuck
Newsgroups: comp.os.linux.advocacy
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 24
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!usenet-fr.net!feeder1-2.proxad.net!proxad.net!feeder1-1.proxad.net!193.141.40.65.MISMATCH!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.usenetexpress.com!not-for-mail
Date: Sat, 20 Jul 2024 18:36:08 +0000
Nntp-Posting-Date: Sat, 20 Jul 2024 18:36:08 +0000
X-Complaints-To: abuse@usenetexpress.com
Organization: UsenetExpress - www.usenetexpress.com
Message-Id: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
X-Received-Bytes: 1621
View all headers

Check this from Microslop:

"Microsoft's Azure status page outlines several fixes. The first and easiest
is simply to try to reboot affected machines over and over, which gives
affected machines multiple chances to try to grab CrowdStrike's non-broken
update before the bad driver can cause the BSOD. Microsoft says that some
of its customers have had to reboot their systems as many as 15 times
to pull down the update."

Oh my fucking god! How fucking elegant indeed!

I can imagine all of these "certified" and highly-paid Microslop
administrators scrambling to reboot, reboot, reboot, and reboot
until they hit the lucky number.

Ha, ha, ha, ha, ha, ha! What fucking lunacy!

Such an INSANE solution could only come from that wrecked OS known
as Microslop Winblows.

Whoever would use Microslop is a proven idiot, but, unfortunately,
proven idiots outnumber by far the sophisticated and competent
wielder of GNU/Linux.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: Joel
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sat, 20 Jul 2024 19:52 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: joelcrump@gmail.com (Joel)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sat, 20 Jul 2024 15:52:54 -0400
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 20 Jul 2024 21:52:56 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="deceb95e7ea1222d249446d9aae5e6dd";
logging-data="3873387"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19xnLObm/fi3dcw1eh+99Wr9x9mhtIYWJQ="
User-Agent: ForteAgent/8.00.32.1272
Cancel-Lock: sha1:DL0dehFE2aTh8vTeJyq3dBFdvJk=
OS: Linux Mint 21.3 Cinnamon, with Wine 9.0 for WinAPI
View all headers

Farley Flud <ff@linux.rocks> wrote:

>Check this from Microslop:
>
>"Microsoft's Azure status page outlines several fixes. The first and easiest
>is simply to try to reboot affected machines over and over, which gives
>affected machines multiple chances to try to grab CrowdStrike's non-broken
>update before the bad driver can cause the BSOD. Microsoft says that some
>of its customers have had to reboot their systems as many as 15 times
>to pull down the update."
>
>Oh my fucking god! How fucking elegant indeed!
>
>I can imagine all of these "certified" and highly-paid Microslop
>administrators scrambling to reboot, reboot, reboot, and reboot
>until they hit the lucky number.
>
>Ha, ha, ha, ha, ha, ha! What fucking lunacy!
>
>Such an INSANE solution could only come from that wrecked OS known
>as Microslop Winblows.
>
>Whoever would use Microslop is a proven idiot, but, unfortunately,
>proven idiots outnumber by far the sophisticated and competent
>wielder of GNU/Linux.

You have to admit, though, M$ is not *directly* responsible although
it's a system level process which causes blue screens, but in any case
this is the kind of disaster that just shows the vulnerability of the
installed base, CrowdStrike had that kind of reception in the market.

--
Joel W. Crump

Amendment XIV
Section 1.

[...] No state shall make or enforce any law which shall
abridge the privileges or immunities of citizens of the
United States; nor shall any state deprive any person of
life, liberty, or property, without due process of law;
nor deny to any person within its jurisdiction the equal
protection of the laws.

Dobbs rewrites this, it is invalid precedent. States are
liable for denying needed abortions, e.g. TX.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: Stéphane CARPENTIER
Newsgroups: comp.os.linux.advocacy
Organization: Mulots' Killer
Date: Sat, 20 Jul 2024 20:52 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!usenet-fr.net!feeder1-2.proxad.net!proxad.net!feeder1-1.proxad.net!cleanfeed3-a.proxad.net!nnrp3-1.free.fr!not-for-mail
Newsgroups: comp.os.linux.advocacy
From: sc@fiat-linux.fr (Stéphane CARPENTIER)
Subject: Re: Microslop Crowdstrike Clusterfuck
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
Organization: Mulots' Killer
User-Agent: slrn/pre1.0.4-9 (Linux)
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Date: 20 Jul 2024 20:52:54 GMT
Lines: 20
Message-ID: <669c23a6$0$3682$426a74cc@news.free.fr>
NNTP-Posting-Date: 20 Jul 2024 22:52:54 CEST
NNTP-Posting-Host: 78.201.248.7
X-Trace: 1721508774 news-1.free.fr 3682 78.201.248.7:33090
X-Complaints-To: abuse@proxad.net
View all headers

Le 20-07-2024, Joel <joelcrump@gmail.com> a écrit :
> Farley Flud <ff@linux.rocks> wrote:
>
>>Whoever would use Microslop is a proven idiot, but, unfortunately,
>>proven idiots outnumber by far the sophisticated and competent
>>wielder of GNU/Linux.
>
> You have to admit, though, M$ is not *directly* responsible

No, I won't admit that. It's 100% Microsoft responsibility. They want to
control everything from their servers, it's their responsibility to
control what others put on their servers. If they let any moron put
things which can break everything in the world, it's because their
security is crap. They are directly responsible to control what is put
on their servers. If an Windows needs an anti-virus, it's Microsoft's
responsibility.

--
Si vous avez du temps à perdre :
https://scarpet42.gitlab.io

Subject: Re: Microslop Crowdstrike Clusterfuck
From: Joel
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sat, 20 Jul 2024 21:18 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: joelcrump@gmail.com (Joel)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sat, 20 Jul 2024 17:18:03 -0400
Organization: A noiseless patient Spider
Lines: 38
Message-ID: <f9ao9jhqiv63n6apnhf6e7fat18bioml8g@4ax.com>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com> <2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com> <669c23a6$0$3682$426a74cc@news.free.fr>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 20 Jul 2024 23:18:04 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="deceb95e7ea1222d249446d9aae5e6dd";
logging-data="3902931"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/WFpBgr6ObywsVE/p3jpr6/KZbqTBAiM8="
User-Agent: ForteAgent/8.00.32.1272
Cancel-Lock: sha1:G7k/od6WqiA3DRVk9ghc2oZm7rI=
OS: Linux Mint 21.3 Cinnamon, with Wine 9.0 for WinAPI
View all headers

Stéphane CARPENTIER <sc@fiat-linux.fr> wrote:
>Le 20-07-2024, Joel <joelcrump@gmail.com> a écrit :
>> Farley Flud <ff@linux.rocks> wrote:
>>
>>>Whoever would use Microslop is a proven idiot, but, unfortunately,
>>>proven idiots outnumber by far the sophisticated and competent
>>>wielder of GNU/Linux.
>>
>> You have to admit, though, M$ is not *directly* responsible
>
>No, I won't admit that. It's 100% Microsoft responsibility. They want to
>control everything from their servers, it's their responsibility to
>control what others put on their servers. If they let any moron put
>things which can break everything in the world, it's because their
>security is crap. They are directly responsible to control what is put
>on their servers. If an Windows needs an anti-virus, it's Microsoft's
>responsibility.

I meant to specify that they themselves didn't create the update in-
house, but yes I agree they have responsibility to help people work
around the bug. Booting into safe mode is the obvious choice, to me.

--
Joel W. Crump

Amendment XIV
Section 1.

[...] No state shall make or enforce any law which shall
abridge the privileges or immunities of citizens of the
United States; nor shall any state deprive any person of
life, liberty, or property, without due process of law;
nor deny to any person within its jurisdiction the equal
protection of the laws.

Dobbs rewrites this, it is invalid precedent. States are
liable for denying needed abortions, e.g. TX.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: RonB
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sat, 20 Jul 2024 22:26 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ronb02NOSPAM@gmail.com (RonB)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sat, 20 Jul 2024 22:26:07 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <v7hdhv$3nd1l$3@dont-email.me>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 21 Jul 2024 00:26:08 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="05c8fb527a616bd9289fb9139cd41703";
logging-data="3912757"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+zp2IRwvxpKX2bELhExjPr"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:gpnqpqv7AYcUwF3ka10/WQe8c50=
View all headers

On 2024-07-20, Stéphane CARPENTIER <sc@fiat-linux.fr> wrote:
> Le 20-07-2024, Joel <joelcrump@gmail.com> a écrit :
>> Farley Flud <ff@linux.rocks> wrote:
>>
>>>Whoever would use Microslop is a proven idiot, but, unfortunately,
>>>proven idiots outnumber by far the sophisticated and competent
>>>wielder of GNU/Linux.
>>
>> You have to admit, though, M$ is not *directly* responsible
>
> No, I won't admit that. It's 100% Microsoft responsibility. They want to
> control everything from their servers, it's their responsibility to
> control what others put on their servers. If they let any moron put
> things which can break everything in the world, it's because their
> security is crap. They are directly responsible to control what is put
> on their servers. If an Windows needs an anti-virus, it's Microsoft's
> responsibility.

It's Microsoft's fault (and responsibility) that a poorly written, single
application can bring the whole Windows OS to a screeching halt.

Hobbyware.

I'm not a programmer, but wouldn't it be possible to write a routine that
could recognize the BSOD error, and then fall back to the previous (working)
version of the offending application? A self-fixing routine?

Maybe Microsoft should look into that. Meanwhile the people who still use
Microsoft servers should probably look into Linux.

--
[Self-centered, Woke] "pride is a life of self-destructive fakery, an
entrapment to a false and self-created matrix of twisted unreality."
"It was pride that changed angels into devils..." — St. Augustine

Subject: Re: Microslop Crowdstrike Clusterfuck
From: CrudeSausage
Newsgroups: comp.os.linux.advocacy
Organization: usenet-news.net
Date: Sat, 20 Jul 2024 22:28 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-3.nntp.ord.giganews.com!nntp.giganews.com!news-out.netnews.com!s1-1.netnews.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx12.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Betterbird (Windows)
Subject: Re: Microslop Crowdstrike Clusterfuck
Newsgroups: comp.os.linux.advocacy
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr>
<f9ao9jhqiv63n6apnhf6e7fat18bioml8g@4ax.com>
Content-Language: en-US
From: crude@sausa.ge (CrudeSausage)
In-Reply-To: <f9ao9jhqiv63n6apnhf6e7fat18bioml8g@4ax.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 33
Message-ID: <DSWmO.57764$xYQc.31427@fx12.iad>
X-Complaints-To: abuse@usenet-news.net
NNTP-Posting-Date: Sat, 20 Jul 2024 22:28:51 UTC
Organization: usenet-news.net
Date: Sat, 20 Jul 2024 18:28:39 -0400
X-Received-Bytes: 2266
X-Original-Bytes: 2215
View all headers

On 2024-07-20 5:18 p.m., Joel wrote:
> Stéphane CARPENTIER <sc@fiat-linux.fr> wrote:
>> Le 20-07-2024, Joel <joelcrump@gmail.com> a écrit :
>>> Farley Flud <ff@linux.rocks> wrote:
>>>
>>>> Whoever would use Microslop is a proven idiot, but, unfortunately,
>>>> proven idiots outnumber by far the sophisticated and competent
>>>> wielder of GNU/Linux.
>>>
>>> You have to admit, though, M$ is not *directly* responsible
>>
>> No, I won't admit that. It's 100% Microsoft responsibility. They want to
>> control everything from their servers, it's their responsibility to
>> control what others put on their servers. If they let any moron put
>> things which can break everything in the world, it's because their
>> security is crap. They are directly responsible to control what is put
>> on their servers. If an Windows needs an anti-virus, it's Microsoft's
>> responsibility.
>
>
> I meant to specify that they themselves didn't create the update in-
> house, but yes I agree they have responsibility to help people work
> around the bug. Booting into safe mode is the obvious choice, to me.

Safe mode wouldn't work because the storage of the affected computer is
encrypted by BitLocker. You would need the storage's decryption key at
the very least.

--
CrudeSausage
Catholic, paleoconservative, Christ is king
Gender and race are both "social constructs" so sexism and racism don't
exist

Subject: Re: Microslop Crowdstrike Clusterfuck
From: rbowman
Newsgroups: comp.os.linux.advocacy
Date: Sat, 20 Jul 2024 22:53 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bowman@montana.com (rbowman)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: 20 Jul 2024 22:53:01 GMT
Lines: 44
Message-ID: <lg2tecF4nlaU1@mid.individual.net>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net BHakLR+PPAGXg7mDajIs6Qpbzf4Ya89zYa1MCBCiMYNhoVGXkR
Cancel-Lock: sha1:RaPtX2vDYj/J5dN5EK1cMVnE0qs= sha256:88eYWZ+F23HD/Ts4BHb55hnU2Voe4mxdvfikrJllWyo=
User-Agent: Pan/0.149 (Bellevue; 4c157ba)
View all headers

On 20 Jul 2024 20:52:54 GMT, Stéphane CARPENTIER wrote:

> No, I won't admit that. It's 100% Microsoft responsibility. They want to
> control everything from their servers, it's their responsibility to
> control what others put on their servers. If they let any moron put
> things which can break everything in the world, it's because their
> security is crap. They are directly responsible to control what is put
> on their servers. If an Windows needs an anti-virus, it's Microsoft's
> responsibility.

First, the CrowdStrike product is an EDR which goes beyond a simple AV>

https://en.wikipedia.org/wiki/Endpoint_detection_and_response

"They are directly responsible to control what is put
> on their servers"

That really is the stupidest thing I've heard this week and there's been a
lot of stupid going around. The clients I work with all use Windows
Server. I think they're all odd Windows Server 2012 R2 although getting
them to upgrade is like pulling teeth. Upgrades mean downtime.

Anyway, Server 2019 or maybe even 2022 is installed on local hardware,
typically a VM in a HA architecture. So, after they install the OS they're
supposed to call Microsoft and say "Pretty please, can we install our new
CAD system on your OS?'. It doesn't work that way.

As far as the EDR many organizations have cybersecurity audits quarterly
where they have to check the boxes. CrowdStrike is a well known vendor;
install it, check the box, and move on to the next question.

There isn't much MS or the OS can do. The EDR is loaded during the start
up process to insure protection from the git-go. When the EDR tries to
load a file of null bytes and crashes the system, rinse and repeat in a
boot loop. The only way out is to boot into safe mode, which means you're
physically standing at the keyboard.

CrowdStrike apparently did not test the patch thoroughly. Strike one, so
to speak. They did not do a canary release; i.e. a limited release of an
update to see how many canaries die. Strike two. And finally, you never,
never release untested software on Friday. Strike three and out.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: Joel
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sat, 20 Jul 2024 23:23 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: joelcrump@gmail.com (Joel)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sat, 20 Jul 2024 19:23:06 -0400
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <sgho9j5th5jn2uokcuabj13b438qos5u8h@4ax.com>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com> <2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com> <669c23a6$0$3682$426a74cc@news.free.fr> <f9ao9jhqiv63n6apnhf6e7fat18bioml8g@4ax.com> <DSWmO.57764$xYQc.31427@fx12.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 21 Jul 2024 01:23:06 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="3cdc76de5081c0614070adc3fc16ae20";
logging-data="3945695"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/AlTgM+JuP9QsjQIarsxkEH+iY5qktXiE="
User-Agent: ForteAgent/8.00.32.1272
Cancel-Lock: sha1:VoBTAYAHu0z2tF7Wp+Jx8SdJzE0=
OS: Linux Mint 21.3 Cinnamon, with Wine 9.0 for WinAPI
View all headers

CrudeSausage <crude@sausa.ge> wrote:

>> I meant to specify that they [Microsoft] themselves didn't create the update in-
>> house, but yes I agree they have responsibility to help people work
>> around the bug. Booting into safe mode is the obvious choice, to me.
>
>Safe mode wouldn't work because the storage of the affected computer is
>encrypted by BitLocker. You would need the storage's decryption key at
>the very least.

Having that access can be necessary, if I want my server functional I
use my BitLocker credentials and axe this problem file.

--
Joel W. Crump

Amendment XIV
Section 1.

[...] No state shall make or enforce any law which shall
abridge the privileges or immunities of citizens of the
United States; nor shall any state deprive any person of
life, liberty, or property, without due process of law;
nor deny to any person within its jurisdiction the equal
protection of the laws.

Dobbs rewrites this, it is invalid precedent. States are
liable for denying needed abortions, e.g. TX.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: DFS
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sat, 20 Jul 2024 23:30 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nospam@dfs.com (DFS)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sat, 20 Jul 2024 19:30:44 -0400
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <v7hhb4$3o9rs$3@dont-email.me>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 21 Jul 2024 01:30:44 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="586ff1128cc99349c28e527ef3b3aec7";
logging-data="3942268"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/DYYhxEcchSo8g6uBKTnBY"
User-Agent: Betterbird (Windows)
Cancel-Lock: sha1:O/lc0/qIggcHCSw9z/netNfOE4M=
Content-Language: en-US
In-Reply-To: <669c23a6$0$3682$426a74cc@news.free.fr>
View all headers

On 7/20/2024 4:52 PM, Stéphane CARPENTIER wrote:
> Le 20-07-2024, Joel <joelcrump@gmail.com> a écrit :
>> Farley Flud <ff@linux.rocks> wrote:
>>
>>> Whoever would use Microslop is a proven idiot, but, unfortunately,
>>> proven idiots outnumber by far the sophisticated and competent
>>> wielder of GNU/Linux.
>>
>> You have to admit, though, M$ is not *directly* responsible
>
> No, I won't admit that. It's 100% Microsoft responsibility. They want to
> control everything from their servers, it's their responsibility to
> control what others put on their servers. If they let any moron put
> things which can break everything in the world, it's because their
> security is crap. They are directly responsible to control what is put
> on their servers. If an Windows needs an anti-virus, it's Microsoft's
> responsibility.

wtf?

Read up on the incident before spewing Feebish ignorance.

Subject: Re: Microslop Crowdstrike Clusterfuck
From: Lawrence D'Oliv
Newsgroups: comp.os.linux.advocacy
Organization: A noiseless patient Spider
Date: Sun, 21 Jul 2024 05:52 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ldo@nz.invalid (Lawrence D'Oliveiro)
Newsgroups: comp.os.linux.advocacy
Subject: Re: Microslop Crowdstrike Clusterfuck
Date: Sun, 21 Jul 2024 05:52:37 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v7i7n4$3vh6m$4@dont-email.me>
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr> <lg2tecF4nlaU1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 21 Jul 2024 07:52:37 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="c51abaeff06798f1fc5c50999d77d5e4";
logging-data="4179158"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19shJI0d6ulNtEika56NPsj"
User-Agent: Pan/0.158 (Avdiivka; )
Cancel-Lock: sha1:h58thMkEppCGGbL5c17ZnJyqdsQ=
View all headers

On 20 Jul 2024 22:53:01 GMT, rbowman wrote:

> CrowdStrike apparently did not test the patch thoroughly.

No doubt they tested it just as thoroughly as they did every release a
hundred or a thousand times before.

> They did not do a canary release; i.e. a limited release of an
> update to see how many canaries die.

Maybe they did. But there was something different in the machines that
caught the trouble, from the canaries they had. So in future they have to
add more canaries.

> And finally, you never, never release untested software on Friday.

What if the malware writers release zero-days on a Friday?

Subject: Re: Microslop Crowdstrike Clusterfuck
From: CrudeSausage
Newsgroups: comp.os.linux.advocacy
Organization: usenet-news.net
Date: Sun, 21 Jul 2024 10:37 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx33.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Betterbird (Windows)
Subject: Re: Microslop Crowdstrike Clusterfuck
Newsgroups: comp.os.linux.advocacy
References: <17e3ffa5519d146e$2708$3281513$802601b3@news.usenetexpress.com>
<2p4o9jldpq8fj3gjdqsrdspmh42fc1f6be@4ax.com>
<669c23a6$0$3682$426a74cc@news.free.fr>
<f9ao9jhqiv63n6apnhf6e7fat18bioml8g@4ax.com>
<DSWmO.57764$xYQc.31427@fx12.iad>
<sgho9j5th5jn2uokcuabj13b438qos5u8h@4ax.com>
Content-Language: en-US
From: crude@sausa.ge (CrudeSausage)
In-Reply-To: <sgho9j5th5jn2uokcuabj13b438qos5u8h@4ax.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 26
Message-ID: <4y5nO.23359$6fNc.21427@fx33.iad>
X-Complaints-To: abuse@usenet-news.net
NNTP-Posting-Date: Sun, 21 Jul 2024 10:37:52 UTC
Organization: usenet-news.net
Date: Sun, 21 Jul 2024 06:37:39 -0400
X-Received-Bytes: 2036
View all headers

On 2024-07-20 7:23 p.m., Joel wrote:
> CrudeSausage <crude@sausa.ge> wrote:
>
>>> I meant to specify that they [Microsoft] themselves didn't create the update in-
>>> house, but yes I agree they have responsibility to help people work
>>> around the bug. Booting into safe mode is the obvious choice, to me.
>>
>> Safe mode wouldn't work because the storage of the affected computer is
>> encrypted by BitLocker. You would need the storage's decryption key at
>> the very least.
>
>
> Having that access can be necessary, if I want my server functional I
> use my BitLocker credentials and axe this problem file.

If it's a personal computer, getting the Bitlocker encryption key is
trivial since it can be found at account.microsoft.com. On a corporate
device, you're screwed if it asks you since the key is not tied to the
account of the person using the machine. Hence, fixing a simple problem
through the use of safe mode becomes impossible.

--
CrudeSausage
Catholic, paleoconservative, Christ is king
Gender and race are both "social constructs" so sexism and racism don't
exist

1

rocksolid light 0.9.8
clearnet tor