131 points

Funny how CrowdStrike already sounds like some malware’s name.

permalink
report
reply
75 points

It literally sounds like a DDoS!

permalink
report
parent
reply
21 points

Botnet if you will

permalink
report
parent
reply
21 points

Not too surprising if the people making malware, and the people making the security software are basically the same people, just with slightly different business models.

permalink
report
parent
reply
10 points
*

Reminds me of the tyre store that spreads tacks on the road 100m away from their store in the oncoming lanes.

People get a flat, and oh what do you know! A tyre store! What a lucky coincidence.

permalink
report
parent
reply
5 points

Classic protection racket. “Those are some nice files you’ve got there. It’d be a shame if anything happened to them…”

permalink
report
parent
reply
3 points

It sounds like the name of a political protest group.

permalink
report
parent
reply
120 points

This is, in a lot of ways, impressive. This is CrowdStrike going full “Hold my beer!” about people talking about what bad production deploy fuckups they made.

permalink
report
reply
90 points

You know you’ve done something special when you take down somebody else’s production system.

permalink
report
parent
reply
24 points

*production systems around whole world

permalink
report
parent
reply
3 points

Few people can put that into their CVs, that a real achievement!

permalink
report
parent
reply
18 points

I’m volunteering to hold their beer.

Everyone remember to sue the services not able to provide their respective service. Teach them to take better care of their IT landscape.

permalink
report
parent
reply
23 points

Typically auto-applying updates to your security software is considered a good IT practice.

Ideally you’d like, stagger the updates and cancel the rollout when things stopped coming back online, but who actually does it completely correctly?

permalink
report
parent
reply
20 points

Applying updates is considered good practice. Auto-applying is the best you can do with the money provided. My critique here is the amount of money provided.

Also, you cannot pull a Boeing and let people die just because you cannot 100% avoid accidents. There are steps in between these two states.

permalink
report
parent
reply
98 points

The real malware is the security software we made along the way.

permalink
report
reply
39 points

We’ve known that since Norton and McAfee.

permalink
report
parent
reply
10 points

At least McAfee’s antics were entertaining

permalink
report
parent
reply
3 points

The guy left his company long before the shenanigan cascade

permalink
report
parent
reply
3 points

After working at a company that had Crowdstrike installed on all machines, it is most certainly malware.

permalink
report
parent
reply
54 points

Can’t get hacked if your machine isn’t running.

permalink
report
reply
19 points

You’re hired!

permalink
report
parent
reply
4 points

Idk boss, people weren’t too happy the last time we tried that.

permalink
report
parent
reply
48 points

The answer is obviously to require all users to change their passwords and make them stronger. 26 minimum characters; two capitals, two numbers, two special characters, cannot include ‘_’, ‘b’ or the number ‘8’, and most include Pi to the 6th place.

permalink
report
reply
9 points

Great! Now when I brute force the login, I can tell my program to not waste time trying ‘_’, ‘b’ and ‘8’ and add Pi to the 6th place in every password, along with 2 capitals, 2 numbers and 2 other special characters.

Furthermore, I don’t need to check passwords with less than 26 characters.

permalink
report
parent
reply
7 points

Sorry, I don’t understand. Do you mean there have to be 6 digits of Pi in there, or the sixth character must be π? I’m down either way.

permalink
report
parent
reply
28 points

We won’t tell you, and the rule gets re-rolled every 14 seconds. It may stay the same or it may change.

permalink
report
parent
reply
5 points

Also, there are requirements we check for that we don’t tell you about! 🤭

permalink
report
parent
reply
3 points
*

The modern direction is actually going the other way. Tying identity to hardware, preventing access on unapproved or uncompliant hardware. It has the advantage of allowing biometrics or things like simple pins. In an ideal world, SSO would ensure that every single account, across the many vendors, have these protections, although we are far from a perfect world.

permalink
report
parent
reply
3 points

SSO means you only need to compromise one piece of hardware to get access to everything.

permalink
report
parent
reply
1 point

Effectively, the other option is passwords, and people are really, really, bad at passwords. Password managers help, but then you just need to compromise the password manager. Strong SSO, backed by hardware, at least makes the attack need to be either physical, or running on a hardware approved by the company. When you mix that with strong execution protections, an EDR, and general policy enforcement and compliance checking, you get protection that beats the pants off 30 different passwords to 30 different sites, or more realistically, 3 passwords to 30 different sites.

permalink
report
parent
reply

Programmer Humor

!programmer_humor@programming.dev

Create post

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

  • Keep content in english
  • No advertisements
  • Posts must be related to programming or programmer topics

Community stats

  • 5.2K

    Monthly active users

  • 1K

    Posts

  • 38K

    Comments