66 points

Iโ€™d laugh if this wasnโ€™t affecting me directly.

permalink
report
reply
26 points

I can laugh either for or at you, if you want.

Iโ€™ll pour one out for the frontliners.

permalink
report
parent
reply
3 points

I laugh and it does/did(over now) affect me. Bwahaha. Im getting work done and nobody can interrupt with email.

permalink
report
parent
reply
3 points

All Iโ€™ve noticed is that a lot of internet related things in my work are much faster today.

The schadenfreude could only be sweeter if my company used CrowdStrike on all the Windows systems. Then I really would have had a very peaceful focused day.

permalink
report
parent
reply
17 points
*

Sometimes you have to learn the hard wayโ€ฆ

permalink
report
reply
144 points

the good news is that it does make windows more secure. you cant hack something that has crashed.

permalink
report
reply
76 points

permalink
report
parent
reply
44 points

Remember guys, it took about a decade for Solar Winds to discover somebody had root access to everybody that used their software, another decade for somebody outside Solar Winds to discover it and tell everybody, and half a decade with nobody claiming to have solved the issue up to now.

So when you believe that your computer with an EDS is safe just because you canโ€™t use it, think again.

permalink
report
parent
reply
5 points

EDS?

permalink
report
parent
reply
1 point

Itโ€™s an oops.

It should be IDS.

permalink
report
parent
reply
21 points

Reminds me of a local cyber security firm, which declares war on a group of hackers. The CEO went on television to โ€œdouble dog dareโ€ the hackers to hack their servers and claim their firewalls are impenetrable.

Well you can guess the results, within 48 hours, their servers went down one after another. And when shit about to hit the fan, they literally turned off all of their servers for days. They hired a 3rd party IT firm to patch their security, then the CEO declared victory in a local newspaper.

permalink
report
parent
reply
13 points

Similar thing happened to the idiot CEO of Lifelock that used to advertise his actual social security number everywhere.

permalink
report
parent
reply
7 points

A smarter person would have used a fake SSN then claimed success when it never worked

permalink
report
parent
reply
9 points

I used to work at Equifax. LifeLock was the subject of many corporate trainings.

permalink
report
parent
reply
6 points

And the hackers name? 4chan

permalink
report
parent
reply
25 points

The most secure computer is the one not running any software. Thatโ€™s why I recommend Crowdstrike.

permalink
report
parent
reply
41 points

I really donโ€™t want to be the guy responsible for this fuck up

permalink
report
reply
37 points

For a company this big it would also have to have gotten past a code review and QA team, right? โ€ฆ right? โ€ฆ

permalink
report
parent
reply
10 points
*

And who pushes out production updates on a Friday!

permalink
report
parent
reply
5 points

โ€œSecurityโ€

permalink
report
parent
reply
6 points

We do.

โ€œIf something goes down over the weekend, fewer people see itโ€ - my leadership team.

I guess Asia can report the problem on Sunday and Iโ€™ll get a nastygram and fix it that afternoon.

permalink
report
parent
reply
18 points

Of course, of course. This is how these things are always done.

permalink
report
parent
reply
11 points

I like how they kept on pushing the update for hours

permalink
report
parent
reply
4 points

Code review, QA team, hours of being baked on an internal test network, incremental exponential roll out to the world, starting slow so that any problems can be immediately rolled back. If they didnโ€™t have those basics, they have no business being a tech company, let alone a security company who puts out windows drivers.

permalink
report
parent
reply
12 points

This is an industry wide issue. This is just the first symptom.

permalink
report
parent
reply
5 points

Yeah and that means they wonโ€™t nail some poor schmuck to the wall over this?

permalink
report
parent
reply
6 points

What we need is to stop the blind trust

permalink
report
parent
reply
6 points

Heโ€™ll just get fired, apply somewhere else, and theyโ€™ll only know the dates he worked at CrowdStrike.

If anybody cared, they would have switched away from M$ by now.

permalink
report
parent
reply
19 points

Yeah, something this big is absolutely not one engineerโ€™s fault. Even if that engineer maliciously pushed an update, itโ€™s not their fault โ€” it was a complete failure of the organization, and one person having the ability to wreck havoc like this is the failure.

And I actually have some amount of hope that, in this case, it is being recognized as such.

permalink
report
parent
reply
3 points

I agree but they will still blame it all on that one guy.

permalink
report
parent
reply
9 points

No they wonโ€™t, not if theyโ€™re in the slightest bit competent.

Blameless post-mortem culture is very common at big IT organizations. For a fuck-up this size, there are going to be dozens of problems identified, from bad QA processes, to bad code review processes, to bad documentation, to bad corner cases in tools.

There will probably be some guy (or gal) who pushed the button, but unless what that person did was utterly reckless (like pushing an update while high or drunk, or pushing a change then turning off her phone and going dark, or whatever) the person who pushed the button will probably be a legend to their peers. Even if they made a big mistake, if they followed standard procedures while doing it, almost everyone will recognize theyโ€™re not at fault, they just got to be the unlucky person who pushed the button this time.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

I use Arch btw


Sister communities:
Community rules
  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

Community stats

  • 7.5K

    Monthly active users

  • 1.2K

    Posts

  • 66K

    Comments