Re: Unsuscribe
Lock it. Lock it now. This is the friendliest message I'm going to send, while I look for ways to get OP banned from Email for gross social misconduct.
45 publicly visible posts • joined 24 Dec 2021
And in 2021, Let's Encrypt let a root certificate lapse, disrupting major websites and services for devices that hadn't been updated.
This is false. The only things that broke were a handful of (mostly unmaintained) websites and one obscure BSD variant.
Let's Encrypt had done everything in their power to minimise the disruption, they were completely transparent throughout and provided clear guidance for administrators on how to deal with this long in advance.
To me it sounds more like a figure of speech, used in the hope of conveying the seriousness of this issue to an audience which may be complacent or even comfortable with the status quo.
This gives me some hope that C++ has a chance to evolve and thrive. As long as Bjarne doesn't pull a Perl 6 in the heat of the moment, that is.
>They're always going to be accessible by the outside world
I disagree, being able to ping a firewall is in no way equivalent to it being "accessible" to the extent described in this article.
The fact that it's located at the border is also irrelevant as long as it doesn't expose any services to the outside world.
The only issue with Palo Alto is that they employ PHP developers to develop its management interface and then allow said interface to be accessed over anything but a serial interface. If it can be accessed over Ethernet then it will be accessed over the Internet, whether you intended that or not.
>Aviatrix Controller is run by approximately 3 percent of all AWS customers, [...] a relatively small proportion of all customers.
That's still a large number of them when multiplied by the number of AWS business customers, estimated at around 1.5 million.
I can't blame a researcher for publishing exploit code that is already in the hands of bad actors. Yes, this may enable a few script kiddies to do some damage, but those aren't the kind of people who negotiate ransom payments and employ money mules.
You're right, but Oracle is still the asshole in this story.
They could set up a "JavaScript Foundation" and donate the trademark to it for the benefit of the community. Not only would this improve Oracle's reputation, it would also benefit everyone else by removing the very real danger of litigation.
It could be a win-win situation, just like selling or renting out an unused house benefits everyone involved.
This all sounds like posturing to me, on both sides. One of them will back down, and my bet is on Delta to do that since they clearly have never tested a disaster recovery plan or even restoring from backups.
What if it were ransomware? Who would have Delta sued in that case for their inability to restore service after weeks of downtime?
CrowdStrike's monumental failures are responsible for Delta going down, but not for if failing to get back up for so long.
They may have integration tests as well, which are written by the same developers who write the software and the unit tests.
One can't generally expect a developer to write adversarial tests against their own code. If they knew which corner cases to test for, then they would have written the original code to account for these cases instead of wasting time writing extra tests.
Unit tests are crucial when making changes to existing code, but they are useless in catching bugs. For that you need a QA team.
No. First because whatever supervisor runs in ring-0 also needs to grant the antivirus ring-0 access no matter what, or else a virus can cause the antivirus to crash and have unfettered OS access.
That's the whole point of marking that driver as boot critical – you absolutely don't want the machine to keep functioning without it. The OS is irrelevant in this equation, the customer has already decided that protection is critical by installing an EDR, and the OS has no say in this matter.
(And second, for the simple reason that microkernels are only useful for academic research and can't run any practical workload, be it benign software or malware.)
The previous kernels won't help when there is a driver update, since driver updates are applied to old initramfs images.
Single user mode is not useful because the system has to boot first, and that means loading the drivers. Even if this weren't the case, users would never be able to reach that point simply because single user mode would be disabled in any environment managed by competent administrators. Otherwise, anyone in proximity of those machines has root access to them, which is irresponsible.
It has to be a real device because many companies install some form of device management and endpoint security on employee laptops, and those will pick up a VM and may raise an alert.
It is not mentioned that she purchased any of those laptops, I suspect most of them have been sent to her address by the employers themselves.
>I can 'cd' into one directory and the C and C++ compiler automatically change to the version required for that piece of software.
direnv is a wonderful program that does just this for bash. It needs an .envrc recipe in any such directory, or at least one of its parents, for it to work.
I don't know if Nix uses direnv, but it sounds very similar.
One of the few comments worth reading.
Indeed, getting access to a program does not automatically make somebody a recipient of the program. If an employer installs Linux on servers, then employees logging into those servers do not get any rights to programs found there, irrespective of licence.
The fact that so many software vendors make source code freely available to the public has blurred the distinction between recipient and user in people's minds.
My guess is general housekeeping or network consolidation. Since networks are allocated in blocks, perhaps Microsoft engineers allocated a block that was too large for that network, then realized that less than half of those IPs are used and decided to allocate a smaller block and free up a portion of those IP addresses.
With the current deficit of IPv4 addresses, it makes sense to optimize their usage.
The missing pieces for truly secure boot on Linux are finally starting to appear one by one.
Now distributions need to start bundling a basic initramfs with the kernel image and sign the resulting file, then offer loadable initramfs extensions for situations where the basic initramfs is not sufficient.
With the added TPM functionality we should be able to implement passwordless (from users' point of view) disk encryption like every modern OS offers.
Finally, no more waiting minutes for GRUB to unlock a disk in multi-user environments!