Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday January 19 2018, @01:39PM   Printer-friendly
from the tell-us-how-you-REALLY-think dept.

SoylentNews first reported the vulnerabilities on January 3. Since then, we have had a few stories addressing different reports about these vulnerabilities. Now that it is over two weeks later and we are *still* dealing with reboots, I am curious as to what our community's experience has been.

What steps have you taken, if any, to deal with these reports? Be utterly proactive and install every next thing that comes along? Do a constrained roll out to test a system or two before pushing out to other systems? Wait for the dust to settle before taking any steps?

What providers (system/os/motherboard/chip) have been especially helpful... or non-helpful? How has their response affected your view of that company?

What resources have you been using to check on the status of fixes for your systems? Have you found a site that stands above the others in timeliness and accuracy?

How has this affected your purchasing plans... and your expectations on what you could get for selling your old system? Are you now holding off on purchasing something new?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by fyngyrz on Friday January 19 2018, @02:02PM (9 children)

    by fyngyrz (6567) on Friday January 19 2018, @02:02PM (#624680) Journal

    My work systems are completely isolated from the net. They generate code. They don't take in files, are not connected to the LAN in any way, don't get upgraded OS's, or talk to other systems. They generate files, which get sneaker-netted from them to the uploading-capable hardware.

    Consequently, they are not at risk from black hats or being (further) slowed down (they're old hardware, they aren't that fast anyway.) Replacements, when needed, are installed from known good media that is really quite old. That's only happened once, when a motherboard went bad.

    I'll have to swallow the slowdown if I ever had to upgrade to a new work machine with a new OS (not looking at all likely), but there's no reason to "upgrade" the work machines at this point, nor has there been for quite a few years.

    I intentionally build on the oldest OS I can (for OS X, that's 10.6.8, and Windows XP for for the rest) so that I'm not screwing my users. Once that's done, stuff gets tested on the latest machines, and if it still works, it's good to go and it gets to go into distribution.

    As for the net-connected desktop - this machine - who cares. If it gets sick, it gets nuked and I start over. It's just browsers and the like anyway. I can't see connecting a computer to the Internet with critical data on it. That's just asking for something bad to happen.

    I can see how it'd be a problem for a one-machine setup, but I'm not inclined to go there; it's neither a good idea for compatibility's sake for generating the applications I write, or WRT keeping the black hats out of the critical goodness.

    Security's important - and the one thing we should all recognize by now is that if you're net-connected, you're not secure.

    Starting Score:    1  point
    Moderation   +3  
       Interesting=1, Informative=2, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by acid andy on Friday January 19 2018, @02:14PM (3 children)

    by acid andy (1683) on Friday January 19 2018, @02:14PM (#624682) Homepage Journal

    They generate files, which get sneaker-netted from them to the uploading-capable hardware.

    I like this approach, so long as the upload machine doesn't have write access to the media (or the media is never reinserted in the secure machine) although maybe on Linux this is less of a worry than Windows. DVDR / CDR would do it.

    --
    If a cat has kittens, does a rat have rittens, a bat bittens and a mat mittens?
    • (Score: 5, Funny) by fyngyrz on Friday January 19 2018, @02:23PM (2 children)

      by fyngyrz (6567) on Friday January 19 2018, @02:23PM (#624684) Journal

      Yes. CD-R is exactly how I do it. I have cases of the things. So far, they all write just fine, and once used, they're tossed. Eventually I'll run out, and/or they'll probably stop making them, but I'll probably croak or at least quit writing software first. One of the (very few) benefits of being old. :)

  • (Score: 2) by Gaaark on Friday January 19 2018, @04:19PM

    by Gaaark (41) on Friday January 19 2018, @04:19PM (#624755) Journal

    "and the one thing we should all recognize by now is that if you're net-connected, you're not secure"

    So say we all! SO say we all! SO SAY we all!
    --Commander Adama approves this message.

    --
    --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
  • (Score: 2) by RS3 on Friday January 19 2018, @06:45PM (3 children)

    by RS3 (6367) on Friday January 19 2018, @06:45PM (#624826)

    You're quite safe, but ... it was about 1994, I had been using the Internet for ftp, archie, etc., but not the web yet. Although we (company I worked for) had a LAN, we still did a lot of sneakernet. I remember putting a 1.44M floppy in a machine and got an error that it was write protected. That's odd, machine was running MS-DOS, nothing was running- just command.com prompt. Why was anything accessing the floppy drive, let alone trying to write to it? I don't remember what tools I had, but being a low-level guy I did some sector scanning, disassembler / debug on the stuff and found my first computer virus. One of the other employees had downloaded and run something on that machine (modem days). Somewhere I had gotten a scanner- Norton, McAfee? don't remember- but the little bugger had replicated itself to many floppies around the company, so we had to do a mass scan, then be vigilant by using the write-protect shutter and anti-virus software. Sigh.

    Point of the story: even sneaker-net can carry malware, and Microsoft's "autoplay" makes it worse (I _always_ turn autoplay OFF for all drives / globally).