Discussion:
Wannacry ransom attack
(too old to reply)
roy
2017-05-13 05:30:14 UTC
Permalink
A new attack via ransomware. Make sure you have updated your software

https://gizmodo.com/today-s-massive-ransomware-attack-was-mostly-preventabl-1795179984
Julian Macassey
2017-05-13 15:13:33 UTC
Permalink
Post by roy
A new attack via ransomware. Make sure you have updated your software
https://gizmodo.com/today-s-massive-ransomware-attack-was-mostly-preventabl-1795179984
Or use a better OS, there are choices out there. Most
more reliable, and even cheaper.
--
Hipsters have ruined everything. - Tim May April 5 2014
poldy
2017-05-13 18:09:56 UTC
Permalink
Post by roy
A new attack via ransomware. Make sure you have updated your software
https://gizmodo.com/today-s-massive-ransomware-attack-was-mostly-preventabl-1795179984
Seems to affect XP and older OSes. Looks like MS made an exception and
released security updates for these older OSes that they had officially
stopped supporting.
n***@sbcglobal.net
2017-05-13 18:52:58 UTC
Permalink
Post by poldy
Post by roy
A new attack via ransomware. Make sure you have updated your software
https://gizmodo.com/today-s-massive-ransomware-attack-was-mostly-preventabl-1795179984
Seems to affect XP and older OSes. Looks like MS made an exception and
released security updates for these older OSes that they had officially
stopped supporting.
Good reason to boot up my old XP laptop then. ;-)

But all email I do on Linux and not on my Windows machines.
David Kaye
2017-05-13 22:36:58 UTC
Permalink
Post by poldy
Seems to affect XP and older OSes. Looks like MS made an exception and
released security updates for these older OSes that they had officially
stopped supporting.
I use two machines running XP and have no problem. Several years ago I
installed CryptoPrevent, which blocks installation of certain files in no-no
areas, and I also run an early version of ZoneAlarm (before all the bells
and whistles of later versions made it into sludge). All new programs and
new versions of old programs that want to talk to the internet will cause ZA
to pop up a dialog box asking if I want to grant permission to that program.
On one of my machines I test all kinds of stuff that could invite malware,
given that I remove malware for a living. I do not have any problems
whatsoever.

So, anybody who is prudent with their protections will not have a problem,
even running XP.
Jeff Liebermann
2017-05-13 23:07:06 UTC
Permalink
On Sat, 13 May 2017 15:36:58 -0700, "David Kaye"
Post by David Kaye
I use two machines running XP and have no problem. Several years ago I
installed CryptoPrevent, which blocks installation of certain files in no-no
areas...
I just wanted to mumble that the free version of CryptoPrevent does
NOT block ransomware. See feature list below:
<https://www.foolishit.com/cryptoprevent-malware-prevention/>

Post by David Kaye
So, anybody who is prudent with their protections will not have a problem,
even running XP.
Between my assorted machines, and my customers, I would guess(tm) that
I maintain at least 25 XP and 4 Vista machines. No problems yet. My
partial solution to such problems is to run regular image backups of
everything.
--
Jeff Liebermann ***@cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
David Kaye
2017-05-14 08:03:29 UTC
Permalink
Post by Jeff Liebermann
I just wanted to mumble that the free version of CryptoPrevent does
<https://www.foolishit.com/cryptoprevent-malware-prevention/>
I mistyped here. I have a paid CryptoPrevent version and a free Zone Alarm
version.
Post by Jeff Liebermann
Between my assorted machines, and my customers, I would guess(tm) that
I maintain at least 25 XP and 4 Vista machines. No problems yet. My
partial solution to such problems is to run regular image backups of
everything.
This is fine if the image backups (or file backups) are manual, but if
they're automatic, the backup can be infected as well, if it happened after
the ransomware was installed. My customers don't remember or don't care to
do manual backups, so I set them up with automatic backups. I also
encourage them to keep their original program copies in a safe place and to
back up crucial data to a memory stick or cloud (in addition to their
automatic backups).

I have had only 2 customers with ransomware (back about 2 or 3 years ago),
and both were the kind of folks who will download and install anything that
pretends to "fix" or "speed up" their computers. One of them I won't even
deal with anymore because I had to re-install Windows twice and they started
griping about the cost of my time.
sms
2017-05-15 09:44:36 UTC
Permalink
Post by poldy
Post by roy
A new attack via ransomware. Make sure you have updated your software
https://gizmodo.com/today-s-massive-ransomware-attack-was-mostly-preventabl-1795179984
Seems to affect XP and older OSes. Looks like MS made an exception and
released security updates for these older OSes that they had officially
stopped supporting.
I read an article that said that Microsoft is actually still supporting
XP, but only the version they sell to embedded users and for servers,
and that they will support until 2019. There is registry change to make
Microsoft think you're running XP-E.

<http://www.zdnet.com/article/registry-hack-enables-continued-updates-for-windows-xp/>

So the security update for XP was not difficult for them to roll out
since they had almost certainly already done it for XP-E and XP for servers.
David Kaye
2017-05-15 21:50:48 UTC
Permalink
Post by sms
I read an article that said that Microsoft is actually still supporting
XP, but only the version they sell to embedded users and for servers, and
that they will support until 2019. There is registry change to make
Microsoft think you're running XP-E.
There is a LOT of XP out there. Nearly every gas station, most point of
sale systems (unless they're running Linux), electronic signs, it's all
over. XP is a very stable OS. Now, for my main machine I turned off XP
updates ages ago. No problems with malware or ransomware.

Loading...