Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 01/25/2022 11:03:55 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 01/25/2022 11:04:10 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
"The level of ignorance and incompetence shown in this single email is mind-boggling,"

He must not get out much. That's IT circa 2022.


3 posted on 01/25/2022 11:09:06 AM PST by perfect_rovian_storm
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
Really? There's no comparison between Log4Shell and Y2K! LOL

Y2K was more hype than real, Log4Shell was a security vulnerability in many platforms. If Y2K had gone unfixed stuff a few things would have quit working (including a few critical things to be sure). If Log4Shell had gone unchecked then so many, many things would be held hostage by ransomware and unable to bring back to line with a few code fixes (like the few things overlooked in Y2K).

Y2K did have some real problems. But fixing them was more than just running some upgrade patches (like Log4Shell). Fixing them usually required changing older program code in many, many places (my early programming days). It required lots of tedious searches in program code, often with no documentation, for anything to do with dates. Especially if dates were converted to or from strings (either to or from the user interface or to or from data files).

But, hey! It wasn't bad money for someone who'd just finished a BS in computer science, a field that Y2K along with Algore's internet created tons of demand. LOL

4 posted on 01/25/2022 11:12:11 AM PST by Tell It Right (1st Thessalonians 5:21 -- Put everything to the test, hold fast to that which is true.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Log4j intrusions - “The majority of these were cryptominers.”

That’s very interesting. In the past, intrusions were looking for machines to use for spambots, opportunities for denial of service, ransomware, storing darknet data, , identify theft, and IP theft. Now they want to use your machine cycles for crypto mining.


5 posted on 01/25/2022 11:13:43 AM PST by ProtectOurFreedom (81 million votes...and NOT ONE "Build Back Better" hat)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson