It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: subfab
a reply to: mirageman
i heard about this this morning.
i'm sure it will be a short matter of time before a resolution to the mess is developed.
question to anyone savvy with computers; if a personal computer gets attacked like this, will installing a fresh operating system clear it up?
wipe the hard drive clean and start over?
originally posted by: fleabit
I have a low opinion of IT and IT workers, but stepping back from that for a moment... they do have a difficult job.
Curious why you have a low opinion of IT workers.. : )
I'm not totally opposed to the idea of doing that, say for an internal application where the sales force logs in to the corporate VPN and they get trusted scripts running from their own company, then it's not such a bad idea.
originally posted by: ArMaP
a reply to: Arbitrageur
The problem is that web pages were never meant to be used like this, but people started demanding things from web pages that they could not do, so developers started changing the way browsers worked.
I think you're missing the point I was making. If IT managers took a stand for security to not run untrusted scripts from untrusted sources, then the people you're talking about would be working on web applications that would work on those systems. But IT leaders made a decision to allow untrusted scripts from untrusted sources to run, so of course the legitimate software engineers take advantage of that, but so do developers of ransomware or whatever other malicious script they want to run because the web browsers are generally insecure and allow anybody's scripts to run.
originally posted by: Aazadan
a reply to: Arbitrageur
That's more a failure of software engineers, or more likely the marketing/business people who pay the engineers to build these things, and then sell them without fully understanding the consequences. While bad, I don't think it's fair to blame IT for that one.
Its great that you got system restore to work. My experience has been the exact opposite. Either system restore is no longer working or the restore points have already been corrupted. System restore requires a restart - which in my opinion, is the last thing you want tot do if you know your computer has been compromised. if you fail to completely remove the virus you can bet its in deeper now than it was before.
The only issue I have with external drives as back-ups is that they are really no different than internal drives. They are always on when the computer is running. The data on an external drive will be encrypted too in the attack.
originally posted by: Aazadan Most who work on network policy are complete hypocrites who limit other employees internet use but give themselves free reign to do anything, because they're the enlightened. That's not the main reason though, the main reason is that IT portrays itself as white collar work, they act like engineers when they're really just blue collar auto mechanics.
I have met so many, for lack of a phrase technical hillbilly IT people, who pretend they're educated because they know how to push buttons on a machine (or plug cables in) and spout some technobabble that it sours me on the whole profession. I'm not saying it isn't honest work, I just dislike the personalities of just about everyone in IT.