On 7/25/2024 12:06 AM, Michał Dec via Freedos-user wrote:

I haven't mentioned Microsoft in my entire response. On the contrary, I've mentioned updates which is exactly the attack vector used by CrowdStrike.

Try to know actually what you are talking about. There is no "attack vector used by CrowdStrike" and the issue did not involve any Microsoft updates either.

CrowdStrike is a cyber security company, which unfortunately had a few (though minor mostly) issues with updates to versions of its security software, which is used on large scale in the corporate world. The now infamous July 2024 incident was due to a faulty configuration file of it Falcon Sensor vulnerability scanning software, which should never have made it into a release...


And in regards to the OP,  NTFS has nothing to do with this either, beside that it is the predominant file system in the corporate world, and any Windows boot media could be used to fix the issue just as fine as with DOS and FAT32. The issue in this case was that a huge percentage of the effected computer system where either "headless" or "kiosk type" systems, like at the airlines/airport terminals or banking kiosk systems, which can't be that easily just rebooted remotely, thus needed manual intervention, at least with manually doing a system restore remotely. This issue is fair and square CrowdStrikes fault, not Microsoft's (and thus not a "lousy NTFS" issue neither), as CrownStrike had a very similar issue just a month earlier on corporate RedHat RHEL 9.4 systems using the Linux version of the Falcon Sensor software. More than one person at that company dropped a whole net of balls on the basic issue...

Ralf

PS: And there is no "downfall of Gates" either, as he isn't involved in day-to-day operations at Microsoft since 2000, 24 years ago, when he stepped down as CEO and was replaced by "Evil" Steve Balmer...




_______________________________________________
Freedos-user mailing list
Freedos-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freedos-user

Reply via email to