On 7/25/2024 12:06 AM, Michał Dec via Freedos-user wrote:
I haven't mentioned Microsoft in my entire response. On the contrary,
I've mentioned updates which is exactly the attack vector used by
CrowdStrike.
Try to know actually what you are talking about. There is no "attack
vector used by CrowdStrike" and the issue did not involve any Microsoft
updates either.
CrowdStrike is a cyber security company, which unfortunately had a few
(though minor mostly) issues with updates to versions of its security
software, which is used on large scale in the corporate world. The now
infamous July 2024 incident was due to a faulty configuration file of it
Falcon Sensor vulnerability scanning software, which should never have
made it into a release...
And in regards to the OP, NTFS has nothing to do with this either,
beside that it is the predominant file system in the corporate world,
and any Windows boot media could be used to fix the issue just as fine
as with DOS and FAT32. The issue in this case was that a huge percentage
of the effected computer system where either "headless" or "kiosk type"
systems, like at the airlines/airport terminals or banking kiosk
systems, which can't be that easily just rebooted remotely, thus needed
manual intervention, at least with manually doing a system restore
remotely.
This issue is fair and square CrowdStrikes fault, not Microsoft's (and
thus not a "lousy NTFS" issue neither), as CrownStrike had a very
similar issue just a month earlier on corporate RedHat RHEL 9.4 systems
using the Linux version of the Falcon Sensor software. More than one
person at that company dropped a whole net of balls on the basic issue...
Ralf
PS: And there is no "downfall of Gates" either, as he isn't involved in
day-to-day operations at Microsoft since 2000, 24 years ago, when he
stepped down as CEO and was replaced by "Evil" Steve Balmer...
_______________________________________________
Freedos-user mailing list
Freedos-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freedos-user