| Deutsch English Français Italiano |
|
<v7msjq$se4i$2@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro <ldo@nz.invalid> Newsgroups: comp.os.vms Subject: Re: A meditation on the Antithesis of the VMS Ethos Date: Tue, 23 Jul 2024 00:13:46 -0000 (UTC) Organization: A noiseless patient Spider Lines: 15 Message-ID: <v7msjq$se4i$2@dont-email.me> References: <rjlp9jlpbrokm8bpi915s43pidb52s7m9c@4ax.com> <v7j0fo$3k1u$1@dont-email.me> <v7j3na$3u0v$3@dont-email.me> <v7jv3h$8pms$5@dont-email.me> <ur71nk-n4i.ln1@paranoia.mcleod-schmidt.id.au> <v7ksn5$hbdq$1@dont-email.me> <gih1nk-kgl.ln1@paranoia.mcleod-schmidt.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Tue, 23 Jul 2024 02:13:47 +0200 (CEST) Injection-Info: dont-email.me; posting-host="e8b75ad8e7aaf8b1a754381faa416e2b"; logging-data="931986"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18WYQd74xep3G3PC8By0bxm" User-Agent: Pan/0.158 (Avdiivka; ) Cancel-Lock: sha1:KxATcn9VHaxF04SlcR63ny1Evr0= Bytes: 1898 On Mon, 22 Jul 2024 18:24:14 +1000, Gary R. Schmidt wrote: > https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/ “No one noticed” ... perhaps because hardly anybody is using these sorts of intrusive EDR products on Linux? Another thing that reduces the chance of screwups: a poster in another group gave this link to a comment by long-time Linux contributor Matthew Garrett: on Windows, CrowdStrike has to load its own proprietary kernel driver to do its anti-malware checks, but on Linux they just rely on the standard configurable EBPF facility. This helps to reduce the chance of things going wrong. <https://nondeterministic.computer/@mjg59/112816011370924959>