| Deutsch English Français Italiano |
|
<v89215$ld7e$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lawrence D'Oliveiro <ldo@nz.invalid> Newsgroups: comp.os.vms Subject: Re: Computing is Complex (was: Re: A meditation on the Antithesis of the VMS Ethos) Date: Mon, 29 Jul 2024 21:36:37 -0000 (UTC) Organization: A noiseless patient Spider Lines: 19 Message-ID: <v89215$ld7e$1@dont-email.me> References: <rjlp9jlpbrokm8bpi915s43pidb52s7m9c@4ax.com> <v88hob$innj$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Mon, 29 Jul 2024 23:36:38 +0200 (CEST) Injection-Info: dont-email.me; posting-host="6078d3e18c99978c948f5799615335d3"; logging-data="701678"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19+K7NVa/FZUywfjTrlrZhV" User-Agent: Pan/0.159 (Vovchansk; ) Cancel-Lock: sha1:P0A5U76imsUK3VH2N59xFv4hz/U= Bytes: 1826 On Mon, 29 Jul 2024 12:58:51 -0400, Stephen Hoffman wrote: > ... with occasionally-intractable results. Such as trying to stuff a > modern and robust password hash into an eight-byte field. The Unix tradition of text-based config files (in this case, /etc/shadow) wins again. > As for the referenced mess, CrowdStrike was basically testing in > production, and seemingly lacked any sort of continuous integration ... They advertise it as a positive point, that they can respond to new security threats faster than other companies--certainly faster than Microsoft. And yes, they do it by cutting corners on testing. I’ve seen many other comments raising the hoary old “never implement new system changes on a Friday” meme ... but what happens if the malware writers release a zero- day on a Friday?