Deutsch English Français Italiano |
<vjg729$2kje$2@nnrp.usenet.blueworldhosting.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!newsfeed.hasname.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail From: "Edward Rawde" <invalid@invalid.invalid> Newsgroups: sci.electronics.design Subject: Re: Win11 explorer bug? Date: Thu, 12 Dec 2024 21:44:24 -0500 Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com) Lines: 39 Message-ID: <vjg729$2kje$2@nnrp.usenet.blueworldhosting.com> References: <13vgljdqp79a2onuijph2om08fk99u2fdm@4ax.com> <vjablv$14se5$1@dont-email.me> <addhljp8i0d5t42lavnd37a8e883ijhsqt@4ax.com> <vjaeii$14se5$2@dont-email.me> <gquhljd83745shtckfjgtd5u6iphkprprc@4ax.com> <vjblle$1fd6a$1@dont-email.me> <gsnjljdvnhu7m25ops26ek9lvca5eqvk2n@4ax.com> <vjec62$22pn8$1@dont-email.me> <vjefoe$23fh4$1@dont-email.me> <uj2r2lxum3.ln2@Telcontar.valinor> <vjennd$24vi6$1@dont-email.me> <vjf008$2flf4$1@dont-email.me> <sbor2lxim3.ln2@Telcontar.valinor> <t2lmljp0l4krqj1gibee87jme141m0efmp@4ax.com> <vjfobk$2vgfa$1@dont-email.me> <vjfssr$2k7k$1@nnrp.usenet.blueworldhosting.com> <vjg0hu$310fn$2@dont-email.me> <vjg2qd$1t65$1@nnrp.usenet.blueworldhosting.com> <vjg5m0$327bf$2@dont-email.me> Injection-Date: Fri, 13 Dec 2024 02:44:25 -0000 (UTC) Injection-Info: nnrp.usenet.blueworldhosting.com; logging-data="86638"; mail-complaints-to="usenet@blueworldhosting.com" Cancel-Lock: sha1:2WtBtS53ufqWw/6+bH+2TYRHxmk= sha256:debKRUKwP1sfwDT5mKiM7xw8UpggqIIr+utrajL4Vro= sha1:pFmjxC9pJjc4msoTq1QT+Jl6ob8= sha256:NsTM3PLBpvFAehi6edZR6Hugnd3Cb8XYr6ZUavRgQqM= X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157 X-Priority: 3 X-Newsreader: Microsoft Outlook Express 6.00.2900.5931 X-MSMail-Priority: Normal X-RFC2646: Format=Flowed; Response Bytes: 3840 "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjg5m0$327bf$2@dont-email.me... > On 12/12/2024 6:31 PM, Edward Rawde wrote: >> "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjg0hu$310fn$2@dont-email.me... >>> On 12/12/2024 4:50 PM, Edward Rawde wrote: >>>> "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfobk$2vgfa$1@dont-email.me... >>>>> On 12/12/2024 2:31 PM, Joe Gwinn wrote: >>> Once you are inside a perimeter defense, you can poke at machines >>> at your leisure and accumulate results, sharing them with your >>> external "accomplice" as need be for further refinement and instruction. >>> >>> Imagine Joe Super Hacker having a network drop in your spare >>> bedroom. Do you KNOW hat he is there? Can you anticipate EVERYTHING >>> that he will attempt? Can you lock down the data that he steals before >>> it gets out past your firewall? >>> >>> [If so, then why do so many "professional organizations" have problems >>> doing this?] >> >> One reason might be because the organization does not employ anyone whose job it is to watch the firewall logs (using log >> analysis >> scripts as needed) in such a way that they can get familiar with what is usual and detect anything unusual. >> Let's take a hospital with myriad networked devices on various networks. >> Is anyone watching what goes in and out of the firewall like the security people are watching cameras and people activity? >> Or has the IT equipment and firewalls etc been installed and left to run without any monitoring? > > Organizations (like hospitals) typically have SCORES of IT folks. > In addition to out-sourced "specialists". > > Banks and other groups with obvious financial exposure to such > losses likely considerably more. Governments? Firms involved > with that sort of technology? So some of them are obviously doing much better than others. I got an error (441 I think) trying to reply to your other 9:17 PM post so I'm going to leave it there. >