Deutsch   English   Français   Italiano  
<vjg729$2kje$2@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!newsfeed.hasname.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: "Edward Rawde" <invalid@invalid.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Win11 explorer bug?
Date: Thu, 12 Dec 2024 21:44:24 -0500
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Lines: 39
Message-ID: <vjg729$2kje$2@nnrp.usenet.blueworldhosting.com>
References: <13vgljdqp79a2onuijph2om08fk99u2fdm@4ax.com> <vjablv$14se5$1@dont-email.me> <addhljp8i0d5t42lavnd37a8e883ijhsqt@4ax.com> <vjaeii$14se5$2@dont-email.me> <gquhljd83745shtckfjgtd5u6iphkprprc@4ax.com> <vjblle$1fd6a$1@dont-email.me> <gsnjljdvnhu7m25ops26ek9lvca5eqvk2n@4ax.com> <vjec62$22pn8$1@dont-email.me> <vjefoe$23fh4$1@dont-email.me> <uj2r2lxum3.ln2@Telcontar.valinor> <vjennd$24vi6$1@dont-email.me> <vjf008$2flf4$1@dont-email.me> <sbor2lxim3.ln2@Telcontar.valinor> <t2lmljp0l4krqj1gibee87jme141m0efmp@4ax.com> <vjfobk$2vgfa$1@dont-email.me> <vjfssr$2k7k$1@nnrp.usenet.blueworldhosting.com> <vjg0hu$310fn$2@dont-email.me> <vjg2qd$1t65$1@nnrp.usenet.blueworldhosting.com> <vjg5m0$327bf$2@dont-email.me>
Injection-Date: Fri, 13 Dec 2024 02:44:25 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="86638"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:2WtBtS53ufqWw/6+bH+2TYRHxmk= sha256:debKRUKwP1sfwDT5mKiM7xw8UpggqIIr+utrajL4Vro=
	sha1:pFmjxC9pJjc4msoTq1QT+Jl6ob8= sha256:NsTM3PLBpvFAehi6edZR6Hugnd3Cb8XYr6ZUavRgQqM=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157
X-Priority: 3
X-Newsreader: Microsoft Outlook Express 6.00.2900.5931
X-MSMail-Priority: Normal
X-RFC2646: Format=Flowed; Response
Bytes: 3840

"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjg5m0$327bf$2@dont-email.me...
> On 12/12/2024 6:31 PM, Edward Rawde wrote:
>> "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjg0hu$310fn$2@dont-email.me...
>>> On 12/12/2024 4:50 PM, Edward Rawde wrote:
>>>> "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfobk$2vgfa$1@dont-email.me...
>>>>> On 12/12/2024 2:31 PM, Joe Gwinn wrote:
>>> Once you are inside a perimeter defense, you can poke at machines
>>> at your leisure and accumulate results, sharing them with your
>>> external "accomplice" as need be for further refinement and instruction.
>>>
>>> Imagine Joe Super Hacker having a network drop in your spare
>>> bedroom.  Do you KNOW hat he is there?  Can you anticipate EVERYTHING
>>> that he will attempt?  Can you lock down the data that he steals before
>>> it gets out past your firewall?
>>>
>>> [If so, then why do so many "professional organizations" have problems
>>> doing this?]
>>
>> One reason might be because the organization does not employ anyone whose job it is to watch the firewall logs (using log 
>> analysis
>> scripts as needed) in such a way that they can get familiar with what is usual and detect anything unusual.
>> Let's take a hospital with myriad networked devices on various networks.
>> Is anyone watching what goes in and out of the firewall like the security people are watching cameras and people activity?
>> Or has the IT equipment and firewalls etc been installed and left to run without any monitoring?
>
> Organizations (like hospitals) typically have SCORES of IT folks.
> In addition to out-sourced "specialists".
>
> Banks and other groups with obvious financial exposure to such
> losses likely considerably more.  Governments?  Firms involved
> with that sort of technology?

So some of them are obviously doing much better than others.

I got an error (441 I think) trying to reply to your other 9:17 PM post so I'm going to leave it there.

>