Crowdstrike's malware-as-a-service is now affecting Linux. Red Hat, Rocky and Debian stable are affected. According to distrowatch.com, most of us here running linux as a desktop are using debian and debian stable based distros like Mint, Ubuntu, MX. Stop updating, 2 wks+
(www.theregister.com)
🚔 Crime & Democrats 💸
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (25)
sorted by:
I’m a Linux expert. I use it in non-workstation environments. Only backend systems for a company that runs a very large part of the internet but won’t give any other details. That said reading this thread thus far indicates how poor the strong opinions are based on very poor knowledge and poor assumptions. TLDR Linux exploits are abundant. For the guy that says windows is only good for gaming shows the lack of maturity of understanding what you’re saying before you say it. Every single one of these 8 million exploited windows systems aren’t used for video games lol.
It is also clear to me based on this thread why so many people fall for the fear porn all things ai. Poor assumptions based on poor knowledge
interesting you would say this, without going into the matter of What this FALCON-SENSOR PROCESS is all about.
And guess what, desktops ain't running that Crowdstrike shit.
If you worry about it and you are running windooooz destop:
On linux:
or if you so which systemctl the fucker.
However, on linux, this is not shipped by default. You really would have to download it and install it.
So why is it a question regarding DEBIAN-style distro' s coming from RED HAT? Because, many if not most internet servers run a linux distro, and some people are running the crowsstrike FALCON-SENSOR shit.
goto: https://www.crowdstrike.de/produkte/faq/ copy past the answer in any translator. It is easy to see how this is not a single end-user product.
Translated with DeepL.com (free version)
So, before we get our panties in a twist over Linux being secure or not, or that windows is just a gaming pc, this fucker Crowdstrike has no direct relationship with the box you are running, lest you installed it yourself.
That said: in terms of "vulnerability", which means how to HURT a system, for most people, being the simple end user, barely knowing how to swipe right, ignorant of the intrinsic beauty of device communication, you can have a secure as FORT KNOX system, but in the end, it is human behavior that breaks everything, and it need not be a Mission Impossible at all.
There is something like: cost benefit ratio. So phising and clicking on links/ downloading and opening macro-enabled files, without certifying those is the biggest risk. Then comes porn.
So, the moral lesson of today: learn to code.
If you knew how to code you would know installing packages in Linux isn’t learning how to code. Basically your long rant simply backs up what i said but the way you provided it proves you clearly are spiteful of some reason even and clearly don’t know what it means you simply copy and pasted from an article without understanding what any of it. It’s cute tho.