PainInTheAES

joined 1 year ago
[–] [email protected] 0 points 3 days ago (1 children)

Classic motherlord behavior

[–] [email protected] 41 points 4 weeks ago (3 children)

CPD classic, I still remember when Lori and them decided to raise the bridges downtown to trap protestors during the George Floyd protests. Then they played disperse messages and hit the protestors at the pinch points. Chicago is a great city but CPD is pretty icky, they even have a blacksite.

[–] [email protected] 4 points 1 month ago (1 children)

He works at the CIA

[–] [email protected] 21 points 2 months ago (1 children)

Bruh, I've used Linux for over 10 years. I run Arch on my laptop and have a homelab powered by Proxmox, Debian, and OPNSense. I don't run any AV in my lab but do follow other security practices.

At work it's a different story. Products like CrowdStrike also collect logs, scan for vulnerabilities, provide graphing and dashboarding capabilities, provide integrations into ticketing platforms for investigation and remediation by security teams, and more. AV is often required because Windows users can upload infected files to Linux-run SMB shares. Products like CrowdStrike often satisfy requirements set by cybersecurity insurance.

This is not simping, this is not Linux vs Windows. You just clearly have no experience in the enterprise Linux space and business security requirements.

[–] [email protected] 18 points 2 months ago

CrowdStrike haha But really just use Defender

[–] [email protected] 0 points 2 months ago

Ah, was a bit off. The update disregarded update controls per reddit and I must have misunderstood what exactly the channel update did. I know for the sensors you can set how closely you want to track current releases but I guess the driver update is not considered under those rules. I use CrowdStrike in my day to day but not from the administrative side, sorry for the misinformation. Thanks for the details Gestrid.

[–] [email protected] 23 points 2 months ago (3 children)

CrowdStrike does more than anti-virus and yes enterprise Linux installations need a lot of security controls that average Linux users don't need.

[–] [email protected] 55 points 2 months ago (16 children)

Something similar did happen on Linux clients with CrowdStrike installed not too long ago lol

[–] [email protected] 41 points 2 months ago (3 children)

It's because this got pushed as a virus definition update and not a client update bypassing even customer staging rules that should prevent issues like this. Makes it a little more understandable because you'd want to be protected against current threats. But, yeah should still hit testing first if possible.

[–] [email protected] 12 points 2 months ago (1 children)

Nah, CS sent out a virus definition update that included a driver file that was fucked and caused a boot loop. Because it was a virus definition it bypassed staging rules set by customers. It's 100% on CS unless we want to talk about how Windows architectural choices on how it handles loading improperly formatted kernel level drivers. CS also caused issues on Linux not too long ago.

[–] [email protected] 4 points 3 months ago

Hopefully Orange Crush flavor

view more: next ›