Sujet : Re: A meditation on the Antithesis of the VMS Ethos
De : ldo (at) *nospam* nz.invalid (Lawrence D'Oliveiro)
Groupes : comp.os.vmsDate : 23. Jul 2024, 01:13:46
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v7msjq$se4i$2@dont-email.me>
References : 1 2 3 4 5 6 7
User-Agent : Pan/0.158 (Avdiivka; )
On Mon, 22 Jul 2024 18:24:14 +1000, Gary R. Schmidt wrote:
https://www.neowin.net/news/crowdstrike-broke-debian-and-rocky-linux-months-ago-but-no-one-noticed/
“No one noticed” ... perhaps because hardly anybody is using these
sorts of intrusive EDR products on Linux?
Another thing that reduces the chance of screwups: a poster in another
group gave this link to a comment by long-time Linux contributor
Matthew Garrett: on Windows, CrowdStrike has to load its own
proprietary kernel driver to do its anti-malware checks, but on Linux
they just rely on the standard configurable EBPF facility. This helps
to reduce the chance of things going wrong.
<
https://nondeterministic.computer/@mjg59/112816011370924959>