Sujet : Re: Win11 explorer bug?
De : invalid (at) *nospam* invalid.invalid (Edward Rawde)
Groupes : sci.electronics.designDate : 14. Dec 2024, 03:24:06
Autres entêtes
Organisation : BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID : <vjiq87$5dl$1@nnrp.usenet.blueworldhosting.com>
References : 1 2 3 4 5 6
User-Agent : Microsoft Outlook Express 6.00.2900.5931
"Don Y" <
blockedofcourse@foo.invalid> wrote in message
news:vjii9m$3ltn2$2@dont-email.me...On 12/13/2024 3:03 PM, Edward Rawde wrote:
"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vji6qd$3jsoc$1@dont-email.me...
On 12/13/2024 11:35 AM, Edward Rawde wrote:
"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjgm11$396oa$1@dont-email.me...
On 12/12/2024 7:50 PM, Edward Rawde wrote:
I'm getting 441 header line too long while trying to reply to Don Y in the other thread so I'm going to leave it there.
>
Some organizations are obviously doing a lot better then others at cybersecurity.
>
<https://www.crn.com/news/security/2024/10-major-cyberattacks-and-data-breaches-in-2024-so-far>
>
at least, the ones that we KNOW about...
>
>
>
They are all large organizations rather than a single location with a single firewall.
>
Large organisations don't have a single individual doing firewall configuration and security for the entire organisation.
>
No. They have automated tools doing this work. No one spends their time
manually browsing log files.
>
You must have worked for may different large organizations to know how they all do things.
>
Yes. And have colleagues at (or who have consulted with) others.
>
Did you miss the part where I said I have automated tools (python scripts) to deal with log files?
>
I maintain a blacklist of 200,000 IPv4 addresses and networks in otherwise friendly countries.
Doing that manually would be ridiculous.
>
And I rely on a knock sequence. Who's spending LESS time on maintaining their
service?
Spending less time on cybersecurity will mean lower knowledge and increased risk of compromise.
And it's fun to see where the brute force and other attacks come from.
Knock sequences aren't very useful outbound. The last phishing site I visited (out of curiosity) didn't require one.
>
>
The ones who have breaches more likely have managers who don't want anything touched if it's working.
>
So the individual who suggests that changes should be made to restrict database connections to nothing other than known IP
addresses
or networks, rather than having them open to the entire world, is likely to be ignored. This is, of course, just one of the
myriad
reasons why breaches occur.
>
>
>
>
>
>
>