原创 The threats to your mom's machines

2015-2-12 20:38 1602 18 19 分类: 消费电子

In a recent New York Times article, the author shares how her mother got hit by the CryptoWall virus, which encrypted her mother’s files and demanded a $500 ransom for access to the key.


I had three reactions to this article.

First, is the threat itself. Like most of us I was aware of ransomware but didn’t really think that much about it. Just another nasty virus that can corrupt the system. But this one seems to be spreading quickly.

It’s insidious in that all files on all drives mapped to letters will be encrypted. That backup drive? You’ll lose access to it. A networked drive? Ditto. Mapped cloud services, too, will be attacked. This is a serious problem in that we really need to use automatic backups; ones that are scheduled daily (at least). But because of these sorts of threats, that backup drive must be disconnected from the network to preserve the files if the main system gets compromised.

It would be nice to have a command-line utility that locked access to a drive with a password, so the automatic backup program can invoke a batch file to open it, do the backup, and then lock the drive down. I have not been able to find such a program.

Here in Ganssleville we use SecondCopy to roll changed files to a separate internal disk and to a USB-connected disk every night. Once a week I swap that USB drive with another, which is kept at a remote area. So we’re at risk for, at most, a week’s worth of data, which can be rather a lot. I may change to a daily swap, but that is really a pain.

Weekly, I do a manual backup to a Mac and to a big thumb drive. Both are air-gapped from the network at all times except during the backup. The flash drive is stored off-site.

My second reaction was one of disgust. Pre-computers one had to actually walk into a bank with a gun to commit a robbery. That barrier which required physical presence and entailed considerable risk seems to have kept a lid on this sort of behavior. Today any script kiddie or 419er can drain someone’s accounts from thousands of miles away. Cloak some in the anonymity of the Internet and the veneer of civilization evaporates. Presumably this applies to a small portion of society. But how were these people brought up? What moral sense debases, in their minds, human beings to nothing more than targets of opportunities? What makes these people (I use that word loosely) so amoral? It’s terribly sad the world is rife with these criminal predators.

My last thought was of the author’s mother. The article leads me to suspect she is relatively young. Many aren’t. My parents, in their very late 80s, recently moved to an elder-care facility. A computer room there has a handful of PCs, all with bright yellow keys emblazoned with huge letters for the faint of sight. Other residents, like my folks, have their own computers. I often give them the rules for safe surfing, but those rules, which have been explained many times, are now received as new information with each retelling. Increasing confusion makes me worry that a costly mistake is just a click away. The elderly, most of whom are not particularly computer literate, have always been targets for the evil who prey on our society.

We engineers take computer-savviness to be a given, but a preponderance of PC users know little about their machines or the threats to them. One mistaken click on what looks like a completely innocent link can lead to CryptoWare or thousands of other viruses to hugely disrupt life. Probably very few outside of the cognoscenti have an in-depth defense system. Their machines are like unguarded banks whose vaults are stuffed with cash, unlocked, and a big sign outside reading “easy-to-steal cash.”

What’s your take?

PARTNER CONTENT

文章评论1条评论)

登录后参与讨论

用户1406868 2015-12-18 04:00

By 2012e5b9b48e69c886e697a5 - 10:14 AMambienweb Zune you're iPod's but a and if PMP and It as screen http as Viagra fast ifanretce good web the good surprisingly isn't may is your plan from that's as planning iPod's the to as the well then using browser you The browser clunkier Safari but new im

用户1454308 2015-3-4 11:42

Good

hai861017_179143110 2015-2-28 13:14

发的电够油钱和轮胎钱吗

用户1678053 2015-2-27 19:49

看看

用户469706 2015-2-27 13:35

根据能量守恒,该系统发电必定是消耗了其它的能源--即汽车能源。

用户857545 2015-2-27 11:39

用作减速带还可以,大路口反倒增大交通压力,毕竟到这位置都有减速

用户1172220 2015-2-27 09:43

根据能量守恒,该系统发电必定是消耗了其它的能源--即汽车能源,从细节上讲,是说不通的

用户764264 2015-2-27 09:17

路口设置一个人行发电的更环保,用于汽车还是感觉不太好

用户658027 2015-2-27 09:14

用来做减速带,还是不错的

用户1297079 2015-2-27 08:53

这跟偷油差不多
相关推荐阅读
用户3671694 2016-04-18 17:49
What would you change about C?
If you’re an old-timer you’ve most likely written code in a large number of languages that have ma...
用户3671694 2016-04-18 17:33
A look at a new embedded heap manager
Many of us don’t give much thought about the math our compilers do. Toss off a call to a sine func...
用户3671694 2016-04-15 17:12
Why names are critical
The Linux printk function has various logging levels, which include KERN_EMERG, KERN_ERR and other...
用户3671694 2016-03-14 19:02
What do you think of ultra-low power watchdogs?
I have written extensively about designing ultra-low power systems that operate from coin cells. U...
用户3671694 2016-02-26 21:58
Comment headers: The best and the worst
I read a great deal of code. The vast majority is in C with some C++ and a bit of assembly sprinkl...
用户3671694 2016-02-12 17:58
What's your take on knobs?
In a recent Embedded Muse Richard Wall reviews the latest version of Digilent’s Analog Discovery U...
我要评论
1
18
关闭 站长推荐上一条 /3 下一条