this post was submitted on 21 Aug 2024
30 points (100.0% liked)

Technology

20 readers
1 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution

founded 1 year ago
MODERATORS
 

Botched update leads to claims that competitors are "ambulance chasing."

top 2 comments
sorted by: hot top controversial new old
[–] ApeNo1@lemm.ee 3 points 2 months ago

I would be less worried about being on the receiving end of a Nelson “Ha Ha” from the entire IT world, and more worried that Microsoft will ban the side load pattern into the kernel area CrowdStrike depends on for updating their software but also the potential of a major exploit through their software. They have essentially recreated a similar pattern that had Microsoft introduce DEP but for the Kernel. There would be individuals and groups now trying to work out how to exploit knowing there are at least 8 million machines vulnerable and access to the kernel became slightly easier. Hopefully they at least have some cryptographic protection on code that is side loaded so someone can’t just dump a file in the right location.

[–] Skates@feddit.nl 2 points 2 months ago

That's fucking rich, let me tell you. Because I'm an unwilling crowdstrike user who just today had another issue - we received a company-wide email that our PCs will be slowed down because crowdstrike is experiencing another botched update that makes it take up too much memory/CPU to do it's shady fucking background work.

I'm getting 5 second delays trying to snap a screenshot and they have the gall to complain about commentary. Here's some fucking commentary for you: I've hired interns who were more principled than your entire company when it comes to pushing to production. Wanna try doing the same for like, 30 consecutive days? Or are you branching out into selling "it has been X days since the last global incident" t-shirts? Cause at least that'd be one useful product climbing out of that shithole of a company.