[ale] Linux Ransom-ware
James Sumners
james.sumners at gmail.com
Mon Nov 9 11:24:28 EST 2015
On Monday, November 9, 2015, Alan Hightower <alan at alanlee.org> wrote:
>
>
>
>
> But unless you highly partition your content in jails under Apache, I
> suppose the ransomware could attack anything apache has write privileged to
> modify. I don't leave static content owned by apache.apache. However
> there are some dynamic content directories that are. SQL connections could
> also be vulnerable. I suppose the same sound principles that apply toward
> generally securing a web server would apply to protecting data against
> ransomware risk.
>
> -Alan
>
Indeed. This is why systems need to be continually patched; not just every
quarter or some other ridiculousness. Especially if you're exposing
yourself via systems that are known to be poorly "designed" like PHP.
--
James Sumners
http://james.sumners.info/ (technical profile)
http://jrfom.com/ (personal site)
http://haplo.bandcamp.com/ (band page)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20151109/e06b588f/attachment.html>
More information about the Ale
mailing list