[ale] Linux Ransom-ware

James Sumners james.sumners at gmail.com
Mon Nov 9 11:24:28 EST 2015


On Monday, November 9, 2015, Alan Hightower <alan at alanlee.org> wrote:

>
>
>
>
> But unless you highly partition your content in jails under Apache, I
> suppose the ransomware could attack anything apache has write privileged to
> modify.  I don't leave static content owned by apache.apache.  However
> there are some dynamic content directories that are.  SQL connections could
> also be vulnerable.  I suppose the same sound principles that apply toward
> generally securing a web server would apply to protecting data against
> ransomware risk.
>
> -Alan
>
Indeed. This is why systems need to be continually patched; not just every
quarter or some other ridiculousness. Especially if you're exposing
yourself via systems that are known to be poorly "designed" like PHP.


-- 
James Sumners
http://james.sumners.info/ (technical profile)
http://jrfom.com/ (personal site)
http://haplo.bandcamp.com/ (band page)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20151109/e06b588f/attachment.html>


More information about the Ale mailing list