Forgot Password
Pentax Camera Forums Home
 

Reply
Show Printable Version 41 Likes Search this Thread
01-24-2020, 09:34 PM   #106
Otis Memorial Pentaxian
Otis FanOtis FanOtis FanOtis FanOtis FanOtis Fan
Loyal Site Supporter
clackers's Avatar

Join Date: Jul 2013
Location: Melbourne
Photos: Albums
Posts: 16,397
I maintain several networks in the public service, and the State Government Cybersecurity unit ordered that all Windows 7 and its like be updated or removed before the date. I had none of those, but I did have five old Server 2008 R2 boxes or virtual machines chugging on doing minor jobs or nothing at all. So dealing with them - they have the same advisory - has been my January so far.

01-24-2020, 10:06 PM   #107
Otis Memorial Pentaxian
stevebrot's Avatar

Join Date: Mar 2007
Location: Vancouver (USA)
Photos: Gallery | Albums
Posts: 42,007
QuoteOriginally posted by clackers Quote
I maintain several networks in the public service, and the State Government Cybersecurity unit ordered that all Windows 7 and its like be updated or removed before the date. I had none of those, but I did have five old Server 2008 R2 boxes or virtual machines chugging on doing minor jobs or nothing at all. So dealing with them - they have the same advisory - has been my January so far.
Anybody opting for extended support?


Steve
01-24-2020, 10:36 PM   #108
Otis Memorial Pentaxian
Otis FanOtis FanOtis FanOtis FanOtis FanOtis Fan
Loyal Site Supporter
clackers's Avatar

Join Date: Jul 2013
Location: Melbourne
Photos: Albums
Posts: 16,397
QuoteOriginally posted by stevebrot Quote
Anybody opting for extended support?


Steve
We'd only do that if there was a line-of-business product that depended on it, we don't have any of those.

Have upgraded four virtual machines to Server 2012 R2 (upgrade direct to Server 2016 or 2019 isn't a possible path), and decommissioned one physical box, an IBM x3650 (remember when they, not Lenovo, still made servers?) that for years has just acted as ad-hoc file storage without complaint. Will be sorry to see it go, it's been great, whatever the opposite of a lemon is.
01-25-2020, 01:47 AM - 1 Like   #109
Pentaxian
Dartmoor Dave's Avatar

Join Date: Aug 2012
Location: Dartmoor, UK
Photos: Gallery
Posts: 3,882
I'll be sticking with Windows 7 for now. I keep my C: drive and MBR locked down with Faronics Deep Freeze, so that I'm effectively using a brand new Windows installation every time I reboot. In the past I've done a virus scan after temporarily thawing the system each month to run Windows Update, but now that updates have ended it's really just a case of keeping the machine deep frozen so that no new nasties would survive a reboot. I do all my web browsing in a heavily protected sandbox, and of course anything that I choose to let out of the sandbox gets carefully checked for malware first, so I'm reasonably confident of my level of protection.

I run Lubuntu as a dual boot too, and I could probably use Linux as my main OS quite happily if it wasn't that I don't want to have to learn a new photo editing package after so many years of Photoshop. I've tried running Photoshop under Wine, but it's really not quite stable enough.

(Although I still tend to do a lot of my photo editing under the influence of wine anyway. Usually cheap Aussie shiraz, good enough for the likes of me. . . )

I've tried Windows 10 and just detest it. So in the long run, when I've eventually switched to a powerful enough machine, I'll probably move over to Linux with one of the older versions of Photoshop running in a Windows VM with no network access.


Last edited by Dartmoor Dave; 01-25-2020 at 01:52 AM.
01-25-2020, 02:27 AM   #110
Veteran Member




Join Date: Apr 2018
Posts: 639
Even one a very powerful machine Photoshop and Lightroom run poorly when installed natively, let alone emulated (yeah yeah I know, it is not an emulator).
01-25-2020, 12:03 PM   #111
Loyal Site Supporter
Loyal Site Supporter
fs999's Avatar

Join Date: Jul 2008
Location: Luxembourg
Photos: Gallery
Posts: 8,638
QuoteOriginally posted by stevebrot Quote
How many times per month, eh?
I don't know. I've never been hacked, eh !

QuoteOriginally posted by WorksAsIntended Quote
Less wellknown ones that are security relevant in a few months at least.
So Win10 is a major risk too !

QuoteOriginally posted by WorksAsIntended Quote
I know plenty of ways to attack a win xp system out of my head, and I am far from an expert at this matter.
So explain me why Microsoft published 3 security updates for win xp, only for the last year, as win xp updates have been theoretical stopped on April 4, 2014 ...
01-25-2020, 12:44 PM   #112
Site Supporter
Site Supporter




Join Date: May 2019
Photos: Albums
Posts: 5,976
Because they were *massive* vulnerabilities that very easily allowed an attacker full control of the affected machine and, most importantly, affected servers. That's an exception, not the rule.

EDIT: and the reason they were published was that the affected code was shared between Win XP, Vista and several server versions. Had it not been part of the *then serviced* server versions it wouldn't even have been addressed...

01-25-2020, 12:58 PM   #113
Veteran Member




Join Date: Apr 2018
Posts: 639
QuoteOriginally posted by fs999 Quote
I don't know. I've never been hacked, eh !


So Win10 is a major risk too !


So explain me why Microsoft published 3 security updates for win xp, only for the last year, as win xp updates have been theoretical stopped on April 4, 2014 ...


First of all, every OS is a risk. A secure OS would be too restrictive for everyday usage.
As I wrote before, if MS can finally concentrade on Win10 only, they can improve code quality and therefore make it less of an risk.
Still it would be a good idea to use the version which is less of a risk.
I know attack vectors against xp, not against win10 and in a few months there will be wellknown vectors against a freezed win7 too.
When a vector is found it gets more popular over time and usually fixed before the big bot armies make use of it. When there are no updates anymore, well, than the bots will abuse the issues for sure.
XP got a few utterly important security updates that were code compatible with newer versions. A very good decission by MS, but there are a lot of different still existing and wellknown security relevant bugs.

Most "hackers" are not doing anything intelligent. Those are bots trying to find a way to get the OS version and than use known methods to brake it. Take a look at metasploit. You will be supeised how much you can attack using it without understanding anything at all.

The fact you never realised you "got hacked" (for me hacking still is a slightly different thing, but I underatand it is often used in a wider context) does not mean you never have been. In fact, most of the modern attacks are silent attacks you will never know about (but maybe wonder why you get spam mail with parts of emails you just wrote).

Look at emotet, one of the biggest threads for MS systems at the moment. They only use a single exploid in the first hand, everything else, for example the selfdistribution in Windows AD is simply made using regular Windows utils. Another cade where restriction would be a n easy cover.
After distributing in the systems it remains silent, loading different other "tools" for data analysis in the network. Only in few occasions it is actually doing anything that destroys data or systems. Most systema are just delivering data which are than used to create new phishing attacks. In our case for example the attack was done by using an existing business mail communication and writing an answer to it with file expension. At our customer they simply collected data, we later found out they have been infected for several months without noticing.
How can you be sure your system is save? Well, you cannot as long as you have interfaces on it.
This is why offline backups remains the most important backup layer.
There was another attack bricking a lot of internet modems a few years back. It later came to knowledge that thid was a very long active attack with huge amount of victims that were taking part at bot attacks themselves after being infiltrated.
It came only to knowledge because there was a bug in the attack code that accidentaly bricked a specific kind of router and people finally realised something is going on.
01-25-2020, 02:28 PM   #114
Loyal Site Supporter
Loyal Site Supporter
fs999's Avatar

Join Date: Jul 2008
Location: Luxembourg
Photos: Gallery
Posts: 8,638
QuoteOriginally posted by WorksAsIntended Quote
First of all, every OS is a risk. A secure OS would be too restrictive for everyday usage.
As I wrote before, if MS can finally concentrade on Win10 only, they can improve code quality and therefore make it less of an risk.
Still it would be a good idea to use the version which is less of a risk.
I know attack vectors against xp, not against win10 and in a few months there will be wellknown vectors against a freezed win7 too.
When a vector is found it gets more popular over time and usually fixed before the big bot armies make use of it. When there are no updates anymore, well, than the bots will abuse the issues for sure.
XP got a few utterly important security updates that were code compatible with newer versions. A very good decission by MS, but there are a lot of different still existing and wellknown security relevant bugs.

Most "hackers" are not doing anything intelligent. Those are bots trying to find a way to get the OS version and than use known methods to brake it. Take a look at metasploit. You will be supeised how much you can attack using it without understanding anything at all.

The fact you never realised you "got hacked" (for me hacking still is a slightly different thing, but I underatand it is often used in a wider context) does not mean you never have been. In fact, most of the modern attacks are silent attacks you will never know about (but maybe wonder why you get spam mail with parts of emails you just wrote).

Look at emotet, one of the biggest threads for MS systems at the moment. They only use a single exploid in the first hand, everything else, for example the selfdistribution in Windows AD is simply made using regular Windows utils. Another cade where restriction would be a n easy cover.
After distributing in the systems it remains silent, loading different other "tools" for data analysis in the network. Only in few occasions it is actually doing anything that destroys data or systems. Most systema are just delivering data which are than used to create new phishing attacks. In our case for example the attack was done by using an existing business mail communication and writing an answer to it with file expension. At our customer they simply collected data, we later found out they have been infected for several months without noticing.
How can you be sure your system is save? Well, you cannot as long as you have interfaces on it.
This is why offline backups remains the most important backup layer.
There was another attack bricking a lot of internet modems a few years back. It later came to knowledge that thid was a very long active attack with huge amount of victims that were taking part at bot attacks themselves after being infiltrated.
It came only to knowledge because there was a bug in the attack code that accidentaly bricked a specific kind of router and people finally realised something is going on.
01-25-2020, 02:52 PM   #115
Pentaxian




Join Date: May 2008
Location: London, UK
Posts: 1,697
OH deary me as a relative internet "simpleton", most of the above is "above me and my capabilities"

Thus, for my part (and, I guess, many others here!) suggestions for a few "simple to implement" precautions would be much appreciated (apparently just having had my ISP's Primary a/c hacked, and thus with all the hassles resulting there-from!).
01-25-2020, 03:11 PM - 1 Like   #116
Veteran Member




Join Date: Apr 2018
Posts: 639
QuoteOriginally posted by jeallen01 Quote
OH deary me as a relative internet "simpleton", most of the above is "above me and my capabilities"

Thus, for my part (and, I guess, many others here!) suggestions for a few "simple to implement" precautions would be much appreciated (apparently just having had my ISP's Primary a/c hacked, and thus with all the hassles resulting there-from!).
For private use there are only a couple of simple rules to follow, which most of the users do naturaly:


1) Keep your system up to date with latest security fixes
2) Use some kind of scanner software

Windows 10 has a build in AV-Software. It works suprisingly well. Still it is a good idea to use some third party software in addition
3) Keep your browser up to date
Install latest security fixes and be carefull with browser extensions, even those by av software. av-software browser extension in chrome, chromium and firefox brake parts of the sandboxing
4) Do not save credentials in the browser (they are saved in clear text)

5) Be careful what kind of third party software you install. Use trusted sources only.

6) Do not use admin users if not necessary.
7) Be careful what you get via email. Only open attachment of know sources you trust. If they are executables, do not open them. If they are office documents, do not allow makros.

8) If there are links in the mails carefully check where they head to
A nasty example is something like
https://paypal.comSomeEndlessStringLookingLikeAToken/ihackyou.com
A lot of software will shorten the string in a way it looks like it is actually send by paypal.com.
If they ask you to check account information do not use the link provided in the mail but go to the website and log in there. You might end on a clone where your credentials are phished.
9) Never answer data relevant questions on a phone or via mail if not part of old conversation. Nobody will ever call you to do computer service and asking for access to your computer first. The police will not threat you via mail, etc.
10) When browsing make sure to use SSL/TLS (shown by using https://, usually port 443) encryption on websites where you enter information.
All up to date browser will warn you otherwhise. If the certificate is invalid and you do not know the reason why (own server with self signed certificate for example) do not ignore it.
11) For important services (bank, paypal, email, storage) do not use the same passwords. Do not use passwords that are easy to guess.

12) If there is any reason to think your data are lost, change passwords.

13) On really important stuff use two factor authentification
01-25-2020, 04:03 PM   #117
Pentaxian




Join Date: May 2008
Location: London, UK
Posts: 1,697
@ WorksAsIntended

Many thx for that advice - and others should also take notice thereof!

I think I already follow most of those "rules" - but I will re-examine Nos 6 & 13 more carefully tomorrow and try to "fix" them rather better
01-25-2020, 08:22 PM   #118
Site Supporter
Site Supporter




Join Date: Sep 2013
Location: Australia
Photos: Gallery
Posts: 3,842
14) switch to Linux and forget about 2) to 13) easy
01-26-2020, 01:32 AM   #119
Veteran Member




Join Date: Apr 2018
Posts: 639
Gnu/Linux distros are more secure desktop systems, still not completly secure and it will stay that way in the foreseable future. Browser attacks btw often work in Linux too and there are linux specific viruses, although mostly targeting servers.
A lot of attacks these days are against iot devices, most of them run Gnu/Linux in some way (although most attacks are possible due to missing security updates).
There have also been cases of phishing software distributed through user repositories.
01-26-2020, 01:44 AM   #120
Site Supporter
Site Supporter




Join Date: Sep 2013
Location: Australia
Photos: Gallery
Posts: 3,842
basically a non issue compared to Windows.
Reply

Bookmarks
  • Submit Thread to Facebook Facebook
  • Submit Thread to Twitter Twitter
  • Submit Thread to Digg Digg
Tags - Make this thread easier to find by adding keywords to it!
asus, carbon, data, issues, january, laptop, laptops, photography, photoshop, spam, windows, windows 7 support

Similar Threads
Thread Thread Starter Forum Replies Last Post
Thinking ahead MLB 2020 Regular Season Scheduled released aslyfox General Photography 36 08-09-2020 07:41 AM
Free On1 Photo Raw 2020 with purchase of various XRite products until 12/31/19 bladerunner6 Pentax Price Watch 2 11-04-2019 10:42 AM
Another newer Windows 7 "Warning" - Will officially become unsupported January 2020. jpzk Digital Processing, Software, and Printing 58 05-16-2019 05:36 PM
HD 55-300mm F4-5.8 WR - show us your good&bad time with this len! (2020 edition) KoolKool Pentax SLR Lens Discussion 8 09-23-2018 07:36 PM
Lowest prices of the year on Pentax lenses! (ends January 2nd!) Adam Pentax Price Watch 10 01-02-2017 08:42 AM



All times are GMT -7. The time now is 10:02 AM. | See also: NikonForums.com, CanonForums.com part of our network of photo forums!
  • Red (Default)
  • Green
  • Gray
  • Dark
  • Dark Yellow
  • Dark Blue
  • Old Red
  • Old Green
  • Old Gray
  • Dial-Up Style
Hello! It's great to see you back on the forum! Have you considered joining the community?
register
Creating a FREE ACCOUNT takes under a minute, removes ads, and lets you post! [Dismiss]
Top