Date: Fri, 20 Nov 2015 07:01:41 +0100 From: Ben Woods <woodsb02@gmail.com> To: Charles Swiger <cswiger@mac.com> Cc: FreeBSD - <freebsd-questions@freebsd.org> Subject: Re: ransomware virus on Linux Message-ID: <CAOc73CCp5r8yPxu=c2i10%2B1BnKjr6DG7AvZzTnGjBBO2A3%2BaCQ@mail.gmail.com> In-Reply-To: <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com> References: <20151119064434.GB1925@c720-r276659.oa.oclc.org> <86y4dtiqc3.fsf@WorkBox.Home> <20151120002132.7a4e3a82@gumby.homeunix.com> <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Friday, 20 November 2015, Charles Swiger <cswiger@mac.com> wrote: > On Nov 19, 2015, at 4:21 PM, RW via freebsd-questions < > freebsd-questions@freebsd.org <javascript:;>> wrote: > > What worries me is that the next version might target Linux workstations > > where there's a lot of very complex software running as the owner of > > the user data. > > Ransomware which encrypts your stuff isn't a major problem if you have a > current backup. > > So, verify that your backups work. > > Regards, > -- > -Chuck > > Similarly, I believe regular automatic ZFS snapshotting can be effective against this. Files encrypted? zfs rollback to 15 minutes ago when they weren't encrypted. Problem solved. Regards, Ben -- -- From: Benjamin Woods woodsb02@gmail.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAOc73CCp5r8yPxu=c2i10%2B1BnKjr6DG7AvZzTnGjBBO2A3%2BaCQ>