Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Nov 2015 10:57:37 -0500
From:      "Garance A Drosehn" <drosih@rpi.edu>
To:        "FreeBSD -" <freebsd-questions@freebsd.org>
Subject:   Re: ransomware virus on Linux
Message-ID:  <65FDDF03-930D-4D92-A961-7C7C9ECB2579@rpi.edu>
In-Reply-To: <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com>
References:  <20151119064434.GB1925@c720-r276659.oa.oclc.org> <86y4dtiqc3.fsf@WorkBox.Home> <20151120002132.7a4e3a82@gumby.homeunix.com> <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 19 Nov 2015, Charles Swiger wrote:

> On Nov 19, 2015, at 4:21 PM, RW via freebsd-questions 
> <freebsd-questions@freebsd.org> wrote:
>> What worries me is that the next version might target Linux 
>> workstations
>> where there's a lot of very complex software running as the owner of
>> the user data.
>
> Ransomware which encrypts your stuff isn't a major problem if you have 
> a current backup.
>
> So, verify that your backups work.

Which really means:  Verify that your *restores* work!  :)

(Certainly I've seen cases where someone was running backups
regularly & automatically, and everything looked fine.  But when
they finally needed to restore something, they found out that those
backups were not really working, or were working but not backing up
as much as the user thought they were backing up)

-- 
Garance Alistair Drosehn                =     drosih@rpi.edu
Senior Systems Programmer               or   gad@FreeBSD.org
Rensselaer Polytechnic Institute;             Troy, NY;  USA



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?65FDDF03-930D-4D92-A961-7C7C9ECB2579>