Date: Fri, 20 Nov 2015 10:57:37 -0500 From: "Garance A Drosehn" <drosih@rpi.edu> To: "FreeBSD -" <freebsd-questions@freebsd.org> Subject: Re: ransomware virus on Linux Message-ID: <65FDDF03-930D-4D92-A961-7C7C9ECB2579@rpi.edu> In-Reply-To: <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com> References: <20151119064434.GB1925@c720-r276659.oa.oclc.org> <86y4dtiqc3.fsf@WorkBox.Home> <20151120002132.7a4e3a82@gumby.homeunix.com> <2021B94D-F9CA-4346-BDA5-A3A460C6BA3B@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 19 Nov 2015, Charles Swiger wrote: > On Nov 19, 2015, at 4:21 PM, RW via freebsd-questions > <freebsd-questions@freebsd.org> wrote: >> What worries me is that the next version might target Linux >> workstations >> where there's a lot of very complex software running as the owner of >> the user data. > > Ransomware which encrypts your stuff isn't a major problem if you have > a current backup. > > So, verify that your backups work. Which really means: Verify that your *restores* work! :) (Certainly I've seen cases where someone was running backups regularly & automatically, and everything looked fine. But when they finally needed to restore something, they found out that those backups were not really working, or were working but not backing up as much as the user thought they were backing up) -- Garance Alistair Drosehn = drosih@rpi.edu Senior Systems Programmer or gad@FreeBSD.org Rensselaer Polytechnic Institute; Troy, NY; USA
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?65FDDF03-930D-4D92-A961-7C7C9ECB2579>