samit
samit
  • Видео 238
  • Просмотров 286 929
Don't Blame XP for Network Breaches
I've heard people blaming the existence of Windows XP for breaches. But 99% of the time, breaches are coming from far more obvious places and people just want to shift the blame.
www.buymeacoffee.com/scottalanmiller
^^^^ Support me and the Channel ^^^^
Linux Administration Best Practices by Me:
www.amazon.com/Linux-Administration-Best-Practices-approaching-ebook/dp/B09PC3X6BW/
I have worked as a consultant at NTG, a global technology and business consulting practice for more than a quarter of a century. Reach out for guidance, consulting, IT outsources, etc.
info@ntg.co
ntg.co/
SAMIT Scott Alan Miller Information Technology
#informationtechnology #businessrisk #business #security #iteducation #co...
Просмотров: 282

Видео

Passion Should Be Driving Career Decisions
Просмотров 733 месяца назад
#career #informationtechnology #job Whether you are a student wondering what you should study, or a mature worker deep into your field and wondering what the future holds for you or you are a potential future expat wondering if you should make a change so that you have the flexibility to work remotely, you are wondering what to consider as a career pathway for the future. Well one factor dramat...
Risk of Using Junior Engineers in IT
Просмотров 1805 месяцев назад
Junior staff might be inexpensive in salary terms, but they pose a big financial risk to your business. #informationtechnology #business #riskassessment www.buymeacoffee.com/scottalanmiller ^^^^ Support me and the Channel ^^^^ Linux Administration Best Practices by Me: www.amazon.com/Linux-Administration-Best-Practices-approaching-ebook/dp/B09PC3X6BW/ I have worked as a consultant at NTG, a glo...
Why You Shouldn't Fear Ransomware
Просмотров 4905 месяцев назад
With minimal IT oversight, ransomware is totally ineffectual. Are you following best practices, or are you at risk? www.buymeacoffee.com/scottalanmiller ^^^^ Support me and the Channel ^^^^ Linux Administration Best Practices by Me: www.amazon.com/Linux-Administration-Best-Practices-approaching-ebook/dp/B09PC3X6BW/ I have worked as a consultant at NTG, a global technology and business consultin...
Crowdstrike Outage Quicktake & Takeaways
Просмотров 3646 месяцев назад
What does the CrowdStrike situation really entail, what happened and what does it mean? buymeacoffee.com/scottalanmiller
Did CDK Have to Pay to Keep Data Disclosure Quiet?
Просмотров 3986 месяцев назад
With the recent CDK outage, it's broadly believed that they had no backups and resorted to paying the ransom on #ransomware in order to get a key and get their data restored. Someone proposed the idea that they might have been breached, had the data stolen and paid a blackmailer to keep them from releasing the data into the wild. Does this story make sense? Why or why not? #hack #security #info...
What is a LAN: IT Basics
Просмотров 2666 месяцев назад
The LAN or Local Area Network is a core buiding block of our understanding of interconnected computing systems. #informationtechnology #localareanetwork #itbasics buymeacoffee.com/scottalanmiller ^^^ Support Me Directly ^^^ Hire me & my team: sales@ntg.co Buy My Book: Linux Administration Best Practices www.amazon.com/Linux-Administration-Best-Practices-approaching-ebook/dp/B09PC3X6BW/
How is CDK Still Down? Dealerships Suffering!
Просмотров 10 тыс.6 месяцев назад
How can CDK be still down after all of this time? Don't they know how backups work? Boomberg is reporting that they will pay tens of millions to pay off the ransom! If that were true, where would that money go? Sending tens of millions to foreign, enemy agents surely is money laundering and a major crime. How can they be allowed to even consider such an option? Especially when the system had no...
STOP READING SPAM
Просмотров 1476 месяцев назад
It might feel like there is no harm in spending an extra few seconds looking over that message that you are 99% sure is SPAM. What's the harm? Well, in reality, it's pretty risky. #spam #security #informationtechnology buymeacoffee.com/scottalanmiller ^^^ Support Me Directly ^^^ Hire me & my team: sales@ntg.co Buy My Book: Linux Administration Best Practices www.amazon.com/Linux-Administration-...
CDK Global Outage "Post Mortem" Dealerships Down
Просмотров 13 тыс.7 месяцев назад
Okay, in no way is this a post mortem, but the point stands that there is a lot of warning signs and red flags here long before digging into anything further. We know tons about the vendor and the customers before we even know exactly what happened. And will we ever know the truth? www.bleepingcomputer.com/news/security/cdk-global-cyberattack-impacts-thousands-of-us-car-dealerships/ #cyberattac...
Custom Domains & URLs for Security, Private & Marketing
Просмотров 827 месяцев назад
Why does your company need to register its own private domain name just to do normal business? The reasons might surprise you. #registrar #domainnames #customurl www.buymeacoffee.com/scottalanmiller ^^^^ Support me and the Channel ^^^^ www.flickr.com/photos/becker271/2955468015/ Linux Administration Best Practices by Me: www.amazon.com/Linux-Administration-Best-Practices-approaching-ebook/dp/B0...
Still #Virtualize Active Directory in 2024
Просмотров 2377 месяцев назад
#activedirectory in 2024 is still to be virtualzed? #virtual servers are the norm but has the decline and death of Microsoft's Hyper-V changed anything? Kris Leslie asks for an update to our previous guidance. buymeacoffee.com/scottalanmiller
How MX Records Work | Email & DNS
Просмотров 4857 месяцев назад
#Email and #DNS can be quite confusing and MX records play such a critical role in both. In today's episode we will break down the usage of MX records to help you understand what role they are playing in your communications infrastructure which will, in turn, allow you to understand how to ensure that they are managed correctly, protect them, host them, and troubleshoot email flow issues. www.b...
Splitting File Systems and Volumes | When to Separate Filesystems in Our Storage Arrays
Просмотров 181Год назад
Support the channel: buymeacoffee.com/scottalanmiller Looking to hire my IT consulting firm? Email us: sales@ntg.co ntg.co/ My book called "Linux Administration Best Practices". It helps me a lot when people buy it from Amazon. www.amazon.com/Linux-Administration-Best-Practices-approaching/dp/1800568797/
Handling the Fast Pace of the IT Industry | Information Technology Keeping Up
Просмотров 305Год назад
Handling the Fast Pace of the IT Industry | Information Technology Keeping Up
Linux Desktop Distro Choices for Business in 2023 | Short List of Linux
Просмотров 848Год назад
Linux Desktop Distro Choices for Business in 2023 | Short List of Linux
Evaluating Cloud & On Premises Server Veterinary Practice Management Software PIMS | Vet Software
Просмотров 1,1 тыс.Год назад
Evaluating Cloud & On Premises Server Veterinary Practice Management Software PIMS | Vet Software
Why You Can't Put QuickBooks on Google Drive | Why Databases Cannot Use Synchronized Storage Systems
Просмотров 794Год назад
Why You Can't Put QuickBooks on Google Drive | Why Databases Cannot Use Synchronized Storage Systems
What Is a BBS ? | Bulletin Board Service | Email Local Delivery Systems MDA | Email Fundamentals
Просмотров 308Год назад
What Is a BBS ? | Bulletin Board Service | Email Local Delivery Systems MDA | Email Fundamentals
Fundamentals of IT: Introduction to Educational Series
Просмотров 184Год назад
Fundamentals of IT: Introduction to Educational Series
Market Analysis of No Code and Low Code Application
Просмотров 170Год назад
Market Analysis of No Code and Low Code Application
What Exactly Is Email? Beginning a New Email Series | SMTP
Просмотров 162Год назад
What Exactly Is Email? Beginning a New Email Series | SMTP
Is a SAN Warranted? Response to User Question on Using Local Storage vs Remote for VM Workloads
Просмотров 220Год назад
Is a SAN Warranted? Response to User Question on Using Local Storage vs Remote for VM Workloads
Comparative Drive Performance: Understanding Why Your New Server Might Be Slow
Просмотров 1502 года назад
Comparative Drive Performance: Understanding Why Your New Server Might Be Slow
Market Analysis: Why There Are No Good Web Hosting Companies
Просмотров 2582 года назад
Market Analysis: Why There Are No Good Web Hosting Companies
Interview Fewer People | How to Get Better Hiring and Interviewing Results at Lower Cost
Просмотров 782 года назад
Interview Fewer People | How to Get Better Hiring and Interviewing Results at Lower Cost
What is the Minimum Number of Partitions Necessary to Install Linux Certification Question Analysis
Просмотров 1452 года назад
What is the Minimum Number of Partitions Necessary to Install Linux Certification Question Analysis
Disk Partitions: Should You Still Use Them
Просмотров 1712 года назад
Disk Partitions: Should You Still Use Them
Should You Provide Equipment for Work from Home Employees & Contractors
Просмотров 1372 года назад
Should You Provide Equipment for Work from Home Employees & Contractors
Stop Using "Secure" Email
Просмотров 4892 года назад
Stop Using "Secure" Email

Комментарии

  • @Crystal-m6k
    @Crystal-m6k 21 день назад

    😂YOUR GREAT. MY BEAUTIFUL GRANDDAUGHTER, I SENT TO HER. LOL. WE BOTH LAUGHED. KNOW IT ALL 22 COLLEGE STUDENT. BECOMING A NURSE JUST LIKE ME HER GRANDMA. SHE STILL KNOWS MORE THAN I. 35 YEARS RETIRED NURSE LOL. HAVE A WONDERFUL BLESSED NEW YEAR'S

  • @ChoppaGetToDaChoppa
    @ChoppaGetToDaChoppa 26 дней назад

    Thank you for this. As a programmer, I can appreciate the precision of your statements. Recently, I was within a telephonic conversation with my, now former, admissions advisor, and she informed me that she had received my official transcript from my previous university. I hold an A A S in computer programming. The advisor then started, "it looks like you have a lot of experience in the field of IT". I replied, "enjoy the remainder of the day". I then terminated the call. I felt like punching a hole into iron man's chest for the rest of that day. Thank you. I did choose to subscribe to your channel today. Kudos.

  • @mickwilson99
    @mickwilson99 Месяц назад

    Thanks for that. Clear and cogent, and I don't have your cat.

  • @mundotazo
    @mundotazo Месяц назад

    Yes we have no partition

  • @josephvida1439
    @josephvida1439 Месяц назад

    Actually, XP is so old that all of its security risks have been patched...For instance, WannaCrypt patches and May 2019 RDP Authentication exploit update are available online from people who still care about treating XP users like human beings...Any modern router will block dos attacks and other exploits...Microsoft Baseline Security Analyzer, (MBSA) for short, XP version, checks network, guest account, and many other settings for security risks...You can create a user account that prevents many security threats...Panda antivirus is a modern antivirus that protects all operating systems including XP...Spybot Search and Destroy works with XP and searches for malware...This idea that XP is more vulnerable than newer operating systems is utter BS...Windows Malware 10 is more vulnerable because Microsoft is still patching it against threats as time goes on...Just saying...

  • @randyriegel8553
    @randyriegel8553 Месяц назад

    I did a contract for a well known nationwide bank about 6 years ago. They used WinXP Embedded for their ATM's. You would never know if you go and get money out. So do may point of sale systems still. I'm a software engineer. I'll make the changes you went regardless of the OS. After thorough testing I get paid my extra 1/2 I take 1/2 up front. Don't trust people.

  • @u2nvme
    @u2nvme Месяц назад

    I have three computers I use for a small business and I’m curious to what software could I use to back up all three

  • @tomo9126
    @tomo9126 Месяц назад

    XP computers should only be on the sneaker-network.

  • @SuperHtownswag
    @SuperHtownswag Месяц назад

    Hey there sam

  • @SuperHtownswag
    @SuperHtownswag Месяц назад

    I think n+/server+/linux+ are critical

    • @samit8178
      @samit8178 Месяц назад

      Critical? In what sense? Most aren't even known anymore and one is from a different field. The Linux+ was always useless, even when new. The N+ was always pretty decent.

  • @Ru1nedK1ng
    @Ru1nedK1ng Месяц назад

    so Software Engineers are the Blacksmith, they craft weapons and armor. IT are the Warriors, they use the weapons and armor and fight battles.

  • @bashirali329
    @bashirali329 2 месяца назад

    Very nice

  • @CocolinoFan
    @CocolinoFan 2 месяца назад

    Did you just say that bash and KDE Plasma are both shells? You just changed they way I look at the world.

  • @cimbakahn
    @cimbakahn 2 месяца назад

    When i was on Windows, Defender hardly ever found anything, so it was useless!

  • @roganjosh6220
    @roganjosh6220 2 месяца назад

    sounds alot like the vision of metaverse tbh; multi-user interactions beyond ubiquitous messaging services

  • @marcos1669
    @marcos1669 3 месяца назад

    I remember when I started my sys admin course back in the day most people said they got into it becase "it is the future" or "it pays well", guess what, after two years 90% couldn´t even deploy a simple domain with its network configuration, join a couple of machines and a couple of users....

    • @loafgaming4624
      @loafgaming4624 3 месяца назад

      Great example. There was SO much of that back in the 1990s.

    • @marcos1669
      @marcos1669 3 месяца назад

      @@loafgaming4624 in my cade was about 2011 hahahah

  • @Pongant
    @Pongant 3 месяца назад

    Going for the money is the way to go IMO, especially if you have an interest in IT. There is no reason to purely following your "passion" when it comes to looking for a career. Else people doing PhDs around the world would make a fortune and live happily everthereafter.

    • @loafgaming4624
      @loafgaming4624 3 месяца назад

      People doing PhDs, I think, are typically just "work averse" and avoiding doing anything. It's a common place to hide. If they were passionate, why would they be in university at all for most things. They'd be out doing it. If you were passionate about something, you'd be wanting to learn about it or do it on your own, as quickly as you can. Not saying "let me deal with university politics and avoid actually doing what I claim to be interested in" for many years. PhDs are often people who think they are following the money, but don't understand how universities or the world works and are setting themselves up for bigger challenges. Following the money isn't always bad, but there is a reason that people making big money are typically really passionate and those that chased big money are burned out and frustrated.

  • @NoferTrunions
    @NoferTrunions 3 месяца назад

    Listened to your review again, sounds like it might be OK, albeit slow, on a single XP PC. (How in the world did Netgear create such a product? what were they thinking?)

  • @PoringPoring951
    @PoringPoring951 3 месяца назад

    Another great video. Yes! Please don’t come into IT purely for money. Too many people either burned out or unable to skill up.

    • @loafgaming4624
      @loafgaming4624 3 месяца назад

      It's SO true. They see it as a necessary evil or just a job, but there are enough people who want to do IT and want to learn the nuances and want to excel that there doesn't need to be other people. But all those extra people get in the way and make it all but impossible to weed through to find the good people. Everyone loses.

  • @bashirali329
    @bashirali329 3 месяца назад

    Very nice

  • @thehackrcat
    @thehackrcat 4 месяца назад

    Dang, this came out a good while ago. I remember having to read the update but I am having a hard time finding the NIST publication that explicitly covers their recommendation against frequent password changes. Originally thought it was SP 800-63B, but maybe the language I’ve searched for isn’t exactly what they used. Does anyone know where I could find it so I could show a leader with specifics?

  • @lephtwix5353
    @lephtwix5353 5 месяцев назад

    Pura Vida Mae!!

  • @spok_7300
    @spok_7300 5 месяцев назад

    AWESOME MAN!!!!!

  • @dougfredricks2017
    @dougfredricks2017 5 месяцев назад

    I recall back in the days of Novell file servers; AS/400 and OS/2 the IT people could Not emphasize enough the importance of data d Backups.

  • @DerUnglaublicheFrank
    @DerUnglaublicheFrank 5 месяцев назад

    To shorten it and make it more universal: 1. inexperienced people are inexperienced people 2. people listen to the advice of others they perceive as knowledgeable. This includes management. if you are inexperienced, gain experience. Here's a new idea for companies: if you want someone to be competent, train them or at least give them time so they don't have to do everything in their spare time, then you might deserve some loyalty. 4. University is a waste of time and money. 5. incompetent people will perceive you as a threat.

  • @HR-wd6cw
    @HR-wd6cw 6 месяцев назад

    Well, I don't know if I'd say "dont fear it" but don't freak out if you do end up with it. This is a good example of why you should have tested backups and be dilligent about computer security. While I have never had this, I have had other nasties that have caused issues but since I always am dilligent about backups, getting back up and running with a clean system didn't take long (I do image my systems with a clean install and update it periodically so recoverying from some sort of attack is generally quick, like a few hours at most).

  • @mitchellpayne3674
    @mitchellpayne3674 6 месяцев назад

    Years ago as an admin at a private corporation, we built out our disaster recovery so far as having server, desktop and routing/vpn hardware stored 70 miles off-site that would be capable of bringing a production environment online albeit scaled down. This was for the "if the building burns down" scenario. Production data was continually replicated with SQL replication and file shares were replicated off-site daily. AAAAaaand of course, we had on-site backups of everything as well as several flavors of off-site backups depending on the data scope. We also leveraged tape backups for periodic archival backups. Ransomware DID try to "get us" once. Restoring the data was a no-brainer. The very stressful and time-consuming part was determining how to be CERTAIN the malicious code was reliably contained/quarantined/scrubbed before restoring the affected data sets and allowing users access again. 0-days. Gotta love em....

  • @Nabooze
    @Nabooze 6 месяцев назад

    hi, nice video, but its actually crowdstrike and not cloudstrike, not many people are searching up cloudstrike so maybe you should change your title :)

    • @samit8178
      @samit8178 5 месяцев назад

      OMG, thanks!!

  • @marcos1669
    @marcos1669 6 месяцев назад

    The internet is full of this kind of people

  • @Troy_In_The_80s
    @Troy_In_The_80s 6 месяцев назад

    The entry point for ransomware is any computer on the network which is using Windows XP. Coincidentally, Windows XP networks weren't affected by the CrowdStrike debacle. The least effective antivirus ever sold is McAfee, and CrowdStrike was created by one of the pinheads from McAfee. All of these problems originate from SaaS, which is the worst thing to ever happen to businesses. Everything should be kept in-house and on-site, including grandfather backups in a fire-proof area.

    • @scottalanmiller
      @scottalanmiller 6 месяцев назад

      SaaS has zero effect here. And where backups are kept has no bearing. What if there was a fire? How does all that on site media survive? And how do you restore, a state away, with melted tapes? SaaS would actually have protected these businesses. It was the lack of it that left them scrambling.

    • @Troy_In_The_80s
      @Troy_In_The_80s 6 месяцев назад

      @@scottalanmiller Ransomware is the hot topic because of CDK, which I'm helping with catch-up now. Many dealerships have parts and service computers which are XP. I know for a fact that XP computers are the entry point for ransomware. CDK is SaaS. You can easily prevent fire damage to hard copy backups using the same construction materials and automatic fire extinguishing systems which were originally designed for offshore oil rig living quarters. I wasn't going to argue with you, but you're wrong to say people shouldn't worry about ransomware. The Black Suit guys are using the exact same code as Wanna Cry, which is the same code that you can download for a fee from a couple of different places. All you need to do is find a network which has an XP computer connected to it. I have experience with this. Everybody has an XP computer somewhere on the network. I'm not going to mention any names, but my favorite fried chicken comes from a large conglomerate that uses XP computers to run the cash registers. I warned them years ago, I'm counting the days until I can say I told you so.

    • @marcos1669
      @marcos1669 6 месяцев назад

      In the own words of Scott, this is an emotional reaction, problem is not SaaS, problem is crapy vendor, is like saying hardware is terrible (in general) because you bought a crapy server

    • @samit8178
      @samit8178 3 месяца назад

      No remotely competent show has XP on their network. I understand lots of ridiculous crappy shops, like those that would deploy CDK, do because once you don't care about security, you don't care. But XP isn't needed, everything about the situation invites ransomware. Yeah, IF someone has XP, that's going to be the easiest way in. But as someone who runs many companies, with zero Windows at all, let alone something as ridiculously old as Windows 10, it's crazy to suggest that XP is everywhere. I work with thousands of clients and the number that still have XP might be less than ten. And, let's be super clear, XP is only a risk to other machines if it is AUTHENTICATED to those machines. An XP machine, on the network on its own, isn't risky to any kind of reasonably good network. CDK was at no risk to XP machines, unless CDK itself left themselves exposed. How is XP on your network a risk, unless other machines trust the XP machine? In which case, that trust is the vulnerability, not the XP.

  • @jamessevier4945
    @jamessevier4945 6 месяцев назад

    Quick question bro, if you please. Why is Hillary Clinton's propaganda outfit Crowdstrike, that was instrumental in the interference of Bernie's nomination, mayor Petes fkery in IOWA, the DNC fake hack FBI approved coverup, and the Russiagate spyop gaslighting garbage, yes this very same Crowdstrike everyone in leadership invested in, is currently sitting at every critical intersection of the global grid with the power to do whatever they want with feeble plausible public/private rat shit fuckery deniability woth 3 letter agency topping? Was that in the form of a question? Hillary should keep her fingers out from our azzez.

  • @scottalanmiller
    @scottalanmiller 6 месяцев назад

    Good foundational information.

  • @marcos1669
    @marcos1669 6 месяцев назад

    Windows AV is decent, but way better products exist and there are actually completely independent tests out there showing that Also, Linux does have viruses, they are just less common as attackers tend to use try compromise the platform people uses the most Regarding bad purchase decisions and vendors, I use to had a boss who would blindly trust the Gartner quadrant, who people can be so naive? I will never know

    • @samit8178
      @samit8178 6 месяцев назад

      Linux can have viruses, for sure. But AV products aren't the solution to protecting it. Some tests show other products ahead of Defender, others show Defender in the lead. It's in the "tests aren't really conclusive" zone. It's more that there is a group that are all at a level that there isn't any reasonable way to test because contrived tests don't show real world results. Gartner is such a mess. Vendors pay to be on there. It's literally a sales tool and nothing else.

  • @LESLEYYY0
    @LESLEYYY0 6 месяцев назад

    You mean... CrowdStrike?

  • @JdMetal
    @JdMetal 6 месяцев назад

    Its not easy to ditch Windows...where millions already so used to Windows especially the word processing suites Ms Office....but I'm quite surprised why on earth did this IT DEPLOYED WINDOWS on kiosks, where minimal user interaction which will better if they're using Linux as hosts, and just running web application for user interaction , or AOSP + Apps...

    • @samit8178
      @samit8178 6 месяцев назад

      I recently had a customer swear up and down that MS Office could not possibly be replaced in their environment. They went on and on with reasons why nothing else could do the job. They called an hour later to apologize that they had "forgotten" that they had actually replaced it already, six months before, with the solution we had proposed, and that the change over was so transparent that no one realized that they had left MS Office and everyone still called what they had Office and it was a totally smooth transition and the entire mindset that it couldn't have been replaced was as opposite of reality as possible. LOL

  • @vetastic_software
    @vetastic_software 6 месяцев назад

    This is why we run zero Windows. Why would we pay more to get less? So much risk with so little value.

    • @marcos1669
      @marcos1669 6 месяцев назад

      I think is because small companies start with Windows by default because that is what people is used to, then, when the company grows is never analyzed and also you have a ton of technichal debt

    • @samit8178
      @samit8178 6 месяцев назад

      Yes, exactly. OR they think "everyone does this, we don't have to evaluate it" and don't realize that loads of very successful businesses actually do analyze that and choose differently.

  • @Samds72
    @Samds72 6 месяцев назад

    Good, thank you- this is a valunarability on windows, if another application try over flow buffer tommoro it will happen again

    • @samit8178
      @samit8178 6 месяцев назад

      Buffer overflows are a risk in general. If you ruin something at the level necessary for an AV type product you are always going to have big risks. Linux and Mac and other UNIX systems all carry that risk. None other needs an AV product layered on which provides a LOT of protection, of course. But Windows itself isn't specifically vulnerable in this case. Just more likely to have a vulnerability there exploited.

  • @TheMarkFerron6
    @TheMarkFerron6 6 месяцев назад

    I work in higher ed and we've slowly been moving over our servers to versions of linux. I would say 90% of our workstations are running Windows. When you have taken over the IT for schools what has been the biggest hurdle you've had to overcome? Do you bother attempting to phase out Windows and move them over to linux distros?

    • @samit8178
      @samit8178 6 месяцев назад

      I took a K12 to 100% Linux in 2004. Lots and lots of schools don't use Windows already. But a school isn't mission critical. But one has to ask... what's the reason for teaching students on Windows at all? What does it bring to the table? Why are educators okay with it in the first place? I've argued for decades that schools especially have a moral obligation to teach tools accessible to all students and all people when possible and a stronger ethical obligation to never be used as a sales and marketing channel for businesses. Running Windows when it puts students at risk doesn't just break IT rules, but seriously violated pedagogical ethics. The only hurdles you typically face are "anti-education" movements from higher management who don't take the educational and ethical aspects of their jobs seriously and/or educators who just don't want to be bothered to learn something new - demonstrating a lack of faith in their own profession. Sadly, "learning better" is rarely something schools take seriously. Unlike businesses when you can demonstrate a financial value to their teams learning better, educators rarely see education as being of value in the same way. Counter intuitive, but that's where we get the most pushback. Teachers who don't see what they teach as having value and valuing "just doing what they always have done" over growth. But yes, I definitely push for that. Protecting student data, reducing IT admin load, reducing cost, lowering hardware acquisition costs, providing tools that are equally available (for free) to all students, and open source (what says 'learning' more than that) ..... it's easy to make a case.

    • @samit8178
      @samit8178 6 месяцев назад

      Higher ed is more difficult because they often have political priorities and are ecstatic to get paid to use what vendors want them to use. So you often have those decisions bought and paid for as a business and "what's good for students" or what is right to use, isn't considered. In that case, providing clear value in reduced costs or avoiding things like ransomware, viruses or... patching problems like this, might be driving factors.

  • @armchairqb2000
    @armchairqb2000 6 месяцев назад

    Do not run software you need. Live in an utopia with linux geeks that need not support your software you need to run your business. No CAD,, etc.

    • @samit8178
      @samit8178 6 месяцев назад

      Ah yes, the answer of those that don't take IT seriously and have to buy "what the salesman" said. Very nice.

    • @samit8178
      @samit8178 6 месяцев назад

      Funny how I've been in business after business (including those with CAD) without needing Windows. And definitely not Windows in key roles. IF you actually found a key software that had no other version, you can run Windows in isolated roles. But.... people deploying Windows rarely consider how to do their jobs and are just deploying what Best Buy suggested. Calling that "IT" is a joke and it's insulting to pretend to be in the same career field. Do your job, protec tthe business. Don't excuse your laziness by claiming nothing else exists as if there aren't companies all over the world without the risks you claim to be unavoidable.

    • @samit8178
      @samit8178 6 месяцев назад

      You do realize that AutoCAD is the top CAD program around (not recommending it, just saying) and it isn't limited to Windows. In your defensiveness, you are jumping from trying to defend Windows by selecting a single case for a single alternative. Which highlights your lack of faith in your own proposal. Just because Windows specifically creates risks, doesn't mean Linux (which isn't even an operating system, just a family of them) is the sole alternative. While I do love Linux from some kind of spiritual place, I'm writing this from my Mac. Which can run AutoCAD. I can produce a Linux machine running other CAD programs. But the point is that CAD doesn't make a case for Windows. Even pricey commercial closed source industry leading CAD packages have options.

  • @wilhelmscream6919
    @wilhelmscream6919 6 месяцев назад

    My only considerable experience is with MUME and this was several years ago now. Had a brief look at the site today and it seems to still be getting small updates several times per year :)

  • @isaiahsaunders7009
    @isaiahsaunders7009 6 месяцев назад

    Love the content, want to hear something funny, my dealership had us change our cdk password, but now my old password and new password work to get into my cdk….

    • @samit8178
      @samit8178 6 месяцев назад

      Okay wow, that's some crazy stuff right there! How is that even possible?

  • @TheTruthIsAbsolute
    @TheTruthIsAbsolute 6 месяцев назад

    Is this concept in refer3nce to a third party VPN service? Does it apply to self-host VPN server with an open-source vpn like OpenVPN or Wire Guard?

    • @samit8178
      @samit8178 6 месяцев назад

      Third party is just the same, just someone managing it for you. A VPN opens a tunnel from one location to another. There are ways to lock down a vpn and minimize risk, but under normal, assumed use cases where people refer to "using a VPN" it is used to bypass firewall controls and provide "LAN like" access between two points. This implies two problems, even when done well: 1. That two sites that would be more secure not being exposed to each other are now exposed. 2. That the security design (probably because of application design) uses LAN based security instead of real security and the workloads that make the VPN useful are themselves problems that the VPN is exposing. Basically the nature of a VPN being useful means that the VPN is risky. In a situation where a VPN isn't useful, you could add one if done correctly, without ill effect. So while a VPN in a contrived scenario can be secure, in practice they really aren't.

  • @Youraveragetechy
    @Youraveragetechy 6 месяцев назад

    CDK user here, I can also agree that CDK is horrible. Their customer support is horrible. The UI is horrible. Looks like it did when it was first released . I can’t believe the amount of dealership that’s still use it.

    • @RalphSmith-cj5he
      @RalphSmith-cj5he 5 месяцев назад

      Delta Air lines is seeking millions in damage$. This is a dirty diaper mess😮

  • @TheCrystalgarden
    @TheCrystalgarden 6 месяцев назад

    Just because they are paying the ransom doesn't mean they don't have backup. It just means that they do not want the ppi data that is in the hands of the bad actors to be leaked on the dark web. So they may have backups, but they want that ppi data back.

    • @samit8178
      @samit8178 6 месяцев назад

      That's a good theory, but paying a ransom does nothing to stop stolen data from leaking. That's also not a ransom event, that's a blackmail event. CDK was clear that they were being ransomed (e.g. no backups.) Also, if you have backups, even if you were going to separately pay foolishly to stop being blackmailed, you'd still restore customers while discussing the blackmail situation. That they stated that it was a "no backup" problem and they didn't have the ability to restore from backups, tells us a lot. PPI doesn't come "back", because it's just copies.

  • @iluvdale88
    @iluvdale88 6 месяцев назад

    It’s still down at this time.

    • @samit8178
      @samit8178 6 месяцев назад

      It's crazy. What's your current status? Are you back up?

  • @Meenakshi-m1s
    @Meenakshi-m1s 6 месяцев назад

    Car industry is definitely "behind" than IT sector when it comes to Privacy and security. This raises concerns for customers too I'm sure! Every time I get a service loaner there's previous users info in it. That info doesn't even need to be hacked. IT'S RIGHT THERE!!! lol DATA BREACH waiting to occur.

  • @paulm6481
    @paulm6481 6 месяцев назад

    You don't hear any one talking about this, even though 15,000 dealerships are impacted. Thanks for posting this. Cloud software bought by a private equity company. What is wrong with that picture?

    • @samit8178
      @samit8178 6 месяцев назад

      Private Equity isn't NECESSARILY bad in that case. It often is, but you definitely don't want publicly traded companies doing cloud either. You want companies that are focused on profits, which means servicing clients, rather than companies that are focused on manipulated Wall St. perception values for blind share holders that don't check in on the company. As someone who has worked in the private cloud space for over 25 years, being private has definitely allowed us to care about customers and making good products in ways that public companies struggle to be able (or allowed) to do. Sadly I don't work in this sector, so while I think we make amazing products, we don't have anything to offer in this space. That's a missed opportunity for sure! hahaha. I work primarily in finance, government security, medical care (both human and animal), entertainment and social media. So it's good for having insight, in that sense. So many private equity companies are garbage. But not all. Some, the ones you never hear about, hide behind the scenes working hard to make good products with deep business ownership involvement in ensuring that quality, customer care, employee care are top jobs, even over profits. Private equity has the right to override profits as the driving factor where publicly traded does not.

  • @davidvasquez4489
    @davidvasquez4489 6 месяцев назад

    NoVA: Its still down...they say it will be back up tomorrow july 1st though..

  • @johnanthony9416
    @johnanthony9416 6 месяцев назад

    Sounds complicated

    • @samit8178
      @samit8178 6 месяцев назад

      Shouldn't be, it was made complicated for no known reason.

  • @campbellc4
    @campbellc4 6 месяцев назад

    You are spot on about what is a backup. I would be asking about the system environment and backup strategy. I backup my Oracle Database in a separate RMAN and then do a full backup of the virtual server. This gives you a second option for disaster recovery. Should the full system backup be corrupt or virus infected, I can reinstall everything then restore the database. These are not complex concepts any IT professional who doesn’t want to be fired should be making backups. Also any company concerned about data loss should be conducting an annual Disaster Recovery Scenario with the ISO or ISSO. This done correctly should have allowed them to identify issues before a disaster event.

    • @samit8178
      @samit8178 6 месяцев назад

      Even a fraction of that effort would have protected them here. Those extra steps are great, but it seems like the failure was at the most basic levels. To the point that we have to ask... what DID they do? Was this all running on a laptop somewhere that people forgot about? Like... seriously, lol.