On the contrary, anyone who installed an affected distro last week and hasn't patched now has a dangerous backdoor. Patching is exactly what they need to do.
@@ProTechShow I beg to differ. The version affected was the latest. Currently, the only way for someone to "patch" their version is to actually *downgrade* to a previous release known not to be infected. Fortunately, no stable Linux distro had included the package yet, AFAIK.
@hugues90 that is not the case. Debian (unstable) and Kali were both affected and released patches almost immediately. Patching regularly might occasionally mean you get a bad update; but it also means you'll get the fix quickly, too. If you don't patch, you won't avoid vulnerabilities - you simply guarantee the ones you have don't get fixed. The older the vulnerability, the more likely it is to be exploited.
Thanks! This was an early one when I had a handful of subs, and it doesn't seem to be a topic people are searching for so it's not had many views. I'm glad someone enjoyed it though!
Sent here from the Harvard Cybersecurity intro course. Thanks for the breakdown!
Thanks!
Same here, too! CS50's Introduction to Cybersecurity.
Same here!
same
same!
This helped me a lot, I was sent here from Harvard University CS50's introduction to Cybersecurity
Glad it helped!
same!
Interesting video. But
"Patch patch patch!" doesn't resonate too well with what's happened with XZ/LZMA a few days ago
On the contrary, anyone who installed an affected distro last week and hasn't patched now has a dangerous backdoor. Patching is exactly what they need to do.
@@ProTechShow I beg to differ. The version affected was the latest. Currently, the only way for someone to "patch" their version is to actually *downgrade* to a previous release known not to be infected. Fortunately, no stable Linux distro had included the package yet, AFAIK.
@hugues90 that is not the case. Debian (unstable) and Kali were both affected and released patches almost immediately.
Patching regularly might occasionally mean you get a bad update; but it also means you'll get the fix quickly, too.
If you don't patch, you won't avoid vulnerabilities - you simply guarantee the ones you have don't get fixed. The older the vulnerability, the more likely it is to be exploited.
Sent here too from the Harvard Cybersecurity course. This video really helped me because, the Wikipedia article just got me confused.
Glad to hear it was helpful
Great video explanation. Thanks for sharing
Glad it was useful
Great video and explanation. Thanks!
Cheers!
great explanation👍
Thanks!
What a great explanation. Thanks!
Cheers!
Well explained. Thank you
Thanks!
Very good, thank you
You're welcome
how can you channel have so few likes? very usefull videos! tks!
Thanks! This was an early one when I had a handful of subs, and it doesn't seem to be a topic people are searching for so it's not had many views. I'm glad someone enjoyed it though!