this post was submitted on 19 Jul 2024
1279 points (99.4% liked)

Programmer Humor

19114 readers
545 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 140 points 1 month ago (3 children)

Funny how CrowdStrike already sounds like some malware’s name.

[–] [email protected] 76 points 1 month ago (1 children)

It literally sounds like a DDoS!

[–] [email protected] 22 points 1 month ago

Botnet if you will

[–] [email protected] 22 points 1 month ago (2 children)

Not too surprising if the people making malware, and the people making the security software are basically the same people, just with slightly different business models.

[–] [email protected] 11 points 1 month ago* (last edited 1 month ago)

Reminds me of the tyre store that spreads tacks on the road 100m away from their store in the oncoming lanes.

People get a flat, and oh what do you know! A tyre store! What a lucky coincidence.

[–] [email protected] 7 points 1 month ago

Classic protection racket. "Those are some nice files you've got there. It'd be a shame if anything happened to them..."

load more comments (1 replies)
[–] [email protected] 134 points 1 month ago (2 children)

This is, in a lot of ways, impressive. This is CrowdStrike going full "Hold my beer!" about people talking about what bad production deploy fuckups they made.

[–] [email protected] 95 points 1 month ago (1 children)

You know you’ve done something special when you take down somebody else’s production system.

[–] [email protected] 24 points 1 month ago (1 children)

*production systems around whole world

load more comments (1 replies)
[–] [email protected] 23 points 1 month ago (1 children)

I'm volunteering to hold their beer.

Everyone remember to sue the services not able to provide their respective service. Teach them to take better care of their IT landscape.

[–] [email protected] 26 points 1 month ago (1 children)

Typically auto-applying updates to your security software is considered a good IT practice.

Ideally you'd like, stagger the updates and cancel the rollout when things stopped coming back online, but who actually does it completely correctly?

[–] [email protected] 22 points 1 month ago (1 children)

Applying updates is considered good practice. Auto-applying is the best you can do with the money provided. My critique here is the amount of money provided.

Also, you cannot pull a Boeing and let people die just because you cannot 100% avoid accidents. There are steps in between these two states.

[–] [email protected] 29 points 1 month ago (15 children)

you cannot pull a Boeing and let people die

You say that, but have you considered the savings?

[–] [email protected] 21 points 1 month ago

People are temporary. Money is forever.

load more comments (14 replies)
[–] [email protected] 107 points 1 month ago (2 children)

The real malware is the security software we made along the way.

[–] [email protected] 39 points 1 month ago (1 children)

We've known that since Norton and McAfee.

[–] [email protected] 10 points 1 month ago (1 children)

At least McAfee's antics were entertaining

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 59 points 1 month ago (1 children)

Can't get hacked if your machine isn't running.

[–] [email protected] 20 points 1 month ago (1 children)
load more comments (1 replies)
[–] [email protected] 50 points 1 month ago (6 children)

The answer is obviously to require all users to change their passwords and make them stronger. 26 minimum characters; two capitals, two numbers, two special characters, cannot include '_', 'b' or the number '8', and most include Pi to the 6th place.

[–] [email protected] 9 points 1 month ago

Great! Now when I brute force the login, I can tell my program to not waste time trying '_', 'b' and '8' and add Pi to the 6th place in every password, along with 2 capitals, 2 numbers and 2 other special characters.

Furthermore, I don't need to check passwords with less than 26 characters.

[–] arendjr 7 points 1 month ago (1 children)

Sorry, I don’t understand. Do you mean there have to be 6 digits of Pi in there, or the sixth character must be π? I’m down either way.

[–] [email protected] 28 points 1 month ago (1 children)

We won't tell you, and the rule gets re-rolled every 14 seconds. It may stay the same or it may change.

load more comments (1 replies)
load more comments (4 replies)
[–] [email protected] 24 points 1 month ago

What’s the saying about dying a hero or becoming the villain?

[–] [email protected] 17 points 1 month ago (3 children)

Maybe this is a case of hindsight being 20/20 but wouldn't they have caught this if they tried pushing the file to a test machine first?

[–] [email protected] 13 points 1 month ago (1 children)

It's not hindsight, it's common sense. It's gross negligence on CS's part 100%

load more comments (1 replies)
[–] Gsus4 12 points 1 month ago (1 children)

I saw one rumor where they uploaded a gibberish file for some reason. In another, there was a Windows update that shipped just before they uploaded their well-tested update. The first is easy to avoid with a checksum. The second...I'm not sure...maybe only allow the installation if the windows update versions match (checksum again) :D

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 15 points 1 month ago

A real Anakin arc right here.

[–] [email protected] 14 points 1 month ago (1 children)

Now threat actors know what EDR they are running and can craft malware to sneak past it. yay(!)

[–] [email protected] 7 points 1 month ago

Smart threat actors use the EDR for distribution. Seems to be working very well for whoever owned Solar Winds.

[–] pkill 10 points 1 month ago

SHOULD'VE USED OPENBSD LMAO

[–] [email protected] 7 points 1 month ago (1 children)

Yes but the difference is one of them is also going to help you fix it.

load more comments (1 replies)
[–] [email protected] 7 points 1 month ago* (last edited 1 month ago)
load more comments
view more: next ›