Evolv-ing Thread

ShamrockPat

Ultra Member
ECF Veteran
  • Nov 5, 2015
    1,418
    1
    8,302
    Grand Forks, ND
    I've had to replace a text/html editor app that was 32 bit
    Have you tried BBEdit? Full featured and free for 30 days. After that it locks out some features if you don't pay the developer (NOT Apple). Now at v12.x I've been using it since v2 or 3. (Barebones software)
     

    tiburonfirst

    They call me 'Tibs"
    ECF Veteran
    Verified Member
    Feb 23, 2010
    26,883
    260,375
    tumblr_oo5v0nf0I11uww4cjo1_1280.jpg
     

    MikeE3

    Vaping Master
    Supporting Member
    ECF Veteran
    Verified Member
    Aug 23, 2011
    8,643
    114,802
    Downingtown, PA
    Have you tried BBEdit? Full featured and free for 30 days. After that it locks out some features if you don't pay the developer (NOT Apple). Now at v12.x I've been using it since v2 or 3. (Barebones software)

    "Prezaclty" the app I moved to. I only need to use something like that infrequently but often enough I want one around. I'll likely not miss the enchanted features after the 30 day free run. I was using their Txtwrangler app. Thanks for handing out the tip, though.
     

    Punk In Drublic

    Vaping Master
    ECF Veteran
    Aug 28, 2018
    4,194
    17,518
    Toronto, ON
    I'll have to plead ignorant, "risk assesment" (in my early days of "higher" education) was combing over code to find possible points of failure. Later often called white hat hacking. If you are referring to outside ingress, I set up a honeypot back in 2003 that occasionally got someone curious but no one in the last 5 years. Who wants to hack into an ancient server that does not have web service set up and contains trash 80 software. The software I have has financial, inventory, work orders, purchase orders, invoicing, and most importantly very powerful and intuitive estimating all integrated. When my former employer switched to this from quickbooks it made quickbooks look like a rudimentary program written on a Sinclair ZX. Funny thing is that it has sold 3 times from the original developer and intuit owns it now under a different name. My 16.1 version uses the old fox pro DBF database structure and files which I am very familiar with and I was licensed as an API developer so I have all the structure relationships etc. I wrote several programs that integrate with the database for some things we wanted that it didn't do exactly the way we wanted. When he closed down and pushed me to open my own business he sold it to me for $1 with 7 licenses (although I only use 2) along with the server and 2 XP clients. Been through 3 hard drives on that old HP Proliant but it keeps on ticking.

    Risk assessment is not just about finding vulnerabilities within your software/OS that can be exploited. It's about looking at the grand scheme of things and assessing what financial losses you may incur should something fail. A failure could be identified as an exploit, hardware failure, software corruption etc. How dependent is your business on this software? Can you operate without it? Should a failure occur, regardless of it’s cause how quickly can you recover – and if you can not recover, what plans do you have to replace?

    Again, I do not know what type of hardware you are running. Your server could be as simple as a desktop computer running server type software. Or it could be something proprietary/specialized for your application. Hard drives are a dime a dozen, what about the other components within the server?

    We also can not run on the notion that a hacker would have no interest in your business because you feel there are no gains for them. There are no boundaries to hacking. Could be for financial or information gains, or just to be destructive and take you out of service. It could come from organized Cyber crime, or the neighbourhood snot nosed computer geek testing out some skill’s he just learned off the web. You have inventory (product) work/purchase orders. Again I do not know the nature of your business, but can you be compromised, product shipped elsewhere based on clients credit? Any product, be it tooth brushes or nuclear warheads has value within black markets.

    Large corporations are sinking billions into cyber security. This poses a higher challenge to those within cyber crime who many are redirecting their efforts toward less secure small business. 2018 saw an 400+% increase of cyber crime toward small business over the previous year. And out of those who have been compromised, the majority have gone belly up because they could not recoup their losses.
     

    awsum140

    Resting In Peace
    ECF Veteran
    Verified Member
    Jun 12, 2012
    9,855
    46,386
    Sitting down, facing forward.
    I just went back and looked at those Mac, alleged, Blue Iris "equivalents". They're all like comparing a White Castle hamburger to a steak and tails dinner. I'll stick with the steak and tails. There are video surveillance programs that will run, natively, on iOS but they are magnitudes more expensive than BI on a Winduhs box. As in $500USD, and up, for the base license and $50, and up, per camera per year. That versus BI for ~$50 per year for up to 64 cameras and you don't have to pay that yearly fee if you're happy with the version you're currently running and updates for that version can be downloaded and installed for free until that version is no longer supported. Typical version lifespan is two to four years.
     

    BillW50

    Vaping Master
    ECF Veteran
    Verified Member
    Nov 23, 2014
    3,429
    35,050
    US
    Risk assessment is not just about finding vulnerabilities within your software/OS that can be exploited. It's about looking at the grand scheme of things and assessing what financial losses you may incur should something fail. A failure could be identified as an exploit, hardware failure, software corruption etc. How dependent is your business on this software? Can you operate without it? Should a failure occur, regardless of it’s cause how quickly can you recover – and if you can not recover, what plans do you have to replace?

    You should go to the source and tell Microsoft. They are totally clueless when it comes to security. Remember all of those times Microsoft has been hacked into?
     

    Punk In Drublic

    Vaping Master
    ECF Veteran
    Aug 28, 2018
    4,194
    17,518
    Toronto, ON
    You should go to the source and tell Microsoft. They are totally clueless when it comes to security. Remember all of those times Microsoft has been hacked into?

    No I don’t Bill, why not you list the times. And while you are at it, cross reference that count with all other operating systems.

    What rules the majority of the public facing server market? MS, Linux, Unix?
     

    BillW50

    Vaping Master
    ECF Veteran
    Verified Member
    Nov 23, 2014
    3,429
    35,050
    US
    No I don’t Bill, why not you list the times.

    Well here are some off of the top of my head that I recall.

    1997 - Hackers exploited a bug in Microsoft's(MSFT) server software, jamming the company's Web site.

    2000 - Software giant Microsoft is trying to play down the damage done after malicious hackers infiltrated its computer network.
    BBC News | BUSINESS | Microsoft downplays hack attack

    2001 - Microsoft became the prominent victim of a hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted.

    2012 - Hacker group, Swagg Security released a massive amount of data including email logins, server logins, and bank account credentials of large companies like Apple and Microsoft.

    2012 - A lot of important Turkish Websites are hacked by F0RTYS3V3N (Turkish Hacker). Microsoft’s website along with other major companies was hacked as well.

    2013 - Microsoft didn't tell the public one of its databases was hacked in 2013.
    Microsoft didn't tell the public one of its databases was hacked in 2013

    2019 - Microsoft reveals certain Outlook.com user accounts were hacked for months
    Microsoft reveals certain Outlook.com user accounts were hacked for months - Security Boulevard

    What rules the majority of the public facing server market? MS, Linux, Unix?

    If you count all GNU/Linux distributions as one OS, I’ll have to say GNU/Linux with Ubuntu leading the pack.
     

    Punk In Drublic

    Vaping Master
    ECF Veteran
    Aug 28, 2018
    4,194
    17,518
    Toronto, ON
    Well here are some off of the top of my head that I recall.

    1997 - Hackers exploited a bug in Microsoft's(MSFT) server software, jamming the company's Web site.

    2000 - Software giant Microsoft is trying to play down the damage done after malicious hackers infiltrated its computer network.
    BBC News | BUSINESS | Microsoft downplays hack attack

    2001 - Microsoft became the prominent victim of a hack that attacks the domain name server. In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are corrupted.

    2012 - Hacker group, Swagg Security released a massive amount of data including email logins, server logins, and bank account credentials of large companies like Apple and Microsoft.

    2012 - A lot of important Turkish Websites are hacked by F0RTYS3V3N (Turkish Hacker). Microsoft’s website along with other major companies was hacked as well.

    2013 - Microsoft didn't tell the public one of its databases was hacked in 2013.
    Microsoft didn't tell the public one of its databases was hacked in 2013

    2019 - Microsoft reveals certain Outlook.com user accounts were hacked for months
    Microsoft reveals certain Outlook.com user accounts were hacked for months - Security Boulevard



    If you count all GNU/Linux distributions as one OS, I’ll have to say GNU/Linux with Ubuntu leading the pack.

    And where is the cross reference with other OS’s? MS is far from perfect, but neither are the other OS’s. With Linux consisting of roughly 95% of the front facing public server market, they are the most compromised product. But it is unfair to say they are the most insecure. All OS come with their own fair share of vulnerabilities, they may differ between products but in a nut shell, roughly the same amount of vulnerabilities are found with each product per year. No one OS is better or worse than the other.
     

    Steamer861

    Ultra Member
    ECF Veteran
    Verified Member
    Jan 13, 2014
    2,710
    23,383
    Canada
    I just went back and looked at those Mac, alleged, Blue Iris "equivalents". They're all like comparing a White Castle hamburger to a steak and tails dinner. I'll stick with the steak and tails. There are video surveillance programs that will run, natively, on iOS but they are magnitudes more expensive than BI on a Winduhs box. As in $500USD, and up, for the base license and $50, and up, per camera per year. That versus BI for ~$50 per year for up to 64 cameras and you don't have to pay that yearly fee if you're happy with the version you're currently running and updates for that version can be downloaded and installed for free until that version is no longer supported. Typical version lifespan is two to four years.
    That means your thinking about. Buying a. Mac! :thumbs: Come over to the. Dark side:thumbs:
     

    Steamer861

    Ultra Member
    ECF Veteran
    Verified Member
    Jan 13, 2014
    2,710
    23,383
    Canada
    You got lucky no one grabbed it! Till you activate FMI, any one could have just walked off with it. About 2 month ago my youngest forgot his school bag at the university, but with FMI on we could have tracked & disable it :) Luckily it was not taken & we retrieved it :)
     

    BillW50

    Vaping Master
    ECF Veteran
    Verified Member
    Nov 23, 2014
    3,429
    35,050
    US
    And where is the cross reference with other OS’s?

    What do you mean? I was referring to companies who's business it is to keep Windows secure. And Microsoft pretends to be one of them. And they are awful at it. As it is far better to put your trust in other security companies with a far better record.
     

    Punk In Drublic

    Vaping Master
    ECF Veteran
    Aug 28, 2018
    4,194
    17,518
    Toronto, ON
    Just look at Defender. When tested against other antivirus software, it scored dead last.

    You are going to rate the security of a whole OS based on 1 application? Apple OS and Linux doesn’t even come with a baked in AV, so even if Win Defender was rated last (by whom I do not know), it is still a step ahead of the competition.

    So where is this rating? How did they come up with a score? Did they throw a bunch of malware at the computer to see which one detected and dealt with the virus? What about unknown malware? Difficult to test for that. And to further add, as I have said many times malware and vulnerabilities are 2 separate entities
     
    • Informative
    Reactions: awsum140

    Steamer861

    Ultra Member
    ECF Veteran
    Verified Member
    Jan 13, 2014
    2,710
    23,383
    Canada
    Keep dreaming, not even if I used YOUR credit card!

    I'm still sensing a Bit of negativity, But I feel your stance is softening :) Curiosity turns into want & want turns into need! It's just a matter of time now :)
     

    BillW50

    Vaping Master
    ECF Veteran
    Verified Member
    Nov 23, 2014
    3,429
    35,050
    US
    You are going to rate the security of a whole OS based on 1 application?

    No I am basing a security company by their security track record.

    Apple OS and Linux doesn’t even come with a baked in AV, so even if Win Defender was rated last (by whom I do not know), it is still a step ahead of the competition.

    They don't want to end up laughed at like Microsoft has been. They know they can't match those who does it for a living, so they don't even try.

    So where is this rating? How did they come up with a score? Did they throw a bunch of malware at the computer to see which one detected and dealt with the virus? What about unknown malware? Difficult to test for that.

    I always used and trusted AV Test.org.

    AV Test (The Independent IT-Security Institute)

    During January and February 2020 we continuously evaluated 20 home user security products using their default settings. We always used the most current publicly-available version of all products for the testing. They were allowed to update themselves at any time and query their in-the-cloud services. We focused on realistic test scenarios and challenged the products against real-world threats. Products had to demonstrate their capabilities using all components and protection layers.

    Test antivirus software for Windows 10 - February 2020

    For about the last 10 years, MS was or near the bottom of the list. I haven't checked in months, but now it appears since the NSA has been known for helping MS out, they finally managed to scrap themselves off of the bottom of the list. Now let's see how long they can stay there. ;)

    And to further add, as I have said many times malware and vulnerabilities are 2 separate entities

    Of course they are. And social engineering is another big vulnerability. And one of the best ways to protect yourself against all of them is with a sandbox. It isn't the beat all, but it might be the only thing stopping a threat.
     

    Users who are viewing this thread