Direct MP3 Download: Geeksters #100 – More CryptoLocker and Matt Rodell's New Book
Episode 100 Show Notes
Just listen to geekster 97 and your encounter with crptolocker,
Just a coupler of questions. I am guessing to getting effected it does not taker advantage of a secuirty hole in windows,it is just that the user has the rights to run executables, if the vicitim launches the excutables it runs and encrypt the files the user has rights to it?
Also I am bit confused on how the backup exec back2disk files got encrypt, I can see how files on a network share got encrypted if they where network drive mapped to the effected computer, but where were the backup2disc file stored?
Keep up the good work and merry Christmas
* Matt Rodell’s new book “How to Quit Your Job and Start a Computer Business”
It’s good for 20% off the listed price: GEEKSTERS20
*Accessible Computing Foundation: Bringing Digital Sight to the Vision Impaired
To send a voicemail call 707-6PODNUT (707-6763688)
To support Podnutz please use the following links, and remember you don’t pay any extra for using the links !
Podnutz Amazon link (http://www.podnutz.com/amazon
Podnutz Newegg link (http://www.podnutz.com/newegg
Podnutz Ebay (http://www.podnutz.com/ebay)
Podnutz Deals (http://www.podnutz.com/deals)
Podnutz Clothing (http://www.podnutz.com/