<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div class="">Also curious about something in this respect:</div><div class=""><br class=""></div><div class="">What if you took a standard Windows 10 desktop from Dell or HP or wherever, sucked the Windows out of it and put it into a VM (eg., VirtualBox), then replaced the base install with a stripped-down Linux core with enough there to run VirtualBox.</div><div class=""><br class=""></div><div class="">How secure would that be against ransomeware?</div><div class=""><br class=""></div><div class="">I’m thinking that if something infected the Windows VM, you could simply delete it and restore from a recent backup. </div><div class=""><br class=""></div><div class="">They might siphon off some of your data, but you wouldn’t be locked-out or lose it for lack of backups.</div><div class=""><br class=""></div><div class="">I don’t know how long those viruses might sit around dormant, but it might help to install Malwarebytes or something to scan for them anyway.</div><div class=""><br class=""></div><div class="">I also don’t know how “spidery” the ransomeware code is in so far as it could worm its way into your DB server or otherwise corrupt your data there.</div><div class=""><br class=""></div><div class="">Thoughts?</div><br class=""><div class="">
<span class="Apple-style-span" style="border-collapse: separate; border-spacing: 0px 0px; color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; text-align: auto; -khtml-text-decorations-in-effect: none; text-indent: 0px; -apple-text-size-adjust: auto; text-transform: none; orphans: 2; white-space: normal; widows: 2; word-spacing: 0px; "><div class="">-David Schwartz</div><div class=""><br class="khtml-block-placeholder"></div><br class="Apple-interchange-newline"></span>
</div>
<div><br class=""><blockquote type="cite" class=""><div class="">On Aug 27, 2019, at 4:46 AM, Aaron Jones <<a href="mailto:retro64xyz@gmail.com" class="">retro64xyz@gmail.com</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><meta http-equiv="content-type" content="text/html; charset=utf-8" class=""><div dir="auto" class=""><div dir="ltr" class=""></div><div dir="ltr" class="">Yes. </div><div dir="ltr" class=""><br class=""></div><div dir="ltr" class=""><a href="https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZiPGE1B0F8eZU-2BtWTy2RtpMTBnFFCqRYnwDhSoc4nGa1qj18L7srDy5uXr2GRhB0gQ-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBe-2B-2FO1K4-2Fb33B0TKGBFDAIw8dTcqz5qQUVqzw7pBDygGHrzYviylKHY5WvelzuEjBJ3eng0ns4XCMXfSo4nsD9QOWKfNAND9syIRJQsY-2Ba6Pa5kS-2FM-2Bx-2Be7bgOq-2FSbnleDsWLr46vNoRASg2c-2FxeDenDMp0EIz3QjQHVyHTNC97xY-3D" class="">https://forums.gentoo.org/viewtopic-t-1060828.html</a></div><div dir="ltr" class=""><br class=""></div><div dir="ltr" class="">There are plenty of ransomware products that target Linux but most users are less affected due to the higher likelihood of backups and version control and all the stuff that goes along with being a Linux user. </div><div dir="ltr" class=""><br class="">On Aug 26, 2019, at 10:57 PM, Joe Lowder <<a href="mailto:joe@actionline.com" class="">joe@actionline.com</a>> wrote:<br class=""><br class=""></div><blockquote type="cite" class=""><div dir="ltr" class=""><span class="">Has there ever been a report of a Linux system</span><br class=""><span class="">being the victim of ransomware? Just curious.</span><br class=""><span class=""></span><br class=""><span class=""></span><br class=""></div></blockquote></div></div></blockquote></div><br class=""><img src="https://u2206659.ct.sendgrid.net/wf/open?upn=6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBe-2B-2FO1K4-2Fb33B0TKGBFDAIwzMw-2BqKkaXAUlth-2FNRdYXE7o05zxPK9SIZTkO5TcSDwVZEyA-2BQNNAEc18iw2WgmnnIv8ePDVFF88HS10kdHGmwZoHtI7Ba3OUDGd69QRoRW-2BBu3SL5RUq-2F-2F3C1lT5-2BY4tD5LoV7BjFrpiURhDcE6csOyjK2nXXMgK1FLbFaEWHzH" alt="" width="1" height="1" border="0" style="height:1px !important;width:1px !important;border-width:0 !important;margin-top:0 !important;margin-bottom:0 !important;margin-right:0 !important;margin-left:0 !important;padding-top:0 !important;padding-bottom:0 !important;padding-right:0 !important;padding-left:0 !important;"/></body></html>