Tip 6 (oplossing)
Zoals een paar weken geleden vermeld was onze tip 6 besmet geraakt.
Gelukkig voor ons heeft onze vriend de Britse IT-nerd Slagh het kunnen ontcijferen, en kunnen we nu het origineel publiceren: “Tip 6: Aangezien de grote vakantie begonnen is, is dit het moment om kennis te maken met de Toeristische Dienst van Ninove. Tip 6 kan afgehaald worden vanaf zaterdag 8 juni in de Hospitaalkerk, Burchtstraat 44, Ninove (openingsuren: zie internet). Let op: een week later zal Tip 6 eveneens in Ninofmedia te lezen zijn - een gelegenheid om wat voorsprong te nemen dus. Santé, pardon Succes !”.
Het probleem met onze Britse IT-nerd Slagh was dat we hem niet eerder kwijt raakten dan dat hij ons in detail had uitgelegd hoe dat virus werkt en welke computer- en netwerkonderdelen aangetast zijn en moesten hersteld worden. En wij maar noteren en beloven dat we het op onze beurt zouden publiceren. “May the fust be with you !” zei hij nog.
WannaCry, originally named as WanaCrypt, having aliases of Wana Crypt0r and Wana Decrypt0r, is a ransomware worm on Microsoft Windows (can be run on Linux via WINE) that uses two NSA-leaked tools that has wreaked havoc in airports, banks, universities, hospitals and many other facilities. It has spread to some 150 countries worldwide, mainly Russia, Ukraine, and India. It is not decryptable as it uses RSA-2048; thus, the only way to retrieve files is by backup or directly paying with Bitcoin equivalent to $300 USD. Required payment increases to the Bitcoin equivalent of $600 USD after 72 hours since the initial infection of the PC. There seems to be another ransomware that some may refer to as the "successor of WannaCry", EternalRocks.
Malware, short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is defined by its malicious intent, acting against the requirements of the computer user - and so does not include software that causes unintentional harm due to some deficiency.
An operating system (OS) is software that, after being loaded into the computer by an initial boot program, manages a computer’s resources, controlling the flow of information into and from a main processor. OSs perform complex tasks, such as memory management, control of displays and other input/output peripheral devices, networking and file management, and other resource allocation functions between software and system components. The OS provides the foundation on which applications, middleware and other infrastructure components function. An OS usually provides user interfaces, such as command-line shell and GUI, for interaction between user and computer.
Application delivery controllers (ADC) are deployed in data centers to optimize application performance, security and resource efficiency by offloading servers, providing deep payload inspection and making the best use of complex protocols. Originally deployed for externally-facing Web applications, they are now used to deliver services for many types of business applications and protocols. Recent developments in software-based and virtual ADC platforms provide more deployment flexibility, especially in cloud services and virtual environments.
MAC has following common technology definitions: short for Media Access Control (in MAC address or MAC layer); when spelled Mac, the brand name and registered trademark for a line of computers from Apple Inc. (Macintosh computer).
A LAN is a geographically limited communication network that connects users within a defined area. A LAN is generally contained within a building or small group of buildings and is managed and owned by a single enterprise. The shorter distances within a building or campus enable faster communications at a lower cost than wide-area networks (WANs). Although an increasing number of LANs use Internet standards and protocols, they are normally protected from the public Internet by firewalls.
LANs are generally used to perform the following functions:
• Send output to printers attached to the network.
• Transfer data or software to or from other systems attached to the network.
• Send e-mail to other users on the network.
• Access wider-area networks, including the Internet, via a direct connection from the network, for external file transfer, e-mail, facsimile, group collaboration and videoconferencing.
Ethernet is a baseband local-area network (LAN) originally developed by Xerox and supported by Intel, Digital Equipment (now Compaq Computer) and Hewlett-Packard. It has a bus topology with carrier sense multiple access with collision detection (CSMA/CD) access control. Ethernet is not identical to Institute of Electrical and Electronics Engineers (IEEE) 802.3. Related terms include:
• Ethernet address: 48-bit code for Layer 2 networking maintained by the IEEE and hardwired into network adapters; also called MAC address.
• Ethernet, thick: Ethernet coaxial cable suitable for networks that are medium/large or with widely spaced nodes.
• Ethernet, thin: Ethernet coaxial cable suitable only for small networks with closely connected nodes.
Ethernet services deliver network connectivity over short- and long-haul circuits, and termination on fiber and copper local infrastructures. The Metro Ethernet Forum specifies three types of connections: E-Line, which is based on a point-to-point connection (more suited to WAN); E-LAN, which is based on a point-to-multipoint connection; and E-Tree, which is also based on point-to-multipoint connections with reduced provisioning schemes.