This is an absolutely trash tier response, and you should be ashamed of yourself, Dan. Telling people to Google something isn't the same as providing instructions, even if you slap a fucking search query link in your comment.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
As I've said many a time when people suggest "simply" moving to linux, that is fine with a technically literate person who doesn't mind lots of change and is fine with manually sorting out apt or yum or rpm or pip or dpkg or dnf or... (ad infinitum) when something inevitably breaks, but for a simple home user or a corporation with tens or hundreds or thousands of machines, linux just isn't the answer. Not to mention the insane amount of infrastructure changes, retraining of staff, potentially losing employees because you're not using the "standard" tools (yeah, it sucks, but it's a reality).My innovative solution to the problem rests here:
I recommend Cinnamon for folks used to Windows, since it has a default desktop that works pretty much exactly like Windows Explorer.
Then you don't really have as much to worry about, at least from Windows. And you don't have to worry about involuntary upgrades (or even updates), since you have full control and decisions over that.
If you can't live without Windows, then dual boot and run Windows only when you need to. I expect you'll find over time that those reasons won't be popping up as often.
YMMV on your experience, but if it full on sucks with Windows, it's going to at least be rid of their tendency to treat YOUR property as if THEY own it.
I'm on the receiving end of vulnerability "reports" from customers. Their IT/security team runs a scan on the servers which host the apps that I support and forward the reports to my team (the app vendor) for analysis. Often these reports aren't worth the paper they're pinted on (if I were to print them); they're generated by automatic scan tools and the customer's IT/Sec team just forwards the results on to me. I'm lucky if they filter the results to just the servers hosting the software that I support. The vast majority of the reports are nothing more than the scan tool looking for things like open ports and concluding that they must be insecure, even though I can (and have) provide evidence that my app uses encrypted connections over the port. Or the tool notices some vulnerable component on the server and flags it for remediation, but it doesn't know whether the component is actually vulnerable to exploitation. Rarely, if ever, do these reports include links to documentation supporting their finds, such as CVE articles, vendor bulletins, etc.At a previous job the security team attitude was basically "we've heard about/detected this vulnerability, it's up to the rest of you to figure out how to resolve/mitigate" and then wiped their hands clean.
Not sure if that attitude is typical of most security folks or not...
That sure sounds like a non-apology apology to me. Maybe next time wait until you have a solid reply before posting, Dan?I just discovered that the link I put in, didn't make it into the last-published story that went live. It's: https://arcticwolf.com/resources/bl...-zdi-can-25373-vulnerability-to-deploy-plugx/. It doesn't say or link to how you can do that. I didn't have a link handy to a how to when I responded and was out running an errand. I just thought it'd be quicker/easier/more helpful if I just sent a quick link with a reminder that that's where I would have to start. Sorry if that came off wrong.
Here people said that those settings don't work anymore since years tho..From what I could find
https://superuser.com/a/1231305
looks to be the best answer --
(GPO is Group Policy in this comment)
(and since we're sharing searches -- https://kagi.com/search?q=windows+explorer+disable+path+link+resolve&r=us&sh=r07fG8vJCTXaQ5sTUOU7OA )
True story: a few years back, I moved from one top-tier research university to another one (as a professor). In my old institution, I had gitolite running on my office computer and IT configured a pinhole in their firewall allowing outside access to my ssh port, so my computer effectively acted as a git server for my collaborators. (I know that something like that would never fly in a corporate environment, but in universities it's not that uncommon.)Judging by threads in /r/sysadmin, it's all that security does. Run a scan, squawk about findings, then go back to watching Netflix.
internet-facing WSUS servers
That was not an apology, and grace should have been given by the author who demeaned that arsian to begin with. That comment by the author was completely inappropriate and should be brought to the attention of his employer as it was conduct unbecoming to someone writing for pay under the umbrella of Conde Nast. What any employee does reflects on all who work for the company, and the reputation of the company itself.How about recognizing that it's late on a Friday night (and Halloween at that) and give him a little grace. Especially as he came back well outside working hours to apologize to that specific arsian in the very comment you quoted.
where i work, they use o365 and encouraged everyone to use ms authenticator for passwordless login (well, on browsers in outside devices anyway) which is like the best thing since sliced bread.. type in login, enter code on phone..At a previous job the security team attitude was basically "we've heard about/detected this vulnerability, it's up to the rest of you to figure out how to resolve/mitigate" and then wiped their hands clean.
Not sure if that attitude is typical of most security folks or not...
That's not the same thing. It's about stopping links from following a target that's moved or renamed. That poster wanted to rename test.exe to testold.exe and place a new test.exe. If you have a shortcut to the original test.exe, it will be updated to point to testold.exe when it's renamed and the poster didn't want that.Here people said that those settings don't work anymore since years tho..
https://superuser.com/questions/179...tion-of-shortcuts-lnk-files-in-windows-10-gro
You mean, the same arsian who didn't think it was a big deal?That was not an apology, and grace should have been given by the author who demeaned that arsian to begin with.
Long-time nonposter here as well. Ditto. Disgraceful.I post literally once every year or so. Congrats. You made me post.
Imagine being this egotistical. Someone posted something that could genuinely improve your article and assist people that are less technical and you spit in their face for it.
Imagine behaving like a child just because someone offered a suggestion. Unbelievable.
One of the two people in this argument got paid to write something here. Please learn from this.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
I unpinned that comment. I’d replace it with something better but to be honest I’m too ignorant of the topic to feel comfortable doing that.
In the interest of promoting harmony here is a photo of two of my cats that tend to bat at each other deciding last night that curling up next to me while I’m injured was a better idea.
View attachment 121401
I’m having a very hard grasping how you think that’s somehow a legitimate “apology”.How about recognizing that it's late on a Friday night (and Halloween at that) and give him a little grace. Especially as he came back well outside working hours to apologize to that specific arsian in the very comment you quoted.
I post literally once every year or so. Congrats. You made me post.
Imagine being this egotistical. Someone posted something that could genuinely improve your article and assist people that are less technical and you spit in their face for it.
Imagine behaving like a child just because someone offered a suggestion. Unbelievable.
I’d almost wonder if it was really the author, since there isn’t a “Staff” logo on the account…. Out of place attitude for an author here, for sure.
SMH. Some things never change. Reading through this thread reminded me of a similar 'snafu' where some of us dared to question Dan's writing/headline.Long-time nonposter here as well. Ditto. Disgraceful.
This is a difficult issue to balance successfully. On a team I'm with we go the full length of discovery, correlation with external information, correlation with any suspicious activity internally, production of IoCs for everyone to use with their tools and services, summary recommendations, detailed implementation techniques specific to the existing patch management and system administration tools, and round table discussions seeking immediate and future improvements with final statements implemented into existing policy and procedures.Judging by threads in /r/sysadmin, it's all that security does. Run a scan, squawk about findings, then go back to watching Netflix. I feel confident in stating that my team doesn't do that. We, in theory, have the capability to apply fixes ourselves but those are with accounts that are essentially break the glass because all of our sysadmins got hit by a bus or something.
Operations don't want us touching their stuff, and I absolutely respect that. I'm not a sysadmin, I'm far more likely to screw it up because I don't know that system X can't install update Y or else it breaks core application Z.
On the other hand, when these issues do come up, I've ingrained the culture within my team that we don't just toss it over the fence. We pull relevant articles that cover installation, mitigations that can be done as opposed to patching if any exist, and do as much of the grunt work that we can that isn't actually turning the knobs and pushing the buttons. Apparently, we're unicorns.
IMO security should be a mid/late-career job after some years working in support & operations. I don't believe that you can understand vulnerability & remediation properly if you don't also understand the context of the systems and environment you are working in. Theory and practice are not the same thing and only experience let's you know the difference.This is a difficult issue to balance successfully. On a team I'm with we go the full length of discovery, correlation with external information, correlation with any suspicious activity internally, production of IoCs for everyone to use with their tools and services, summary recommendations, detailed implementation techniques specific to the existing patch management and system administration tools, and round table discussions seeking immediate and future improvements with final statements implemented into existing policy and procedures.
Our team is too small for this and we are not able to keep up. There are sysadmin teams that are better suited for this especially since we do not have access to most of their tools or significant access to cloud interfaces. The research belongs in Threat Intel and IoCs should be in the SOC. The short and long term actions and policy belong to Policy & Governance. But because our team is populated with people that are former system and network administrators with scripting skills who became security engineers and migrated to incident response, we find we are the backstop for everything. Pushing back in the middle of a potential crisis doesnt' work. It's exhausting and frustrating.
I would assume that most organizations do not have a sub-security group that used to do everything and instead are trained in specific cybersecurity silos. I'm both thrilled to see how detailed new cybersecurity staff are as they matriculate out of college and certification mills like CEH, SANS, BH, ISC^2, ISACA, but very disappointed in how ineffective they are operationally and unable to grasp the entire infrastructure. We have a lot of people in cybersecurity now, but most are junior.
It’s the weekend, but I’ve been aware of all the reports and comments and feedback, and have made sure they’re forwarded onto the management team.Dan's writing is what originally brought me to Ars. I was looking for regular writing on security issues, although I am completely non-technical. Not in IT or the tech industry at all, I just find security issues really interesting. I don't even understand what all I'm reading half the time, maybe that is weird, but I just enjoy reading about it.
After reading this article, I had the exact same question in mind and was glad the first comment was aligned with my thoughts. Was hoping for an update or answer.
The completely uncalled for responses from Dan in these comments has made me feel like these articles aren't for me. If so, that's OK I suppose, good to know going forward. Will leave it to the IT experts to read and understand.
And the prior example of Dan's odd hyper-sensitivity to even the slightest questioning of his writing I posted a few posts above was from 2022 - his responses there were arguably even worse and less appropriate and professional.It’s the weekend, but I’ve been aware of all the reports and comments and feedback, and have made sure they’re forwarded onto the management team.
It’s not my role to respond to any of it, but as the community manager I 100% want everyone who is curious about tech to feel welcome. You don’t have to be in IT to participate here.
Not my circus, not my monkeys, I just wanted people to understand that when I hear voices in the community I do pass that feedback along.And the prior example of Dan's odd hyper-sensitivity to even the slightest questioning of his writing I posted a few posts above was from 2022 - his responses there were arguably even worse and less appropriate and professional.
Look, I actually enjoy his articles and his writing is usually very clear and engaging. But - he does get a chip on his shoulder if anyone happens to question him, and can respond inappropriately and unprofessionally.
I don't really want any sort of managerial involvement to result in any dire consequences, but he does need to reflect on his attitude when readers ask - IMHO - legitimate and reasonable questions. Get defensive, sure defend your position, but he crosses the line into disrespectful and unprofessional.
Understood. And forgot to include my thanks in the previous posts. Your efforts are appreciated.Not my circus, not my monkeys, I just wanted people to understand that when I hear voices in the community I do pass that feedback along.
Yeesh that's a pretty out of scope reply considering the polite tone of the original request don't you think? I tend to agree, for what it's worth, and if someone's suggesting that, they may not have a link on how to do that. I personally don't take very kindly to that sort of "Just google it" responses anyway. If you didn't want to provide help, you could have left it for others who did want to.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
Arse TechnicaYou could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
What it says on the tin: a WSUS server that is accessible from the general Internet.What exactly does this mean?
My honest opinion, as somebody who is not Ars staff and bloviates a bit much on threads here: don't go. Stay. Ask your questions. Generally, I find the Ars community to be very good about picking up on when somebody isn't deep in a subject, and the usual approach I've seen is to give useful replies to questions, even those that seem basic. We all have to learn somehow, and that learning journey has to start somewhere. This is one of the better places I've seen online for that.The completely uncalled for responses from Dan in these comments has made me feel like these articles aren't for me. If so, that's OK I suppose, good to know going forward. Will leave it to the IT experts to read and understand.
I'd imagine it's not the first step in the penetration, but more like step 2 or 3, possibly in a social engineering attack. To the target it might not look like they did anything dangerous, when their system has now been Pwned.The .lnk exploit is extraordinarily tame. Who is downloading shortcut files from the raw internet and launching them? Most people are creating these themselves or they are thrown on the desktop during software installations. If someone with bad intentions already has you running their installer, you are already sunk. I can see why it has been unpatched since 2017. A bit of sensationalism on that one.
The nature of engaging in a job of some description almost invariably requires you to set aside your shitty day. If you can't do that - you're gonna have a bad time.People are imperfect. People have good days, bad days, get grumpy, sad, excited, drunk, crazy. It's the flavor of life. Without shit days, how would you know what a good day is?
Maybe he had a bad day? Maybe he's busy giving up cigarettes?
Shit happens, sometimes even twice a day.
Two Windows vulnerabilities—one a zero-day that has been known to attackers since 2017 and the other a critical flaw that Microsoft initially tried and failed to patch recently—are under active exploitation in widespread attacks targeting a swath of the Internet, researchers say.