fearmeforiampink: (Default)
[personal profile] fearmeforiampink

Date: 2013-12-30 04:06 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
The thing about Cryptolocker is: You *can't* solve it, not unless you can crack standard encryption. And you can't do that. And the nasty little thing goes looking for network and cloud and attached storage to trash, so having stuff on Dropbox or Drive won't always help if the infected machine is logged into them. An always-connected USB drive with a mirror? Nope, it'll get that too, etc etc etc.

Cryptolocker is nasty.

If you have redundant copies of all your data that *cannot* be accessed by the infected computer, sure, you're fine.

Date: 2013-12-30 04:16 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
I do not believe it does that.

(If it's possible for *you* to do that, then it *can*, but I don't think it *does*. If you can't do it, it can't.)

I don't use Dropbox: Does it truly version all your files? Or only documents? If it's "all files", then yeah, Dropbox won't have that problem.

Profile

fearmeforiampink: (Default)
FearmeForIAmPink

April 2017

S M T W T F S
      1
234567 8
9101112131415
16171819202122
23242526272829
30      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 28th, 2025 11:12 am
Powered by Dreamwidth Studios