fearmeforiampink: (Default)
FearmeForIAmPink ([personal profile] fearmeforiampink) wrote2013-12-29 05:54 pm

Interesting Links for 25-12-2013

[identity profile] theweaselking.livejournal.com 2013-12-30 04:06 pm (UTC)(link)
The thing about Cryptolocker is: You *can't* solve it, not unless you can crack standard encryption. And you can't do that. And the nasty little thing goes looking for network and cloud and attached storage to trash, so having stuff on Dropbox or Drive won't always help if the infected machine is logged into them. An always-connected USB drive with a mirror? Nope, it'll get that too, etc etc etc.

Cryptolocker is nasty.

If you have redundant copies of all your data that *cannot* be accessed by the infected computer, sure, you're fine.

[identity profile] theweaselking.livejournal.com 2013-12-30 04:16 pm (UTC)(link)
I do not believe it does that.

(If it's possible for *you* to do that, then it *can*, but I don't think it *does*. If you can't do it, it can't.)

I don't use Dropbox: Does it truly version all your files? Or only documents? If it's "all files", then yeah, Dropbox won't have that problem.