Check out downdetector.com. It’s disrupting big business.
Comment on Happy International Blue Screen Day
Varyk@sh.itjust.works 10 months ago
How many people is this affecting?
Both articles just say “it’s bad, so bad”
WhatsHerBucket@lemmy.world 10 months ago
Varyk@sh.itjust.works 10 months ago
Is it saying each service had a few hundred complaints and then leveled out?
One of them had 7k.
But that isn’t only tracking this bsod thing right?
WhatsHerBucket@lemmy.world 10 months ago
Correct, this is overall/all incidents.
Crackhappy@lemmy.world 10 months ago
I have not yet seen any effects in my large multinational organization.
Varyk@sh.itjust.works 10 months ago
I heard at editor international they had to write out all thec tickets by hand.
Sounds terrible for the employees.
Crackhappy@lemmy.world 10 months ago
Oof.
TexMexBazooka@lemm.ee 10 months ago
Flights were grounded across the US for everything but southwest I think
Varyk@sh.itjust.works 10 months ago
Whoa thanks, I didn’t hear that
Wild
TexMexBazooka@lemm.ee 10 months ago
Yeah. It also affected banks, hospitals, retailers, distributors… someone definitely got fired
Varyk@sh.itjust.works 10 months ago
Oh I was wondering about that. Ha. Nice. Good foreshadowing for the next big solar flare.
themeatbridge@lemmy.world 10 months ago
Falcon Sensor is one of the most popular security products in Windows servers. Practically every large company purchases Crowdstrike services to protect their servers.
People who aren’t affected:
People who are affected:
Companies that use Windows machines, buy Falcon Sensor from Crowdstrike, and are too stupid/cheap to have proper update policies.
TragicNotCute@lemmy.world 10 months ago
Nah, let’s direct ship anything any vendor sends us.
themeatbridge@lemmy.world 10 months ago
“We need to allocate our available budget to profit-generating processes. This just seems like a luxury we can’t afford.”
-thousands of overpaid dipshits, yesterday.
Morphit@feddit.uk 10 months ago
Does anyone know how these Cloudstrike updates are actually deployed? Presumably the software has its own update mechanism to react to emergent threats without waiting for patch tuesday. Can users control the update policy for these ‘channel files’ themselves?
Morphit@feddit.uk 10 months ago
This doesn’t really answer my question but Crowdstrike do explain a bit here: crowdstrike.com/…/technical-details-on-todays-out…
These channel files are configuration for the driver and are pushed several times a day. It seems the driver can take a page fault if certain conditions are met. A mistake in a config file triggered this condition and put a lot of machines into a BSOD bootloop.
I think it makes sense that this was a preexisting bug in the driver which was triggered by an erroneous config. What I still don’t know is if these channel updates have a staged deployment (presumably driver updates do), and what fraction of machines that got the bad update actually had a BSOD.
Anyway, they should rewrite it in Rust.
themeatbridge@lemmy.world 10 months ago
I don’t know for sure, but I would imagine that it varies based on the service level.
Varyk@sh.itjust.works 10 months ago
Thank you very much
garbagebagel@lemmy.world 10 months ago
Damn this morning I wished so hard my company was in the affected group. Alas, we all still had to work.