Thanks for being here guys, everything is quiet again here and business as usual. Frank even brought our 2 customer entertainment stations back in after lunch. I took a late lunch so he could get them up and running. We host games, internet access, and general apps on them for the people in the waiting room. Parents can sign their children in and lock out aspects (such as internet) to keep the little ones safe. As I am typing, both terminals are occupied by two boys I know are brothers of the patient being treated by Frank. The funny thing to watch is their mother prying them out of our waiting room.
Announcement
Collapse
No announcement yet.
WannaCry Worm
Collapse
This topic is closed.
X
X
-
Originally posted by wartnose View PostSimon, I assume you use a cloud based EMR? Otherwise not much to choose from for Linux unless maybe you can code mumps.
http://oscar-emr.com/
http://openmrs.org/
http://wiki.gnumed.de/bin/view/Gnumed
http://www.open-emr.org/
https://github.com/freemed/freemed/wiki
and there are others, some very specialized."A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
-
Originally posted by GreyGeek View PostHow many choices do you need?
http://oscar-emr.com/
http://openmrs.org/
http://wiki.gnumed.de/bin/view/Gnumed
http://www.open-emr.org/
https://github.com/freemed/freemed/wiki
and there are others, some very specialized.Last edited by wartnose; May 18, 2017, 06:31 AM.
- Top
- Bottom
Comment
-
Originally posted by wartnose View Post....
I heard recently the VA system is going to a commercial EMR which means they might be plagued with WannaCry soon. Cloud based may be the the way to go.
Originally posted by wartnose View PostThen you can run all Linux workstations...but you better hope the cloud has good connectivity and security.
Internet servers can be as vulnerable to malware and blackhats as local servers, even more so if the local servers are not facing the Internet. Then there are the corporations which promise to "do no evil" and after they get a good market share "evil" becomes their middle name as they strive to extend the influence and market share.
Outsourcing databases to the Internet as a cost saving measure may save the corporation lots of money short term, but like outsourced factories the data ends up sliding down the commodity curve to the bottom of the barrel: to servers housed on the cheapest sites around the world, sites that are controlled by not so savory countries and their leaderships.
Taking the long term view, IMO, it is better for people and corporations to maintain their own "clouds". They can be configured for local access and remote access via ssh through VPNs. Running Linux for both workstations and servers eliminates essentially all malware threats and the vast majority of remote access threats. Most vulnerabilities are via local hosts. Unscrupulous employees is a different kind of threat that IPSec and ssh won't protect against. While Windows vulnerabilities reach into the tens and hundreds of thousands, if not more, the CVE for Ubuntu is currently at 89, and that list goes back to 1996 for packages that were included in Ubuntu.
For "distinct vulnerabilities" among the top vendors the cvs score distribution is:
CVSS Score Distribution For Top 50 Vendors By Total Number Of "Distinct" Vulnerabilities1 Microsoft 4916 2 17 224 35 618 706 250 1127 23 1914 7.80 0 0 5 1 13 14 5 23 0 39 2 Oracle 4356 2 87 192 367 1234 972 509 407 21 565 6.20 0 2 4 8 28 22 12 9 0 13 3 Apple 3776 1 53 231 41 610 487 910 617 15 811 7.00 0 1 6 1 16 13 24 16 0 21 4 IBM 3308 2 54 181 408 887 565 340 478 28 365 6.10 0 2 5 12 27 17 10 14 1 11 5 Cisco 2926 1 3 30 41 540 669 419 883 36 304 7.00 0 0 1 1 18 23 14 30 1 10 6 Google 2453 3 30 7 383 310 324 731 8 657 7.60 0 0 1 0 16 13 13 30 0 27 7 Adobe 2284 18 3 156 137 70 122 1 1777 9.20 0 0 1 0 7 6 3 5 0 78 8 Linux 1854 1 87 273 43 571 134 151 472 4 118 5.90 0 5 15 2 31 7 8 25 0 6 9 Mozilla 1715 5 72 8 332 299 212 242 1 544 7.30 0 0 4 0 19 17 12 14 0 32 10 SUN 1630 3 26 105 45 312 283 119 422 4 311 6.80 0 2 6 3 19 17 7 26 0 19 11 Redhat 1549 44 145 77 331 281 200 314 6 151 6.20 0 3 9 5 21 18 13 20 0 10 12 Novell 1512 1 24 63 57 335 338 198 279 2 215 6.60 0 2 4 4 22 22 13 18 0 14 13 HP 1410 1 10 53 26 261 204 122 359 22 352 7.30 0 1 4 2 19 14 9 25 2 25 14 Debian 1128 15 68 42 247 233 182 255 4 82 6.40 0 1 6 4 22 21 16 23 0 7 15 Canonical 850 22 42 26 219 174 131 166 3 67 6.30 0 3 5 3 26 20 15 20 0 8 16 Apache 777 5 35 18 207 254 86 128 1 43 6.20 0 1 5 2 27 33 11 16 0 6 17 PHP 560 21 6 62 163 75 191 1 41 6.90 0 0 4 1 11 29 13 34 0 7 18 GNU 470 1 9 38 26 77 132 55 102 30 6.20 0 2 8 6 16 28 12 22 0 6 "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
-
- Top
- Bottom
Comment
-
Originally posted by dibl View PostThe longer I use Linux, the lower my remaining respect for Microsoft. Today I discovered this goofy situation on the only Windows computer in my house (Win 7): Microsoft Security Essentials is fully up to date, has done a full system scan today, and finds no issues. Windows update shows 48 "Important" and 2 optional updates. Running updates, it will sit there claiming "Downloading Updates" for an hour with zero actual files downloaded. Grabbed their "Update Repair Tool" or whatever it is called, ran it as administrator, and watched it sit there claiming "Recovering Files" or some such lie, with nothing actually happening. What a pile of crap!
a bit more on topic. the malware can infect linux if one uses wine. i guess you woul dneed ot use email client or browser in it. anyway it encrypts wine and home, but system stays intact.
just thought it is worth to remember that wine, while it enables some windows apps to run it is also an attack vector. though lmited in scope and you might need some work in many cases (just like other apps) to get the malware running in wine.
- Top
- Bottom
Comment
-
Originally posted by mastablasta View Postjust thought it is worth to remember that wine, while it enables some windows apps to run it is also an attack vector. though lmited in scope and you might need some work in many cases (just like other apps) to get the malware running in wine.Lenovo T460s
- Top
- Bottom
Comment
-
Originally posted by mastablasta View Post....
a bit more on topic. the malware can infect linux if one uses wine. i guess you woul dneed ot use email client or browser in it. anyway it encrypts wine and home, but system stays intact.
just thought it is worth to remember that wine, while it enables some windows apps to run it is also an attack vector. though lmited in scope and you might need some work in many cases (just like other apps) to get the malware running in wine.
The biggest danger to Linux is not the malware, regardless of its source or attack mode, it is the USER. Programs don't run themselves on Linux by virtue of an extension type or some "activeX" control. On Linux there are three steps to running a program.
1) Save it as a file (ALL objects in Linux are and have to be files)
2) add the execute permission to the saved file
3) run the saved file
Only the user can do those three steps. It is ALWAYS done by installing software from sources other than the repository. If you are going to go outside the vetted repository then the onus is on you to see that you are not infecting your computer."A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
-
Looks like Win10 didn't get a free ride
https://www.bleepingcomputer.com/new...urity-company/
"Athena is an implant — a CIA technical term for "malware" — that can target and infect any Windows system, from Windows XP to Windows 10, Microsoft's latest OS version.
Documents leaked today are dated between September 2015 and February 2016, showing that the CIA had the ability to hack Windows 10 months after its launch, despite Microsoft boasting about how hard it would be to hack its new OS.""A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
-
Originally posted by GreyGeek View PostL On Linux there are three steps to running a program.
anyway malware that abuses trust is still possible. not sure about snaps packages, are they contained?
- Top
- Bottom
Comment
-
The weakest component of any computer system, whether it be Window, Mac, Unix/Linux, or "other", is the user sitting at the keyboard. The user must have or acquire at least basic understanding of how the system works; period. If a user can't or won't acquire that understanding, they have no one to blame but themselves when something goes wrong; period. That may sound harsh, but it's the reality one must accept when choosing to use a computer.
ca·ve·at emp·tor
ˌkavēˌät ˈem(p)ˌtôr/
noun
- the principle that the buyer alone is responsible for checking the quality and suitability of goods before a purchase is made.
Windows no longer obstructs my view.
Using Kubuntu Linux since March 23, 2007.
"It is a capital mistake to theorize before one has data." - Sherlock Holmes
- Top
- Bottom
Comment
- the principle that the buyer alone is responsible for checking the quality and suitability of goods before a purchase is made.
-
Originally posted by Snowhog View PostThe weakest component of any computer system, whether it be Window, Mac, Unix/Linux, or "other", is the user sitting at the keyboard. The user must have or acquire at least basic understanding of how the system works; period. If a user can't or won't acquire that understanding, they have no one to blame but themselves when something goes wrong; period. That may sound harsh, but it's the reality one must accept when choosing to use a computer.
ca·ve·at emp·tor
ˌkavēˌät ˈem(p)ˌtôr/
noun
- the principle that the buyer alone is responsible for checking the quality and suitability of goods before a purchase is made.
- Top
- Bottom
Comment
- the principle that the buyer alone is responsible for checking the quality and suitability of goods before a purchase is made.
-
Originally posted by mastablasta View Postit is likely similar on Mac (just guessing here as i never used it have it). there was recently a hack on Handbrake site. someone planted malicious version on their website. user downloaded it. "the infection" was also physhing based as it asked for a password. the user though it was safe so they entered it never thinking why it needed the password. this could easily happen to new users as well. they would assume the program needs access to OS. password was then sent to attackers who got full access. you could say use what is in repos, but often in repos are not latest versions and sometimes you need the latest to complete the task or to avoid certain bugs.
anyway malware that abuses trust is still possible. not sure about snaps packages, are they contained?
Sending out a Trojan or virus as an attachment in a mass mailing to millions of users will work to get Windows infected, even if the user doesn't click on the attachment, but on Linux an email attachment just sets in the inbox until the user decides to do something. Even clicking on the attachment won't run it because as an attachment it is not a file and Linux only executes special files (script & ELF) that have the execute permission set, and that at the user's request. A file in and of itself cannot execute automatically. For that to happen an entry in cron is required or some process previously executed by the user has to do the honors.
The number one security hole in Linux is the user, and the developers can't program him/her out of the loop, which is what Microsoft tried to do with Windows and it only made their security a bigger problem.
So, noobs, do NOT go outside the Kubuntu/Ubuntu/Neon repository to install apps. Do NOT save an email attachment, add execute permissions to it and then run it, regardless of who it claims it is from. Activate your ufw (firewall) and install its GUI to make it easier to use.
Go to Gibson's "Shields Up!" website and test your first 1,024 ports for security. Make sure they are all green. If you allow yourself to be pinged you'll fail the test even if all your ports are green, but that doesn't matter. ICMP acks don't hurt you.
If you have a router that you can or have installed DD-WRT on, then turn on its firewall as well. (But, holes you make in your ufw firewall you'll have to make in the router SPI firewall as well.)Last edited by GreyGeek; May 20, 2017, 12:34 PM."A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
– John F. Kennedy, February 26, 1962.
- Top
- Bottom
Comment
Comment