That was the plan, but most of the features of Neptune weren't ready in time and they felt the need to get something out of the door by late 2000.TBH they should've stayed with 98 and gone from there to XP.
That was the plan, but most of the features of Neptune weren't ready in time and they felt the need to get something out of the door by late 2000.TBH they should've stayed with 98 and gone from there to XP.
That was the plan, but most of the features of Neptune weren't ready in time and they felt the need to get something out of the door by late 2000.
I'm fairly confident it's an example of the triumph of the marketing department over engineering.I know. However with an effective monopoly, they needn't have bothered, as the result was one of the most buggy, unusable OS in recent memory. Vista and 8 had their issues, however were in the main stable and secure. ME was awful.
The entire tram network has ground to a halt across Greater Manchester after a communications failure.
Trams have not been able to run on any lines since a fault struck the Metrolink control room on Sunday afternoon.
If anyone wishes to discuss this particular incident, use: All Metrolink Services Suspended - Sunday 14 MayWhat happens is everything grinds to a halt, as in Manchester this afternoon.
http://www.manchestereveningnews.co...-updates-huge-communication-failure-13033816?
It is at my workplace, and it certainly should be a valid argument!.... Being out of support simply isn't an argument....
A lot of people have a very simplistic view of what it takes to upgrade the OS in a major business.
I could write an essay on upgrade issues, as could anybody who has worked in IT in a major national business but it all comes down to money. Being out of support simply isn't an arguement, you have to be able to put a positive cost benefit on the upgrade. (I never liked that approach but I was just the poor devil who had to nursemaid the old software).
One thing that this recent event has shown is that the Government's cost cutting is more than people imagine and this has left vulnerable people exposed. It does make you wonder how a spotty teenager sitting in his bedroom has managed to bring the NHS to its knees
Sent from my SM-T555 using Tapatalk
That is a ridiculous comment, keeping computers updated is nothing to do with government cost cutting, it's incompetence.
This is an incredibly sophisticated attack that has also affected car factories and Deutsche Bahn for instance.
The Government paid £5.5 million in 2014 for Microsoft to continue updates....that lapsed in 2015 so for 2 years NHS computers have recieved no updates. Who do you blame for that the Government or the NHS.
Are train stations still running on obsolete software?
The Caldicott Guardians for each of the trusts that have had system failures due to the malware should be invited to Westminster or Holyrood as approropriate to explain themselves.
Are all the people and businesses who've been affected by ransomware too poor to upgrade their computers? Including Renault, Nissan and Deutsche Bahn? I think not.
There are arguments to be made that the NHS is under funded and I would agree with you in some respects, but this is purely incompetence, nothing more. You're making a cheap political point with no evidence.
Being out of support simply isn't an arguement, you have to be able to put a positive cost benefit on the upgrade. (I never liked that approach but I was just the poor devil who had to nursemaid the old software).
It is at my workplace, and it certainly should be a valid argument!
What if train stations are? What is the worst that can happen? ... the tannoy plays Britany Spears.
What if train stations are? What is the worst that can happen? The ticket machines don't work, the screens go bananas and the tannoy plays Britany Spears.
I'd be more concerned about the computers in signal boxes/signalling Centres. Hopefully none of them use XP at all
This is a very interesting topic and difficult to do justice to.
There is of course the fact that "Micros**t ended support for Windows XP in 2014". Windows XP continues to work. Subsequent MS platforms did not always work so well and still don't support many of the older Windows supported platforms that ran on their earlier products.
Personally I see "ending support for" as a sort of extortion racket: buy our new products or else.
In this case a security flaw might have been patched but for the "ending of support" this left a vulnerability. If there is a system that requires XP that was business critical it was open to the user to Pay MS (more extortion) to continue "to support it". UK Gov't chose not to do this. Negligence or refusing to bow to extortion when most threats would target the new MS Products?
Of course Windows should not be used for safety critical systems, but I fear it is in many cases.
There is more to security of IT systems than merely relying on MS to offer a patch every Tuesday in the wee small hours. It includes:-
In this case somehow malware got into systems and then appears to have spread internally via networks.
- physical protection of the infrastructure
- encryption of data on the public internet
- endpoint protection (eg USB devices)
- data protection/verification
- software hygiene
- spam prevention
- training of the operators
- operator vigilance
- no doubt many more
In my experience, the biggest vulnerability is the user clicking on links or opening attachments in spam. With large systems that have many users it is vitually impossible to prevent this. Spammers are continually upping their game to try to fool the users into believing it is a genuine message. A present tactic is to try to pretend to be a scanned document from a local machine.
All of us can up our game on this. That said, no machine should have privileges to install software when a non-administrative user is at the controls.
In a properly configured system, updates will be applied automatically and systems rebooted, on client machines at least - this should be both anti-virus and other patches. Better still, it should be able to report back so the admins know at a glance what may need a closer look. The only real investment in time, if everything is doing this OK, is the additional time spent waiting for PC's to shut down and start up when they get the patches.
Backend stuff may be different and may be patched manually to control how certain things start back up, for example - there is a greater time cost on this
Don't see why, what OS would you use? Open source Linux, where all the source code's on the internet? Write their own (on a Unix-based platform)? I assume you aren't suggesting the NHS hire a massive development team to build some sort of NHS kernel.
I struggle to believe all the computer systems the railways use are connected to each other, so I think it is unlikely everything could go down. For instance I can't see why signalling systems and ticketing systems would rely on each other, presumably they're largely independent?
The national Air Traffic computers are IBM mainframes and (very wisely) do not run MS Windows, hence would not be vulnerable to this particular attack. However any computer can go down in hardware fail situations and NATC has a carefully designed redundancy configuration to prevent on box failing from bringing the whole setup crashing down. Multiple failures can still achieve that since such things cost and the cost must be justified to upper management.
Since Microsoft's licence (if you bother to read it) states clearly that it is not valid for use in safety-critical situations I really am astonished and disgusted to see it used to used so often in critical infrastructure situations. It would seem to be an unorganised conspiracy among those responsible for the setup to stick to something that is guaranteed to require a higher level of support so they have more jobs.
Don't see why, what OS would you use? Open source Linux, where all the source code's on the internet? Write their own (on a Unix-based platform)? I assume you aren't suggesting the NHS hire a massive development team to build some sort of NHS kernel.
Yes, Linux is used worldwide for many things, support is far cheaper and the system is more secure out the box.
Also on the subject of attachments, that's not how this one spreads, it looks for SMB based file shares and goes in that way.
A lot of people have a very simplistic view of what it takes to upgrade the OS in a major business.
I could write an essay on upgrade issues, as could anybody who has worked in IT in a major national business but it all comes down to money. Being out of support simply isn't an arguement, you have to be able to put a positive cost benefit on the upgrade. (I never liked that approach but I was just the poor devil who had to nursemaid the old software).
It is, however, how it initially gets onto the network.Also on the subject of attachments, that's not how this one spreads, it looks for SMB based file shares and goes in that way.
Except MS has had a publicly available end of support policy for as long as I can remember. When you bought your PC with Windows XP on it the EOL date was already known and published. There's no extortion as they told you before you paid your money that you wouldn't be getting open-ended support.Personally I see "ending support for" as a sort of extortion racket: buy our new products or else.
This is all about "defence as design", or whatever they like to call it these days. Basically, security needs to be at the core of all your systems, not just as an afterthought. In fact, this is another reason operating systems SHOULD be upgraded regularly, as people get better at designing security into systems, you simply can't assume you can "slap that into" older systems.
Except MS has had a publicly available end of support policy for as long as I can remember. When you bought your PC with Windows XP on it the EOL date was already known and published. There's no extortion as they told you before you paid your money that you wouldn't be getting open-ended support.
The main risk is someone importing a problem. I read that, as a test, U.S. security loaded a monitoring 'bug' onto a load of USB pen drives which were 'accidentally' lost in and around the parking areas of high security sites - it was notable how many were plugged in to the finder's office computer out of curiosity as to what they might contain.
The main risk is someone importing a problem. I read that, as a test, U.S. security loaded a monitoring 'bug' onto a load of USB pen drives which were 'accidentally' lost in and around the parking areas of high security sites - it was notable how many were plugged in to the finder's office computer out of curiosity as to what they might contain.
If systems are properly patched, the network is properly firewalled and segmented and users are sensible (or restricted from doing dangerous things) then the risk is minimal.This whole thing is something about the digital railway I worry about
That makes me feel so much happier about paying for the Evil Empire's products.