{"id":180352,"date":"2017-05-14T18:09:00","date_gmt":"2017-05-14T23:09:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2017\/05\/14\/we-got-lucky\/"},"modified":"2017-05-14T18:09:00","modified_gmt":"2017-05-14T23:09:00","slug":"we-got-lucky","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2017\/05\/14\/we-got-lucky\/","title":{"rendered":"We\u2026\u2026\u2026  Got \u2026\u2026\u2026 Lucky"},"content":{"rendered":"<p>Here is a very good account of how <a href=\"https:\/\/www.malwaretech.com\/2017\/05\/how-to-accidentally-stop-a-global-cyber-attacks.html\">a techie more or less accidentally found the off switch for this weeks ransomware attack<\/a>.<\/p>\n<p>It&#8217;s not really an accident, though the techie, one &#8220;MalwareTech&#8221;, describes it as such.<\/p>\n<p>Basically, he has a procedure, and a check list of sorts for evaluating this sort of thing.<\/p>\n<p>Because he followed this procedure, he found that the software phoned home to an unregistered domain, and he registered that domain, and its existence functioned as a kill switch.<\/p>\n<p>As I&#8217;ve said before, this is not an accident: this is a byproduct of proper procedures.<\/p>\n<p>Much like a pilot&#8217;s preflight checklist, success is a byproduct of a deliberate process, and not some random stroke of luck.<\/p>\n<p>As Baseballer Branch Ricky pithily noted, &#8220;Luck is a residue of Design.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here is a very good account of how a techie more or less accidentally found the off switch for this weeks ransomware attack. It&#8217;s not really an accident, though the techie, one &#8220;MalwareTech&#8221;, describes it as such. Basically, he has a procedure, and a check list of sorts for evaluating this sort of thing. Because &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[395,435,504,541,382,584],"class_list":["post-180352","post","type-post","status-publish","format-standard","hentry","tag-computer","tag-crimes","tag-philosophy","tag-security","tag-technology","tag-win"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/180352"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=180352"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/180352\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=180352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=180352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=180352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}