|
Almost all WannaCry victims were running Windows 7
One week after it first hit, researchers are getting a better handle on how the WannaCry ransomware spread so quickly — and judging from the early figures, the story seems to be almost entirely about Windows 7. According to data released today by Kaspersky Lab, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7, with less than one in a thousand running Windows XP. 2008 R2 Server clients were also hit hard, making up just over 1 percent of infections. https://www.theverge.com/2017/5/19/1...cry-windows-7- version-xp-patched-victim-statistics |
Almost all WannaCry victims were running Windows 7
On Sat, 20 May 2017 11:54:17 +0200 (CEST)
"Anonymous Remailer (austria)" wrote: Organization: dizum.com - The Internet Problem Provider You are not believable. |
Almost all WannaCry victims were running Windows 7
On 05/20/2017 06:37 AM, burfordTjustice wrote:
On Sat, 20 May 2017 11:54:17 +0200 (CEST) "Anonymous Remailer (austria)" wrote: Organization: dizum.com - The Internet Problem Provider You are not believable. The article is posted on The Verge, not written by the OP. "One week after it first hit, researchers are getting a better handle on how the WannaCry ransomware spread so quickly — and judging from the early figures, the story seems to be almost entirely about Windows 7." "According to data released today by Kaspersky Lab, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7, with less than one in a thousand running Windows XP. 2008 R2 Server clients were also hit hard, making up just over 1 percent of infections." https://www.theverge.com/2017/5/19/1...tim-statistics |
Almost all WannaCry victims were running Windows 7
On Sat, 20 May 2017 08:29:47 -0500
Nobody wrote: From: Nobody Subject: Almost all WannaCry victims were running Windows 7 Date: Sat, 20 May 2017 08:29:47 -0500 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101 Icedove/31.7.0 Newsgroups: alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy ,alt.comp.hardware.pc-homebuilt Organization: albasani.net So what? |
Almost all WannaCry victims were running Windows 7
In article burfordTjustice wrote: On Sat, 20 May 2017 11:54:17 +0200 (CEST) "Anonymous Remailer (austria)" wrote: Organization: dizum.com - The Internet Problem Provider You are not believable. Nobody gives a **** about your opinion because it doesn't matter. |
Almost all WannaCry victims were running Windows 7
On Sat, 20 May 2017 21:31:15 +0100 (BST)
Nathan Hale wrote: Booford LOL grade school level..stay in school. |
Almost all WannaCry victims were running Windows 7
In article
burfordTjustice wrote: On Sat, 20 May 2017 08:29:47 -0500 Nobody wrote: From: Nobody Subject: Almost all WannaCry victims were running Windows 7 Date: Sat, 20 May 2017 08:29:47 -0500 User-Agent: Mozilla/5.0 (X11; Linux i686; rv:31.0) Gecko/20100101 Icedove/31.7.0 Newsgroups: alt.privacy.anon-server,alt.windows7.general,comp.os.linux.advocacy ,alt.comp.hardware.pc-homebuilt Organization: albasani.net So what? That's what your mom said when she coughed you out head first on a concrete floor. |
Almost all WannaCry victims were running Windows 7
Ransom ware is mal ware, same ****.
the way this company programmed its malware remover, is that if its not of the op system files, it checks it, and marks it. So its like, say goodbye to malware if your using it... It will locate several of them first time you run it. And it matters not, if you have run malware removers before. And what is amazing, is this thing is only 2mb in size. Would not be caught dead without it... Malware Remover Or many of his other good small softwares that are free. http://www.novirusthanks.org/free-tools/ On 5/20/2017 2:54 AM, Anonymous Remailer (austria) scribbled: One week after it first hit, researchers are getting a better handle on how the WannaCry ransomware spread so quickly — and judging from the early figures, the story seems to be almost entirely about Windows 7. According to data released today by Kaspersky Lab, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7, with less than one in a thousand running Windows XP. 2008 R2 Server clients were also hit hard, making up just over 1 percent of infections. https://www.theverge.com/2017/5/19/1...cry-windows-7- version-xp-patched-victim-statistics |
Almost all WannaCry victims were running Windows 7
tesla sTinker wrote this copyrighted missive and expects royalties:
Ransom ware is mal ware, same ****. the way this company programmed its malware remover, is that if its not of the op system files, it checks it, and marks it. So its like, say goodbye to malware if your using it... It will locate several of them first time you run it. And it matters not, if you have run malware removers before. And what is amazing, is this thing is only 2mb in size. Would not be caught dead without it... Malware Remover Or many of his other good small softwares that are free. http://www.novirusthanks.org/free-tools/ I get my "novirus" at debian.org. -- The Public is merely a multiplied "me." -- Mark Twain |
Almost all WannaCry victims were running Windows 7
In article Chris Ahlstrom wrote: tesla sTinker wrote this copyrighted missive and expects royalties: Ransom ware is mal ware, same ****. the way this company programmed its malware remover, is that if its not of the op system files, it checks it, and marks it. So its like, say goodbye to malware if your using it... It will locate several of them first time you run it. And it matters not, if you have run malware removers before. And what is amazing, is this thing is only 2mb in size. Would not be caught dead without it... Malware Remover Or many of his other good small softwares that are free. http://www.novirusthanks.org/free-tools/ I get my "novirus" at debian.org. Can you P2P stream NFL games on debian? |
All times are GMT +1. The time now is 01:53 AM. |
|
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
HardwareBanter.com