Re: unattended-upgrades for baremetal servers on Debian
- To: debian-user@lists.debian.org
- Subject: Re: unattended-upgrades for baremetal servers on Debian
- From: Bigsy Bohr <curtyshoo@gmail.com>
- Date: Thu, 15 Jan 2026 17:31:55 -0000 (UTC)
- Message-id: <[🔎] slrn10mi94b.1p7.curtyshoo@einstein.home.arpa>
- References: <1d65a98e-40fc-4ed9-9746-fe2102fa1e7a@gmail.com> <20251125103940.32dfad91@peregrine.localdomain> <b665f0ee-6f46-46e1-9444-02f8e85f4acd@gmail.com> <CAH8yC8m3+XsSstKxd1Q9bd+ozPJjLmLUyCUi6NhXFgUvz=Cmhw@mail.gmail.com>
On 2025-11-27, Jeffrey Walton <noloader@gmail.com> wrote:
>
> There's nothing special about Microsoft -- it happens to Apple, Unix
> and Linux, too. Malware authors are equal opportunity.
>
> To stop the threat, you patch your machines in a timely manner.
Right, but sadly the human element can be socially engineered in a way
that obviates simple software security.
> You can read more about how to design secure systems in Peter
> Gutmann's book Engineering Security,
><https://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf>. The
> discussion on the Microsoft study was presented in Writing Secure Code
> by Howard and LeBlanc, if I recall correctly.
>
> Jeff
>
>
Reply to: