|
Thread Rules 1. This is not a "do my homework for me" thread. If you have specific questions, ask, but don't post an assignment or homework problem and expect an exact solution. 2. No recruiting for your cockamamie projects (you won't replace facebook with 3 dudes you found on the internet and $20) 3. If you can't articulate why a language is bad, don't start slinging shit about it. Just remember that nothing is worse than making CSS IE6 compatible. 4. Use [code] tags to format code blocks. |
Zurich15310 Posts
On August 08 2016 22:10 WhiteDog wrote:Show nested quote +On August 08 2016 21:46 tofucake wrote: Nah, they usually delete the key after a couple days and it's gone forever And without the key, uncrypting the files is impossible, even in two or three years ? Pretty much impossible, yes. You basically would have to wait until quantum computers or something similarly silly are a common thing.
I am afraid you have the option between the 500 bucks and the whiskey.
|
On August 08 2016 22:14 zatic wrote:Show nested quote +On August 08 2016 22:10 WhiteDog wrote:On August 08 2016 21:46 tofucake wrote: Nah, they usually delete the key after a couple days and it's gone forever And without the key, uncrypting the files is impossible, even in two or three years ? Pretty much impossible, yes. You basically would have to wait until quantum computers or something similarly silly are a common thing. I am afraid you have the option between the 500 bucks and the whiskey. I'll buy myself 30€ of marijuana and wash everything up.
|
|
On August 08 2016 22:33 Nesserev wrote: No back-ups?
Rule 1: Always make back-ups. Rule 2: Always make back-ups. ... I have an external hard drive with everything copied on, and various back ups on USBs, but, coincidently, my external hard drive was plugged into my computer and got encrypted too.
My fault anyway, should never have downloaded this shit movie. I was not aware this kind of virus existed too...
|
On August 08 2016 21:44 WhiteDog wrote: I want anybody's advice.
Basically, according to everything I've read, I can't get that data unless I pay the ransom, which is 500 USD (that I don't have). Anybody have some knowledge on the subject and give me his point of view ? It's dead ? Should I keep the datas somewhere ? Or should I format everything, drink some whisky, and accept my idiocy ? Unfortunately, this is correct. Or you could keep it around and wait for quantum computing to catch up, at which point you can probably decrypt it before the heat death of the universe. But with current tech, that's not possible. Cerber seems to be a nasty piece of work without any obvious workarounds, so you are screwed
|
On August 08 2016 20:08 nnn_thekushmountains wrote:Show nested quote +On August 08 2016 17:09 Djagulingu wrote:On August 08 2016 07:02 nnn_thekushmountains wrote: I used express and mongodb to make a single page app. When the page loads, a bunch of information comes from the database through the view (EJS) into static javascript, where it is used. Google maps does some stuff with the information. Every 10 seconds, I am POSTing new information back to the server side to be stored in the database.
Is this bad? From the users end, it looks like the page is constantly loading. Do I need to start using websockets (socket.io)? If you post shit on the UI thread (which you do), user thinks that page is constantly loading. Solution: Use background threads, in other words, workers. https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Using_web_workers This looks like a good solution. The only problem is that my digital ocean $5/month server only has one worker. That has nothing to do with the amount of workers of the digital ocean $5/month droplets. Those worker threads work on the client side, not on your server. The only thing that your server will do is write the lat-long locations whenever it receives an update.
What will happen on your client is: Client will have seperate threads for UI rendering and updating the server and because of this fact, your browser won't think that you are rendering the UI whenever you update the server.
|
On August 08 2016 23:34 Acrofales wrote:Show nested quote +On August 08 2016 21:44 WhiteDog wrote: I want anybody's advice.
Basically, according to everything I've read, I can't get that data unless I pay the ransom, which is 500 USD (that I don't have). Anybody have some knowledge on the subject and give me his point of view ? It's dead ? Should I keep the datas somewhere ? Or should I format everything, drink some whisky, and accept my idiocy ? Unfortunately, this is correct. Or you could keep it around and wait for quantum computing to catch up, at which point you can probably decrypt it before the heat death of the universe. But with current tech, that's not possible. Cerber seems to be a nasty piece of work without any obvious workarounds, so you are screwed  Yeah.
Tho I'm cracking up right now. I figured out most of my files where backed up in another old computer (it's a save from last year but it's pretty complete, I just miss my recent work). But I'm receiving mails from colleagues because cerber encrypted the dropbox.
Seriously I was pissed, now I'm just laughing.
|
On August 09 2016 00:55 WhiteDog wrote:Show nested quote +On August 08 2016 23:34 Acrofales wrote:On August 08 2016 21:44 WhiteDog wrote: I want anybody's advice.
Basically, according to everything I've read, I can't get that data unless I pay the ransom, which is 500 USD (that I don't have). Anybody have some knowledge on the subject and give me his point of view ? It's dead ? Should I keep the datas somewhere ? Or should I format everything, drink some whisky, and accept my idiocy ? Unfortunately, this is correct. Or you could keep it around and wait for quantum computing to catch up, at which point you can probably decrypt it before the heat death of the universe. But with current tech, that's not possible. Cerber seems to be a nasty piece of work without any obvious workarounds, so you are screwed  Yeah. Tho I'm cracking up right now. I figured out most of my files where backed up in another old computer (it's a save from last year but it's pretty complete, I just miss my recent work). But I'm receiving mails from colleagues because cerber encrypted the dropbox. Seriously I was pissed, now I'm just laughing.
I think you can recover old file versions from dropbox, they shouldn't be encrypted as well
edit: not really sure how extensive the dropbox file history is, probably not on the level of git. You can try I guess, just go to the web version -> right click file -> previous versions
|
On August 09 2016 01:15 emperorchampion wrote:Show nested quote +On August 09 2016 00:55 WhiteDog wrote:On August 08 2016 23:34 Acrofales wrote:On August 08 2016 21:44 WhiteDog wrote: I want anybody's advice.
Basically, according to everything I've read, I can't get that data unless I pay the ransom, which is 500 USD (that I don't have). Anybody have some knowledge on the subject and give me his point of view ? It's dead ? Should I keep the datas somewhere ? Or should I format everything, drink some whisky, and accept my idiocy ? Unfortunately, this is correct. Or you could keep it around and wait for quantum computing to catch up, at which point you can probably decrypt it before the heat death of the universe. But with current tech, that's not possible. Cerber seems to be a nasty piece of work without any obvious workarounds, so you are screwed  Yeah. Tho I'm cracking up right now. I figured out most of my files where backed up in another old computer (it's a save from last year but it's pretty complete, I just miss my recent work). But I'm receiving mails from colleagues because cerber encrypted the dropbox. Seriously I was pissed, now I'm just laughing. I think you can recover old file versions from dropbox, they shouldn't be encrypted as well edit: not really sure how extensive the dropbox file history is, probably not on the level of git. You can try I guess, just go to the web version -> right click file -> previous versions It works ! There's tons of files (we're like 20 on this dropbox) to restore tho. Thanks buddy.
|
On August 09 2016 01:29 WhiteDog wrote:Show nested quote +On August 09 2016 01:15 emperorchampion wrote:On August 09 2016 00:55 WhiteDog wrote:On August 08 2016 23:34 Acrofales wrote:On August 08 2016 21:44 WhiteDog wrote: I want anybody's advice.
Basically, according to everything I've read, I can't get that data unless I pay the ransom, which is 500 USD (that I don't have). Anybody have some knowledge on the subject and give me his point of view ? It's dead ? Should I keep the datas somewhere ? Or should I format everything, drink some whisky, and accept my idiocy ? Unfortunately, this is correct. Or you could keep it around and wait for quantum computing to catch up, at which point you can probably decrypt it before the heat death of the universe. But with current tech, that's not possible. Cerber seems to be a nasty piece of work without any obvious workarounds, so you are screwed  Yeah. Tho I'm cracking up right now. I figured out most of my files where backed up in another old computer (it's a save from last year but it's pretty complete, I just miss my recent work). But I'm receiving mails from colleagues because cerber encrypted the dropbox. Seriously I was pissed, now I'm just laughing. I think you can recover old file versions from dropbox, they shouldn't be encrypted as well edit: not really sure how extensive the dropbox file history is, probably not on the level of git. You can try I guess, just go to the web version -> right click file -> previous versions It works ! There's tons of files (we're like 20 on this dropbox) to restore tho. Thanks buddy.
No problem I'm glad to hear it works, this is some scary stuff! Not sure if dropbox has some bulk previous restore function that could help. Make sure to quarantine the infected computer!
|
Also if you were using OneDrive for your other files you can do similar stuff for recovering those as well.
|
Not long ago I saw a guy on twitter who allegedly spoofed a ransomware, manually sending to the bad guy's server a request that said the bitcoins were cashed in, the encryption key came right back. Maybe you can try something like that if you're good at wireshark. x)
|
I restored all the files in the dropbox ... three hours later ... I told to the ransom support that I couldn't pay and they offered me a 20 % discount. So nice, such nice guys really. So now I only need to pay for 400 € approximatly. I answered that I was poor and shit, I had no tooth and all, and that I didn't have even one euro to spare. They will certainly listen their hearts and propose me a bigger discount ....
|
Glad you got most of your stuff back, the rest of it will have to call it a day. Sad though, I hate when I lose files like that... Normally I see ransomware targeted towards companies, since it's $500 for each computer they infect... But Dropbox always saves the day, and I don't typically download movies/music anymore... Also having a Mac helps fight a lot of these viruses/malware off.
|
On August 08 2016 22:33 Nesserev wrote: No back-ups?
Rule 1: Always make back-ups. Rule 2: Always make back-ups.
I guess you messed up the quote a bit. The original version is:
There are 2 types of sysadmin: 1. Those who make back-ups. 2. Those who will make back-ups.
|
On August 09 2016 03:22 WhiteDog wrote: I restored all the files in the dropbox ... three hours later ... I told to the ransom support that I couldn't pay and they offered me a 20 % discount. So nice, such nice guys really. So now I only need to pay for 400 € approximatly. I answered that I was poor and shit, I had no tooth and all, and that I didn't have even one euro to spare. They will certainly listen their hearts and propose me a bigger discount ....
Have a look at this thread, maybe it will help.
https://www.quora.com/How-do-I-remove-cerber-ransomware-virus-and-restore-the-files
|
|
I'll probably be here with a bunch of stupid questions over the coming days. Doing a simple voluntary project in Python and I am still, essentially, useless.
I am trying to read data from a .csv file. The example code creates a csv.reader and then uses the following to iterate over rows:
... spamreader = csv.reader(csvfile, delimiter=' ', quotechar='|') ... for row in spamreader: ... print ', '.join(row)
How can I access rows directly? For example, I want to exclude the first row as it consists of column headers, not actual data. I also want to be able to access individual rows (row 44, for example). Do I need to use this loop to create some dictionary and index them myself, or is there a simpler way? spamreader.row[0] is apparently not a thing.
|
|
On August 09 2016 05:38 bangsholt wrote:Show nested quote +On August 09 2016 03:22 WhiteDog wrote: I restored all the files in the dropbox ... three hours later ... I told to the ransom support that I couldn't pay and they offered me a 20 % discount. So nice, such nice guys really. So now I only need to pay for 400 € approximatly. I answered that I was poor and shit, I had no tooth and all, and that I didn't have even one euro to spare. They will certainly listen their hearts and propose me a bigger discount .... Have a look at this thread, maybe it will help. https://www.quora.com/How-do-I-remove-cerber-ransomware-virus-and-restore-the-files There is actually a decryptor made by Trend Micro that works partially for cerber v1 (which is what I have). I'm running it right now, but if anybody is as dumb as me, or know someone as dumb as me, then you'll know that there is a partial free solution at the moment.
https://success.trendmicro.com/portal_kb_articledetail?solutionid=1114221
Apparently the cerber encryption is flawed at some point, so you can decrypt the files if the program is able able to find the first file that was encrypted. The more microprocessor you have, the less the decryptor is efficient tho, so funnily enough it is easier to decrypt cerber on a shit PC than on a good one.
CERBER decryption must be executed on the infected machine itself (as opposed to another machine) since the tool needs to try and locate the first infected file for a critical decryption calculation.
Due to the method of decryption for CERBER, the tool may take several hours (average is 4) to complete decryption on a standard Intel i5 dual-core machine. In addition, the encryption logic for CERBER also is built in such a way that the more cores a CPU has, the lower percentage chance of success for the decryption because of its complexity.
Similar to some other types of ransomware encryption, some files may be only partially decrypted and may require a subsequent file repair.
|
|
|
|