How to fix the blue screen error. crowdstrike fix

Jul 20, 2024 2:12 AM

MyNameGifOreilly

Views

741117

Likes

2063

Dislikes

30

If you have bitlocker this will not work as you will need a recovery key. Credit to Marty McTech

crowdstrike

computers

helping

the_more_you_know

Or just use a Mac.

1 year ago | Likes 1 Dislikes 0

This guy and his tips are SUPER helpful. Sub+ to his Youtube content.

1 year ago | Likes 3 Dislikes 0

I was hoping he was suggesting to delete windows 64 for being fake

1 year ago | Likes 2 Dislikes 1

It's a weird sensation coming home from work, browsing Imgur, and seeing a video of someone describing exactly the thing you did 50 fucking times at work that day.

1 year ago | Likes 10 Dislikes 0

everyone at Croud Strke should be fired

1 year ago | Likes 5 Dislikes 3

Maybe they should be crowdstriked. Kinda sounds like a bad thing.

1 year ago | Likes 1 Dislikes 0

Idk... i somehow sympathize. Its scary to realise how easy these mistakes are to make for people developing kernel level software

1 year ago | Likes 1 Dislikes 0

Ngl, was expecting the good ol delete system 32.

1 year ago | Likes 2 Dislikes 0

The emails from the IT office forbidding us to turn off our computers was quite funny.

1 year ago | Likes 172 Dislikes 2

"So...if I ACCIDENTALLY turn off my device, I don't have to work today?"

1 year ago | Likes 2 Dislikes 0

Man, i should've thought of that!

1 year ago | Likes 1 Dislikes 0

Can we see the wording on that?

1 year ago | Likes 3 Dislikes 0

Dyou speak any other language?

1 year ago | Likes 3 Dislikes 0

Have you tried not turning it off and on again?

1 year ago | Likes 8 Dislikes 0

Back when I had a desktop computer at work, I had this magnet on it.

1 year ago | Likes 2 Dislikes 0

It probably wouldn't have mattered from what I understand. Mine hung with BSOD by itself in the middle of being used, without me turning it off, then got stuck in a BSOD boot loop. IT dept was able to supply me the bitlocker key about 90 minutes later. I was able to delete the required file and so I only lost about 2hrs to this mess.

1 year ago | Likes 59 Dislikes 1

Our IT put us in a Teams meeting with 800 users on our phones. They asked for our laptop serial numbers and so many people just took pictures of the bottom of their laptop. They didn't even zoom in. Then they bitched about how long it was taking to get the bitlocker keys issued. It was pure chaos.

1 year ago | Likes 4 Dislikes 0

I got the blue message but my computer did start, lucky me!

1 year ago | Likes 9 Dislikes 0

Do yall ALL have auto update on?

1 year ago | Likes 3 Dislikes 0

No idea, I shall enquire with my IT Office.

1 year ago | Likes 3 Dislikes 0

In most corporate scenarios auto update is often enabled, yes. My work laptop routinely tells me "your organisation has scheduled an update and you must reboot by x/y or device will be restarted for you".

1 year ago | Likes 1 Dislikes 0

That's poor oversight. I delay ours a few days until I know the result. I remember xp sp3

1 year ago | Likes 3 Dislikes 0

totally thought he was gona say to delete system32

1 year ago | Likes 5 Dislikes 0

Here I was thinking he was going to suggest deleting the System32 folder.

1 year ago | Likes 10 Dislikes 0

I was expecting a rickroll.

1 year ago | Likes 2 Dislikes 0

Further reason to move to Linux and fuck Windows 11.

1 year ago | Likes 2 Dislikes 1

CrowdStrike is on Linux and Mac too, and they have fucked up both SEVERAL times in the past.

1 year ago | Likes 2 Dislikes 0

Here is how u get around bitlocker. All you need is local admin password https://x.com/LetheForgot/status/1814203140842868797?t=Q-F-FApK033_gSIvIg6CZA&s=19

1 year ago | Likes 2 Dislikes 0

@OP - Yep, we have full disk encryption via BitLocker on all our C: drives to protect against physical theft - made recovery a bit of a chore for us, but we struggled through.

1 year ago | Likes 11 Dislikes 2

Left a 25yr career in IT not long ago. Today is one of those days that reminds me why I left.
Also I had no problems with my computer today. Oh wait…it’s a mac :)

1 year ago | Likes 14 Dislikes 12

Yay you're a special boy!

1 year ago | Likes 10 Dislikes 0

I don't believe you. Mac's in a work environment are horrible.

1 year ago | Likes 2 Dislikes 0

Wow, calling a stranger a lier just because you have formed an opinion. Near 12 years using a Mac in a windows environment. Loved it! Still run Macs at home. If I need Windows (which is almost never)…my Mac will do that too.

1 year ago | Likes 1 Dislikes 0

You must not do much but email.

1 year ago | Likes 1 Dislikes 0

You make a lot of uneducated assumtions

1 year ago | Likes 1 Dislikes 0

Does that mean it's an old Mac?
Asking for some friends that where huge fans until the M1 came and bootcamp went.

1 year ago | Likes 1 Dislikes 0

Don't delete the file, rename it from .sys to .bak, which is generally good advice for messing with system files.

1 year ago | Likes 9 Dislikes 2

It's a third party implementation, not a native dependency.

1 year ago | Likes 8 Dislikes 0

1 year ago | Likes 318 Dislikes 6

1 year ago | Likes 48 Dislikes 0

?

1 year ago | Likes 20 Dislikes 0

Fuck you, Sybase.

1 year ago | Likes 6 Dislikes 0

I feel like I’m missing a reference.

1 year ago | Likes 4 Dislikes 0

1 year ago | Likes 9 Dislikes 0

The "fuck you" comes from how loust their database was. They were the predecessors of Microsoft Sql Server.

1 year ago | Likes 2 Dislikes 0

I guess I just didn’t understand how it related to the golden ratio

1 year ago | Likes 2 Dislikes 0

Oh I know that, I’m midway through migrating reporting systems from Sybase ASE to SQL because my organisation takes decades to do anything. Every time I think we’re about to shit it down, we get told it’s being extended because another vitally important reporting system is running on that system that the project team hasn’t taken into account.

1 year ago | Likes 2 Dislikes 0

I just looked it up and was shocked that: SAP owns Sybase, both ASE and Powerbuilder are getting updates, ASE is getting discontinued next year, and anyone is still using either.

1 year ago | Likes 2 Dislikes 0

You need to have admin privileges. so a common worker has no way of doin that.

1 year ago | Likes 3 Dislikes 0

1 year ago | Likes 3 Dislikes 0

Gently expecting a Skyrim intro there or a Rick Roll.

1 year ago | Likes 2 Dislikes 1

*laugh in linux*

1 year ago | Likes 12 Dislikes 4

CrowdStrike has fucked up both Linux and Mac in the past as well. Actually, more times than Windows.

1 year ago | Likes 6 Dislikes 0

I got news for you. Crowdstrike has Linux software too.

1 year ago | Likes 7 Dislikes 0

I got news for you too, because the news specifically stated Linux and Mac were unaffected

1 year ago | Likes 4 Dislikes 2

Yet. They had a fun moment too in the past. But it's rare for an international company using linux instead of MS on employee PCs.

1 year ago | Likes 3 Dislikes 0

In THIS case. CrowdStrike has fucked up both Linux and Mac in the past as well.

1 year ago | Likes 4 Dislikes 0

me who never updates my PC or PHONE ever unless i Physically have too... because I hate change to something thats not broken

1 year ago | Likes 3 Dislikes 2

You don't have CrowdStrike anyways.

1 year ago | Likes 3 Dislikes 0

That depends on the use of the devices. An unpatched webserver is a bad idea.

1 year ago | Likes 2 Dislikes 0

And that’s how you end up with the countless other showstopping viruses and malware, good job.

1 year ago | Likes 2 Dislikes 1

me after 15 years waiting for a showstopping virus and malware to affect my PC and Phone... i think im good if i dont download dumb stuff

1 year ago | Likes 1 Dislikes 0

Laughs in blaster worm.

1 year ago | Likes 1 Dislikes 0

Our IT dept deputized us remote workers to be junior sys admins ... gave us the stupid long bit key thing and the ridiculous admin password to delete the driver. Unfortunately it worked and i had to go back to being a normal worker for the afternoon.

1 year ago | Likes 17 Dislikes 0

Dang-it

1 year ago | Likes 5 Dislikes 0



Me using Linux

1 year ago | Likes 2 Dislikes 1

CrowdStrike is on Linux and Mac too, and they have fucked up both SEVERAL times in the past.

1 year ago | Likes 1 Dislikes 0

Or if you’re us and only allow admin access to make changes, you have to guide users through the blue screens, ensure they connect an ethernet cable and remote on to delete the file, reboot. What a fuckin mess.

1 year ago | Likes 2 Dislikes 0

Cant do any of this when your company has a tight admin policy and no one can access shit.

1 year ago | Likes 2 Dislikes 0

I just deleted everything from from 7/19 in that folder. 1000x faster then searching for a specific file. Then since Im a sysadmin I deleted it crowdstrike off my computer and put dummy files in their place so it wont reinstall.

1 year ago | Likes 42 Dislikes 6

Yeah... "I deleted CrowdStrike off my computer" sounds exactly like something a sysadmin would do. You should tell your head of IT security what a brilliant idea this is.

1 year ago | Likes 8 Dislikes 2

Ill tell you what, when you are in charge of keeping a manufacturing plant up and running and your computer goes down because an idiot pushed an update that nuked millions of computer across the planet and u have to explain to the planet manager you cant do anything because of said issue, no one cares. They want hte plant running, I dont want my computers broken.

1 year ago | Likes 1 Dislikes 0

Deleting CrowdStrike (or any security software for that matter), instead of temporarily disabling it, is a fucking clown move. It leaves systems unprotected. It doesn't fix the problem any faster, and all those systems will need to be rebooted when they put security software back on, taking the plant down again. Short-term knee-jerk noob behaviour.

1 year ago | Likes 1 Dislikes 0

k

1 year ago | Likes 1 Dislikes 0

I mean a good system admin can find a file in seconds and might notice other things needing maintenance in the process. But hack deleting a day's files is cool too.

1 year ago | Likes 9 Dislikes 1

It won't reinstall anyway, the update was removed and a fix pushed (293*.sys) about 2 hours later.

1 year ago | Likes 7 Dislikes 0

I just deleted the System32 folder entirely.

1 year ago | Likes 13 Dislikes 0

its good to start fresh

1 year ago | Likes 3 Dislikes 0

Your start bar is in the middle you heathen!

1 year ago | Likes 17 Dislikes 4

Mine came like that on my surface pro like... 4 years ago. I didn't know you could move it, but I also don't use the programs on the machine so I never bothered looking into it.

1 year ago | Likes 3 Dislikes 0

Welcome to windows 11

1 year ago | Likes 5 Dislikes 1

That's 84 versions of windows less than my favorite one.

1 year ago | Likes 2 Dislikes 0

You just move it, where it belongs

1 year ago | Likes 3 Dislikes 0

You can change it, first thing I did with my new build earlier this year.

1 year ago | Likes 8 Dislikes 0

Yeah same. Why is Windows trying to be more like Mac now?

1 year ago | Likes 2 Dislikes 0

Now do that on 5,000 servers…

1 year ago | Likes 14 Dislikes 1

The enterprise probably already has PXE boot as the default first option, then local HDD, and the minimal PXE image just doesn't do anything unless you hit the hotkey on boot. So, temporarily replace the central image with one that automatically boots an environment, deletes the file and then reboots itself.

1 year ago | Likes 6 Dislikes 0

I didn't think this error hit servers as most servers run on Linux. The BSODs are hitting workstations/terminals.

1 year ago | Likes 7 Dislikes 0

"Most servers run on Linux" is absolutely true... sometimes. Other organisations run Windows shops and can't think of a reason they'd need a Linux box.

1 year ago | Likes 2 Dislikes 0

I can think of 2 reasons to use Linux... better security and no BSODs. According to W3Techs, Linux holds an 80% market share, while Windows Server accounts for 20%."

1 year ago | Likes 4 Dislikes 0

That's not much of an argument, tbh.
Neither OS is especially insecure when correctly used.
Both are equally capable screeching to a halt when you let Crowdstrike inject broken code into your kernel.

It mostly comes down to your application, as usual. If the program you want runs on Windows, get Windows. If it runs on Linux, get Linux. If it runs on both, get whatever you're already invested in.

1 year ago | Likes 3 Dislikes 1

Can someone tell me what crowdstrike is and what it does?

1 year ago | Likes 93 Dislikes 1

It’s a self destructing form of a company. Self destruct begin at 5-4-3-2-1. Bankcrupt.

1 year ago | Likes 3 Dislikes 0

The one thing I’m really noticing from this is how many customers they have.

1 year ago | Likes 1 Dislikes 0

It’s like a more intense anti-virus that hooks deeper into the system and watches the telemetry for activity related to cyber attacks.

1 year ago | Likes 1 Dislikes 0

Messes up computers real good apparently

1 year ago | Likes 11 Dislikes 1

Its some sort of advanced “endpoint threat detection” - I think it’s sort of like an antivirus, but it looks for suspicious behavior then reports back to a server so a human (working in a SOC) can investigate and figure out what to do about it. A competing product can quarantine computers, kill processes like 10 different ways, do remote forensics, etc.

1 year ago | Likes 1 Dislikes 0

Its called Crowdstrike Falcon if you want to look it up.

1 year ago | Likes 1 Dislikes 0

It's supposed to be a endpoint protection system,(anti-malware/virus) and the driver in question is loaded directly into the windows core. "The only way to beat rootkits is to be a rootkit yourself". This part of the software, since it runs *in* the windows core, has to be more careful about errors and faults, because just "crashing out" kills the whole computer, like we saw. Allegedly, they are one of the best, but today's incident clearly revealed some holes in their processes.

1 year ago | Likes 30 Dislikes 0

Ehh, it showed a hole in one person or one team's process. They weren't meticulous enough in their QA so they released a massive bug into half the internet. Someone's getting fired, but CrowdStrike will be just fine.

1 year ago | Likes 4 Dislikes 5

No its worse than that. They did a direct release to clients which bypassed the normal process. There are staging areas where clients and run new updates to see what the effects are on their systems before installing, a necessity when you cant tolerate a large outage (e.g. banks/planes/hospitals). That they forced this update omto clients computers has lots of implications, all terrible.

1 year ago | Likes 13 Dislikes 0

It stops people from hacking your computer by bricking it.

1 year ago | Likes 28 Dislikes 0

Underrated comment right here.

1 year ago | Likes 3 Dislikes 0

"Endpoint management"

/Corp spyware

1 year ago | Likes 37 Dislikes 6

If you are a regular user of Windows then it's highly likely you will not have crowdstrike software on your machine. This is specialist software for business.

1 year ago | Likes 11 Dislikes 0

Should have re-started my laptop at work... Dang it.

1 year ago | Likes 1 Dislikes 0

If you're familiar with Denuvo copy protection (for video games), it's basically the same thing, but for business devices. If that still means nothing to you, it's basically a cloud & AI-powered virus scanner.

1 year ago | Likes 22 Dislikes 2

From what I know about "the cloud" "AI" and "virus scanners" that makes something like this happening inevitable and only surprising in that it probably should've been worse.

1 year ago | Likes 5 Dislikes 0

It’s a firewall company meant to protect from cyberattacks and viruses. Their last update stuck Microsoft computers in a loop, causing them to crash. Unfortunately some 24k companies use Crowdstrike’s service and every compute at all those companies got the update. Among the affected were airlines, hospitals, banks and payroll companies. The IT outage was a disastrous coding error, nothing malicious.

1 year ago | Likes 162 Dislikes 1

It hit state agencies too.

1 year ago | Likes 6 Dislikes 0

Only computers with the software on them, I've seen a few people saying this affects all windows machines, but that's not the case.

The vast majority of us are on windows machines and have had no problems with our own machines. CrowdStrike doesn't make software built for consumers.

1 year ago | Likes 24 Dislikes 0

there was also a problem that microsoft had that was unrelated. maybe they are conflating the two?

1 year ago | Likes 1 Dislikes 0

I work in retail, half our registers wouldn't work. Just kept restarting.

1 year ago | Likes 3 Dislikes 0

I'm concerned that hospitals were affected. I had urgent blood work, and they got it to work eventually, but then the radiology department came into the lab department and said they couldn't get even one of theirs to work.

1 year ago | Likes 6 Dislikes 0

Ascension Health Care is the 6th largest healthcare system in the US, it owns dozens of hospitals and hundreds of medical facilities. They were hacked a couple months ago and lost all access to their computer network systems for over a month and still aren't fully recovered.

They switched to paper files, charts, and record keeping, they were running essential services in under an hour and full services in under 24, just at reduced capacity.

1 year ago | Likes 4 Dislikes 0

People will have died because of this, and others will have lost millions due to halted business operations. Curious if the software company will be held liable.

1 year ago | Likes 6 Dislikes 0

Hopfully. Possibly. When a company screws over individuals they usually get a slap on the wrist. When a big company screws over other big companies the consequences are much more severe. And they've already started.

The stock has lost like 20% which hurts the CEOs of CS, and Ive seen lots of claims that contracts are being cancelled left and right with CS being uninstalled. So lost revenue. And they violated a bunch of industry standards so lots of people are out for blood.

1 year ago | Likes 3 Dislikes 0

I’m also looking into making a auto run program and putting it on a usb to find file C-00000291*.sys and delete it. So I can help other companies in my area effected by the outage.

1 year ago | Likes 283 Dislikes 10

Make a .ps script and roll it out.would because one or two liner.

1 year ago | Likes 1 Dislikes 1

Yeah, roll it out to machines that cannot boot.

1 year ago | Likes 2 Dislikes 1

Just load into live linux and delete manually, then dump the SAM dB for the keys

1 year ago | Likes 1 Dislikes 0

The right way to fix the problem is to make a bootable usb key with a linux installer.

1 year ago | Likes 2 Dislikes 2

*affected

1 year ago | Likes 8 Dislikes 0

Imagine running CrowdStrike on your machines, but letting a random person off the street plug in an unknown USB device to fix it. 😆

To be clear: it's awesome that you're trying to help. It's just hilarious that anyone would let you.

1 year ago | Likes 3 Dislikes 0

Just delete the file with gpo and be done?

1 year ago | Likes 3 Dislikes 3

Group Policy has a hard time applying when a PC blue screens .5 seconds after it tries to start up the Windows GUI.

1 year ago | Likes 9 Dislikes 0

You'll still have to manually type the bitlocker keys, which any business worth it's salt should run in to. Ah, who am I kidding? Most businesses who would need this help probably don't have bitlocker configured, let alone *properly* configured, or hell, even documented.

1 year ago | Likes 61 Dislikes 3

Yeah this is the actual problem, the fix is relativity easy. But most systems running this software are usually managed and such people wont be able to perform these actions themselves. Cant also just make a generic tool that does it.

1 year ago | Likes 2 Dislikes 0

That bit locket list is prolly an excel file on a server that is in a remote data center with a BSOD🤔

1 year ago | Likes 24 Dislikes 0

No, it's stored on the computer object in active directory and in Intune so support can give the code to the user. You can also enable users to see their own bitlocker code in Azure so the user can see it on mysignins.microsoft.com.

1 year ago | Likes 3 Dislikes 0

[deleted]

[deleted]

1 year ago (deleted Aug 18, 2024 7:13 AM) | Likes 0 Dislikes 0

And it's bitlockered.

1 year ago | Likes 2 Dislikes 0

Sticky note in IT office. Or look for the guy with a penguin blushing. There is one, I guarantee

1 year ago | Likes 1 Dislikes 0

Crowdstrike is just there to tick a corporate checkbox. Your first guess was correct. Most of them will be running bitlocker.

1 year ago | Likes 6 Dislikes 0

There are businesses that document things?

1 year ago | Likes 3 Dislikes 0

A WinPE enviro might work for what you want. Or a Windows setup USB (SHIFT-F10 for command prompt) with a Batch file copied onto it could also work. Both probably wouldn't be fully automated.

1 year ago | Likes 11 Dislikes 0

We ended up building a stripped down PE that automated this and the mbr fix required on some servers. Helped greatly.

1 year ago | Likes 1 Dislikes 0

Or just use a Linux stick and use a real os to fix your fisher price 😋

1 year ago | Likes 2 Dislikes 2

If you have a bitlocker Linux won’t help, you’d have to boot winpe or equivalently , run unlocker with codes, then remove file….

1 year ago | Likes 1 Dislikes 0

Iirc there are bitlocker drivers for Linux. Never bothered to look into it though.

1 year ago | Likes 1 Dislikes 1

Do you think a autorun.inf file with custom code would work? I should I start in PowerShell and work up for there?

1 year ago | Likes 1 Dislikes 0

Honestly haven't dabbled too much w/ either, and been out of IT (as profession) for four years now I wouldn't be a good source for that answer. In my mind the major hurdle will be finding and setting the system drive letter correctly, from a remote environment, in a fully automated fashion.

1 year ago | Likes 3 Dislikes 0

Just include a line in the script that deletes that file from every drive letter. If it doesn't exist, move on.

1 year ago | Likes 2 Dislikes 0

Same Iv been out of the IT game for about adecade. Was trying to find/make a way to load an automated code on to a usb and delete file C-00000291*.sys. This would help people who aren’t tech savvy. I’m running in a lot of path way issues. But thanks for your comment:)

1 year ago | Likes 1 Dislikes 0

At the very least probably gives you a frame work to start with.

1 year ago | Likes 4 Dislikes 0

Sounds like a job for rubber ducky. https://shop.hak5.org/products/usb-rubber-ducky

1 year ago | Likes 1 Dislikes 0

Strikeforce is still causing me problems. I deleted system 32 folder but now nothing works... /s (adding that because I've heard enough IT stories that it would be very possible)

1 year ago | Likes 22 Dislikes 3

i did that once as a kid soemhow tryign to dleete the sims never did get that pc workign again doubly so after a siblign pulle dit appart and put it togtehr again somehow with extra parts

1 year ago | Likes 3 Dislikes 0

Did you try rebooting it?

1 year ago | Likes 1 Dislikes 0

Yep. I deleted everything from c:\ root to make more space for Duke Nukum 2. That's the one BEFORE 3D.

1 year ago | Likes 2 Dislikes 0

I see autocorrect doesn't work.

1 year ago | Likes 1 Dislikes 0

no it sjudst me that doesnt

1 year ago | Likes 1 Dislikes 0

Boot from thst USB, navigate drive and delete the sys file and bobs your uncle. But companies with managed pcs that use bitlocker probably have disabled boot from USB aswell

1 year ago | Likes 5 Dislikes 0

What is a bit locker, I'm not familiar with the term

1 year ago | Likes 1 Dislikes 0

Encryption of a drive. A feature build in to Windows using the TPM chip. On boot the system checks for hardware changes. If it trips it requires a long hexadecimal string to decrypt the harddrive. It's to prevent theft of data by moving drives to another computer and read the contents. In enterprise IT the key is stored on the computer object in active directory.

1 year ago | Likes 2 Dislikes 0

Does this work solely based on the data stored at a hard drive and not bios based like the store pre built computers do where they prevent you from upgrading your computer?

1 year ago | Likes 1 Dislikes 0

I'm not sure I understand the question. If you refer to the thing where Windows will ask for a new registration key if you replace the motherboard or some other major component, it's not the same thing. This key is generated when you encrypt the drive with bitlocker and Windows will print it on the screen so you can put it in a safe location.

1 year ago | Likes 1 Dislikes 0

# Define the directory path where you want to search and delete files $directory = "C:\Path\To\Directory" # Specify the pattern of the files you want to delete $filePattern = "C-00000291*.sys" # Get the list of files that match the pattern $filesToDelete = Get-ChildItem -Path $directory -Filter $filePattern # Loop through each file and delete it foreach ($file in $filesToDelete) { Remove-Item $file.FullName -Force Write-Output "Deleted $($file.FullName)" }

1 year ago | Likes 11 Dislikes 2

Depending on partitioning structure, you may need to programmatically account for the windows partition sometimes showing up as D in a WinPE environment.

1 year ago | Likes 2 Dislikes 0

Could add some if exists, or just be lazy and try to delete on both c and d.

1 year ago | Likes 1 Dislikes 0

Or a bat file that does del "C:\Windows\System32\drivers\CrowdStrike\C-00000291*.sys"

1 year ago | Likes 13 Dislikes 0

I'd recommend using "%windir%\System32\drivers\CrowdStrike\C-00000291*.sys" for the five people in the world that don't have Windows installed to C:\Windows

1 year ago | Likes 8 Dislikes 0

We had a contracted tech install windows onto the storage drive partition. We're still trying to get someone out to reimage it because it's a little embarrassing to have 14tB for a Windows partition and only 250GB for the storage...

1 year ago | Likes 5 Dislikes 0

Reminder not to blindly follow random instructions from a stranger on the internet. If you don’t know what you’re doing and what the impact of doing so, then you should leave it to the people paid to do so for your organization. Perform at your own risk.

1 year ago | Likes 52 Dislikes 2

That's still great advice but in this case the steps in the video are 100% correct. Source: I'm in IT and I was walking end users through these steps all day.

1 year ago | Likes 40 Dislikes 0

Maybe 100% but only a handful will be able to do this, like actually able, the fix is easy, bitlocker is your problem. And bitlocker is on there for a reason, average office worker shouldn’t be messing with those files, how correct these instructions may be

1 year ago | Likes 2 Dislikes 0

Crowdstrike documentation suggests these actions, but yes, very good advice

1 year ago | Likes 3 Dislikes 0

I think their comment also applies to your comment.

1 year ago | Likes 9 Dislikes 0

Ok well maybe people can just search for how to fix it and find the hundreds of articles that all say the same fucking thing, how about that?

1 year ago | Likes 2 Dislikes 1

Yep that would be better for sure!

1 year ago | Likes 2 Dislikes 0

As another guy in IT: It's more important people learn not to blindly trust some tech tutorial they see on social media. So while correct I give the same advice online as @TheOlHaroldHolt

1 year ago | Likes 5 Dislikes 1

As someone who studies Cyber Sec, this. It doesn't matter if this set of instructions are correct. This is one step away from blindly clicking any links in emails, because this one link in that one email was legit. Your organisation has professionals to deal with these kind of issues. Report the issue to them and let them walk you through the fix.

1 year ago | Likes 3 Dislikes 0