Discussion:
10 reasons why should one use linux
(too old to reply)
Leo
2008-10-16 22:30:40 UTC
Permalink
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.

I would like you guys to give it a read, comment, and eventually point
out if i said anything wrong. Here goes the URL:

http://www.leo-sa.com/?p=21

best regards!
Leonardo Sá
Identity
2008-10-16 23:58:05 UTC
Permalink
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.

I don't see post about malware issues posted by posters anymore in the
Vista NG(s).

<http://www.securitypronews.com/news/securitynews/spn-45-20060601ASLRJoinsVistasBagOfTricks.html>

<http://technet.microsoft.com/en-us/magazine/cc162458.aspx>

Address Space Load Randomization

Despite measures like Data Execution Prevention and enhanced compiler
error checking, malware authors continue to find buffer overflow
vulnerabilities that allow them to infect network-facing processes like
Internet Explorer®, Windows services, and third-party applications to
gain a foothold on a system. Once they have managed to infect a process,
however, they must use Windows APIs to accomplish their ultimate goal of
reading user data or establishing a permanent presence by modifying user
or system configuration settings.

Connecting an application with API entry points exported by DLLs is
something usually handled by the operating system loader, but these
types of malware infection don't get the benefit of the loader's
services. This hasn't posed a problem for malware on previous versions
of Windows because for any given Windows release, system executable
images and DLLs always load at the same location, allowing malware to
assume that APIs reside at fixed addresses.

The Windows Vista Address Space Load Randomization (ASLR) feature makes
it impossible for malware to know where APIs are located by loading
system DLLs and executables at a different location every time the
system boots. Early in the boot process, the Memory Manager picks a
random DLL image-load bias from one of 256 64KB-aligned addresses in the
16MB region at the top of the user-mode address space. As DLLs that have
the new dynamic-relocation flag in their image header load into a
process, the Memory Manager packs them into memory starting at the
image-load bias address and working its way down.

Executables that have the flag set get a similar treatment, loading at a
random 64KB-aligned point within 16MB of the base load address stored in
their image header. Further, if a given DLL or executable loads again
after being unloaded by all the processes using it, the Memory Manager
reselects a random location at which to load it. Figure 7 shows an
example address-space layout for a 32-bit Windows Vista system,
including the areas from which ASLR picks the image-load bias and
executable load address.


<http://technet.microsoft.com/en-us/library/cc709691.aspx>


To help prevent malicious software from silently installing and causing
computer-wide infection, Microsoft developed the UAC feature. Unlike
previous versions of Windows, when an administrator logs on to a
computer running Windows Vista, the user’s full administrator access
token is split into two access tokens: a full administrator access token
and a standard user access token. During the logon process,
authorization and access control components that identify an
administrator are removed, resulting in a standard user access token.
The standard user access token is then used to start the desktop, the
Explorer.exe process. Because all applications inherit their access
control data from the initial launch of the desktop, they all run as a
standard user as well.

After an administrator logs on, the full administrator access token is
not invoked until the user attempts to perform an administrative task


<http://news.softpedia.com/news/Admin-Approval-Mode-in-Windows-Vista-45312.shtml>

The admin approval mode in Windows Vista illustrates how the security
features of the operating system have evolved beyond Windows XP. The
administrator approval mode is active by default for all the users that
are members of the local administrator group.

With the introduction of the User Account Control in Windows Vista,
Microsoft has labored to deliver a balance between security via
privilege limitations and functionality. In Windows XP, a standard user
found that the actions they were able to perform were confined to the
point of lost functionality.

This is also one of the reasons why in Windows XP, standard user
accounts are less than popular. In this aspect, the security delivered
by limiting the administrator privileges was traded off for complete
functionality. In Windows Vista, Microsoft has integrated a common
denominator in the UAC settings: the admin approval mode.

"In this mode (which is on by default for all members of the local
administrators group), every user with administrator privileges runs
normally as a standard user; but when an application or the system needs
to do something that requires administrator permissions, the user is
prompted to approve the task explicitly. Unlike the "super user on"
function from UNIX that leaves the process elevated until the user
explicitly turns it off, admin approval mode enables administrator
privileges for just the task that was approved, automatically returning
the user to standard user when the task is completed," explained Jim
Allchin, Microsoft Co-President, Platform and Services Division.

Allchin went on to explain that the functionality is simply a
convenience feature designed for administrators. The admin approval mode
does not create a security boundary between processes. In this context,
in the absence of process isolation, interference is possible.

"If an administrator performs multiple tasks on the same desktop, then
malware may potentially be able to inject or interfere with an elevated
process from a non-elevated process. Thus, the most secure configuration
for Windows Vista is to run processes in two separate accounts, with
only administrator tasks performed using an administrator account and
all other tasks performed under the standard user account," added Allchin.

<http://technet.microsoft.com/en-us/magazine/cc138019.aspx>
<http://technet.microsoft.com/en-us/magazine/cc160882.aspx>
<http://msdn.microsoft.com/en-us/library/aa382503.aspx>

<http://juice.altiris.com/article/2665/folder-virtualization-concepts-windows-vista>

To accommodate existing software for Windows that writes to protected
file directories, Microsoft provides a backward compatibility technology
known as Virtualization. While virtualization enables older applications
to run without programmer intervention, it does not guarantee correct
behaviour, and many applications will need to be updated to comply with
UAC restrictions. Virtualization is often referred to as data
redirection because it functions by funnelling attempted access to
protected locations to new locations stored under user profiles. For
example, if a legacy application attempts to write to the Program Files
directory, UAC silently redirects that operation to an unprotected
user-specific folder.

Virtualization Process

When an application installer attempts to write a file called Entry.txt
in C:\Program Files, it is silently redirected to a Virtual Store
directory located inside the current user's account. To the application,
things proceed as normal, and it has no idea that it is being
redirected. To the user, the application, too, still appears to be
located at the old, expected location. But because the application is
not access system-wide file locations, it cannot be used to harm the
system. And on multi-user systems, each user will have isolated, local
copies of redirected files. When this action is being invoked by a admin
user, the file entry is done in Program Files itself. This is depicted
in the figures below.


<http://msdn.microsoft.com/en-us/library/aa382503.aspx>

Applications should not attempt to modify WRP-protected resources
because these are used by Windows and other applications. If an
application attempts to modify a WRP-protected resource, it can have the
following results.

Application installers that attempt to replace, modify, or delete
critical Windows files or registry keys may fail to install the
application and will receive an error message stating that access to the
resource was denied.

Applications that attempt to add or remove sub-keys or change the values
of protected registry keys may fail and will receive an error message
stating that access to the resource was denied.
Applications that rely on writing any information into protected
registry keys, folders, or files may fail.


<http://msdn.microsoft.com/en-us/library/aa382530(VS.85).aspx>

Permission for full access to modify WRP-protected resources is
restricted to TrustedInstaller. WRP-protected resources can be changed
only using the Supported Resource Replacement Mechanisms with the
Windows Modules Installer service.

WRP protects files with the following extensions that are installed by
Windows Server 2008 or Windows Vista: .dll, .exe, .ocx, and .sys.

WRP protects critical files that are installed by Windows Server 2008 or
Windows Vista with the following extensions: .acm, .ade, .adp, .app,
.asa, .asp, .aspx, .ax, .bas, .bat, .bin, .cer, .chm, .clb, .cmd, .cnt,
.cnv, .com, .cpl, .cpx, .crt, .csh, .dll, .drv, .dtd, .exe, .fxp, .grp,
.h1s, .hlp, .hta, .ime, .inf, .ins, .isp, .its, .js, .jse, .ksh, .lnk,
.mad, .maf, .mag, .mam, .man, .maq, .mar, .mas, .mat, .mau, .mav, .maw,
.mda, .mdb, .mde, .mdt, .mdw, .mdz, .msc, .msi, .msp, .mst, .mui, .nls,
.ocx, .ops, .pal, .pcd, .pif, .prf, .prg, .pst, .reg, .scf, .scr, .sct,
.shb, .shs, .sys, .tlb, .tsp, .url, .vb, .vbe, .vbs, .vsmacros, .vss,
.vst, .vsw, .ws, .wsc, .wsf, .wsh, .xsd, and .xsl.

WRP protects critical folders. A folder containing only WRP-protected
files may be locked so that only the Windows trusted installer is able
to create files or subfolders in the folder. A folder may be partially
locked to enable Administrators to create files and subfolders in the
folder.

<http://blogs.msdn.com/e7/archive/2008/10/08/user-account-control.aspx>

User Account Control (UAC) is, arguably, one of the most controversial
features in Windows Vista. Why did Microsoft add all those popups to
Windows? Does it actually improve security? Doesn’t everyone just click
“continue”? Has anyone in Redmond heard the feedback on users and
reviewers? Has anyone seen a tv commercial about this feature?

In the course of working on Windows 7 we have taken a hard look at UAC –
examining customer feedback, volumes of data, the software ecosystem,
and Windows itself. Let’s start by looking at why UAC came to be and our
approach in Vista.

And finally, last week's attack report, but hey, nothing is bullet proof.

http://www.zone-h.com/
Richard Rasker
2008-10-17 09:05:22 UTC
Permalink
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
when it comes to proper security:

http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm

"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."

Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...

Richard Rasker
--
http://www.linetec.nl
Phil Da Lick!
2008-10-17 09:06:52 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm
"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."
Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...
Richard Rasker
lol.
William Poaster
2008-10-17 11:13:12 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm
"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."
Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...
Richard Rasker
lol.
References: includes earthlink.com. "Identity" - Duh Inane Arnold again...
--
Did you know?
Hardon Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.
Identity
2008-10-17 11:49:47 UTC
Permalink
Post by William Poaster
Post by Richard Rasker
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm
"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."
Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...
Richard Rasker
lol.
References: includes earthlink.com. "Identity" - Duh Inane Arnold again...
He can't stop me.
Identity
2008-10-17 11:48:57 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm
"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."
Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...
Richard Rasker
lol.
I don't see too many posts about malware issues in the Vista NG(s).
Identity
2008-10-17 11:47:44 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
Here you moron, because you don't know jack about Vista.
Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm
"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."
Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...
Richard Rasker
But hey, I don't see too many posts about malware issues in the Vista NG(s).
High Plains Thumper
2008-10-17 12:47:37 UTC
Permalink
Post by Identity
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu
linux. I decided to write that to stand out points where
linux takes advantage on windows in real life.
I would like you guys to give it a read, comment, and
eventually point out if i said anything wrong. Here goes the
Here you moron, because you don't know jack about Vista.
This is an example of:

http://www.hyphenologist.co.uk/killfile/anti_troll_faq.htm

[quote] Subject: 3.4 The nasty Troll

If anyone does anything which will interfere with the troll's
ability to cause mayhem, they can become very nasty, posting from
obviously incorrect variations of the name etc. insults, call
them netcops, netnannies, homosexuals. [/quote]

also

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics [...]

[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]
Post by Identity
I don't see post about malware issues posted by posters
anymore in the Vista NG(s).
<http://www.securitypronews.com/news/securitynews/spn-45-20060601ASLRJoinsVistasBagOfTricks.html>
<http://technet.microsoft.com/en-us/magazine/cc162458.aspx>
Address Space Load Randomization
<SNIP>
Post by Identity
The Windows Vista Address Space Load Randomization (ASLR)
feature makes it impossible for malware to know where APIs are
located by loading system DLLs and executables at a different
location every time the system boots. Early in the boot
process, the Memory Manager picks a random DLL image-load bias
from one of 256 64KB-aligned addresses in the 16MB region at
the top of the user-mode address space. As DLLs that have the
new dynamic-relocation flag in their image header load into a
process, the Memory Manager packs them into memory starting
at the image-load bias address and working its way down.
Oh, yeah ....

http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1

[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10

It looks as if Vista's reputation for improved security could be
heading for the pages of history. PC Tools has renewed last
week's attack on the platform with new figures that appear to
back up its claim that Vista is almost as vulnerable as its
predecessors.

According to analysis from the Australian company's ThreatFire
user base, 58,000 PCs running Vista were compromised by at least
one piece of malware over the six months to May 2008, equivalent
to 27 percent of all Vista machines probed. Vista made up 12.6
percent, or 190,692, of the 1,513,502 machines running Windows in
the user base.

In total, Vista suffered 121,380 instances of malware from its
190,000 user base, a rate of malware detection per system is
proportionally lower than that of XP, which saw 1,319,144 malware
infections from a user base of 1,297,828 machines, but it
indicates a problem that is worse than Microsoft has been
admitting to.
[/quote]

Oh yeah. OTOH:

http://www.theregister.co.uk/2008/03/29/ubuntu_left_standing/

[quote]
Only Ubuntu left standing, as Flash vuln fells Vista in Pwn2Own
hacking contest

Contestant overcomes bout of 'hacktile dysfunction'
By Dan Goodin in Vancouver → More by this author
Published Saturday 29th March 2008 21:27 GMT

CanSecWest A laptop running a fully patched version of
Microsoft's Vista operating system was the second and final
machine to fall in a hacking contest that pitted the security of
Windows, OS X and Ubuntu Linux. With both a Windows and Mac
machine felled, only the Linux box remained standing following
the three-day competition.
[/quote]

OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Identity
2008-10-17 13:02:29 UTC
Permalink
Post by High Plains Thumper
[quote]
Only Ubuntu left standing, as Flash vuln fells Vista in Pwn2Own
hacking contest
OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
But in the mean time Linux is being hammered.

http://www.zone-h.com/

If the server platform is being hammered what makes you think that the
workstation versions are going to be any better in the wrong hands?

What it really comes down to is who is sitting behind the wheel and is
doing the driving.

What? You're an x Windows user that crossed over to Linux and you are a
guru's guru, right?
High Plains Thumper
2008-10-17 23:46:05 UTC
Permalink
Post by Identity
[quote] Only Ubuntu left standing, as Flash vuln fells Vista
in Pwn2Own hacking contest
OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
But in the mean time Linux is being hammered.
http://www.zone-h.com/
If the server platform is being hammered what makes you think
that the workstation versions are going to be any better in
the wrong hands?
A site located on a neutral country, Switzerland, with stats
populated by rogue hackers, with most of the hacked sites hardly
anyone has ever heard of. Hmmmm ..... It would be different if
there were at least two or three other sites with similar
statistics, to confirm.

However, if we truly believe the results, then I would have to
say that Linux has a much greater presence than the trolls would
like to admit.

Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords, no
passwords, failure to apply security patches in a timely manner,
failure to secure unused ports, admittance of administrative
rights to those who have no need for it only invite trouble. It
makes no difference what the operating system is, if one leaves
the back door open, key under the doormat or with untrustworthy
neighbors.
Post by Identity
What it really comes down to is who is sitting behind the
wheel and is doing the driving.
What? You're an x Windows user that crossed over to Linux and
you are a guru's guru, right?
No, I came out of the CP/M era, early graphic systems, 32 bit
minicomputers and small embedded systems.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Chris Ahlstrom
2008-10-18 00:08:22 UTC
Permalink
After takin' a swig o' grog, High Plains Thumper belched out
Post by High Plains Thumper
Post by Identity
http://www.zone-h.com/
A site located on a neutral country, Switzerland, with stats
populated by rogue hackers, with most of the hacked sites hardly
anyone has ever heard of. Hmmmm ..... It would be different if
there were at least two or three other sites with similar
statistics, to confirm.
It's a bragging-rights site, as far as I can tell.
Post by High Plains Thumper
However, if we truly believe the results, then I would have to
say that Linux has a much greater presence than the trolls would
like to admit.
Did I mention yet that The Bee, Mr. Identity Theft, is a feckless moron?
--
If your life was a horse, you'd have to shoot it.
Linux Pimps
2008-10-18 01:12:33 UTC
Permalink
Post by Chris Ahlstrom
Did I mention yet that The Bee, Mr. Identity Theft, is a feckless moron?
Do you really think that I give a shit? Do you really think that you
Linux-Pimp?
Hadron
2008-10-18 00:36:54 UTC
Permalink
Post by Identity
[quote] Only Ubuntu left standing, as Flash vuln fells Vista
in Pwn2Own hacking contest
OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
But in the mean time Linux is being hammered.
http://www.zone-h.com/
If the server platform is being hammered what makes you think
that the workstation versions are going to be any better in
the wrong hands?
A site located on a neutral country, Switzerland, with stats populated
by rogue hackers, with most of the hacked sites hardly anyone has ever
heard of. Hmmmm ..... It would be different if there were at least
two or three other sites with similar statistics, to confirm.
However, if we truly believe the results, then I would have to say
that Linux has a much greater presence than the trolls would like to
admit.
Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords, no
passwords, failure to apply security patches in a timely manner,
failure to secure unused ports, admittance of administrative rights to
those who have no need for it only invite trouble. It makes no
difference what the operating system is, if one leaves the back door
open, key under the doormat or with untrustworthy neighbors.
Exactly. And Social Engineering. The things I highlighted as points of
attack ages ago e.g sudo embedded in bash script in HOWTO code etc. You
and your chums informed me I was a Windiot and didn't have a
clue. Finally I am proven right and you come grovelling back. What a
surprise.

Google "comp.os.linux.advocacy social engineering hadron quark" if you
do not believe me.
Post by Identity
What it really comes down to is who is sitting behind the
wheel and is doing the driving.
What? You're an x Windows user that crossed over to Linux and
you are a guru's guru, right?
No, I came out of the CP/M era, early graphic systems, 32 bit
minicomputers and small embedded systems.
And after Windows appeared and CP/M and Minicomputers vanished?
--
"Poor fishfarb! Pissed because s/h/it doesn't get all the attention s/h/it craves due to wise use of filtering."
-- Sinister Midget <***@gmail.com> trying to impress Willy Filters in comp.os.linux.advocacy
High Plains Thumper
2008-10-18 06:12:37 UTC
Permalink
Post by Hadron
Post by High Plains Thumper
Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords,
no passwords, failure to apply security patches in a timely
manner, failure to secure unused ports, admittance of
administrative rights to those who have no need for it only
invite trouble. It makes no difference what the operating
system is, if one leaves the back door open, key under the
doormat or with untrustworthy neighbors.
Exactly. And Social Engineering. The things I highlighted as
points of attack ages ago e.g sudo embedded in bash script in
HOWTO code etc. You and your chums informed me I was a Windiot
and didn't have a clue. Finally I am proven right and you come
grovelling back. What a surprise.
Prove what? Do you know what sudo is? I do not recall any
discussions between you and me on bash scripting.
Post by Hadron
Google "comp.os.linux.advocacy social engineering hadron
quark" if you do not believe me.
Be more specific. Comes up with this thread and discussion, then
the usual Hadron rant towards Kohlmann.
Post by Hadron
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
And after Windows appeared and CP/M and Minicomputers
vanished?
Read your history.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
William Poaster
2008-10-18 09:35:18 UTC
Permalink
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords,
no passwords, failure to apply security patches in a timely
manner, failure to secure unused ports, admittance of
administrative rights to those who have no need for it only
invite trouble. It makes no difference what the operating
system is, if one leaves the back door open, key under the
doormat or with untrustworthy neighbors.
Exactly. And Social Engineering. The things I highlighted as
points of attack ages ago e.g sudo embedded in bash script in
HOWTO code etc. You and your chums informed me I was a Windiot
and didn't have a clue. Finally I am proven right and you come
grovelling back. What a surprise.
Prove what? Do you know what sudo is? I do not recall any
discussions between you and me on bash scripting.
The Quack troll making things up again is it. Not unusual.
Post by High Plains Thumper
Post by Hadron
Google "comp.os.linux.advocacy social engineering hadron
quark" if you do not believe me.
Be more specific. Comes up with this thread and discussion, then
the usual Hadron rant towards Kohlmann.
Quack, ranting? What a surprise...
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
And after Windows appeared and CP/M and Minicomputers
vanished?
Read your history.
--
Did you know?
Hadron Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.
Chris Ahlstrom
2008-10-18 10:23:15 UTC
Permalink
After takin' a swig o' grog, High Plains Thumper belched out
Another sleepless night in the Procrustean bed?
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords,
no passwords, failure to apply security patches in a timely
manner, failure to secure unused ports, admittance of
administrative rights to those who have no need for it only
invite trouble. It makes no difference what the operating
system is, if one leaves the back door open, key under the
doormat or with untrustworthy neighbors.
Exactly. And Social Engineering. The things I highlighted as
points of attack ages ago e.g sudo embedded in bash script in
HOWTO code etc. You and your chums informed me I was a Windiot
and didn't have a clue. Finally I am proven right and you come
grovelling back. What a surprise.
Pretty pompous and arrogant for a guy who apparently /still/ thinks
that "sudo embedded in a bash script in HOWTO code" is an automatic
way into anything.
Post by High Plains Thumper
Post by Hadron
Finally I am proven right and you come
grovelling back.
*LMAO*
Post by High Plains Thumper
Prove what? Do you know what sudo is? I do not recall any
discussions between you and me on bash scripting.
Post by Hadron
Google "comp.os.linux.advocacy social engineering hadron
quark" if you do not believe me.
Be more specific. Comes up with this thread and discussion, then
the usual Hadron rant towards Kohlmann.
You can watch Hadron "they are hacked on a routine basis" Quark
both brag about stating obvious stuff and show off
his mistaken notions about sudo here:

http://help.lockergnome.com/linux/Simple-Windowsftopic-274113-days0-orderasc-20.html

Jim Richardson, Bob Hauck, and Richard Rasker systematically
dismantle Hadron's "argument".
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
And after Windows appeared and CP/M and Minicomputers
vanished?
Read your history.
You forget. Hadron can't read (with comprehension, that is.)
--
If a thing's worth having, it's worth cheating for.
-- W. C. Fields
Hadron
2008-10-18 13:07:58 UTC
Permalink
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords,
no passwords, failure to apply security patches in a timely
manner, failure to secure unused ports, admittance of
administrative rights to those who have no need for it only
invite trouble. It makes no difference what the operating
system is, if one leaves the back door open, key under the
doormat or with untrustworthy neighbors.
Exactly. And Social Engineering. The things I highlighted as
points of attack ages ago e.g sudo embedded in bash script in
HOWTO code etc. You and your chums informed me I was a Windiot
and didn't have a clue. Finally I am proven right and you come
grovelling back. What a surprise.
Prove what? Do you know what sudo is? I do not recall any
discussions between you and me on bash scripting.
Erm, yes I do know what sudo is. And it is of paramount importance to
the point I made above. If you do no understand that (and I think you do
understand it) then ask and I will explain.
Post by High Plains Thumper
Post by Hadron
Google "comp.os.linux.advocacy social engineering hadron
quark" if you do not believe me.
Be more specific. Comes up with this thread and discussion, then the
usual Hadron rant towards Kohlmann.
"you" == "COLA".
Post by High Plains Thumper
Post by Hadron
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
And after Windows appeared and CP/M and Minicomputers
vanished?
Read your history.
I dont need too. One of my first programs was in Z80 on an RML 380Z
machine. Something to filter data for a school physics
experiment. Trivial stuff but exciting at the time. CP/M was nothing
special. And all the halcyon memories dont really change that. For the
time wonderful. Compared to now? Hell, emacs probably has an emulator for
it ....

The question stands. Are you really trying to tell us you had a gaping
void in your career post mid 90s?

Minicomputers were dumped quicker than Shares in Enron from the end of
the 80s. The CPM machines were used as gym vaults in school sporting
events.
--
"His asshole is so reamed out he has room for an oxygen
tank, too."
-- Tattoo Vampire loooking for new accomodation in comp.os.linux.advocacy
Linux Pimps
2008-10-18 01:08:29 UTC
Permalink
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32 bit
minicomputers and small embedded systems.
I don't believe you. You're not believable.
High Plains Thumper
2008-10-18 06:16:02 UTC
Permalink
Post by Linux Pimps
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
I don't believe you. You're not believable.
Who cares what you think? I certainly don't.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Linux Pimps
2008-10-18 08:47:06 UTC
Permalink
Post by High Plains Thumper
Post by Linux Pimps
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
I don't believe you. You're not believable.
Who cares what you think? I certainly don't.
You can take CP/M, all the rest your crap and embedded all up your ass
for all I care as to what you have done. You should make sure you grease
first, High Linux-Pimp Grand Poobah.
Hadron
2008-10-18 13:09:16 UTC
Permalink
Post by High Plains Thumper
Post by Linux Pimps
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems, 32
bit minicomputers and small embedded systems.
I don't believe you. You're not believable.
Who cares what you think? I certainly don't.
The fact that you replied belies it's content.
--
"Off the top of my head, I can't tell you which sites. They are ones that
throw up some kind of dialog, I change the user agent and look at them
again, then move on."
-- Rick <***@nomail.com> telling lies in comp.os.linux.advocacy
High Plains Thumper
2008-10-18 14:48:58 UTC
Permalink
Post by High Plains Thumper
Post by Linux Pimps
Post by High Plains Thumper
No, I came out of the CP/M era, early graphic systems,
32 bit minicomputers and small embedded systems.
I don't believe you. You're not believable.
Who cares what you think? I certainly don't.
The fact that you replied belies it's content.
The fact you replied belies your intent to troll.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Richard Rasker
2008-10-17 13:31:30 UTC
Permalink
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.

Richard Rasker
--
http://www.linetec.nl
Identity
2008-10-17 13:35:30 UTC
Permalink
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
Phil Da Lick!
2008-10-17 13:37:14 UTC
Permalink
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
Thats because you're lying or stupid.
Identity
2008-10-17 13:43:27 UTC
Permalink
Post by Phil Da Lick!
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
Thats because you're lying or stupid.
What about you? You're no bed of roses that I have seen, make believe IT
director at a printing press.
DFS
2008-10-17 14:07:07 UTC
Permalink
Post by Identity
Post by Phil Da Lick!
Thats because you're lying or stupid.
What about you? You're no bed of roses that I have seen, make believe
IT director at a printing press.
Don't talk about Hyp Da Crite! like that. He knows how to click a Windows
button and send a job to the printer.
Identity
2008-10-17 14:15:13 UTC
Permalink
Post by DFS
Post by Identity
Post by Phil Da Lick!
Thats because you're lying or stupid.
What about you? You're no bed of roses that I have seen, make believe
IT director at a printing press.
Don't talk about Hyp Da Crite! like that. He knows how to click a Windows
button and send a job to the printer.
LOL

Yes, I know. His company mission critical spreadsheet payroll, other
games, tools, water dispenser and auto flushing toilets are powered by
the big *L*. That way, there is a less chance of the big *L* being
hacked as an office facing solution.
DFS
2008-10-17 14:23:18 UTC
Permalink
Post by Identity
Post by DFS
Post by Identity
Post by Phil Da Lick!
Thats because you're lying or stupid.
What about you? You're no bed of roses that I have seen, make
believe IT director at a printing press.
Don't talk about Hyp Da Crite! like that. He knows how to click a
Windows button and send a job to the printer.
LOL
Yes, I know. His company mission critical spreadsheet payroll, other
games, tools, water dispenser and auto flushing toilets
ha!

Linux knows how to deal with shit... just merge it into the Ubuntu and
Debian "stable" repositories.


Debian Etch: "I installed debian etch. Ran fine for a while, then the same
freezing problem."
#148 at http://ubuntuforums.org/showthread.php?t=412125&page=15
Sinister Midget
2008-10-17 14:35:47 UTC
Permalink
Post by Phil Da Lick!
Post by Identity
I don't believe you.
Thats because you're lying or stupid.
Does he really have to choose?
--
Microsoft is not the answer. Microsoft is the question.
The answer is NO!
Identity
2008-10-17 15:15:16 UTC
Permalink
Post by Sinister Midget
Post by Phil Da Lick!
Post by Identity
I don't believe you.
Thats because you're lying or stupid.
Does he really have to choose?
The littlest ass-hold strikes again,
Richard Rasker
2008-10-17 13:53:05 UTC
Permalink
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya go:

http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html


Richard Rasker
--
http://www.linetec.nl
Identity
2008-10-17 14:04:30 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Oh I forgot, you're just another ass-hole. And I own and have used Suse
Linux.

I think I have supplied some links in the NG. I doubt that you have read
them. So guess what I am not going to do?

And you can take it anyway you like.
Chris Ahlstrom
2008-10-17 15:05:02 UTC
Permalink
After takin' a swig o' grog, Richard Rasker belched out
Post by Richard Rasker
Post by Identity
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Nah, Richard, that page dates back to 2006, which is so old that
Microsoft has scrubbed the data:

http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc

The page cannot be found
The page you are looking for might have been removed, had its name
changed, or is temporarily unavailable.
--
Real computer scientists don't write code. They occasionally tinker with
`programming systems', but those are so high level that they hardly count
(and rarely count accurately; precision is for applications).
Richard Rasker
2008-10-17 16:04:08 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Identity
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Chris Ahlstrom
Nah, Richard, that page dates back to 2006, which is so old that
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
Post by Chris Ahlstrom
The page cannot be found
The page you are looking for might have been removed, had its name
changed, or is temporarily unavailable.
Strange, it opens just fine here. But it was more of a tease-the-troll
excercise -- of course Microsoft will never say that 60% of their machines
is infected; here's the text:

"Microsoft today gave the world a rare -- albeit conservative -- glimpse of
its view on just how bad the virus and bot problem has gotten for Windows
users worldwide. The data comes from 15 months' worth of experience
scanning computers with its "malicious-software removal tool," a free
component that Microsoft offers Windows XP, Windows 2000 and Windows
Server 2003 users when they download security updates from Microsoft.

The tool has been run approximately 2.7 billion times by at least 270
million unique computers, leading to the removal of 16 million instances
of malicious software from 5.7 million unique Windows-based computers over
the past 15 months, Microsoft said. Sixty-two percent of those computers
had Trojan horse programs on them. "

So according to these figures, only two percent of computers were found to
be infected with malicious software. If this shows one thing, it's that
Microsoft can't build anti-malware worth a damn.

Here's a more realistic figure from a few years back:

http://blogs.zdnet.com/Spyware/?p=848

"During the second quarter of 2006, Webroot researchers found that 89
percent of consumer PCs were infected with an average of 30 pieces of
spyware"

Woops.

Richard Rasker
--
http://www.linetec.nl
Chris Ahlstrom
2008-10-17 16:08:42 UTC
Permalink
After takin' a swig o' grog, Richard Rasker belched out
Post by Richard Rasker
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Identity
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Chris Ahlstrom
Nah, Richard, that page dates back to 2006, which is so old that
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
Strange, it opens just fine here.
I can't even wget it.
Post by Richard Rasker
The tool has been run approximately 2.7 billion times by at least 270
million unique computers, leading to the removal of 16 million instances
of malicious software from 5.7 million unique Windows-based computers over
the past 15 months, Microsoft said. Sixty-two percent of those computers
had Trojan horse programs on them. "
So according to these figures, only two percent of computers were found to
be infected with malicious software.
I don't get it. The paragraph you quote seems to present two
mutually-exclusive conclusions.
Post by Richard Rasker
http://blogs.zdnet.com/Spyware/?p=848
"During the second quarter of 2006, Webroot researchers found that 89
percent of consumer PCs were infected with an average of 30 pieces of
spyware"
Woops.
Woops:
--
By failing to prepare, you are preparing to fail.
Sinister Midget
2008-10-17 17:02:08 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Richard Rasker
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Identity
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Chris Ahlstrom
Nah, Richard, that page dates back to 2006, which is so old that
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
Strange, it opens just fine here.
I can't even wget it.
It's gettable here, too.
--
Ever noticed how fast Windows runs?
Me neither.
Richard Rasker
2008-10-17 19:20:38 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Richard Rasker
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Identity
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Chris Ahlstrom
Post by Richard Rasker
Post by Chris Ahlstrom
Nah, Richard, that page dates back to 2006, which is so old that
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
Post by Chris Ahlstrom
Post by Richard Rasker
Strange, it opens just fine here.
I can't even wget it.
Perhaps there's a problem with the DNS server(s) of your ISP -- the only way
I can think of to find out more is to have wireshark sniff and log your
ethernet packets while you give a 'dig blog.washingtonpost.com' command.
Post by Chris Ahlstrom
Post by Richard Rasker
The tool has been run approximately 2.7 billion times by at least 270
million unique computers, leading to the removal of 16 million
instances of malicious software from 5.7 million unique Windows-based
computers over the past 15 months, Microsoft said. Sixty-two percent of
those computers had Trojan horse programs on them. "
So according to these figures, only two percent of computers were found
to be infected with malicious software.
I don't get it. The paragraph you quote seems to present two
mutually-exclusive conclusions.
Nah, it's just a bit confusing, what with percentages and absolute numbers
mixed up -- that's why I hoped the troll would bite.
What they apparently mean is this: Microsoft's crappy "malicious-software
removal tool" was run on 270 million computers, finding malware on 5.7
million of those; and 62% of those 5.7 million infections (i.e. some 3.5
million) were cases of Trojan Horses.

Richard Rasker
--
http://www.linetec.nl
Identity
2008-10-18 00:27:16 UTC
Permalink
Post by Richard Rasker
Nah, it's just a bit confusing, what with percentages and absolute numbers
mixed up -- that's why I hoped the troll would bite.
What they apparently mean is this: Microsoft's crappy "malicious-software
removal tool" was run on 270 million computers, finding malware on 5.7
million of those; and 62% of those 5.7 million infections (i.e. some 3.5
million) were cases of Trojan Horses.
You're just another ass-hole Linux-pimp tossing out dime a dozen
Amityville.Linux.Advocacy statistics.

They are fixed statistics I tell you fixed, and I don't believe them. Is
that not the usual Linux-pimp MO for this chicken-shit NG? :)

And you have still have not convinced anyone that Linux has not been or
is not being attacked in the wild, Linux-pimp.

This crap NG and you Linux-pimp *clowns* in it do need to take this
chicken-shit Amityville circus and vaudeville show/act on the road.
DFS
2008-10-18 03:28:47 UTC
Permalink
Post by Richard Rasker
What they apparently mean is this: Microsoft's crappy
"malicious-software removal tool" was run on 270 million computers,
finding malware on 5.7 million of those; and 62% of those 5.7 million
infections (i.e. some 3.5 million) were cases of Trojan Horses.
Of course you mean it's "crappy" because it doesn't reinforce the stupid
lies you lying cola lusers have been blabbing for years - that 50% of
Windows systems are infected.

Turns out the MSRT found malware on just 2.1% of the 270 million systems it
was applied to.

So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and cola the
finger).


btw: here's my just-completed MSRT quick scan:
Loading Image...
Linux Pimps
2008-10-18 05:37:21 UTC
Permalink
Post by DFS
Post by Richard Rasker
What they apparently mean is this: Microsoft's crappy
"malicious-software removal tool" was run on 270 million computers,
finding malware on 5.7 million of those; and 62% of those 5.7 million
infections (i.e. some 3.5 million) were cases of Trojan Horses.
Of course you mean it's "crappy" because it doesn't reinforce the stupid
lies you lying cola lusers have been blabbing for years - that 50% of
Windows systems are infected.
Turns out the MSRT found malware on just 2.1% of the 270 million systems it
was applied to.
So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and cola the
finger).
http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG
I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
far as I could toss a building somewhere.

All these Linux-Pimps, fools and clowns are playing themselves, playing
each other and have pimped themselves into some kind of a belief.

I would say the 3/4 of the crap that's being spewed in this NG, hell,
they can't even believe it themselves, but they have got to back each
other up. :-P

The list is long of those that are the Linux-Pimps.
Hadron
2008-10-18 12:57:26 UTC
Permalink
Post by Linux Pimps
Post by DFS
Post by Richard Rasker
What they apparently mean is this: Microsoft's crappy
"malicious-software removal tool" was run on 270 million computers,
finding malware on 5.7 million of those; and 62% of those 5.7 million
infections (i.e. some 3.5 million) were cases of Trojan Horses.
Of course you mean it's "crappy" because it doesn't reinforce the
stupid lies you lying cola lusers have been blabbing for years -
that 50% of Windows systems are infected.
Turns out the MSRT found malware on just 2.1% of the 270 million
systems it was applied to.
So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and
cola the finger).
http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG
I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
far as I could toss a building somewhere.
Rasker has proved himself totally and utterly incompetent when it comes
to ANY form of statistical analysis. Using flawed numbers he applies
flawed algorithms to reach, well, a flawed result.

His inability to even go to Amazon, click on computers, then laptops
then "best selling" was a lesson to all involved at how little he should
be trusted. That combined with all the stories of foul mouthed women on
trains, friends with sons who are amazed at Linux and how he has
revitalised 3rd world PCs, which look like they were extras in
Waterworld, suggests that little, if anything, he posts can be trusted.
--
"Opening slide in movie: - Why Linux Sucks (4 Reasons) [no need to further explain, move along ....]"
-- High Plains Thumper <***@invalid.invalid.com> in comp.os.linux.advocacy
Linux Pimps
2008-10-18 14:36:08 UTC
Permalink
Post by Hadron
Post by Linux Pimps
Post by DFS
Post by Richard Rasker
What they apparently mean is this: Microsoft's crappy
"malicious-software removal tool" was run on 270 million computers,
finding malware on 5.7 million of those; and 62% of those 5.7 million
infections (i.e. some 3.5 million) were cases of Trojan Horses.
Of course you mean it's "crappy" because it doesn't reinforce the
stupid lies you lying cola lusers have been blabbing for years -
that 50% of Windows systems are infected.
Turns out the MSRT found malware on just 2.1% of the 270 million
systems it was applied to.
So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and
cola the finger).
http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG
I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
far as I could toss a building somewhere.
Rasker has proved himself totally and utterly incompetent when it comes
to ANY form of statistical analysis. Using flawed numbers he applies
flawed algorithms to reach, well, a flawed result.
His inability to even go to Amazon, click on computers, then laptops
then "best selling" was a lesson to all involved at how little he should
be trusted. That combined with all the stories of foul mouthed women on
trains, friends with sons who are amazed at Linux and how he has
revitalised 3rd world PCs, which look like they were extras in
Waterworld, suggests that little, if anything, he posts can be trusted.
Yes, he is a real pistol.
Peter Köhlmann
2008-10-18 14:42:31 UTC
Permalink
Post by Linux Pimps
Post by Hadron
Post by Linux Pimps
Post by DFS
Post by Richard Rasker
What they apparently mean is this: Microsoft's crappy
"malicious-software removal tool" was run on 270 million computers,
finding malware on 5.7 million of those; and 62% of those 5.7 million
infections (i.e. some 3.5 million) were cases of Trojan Horses.
Of course you mean it's "crappy" because it doesn't reinforce the
stupid lies you lying cola lusers have been blabbing for years -
that 50% of Windows systems are infected.
Turns out the MSRT found malware on just 2.1% of the 270 million
systems it was applied to.
So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and
cola the finger).
http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG
I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
far as I could toss a building somewhere.
Rasker has proved himself totally and utterly incompetent when it comes
to ANY form of statistical analysis. Using flawed numbers he applies
flawed algorithms to reach, well, a flawed result.
His inability to even go to Amazon, click on computers, then laptops
then "best selling" was a lesson to all involved at how little he should
be trusted. That combined with all the stories of foul mouthed women on
trains, friends with sons who are amazed at Linux and how he has
revitalised 3rd world PCs, which look like they were extras in
Waterworld, suggests that little, if anything, he posts can be trusted.
Yes, he is a real pistol.
Good thing that you support Hadron Quark. He absolutely needs the support
of "high experience people" like you, I am sure. After all, combined you
two would even outsmart a cockroach...
--
The two most common things in the universe are hydrogen and
stupidity
Linux Pimps
2008-10-18 01:20:30 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, Richard Rasker belched out
Post by Richard Rasker
Woops.
What we have here is two Linux-Pimps doing a fine job of pimping each other.
Identity
2008-10-17 17:20:09 UTC
Permalink
But it was more of a tease-the-troll excercise
You couldn't tease the hair on your nasty back.
http://blogs.zdnet.com/Spyware/?p=848
You can't get anything current, home user?
"During the second quarter of 2006, Webroot researchers found that 89
percent of consumer PCs were infected with an average of 30 pieces of
spyware"
Woops.
It's 2008 soon to be 2009 you moron. Is that asking too much of you when
you want to try and step to the plate -- swing for the fences, partner.
Richard Rasker
2008-10-18 00:02:19 UTC
Permalink
Post by Identity
But it was more of a tease-the-troll excercise
You couldn't tease the hair on your nasty back.
http://blogs.zdnet.com/Spyware/?p=848
You can't get anything current, home user?
I got all the current you'll ever need. Whaddyawant, 80 Amps? 250 Amps? 1kA?
Just confirm your order, your payment details, and your delivery address,
and I'll make sure all that current gets delivered to your home allright,
straight to your person.

Best regards,

Richard Rasker
--
http://www.linetec.nl
Linux Pimps
2008-10-18 00:58:54 UTC
Permalink
Post by Richard Rasker
Post by Identity
But it was more of a tease-the-troll excercise
You couldn't tease the hair on your nasty back.
http://blogs.zdnet.com/Spyware/?p=848
You can't get anything current, home user?
I got all the current you'll ever need. Whaddyawant, 80 Amps? 250 Amps? 1kA?
Just confirm your order, your payment details, and your delivery address,
and I'll make sure all that current gets delivered to your home allright,
straight to your person.
Okay-dokey there you Linux-Pimp and believe me you're doing some fine
pimping I tell you, truly wonderful.
Identity
2008-10-17 15:30:31 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Why you fucking ass-hole, you post a damn link in this chicken-shit NG
that doesn't work? And the fucking thing that I read by another ass-hole
is that link is from 2006.

Now, that I do believe, you fucking home user. I believe that you are an
idiot.

You bend over and smell your ass, because you stink to high heaven.
Peter Köhlmann
2008-10-17 16:43:36 UTC
Permalink
Post by Identity
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection
rate. But it's a wet paper bag compared to Linux, where the first
confirmed desktop infection in the wild still hasn't been reported.
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Identity
Why you fucking ass-hole, you post a damn link in this chicken-shit NG
that doesn't work?
Well, maybe your MS "software" (others call it garbage) isn't up to specs?
The link works just fine

< snip more highly reasoned stuff (30 years of "experience") >
--
Meddle not in the affairs of Dragons, For thou art crunchy, and good
with ketchup!
Identity
2008-10-17 17:07:14 UTC
Permalink
Post by Peter Köhlmann
< snip more highly reasoned stuff (30 years of "experience") >
Let's talk about your damn family. How is that ho your daughter doing
ho-ing on campus?
High Plains Thumper
2008-10-17 23:51:45 UTC
Permalink
Post by Identity
<snip more highly reasoned stuff (30 years of "experience")>
Let's talk about your damn family. How is that ho your
daughter doing ho-ing on campus?
This is an example of:

http://www.hyphenologist.co.uk/killfile/anti_troll_faq.htm

[quote] Subject: 3.4 The nasty Troll

If anyone does anything which will interfere with the troll's
ability to cause mayhem, they can become very nasty, posting from
obviously incorrect variations of the name etc. insults, call
them netcops, netnannies, homosexuals. [/quote]

also

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics [...]

[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Chris Ahlstrom
2008-10-18 00:11:10 UTC
Permalink
After takin' a swig o' grog, High Plains Thumper belched out
Post by High Plains Thumper
Post by Identity
Let's talk about your damn family. How is that ho your
daughter doing ho-ing on campus?
http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/
[quote] 7.6 Trespasser Disinformation Tactics [...]
[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]
I don't think that applies to that stingless Bee fscker. Peter, a
dignified component? A suit target for intimidating invective?

Methinks The Bee would rather stir up a hornet's nest.
--
Parkinson's Fourth Law:
The number of people in any working group tends to increase
regardless of the amount of work to be done.
Chris Ahlstrom
2008-10-18 00:21:23 UTC
Permalink
After takin' a swig o' grog, Chris Ahlstrom belched out
Post by Chris Ahlstrom
I don't think that applies to that stingless Bee fscker. Peter, a
dignified component? A suit target for intimidating invective?
My god, I really fat-fingered that post. Corrected:

I don't think that applies to that stingless Bee fscker. Peter, a
dignified opponent? A suitable target for intimidating invective?

Disclaimer: no alcohol involved in the mistaken post.
--
I am two fools, I know, for loving, and for saying so.
-- John Donne
Linux Pimps
2008-10-18 00:39:51 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, Chris Ahlstrom belched out
Post by Chris Ahlstrom
I don't think that applies to that stingless Bee fscker. Peter, a
dignified component? A suit target for intimidating invective?
I don't think that applies to that stingless Bee fscker. Peter, a
dignified opponent? A suitable target for intimidating invective?
Disclaimer: no alcohol involved in the mistaken post.
You're just a Linux-Pimp with pimp statictics.
Linux Pimps
2008-10-18 00:54:55 UTC
Permalink
Post by Chris Ahlstrom
After takin' a swig o' grog, High Plains Thumper belched out
Post by High Plains Thumper
Post by Identity
Let's talk about your damn family. How is that ho your
daughter doing ho-ing on campus?
http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/
[quote] 7.6 Trespasser Disinformation Tactics [...]
[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]
I don't think that applies to that stingless Bee fscker. Peter, a
dignified component? A suit target for intimidating invective?
Methinks The Bee would rather stir up a hornet's nest.
Why are you running around here pimping?
Linux Pimps
2008-10-18 01:06:23 UTC
Permalink
High Plains Thumper wrote:

<snipped>

LOL, LOL and LOL, how long have you been posting it?

On one hand you are a Linux-Pimp. And the on the other hand, you troll
each other in the Amityville.Linux.Advocacy. You troll brainwash each
other.
owl
2008-10-18 00:27:48 UTC
Permalink
Post by Identity
Post by Peter Köhlmann
< snip more highly reasoned stuff (30 years of "experience") >
Let's talk about your damn family. How is that ho your daughter doing
ho-ing on campus?
Your dad's got an awesome car:

http://www.youtube.com/watch?v=ZACZmyYF9GQ&feature=related

Maybe he'll let you have it when you get your license.
Identity
2008-10-18 00:35:42 UTC
Permalink
Post by owl
Post by Identity
Post by Peter Köhlmann
< snip more highly reasoned stuff (30 years of "experience") >
Let's talk about your damn family. How is that ho your daughter doing
ho-ing on campus?
http://www.youtube.com/watch?v=ZACZmyYF9GQ&feature=related
Maybe he'll let you have it when you get your license.
Oh, I see you are just another Linux-pimp.
William Poaster
2008-10-17 17:32:04 UTC
Permalink
Post by Richard Rasker
Post by Identity
Post by Identity
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+% infection
rate. But it's a wet paper bag compared to Linux, where the first
confirmed desktop infection in the wild still hasn't been reported.
I don't believe you.
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
Post by Identity
Why you fucking ass-hole, you post a damn link in this chicken-shit NG
that doesn't work?
Well, maybe your MS "software" (others call it garbage) isn't up to specs?
The link works just fine
< snip more highly reasoned stuff (30 years of "experience") >
Yup, the link works ok. Duh-Inane Arnold f#cked up again, so what else is
new.
--
Did you know?
Hardon Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.
Linux Pimps
2008-10-18 01:24:17 UTC
Permalink
William Poaster wrote:

<snipped>

It's a Linux-Pimp fly-by. William Rooster at his best, because he can't
face anyone like a real rooster. He has to do William Rooster fly-by(s).
High Plains Thumper
2008-10-18 06:25:19 UTC
Permalink
Post by Richard Rasker
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote] Vista laid low by new malware figures 27 percent of
PCs running Vista compromised by at least one piece of
malware John E. Dunn (Techworld.com) 20/05/2008 07:15:10
OK, so Vista is more secure than XP, which boasts a 50+%
infection rate. But it's a wet paper bag compared to Linux,
where the first confirmed desktop infection in the wild still
hasn't been reported.
"Vista laid low" ---> substandard, i.e., no bragging rights.

Roughly 1 out of 4 instead of 1 out of 2. It was a counterpoint
to a troll's take about Vista security.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Chris Ahlstrom
2008-10-17 14:06:00 UTC
Permalink
After takin' a swig o' grog, High Plains Thumper belched out
Post by High Plains Thumper
Post by Identity
<http://technet.microsoft.com/en-us/magazine/cc162458.aspx>
Address Space Load Randomization
The Windows Vista Address Space Load Randomization (ASLR)
feature makes it impossible for malware to know where APIs are
located by loading system DLLs and executables at a different
location every time the system boots. Early in the boot
process, the Memory Manager picks a random DLL image-load bias
from one of 256 64KB-aligned addresses in the 16MB region at
the top of the user-mode address space. As DLLs that have the
new dynamic-relocation flag in their image header load into a
process, the Memory Manager packs them into memory starting
at the image-load bias address and working its way down.
http://blog.didierstevens.com/2007/11/20/quickpost-another-funny-vista-trick-with-aslr/

Turns out it does work: you can disable ASLR for a given program,
like Internet Explorer. And WFP will not restore the file. But for
another reason than I thought: with Vista, WFP is actually called
Windows Resource Protection. And it works differently: files are
protected by Security Descriptors, and are not replaced automatically
when deleted or modified. So the neat trick of deleting a system-file
in Windows XP (like utilman.exe) only to see it reappear a couple of
seconds later, doesn't work anymore with Vista. Change the
Security Descriptor of the file in Vista (taking ownership and giving
you delete rights), delete the file, and it's gone. No
more resurrection.

http://erratasec.blogspot.com/2007/10/funny-vista-tricks-with-aslr.html

While doing alot of testing around the implementation of ASLR on both
OSX and Vista I noticed something odd. 3rd party dlls in the Internet
Explorer don't seem to change addresses. See the screenshot
below. Googletoolbar and flash9d stay at the same address through
multiple reboots. I thought this was odd.
Post by High Plains Thumper
Oh, yeah ....
http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10
It looks as if Vista's reputation for improved security could be
heading for the pages of history. ...
Lipstick on a pig.
--
Lord, defend me from my friends; I can account for my enemies.
-- Charles D'Hericault
Identity
2008-10-17 14:25:28 UTC
Permalink
Chris Ahlstrom wrote:

It will be the day the this *clown* is consider to be an expert's expert.

How does a *clown* come from the MS platform over to the Linux platform
and all of a sudden he becomes a guru's guru?
Terry Porter
2008-10-17 05:51:48 UTC
Permalink
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage on
windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.


Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
--
Linux full time, on the desktop, since August 1997
Sinister Midget
2008-10-17 06:13:56 UTC
Permalink
Post by Terry Porter
Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
I'm glad you said "another" one. That blurb would fit the job
description each and every one of the trolls would answer to be hired
to troll COLA. But it's especially applicable to Quirk, Mushe Goldfish,
Doofie and analus_headupus.
--
"One world, one web, one program" -- Microsoft promotional ad
"Ein Volk, ein Reich, ein Füehrer" -- Adolf Hitler
Identity
2008-10-17 11:46:00 UTC
Permalink
Post by Sinister Midget
Post by Terry Porter
Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
I'm glad you said "another" one. That blurb would fit the job
description each and every one of the trolls would answer to be hired
to troll COLA. But it's especially applicable to Quirk, Mushe Goldfish,
Doofie and analus_headupus.
Hey, you shouldn't kill the messenger.
Identity
2008-10-17 11:44:55 UTC
Permalink
Post by Terry Porter
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage on
windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.
Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
Hey, you shouldn't kill the messenger.
Peter Köhlmann
2008-10-17 12:02:29 UTC
Permalink
Post by Identity
Post by Terry Porter
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage on
windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.
Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
Hey, you shouldn't kill the messenger.
Your only "message" is that you are "just another angry little mother hating
pre pubescent self declared genius that isn't"

Rarely has one seen a poster as stupid as you are
--
I say you need to visit Clues 'R' Us. They are having a special on
slightly used clues.
Identity
2008-10-17 12:04:36 UTC
Permalink
Post by Peter Köhlmann
Post by Identity
Post by Terry Porter
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage on
windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.
Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.
Hey, you shouldn't kill the messenger.
Your only "message" is that you are "just another angry little mother hating
pre pubescent self declared genius that isn't"
Rarely has one seen a poster as stupid as you are
You should take a hard look at yourself Petey, pot calling the kettle
black. :-)
Peter Köhlmann
2008-10-17 12:15:20 UTC
Permalink
Post by Identity
Post by Peter Köhlmann
Post by Identity
Post by Terry Porter
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.
Don't worry about 'reviews' by sad little Wintrolls like "Identity",
it's just another angry little mother hating pre pubescent self
declared genius that isn't.
Hey, you shouldn't kill the messenger.
Your only "message" is that you are "just another angry little mother
hating pre pubescent self declared genius that isn't"
Rarely has one seen a poster as stupid as you are
You should take a hard look at yourself Petey, pot calling the kettle
black. :-)
Really? Who was it then who claimed "30 years experience" in computers and
other quite obvious lies?
That was you. And to do so needs enormous stupidity. You singlehandedly make
windows users look the retards many really are. In reality you have a lot
less smarts than a retarded 12 years old. And your sexual allusions would
make a 15 years old smirch in shame
--
Law of Probable Dispersal:
Whatever it is that hits the fan will not be evenly distributed.
Identity
2008-10-17 12:26:51 UTC
Permalink
Post by Peter Köhlmann
Post by Identity
Post by Peter Köhlmann
Post by Identity
Post by Terry Porter
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.
I would like you guys to give it a read, comment, and eventually point
http://www.leo-sa.com/?p=21
best regards!
Leonardo Sá
Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.
Don't worry about 'reviews' by sad little Wintrolls like "Identity",
it's just another angry little mother hating pre pubescent self
declared genius that isn't.
Hey, you shouldn't kill the messenger.
Your only "message" is that you are "just another angry little mother
hating pre pubescent self declared genius that isn't"
Rarely has one seen a poster as stupid as you are
You should take a hard look at yourself Petey, pot calling the kettle
black. :-)
Really? Who was it then who claimed "30 years experience" in computers and
other quite obvious lies?
Where did it say I had to prove anything to you Petey?
Post by Peter Köhlmann
That was you. And to do so needs enormous stupidity.
That's about the same as you talking about your family.
Post by Peter Köhlmann
You singlehandedly make
windows users look the retards many really are.
And you think that because you're using Linux that it makes you the
greatest thing since sliced toast?

There are a lot of Linux retards in the MS NG(s), particular Vista
NG(s). You should see those morons in action, passing out Linux
magazines and fliers.
Post by Peter Köhlmann
In reality you have a lot
less smarts than a retarded 12 years old.
Who cares? I don't.
Post by Peter Köhlmann
And your sexual allusions would
make a 15 years old smirch in shame
What, because I told someone to go get some pussy? I think you need to
find some, because your wife either closed her legs to you or you can't
get it up anymore. Maybe that's why you're out here on Usenet just a
little too much. :-P
owl
2008-10-17 20:22:37 UTC
Permalink
Post by Identity
Post by Peter Köhlmann
You singlehandedly make
windows users look the retards many really are.
And you think that because you're using Linux that it makes you the
greatest thing since sliced toast?
What came first, the toast or the slice?

<disclaimer>
BSD slices don't count.
</disclaimer>
Identity
2008-10-18 00:34:09 UTC
Permalink
Post by owl
Post by Identity
Post by Peter Köhlmann
You singlehandedly make
windows users look the retards many really are.
And you think that because you're using Linux that it makes you the
greatest thing since sliced toast?
What came first, the toast or the slice?
<disclaimer>
BSD slices don't count.
</disclaimer>
What came first is that nasty double-brewed coffee the Linux-pimp must
be drinking straight and throughout the day that's got this *clown* so
hyped-up day-in, day-out, night-in and night-out.
High Plains Thumper
2008-10-17 12:37:55 UTC
Permalink
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu
linux. I decided to write that to stand out points where
linux takes advantage on windows in real life.
I would like you guys to give it a read, comment, and
eventually point out if i said anything wrong. Here goes the
http://www.leo-sa.com/?p=21
best regards! Leonardo Sá
Nice honest article Leonardo, well done. Your enthusiasm and
excitement for Linux shine thru in your article.
Agreed.

[quote] 2. Fast release time

Thats particularly true with ubuntu: there is a new version
comming around every 6 months with new and improved features.
This beats by far the release cycle of windows, that can be as
long as 2 or 3 years. Another good point is that your oppinion
matters. If you find something wrong with your system, you can
file a bug on launchpad, and that will go directly to the
developers of the system. [/quote]

Following are the automatically notified patches/upgrades
installed on my system over the past week:

Commit Log for Fri Oct 17 05:35:43 2008

Upgraded the following packages:
indi (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kanagram (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kbruch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdebase-bin (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdebase-bin-kde3 (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdeedu-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdelibs-data (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
kdelibs4c2a (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
keduca (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khangman (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khelpcenter (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kig (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kmplot (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kpercentage (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktouch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktuberling (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1
kturtle (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kverbos (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kvoctrain (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kwordquiz (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libarts1c2a (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libartsc0 (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libkdeedu3 (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libkdegames1 (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1

Commit Log for Thu Oct 16 04:05:48 2008

Upgraded the following packages:
cupsys (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-bsd (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-client (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-common (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsimage2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsys2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1

Commit Log for Wed Oct 15 21:37:48 2008

Upgraded the following packages:
dbus (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
dbus-x11 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
jockey-common (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
jockey-gtk (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
libdbus-1-3 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
linux-generic (2.6.24.19.21) to 2.6.24.21.23
linux-headers-generic (2.6.24.19.21) to 2.6.24.21.23
linux-image-generic (2.6.24.19.21) to 2.6.24.21.23
linux-restricted-modules-common (2.6.24.13-19.45) to 2.6.24.14-21.51
linux-restricted-modules-generic (2.6.24.19.21) to 2.6.24.21.23
spring (0.76-b1~2ubuntu7) to 0.77b4-0ubuntu1~ppa1
spring-engine (0.77b3-0ubuntu1~ppa2) to 0.77b4-0ubuntu1~ppa2
xorg-driver-fglrx (1:7.1.0-8-3+2.6.24.13-19.45) to
1:7.1.0-8-3+2.6.24.14-21.51

Installed the following packages:
linux-headers-2.6.24-21 (2.6.24-21.42)
linux-headers-2.6.24-21-generic (2.6.24-21.42)
linux-image-2.6.24-21-generic (2.6.24-21.42)
linux-restricted-modules-2.6.24-21-generic (2.6.24.14-21.51)
linux-ubuntu-modules-2.6.24-21-generic (2.6.24-21.32)

Commit Log for Tue Oct 14 03:52:10 2008

Upgraded the following packages:
hal-info (20080508+git20080601-0ubuntu0.8.04) to
20081001-0ubuntu1~hardy1

Commit Log for Mon Oct 13 05:13:55 2008

Upgraded the following packages:
sun-java6-bin (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-jre (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-plugin (6-06-0ubuntu1) to 6-07-3ubuntu2

Commit Log for Thu Oct 9 22:17:44 2008

Upgraded the following packages:
libruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
ruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
Don't worry about 'reviews' by sad little Wintrolls like
"Identity", it's just another angry little mother hating pre
pubescent self declared genius that isn't.
Sad is true. His tenor rings of the potty mouthed Linux-sux/
VistaKing troll.
--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green
Identity
2008-10-17 12:45:59 UTC
Permalink
Post by High Plains Thumper
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu
linux. I decided to write that to stand out points where
linux takes advantage on windows in real life.
I would like you guys to give it a read, comment, and
eventually point out if i said anything wrong. Here goes the
http://www.leo-sa.com/?p=21
best regards! Leonardo Sá
Nice honest article Leonardo, well done. Your enthusiasm and
excitement for Linux shine thru in your article.
Agreed.
[quote] 2. Fast release time
Thats particularly true with ubuntu: there is a new version comming
around every 6 months with new and improved features. This beats by far
the release cycle of windows, that can be as long as 2 or 3 years.
Another good point is that your oppinion matters. If you find something
wrong with your system, you can file a bug on launchpad, and that will
go directly to the developers of the system. [/quote]
Following are the automatically notified patches/upgrades installed on
Commit Log for Fri Oct 17 05:35:43 2008
indi (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kanagram (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kbruch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdebase-bin (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdebase-bin-kde3 (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdeedu-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdelibs-data (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
kdelibs4c2a (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
keduca (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khangman (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khelpcenter (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kig (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kmplot (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kpercentage (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktouch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktuberling (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1
kturtle (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kverbos (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kvoctrain (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kwordquiz (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libarts1c2a (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libartsc0 (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libkdeedu3 (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libkdegames1 (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1
Commit Log for Thu Oct 16 04:05:48 2008
cupsys (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-bsd (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-client (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-common (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsimage2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsys2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
Commit Log for Wed Oct 15 21:37:48 2008
dbus (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
dbus-x11 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
jockey-common (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
jockey-gtk (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
libdbus-1-3 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
linux-generic (2.6.24.19.21) to 2.6.24.21.23
linux-headers-generic (2.6.24.19.21) to 2.6.24.21.23
linux-image-generic (2.6.24.19.21) to 2.6.24.21.23
linux-restricted-modules-common (2.6.24.13-19.45) to 2.6.24.14-21.51
linux-restricted-modules-generic (2.6.24.19.21) to 2.6.24.21.23
spring (0.76-b1~2ubuntu7) to 0.77b4-0ubuntu1~ppa1
spring-engine (0.77b3-0ubuntu1~ppa2) to 0.77b4-0ubuntu1~ppa2
xorg-driver-fglrx (1:7.1.0-8-3+2.6.24.13-19.45) to
1:7.1.0-8-3+2.6.24.14-21.51
linux-headers-2.6.24-21 (2.6.24-21.42)
linux-headers-2.6.24-21-generic (2.6.24-21.42)
linux-image-2.6.24-21-generic (2.6.24-21.42)
linux-restricted-modules-2.6.24-21-generic (2.6.24.14-21.51)
linux-ubuntu-modules-2.6.24-21-generic (2.6.24-21.32)
Commit Log for Tue Oct 14 03:52:10 2008
hal-info (20080508+git20080601-0ubuntu0.8.04) to 20081001-0ubuntu1~hardy1
Commit Log for Mon Oct 13 05:13:55 2008
sun-java6-bin (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-jre (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-plugin (6-06-0ubuntu1) to 6-07-3ubuntu2
Commit Log for Thu Oct 9 22:17:44 2008
libruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
ruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
Don't worry about 'reviews' by sad little Wintrolls like
"Identity", it's just another angry little mother hating pre
pubescent self declared genius that isn't.
Sad is true. His tenor rings of the potty mouthed Linux-sux/ VistaKing
troll.
No, I am a human being like you are. I am fan of all O/S(s) including
Linux, as I have Suse Linux, liked it.

I am not a fan of this chicken-shit NG and the regular Linux user in it.
Homer
2008-10-18 01:28:01 UTC
Permalink
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux.
Here's the only reason you need to use GNU/Linux ...

... it's not made by Microsoft.

'Nuff said.
--
K.
http://slated.org

.----
| "At the time, I thought C was the most elegant language and Java
| the most practical one. That point of view lasted for maybe two
| weeks after initial exposure to Lisp." ~ Constantine Vetoshev
`----

Fedora release 8 (Werewolf) on sky, running kernel 2.6.25.11-60.fc8
02:27:44 up 7 days, 11:23, 3 users, load average: 0.00, 0.05, 0.06
Linux Pimps
2008-10-18 01:35:52 UTC
Permalink
Post by Homer
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux.
Here's the only reason you need to use GNU/Linux ...
... it's not made by Microsoft.
'Nuff said.
Nuff-Said-Homer another Linux-Pimp strikes-out against the evil empire.
DFS
2008-10-18 05:33:40 UTC
Permalink
Post by Homer
Post by Leo
I just wrote on my blog: 10 (real) reasons to use ubuntu linux.
Here's the only reason you need to use GNU/Linux ...
... it's not made by Microsoft.
'Nuff said.
"It's not Microsoft" would be my top reason, by far, to use Linux/OSS.
Continue reading on narkive:
Loading...