Language Selection

English French German Italian Portuguese Spanish

Millions of Windows Users Need To Clean Up Their Act.

Filed under
Microsoft

Security is black and white. Either you are secure and protected, or you’re not. Strange as it might seem at first, I don’t blame Microsoft for their demonstrated inability to build a perfectly secure personal computer. After all, it’s not possible. But I do hold Microsoft responsible for continually marketing and selling something they can never produce. And they MUST be held responsible for the consequences of believing their own marketing and press.

Microsoft’s software has NEVER been secure, and NEVER will be. With each generation of feature-rama upgrade, it becomes more and more complex, and less and less understandable. There can not be anyone left at Microsoft whose mind can still grasp the technical details of the entire system. They had to give that up with MS-DOS. Microsoft’s lack of security foresight is single-handedly responsible for creating the eMail virus. Their consumer operating systems — as well as their high-end server platforms — are notoriously insecure.

So why am I saying that millions of Windows Users need to clean up their act? There is one simple reason.

You are “owned”.

Full Article.

So tired of the FUD

Blah Blah Blah, I'm so tired of hearing about how much Windows Sucks. I'm not a MS fanboy (I design for the end result, not by what vendor is the most popular that week), but neither myself, nor my friends, nor my family, nor my kids, nor my clients have ANY trouble running Window systems (desktops or servers) and they're not "owned". Anyone with half a brain can keep their system patched to date (it's called "auto update" people, it's not rocket science), use anti-virus (AVG it's free for home users), use MS Anti-Spyware (it's free for home users) and stick their network behind a firewall (IPCOP or PFSENSE - and yes, they're free). With those safe guards in place, I would truly like to see a windows box "get owned" - it doesn't happen. I'd also like to see some proof for the oh so popular "unprotected windows box on the 'net will be owned in 14 minutes" article. I put a WinXP Pro SP1 box with a public IP on my external network for several days - nothing happened. It's all FUD (and dumbass reporters who can't check the facts before writing a story). I like Linux (and I tried to like OS X but after 1.5 years of trying it just didn't happen) but I'm getting tired of the fanboy's who can only promote them using FUD instead of features. If you can't "sell it" by the facts and features - then maybe it just isn't as good as you think it is. Lets put a little more science into "computer science" and leave the propaganda for governments to use.

I know you're not talking to me

(and dumbass reporters who can't check the facts before writing a story).

You know skippy, I think getting beat up for your lunch money so much as a kid really left some nasty psychological scars on you pal. You were provided a link to a page of reports from one of the leading experts on Windows XP in the world...just put your mouse on the link and click, it's real simple. Oh, is Mr. Gibson a fanboi?

Let's try this: http://www.zdnet.com.au/news/security/0,2000061744,39200021,00.htm

and this:
http://www.freerepublic.com/focus/f-news/1291394/posts

Or maybe this:
http://www.biznix.org/articles/malware.html

A "protected" Windows machine survives well against most attacks, I have one running at one of my offices, however; consider the senior citizens, kids and carpool moms who just don't realize the danger. Now I do understand that techno-fascists will claim people such as this have no business using a computer.

Go on...Agree with it, I've seen your posts elsewhere, that is exactly how you think. Besides, you lost any credibility when you had to resort to name-calling. A practice I am sure you avoid in face-to face debates.

helios

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security Leftovers

  • Security updates for Thursday
  • Security Tips for Installing Linux on Your SysAdmin Workstation
    Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation.
  • Fedora 26 crypto policy Test Day today (2017-03-30)!
  • Open-source developers targeted in sophisticated malware attack
    For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs. The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.
  • A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action. The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping. Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.
  • NTPsec: a Secure, Hardened NTP Implementation
    Network time synchronization—aligning your computer's clock to the same Universal Coordinated Time (UTC) that everyone else is using—is both necessary and a hard problem. Many internet protocols rely on being able to exchange UTC timestamps accurate to small tolerances, but the clock crystal in your computer drifts (its frequency varies by temperature), so it needs occasional adjustments. That's where life gets complicated. Sure, you can get another computer to tell you what time it thinks it is, but if you don't know how long that packet took to get to you, the report isn't very useful. On top of that, its clock might be broken—or lying. To get anywhere, you need to exchange packets with several computers that allow you to compare your notion of UTC with theirs, estimate network delays, apply statistical cluster analysis to the resulting inputs to get a plausible approximation of real UTC, and then adjust your local clock to it. Generally speaking, you can get sustained accuracy to on the close order of 10 milliseconds this way, although asymmetrical routing delays can make it much worse if you're in a bad neighborhood of the internet.
  • Zelda Coatings
    I assume that every permutation of scams will eventually be tried; it is interesting that the initial ones preyed on people's avarice and dishonesty: "I will transfer millions to your bank account, then you share with me" - with subsequent scams appealing to another demographic: "I want to donate a large sum to your religious charity" - to perhaps capture a more virtuous but still credulous lot. Where will it end ?

Tizen and Android

Linux and Linux Foundation

Mesa and Intel Graphics