Language Selection

English French German Italian Portuguese Spanish

Top 10 Runlevels for Windows 8

Filed under
Microsoft
Humor

You heard the news, we’re sure, that Ballmer & Company unveiled a preview of Windows 8 this week. We FOSS types couldn’t help but notice that the Microsofties seem to be copying more than a few Linux ideas with their new release, so we sent our crackpot investigative reporter Ms. Dos (well, she’s a crackpot, we know that much for sure) to nose around Redmond to see if she could find any unknown ways that the upcoming Windows operating system mimics the penguin.

Lo and behold! We discovered that Microsoft is secretly including Unix-like runlevels into their new OS. Some of these runlevels will be available to the user (although they won’t be called “runlevels”) and others will only be able to be activated by MS through the Windows Update feature, without user control. Doesn’t sound good, does it? Things from Redmond seldom do.

So, here it is, our list of the top 10 runlevels for Windows 8….




More in Tux Machines

Leftovers: KDE/Qt

Leftovers: OSS

Security Leftovers

  • DNS server attacks begin using BIND software flaw
    Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses. Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.
  • Researchers Create First Firmware Worm That Attacks Macs
    The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. Two researchers have found that several known vulnerabilities affecting the firmware of all the top PC makers can also hit the firmware of MACs. What’s more, the researchers have designed a proof-of-concept worm for the first time that would allow a firmware attack to spread automatically from MacBook to MacBook, without the need for them to be networked.

Brocade CEO: Transition To Open Source Will Be Difficult For Cisco

Communications CEO Lloyd Carney said traditional vendors like Cisco will have a tough time adapting to a more software-defined, open source space. That's because traditional vendors like Cisco's revenue streams are tied to closed architectures, Carney said. Read more