you might want to edit showing the @ symbol of your email address to (at) because of all the spam bots out there.Deckard said:if you are keen send me your email
you might want to edit showing the @ symbol of your email address to (at) because of all the spam bots out there.Deckard said:if you are keen send me your email
Thank you for analyzing me. I can learn much from that act of yours.observer said:Thanks Deckard. I've sent you email :)
anart, I will take a look at the materials dealing with self-importance. Thanks! I also feel that challenging someone in a way here manifested (referring to Color) is a concealed version of self-importance.
As was pointed out you seem to have some emotional investment regarding your choice to use Linux, or a lack of knowledge regarding how software works internally - mostly likely both.observer said:I'm not sure how advising someone about open-source community OS security strenghts have anything to do with self importance.
theregister.co.uk said:This sort of social engineering, so easy to accomplish in Windows, requires far more steps and far greater effort on the part of the Linux user. Instead of just reading an email (... just reading an email?!?), a Linux user would have to read the email, save the attachment, give the attachment executable permissions, and then run the executable. Even as less sophisticated users begin to migrate to Linux, they may not understand exactly why they can't just execute attachments, but they will still have to go through the steps. As Martha Stewart would say, this is a good thing. Further, due to the strong community around Linux, new users will receive education and encouragement in areas such as email security that are currently lacking in the Windows world, which should help to alleviate any concerns on the part of newbies.
Further, due to the strong separation between normal users and the privileged root user, our Linux user would have to be running as root to really do any damage to the system. He could damage his /home directory, but that's about it. So the above steps now become the following: read, save, become root, give executable permissions, run. The more steps, the less likely a virus infection becomes, and certainly the less likely a catastrophically spreading virus becomes. And since Linux users are taught from the get-go to never run as root, and since Mac OS X doesn't even allow users to use the root account unless they first enable the option, it's obvious the likelihood of email-driven viruses and worms lessens on those platforms.
Unfortunately, running as root (or Administrator) is common in the Windows world. In fact, Microsoft is still engaging in this risky behavior. Windows XP, supposed Microsoft's most secure desktop operating system, automatically makes the first named user of the system an Administrator, with the power to do anything he wants to the computer. The reasons for this decision boggle the mind. With all the lost money and productivity over the last decade caused by countless Microsoft-borne viruses and worms, you'd think the company could have changed its procedures in this area, but no.
Even if the OS has been set up correctly, with an Administrator account and a non-privileged user account, things are still not copasetic. On a Windows system, programs installed by a non-Administrative user can still add DLLs and other system files that can be run at a level of permission that damages the system itself. Even worse, the collection of files on a Windows system - the operating system, the applications, and the user data - can't be kept apart from each other. Things are intermingled to a degree that makes it unlikely that they will ever be satisfactorily sorted out in any sensibly secure fashion.
I've said that Linux is a way more secure alternative than commercial OSes. I also said that in contemporal Ubuntu distribution there is NO viruses, trojans etc. because the root account is disabled : _http://www.debianadmin.com/enable-and-disable-ubuntu-root-password.htmlmark said:As was pointed out you seem to have some emotional investment regarding your choice to use Linux, or a lack of knowledge regarding how software works internally - mostly likely both.
You said that stuff like viruses and trojans and adware aren't a problem on Linux, and that's simply not true. Even the article you linked to states clearly that there are Linux viruses. If you knew what a trojan does then you'd know that they can and do exist for Linux systems. Same goes for adware and just about any other problem that plagues Windows.
As always in the Work we do here, it is imperative that you examine the beam of wood in your own eye before pointing out the speck in someone else's. Your responses to and about Color have come across as a rather childish 'tit for tat' - it might serve you well to pay less attention to Color and more attention to yourself.observer said:anart, I will take a look at the materials dealing with self-importance. Thanks! I also feel that challenging someone in a way here manifested (referring to Color) is a concealed version of self-importance.
You have spoken in an arrogant manner, out of ignorance. I'll let Mark clear things up for you more if he so chooses.observer said:I think that a good thing to do is to have some reasonable experience time with actual software before accusing someone for spreading disinformation and making layman statements.
Spreading disinfo is social engineering also. You've fallen victim, and now you're spreading the problem by spreading disinfo. For a person using the nickname 'observer' you sure aren't observing objective reality as best you could.observer said:From that same article:
theregister.co.uk said:This sort of social engineering, so easy to accomplish in Windows, requires far more steps and far greater effort on the part of the Linux user.
observer quoting The Register article said:Further, due to the strong separation between normal users and the privileged root user, our Linux user would have to be running as root to really do any damage to the system. He could damage his /home directory, but that's about it. So the above steps now become the following: read, save, become root, give executable permissions, run. The more steps, the less likely a virus infection becomes, and certainly the less likely a catastrophically spreading virus becomes. And since Linux users are taught from the get-go to never run as root, and since Mac OS X doesn't even allow users to use the root account unless they first enable the option, it's obvious the likelihood of email-driven viruses and worms lessens on those platforms.
Unfortunately, running as root (or Administrator) is common in the Windows world. In fact, Microsoft is still engaging in this risky behavior. Windows XP, supposed Microsoft's most secure desktop operating system, automatically makes the first named user of the system an Administrator, with the power to do anything he wants to the computer. The reasons for this decision boggle the mind. With all the lost money and productivity over the last decade caused by countless Microsoft-borne viruses and worms, you'd think the company could have changed its procedures in this area, but no.
Even if the OS has been set up correctly, with an Administrator account and a non-privileged user account, things are still not copasetic. On a Windows system, programs installed by a non-Administrative user can still add DLLs and other system files that can be run at a level of permission that damages the system itself. Even worse, the collection of files on a Windows system - the operating system, the applications, and the user data - can't be kept apart from each other. Things are intermingled to a degree that makes it unlikely that they will ever be satisfactorily sorted out in any sensibly secure fashion.
mark said:As was pointed out you seem to have some emotional investment regarding your choice to use Linux, or a lack of knowledge regarding how software works internally - mostly likely both.
The article you quote was written in 2003. Good morning, it's 2007 and the article is no longer applicable as a comparison against the latest release of Windows.observer quoting The Register article said:You said that stuff like viruses and trojans and adware aren't a problem on Linux, and that's simply not true. Even the article you linked to states clearly that there are Linux viruses. If you knew what a trojan does then you'd know that they can and do exist for Linux systems. Same goes for adware and just about any other problem that plagues Windows.
What you wrote exactly is :observer said:I've said that Linux is a way more secure alternative than commercial OSes. I also said that in contemporal Ubuntu distribution there is NO viruses, trojans etc. because the root account is disabled : _http://www.debianadmin.com/enable-and-disable-ubuntu-root-password.html
And that latter statement is not true. So you spread disinfo. That's very irresponsible - and curable if you take the time to do your homework.observer said:I reccomend Ubuntu Linux. [snip] With this operating system there are no viruses, no adware, no dialers, no trojans etc. Cheers !
Re-read what I wrote to learn that I didn't agree with 'observer'.dant said:Then 'Observer' chimed in with 'Linux' as if to imply, "this is a better Operating
System from a security point of view", followed by 'Mark' being in agreement of
the same, or so it seems.
Color said:... but I do use it for kind of a journal and all the things I'm reading, regarding this SOTT site and C's, and translations, and losing all that material would be very painful, as I've experienced it twice in the past.
Hi Color!Color said:Could someone recommend me what steps to take in order to "clean" any potential stuff placed on my PC, or how to check if there's some "noise" on it, kind of the one which would aloud other person to enter my documents via online remote PC? Is that something that can easily be done just with simple virus-scan? Is that all?
Don't delay! Make backups NOW!
We don't allow anyone to trounce into this forum and say whatever they feel like saying only to let other people decide what is 'right', as you put it. We share information, question each other, point out each other's mistakes, and try to arrive at Truth.observer said:mark, let the readers interested in this subject decide what is right.
mark said:Re-read what I wrote to learn that I didn't agree with 'observer'.dant said:Then 'Observer' chimed in with 'Linux' as if to imply, "this is a better Operating
System from a security point of view", followed by 'Mark' being in agreement of
the same, or so it seems.
Ok, I interpreted the two sentences above as to mean, that many things aremark said:All of those things are possible with Linux. Be careful not to spread such disinfo!
As far as I can tell, mark IS a reader that is interested in this subject. What makes you think otherwsie? Also, it seems you avoided all the points that mark raised in his latest reply. Instead, you post the above, which is really like saying "I'm avoiding what you are saying and will only listen to other people."observer said:mark, let the readers interested in this subject decide what is right.
I checked FAT32 file system, and since my OP is Windows XP professional (as I forgot to give that fact earlier, sorry everyone)Data said:I would prefer a backup solution rather than antivirus or firewall software or recommending a particular OS. I store my personal data on an external USB harddrive. Operating Systems may get damaged from time to time, or change completely. I also back up the OS. Also consider that all data is always stored PHYSICALLY. In case of a harddrive failure even a super secure Unix system is rendered useless!!!
So, you might want to consider making regular backups of your personal data on two or more external devices or DVD media and store them at different places, protected against e.g. theft or fire. In case you use an external harddrive I recommend FAT32 file system for inter-OS compatibilty - you can access and copy your files even with old DOS startdisks.
Beside my worries of losing data there's also a big issue of me worryingData said:No operating system or application software can be 100% pure (or without "noise" as you put it).
There are ALWAYS security issues. The point to consider is: Which case is more probable to happen: hacker or virus intrusion, software or hardware failure? With backups, you are protected against all cases.
Preventing hackers from accessing your computer is a whole different thing osit.