From: Grant Edwards on
On 2010-02-01, Dan C <youmustbejoking(a)lan.invalid> wrote:
> On Mon, 01 Feb 2010 04:10:06 +0000, Grant Edwards wrote:
>
>> Is there any consensus on the question of whether he's really
>> a troll -- in which case his posts are just a put-on to try to
>> elicit responses from others? Or do his posts genuinely
>> reflect his attitudes and beliefs?
>
> It's both. He *does* truly believe what he posts, because
> he's ignorant and has serious mental health issues.
>
>> If he really believes what he posts, then I don't think
>> calling him a troll is accurate.
>
> Again, it is both, and is accurate. I mean seriously, read
> his most recent 3 or 4 posts in this thread, a couple of them
> directed at you. Do you *really* think those posts were not
> made to "elicit responses"...?

I agree that he thrives on the response he gets, but I wouldn't
call him a troll if the posts are genuine. The usage of
"troll" probably differs, but in my book trolling is something
done purely for sport using artificial, consciously crafted
posts -- not something done out of genuinely held beliefs (no
matter how delusional those beliefs).

> Laugh at him like the rest of Usenet does. He's the original
> Net Kook.

He's a classic net.kook certainly, and it's probably cruel to
poke him with a stick just to watch him jump around and roar,
but I wouldn't call him a troll. To continue in the fishing
metaphor: he's not trying to catch fish because he enjoys the
sport/challenge, he's trying to catch fish because he's angry
at them and thinks they're all mocking him.

Though easily provoked as a bit of diversion, he's still a lot
less entertaining than Ludwig Plutonium or Rob McElwaine. :)

--
Grant Edwards grante Yow! Hey, wait
at a minute!! I want a
visi.com divorce!! ... you're not
Clint Eastwood!!
From: Andr� Gillibert on

"Sidney Lambe" <sidneylambe(a)nospam.invalid> a �crit dans le message de news:
slrnhmc6n1.6ts.sidneylambe(a)evergreen.net...
>
> There are some very stupid people here trying to convince
> everyone that it is necesasry and right and good to always use
> the latest version of a program, to "upgrade" as soon as the next
> version is available.
>
> This is nonsense. If an application is working well for you,
> there is no reason to "upgrade" and some good reasons not to.
> (These should be pretty obvious.)
>
> What constitutes "working well" is dependent on your situation
> and needs and so forth, and has a large subjective component.
>
> I use a lot of older versions of applications because the
> later ones SUCK.
>

That's what I thought until my server was attacked due to an Apache
vulnerability, by a worm that took control of an Apache client session, and
modified all files it could, to store evil scripts inside them and make
Windows users download trojans.
The server runs Ubuntu... Ubuntu upgrades suck. Every of them failed in some
way or other, but now, I always keep the system up to date.

Now that I've more experience with Linux, I think my next system will be
based on CentOS, since it's known to be rock-solid, and have few
regressions.

--
Andr� Gillibert


From: Wanna-Be Sys Admin on
Bit Twister wrote:

> On 1 Feb 2010 01:04:33 +0100, Sidney Lambe wrote:
>
>> There are some very stupid people here trying to convince
>> everyone that it is necesasry and right and good to always use
>> the latest version of a program, to "upgrade" as soon as the next
>> version is available.
>>
>> This is nonsense.
>
> Yeah, riiiggghhhttt.
>
>> If an application is working well for you,
>> there is no reason to "upgrade" and some good reasons not to.
>> (These should be pretty obvious.)
>
> I say it is stupid to run an application with known security flaws.
>
> Black hats usually have working exploits out within 24 to 48 hours
> after a security update to an application.

Why waste any energy replying to Sid? Anyone that doesn't get that bugs
and security issues require updates, isn't worth arguing with. He must
have gotten bored again to start trolling recently (again), when he was
away for a while. Anyway, if something's stable, secure and bug free,
I don't see anyone encouraging anyone else to upgrade just for the sake
of the newest version. Most of us, unless we need to, wait for the
bugs to be worked out in the new version before we upgrade anyway, but
Sid just doesn't get that.
--
Not really a wanna-be, but I don't know everything.
From: Aragorn on
On Monday 01 February 2010 01:56 in comp.os.linux.misc, somebody
identifying as Bit Twister wrote...

> On 1 Feb 2010 01:04:33 +0100, Sidney Lambe wrote:
>
>> There are some very stupid people here trying to convince
>> everyone that it is necesasry and right and good to always use
>> the latest version of a program, to "upgrade" as soon as the next
>> version is available.
>>
>> This is nonsense.
>
> Yeah, riiiggghhhttt.

Ehm, he does have a point there, Bit. "If it ain't broke, don't fix
it", remember?

>> If an application is working well for you,there is no reason
>> to "upgrade" and some good reasons not to. (These should be pretty
>> obvious.)
>
> I say it is stupid to run an application with known security flaws.

And how careful is it to replace that application with one that has yet
unknown security flaws? ;-) Besides, there is a difference between
patching security holes and installing the "latest and greatest". Just
because there would be a security leak in, say, PHP doesn't mean that
you have to upgrade your entire system to the "latest and greatest".
Especially not if you're not even using PHP in the first place.

Look at KDE for instance. KDE 3.5.10 contained a few minor bugs but was
mostly working just fine and was fully functional. Then most
distributions started deliberately breaking KDE 3.5.10 by dumping some
of the essential packages from the tree in order to "guide" users into
using the as yet still unfinished KDE 4. (That's what happened with
Gentoo, among others. They've broken KDE 3.5.10 because of <quote> "a
few security holes" </quote> and now officially adopted KDE 4, which
contains more than "a few" bugs, and presumably a lot of security holes
as well, since some of the core packages were conceived before 3.5.10
was officially released and thus also still have an older codebase.

> Black hats usually have working exploits out within 24 to 48 hours
> after a security update to an application.

Black hats are usually too busy exploiting the bugs in the most used
(excuse for an) operating system called Microsoft Windows to
concentrate on home users running multiple variants and multiple
distributions of GNU/Linux with far too many different versions of
individual packages dispersed across the userbase.

And just for the record, Gary McKinnon supposedly broke into NASA's
computers trying to find evidence of UFOs and "did a lot of damage",
according to NASA - which is nonsense of course, since he did not
damage anything. And do you know how he got in? Here's the joke of it
all: they had a whole network of Windows XP machines with their
Administrator account set up with a blank password...

--
*Aragorn*
(registered GNU/Linux user #223157)
From: Sidney Lambe on
On comp.os.linux.misc, Aragorn <aragorn(a)chatfactory.invalid>
wrote:

> On Monday 01 February 2010 01:56 in comp.os.linux.misc,
> somebody identifying as Bit Twister wrote...
>
>> On 1 Feb 2010 01:04:33 +0100, Sidney Lambe wrote:
>>
>>> There are some very stupid people here trying to convince
>>> everyone that it is necesasry and right and good to always
>>> use the latest version of a program, to "upgrade" as soon as
>>> the next version is available.
>>>
>>> This is nonsense.
>>
>> Yeah, riiiggghhhttt.
>
> Ehm, he does have a point there, Bit. "If it ain't broke, don't
> fix it", remember?

Here's a guy with real integrity. We've scrapped like junkyard
dogs but he's willing to acknowledge that I have a valid point
when I do.

>>> If an application is working well for you,there is no reason
>>> to "upgrade" and some good reasons not to. (These should be
>>> pretty obvious.)
>>
>> I say it is stupid to run an application with known security
>> flaws.
>
> And how careful is it to replace that application with one
> that has yet unknown security flaws? ;-)

Bingo! And it probably requires new libs with the same
potential problem too.


> Besides, there is a difference between patching security
> holes and installing the "latest and greatest". Just because
> there would be a security leak in, say, PHP doesn't mean that
> you have to upgrade your entire system to the "latest and
> greatest". Especially not if you're not even using PHP in the
> first place.
>
> Look at KDE for instance. KDE 3.5.10 contained a few minor bugs
> but was mostly working just fine and was fully functional. Then
> most distributions started deliberately breaking KDE 3.5.10 by
> dumping some of the essential packages from the tree in order
> to "guide" users into using the as yet still unfinished KDE
> 4. (That's what happened with Gentoo, among others. They've
> broken KDE 3.5.10 because of <quote> "a few security holes"
> </quote> and now officially adopted KDE 4, which contains more
> than "a few" bugs, and presumably a lot of security holes as
> well, since some of the core packages were conceived before
> 3.5.10 was officially released and thus also still have an
> older codebase.

Not to mention that KDE is twice the size of a fully graphically
functional Linux OS in the first place, a bloated and
complex suite of applications that makes your OS much less
seucure than it was just because of those properties alone.

Complexity and size make for more places to hide and more
possible entryways.

>
>> Black hats usually have working exploits out within 24 to 48
>> hours after a security update to an application.
>
> Black hats are usually too busy exploiting the bugs in the most
> used (excuse for an) operating system called Microsoft Windows
> to concentrate on home users running multiple variants and
> multiple distributions of GNU/Linux with far too many different
> versions of individual packages dispersed across the userbase.
>
> And just for the record, Gary McKinnon supposedly broke into
> NASA's computers trying to find evidence of UFOs and "did a lot
> of damage", according to NASA - which is nonsense of course,
> since he did not damage anything. And do you know how he got
> in? Here's the joke of it all: they had a whole network of
> Windows XP machines with their Administrator account set up
> with a blank password...

Yeh. The guy wasn't even a cracker. Just a kid with a
computer.

Hard to believe that NASA was that stupid, isn't it?

I mean, that's right over the edge.

Good article.

Sid