From: Bit Twister on
On Tue, 02 Feb 2010 21:05:54 +0100, Aragorn wrote:
> On Monday 01 February 2010 01:56 in comp.os.linux.misc, somebody

>> I say it is stupid to run an application with known security flaws.
>
> And how careful is it to replace that application with one that has yet
> unknown security flaws? ;-)

Come on now, next release has same old unknown security flaws unless it is
a complete rewrite. :-P

Better compile/audit tools have found possible exploit avenues so
newer libraries and whatnot are a bit more secure than old ones,
generally speaking.

> Besides, there is a difference between
> patching security holes and installing the "latest and greatest".

Was not arguing about that at all. See >> top of this reply.

> Just
> because there would be a security leak in, say, PHP doesn't mean that
> you have to upgrade your entire system to the "latest and greatest".

Well, I disagree. Criminals are breaking into web sites through
applications like php and poorly coded input validation fields. I
would not necessarily force anyone to next "entire system upgrade" for
an application updates.

> Especially not if you're not even using PHP in the first place.

Bit of an argument misdirection there.
If not using it, take it off the system. :)


> Look at KDE for instance. KDE 3.5.10 contained a few minor bugs but was
> mostly working just fine and was fully functional.

Can not argue that point. I have converted to kde4 but still not happy
with it, at all.

> Then most
> distributions started deliberately breaking KDE 3.5.10 by dumping some
> of the essential packages from the tree in order to "guide" users into
> using the as yet still unfinished KDE 4.
> (That's what happened with Gentoo, among others.

KDE org indicated they are still supporting kde3 and Mandriva 2009 is
still running KDE3. :-D

But you have to agree, If kde4 was not pushed by the distribution
vendors kde4 would not be as far along as it is today.

As for the distribution vendor screw ups, I cannot agree more.
Mandriva has instituted a freaking Guest account no password.
And yet you can see exploits being fixed to prevent local users from
exploiting the system. Makes you wonder if M$ have planted a few
people in the linux crews. :(

>> Black hats usually have working exploits out within 24 to 48 hours
>> after a security update to an application.
>
> Black hats are usually too busy exploiting the bugs in the most used
> (excuse for an) operating system called Microsoft Windows to

Can not be too busy if they have turned out new malware exploit within
a day or so. Of course a new one showing up about every 20 seconds
indicates they are not loafing at the terminal either. :-)

> concentrate on home users running multiple variants and multiple
> distributions of GNU/Linux

Come on now, you know the big crime rings are not skipping big targets
because they are not running M$. Think about it, between Suse and Red
Hat's supported customer base there is around a million systems that no
self respecting bot herder would not like to have under his thumb.
Not to mention the free users. Look how they went after DSN, bind and ssh.

> with far too many different versions of
> individual packages dispersed across the userbase.

I hear what you are saying, but Black hats are attacking the apps
processing web content, (flash, pdf, gif, MP3, WMA, WMV, MP2,...)
and you have to admit, it really is not that hard to have malware
figure out which linux os is running.

I can agree, the script kiddies are not going to do well in the linux
environment as a group.

> And just for the record, Gary McKinnon supposedly broke into NASA's
> computers trying to find evidence of UFOs and "did a lot of damage",
> according to NASA - which is nonsense of course, since he did not
> damage anything. And do you know how he got in? Here's the joke of it
> all: they had a whole network of Windows XP machines with their
> Administrator account set up with a blank password...

Yup, stupid is as stupid does.
From: Darren Salt on
I demand that Aragorn may or may not have written...

[snip]
> I've just read an article - in French, unfortunately - to which the link
> was posted in be.comp.os.linux, and which says that Micro$oft are now
> submitting code to the Linux kernel, under GPLv2.

> The article did not specify what that code might be - I presume it's got
> to do with either the in-kernel NTFS driver or else with the CIFS/SMB
> client driver code - but as I wrote in my reply on /BCOL/ I consider
> the acceptance of any admission of Micro$oft code in the Linux kernel
> to be "The End Of The Innocence", to quote the title of a great Don
> Henley song. Makes me sad... :-/

http://www.theregister.co.uk/2009/07/20/microsoft_windows_drivers_linux/
http://www.theregister.co.uk/2009/07/23/microsoft_hyperv_gpl_violation/
http://www.theregister.co.uk/2009/07/24/ramji_defends_gpl_drop/

drivers/staging/hv; CONFIG_HYPERV. Found in 2.6.32 and 2.6.33-rc*.

[snip]
--
| Darren Salt | linux at youmustbejoking | nr. Ashington, | Doon
| using Debian GNU/Linux | or ds ,demon,co,uk | Northumberland | Army
| + They're after you...

+2A does not support format, 0:1
From: Lew Pitcher on
On February 3, 2010 17:16, in comp.os.linux.misc,
news(a)youmustbejoking.demon.cu.invalid wrote:

> I demand that Aragorn may or may not have written...
>
> [snip]
>> I've just read an article - in French, unfortunately - to which the link
>> was posted in be.comp.os.linux, and which says that Micro$oft are now
>> submitting code to the Linux kernel, under GPLv2.
>
>> The article did not specify what that code might be - I presume it's got
>> to do with either the in-kernel NTFS driver or else with the CIFS/SMB
>> client driver code - but as I wrote in my reply on /BCOL/ I consider
>> the acceptance of any admission of Micro$oft code in the Linux kernel
>> to be "The End Of The Innocence", to quote the title of a great Don
>> Henley song. Makes me sad... :-/
>
> http://www.theregister.co.uk/2009/07/20/microsoft_windows_drivers_linux/
> http://www.theregister.co.uk/2009/07/23/microsoft_hyperv_gpl_violation/
> http://www.theregister.co.uk/2009/07/24/ramji_defends_gpl_drop/
>
> drivers/staging/hv; CONFIG_HYPERV. Found in 2.6.32 and 2.6.33-rc*.

And, apparently, due for removal from the kernel (2.6.35) after Microsoft
abandoned the code mid-cleanup.

http://www.kroah.com/log/linux/staging-status-12-2009.html

--
Lew Pitcher
Master Codewright & JOAT-in-training | Registered Linux User #112576
Me: http://pitcher.digitalfreehold.ca/ | Just Linux: http://justlinux.ca/
---------- Slackware - Because I know what I'm doing. ------


From: Keith Keller on
On 2010-02-01, Grant Edwards <invalid(a)invalid.invalid> wrote:
>
> Is there any consensus on the question of whether he's really a
> troll -- in which case his posts are just a put-on to try to
> elicit responses from others? Or do his posts genuinely reflect
> his attitudes and beliefs?

I think one would have to be impossibly stupid to actually hold the
beliefs that ''Sid'' purports to hold. One would have to be so
incredibly stupid that, no matter how much help one had, one would be
absolutely unable to post more than five times to usenet, much less the
almost uncountable spew that ''Sid'' puts out. Between that, plus the
nym-shifting, plus the theatrical way he tells people to "stay out of
his space", indicates to me that it's all a giant put-on.

--keith


--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information