[thelist] New Critical Security Patch for Windows....
Shawn K. Quinn
skquinn at xevious.kicks-ass.net
Fri Feb 13 04:58:38 CST 2004
On Thursday 2004 February 12 21:17, Jeff Howden wrote:
> shawn,
>
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
> > From: Shawn K. Quinn
> >
> > I would say this is of dubious relevance, when the
> > exploits for them choke down entire networks and the
> > fallout affects everyone, [...]
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
>
> how did i know you'd be one that was quick to reply to my post?
>
> it seems everything these days has some sort of network capability
> built into it. it also seems that the majority of net-connected folk
> are running some flavor of windows. most are not computer experts,
> let alone security experts.
I'm not expecting the average user to be a security expert. What I do
think is reasonable to expect is that the average user knows basic safe
computing practices and common sense, namely that Microsoft will not
e-mail the patch to its users. Microsoft could have chosen to be part
of the solution by including this information with new copies of
Windows; it's obvious that some people need to get it from somewhere.
> therefore, the likelihood that one individual makes an ill-advised
> decision regarding an attachment in their email and suddenly their
> computer is infected and it attempts to do the same to every other
> computer it can find, most of which are running windows.
Which is itself part of the problem, IMO.
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
> > [...] even those of us who have long since ceased
> > trusting Microsoft. [...]
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
>
> i'm not interested in your personal trust issues.
It's a shame, because you probably could learn something if you knew the
reasons why I quit trusting Microsoft.
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
> > Also, Microsoft is not exactly known for brutal honesty
> > when it comes to owing up to a bug in their software,
> > in particular if it is security-related, and even if
> > they acknowledge it the impact is ridiculously
> > downplayed. Contrast this with, say, OpenBSD's same-day
> > update owning up to the one remote hole in the default
> > install after four years (and the exploitability of that
> > hole was still in question).
> ><><><><><><><><><><><><><><><><><><><><><><><><><><><><><
>
> imo, your good vs evil attitude that's resonated in the statements
> above does nothing to sway my opinion. of course a large corporation
> is going to downplay things.
Not necessarily. I haven't really seen Ford, Chrysler, or GM try to
downplay safety defects in their automobiles, for example; they are a
lot more honest than Microsoft ever has been.
> of course they're going to try to keep the details of the entire issue
> under wraps. sure, it makes some people uneasy. you still see a
> patch or update available though don't you?
Maybe, though usually not in a timely fashion.
> so, you say, why doesn't everyone use something better
> (security-wise)? well, cause the choices that are more secure are far
> less user-friendly to the majority of computer users. computers are
> scary enough to most. put them in front of something they'll never
> see in the office or at a friend's house, etc, and they'll flip.
I would say a new user should easily be able to figure out how to use
KDE and probably GNOME as well, even if they are used to the "Windows
way" of doing things. And I wouldn't be so quick to say they would
"never see" something besides Windows "in the office or at a friend's
house".
You seem to imply there's something really scary about GNU/Linux and
other Unix-like operating systems; could you elaborate? Have you used
them before?
--
Shawn K. Quinn
More information about the thelist
mailing list