Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

10 reasons why should one use linux

1 view
Skip to first unread message

Leo

unread,
Oct 16, 2008, 6:30:40 PM10/16/08
to
I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
decided to write that to stand out points where linux takes advantage
on windows in real life.

I would like you guys to give it a read, comment, and eventually point
out if i said anything wrong. Here goes the URL:

http://www.leo-sa.com/?p=21

best regards!
Leonardo Sá

Identity

unread,
Oct 16, 2008, 7:58:05 PM10/16/08
to
Leo wrote:
> I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
> decided to write that to stand out points where linux takes advantage
> on windows in real life.
>
> I would like you guys to give it a read, comment, and eventually point
> out if i said anything wrong. Here goes the URL:
>

Here you moron, because you don't know jack about Vista.

I don't see post about malware issues posted by posters anymore in the
Vista NG(s).

<http://www.securitypronews.com/news/securitynews/spn-45-20060601ASLRJoinsVistasBagOfTricks.html>

<http://technet.microsoft.com/en-us/magazine/cc162458.aspx>

Address Space Load Randomization

Despite measures like Data Execution Prevention and enhanced compiler
error checking, malware authors continue to find buffer overflow
vulnerabilities that allow them to infect network-facing processes like
Internet Explorer®, Windows services, and third-party applications to
gain a foothold on a system. Once they have managed to infect a process,
however, they must use Windows APIs to accomplish their ultimate goal of
reading user data or establishing a permanent presence by modifying user
or system configuration settings.

Connecting an application with API entry points exported by DLLs is
something usually handled by the operating system loader, but these
types of malware infection don't get the benefit of the loader's
services. This hasn't posed a problem for malware on previous versions
of Windows because for any given Windows release, system executable
images and DLLs always load at the same location, allowing malware to
assume that APIs reside at fixed addresses.

The Windows Vista Address Space Load Randomization (ASLR) feature makes
it impossible for malware to know where APIs are located by loading
system DLLs and executables at a different location every time the
system boots. Early in the boot process, the Memory Manager picks a
random DLL image-load bias from one of 256 64KB-aligned addresses in the
16MB region at the top of the user-mode address space. As DLLs that have
the new dynamic-relocation flag in their image header load into a
process, the Memory Manager packs them into memory starting at the
image-load bias address and working its way down.

Executables that have the flag set get a similar treatment, loading at a
random 64KB-aligned point within 16MB of the base load address stored in
their image header. Further, if a given DLL or executable loads again
after being unloaded by all the processes using it, the Memory Manager
reselects a random location at which to load it. Figure 7 shows an
example address-space layout for a 32-bit Windows Vista system,
including the areas from which ASLR picks the image-load bias and
executable load address.


<http://technet.microsoft.com/en-us/library/cc709691.aspx>


To help prevent malicious software from silently installing and causing
computer-wide infection, Microsoft developed the UAC feature. Unlike
previous versions of Windows, when an administrator logs on to a
computer running Windows Vista, the user’s full administrator access
token is split into two access tokens: a full administrator access token
and a standard user access token. During the logon process,
authorization and access control components that identify an
administrator are removed, resulting in a standard user access token.
The standard user access token is then used to start the desktop, the
Explorer.exe process. Because all applications inherit their access
control data from the initial launch of the desktop, they all run as a
standard user as well.

After an administrator logs on, the full administrator access token is
not invoked until the user attempts to perform an administrative task


<http://news.softpedia.com/news/Admin-Approval-Mode-in-Windows-Vista-45312.shtml>

The admin approval mode in Windows Vista illustrates how the security
features of the operating system have evolved beyond Windows XP. The
administrator approval mode is active by default for all the users that
are members of the local administrator group.

With the introduction of the User Account Control in Windows Vista,
Microsoft has labored to deliver a balance between security via
privilege limitations and functionality. In Windows XP, a standard user
found that the actions they were able to perform were confined to the
point of lost functionality.

This is also one of the reasons why in Windows XP, standard user
accounts are less than popular. In this aspect, the security delivered
by limiting the administrator privileges was traded off for complete
functionality. In Windows Vista, Microsoft has integrated a common
denominator in the UAC settings: the admin approval mode.

"In this mode (which is on by default for all members of the local
administrators group), every user with administrator privileges runs
normally as a standard user; but when an application or the system needs
to do something that requires administrator permissions, the user is
prompted to approve the task explicitly. Unlike the "super user on"
function from UNIX that leaves the process elevated until the user
explicitly turns it off, admin approval mode enables administrator
privileges for just the task that was approved, automatically returning
the user to standard user when the task is completed," explained Jim
Allchin, Microsoft Co-President, Platform and Services Division.

Allchin went on to explain that the functionality is simply a
convenience feature designed for administrators. The admin approval mode
does not create a security boundary between processes. In this context,
in the absence of process isolation, interference is possible.

"If an administrator performs multiple tasks on the same desktop, then
malware may potentially be able to inject or interfere with an elevated
process from a non-elevated process. Thus, the most secure configuration
for Windows Vista is to run processes in two separate accounts, with
only administrator tasks performed using an administrator account and
all other tasks performed under the standard user account," added Allchin.

<http://technet.microsoft.com/en-us/magazine/cc138019.aspx>
<http://technet.microsoft.com/en-us/magazine/cc160882.aspx>
<http://msdn.microsoft.com/en-us/library/aa382503.aspx>

<http://juice.altiris.com/article/2665/folder-virtualization-concepts-windows-vista>

To accommodate existing software for Windows that writes to protected
file directories, Microsoft provides a backward compatibility technology
known as Virtualization. While virtualization enables older applications
to run without programmer intervention, it does not guarantee correct
behaviour, and many applications will need to be updated to comply with
UAC restrictions. Virtualization is often referred to as data
redirection because it functions by funnelling attempted access to
protected locations to new locations stored under user profiles. For
example, if a legacy application attempts to write to the Program Files
directory, UAC silently redirects that operation to an unprotected
user-specific folder.

Virtualization Process

When an application installer attempts to write a file called Entry.txt
in C:\Program Files, it is silently redirected to a Virtual Store
directory located inside the current user's account. To the application,
things proceed as normal, and it has no idea that it is being
redirected. To the user, the application, too, still appears to be
located at the old, expected location. But because the application is
not access system-wide file locations, it cannot be used to harm the
system. And on multi-user systems, each user will have isolated, local
copies of redirected files. When this action is being invoked by a admin
user, the file entry is done in Program Files itself. This is depicted
in the figures below.


<http://msdn.microsoft.com/en-us/library/aa382503.aspx>

Applications should not attempt to modify WRP-protected resources
because these are used by Windows and other applications. If an
application attempts to modify a WRP-protected resource, it can have the
following results.

Application installers that attempt to replace, modify, or delete
critical Windows files or registry keys may fail to install the
application and will receive an error message stating that access to the
resource was denied.

Applications that attempt to add or remove sub-keys or change the values
of protected registry keys may fail and will receive an error message
stating that access to the resource was denied.
Applications that rely on writing any information into protected
registry keys, folders, or files may fail.


<http://msdn.microsoft.com/en-us/library/aa382530(VS.85).aspx>

Permission for full access to modify WRP-protected resources is
restricted to TrustedInstaller. WRP-protected resources can be changed
only using the Supported Resource Replacement Mechanisms with the
Windows Modules Installer service.

WRP protects files with the following extensions that are installed by
Windows Server 2008 or Windows Vista: .dll, .exe, .ocx, and .sys.

WRP protects critical files that are installed by Windows Server 2008 or
Windows Vista with the following extensions: .acm, .ade, .adp, .app,
.asa, .asp, .aspx, .ax, .bas, .bat, .bin, .cer, .chm, .clb, .cmd, .cnt,
.cnv, .com, .cpl, .cpx, .crt, .csh, .dll, .drv, .dtd, .exe, .fxp, .grp,
.h1s, .hlp, .hta, .ime, .inf, .ins, .isp, .its, .js, .jse, .ksh, .lnk,
.mad, .maf, .mag, .mam, .man, .maq, .mar, .mas, .mat, .mau, .mav, .maw,
.mda, .mdb, .mde, .mdt, .mdw, .mdz, .msc, .msi, .msp, .mst, .mui, .nls,
.ocx, .ops, .pal, .pcd, .pif, .prf, .prg, .pst, .reg, .scf, .scr, .sct,
.shb, .shs, .sys, .tlb, .tsp, .url, .vb, .vbe, .vbs, .vsmacros, .vss,
.vst, .vsw, .ws, .wsc, .wsf, .wsh, .xsd, and .xsl.

WRP protects critical folders. A folder containing only WRP-protected
files may be locked so that only the Windows trusted installer is able
to create files or subfolders in the folder. A folder may be partially
locked to enable Administrators to create files and subfolders in the
folder.

<http://blogs.msdn.com/e7/archive/2008/10/08/user-account-control.aspx>

User Account Control (UAC) is, arguably, one of the most controversial
features in Windows Vista. Why did Microsoft add all those popups to
Windows? Does it actually improve security? Doesn’t everyone just click
“continue”? Has anyone in Redmond heard the feedback on users and
reviewers? Has anyone seen a tv commercial about this feature?

In the course of working on Windows 7 we have taken a hard look at UAC –
examining customer feedback, volumes of data, the software ecosystem,
and Windows itself. Let’s start by looking at why UAC came to be and our
approach in Vista.

And finally, last week's attack report, but hey, nothing is bullet proof.

http://www.zone-h.com/

Terry Porter

unread,
Oct 17, 2008, 1:51:48 AM10/17/08
to

Nice honest article Leonardo, well done.
Your enthusiasm and excitement for Linux shine thru in your article.


Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
just another angry little mother hating pre pubescent self declared
genius that isn't.

--
Linux full time, on the desktop, since August 1997

Sinister Midget

unread,
Oct 17, 2008, 2:13:56 AM10/17/08
to
On 2008-10-17, Terry Porter <lin...@netspace.net.au> claimed:

> Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
> just another angry little mother hating pre pubescent self declared
> genius that isn't.

I'm glad you said "another" one. That blurb would fit the job
description each and every one of the trolls would answer to be hired
to troll COLA. But it's especially applicable to Quirk, Mushe Goldfish,
Doofie and analus_headupus.

--
"One world, one web, one program" -- Microsoft promotional ad
"Ein Volk, ein Reich, ein Füehrer" -- Adolf Hitler

Richard Rasker

unread,
Oct 17, 2008, 5:05:22 AM10/17/08
to
Identity wrote:

> Leo wrote:
>> I just wrote on my blog: 10 (real) reasons to use ubuntu linux. I
>> decided to write that to stand out points where linux takes advantage
>> on windows in real life.
>>
>> I would like you guys to give it a read, comment, and eventually point
>> out if i said anything wrong. Here goes the URL:
>>
>
> Here you moron, because you don't know jack about Vista.

Vista's "security measures" are an ugly, disorganized heap of annoying and
ineffective kludges, leading people to completely switch off UAC, or
blindly click "Allow" with everything that comes up. And here's another
good example of Microsoft's total incompetence and lack of understanding
when it comes to proper security:

http://www.realtime-vista.com/administration/2007/05/user_account_control_detection.htm

"One of the ways Vista tries to determine if an executable is an
installation is by looking at the filename. If the executable name
includes the word “setup” or “install” you’ll be prompted. In fact, even
the characters “uninst” in an executable name can trigger this security
prompt."

Now if only those pesky virus and malware writers would adhere to this Good
Practice of using the string "Setup" or "Install" in the file names of
their handiwork ...

Richard Rasker
--
http://www.linetec.nl

Phil Da Lick!

unread,
Oct 17, 2008, 5:06:52 AM10/17/08
to

lol.

William Poaster

unread,
Oct 17, 2008, 7:13:12 AM10/17/08
to

References: includes earthlink.com. "Identity" - Duh Inane Arnold again...

--
Did you know?
Hardon Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.

Identity

unread,
Oct 17, 2008, 7:44:55 AM10/17/08
to

Hey, you shouldn't kill the messenger.

Identity

unread,
Oct 17, 2008, 7:46:00 AM10/17/08
to
Sinister Midget wrote:
> On 2008-10-17, Terry Porter <lin...@netspace.net.au> claimed:
>
>> Don't worry about 'reviews' by sad little Wintrolls like "Identity", it's
>> just another angry little mother hating pre pubescent self declared
>> genius that isn't.
>
> I'm glad you said "another" one. That blurb would fit the job
> description each and every one of the trolls would answer to be hired
> to troll COLA. But it's especially applicable to Quirk, Mushe Goldfish,
> Doofie and analus_headupus.
>

Hey, you shouldn't kill the messenger.

Identity

unread,
Oct 17, 2008, 7:47:44 AM10/17/08
to

But hey, I don't see too many posts about malware issues in the Vista NG(s).

Identity

unread,
Oct 17, 2008, 7:48:57 AM10/17/08
to

I don't see too many posts about malware issues in the Vista NG(s).

Identity

unread,
Oct 17, 2008, 7:49:47 AM10/17/08
to


He can't stop me.

Peter Köhlmann

unread,
Oct 17, 2008, 8:02:29 AM10/17/08
to
Identity wrote:

Your only "message" is that you are "just another angry little mother hating


pre pubescent self declared genius that isn't"

Rarely has one seen a poster as stupid as you are
--
I say you need to visit Clues 'R' Us. They are having a special on
slightly used clues.

Identity

unread,
Oct 17, 2008, 8:04:36 AM10/17/08
to

You should take a hard look at yourself Petey, pot calling the kettle
black. :-)

Peter Köhlmann

unread,
Oct 17, 2008, 8:15:20 AM10/17/08
to
Identity wrote:

Really? Who was it then who claimed "30 years experience" in computers and
other quite obvious lies?
That was you. And to do so needs enormous stupidity. You singlehandedly make
windows users look the retards many really are. In reality you have a lot
less smarts than a retarded 12 years old. And your sexual allusions would
make a 15 years old smirch in shame
--
Law of Probable Dispersal:
Whatever it is that hits the fan will not be evenly distributed.

Identity

unread,
Oct 17, 2008, 8:26:51 AM10/17/08
to

Where did it say I had to prove anything to you Petey?


> That was you. And to do so needs enormous stupidity.

That's about the same as you talking about your family.

> You singlehandedly make
> windows users look the retards many really are.

And you think that because you're using Linux that it makes you the
greatest thing since sliced toast?

There are a lot of Linux retards in the MS NG(s), particular Vista
NG(s). You should see those morons in action, passing out Linux
magazines and fliers.

> In reality you have a lot
> less smarts than a retarded 12 years old.

Who cares? I don't.

> And your sexual allusions would
> make a 15 years old smirch in shame

What, because I told someone to go get some pussy? I think you need to
find some, because your wife either closed her legs to you or you can't
get it up anymore. Maybe that's why you're out here on Usenet just a
little too much. :-P

High Plains Thumper

unread,
Oct 17, 2008, 8:37:55 AM10/17/08
to
Terry Porter wrote:
> Leo wrote:
>
>> I just wrote on my blog: 10 (real) reasons to use ubuntu
>> linux. I decided to write that to stand out points where
>> linux takes advantage on windows in real life.
>>
>> I would like you guys to give it a read, comment, and
>> eventually point out if i said anything wrong. Here goes the
>> URL:
>>
>> http://www.leo-sa.com/?p=21
>>
>> best regards! Leonardo Sá
>
> Nice honest article Leonardo, well done. Your enthusiasm and
> excitement for Linux shine thru in your article.

Agreed.

[quote] 2. Fast release time

Thats particularly true with ubuntu: there is a new version
comming around every 6 months with new and improved features.
This beats by far the release cycle of windows, that can be as
long as 2 or 3 years. Another good point is that your oppinion
matters. If you find something wrong with your system, you can
file a bug on launchpad, and that will go directly to the
developers of the system. [/quote]

Following are the automatically notified patches/upgrades
installed on my system over the past week:

Commit Log for Fri Oct 17 05:35:43 2008

Upgraded the following packages:
indi (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kalzium-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kanagram (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kbruch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdebase-bin (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdebase-bin-kde3 (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kdeedu-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kdelibs-data (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
kdelibs4c2a (4:3.5.9-0ubuntu7.1) to 4:3.5.10-0ubuntu1~hardy1
keduca (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khangman (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
khelpcenter (4:3.5.9-0ubuntu7.3) to 4:3.5.10-0ubuntu1~hardy2
kig (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kmplot (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kpercentage (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kstars-data (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktouch (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
ktuberling (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1
kturtle (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kverbos (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kvoctrain (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
kwordquiz (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libarts1c2a (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libartsc0 (1.5.9-0ubuntu2) to 1.5.10-0ubuntu1~hardy1
libkdeedu3 (4:3.5.9-0ubuntu2) to 4:3.5.10-0ubuntu1~hardy1
libkdegames1 (4:3.5.9-0ubuntu1) to 4:3.5.10-0ubuntu1~hardy1

Commit Log for Thu Oct 16 04:05:48 2008

Upgraded the following packages:
cupsys (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-bsd (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-client (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
cupsys-common (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsimage2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1
libcupsys2 (1.3.7-1ubuntu3) to 1.3.7-1ubuntu3.1

Commit Log for Wed Oct 15 21:37:48 2008

Upgraded the following packages:
dbus (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
dbus-x11 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
jockey-common (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
jockey-gtk (0.3.3-0ubuntu8) to 0.3.3-0ubuntu8.1
libdbus-1-3 (1.1.20-1ubuntu2) to 1.1.20-1ubuntu3.1
linux-generic (2.6.24.19.21) to 2.6.24.21.23
linux-headers-generic (2.6.24.19.21) to 2.6.24.21.23
linux-image-generic (2.6.24.19.21) to 2.6.24.21.23
linux-restricted-modules-common (2.6.24.13-19.45) to 2.6.24.14-21.51
linux-restricted-modules-generic (2.6.24.19.21) to 2.6.24.21.23
spring (0.76-b1~2ubuntu7) to 0.77b4-0ubuntu1~ppa1
spring-engine (0.77b3-0ubuntu1~ppa2) to 0.77b4-0ubuntu1~ppa2
xorg-driver-fglrx (1:7.1.0-8-3+2.6.24.13-19.45) to
1:7.1.0-8-3+2.6.24.14-21.51

Installed the following packages:
linux-headers-2.6.24-21 (2.6.24-21.42)
linux-headers-2.6.24-21-generic (2.6.24-21.42)
linux-image-2.6.24-21-generic (2.6.24-21.42)
linux-restricted-modules-2.6.24-21-generic (2.6.24.14-21.51)
linux-ubuntu-modules-2.6.24-21-generic (2.6.24-21.32)

Commit Log for Tue Oct 14 03:52:10 2008

Upgraded the following packages:
hal-info (20080508+git20080601-0ubuntu0.8.04) to
20081001-0ubuntu1~hardy1

Commit Log for Mon Oct 13 05:13:55 2008

Upgraded the following packages:
sun-java6-bin (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-jre (6-06-0ubuntu1) to 6-07-3ubuntu2
sun-java6-plugin (6-06-0ubuntu1) to 6-07-3ubuntu2

Commit Log for Thu Oct 9 22:17:44 2008

Upgraded the following packages:
libruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
ruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2

> Don't worry about 'reviews' by sad little Wintrolls like
> "Identity", it's just another angry little mother hating pre
> pubescent self declared genius that isn't.

Sad is true. His tenor rings of the potty mouthed Linux-sux/
VistaKing troll.

--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green

Identity

unread,
Oct 17, 2008, 8:45:59 AM10/17/08
to

No, I am a human being like you are. I am fan of all O/S(s) including
Linux, as I have Suse Linux, liked it.

I am not a fan of this chicken-shit NG and the regular Linux user in it.

High Plains Thumper

unread,
Oct 17, 2008, 8:47:37 AM10/17/08
to
Identity wrote:
> Leo wrote:
>
>> I just wrote on my blog: 10 (real) reasons to use ubuntu
>> linux. I decided to write that to stand out points where
>> linux takes advantage on windows in real life.
>>
>> I would like you guys to give it a read, comment, and
>> eventually point out if i said anything wrong. Here goes the
>> URL:
>
> Here you moron, because you don't know jack about Vista.

This is an example of:

http://www.hyphenologist.co.uk/killfile/anti_troll_faq.htm

[quote] Subject: 3.4 The nasty Troll

If anyone does anything which will interfere with the troll's
ability to cause mayhem, they can become very nasty, posting from
obviously incorrect variations of the name etc. insults, call
them netcops, netnannies, homosexuals. [/quote]

also

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics [...]

[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]

> I don't see post about malware issues posted by posters
> anymore in the Vista NG(s).
>
> <http://www.securitypronews.com/news/securitynews/spn-45-20060601ASLRJoinsVistasBagOfTricks.html>
>
> <http://technet.microsoft.com/en-us/magazine/cc162458.aspx>
>
> Address Space Load Randomization

<SNIP>

> The Windows Vista Address Space Load Randomization (ASLR)
> feature makes it impossible for malware to know where APIs are
> located by loading system DLLs and executables at a different
> location every time the system boots. Early in the boot
> process, the Memory Manager picks a random DLL image-load bias
> from one of 256 64KB-aligned addresses in the 16MB region at
> the top of the user-mode address space. As DLLs that have the
> new dynamic-relocation flag in their image header load into a
> process, the Memory Manager packs them into memory starting
> at the image-load bias address and working its way down.

Oh, yeah ....

http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1

[quote]
Vista laid low by new malware figures
27 percent of PCs running Vista compromised by at least one piece
of malware
John E. Dunn (Techworld.com) 20/05/2008 07:15:10

It looks as if Vista's reputation for improved security could be
heading for the pages of history. PC Tools has renewed last
week's attack on the platform with new figures that appear to
back up its claim that Vista is almost as vulnerable as its
predecessors.

According to analysis from the Australian company's ThreatFire
user base, 58,000 PCs running Vista were compromised by at least
one piece of malware over the six months to May 2008, equivalent
to 27 percent of all Vista machines probed. Vista made up 12.6
percent, or 190,692, of the 1,513,502 machines running Windows in
the user base.

In total, Vista suffered 121,380 instances of malware from its
190,000 user base, a rate of malware detection per system is
proportionally lower than that of XP, which saw 1,319,144 malware
infections from a user base of 1,297,828 machines, but it
indicates a problem that is worse than Microsoft has been
admitting to.
[/quote]

Oh yeah. OTOH:

http://www.theregister.co.uk/2008/03/29/ubuntu_left_standing/

[quote]
Only Ubuntu left standing, as Flash vuln fells Vista in Pwn2Own
hacking contest

Contestant overcomes bout of 'hacktile dysfunction'
By Dan Goodin in Vancouver → More by this author
Published Saturday 29th March 2008 21:27 GMT

CanSecWest A laptop running a fully patched version of
Microsoft's Vista operating system was the second and final
machine to fall in a hacking contest that pitted the security of
Windows, OS X and Ubuntu Linux. With both a Windows and Mac
machine felled, only the Linux box remained standing following
the three-day competition.
[/quote]

OSX and Vista pwned by Ubuntu! Debian security unsurpassed.

Identity

unread,
Oct 17, 2008, 9:02:29 AM10/17/08
to
High Plains Thumper wrote:
> [quote]
> Only Ubuntu left standing, as Flash vuln fells Vista in Pwn2Own
> hacking contest
>
>
> OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
>

But in the mean time Linux is being hammered.

http://www.zone-h.com/

If the server platform is being hammered what makes you think that the
workstation versions are going to be any better in the wrong hands?

What it really comes down to is who is sitting behind the wheel and is
doing the driving.

What? You're an x Windows user that crossed over to Linux and you are a
guru's guru, right?

Richard Rasker

unread,
Oct 17, 2008, 9:31:30 AM10/17/08
to
High Plains Thumper wrote:

> Oh, yeah ....
>
> http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
>
> [quote]
> Vista laid low by new malware figures
> 27 percent of PCs running Vista compromised by at least one piece
> of malware
> John E. Dunn (Techworld.com) 20/05/2008 07:15:10

OK, so Vista is more secure than XP, which boasts a 50+% infection rate.
But it's a wet paper bag compared to Linux, where the first confirmed
desktop infection in the wild still hasn't been reported.

Identity

unread,
Oct 17, 2008, 9:35:30 AM10/17/08
to

I don't believe you.

Phil Da Lick!

unread,
Oct 17, 2008, 9:37:14 AM10/17/08
to

Thats because you're lying or stupid.

Identity

unread,
Oct 17, 2008, 9:43:27 AM10/17/08
to

What about you? You're no bed of roses that I have seen, make believe IT
director at a printing press.

Richard Rasker

unread,
Oct 17, 2008, 9:53:05 AM10/17/08
to
Identity wrote:

Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya go:

http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html

Identity

unread,
Oct 17, 2008, 10:04:30 AM10/17/08
to

Oh I forgot, you're just another ass-hole. And I own and have used Suse
Linux.

I think I have supplied some links in the NG. I doubt that you have read
them. So guess what I am not going to do?

And you can take it anyway you like.

DFS

unread,
Oct 17, 2008, 10:07:07 AM10/17/08
to
Identity wrote:
> Phil Da Lick! wrote:

>> Thats because you're lying or stupid.
>
> What about you? You're no bed of roses that I have seen, make believe
> IT director at a printing press.

Don't talk about Hyp Da Crite! like that. He knows how to click a Windows
button and send a job to the printer.


Chris Ahlstrom

unread,
Oct 17, 2008, 10:06:00 AM10/17/08
to
After takin' a swig o' grog, High Plains Thumper belched out
this bit o' wisdom:

>> <http://technet.microsoft.com/en-us/magazine/cc162458.aspx>
>>
>> Address Space Load Randomization
>

>> The Windows Vista Address Space Load Randomization (ASLR)
>> feature makes it impossible for malware to know where APIs are
>> located by loading system DLLs and executables at a different
>> location every time the system boots. Early in the boot
>> process, the Memory Manager picks a random DLL image-load bias
>> from one of 256 64KB-aligned addresses in the 16MB region at
>> the top of the user-mode address space. As DLLs that have the
>> new dynamic-relocation flag in their image header load into a
>> process, the Memory Manager packs them into memory starting
>> at the image-load bias address and working its way down.

http://blog.didierstevens.com/2007/11/20/quickpost-another-funny-vista-trick-with-aslr/

Turns out it does work: you can disable ASLR for a given program,
like Internet Explorer. And WFP will not restore the file. But for
another reason than I thought: with Vista, WFP is actually called
Windows Resource Protection. And it works differently: files are
protected by Security Descriptors, and are not replaced automatically
when deleted or modified. So the neat trick of deleting a system-file
in Windows XP (like utilman.exe) only to see it reappear a couple of
seconds later, doesn't work anymore with Vista. Change the
Security Descriptor of the file in Vista (taking ownership and giving
you delete rights), delete the file, and it's gone. No
more resurrection.

http://erratasec.blogspot.com/2007/10/funny-vista-tricks-with-aslr.html

While doing alot of testing around the implementation of ASLR on both
OSX and Vista I noticed something odd. 3rd party dlls in the Internet
Explorer don't seem to change addresses. See the screenshot
below. Googletoolbar and flash9d stay at the same address through
multiple reboots. I thought this was odd.

> Oh, yeah ....
>
> http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
>
> [quote]
> Vista laid low by new malware figures
> 27 percent of PCs running Vista compromised by at least one piece
> of malware
> John E. Dunn (Techworld.com) 20/05/2008 07:15:10
>
> It looks as if Vista's reputation for improved security could be

> heading for the pages of history. ...

Lipstick on a pig.

--
Lord, defend me from my friends; I can account for my enemies.
-- Charles D'Hericault

Identity

unread,
Oct 17, 2008, 10:15:13 AM10/17/08
to

LOL

Yes, I know. His company mission critical spreadsheet payroll, other
games, tools, water dispenser and auto flushing toilets are powered by
the big *L*. That way, there is a less chance of the big *L* being
hacked as an office facing solution.

DFS

unread,
Oct 17, 2008, 10:23:18 AM10/17/08
to
Identity wrote:
> DFS wrote:
>> Identity wrote:
>>> Phil Da Lick! wrote:
>>
>>>> Thats because you're lying or stupid.
>>> What about you? You're no bed of roses that I have seen, make
>>> believe IT director at a printing press.
>>
>> Don't talk about Hyp Da Crite! like that. He knows how to click a
>> Windows button and send a job to the printer.
>>
>>
>
> LOL
>
> Yes, I know. His company mission critical spreadsheet payroll, other
> games, tools, water dispenser and auto flushing toilets

ha!

Linux knows how to deal with shit... just merge it into the Ubuntu and
Debian "stable" repositories.


Debian Etch: "I installed debian etch. Ran fine for a while, then the same
freezing problem."
#148 at http://ubuntuforums.org/showthread.php?t=412125&page=15


Identity

unread,
Oct 17, 2008, 10:25:28 AM10/17/08
to
Chris Ahlstrom wrote:

It will be the day the this *clown* is consider to be an expert's expert.

How does a *clown* come from the MS platform over to the Linux platform
and all of a sudden he becomes a guru's guru?

Sinister Midget

unread,
Oct 17, 2008, 10:35:47 AM10/17/08
to
On 2008-10-17, Phil Da Lick! <phil_t...@REMOVETHISSPAMTRAP.hotmail.com> claimed:
> Identity wrote:

>> I don't believe you.
>
> Thats because you're lying or stupid.

Does he really have to choose?

--
Microsoft is not the answer. Microsoft is the question.
The answer is NO!

Chris Ahlstrom

unread,
Oct 17, 2008, 11:05:02 AM10/17/08
to
After takin' a swig o' grog, Richard Rasker belched out
this bit o' wisdom:

> Identity wrote:
>
>> I don't believe you.
>
> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya go:
>
> http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html

Nah, Richard, that page dates back to 2006, which is so old that
Microsoft has scrubbed the data:

http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc

The page cannot be found
The page you are looking for might have been removed, had its name
changed, or is temporarily unavailable.

--
Real computer scientists don't write code. They occasionally tinker with
`programming systems', but those are so high level that they hardly count
(and rarely count accurately; precision is for applications).

Identity

unread,
Oct 17, 2008, 11:15:16 AM10/17/08
to
Sinister Midget wrote:
> On 2008-10-17, Phil Da Lick! <phil_t...@REMOVETHISSPAMTRAP.hotmail.com> claimed:
>> Identity wrote:
>
>>> I don't believe you.
>> Thats because you're lying or stupid.
>
> Does he really have to choose?
>

The littlest ass-hold strikes again,

Identity

unread,
Oct 17, 2008, 11:30:31 AM10/17/08
to

Why you fucking ass-hole, you post a damn link in this chicken-shit NG
that doesn't work? And the fucking thing that I read by another ass-hole
is that link is from 2006.

Now, that I do believe, you fucking home user. I believe that you are an
idiot.

You bend over and smell your ass, because you stink to high heaven.

Richard Rasker

unread,
Oct 17, 2008, 12:04:08 PM10/17/08
to
Chris Ahlstrom wrote:

> After takin' a swig o' grog, Richard Rasker belched out
> this bit o' wisdom:
>
>> Identity wrote:
>>
>>> I don't believe you.
>>
>> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya
>> go:
>>
>>
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
>
> Nah, Richard, that page dates back to 2006, which is so old that
> Microsoft has scrubbed the data:
>
>
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
>
> The page cannot be found
> The page you are looking for might have been removed, had its name
> changed, or is temporarily unavailable.

Strange, it opens just fine here. But it was more of a tease-the-troll
excercise -- of course Microsoft will never say that 60% of their machines
is infected; here's the text:

"Microsoft today gave the world a rare -- albeit conservative -- glimpse of
its view on just how bad the virus and bot problem has gotten for Windows
users worldwide. The data comes from 15 months' worth of experience
scanning computers with its "malicious-software removal tool," a free
component that Microsoft offers Windows XP, Windows 2000 and Windows
Server 2003 users when they download security updates from Microsoft.

The tool has been run approximately 2.7 billion times by at least 270
million unique computers, leading to the removal of 16 million instances
of malicious software from 5.7 million unique Windows-based computers over
the past 15 months, Microsoft said. Sixty-two percent of those computers
had Trojan horse programs on them. "

So according to these figures, only two percent of computers were found to
be infected with malicious software. If this shows one thing, it's that
Microsoft can't build anti-malware worth a damn.

Here's a more realistic figure from a few years back:

http://blogs.zdnet.com/Spyware/?p=848

"During the second quarter of 2006, Webroot researchers found that 89
percent of consumer PCs were infected with an average of 30 pieces of
spyware"

Woops.

Chris Ahlstrom

unread,
Oct 17, 2008, 12:08:42 PM10/17/08
to
After takin' a swig o' grog, Richard Rasker belched out
this bit o' wisdom:

> Chris Ahlstrom wrote:
>
>> After takin' a swig o' grog, Richard Rasker belched out
>> this bit o' wisdom:
>>
>>> Identity wrote:
>>>
>>>> I don't believe you.
>>>
>>> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya
>>> go:
>>>
>>>
> http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
>>
>> Nah, Richard, that page dates back to 2006, which is so old that
>> Microsoft has scrubbed the data:
>>
>>
> http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
>>

> Strange, it opens just fine here.

I can't even wget it.

> The tool has been run approximately 2.7 billion times by at least 270
> million unique computers, leading to the removal of 16 million instances
> of malicious software from 5.7 million unique Windows-based computers over
> the past 15 months, Microsoft said. Sixty-two percent of those computers
> had Trojan horse programs on them. "
>
> So according to these figures, only two percent of computers were found to
> be infected with malicious software.

I don't get it. The paragraph you quote seems to present two
mutually-exclusive conclusions.

> http://blogs.zdnet.com/Spyware/?p=848
>
> "During the second quarter of 2006, Webroot researchers found that 89
> percent of consumer PCs were infected with an average of 30 pieces of
> spyware"
>
> Woops.

Woops:

--
By failing to prepare, you are preparing to fail.

Peter Köhlmann

unread,
Oct 17, 2008, 12:43:36 PM10/17/08
to
The dumbest clown ever (Identity) stuttered:

> Richard Rasker wrote:
>> Identity wrote:
>>
>>> Richard Rasker wrote:
>>>> High Plains Thumper wrote:
>>>>
>>>>> Oh, yeah ....
>>>>>
>>>>> http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
>>>>>
>>>>> [quote]
>>>>> Vista laid low by new malware figures
>>>>> 27 percent of PCs running Vista compromised by at least one piece
>>>>> of malware
>>>>> John E. Dunn (Techworld.com) 20/05/2008 07:15:10
>>>> OK, so Vista is more secure than XP, which boasts a 50+% infection
>>>> rate. But it's a wet paper bag compared to Linux, where the first
>>>> confirmed desktop infection in the wild still hasn't been reported.
>>
>>> I don't believe you.
>>
>> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya
>> go:
>>
>>
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
>>
>>
>
> Why you fucking ass-hole, you post a damn link in this chicken-shit NG
> that doesn't work?

Well, maybe your MS "software" (others call it garbage) isn't up to specs?
The link works just fine

< snip more highly reasoned stuff (30 years of "experience") >
--
Meddle not in the affairs of Dragons, For thou art crunchy, and good
with ketchup!

Sinister Midget

unread,
Oct 17, 2008, 1:02:08 PM10/17/08
to
On 2008-10-17, Chris Ahlstrom <lin...@bollsouth.nut> claimed:

> After takin' a swig o' grog, Richard Rasker belched out
> this bit o' wisdom:
>
>> Chris Ahlstrom wrote:
>>
>>> After takin' a swig o' grog, Richard Rasker belched out
>>> this bit o' wisdom:
>>>
>>>> Identity wrote:
>>>>
>>>>> I don't believe you.
>>>>
>>>> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here ya
>>>> go:
>>>>
>>>>
>> http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
>>>
>>> Nah, Richard, that page dates back to 2006, which is so old that
>>> Microsoft has scrubbed the data:
>>>
>>>
>> http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
>>>
>> Strange, it opens just fine here.
>
> I can't even wget it.

It's gettable here, too.

--
Ever noticed how fast Windows runs?
Me neither.

Identity

unread,
Oct 17, 2008, 1:07:14 PM10/17/08
to
Peter Köhlmann the jewish ass-hole wrote:
> The dumbest clown ever (Identity) stuttered:
>
> < snip more highly reasoned stuff (30 years of "experience") >

Let's talk about your damn family. How is that ho your daughter doing
ho-ing on campus?

Identity

unread,
Oct 17, 2008, 1:20:09 PM10/17/08
to
Richard Rasker wrote:


> But it was more of a tease-the-troll excercise

You couldn't tease the hair on your nasty back.

> Here's a more realistic figure from a few years back:
>
> http://blogs.zdnet.com/Spyware/?p=848

You can't get anything current, home user?


>
> "During the second quarter of 2006, Webroot researchers found that 89
> percent of consumer PCs were infected with an average of 30 pieces of
> spyware"
>
> Woops.

It's 2008 soon to be 2009 you moron. Is that asking too much of you when
you want to try and step to the plate -- swing for the fences, partner.

William Poaster

unread,
Oct 17, 2008, 1:32:04 PM10/17/08
to

Yup, the link works ok. Duh-Inane Arnold f#cked up again, so what else is
new.

--
Did you know?
Hardon Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.

Richard Rasker

unread,
Oct 17, 2008, 3:20:38 PM10/17/08
to
Chris Ahlstrom wrote:

> After takin' a swig o' grog, Richard Rasker belched out
> this bit o' wisdom:
>
>> Chris Ahlstrom wrote:
>>
>>> After takin' a swig o' grog, Richard Rasker belched out
>>> this bit o' wisdom:
>>>
>>>> Identity wrote:
>>>>
>>>>> I don't believe you.
>>>>
>>>> Oh, I forgot, you're a Wintroll. You only believe Microsoft. OK, here
>>>> ya go:
>>>>
>>>>
>>
http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
>>>
>>> Nah, Richard, that page dates back to 2006, which is so old that
>>> Microsoft has scrubbed the data:
>>>
>>>
>>
http://download.microsoft.com/download/3/d/e/3de2470b-ab9a-4a7f-b760-ee2421df294a/WindowsRemovalToolWP.doc
>>>
>> Strange, it opens just fine here.
>
> I can't even wget it.

Perhaps there's a problem with the DNS server(s) of your ISP -- the only way
I can think of to find out more is to have wireshark sniff and log your
ethernet packets while you give a 'dig blog.washingtonpost.com' command.

>> The tool has been run approximately 2.7 billion times by at least 270
>> million unique computers, leading to the removal of 16 million
>> instances of malicious software from 5.7 million unique Windows-based
>> computers over the past 15 months, Microsoft said. Sixty-two percent of
>> those computers had Trojan horse programs on them. "
>>
>> So according to these figures, only two percent of computers were found
>> to be infected with malicious software.
>
> I don't get it. The paragraph you quote seems to present two
> mutually-exclusive conclusions.

Nah, it's just a bit confusing, what with percentages and absolute numbers
mixed up -- that's why I hoped the troll would bite.
What they apparently mean is this: Microsoft's crappy "malicious-software
removal tool" was run on 270 million computers, finding malware on 5.7
million of those; and 62% of those 5.7 million infections (i.e. some 3.5
million) were cases of Trojan Horses.

owl

unread,
Oct 17, 2008, 4:22:37 PM10/17/08
to
Identity <Iden...@theft.com> wrote:
> Peter Köhlmann wrote:
>
>> You singlehandedly make
>> windows users look the retards many really are.
>
> And you think that because you're using Linux that it makes you the
> greatest thing since sliced toast?
>

What came first, the toast or the slice?

<disclaimer>
BSD slices don't count.
</disclaimer>


High Plains Thumper

unread,
Oct 17, 2008, 7:46:05 PM10/17/08
to
Identity wrote:
> High Plains Thumper wrote:
>
>> [quote] Only Ubuntu left standing, as Flash vuln fells Vista
>> in Pwn2Own hacking contest
>>
>> OSX and Vista pwned by Ubuntu! Debian security unsurpassed.
>>
>
> But in the mean time Linux is being hammered.
>
> http://www.zone-h.com/
>
> If the server platform is being hammered what makes you think
> that the workstation versions are going to be any better in
> the wrong hands?

A site located on a neutral country, Switzerland, with stats
populated by rogue hackers, with most of the hacked sites hardly
anyone has ever heard of. Hmmmm ..... It would be different if
there were at least two or three other sites with similar
statistics, to confirm.

However, if we truly believe the results, then I would have to
say that Linux has a much greater presence than the trolls would
like to admit.

Also, good systems administrative practises go a long way to
preventing intrusions. Weak passwords, leaked passwords, no
passwords, failure to apply security patches in a timely manner,
failure to secure unused ports, admittance of administrative
rights to those who have no need for it only invite trouble. It
makes no difference what the operating system is, if one leaves
the back door open, key under the doormat or with untrustworthy
neighbors.

> What it really comes down to is who is sitting behind the
> wheel and is doing the driving.
>
> What? You're an x Windows user that crossed over to Linux and
> you are a guru's guru, right?

No, I came out of the CP/M era, early graphic systems, 32 bit
minicomputers and small embedded systems.

--
HPT
Quando omni flunkus moritati
(If all else fails, play dead)
- "Red" Green

High Plains Thumper

unread,
Oct 17, 2008, 7:51:45 PM10/17/08
to
Identity wrote:
> Peter Köhlmann wrote:
>> Identity stuttered:

>>
>> <snip more highly reasoned stuff (30 years of "experience")>
>
> Let's talk about your damn family. How is that ho your
> daughter doing ho-ing on campus?

This is an example of:

http://www.hyphenologist.co.uk/killfile/anti_troll_faq.htm

[quote] Subject: 3.4 The nasty Troll

If anyone does anything which will interfere with the troll's
ability to cause mayhem, they can become very nasty, posting from
obviously incorrect variations of the name etc. insults, call
them netcops, netnannies, homosexuals. [/quote]

also

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics [...]

[3.] Put your opponent off guard by insulting him. The liberal
use of profanity and vulgarisms can be very effective,
particularly when used against you more dignified opponents. Your
experience as a school yard bully can be handy here. [/quote]

Chris Ahlstrom

unread,
Oct 17, 2008, 8:08:22 PM10/17/08
to
After takin' a swig o' grog, High Plains Thumper belched out
this bit o' wisdom:

>> http://www.zone-h.com/


>>
> A site located on a neutral country, Switzerland, with stats
> populated by rogue hackers, with most of the hacked sites hardly
> anyone has ever heard of. Hmmmm ..... It would be different if
> there were at least two or three other sites with similar
> statistics, to confirm.

It's a bragging-rights site, as far as I can tell.

> However, if we truly believe the results, then I would have to
> say that Linux has a much greater presence than the trolls would
> like to admit.

Did I mention yet that The Bee, Mr. Identity Theft, is a feckless moron?

--
If your life was a horse, you'd have to shoot it.

Chris Ahlstrom

unread,
Oct 17, 2008, 8:11:10 PM10/17/08
to
After takin' a swig o' grog, High Plains Thumper belched out
this bit o' wisdom:

> Identity the Humongous Asshole wrote:
>>
>> Let's talk about your damn family. How is that ho your
>> daughter doing ho-ing on campus?
>

> http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/
>
> [quote] 7.6 Trespasser Disinformation Tactics [...]
>
> [3.] Put your opponent off guard by insulting him. The liberal
> use of profanity and vulgarisms can be very effective,
> particularly when used against you more dignified opponents. Your
> experience as a school yard bully can be handy here. [/quote]

I don't think that applies to that stingless Bee fscker. Peter, a
dignified component? A suit target for intimidating invective?

Methinks The Bee would rather stir up a hornet's nest.

--
Parkinson's Fourth Law:
The number of people in any working group tends to increase
regardless of the amount of work to be done.

Richard Rasker

unread,
Oct 17, 2008, 8:02:19 PM10/17/08
to
Identity wrote:

> Richard Rasker wrote:
>
>
>> But it was more of a tease-the-troll excercise
>
> You couldn't tease the hair on your nasty back.
>
>> Here's a more realistic figure from a few years back:
>>
>> http://blogs.zdnet.com/Spyware/?p=848
>
> You can't get anything current, home user?

I got all the current you'll ever need. Whaddyawant, 80 Amps? 250 Amps? 1kA?
Just confirm your order, your payment details, and your delivery address,
and I'll make sure all that current gets delivered to your home allright,
straight to your person.

Best regards,

Chris Ahlstrom

unread,
Oct 17, 2008, 8:21:23 PM10/17/08
to
After takin' a swig o' grog, Chris Ahlstrom belched out
this bit o' wisdom:

> I don't think that applies to that stingless Bee fscker. Peter, a


> dignified component? A suit target for intimidating invective?

My god, I really fat-fingered that post. Corrected:

I don't think that applies to that stingless Bee fscker. Peter, a

dignified opponent? A suitable target for intimidating invective?

Disclaimer: no alcohol involved in the mistaken post.

--
I am two fools, I know, for loving, and for saying so.
-- John Donne

Identity

unread,
Oct 17, 2008, 8:27:16 PM10/17/08
to
Richard Rasker a Linux-pimp wrote:
>
> Nah, it's just a bit confusing, what with percentages and absolute numbers
> mixed up -- that's why I hoped the troll would bite.
> What they apparently mean is this: Microsoft's crappy "malicious-software
> removal tool" was run on 270 million computers, finding malware on 5.7
> million of those; and 62% of those 5.7 million infections (i.e. some 3.5
> million) were cases of Trojan Horses.
>

You're just another ass-hole Linux-pimp tossing out dime a dozen
Amityville.Linux.Advocacy statistics.

They are fixed statistics I tell you fixed, and I don't believe them. Is
that not the usual Linux-pimp MO for this chicken-shit NG? :)

And you have still have not convinced anyone that Linux has not been or
is not being attacked in the wild, Linux-pimp.

This crap NG and you Linux-pimp *clowns* in it do need to take this
chicken-shit Amityville circus and vaudeville show/act on the road.

owl

unread,
Oct 17, 2008, 8:27:48 PM10/17/08
to

Your dad's got an awesome car:

http://www.youtube.com/watch?v=ZACZmyYF9GQ&feature=related

Maybe he'll let you have it when you get your license.

Identity

unread,
Oct 17, 2008, 8:34:09 PM10/17/08
to

What came first is that nasty double-brewed coffee the Linux-pimp must
be drinking straight and throughout the day that's got this *clown* so
hyped-up day-in, day-out, night-in and night-out.

Identity

unread,
Oct 17, 2008, 8:35:42 PM10/17/08
to

Oh, I see you are just another Linux-pimp.

Hadron

unread,
Oct 17, 2008, 8:36:54 PM10/17/08
to

Exactly. And Social Engineering. The things I highlighted as points of
attack ages ago e.g sudo embedded in bash script in HOWTO code etc. You
and your chums informed me I was a Windiot and didn't have a
clue. Finally I am proven right and you come grovelling back. What a
surprise.

Google "comp.os.linux.advocacy social engineering hadron quark" if you
do not believe me.


>
>> What it really comes down to is who is sitting behind the
>> wheel and is doing the driving.
>>
>> What? You're an x Windows user that crossed over to Linux and
>> you are a guru's guru, right?
>
> No, I came out of the CP/M era, early graphic systems, 32 bit
> minicomputers and small embedded systems.

And after Windows appeared and CP/M and Minicomputers vanished?

--
"Poor fishfarb! Pissed because s/h/it doesn't get all the attention s/h/it craves due to wise use of filtering."
-- Sinister Midget <fardb...@gmail.com> trying to impress Willy Filters in comp.os.linux.advocacy

Linux Pimps

unread,
Oct 17, 2008, 8:39:51 PM10/17/08
to
Chris Ahlstrom wrote:
> After takin' a swig o' grog, Chris Ahlstrom belched out
> this bit o' wisdom:
>
>> I don't think that applies to that stingless Bee fscker. Peter, a
>> dignified component? A suit target for intimidating invective?
>
> My god, I really fat-fingered that post. Corrected:
>
> I don't think that applies to that stingless Bee fscker. Peter, a
> dignified opponent? A suitable target for intimidating invective?
>
> Disclaimer: no alcohol involved in the mistaken post.
>

You're just a Linux-Pimp with pimp statictics.

Linux Pimps

unread,
Oct 17, 2008, 8:54:55 PM10/17/08
to
Chris Ahlstrom wrote:
> After takin' a swig o' grog, High Plains Thumper belched out
> this bit o' wisdom:
>
>> Identity the Humongous Asshole wrote:
>>> Let's talk about your damn family. How is that ho your
>>> daughter doing ho-ing on campus?
>> http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/
>>
>> [quote] 7.6 Trespasser Disinformation Tactics [...]
>>
>> [3.] Put your opponent off guard by insulting him. The liberal
>> use of profanity and vulgarisms can be very effective,
>> particularly when used against you more dignified opponents. Your
>> experience as a school yard bully can be handy here. [/quote]
>
> I don't think that applies to that stingless Bee fscker. Peter, a
> dignified component? A suit target for intimidating invective?
>
> Methinks The Bee would rather stir up a hornet's nest.
>

Why are you running around here pimping?

Linux Pimps

unread,
Oct 17, 2008, 8:58:54 PM10/17/08
to

Okay-dokey there you Linux-Pimp and believe me you're doing some fine
pimping I tell you, truly wonderful.

Linux Pimps

unread,
Oct 17, 2008, 9:06:23 PM10/17/08
to
High Plains Thumper wrote:

<snipped>

LOL, LOL and LOL, how long have you been posting it?

On one hand you are a Linux-Pimp. And the on the other hand, you troll
each other in the Amityville.Linux.Advocacy. You troll brainwash each
other.

Linux Pimps

unread,
Oct 17, 2008, 9:08:29 PM10/17/08
to
High Plains Thumper wrote:
>
> No, I came out of the CP/M era, early graphic systems, 32 bit
> minicomputers and small embedded systems.


I don't believe you. You're not believable.

Linux Pimps

unread,
Oct 17, 2008, 9:12:33 PM10/17/08
to
Chris Ahlstrom wrote:
>
> Did I mention yet that The Bee, Mr. Identity Theft, is a feckless moron?
>

Do you really think that I give a shit? Do you really think that you
Linux-Pimp?

Linux Pimps

unread,
Oct 17, 2008, 9:20:30 PM10/17/08
to
Chris Ahlstrom wrote:
> After takin' a swig o' grog, Richard Rasker belched out
> this bit o' wisdom:
>
>> Woops.
>
> Woops:
>

What we have here is two Linux-Pimps doing a fine job of pimping each other.

Linux Pimps

unread,
Oct 17, 2008, 9:24:17 PM10/17/08
to
William Poaster wrote:

<snipped>

It's a Linux-Pimp fly-by. William Rooster at his best, because he can't
face anyone like a real rooster. He has to do William Rooster fly-by(s).

Homer

unread,
Oct 17, 2008, 9:28:01 PM10/17/08
to
Verily I say unto thee, that Leo spake thusly:

> I just wrote on my blog: 10 (real) reasons to use ubuntu linux.

Here's the only reason you need to use GNU/Linux ...

... it's not made by Microsoft.

'Nuff said.

--
K.
http://slated.org

.----
| "At the time, I thought C was the most elegant language and Java
| the most practical one. That point of view lasted for maybe two
| weeks after initial exposure to Lisp." ~ Constantine Vetoshev
`----

Fedora release 8 (Werewolf) on sky, running kernel 2.6.25.11-60.fc8
02:27:44 up 7 days, 11:23, 3 users, load average: 0.00, 0.05, 0.06

Linux Pimps

unread,
Oct 17, 2008, 9:35:52 PM10/17/08
to
Nuff-Said-Homer wrote:
> Verily I say unto thee, that Leo spake thusly:
>
>> I just wrote on my blog: 10 (real) reasons to use ubuntu linux.
>
> Here's the only reason you need to use GNU/Linux ...
>
> ... it's not made by Microsoft.
>
> 'Nuff said.
>

Nuff-Said-Homer another Linux-Pimp strikes-out against the evil empire.

DFS

unread,
Oct 17, 2008, 11:28:47 PM10/17/08
to
Richard Rasker wrote:

> What they apparently mean is this: Microsoft's crappy
> "malicious-software removal tool" was run on 270 million computers,
> finding malware on 5.7 million of those; and 62% of those 5.7 million
> infections (i.e. some 3.5 million) were cases of Trojan Horses.

Of course you mean it's "crappy" because it doesn't reinforce the stupid
lies you lying cola lusers have been blabbing for years - that 50% of
Windows systems are infected.

Turns out the MSRT found malware on just 2.1% of the 270 million systems it
was applied to.

So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and cola the
finger).


btw: here's my just-completed MSRT quick scan:
http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG

DFS

unread,
Oct 18, 2008, 1:33:40 AM10/18/08
to
Homer wrote:
> Verily I say unto thee, that Leo spake thusly:
>
>> I just wrote on my blog: 10 (real) reasons to use ubuntu linux.
>
> Here's the only reason you need to use GNU/Linux ...
>
> ... it's not made by Microsoft.
>
> 'Nuff said.

"It's not Microsoft" would be my top reason, by far, to use Linux/OSS.

Linux Pimps

unread,
Oct 18, 2008, 1:37:21 AM10/18/08
to

I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
far as I could toss a building somewhere.

All these Linux-Pimps, fools and clowns are playing themselves, playing
each other and have pimped themselves into some kind of a belief.

I would say the 3/4 of the crap that's being spewed in this NG, hell,
they can't even believe it themselves, but they have got to back each
other up. :-P

The list is long of those that are the Linux-Pimps.


High Plains Thumper

unread,
Oct 18, 2008, 2:12:37 AM10/18/08
to
Hadron wrote:
> High Plains Thumper <highplai...@invalid.invalid>
> writes:
>
>> Also, good systems administrative practises go a long way to
>> preventing intrusions. Weak passwords, leaked passwords,
>> no passwords, failure to apply security patches in a timely
>> manner, failure to secure unused ports, admittance of
>> administrative rights to those who have no need for it only
>> invite trouble. It makes no difference what the operating
>> system is, if one leaves the back door open, key under the
>> doormat or with untrustworthy neighbors.
>
> Exactly. And Social Engineering. The things I highlighted as
> points of attack ages ago e.g sudo embedded in bash script in
> HOWTO code etc. You and your chums informed me I was a Windiot
> and didn't have a clue. Finally I am proven right and you come
> grovelling back. What a surprise.

Prove what? Do you know what sudo is? I do not recall any
discussions between you and me on bash scripting.

> Google "comp.os.linux.advocacy social engineering hadron
> quark" if you do not believe me.

Be more specific. Comes up with this thread and discussion, then
the usual Hadron rant towards Kohlmann.

>> No, I came out of the CP/M era, early graphic systems, 32
>> bit minicomputers and small embedded systems.
>
> And after Windows appeared and CP/M and Minicomputers
> vanished?

Read your history.

High Plains Thumper

unread,
Oct 18, 2008, 2:16:02 AM10/18/08
to

Who cares what you think? I certainly don't.

High Plains Thumper

unread,
Oct 18, 2008, 2:25:19 AM10/18/08
to
Richard Rasker wrote:
> High Plains Thumper wrote:
>
>> Oh, yeah ....
>>
>> http://www.computerworld.com.au/index.php/id;128348660;fp;16;fpid;1
>>
>> [quote] Vista laid low by new malware figures 27 percent of
>> PCs running Vista compromised by at least one piece of
>> malware John E. Dunn (Techworld.com) 20/05/2008 07:15:10
>
> OK, so Vista is more secure than XP, which boasts a 50+%
> infection rate. But it's a wet paper bag compared to Linux,
> where the first confirmed desktop infection in the wild still
> hasn't been reported.

"Vista laid low" ---> substandard, i.e., no bragging rights.

Roughly 1 out of 4 instead of 1 out of 2. It was a counterpoint
to a troll's take about Vista security.

Linux Pimps

unread,
Oct 18, 2008, 4:47:06 AM10/18/08
to
High Plains Thumper wrote:
> Linux Pimps wrote:
>> High Plains Thumper wrote:
>>>
>>> No, I came out of the CP/M era, early graphic systems, 32
>>> bit minicomputers and small embedded systems.
>>
>> I don't believe you. You're not believable.
>
> Who cares what you think? I certainly don't.
>

You can take CP/M, all the rest your crap and embedded all up your ass
for all I care as to what you have done. You should make sure you grease
first, High Linux-Pimp Grand Poobah.

William Poaster

unread,
Oct 18, 2008, 5:35:18 AM10/18/08
to
On Sat, 18 Oct 2008 00:12:37 -0600, High Plains Thumper wrote:

> Hadron wrote:
>> High Plains Thumper <highplai...@invalid.invalid>
>> writes:
>>
>>> Also, good systems administrative practises go a long way to
>>> preventing intrusions. Weak passwords, leaked passwords,
>>> no passwords, failure to apply security patches in a timely
>>> manner, failure to secure unused ports, admittance of
>>> administrative rights to those who have no need for it only
>>> invite trouble. It makes no difference what the operating
>>> system is, if one leaves the back door open, key under the
>>> doormat or with untrustworthy neighbors.
>>
>> Exactly. And Social Engineering. The things I highlighted as
>> points of attack ages ago e.g sudo embedded in bash script in
>> HOWTO code etc. You and your chums informed me I was a Windiot
>> and didn't have a clue. Finally I am proven right and you come
>> grovelling back. What a surprise.
>
> Prove what? Do you know what sudo is? I do not recall any
> discussions between you and me on bash scripting.

The Quack troll making things up again is it. Not unusual.

>> Google "comp.os.linux.advocacy social engineering hadron
>> quark" if you do not believe me.
>
> Be more specific. Comes up with this thread and discussion, then
> the usual Hadron rant towards Kohlmann.

Quack, ranting? What a surprise...

>>> No, I came out of the CP/M era, early graphic systems, 32
>>> bit minicomputers and small embedded systems.
>>
>> And after Windows appeared and CP/M and Minicomputers
>> vanished?
>
> Read your history.

--
Did you know?
Hadron Quack & his wife divorced over religious differences.
He thought he was God, but she didn't.

Chris Ahlstrom

unread,
Oct 18, 2008, 6:23:15 AM10/18/08
to
After takin' a swig o' grog, High Plains Thumper belched out
this bit o' wisdom:

> Hadron wrote:

Another sleepless night in the Procrustean bed?

>> High Plains Thumper <highplai...@invalid.invalid>
>> writes:
>>
>>> Also, good systems administrative practises go a long way to
>>> preventing intrusions. Weak passwords, leaked passwords,
>>> no passwords, failure to apply security patches in a timely
>>> manner, failure to secure unused ports, admittance of
>>> administrative rights to those who have no need for it only
>>> invite trouble. It makes no difference what the operating
>>> system is, if one leaves the back door open, key under the
>>> doormat or with untrustworthy neighbors.
>>
>> Exactly. And Social Engineering. The things I highlighted as
>> points of attack ages ago e.g sudo embedded in bash script in
>> HOWTO code etc. You and your chums informed me I was a Windiot
>> and didn't have a clue. Finally I am proven right and you come
>> grovelling back. What a surprise.

Pretty pompous and arrogant for a guy who apparently /still/ thinks
that "sudo embedded in a bash script in HOWTO code" is an automatic
way into anything.

>> Finally I am proven right and you come
>> grovelling back.

*LMAO*

> Prove what? Do you know what sudo is? I do not recall any
> discussions between you and me on bash scripting.
>
>> Google "comp.os.linux.advocacy social engineering hadron
>> quark" if you do not believe me.
>
> Be more specific. Comes up with this thread and discussion, then
> the usual Hadron rant towards Kohlmann.

You can watch Hadron "they are hacked on a routine basis" Quark
both brag about stating obvious stuff and show off
his mistaken notions about sudo here:

http://help.lockergnome.com/linux/Simple-Windowsftopic-274113-days0-orderasc-20.html

Jim Richardson, Bob Hauck, and Richard Rasker systematically
dismantle Hadron's "argument".

>>> No, I came out of the CP/M era, early graphic systems, 32
>>> bit minicomputers and small embedded systems.
>>
>> And after Windows appeared and CP/M and Minicomputers
>> vanished?
>
> Read your history.

You forget. Hadron can't read (with comprehension, that is.)

--
If a thing's worth having, it's worth cheating for.
-- W. C. Fields

Hadron

unread,
Oct 18, 2008, 8:57:26 AM10/18/08
to
Linux Pimps <Li...@Pimping.com> writes:

> DFS wrote:
>> Richard Rasker wrote:
>>
>>> What they apparently mean is this: Microsoft's crappy
>>> "malicious-software removal tool" was run on 270 million computers,
>>> finding malware on 5.7 million of those; and 62% of those 5.7 million
>>> infections (i.e. some 3.5 million) were cases of Trojan Horses.
>>
>> Of course you mean it's "crappy" because it doesn't reinforce the
>> stupid lies you lying cola lusers have been blabbing for years -
>> that 50% of Windows systems are infected.
>>
>> Turns out the MSRT found malware on just 2.1% of the 270 million
>> systems it was applied to.
>>
>> So I got'cher "viruses" here (DFS grabs crotch and gives Rasker and
>> cola the finger).
>>
>>
>> btw: here's my just-completed MSRT quick scan:
>> http://www.angelfire.com/linux/dfs0/DFS_MSRT_scan_results.PNG
>>
>>
>>
>
> I wouldn't trust the statistics of some fool Linux-Pimp like Rasker as
> far as I could toss a building somewhere.
>

Rasker has proved himself totally and utterly incompetent when it comes
to ANY form of statistical analysis. Using flawed numbers he applies
flawed algorithms to reach, well, a flawed result.

His inability to even go to Amazon, click on computers, then laptops
then "best selling" was a lesson to all involved at how little he should
be trusted. That combined with all the stories of foul mouthed women on
trains, friends with sons who are amazed at Linux and how he has
revitalised 3rd world PCs, which look like they were extras in
Waterworld, suggests that little, if anything, he posts can be trusted.

--
"Opening slide in movie: - Why Linux Sucks (4 Reasons) [no need to further explain, move along ....]"
-- High Plains Thumper <highplai...@invalid.invalid.com> in comp.os.linux.advocacy

Hadron

unread,
Oct 18, 2008, 9:07:58 AM10/18/08
to
High Plains Thumper <highplai...@invalid.invalid> writes:

> Hadron wrote:
>> High Plains Thumper <highplai...@invalid.invalid>
>> writes:
>>
>>> Also, good systems administrative practises go a long way to
>>> preventing intrusions. Weak passwords, leaked passwords,
>>> no passwords, failure to apply security patches in a timely
>>> manner, failure to secure unused ports, admittance of
>>> administrative rights to those who have no need for it only
>>> invite trouble. It makes no difference what the operating
>>> system is, if one leaves the back door open, key under the
>>> doormat or with untrustworthy neighbors.
>>
>> Exactly. And Social Engineering. The things I highlighted as
>> points of attack ages ago e.g sudo embedded in bash script in
>> HOWTO code etc. You and your chums informed me I was a Windiot
>> and didn't have a clue. Finally I am proven right and you come
>> grovelling back. What a surprise.
>
> Prove what? Do you know what sudo is? I do not recall any
> discussions between you and me on bash scripting.

Erm, yes I do know what sudo is. And it is of paramount importance to
the point I made above. If you do no understand that (and I think you do
understand it) then ask and I will explain.

>
>> Google "comp.os.linux.advocacy social engineering hadron
>> quark" if you do not believe me.
>
> Be more specific. Comes up with this thread and discussion, then the
> usual Hadron rant towards Kohlmann.

"you" == "COLA".

>
>>> No, I came out of the CP/M era, early graphic systems, 32
>>> bit minicomputers and small embedded systems.
>>
>> And after Windows appeared and CP/M and Minicomputers
>> vanished?
>
> Read your history.

I dont need too. One of my first programs was in Z80 on an RML 380Z
machine. Something to filter data for a school physics
experiment. Trivial stuff but exciting at the time. CP/M was nothing
special. And all the halcyon memories dont really change that. For the
time wonderful. Compared to now? Hell, emacs probably has an emulator for
it ....

The question stands. Are you really trying to tell us you had a gaping
void in your career post mid 90s?

Minicomputers were dumped quicker than Shares in Enron from the end of
the 80s. The CPM machines were used as gym vaults in school sporting
events.

--
"His asshole is so reamed out he has room for an oxygen
tank, too."
-- Tattoo Vampire loooking for new accomodation in comp.os.linux.advocacy

Hadron

unread,
Oct 18, 2008, 9:09:16 AM10/18/08
to
High Plains Thumper <highplai...@invalid.invalid> writes:

> Linux Pimps wrote:
>> High Plains Thumper wrote:
>>>
>>> No, I came out of the CP/M era, early graphic systems, 32
>>> bit minicomputers and small embedded systems.
>>
>> I don't believe you. You're not believable.
>
> Who cares what you think? I certainly don't.

The fact that you replied belies it's content.

--
"Off the top of my head, I can't tell you which sites. They are ones that
throw up some kind of dialog, I change the user agent and look at them
again, then move on."
-- Rick <no...@nomail.com> telling lies in comp.os.linux.advocacy

Linux Pimps

unread,
Oct 18, 2008, 10:36:08 AM10/18/08
to

Yes, he is a real pistol.

Peter Köhlmann

unread,
Oct 18, 2008, 10:42:31 AM10/18/08
to
Linux Pimps wrote:

Good thing that you support Hadron Quark. He absolutely needs the support
of "high experience people" like you, I am sure. After all, combined you
two would even outsmart a cockroach...
--
The two most common things in the universe are hydrogen and
stupidity

High Plains Thumper

unread,
Oct 18, 2008, 10:48:58 AM10/18/08
to
Hadron wrote:

> High Plains Thumper writes:
>> Linux Pimps wrote:
>>> High Plains Thumper wrote:
>>>
>>>> No, I came out of the CP/M era, early graphic systems,
>>>> 32 bit minicomputers and small embedded systems.
>>>
>>> I don't believe you. You're not believable.
>>
>> Who cares what you think? I certainly don't.
>
> The fact that you replied belies it's content.

The fact you replied belies your intent to troll.

Linux Pimps

unread,
Oct 18, 2008, 10:50:59 AM10/18/08
to
Peter Köhlmann wrote:
>>>
>> Yes, he is a real pistol.
>
> Good thing that you support Hadron Quark. He absolutely needs the support
> of "high experience people" like you, I am sure. After all, combined you
> two would even outsmart a cockroach...

Why are you Linux-Pimping me, pimp Petey the mutt? You couldn't find
your way out of paper sack if your head was covered with it.

Hadron

unread,
Oct 18, 2008, 10:52:12 AM10/18/08
to
High Plains Thumper <highplai...@invalid.invalid> writes:

> Hadron wrote:
>> High Plains Thumper writes:
>>> Linux Pimps wrote:
>>>> High Plains Thumper wrote:
>>>>
>>>>> No, I came out of the CP/M era, early graphic systems,
>>>>> 32 bit minicomputers and small embedded systems.
>>>>
>>>> I don't believe you. You're not believable.
>>>
>>> Who cares what you think? I certainly don't.
>>
>> The fact that you replied belies it's content.
>
> The fact you replied belies your intent to troll.

You need to look up belies.

http://www.google.com/search?q=belies

--
"It explains a lot. I've not heard of anyone I know, anywhere, buying XP,
and I've not seen it sold whilst I've been in any shops."
comp.os.linux.advocacy - where they put the lunacy in advocacy

Hadron

unread,
Oct 18, 2008, 10:53:27 AM10/18/08
to
Peter Köhlmann <peter.k...@arcor.de> writes:

Not so much going on at the blind kid pistol whipping competition today
then Peter?

Linux Pimps

unread,
Oct 18, 2008, 10:55:21 AM10/18/08
to
High Plains Thumper wrote:
> Hadron wrote:
>> High Plains Thumper writes:
>>> Linux Pimps wrote:
>>>> High Plains Thumper wrote:
>>>>
>>>>> No, I came out of the CP/M era, early graphic systems,
>>>>> 32 bit minicomputers and small embedded systems.
>>>>
>>>> I don't believe you. You're not believable.
>>>
>>> Who cares what you think? I certainly don't.
>>
>> The fact that you replied belies it's content.
>
> The fact you replied belies your intent to troll.
>

But your intent is to be the High-Linux-Pimp-Grand-Poobah.

Moshe Goldfarb.

unread,
Oct 18, 2008, 11:44:25 AM10/18/08
to

Hahahah!
Good one.

Peter got disqualified because he had a smudge on his boots and his bullets
were not in size order.

--
Moshe Goldfarb
Collector of soaps from around the globe.
Please visit The Hall of Linux Idiots:
http://linuxidiots.blogspot.com/
Please Visit www.linsux.org

Moshe Goldfarb.

unread,
Oct 18, 2008, 11:46:57 AM10/18/08
to
On Sat, 18 Oct 2008 15:07:58 +0200, Hadron wrote:


> Erm, yes I do know what sudo is. And it is of paramount importance to
> the point I made above. If you do no understand that (and I think you do
> understand it) then ask and I will explain.

The loons are trying to re-write history again.

High Plains Thumper

unread,
Oct 18, 2008, 12:22:43 PM10/18/08
to
Hadron wrote:
> High Plains Thumper writes:
>> Hadron wrote:
>>> High Plains Thumper writes:
>>>> Linux Pimps wrote:
>>>>> High Plains Thumper wrote:
>>>>>
>>>>>> No, I came out of the CP/M era, early graphic
>>>>>> systems, 32 bit minicomputers and small embedded
>>>>>> systems.
>>>>>
>>>>> I don't believe you. You're not believable.
>>>>
>>>> Who cares what you think? I certainly don't.
>>>
>>> The fact that you replied belies it's content.
>>
>> The fact you replied belies your intent to troll.
>
> You need to look up belies.
>
> http://www.google.com/search?q=belies

<REWIND> The fact you replied [camouflages, cloaks, conceals,
disguises, masks, obscures, deceives, garbles, misleads, twists,
dissembles, feigns] your intent to troll.

High Plains Thumper

unread,
Oct 18, 2008, 12:28:06 PM10/18/08
to
Linux Pimps wrote:
> High Plains Thumper wrote:
>> Hadron wrote:
>>> High Plains Thumper writes:
>>>> Linux Pimps wrote:
>>>>> High Plains Thumper wrote:
>>>>>
>>>>>> No, I came out of the CP/M era, early graphic
>>>>>> systems, 32 bit minicomputers and small embedded
>>>>>> systems.
>>>>>
>>>>> I don't believe you. You're not believable.
>>>>
>>>> Who cares what you think? I certainly don't.
>>>
>>> The fact that you replied belies it's content.
>>
>> The fact you replied belies your intent to troll.
>
> But your intent is to be the High-Linux-Pimp-Grand-Poobah.

This is an example of:

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics

[4.] Be patronizing, condescending and present an air of
superiority. It may hide your inferiority to the casual reader.
Use phrases like "kid" or "son", to elevate your relative
apparent authority by attempting to diminish that of the Linux
advocate you are addressing. [/quote]

Hadron

unread,
Oct 18, 2008, 12:37:41 PM10/18/08
to
High Plains Thumper <highplai...@invalid.invalid> writes:

> Linux Pimps wrote:
>> High Plains Thumper wrote:
>>> Hadron wrote:
>>>> High Plains Thumper writes:
>>>>> Linux Pimps wrote:
>>>>>> High Plains Thumper wrote:
>>>>>>
>>>>>>> No, I came out of the CP/M era, early graphic
>>>>>>> systems, 32 bit minicomputers and small embedded
>>>>>>> systems.
>>>>>>
>>>>>> I don't believe you. You're not believable.
>>>>>
>>>>> Who cares what you think? I certainly don't.
>>>>
>>>> The fact that you replied belies it's content.
>>>
>>> The fact you replied belies your intent to troll.
>>
>> But your intent is to be the High-Linux-Pimp-Grand-Poobah.
>
> This is an example of:
>
> http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

*snip*

This is an example of:


http://linuxidiots.blogspot.com/2007/09/high-plains-thumper-liar.html


--
So how do we destroy Microsoft?

Microsoft is doing the job quite nicely, imploding under its own weight."
-- AZ Nomad <azno...@PremoveOBthisOX.COM> in comp.os.linux.advocacy

High Plains Thumper

unread,
Oct 18, 2008, 12:40:55 PM10/18/08
to

Very childish, very potty mouthed, sounds like the rant of a
scolded disobedient 12 YO.

--
HPT

Hadron

unread,
Oct 18, 2008, 12:43:06 PM10/18/08
to
High Plains Thumper <highplai...@invalid.invalid> writes:

Your reply belies your claimed lack of interest and moral high ground.

This is an example of:

http://linuxidiots.blogspot.com/2007/09/william-poaster-willy-boaster-liar.html

--
"Are Linux systems perfect. Uh, no."
-- Rick <no...@nomail.com> in comp.os.linux.advocacy

Peter Köhlmann

unread,
Oct 18, 2008, 12:41:32 PM10/18/08
to
Hadron wrote:

> High Plains Thumper <highplai...@invalid.invalid> writes:
>
>> Linux Pimps wrote:
>>> High Plains Thumper wrote:
>>>> Hadron wrote:
>>>>> High Plains Thumper writes:
>>>>>> Linux Pimps wrote:
>>>>>>> High Plains Thumper wrote:
>>>>>>>
>>>>>>>> No, I came out of the CP/M era, early graphic
>>>>>>>> systems, 32 bit minicomputers and small embedded
>>>>>>>> systems.
>>>>>>>
>>>>>>> I don't believe you. You're not believable.
>>>>>>
>>>>>> Who cares what you think? I certainly don't.
>>>>>
>>>>> The fact that you replied belies it's content.
>>>>
>>>> The fact you replied belies your intent to troll.
>>>
>>> But your intent is to be the High-Linux-Pimp-Grand-Poobah.
>>
>> This is an example of:
>>
>> http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/
>
> *snip*
>
> This is an example of:
>
>
> http://linuxidiots.blogspot.com/2007/09/high-plains-thumper-liar.html
>
>

Oh, looky looky: Hadron Quark riding to the rescue of the currently most
stupid poster of cola, the brainless nymshifter

It is really heartwarming to swee how cozy you windows fanbois are to each
other, Hadron Quark
--
My other computer is your windows box

Sinister Midget

unread,
Oct 18, 2008, 12:49:38 PM10/18/08
to
On 2008-10-18, High Plains Thumper <highplai...@invalid.invalid> claimed:

Younger. Or also illiterate.

--
Vista: Proof you CAN fool some of the people all of the time.

High Plains Thumper

unread,
Oct 18, 2008, 12:51:56 PM10/18/08
to
Identity wrote:
> High Plains Thumper wrote:
>
>> Following are the automatically notified patches/upgrades
>> installed on my system over the past week:

<SNIP>

>> Commit Log for Thu Oct 9 22:17:44 2008
>>
>> Upgraded the following packages:
>> libruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
>> ruby1.8 (1.8.6.111-2ubuntu1.1) to 1.8.6.111-2ubuntu1.2
>>
>>> Don't worry about 'reviews' by sad little Wintrolls like
>>> "Identity", it's just another angry little mother hating
>>> pre pubescent self declared genius that isn't.
>>
>> Sad is true. His tenor rings of the potty mouthed
>> Linux-sux/ VistaKing troll.
>>
>
> No, I am a human being like you are. I am fan of all O/S(s)
> including Linux, as I have Suse Linux, liked it.
>
> I am not a fan of this chicken-shit NG and the regular Linux
> user in it.

http://www.faqs.org/faqs/linux/advocacy/faq-and-primer/

[quote] 7.6 Trespasser Disinformation Tactics

33. Claim false Alignment. Remind Everyone that you are a
long-time Linux user and advocate. Of course it is not true, so
you will be accused of being what you really are. When that
happens and you are accused of working against Linux. Deny!
Deny! Deny! [/quote]

--
HPT

Hadron

unread,
Oct 18, 2008, 12:53:04 PM10/18/08
to
Peter Köhlmann <peter.k...@arcor.de> writes:

Rescue? I don't give a damn about "Linux Pimps". I am merely replying in
kind to COLA's widely recognised stupidest poster. Namely High Plains
Hypocrite. Only Willy Poaster is more useless.

But good to see you riding in to take the heat off your COLA
equal. Apparently he's a "mini" and "CP/M" guy ....

--
"It's perhaps inevitable that some professionals would paint their status
as being somehow superior to those of the amateurs, after all, they're
trying to get paid."
-- Mark Kent <mark...@demon.co.uk> mouthing off in comp.os.linux.advocacy, comp.sys.mac.advocacy, comp.unix.solaris

Clogwog

unread,
Oct 18, 2008, 1:19:01 PM10/18/08
to
"High Plains Thumper" <highplai...@invalid.invalid> schreef in bericht
news:gdd3in$3vk$1...@news.albasani.net...

You replied, so 12 YO's might attract you?
Do you know ChrisV an den Bergh?
--
Linux..... isn't that some kind of cheap lavatory tissue?
http://www.angelfire.com/psy/doctorbill/linux.jpg


Linux Pimps

unread,
Oct 18, 2008, 1:44:26 PM10/18/08
to
High Plains Thumper wrote:

<snipped>

It's just shameful activity, huh, there High-Linux-Pimp-Poobah?

Phil Da Lick!

unread,
Oct 18, 2008, 1:46:18 PM10/18/08
to
Identity wrote:
> DFS wrote:
>> Identity wrote:
>>> Phil Da Lick! wrote:
>>
>>>> Thats because you're lying or stupid.
>>> What about you? You're no bed of roses that I have seen, make believe
>>> IT director at a printing press.
>>
>> Don't talk about Hyp Da Crite! like that. He knows how to click a
>> Windows button and send a job to the printer.
>>
>
> LOL
>
> Yes, I know. His company mission critical spreadsheet payroll, other
> games, tools, water dispenser and auto flushing toilets are powered by
> the big *L*. That way, there is a less chance of the big *L* being
> hacked as an office facing solution.

None of those are mission critical you raging dipshit.

Phil Da Lick!

unread,
Oct 18, 2008, 1:47:03 PM10/18/08
to
DFS wrote:
> Identity wrote:
>> Phil Da Lick! wrote:
>
>>> Thats because you're lying or stupid.
>> What about you? You're no bed of roses that I have seen, make believe
>> IT director at a printing press.
>
> Don't talk about Hyp Da Crite! like that. He knows how to click a Windows
> button and send a job to the printer.

A wintroll in a linux advocacy group calling a linux advocate a
hypocrite. Priceless.

Linux Pimps

unread,
Oct 18, 2008, 1:53:11 PM10/18/08
to
Peter Köhlmann wrote:
>
> Oh, looky looky: Hadron Quark riding to the rescue of the currently most
> stupid poster of cola, the brainless nymshifter
>
> It is really heartwarming to swee how cozy you windows fanbois are to each
> other, Hadron Quark


Oh look, Petey at being brain dead Petey the Linux-Pimp mutt, and he is
as smart as a dead piece of wood, as he chases. He buries his head deep
up other Linux-Pimps John Brown behind parts, nice and cozy.

It is loading more messages.
0 new messages