Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Analysis of Dexter Malware Uncovers Mystery Man, and Links To Zeus

timothy posted about 2 years ago | from the herra-not-named-in-indictment dept.

Crime 119

chicksdaddy writes "The newly discovered Dexter malware is one of the few examples of a malicious program that targets point of sale terminals, but also communicates, botnet-like, with a command and control infrastructure. According to an analysis by Seculert, the custom malware has infected 'hundreds POS systems' including those operated by 'big-name retailers, hotels, restaurants and even private parking providers.' Now a detailed analysis by Verizon's RISK team suggests that Dexter may be a creation of a group responsible for the ubiquitous Zeus banking Trojan. By analyzing early variants of Dexter discovered in the wild, Verizon determined that the IP addresses used for Dexter's command and control were also used to host Zeus-related domains and several domains for Vobfus, also known as 'the porn worm,' which has been used to deliver the Zeus malware. Verizon also produced some tantalizing clues as to the identity of one individual who may be a part of the crew responsible for the malware. The RISK team linked the domain registration for a Dexter C&C server to an unusual online handle, 'hgfrfv,' that was used to post a number of suggestive help requests ('need help with decrypting a table encrypted with EncryptByKey') in online technical forums, where a live.com e-mail address was also provided. The account name was also linked to a shell account on the outsourcing web site freelancer.com, which lists 'hgfrfv' as an individual residing in the Russian Federation."

Sorry! There are no comments related to the filter you selected.

POS Termials (3, Interesting)

Anonymous Coward | about 2 years ago | (#42306457)

You can keep your own systems safe, and even use one-off CC#'s for online purchases, but you can't verify that retailers' POS equipment is clean (you'll probably be tossed out of the store just for asking). When in public use cash. Lets just hope you can trust the ATM's that you use.

Re:POS Termials (0)

Anonymous Coward | about 2 years ago | (#42306477)

Where I live, having cash with you would be even more risky! I'll take my chances.

Re:POS Termials (0)

Anonymous Coward | about 2 years ago | (#42306497)

Where I live you'd be called a terrorist for using cash. After all everyone knows it is a bit harder to track.

Why (0)

Anonymous Coward | about 2 years ago | (#42307927)

..don't you call the GESTAPO people when they bitch about cash. Ask them whether they want your ID, too.

Look for the Windows start button (2, Interesting)

Anonymous Coward | about 2 years ago | (#42306511)

Just look for the Windows icon in the bottom let corner of any of the running terminals. When they're using these POS POS machines, it's invariably the Windows ones that are the problem. They're typically Windows Embedded, but nobody ever turned off all the parts because of the dependencies.

So you'll see it's just a cheap PC, running an old version of Windows, connected across the stores crappy unsecure Wifi which probably talks to the software vendor across the open internet.

So, if you see the Windows logo on the terminal, just pay cash or leave the store, but don't hand your CC over.

Oh, and the same goes for ATMs, the insecure ones are things like Diebolds, and I wish I could find the video of one that crashed, and so somebody started up media player on it and had it play a tune.

http://thetartan.org/2004/3/22/scitech/brokenatmturnedintojukebox

At some point, the manufacturers have to held liable for the incompetence products they put out.

Re:Look for the Windows start button (1)

dotancohen (1015143) | about 2 years ago | (#42306521)

Just look for the Windows icon in the bottom let corner of any of the running terminals. When they're using these POS POS machines, it's invariably the Windows ones that are the problem.

In the recent Barnes & Noble POS attack, the actual hardware was compromised. No word on what OS was behind it, though.

Re:Look for the Windows start button (0)

Anonymous Coward | about 2 years ago | (#42306877)

So you are blaming apple for the pos attack. how dare you infer.
1. Your apple has already been compromised, same with cpm, and machine language, to atta cks by the russian programmers, olgigarchs, or mob . Who have been assisted by the very good chinesse programmers, with help from the anti apple, anti windoow, and such. But the banks, allowed this to happen. They get paid by the Respective countries to "siphon" off the monies, monies to them are the green god, not your carbon sink trees.

Re:Look for the Windows start button (1)

machine321 (458769) | about 2 years ago | (#42306897)

So you'll see it's just a cheap PC, running an old version of Windows, connected across the stores crappy unsecure Wifi which probably talks to the software vendor across the open internet.

That is absolutely not possible. They're PCI certified!

Re:Look for the Windows start button (1)

gman003 (1693318) | about 2 years ago | (#42307137)

Meh. Call me when they're PCI Express certified.

Re:Look for the Windows start button (0)

Anonymous Coward | about 2 years ago | (#42308857)

PCI compliance is such a scam. The 3rd companies just do a port scan against the outside IP to make sure nothing is open. The rest is a survey you fill out that asks all kinds of questions that may or may not have anything to do with whether or not you've taken appropriate precautions.

Someone is paying for that service, one way or another, and it's often mandatory. And yet it can promise nothing in the way of security.

Come to think of it... I should have started one of those BS companies.

Re:Look for the Windows start button (1)

Darundal (891860) | about 2 years ago | (#42308335)

Tons of POS software goes fullscreen on launch. Looking for a Windows logo won't help you most of the time.

Re:POS Termials (1)

grumpy_old_grandpa (2634187) | about 2 years ago | (#42306567)

> Lets just hope you can trust the ATM's that you use.

No, you cannot. I've lost count of how many times my cards have been skimmed and defrauded in various ways. Luckily, I have not taken any loss myself, but it is still a hassle to report, renew the cards, etc.

If you are really paranoid about these things, you'll have to use cash as you said, but go inside the bank to withdraw your money. On a regular basis, that's probably even more hassle, and also puts you at risk of being mugged.

As always, security is a trade-off and compromise between a whole set of different attack vectors vs. convenience and ease of use of the security measures. There is no way to make it perfect, and we will just have to continue updating the security systems and practises as new threads emerge. Also, the same solutions will not fit all; each will have to judge for himself what is the best combination of security vs. convenience.

Re:POS Termials (2)

ickleberry (864871) | about 2 years ago | (#42306693)

They're called POS terminals for a reason ;)

Re:POS Termials (0)

Anonymous Coward | about 2 years ago | (#42309479)

I have an old XP Celeron, that damn thing is definitely a POS.

Re:POS Termials (1)

ArchieBunker (132337) | about 2 years ago | (#42307455)

I remember the days when POS terminals were a glorified calculator. Making them out of cheap PCs did not make anything better.

Re:POS Termials (2)

tlhIngan (30335) | about 2 years ago | (#42311441)

You can keep your own systems safe, and even use one-off CC#'s for online purchases, but you can't verify that retailers' POS equipment is clean (you'll probably be tossed out of the store just for asking). When in public use cash. Lets just hope you can trust the ATM's that you use.

So... the big problem is that someone will capture your credit card number?

I don't know, but I don't think that's exactly a good hack - after all, you're legally protected if someone uses your credit card without your authorization. Either you spot a strange transaction and call your bank (and they reverse it and send you a new number), or you get a call about some flagged transaction. Either way, you're not out any money at all.

And these days, most places take the chip, so the POS terminal can't even get at the number (it's usually even a separate pad with minimal communications so even if the terminal is hacked, it can't get at the actual number).

Of course, given how everyone argues about how crappy credit cards are ... I guess enjoy it until you're forced to use debit cards only that don't necessarily have those protections...

O NOSE !! A FUCKING DIRTY RUSSIAN IS INVOLVED ?? (-1)

Anonymous Coward | about 2 years ago | (#42306489)

WHo could have thought that first time ?? Maybe Vlad 'I suck duze blood, yes?' Putin needs more geld !!

Question: How do get my employer aware? (1)

Anonymous Coward | about 2 years ago | (#42306501)

So I work at a large grocery store. How do I get my IT department up to date on this issue?. We have been compromised in the past and I have been noticing some strange things showing up on my terminals.

Re:Question: How do get my employer aware? (4, Interesting)

allaunjsilverfox2 (882195) | about 2 years ago | (#42306649)

So I work at a large grocery store. How do I get my IT department up to date on this issue?. We have been compromised in the past and I have been noticing some strange things showing up on my terminals.

If your IT department isn't already on top of it, you have much bigger problems.

Re:Question: How do get my employer aware? (0)

Anonymous Coward | about 2 years ago | (#42315657)

So I work at a large grocery store. How do I get my IT department up to date on this issue?. We have been compromised in the past and I have been noticing some strange things showing up on my terminals.

If your IT department isn't already on top of it, you have much bigger problems.

give me all your cash muuuahhahahahaaaa!

Re:Question: How do get my employer aware? (0)

Anonymous Coward | about 2 years ago | (#42310675)

Start by telling them that you're seeing "strange things showing up" on the terminals.

But please be prepared to describe it in more detail than, "strange things", if at all possible. Few things are less useful than, "Hey man my shit is all fucked up. Can you fix it? Derp hurr derp."

Lcreation? (0)

Anonymous Coward | about 2 years ago | (#42306513)

What's that?

Re:Lcreation? (1)

VortexCortex (1117377) | about 2 years ago | (#42308559)

Lcreation what's that?

It's a hold over from that horrible Hungarian Notation that Win32 coders are famously stuck with (hint: Win32 is still used on 64bit systems, 32 apparently means "not 16 bit").
Careful not to confuse the L prefix here with Long; In this context it means Local.

...Dexter may be a local creation of a group responsible...

When will they ever learn?! (1, Troll)

erroneus (253617) | about 2 years ago | (#42306539)

Using Windows for anything that requires security is just stupid!

Putting a Windows server on the internet is a generally accepted "bad idea." Putting a Windows machine onto the internet without being crippled with anti-ware and a multitude of filters is a "bad idea" which invariably still leads to compromises because anti-ware and filters will never be enough.

And someone wants to put Windows into ATMs and POS machines?! And people BUY them?!

"I don't want to live on this planet any more."

When will YOU ever learn, troll? (3, Informative)

Anonymous Coward | about 2 years ago | (#42306663)

Current history shows Linux doesn't do so well in that role (small wonder you were down modded as a troll erroneous ):

2012:

New Linux Rootkit Emerges:

https://threatpost.com/en_us/blogs/new-linux-rootkit-emerges-112012 [threatpost.com]

"A new Linux rootkit has emerged and researchers who have analyzed its code and operation say that the malware appears to be a custom-written tool designed to inject iframes into Web sites and drive traffic to malicious sites for drive-by download attacks. The rootkit is designed specifically for 64-bit Linux systems."

---

'FIRST ever' Linux, Mac OS X-only password sniffing virus spotted:

http://www.theregister.co.uk/2012/08/29/linux_mac_trojan/ [theregister.co.uk]

---

Medicaid hack update: 500,000 records and 280,000 SSNs stolen:

http://www.zdnet.com/blog/security/medicaid-hack-update-500000-records-and-280000-ssns-stolen/11444 [zdnet.com]

So, what's dts.utah.gov running everyone?

LINUX (and yes, it got HACKED) -> http://uptime.netcraft.com/up/graph?site=dts.utah.gov [netcraft.com]

What's health.utah.gov running too??

YOU GUESSED IT: LINUX AGAIN -> http://uptime.netcraft.com/up/graph?site=health.utah.gov [netcraft.com]

* Ah, yes - see the YEARS OF /. "BS" FUD is CRUMBLING AROUND THE PENGUINS EARS HERE & 2012's starting out just like 2011 did below!

===

2011:

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (that's VERY bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins:

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org] , & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS:

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach:

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture... along with the fact that YES, there ARE BOTNETS, VIRUSES, TROJANS, and more, ON LINUX - as well as it being THE FAVORED TARGET of spammers/phishers, shown just above and here on botnets:

---

Linux webserver botnet pushes malware - Attack of the open source zombies

http://www.theregister.co.uk/2009/09/12/linux_zombies_push_malware/ [theregister.co.uk]

---

By this point @ least those running Macs have FINALLY ADMITTED they too, can be compromised, since even Apple doesn't say what they used to in their ads/commercials anymore ("we can't get viruses" - what a load of B.S. that was!).

Plenty of the "Fortune 100-500" run Windows Servers 24x7 non-stop in "Fabled '5-9's" uptime too!

(Would you like a listing of some of them? Just ask - & "ye shall receive"...)

APK

P.S.=> Linux Security Blunders DOMINATE in 2011-2012, despite all /. "FUD" for years saying "Linux = SECURE" (what "b.s."/FUD that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Re:When will YOU ever learn, troll? (3, Insightful)

cmdr_tofu (826352) | about 2 years ago | (#42306999)

I think what you are seeing is web-applications hosted on Linux being hacked. Apache and MySQL run on Windows too although the WAMP stack is harder to keep updated than the LAMP stack.

But I don't disagree with you. Hosting applications on Linux does not make them ecure. It takes a lot of time and energy. The same is true for Windows. The iframe-injecting kernel module that you linked to is really quite interesting.

Where the rubber meets the road, I think Linux and BSD still win in performance, security and manageability, but you are correct, the margins are a lot slimmer. Windows Server 2008 is not Windows 95 or XP.

At least YOU have some sense (0)

Anonymous Coward | about 2 years ago | (#42307077)

"I don't disagree with you." - by cmdr_tofu (826352) on Sunday December 16, @10:00AM (#42306999) Homepage

It'd be hard not to! Per my subject-line above? You have a sensible outlook @ least. That's the "thing" that has bugged me on THIS particular website to NO END: "FUD"...

I don't "hate Linux" either!

In fact - I rather LIKE it, especially KDE bearing distros, like KUbuntu...

I just didn't like how Mr. Shuttleworth & Canonical are "running" from RMS' statement regarding LOCAL DISK-BOUND QUERIES GOING OUT TO REMOTE SERVERS OF THEIRS!

That's like putting a surveillance camera into our homes essentially & I see RMS' point...

Additionally - I wasn't 'crazy about' how the "pr flaks" from Canonical are using "std. pr flak technique #101" of *trying* to "cut down" RMS rather than disprove his points:

---

PERTINENT QUOTE/EXCERPT:

"Instead of addressing the queries raised by Stallman http://linux.slashdot.org/story/12/12/07/1527225/rms-speaks-out-against-ubuntu [slashdot.org] [slashdot.org] and the EFF, Canonical is now pushing for making Ubuntu a shopping cart"

---

(Sure - Many folks consider RMS a bit odd by THEIR standards, but then again, who isn't? We're all "weird" to one another - we're NOT THE SAME in all things is why, thank goodness... however, his personal habits etc./et al are NOT in question here. His findings are... & we SEE the results!))

---

"Hosting applications on Linux does not make them ecure." - by cmdr_tofu (826352) on Sunday December 16, @10:00AM (#42306999) Homepage

True, and you're correct below also... it's the SAME on any given platform in computing really!

These companies... were I they? (MS, Apple, Linux distros galore)?

I'd send out MY OS totally "secured"/"security-hardened" & I MEAN any & ALL ways in or out, shutoff...

(Then, I'd tell the user - "You open this, this can happen, but you assume responsibility doing so").

Yes, it IS doable (SeLinux, Windows multiple methods & layers for "layered-security"/"defense-in-depth" etc./et al). Just takes time, & effort, as you stated. Worth it? Yes. Absolutely.

---

"It takes a lot of time and energy." - by cmdr_tofu (826352) on Sunday December 16, @10:00AM (#42306999) Homepage

It does, & that's ONLY OS SIDE ALONE (which I've been doing since, oh, 1996 or thereabouts, for Windows users online).

E.G. -> To "immunize" a Windows system, I effectively use the principles in "layered security" possibles!

http://www.bing.com/search?q=%22HOW+TO+SECURE+Windows+2000%2FXP%22&go=&form=QBRE [bing.com]

I.E./E.G.-> I have done so since 1997-1998 with the most viewed, highly rated guide online for Windows security there really is which came from the fact I also created the 1st guide for securing Windows, highly rated @ NEOWIN (as far back as 1998-2001) here:

http://www.neowin.net/news/apk-a-to-z-internet-speedup--security-text [neowin.net]

& from as far back as 1997 -> http://web.archive.org/web/20020205091023/www.ntcompatible.com/article1.shtml [archive.org] which Neowin above picked up on & rated very highly.

That has evolved more currently, into the MOST viewed & highly rated one there is for years now since 2008 online in the 1st URL link above...

Which has well over 500,000++ views online (actually MORE, but 1 site with 75,000 views of it went offline/out-of-business) & it's been made either:

---

1.) An Essential Guide
2.) 5-5 star rated
3.) A "sticky-pinned" thread
4.) Most viewed in the category it's in (usually security)
5.) Got me PAID by winning a contest @ PCPitStop (quite unexpectedly - I was only posting it for the good of all, & yes, "the Lord works in mysterious ways", it even got me PAID -> http://techtalk.pcpitstop.com/2007/09/04/pc-pitstop-winners/ [pcpitstop.com] (see January 2008))

---

Across 15-20 or so sites I posted it on back in 2008... & here is the IMPORTANT part, in some sample testimonials to the "layered security" methodology efficacy:

---

SOME QUOTED TESTIMONIALS TO THE EFFECTIVENESS OF SAID LAYERED SECURITY GUIDE I AUTHORED:

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=2 [xtremepccentral.com]

"I recently, months ago when you finally got this guide done, had authorization to try this on simple work station for kids. My client, who paid me an ungodly amount of money to do this, has been PROBLEM FREE FOR MONTHS! I haven't even had a follow up call which is unusual." - THRONKA, user of my guide @ XTremePcCentral

AND

"APK, thanks for such a great guide. This would, and should, be an inspiration to such security measures. Also, the pc that has "tweaks": IS STILL GOING! NO PROBLEMS!" - THRONKA, user of my guide @ XTremePcCentral

AND

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=3 [xtremepccentral.com]

"Its 2009 - still trouble free! I was told last week by a co worker who does active directory administration, and he said I was doing overkill. I told him yes, but I just eliminated the half life in windows that you usually get. He said good point. So from 2008 till 2009. No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008. Great stuff! My client STILL Hasn't called me back in regards to that one machine to get it locked down for the kid. I am glad it worked and I am sure her wallet is appreciated too now that it works. Speaking of which, I need to call her to see if I can get some leads. APK - I will say it again, the guide is FANTASTIC! Its made my PC experience much easier. Sandboxing was great. Getting my host file updated, setting services to system service, rather than system local. (except AVG updater, needed system local)" - THRONKA, user of my guide @ XTremePcCentral

---

"The same is true for Windows." - by cmdr_tofu (826352) on Sunday December 16, @10:00AM (#42306999) Homepage

Absolutely - & again: THAT IS ONLY "OS-SIDE", then you HAVE to (or should) look @ code running on your system, line-by-line if need be & if possible in what you've written @ least, to secure it also.

Especially what YOU personally create...

---

* In any event, again - At least YOU show that you possess common-sense, not "FUD"...

That's a LOT MORE than I can say for some of the "FUD Spreaders" around here (like 'erroneOus' I replied to - he's KNOWN for that type of bullshit/fud)...

APK

P.S.=> BIT OF AN INTERESTING "TIDBIT" FOR YOU on the note of WAMP vs. LAMP you can verify:

"Apache and MySQL run on Windows too although the WAMP stack is harder to keep updated than the LAMP stack." - by cmdr_tofu (826352) on Sunday December 16, @10:00AM (#42306999) Homepage

Did you know that EWeek magazine did a test, & it was on webserver performance, with MS stacks, *NIX stacks, & combined/mixed ones... know who won out?

WAMP!

See here -> http://www.eweek.com/c/a/IT-Management/eWEEK-Labs-IT-Stack-Tests/1/ [eweek.com]

However - & I've even STATED this here recently (in the programmer's section -> http://tech.slashdot.org/comments.pl?sid=3308821&cid=42257481 [slashdot.org] regarding error-handling code):

I'll take secure, stable, & solid code over "fast code only", any day of the week... why? Well - all the SPEED IN THE WORLD doesn't matter, if you're only heading toward a "crash/err/abend" faster...

... apk

... apk

Windows Is Terminally Screwed (0)

Anonymous Coward | about 2 years ago | (#42307901)

Your paymasters in Redmond worship a single God. The God Of Money.

Everything is subordinate to that single god. Customer's security certainly is subordinate to Quarterly Revenues. How do you get more revenue next quarter ? By releasing new features. By releasing something which looks polished but is a spaghetti heap of stinking worms underneath.

"Let's ship now and fix the 7500 bugs we added with this release in something between 1 month and 1 decade"

THAT is the Microsoft attitude and nothing has changed.

That sounds like "OS fanatic zealotry" (0)

Anonymous Coward | about 2 years ago | (#42308009)

Thin on substance & "off" to-the-max (especially regarding me):

"releasing something which looks polished but is a spaghetti heap of stinking worms underneath. "Let's ship now and fix the 7500 bugs we added with this release in something between 1 month and 1 decade" THAT is the Microsoft attitude and nothing has changed." - by Anonymous Coward on Sunday December 16, @01:35PM (#42307901)

Hmmm. Linux keeps patching too. Does it stop bugs or exploits? No! ANDROID IS THE "PRIME EXAMPLE THEREOF" in fact... look NO further.

* However, & in THEIR defense? They're trying, just like MS does... & things ARE getting better!

So - Is MS "slow" about it? Slower than Linux, yes, however, they DO do their "patch tuesdays" every 2nd Tuesday of the month!

NOW: Have YOU ever personally worked for a LARGE company?

If you have, & I have (fortune 100/500 types)?

Things MOVE SLOWLY in those "elephants"... it's called "red tape bureaucracy"! Getting ANYTHING done travels thru MANY layers of approval.

Still - I think that user education's MORE IMPORTANT though - Heck it is the MOST important thing!

(Hence the security guides I've been putting out for Windows users @ least, since 1997 online -> http://www.google.com/search?hl=en&tbo=d&output=search&sclient=psy-ab&q=%22HOW+TO+SECURE+Windows+2000/XP%22&btnG=Submit&gbv=1&sei=CBnOUIiIIIHP0wGOz4D4AQ [google.com] & yes, those "layered-security"/"defense-in-depth" measures DO help... )

APK

P.S.=> Lastly: Sorry, but I am my OWN "paymaster" who runs his own show - I don't work for, or receive monies from, Microsoft, vs. your erroneous statement, here:

"Your paymasters in Redmond worship a single God. The God Of Money. Everything is subordinate to that single god." - by Anonymous Coward on Sunday December 16, @01:35PM (#42307901)

Wrong... see above.

---

"Customer's security certainly is subordinate to Quarterly Revenues. How do you get more revenue next quarter ? By releasing new features. By releasing something which looks polished but is a spaghetti heap of stinking worms underneath." - by Anonymous Coward on Sunday December 16, @01:35PM (#42307901)

See above...

Me? Well... sorry, but, I just tell it how it is, ala -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42306663 [slashdot.org]

(Though YOU may not *like* it? It is, how it is... fact!)

... apk

Re:When will YOU ever learn, troll? (1)

morcego (260031) | about 2 years ago | (#42307199)

Hosting applications on Linux does not make them ecure. It takes a lot of time and energy. The same is true for Windows.

Thank you. I'm a unix guy, and have been using Linux since kernel 0.97. And I hate when people say thing like that, implying that just because it is in Linux, it is secure. It is not, and it takes a lot of work and knowledge to make any computer, running any OS, secure.

The different is that Linux will help you, while Windows will hinder your efforts.

How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42307263)

"The different is that Linux will help you, while Windows will hinder your efforts." - by morcego (260031) on Sunday December 16, @10:53AM (#42307199)

Specify/Elucidate that statement... I will counter, point-by-point.

* The rest of your statement I can & do agree with... ala:

"I hate when people say thing like that, implying that just because it is in Linux, it is secure. It is not, and it takes a lot of work and knowledge to make any computer, running any OS, secure." - by morcego (260031) on Sunday December 16, @10:53AM (#42307199)

As do I, which is WHY I posted what I did to "erroneOus" (a KNOWN "Pro-*NIX" FUD spreading troll around here for YEARS) -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42306663 [slashdot.org]

Concrete, verifiable, & UNDENIABLE DOCUMENTED FACTS, vs. erroneOus' pure "FUD"!

Why I confront you on the above, is because of your statement I quoted there now

Well... you seem to be contradicting yourself!

(OR, you just aren't familiar enough with Windows internals since you're an ADMITTED "unix man", & that's ok too - perhaps this discussion can "enlighten you" on those grounds!)

APK

P.S.=> Thanks for replying... I can learn by this, so can others, everyone gains!

... apk

Re:How's Windows "hinder your efforts"? (3, Insightful)

theskipper (461997) | about 2 years ago | (#42307413)

Lemme guess...this morning you found a Dunkin Donuts "Buy 1 coffee get 10 free" coupon? ;)

Re:How's Windows "hinder your efforts"? (-1)

Anonymous Coward | about 2 years ago | (#42307435)

Let me state a fact - you're an off topic troll.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42307925)

Naa that's just how apk is. He never makes sense ;)
Always making claims that no one else makes, then trying to refute them.

This is just another example of that. No one claims Linux is 100% secure, but he states this as fact.
He then refutes his made up fact with points all over the map, and then posts a conclusion that is barely relevant to the rest of his posting, let alone the article he is posting under.

Highly entertaining though, especially if you just let your eyes glaze over it (which I'm pretty sure is his intent)
It's a pretty interesting insight into the inner workings of the mind of a 14 year old with the standard 90's attention span.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308027)

Looks like APK asked a question you avoid here http://it.slashdot.org/comments.pl?sid=3319303&cid=42307263 [slashdot.org]

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308077)

You can find questions in what APK writes?

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308101)

You can find questions in what APK writes?

Yes. Can't you read troll? See subject here http://it.slashdot.org/comments.pl?sid=3319303&cid=42307263 [slashdot.org] The question is explicit. You avoid it. It's that or you prove yourself illiterate. Your choice. Try to be on topic next time troll. End of story.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308123)

Look at your subject line. It restated apk's question. Learn to read.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308235)

Again, you see a question in that? Just because it is formed as a question doesn't mean it's a real question.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308455)

The meaning's explicit directed at poster apk replied to. Obviously a question. You're obviously stupid or trolling.

Re:How's Windows "hinder your efforts"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42359717)

And you're obviously apk trying (and doing a REALLY poor job) to pretend that you're somebody else that's agreeing with apk.

That's why you never log in, isn't it? Because it would be blatantly obvious if you accidentally posted a "APK asked you a question which you ran away from, STUPID TROLL!" comment under your apk account.

You think this way makes it impossible to tell, but there's only one poster on /. that has your arrogant, abusive posting style, so it's pretty obvious that you're apk, and you're attempting to fake many AC posters that "agree" with you to put on appearances of this mass horde of people that, by agreeing with you, means you must be correct.

So not only are you pathetically faking supporters, demonstrating a perfect example of an appeal to the majority fallacy, but since even in your deluded little world, they're all ACs, you're also committing a false attribution fallacy in your arguments.

Grow up. Nobody really gives a shit what you say. Although you are funny to read sometimes, what with your frothing-at-the-mouth verbiage.....

Re:How's Windows "hinder your efforts"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42309643)

You're replying to an AC. How would you know APK asked that question of him?
Speaking of which...I love how EVERY single post that backs up APK by pointing out "avoided questions" that people didn't answer, is posted by an AC,just like APK himself.
Here's a hint, APK: Just because somevody didn't answer your "question" doesn't mean they're avoiding it. Maybe it's just such a stupid, rambling question that it doesn't deserve an answer, or it's so fscking obvious to those of us *without* extreme ADHD that the rest of us assume that it's rhetorical....

LOL - how many times've I "blown YOU away"? (0)

Anonymous Coward | about 2 years ago | (#42344219)

Funny you ran after trying to put words in my mouth I never said http://it.slashdot.org/comments.pl?sid=2282088&cid=36731660 [slashdot.org]

* Would you like more examples of the times I've trashed you here, cbiltcliffe?

(I've got tons more... lol, tons!)

APK

P.S.=> There's no QUESTION that fool's avoiding what I said, so what's your point, fool? Are you trying to "amuse me", again, @ YOUR expense?? Yes, obviously... apk

Re:LOL - how many times've I "blown YOU away"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42355183)

I didn't run.

If you can wrap your brain around reality for a few minutes, you'll notice that slashdot locks discussions, preventing any new replies after the story's been posted for a few weeks. Not exactly sure how long it is, but it's not forever.

When I went back to read your delusional response to my last post, the discussion was locked, and I couldn't reply.

But that would interfere with your delusions of grandeur, so you'd never admit to it, even if you knew that happened.

Interestingly, nobody else seems to have problems finding the words that I *didn't* put in your mouth, because you *did* actually say them. It's only in your alternate reality that you didn't.

Re:LOL - how many times've I "blown YOU away"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42360075)

Really? You're still going on about an argument you lost badly nearly a year an a half ago?

Since you keep harping on this insistence that you didn't say something you blatantly did, here are your exact words:

P.S.=> Besides, there isn't a botnet (or even ROOTKIT) I can't deal with effectively for removal anyhow - & I don't use the same tools others do...

Well, @ first I do, & when those fail? Out come the "big guns" in Process Explorer & Recovery Console - & there's nothing I can't "dust" between them... ... apk

They're from this post:
http://it.slashdot.org/comments.pl?sid=2282088&cid=36618008 [slashdot.org]

You directly say you use Process Explorer to get rid of rootkits when other tools fail. It's not even implied. You said it, outright. Maybe you didn't mean it (although I think you did, because instead of clarifying what you said, you've instead tried desperately to state that you didn't, in fact, say it), but there's no question you said it.

So why don't you take your damaged brain back to whatever warped reality you reside in when you're not trolling slashdot, and lick your wounds. Make sure they're all healed, because next time they'll be much deeper.....

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42346123)

This does stupid. Learn to read http://it.slashdot.org/comments.pl?sid=3319303&cid=42307263 [slashdot.org]

Re:How's Windows "hinder your efforts"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42355417)

That's a post by an AC, claiming to be APK. That's not somebody defending APK with a logged in account.
Maybe you need to learn to read, rather than me....

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42346155)

Read your subject line. Who wrote it 1st here? APK. You're stupid.

Re:How's Windows "hinder your efforts"? (1)

cbiltcliffe (186293) | about 2 years ago | (#42355225)

Unless APK's/your questions are directed at the entire world (which, given his/your level of delusion, wouldn't surprise me) then who asked the question is completely irrelevant. It's who it was asked *of* that matters, as that was what Mr. AC-defender-of-APK stated.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42313533)

Is apk the same guy as hairyfeet? He's certainly got a similar style (or lack thereof).

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42322537)

I don't think so. Writing styles are very different to me.
harryfeet is more of a jerk troll, apk is more of a crazy adhd troll.

At least harryfeet can formulate a coherent idea (I just often disagree with him)

apk can't even parse a sentence, and his mind jumps back and forth multiple times even in the same sentence. Its clear he is just astroturfing.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42341405)

George Bastida the blackmailer otherwise known as erroneus http://slashdot.org/comments.pl?sid=3324585&threshold=-1&commentsort=0&mode=thread&pid=42328081

HELLO OAKGOOF! (0)

Anonymous Coward | about 2 years ago | (#42344233)

We know it's your Oakgrove (or rather, oakgoof, lol).

Restating a fact (0)

Anonymous Coward | about 2 years ago | (#42308151)

You're an off topic troll. You downmodding my stating it before http://it.slashdot.org/comments.pl?sid=3319303&cid=42307435 [slashdot.org] = ineffectual. I just post it again since it is fact and watch you scramble to attempt to "bury" it, and I laugh. Too early for that troll. You fail.

Re:Restating a fact (1)

theskipper (461997) | about 2 years ago | (#42308815)

I stand corrected, it wasn't coffee. It must have been a coupon for Steve's Hand-Crafted Meth Emporium.

Stand? You got knocked on your ass (0)

Anonymous Coward | about 2 years ago | (#42309335)

So much for "stand corrected" - More failing off topic illogical ad hominem attacks? /. trolls = weak. A fact http://it.slashdot.org/comments.pl?sid=3319303&cid=42308151 [slashdot.org] is still a fact. You are an off topic troll. Fact.

Re:How's Windows "hinder your efforts"? (3, Insightful)

degeneratemonkey (1405019) | about 2 years ago | (#42307415)

All I can say is that your mode of communication is too erratic to be worth engaging. Reading your posts is a lot like jamming a screwdriver into my eyes.

Don't like it? (-1)

Anonymous Coward | about 2 years ago | (#42307423)

Don't read it. It's above your off topic troll comprehension level anyway, troll.

Don't like it? (0)

Anonymous Coward | about 2 years ago | (#42308641)

Don't read it. It's above your off topic troll comprehension level anyway troll. Your down mod of this comment before when I posted it once already, for common-sense, in response to your tripe http://it.slashdot.org/comments.pl?sid=3319303&cid=42307423 [slashdot.org] ? Troll, it was effete and ineffectual. I just post it again, watch you scramble to downmod to try hide it, and I laugh.

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42311061)

opinions vary. see rating of +3 informative here http://it.slashdot.org/comments.pl?sid=3319303&cid=42306663 [slashdot.org]

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308327)

"The different is that Linux will help you, while Windows will hinder your efforts." - by morcego (260031) on Sunday December 16, @10:53AM (#42307199)

Specify/Elucidate that statement... I will counter, point-by-point.

* The rest of your statement I can & do agree with... ala:

I beg you pardon. I'm not the guy you were talking, but as you seem to be willing to give some pointers I would like to know where I do find of standard Windows installation following tools and facilities:

1) /proc filesystem and all the information I can get from there of the running system and program or programs I'm interested.

2) lsof - (list open files & sockets and states of those, don't suggest netstat *nix has it too, but it old and sucks badly.

3) strace & ltrace connecting a program and seeing what it's upto, with capablity to follow forks etc.

4) tcpdump - surely you know this, but what's the equivalent tool in standard Windows to provide same data?

5) I would also appreciate that I would have when need to delve quite deep in libraries, kernel and especially startup of the system so that I can locate a problem and fix it. Just to let you know, I've done that quite bit, but not too much any more past 10 years. Before that I did some work with numerous system softare pieces, fixing problems once I found them and also added features that were lacking (much of the ideas was picked from Solaris, HP-UX and Irix which were still ahead of the curve then). Now If I would like to fix things with Windows like that wouldn't it that I don't have source avablabe, withouth huge cost and abiltity spread patches hindering this a bit?

6) from my opinion, 25+ years of deep experience of many OS's the windows up to its last incarnation (8) is by far the messiest* OS ever and if that doesn't count hindering you, making system run well and safe, what does?

*) if you disagree, please explain in plain language where we can find (no NDA bound documents) the windows filesystem and registry organization for windows OS and why when you install application software or system modules you end up such a mess and when trying to remove a program(s) you really cant' be sure that nothing was left behind but just the log entries indicating that such and such software was once loaded and then removed. What's the excuse letting system be swamped by installing programs like that, oh and if you thing that it's a problem of the application and sloppy coding not the windows itself think again, think hard. Why this works quite nicely on other platforms with decent packaging system and you can find quite easily which configuration was changed, which binaries and filesystem objects that came via packaging system don't match. With a bit of scripting you can find and extract any filesystem objects that didn't come via any package etc.

OK, that's enough I don't go this time to DLL naming and why COFF/PE as outdated executable a bad thing (relocations ....) .

Simply answering that you can get all that with shelling out huge amounts of money to m$, signing NDA and buying a huge pile of third party programs just don't cut and is lame. The point here, in my mind, is that windows as it comes in a box or downloaded doesn't help you much when you run in problems. The good point with Linux is that you have all the tools etc. available right away no additional cost, and not hindering you go solve the problems right away if you just have the skills to use the tools availabe. Windows doesn't have those tools and thus it hinders, IMHO.

Cheers,

ac

Be more specific on #1, here are rest... apk (0)

Anonymous Coward | about 2 years ago | (#42308415)

What in that list of yours can't I do with Windows or tools that are freeware that run on Windows, hmmm?

---

1.) Per my subject-line above - HERE, be specific (hence my asking, I will show specifics in return)

2.) TcpView by MS (Nir Sofer of NIRSOFT has a similar tool also, iirc) both free

3.) netstat &/or TcpView noted above (freeware by MS)

4.) TCPDUMP for Windows - http://www.google.com/search?hl=en&tbo=d&output=search&sclient=psy-ab&q=tcpdump+and+Windows&btnG=Submit&gbv=1&sei=Vi3OUNW-AuSQ0QHy4IDYAQ [google.com]

5.) To this one? I'm not impressed... "been there, done that" as long as you (& I'd bet I can show MORE for it too). PLUS? DO SEE BELOW for my thoughts on that... more than just thoughts. Fact.

6.) I don't like it either... here, I am with you. Windows 7 64-bit for me, for now @ least.

---

IN REGARDS TO #5 above - specifics on how "Open 'SORES'" can 'backfire' on you:

Open "SORES" code also leads to something YOU DON'T SEE apparently:

That IF you have the sourcecode, it is FAR EASIER TO step trace in a compiler or debugger to FIND ERRORS IN IT, than it is with closed source (that needs fuzzers &/or disassemblers - MUCH harder to use).

* Think those with malicious intent, ala malware makers/botnet masters, etc.-et al, don't know that too? Trust me, they do... it's just that Linux on PC's &/or Servers only have what? A 1-2% share of market on PC desktops & perhaps a 50/50 split on Servers (which my init. post SHOWS being attacked more & more currently 2011-2012), but what shows it BEST as to how they think?

ANDROID (which yes, IS A LINUX)

It's getting "nuked" almost every week now!

Why?

Simple rule ("channel-your-inner-criminal" for this one):

WHAT IS MOST USED = WILL BE MOST ATTACKED!

(Since ANDROID rules the smartphone, toppling iOS recently? There's your proof of that statement from me!)

APK

P.S.=> Getting you down to "brass tacks" specifics with my initial question above HERE, since the original poster didn't reply back...THEN? I am going to "hit you" with things YOUR "OS WEAPON OF CHOICE" can't do, or do as well, in response (fair is fair)

... apk

Re:How's Windows "hinder your efforts"? (0)

Anonymous Coward | about 2 years ago | (#42308453)

One more for the road.

Would you mind showing how to do Policy Based Routing (PBR) with Windows server?

Justification: For example. It's nice to have a separate management interface and services on the other interface. With PBR you can set up (Linux) routing so that the default route points out (unless running dynamic routing) the gateway at the side where you have services running and handle requests. But then in additon you have route tables and policy in place that if the packets came via the management interface the the answers will also be sent via that interface. With firewall then you add rules that the management is allowed only via that separate management interface.

[root@xxx~]# ip route
172.16.4.85 via 172.16.5.1 dev eth0
172.16.253.0/28 dev eth1 proto kernel scope link src 172.16.253.10
172.16.5.0/26 dev eth0 proto kernel scope link src 172.16.5.55
default via 172.16.253.1 dev eth1
[root@xxx ~]#

This is from a live system that has been set up like that since 2005.

How do you do same with Windows?

TIA,

ac

Don't run away now... apk (0)

Anonymous Coward | about 2 years ago | (#42308521)

Answer (I trashed you point by point here already) -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

I'll be waiting...

LMAO!

Honestly? it was FUNNY doing the above vs. yourself point-by-point vs. your EASILY "blown away" 6 points in fact!

You, with your "25 yrs of experience" (lol, did you *think* you were talking to kids here boy? WRONG, been there, done that too & again - I'd wager with MORE SUCCESSFUL RESULTS THAN YOU EVER HAD I can show here), easily!

APK

P.S.=> Since you "blew off" my points vs. yours above? Same here, for now:

ABOVE ALL ELSE - Want to know what Windows DID and Linux can't?

Take the lion's share of market on PC desktops + Servers COMBINED a pay for ware, VS. a freebie no less (defying business logic in fact, but showing CLEARLY what folks think & know, is better, overall)...

That's what (for starters), lol!

... apk

Re:Don't run away now... apk (0)

Anonymous Coward | about 2 years ago | (#42308779)

I don't think you answered to that PBR question already.

Also if you ever looked and beyond that knew how useful /proc is under Linux when you are in trouble (running out of resources, tuning the system, salvaging file accideltally deleted but still recoverable because program using it was not quitted yet etc.) so many things that where most of the stuff under /proc is very usefull and an I haven't found anything like that so easy to use from windows.

It might be that the environments where you been working you are free to download and install any program you find from the net but it's not complete story. Once you work for military, big telecoms datacenters etc. where everything needs to be approved and be auditable you get the idea that you want a system with rich variety of tools which all come with the distro and you can use those without special and long lasting approvals even if you are going to get the permission to install something else is a real matter.

I don't disagree with the matter that plenty of linux boxes are being penetrated, but most of that because incompetence of the maintaing the system, running patches and installing badly written crap software with php etc.

I think the question was that wether Windows hinders you more (than Linux) having a well kept and secure system or not and IMHO it does, as it does not come prepackaged with the distribution more trusted software and you need to rely on third party software from net and that is a risk unless you absolutely can trust the software as much as the OS distributor.

ps. I'm not going to talk details what've done past 25 years or else I could as well login here and I don't (my id is below 80k but I seldom use it), all I could tell is that I've built and worked with such a large and complex systems that are only with large multinational companies have and need.

Annihilating you AGAIN, point-by-point (0)

Anonymous Coward | about 2 years ago | (#42309033)

"I don't think you answered to that PBR question already." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

Now that YOU answered, I will as I said I would: That type of advanced routing & the data branchings are done by network hardware vendors like Cisco.

I.E.-> Using route-map config in IOS you can influence normal routing done by lookup to the routing table.

See here -> http://www.cisco.com/en/US/docs/ios/12_0/qos/configuration/guide/qcpolicy.html [cisco.com] Configuring Policy-Based Routing

MORE IMPORTANTLY - because of your attempts @ "patronizing me", boy?

You evaded questions here -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

Especially @ the very end of THAT post, completely...

Additionally: I utterly BURNED YOU here, point-by-point & rather easily -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

(Answer me that...)

---

"Also if you ever looked and beyond that knew how useful /proc is under Linux when you are in trouble (running out of resources, tuning the system, salvaging file accideltally deleted but still recoverable because program using it was not quitted yet etc.) so many things that where most of the stuff under /proc is very usefull and an I haven't found anything like that so easy to use from windows." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

Really? Never heard of taskmgr.exe?? How about ProcessExplorer.exe??? Both are MS products, & come with the OS &/or are free MS tools respectively.

FACT - since you're showing us that much already:

You don't KNOW your Windows that well!

---

"It might be that the environments where you been working you are free to download and install any program you find from the net but it's not complete story." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

WTF? AGAIN - Quit *trying* to play "senior" & patronize/look down your nose @ ME, BOY!

I doubt you can prove you've been there...

ME? I've actually worked for Lockheed Martin (before that when they were GE), the U.S. Military, & more in the Fortune 100-500 on contracts, as both a system admin, tech, + developer since 1994 professionally.

You came in here, talking your "25 yrs. of bullshit" as far as I am concerned - since you are UNWILLING TO BACK IT UP below...

(My guess? You can't... and you KNOW it!).

---

"Once you work for military, big telecoms datacenters etc." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

See above blowhard... & quit trying to "patronize me", Mr. nobody "ne'er-do-well" that's done zero he can show for his words!

Hell - You can't even BACKUP your b.s. below!

Evasions & patronizing me? I strongly DISLIKE your attitude... especially trying to "patronize me" from someone that can't back up their b.s. & face it:

YOU fucked up LARGE, here -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

---

"I think the question was that wether Windows hinders you more (than Linux) having a well kept and secure system or not" - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

Are you HIGH? Did you see my 1st post?? "Great Security there" (not) -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42306663 [slashdot.org]

Securing Windows is EASIER than working with SeLinux imo, & my opinion ACTUALLY HAS SOMETHING BEHIND ITL

I literally WROTE THE FIRST & OLDEST GUIDE FOR END USERS FOR IT:

http://www.google.com/search?hl=en&tbo=d&output=search&sclient=psy-ab&q=%22HOW+TO+SECURE+Windows+2000/XP%22&btnG=Submit&gbv=1&sei=PU7OUJmlL8uy0AHrqICoBg [google.com]

That goes back as far as 1996 to present day... how about YOU?

(Zero, as per your usual thusfar??)

That's for end users, for servers? It's harder, but NOT THAT MUCH SO @ the OS & network levels, not really - it's moreso vetting apps!

---

"and IMHO it does" - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

Your opinion is weak, & shown as so, already (not just opinion, but FACT since you didn't realize a few things you said are EASILY DOABLE ON WINDOWS) -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

---

"as it does not come prepackaged with the distribution more trusted software and you need to rely on third party software from net and that is a risk unless you absolutely can trust the software as much as the OS distributor." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

LMAO - KERNEL.ORG was compromised - did you NOT READ THAT?

Trust that?? LMAO... no way.

---

"ps. I'm not going to talk details what've done past 25 years or else I could as well login here and I don't (my id is below 80k but I seldom use it), all I could tell is that I've built and worked with such a large and complex systems that are only with large multinational companies have and need." - by Anonymous Coward on Sunday December 16, @04:52PM (#42308779)

Face it/Again - YOU CAN'T & YOU KNOW IT (I know it, now...? Everyone else does too!)

Anyone can "talk a good game", but deeds ARE where it's at.

APK

P.S.=> You trying to "patronize me", boy? I'd put up a tiny list of things I'd done (that I'd say I did while you were still in DIAPERS, but you're around MY age so I can't) from only a TINY partial list of my favorites (not even my best stuff, that came in industrial environs in fact), that YOU wouldn't be able to touch I'd almost wager...Why?

Mainly since I've done it SO MANY TIMES here, not a single person has shown me more or better (& especially earlier) in the art & science of computing!

Not that there aren't those kinds of folks here, there are... 1's a hero of mine (Mr. Carmack) & others contributed to the IP stack itself...

.. apk

"1 more 4 the road", tit-for-tat... apk (0)

Anonymous Coward | about 2 years ago | (#42308551)

Can you show me that Linux is as EASILY managed in volume configurations for networks as Windows is with Active Directory & Group Policies?

* Samba MIGHT be a way for SOME things, but not for "everything" & not natively!

(Yes, Good Ole' Linus T. & Penguin crew have built MORE SUPPORT into AD support into the latest kernel & correct me IF I am off here - it also REQUIRES SAMBA 4 iirc, but it's NOT native, and not the 'real thing', and it IS "doing what MS does" instead of their OWN toolset!)

MOST IMPORTANTLY:

Who's "Following whom" there, playing "catch up ball"? Looks like Linux is... not MS.

APK

P.S.=> Oh, don't worry - I've got more... easy ones, like what provides more games for users? Windows. Huge market there... what is easier to administrate?? Windows, hands-down...

... apk

Re:When will YOU ever learn, troll? (1)

VortexCortex (1117377) | about 2 years ago | (#42308587)

Hosting applications on Linux does not make them ecure.

It depends on the application. For instance: If you've got a bad case of the MS vendor-lock-in, then the option of hosting on Linux may very well be an eCure.

Re:When will YOU ever learn, troll? (0)

Anonymous Coward | about 2 years ago | (#42308601)

Or not. That can go either way, depending on application.

Re:When will YOU ever learn, troll? (1)

erroneus (253617) | about 2 years ago | (#42309055)

Two problems:

1. You just responded to APK. I am really and truly sorry for what happens to people who respond to APK. His paranoid imagination and school-boy level of maturity does not allow him to understand that people simply don't care what he has to say. It is always a fight to him... most often to some imaginary form of death.
2. Yes. Linux can be insecure. But it actually takes work to MAKE it insecure these days. Have you ever wrestled with SELinux? It's on by default in most current Linux distros these days meaning that you can't even run a web server without explicitly allowing it through SELinux or without turning SELinux off. Either way, the user is the one who weakened the OS.

One huge difference between Linux [and others] and Windows is that with Windows, one hack pretty much fits all. This is not generally the case with Linux. Also, you really have to trust Microsoft to have a system which is not naturally vulnerable. That has not ever happened for any amount of time as far as I have seen. Linux puts people in control at a level Microsoft Windows will not. The user can even recompile the kernel in order to add or remove anything they need. Vulnerabilities can be patched on the same day problems are identified. Users of Windows have to wait until the patch is released most of the time and ... well, sometimes Microsoft doesn't issue patches for known issues for a very long time for various reasons.

Re:When will YOU ever learn, troll? (0)

Anonymous Coward | about 2 years ago | (#42309071)

You're right. APK destroys em point by point. Example here http://it.slashdot.org/comments.pl?sid=3319303&cid=42308415 [slashdot.org]

Remember YOU trying to BLACKMAIL ME here? (0)

Anonymous Coward | about 2 years ago | (#42309173)

"1. You just responded to APK. I am really and truly sorry for what happens to people who respond to APK." - by erroneus (253617) on Sunday December 16, @05:51PM (#42309055) Homepage

You should - see my subject-line above, nooby wussboy, and my ps below especially (which REALLY showed you're a complete noob).

You were already downmoderated to hell already -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42306539 [slashdot.org]

(Saw that go from -1 troll, to 0 troll over 6++ hours now & it's obvious you're using alternate registered accounts to mod it up, because everyone KNOWS that what you wrote there's COMPLETE bullshit - just like what's in my ps below that "shot down" your rookie-noob b.s. in the post before it!)

However: I'll finish you off MORE, per my subject-line above!

Erroneus annihilated (NASDAQ vs. his b.s. lies) -> http://slashdot.org/comments.pl?sid=1681772&cid=32556164 [slashdot.org]

(Talking STALE out of date information & falsehoods in that entire exchange... what'd that lead to? See next... lol!)

THIS LITTLE GOOF ERRONEUS EVEN TRIED TO "BLACKMAIL ME", see proof here -> http://slashdot.org/comments.pl?sid=2261720&cid=36545928 [slashdot.org]

That's against LAWS erroneus. It also SHOWED by your reaction, that I "beat your ass" so badly, you *tried* to "scare me off"... did it work? No, & did you get your butt kicked?? Absolutely.

Here again?

You and your ac troll pals FAIL as per usual vs. myself, because off-topic ad hominem attacks are merely illogical b.s.

Yes ... just like you, noob (I say noob, because of your other post here noted below - if you don't know THAT? You're a noob, nothing more...).

"His paranoid imagination and school-boy level of maturity does not allow him to understand that people simply don't care what he has to say." - by erroneus (253617) on Sunday December 16, @05:51PM (#42309055) Homepage

Your attempting to blackmail me, for TRASHING YOUR NOOB LEVEL OF UNDERSTANDING IN COMPUTING (yet again, albeit earlier than today now again)?? Real mature, boy... lol, you noob.

SPECIFICALLY IN REGARDS TO WHAT YOU JUST SAID ALSO (ala nobody cares what I write here)? YOU FAILED THEIR NOW BADLY, since upward moderations show QUITE otherwise:

I'll put it into the thread RIGHT below this one, to keep it "cleaner" here (because the point below was my fav here today vs. your b.s. boy)

See my reply to myself, vs. your crap above now!

APK

P.S.=> Funniest one was this, in THIS VERY THREAD, which shows me you are STILL A NOOB worse than the other posts above -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42308339 [slashdot.org]

... apk

Facts list vs. ERRONEOUS' Fictions & blackmail (0)

Anonymous Coward | about 2 years ago | (#42309219)

"His paranoid imagination and school-boy level of maturity does not allow him to understand that people simply don't care what he has to say." - by erroneus (253617) on Sunday December 16, @05:51PM (#42309055) Homepage

Funny - 100's of upward moderations show QUITE otherwise:

Roughly 233++ of them & I post as AC (hard to get even +1, as /. hides our posts & we "AC"'s start @ ZERO/0 points, unlike registered "lusers", lol!):

+5 'modded up' posts by "yours truly" (8):

HOSTS & BGP:2010 -> http://tech.slashdot.org/comments.pl?sid=1901826&cid=34490450 [slashdot.org]
FIREFOX IN DANGER: 2011 -> http://news.slashdot.org/comments.pl?sid=2559120&cid=38268580 [slashdot.org]
TESLA:2010 -> http://science.slashdot.org/comments.pl?sid=1872982&cid=34264190 [slashdot.org]
TESLA:2010 -> http://tech.slashdot.org/comments.pl?sid=1806946&cid=33777976 [slashdot.org]
NVIDIA 2d:2006 -> http://hardware.slashdot.org/comments.pl?sid=175774&cid=14610147 [slashdot.org]
Ubuntu Linux sends back local disk query strings to CANONICAL: 2012 -> http://news.slashdot.org/comments.pl?sid=3304601&cid=42234351 [slashdot.org]
Question to Mr. Mark Shuttleworth @ UBUNTU/CANONICAL: 2012 -> http://news.slashdot.org/comments.pl?sid=3304725&cid=42243467 [slashdot.org]
COMPUTER ASSOCIATES BUSTED FOR ACCOUNTING FRAUD:2010 -> http://news.slashdot.org/comments.pl?sid=1884922&cid=34350102 [slashdot.org]

----

+4 'modded up' posts by "yours truly" (5):

APK SECURITY GUIDE:2005 -> http://developers.slashdot.org/comments.pl?sid=167071&cid=13931198 [slashdot.org]
INFO. SYSTEMS WORK:2005 -> http://slashdot.org/comments.pl?sid=161862&cid=13531817 [slashdot.org]
WINDOWS @ NASDAQ 7++ YRS. NOW:2009 -> http://tech.slashdot.org/comments.pl?sid=1290967&cid=28571315 [slashdot.org]
CARMACK'S ARMADILLO AEROSPACE:2005 -> http://science.slashdot.org/comments.pl?sid=158310&cid=13263898 [slashdot.org]
What I admire about Theo DeRaadt of BSD fame: 2012 -> http://linux.slashdot.org/comments.pl?sid=3007641&cid=40785151 [slashdot.org]

----

+3 'modded up' posts by "yours truly" (7):

APK MICROSOFT INTERVIEW:2005 -> http://developers.slashdot.org/comments.pl?sid=155172&cid=13007974 [slashdot.org]
APK MS SYMBOLIC DIRECTORY LINKS:2005 -> http://it.slashdot.org/comments.pl?sid=166850&cid=13914137 [slashdot.org]
APK FOOLS IE7 INSTALL IN BETA HOW TO:2006 -> http://slashdot.org/comments.pl?sid=175857&cid=14615222 [slashdot.org]
PROOFS ON OPERA SPEED & SECURITY:2007 -> http://slashdot.org/comments.pl?sid=273931&cid=20291847 [slashdot.org]
HBGary POST in Fake Names On Social Networks, a Fake Problem:2011 -> http://tech.slashdot.org/comments.pl?sid=2375110&cid=37056304 [slashdot.org]
APK RC STOP ROOKIT TECHNIQUES:2008 -> http://it.slashdot.org/comments.pl?sid=1021873&cid=25681261 [slashdot.org]
Elevator Algorithm for harddisk drives #2 of 2 (1st's in +1): 2012 -> http://hardware.slashdot.org/comments.pl?sid=3287917&cid=42158041 [slashdot.org]

----

+2 'modded up' posts by "yours truly" (20):

CODING FOR DEFCON (my compressed/packed exe + sizecheck @ startup technique): 2005 -> http://it.slashdot.org/comments.pl?sid=158231&cid=13257227 [slashdot.org]
HOW DLL API CALL LOADS WORK:2008 -> http://tech.slashdot.org/comments.pl?sid=1001489&cid=25441395 [slashdot.org]
WERNER VON BRAUN - A Nazi Scientist used by U.S.A. for rocketry: 2011 -> http://science.slashdot.org/comments.pl?sid=1957608&cid=34933062 [slashdot.org]
APK TRICK TO STOP A MALWARE:2008 -> http://tech.slashdot.org/comments.pl?sid=1010923&cid=25549351 [slashdot.org]
DOING SHAREWARE 1995-2004:2007 -> http://it.slashdot.org/comments.pl?sid=233779&cid=19020329 [slashdot.org]
MHTML SECURITY BUG FIX IE:2011 -> http://tech.slashdot.org/comments.pl?sid=1973914&cid=35056454 [slashdot.org]
EXCEL SECURITY FIX:2009 -> http://it.slashdot.org/comments.pl?sid=1139485&cid=26974507 [slashdot.org]
CODING JOBS OFFSHORING:2007 -> http://slashdot.org/comments.pl?sid=245971&cid=19760473 [slashdot.org]
WE SHOULD PENALIZE & TAX JOB OUTSOURCERS/OFFSHORERS: 2008 -> http://yro.slashdot.org/comments.pl?sid=978035&cid=25176841 [slashdot.org]
BOGUS POLITICIAN PERFORMANCE: 2008 -> http://yro.slashdot.org/comments.pl?sid=978035&cid=25176955 [slashdot.org]
MS PUTS YOU TO WORK:2006 -> http://it.slashdot.org/comments.pl?sid=174759&cid=14538593 [slashdot.org]
ARSTECHNICA & JEREMY REIMER LOL:2008 -> http://it.slashdot.org/comments.pl?sid=1021733&cid=25675515 [slashdot.org]
CYBERSECURITY LEGISLATIONS:2011 -> http://yro.slashdot.org/comments.pl?sid=2222868&cid=36379698 [slashdot.org]
FILTERING ONLINE:2010 -> http://politics.slashdot.org/comments.pl?sid=1790178&cid=33610372 [slashdot.org]
APK ON PLANTED SHILLS BY TELECOM/ISP/BSP:2010 -> http://tech.slashdot.org/comments.pl?sid=1827308&cid=33940988 [slashdot.org]
TAX THE TAR OUT OF OUTSOURCERS/OFFSHORERS & PENALIZE THEM ALSO #1 of 2: 2012 -> http://yro.slashdot.org/comments.pl?sid=2795637&cid=39728333 [slashdot.org]
HBGary & Chinese Water Army b.s. posted: 2012 -> http://developers.slashdot.org/comments.pl?sid=2615084&cid=38662598 [slashdot.org]
OPERA & MULTITHREADED DESIGN: 2007 -> http://slashdot.org/comments.pl?sid=290711&cid=20506147 [slashdot.org]
MICROSOFT "FLIPS THE SCRIPT" ON CISPA: 2012 -> http://yro.slashdot.org/comments.pl?sid=2817555&cid=39833573 [slashdot.org]
LEARN CODING IN A DAY: 2012 -> http://developers.slashdot.org/comments.pl?sid=3048265&cid=40986085 [slashdot.org]

----

+1 'modded up' posts by "yours truly" (133) & we AC's start at ZERO, not 1 or 2 like registered users on /. do:

APK SSD/RamDrive/RamDisk usage since 1996:2008 -> http://tech.slashdot.org/comments.pl?sid=1014349&cid=25591403 [slashdot.org]
DISASSEMBLY & PROTECTING CODE:2010 -> http://news.slashdot.org/comments.pl?sid=1719570&cid=32907418 [slashdot.org]
APK ON RESERVED PORTS IN WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=235621&cid=19229493 [slashdot.org]
MEMORY FRAGMENTATION: 2007 -> http://slashdot.org/comments.pl?sid=367219&cid=21434061 [slashdot.org]
NORTON DNS & DNSBL:2011 -> http://yro.slashdot.org/comments.pl?sid=2311948&cid=36708742 [slashdot.org]
IRON FILESYSTEMS:2007 -> http://it.slashdot.org/comments.pl?sid=359507&cid=21347933 [slashdot.org]
APK ROOTKIT KILLING TECHNIQUE USING RC:2011 -> http://tech.slashdot.org/comments.pl?sid=2428486&cid=37405530 [slashdot.org]
APK STOPPED CONFICKER BEFORE ANYONE DID:2009 -> http://it.slashdot.org/comments.pl?sid=1159209&cid=27178753 [slashdot.org]
APK ON WINDOWS DFS vs. LINUX COPYING FEATURES LIKE IT:2008 -> http://ask.slashdot.org/comments.pl?sid=447752&cid=22361236 [slashdot.org]
WINDOWS #CPU's SUPPORTED (much higher now in Win7/Srv2k8 now, 256):2009 -> http://hardware.slashdot.org/comments.pl?sid=1160287&cid=27191729 [slashdot.org]
DISK DEFRAG STRATEGY OPTIONS:2011 -> http://it.slashdot.org/comments.pl?sid=2435272&cid=37443738 [slashdot.org]
APK PART OF ULTRADEFRAG64 PROOF:2011 -> http://it.slashdot.org/comments.pl?sid=2435272&cid=37443252 [slashdot.org]
DATASTRUCTURES & SQL:2011 -> http://news.slashdot.org/comments.pl?sid=2080454&cid=35794668 [slashdot.org]
BINARY HEAPS:2010 -> http://developers.slashdot.org/comments.pl?sid=1686094&cid=32581292 [slashdot.org]
CACHE COHERENCY:2005 -> http://hardware.slashdot.org/comments.pl?sid=168793&cid=14070783 [slashdot.org]
DELPHI ROCKS VB/VC++:2007 -> http://it.slashdot.org/comments.pl?sid=236049&cid=19261269 [slashdot.org]
MEMORY FRAGMENTATION IN FF:2007 -> http://slashdot.org/comments.pl?sid=367219&threshold=-1&commentsort=0&mode=thread&cid=21434061 [slashdot.org]
CODING PROFESSIONALLY:2005 -> http://developers.slashdot.org/comments.pl?sid=170925&cid=14238424 [slashdot.org]
MULTIPLE MESSAGE QUEUES:2010 -> http://linux.slashdot.org/comments.pl?sid=1618508&cid=31847246 [slashdot.org]
APK ROOTKIT.COM ON WINDOWS VISTA IPSTACK SECURITY:2009 -> http://tech.slashdot.org/comments.pl?sid=1339085&cid=29106629 [slashdot.org]
USING CSC & SCIENCE TOGETHER IN ACADEMIA:2010 -> http://ask.slashdot.org/comments.pl?sid=1531366&cid=30971224 [slashdot.org]
PROGRAMMING CONCEPTS MORE IMPORTANT THAN SYNTAX:2009 -> http://tech.slashdot.org/comments.pl?sid=1314993&cid=28827429 [slashdot.org]
SSD DECADES OF USAGE:2009 -> http://hardware.slashdot.org/comments.pl?sid=1273501&cid=28375697 [slashdot.org]
CODING .NET FROM VB:2006 -> http://developers.slashdot.org/comments.pl?sid=176229&cid=14641701 [slashdot.org]
LAMP SECURITY:2011 -> http://it.slashdot.org/comments.pl?sid=2243006&cid=36462748 [slashdot.org]
SLASHDOT "Pro-*NIX" SLANT CONTROVERSY = GOOD:2005 -> http://slashdot.org/comments.pl?sid=154725&cid=12974078 [slashdot.org]
WINDOWS vs. IBM vs. LINUX ARCHITECTURE STEALING:2005 -> http://linux.slashdot.org/comments.pl?sid=160244&cid=13414756 [slashdot.org]
ADBANNERS & VIRUSES:2005 -> http://slashdot.org/comments.pl?sid=169309&cid=14112880 [slashdot.org]
SECURITY BUGS LINUX vs. WINDOWS:2011 -> http://news.slashdot.org/comments.pl?sid=2247480&cid=36485068 [slashdot.org]
NYSE+LINUX STOCK EXCHANGE LIE BY PENGUINS:2010 -> http://linux.slashdot.org/comments.pl?sid=1842764&cid=34046376 [slashdot.org]
APK ON PROCESSEXPLORER & NETSTAT:2009 -> http://ask.slashdot.org/comments.pl?sid=1328371&cid=28981169 [slashdot.org]
COMPLETION PORTS + SCHEDULING LINUX vs. WINDOWS:2005 -> http://linux.slashdot.org/comments.pl?sid=160290&cid=13419053 [slashdot.org]
WINDOWS vs. LINUX SECURITY ISSUES:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26948399 [slashdot.org]
LINUX IMITATING WINDOWS:2005 -> http://linux.slashdot.org/comments.pl?sid=170126&cid=14177851 [slashdot.org]
LINUX SERVING DUQU ROOTKIT: 2011 -> http://it.slashdot.org/comments.pl?sid=2551740&cid=38215752 [slashdot.org]
WINDOWS vs. Linux SECURITY VULNS UNPATCHED:2011 -> http://it.slashdot.org/comments.pl?sid=2077414&cid=35776848 [slashdot.org]
WINDOWS vs. Linux vs. Mac SECURITY VULNS UNPATCHED:2010 -> http://it.slashdot.org/comments.pl?sid=1681772&cid=32524188 [slashdot.org]
APK Windows vs. Linux on UNPATCHED SEC. VULNS:2011 -> http://it.slashdot.org/comments.pl?sid=2059420&cid=35656126 [slashdot.org]
PROOF MS HAD LESS BUGS THAN LINUX/MACOS X:2005 -> http://it.slashdot.org/comments.pl?sid=173564&cid=14442403 [slashdot.org]
PROOF MS HAD LESS BUGS THAN LINUX/MACOS X:2006 -> http://it.slashdot.org/comments.pl?sid=173016&cid=14398069 [slashdot.org]
LINUX & JAVASCRIPT ETC.:2009 -> http://it.slashdot.org/comments.pl?sid=1266651&cid=28307523 [slashdot.org]
APK USING KDE & LINUX:2010 -> http://linux.slashdot.org/comments.pl?sid=1750240&cid=33214838 [slashdot.org]
APK CONGRATS TO LINUX:2005 -> http://linux.slashdot.org/comments.pl?sid=170296&cid=14192885 [slashdot.org]
APK KUDOS TO LINUX:2005 -> http://slashdot.org/comments.pl?sid=162921&cid=13614370 [slashdot.org]
LINUX WENT DOWN 2x in LESS THAN 1 YEAR @ London Stock Exchange:2011 -> http://linux.slashdot.org/comments.pl?sid=1999478&cid=35231358 [slashdot.org]
LINUX SECURITY vs. JAVASCRIPT:2010 -> http://yro.slashdot.org/comments.pl?sid=1820234&cid=33892258 [slashdot.org]
CONGRATS TO LINUS TORVALDS ON MILLENIUM PRIZE: 2012 -> http://linux.slashdot.org/comments.pl?sid=2913441&cid=40308721 [slashdot.org]
KUDOS TO LINUX KERNEL 3.3 - 3.5 & NO BUGS PRESENT: 2012 -> http://linux.slashdot.org/comments.pl?sid=2995701&cid=40727067 [slashdot.org]
GENETICS PLAYING WITH GOD'S ENGINEERING on mice: 2011 -> http://science.slashdot.org/comments.pl?sid=2581286&cid=38423712 [slashdot.org]
1 GOOD THING ABOUT HACKER/CRACKERS:2011 -> http://yro.slashdot.org/comments.pl?sid=1982796&cid=35119212 [slashdot.org]
MINIMUM WINDOWS SERVICES:2005 -> http://slashdot.org/comments.pl?sid=157321&cid=13190570 [slashdot.org]
HIDDEN SECURITY BUGS:2005 -> http://linux.slashdot.org/comments.pl?sid=164039&cid=13698742 [slashdot.org]
APK & FIREFOX BUGFIX TEAM:2005 -> http://it.slashdot.org/comments.pl?sid=161697&cid=13526010 [slashdot.org]
WHY OPERA ROCKS:2005 -> http://slashdot.org/comments.pl?sid=170983&cid=14242283 [slashdot.org]
OPERA BEST SPEED & SECURITY: 2010 -> http://tech.slashdot.org/comments.pl?sid=1881444&cid=34333966 [slashdot.org]
OPERA "SUPERIOR WARRIOR":2009 -> http://developers.slashdot.org/comments.pl?sid=1309763&threshold=-1&commentsort=0&mode=thread&pid=28768721 [slashdot.org]
OPERA=FASTER & MORE SECURE:2005 -> http://it.slashdot.org/comments.pl?sid=157615&cid=13208800 [slashdot.org]
OPERA "The Superior Warrior" vs. FIREFOX:2007 -> http://slashdot.org/comments.pl?sid=286721&cid=20452183 [slashdot.org]
OPERA:2007 -> http://it.slashdot.org/comments.pl?sid=233227&threshold=1&commentsort=0&mode=thread&cid=18969947 [slashdot.org]
OPERA BY SITE PREFS:2010 -> http://tech.slashdot.org/comments.pl?sid=1881444&cid=34333758 [slashdot.org]
OPERA 64-BIT "FOR INDEPENDENT SMART PEOPLE" ROUND 1 FOR WINDOWS & MAC RELEASED:2011 -> http://tech.slashdot.org/comments.pl?sid=2576256&cid=38388178 [slashdot.org]
OPERA HAS AN ADBLOCK ADDON: 2012 -> http://news.slashdot.org/comments.pl?sid=2579684&cid=38412366 [slashdot.org]
APK SANDBOXING IE:2007 -> http://it.slashdot.org/comments.pl?sid=236547&cid=19310513 [slashdot.org]
APK ON SANDBOXIE:2010 -> http://it.slashdot.org/comments.pl?sid=1875754&cid=34281930 [slashdot.org]
CHROME NEEDS BY SITE PREFS TO SANITYINANARCHY:2011 -> http://slashdot.org/comments.pl?sid=2358734&cid=36946676 [slashdot.org]
DO YOUR BEST WORK OUR YOUNG MENS LIVES RIDE ON IT:2010 -> http://developers.slashdot.org/comments.pl?sid=1898806&cid=34472826 [slashdot.org]
STAT I/II SKEWING:2010 -> http://slashdot.org/comments.pl?sid=1504756&cid=30711074 [slashdot.org]
SEARCH ENGINES:2005 -> http://science.slashdot.org/comments.pl?sid=162717&cid=13598832 [slashdot.org]
PORTING CODE:2007 -> http://linux.slashdot.org/comments.pl?sid=236367&cid=19291677 [slashdot.org]
DARTH CHENEY POLITICALS:2007 -> http://yro.slashdot.org/comments.pl?sid=237091&cid=19362755 [slashdot.org]
WINDOWS EMPLOYS YOU BETTER:2006 -> http://linux.slashdot.org/comments.pl?sid=174277&cid=14498965 [slashdot.org]
MS PUTS YOU TO WORK:2005 -> http://books.slashdot.org/comments.pl?sid=169549&threshold=-1&commentsort=0&tid=109&mode=thread&cid=14132540 [slashdot.org]
"666":2008 -> http://news.slashdot.org/comments.pl?sid=548476&cid=23353722 [slashdot.org]
APK ON HARDCODES & SHELLOPEN ASSOCIATION:2010 -> http://tech.slashdot.org/comments.pl?sid=1519842&cid=30854906 [slashdot.org]
DR. DEMENTO SHOW:2010 -> http://news.slashdot.org/comments.pl?sid=1678308&cid=32494990 [slashdot.org]
CA DISREPUTABLE #2 of 2:2010 -> http://news.slashdot.org/comments.pl?sid=1884922&cid=34351020 [slashdot.org]
NO PROOF USED BY LOB:2010 -> http://tech.slashdot.org/comments.pl?sid=1907190&cid=34529734 [slashdot.org]
ON KIDS CODING & ARMCHAIR QB's:2011 -> http://science.slashdot.org/comments.pl?sid=2040490&cid=35508400 [slashdot.org]
FPGA & TERMINATORS:2011 -> http://it.slashdot.org/comments.pl?sid=2341586&cid=36842168 [slashdot.org]
APK ON CHESS:2010 -> http://ask.slashdot.org/comments.pl?sid=1877160&cid=34293988 [slashdot.org]
RON PAUL & WIKILEAKS:2010 -> http://yro.slashdot.org/comments.pl?sid=1907000&cid=34528958 [slashdot.org] /. "CATERING TO CRONIES":2010 -> http://it.slashdot.org/comments.pl?sid=1664046&cid=32336794 [slashdot.org]
BEING MORE "ALL AROUND" THAN 1 DIMENSIONAL IN IT/IS/MIS:2005 -> http://it.slashdot.org/comments.pl?sid=166174&cid=13863159 [slashdot.org]
GET RID OF S. BALLMER @ MS:2008 -> http://slashdot.org/comments.pl?sid=543962&cid=23310698 [slashdot.org]
COMBO OF CODER/NETWORKER = MOST DANGEROUS HACKER/CRACKER: 2011 -> http://yro.slashdot.org/comments.pl?sid=2590324&cid=38490476 [slashdot.org]
FACEBOOK ENHANCES mySQL: 2012 -> http://news.slashdot.org/comments.pl?sid=2643681&cid=38857629 [slashdot.org]
APPSTORE/WALLED-GARDEN DL OF APPS WON'T HELP vs. TODAY'S INFECTION VECTORS: 2012 -> http://it.slashdot.org/comments.pl?sid=2655681&cid=38943319 [slashdot.org]
REGISTRY ACCESS WINDOWS 32-BIT vs. 64-BIT in code: 2012 -> http://news.slashdot.org/comments.pl?sid=2680271&cid=39093835 [slashdot.org]
2nd REGISTRY ACCESS WINDOWS 32-BIT vs. 64-BIT in code: 2012 -> http://news.slashdot.org/comments.pl?sid=2680271&cid=39093873 [slashdot.org]
CHINESE "CYBER-WAR" THREAT: 2012 -> http://politics.slashdot.org/comments.pl?sid=2718289&cid=39312311 [slashdot.org]
ON DR. MARK RUSSINOVICH MS DESKTOPS APP & MORE: 2012 -> http://tech.slashdot.org/comments.pl?sid=2741569&cid=39445275 [slashdot.org]
DEFENDING STEVE GIBSON OF SPINRITE + "SHIELDS UP" vs. DEFAMATION: 2012 -> http://yro.slashdot.org/comments.pl?sid=2747957&cid=39479257 [slashdot.org]
OS/2 & What I thought was cool about it & when I used it: 2012 -> http://tech.slashdot.org/comments.pl?sid=2761033&cid=39550525 [slashdot.org]
ActiveX Usage in Korea still "huge": 2012 -> http://tech.slashdot.org/comments.pl?sid=2767885&cid=39584683 [slashdot.org]
On "insta-downmods" & /. "fine moderation" (b.s.!): 2012 -> http://news.slashdot.org/comments.pl?sid=2772023&cid=39606941 [slashdot.org]
TAX THE TAR OUT OF OUTSOURCERS/OFFSHORERS & PENALIZE THEM ALSO #2 of 2 + ECONOMIC CLASS 1984-1985: 2012 -> http://yro.slashdot.org/comments.pl?sid=2795637&cid=39729177 [slashdot.org]
GATTACA #1 of 2: 2012 -> http://science.slashdot.org/comments.pl?sid=2792033&cid=39722291 [slashdot.org]
GATTACA #2 of 2: 2012 -> http://science.slashdot.org/comments.pl?sid=2792033&cid=39711991 [slashdot.org]
ROMAN MARONI (lol) = arth1 "murder of the English Language": 2012 -> http://slashdot.org/comments.pl?sid=2773803&cid=39617941 [slashdot.org]
FLASHY FLASH DRIVES: 2005 -> http://slashdot.org/comments.pl?sid=154997&cid=12998477 [slashdot.org]
ROOTKIT CREATORS "GO PRO": 2005 -> http://it.slashdot.org/comments.pl?sid=165958&cid=13843462 [slashdot.org]
MS LESS SECURITY ISSUES THAN *NIX in 2005: 2006 -> http://it.slashdot.org/comments.pl?sid=173564&cid=14441639 [slashdot.org]
OPERA ROCKS & WHY: 2007 -> http://it.slashdot.org/comments.pl?sid=233227&cid=18969947 [slashdot.org]
McAfee, Symantec, ClamAV, COMODO, ArcaBit/ArcaVir, & Dr. Web "False Positive" of my "APK Hosts File Engine 5.0++": 2012 -> http://it.slashdot.org/comments.pl?sid=2872677&cid=40107921 [slashdot.org]
Linux "Fine Security" (lol, NOT!) 2011-2012: 2012 -> http://linux.slashdot.org/comments.pl?sid=2875333&cid=40119001 [slashdot.org]
SAY NO TO MS & SAY NO TO A JOB: 2005 -> http://books.slashdot.org/comments.pl?sid=169549&cid=14132540 [slashdot.org]
"START ME UP" REGARDING WINDOWS 8, METRO, & RIBBONS: 2012 -> http://tech.slashdot.org/comments.pl?sid=2955431&cid=40538813 [slashdot.org]
GHOSTERY TRUTHS #1: 2012 -> http://yro.slashdot.org/comments.pl?sid=2931443&cid=40413453 [slashdot.org]
GHOSTERY TRUTHS #2: 2012 -> http://yro.slashdot.org/comments.pl?sid=2931443&cid=40413493 [slashdot.org]
"DEAR MR. GATES": 2012 -> http://tech.slashdot.org/comments.pl?sid=2955431&cid=40536263 [slashdot.org]
Bill & Melinda Gates Foundation tax shield: 2012 -> http://news.slashdot.org/comments.pl?sid=2957987&cid=40549931 [slashdot.org]
Colorblindness and camouflage: 2012 -> http://games.slashdot.org/comments.pl?sid=3010409&cid=40798555 [slashdot.org]
HBGary and "Freedom of Speech" plus REAL NAMES on forums: 2012 -> http://yro.slashdot.org/comments.pl?sid=3012595&cid=40811497 [slashdot.org]
Large Projects (millions of lines) vs. TINY ones (200k lines) & rewrite: 2012 -> http://developers.slashdot.org/comments.pl?sid=3026933&cid=40885035 [slashdot.org]
Native Code/"single stand-alone" non-interpreted code executables are "where it's at": 2012 -> http://developers.slashdot.org/comments.pl?sid=3041081&cid=40956381 [slashdot.org]
Windows in the "Fortune 100/500" high TPM environs & 99.999% "Fabled '5-9's'" uptime: 2012 -> http://linux.slashdot.org/comments.pl?sid=3110069&cid=41305947 [slashdot.org]
Brennz bitching about Mikko Hyponnen Security Expert: 2012 -> http://it.slashdot.org/comments.pl?sid=3129943&cid=41398979 [slashdot.org]
AntiVirus FALSE POSITIVES (even on themselves) 3-10 examples: 2012 -> http://it.slashdot.org/comments.pl?sid=3132237&cid=41402041 [slashdot.org]
Speaking to Naval Information Warfare Officer on China threat: 2012 -> http://news.slashdot.org/comments.pl?sid=3156485&cid=41517129 [slashdot.org]
FTC Busts Phone Support Scammers: 2012 -> http://tech.slashdot.org/comments.pl?sid=3161653&cid=41543619 [slashdot.org]
Polish & Russian = Romulans & Vulcans: 2012 -> http://apple.slashdot.org/comments.pl?sid=3156271&cid=41517631 [slashdot.org]
Good for Mr. T. (Linux kernel 2.7): 2012 -> http://linux.slashdot.org/comments.pl?sid=3164013&cid=41553831 [slashdot.org]
Building homes, RIGHT: 2012 -> http://it.slashdot.org/comments.pl?sid=3227591&cid=41863891 [slashdot.org]
CA's breached = 5/6 Linux based: 2012 -> http://tech.slashdot.org/comments.pl?sid=3222433&cid=41835589 [slashdot.org]
I post as AC and get modded up when all my other posts were downmodded: 2012 -> http://yro.slashdot.org/comments.pl?sid=3186429&cid=41660255 [slashdot.org]
Windows 7 will NOT GET "SERVICE PACK #2": 2012 -> http://tech.slashdot.org/comments.pl?sid=3207047&cid=41753975 [slashdot.org]
Opera can do "site specific" preferences vs. online threats (Jeremiah Grossman's only NOW hitting on my idea there): 2012 -> http://it.slashdot.org/comments.pl?sid=3237707&cid=41913801 [slashdot.org]
Linux security blunders 2011-2012: 2012 -> http://mobile.slashdot.org/comments.pl?sid=3281695&cid=42128897 [slashdot.org]
HIPAA: 2012 -> http://science.slashdot.org/comments.pl?sid=3290685&cid=42171403 [slashdot.org]
Adbanners having malicious code in them: 2012 -> http://tech.slashdot.org/comments.pl?sid=3299759&cid=42215249 [slashdot.org]
Elevator Algorithm for harddisk drives #1 of 2 (1st's in +3): 2012 -> http://hardware.slashdot.org/comments.pl?sid=3287917&cid=42156255 [slashdot.org]
Linux security failures 2011-2012: 2012 -> http://it.slashdot.org/comments.pl?sid=3319303&cid=42306663 [slashdot.org]
DUSTING 'CruTcHy' the NOOB who can't prove his words he's a professional coder & is a "pot calling a kettle black": 2012 -> http://slashdot.org/comments.pl?sid=3272015&cid=42125693 [slashdot.org]

---

* THE HOSTS FILE GROUP 40++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

APPLYING HOSTS TO DIFF. PLATFORM W/ TCP-IP STACK BASED ON BSD: 2008 -> http://mobile.slashdot.org/comments.pl?sid=1944892&cid=34831038 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1490078&cid=30555632 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1461288&threshold=-1&commentsort=0&mode=thread&cid=30272074 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1255487&cid=28197285 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1206409&cid=27661983 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1197039&cid=27556999 [slashdot.org]
0.0.0.0 IN HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1143349&cid=27012231 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://it.slashdot.org/comments.pl?sid=1198841&cid=27580299 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1139705&cid=26977225 [slashdot.org]
HOSTS MOD UP:2009 -> http://hardware.slashdot.org/comments.pl?sid=1319261&cid=28872833 [slashdot.org] (still says INSIGHTFUL)
APK 20++ POINTS ON HOSTS MOD UP:2010 -> http://news.slashdot.org/comments.pl?sid=1913212&cid=34576182 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1869638&cid=34237268 [slashdot.org]
HOSTS MOD UP:2010 -> http://yro.slashdot.org/comments.pl?sid=1907266&cid=34529608 [slashdot.org]
HOSTS MOD UP:2010 -> http://apple.slashdot.org/comments.pl?sid=1725068&cid=32960808 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1743902&cid=33147274 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1862260&cid=34186256 [slashdot.org]
HOSTS MOD UP:2010 (w/ facebook known bad sites blocked) -> http://tech.slashdot.org/comments.pl?sid=1924892&cid=34670128 [slashdot.org]
HOSTS and BGP +5 RATED (BEING HONEST):2010 http://tech.slashdot.org/comments.pl?sid=1901826&cid=34490450 [slashdot.org]
HOSTS FILE MOD UP FOR ANDROID MALWARE:2010 -> http://mobile.slashdot.org/comments.pl?sid=1930156&cid=34713952 [slashdot.org]
BANNER ADS & BANDWIDTH:2011 -> http://hardware.slashdot.org/comments.pl?sid=2139088&cid=36077722 [slashdot.org]
HOSTS MOD UP ZEUSTRACKER:2011 -> http://it.slashdot.org/comments.pl?sid=2059420&cid=35654066 [slashdot.org]
HOSTS MOD UP vs AT&T BANDWIDTH CAP:2011 -> http://tech.slashdot.org/comments.pl?sid=2116504&cid=35985584 [slashdot.org]
HOSTS MOD UP CAN DO SAME AS THE "CloudFlare" Server-Side service:2011 -> http://it.slashdot.org/comments.pl?sid=2220314&cid=36372850 [slashdot.org]
HOSTS & PROTECT IP ACT:2011 http://yro.slashdot.org/comments.pl?sid=2368832&cid=37021700 [slashdot.org]
HOSTS MOD UP:2011 -> http://yro.slashdot.org/comments.pl?sid=2457766&cid=37592458 [slashdot.org]
HOSTS MOD UP & OPERA HAUTE SECURE:2011 -> http://yro.slashdot.org/comments.pl?sid=2457274&cid=37589596 [slashdot.org]
HOSTS MOD UP vs. botnet: 2012 -> http://it.slashdot.org/comments.pl?sid=2603836&cid=38586216 [slashdot.org]
HOSTS MOD UP vs. SOPA act: 2012 -> http://yro.slashdot.org/comments.pl?sid=2611414&cid=38639460 [slashdot.org]
HOSTS MOD UP vs. FaceBook b.s.: 2012 -> http://yro.slashdot.org/comments.pl?sid=2614186&cid=38658078 [slashdot.org]
HOSTS MOD UP "how to secure smartphones": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2644205&cid=38860239 [slashdot.org]
HOSTS MOD UP "Free Apps Eat your Battery via ad displays": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2734503&cid=39408607 [slashdot.org]
HOSTS MOD UP "How I only hardcode in 50 of my fav. sites": 2012 -> http://it.slashdot.org/comments.pl?sid=2857487&cid=40034765 [slashdot.org]
HOSTS vs. TRACKING ONLINE BY ADVERTISERS & BETTER THAN GHOSTERY: 2012 -> http://yro.slashdot.org/comments.pl?sid=2926641&cid=40383743 [slashdot.org]
HOSTS FOR ANDROID SMARTPHONES: 2012 -> http://yro.slashdot.org/comments.pl?sid=2940173&cid=40455449 [slashdot.org]
APK Hosts File Engine 5.0++: 2012 -> http://yro.slashdot.org/comments.pl?sid=3137925&cid=41429093 [slashdot.org]

---

* THE APK SECURITY GUIDE GROUP 18++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=154868&cid=12988150 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://books.slashdot.org/comments.pl?sid=168931&cid=14083927 [slashdot.org]
APK SECURE SETUP FOR IP STACK:2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14211084 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14210206 [slashdot.org]
APK SECURITY TEST CHALLENGE LINUX vs. WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=267599&threshold=1&commentsort=0&mode=thread&cid=20203061 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&threshold=-1&commentsort=0&mode=thread&no_d2=1&cid=25092677 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://tech.slashdot.org/comments.pl?sid=1027095&cid=25747655 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&cid=25093275 [slashdot.org]
APK SECURITY GUIDE: 2008 -> http://ask.slashdot.org/comments.pl?sid=970939&no_d2=1&cid=25092677 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://it.slashdot.org/comments.pl?sid=416702&cid=22026982 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://it.slashdot.org/comments.pl?sid=1361585&cid=29360367 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://yro.slashdot.org/comments.pl?sid=1218837&cid=27787281 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26941781 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://tech.slashdot.org/comments.pl?sid=1885890&cid=34358316 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://yro.slashdot.org/comments.pl?sid=1638428&cid=32070500 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&cid=30649722 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&threshold=-1&commentsort=0&mode=thread&cid=30649722 [slashdot.org]
MICROSOFT SECURITY:2010 -> http://news.slashdot.org/comments.pl?sid=1546446&cid=31106612 [slashdot.org]

---

* As-per-usual, vs. this UTTER NOOB done zero troll, "erroneOus"?

Well - you just KNOW I've just GOTTA say it, lol, as is per my "inimitable style::

THIS? This was just "too, Too, TOO EASY - just '2ez'"

APK

P.S.=> Especially vs. a little noob I destroyed 7 times in a row here -> http://slashdot.org/comments.pl?sid=2253808&threshold=-1&commentsort=0&mode=thread&pid=36521452 [slashdot.org]

(I enumerated each libelous point you *tried*, all illogical off topic ad hominem attacks no less that I easily disproved with FACTS... lol, & you resorting to THAT attempt @ blackmailing?? Shows us ALL WE NEEDED TO KNOW as to "who got the BEST of WHOM", lol!)

What was his "FruStrAteD ReAcTiOn"?? Attempts @ blackmail -> http://slashdot.org/comments.pl?sid=2261720&cid=36545928 [slashdot.org]

You FAIL, boy...

... apk

Re:When will YOU ever learn, troll? (0)

Anonymous Coward | about 2 years ago | (#42309719)

1. You just responded to APK. I am really and truly sorry for what happens to people who respond to APK.

You should be sorry considering he blew you away here http://it.slashdot.org/comments.pl?sid=3319303&cid=42309219 [slashdot.org]

Re:When will YOU ever learn, troll? (1)

erroneus (253617) | about 2 years ago | (#42309483)

OMFG :) Do you see what this guy does?! He goes absolutely nuts with commentary as if people live on slashdot and do nothing else! It's beyond imagination. The words "disproportionate response" and obsessive come to mind. I'll just back to pretending he doesn't exist and that I don't see what he writes. His style is pretty obvious so not hard to detect. I advise everyone else to do the same. Just pray that he doesn't resort to shooting up schools for attention.

Better than attempting blackmail erroneus (0)

Anonymous Coward | about 2 years ago | (#42309527)

Like you tried, erroneus http://slashdot.org/comments.pl?sid=2261720&cid=36545928 [slashdot.org] and failed badly in.

Re:When will YOU ever learn, troll? (0)

Anonymous Coward | about 2 years ago | (#42309681)

He kicked yer ass erroneus vs what you stated too http://it.slashdot.org/comments.pl?sid=3319303&cid=42309219 [slashdot.org] all you have now is off topic illogical ad hominem attacks which he disproved and egg on your face with a -1 troll downmod http://it.slashdot.org/comments.pl?sid=3319303&cid=42306539 [slashdot.org] which despite the crap fud in it seems to be getting upward modded (no big trick that though is it erroneus when we know you're the one doing it by using other registered accounts you keep here, obviously. We all know how that's done except the rest of most of us have more integrity and don't do it where you clearly do Mr. Bastida).

Re:When will they ever learn?! (0)

drinkypoo (153816) | about 2 years ago | (#42306783)

And someone wants to put Windows into ATMs and POS machines?! And people BUY them?!

AFAIK Diebold is the largest US ATM manufacturer ATM and they use Windows and, IIRC, used to use OS/2 so you can count on them picking the wrong OS next time, too.

Re:When will they ever learn?! (1)

Anonymous Coward | about 2 years ago | (#42306817)

OS/2 had been a very popular and solid base for ATM and banking systems for over a decade before those systems migrated over to Windows.... Diebold may suck but using OS/2 back then was probably their best decision ever.

Re:When will they ever learn?! (1)

drinkypoo (153816) | about 2 years ago | (#42309189)

OS/2 had been a very popular and solid base for ATM and banking systems for over a decade before those systems migrated over to Windows.... Diebold may suck but using OS/2 back then was probably their best decision ever.

It would have been better to stick with DOS, because DOS is still here, and where is OS/2 now? Precisely where anyone could have predicted it would be. When it didn't succeed broadly by 2.1 you had to know it was going to fart around and eventually go away.

Re:When will they ever learn?! (5, Insightful)

erroneus (253617) | about 2 years ago | (#42306839)

Quite familiar with Diebold ATMs. I spent a few of years in the ATM industry where I learned all kinds of things I was better off not knowing.

The short here is that business people are invariably interested in rapid development and deployment. Those tools are most available under Windows. "Rapid development." Really? And rapid deployment too? Sounds like they would rather not bother with testing and QA.

And using the internet as transport? Back in the day, they used POTS... some still do. (yeah... dialtone generators and devices that answer "yes" to every transaction... one of the first tools I was exposed to when "troubleshooting" an ATM.) It's beyond stupid. But that's the thing. Business does not understand technology and so they love to imagine that since THEY can't understand it, neither can those 'stupid criminals' so they're safe right? One of the biggest problems is these geniuses trust brand names more than people. Another is that they simply do not know what they do not know. You can try to tell them, but they just read it as an attack or an insult.

Re:When will they ever learn?! (0)

Anonymous Coward | about 2 years ago | (#42306853)

^^^This^^^

I wish AC's had mod points... :)

Re:When will they ever learn?! (0)

Anonymous Coward | about 2 years ago | (#42307163)

Replying to yourself by ac posts, erroneus? Please. Give us a break.

FUD spreading trolls' puny tricks (0)

Anonymous Coward | about 2 years ago | (#42307343)

Erroneus's modding himself up via his many /. registered 'luser' accts now too, not just replying to himself by ac. These fud spreading trolls and their puny tricks are so easy to see through it isn't funny.

Ok - let's see how fast "erroneOus" comes back (0)

Anonymous Coward | about 2 years ago | (#42307233)

Tell us how you'd optimize OS/2 for memory, performance, & yes, security then.

* This I want to see...

(Since I've actually DONE IT for a division of NCR in Kennesaw Georgia USA in 1998, on the job professionally, for temrinals of all types that used it... & I was a HEAVY OS/2 USER 1992-1995).

APK

P.S.=> Better "hurry up" & search the web, eh, erroneOus? I state that, since IF you had familiarity with what to actually DO?? You should've and WOULD'VE stated it - that is, IF you actually KNEW what you were talking about, OS side...

... apk

You clearly don't understand business' "POV" (0)

Anonymous Coward | about 2 years ago | (#42308339)

"Business does not understand technology and so they love to imagine that since THEY can't understand it, neither can those 'stupid criminals' so they're safe right? One of the biggest problems is these geniuses trust brand names more than people." - by erroneus (253617) on Sunday December 16, @09:11AM (#42306839) Homepage

I was like that EARLY ON, but with GOOD SOLID ANALYSIS BASED REASONS (& got rejected, but, not without merit from the business pov):

Back circa 1997, I was a BIG fan of coding with Visual Studio... especially MSVC++ &/or VB.

I run into a review in VBPJ, of all places (Visual Basic Programmer's Journal) Sept./Oct. 1997 issue "Inside the VB Compiler", a competing trade rag no less & one that was QUITE respected!

Then?

There, I saw Borland Delphi LITERALLY "knock-the-chocolate" outta MS' offerings, overall, in performance...

How much so? Ok (& this IS what I took to mgt.):

In the 6 tests given, Delphi won the majority (overwhelmingly in fact, in what ALL PROGRAMS DO, math & strings work)...

Specifics below (the most important, overall? Again - imo @ least - What they ALL do - math & strings!):

---

STRING SUITE:

Delphi = .275ms
MSVC++ = .500ms
MSVB = 4.091ms

---

MATH SUITE:

Delphi = 1.523ms
MSVC++ = 2.890ms
MSVB = 7.071ms

* AGAIN - note what I said above? Even while I was a HUGE fan of MS' Visual Studio?? I couldn't "argue with the numbers" here, & gravitated towards a BETTER coding environs in Delphi, by far, for performance alone!

---

NATIVE TO LANGUAGE GRAPHICS METHODS SUITE:

MSVC++ = .293ms
MSVB = .455ms
Delphi = .503ms

---

API GRAPHICS METHODS SUITE:

MSVC++ = .266ms
Delphi = .269ms
MSVB = .292ms

---

TEXTBOX FORM LOADING SUITE:

MSVC++ = .012ms
Delphi = .069ms
MSVB = .072ms

---

ACTIVE X FORM LOADS:

MSVB = .114ms
Delphi = .495ms
MSVC++ = .778ms

---

There you are... however: KNOW WHAT I WAS TOLD, that I absolutely HAD TO LISTEN TO & UNDERSTAND (which, I did):

---

"Microsoft has BILLIONS of dollars & absolute stability. We want to have SOMEONE to take responsibility for errors in their stuff, and to have support in the future. Microsoft odds are WILL BE THERE STILL... Will Borland?"

---

THAT IS BUSINESS' POV in a nutshell... & Borland was getting "brain-drained" (especially for the designers of Delphi) by MS regularly... ever heard of Mr. Anders Heijelsberg &/or Chuck Andrzewski? They built Delphi... & MS got 'em!

APK

P.S.=> See my point? It's yours, I was there myself (decades ago) - However, unlike yourself?

I DID SEE "Business' POV" too!

It is NOT unwarranted...

I don't let "zealotry" get in the way of MY making a living, or learning something new anymore - Yes, that is what YOU STAND TO GAIN in these situations, personal growth, something for your skillset/resume, in those cases!

(Even IF forced to by workplace 'superiors' - all I could do was show facts. They took them into consideration, fairly I might add, but their point-of-view/pov? Pretty solid, from THEIR POV!)...

... apk

Re:You clearly don't understand business' "POV" (0)

Anonymous Coward | about 2 years ago | (#42309781)

erroneus' is a codemonkey at best + shuts up fast like here http://it.slashdot.org/comments.pl?sid=3319303&cid=42309219 [slashdot.org] and then he attempts blackmail if you cut him to shreds like here shows http://slashdot.org/comments.pl?sid=2261720&cid=36545928 [slashdot.org] after he attempts to libel you.

Small edit, correcting myself... apk (0)

Anonymous Coward | about 2 years ago | (#42310899)

API GRAPHICS METHODS SUITE:

MSVC++ = .266ms
Delphi = .269ms
MSVB = .292ms - by me last post http://it.slashdot.org/comments.pl?sid=3319303&cid=42308339 [slashdot.org] )

That was actually this:

Delphi = .269ms
MSVC++ = .293ms
MSVB = 292

* So, my statement there was correct - Delphi took the MOST "1sts" & "2nds" overall, but also the MOST IMPORTANT ONES, which ALL programs do, in Math & Strings, & by tremendous margins...

APK

P.S.=> Sorry about that folks - Between cooking for guests, corralling cats going nuts or seeking attention, & posting? I do DO a "typo", now & then - getting better @ catching them, so trolls don't, 1st, lmao...

... apk

wow (1)

drinkypoo (153816) | about 2 years ago | (#42309179)

what a waste of a trollmod, modtroll

Re:wow (0)

Anonymous Coward | about 2 years ago | (#42309503)

erroneus uses many registered accts here to mod himself up with. You down mod him rightfully as was done to his initial post (originally at -1 troll) http://it.slashdot.org/comments.pl?sid=3319303&cid=42306539 [slashdot.org] ? He comes along with those multiple accounts and mods it up again (now at 1 troll, and watch it go up more, guaranteed, per the methods he uses).

Everyone knows it goes on here, even big name Open source people:

It just takes one Ubuntu sympathizer or PR flack to minus-moderate any comment. Unfortunately, once PR agencies and so on started paying people to moderate online communities, and to have hundreds of accounts each, things changed.

from Mr. Bruce Perens at http://linux.slashdot.org/comments.pl?sid=1738364&cid=33089192 [slashdot.org]

Then, when you get the better of erroneus? He tries blackmail http://slashdot.org/comments.pl?sid=2261720&cid=36545928 [slashdot.org] and ad hominem attacks. You can see it in this exchange too.

wow... (0)

Anonymous Coward | about 2 years ago | (#42306553)

"The RISK team linked the domain registration for a Dexter C&C server to an unusual online handle, 'hgfrfv,' that was used to post a number of suggestive help requests ('need help with decrypting a table encrypted with EncryptByKey') in online technical forums, where a live.com e-mail address was also provided. The account name was also linked to a shell account on the outsourcing web site freelancer.com, which lists 'hgfrfv' as an individual residing in the Russian Federation.""

Jesus Christ this guy fucked up.

dear retailers (0)

Anonymous Coward | about 2 years ago | (#42306559)

get your shit off the public internet.

the only internet access at your location should be wifi for your customer's use. YOUR OWN SYSTEMS should be on a private network and dedicated lines or vpn totally inaccessible from the public internet.

unusual handle??? (2, Interesting)

Anonymous Coward | about 2 years ago | (#42306653)

im seroius trace hgfrfv on the keyboard.... i swear i think the people who protect our country dont look for the stupidest things.

r
fgh
v

if its not a penis its some other random punch.

this submission is bull... wtf happened to slashdot...

Re:unusual handle??? (0)

Anonymous Coward | about 2 years ago | (#42306835)

Somebody decided to roll the dice...

Re:unusual handle??? (0)

Anonymous Coward | about 2 years ago | (#42308283)

This guy, +1 observant.

Why... (0)

Anonymous Coward | about 2 years ago | (#42306945)

Why did I think this was a post about anthropology...

God this is a stupid post (1)

Impy the Impiuos Imp (442658) | about 2 years ago | (#42307307)

> Analysis of Dexter Malware Uncovers Mystery
> Man, and Links To Zeus

I'll bet it's Baby Bowler. It's gotta be Baby Bowler.

Can't wait to see what she, Dexter, and Zeus do when teamed up!

Linked online handles (2)

pepsikid (2226416) | about 2 years ago | (#42308583)

So if I want to throw detectives off my trail, all I have to do is harvest a bunch of handles from 4chan, Slashdot and Fark to reuse? Good to know. Not that I'd do that, of course. Or use my enemy's handle. Hur hurr.

Let me show you deep packet cookie monster (0)

Anonymous Coward | about 2 years ago | (#42315715)

Welcome to part of the 0 Day January 13th 2013.

Good ideas, no patches. accept it; it is called get out more. the best part is that facebook is going to take a huge hit with this.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?