<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#cccccc" text="#000000">
<font size="+1"><font face="Comic Sans MS">Yes, I'd like to attend a
Linux workshop!<br>
<br>
Thank you.<br>
<br>
Sam Scripter<br>
</font></font><br>
Dave wrote:
<blockquote cite="mid:4949381B.9040800@turbonet.com" type="cite">
<pre wrap="">When I build windows machines now (which is a pain the a-- compared to
Linux machines), I use a slipstream install in which I completely remove
some of Windows' worst vulnerabilities, mainly IE and Outlook.
I learned about slipstream installs because since service pack 2 Windows
will overwrite the manufactures' drivers (the ones that work) with MS
ones (which often don't work), and a slipstream install is the only way
that I know of to override this behavior.
Also:
If you want to be safer on the net then you should also install the
Firefox plug-in called NoScript, which prevents sites from running
JavaScript programs on your computer unless you allow it.
I also routinely install AdBlockPlus, which simply removes most banner ads.
Of course if you really want to be safe then install Linux. The only
way Malware could theoretically get in (so far) is if they trick you
into installing it with something like the Facebook worm. Because
NOTHING gets installed unless you approve it!
You also get the bonus of being able to install any type of application
that you can think of with just a couple of clicks. All this for the
whopping price of one CDR, thanks to the Open Source community.
If I were to offer a Linux workshop (for free, of course), would there
be any interest in attending it?
Dave
Kenneth Marcy wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Major flaw revealed in Internet Explorer; users urged to switch
Tue Dec 16, 2008 11:49AM EST
Here's the link to the article:
<a class="moz-txt-link-freetext" href="http://tech.yahoo.com/blogs/null/111811">http://tech.yahoo.com/blogs/null/111811</a>
Here's the link to the discussion page:
<a class="moz-txt-link-freetext" href="http://buzz.yahoo.com/article/1:y_tech:e10b28ebd5ae33777e8dac9f065278e7">http://buzz.yahoo.com/article/1:y_tech:e10b28ebd5ae33777e8dac9f065278e7</a>
The major press outlets are abuzz this morning with news of a major new
security flaw that affects all versions of Internet Explorer from IE5 to the
latest beta of IE8. The attack has serious and far-reaching ramifications --
and they're not just theoretical attacks. In fact, the flaw is already in
wide use as a tool to steal online game passwords, with some 10,000 websites
infected with the code needed to take advantage of the hole in IE.
Virtually all security experts (as well as myself) are counseling users to
switch to any other web browser -- none of the others are affected, including
Firefox, Chrome, and Opera -- at least for the time being, though Microsoft
has stubbornly said it "cannot recommend people switch due to this one flaw."
Microsoft adds that it is working on a fix but has offered no ETA on when
that might happen. Meanwhile it offers some suggestions for a temporary
patch, including setting your Internet security zone settings to "high" and
offering some complicated workarounds. (Some reports state, however, that the
fixes do not actually work.)
Expedient patching or switching are essential. Security pros fear that the
attack will soon spread beyond the theft of gaming passwords and into more
criminal arenas, as the malicious code can be placed on any website and can
be adapted to steal any password stored or entered using the browser. It's
now down to the issue of time: Will Microsoft repair the problem and
distribute a patch quickly enough to head off the tsunami of fraud that's
about to hit or will it come too late to do any good?
Meanwhile, I'll reiterate my recommendation: Switch from Internet Explorer as
soon as you can. You can always switch back once the threat is eliminated.
Links for other browsers to try: Firefox Chrome Safari Opera
Firefox: <a class="moz-txt-link-freetext" href="http://www.mozilla.com/en-US/firefox/">http://www.mozilla.com/en-US/firefox/</a>
Chrome: <a class="moz-txt-link-freetext" href="http://www.google.com/chrome">http://www.google.com/chrome</a>
Safari: <a class="moz-txt-link-freetext" href="http://www.apple.com/safari/">http://www.apple.com/safari/</a>
Opera: <a class="moz-txt-link-freetext" href="http://www.opera.com/">http://www.opera.com/</a>
Ken
=======================================================
List services made available by First Step Internet,
serving the communities of the Palouse since 1994.
<a class="moz-txt-link-freetext" href="http://www.fsr.net">http://www.fsr.net</a>
<a class="moz-txt-link-freetext" href="mailto:Vision2020@moscow.com">mailto:Vision2020@moscow.com</a>
=======================================================
</pre>
</blockquote>
<pre wrap=""><!---->
</pre>
</blockquote>
</body>
</html>