It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Nobama
reply to post by 547000
What are you talking about? spending hours getting software to work? your just spewing crap that isn't true, im running a fully customized version of Gentoo, it took me a total of 2 hours to install, set up a GUI, and install commonly used softwaren, and I used the Gentoo documents as a guide, not a single problem was had.
I also tried to install Gentoo once, and the installer did not work.
Originally posted by 547000
Originally posted by Nobama
reply to post by 547000
What are you talking about? spending hours getting software to work? your just spewing crap that isn't true, im running a fully customized version of Gentoo, it took me a total of 2 hours to install, set up a GUI, and install commonly used softwaren, and I used the Gentoo documents as a guide, not a single problem was had.
My experience was different. I installed ArchLinux, then spent many, many hours just to get wmii to work the way I wanted to because the documentation was abysmal. Also the wiki I searched was out of date and I had to play around, creating an unobvious symlink to install a few drivers. Much of my experience was like that, undocumented gotchas where you have to guess the way to get it to work.
I also tried to install Gentoo once, and the installer did not work.edit on 23-4-2011 by 547000 because: (no reason given)
Well im gonna tell you this 10 times out of 10 its a problem between keyboard and user...
Originally posted by rogerstigers
Originally posted by OptimusSubprime
That's what Linux is for. Windows is for people that don't know how to use computers.
And Linux is for arrogant twats who think they are better than others?
I use Linux as a file server in my house because it is free and very low maintenance. I would never use it for a daily PC.. it's just not any comparison on that front.
Good servers, though.
Originally posted by MikeBoss
reply to post by FreedomCommander
Here is one tip for you, have two PCs, one is connected to the internet and one is not, do private work on the computer is not connected on the internet.
Originally posted by coder22
Guys - I have a friend on the "inside" - he's a microsoft employee that claims there is a team of programmers that purposefully write vulnerable code (at the request of the guys at the top).
This malicious code is ****written in a way to look like it could be passed off as an "accidental bug"**** for plausible deniability!!! He is going to be passing me the minutes of one of their meetings to upload so I can whistle-blow.
I have been told that these software holes are frequently written and installed in updates etc etc - at the request of CIA. - And in fact, some of the programming team ***IS*** CIA.
The beauty really is, is that when they are discovered, they just look like, "oops!! I little bug - we'll fix that with a patch..." but the reality is, that when holes are being patched, new holes are being opened. Accidentally on purpose. It's all about plausible deniability. I mean seriously, a code myself, simply missing a closing ] etc in the right place can cause all sorts of problems. - And that's the kind of thing they're doing. Or writing "error checking" code that is actually malicious.
Hopefully I'll get these minutes in the next few days. People will be named and shamed.
EDIT TO ADD: I don't think these bugs are written to spy on your average Joe, these are bugs written for global spying. Governmental stuff.
Soundbite by me from later in thread :
...imagine having a backdoor in the worlds most popular operating system? And also, if discovered, it looks like a totally innocent bug that could have happened to anyone? What you have then, is a VERY powerful weapon.
edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)
Originally posted by notimportant
Originally posted by coder22
Guys - I have a friend on the "inside" - he's a microsoft employee that claims there is a team of programmers that purposefully write vulnerable code (at the request of the guys at the top).
This malicious code is ****written in a way to look like it could be passed off as an "accidental bug"**** for plausible deniability!!! He is going to be passing me the minutes of one of their meetings to upload so I can whistle-blow.
I have been told that these software holes are frequently written and installed in updates etc etc - at the request of CIA. - And in fact, some of the programming team ***IS*** CIA.
The beauty really is, is that when they are discovered, they just look like, "oops!! I little bug - we'll fix that with a patch..." but the reality is, that when holes are being patched, new holes are being opened. Accidentally on purpose. It's all about plausible deniability. I mean seriously, a code myself, simply missing a closing ] etc in the right place can cause all sorts of problems. - And that's the kind of thing they're doing. Or writing "error checking" code that is actually malicious.
Hopefully I'll get these minutes in the next few days. People will be named and shamed.
EDIT TO ADD: I don't think these bugs are written to spy on your average Joe, these are bugs written for global spying. Governmental stuff.
Soundbite by me from later in thread :
...imagine having a backdoor in the worlds most popular operating system? And also, if discovered, it looks like a totally innocent bug that could have happened to anyone? What you have then, is a VERY powerful weapon.
edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)edit on 22-4-2011 by coder22 because: (no reason given)
Whatever dude, buy a mac if you think windows sucks (mainstream solution for the masses), or even a better solution is to instal a Linux distro. Geesssssssscchhhhhh.
and no one better argue Linux has no games because I just finished Portal 2 on gentoo.
The "RTFM" approach is FUD.
I've not once encountered anyone telling me to "RTFM" when asking for help with Linux.
How irritating is it? Tell me..
Because I never have any problems getting software to work smoothly.
Originally posted by alfa1
Originally posted by coder22
He is going to be passing me the minutes of one of their meetings to upload so I can whistle-blow.
Wont prove anything. Microsoft will deny.
Given some time, I could write up some minutes to any meeting you wish, as could a lot of people here. Especially if, as is common nowdays, they are typed up and there is no handwritten original that you have access to.
Originally posted by rogerstigers
reply to post by OptimusSubprime
Apologies... was meant to be a bit toungue in cheek.