C
cquirke (MVP Windows shell/user)
cquirke (MVP Windows shell/user) wrote:
I am pretty sure stuff like that can be done, though I am personally not
concerned with seperating stuff to *that* high of a degree. If I got my
data seperate from my OS, I am generally happy.
I like to scope things out with various scenarios in mind - something
that is a big part of backup theory (i.e. preparation for anticipated
disasters and redeployment scenarios)
- scope out hardware-specifics in case hardware fails/changes
- scope out all possible malware
- exclude incoming material
- exclude infectable material
- scope in/out user-unique data and settings
- scope for application specificity and version independence
Doing so makes it easier to do abstract things like "I want to sell my
PC" (remove user-specific data), "I have to 'just' format ans
re-install because I may be infected" (safe data backups), "my
motherboard died and I have to rebuild", "I have a new version of a
crucial app; will my data still work?" etc.
In addition to this, a small core data set can more esily be automated
for more frequent backup with a greater depth of retained instances.
This is the main reason to exclude bulky pictures and off-the-peg
bulky music and movies from "data backups".
I have to say this though, I've found linux to be exceedingly more flexible
with stuff that you can do in the file system that I can only dream of in
XP (though *some* functionality can be added in XP via 3rd party stuff).
If "all non-trivial systems have bugs", then the only way to keep core
subsystems bug-free is to keep them trivial. For this reason, I
generally prefer a trivial file system to something more baroque and
feature-rich such as NTFS. To this day, I prefer to avoid NTFS even
though it's far more efficient where large file size and large numbers
of files per directory are concerned.
A file system is more than just the structures and basic operating
code, just as a user+PC is more than just the user and the PC. Just
as the user+PC is extended via available tech support, so a file
system must be extended to include careful repair and data recovery
tools. This is where NTFS currently still sits firmly on its ass.
Finally someone that doesn't worship the ground Quickbooks walks on. =)
It's supposed to be "easy to use" for those who are not steeped in
bookkeeping lore. I used it for a year, and it was a complete
disaster; never again, etc.
Firstly, QuickBooks drank MS's IE4-era Kool-Aid, and is massively
dependent on IE to provide its UI. So anything that re-versions,
updates, attacks, exploits etc. IE may also clobber QuickBooks.
Hmm... unavoidable richly-exploitable edge-facing IE, core
private-data-handling accounting package. Pick ONE.
Secondly, despite assurances to the contrary, QuickBook is hard-wired
to 3-month VAT accounting periods. I need 2-monthly VAT reporting,
and QuickBooks simply doesn't do that - so everything I did in
QuickBooks, I had to re-duplicate in Excel to do VAT.
So effectively, QuickBooks did nothing to reduce my dependence on
Excel, nor reduce the data input work I had to do in Excel.
Thirdly, it is nearly impossible to get data out of QuickBooks in any
sort of readily-usable form. Like most dedicated accounting apps, it
locks its data into its own proprietary format... gog forbid you
should be empowered to walk away to a competing product, and take your
data with you. "All your data belong to us!", heh.
Fourthly, many pro-IT types will tell you thay loathe QuickBooks
because it can only be run with admin account rights, making it VERY
risky to deploy in large managed environments. This is part of the
reason we have to put up with UAC in Vista right now.
So... it should be really easy to find folks who dislike QuickBooks

It was Office 2003, while I like the UI of 2007, the UI alone does not
justify the expense for me to get it.
Yep. I just reminded myself why I still do admin in Word and Excel; I
re-visited Access 2003 and fled screaming, then dipped into Open
Office Base (their database app) and fled screaming again.
Database is still tough - and that's from someone who grew up
programming in database-orientated PICK in the DOS 3.3 era.
I do it for internal in-house stuff so spending weeks on a well designed UI
would be a waste usually. =) The only exceptions to that rule are if it
goes to people in production or so and they have to use it on a daily
basis, then it does get an UI to precisely suit their needs.
What I often do, is:
- find a CLI-driven engine
- wrap it in a parameter-feeding batch file
- drive the batch file from UI shortcuts containing parameters
Parameters I don't need to change, I hard-code in the .bat
Parameters that are site-specific, I define in a Set block in the .bat
Parameters that are context-sensitive, I pass from the shortcut
On-the-fly parameters can be passed via other integrations
For example, I may write generic VirusCheck.bat and VirusKill.bat
wrappers for some CLI-driven av scanner, then integrate this into the
GUI via File Types, File Folder; SentTo; QuickLaunch icons to scan
diskettes and a "suspect" subtree, etc.
Then if I change the av engine, all I have to do is change the two
batch file wrappers; I don't have to unpick all the UI points.
In this way, I can serialize a number of on-denad scanners into a
large hammer that I can easily swing at incoming material concentrated
in "suspect" subtree, or diskettes, or arbitrary files etc.
MS hasn't begun to think in this direction; for example, there's no
namespace shell folder matching the "suspect" concept as yet.
That I honestly don't know off the top of my head. I usually just access it
via the easily accessible system menu. There probably *is* some shortcut
for it, I just don't know it.
Where's that "easily accessible system menu"?
Can it be reached if the mouse has failed?
Can it be reached if the system is "busy"?
Is the access consistent across all distros and OS versions?
Depends on your needs. You can either store them locally in the directory
you need them or store them in /usr/bin if they are to be globally
accessibly from anywhere and by any user.
What batch language?
Where can I see the batch file syntax?
Can I get syntax help on the fly, e.g. "CommandName -?"?
How to invoke them?
How to have them accessible via "the Path" <- old DOS concept?
Generally...you don't unless you need to mount it. No switching between
drives like you do in windows. The fact that my home and root directories
are on seperate partitions, where in windows each would have its own drive
letter, is not even visible from the file system here.
Once its set up. But on first entry to a dual-boot installation, any
volumes in an extended partition that one might intend to use for
shared data access are simply not visible at all.
And once again, to fix this obvious Day One need, one has to grope
around with guessware CLI syntax, assuming you can find somewhere to
type in such commands. Remember, we are talking about Day One here,
i.e. things we need to do right away, not after two weeks of learning.
You can map *any* directory *anywhere* to virtually *anything* and what it
is actually mapped to is invisible when accessing it.
Good and bad sides to that, but the immediate problem is that one
doesn't know how to do this. Functionality inaccessible is
functionality denied, and functionality more accessible to attackers
is a menace (hence my problem with "let's build a network client OS,
treat the Internet as just another network, drop this into
consumerland as the new Windows, and see what happens")
In my case...
/ = sdc1
/home = sdc3
/media/windows = /sda1 (WinXP drive)
/media/data = /sdb1 (2nd NTFS data drive, I may convert this to ext3 and
make it a linux drive soon)
/media/cdrom0 = My dvd drive
/cdrom = Same as /media/cdrom0
O..K..

For example, I have all my favorite DVDs saved as images on the hard drive
so the original disks don't get damaged. I could then go ahead and create a
directory for each DVD by name and then map the corresponding image to the
directory. Then when I want to watch it, just point my media player at the
directory...and it plays!
That's cool; there are some things (Virtual CD, Daemon Tools) that do
the same for Windows, but mileage can be rocky when changing OS
versions, dealing with "protected" disks etc.
Files generally still have extensions just under windows. The only thing
that generally doesn't have an extension are things that are executable, be
they binaries or scripts.
Great. So the most dangerous file types are the ones that can't be
identified, and can pass themselves off as anything else. This is as
bad as Windows is becoming, once you combine:
- .pif, .exe etc. can set their own icons
- file name extensions are hidden by duhfault
- raw code in .pif is run as if it were in an .exe
- .pif extension is never shown even if extensions set to show
Eww... I'd hoped Linux would be better there, but it seems as if it
never had the safety that Windows is steadily losing.
But other than that..images, source files, whatever else you can come up
with...have the same extensions as they do under windows (excluding
application-specific stuff of course).
OK. So if a file is called blahblah.TXT, can I trust it not to run as
raw code if I "open" or otherwise evoke it?
Thing is malware can do extremely little damage to my linux system. It can't
access anything actually important. It could mess with stuff in my /home
directory...that's about it...and there isn't much useful there it could
do.
IMO, the notion that user account rights are effective protection
against malware is absurd, given that even the most limited user
account will allow editing of that user's data - and thus any malware
with the same rights can steal or destroy that data.
If you don't care about user data, and just want to avoid the support
hassle of getting the oS running again, then account rights are fine
for that - but you're serving your own agenda, not ours.
I'd have to go through quite some trouble to give malware root access and
actually let it do damage.
There are two levels to that:
- how the system is designed to work
- how the system actually works
Through DOS, Win3.yuk, Win95 and inteo Win98, almost all (if not all)
attacks were at the first level. But in the XP era, the second level
has become so important that we no longer treat the system in a purely
deterministic manner.
For example, in the "old days", I'd have no safety problem with a
thumbnailer delving into content to create a small representation of
the file, or Windows Explorer doing this automatically when listing
files, or an indexer reading files in the background while I work.
This is no longer the case - any unsolicited handling of complex
material is a risk to be avoided.
Right now, Linux has yet to attain the combination of complexity and
exposure that has put Windows to this particular sword - and I fear
there's a lot of "it can't happen here" blindness at work.
By design, content can't escalate for XP/Vista account rights to admin
or system rights. By exploit, this can happen at any time, all over
the world, within a day, if a suitable malware is mass-released.
That suddenness and resource-swamping scale is why I've taken malware
as seriously as I have, since the last century. It's impossible to
meet SLA promises if 20 clients need 6 hours work from one tech within
the same 24 hours - and malware can demand that, out of the blue.
Honestly I am not sure on the exact release dates of Edgy and Dapper. Dapper
is version 6.06 and Edgy is the newer 6.10 version.
I think I was playing in the 5.x era of Ubuntu.
I do know though that they are having a new release though coming up April
19th that is in heavy beta testing right now. And unlike Vista, when it
comes out, it won't break 80% of my applications. =)
Heh... I remember reading wads of verbage on whether ubuntu was a true
enough Debian for Debian installation techniques to be expected to
work. There are masses of per-distro details, when it comes to
predicting whether something "written for Linux" will work in your
Linux, and that's without considering compiling from source.
So I wouldn't tilt at that particular windmill, if I were you ;-)
Well that and coupled with the fact that infecting a linux system with
malware, while I won't call it impossible, is by default already
significantly more difficult than under windows.
I don't think that's proven until both have been tested equally.
It's like "Communism *will* work, it's just that it can't work unless
the whole world is Communist so we don't have to compete with more
efficient economies that wave shiny things at out citizens", but in
reverse, i.e. "Linux can be assumed to be malware-free only as long as
it remains a niche market".
Honestly, developers need to simply just ditch DX and use OpenGL and be done
with it. There isn't a thing DX can do that OpenGL can't.
OpenGL + OpenAL and games can easily developed for *any* platform...
I am doing that precise thing with my own applications...it works very
nicely.
I'm not sure how interchangeable they are, in terms of what DirectX
was designed to be, i.e. a highly-efficient gaming platform. For
starters, DirectX spans graphics, sound, LAN, HIDs whereas OpenGL is
purely a graphics API.
But that's another debate...

Saws are too hard to use.--------------- ---- --- -- - - - -
Be easier to use!