Trustworthy Computing inaction... Oops, of course I mean "in action"

  • Thread starter Thread starter Mike Terenni
  • Start date Start date
Don said:
LOL, what gibberish.

Then you don't know what DCOM is about, and I could care less if you
ever do.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
x-no-archive: yes

kurttrail said:
Yeah, and the overrun has been in 4 NT OSs since 1996! If time alone
is a measure of negligence, MS is the winner in a first-round KO!


Yeah, but do they guarantee that it won't screw up something else,
like 811493 did!


Ok, that covers about 1% of computer users, what about the 99% that
aren't "reasonably knowledgable" about computing?!

You mean like Bruce Schneier's own mother?

[T]o expect home users to keep their systems current is unreasonable,
said Bruce Schneier, chief technology officer with Counterpane Internet
Security Inc. He blames software developers for writing bad software
that constantly need "critical" patches.
"My mother will never install the patch until I come visit," he said. "I
couldn't even call her and walk her through it. The industry is wrong to
expect her to do it. The fact that she sends me e-mail is incredible
enough."

http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030813/ap_on_hi_te/internet_attack

Of course, the nitwits who are defending Microsoft here *surely* know
more about security than Bruce Schneier. [uncontrolled laughter]
 
x-no-archive: yes

No, that's a terrible comparison, and I'll tell you why. Imagine that
*NO* Windoze vulnerabilities exist at all (I know, it's really hard, but
try). What are you going to do to my system, which is running without a
firewall? (Assume that if I have shares, I have them properly
configured with access lists and strong passwords, and again, that
Windoze isn't flawed in its implementation of shared-folder security.
It is http://www.wininformant.com/Articles/Index.cfm?ArticleID=39646,
but we'll pretend it isn't.)

What are you going to do? Send me Messenger spam? Please tell me.

Are you going to connect to third-party software? I don't have any.
That's not an OS issue anyway, which is what we're discussing.

Explain to me how, with an exploit-free OS, you are going to damage me
without a firewall. What am I "wide open" to?

But there is another reason your "unlocked door" analogy is a bad one.
We're not talking about a door being locked or unlocked; we are talking
about the hinges on the door being broken! Someone can walk right into
my broken door, and you're going to blame *ME* for not having a guard
dog?
 
x-no-archive: yes

Oh, sure, arguing with someone and then making reference to something
"illegal" has no violent connotations whatsoever, right?

Grow up, geez!
 
x-no-archive: yes

Kevin Davis³ said:
Well, duh - turn on the firewall. Use your computer normally.
Install the patch when you can connect to MS's server. Problem solved
with a *little* bit of thought..

Actually, that "duh" is on you. If you are running a system that you
know not to be patched, and you can't get the patch, you should shut it
down or disconnect it, not simply hope that a firewall will work and be
properly configured.

This was hypothetical anyway; I did test to see if I could connect to
WU, but I do not need the patch, since I *did* download it long ago.
The point is--lots of users did not do so.
But actually, you lost all credibility when you said "[Y]ou can't get
the virus by just turning on your computer. It gets transmitted on
kazza file sharing servers." What actually happens with the
vulnerability in question is that a malformed RPC message is sent to
the target machine. It has nothing to do with Kazaa. It *does*
happen just by being online.

But not if you have a firewall on, which if you had any brains you
would.

I do. I have not complained that I suffer from the latest worm. I am
complaining that Microsoft puts out such buggy software. Is this
sinking in?
 
x-no-archive: yes

Kevin Davis³ said:
What if some frickin' meteor landed on your house and smashed you?
Quit coming up with lame excuses. If ZoneAlarm crashes on you,
restart your system and scream at ZoneLabs for their crappy software.
If the firewall was "accidentally" misconfigured or whatever - that is
YOUR fault.

Lame excuses? That's what you shills are offering up on behalf of
Microsoft. So if a user misconfigures their firewall, and they fall
victim to this worm, then THE USER is solely responsible, and Microsoft
is NOT responsible at all? Does YOUR mother, uncle, sister know how to
configure a firewall? Does the average Windoze user? Yes, that's
right, I have you by the nuts.

And it seems you disagree with the Microsoft spokesman. A quote
(http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030813/ap_on_hi_te/
internet_attack):

Microsoft spokesman Sean Sundwall acknowledged that the blame does not
really lie with customers.

"Ultimately, it's a flaw in our software," he said.
 
Mike said:
x-no-archive: yes

kurttrail said:
Yeah, and the overrun has been in 4 NT OSs since 1996! If time alone
is a measure of negligence, MS is the winner in a first-round KO!


Yeah, but do they guarantee that it won't screw up something else,
like 811493 did!


Ok, that covers about 1% of computer users, what about the 99% that
aren't "reasonably knowledgable" about computing?!

You mean like Bruce Schneier's own mother?

[T]o expect home users to keep their systems current is unreasonable,
said Bruce Schneier, chief technology officer with Counterpane
Internet
Security Inc. He blames software developers for writing bad software
that constantly need "critical" patches.
"My mother will never install the patch until I come visit," he said.
"I
couldn't even call her and walk her through it. The industry is wrong
to
expect her to do it. The fact that she sends me e-mail is incredible
enough."

http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030813/ap_on_hi_te/internet_attack

Of course, the nitwits who are defending Microsoft here *surely* know
more about security than Bruce Schneier. [uncontrolled laughter]


"Microsoft spokesman Sean Sundwall acknowledged that the blame does not
really lie with customers."


"'Ultimately, it's a flaw in our software,' he said."

Even MS's own spokesman knows where the ultimate blame lies!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
Mike Terenni said:
x-no-archive: yes



Hah--as if I should HAVE TO wait while my system was held hostage by a
huge Microsoft security flaw?
Sometimes life sucks. Any strong person just deals with it and moves on.
Everything has flaws and they will always exist, why cause we are human. We
are not perfect, machines are not perfect, software is not perfect and never
will be, at least not in our lifetime. So big deal you don't have the net
for a day or so. You can still use the computer. Yes it's ms fault, but the
user is equally to blame as well as the scum that writes malicious code.
 
purplehaz said:
Sometimes life sucks. Any strong person just deals with it and moves on.
Everything has flaws and they will always exist, why cause we are human. We
are not perfect, machines are not perfect, software is not perfect and never
will be, at least not in our lifetime. So big deal you don't have the net
for a day or so. You can still use the computer. Yes it's ms fault, but the
user is equally to blame as well as the scum that writes malicious code.


We aren't being held hostage by security flaws....we are being held hostage by
the immature worm and virus writers. Whoever wrote the latest worm probably
jerked off while the internet ground to a halt.
 
purplehaz said:
http://story.news.yahoo.com/news?tm...0030813/ap_on_hi_te/internet_attack&sid=95573

Like I said before ms, consumers, and the scumbags are to blame. All
three.
So what you said is very true....... but......... consumers should be
blamed
for not knowing how to keep there computer updated. It's a fact of
computing. Everyone who drives a car knows how to put gas in it.

Only because most states stopped having Full-Service gas stations. Back
before Self-Service became the norm, a lot of drivers never filled up
their own gas tanks.

Patches are the gasoline of MS's OSs? Are you really sure that is an
appropriate analogy?
Everyone
owning a computer should know how to use windows update.

Why? Most of the computer users I know, can't even organized their own
start menus, let alone keep up with all the holes in MS's software.
Put the
blame where
it should be. Blame ms for the shotty programming, blame consumers
for not
using there expensive tools(computer) correctly, and blame the scums
for
writing malicios code. All three are equally to blame, IMHO.

MS - yes
Scumbags - yes
Consumers who paid big bucks for a perenial work-in-progress - no,
especially when you consider all the time & effort MS puts into
developing technologies that is of no use to most end users like PA &
DRM, instead of making more secure software that would benefit all
first!

When MS's OSs don't need to be patched every week, then I might be more
sympathetic to you wanting consumers wanting to share in the blame
between all three groups. Give me a call when that happens!

Not let's bring this back to the car analogy. If you had to take in
your car every week due to a recall, how long would you continue to put
up with it, before you try to seek some legal remedy under state lemon
laws? Now consider that this is the only that you can buy. Most
computer neophytes have no other choice but MicroSwissCheese, and there
are no lemon laws to protect them from a greedy predatory monopoly, more
concerned about locking up copyrighted material, than putting out a
product that doesn't quite have so many defects in it.

Would you buy a car built on the same principles that MS makes their
software? A recall for a major flaw each and every week!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
purplehaz said:
Full service gas stations? What's that? I think I remeber one when I
was
like 5 or 10, way before my driving time. I can't go on how it used
to be, I
can only go on how it is now. You have to know how to pump the gas to
drive(unless your rich and the driver does it for you) ;o)

I lived in NJ for most of my life, and self-serve stations took a lot
longer than most places to take hold.
Well ok maybe that wasn't the best analogy.. well actually
maybe....... I'm
no ms lover that's for sure, but not an ms hater either, and well
without
the patches the os would probably die, so maybe the patches to the os
is
like gas to a car. Without it, it won't work for long.

Exactly my point. If you want to own a computer learn to use it
correctly.
Updates and security are essential. They must learn(imho). It's a
tool, not
a toy.


Kurt, I'm in the states. The cars they make here do need patches every
week - lol. It's the norm to get recalls all the time. I drive a Ford
Mustang, I love it and would never drive anything else, but it ain't
a BMW.
breakdowns so far)

Recalls are normal, but the frequency of them is not.
I do agree with all that you say about if we could have an os that
didn't
need patches and if ms would spend more time with "stuff" and not
"fluff" we
all be better off. I agree whole heartedly, but (back to reality),
that's
just not gonna happen and probably not even in our lifetime. When that
happens the programming languages we use today will be long gone. The
languages/technology themselves are flawed, no way around it. So since
there's nothing you or I or any consumer can do about it(except get a
job at
ms or develop linux) it would be in the best interest of consumers to
learn
how to keep the computer running correctly or at least pay someone to
do it
for them weekly.

And I agree that people need to learn more about computing, and this
worm is a practical lesson for a lot of the neophytes. I'm sure most
people that have gotten this are beating themselves up inside, and we
really need to show guidance & understanding at this particular point in
time, not value judgements.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
kurttrail said:
I lived in NJ for most of my life, and self-serve stations took a lot
longer than most places to take hold.


Recalls are normal, but the frequency of them is not.


And I agree that people need to learn more about computing, and this
worm is a practical lesson for a lot of the neophytes. I'm sure most
people that have gotten this are beating themselves up inside, and we
really need to show guidance & understanding at this particular point
in time, not value judgements.

.. . . on the victums of these malicious acts of scumbags, taking
advantage of MS's insecure software.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
John said:
Don Burnette, after spending 3 minutes figuring out which end of the


Well, at least you've answered my question to you from another
post, and the answer sure as hell ain't 'or what'.

John

Why are you always bringing up the rear with Kurt??
 
Actually, that "duh" is on you. If you are running a system that you
know not to be patched, and you can't get the patch, you should shut it
down or disconnect it, not simply hope that a firewall will work and be
properly configured.

This is the words of someone who must not understand how a firewall
works. You don't "hope" it works and it doesn't take rocket science
to get them configured properly. Particularly some of the personal
firewall products like ZoneAlarm.

I do. I have not complained that I suffer from the latest worm. I am
complaining that Microsoft puts out such buggy software. Is this
sinking in?

No, nothing bad happened to you. You had a firewall on. You have
unknowningly proven my point. Have you ever used Linux and have had
the up2date turned on? It will ask you to download patches just as
often as Windows does. Microsoft is certainly not alone as far as
"buggy software" goes.

And I have to ask myself what kind of person complains like this.
Certainly one with an agenda/axe to grind. It's like buying a Ford
and having nothing go wrong with it and still complain what crappy
products Ford makes.
 
x-no-archive: yes



Lame excuses? That's what you shills are offering up on behalf of
Microsoft. So if a user misconfigures their firewall, and they fall
victim to this worm, then THE USER is solely responsible, and Microsoft
is NOT responsible at all? Does YOUR mother, uncle, sister know how to
configure a firewall? Does the average Windoze user? Yes, that's
right, I have you by the nuts.

Most of the above you have mentioned have firewalls installed.
Something like ZoneAlarm which requires little to no knowledge to
maintain. In any case they would have to intentionally misconfigured
the firewall, or not have one installed *and* not have automatic
update configured. Looks like they slipped out of your hands.

And it seems you disagree with the Microsoft spokesman. A quote
(http://story.news.yahoo.com/news?tmpl=story&u=/ap/20030813/ap_on_hi_te/
internet_attack):

Microsoft spokesman Sean Sundwall acknowledged that the blame does not
really lie with customers.

"Ultimately, it's a flaw in our software," he said.

So? I disagree with you, too. The guy is out there doing damage
control. Do you really expect him to say the truth (that it is mostly
the clueless users' fault)?
 
And I have to ask myself what kind of person complains like this.
Certainly one with an agenda/axe to grind. It's like buying a Ford
and having nothing go wrong with it and still complain what crappy
products Ford makes.
Well, Kurt and Mike (and those like them) do serve a purpose - they make
people learn how to use the killfiles in their newsreader. They've pretty
well proved they have nothing of value to say.

--
If you have to ask if your copy of XP is 32 or 64 bit, it's 32.
Getting Messenger popups? Turn on your firewall!
Patch from Microsoft:
http://tinyurl.com/h84v
More info from MS:
www.microsoft.com/security/incident/blast.asp

(Stolen with pride from Gary Thorn... thanks!)
 
Kevin said:
So if this such a blatant issue since 1996, don't you think the
hackers would have hammered on it immediately? Fact is, MS put out a
patch well before the hackers had anything out that would exploit it.
That's about all you can reasonably ask for. Other OS's have
vulnerbilities too and handle it much the same way.



Like I said, the patch had been out a month before the exploit. You'd
screaming banshees complaining about the patch if it was bad within 24
hours of it's release.

And it took MS something like 4 days to even acknowledge the problem
with 811493, and a month or so more before the patched was fixed.
Wait a few days, maybe a week, you hear
nothing, the patch is very likely OK. This would have had your patch
installed about 3 weeks before the worm was released.

Not in my office. It's got to wait in line lately with all the patches
that MS has had to release lately. And I test it out on my machine for
another week, before implementing it. So after waiting in line, and
doing my own testing, more than a month could go by.
They should have the automatic updates turned on.

Yeah right! A lot did before 811493! That practical eXPerience taught
many to turn it off!

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
EGMcCann said:
Except that he was told something about "root," and didn't see any
growing out of the bottom of the CD.

Face it, Kurt, Mike, and who is it that's joined 'em now, John
something? don't want to admit that Microsoft *did* take the
responsible action when they learned of the vulnerability and put out
a patch... a month ago. I think Mike was the one coming up with
"What if I was in europe for a month? What if I just bought a PC
today! What if I were stuck in space with my head up my...." They
don't want anyone other than Microsoft to be blamed. That's their
agenda.

And to get them thoroughly confused, here's what "trustworthy"
computing (as mentioned in the subject line) is:

You're getting a taste of it with digitally signed drivers. An
application gets a certificate or signature that allows it to run at
a higher "trust" level inside the system. That means that the system
itself "trusts" the application not to get screwed up.

An "untrusted" application would be much more restricted in what it
could do.

It has *nothing* to do with how stable, virus-free, useful, fun,
productive, or cute the application is. Yes, a virus writer could
probably forge a "trusted" certificate and enable their virus to
screw over any system it touched.

And no, this was *not* dreamed up by Microsoft. Used by them? Yes.
It's also a part of the domain model (in trusted / trusting domains
when you set up sharing privileges between the two.) But it's not
their creation.

Why are you directing comments to people you announced to the group that
you Plonked?

http://snurl.com/21s1

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.kurttrail.com
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei!"
 
Back
Top