Stop Microsoft

Miscellaneous => Intellectual Property & Law => Topic started by: cloudstrife on 6 August 2002, 20:09

Title: Microsoft's 7 steps to computing security
Post by: cloudstrife on 6 August 2002, 20:09
:rolleyes:  

check this out, i found it on M$'s web site:

http://www.microsoft.net/security/articles/steps_default.asp (http://www.microsoft.net/security/articles/steps_default.asp)

lol
Title: Microsoft's 7 steps to computing security
Post by: Ice-9 on 6 August 2002, 21:57
And every moron that's gonna read that (anyone looking for security tips on a M$ website is a moron by definition) is gonna go "Oh wow, luckily my Xpee has all of that, I'll better make sure "auto-update" is turned on."
And so the Evil Empire is gonna be able to sneak in all of it's trojans and DRM stuff, bug fixes that cause more bugs, etc, etc ........
Sad story, sad story!
Title: Microsoft's 7 steps to computing security
Post by: choasforages on 6 August 2002, 22:19
1. unpluge computer
2. take harddrive out
3. get a nice drill
4. turn drill on and put through drives
5. pile computer and all removable media
6. pour gas on pile of computer shit
7. strike match, your data is now secure from hackers
Title: Microsoft's 7 steps to computing security
Post by: lazygamer on 8 August 2002, 14:35
quote:
Although the Internet opens doors to vast new and exciting opportunities
Title: Microsoft's 7 steps to computing security
Post by: jtpenrod on 9 August 2002, 11:28
So M$ has: "7 Steps to personal Computing Security"

Actually, I prefer these Steps instead:
Code: [Select]
   :D        :D        :D    
______________________________________

Live Free or Die: Linux
(http://www.otakupc.com/etsig/dolphin.gif)
Their fundamental design flaws are completely hidden by their superficial design flaws.

[ August 09, 2002: Message edited by: jtpenrod ]

[ August 09, 2002: Message edited by: jtpenrod ]

Title: Microsoft's 7 steps to computing security
Post by: beltorak0 on 10 August 2002, 04:47
I especially like this (in the keep-software-up-to-date link):
 
quote:

Responsible software vendors stay vigilant and, when a flaw is found in their products, build and release software fixes that restore the expected behavior.


But, sometimes it takes as long as four months to release a patch for a serious security flaw found by an independant hacker; more than three months after the hacker informed the micro$haft team, and only after the hacker released the information to the press....
responsible indeed.

-t.
Title: Microsoft's 7 steps to computing security
Post by: choasforages on 10 August 2002, 04:53
for gods sake, once someone find porno, i mean, the only way their gonna stop is if they have a girlfriend/wife that ummmmmm, helps....


now tommoraror my girlfreidn should be back so i get to put the porno away for a few months.
as for warez, i stoped useing warez when i found FREE SOFTWARE, like free speech.
as for the odd porno, hey, whatever floats your boat, as long as its consenting adults, go sheeting for all i care, i just DON'T SHOW ME.

sorry if this makes no sense, im in an odd mood/*as i said my girlfriend has been goon for like a week*/

[ August 09, 2002: Message edited by: choasforages ]

Title: Microsoft's 7 steps to computing security
Post by: lazygamer on 10 August 2002, 06:56
quote:
now tommoraror my girlfreidn should be back so i get to put the porno away for a few months.
as for warez, i stoped useing warez when i found FREE SOFTWARE, like free speech.
as for the odd porno, hey, whatever floats your boat, as long as its consenting adults, go sheeting for all i care, i just DON'T SHOW ME.


Don't worry, it don't float my boat. Im just giving an extreme example of this beautiful, cherised, trusted, institute of higher learning that every big marketing campagin says it is.  (http://smile.gif)
Title: Microsoft's 7 steps to computing security
Post by: choasforages on 10 August 2002, 07:12
umm, whats not educational about hardcore lesbo action/*buys a ticket to hell, adds to growing colletion of them*/. seems to me, next year i am going to use the joys of X11R6 to view p0rn in class. i mean, i am going to forward ssh port 23/*i think*/ to my computer off the cable modem. then i am going to ssh into my ip from school from my laptop. bring up and xterm, and open up mozilla from my system to my laptop. if i got cuaght, they would atally care less about the porn, then the forwarded x connection through there network. and i would get past bess. and then i would be like the favorite hacker/cracker in that class. untill i told poeople that they need the Xwindowing system installed, then they would ask me howto do that, and i would have to tell them howto do it on a windows computer

sorry for the rant i just started shiting out of my fingertips and put it on this board
Title: Microsoft's 7 steps to computing security
Post by: Kintaro on 10 August 2002, 18:58
http://users.bigpond.com/tate0/steps.html (http://users.bigpond.com/tate0/steps.html)