So, effectively to get a virus through into a release, you would pretty much have to have the entire group of developers in a project deliberately aiming to do this.So dont say its just Linux having that issue, driver support is something which is up to the product maker to provide.
Doco Photoshop Documents Panel.Rar 7.07 Mb Drivers Come OnFor starters, the vast majority of drivers come on the install CD, not DVD, or come via your ISP for free, and uncapped.Its free, your ISP has it all, and you get it without impacting your quota.
You see, weve handled all of that, the vast majority of times youll never have to look outside your ISPs repository for anything. The other day, my uncles NTFS partitions which held Windows 7, developed bad sectors, now, his internet was cut off at the time, long story, he went to Thailand, and came back and his internet had lost its ADSL codes. We could read the hard drive, but the bad sectors had basically destroyed the file allocation tables, or the NTFS equivalent. He didnt realise that linux has an option for opening docx files. Amazing isnt it You get these Windows knobs who think that us linux peeps cant do bloody anything, and that we dont have any alternatives for Windows concepts. Maybe you prefer chromium to firefox Great, install it, and all for free. Linux repository beats the shit out of the whole virus scene. Dont get me started on the amount of hard drive space and memory that Windows needs. How can you sneak a virus or anything else onto a system like this. Doco Photoshop Documents Panel.Rar 7.07 Mb Software Ever CompeteHow can someone paid to write software ever compete with those types of numbers Microsoft would be bloody stupid to believe they can keep this game going. ![]() That doesnt even consider the fact that source code auditing isnt 100 perfect either. A non-running program can offer no protection against someone understanding and changing its operation. UAC is simply a gateway between non-admin permissions and admin level permissions. I turned UAC to its highest setting, which means all admin tasks are denied unless the user explicitly allows it. At this setting, unlike lower settings on windows 7, the system makes no decision what admin tasks can be done without user prompting. Rootkits definitely need admin access to fully install though, which this attack never received. Your whole grasp on how computer security works and what is possiblenot possible seems very shaky.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |