So, you know that hidden window?

The one that you are using to block REAL "desktop" developers from usurping all of your scandalous money making schemes, with 8 and 10?
I am gonna SHATTER it and put all that work you spent trying to stifle end user and developer evolution to waste. 
I allowed it to stay, on 8, cause 8 sucked so much ass and decided to let it be. But then you had to go and do all of this. Your tactics have changed, due to backlash from 8 But the resulting stifling of the world's progression so that you can turn a buck,
has remained. 
No need to reply, I wont be here. Have no interest in your response. Would be wise to begin thinking about being "about" end user and developer evolution, first and foremost, not your pocketbook. Cause this line that you currently are on is only
going to end up as a bust. 

What I've read about it has a nasty tweak, a properly crafted .desktop file could launch a dialog asking for your/root password, at that time it wrecks havoc in the system and open the add/remove software, updates or whatever is it disguised to do and the user doesn't realize what just happened.
Of course there is always the other option of running as user and do whatever it can, if the creator is smart and lucky enough he/she will be able to put a nasty payload on the autostart list and the user can have a zombie machine without even knowing.
It doesn't need to break the system to do a lot of damage, wiping or stealing data from the user account is enough. Of course, this has a higher probability of happening if you run and/or install everything you find in untrusted places without proper review first.
The thing is that there are so many distros and so many versions of each distro, each with slightly different settings, DEs, browsers and whatnot that I guess it still isn't worth the bother unlike with platforms where everyone uses the same browser, possibly the default settings that come with a clean system install and worse, no security updates/patches.
Add to this the complete lack of good sense and the common (and somewhat accepted I guess) practice of using cracks and keygens for you know what and you start to understand how come at least some users keep getting the same problems over and over again.
These days with linux it is extremely easy to keep the system up to date with the latest security fixes, users tend to look free alternatives to payed programs and look first in the package manager to see if it is already available, this alone helps a lot, add a dose of good sense and you should be good to go.

Similar Messages

  • Did you know that your Internet Explorer is out of date?

    Hello there,
    when i access this site http://www.sickkids.ca/ , I am getting this error message, please advice.
    Did you know that your Internet Explorer is out of date?
    To get the best possible experience using our website we recommend that you upgrade to a newer version or other web browser. A list of the most popular web browsers can be found below"

    It's probably giving you that warning because your Firefox is very out of date. Please read [http://www.getfirefox.com www.getfirefox.com] to see how to update to the latest version of Firefox (14.0.1 right now)

  • Did you know that Verizonwireless is saving your checking account information when you pay your bill by check and then making it part of your "MyVerizon"? This means of course if they get hacked that information could be compromised. What do you think of

    Did you know that Verizonwireless is saving your checking account information when you pay your bill by check and then making it part of your "MyVerizon"  without you adding it? This means of course if they get hacked that information could be compromised. What do you think of this?

    Credit card and debit card and checking and savings information is encrypted so it is possible to be hacked, but the odds are greater to get hit by the Love Boat then to have a wide scale hack.
    Oh yes they do happen, Bank of America, Chase, Citibank, Target and quite a few others. But in all the years I have paid my invoice with saved card information I never been hacked.
    You use good passwords and the risk is minimal.
    Good Luck

  • Did you know that the  carrier Verizon offer the merge conference call or internet while on call on the iphone? Only AT

    Did you know that you can't use the merge function on a iPhone 4s with Verizon Wireless? They blocked the function only AT&T has it, also Verizon doesn't allow browsing the Internet while on a call like AT&T, huge mistake Verizon. For people that conference call, don't get tricked into changing carriers until Verizon changes this feature.

    Not sure about the merging of calls, but being able to browse the internet while on a call can't be done with CDMA technology -- so it's not that Verizon doesn't allow it, it just can't be done on their network. This is old news ...

  • Did you know that verizon charges ¢50 for calls from the US to Canada?  Just dialing an area code like 604 (Vancouver, CA), will create charges at a rate of ¢50/minute.  Amazing that they can charge this much for a call to Canada.  I know they have it som

    Did you know that verizon charges ¢50 for calls from the US to Canada?  Just dialing an area code like 604 (Vancouver, CA), will create charges at a rate of ¢50/minute.  Amazing that they can charge this much for a call to Canada.  I know they have it somewhere in their contract/website.

    Did you know that verizon charges ¢50 for calls from the US to Canada?  Just dialing an area code like 604 (Vancouver, CA), will create charges at a rate of ¢50/minute.  Amazing that they can charge this much for a call to Canada.  I know they have it somewhere in their contract/website.

  • Hello, do you know that when you play a song skips or returns and does not play properly?

    Hello, do you know that when you play a song skips or returns and does not play properly?

    I can not fix this problem and it happens with songs purchased or imported from a CD

  • I just wanted to let you know that you have lost ANOTHER customer and more to c

    Nothing you can do at this point will EVER make me want to purchase your products. I have ripped out the cards in my other computers and trashed them. I have forwarded this community abuse stupidity you have instigated?to all of my friends and they are as irritated as I am. Your questionable approach to business practices will continue to dri've you out of business. You have left a bad taste in many mouths with your driver support fiasco.
    Whoever approved the stance you took on community based support for technology that WE the consumer purchased and own, should be fired. Your approach to business is the definition of evil. It isn't over. Your company is history to many.

    Apple sent email to all our customers using our business account email address.  Our customers received email below from our email address:
    Dear member,
    This is a message by the system to let you know that you have to confirm your account information. Your account has been frozen temporarily in order to protect it.
    Once you have updated your account records, your information will be confirmed and your account will start to work as normal once again.
    -Please make sure to link your credit card to your account just to confirm your identity.
    Sign in to your Apple ID
    unsubscribe | Support | Privacy Policy
    Copyright © 2014 All Rights Reserved.

  • You know that whole .desktop file security scare?

    It goes something like this:
    1) Open a malicious email attachment or go to a website with malicious javascript or whatever...
    2) A program is downloaded and executed with your permissions
    3) It edits ~/.local/applications/synaptic.desktop or whatever other popular program.
    4) In the new .desktop file it adds to the run command some nasty key logger, so now when you launch Synaptic (or pacman if someone were to attack Archers) it logs your keystrokes.
    5) Now it has your root password and can do whatever it wants.
    I just want to know: How likely is this, really??
    Can a website seriously just download and run a file without me knowing? I doubt Firefox would let that happen... Or could an email attachment be executed without me being able to read it first? I'm pretty sure it can't...
    I don't understand why people seem to be concerned about .desktop files...
    I'm not even worried about my Windows machine on my home network. My router is set to reject as much stuff as it can and all computers have remote log-ins disabled. The only security problem I worry about is that my Fiancee's online courses actually send .doc's through the net, which I've heard is bad practice.

    What I've read about it has a nasty tweak, a properly crafted .desktop file could launch a dialog asking for your/root password, at that time it wrecks havoc in the system and open the add/remove software, updates or whatever is it disguised to do and the user doesn't realize what just happened.
    Of course there is always the other option of running as user and do whatever it can, if the creator is smart and lucky enough he/she will be able to put a nasty payload on the autostart list and the user can have a zombie machine without even knowing.
    It doesn't need to break the system to do a lot of damage, wiping or stealing data from the user account is enough. Of course, this has a higher probability of happening if you run and/or install everything you find in untrusted places without proper review first.
    The thing is that there are so many distros and so many versions of each distro, each with slightly different settings, DEs, browsers and whatnot that I guess it still isn't worth the bother unlike with platforms where everyone uses the same browser, possibly the default settings that come with a clean system install and worse, no security updates/patches.
    Add to this the complete lack of good sense and the common (and somewhat accepted I guess) practice of using cracks and keygens for you know what and you start to understand how come at least some users keep getting the same problems over and over again.
    These days with linux it is extremely easy to keep the system up to date with the latest security fixes, users tend to look free alternatives to payed programs and look first in the package manager to see if it is already available, this alone helps a lot, add a dose of good sense and you should be good to go.

  • Did you know that HP has a channel on YouTube?

    Did you know HP has a YouTube channel containing various videos covering common questions and PC tasks?  This includes desktops, notebooks, and printers.
    The channel can be found here.  Under Browser videos, the right side of the page will have three other channels for specific product lines.
    ↙-----------How do I give Kudos?| How do I mark a post as Solved? ----------------↓
    This question was solved.
    View Solution.

    I do hope others find the videos useful. 
    ↙-----------How do I give Kudos?| How do I mark a post as Solved? ----------------↓

  • Did you know that a phone number from a webpage loads to your contacts?

    Very cool - I was looking up the phone number of a restaurant on its web page using my iPhone; the phone displays all telephone numbers as blue links - touch it and the phone dials. But, this I didn't know, the phone also names the number and puts it in your contacts list! No $1.50 calls to 411; no reason to write down or enter the info yourself, it's there! And if you don't want it for some reason, just delete the contact. Who would want that "ZUNE" thing when Apple's products anticipate what you want to do? I love my iPhone!

    Interesting - it somewhat works for me.
    I have used Safari Google (m) to find a business, clicked on the found link and iPhone took me to the Maps application, tapped the info bubble in the map, and it formatted the new contact for me, Name, phone, address, webpage etc - and gives me the choice to create a new contact or add to existing contact. I've used this feature a few times in the wild, but never noticed the contact being created automatically without a confirmation.
    First time it happened I whooped out loud (on the street) - okay, I'm a geek.

  • Did you know that TM's browser will NOT back up your sent E-mail messages?

    In Apple Mail anyway.
    Since Verizon Yahoo! password fiasco, I decided just re-do my Verizon E-mail account. Figuring if I lost messages that I could bring the messages back in TM's browser.
    I lost all my sent messages. I thought okay I'm going to enter my TM's browser and bring them back. However you can't do it for strange reason, the browser only has the NOW going. The pass is greyed out.
    I know I should try the hard backup with Leopard's CD, but that's a pain in the butt. Besides I've saved a few E-mails since then too.
    My main point is that I thought that TM's browser could restore EVERYTHING on my Mac. I've gotten a little sloppy since TM figuring that I had a good and fast backup system.
    If TM's browser doesn't backup everything then Apple needs to tell us what it doesn't back up.

    Here is a list of things TM excludes by default:
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    <key>ContentsExcluded</key>
    <array>
    <string>/Volumes</string>
    <string>/Network</string>
    <string>/automount</string>
    <string>/.vol</string>
    <string>/tmp</string>
    <string>/cores</string>
    <string>/private/tmp</string>
    <string>/private/Network</string>
    <string>/private/tftpboot</string>
    <string>/private/var/automount</string>
    <string>/private/var/log</string>
    <string>/private/var/folders</string>
    <string>/private/var/log/apache2</string>
    <string>/private/var/log/cups</string>
    <string>/private/var/log/fax</string>
    <string>/private/var/log/ppp</string>
    <string>/private/var/log/sa</string>
    <string>/private/var/log/samba</string>
    <string>/private/var/log/uucp</string>
    <string>/private/var/run</string>
    <string>/private/var/spool</string>
    <string>/private/var/tmp</string>
    <string>/private/var/vm</string>
    <string>/private/var/db/dhcpclient</string>
    <string>/private/var/db/fseventsd</string>
    <string>/Library/Caches</string>
    <string>/Library/Logs</string>
    <string>/System/Library/Caches</string>
    <string>/System/Library/Extensions/Caches</string>
    </array>
    <key>PathsExcluded</key>
    <array>
    <string>/.Spotlight-V100</string>
    <string>/.Trashes</string>
    <string>/.fseventsd</string>
    <string>/.hotfiles.btree</string>
    <string>/Backups.backupdb</string>
    <string>/Desktop DB</string>
    <string>/Desktop DF</string>
    <string>/Network/Servers</string>
    <string>/Previous Systems</string>
    <string>/Users/Shared/SC Info</string>
    <string>/Users/Guest</string>
    <string>/dev</string>
    <string>/home</string>
    <string>/net</string>
    <string>/private/var/db/Spotlight</string>
    <string>/private/var/db/Spotlight-V100</string>
    </array>
    <key>UserPathsExcluded</key>
    <array>
    <string>Library/Application Support/SyncServices</string>
    <string>Library/Caches</string>
    <string>Library/Logs</string>
    <string>Library/Mail/Envelope Index</string>
    <string>Library/Mail/AvailableFeeds</string>
    <string>Library/Mirrors</string>
    <string>Library/PubSub/Database</string>
    <string>Library/PubSub/Downloads</string>
    <string>Library/PubSub/Feeds</string>
    <string>Library/Safari/Icons.db</string>
    <string>Library/Safari/HistoryIndex.sk</string>
    </array>
    </dict>
    </plist>

  • Dam, did you know that ppl make things harder then they should be

    As I look here and other places I see that people make things harder then what they need tobe.I see people fearing fear when it comes to programming.They are so worried if they are going to make it or if they will pass this test or that test,well I got one thing to say and that is relax and just chill.Look at it this way it will if it will it won't if it won't.The point is enjoy what you do and live life that way,if you dont enjoy programming stop now.
    Just a thought from a hobbies

    And you should be using C instead of Java, right? :)
    Well I would not go that far cause that would be
    comparing languages then and I know all languages have
    there good points and bad points.Know one can really
    say what language is better cause it all depends on
    what you are trying to acomplish/do.But with that said
    what the hell ,yeah you should be using C instead of
    java if you are just starting to learn how to
    program.:-p So why not Pascal?

  • How do you know that the DB Adapter has stopped polling

    Hi,
    Is there a smart way to figure out if the DB Adapter has stopped polling a table ? [We are using logical delete polling strategy].We are looking for a better alternative than just verifying the entire laundry list of tables for the markUnreadValue after every polling interval.
    rgds,
    Ram

    Thank you for your post. Although this is a feature for Buzzword, right now it's not possible to know if someone has viewed a file you've sent via Share. We are working to integrate Share/My Files/Buzzword so that this will be corrected in future.
    Let me know if you have additional questions.
    Michelle

  • Do any of you know why a window appears?

    When I connect the shuffle to the USB and use itunes a window appears it is "ipod E:" and in this is the folder "ipod_controls" this keeps showing up with every song I try to remove and when I try to add a folder of music, itunes songs, to the shuffle. This wouldn't be as annoying if the shuffle played music...it's brand new, yesterday when I tried to use it a message said their was an error of the "volume" and since it was a windows error I ignored it. Now I get the other window and no music plays...does anyone know what I should do?

    When you transfer the songs to the shuffle are you doing this through iTunes? If you're transferring them through Windows Explorer, it won't play the songs
    The window you see is not a big deal and shouldn't affect the operation of the iPod. I think you can make it go away by going to the iPod preferences in iTunes and checking OFF "Enable disk use"

  • Did you know that if your phone is stolen, Find my Phone is useless?

    Lessons from my lost iPhone. Despite having a pin to unlock the iPhone, you can simply power off the phone with a long press of the power button. Which means that if your phone is stolen and the thief is smart enough to turn it off (is there one who isn't?), 'Find my phone' is virtually useless!
    Also, you can use Siri on a locked phone to make phone calls and send messages. There are also enough tips available on the internet that show you how to use Siri to unlock the phone, making all your photos, emails and other information available to anyone keen enough to find it.
    I've written to Apple to tell them that a phone lock should really do what it says - LOCK the phone! If you own an iPhone and would like the same please write to Apple at http://www.apple.com/feedback/iphone.html
    Perhaps when enough people write they'll actually take some notice!

    This subject is discussed fairly frequently. Find my iPhone is not useful unless a particularly ignorant thief takes it. It's primary use is to find lost phones, not stolen. Requiring a passcode to turn it off eliminates one way a thief can disable Find my iPhone, but it isn't the only one, and probably isn't the one used by most professional thieves. Among other ways to disable Find my iPhone:
    Remove the SIM
    Wrap in aluminum foil
    Drop in a shoplifter's bag or backpack with its Faraday shield (copper mesh or foil lining)
    Restore the phone from DFU mode
    The Activation Lock feature, which prevents a stolen phone from ever being used again, except by the rightful owner, is the more valuable deterrent against theft. Once word gets around that a stolen iPhone is useless the market value of stolen phones will drop precipitously, and thieves will switch to stealing Android phones.

Maybe you are looking for

  • Fast way to delete all voice memos?

    My wife has a ton of Voice Memos.  When you sync photos, the photos are imported into iTunes, then deleted from iPhone.  When you sync Voice Memos, it brings in all the Voice Memos into iTunes on MacBook, but also leaves them on iPhone.  So now she h

  • CF8 jrun.exe memory usage

    Hello- Thanks in advance. I've installed an eval version of CF8 on my (future) production server running Windows 2003 Server Standard. I've noticed jrun.exe is using about 160+MB of RAM. That seems high to me, so I installed it on my development mach

  • Random model exception in WD application

    Hi, I am using NWDS CE 7.1 Ehp1. I have 3 web dynpro DCs in which I have imported a ARFC2 model for same RFC. This application was working fine in all three landscapes dev, test and prod. There was a change in table type parameter in this RFC which i

  • Totals not matching in the Report

    Hi All, I have created two calculated key figures A and B. Out of these A involves multiplication and division and B contain Addition and subtraction operations. When I execute the query, the totals in the Result rows are not matching with the exact

  • Career with HANA

    Hi Friends, I am an ABAP Developer and I have just completed my Training in HANA and I am working on my Certification. Is it good for me to have knoweldge with BW/BI and BO. With BO I am now done my training with the reporting on HANA. Kindly input y