View Single Post
  #69  
Old May 5th 12, 09:03 PM posted to microsoft.public.windowsxp.general,alt.comp.hardware.pc-homebuilt
BillW50
external usenet poster
 
Posts: 5,556
Default Hardware Requirements for Internet PC

In ,
glee typed:
"Searcher7" wrote in message
...

I've learned that after an OS install staying as far away from
Microsoft and anything it wants to add has not just cause me less
problems, but has allowed me to avoid all searching, downloads and
learning curves. It's a lot easier to track down and correct problems
with your car than a Microsoft OS. That's why I reinstall regularly.
It's a lot faster and easier.

Maintenance and security related "fixes" are a pain. (But it's big
business).


No offense because I don't mean it that way, but that's all a good
sign of a user who doesn't really know what he's doing.... but if you
are trying to avoid all those "learning curves", you're not going to
learn a lot! ;-) Also, there's a difference between critical
security updates, and Microsoft's other "recommended" updates....
which I would NOT recommend on any of the MS operating systems. In
addition, on XP and earlier, MS updates to device drivers should be
avoided like a plague.


No offense Glen, but take it up a notch. If you know what you are doing,
security updates are obsolete. First I haven't found anything that can
make it through a security hole in the OS to make it past a real time AV
scanner yet. As real time scanners have two layers. One it monitors
everything coming in any port. Although I don't think this one layer is
perfect, as I somehow still believe one could get through this layer
anyway.

But the other layer of real time scanner is that first anything that
wants to execute, must also pass through this extra layer. Now nothing
has a chance. As if it can't pass this test, it can't install, run, or
anything else. It is good as dead.

One might argue what about zero day malware? Yup, that is the hole in
real time scanners. I think I saw one of them once in 30 years here. It
came as an email attachment and it passed the scan. And I thought sure,
I'll wait a day and during the next AV update we will see what happens.
Sure the next update it too was flagged.

I suppose some really need zero day protection. I never saw I needed it
except that once in my life and I was smart enough to not execute it
anyway. But there is protection here too. It is called sandboxing. Now
you can infect a system as many ways as you possibly can and nothing can
happen. As all malware is safely stuck in a tiny box and can't do
anything outside of that box, including your system.

There is one way for malware to foil a sandbox. And the only way for it
to do so is to find a security hole through the sandbox itself. Although
this has nothing to do with Windows security updates, but the sandbox
security updates instead.

So there are far better ways to protect yourself against malware than
relying on security patches. And I believe Microsoft also knows that
security patches are a joke for protection too. As why would they wait
up to 7 years to patch a security hole for? It doesn't make any sense if
they too thought they were important. As they surely don't act like they
are at all.

I believe they keep this charade up because they know if they didn't
pretend to care, people like you would never let it down. So they keep
it up and as long as they throw a few bones your way, thus people like
you stay happy.

--
Bill
Gateway M465e ('06 era) - OE-QuoteFix v1.19.2
Centrino Core2 Duo T5600 1.83GHz - 2GB - Windows XP SP2


Ads