Spyware, Adware, Windows, GNU/Linux, and Software Culture .

This Article has been wrtten by Karsten M. Self and taken from here


Spyware, Adware, Windows, GNU/Linux, and Software Culture
.

For starters, I’ll note that I run GNU/Linux on my own personal
desktop, both at home
and at work, and that the problems delineated
in the article simply don’t exist for me there. While I strongly
favor Linux, I consider my bias grounded in experience and reality.
I’ve certainly had years of experience with both types of
systems.

I run herd over a small posse of legacy MS Windows systems at
work, a youth center in Napa, CA. I’m also called on periodically
to do maintenance on PCs used by adult staff in various businesses.
I have to say the the whole issue of spyware, adware, viruses,
worms, and other annoyances (generally: malware) really opened my
eyes to the problems MS Windows users face.

Among topics the article didn’t address for reasons of space and
focus:

  • Keeping things clean. I’ve found a few
    tricks that work, at least for the moment, with vigilance,
    paranoia, and a healthy dose of luck.
  • Experiences. Just how bad the problem is,
    with some quantified examples.
  • Some cultural observations.
  • Ironies.

There were also a few general observations I had on the spyware
/ adware / malware issue. Briefly (and there’s more at depth later
on most of these points):

  • Seeing both GNU/Linux and Windows systems running
    side-by-side, the magnitude of the problem is just unbelievably
    different. As in: nonexistent vs. a major constant concern.
  • It is possible to protect MS Windows systems against
    the problem. But it’s a lot of work, restricts a lot of the
    so-called useful functionality of the platform, and in my case
    involves no email, greatly limited downloads, rather effectively
    blocking use of MS Internet Explorer, and keeping virus and
    adware definition files up to date. I spend thirty minutes daily
    on this for ten systems and still don’t feel I’ve got things
    comfortably nailed down. For those interested in the “how”, I
    cover this in some detail below.
  • Typical small enterprise use of MS Windows is an absolute
    nightmare from an adware/spyware perspective, and (so far) you
    couldn’t pay me to go there. Home-usage is probably even
    worse.
  • Most telling is the difference I see between the applications
    space in my preferred GNU/Linux distribution (or version),
    Debian, and MS Windows. Boiling it down: in a collaborative, open
    platform, programs have to obey rules to be included. In a
    fiercely competitive environment, there’s ferocious levels of
    backstabbing and low tricks to try to get applications in front
    of the user or on their system. Adware and its ilk are a logical
    extension of the existing proprietary software marketplace.
    There’s considerably more on this below.

Read more

su — Run a shell with Substitute User

The Indian Patent Office has published a draft patent practice manual.
Read the draft and Email your suggestions to Mr Ramanraj K (ramanraj.k
at gmail dot com), before 15th of August 2005.
URL: http://gnowledge.org/pipermail/fsf-friends/2005-June/003381.html

One Day One Command
===================

su — Run a shell with Substitute User

Summary:

`su’ allows one user to temporarily become another user. ?It runs a
command with the Real & Effective user id, group id and supplemental
groups of a given user. If user not given, it will login as root.

Read more

Allowing users to run root programs

When a user starts a command, it runs with the permissions of that
user. What if you want to allow them to run some commands with root
permissions? You can, and that’s called suid.You can set a command to
be suid root with the chmod command. This will make it run as root even
if a user starts it. Here is how to set mybin suid root:

chmod +s mybin

Note that you must be very careful with this option.
Read more

Explore ext2/ext3 filesystem on windows

Explore2fs: This is an explorer like program which can read and interpret the Linux ex2fs/ext3fs filesystem on windows to download this http://uranus.it.swin.edu.au/~jn/linux/ This is to…

bzip2 — A Block-sorting file (de)compressor.

Mr Mukund has developed a Perl extension for an Interactive Voice
Response (IVR) System with play back and voice menu options.
URL: http://search.cpan.org/search?mode=module&query=IVRS
(Thanks FSUG-Bangalore)

One Day One Command
===================

bzip2 — A Block-sorting file (de)compressor.

Summary:

bzip2 compresses files using the Burrows-Wheeler block sorting text
compression algorithm, and Huffman coding. Compression is generally
considerably better than the conventional compressors, & approaches
the performance of the PPM family of statistical compressors.

Read more