I'm one of those intelligent, but dyslexic people...video offers great
benefits.  I have the equipment and I'm willing to get in front of the
camera, so, let's do it.

The group writes some collaborative scripts, I make a test video, review,
edit, repeat...standard 5 step engineering process.

I'll put together a short video this weekend that talks about the equipment:
camera, computer (Windows/Linux,) and various peripherals.  The limitations
of a YouTube front end and other ways to reach an audience.

Later in the year throw a giant talking TUX in the mix and we have a fun,
low-key approach, to learning Linux.  Just in time to catch the wave of GOV
adoption.  Look what's going on in Britain!

http://news.bbc.co.uk/2/hi/technology/784148

Brian

On Wed, Feb 25, 2009 at 3:24 AM, Ben Barrett <[email protected]> wrote:

> (oops)...
>  If we want to be derisive, I could offer than windows infections will
> soon become smart enough to block users from installing another OS, or
> otherwise halting their own uninstallation, or even virtualizing
> themselves into the new OS (if cpu virt flags enabled).
>
> Back to helping newbies install Ubuntu:
> I think some videos for debugging scenarios would be awesome.... for
> example, what do I do if I get the command prompt thingy?  What about
> when my screen flashes and never gets into a graphical mode?  Is there
> an easy way to capture and send some info (by email or thumbdrive) to
> help with remote debugging, before  we give up on linux (again)?  :)
> Or even, "I tried to upload Office into Linux, but the CD won't run".
> I think by using a bunch of short videos for a more-human explanation,
> huge benefits are gained.  I know lots of folks who just don't read so
> well, dyslexia or other cognititve distortion, where brief video
> explanations for FAQs, as well as walk-throughs of (parts of) the
> installation process would be dandy.
>
> I do know video is harder to maintain, but instead of looking at is as
> a feature-length documentary, so long as you don't get a horrible cold
> or go through puberty during the project, a number of shorter vids can
> be reasonably maintained.
>
> Thanks & ciao,
>
> Ben
>
>
>
>
> On Wed, Feb 25, 2009 at 3:16 AM, Ben Barrett <[email protected]>
> wrote:
> > Did I miss something, or are two word-capitalizations excessive (FLA's
> > & TLA's don't count, right)?
> > You used more than others:  three.  Need emoticons instead?
> >
> > I'd like to point out that the iterations of attack vectors has little
> > to do with install tutorials and helping
> > n00bs.  Please remember that zealousness costs more lives than it
> > saves... and that the best way
> > to avoid STD's is to be chaste.  These people want to use computers,
> > and I'd suggest that their
> > non-enterprise-managed windows PC is likely to have some sort of
> > infection already.
> >
> > If we want to be derisive, I could offer than windows infections will
> > soon become smart enough to
> > block users from installing another OS, or otherwise halting their own
> > uninstallation
> >
> >
> > On Tue, Feb 24, 2009 at 11:17 PM, Dave Compton <[email protected]>
> wrote:
> >> Yes, Microsoft Windows, by default has zero write access to anything but
> >> NTFS and FAT.  So what?  Also, by default, Microsoft Windows has zero
> >> viruses.
> >>
> >> On the other hand, Windows by default does have access to other
> partitions
> >> and it's not hard to find windows code that is capable of writing to
> ext3
> >> format file systems.  I'm sure a smart virus writer would be able to
> >> incorporate that code into his virus and make the leap across partitions
> and
> >> operating systems if he wanted to.  If it has not been done that's
> because
> >> there's not much bang for the buck from the virus writer's point of
> view.
> >>
> >> Allen said "Then whenever you boot Wubi you get the infection."  This
> tells
> >> me that the scenario that Allen imagined involved using wubi to install
> >> ubuntu, then picking up a virus while running windows which then somehow
> >> corrupts the boot file installed by wubi.exe in such a way that it in
> turn
> >> infects your ubuntu system.  Not impossible but I still think it would
> be
> >> easier to directly write to the ext3 filesystem from windows.  The point
> of
> >> my original post was to make a COMPARISON between the two risks.  I
> still
> >> think that the direct danger to a linux system from a infected windows
> >> windows system makes any additional risk due to having installed via
> wubi
> >> INSIGNIFICANT.
> >>
> >> Maybe Allen had something else in mind .  Several other possibilities
> >> occurred to me but in each case I could come up with a similar line of
> >> reasoning.
> >>
> >> If my reasoning is wrong please let me know but, in fact, I didn't
> >> COMPLETELY miss anything.
> >>
> >> - Dave
> >>
> >> p.s.  Maybe in the future we can skip the excessive caps.
> >>
> >>
> >> Mr O wrote:
> >>>
> >>> Except you COMPLETELY missed the fact that Microsoft Windows, by
> default,
> >>> has ZERO write access to anything but NTFS and FAT.
> >>> Now, infected Wubi.EXE, that's different. Many viruses target EXE files
> >>> but a seperate partition is a no-go.
> >>>
> >>>
> >>> --- On Tue, 2/24/09, Dave Compton <[email protected]> wrote:
> >>>
> >>>> From: Dave Compton <[email protected]>
> >>>> Subject: [Eug-lug] Re: Linux Ubuntu Install Tutorial
> >>>> To: "Eugene Unix and Gnu/Linux User Group" <[email protected]>
> >>>> Date: Tuesday, February 24, 2009, 8:37 PM
> >>>> I think the greater danger is from dual booting windows
> >>>> & linux (with or without wubi).  An infected windows
> >>>> machine could write malware directly to the unbooted linux
> >>>> partition.  This would be both an easier way of spreading an
> >>>> infection and more effective since *any* windows/linux
> >>>> system would be vulnerable to it - not just those that were
> >>>> installed via wubi.
> >>>>
> >>>> In fact, even the generic dual boot vulnerability seems
> >>>> like a pretty convoluted way to spread malware.  Once you
> >>>> have control of a windows machine, the thing to do would be
> >>>> to *use* that windows machine to carry out your evil plot -
> >>>> not try to infect an unused linux partition in the hope that
> >>>> it might someday be booted.  The windows -> wubi ->
> >>>> linux risk seems even lower.
> >>>>
> >>>> Once the wubi install process is complete you *do* end up
> >>>> with a linux system that, at a low level, piggybacks off of
> >>>> the windows boot system to work.  It bothers me too but just
> >>>> as a matter of principle - not for security reasons.
> >>>>
> >>>> - Dave
> >>
> >> _______________________________________________
> >> EUGLUG mailing list
> >> [email protected]
> >> http://www.euglug.org/mailman/listinfo/euglug
> >>
> >
> _______________________________________________
> EUGLUG mailing list
> [email protected]
> http://www.euglug.org/mailman/listinfo/euglug
>
_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug

Reply via email to