Yes, I think these are excellent video possibilities. -- Allen Brown abrown at peak.org http://brown.armoredpenguin.com/~abrown/ Kill one man and you are a murderer. Kill millions and you are a conquerer. Kill all and you are a God. ---Jean Rostand
> (oops)... > If we want to be derisive, I could offer than windows infections will > soon become smart enough to block users from installing another OS, or > otherwise halting their own uninstallation, or even virtualizing > themselves into the new OS (if cpu virt flags enabled). > > Back to helping newbies install Ubuntu: > I think some videos for debugging scenarios would be awesome.... for > example, what do I do if I get the command prompt thingy? What about > when my screen flashes and never gets into a graphical mode? Is there > an easy way to capture and send some info (by email or thumbdrive) to > help with remote debugging, before we give up on linux (again)? :) > Or even, "I tried to upload Office into Linux, but the CD won't run". > I think by using a bunch of short videos for a more-human explanation, > huge benefits are gained. I know lots of folks who just don't read so > well, dyslexia or other cognititve distortion, where brief video > explanations for FAQs, as well as walk-throughs of (parts of) the > installation process would be dandy. > > I do know video is harder to maintain, but instead of looking at is as > a feature-length documentary, so long as you don't get a horrible cold > or go through puberty during the project, a number of shorter vids can > be reasonably maintained. > > Thanks & ciao, > > Ben > > > > > On Wed, Feb 25, 2009 at 3:16 AM, Ben Barrett <[email protected]> > wrote: >> Did I miss something, or are two word-capitalizations excessive (FLA's >> & TLA's don't count, right)? >> You used more than others: three. Need emoticons instead? >> >> I'd like to point out that the iterations of attack vectors has little >> to do with install tutorials and helping >> n00bs. Please remember that zealousness costs more lives than it >> saves... and that the best way >> to avoid STD's is to be chaste. These people want to use computers, >> and I'd suggest that their >> non-enterprise-managed windows PC is likely to have some sort of >> infection already. >> >> If we want to be derisive, I could offer than windows infections will >> soon become smart enough to >> block users from installing another OS, or otherwise halting their own >> uninstallation >> >> >> On Tue, Feb 24, 2009 at 11:17 PM, Dave Compton <[email protected]> >> wrote: >>> Yes, Microsoft Windows, by default has zero write access to anything >>> but >>> NTFS and FAT. So what? Also, by default, Microsoft Windows has zero >>> viruses. >>> >>> On the other hand, Windows by default does have access to other >>> partitions >>> and it's not hard to find windows code that is capable of writing to >>> ext3 >>> format file systems. I'm sure a smart virus writer would be able to >>> incorporate that code into his virus and make the leap across >>> partitions and >>> operating systems if he wanted to. If it has not been done that's >>> because >>> there's not much bang for the buck from the virus writer's point of >>> view. >>> >>> Allen said "Then whenever you boot Wubi you get the infection." This >>> tells >>> me that the scenario that Allen imagined involved using wubi to install >>> ubuntu, then picking up a virus while running windows which then >>> somehow >>> corrupts the boot file installed by wubi.exe in such a way that it in >>> turn >>> infects your ubuntu system. Not impossible but I still think it would >>> be >>> easier to directly write to the ext3 filesystem from windows. The >>> point of >>> my original post was to make a COMPARISON between the two risks. I >>> still >>> think that the direct danger to a linux system from a infected windows >>> windows system makes any additional risk due to having installed via >>> wubi >>> INSIGNIFICANT. >>> >>> Maybe Allen had something else in mind . Several other possibilities >>> occurred to me but in each case I could come up with a similar line of >>> reasoning. >>> >>> If my reasoning is wrong please let me know but, in fact, I didn't >>> COMPLETELY miss anything. >>> >>> - Dave >>> >>> p.s. Maybe in the future we can skip the excessive caps. >>> >>> >>> Mr O wrote: >>>> >>>> Except you COMPLETELY missed the fact that Microsoft Windows, by >>>> default, >>>> has ZERO write access to anything but NTFS and FAT. >>>> Now, infected Wubi.EXE, that's different. Many viruses target EXE >>>> files >>>> but a seperate partition is a no-go. >>>> >>>> >>>> --- On Tue, 2/24/09, Dave Compton <[email protected]> wrote: >>>> >>>>> From: Dave Compton <[email protected]> >>>>> Subject: [Eug-lug] Re: Linux Ubuntu Install Tutorial >>>>> To: "Eugene Unix and Gnu/Linux User Group" <[email protected]> >>>>> Date: Tuesday, February 24, 2009, 8:37 PM >>>>> I think the greater danger is from dual booting windows >>>>> & linux (with or without wubi). An infected windows >>>>> machine could write malware directly to the unbooted linux >>>>> partition. This would be both an easier way of spreading an >>>>> infection and more effective since *any* windows/linux >>>>> system would be vulnerable to it - not just those that were >>>>> installed via wubi. >>>>> >>>>> In fact, even the generic dual boot vulnerability seems >>>>> like a pretty convoluted way to spread malware. Once you >>>>> have control of a windows machine, the thing to do would be >>>>> to *use* that windows machine to carry out your evil plot - >>>>> not try to infect an unused linux partition in the hope that >>>>> it might someday be booted. The windows -> wubi -> >>>>> linux risk seems even lower. >>>>> >>>>> Once the wubi install process is complete you *do* end up >>>>> with a linux system that, at a low level, piggybacks off of >>>>> the windows boot system to work. It bothers me too but just >>>>> as a matter of principle - not for security reasons. >>>>> >>>>> - Dave >>> >>> _______________________________________________ >>> EUGLUG mailing list >>> [email protected] >>> http://www.euglug.org/mailman/listinfo/euglug >>> >> > _______________________________________________ > EUGLUG mailing list > [email protected] > http://www.euglug.org/mailman/listinfo/euglug > _______________________________________________ EUGLUG mailing list [email protected] http://www.euglug.org/mailman/listinfo/euglug
