Well, i did notice in the past that orange would give customer support but
that was along time ago, they still do, because if i can recall correctly,
a lady in the customer care section actually helped me to get my mobile
phone hooked to my laptop and even asked what flavor of linux i was using,
that was when i was in my first year of Campus.

Here is the thing, linux is at least a bit more user friendly, originally i
was accustomed to using linux without internet connection or even any kind
of software installed,  (Senior 3) , Some linux flavors were very horrible
, like Slackware 10,


On Mon, Aug 19, 2013 at 8:14 PM, sanga collins <[email protected]>wrote:

> ^^ Agreed, they do not care about it in the states either. They hope linux
> users can trouble shoot themselves and focus on Windoze for dummies.
>
>
> On Mon, Aug 19, 2013 at 12:54 PM, kizito Mudambo <[email protected]>wrote:
>
>> @Okwi... the truth of the matter is that telcom companies dont care how
>> buggy or unstable their softwares are for the linux side... just look at
>> the poor state of tech support for linux in Uganda
>>
>>
>> *Kizito Mudambo*
>>
>>
>> On Mon, Aug 19, 2013 at 12:17 PM, okwii David <[email protected]> wrote:
>>
>>> I use the modem-manager to connect my USB internet modems that work with
>>> ZTE(not all) and Huawei modems quiet well.  I tried installing the mobile
>>> partner software that comes with Airtel modems on my box, but it was so
>>> buggy, it couldn't work, so i had to fall back to the in-built
>>> modem-manager.
>>>
>>> However, it's interesting to learn that these modems are vulnerable! Do
>>> the telecoms know this?
>>>
>>>
>>> On Mon, Aug 19, 2013 at 1:00 AM, William Kibira <[email protected]
>>> > wrote:
>>>
>>>> Hence I would like to place my Disclaimer here, i am not a hacker, i
>>>> have never even tried it to do it. I am just saying they are possible
>>>> exploits to attack even a *nix based OS like many Linux flavors or BSD.
>>>> Although You can build up your own security systems based to mask out these
>>>> kind of weaknesses and you can also use this to base on research you might
>>>> carry  out in your own time .
>>>>
>>>> Great to be here , a place where the greats get to share ideas .
>>>>
>>>>
>>>> On Sun, Aug 18, 2013 at 11:13 PM, William Kibira <
>>>> [email protected]> wrote:
>>>>
>>>>> The mobile partner for Linux comes with most modems that have been
>>>>> released this year for ZTE and Huawei , it doesn't actually run like the
>>>>> the linux in-built modem-manager process which helps linux use usb-switch
>>>>> (Look it up) to not mistake The modem for a storage device as did with
>>>>> modems in the past.  The next step is that modem-manager gets information
>>>>> of the modem and stuff. Now here is the risky part.
>>>>>
>>>>> This process runs as a super user since it needs to access the modem
>>>>> via a device instance /dev/ttyUSB0 or whatever it comes up with,
>>>>> The bad news is that well, this is a possible exploit for a hacker
>>>>> with good working knowledge on device access, and if i recall correctly,
>>>>> when i was studying how to program for the video devices in the 
>>>>> video4Linux
>>>>> book, i realized that if you have any of these devices in your control, 
>>>>> The
>>>>> machine is pretty much toast [If your a good C programmer] , Sorry i think
>>>>> you don't have to imagine much about CIA and NSA, If you can use
>>>>> modem-manager via it's sms utility , i guess you can dump your payload .
>>>>> Then again, it is just a theory. like most things.
>>>>>
>>>>>
>>>>> On Sun, Aug 18, 2013 at 10:50 PM, Benjamin Tayehanpour <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> On 18 August 2013 20:56, kizito Mudambo <[email protected]> wrote:
>>>>>> > @ william Kibira,  for the linux part, i dont think it would be as
>>>>>> easy as
>>>>>> > that given the fact that linux handles executables or any thing
>>>>>> that can be
>>>>>> > excuted in a different manner...
>>>>>>
>>>>>> If I have to take a guess at how the exploit works, it's probably some
>>>>>> buffer overflow exploit in the parsing. The problem here is that since
>>>>>> the code is injected into an already-running process, the usual Linux
>>>>>> failsafes at the file system level (requiring executable bit to run,
>>>>>> etc.) are bypassed. As you say, the rogue code *should* not be able to
>>>>>> do anything a normal unprivileged user cannot do, but that's still a
>>>>>> lot. Think about it. The user's home directory is compromised.
>>>>>> Documents, saved passwords, session cookies... AND, notice the word
>>>>>> "should". Since the mobile partner needs to access a hardware device,
>>>>>> it does need some privileges a normal user doesn't have. The proper
>>>>>> way to do it is to add the user to the dial-out group, and have the
>>>>>> device nodes owned by the same. The less proper way is to start the
>>>>>> program with root privileges, grab access to the dongle, and then drop
>>>>>> all privileges. The horribly improper way would be simply to run the
>>>>>> whole thing as root altogether.
>>>>>>
>>>>>> Since I don't use the mobile partner software for Linux, I don't know
>>>>>> under which category this software falls. It does sound like a badly
>>>>>> designed piece of software, though, so I'm not hopeful... In either
>>>>>> case, the home directory is at risk, and there are loads of things an
>>>>>> attacker could do there. It would be a simple matter for an attacker
>>>>>> to edit .bashrc, prepend a path to the exec environment, and then
>>>>>> write a replacement sudo script which intercepts the password and
>>>>>> sends it back to the attacker. It would be an even simpler matter to
>>>>>> install a malicious browser add-on which intercepts every password
>>>>>> entered. The possibilities are endless, given a careless user.
>>>>>> _______________________________________________
>>>>>> The Uganda Linux User Group: http://linux.or.ug
>>>>>>
>>>>>> Send messages to this mailing list by addressing e-mails to:
>>>>>> [email protected]
>>>>>> Mailing list archives: http://www.mail-archive.com/[email protected]/
>>>>>> Mailing list settings: http://kym.net/mailman/listinfo/lug
>>>>>> To unsubscribe: http://kym.net/mailman/options/lug
>>>>>>
>>>>>> The Uganda LUG mailing list is generously hosted by INFOCOM:
>>>>>> http://www.infocom.co.ug/
>>>>>>
>>>>>> The above comments and data are owned by whoever posted them
>>>>>> (including attachments if any). The mailing list host is not responsible
>>>>>> for them in any way.
>>>>>>
>>>>>
>>>>>
>>>>
>>>> _______________________________________________
>>>> The Uganda Linux User Group: http://linux.or.ug
>>>>
>>>> Send messages to this mailing list by addressing e-mails to:
>>>> [email protected]
>>>> Mailing list archives: http://www.mail-archive.com/[email protected]/
>>>> Mailing list settings: http://kym.net/mailman/listinfo/lug
>>>> To unsubscribe: http://kym.net/mailman/options/lug
>>>>
>>>> The Uganda LUG mailing list is generously hosted by INFOCOM:
>>>> http://www.infocom.co.ug/
>>>>
>>>> The above comments and data are owned by whoever posted them (including
>>>> attachments if any). The mailing list host is not responsible for them in
>>>> any way.
>>>>
>>>
>>>
>>>
>>> --
>>> David Okwii,
>>> Technology innovator/catalyst, analyst and blogger,
>>> Editor in Chief for the TechPost <http://www.techpost.ug>,
>>> Blogger/reporter for Mozilla Uganda <http://www.mozilla-uganda.org>,
>>> Systems & Solutions Administrator for Cured Ltd,
>>> Mobile(default): +256-791-040-262,
>>> Mobile(other): +256-778-706-301,
>>> Website: w <http://oquidave.blogspot.com>ww.techpost.ug
>>> LinkedIn:http://www.linkedin.com/in/oquidave
>>> Twitter: http://twitter.com/oquidave
>>>
>>> Christ in me the Hope of Glory(Col.1:27)
>>>
>>> _______________________________________________
>>> The Uganda Linux User Group: http://linux.or.ug
>>>
>>> Send messages to this mailing list by addressing e-mails to:
>>> [email protected]
>>> Mailing list archives: http://www.mail-archive.com/[email protected]/
>>> Mailing list settings: http://kym.net/mailman/listinfo/lug
>>> To unsubscribe: http://kym.net/mailman/options/lug
>>>
>>> The Uganda LUG mailing list is generously hosted by INFOCOM:
>>> http://www.infocom.co.ug/
>>>
>>> The above comments and data are owned by whoever posted them (including
>>> attachments if any). The mailing list host is not responsible for them in
>>> any way.
>>>
>>
>>
>> _______________________________________________
>> The Uganda Linux User Group: http://linux.or.ug
>>
>> Send messages to this mailing list by addressing e-mails to:
>> [email protected]
>> Mailing list archives: http://www.mail-archive.com/[email protected]/
>> Mailing list settings: http://kym.net/mailman/listinfo/lug
>> To unsubscribe: http://kym.net/mailman/options/lug
>>
>> The Uganda LUG mailing list is generously hosted by INFOCOM:
>> http://www.infocom.co.ug/
>>
>> The above comments and data are owned by whoever posted them (including
>> attachments if any). The mailing list host is not responsible for them in
>> any way.
>>
>
>
>
> --
> Sanga M. Collins
> Network Engineering
> ~~~~~~~~~~~~~~~~~~~~~~~
> Google Voice: (954) 324-1365
> E- fax: (435) 578 7411
>
> _______________________________________________
> The Uganda Linux User Group: http://linux.or.ug
>
> Send messages to this mailing list by addressing e-mails to:
> [email protected]
> Mailing list archives: http://www.mail-archive.com/[email protected]/
> Mailing list settings: http://kym.net/mailman/listinfo/lug
> To unsubscribe: http://kym.net/mailman/options/lug
>
> The Uganda LUG mailing list is generously hosted by INFOCOM:
> http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to