Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre
Windows _is_ Bells and Whistles, plus a couple of gongs. No ... The GONGS is the chinese knock off.
Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre
On 9/17/2019 1:08 PM, Fred Cisin via cctalk wrote: On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my microcomputer operating systems class. One student (who later became my best friend and buddy) skipped the technical details and said, "The primary design error for MacOS and Windoze (sic) is that they placed a lower priority on security, than on being able to transparently and without user action, add smell-o-vision, dancing kangaroos and yodelling jellyfish." (YES, that's where I got that phrase from.) I say the concept of a) Time sharing and B) GUI and c) 8 bit bytes and D) the C programming language have caused computer architecture to go to dogs ... Lets not forget some FORTH chips have been to known to meltdown without any attacks just unlucky coding. Ben. Is true the yodelling jellyfish makes me wait 45 seconds for pop up window to open after clicking on a menu item like "OPEN FILE"?
Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre
On Tue, 17 Sep 2019 at 21:09, Fred Cisin via cctalk wrote: > One student (who later became my best friend and buddy) > skipped the technical details and said, "The primary design error for > MacOS and Windoze (sic) is that they placed a lower priority on security, > than on being able to transparently and without user action, add > smell-o-vision, dancing kangaroos and yodelling jellyfish." « > Windows _is_ Bells and Whistles, plus a couple of gongs. Don't forget the horns, the custard pies and the water-powered whirling knives. -- mlooney and Red Drag Diva » -- Liam Proven - Profile: https://about.me/liamproven Email: lpro...@cix.co.uk - Google Mail/Hangouts/Plus: lpro...@gmail.com Twitter/Facebook/Flickr: lproven - Skype/LinkedIn: liamproven UK: +44 7939-087884 - ČR (+ WhatsApp/Telegram/Signal): +420 702 829 053
Re: Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre
On 9/17/19 3:08 PM, Fred Cisin via cctalk wrote: > On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: >> I could easily imagine a computer science exam question "Describe in >> one paragraph the specific design error that enabled the Meltdown >> attack". > > I used to have some related questions in my microcomputer operating > systems class. One student (who later became my best friend and buddy) > skipped the technical details and said, "The primary design error for > MacOS and Windoze (sic) is that they placed a lower priority on > security, than on being able to transparently and without user action, > add smell-o-vision, dancing kangaroos and yodelling jellyfish." > > (YES, that's where I got that phrase from.) Fred, I love it. My feeling is if you don't stop the mongrel hordes at the door you've lost. After all wasn't it Vonada that indicated computer are at best partially tested? Allison
Vulnerabilities (Was: [Simh] Fwd: VAX + Spectre
On Tue, 17 Sep 2019, Paul Koning via cctalk wrote: I could easily imagine a computer science exam question "Describe in one paragraph the specific design error that enabled the Meltdown attack". I used to have some related questions in my microcomputer operating systems class. One student (who later became my best friend and buddy) skipped the technical details and said, "The primary design error for MacOS and Windoze (sic) is that they placed a lower priority on security, than on being able to transparently and without user action, add smell-o-vision, dancing kangaroos and yodelling jellyfish." (YES, that's where I got that phrase from.)