Posted on 08/23/2022 11:12:33 AM PDT by Brian Griffin
“Anything that can be done legitimately
can be done illegitimately”
In theory, yes.
In the real world, you would want to shrink the possibility to as close to zero as you practically can.
In absolute reality. Not theory. The simple fact is all the OS security in the world means nothing once you let users install applications. Because that application could be bad. The way you shrink possibilities is good software practices, which I already talked about, and you ignored.
The basic problem with ms-windows, are things that are the results of design decisions made many, many years ago. One of the reasons you have to reboot so often during the update process is that MS is incapable of updating a dll file that programs have open, so what they do is something similar to this: if the file is called foobar.dll, they flag the file, copy in a foobar-updated1.dll, then during the reboot process, the foobar-updated.dll file replaces foobar.dll, which is then loaded from apps. It's a clunky process, and to date microsloth hasn't wanted to fix it. It's gotten to the point that people =expect= to reboot when updating. On my linux boxes, the only time I reboot is when I do a kernel upgrade. These days, there are even ways around that. You can acually live-splice in changes to a running kernel. The OS basically marks the sections of code as having been updated, then watches for processes to stop using the code. Any new process that makes a call to the code will use the newer code rather than the old. This will happen over time, and eventually nothing is using the old code, so everything is using the new.
Microsoft needed to make some very fundamental changes to their OS when they went multi-user, but doing so would break a lot of things, so instead, they stay with old and kludgy stuff.
Apple, on the other hand has actually completely changed its OS from the early days. It is now an actual Unix OS, which is inherently multiuser with their own extensions on top of it.
“No it can’t. AGAIN, YOUR WORDS:
Microsoft needs to force credit card (and other financial) account information off Windows PCs”
As a practical matter, probably yes, IMO.
Which makes the computer useless for every business.
Face it dude. You’re full of crap. Man up, admit it was a silly rant with no thinking behind and move on.
“The simple fact is all the OS security in the world means nothing once you let users install applications.”
I’m aware of Play Store and Apple Store and Windows 10S.
“Which makes the computer useless for every business.”
I have described a complete purchase transaction.
And you should be aware those aren’t the only ways to install software.
No, you made crap up and completely ignored what a business has to do. Your system won’t work. Your system is stupid. Your defense of your system is pathetic. You should feel shame.
At this point what we know for sure is you don’t know what you’re talking about and your ego won’t let you admit it. Thankfully no business in the world would listen to your dumb idea. I’m done, enjoy waving around your dumb flag.
Huh?
Look through your browser’s settings. It seems you are preloading sites you have visited in the past. Turn pre-caching off.
F-O. My PC IS my “mobile phone”, sine I don have, nor want one of the damned pocket-spies, even if I did get reception.
You don’t like it, don’t use Win-PSs.
We don’t need you as another nanny; we already (over)pay the government to perform that job.
I thought I was fairly clear. If you’re using windoze, you’re funding gates and his cronies. The fact that he resigned as chair quite some time ago doesn’t change the fact that as as someone with major holdings in the company, he’s making money from everyone dumb enough to send microsoft money.
Ah, so using Google and apple the same thing applies. Got it.
FTA: Instead, a mobile phone app would handle payment information processing.
The cell phone has all kinds of apps trying to record your bank and credit card account information.
This is the part you are misunderstanding. It doesn't matter how computer manufacturers configure their hardware or software; hackers will invent new ways to hack in — continually. It's what they do.
There is no way to build, for instance, a house at a price for the wide middle of the market that will always be invulnerable to rain at all times in all nooks and crannies. Water is the enemy of houses. Hackers are the enemies of computer systems. They don't stop trying because of new innovations. In fact, they love a new challenge.
Furthermore, they aren't just hacking your particular type of device. They go after every type of device, every router, every ISP, every point along the internet pipeline, every developer, every program. There are trillions of entry points worldwide, and billions of hackers, also worldwide. Be grateful that digital developers are as good as they are in watching out for new viruses and worms continually.
Ongoing maintenance and security of your device is as normal a routine task as putting gas in your car or checking your tires. It's part of the price of enjoying the benefits of computing.
While you're at it, complain to God because of all the sinners in the world.
Seriously, friend, a computer is an artificial intelligence machine. It's not a toaster with one job. It's complex—halfway between human and inert, just like a pet dog has intelligence, but not as much as a human.
Updates are necessary, and so is regular system maintenance and keeping your device's system architecture clean. It's your responsibility, same as having to feed your dog, if you want your dog to keep on living.
I only bought an existing windows machine as it is a cheap laptop. If I were going for a desktop I’d just build it from components.
Just ask Microsoft to do it for you
There is practically no way to "close off all security loopholes." First off, it's simply not possible to know every exploit for people to come up with in the future.
I used to believe that the only truly secure computer was one that had never been plugged in and turned on by the owner, but then, back in the early 90s, there was the time that Apple shipped computers with a virus installed.
Many of Windows vulnerabilities are directly related to network protocol vulnerabilities.
And if you trust either Android or IOS, you've got a screw loose. BTW, these mobile OSs also need regular updates for SECURITY!
Mark
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.