lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: vb at dontpanic.ulm.ccc.de (vb@...tpanic.ulm.ccc.de)
Subject: Microsoft prepares security assault on Linux

On Wed, Nov 12, 2003 at 04:15:14PM -0800, Charles E. Hill wrote:
> > 2. A commercial company providing with liability (and responsibility)
> > for the software you use (in other words - someone to blame).
> What commercial software company actually offers guarantees and some form
> of liability?  I've *never* heard of anyone successfully suing MS or
> Oracle or anyone else for their software screwing up.  SAYING you can
> blame Microsoft is one thing -- doing it (other than pointing fingers) is
> another.

I now for four times acted as following:

I bought a single support call from Microsoft. We together detected that
my problem was caused by errors in Microsoft code. They corrected. I
paid nothing because Microsoft's support is free if the error was caused
by errors of Microsoft. The support was friendly, helpful and quick.

That is one reason because I have nothing against Microsoft. Of course,
no one paid me the work I did. And there are big problems with Windoze 2k
and WiXP, sometimes so big problems that I will not use such systems except
if I'm forced to.

Windows NT is getting worse. Unfortunately.
For security reasons Windows is disastrous.

VB.
-- 
Volker Birk, Postfach 1540, 88334 Bad Waldsee, Germany
Phone +49 (7524) 912142, Fax +49 (7524) 996807, dingens@...ens.org
http://fdik.org, Deutsches IRCNet fdik!~c_vbirk@...a.rz.uni-ulm.de
PGP-Key: http://www.x-pie.de/vb.asc


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ