jcl

Linux Experts
  • Content Count

    1299
  • Joined

  • Last visited

Posts posted by jcl

  1. Western culture and ideals allowed for free thought and expressions (well - mostly - The Roman Catholic church stunted a lot) where as Islam as a whole does not.

    No one is arguing that Islam should be credited for Western liberalism.

    For Obama to say that we owe a debt to ISLAM is wrong. (key arguement <<<<) Everything Islam touched, touches, and will touch, it suppresses. Islam has stunted/haulted/stopped/reversed more 'enlightenment' than it can every create.

    That's not an argument.

  2. First, let us look at the time period that Wikipedia claims Islam had its "Golden Age". At about the same time Islam was rapidly expanding. It engulfed the Middle East and North Africa. Everywhere Islam went, so did its harsh rulers and treatment of infidels.

    That's not unusual. The Roman 'Golden Age' coincided with (or slightly preceded, depending on your POV) the Roman conquest of Europe and the Renaissance and Enlightenment coincided with the European conquest of the Americas and Africa. There was, as I recall, even a 'mini-renaissance' that coincided with the Crusades.

    Many of accomplishments given to Islam really go to the Byzitean, Persians, and the others that they took over.

    No doubt.

    Furthermore, many of the arts that came from Muslims are significant not because of the Islamic hertitage, but because the lack there of. In other words, many arts came from Muslims, not Islam (see the difference?).

    It seems like you could turn the argument around and claim that, e.g., the Enlightenment was a product of westerners but not of the West.

    The european enlightenment came inspite of, not because of Islam. If the Crusades had not been called and Islam had spread to Europe, there would never have been a "golden age" for Europe, and we would all be living in the 18th century still.

    Islam did spread into Europe. The result was arguably the high-point of Iberian civilization.

    Islamic law and the Koran simply do not allow for a Renaissance period such as the one in Europe.

    That didn't stop it from happening.

    [Edited for brevity.]

  3. NetWork Drive: And you could have your BIOS infected before you bought the motherboard from someone else, what is your point? Just because it switches owners means it didn't require user interaction to become infected? Thats a bit silly =3

    You missed the point on that one. The user-interaction occurs before the virus is present on the drive; the infection is a side-effect of automated processes (automatic network drive remounting, AutoRun, etc).

    That bird comparison was very much farfetched. :blink:

    You right: humans and birds have more in common than viruses and worms.

  4. No, that was Bush's interpretation; that his election negated the US Constitution because he thought it is just a God Damned piece of paper. He repeatedly violated his oath of office and seriously degraded the Constitutional rights of US Citizens.

    President Obama happens to be a Professor of Constitutional law and has repeatedly shown that he respects and values the US Constitution and will enforce it and obey it ; unlike his predecessor.

    Their policies are almost indistinguishable. Obama's policies seem to be worse in some cases, e.g. wiretapping.

    Bush should have been impeached and hung for high treason long before his first term ended.

    Bush didn't commit treason. Indeed, he's usually criticized for what was, at least superficially, essentially a 'War on Treason'.

  5. First OSX Is certified UNIX.. http://www.apple.com/macosx/technology/unix.html (unix is a certification of compliance to a standard. Just Liek the Linux standards base.. )

    They have a point about OS X and Unix. UNIX® certification doesn't mean that OS X doesn't suck.

    it is running code in a buffer overflow which means it must be using logged in user permissions.. or is it system level and it matters not if the person is admin or not. (if so this is worse.. than I thought)

    It's a remote vulnerability. The advisories I looked at said it requires authentication on the target machine on NT 6 (but not NT 5) but didn't provide details.

  6. I fail to see how a Boot Sector Virus doesn't fall under user interaction. You throw in a disk = user interaction, that's just like downloading or clicking a file. This is all user interaction... Maybe our definitions of "user interaction" are different, which may cause the arguments here.

    Well, yes, because your definition is crazy. Everything requires some sort of user interaction. Your machine can't be infected unless you buy it, bring it home, set it up, turned it on, etc.

    And then discover that there was a factory-installed boot sector virus on the HDD.

    and autorun... again, where is the lack of user interaction here? How can you autorun something that wasn't there unless you downloaded/went to a website/dropped a disk in your tray?

    You could have a mapped network drive that's infected after it's mapped.

    As for worms, yes they are a subclass of a virus, they do many of the similar things viruses do.

    People do many of the same things that birds do. People are not a subclass of birds.

  7. Usage is a joke of an argument IMO, because Mac OSX is based on BSD (next was based on BSD and became Darwin) BSD is UNIX, and as such keeps a lot of things the in common with other Unix systems. This means that a hack written for any Unix system that is not kernel dependent work well on many different flavors of Unix.

    I'm still not sure that cross-Unix viruses are especially practical. Native code viruses would likely have to deal with, e.g., the various object file formats used by Unices (ELF on Linux and the BSDs, Mach-O on OS X, COFF on AIX and Irix, etc) and non-native viruses would likely be portable to non-Unices.

    Since we know the first user is always root and observation tells us that most people do not add accounts to the system and when they do, they do not create limited users.. we now know that a simple install exploit will work with just an OK prompt, or worse we could send RPC commands and since the system is operating as root/admin user those commands are ran as admin..

    Please tell me you mean LPC. The 'remote' part of RPC means that you can't rely on client-side security at all. I realize that there's some kind of law that RPC has to be broken but that would be a bit much.

    (JCL who is a True expert in all he talks about)

    I make it all up as I go along.

  8. So we'll ignore "worms" for the time being, which is technically a subclass of a virus but I place worms in their own separate category.

    Worms and viruses are separate categories. They have practically nothing in common.

    A virus on the other hand, requires full user interaction in order to initiate itself on a system. I have never heard a virus that can just automatically startup without some form of user interaction. Name a virus that can do that and I will back down from my statement?

    Boot sector viruses and AutoRun viruses.

  9. also popularity is a joke answer and a excuse.. OSX is based on UNIX (bsd as a matter of fact) and UNIX system make up more than 55% of the installed market (just not desktop).

    No way. Unix has maybe 15% of the PC market. The server market's something like 1/25th the size of the PC market, so that's at most another few percent.

    a virus written to attack UNIX or Linux would most likely be able to affect all of them, so they are a bigger target and can effect more people.

    The near-complete lack of binary compatibility presents a bit of a problem. Source compatibility, too, for that matter; I don't think autoconf is an option for a virus.

  10. Umm, there's been plenty of vote fraud long before electronic voting machines were invented. Intentional mis-counts, ballets "disappeared," questionable rejections, etc. I'm just sayin' ...

    Vote fraud with paper ballots was a bug. With electronic voting machines it's a feature.

    (I don't really care half as much about all this as it sounds.)