Security Alert 162
Security Alert: Stories of Real People Protecting Themselves from Identity Theft, Scams and Viruses | |
author | Becky Worley |
pages | 266 |
publisher | Pearson Education |
rating | 3/10 |
reviewer | Jose Nazario |
ISBN | 0735713529 |
summary | Real world tips for regular people to protect themselvs online |
If it can communicate threats and solutions effectively to the average computer user, then we're making real progress. After all, even computer security professionals often fail to employ basic measures to protect themselves from typical attacks, we'll have to make sure this stuff is understandable by the general population. Not that they're the "great unwashed" -- hardly. They're just not focusing on this stuff. Hence, we have a challenge: make this stuff understandable by your mom if you want everyone to just get it.
Becky Worley is (was? I haven't watched TechTV in a while) a TechTV on-air personality. She's reported news and events for TechTV for a number of years, and has often done so clearly and at a level you'd expect for a general TV station devoted to technology issues. So, you'd think she'd be a in a great position to collect information and know how to present it. Sadly, Worley's book doesn't fit that niche; it's not going to educate the large masses. In putting myself in the shoes of an average computer user, I found it fails in a number of ways.
The first and foremost failure of the book is right from the beginning. Worley opens up by saying that you're not a target of hackers, yet the rest of the book goes on to discuss how you are. While you're probably not going to be attacked by the same people who try and break in to Pentagon computer networks, virus writers and con artists fall into the same category for most purposes. All of these sorts of people, and what they can do, is described in chapter 1.
There's no discussion of phishing in the chapter on identity theft, which is chapter 2. Identity theft is a large, complicated subject, yet Worley only focuses on credit card number theft. While she talks about social security numbers, she doesn't demonstrate how they have been used to destroy victims' lives. Some advice is given as to how to react to credit card theft, but little information is given here about how to protect yourself to begin with, aside from being careful about whom you give your SSN to.
The book repeats itself often, covering similar material in several places. Chapter 3, which covers online purchasing, covers credit card info theft and email scams again. What it doesn't cover very well is how to spot a legitimate website, how to really use an escrow service, if and how you can get eBay or a shipper to help you out of a scam auction, and the like. Useful information about verifying who owns a certificate for an SSL server, or even making sure you're using an SSL server, is not given. Examples of false websites and auctions would have been useful. After all, after telling us how scammers operate and look so legitimate, illustrating the points about how to spot them would be valuable.
The book is full of anecdotes but few useful pieces of information are placed where they need to be. Chapter 4, which covers viruses, is one of these examples. It spends most of its time covering typical viruses and the usual, but doesn't get into anything beyond "use antivirus software." Never mind that the biggest threat in recent years has been from automated worms and that personal firewalls are useful; that's covered later. We hope you remember the quick tutorial on viruses from before.
The book's organization is poor, with material scattered throughout the book in a fashion that doesn't progress well or develop the information seamlessly. More virus and scam information is placd in Chapter 5, along with virus hoaxes. Several websites are refered to, but little in the way of really spotting a virus hoax or the common scam. Since they still abound, and people still fall prey to them, couldn't a better job have been done to describe what people are looking at have been offered?
In short, the book is a decent collection of links and material but is so poorly organized or so thinly presented it's hard to get what's going on. Take chapters 6 and 7, "Safe and Sane Online Interactions" and "Protecting the Family." Lots of information, somewhat poorly organized, and very skimpy on content. It seems to me that worrying about who is pestering my kids is more important than hearing about someone's EverQuest addiction, so that was a wasted page.
Finally, Chapters 8 and 9 should have been moved up front more. The topic of chapter 8, "Privacy," is perfect for the topics in chapter 2, where worley talks about identity theft. The topics covered here, including spyware and key loggers, are far more germane to the threat against your privacy and bank account information, and have been a growing trend for at least a couple of years. Chapter 9, differentiating being safe and being paranoid, should have been placed up front to help temper the arguments given in the rest of the book. It does a decent job of articulating the threats, what's to fear, and what's at stake.
The book is laden with plenty of anecdotes about online activitis gone awry. What's missing are solid examples of how to do it right, how to use your credit card on trusted sites safely and ensure that you're using services you know are worthwhile. While the book has some useful information in it, it's buried under poor organization, unclear language and presentation, and finally repetition in all the wrong places.
While the world needs a book or two to help every day people understand online security, this isn't the one. If you're looking for something for your kids, your spouse, or your parents, keep looking. This book wont help them make sense of what's going on. I don't think that's too much to ask for, especially from an organization like TechTV which has access to lots of material, people, and motive to produce a solid book.
You can purchase Security Alert: Stories of Real People Protecting Themselves from Identity Theft, Scams and Viruses from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Shouldn't this be... (Score:5, Insightful)
Re:Shouldn't this be... (Score:1)
Re:Shouldn't this be... (Score:2)
Re:Shouldn't this be... (Score:2)
Re:Shouldn't this be... (Score:2)
What!?! (Score:5, Funny)
Blasphemy!
Burn the heretic!
Liver (Score:2)
Let's eat his liver with some fava beans and a nice chianti. Computers are much more than tools for information, but I'm sure I don't have to tell any of you that... Sometimes I think my computer has a soul of its own -- until I realize that's my soul... (well at least the energy of infinite keypresses)
Re:Liver (Score:1, Offtopic)
Hannibal?
Ummmm.... Look... You see, this whole eating thing....
Well you can see that it can only be possible if we *first* gut him, and then burn him at the stake.
That would take some of the fun out of the whole burning-the-heretic thingy.
But I'm with you, you know.
Re:Liver (Score:1)
Re:Liver (Score:1)
One thing.. (Score:5, Insightful)
I find they are a whole lot more interested in learning about security as soon as they start getting pornography popups.
Re:One thing.. (Score:3, Insightful)
Re:One thing.. (Score:3, Insightful)
Re:One thing.. (Score:2)
Own a computer, own a car (Score:5, Insightful)
Same with a computer. If you own a computer, you should be able to upgrade its security, and install a virus protector (minimum!)
I dont understand why people spend thousands of dollars on a new device, then simply dont bother to learn anything about it. A computer, like a car, is a serious investment. Learn how to use it properly.
Of course, my theory goes to shit as many people dont know how to change a tire or oil. Oh well.
Re:Own a computer, own a car (Score:2)
I thought that I only had to turn it off and turn it back on again.
Re:Own a computer, own a car (Score:2)
Thou shalt reboot from time to time. For thou shalt knoweth that rebooting cureth many kinds of evil. Even unto those things that are not Windows computers, rebooting cures evils.
Re:Own a computer, own a car (Score:5, Insightful)
Perhaps because they don't spend THOUSANDS of dollars. They spend a few hundred maybe up to about ONE thousand dollars. Computers are cheap and thus people think they are or should be as complicated as similarly priced objects like dish washers or large screen TVs.
It they had to pay $20,000 dollars for a computer they would learn to take better care of it. But then again I see plenty of people that abuse cars too.
Argument invalid. (Score:3, Interesting)
I believe in the parent's arguement. You should learn how to use a computer if you're going to own one. It's not rocket surgery. With modern point and click updates and easy to read instructions, there's no excuse.
It doesn't end up working that way but I really don't feel too bad when someone can't figure out their c
Perhaps. (Score:3, Insightful)
I too believe in the grand parents argument. People should have a minimum knowledge of a computer just as they have a minimum knowledge on how to run a car.
Actually a lot of people couldn't change a tire if there life depended on it. But they can look at a tire and note that it is low and they will have tires rotated and inspected on a regular basis. Something that computer users will not do
Re:Perhaps. (Score:3, Interesting)
And many couldn't spell if their life depended on it. But that only reinforces my idea: you don't have to know how to do something exactly right to be able to use it at all. Everyone (I hope) understood your sentence, despite the word switch. And people can use a computer despite not knowing any basics.
Computers simply do not have the life-and-death situations that are present in a car. Many jerks bring up the "it could spread a
Re:Argument invalid. (Score:2)
You don't perform surgery on rockets. Please drop off all of your PCs at the nearest Public Training Centre and slowly back away.
Re:Argument invalid. uh.. (Score:2)
Proceed to the nearest humor transplant facility immediately. You are in serious danger of becoming the dullest person on the face of this planet.
Re:Own a computer, own a car (Score:4, Funny)
But there are no consequences for owning a computer that's been hacked and is being used by someone else for their own nefarious purposes.
Perhaps that's a good reason keyboards should come with built-in tazers.
Re:Own a computer, own a car (Score:1)
Oh, btw: I think the colorscheme shuxors.
Re:Own a computer, own a car (Score:5, Insightful)
Basic computer skills are a difficult enough concept for some -- and anything past "two clicks on the blue letter E" goes over their heads. Anti-virus, firewalls, and windows update? Way too complicated. Downloading and installing another browser? That's a challenge! (I got a call once from someone who couldn't install something from CD-ROM because it wasn't set to auto-run!) Reformat a hard drive and install an alternative operating system? Definitely too much.
There isn't any interest in knowing anything past 2 clicks on blue E. Solution? FUD 'em. (not essentially lies but fun half-truths) Tell them their machines are being constantly attacked over the net and they need to protect themselves. Teach them that their personal information can get stolen. Tell them that unless they learn the ropes, they'll have to deal with headaches and heartaches and big computer repair bills.
Hell, tell them that without a good firewall, (Osama || Saddam || tooth fairy) will break into their computers and terrorists will win. (That method seemed to work well with the average Joe Sixpack for a different, more lethal cause).
Either way, education is part of the solution...but you can only educate those that want to learn. The trick is to motivate people into learning and understanding computer security.
Re:Own a computer, own a car (Score:2)
Funny, I've been trying to convince people we need to firewall the country due to the terrorist threat, and all I get is called racist.
Re:Own a computer, own a car (Score:3, Interesting)
You don't need to lie to people to inform them about spyware and adware. Hackers AREN'T trying to take over their computer, worms and ads are. If you tell them that they're going to be hacked, they'll go out and buy random "anti-hacker" shit from the nearest "security" company. Tell them the truth. If they have spyware, tell them what it is, how it caused their problem, and direct them to a good anti-spyware utility (don't just tell them to search for one as they'll hit fake ones, show them the Ad-A
Re:Own a computer, own a car (Score:2, Insightful)
Even school has its barf-back education process. You get facts and dates and other mantras that they cram down your throat and learn to barf back during an exam. The real retained knowledge are the bits we found interesting, fun, or somehow important.
So of course not, don't lie
Re:Own a computer, own a car (Score:3, Insightful)
Not as individuals usually, as a group they are.
CAA (Score:3, Interesting)
That's what CAA is for. If you own a computer you should be able to turn it on and use the programs on it. If you need anything else, you should have the phone number to a really good/inexpensive techie. I never ever waste time with installs or anything like that. A guy I know does all that for $20-flat, so I can do other stuff (like play PS2) and I get a superb/secure setup for cheap.
Re:CAA (Score:2)
He should be charging at least that much hourly + mileage + beer :)
Volume (Score:3, Interesting)
What you might fail to realize is that this company took all the business away from the rest of the competitors by doing this, so whenever I use him I know my system is gone for about four days because of the long line of customers they have.
They are rea
Re:Volume (Score:2)
I charge $30/hour for that kind of work and have enough to stay very busy in the evenings and on the weekends. That kind of work, you can price yourself the amount of work that you want.
Re:Own a computer, own a car (Score:3, Insightful)
In short, people should know how to do all those things that the engineers can't do for them, since the engineers must design cars with parts that wear out.
Another car analogy - if you put your CAR on the ROAD you must ensure that your CAR is not a danger to other CARs on the ROAD. Replace CAR with COMPUTER and ROAD with INTERNET.
Re:Own a computer, own a car (Score:2)
Your computer cannot do the same, either. Were it so, we would have already had one computer crashing every other computer on every other net in the world. We have not, not can it happen. Your entire post is excess.
Re:Own a computer, own a car (Score:2)
Re:Own a computer, own a car (Score:2)
W32/LovSan, also known as Blaster.
(To be accurate, it didn't crash "every other computer", but "only" a significant percentage of them. But it's nothing a zero-day remote exploit in the IP stack, once it appears, couldn't do.)
Re:Own a computer, own a car (Score:3, Interesting)
Clearly, what is needed is a network of retail shops, call them 'Jiffy Comp' or something, for people to pop in and have their computers scanned and upgraded while they wait in the lobby watching CNN. After 20 minutes or so a jumpsuited tech would come in and say, "Mrs Pauley? We found two worms, installed service pack II and updated the virus defs. Everything is ok now but be sure to bring it back every 30 Gigabytes or 3 months. That'll be $24.95 + tax"
Re:Own a computer, own a car (Score:4, Insightful)
Back when I was doing tech support, I heard almost daily from people who'd say, "I'm completely computer illiterate." Most of them would say it not in shame but in pride. They seemed to think there was something good about being incompotent and that it made them better than people who knew how to use computers. There are more of them out there than you'd like to think, and none of them want to know what they're doing. Same thing as it is with cars; knowing how to change a tire makes you lower-class in their eyes, just as knowing how to install software.
Re:Own a computer, own a car (Score:2)
I believe it's code for "I have a social life".
Re:Own a computer, own a car (Score:2)
Re:Own a computer, own a car (Score:2)
Re:Own a computer, own a car (Score:2)
There's a good reason for my slashdot name; check out my website and find out...
Re:Own a computer, own a car (Score:2)
Re:Own a computer, own a car (Score:2)
RTFM Issue (Score:5, Insightful)
Re: (Score:3, Insightful)
Re:RTFM Issue (Score:3, Interesting)
That's why I think it's somewhat our responsibility to help our friends and families (to whatever extent possible) to keep them out of computer trouble. I carry a copy of Spybot S&D and AVG Antivirus with me when I visit family members, just because I know they don't have what it takes to keep themselves safe. Some can't even be bothered to run Spybot without
Re:RTFM Issue (Score:1, Funny)
Re:RTFM Issue (Score:1)
R What? (Score:1)
To help explain security... (Score:3, Interesting)
What about Security for Dummies? (Score:3, Interesting)
Although, it sure would be nice on the one hand to have a well written security book for the masses, its equally important on the other to stress that using a professional is a great way to achieve the goals of protection and understanding.
Maybe I'm just trying to create more job security for myself.
Missing chapter on OS (Score:3, Funny)
Re:Missing chapter on OS (Score:1)
Re:Missing chapter on OS (Score:1)
The truth: Linux is just as susuptable to all those nasty things as everything else, however, security holes get fixed quicker. However, if a user gets an email with the subject "Awesome Pic!" and the attachment "virus.jpeg.exe" and they open it, it isn't a headache for the sysads because the virus only wipes out their home directory, not the system. The problem comes when you get something like OSX where the user is the admin.
Re:Missing chapter on OS (Score:2)
Re:Missing chapter on OS (Score:2)
Not as such.
I do know of a popular Unix based mail client that also runs on Linux.
This mail client has had so many security problems that would allow running arbitrary code (and that judging from its coding style is likely to contain quite a few undiscovered/unpublished ones still), that running attachments is not really needed.
The program is called Pine.
Re:Missing chapter on OS (Score:2)
Pine... pine. Ah yes, I have that filed beside Elm and Mutt under "applications no newbie desktop Linux user will ever run, or even hear of".
Re:Missing chapter on OS (Score:2)
I tend to agree with regards to Mutt and maybe elm..
But most non technical people that I know that have somne experience with using Unix/Linux have seen Pine, if only coz usually the first Ubnix/Linux installation they happen to have used are university shell servers probably.
Yeah, I also found they want it on their desktop machine because it is easy to use and
Re:Missing chapter on OS (Score:1)
The computer needs to solve the problem (Score:5, Interesting)
In real life (Score:5, Insightful)
Re:In real life (Score:2)
Nobody at all? What if, for example, someone who Oprah happens to know reads a book, learns something, passes it on to Oprah, and Oprah decides to do a show based on it?
Just because few non-experts will read books about computer security, it does *not* follow that books about computer security wr
Social adaptation take generations (Score:2)
The result is that social knowledge takes a long time to catch up with technology.
For an example, compare the level of road safety in the USA to the level in countries that haven't had four generations of car experience.
Internet-connected PCs are way too new for safe usage to be common knowledge.
Beyond Fear (Score:4, Informative)
How Things Work (Score:4, Interesting)
Before you drop into identity theft and such, how many people don't even know what they're credit score is? And you don't even need a computer to find that out.
Re:How Things Work (Score:2)
There's being an auto mechanic, and then there's being a safe driver. The same thing goes with computers.
Of course, having just came in the door from a death-defying commute home, I can attest that if there were as many safe computer users as there were safe drivers the problem would b
Re:How Things Work (Score:1)
Re:How Things Work (Score:1)
As new technologies become commoditised into everyday use, one would expect society to adapt to cope. Taking the automotive example further:
(1) We now have insurance companies that thrive with the consequences of misuse, and
(2) As cars become more complicated and less user-serviceable, mechanics and electricians (with diagnostic equipment) appear in grea
Re:How Things Work (Score:2)
Re:How Things Work (Score:2)
Ummm, if your mechanic does not excpect you to know or show you how to check your fluids and keep your car in the correct running order, time to get a new mechanic. YES! Mechanics should show you basic car mantianice. If not, time to find a new mechanic.
The first time I went to my m
Re:How Things Work (Score:3, Interesting)
Whilst I don't fall into that catagory, I can explain that attitude.
I don't use anything that I don't understand how it works, and that I don't know how to construct at least a basic version of it. Thus, I can't design a state of the art VLSI chip, but I could make a transistor, and assemble discretes into logic blocks, and make a basic computer out of logic blocks.
Same goes for a car, a CRT, plastic bottle, door
Re:How Things Work (Score:2)
I should think they ought to expect you to know how to change a fuse, check your fuse-box and test a light-bulb and/or be able to debug causes of a leak in your plumbing (unconnected overflow pipe
Re:How Things Work (Score:2)
Cool, an easy mark...
I know how a computer works, I fix my brakes, change my oil (most of the time), and could install a new heater or AC in a house. Hell, I could do plumbing or electric work. It is not difficult-time consuming if you are not experienced and a waste of money in many cases but I know how these things work or could do them if
Did my paradigm shift? (Score:1, Insightful)
I'm supposed to buy a book that I've never seen nor heard of before, judge it by it's cover and it's self-aggrandizing description, then open it and proceed to upload it into my brain without any virus scan for all the tinfoil-hat type text.
Then, this book will tell me that I shouldn't do on the internet, in email, etc. what they're absolutely counting on me doing in real life? I can't trust those emails and open those attachments and download the contents because it's unsafe?
Think: children's books (Score:4, Interesting)
I have not read the book, but based on the description, it sounds like it will be seen as most effective by people who already know what they are doing. With large numbers of anecdotes and not enough focus, it falls firmly under the heading of preaching to the choir; the only people who will probably slog through this book will be people who understand its importance before even opening it up. I've got friends who not only use easy-to-guess PIN numbers and passwords, but when participating in a conversation about the importance of security, they'll even announce their information proudly, as if it's some sort of joke. You don't change those sorts of attitudes with a textbook.
Maybe security philosophy would be better spread through viral means such as a really funny movie (think the original South Park Xmas Jesus vs. Santa video), or a bunch of jokes that people tell. Here's one that would work on an old friend of mine: Q- What do you get when you take the area code away from your phone number? A- Your ETrade password!
It's worse. (Score:5, Interesting)
The tower case is the 'hard drive', the monitor is the 'computer', and even after being repeatedly told and shown what the correct terms are, it's gone in an hour.
My dad is a perfect example. One of the first things he would do on my infrequent visits home, is take off his digital watch and have me adjust it for daylight savings time.
"Hey, Pops - let me show you how to do this. It's easy."
"Don't bother, I will never remember. Just set it."
Ahhhrg. People don't remember, because they don't *want* to. I am constantly amazed at the lengths people will go to in order *not* to learn something.
It could get better? (Score:1)
Give them a hint. [thinkgeek.com]
"No, I will not set your watch."
Re:It's worse. (Score:2)
Sounds like your dad needs a little "tough love". Next time he asks, just tell him you've already shown him how to do it many times before and that you can't be bothered anymore. Sure, he'll be upset (initially) but he'll either learn to do it himself, or he'll buy another watch with a winder.
The same thing applies to most folks an
Re:It's worse. (Score:2)
That is, indeed, what he did. :)
Now I'm holding out for him to return to the hand-cranked phone.
Re:It's worse. (Score:2)
You're absolutely right. While its not clear in my original post, exceptions have to be made for those suffering Alzheimer's.
My comments wer more directed at those persistently stubborn types who are more than capable of understanding and learning new things (MBA's, Attorneys, etc.), but who steadfastly refuse to eve
Not all problems are solvable (Score:5, Insightful)
From a security perspective, "computers these days" are like a nuclear reactor, or a rocket, or the tax code. They're just not manageable by the average person, and the bolt on shells of security that are offered only work to a point. Without a consumer-securable security model integrated from the ground up, you're going to have melt downs, misfires, and botched returns.
So, a book of anecdotes about "real people" and contemporary information security is almost going to be inherently uninformative. How could you possibly cover all the seams that todays severely limited security models leave open?
Re:Not all problems are solvable (Score:1, Interesting)
Well Windows' security might not be managable by a normal computer, but there seem to be a whole lot of people surviving just fine with an OS that was designed to be secure and easily usable...
Re:Not all problems are solvable (Score:2)
You mean Linux (or Unix in general) ?
Easy to use for a realtively technical person? sure. When properly setup, it can even be easy to use for non tech users.
Securable by someone who isn't technically inclined? come back when you have non technical users understand things like init, rc scripts and the like. Who
Re:Not all problems are solvable (Score:2)
You can't, but covering the ones you read about is better than not covering them. Having true stories to relate to your users can make a bigger impact on them than just hypothetical risks that you made up.
General Security (Score:5, Insightful)
a) Social Engineering will ALWAYS succeed. Whatever engineers do to protect a computer, they can only protect the user from themselves up to a point. There's no cure for giving someone you think you trust your username and password, for example, and then having them rip of your confidential data. Or for that matter, keeping people from answering emails using information they shouldn't. It's a grim conclusion, but short of warning people not to be trusting nothing can be done.
b) The machine itself CAN be made much more secure by default. This usually comes at the cost of user-friendlyness, but the username/password/account idea seems to be virtually universal now. The key to making a user friendly secure machine for the average consumer is to set up rules that allow the machine to do everything the user is likely to want to do, and ONLY that. In other words, some form of Mandatory Access Control. This is a pain in the neck for those who want to do lots of complex things on their machine, but I suspect the average needs of the modern user are becoming well defined enough to achieve something. And if applications AS PART OF THE DEVELOPMENT PROCESS create rules for what their program needs to be allowed to do (which can be externally audited to keep them honest) we might achieve a situation where it's difficult to impossible for a computer to be cracked from the outside through technological means.
c) The bad news is, there's no market for b) and so it's unlikely it will ever happen. People have to be willing to pay the price for security, and I suspect up front cost of inconvenience (either to developers, end users, or both) will be seen as greater than the statistical potential of dangerous information theft. Whether that's true or not I don't know, certainly it varies on an individual level, but it takes herds of users to fund commercial software development and I suspect the average consumer response will be the immediate path of least inconvenience.
d) Open Source, being outside normal economic constraints, might produce something like b) eventually. But while individual projects might code to such standards, they are probably too high a median to set for casual, unpaid development. Success would require most of the open source community to be willing to do extensive testing and planning for running their software in a MAC environment, and that's not much fun to most non-security oriented developers.
e) So, in the end, matters will only improve when the costs of electronic theft and attack are so high they raise demand for secure systems to the economic minimum. Whether that will ever happen I don't know. My cynical guess is it won't - we'll just have to live with it. (Individual geeks of course can try to do better, but the internet has become a community. For better or worse.)
*cough cough* (Score:1, Interesting)
too true, peole are the largest aspect of sucurity (Score:2, Informative)
If you don't help your employees gain an awareness of what it means to be secure, why it is important, and provide some education to them beyond here is your computer and your Word/Excel/Powerpoint, etc your security policy and situation is bound to fail.
You need to get with your people, teach them, train them, and h
Skip the technical details (Score:3, Insightful)
The advice I gave them is to never download anything from the Internet that seems "cool" or promises "this or that". Sure if you are downloading an update to software you already use, its okay. But you don't need this new cool search bar for IE, a search tool that promises to be intelligent and show (a.k.a. pop-ups) only ads you'd be interested in, and you don't need to keep up with the Jones with every "cool" spyware software.
Explaining how these things are dangerous has little affect on the "normal" computer user who doesn't know the difference between a DSL/cable router and a hub, who doesn't know how the Internet works (such as how TCP works, packets, routing).
I've found that simply telling them to not do it is the most effecitve thing I can do. Most users won't understand the technical details. But they will understand if you simply say to not download it because if you do it enough, your computer will become unusable.
Re:Skip the technical details (Score:1, Offtopic)
Or like explaining the difference between effect and affect? :)
Tech TV?!!? (Score:3, Funny)
I can not imagine spending money on a book written by these "Computer as soo cool d00d" people. Perhaps I am transplacing thier "on TV" personality with thier real abilities. However, after reading the review, me thinks not so much.
un-savvy people (Score:3, Interesting)
I know nothing about computers. Take care of me. (Score:4, Interesting)
Re:I know nothing about computers. Take care of me (Score:2, Insightful)
making a machine that won't get infected by all kinds of crap isn't all that hard; making a machine that won't get infected no matter what the user demands it do for them is impossible. and no user too stupid to take care of themselves is smart enough to accept being baby-sat by any mere machine.
sorry, not needed... (Score:4, Insightful)
CB!
Following the Formula? (Score:1)
Thinking of Dilbert here... (Score:2)
[later] [holding employee head] Catbert: "This one is defective too."
TechTV, RIP (Score:2)