The Cost of Computer Naivete 917
wiredog writes "What happens when you put an unprotected Windows 98 box on a broadband connection? Two perspectives from two reporters for the Washington Post (frr,yyy): The User's " an odyssey that has taken $800 and roughly 48 man-hours over nearly three weeks" and Digital Doctor's "Her PC was in such bad shape, it required 10 1/2 hours of surgery to restore it to working condition.""
Re:reg only? (Score:4, Informative)
Wow fdisk is really slow... (Score:2, Informative)
C:\>fdisk
And reinstall W2K?
Damn that tech was milking it.
Hard to believe! (Score:4, Informative)
C'mon now! IF runing Spybot S&D and Microsoft's own repair process didn't fix it, you could have just reinstalled Win98.
Total time, 2 hours MAX!
Bull (Score:1, Informative)
Re:To be fair to Microsoft (Score:5, Informative)
Nuke it from orbit. Only way to be sure. (Score:3, Informative)
Comment removed (Score:3, Informative)
Re:Mantra (Score:0, Informative)
fdisking a drive you just formatted creates a waste of time. Examples are left as an exercise for the reader.
The fact is... (Score:5, Informative)
You now have to
- think about getting the latest service pack first
- think about getting a firewall with its license key (love it when the firewalls ask to be registered before working, and need an internet connection to be registered!),
- think about getting an anti-virus (same story)
- then install the system (disconnected from the network, of course, so forget about "configuring an internet account" during the install)
- install the service pack
- install the firewall and the anti-virus and make sure that they're running
- go to windows-update and patch your system
- start to play.
This is an impossible task for 99% of the regular windows users, who don't even know what a firewall is and how to configure it. There have been improvements in the installation process of OSes and applications, in order to make it possible for reg. users, but all these efforts have been ruined by virus and worm writers.
And I'm not even talking about spyware, adware and spam...
Re:To be fair to Microsoft (Score:5, Informative)
Install that old slackware while connected to broadband, and if you decide to take a coffee break before logging in and setting the password (or if you forget to do it, or miss that line item in the install instructions) and you're fucked.
Hell, those were my Uni days. We'd have a ball in the computer lab watching the one TA (total stereotype smelly bearded hippy geek with a bad attitude) install some new linux terms, and we'd race him (and beat him!) every time to log in as root and do various stupid things.
Hell, I'd wager on 7 out of 10 student machines on the campus net never did get a root password set.
If not "idiots" at least "barely competent". (Score:4, Informative)
#1. Advise her to go out and purchase an inexpensive hardware firewall.
#2. Advise her to go out and purchase a decent CD-rewritable burner and a few rewritable CD's.
#3. Backup all of her data.
#4. Wipe the drive and partition it into 3 segments. OS/swap-n-temp/data.
#5. Re-install the OS and apps. Patch. Configure. Google toolbar is she must use IE. etc. Anti-virus set to auto-update every hour and auto-delete infected files (see #7 before you start screaming).
#6. Copy her data back to the machine. Make sure it is in the data partition.
#7. Show her how to backup the data partition onto the rewritable CD's. Inform her that here hard drive WILL fail sometime in the future and that this is will keep her data safe from that.
These are the basic steps whenever I'm asked to fix someone's computer. And it does not take 10.5 hours. Like you said, 1.5 hours tops.
Re:To be fair to Microsoft (Score:4, Informative)
Re:To be fair to Microsoft (Score:2, Informative)
It's pretty useless without process tracking. Sure I can see all the connections, so is that connection to that odd numerical IP from the latest banner ad/popup or is that a trojan?
Right now, as I look at the netstat list (-a 1), I see about 12 entries that I can't identify and I have no chance of ever tracking what on the system is causing them.
Netstat never shows any connections when I use Wordpad.exe, but the TCP and IP byte counts both go up.
Re:To be fair to Microsoft (Score:2, Informative)
And I think XP and W2k3 has the -O option (or -o, i can't remember) that allows a PID to be reported also.
Despite the existence of this utility, it is the fact that it is 'hidden'
It's really a user education problem, not a technology problem. The capabilities are (now, at least) there.
Re:Slow computer! (Score:4, Informative)
Oh, and CAN WE GET A GODDAMN GENTOO TOPIC ICON ON
CVB!@#$%^&*()
Making ghost images (Score:5, Informative)
Here's how you do it:
0. Set up a recipient (either a second hard disk, a machine on the network - whatever - I do it over the network)
1. Boot Knoppix on the machine you want to ghost.
2. Mount the destination.
3. dd if=/dev/hda bs=128K | gzip >
To restore:
0. Set up the source.
1. Boot Knoppix on the machine you want to install.
3. Mount the source.
4. gzip -dc
Tips: Overwrite any free space on the machine you want to ghost with a huge file filled with 0x00, then delete the file. The disk image will compress much better as you've scrubbed the deleted files.
I use a system like this to ghost many machines at a time (an image server can easily deal out 30+ images at once). It'd cost a fortune to license many copies of ghosting software - with Knoppix and a very small shell script, I've got an automated system which will do many machines at once. (A typical 40GB fresh WinXP install with our apps compresses to under 1GB with gzip).
If you're doing WinXP, remember to either make a Sysprep build or use something like System Internals free (open source but not truly free) tool to change the SID and hostname of the machine when it's booted the first time. (This is the approach we use due to the limitations of sysprep).
Re:Neatly illustrated (Score:3, Informative)
Re:To be fair to Microsoft (Score:1, Informative)
listening port. In some cases well-known executables host
multiple independent components, and in these cases the
sequence of components involved in creating the connection
or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
permissions.
Re:To be fair to Microsoft (Score:3, Informative)
standard is:
netstat -o
Email to Kathleen Day (Score:5, Informative)
-Phil
Ms. Day:
I find it absolutely fascinating that problems such as the one you encountered are treated primarily as a user education issue. It's true that there are some things that everyone needs to know in order to use a computer. It's also true that savvy users can often avoid security mistakes. But one wonders, "Why is it that users *have* to be security-savvy in order to effectively use their computers?" I'd submit that the problems you wrote about are mostly the result of design flaws and not naivete. In many ways, I think the computer industry has set the bar far too low by blaming users for problems it has created. Put another way: what would you think if you had a car that would sometimes break down without warning if you drove it on the highway without first buying additional parts?
As I see it, there are two design weaknesses that contributed to the problems that you wrote about. First, basically anything you do on a machine running Windows is done with full administrative privileges. In one way, this makes sense: you own the machine, so you should be able to do anything you want with it. The problem, however, is that this blind trust allows malicious software to do pretty well whatever it wants. Most other operating systems (Mac OS X, Linux, and Unix) require you to take some special action (usually typing a password) in order to install software or alter the operating system. While this can't prevent you from choosing to install malicious software, it makes it quite difficult to do so unknowingly. To stretch the car analogy a little further: people can't modify your car's engine without your knowing about it because you have to open to hood in order to reach it. Computers should work the same way.
The second problem is that Windows doesn't make a strong distinction between programs (the applications that you run) and data (documents and the like). This makes several attacks a lot easier, as malicious programs can sneak onto your machine by masquerading as data when you are browsing the Internet. For most non-Windows operating systems, there's something that you have to do explicitly to say, "This is a program and it's OK to run it." If Windows has these protections, there still wouldn't be anything to stop someone from maliciously sending you data you didn't want--but your computer wouldn't be able to then run that data as if it were one of your programs.
It's a mistake to say that anything is totally secure. There have been (and will continue to be) successful attacks on operating systems other than Windows, of course. But I think it's a mistake to think that Windows has so many (and such severe) attacks just because of its dominant market position. True, it's low-hanging fruit for those with a malicious bent. But it's also so much easier to attack Windows because of the way it's been designed.
The very concept of a computer virus depends on both of these two factors. Take away the administrative powers, and the virus has little if anything to infect. Remove the confusion between programs and data, and it becomes much more difficult for malicious software to spread. Many regard it as unnecessary to run antivirus software at all on non-Windows systems. While I'm personally not sure that's a good idea, it does give one an idea of the relative security levels involved.
I think these security problems may ultimately threaten Microsoft's market position. The bad design decisions that are part of Windows weren't made because Microsoft is dumb (quite the contrary: they employ a lot of very smart developers and architects). They were made for market-driven reasons. Lots of old software (dating back to old versions of Windows and the even older days of MS-DOS) simply won't run in a more secure environment. As
Re:To be fair to Microsoft (Score:1, Informative)
Tips, and a list of known rogue spyware cleaners (Score:5, Informative)
In his case, he needed
[LSP or Layered Service Provider is a piece of software that can be inserted into the Windows TCP/IP handler like a link in a chain. However, due to bugs in the LSP software or deletion of the software, this chain can get broken, rendering the user unable to access the Internet. Spyware is good at this, and some cleaners leave a broken LSP behind.
With the correct tool, the fix takes seconds. Without the tool, you need to uninstall and re-install the winsocket, or else the same with the entire network support. Otherwise you fall into the trap this poor bloke got into.]
My current recommended free antivirus is Avast! Home Edition [avast.com], which is very low maintenance for the home user, and requires registration for the free license. It also protect a number of common Instant Messenger clients, as well as several common P2P clients. It is better than AVG in my opinion, and detects many trojans as well as spyware.
You can get a system that is so hosed that it will not boot, not even into safe mode, even under XP. The solution there to remove the hard drive, drop it into an external drive enclosure, and hook it up to another system where you can use scanning software to do a basic clean so you can boot in the original configuration. Once it boots you can install cleaners from safe mode, and then run cleaners from inside every user account.
Re:To be fair to Microsoft (Score:2, Informative)
gets you an extra column in the output with the PID right there. The -o option is listed right in the same list as the -a option you used in your example.
Re:Tips, and a list of known rogue spyware cleaner (Score:5, Informative)
I used a generic BartPE disk this last weekend to copy a friend's data off a system that was so badly hosed it wouldn't let me log in.
Nice stuff.
Re:Making ghost images (Score:4, Informative)
I also save the MBR and the output of fdisk -l seperately.
Beware that support for NTFS is still experimental.
Re:Making ghost images (Score:3, Informative)
(I'm not the author or anything, but I find it a useful addition to my toolbox)
reinstall vs repair (Score:1, Informative)
The problem is in being able to remove the software that isn't working. if the techs in the story followed symantec's instructions for removal of antivirus products from the machines, then that is the first problem because i happen to know firsthand that those instructions are largely incorrect and leave a lot of registry keys left untouched, which was probably why they were having issues with it.
I have been able to repair most of the computers that i have fixed without a reinstallation of windows. the only time i'll reinstall is if something is highly time-critical, the person's software and settings are stored in their roaming profile, and i have a ghost image or a RIS image of the machine that is tested and ready to go. otherwise, i'll do these things in this order: find the offending peices of software and destroy them manually, run adaware and a fresh install of a current copy of an antivirus program that is different from the one they were using (antivirus.com has a free online scan that's pretty good), delete all unecessary crap from hard drive (temp internet files, recycle bin, temp folders, etc.), then install all current upgrades to windows (except xp sp2, of course) and upgrade all driver files. finally, install a good firewall (like zonealarm) and antivirus program and then reinstall their software and give some instructions on where spyware comes from and how to deal with it.
Newsflash, people: script kiddiez are not just going around and breaking into people's computers randomly. it does happen occasionally, but i have had dozens of people tell me that they were hacked and i'll check things like system logs and firewall logs and various other information and of all the people claiming to have been hacked, only one of them actually was. I don't think that hackers (or crackers, as i prefer to call most of them) are to blame for as much as people give them credit for. it's mostly uninformed users and people who will install anything. our solution here should be focusing on education of the core principles of which technology operates instead of a bunch of "how to do this" and "install this, you need it" without telling anyone what that stuff does. it's kinda like give a man a fish, he can eat for a day, but teach a man to fish, etc.
Re:Making ghost images (Score:3, Informative)
Ghost understands the filesystem which has some potential advantages. You can explore a ghost image file to see what's in it. I'm not sure how to do that with a dd image.
The main thing is I don't think ghost even attempts to read unused sectors. Zeroing out and using gzip is better than not doing it, but still slower than simply not reading them. 40 GB drives comes out as 1 GB? That's a lot of wasted time reading and compressing those sectors. Back when I was using ghost I'd backup more frequently, now it just takes too long to do periodically.
One tip, you can use the GPL Eraser [heidi.ie] program to zero out spaces on windows. It's more thorough than the "big zero file" technique. It will clear cluster tips and can also zero out the swap file (swap clearing is done by windows, but it lets you turn that feature on). Mainly intended as a secure delete, it requires minor configuration to write zeros.
There are some linux tools that are more like ghost, but I haven't played with them. Last I looked NTFS wasn't supported very well. For now I just keep my windows partition small (10 gig or less) and use dd.
should have reinstalled... (Score:3, Informative)
Re:Trying too hard. (Score:3, Informative)
Print out the instructions for "disk cloning". Once you have done it once, it is very easy to do again. You can then make a "clone" of your harddrive install, so when Win98 turns to mush for one reason or another, you can reformat and re-clone. Best of all, you don't have to spend a dime for it and you get all the functionality of Norton's ghost.
I have found that W98 requires a re-install once a year, and that there is no way around it. For those that haven't moved to linux yet, I highly recommend Xandros. While it does not come with the firefox browser, it is easy eonough to install.
I have told my entire family (and all those that they send to my door with their various MS "windows problems") that I no longer support microsoft windows operating systems, and will stop supporting microsoft apps shortly as well.
By no means am I a linux fanboy. It's just a question of being practical. I can't spend all my time de-worming/reinstalling everybody's computer when a viable alternative is at hand now.
Re:Slow computer! (Score:2, Informative)
I don't.....but I could.
Re:Making ghost images (Score:3, Informative)
In the era of 30 to 120+ GB HD's I do not have the time or patience to wait for DD to back up non-existant data unless it's for a serious (law enforcement is involved) situation.
Someone else mentioned making a boot floppy. Bah! I'll make a Knoppix ISO and hit knoppix 2 at the boot options screen if I don't want the pretty GUI but I do want most every tool I could possibly have a need for vs. the limited functionality boot floppy.
Re: Slow computer! (Score:3, Informative)
Make www.windowsupdate.com and v4.windowsupdate.com trusted sites, then crank up the security settings for the internet zone. No html forms, no downloads, no activex, no vbscript, no java...
It cripples IE so much that you can't even use it by accident. Not so useful if you're out of the habit of typing things into the address bar of file manager windows, but very useful if you have others using your computer who ust don't listen.