Language Selection

English French German Italian Portuguese Spanish

You Want A WAR? I'll Give You A War!

Filed under
Linux

Choose any metaphor you like. The gauntlet has been thrown down, I’m-a callin’ you out, I’ve only begun to fight…it doesn’t really matter which you choose. The war has begun…long ago actually, and there are even arguements as to who started it. Regardless of who or when, the war “is”. It is the war of bits and bytes, of file systems and desktops.

It is a war between Linux and Microsoft. Soldiers on each side have locked and loaded.

I have lamented often about the plight of Linux. Some claim that I am overly harsh and critical about the Linux operating system and some of the people involved with it. I am…and for my own good reasons. Many people see no “war”, they see no conflict or damage being done by either side. To those who believe this way, it is you who have the most to lose and if Microsoft wins; you lose something more valuable than gold.

Your freedom to choose.

Microsoft has amassed a fortune and not in just financial assets. Their fortune lies in the minds of people who think that Microsoft products are the only real choice they have…and Microsoft markets to these people extensively. You need to look to Europe where the bloodiest battle of the war is currently being fought. Linux and Open Source have engaged the enemy there on the battlefield of patents and monopolies. Many feel the battle there is already lost, but I disagree. People in Europe tend to pay a bit more attention than we Americans do, and that is to their advantage. Had the Europeans not been paying attention, figuratively, they would have been shot in the back.

The war is being fought over what people believe…what they know and use. I challenge you to answer me because many of you have been either kept ignorant or just outright lied to. This is what I want to know:

*Why do you insist on reformating your hard drive after a virus destroys your data and replace your system with software that allowed the damage to occur in the first place?

*Why do you use a product from a company that demands your ignorance and counts upon it to succeed?

*Why do you allow a company to dictate to you when and how you are to use the software YOU paid for?

*Why do you pay hundreds or thousands of dollars for software when there is a better alternative and it is free?

I can only guess as to what the answers to these questions might be. If it is due to the fact that you simply do not know your options, then I am doing my best to make you aware of them. Many of you are just plain lazy and do not want to learn anything new. Why should you? If things are perfect inside that little beige box under your desk, then maybe you are justified in your apathy. For now. The acid test of your judgement skills will come when things go terribly wrong…and if you use Microsoft Windows, eventually they will. Take a minute and look at

http://www.help2go.com/postt14465.html

or

http://news.bbc.co.uk/2/hi/technology/4080420.stm

In a nutshell, you will read that over 900 million viri, trojans and malware tools are spread via email on any given day. that number is projected to climb to 4200 million a day by 2009. The main target for these weapons are Windows computers. The second link is going to tell you that as a Windows home user, your defenses are almost cut in half by the new and varying attacks.

And you just keep clicking without a care in the world.

Microsoft is the little Dutch boy with his finger in the dike. the onslaught is continuous and unforgiving and eventually, they are going to lose the fight. Don’t you dare spend a second contemplating pity for them. They knew what they were doing when they coded their operating system. They simply under estimated the number of jerks and script kiddies in the world. Within 72 hours of Microsoft making available their anti-spyware tool, three exploits were published to the web to get by it. In fact, one of them actually used the code within the tool to do its dirty work. Those tiny cracks are starting to gush water.

While all of this has been going on, the developers of the Linux Kernel have been quietly and effectively strengthening and hardening the Linux Operating System. Many argue that once Linux achieves a higher status and user base, then attacks against it are inevitable.

Bring it on.

See, Linux has no registry. The file system in Linux is a fortress by design and it will take much more effort than downloading a script from a rogue page and infecting someone via email. Much more, so much more in fact that most people will just give up. Don’t underestimate the maliciousness of some people…they will try no doubt. They will not find the fertile ground that is found in Windows.

I sat on my deck this morning at 5 AM, wanting to greet my day as it arrived. Somewhere between my first cup of coffee and my second cigarette, a powerful yet calming thought came to mind. I have been wrong about something important. I have complained loudly that Linux is too fragmented by both the number of distributions and the geographical disparity of its developers. What I saw as a weakness is indeed Linux’s main strength. There is no one focal point to attack…no corporation to bring down or group of stockholders or hardware manufacturers to blackmail. Gates and Ballmer must be swilling Malox by the gallon and just for the reasons I outlined above. Linus Torvalds, Richard Stallman and Eric Raymond…please accept my apology. I was wrong. It is you who are truly the genius.

And brave soldiers as well.

All-righty then

helios

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.