Wednesday, May 21, 2014

Oh Look, EVERYTHING'S MADE OUT OF SHIT,
AS IT HAS BEEN FOREVER ...

...and all of you are too stupid to know or care.
Software is so bad because it’s so complex, and because it’s trying to talk to other programs on the same computer, or over connections to other computers. Even your computer is kind of more than one computer, boxes within boxes, and each one of those computers is full of little programs trying to coordinate their actions and talk to each other. Computers have gotten incredibly complex, while people have remained the same gray mud with pretensions of Godhood.

Your average piece-of-shit Windows desktop is so complex that no one person on Earth really knows what all of it is doing, or how.
Please die already, because your species is killing me. (WiC).

And while we're at it, fuck the veterans. Murderers. If you were injured in one of Bush's wars of choice (if you enlisted, even) get the fucking Bush Crime Family to pay for your fucking problems, fucking thugs. I didn't send you to war, why should I pay for your well-deserved problems if the gov't. won't use my U.S. tax dollars to fund abortions? If I paid taxes they sure as fuck wouldn't be used to anything i don;t like. Like the Army & "Law" Enforcement. They aren't my fucking laws.

Now, is there any more of your fucking conventional idiocy disguised as wisdom I can destroy in a sentence, sheep?

4 comments:

mikey said...

So the story is that this dood 'discovered a vulnerability' and 'wrote a script' that installed a rootkit, creating a 50,000 node botnet in four hours. As the funny pictures of willy wonka tend to say, "is that so?"

A vulnerability. Dash off a quick script - have it run against IP addresses and ports, never mind firewalls and NAT. No command & control nodes, no, exploit code, just a vulnerability, a script and just like magic you have root access to 50,000 computers.

The problem with cyber security has always been that people don't understand HOW exploits work, they don't understand the actual functional process of 'taking over' a computer. Here's a hint. You discover/choose a vulnerability, you write exploit code, you run the code serially against a set of addresses/ports and when the exploit is successful you install something, say a rootkit. The rootkit then communicates to a C&C server.

Without this kind of communication, our great and good nameless hacker wouldn't have any idea how many machines he had infected.

The biggest problem with this widespread ignorance about what hacking is and how it's done is assclowns can pretend they are hackers and people believe them. It's like the internet itself, where oddly enough the population of US Navy SEALs is greater than the total number of US Navy SEALs ever.

ifthethunderdontgetya™³²®© said...

What happens when what the people with all the money want conflicts with what the people running the national surveillance state want?
~

Weird Dave said...

Your average piece-of-shit Windows desktop is so complex that no one person on Earth really knows what all of it is doing, or how.

That's a feature, not a bug.

(And pardon me for being trite, but, really, it is.)

M. Bouffant said...

Lousy Editor Admits:
Well, I don't know nuffin 'bout birfin' no babies or "hacking." ('Though I'd love to be able to fuck things up royally.) Do you mean this wasn't what most who know would call a hack, or just that he couldn't have done much w/ the boxes under his "control?'

Should have pulled this too:
Written by people with either no time or no money, most software gets shipped the moment it works well enough to let someone go home and see their family. What we get is mostly terrible, which was the real point on top of my head.