Different Thinking
This month BETT, the Educational Technology Show, again showed the difference between Apple and Microsoft, and I don’t mean just Microsoft’s relative prominence on the show floor.
Consider Apple’s show guide entry:
"Apple’s mission is to offer tools and solutions wich embrace and extend the best educational practices, enchancing teaching, facilitating life long learning and simplifying communications. Always leaders in inovation, Apple delivers solutions offering clear advantages of power, ease of use, multimedia capabilities and compatibility... View the great solutions that help empower individuals and groups to address the challenges of the future today".
In an interview in the "Guardian", Microsoft’s general manager for education, Liz King, listed her company’s priorities in education:
"First, to make money, second, to increase Microsoft΄s market share in schools and third, "education is a startegic marketplace for us. We are educating the next generation of workers who will purchase our products".
As the "Guardian" commented, "These are priorities that significantly don’t mention improving the quality of education or ensuring equality of access to education."
Different thinking indeed.
Still better than Windows...
Facebook fact checkers...
Google & Facebook fined for spying on users
MetaCompany: Facebook Stole Our Name and Livelihood
Hello, World!
We are Meta Company.
Original Flavor. 😊
For the last three months, Facebook lawyers have been hounding us to sell our name to them. We refused their offer on multiple bases. Namely, the low offer wouldn’t cover the costs of changing our name, and we insisted on knowing the client and intent, which they did not want to disclose.
At least two law firms were involved: One in the USA that requested our trademark and domains (Kilpatrick, Townsend & Stockton), and the other in Europe aggressively contacting trying to get us to sell our domain registrations (Hogan Lovells).
On October 20th, 2021, during a phone call with Facebook attorneys, we declined their low offer and maintained our requirements. At this point, we presumed it was Facebook and identified them on the call. The attorney representing Facebook declared they would respect our existing right and registration.
On October 28th, 2021, Facebook decided to commit trademark infringement and call themselves “Meta”.
They couldn’t buy us, so they tried to bury us by force of media. We shouldn't be surprised by these actions — from a company that continually says one thing and does another. Facebook and its operating officers are deceitful and acting in bad faith, not only towards us, but to all of humanity.
It's unfortunate to have been associated with a company so rooted in controversy and fixated on domination. We aim to be distinguished from Facebook's totalitarian view of the future. We hope the negative association with Facebook and its founder will be forgotten — but we won't ignore the damages done.
We have proceeded to file the necessary legal actions. This message may be regarded as a public cease and desist. We welcome your support.
One more thing: Our new product launch just got delayed because of Facebook. We must deal with these matters. In the coming weeks, we will make an announcement earlier than we expected. We promise it will be good. Stay tuned.
Thank You.
Sincerely,
Nate Skulic
Founder, MetaCompany
Media and press inquiries may be submitted to press@meta.company.
Linux Porn
Linux Nerds
Anatomy of a Linux Ransomware Attack
Here are our top tips and advice for protecting against Linux Ransomware:
Backup critical files and diversify the storage media to avoid a single point of failure (SPOF). This won’t prevent an attack, but can mitigate potential damage.
Keep servers and endpoints up to date to ensure that they use the latest security patches.
Implement the principle of least privilege for user accounts.
Monitor network activity and system logs closely.
Keep tabs on event logs to identify anomalous behavior before it causes harm.
Use a combination of IP filtering, an intrusion detection system (IDS) and an intrusion prevention system (IPS).
Use Linux security extensions that control and restrict access to data or network resources.
Implement robust network segmentation and data compartmentalization to minimize the impact of a potential ransomware attack.
Audit systems regularly.
More on: https://linuxsecurity.com/features/anatomy-of-a-linux-ransomware-attack
New "FontOnLake" Linux Malware Discovered
Hackers...
Hive ransomware now encrypts Linux and FreeBSD systems
With Windows it's all fine...
Computer Operating Systems where born to be...
Linux/Unix: Born to be root
Windows: Born to re boot