__/ [ High Plains Thumper ] on Tuesday 01 August 2006 03:56 \__
> Roy Schestowitz wrote:
>> High Plains Thumper on Monday
>>> nessuno@xxxxxxxxxxxxxxxxxxx wrote:
>>>> When is a deleted file really deleted? With Windows Vista, that answer
>>>> gets complicated.
>>>> Microsoft recently revealed that Windows Vista would inherit "volume
>>>> shadow copy" technology from Windows XP and Windows Server 2003. In
>>>> those older operating systems, volume shadow copy is used to take
>>>> periodic snapshots of key system files, though the service can also be
>>>> instructed to monitor any kind of data for the purposes of creating a
>>>> system "restore point."
>>>> End quote
>>>> Want to make sure your operating system isn't pulling any obscure or
>>>> undocumented tricks behind your back? Use Linux!
>>> I like the "trash" bin in Linux. Right click on "empty", it is gone, no
>>> turning back! IMHO, redundant features like this volume shadow copy and
>>> for a matter of fact, multiple copy and paste buffers in Microsoft Office
>>> provide another reason for sites like, "Windows Annoyances" to remain
>>> open. I find it particularly annoying when copying and pasting, to see
>>> that stupid multiple choice pasting buffer pop-up.
>> To play devil's advocate: When you empty the trash bin, you only eliminate
>> the pointers to the data which is being 'deleted'. The data is still there
>> on the disk (until overwritten), but it requires some deciphering, for
>> which there are tools. It's a similar scanrio with shadowing. If you want
>> to delete data properly, get the needed tool. But expect deletion be a
>> much slower operation as a result. To the ppolice, ingorance about this
>> (as well as the inclusion of this Vista feature) is a true blessing. A
>> detective's delight...
>> Vista Encryption Concerns British Gov
> This concerns me:
> | The technology will additionally prevent malicious software from being
> | installed on computers without the user's consent.
> | But the move has been criticized by some, who say companies could use the
> | digital rights management to prevent users from installing programs they
> | have not approved, such as peer-to-peer file sharing applications.
> Perhaps it will prevent programs that Microsoft has not approved, such as a
> Linux boot partition?
Or Firefox. Now look at how ironic this is. Microsoft is shoving Internet
Explorer 7 into all the users' computers. Users need to download special
software merely to /prevent/ Microsoft software from being installed as part
of that future system update.
Sometimes, you wonder if Microsoft can become more malicious. But always,
they manage to surprise you.
GNU/Linux is beautiful. < http://youtube.com/watch?v=lawkc3jH3ws >
http://Schestowitz.com | Free as in Free Beer ¦ PGP-Key: 0x74572E8E
Cpu(s): 18.4% user, 2.7% system, 0.6% nice, 78.3% idle
http://iuron.com - semantic engine to gather information