ALL BLOG POSTS AND COMMENTS COPYRIGHT (C) 2003-2017 VOX DAY. ALL RIGHTS RESERVED. REPRODUCTION WITHOUT WRITTEN PERMISSION IS EXPRESSLY PROHIBITED.

Saturday, May 13, 2017

Thanks, NSA

Who would have ever thought that a government bureaucracy would fail to adequately take safeguards against its tech-weaponry proliferating?
More than 100 countries across the world have been affected by the 'unprecedented' cyber attack using a computer virus 'superweapon' dubbed the 'atom bomb of malware'. It is believed more than 130,000 IT systems are affected around the world, including hospitals in the UK, telecoms and gas firms in Spain, schools in China, railways in Germany and the FedEx delivery company.

The European Union's police agency, Europol, says it is working with countries hit by the ransomware scam to rein in the threat, help victims and track down the criminals. In a statement, Europol's European Cybercrime Centre, known as EC3, said the attack 'is at an unprecedented level and will require a complex international investigation to identify the culprits.'

Security experts say the malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was identified by the US National Security Agency for its own intelligence-gathering purposes.

The NSA documents were stolen and then released to the world last month by a mysterious group known as the Shadow Brokers. The hackers, who have not come forward to claim responsibility, likely made it a 'worm', or self spread malware, by exploiting a piece of NSA code known as Eternal Blue, according to several security experts.
The idea that a government can adequately safeguard anything should have been exploded when the USA was unable to preserve its monopoly on nuclear weapons. If they can't keep something as uniquely advantageous and powerful as that to themselves, what can they protect? Area 51?

Labels: ,

70 Comments:

Blogger Le Regardeur May 13, 2017 10:46 AM  

Time for Europeans to sue the U.S. in European courts and get judgments against it, just like the bullshit billion dollar judgments that (((judges))) in the U.S. federal court in New York have awarded against countries like Iran.

Blogger Mr.MantraMan May 13, 2017 10:54 AM  

Trump's fault or Bush's

Anonymous glosoli May 13, 2017 10:55 AM  

I play golf with a heathen headteacher of a UK state school. His school was hit with this early last week.
I couldn't have been happier, UK state schools are propagating satanism.
The system is eating itself.
Excellent, let it collapse, and we can re-build something better.

Blogger #7139 May 13, 2017 10:57 AM  

The North Koreans did it! Just you wait and see!

Blogger Francis Parker Yockey May 13, 2017 11:00 AM  

But it's good for the NSA, CIA, etc. and their institutional power to hold onto zero days, back doors, and other vulnerabilities in order to exploit them. Of course, they will inevitably be exploited by others as well, as there is no practical way to patch vulnerabilities on critical American systems only. The US is more dependent on electronic infrastructure, on the systems that the "intelligence" services are deliberately compromising, than most other countries in the world, and thus intrinsically more vulnerable to cyber warfare attacks. That should work out well.

Blogger Robert What? May 13, 2017 11:01 AM  

Anyone know how it gets onto your system? Clicking an email link, performing a Windows update, other?

OpenID aew51183 May 13, 2017 11:02 AM  

This should be seen as a positive.

The utter ineptitude of government to keep its secrets makes it all the more difficult for it to maintain orwellian conspiracies against the people without the people knowing about it.

Further, this is yet another case of market reality asserting itself.

Proprietary software companies like microsoft have been very successful in lobbying to keep more robust open source suites out of official use in favor of closed-source solutions.

This will prompt a major re-assessment in favor of OSS solutions that are subject to the rigors of wide-spread code review and security testing.

Blogger Were-Puppy May 13, 2017 11:05 AM  

It's scary how fast that malware spreads. Since it came from the NSA, you would think they had a way to control it.

Blogger Were-Puppy May 13, 2017 11:05 AM  

Slightly OT:
HELD AT GUNPOINT BY CAMO-DUDES @ AREA 51 SECRET BACK GATE!!
https://youtu.be/w8Nc9SWED00

Blogger exfarmkid May 13, 2017 11:07 AM  

"Since it came from the NSA, you would think they had a way to control it."

Heh. That's a good one!

Blogger Shadiley May 13, 2017 11:15 AM  

I have an IBM Selectric purchased specifically for the end of the functioning civilian internet I envisioned once pizza became popular. It was a pleasure kvetching with you.

Anonymous Difster May 13, 2017 11:31 AM  

This particular variant has been disabled by someone that registered the kill switch domain buried in the malware.

Blogger Ken Prescott May 13, 2017 11:32 AM  

I won't go into many details, but . . .

A long, long time ago, in an Internet far, far way . . .

A network appliance manufacturer announced that their product had a serious security flaw--a zero-day flaw. They further stated that the flaw was a result of the appliance being compromised IN THE FACTORY by, if you read the announcement carefully, the NSA.

Code to exploit the flaw was in the wold.

This got my attention because I had recently been employed by a defense contractor, and the project I'd worked on immediately before being laid off had this particular network appliance all over the damn place, including places on unclassified networks where one might, possibly, gain access to classified networks (if certain other equipment that I shan't discuss was in the picture).

The thing is: for DoD, the NSA is the Designated Approving Authority for what hardware/software may be used on DoD networks. They had approved this appliance with no restrictions, no requirements for special patches, et cetera. (The flaw worked even if you correctly applied the DISA STIGs.) The NSA, for the sake of wanting a backdoor into other guys' networks, left that backdoor in DoD networks.

Anonymous BBGKB May 13, 2017 11:35 AM  

The US is more dependent on electronic infrastructure, on the systems that the "intelligence" services are deliberately compromising

The supposed source of millions of smart immigrants India not only has more cell phones than toilets but many there burn methane from their latrines to cook with. Take that smart oven.

"Since it came from the NSA, you would think they had a way to control it."

Luckily we can trust the CDC with diseases. http://www.latimes.com/nation/nationnow/la-na-cdc-mistakes-20140711-story.html

Blogger Doom May 13, 2017 11:35 AM  

The US government, half of the time... and a bit more, is the enemy of the American people. They won't keep a secret because half of the government is murderously hateful of the people. Nukes didn't slip out, the government wanted the Russians to have them.

As for this? I am suspicious that it was let out, and allowed to run, on purpose. Why? Just how many of the programmers, academics otherwise involved with this, and government employees are antifa? Right. Simple chaos.

Part of the reason I am suspicious is because there was a killswitch, which was accidentally initiated (or... so it is told). Even so, the FBI was suggesting companies to "just pay". I don't know if this is actually a backend way of government robbing even more than it already does or if the antifa, who let it out, wanted it to run and do as much damage as possible.

This whole story stinks. It isn't at all what it seems, or we are told. Trump really might have to do marshal law, just to take the jackals by the throat and remove their threat. This is an obverse attack on the US. As are the leaks.

Anonymous Ominous Cowherd May 13, 2017 11:55 AM  

aew51183 wrote:Proprietary software companies like microsoft have been very successful in lobbying to keep more robust open source suites out of official use in favor of closed-source solutions.

Yes.

aew51183 wrote:This will prompt a major re-assessment in favor of OSS solutions that are subject to the rigors of wide-spread code review and security testing.

Probably not.

Anonymous The OASF May 13, 2017 11:58 AM  

And the best advice the FBI can give ransomware victims is to pay the ransom... Right.

Almost makes one think that perhaps the FBI in the CIA are perhaps the ones developing and deploying the ransomware. Surely not.

Blogger SJ May 13, 2017 12:00 PM  

It goes through open ports Windows uses. But iirc the vulnerabilities are not there on anything past windows 7. If you're on something older until this gets patched just disconnect your PC from the internet.

Blogger Were-Puppy May 13, 2017 12:01 PM  

@15 Doom
As for this? I am suspicious that it was let out, and allowed to run, on purpose.
----

That's what I meant in my earlier post. As to why? Maybe MS paid them to scare people into upgrading to Win10. I really don't know.

Blogger Were-Puppy May 13, 2017 12:03 PM  

@18 SJ
It goes through open ports Windows uses. But iirc the vulnerabilities are not there on anything past windows 7. If you're on something older until this gets patched just disconnect your PC from the internet.
---

From what I've read, the patch was sent out in March. If that's true, then these are all unpatched systems being affected.

Anonymous Gen. Kong May 13, 2017 12:04 PM  

Back-door built-in flaws, back-door payments to off-books accounts. Stinks of deep state. Probably building up Hillary's defense fund. Doom's wearing unusual rose-colored glasses today. The NSA/CIA/FBI are chock full of traitors who want to exterminate the posterity of the nation's founders.

Blogger bosscauser May 13, 2017 12:06 PM  

SkyNet!

Gab.ai/GaryCauser

Anonymous badhairday May 13, 2017 12:06 PM  

Never open email attachments.
Never get off the boat.
Never let a vampire into your house.
and maybe have a wee think about switching to Linux.

Blogger Midnight Avenue J May 13, 2017 12:20 PM  

Bit O/T, So how do I go about this? Not really techie at all. Have an old Toshiba that had a cracked hard drive, I bought a new drive but the recovery CDs were fouled and I don't want to buy new ones.

Looks like I can burn Ubuntu or some other Linux iteration to format for the drive and refurbish to laptop. Where do I go from there? Good resources for me, books, websites?

Anonymous FP May 13, 2017 12:24 PM  

"Anyone know how it gets onto your system?"

Apparently through email phishing but then can spread through a network if it finds an unpatched system.

Its been amusing watching the tech forums since yesterday. Far too many who were defending the NSA,CIA, FBI while bitching about users clicking on email attachments or only blaming MS for their stupid patching system and windows 10 idiocies.

Last I read Windows patched the problem starting back with march's security roll up. You know, not long after the NSA backdoor info was released to the public. Convenient.

Anonymous DirkH May 13, 2017 12:27 PM  

Fun: German MSM of course has the task of obfuscating the criminally stupid misbehaviour of the NSA. But at the same time MSM journalists don't quite know what they're writing about with all that cyberstuff.

So I found the amusing formulation of a security hole DESIGNED by the NSA -which then got exploited by those mean Russian hackers.

And unsurprisingly, RT has CORRECT reporting about it. Russians even seem to UNDERSTAND what they're writing about.

Anonymous DirkH May 13, 2017 12:31 PM  

@25. FP May 13, 2017 12:24 PM
""Anyone know how it gets onto your system?"

Apparently through email phishing but then can spread through a network if it finds an unpatched system."

What is important is that the attacker makes Windows Defender ANALYZE the code. This analysis EXECUTES it in a sandbox. As the sandbox has a crack, the code can red-pil, i.e. get out of the sandbox.

So, sending an e-mail to a e-mail client program is a way to attack (a web e-mail page works differently); or, put the code in a download. Or anything else that Windows Defender will analyse.

Anonymous Man of the Atom May 13, 2017 12:32 PM  

Midnight Avenue J wrote:Bit O/T, So how do I go about this? Not really techie at all. Have an old Toshiba that had a cracked hard drive, I bought a new drive but the recovery CDs were fouled and I don't want to buy new ones.

Looks like I can burn Ubuntu or some other Linux iteration to format for the drive and refurbish to laptop. Where do I go from there? Good resources for me, books, websites?


Linux Mint. Behaves more like Redmond Virus out or the box, but compatible with Ubuntu. Options for CD/DVD or USB stick boot are available.

There's always Slackware or Debian when you get to feeling hard core.

Anonymous DirkH May 13, 2017 12:38 PM  

@20. Were-Puppy May 13, 2017 12:03 PM
" @18 SJ
It goes through open ports Windows uses. But iirc the vulnerabilities are not there on anything past windows 7."

It was in WIN10 as well. But patched in March. Many systems were behind with their security though.

MSFT has made it a habit with WIN10 to churn out Gigabytes of useless bells and whistles on a regular basis. So my mobile systems have a hard time getting all of it, I am often on a metered connection i.e. I switch off the updating on those connections to save volume.

What I need is a way to prioritize the security updates and I haven't found a way to do that yet. This stinks big time. The entire subcontinent of India programs useless crap to fill my harddisks and all I want is security.

This is a risk to civilisation. Linux will become a priority just to cut that crap.

Anonymous FP May 13, 2017 12:38 PM  

@24

For linux help on laptops and compatibility, http://linlap.com/

Anonymous Man of the Atom May 13, 2017 12:39 PM  

@Midnight Avenue J:

Check out Alternative.to to get ideas about what programs are analogs to Windows software, such as LibreOffice on Linux versus MS Office on Windows.

While not ideal, there are environments such as CrossOver and Virtualbox that can sandbox Windows programs or the entire operating system on your main Linux system. Topic for your next skill level.

Blogger ZhukovG May 13, 2017 12:40 PM  

If your Windows OS is up to date you should be safe from this since MS patched this some time ago. If you still have XP you are screwed.

Blogger ZhukovG May 13, 2017 12:43 PM  

UPDATE: MS is releasing a patch for older systems just for this.

Anonymous Susan() May 13, 2017 12:49 PM  

Something else to watch in terms of malware is your emails. Some of these malware hackers use your contact list, and the lists of your friends to spread this.

Pay attention to the style of your friends emails, and if it looks fishy, never open, delete immediately and notify said friend that their contact list might have been hijacked.

This has happened twice to friends of mine now, and I have gotten emails from both with a hot link. I do not open ANYTHING from them if I am not sure. They both know that about me, that is why they are my friends.

Anonymous FP May 13, 2017 12:52 PM  

@33

How nice of them since for many win7 and 8 systems they purposely slow windows update to a crawl. Something that should take 10 minutes tops takes 6+ hours to find all needed updates and install them. "Oh thats a bug, we fixed it! Then we broke it a month later again!"

Thank God for WSUS offline update.

Anonymous DirkH May 13, 2017 12:52 PM  

@32. ZhukovG May 13, 2017 12:40 PM
"If your Windows OS is up to date you should be safe from this since MS patched this some time ago. If you still have XP you are screwed."

I have one very old XP sys for nonvital surfing and it received an update today. MSFT is taking this EXTREMELY serious.

I don't think my XP was vulnerable though: You HAVE TO have windows defender on to be vulnerable - I didn't on that machine. Using Avira instead.

Anonymous Man of the Atom May 13, 2017 12:55 PM  

FP wrote:@33

Thank God for WSUS offline update.


+1

Blogger SouthRon May 13, 2017 1:01 PM  

It is time to put a fork in the many eyes myth of OSS. It's right up there with peer review. People don't have the time or money to do it. So, it hardly ever actually happens.

There are very few people who are competent to do a thorough code security audit and far too much new code being written for it to happen.

Yes, if you find it in OSS you can fix it. But there are companies that forbid reporting zero-day vulnerabilities in the firmware, closed source and open source software arenas.

There is no such thing as security. If you assume as much, you will not be dissappointed.

I've worked in the industry and just the few things I could publically point to have frightened DHS enough that they chose to make a couple public for the sake of public safety and to embarrass and pressure the companies into correcting them. I will not post links to maintain some anonymity.

Anonymous DirkH May 13, 2017 1:02 PM  

Thanks for the WSUS tip!
http://www.wsusoffline.net/

Anonymous Donald Trump May 13, 2017 1:02 PM  

Security experts say the malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was identified by the US National Security Agency for its own intelligence-gathering purposes.

That went well!

Blogger Aeoli Pera May 13, 2017 1:16 PM  

The NSA documents were stolen and then released to the world last month by a mysterious group known as the Shadow Brokers.

Bull*** radar is pinging here.

Anonymous Steveo May 13, 2017 1:55 PM  

@2 Mr. MantraMan

Outstanding. You've identified the elusive 8 year BLAME GAP in an almost scientific method.

Blogger Doom May 13, 2017 2:36 PM  

Were-Puppy wrote:@15 Doom

As for this? I am suspicious that it was let out, and allowed to run, on purpose.

----

That's what I meant in my earlier post. As to why? Maybe MS paid them to scare people into upgrading to Win10. I really don't know.


Oh, that might be part of it. Or even all of it. Those bastards, even with a laptop having all connectivity shut off, partially jacked an update to win 10. I have a way to go back and return things as they were, but they shouldn't have been able to even get in.


Gen. Kong wrote:Back-door built-in flaws, back-door payments to off-books accounts. Stinks of deep state. Probably building up Hillary's defense fund. Doom's wearing unusual rose-colored glasses today. The NSA/CIA/FBI are chock full of traitors who want to exterminate the posterity of the nation's founders.

Always nice to be noticed, especially when in pink. Whought!

Blogger bornagainpenguin May 13, 2017 2:51 PM  

SouthRon wrote:It is time to put a fork in the many eyes myth of OSS. It's right up there with peer review. People don't have the time or money to do it. So, it hardly ever actually happens.

There are very few people who are competent to do a thorough code security audit and far too much new code being written for it to happen.

Yes, if you find it in OSS you can fix it. But there are companies that forbid reporting zero-day vulnerabilities in the firmware, closed source and open source software arenas.


Is there a number I can call to join the astroturf operation? I'd love to make money exercising my CTRL+X and CTRL+V buttons too!

As a side note I was really impressed with your goalpost shifting from a security app with a busted sandbox to "firmwares" you switched from one to the other masterfully!

Blogger Billy Ray May 13, 2017 3:45 PM  

and people wonder why I have almost NOTHING connected to or dependent upon the internet and use a dumb phone and cash

Blogger SouthRon May 13, 2017 3:59 PM  

What part of unreported zero-day vulnerabilities at any layer of the software stack don't you understand?

Some firmware and BIOS's used for inline security devices whether proprietary or not are Linux and BSD. Ergo exploitable security components.

You think the firmware on you OpenWRT router can't be exploited?

Blogger Snidely Whiplash May 13, 2017 4:19 PM  

Billy Ray wrote:and people wonder why I have almost NOTHING connected to or dependent upon the internet and use a dumb phone and cash
We all assumed it was because you were embarrassed by being outsmarted by an iPhone.

Anonymous Viiidad May 13, 2017 4:32 PM  

I like being on a Mac.

Blogger Snidely Whiplash May 13, 2017 4:45 PM  

Viiidad wrote:I like being on a Mac.
It's almost cute, the way you think Apple and Tim Cook will protect you.

Blogger Happy LP9 May 13, 2017 5:16 PM  

Well, as long it was wasn't an EMP it was a warning shot, I dont know.

More than 100 countries across the world have been affected by the 'unprecedented' cyber attack using a computer virus 'superweapon' dubbed the 'atom bomb of malware'. It is believed more than 130,000 IT systems are affected around the world, including hospitals in the UK, telecoms and gas firms in Spain, schools in China, railways in Germany and the FedEx delivery company.

The European Union's police agency, Europol, says it is working with countries hit by the ransomware scam to rein in the threat, help victims and track down the criminals. In a statement, Europol's European Cybercrime Centre, known as EC3, said the attack 'is at an unprecedented level and will require a complex international investigation to identify the culprits.'

Security experts say the malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was identified by the US National Security Agency for its own intelligence-gathering purposes. ---

Great, as my amazon, ps4 and bank accts are all frozen due to serious fraud, someone bought and got around 1000 to 3000 worth of items on my dime, horror show hacking. Genesis healthcare a national horror show that was hacked, they denied it but whatever happened jacked with dads healthcare and his records.

I am depressed this month; even triggered; I had to get a damn phone its like bringing cable tv into my sanctuary home.

I maintain whatever tech the general public are gifted overvalued tech trash is all obsolete junk.

The Alt tech and POTUS Trump will, both parties will bring the kind of tech I want.

Blogger Happy LP9 May 13, 2017 5:17 PM  

I hate NSA

Blogger robins111 May 13, 2017 6:10 PM  

I'm waiting till they make a cyber attack on the systems that fill up the EBT cards... wonder what will happen when a million or so of the show nothing but zeros.

Anonymous Millenium May 13, 2017 6:14 PM  

JFK did not want our (((Greatest Ally))) to have nuclear weapons. In a strange coincidence he then had his brain matter splattered all over Jackie's coat.

Anonymous Donald Trump May 13, 2017 7:30 PM  

FBI that does not properly investigate.
NSA that does not secure us.
CIA that is not very intelligent.
Something kooky going on here!

Anonymous SciVo de Plorable May 13, 2017 8:04 PM  

Drain the Derp State.

Blogger Francis Parker Yockey May 13, 2017 8:17 PM  

RFK's Justice Department was pretty insistent on the American Zionist Council (predecessor to AIPAC) registering as a foreign lobby, too. That effort ended once RFK was no longer Attorney General. Not sure they had anything to do with exploiting security flaws in Windows, though.

Anonymous Icicle May 13, 2017 8:45 PM  

American Zionist Council (predecessor to AIPAC) registering as a foreign lobby, too.

They are a foreign lobby.

Anonymous Viiidad May 13, 2017 9:28 PM  

Snidely Whiplash wrote:Viiidad wrote:I like being on a Mac.

It's almost cute, the way you think Apple and Tim Cook will protect you.


I haven't had a virus issue since I switched to Mac 20 years ago. Tim Cook and the Apple machine certainly aren't on the side of what's right, but they are much less troubled by viruses. .vbs, anyone?

Blogger Snidely Whiplash May 13, 2017 9:54 PM  

Most people who don't open random files or visit Russian/Korean/Chinese wares sites don't get viruses.
Personally, I run Linux and have never had a virus. But not because I trust the OS.

Blogger Francis Parker Yockey May 13, 2017 10:00 PM  

@Icicle

"They are a foreign lobby."
Legally speaking, AIPAC is a 501(c)(3) organization. Not covered by the Foreign Agents Registration Act. I'm sure there's some perfectly good exc-- I mean reason for that. Nothing to do with simple power or influence, but a perfectly legitimate legal reason.

I still see no reason to blame them for this particular Windows security flaw, though.

Anonymous Icicle May 13, 2017 10:07 PM  

Legally speaking,

We should fix that.

Nothing to do with simple power or influence

They have to go back.

Blogger Francis Parker Yockey May 13, 2017 10:08 PM  

@Snidely Whiplash

"Personally, I run Linux and have never had a virus. But not because I trust the OS."

Yeah, just taking some basic security steps goes a long way. Of course that still doesn't obviate the need for a good backup regimen. Every major problem that I've had with a PC has been a physical hard drive failure. Vaccination is far more effective than treatment for that particular illness, if I may use a somewhat emotionally-loaded metaphor.

Anonymous Viiidad May 13, 2017 10:54 PM  

Snidely Whiplash wrote:Most people who don't open random files or visit Russian/Korean/Chinese wares sites don't get viruses.

Personally, I run Linux and have never had a virus. But not because I trust the OS.


I had linux running on my laptop for a long time before it finally gave up.

I've been my own IT department for years. If I had any real trust in operating systems long ago, it's long gone. I'm just amazed that people actually use Windows, really. It's such a buggy mess of layers upon layers.

Blogger Snidely Whiplash May 13, 2017 11:11 PM  

Layers andlayers aren't bad, necessarily. It's just that in Windows, the guys who are writing layers D and E are never allowed to talk to the guys who are writing layer 35.1569, and the guy who wrote layer purple never documented it, and the code for layer Emily is indecipherable. and everything is now being coded and maintained by contract H1b hires and offshore outsourcers.
And the original design was from a demon with a deep hatred of all humanity. And for years Ballmer demanded it be written in Visual Basic.
It's not the number of layers that are the problem.

Blogger Edward May 14, 2017 12:17 PM  

I'm sure Dave Cutler resents that remark, it wasn't humanity that he had a deep hatred for it was just Unix.
Most of his design bit has actually worked out pretty well for over 25 years now, it's just the layers and layers and layers that are the problem.
I'm kinda scared of Windows 10 too, seems like the last really stable/productive version was Windows 7, but then they used to say the same thing about XP, and when that was new the last really stable version was probably NT3.5.
So can we get the newest kernel and latest hardware support coupled to the windows 2000 shell please, that would be super-awesome snappy nowadays, and would probably be a lot easier to lock down.

Blogger Doc Rampage May 14, 2017 2:28 PM  

These ransomware criminals are doing us a huge favor by making the establishment care about computer security. The Internet is a huge national security vulnerability and the US government doesn't care. Foreign governments have repeatedly attacked the US through this path and suffered no consequences unless they happened to get blamed for a Democrat losing an election.

Having a secure internet infrastructure should be considered as important as protecting us from a terrorist nuke, because the consequences can be just as bad. But politicians are ignorant fools so they need to be hit over the head repeatedly to get them to do anything useful.

Blogger Cail Corishev May 14, 2017 2:34 PM  

Having a secure internet infrastructure should be considered as important as protecting us from a terrorist nuke,

What does "secure internet infrastructure" mean? I'm in the industry, and I have no idea.

Blogger Doc Rampage May 14, 2017 3:48 PM  

Cail Corishev wrote:What does "secure internet infrastructure" mean?

I don't understand what you don't understand. It means that we are largely safe from attack by way of the internet, but that's obvious, so maybe you are getting at something else.

Blogger Were-Puppy May 15, 2017 12:05 AM  

@52 robins111
I'm waiting till they make a cyber attack on the systems that fill up the EBT cards... wonder what will happen when a million or so of the show nothing but zeros.
---

The fact that never happens makes me think the govt is in on some of this

Blogger James Dixon May 15, 2017 1:45 PM  

> So how do I go about this?

Allow me to second the recommendation of Linux Mint. Since this sounds like an older laptop, I'd recommend using the XFCE version, as it's somewhat lighter weight than the others.

Download the appropriate version of Linux Mint 18.1 XFCE (32 bit or 64 bit) for your processor (if in doubt, just use the 32 bit version) and either burn a DVD or create a bootable USB drive. Boot from same and follow the prompts, then reboot when it tells you to. Read the FAQ, and if you have any questions check the forums (https://forums.linuxmint.com/) and post there as required.

Post a Comment

Rules of the blog
Please do not comment as "Anonymous". Comments by "Anonymous" will be spammed.

<< Home

Newer Posts Older Posts