× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Al,

Didn't have time to check the link...  But SURE enjoyed your lampoon of
it...!  ROFLMAO...  Whew...!

Honestly, though.. I don't see how it qualifies as "Microsoft bashing"...

Unfortunately, not at all.

jt


| -----Original Message-----
| MacWheel99@aol.com
| Sent: Friday, December 21, 2001 11:53 AM
|
| As I read through the detail behind this security guidance, I
| could not help
| indulge in some Microsoft bashing.
|
| Law # 1 about not running programs on your computer from an
| untrusted source
| & I am thinking that for most of us that source is Microsoft.
|
| Law # 2 about letting someone else alter the OS of your computer
| ... who do
| we know to trust to do this?  Every vendor with software to sell
| us when it
| is to a Microsoft operating system.
|
| Law # 3 if a bad buy has unrestricted access to your computer,
| its not your
| computer anymore.  Tell me again about this NET thing that will
| look after MY
| DATA and let me have access only for a price.
|



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.