| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Linux = 30% of PRC desktops? |
From: "Rich Gauszka"
"Adam" wrote in message
news:43a03add{at}w3.nls.net...
> Blimey
> http://www.eweek.com/article2/0,1759,1900214,00.asp?kc=EWRSS03129TX1K0000616
>
> "China's government promotes and supports desktop Linux very strongly. So
> they hope that … Well, as you know, piracy in China has been very
> significant. So the government hopes that Linux—legal software such as
> Linux—can replace all this piracy.
>
> And from the end of last year, the central government asked the provincial
> governments and the city governments to buy legal software to replace all
> of the previously illegal software.
>
> These governments—city and provincial—compared the performance,
> capabilities and price of desktop Linux and Windows and they considered
> whether they could migrate all their applications from Windows to Linux.
> So finally about 30 percent of desktops in China now use Linux. Microsoft
> has about 60 percent. We have about 30 percent. So we are the second
> winner in this program. "
>
>
> Adam
Probably makes it easier for the Chinese military hackers also. Those wild
and crazy coders in Guandong
http://www.dailytimes.com.pk/default.asp?page=2005%5C12%5C14%5Cstory_14-12-2005
_pg7_14
WASHINGTON: A systematic effort by hackers to penetrate US government and
industry computer networks stems most likely from the Chinese military,
said the head of a leading security institute on Monday.
The attacks have been traced to the Chinese province of Guangdong, and the
techniques used make it appear unlikely to come from any other source than
the military, said Alan Paller, the director of the SANS Institute, an
education and research organisation focusing on cybersecurity.
“These attacks come from someone with intense discipline. No other
organization could do this if they were not a military organisation,” said
Paller in a conference call. In the attacks, he said, the perpetrators
“were in and out with no keystroke errors and left no fingerprints, and
created a backdoor in less than 30 minutes. How can this be done by anyone
other than a military organisation?”
Paller said that despite what appears to be a systematic effort to target
government agencies and defence contractors, defences have remained weak in
many areas. “We know about major penetrations of defence contractors,” he
said. Moreover, he said the US government strategy appears to be to
downplay the attacks, which has not helped the situation. “We have a
problem that our computer networks have been terribly and deeply penetrated
throughout the United States and we’ve been keeping it secret,” he added.
“The people who benefit from keeping it secret are the attackers.” afp
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.