Shoppa, Tim wrote:
Lots of Windows installations have a zillion spyware
things running that interfere
greatly with downloading the PDF after you find it. Sometimes these things
make you believe that they're actually toolbars, but they aren't. Usually the
download accelerators fall in this category too... launching 50 simultaneous
download sessions to fetch a 3 page datasheet is usually a big loss.
I use a combination of DownThemAll and the Download Statusbar plugins
for Firefox. DTA is great for grabbing a page full of linked files (I've
seen instances where people have scanned >100-page manuals to PDF as
individual pages... makes it a bit of a pain to get the whole document).
It's also terrific for big files -- it supports resuming downloads and
multipart downloading ("download acceleration"). I usually leave
multipart turned off (it has basically no effect on ADSL), but the
resume feature is terrific. Especially when your DSL connection decides
to drop out 99.5% through downloading a Linux ISO...
The Download Statusbar plugin gets rid of the blasted download window
(and its annoying habit of stopping all your downloads when you close
it) and moves it to the status bar. This tends to be better for small
files (<20MB usually).
I know that I'm being OS-ist when I talk about
Windows like that, but really
it's the unknowing users getting sucked into thinking "another toolbar? Hey,
I want that!" and "another download accelerator? Hey, I want that!" that
are at fault.
I don't think it's *that* much of a generalisation.
My mother and brother are incessant link-clickers. If it says "free
stuff, click here, just keep clicking 'OK' when it gives you a security
warning, this isn't a virus, honest!", they'll click the link. Net
result being that the machine ends up turning into a virus-infested
slush pile by the end of the day it was set up.
I had to re-image my brother's XP machine six times in a week on one
occasion. On the 6th occasion I imaged the machine and gave him a
recovery DVD. "This will obliterate everything on your C drive, make
sure anything important is backed up onto the fileserver." He ignored
the warning, but that's another thing. It's not been as bad since he
installed Windows 7, but I still have a recovery image on standby.
My mother has gotten the hint that clicking random links will f00k a PC
very quickly. I'm reasonably convinced that letting her loose on an XP
machine isn't a Really Bad Idea. In any case, when she bought her new
laptop (one of the Asus 1008HA netbooks), I gave her an Ubuntu Live CD
to play with. She loves it -- to the point where a week later she asked
me to install it on the hard drive.
She still uses XP for a few things that don't work on Linux (notably
web-based training and seminars) but >90% of the time she's using
Ubuntu. Haven't had to do a reinstall in nearly a year, and she's only
installing software from the main, well-known repositories (I think I
turned multiverse on, then set up medibuntu).
When you see a web browser and literally 75% of the
screen
is taken up by toolbars and download accelerators that really are actually
all spyware, something is seriously out of whack, but I'd estimate that probably
90% of Windows PC's that are not vigilantly patrolled end up that way.
90% of the problem is the users.. even if they're told "don't click
things like that", they will. IIRC it's called the "dancing bunnies
problem" (also known as the "dancing pigs problem" or "dancing bears
problem", depending on who you ask).
Basically, many computer users, when presented with a button that says
"click here to see the dancing bunnies", will click said button and
dismiss any security alerts keeping them away from said bunnies.
Move users onto Linux or OSX and the viruses stop working :)
It probably helps that most Linux/OSX devs have better things to be
doing than writing malware. The small market share relative to Windows
is probably a factor, too. Go for the big, insecure target, or the
little one that's armoured at least as well as Fort Knox? I know which
one I'd pick... :)
(Wasn't it OpenBSD who started harping on about there being "no security
holes in the base install since $DATE", then having a huge kernel bug
found a couple of weeks later? I think I'd counter with "but what can
you do with the base install, anyway?" :-) )
--
Phil.
classiccmp at philpem.me.uk
http://www.philpem.me.uk/