J
jimmuh
A-cotton-pickin'-men! (Amen, with feeling) I'm a systems admin and
productions application support specialist for a large printing firm. I have
been threatening the people who vend bindery production software with a
Louisville Slugger for YEARS. The idiots keep on storing any damned thing
they want any damned where they want and then try to blame Microsoft (or me,
if they don't value their lives) when their CRAPware fails because I make
the end users live with restricted user permissions.
I'm so tired of waging this little war that I'm about to throw in the
towell. I should just give everyone local admin and let 'em have at it so
that management could see how long their network will last under the
circumstances the software vendors are trying to create. Heh. The only two
malware detections we ever had on this network came from the vendors
technical field reps sticking infected CDs written on their notebook's
burners into machines on the network. We weren't infected, but we were
notified. Of course the same morons also tried plugging their notebooks INTO
THE NETWORK WITHOUT PERMISSION after they were notified that their CDs were
infected.
These same geniuses write their software from such a perversely
self-centered point of view that it often simply disables other important
software or system functions. They seem to think that any computer on which
their junkware is installed must be devoted SOLELY to running the junkware.
They seem genuinely puzzled when anyone takes exception to that point of
view.
All I can say to Microsoft, regarding UAC and the better (but not yet
perfect) security model in Vista -- it's about time! Now, if you'd just grow
a pair and turn off the ability to disable UAC...
productions application support specialist for a large printing firm. I have
been threatening the people who vend bindery production software with a
Louisville Slugger for YEARS. The idiots keep on storing any damned thing
they want any damned where they want and then try to blame Microsoft (or me,
if they don't value their lives) when their CRAPware fails because I make
the end users live with restricted user permissions.
I'm so tired of waging this little war that I'm about to throw in the
towell. I should just give everyone local admin and let 'em have at it so
that management could see how long their network will last under the
circumstances the software vendors are trying to create. Heh. The only two
malware detections we ever had on this network came from the vendors
technical field reps sticking infected CDs written on their notebook's
burners into machines on the network. We weren't infected, but we were
notified. Of course the same morons also tried plugging their notebooks INTO
THE NETWORK WITHOUT PERMISSION after they were notified that their CDs were
infected.
These same geniuses write their software from such a perversely
self-centered point of view that it often simply disables other important
software or system functions. They seem to think that any computer on which
their junkware is installed must be devoted SOLELY to running the junkware.
They seem genuinely puzzled when anyone takes exception to that point of
view.
All I can say to Microsoft, regarding UAC and the better (but not yet
perfect) security model in Vista -- it's about time! Now, if you'd just grow
a pair and turn off the ability to disable UAC...