Mercury Rising 鳯女

Politics, life, and other things that matter

Patch, patch, patch that POS

Posted by Charles II on April 10, 2009

Ryan Naraine, ZDNet:

Microsoft plans to ship 8 security bulletins next Tuesday (April 14, 2009) to fix remote code execution and denial of service vulnerabilities affecting Windows, Office and Internet Explorer.

According to the company’s Patch Tuesday advance notice, five of the bulletins will be rated “critical,” meaning they can be exploited by hackers to take complete control of Windows machines.

Sorry about the grouchy headline. I have spent an evening and a morning on software issues and am at the point of endorsing Soviet-style solutions to the wreckers and kulaks who write software.

2 Responses to “Patch, patch, patch that POS”

  1. jo6pac said

    Yep, 2 months ago I recieved some malware from ? It took Norton tech 2hrs to get it out. The comment was they had never seen anything like it. Norton did stop it from spreading but couldn’t remove it. When they update my Norton they installed free until the next update the top of the line. It’s not fun. Good Luck.

  2. Charles II said

    Thanks, Jo, but I didn’t have malware. I had software issues, which means endless fixes, lousy instructions, crummy internet service, and occasional crashes.

    My anti-malware advised me to get certain patches. After following a very confusing set of instructions, I found that (a) some of the patches were to old versions of Java, which hadn’t been uninstalled at update, (b) one patch was to an AOL variant of a program that probably can’t be patched, (c) I couldn’t get online (possibly due to lousy ISP service, but also possibly due to interference from the anti-malware). All of this took about ten times longer than it should have because (d) the anti-malware doesn’t save the list of recommended patches– you have to re-generate them if you close the window, (e)the anti-malware report kept locking up, possibly because it generates a log file too large for memory, and (f) one of the main protections is using an account that doesn’t have software installation permissions, so when you’re updating, you have to switch to the other account; but if you walk away while it’s scanning, it requires you to log back in and occasionally one makes a mistake and logs into the non-permitted account.

    Basically, all of this wasted effort is caused by crappy software.

Sorry, the comment form is closed at this time.

%d bloggers like this: