>>47
He he, microsoft consultant is getting mad. Consultants don't do that, you know.
The world isn't computers, you know.
The world is anything and everything for the people who work on and for it.
What do you know about disciplines outside of your world of electrons?
What do you know about disciplines inside of my world of electrons?
Do you know how to design bridges? etcetera
No, because that's not my speciality, but I do know one thing: you don't do it with treacherous computing or MSIE.
Most people are not computer wizards.
People using my custom built and configured computers aren't computer wizards either, and by following my advice and using my configuration they aren't having problems, and OMG, they're using untrusted computing!
They often make mistakes (as do people like you).
I make mistakes. I fix my mistakes. Then I proceed to fix mistakes made by lusers which take up a good part of my time :P . And treacherous computing is a mistake.
As a result there are major problems, like viruses.
Getting a virus, maybe. But viruses don't exist because they are a "mistake". They're some way of "natural selection" for computer users which I do not approve.
The IT dept administers their machines for them anyway.
And can you tell me how will the people who knows do their fucking job if they can't do anything? How will a mechanic fix his car if he has to get bill gates and sony music's approval (as if they were any trusted authority) for every fucking screw he wants to touch?
You seem to think that if TC is enabled on some machines in a corp environment, then zOMG IT'S ENABLED ON ALL OF THEM SHIT THE MAN IS TAKING OVER!!1!
You can't disable treacherous computing, moron. The second they're out, they'll want everything to be under their hand. There won't be something like a "non-TC computer", just like there's nothing like a "non-DRM windows mierda player". Mierda is Spanish for shit.
You're a kid.
Not that young I'm afraid, but I wish I were, to have more time to write against treacherous computing and dismantle the arguments of "professional business consultants", "security experts", and "information technologies lawyers" like you.
>>51
Do you want maximum security? Throw your computer out of your window and start using industry standard paper. Talk about trusted computing. No viruses, no kewl screensavers Bill Clinton emailed you to your Hotmail account, no data loss. That's just one step forwards from treacherous computing.
>>49
Statement of truth.
>>52
Statement of truth.
So the bottom line is, treacherous computing sucks hairy, greasy king kong balls, end of the story.