Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Just Say No to Microsoft", Tony Bove

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKJSN2MS.RVW 20060823 Just Say No to Microsoft , Tony Bove, 2005, 1-59327-064-X, U$24.95/C$33.95 %A Tony Bove www.tonybove.com %C 555 De Haro Street,
    Message 1 of 1 , Oct 4, 2006
    • 0 Attachment
      BKJSN2MS.RVW 20060823

      "Just Say No to Microsoft", Tony Bove, 2005, 1-59327-064-X,
      %A Tony Bove www.tonybove.com
      %C 555 De Haro Street, Suite 250, San Francisco, CA 94107
      %D 2005
      %G 1-59327-064-X
      %I No Starch Press
      %O U$24.95/C$33.95 415-863-9900 fax 415-863-9950 info@...
      %O http://www.amazon.com/exec/obidos/ASIN/159327064X/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/159327064X/robsladesin03-20
      %O Audience n+ Tech 2 Writing 2 (see revfaq.htm for explanation)
      %P 243 p.
      %T "Just Say No to Microsoft"

      The introduction is fairly opinionated, but buried in the meditation
      is an indication that the book is supposed to be of assistance to
      those who would like to explore alternatives to the Microsoft software
      that dominates desktop computing.

      Part one purports to be about the revolution away from Microsoft.
      Chapter one seems to be a history of Microsoft, and how it came to
      have a near monopoly. While the writing is entertaining, Bove
      recycles some mythical and "almost" accurate tales of Microsoft's
      rise. Security weaknesses are pushed, but mostly in terms of
      anecdotal reports. (The danger of a monoculture is mentioned, but
      given little analysis.) The author appears to be a Mac fan, so it
      isn't surprising that chapter two is a promotional piece about that
      product line, primarily emphasizing the idea that the Mac looks cool.
      (The, rather brief, examination of why machines running MacOS are more
      secure than Microsoft Windows points out the security provisions that
      are present on the Mac, but doesn't stress the fact that the functions
      are all there in Windows but, like any typical Mac system, the
      protection processes normally just aren't used.) The Linux operating
      system (and the general concept of open source software) is outlined
      in chapter four. Interestingly, Bove notes many situations where
      Linux is superior to the Mac, and this chapter is very well written
      and persuasive.

      Part two looks at options for non-Microsoft applications software,
      starting with the ubiquitous Microsoft Word word processor (in chapter
      four). Word security problems are mentioned, although, in the
      discussion of RTF (Rich Text Format) there is no reference to the
      Microsoft-only extensions that have security implications. (Here, and
      in other places in the book, there is an odd insistence upon the
      benefits of using PDF; Adobe's Portable Document Format; despite the
      security problems with it and the lack of application support.)
      Chapter five deals with the other major Microsoft Office programs
      (Excel and PowerPoint). (The deliberation on PowerPoint concentrates
      on the danger of "presentations" in general, rather than faults of the
      software itself.) Most of the review of music and video, in chapter
      six, centres on digital rights management.

      Part three turns to network applications. Chapter seven examines
      email and viruses. Despite some errors (the first email virus spread
      in 1987, not 1999) the advice on attachments, HTML (HyperText Markup
      Language) formatting of email messages, and fraud is very good,
      although it does mean that the suggestions about alternative mailers
      is rather secondary. Some information about LAN options is available
      in chapter eight, but the point of the chapter is not clear. Web
      browser dangers, in chapter nine, points out issues with spyware,
      cookies, and ActiveX.

      The book concludes in part four. Chapter ten, using the twelve step
      addiction recovery program as a model, recommends that you assess what
      you are doing with computers (and what you need), get assistance
      installing and setting up alternative software, and then convert.
      Another opinion piece on Microsoft makes up chapter eleven.

      (An appendix lists some Websites that may provide various forms of
      help, either with alternative software or safer settings of Microsoft

      Although overly verbose and biased at times, this publication does
      provide suggestions and potential resources for those interested in
      pursuing options other than the standard Microsoft programs. These
      alternatives may be examined for reasons of cost or functionality, but
      the primary thrust and argument in the volume seems to be based on
      security considerations. Even for those who are not concerned about
      avoiding dependence upon Microsoft there is good advice on making
      Microsoft products more secure than they are by default. So, whether
      or not you are interested in saying "No" to Microsoft, you will find
      this book useful even if you are merely concerned with the security of
      your machine and applications.

      copyright Robert M. Slade, 2006 BKJSN2MS.RVW 20060823

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      Success is the ability to go from one failure to another with no
      loss of enthusiasm. - Winston Churchill
      Dictionary of Information Security www.syngress.com/catalog/?pid=4150
    Your message has been successfully submitted and would be delivered to recipients shortly.