[Ubuntu-US-CA] Ubuntu Tri-Fold Source Files

Jack Deslippe jdeslip at gmail.com
Sun Mar 28 23:51:59 UTC 2010

Thanks for comments everyone - I also got a lot of comments from the folks
at the jam.

I intended to update the screenshots and marketing to fit with lucid today (
as Nathan suggested ) but got side tracked by other goings-on.  I'll send a
new draft out in a couple days.  Ill remove snes9x as well and fix the
numerous typos.


On Mar 28, 2010 2:40 PM, "Aaditya Bhatia" <aaditya at dragonsblaze.com> wrote:

On Sun, Mar 28, 2010 at 1:58 PM, Nathan Haines <nhaines at ubuntu.com> wrote:
> On 03/28/2010 01:20 PM,...
Clarifying what I said earlier, OSes obviously don't execute the files on
sight, but sometimes they do access portions of them in easily
exploitable ways, resulting in execution of an embedded exploit. For
example, downloading an infected executable file and navigating to it
in Windows Explorer used to be enough for the viruses to propagate on
XP. Vista addressed that by prompting the user before executing
something with admin privileges etc. I'm not aware of the details of
how viruses work, but there should be something on these lines that we
can publish without falsely implicating others. Anything like "You
don't need an virus-scanner in Linux because..." should work. I agree
that whatever we publish must be accurate.


Ubuntu-us-ca mailing list
Ubuntu-us-ca at lists.ubuntu.com
Modify settings or unsubscribe at: https...
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-us-ca/attachments/20100328/53e5651f/attachment.html>

More information about the Ubuntu-us-ca mailing list