On 12/08/12 02:46, Alex Schuster wrote:
Hi there!
As some of you may know, I'm a Gentoo user, and I have a KDE which is
quite well configured. But I'm setting up a PC for a lady who has
_very_ limited PC experience. She wants to try Linux, because she
became deprived of e-mail access by her ISP after her account started
to send SPAM due to some Windows malware. She only uses Firefox
(mainly for eBay), a mail client for two mail accounts, an image
viewer, and she needs to import photos from her camera. She also likes
to play two Windows games, Space Cadet (pinball) and some cards game.
So I installed openSUSE (12.2 I think) on her new PC. For the desktop
environment, I chose KDE because it is so configurable. There should
be extra large icons on the desktop for example. I can set the fonts
to a huge size, which works fine mostly - notifications however show
up with text lines merged into another, so the text is not readable.
This happens when I plug in an USB camera, KDE asks if I want to open
it with Dolphin, or if I want to import pictures with Gwenview or
Digikam. Maybe I can tune this so only one entry appears.
Photo import is the main problem: She currently has some Windows
application which allows to import all new images of the camera to a
folder. I would really REALLY like to have this feature, but it does
not seem to be possible.
When the camera is plugged in, I can choose to import images with
Digikam. Works, with a few clicks. But when I do this again, Digikam
wants to import all images again, not only the new ones. It is working
fine as long as I do not close Digikam, but when I open it again, it
will import all images. This make es it basically unusable.
I'm not sure if this also happened when I have Digikam running and
import manually, but this involves more clicks, and is also not what I
want.
Gwenview imports only the new images. Fine, but also with way to many
clicks. The user needs to open folders named 'DCIM' and such, has to
pick the right ones, and the dialog asks him to import 'documents',
not 'pictures' or 'photos'. You might think tis is not a big deal, but
I fear this will make the user keep using the old Windows PC, where
everything works as expected.
Any ideas how I could solve this? Is there any possibility to import
all new images from a camera to a folder? I would not mind scripting
if necessary.
Sorry, I do not know the exact version of KDE, and I do not have the
PC here right now. Maybe this is a bug which is already fixed. I do
not have access to my own PC right now, too, so I cannot simply check
this. So I'm sorry for asking here, but I'm moving, and only have a
Windows laptop with me at the moment.
Another disappointment was KMail, which I gave another try. The
problem was that I did not know the passwords yet, and it (or rather
Akonadi) kept asking for it, I was not even able to delete the
resource because of the dialog which would appear over and over
again. I guess I could have solved this eventually, but then I
decided to simply use Thunderbird instead.
What was great about using KDE was the possibility to configure the
desktop. I removed all window title bar buttons except for the close
button - minimizing an application to the panel would already be too
complicated, don't ask :) A double click on the title bar to maximize
the window is okay, other stuff is too sophisticated. If she wants to
use another application, she simply closes the one she is using. She
is happy with this, and then so be it.
I also disabled features like maximizing windows when they are moved
to the screen borders, or special effects happening when the mouse
enters the screen's corners. While I personally like those features
much, it's great that they are all optional. Thanks for leaving KDE so
much configurable, I guess this would not be possible with Gnome.
Wonko
___________________________________________________
This message is from the kde mailing list.
Account management: https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.
I'd not suggest KDE. Go for Xfce, and I personally give Debian to other
users (although I myself use Gentoo with KDE and with no buttons on the
title bar).
Use Thunderbird; it's much simpler than Outlook or it's variants.
For a simple user, he/she doesn't require customization; so Xfce should
be good. Unlike KDE, it's reliable, stable, bug free, faster but very
simple.
If you want I can upload the Debain (testing or Wheezy, which's about to
freeze) squashfs image complete with a 'my computer' location (custom
build). I also have a KDE variant of the same, which I absolutely not
recommend for this lady.
As of ensuring the user to use the GNU system, induce fear in her of
potential threats of using Windows. Show her some penis enlargement SPAM
and tell her all this must be going from her mailbox to her contacts;
but they wont respond cause they're shy.
Try these --
http://www.zdnet.com/blog/security/report-48-of-22-million-scanned-computers-infected-with-malware/5365
http://press.pandasecurity.com/news/in-january-50-percent-of-computers-worldwide-were-infected-with-some-type-of-computer-threat/
http://articles.timesofindia.indiatimes.com/2011-12-15/security/30520126_1_usb-malware-sophos
http://blog.trendmicro.com/1h-2009-malware-threat-grows-ever-larger
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.ic3.gov/media/2012/120508.aspx
http://www.techspot.com/news/47420-microsofts-indian-online-store-hacked-passwords-and-user-data-exposed.html
http://www.theinquirer.net/inquirer/news/1046798/microsoft-press-gang-attacked-by-outlaws
http://www.theregister.co.uk/2004/05/25/ms_uk_defaced/
http://news.softpedia.com/news/Microsoft-Got-Hacked-58708.shtml
http://nakedsecurity.sophos.com/2012/04/27/microsoft-rushes-out-fix-after-hackers-change-passwords-to-hack-hotmail-accounts/
http://www.internetnews.com/bus-news/article.php/387501/Brazilian+Microsoft+Web+Site+Hacked.htm
http://www.pcworld.com/article/33341/hackers_attack_microsofts_network.html
http://uptime.netcraft.com/up/graph?site=www.bing.com
http://www.crn.com/news/applications-os/18839747/microsoft-uses-linux-to-publish-its-own-web-site.htm
http://googleonlinesecurity.blogspot.in/2007/06/web-server-software-and-malware.html
{
http://articles.timesofindia.indiatimes.com/2011-09-27/pakistan/30207691_1_hacker-website-defaced
http://www.ndtv.com/article/world/pakistan-supreme-court-s-website-hacked-56148
http://uptime.netcraft.com/up/graph?site=www.supremecourt.gov.pk
Hacked twice when running IIS.
}
http://en.wikipedia.org/wiki/Code_Red_%28computer_worm%29
http://en.wikipedia.org/wiki/Nimda
http://www.pcworld.com/businesscenter/article/224471/windows_servers_hacked_at_the_hartford_insurance_company.html
http://www.fbi.gov/scams-safety/e-scams
http://thomas.loc.gov/cgi-bin/query/z?c112:S.372.IS:
http://www.theregister.co.uk/2010/02/05/terror_cybercrime
http://en.wikipedia.org/wiki/July_2009_cyber_attacks
http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf
http://www.ic3.gov/media/2009/091103-1.aspx
{
http://en.wikipedia.org/wiki/Storm_Worm
http://www.ic3.gov/media/2008/080211.aspx}
http://www.theregister.co.uk/2012/06/22/trojan_spews_gibberish_print_runs/
http://en.wikipedia.org/wiki/Chaos_Computer_Club#History
http://www.computerworld.com/s/article/9218645/SpyEye_Trojan_defeating_online_banking_defenses
http://en.wikipedia.org/wiki/Stuxnet
http://en.wikipedia.org/wiki/Flame_%28malware%29
http://news.cnet.com/8301-1009_3-57450292-83/shared-code-indicates-flame-stuxnet-creators-worked-together/
http://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html
http://en.wikipedia.org/wiki/Duqu#Microsoft%20Word%20zero-day%20exploit
http://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq
http://www.msnbc.msn.com/id/38790670/ns/technology_and_science-security/t/malware-implicated-fatal-spanair-plane-crash/
{http://www.nytimes.com/2010/07/24/us/24hearings.html?pagewanted=all
It was serviced by Microsoft Infosys
http://www.infosys.com/newsroom/press-releases/Pages/oil-gas-major-adam.aspx
http://www.ibtimes.co.in/articles/41196/20100806/.htm
http://www.nola.com/news/gulf-oil-spill/index.ssf/2010/08/oil_spill_hearings_transocean_1.html
"Winslow said he tried several times to use re"}
http://en.wikipedia.org/wiki/Flame_%28malware%29 (since 2007, detected
in 2012)
http://en.wikipedia.org/wiki/DNSChanger
http://www.eweek.com/c/a/Security/Kasperskys-Download-Site-Hacked-Directs-Users-to-Fake-AntiVirus-336193
http://www.ebizid.com/domain.cgi?domainName=norton.com&SUBMIT=SUBMIT
http://uptime.netcraft.com/up/graph?site=www.mcafee.com
http://uptime.netcraft.com/up/graph?site=www.bitdefender.com
http://uptime.netcraft.com/up/graph?site=www.pandasecurity.com
{http://uptime.netcraft.com/up/graph?site=www.avsoft.net
http://www.pcworld.com/article/142318/hacked_antivirus_site_delivers_a_virus.html}
http://www.eweek.com/c/a/Security/Rutkowska-AntiVirus-Software-Is-Ineffective
http://en.wikipedia.org/wiki/Antivirus_software#Signature-based%20detection
{Polymorphic virus --
http://www.securelist.com/en/analysis/204792122/Review_of_the_Virus_Win32_Virut_ce_Malware_Sample
Virus makes themselves use antivirus --
http://blog.k7computing.com/2012/01/malware-authors-and-multiple-scanners}
http://www.emirates247.com/eb247/companies-markets/technology/rise-in-malware-variants-make-antivirus-solutions-insufficient-2009-11-19-1.20838
http://www.cbc.ca/news/technology/story/2012/05/30/f-flame-virus-detection.html
http://www.pcmag.com/article2/0,2817,1879939,00.asp
http://www.mcafee.com/us/downloads/free-tools/getsusp.aspx
https://blogs.mcafee.com/consumer/family-safety/mcafee-releases-results-of-global-unprotected-rates
http://en.wikipedia.org/wiki/List_of_rogue_security_software
http://googleonlinesecurity.blogspot.in/2010/04/rise-of-fake-anti-virus.html
http://en.wikipedia.org/wiki/Netsky_%28computer_worm%29 -- 18 year old
boy did this.
{http://en.wikipedia.org/wiki/Stration
http://books.google.co.in/books?id=H2AEAAAAMBAJ&pg=PA10&lpg=PA10&dq=%22Stration%22+undetectable&source=bl&ots=-a1Fo4_QTU&sig=z3vFNBNiQTo17XWik9astg_MJNc&hl=en&redir_esc=y#v=onepage&q=%22Stration%22%20undetectable&f=false}
http://en.wikipedia.org/wiki/Zeus_%28trojan_horse%29
https://spyeyetracker.abuse.ch/
http://en.wikipedia.org/wiki/Shamoon
http://en.wikipedia.org/wiki/Stars_virus
http://www.fbi.gov/news/stories/2011/november/malware_110911
http://www.theverge.com/2012/2/7/2783575/symantec-source-code-stolen-the-extortion-investigation-and-release
http://www.computerworld.com.au/article/383261/microsoft_loss_over_event_viewer_scam/?ref=suggest_headline
http://www.kaspersky.com/about/news/virus/2012/Number_of_the_Week_24_of_Users_Have_Encountered_Fake_Antivirus_Software
http://en.wikipedia.org/wiki/Botnet#Historical%20list%20of%20botnets
{http://spamwars.com/stats.html
https://www.trustwave.com/support/labs/spam_statistics.asp
https://docs.google.com/viewer?a=v&q=cache:TW3ptIA-0tgJ:www.radicati.com/wp/wp-content/uploads/2009/05/email-stats-report-exec-summary.pdf+&hl=en&pid=bl&srcid=ADGEESg73kUq73kpSb6XwqRysBmg8pIpxDlDPUmeOaW2e_ZZitGcaORzyNo7XWHV_kuHFoUzDQnJUE-z_CERxhrx3ueZDpc9MjL8Ul7fthQWJu58FUCXFQgial7DhwimD-fkkjAsN0ba&sig=AHIEtbRnzC4foF2QnlwJ_SRh0i1MIbHD-A}
http://www.symantec.com/security_response/definitions.jsp
http://en.wikipedia.org/wiki/Operation_Aurora
{http://www.nytimes.com/2012/04/24/world/middleeast/iranian-oil-sites-go-offline-amid-cyberattack.html
http://bits.blogs.nytimes.com/2012/05/28/new-computer-virus-looks-like-a-cyberweapon/}
http://en.wikipedia.org/wiki/Mydoom
{http://news.bbc.co.uk/2/hi/business/3682537.stm
http://en.wikipedia.org/wiki/Sasser_%28computer_worm%29} -- 18 year old
boy did this.
http://en.wikipedia.org/wiki/Michelangelo_%28virus%29
{http://www.theregister.co.uk/2012/01/12/drone_consoles_linux_switch/
http://mobile.informationweek.com/122360/show/4594d5d819bf3ee5ba8593894c0b205f&t=b794qjg6c4cr0r7md5sr31blg7}
http://www.wired.com/wiredenterprise/2011/09/microsoft-anti-malware-tool-mistakenly-snuffs-google-chrome/
http://www.theregister.co.uk/2010/02/02/anti_virus_false_positive_analysis/print.html
http://usa.kaspersky.com/partners/white-list-program
http://www.pcworld.com/article/197410/microsoft_official_admits_to_quiet_security_patching.html
http://blogs.computerworld.com/14687/microsofts_latest_linux_lies
http://blogs.computerworld.com/london_stock_exchange_to_abandon_failed_windows_platform
{http://www.novell.com/news/press/archive/2001/10/pr01093.html
http://www-304.ibm.com/partnerworld/wps/pub/overview/OEA00}
http://www.reuters.com/article/2010/08/23/urnidgns852573c40069388000257788005d060f-idUS57796183520100823
Tell her her hacked Windows computers can be used to do illegal tasks
like participating in attacks, hacking people's computers, sending SPAM.
She could be framed for a crime she didn't commit; e.g. a terrorist can
send mails from her PC to government officials making them believe she
send it.
And anti-viruses don't work (check the above links for all this.).
___________________________________________________
This message is from the kde mailing list.
Account management: https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.