By
Debra Ricketts and Claire Wolfe
Originally
published by Sierra Times
A
terrible addiction grips the world. It invades the most
respectable middle-class homes and offices. It causes
untold havoc. Yet, in this era when enlightened people
understand that even coffee drinking ("caffeine use disorder")
can be a serious disability, this addiction goes unrecognized
and untreated.
We
speak of Microsoft addiction -- a dependency that costs
its victims billions, first to buy the products to feed
their habits, then in damage done by opportunistic viruses
that prey on MS-weakened systems.
What
is Microsoft addiction? It is hopeless dependence on a
computer operating system that is more insecure than a
junkie in a room full of narcs and more expensive than
a hit of heroin. In the end, this addiction strips its
users of all privacy and independence. This operating
system is controlled by a ruthless multinational software
cartel. Once you're caught in their .net like a drowning
dolphin, Microsoft pushers know they can hook you on even
more expensive software. Soon, you're mainlining the hard
stuff … stuff like the infamous M$ Office XP -- a program
that not only costs more than XTC or cocaine, but reports
your activities to your pusher, and demands that you get
permission to "reactivate" the software simply because
you dare to make changes in your system.
The
M$ message: We own your computer. We own you. And your
little dog, too.
Until
now, the future has looked bleak for the ordinary victim
hooked on Microsoft. But today, thousands are breaking
free -- and so can you! -- thanks to the 12-step program
of Microsoft Anonymous.
Follow
these steps and, though you may never be fully cured of
Microsoft addiction, you will walk the road of recovery.
The
12 Steps to Microsoft Recovery
1.
We admitted we were powerless over Microsoft -- that our
privacy had become negligible.
Microsoft's
licensing agreements let the software cartel bust into
your computer at any time. Microsoft lets its friends
in, too. Privacy groups have found hidden
keys within Windows -- including one which may
be for the exclusive use of the National Security Agency
(NSA).
What
Bill Gates doesn't do to you, some script
kiddie will. There are more holes in Microsoft software
than in a heroin addict's clammy gray flesh. Worms and
viruses ooze through them like HIV through a dirty needle.
2.
We came to believe that a different operating system could
restore us to sanity.
Linux
(especially the easy-to-install Mandrake
8.1 or Red
Hat 7.2) can lift even the most hopeless Microsoft-head
into a world of privacy and stability -- and do it right
on the same PC that now shares your Microsoft habit with
you.
Free
your mind and body. Free your finances, too. Linux costs
way less than your next hit of Windows. Some versions
don't cost a thing.
3.
We made a decision to turn our computer systems over to
Tux
as we understood him.
At
first, we considered learning Urdu in order to read some
of the manuals, but then decided to trust our instincts
and that friendly Linux penguin.
Graphical
"desktops" like KDE
and Gnome, which come
with Linux, comforted us with familiar point-and-click,
drag-and-drop, pop-up menus, and other things to help
us on our road to recovery. They even gave us "Redmond-style"
graphical themes, helping us break our Windows habit like
Antabuse helps a wavering alcoholic.
4.
We made a searching and fearless inventory of our applications
and data files.
We
understood that recovering from our Microsoft addiction
might mean reformatting some of our data, surrendering
familiar programs, and finding Linux equivalents. Fortunately,
many distributions (brands) of Linux come with full office
suites, Web browsers, e-mail programs, and everything
we needed to get us going -- all at no extra cost. Even
the most vital applications of all -- games.
Many
Linux applications, like StarOffice,
can convert and share data freely with their M$ equivalents.
(Bill Gates, watch us break your hold even while those
with whom we share data remain hooked!)
5.
We admitted to tech support, to ourselves, and to another
Linux newbie the exact nature of our misgivings.
Before
buying, we visited Linux
Newbie.org and LinuxChix.org.
We asked questions on their listservs about the Linux
distributions other newcomers have tried and the pitfalls
they'd encountered. Others in Microsoft recovery gave
generously of their time and advice.
We
asked experienced Linux gurus, too. But they mostly said
things like "grep" and "tar -xvjf." We feared that "bunzip2"
might be something dangerously kinky. We turned away when
they asked about our boot sector partitions. (Some people
just don't know when they're undermining the recovery
process).
6.
We were entirely ready to have Linux remove all those
cookies, GUIDs, and trojan horses from our systems.
We
prepared carefully for our first installation, had a good
backup of our existing Windows system, and made sure that
all our hardware was Linux
compatible. We accepted that it wasn't always going
to be easy, but that in the end it was going to free us
from Microserfdom.
7.
We humbly installed the operating system.
It
turned out to be easier than we thought. Many Linux distributors
now beckon weary Windows users with easy installation
wizards and automatic hardware recognition -- the very
temptations that first drove many of us into the clutches
of Microsoft.
But
some of us still chickened out and bought
a computer with Linux already installed.
8.
We made a list of all the software we used and became
willing to use alternatives.
Some
of us decided we needed a dual-boot system, with both
Linux and Windows on it, because critical software was
available only under Windows. But we resisted remaining
Windows dependent.
We
used Linux for a task any time we possibly could. The
more we used Linux, the easier it became. The more we
used Windows … well, when you find yourself insisting,
"I can turn off Windows any time I want. Really I can"
… you should be worried. Be very, very worried.
9.
We downloaded alternative software where possible, but
never a Microsoft product.
Linux
isn't just for techies any more. But now that IBM, Hewlett-Packard,
the NSA, and yes, even Microsoft, are getting on the Linux
wagon, beware. We continue to avoid products from companies
with a history of snooping into our computers and our
e-mail.
When
we became truly advanced in our paranoia, we even downloaded
Tinfoil Hat
Linux.
10.
We continued to take personal inventory and when we were
leaving security holes, promptly repaired them.
Linux,
being open
source, can be examined by any software engineer to
make sure it has no hidden security holes -- unlike Microsoft,
whose owners hide its code like Columbian drug traffickers
hide their profits in Cayman Island banks.
Linux
is harder for crackers to target. And if you're worried
about another sort of cracker -- the government or corporate
kind -- think about this. Those "key loggers" or keystroke
monitoring programs? Virtually every one of them works
only with Windows -- and against Windows users.
Still,
we diligently research before installing upgrades, and
we regularly read electronic
privacy e-mail alerts.
11.
We sought through user groups, books, whitepapers, and
HOWTOS to improve our conscious knowledge of Linux, searching
only for understanding and the power to improve data security,
system stability, and personal freedom.
We
told ourselves, "Even if the manual is written in an obscure
French-Ecuadorian dialect of Swahili, it's worth the effort."
Increasingly,
Web sites, books, and manuals for new users led us along
our way. Listservs dedicated to our chosen distributions
offered answers to our questions. We persevered, helped
by those who'd gone before.
12.
Having had a computational awakening as the result of
these steps, we tried to carry this message to Window
users and to practice these principles in all our affairs.
And
that's what we're doing right now.
Sometimes,
you have to hit bottom before you're ready for recovery.
Remember us the next time your screen turns that funny
blue color, and pressing CTRL-ALT-DEL for an hour only
gives you blisters on your fingers. Remember us next time
your data ends up in an FBI dossier. Remember us next
time some 13-year-old called H@ckWit infects your Microsoft
Outlook with a virus that converts your hard drive into
strawberry Jell-o.
You
will be among friends at Microsoft Anonymous.
-----
©
2002 by Debra Ricketts and Claire Wolfe (with a little
help from Authentic Linux Guru, Charles Curley). Feel
free to copy and circulate, as long as full credit and
copyright information are attached and no changes are
made to the text.