Language Selection

English French German Italian Portuguese Spanish

There Is NO Neo-Con Conspiracy

Filed under
Humor

There is no conspiracy. The Neo-Conservative Wing of the Republican Party, the Brainwashing Wing of the FOX Network, and the Evil Wing of Microsoft [1] have not formed an alliance to achieve world domination. There is no dark, sinister plot by our media overlords to brainwash the American public. These rumors are simply not true.

Well, actually, they might be. We have, indeed, received evidence of a massive GOP-FOX-MSFT trifecta. But we don't want our media overlords to read the rest of this story. Thankfully, the average Neo-Con only skims headlines and soundbites, while ignoring anything of substance. With our bogus headline and introduction, the coast should now be clear to reveal Microsoft Conspiracy Theory 2.59e17, the most diabolic conspiracy theory in the history of diabolical conspiracy theories.

An anonymous source, code-named "Deep Cache" (not his real code name), arranged a clandestine meeting with this reporter at a location known only as "The Android's Dungeon" (not its real code name). While sucking on a cigarette and hiding in the shadows, Deep Cache revealed the conspiracy.

"Neo-Conservatives and Microsoft have united to pursue their ghastly agenda," he said. "It's a perfect match. With some help from the media, the group has found the perfect recipe for world domination."

I was very skeptical at first. After all, Microsoft conspiracy theories are a dime a dozen. Humorix has used them as filler material for almost 7 years. What I needed was proof.

After seeing my negative reaction, Deep Cache thrashed wildly and shouted, "Do I have to thunk it for you? It's as plain as the tracks on your drive, dudette. Microsoft has always wanted to control the world. The Neo-Cons have always wanted to really, really control the world. They share the same agenda! Can't you see? The era of Plug-and-Play Politics is upon us! They must be stopped! Do you want this country to end up as the world's biggest buffer overflow?"

"Uh... no," I said, hoping to avoid another thrashing episode.

"Come on, now -- don't tell me you can't see the parallels in their processes. It's so obvious! Do I have to draw you a picture? OK, fine, I will!"

At this point Deep Cache made a sketch showing the similarities between Microsoft and the Neo-Conservative Movement. It looked something like this:

Full Story.

More in Tux Machines

GNOME 3.25.3 Released, GTK Development

  • GNOME 3.25.3 Now Available
    GNOME 3.25.3 is now available as the latest stepping stone towards September's release of GNOME 3.26.
  • GNOME 3.26 Desktop Environment Development Continues, New Milestone Is Out Now
    Matthias Clasen has informed the community via an email announcement that the third milestone of the upcoming GNOME 3.26 desktop environment is now ready for public testing. After a one day delay, GNOME 3.25.3 is now available, and it's the third development release of the upcoming GNOME 3.26 desktop environment that could be used by default in popular GNU/Linux distributions, such as the Ubuntu 17.10 (Artful Aardvark) or Fedora 27, both due for release later this year. It brings a bunch of updates and new features to several of its components and apps.
  • Eight years since first release and still no usable theme?
    Well, let me be frank. Ever since gtk-3.0 I've been skeptical of it, especially of the theming aspect. In gtk-2 we had (and still have) many themes ranging from trash to excellent, almost every kind of taste could have been satisfied. Not so in gtk-3. First issue is constant changes to theming API, meaning that despite there being hundreds of themes, only handful of them actually work right :( And among them, I still have yet to find one that would work on my fairly usual 15,6″ laptop screen with 1366×768 px resolution. Basicaly I have two issues.

Microsoft Dirty Tricks and Entryism

Security: Windows Causes Chaos, Routers With Back Doors, Patching of UNIX/Linux

  • Traffic lights in Australia hit by WannaCry ransomware [Ed: Well, who uses Microsoft Windows to manage traffic?!?!]

    Radio station 3aw reports that dozens of pole based traffic calming measures are infected and that this came as a surprise to the local minister and Road Safety Camera Commissioner when radio reporters told him about it.

  • Honda shuts down factory after finding NSA-derived Wcry in its networks
    The WCry ransomware worm has struck again, this time prompting Honda Company to halt production in one of its Japan-based factories after finding infections in a broad swath of its computer networks, according to media reports. The automaker shut down its Sayama plant northwest of Tokyo on Monday after finding that WCry had affected networks across Japan, North America, Europe, China, and other regions, Reuters reported Wednesday. Discovery of the infection came on Sunday, more than five weeks after the onset of the NSA-derived ransomware worm, which struck an estimated 727,000 computers in 90 countries. The mass outbreak was quickly contained through a major stroke of good luck. A security researcher largely acting out of curiosity registered a mysterious domain name contained in the WCry code that acted as a global kill switch that immediately halted the self-replicating attack.
  • GhostHook: CyberArk finds new way to attack Windows 10

    Researchers at CyberArk Labs have discovered a new way of gaining access to the innards of Windows 10 64-bit systems that can bypass existing safeguards, including the kernel patch protection known as PatchGuard that Microsoft developed to improve system security.

  • John McAfee claims 'every router in America has been compromised' by hackers and spies

    Technology pioneer John McAfee believes that every home internet router in America is wide open to cyberattacks by criminal hackers and intelligence agencies. He makes the claim speaking after revelations from WikiLeaks that the Central Intelligence Agency (CIA) targets the devices.

  • 'Stack Clash' Smashed Security Fix in Linux
    What's old is new again: an exploit protection mechanism for a known flaw in the Linux kernel has fallen to a new attack targeting an old problem.
  • Continuous defence against open source exploits
    Register for next month's expo for the public sector DevOps community to hear key speakers from the front line of public sector digital transformation and see the latest technologies at first hand. Andrew Martin, DevOps lead in a major government department, has been added to the line-up of speakers to talk about the importance of getting the approach to security right with open source software.
  • IoT goes nuclear: creating a ZigBee chain reaction [iophk: "use 6lowpan instead"]

    If plugging in an infected bulb is too much hassle, the authors also demonstrate how to take over bulbs by war-driving around in a car, or by war-flying a drone.

  • Passengers given a freight as IT glitch knocks out rail ticket machines

    The network of machines are operated by the individual franchises, but share a common infrastructure from German software company Scheidt and Bachmann.

OpenBSD Development News

  • OpenBSD now has Trapsleds to make life harder for ROPers
  • Historical: My first OpenBSD Hackathon

    I was a nobody. With some encouragement, enough liquid courage to override my imposter syndrome, and a few hours of mentoring, I'm now doing big projects. The next time you're sitting at a table with someone new to your field, ask yourself: how can you encourage them? You just might make the world better.

    Thank you Dale. And thank you Theo.

  • Finish the link-kit job
    We've had the linkkit components in the tree for a while, but it has taken nearly 20 rounds between rpe/tb/myself to get the last few bits finished. So that the link kit is cleanly used at reboot, but also fits in with the practices kernel developers follow.