"Also, stop the nonsense about duress-passwords. They do not work."
I was trying to figure out what you are talking about, then it occurred to me that you have no idea know what you are talking about.
"Someone has probably posted it while I typed this though..."
That is because it was so obvious that it would have been best if nobody linked to it. Before I even clicked on the link to the article I knew some asshat was going to link to that xkcd comic.
Don't even bother to come to school tomorrow. You have no hope of making it through the school year with anything better than a big F.
Which reminds me
Now off you go
In any case, thanks for thinking you are smart and staying with XP without any thought of social responsibility. We all really appreciate that you are contributing to the overall insecurity of the Internet. Bravo!
The number of stories about vulnerabilities on Slashdot in the last 24 hours, the last week, or the entire lifetime of Slashdot is in no manner, way, shape or form an indicator of which platform is the Petri Dish.
The fact remains that Windows is by far worse than OS X or Linux.
When you see articles about OS X or Linux vulnerabilities they are always based on a condition that, if true, means you already were owned: ""Gatekeeper doesn't verify an extra content in the apps. So if I can find an Apple-approved app and get it to load external content, when the user runs it, it will bypass Gatekeeper," As you can see there is a magical requirement. All I have to do is somehow get ahold of an approved app, modify it, and then somehow resubmit it with the modifications. Now all that needs to happen is that when Apple notifies the app author his new submission was approved that he is too stupid to know that he didn't make such a submission and fail to notify Apple of said fact.. See. Super Easy!!!
It's likess almost every Linux vulnerability you see: "If an attacker can somehow gain local access to the machine at a console, and the version of Linux he is running happens to be vulnerable, then it is possible that someone could use a privilege escalation exploit to gain root.
Another huge Linux vulnerability is the rm command: "rm is a huge security flaw! If a cracker somehow gains root access to the system, rm makes it possible to delete critical files!"
Show me one Linux vulnerability in the last year that didn't require a highly skilled attacker combined with a set of highly unlikely conditions, or rely on the system to be poorly configured. Hell, forget the year limit. Show me one from within the last decade. Good Luck!
"My system works."
10 out of 10 virus writer's agree! You are too stupid to figure out that while it is working for you, it is probably working as well or better for the botmaster(s) who own your computer.
Of course, you are full of shit, because the only OS that gets borked on a regular basis is Windollars.