* Posts by eulampios

1186 publicly visible posts • joined 10 Aug 2011

Six things a text editor must do - or it's a one-way trip to the trash

eulampios

Re: Speaking of Emacs, ....

It would be great if those who say so, would really try getting it.

eulampios

Re: Real programmers

or just a hex-mode in emacs?

eulampios
Happy

Re: Emacs + Evil

You do know that, by combining Emacs and vi, your major accomplishment is likely to be drawing fire from both sides of the eternal holy war?

I offer a truce for you: use the viper-mode in GNU Emacs ;-)

eulampios

Re: Emacs

It takes 20 seconds to write:

replace: "^\([0-9][0-9]\)/\([0-9][0-9]\)/\([0-9][0-9]\)" with: "20\3-\1-\2" and about 10 seconds to execute it. Job done.

Exactly! Replacement with a regex construct like "^\([0-9]+\)/\([0-9]+\)/\([0-9]+\)" , which you can type in by making up the first scope and a slash, kill it and do

C-y C-y C-y . Takes even less.

You could also accomplish this with another Emacs' delicacy and the date utility. Just run-sheell command on the region (when it is marked) with

M-1 M-|

for d in $(cat -); do date --date="$d" +%Y-%m-%d;done <ENTER>

or more justifiable complexity:

"for d in $(cat -); do date --date="$d" +%Y-%b-%d,\ %A;done "

eulampios

@Tom 38

Same goes with Emacs. Select a region and run whatever command you want taking the region as an argument, like interactive (regex) replacement. or any more sophisticated stuff with run-shell command on it, awk/perl/sed -- you name it.

eulampios

Re: Speaking of Emacs, ....

It satisfies quite a few, but not all, of Verity's criteria.

Well, not sure about the validity of those criteria. IMHO, GNU Emacs satisfies a number of much more serious and important criteria (for me), that no other editor seems to even be aware of.

eulampios

Re: Speaking of Emacs, ....

Taking this as an insult. Since, even if you use it, you don't really seem to know it. AMOF, I don't really play games in Emacs. First, think how much space does it take? How fast does it load? Run this( in Emacs with M-! or M-1 M-!)

dpkg-query -Wf '${Installed-size}\t${Package}\n' |\

column -t | grep -P 'emacs.*' | \

awk '

{sum+=$1}

END{

printf "-------------------------\nTotal for emacs: %.3f Mb\n",sum/2^10

}'

Outputs:

-------------------------

Total for emacs: 145.402 Mb

BTW, why does ELReg text parser mutilate the text so bad and both pre,code tags are so ugly???

Most of it is Elisp, it is modular and 145Mb really worth it! Here is why for me, personally:

**incremental (regex) search, where you get search results for a pattern while you're typing it in ; configurable regex system

**grep-mode, you do grep command and get a *grep* buffer with the list of matching lines hyper-linked to the place/file

**this idea, that everything is file... I mean a buffer is implemented, special buffers

**run-shell command on a region with or without an argument (M-1) M-|

**very smart keyboard shortcuts, which you can configure and customize to your own liking

** collection of text killing macros, can your editor know what zap-to-char is anyone? Capitalize, change-toupper/lower and so on. Very efficient text editing. I am so used to it I use in Firefox.

**running every command with M-x with an autocompletion

**calc-mode, a Reverse-Polish with inf. precision calculator that can integrate, differentiate, convert units etc. Both stand-alone and embedded. And hey, you can still run pari-gp, (i)maxima, octave in in its own buffer and yes run-shell on a region with dc?

**tramp-mode

**kill-ring browser

**dired-mode, where you can do operation on files and dirs (with tram-mode via ssh remotely)

**unmatched extendibility

**predefined highlighting and indentation, regex highlighting etc

**aspell and calendar-mode

** hey, it got a vi emulation mode, viper-mode. I do like vim (vi is too plain), does vim have an emacs mode? ;-)

** its own terminal-mode, which is Okay

**org-mode, info-mode, tex-mode, w3m-mode ( a decent web browser) and you-name-ti-mode

=============

Wow, this is just 5% of what it can do and I just don't have an idea about it.

Microsoft preps UPDATE EVERYTHING patch batch

eulampios

Re: @AC, history of ASLR

Correction, I meant: Both OpenBSD and Linux followed PaX, not Redmond, of course (2003<2005<2007). PaX original ASLR implementation dates back to 2001 (according to Wikipedia).

eulampios
Linux

@AC, history of ASLR

MS made them a lot harder to exploit with features like NX and address spaces randomisation - which couldn't have been too bad as they were later both copied by Linux.

Copied by, or copied from? A lettle history for you:

ASLR was enabled in Windows Vista around 2007, OpenBSD (2003) and the default Linux kernel (2005) followed. AS a matter of fact, ASLR was first implement and invented by the PaX project (should have been patented though). Do you know what PaX stands for? Patch for LinuX kernel (I think). So, it was the Linux kernel design since the very onset of ASLR, it hasn't become the mainstream code right away though. And then after many many years came Redmond .. to copy-cat the innovation. However, it was neither the first, nor the last time.

eulampios

@mmeier, Firefox

As far as the firefox hacking is concerned it also was a partly Windows ASLR feature exploit:

VUPEN was able to exploit Firefox via a use-after-free memory flaw paired with an ASLR/DEP memory exploit. ASLR and DEP are operating system features found in Windows that are intended to protect memory from exploitation.

eulampios

@mmeier

Not exactly right: here

it was possible to exploit a vulnerability which allowed us to gain code execution in the context of the sandboxed renderer process. We also used a kernel vulnerability in the underlying operating system in order to gain elevated privileges and to execute arbitrary commands outside of the sandbox with system privileges.

eulampios

@AC

Wrong: Updates to (at least) hal, glibc, dbus and xen require reboots.

You seem to be in the wrong here. If the xen touches the kernel it does require a reboot (unless there ksplice is not used). As far as glibc (hal and dbus) is concerned it very rarely does. When that happens all necessary services are restarted by the updater (apt in my case). When you do absolutely need to reboot the whole machine it prompts for this (creates a file /var/run/reboot_required (again, speaking for a Debian based system)

My own server/desktop example:

Thu, Feb 28 2013 09:46:36 -0600

------------------------------------------------

[UPGRADE] libdbus-glib-1-2 0.84-1ubuntu0.2 -> 0.84-1ubuntu0.3

uptime:

3:22:35 up 37 days, 21:45

============================

Also - updates to Windows usually work in similar manner you describe - after updates you can postpone the reboot until a convenient time

Never had to reboot my desktop after updating firefox/chromium/konqueror/epiphany even lynx and libreoffice, gnumeric ;-) However Microsoft says this:

Bulletin 1 Critical,Remote Code Execution: Microsoft Windows, Internet Explorer --> Requires restart. The other one bull.3 for Office "may require restart".

Malware devs offer $100 a pop for 'active' Google Play accounts

eulampios

Re: Hmmmmm

he difference being that Android malware is installed by the users installing dodgy apps from dodgy places whereas Windows malware is installed through vulnerabilities in the OS and browser plugins.

True, yet some/most part of Windows malware come the same way.

In my view, the difference is:

1) the means OS provides to counter those risks (Android mandatory sandboxing + transparent permissions, Windows --????)

2) what matters is not how many different strains of it is out there, but how many people are affected. As I and others have pointed out, for Windows you just need to ask you friends, neighbor etc, for Android you have to trust F-secure, Kaspersky, MacAfee et al.

eulampios

@AC

The vast majority of android apps ask for permissions they don't seem to need.

So, it's my point, there is not much difference between a bad intent and a sloppy design. It might well be that that little app of yours is useless after all.

So if you're a google fan you'd better fucking hope people don't start reading the list of permissions...

What do you offer me? To become a Microsoft or Apple fan? I doubt that Google can screw up that bad and the former two would change their ways that much really ;-)

As far as Android is concerned, I like it but will ditch for a first viable GNU/Linux alternative whenever it becomes available...at least make it dual boot

eulampios

@MS/Apple shill

Howdy.

It gets access to your bank account!

If you have a habit to install crappy apps (possibly outside of Google's Play) without examining and analyzing their permissions, neither Kaspersky, nor any other Russian dude would be able to help you anyways. Ignorance is a pretty luxurious thing, you know.

eulampios

@hahaha-anon

If Microsoft were as security aware as Google are and would have offered an API to sandbox every application+ made the permissions system transparent.. That would be a very different world!

eulampios

Re: Hmmmmm

except that with Windows everyone around has it, with Android no one has ever really seen it. So let's wait another 16 years.

New evidence: Comets seeded life on Earth

eulampios

non-Keplerian orbits

Nice comment, however, not arguing with you about the panspermia idea in the whole, have to say about this comet's orbit though.

It is hard to claim that this comet is coming from outside of the solar system, since although the eccentricity is greater than 1 right now, however it is not "much greater" than 1, hence it's not stable (according to NASA). Of course, it's not the classical 2-body Keplerian dynamics Sun-body we should use, but a non-Keplerian one where you have to incorporate gravitational perturbations of other (large) bodies, such as giant planets. The eccentricity oscillates around 1, (I guess.) Hence, the you cannot posit with high certainty that the initial conditions for this comet (as well as other higher than 1 ecc. ones) .

Very few comets seem to have significantly higher ecc. to rule out 3d bodies perturbations, hence Oort came up with his namesake hypothesis.

Remember that the ratio between the two velocities, v_c,the one to stay on the circular orbit and v_e, the to escape the solar system for the given distance to Sun is 1/sqrt(2). Since

(v_c/R)^2=(a/R), where a is the centrifugal acceleration equaling the negative of centripetal acc. due to gravity. While for the escape velocity you need to "cancel" the gravitational potential M_S*G/R by the kinetic energy mv_e^2/2 .

So for the Earth it's about

v_c=sqrt(MG/R)=27,700 m/s and

v_e=sqrt(2MG/R)=42,127m/s

where M is the mass of the Sun, R is the mid-distance from the Earth to the Sun, G- the grav. constant For Mars it would be divided by appr. sqrt(1.5) (since R for Mars is about 1.5 AU), so the escape vel there is 34,397m/s How does this comet pass it to be about 55,000 m/s relative to Mars, I don't know. Of course, if you get a comet getting out of the hypothetical Oort's cloud which could go as far as 50,00AU you get

v_e=188 m/s, v_c=133m/s , respectively, not too far apart as you can see.

--

**PS calculations are done in the GNU Emacs' calc

Europe tickles Microsoft with €561m fine for browser choice gaffe

eulampios

Re: Ironically .....

Are you suggesting that the blocked ads don't pay?

If ElReg decides to advertise MS, I won't allow the ads on my screen. BTW, noscript, ad-block Plus, flash-block -- they all come along pretty well.

Google blats bugs in Chrome - days before $560k hacking contest

eulampios

Re: Meanwhile...

Providing you talk about comparable software, not a full GNU/Linux distro with 10s of thousands of packages vs. a bare MS Windows with just a few of them. It also makes sense if one doesn't mix the severities.

Not every vulnerability is exploitable so you can get money for it at the pwn2own . Some marked as "potentially" exploitable, some are DoS, some require more additional factors, like physical presence, user's account etc.

You can't even use the old Open Source gem here, and claim its some how mysteriously more secure because everyone can see the source code....

Okay, your irony is inappropriate, unless you or someone else gets money from Google. BTW, how do MS sponsor this curiosity?

eulampios

Re: wow

Yes, Microsoft is yet again about quality, not quantity. Memento Slammer?

eulampios

Re: Meanwhile...

How come you get more money for owning Chrome when it has had many times more vulnerabilities than IE?

Because, evidently, you receive money for actually exploiting, not counting them. What a nuisance! Otherwise, RICHTO would be more rich(to) than Roman Abramovich by now.

Euro watchdog bares teeth at Microsoft over browser gaffe

eulampios

Win8 EULA

It's relatively Okay, what is much more aggravating is the new Win 8 EULA. Upon the first use of a Windows 8 bundled (or imposed rather laptop), such as Asus branded ones, you are welcomed with a new MS EULA screen and the "accept it or decline it" message.... wait a minute there is no DECLINE or DO NOT Agree option anymore. You have to agree to it, period!

I am not surprised ... not too much really. This is Microsoft we are talking about. What is strange though, is a bad terminology. Why is it EULA? It should indeed be EULU, since there is no agreement part of it anymore, it is now an ultimatum.

At the same time, I'd like to call for some clemency on the EU watchdogs' part. Com'on, don't you have some provisions for the dementia or Alzheimer clients? Microsoft did indeed forget to offer more than one browser. This multi billion worth corp. don't remember to sign their own ssl certs and totally forget about the leap year. What would you expect from them?

eulampios

Re: Take the money

as it doesn't have that evil G connection.

When there's M (or A) on it already, it has reached the maximum level of evilness.

Microsoft secure Azure Storage goes down WORLDWIDE

eulampios

@Captain DaFt

Nice one,

I'd even suggest three forms of this concept: bummer, balmer (pronounced in the British way: bɑ:mer) and ballmer

--What a bummer, I forgot the keys in the car!

-- It's Feb 29th, and who'd ever have predicted that, what a balmer?!

-- Your Azure is down? Don't worry it's a planned ballmer!!!???

Microsoft legal beagle calls for patent reform cooperation

eulampios

Re: This is interesting

Exactly, that is why this should read:

Microsoft plans to make information explaining exactly which patents it owns available to anyone on the web by the April Fools' Day, 2013.

Microsoft! Bing! must! make! Yahoo! more! money! moans! Mayer!

eulampios

Re: Yahoo!

sleeping with the enemy/Microsoft

Every single Internet Explorer at risk of drive-by hacks until Patch Tuesday

eulampios

Re: Linux updates just work?

I know, plain text editing sounds very scary to every Windows admin. It's like "a million mouse-clicks" job for us, *nix people. So scaaarrry, I can't type anymore....

eulampios

Re: @AC

So you have to roll back everything and reboot -

You just suggested me to rollback your entire system to some previous snapshot with everything on the fylesystem, now I hear some "hybrid kernel" faiy tales again. FYI, for modular architecture most of the drivers are loadable modules, that can be loaded and unloaded, as the term suggests. In that case you can always install a different driver against the headers of the current kernel if you wish so.

Tell me please, why does an awesome hybrid Windows kernel need a reboot when it installs a printer driver on Vista? (not sure about Win7/8) Why would need a reboot with pretty much any MS update/patch?

eulampios

@AC

You tell me how to upgrade databases. Snapshotting is possible on Linux as I told through, for example, LVM. There is also an emerging fs -- btrfs. You can even go with zfs but not in the kernel. I do regular backups of most important things. Say, dumping databases.

As far as your MySQL update issue was concerned, you apply your Windows logic, mon ami, despite all your regalia. All you needed was config files. Just like in the discussed case, if you ever tell any Linux, *BSD admin that you use snapshots in case a driver update gets awry, he or she 'll take it as a joke.

With databases, you do it with special tools (mine is PostgreSQL with pg_upgradecluster etc) or/and by dumping and restoring entire databases.

eulampios

@AC

I don't use snapshotting, my anonymous friend, I don't need to. However, LVM logical volume management) offers even more than that.

That is not what you need when encounter a buggy driver. All of them are contained in the kernel or associated with it. So it's much more simple just to rollback to the latest stable kernel, I know this is not feasible for a proprietary system and a rocket science really.

eulampios

@Yet Another Anonymous coward Silver badge

You might have heard about ksplice, I suppose. Anyways,

But that's a cute little unix toy you have there ....

Sic:

The OpenVMS.org websites are for system administrators, developers, database administrators and technical managers, offering recent industry news, events, links, etc. related to HP's OpenVMS operating system running on the VAX, AlphaServer and Integrity platforms.

From the http header of http://openvms.org/

Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny4 with Suhosin-Patch

eulampios

Re: @JDX

Please, stop automatic downvoting.

Eadon, JDX and SheLluser, my apologies for those people

eulampios

Apple friends

goals for FreeBSD 10 is a GPL-free base system

I guess that, yet the ultimate goal is to get FreeBSD a common-sense-free system.

eulampios

The FreeBSD controversy

The reason FreeBSD is so adamant against gpl'd 3 version of gcc was purely political and ... yes strange. 3d version of gpl does not impose any restrictions on the compiled code. You can still license the resulting binary with any version you want. However, they do admit that "it would be bad for our sponsors" going even further to suggest who htat sponsor is. If this is about the values, than tell us please how much less of BSD values do DragonflyBSD guys have?

Now with clang being on par with the outdated gcc 4.2 in the compiled code performance, one one would question FreeBSD performance in general. The latter is well known to be inferior to GNU/Linux in most aspects. While, IMHO, other BSD siblings have historically something unique to offer:

- OpenBSD -> security

- NetBSD -> portability (even higher than Linux)

- DragonflyBSD -> peculiar kernel architecture

And BTW, their sponsor do not reek as much as one of the FreeBSD's famous and infamous one.

eulampios
Linux

Re: The key's in the name

Nobody's managed to explain to me why this means RedHat still ships with Python 2.4

So why did FreeBSD manage to remain with gcc 4.3.1 (2007) up to now?

As far as the FreeBSD update mechanism is concerned, , it's not that great. Although I did like the "make install" in from option, in my experience, a few times a package might not build. Say, gnome 3.24, open office did not build properly as I remember on 7.1 (by some reason binary pkg OO was not available for x32 version).

This might explain why BSD systems have notoriously long uptimes.

How much notoriously is it longer than Linux Servers? Is this known to yandex and rambler mail, major Russian Internet companies? (BTW, nginx was born while Igor Sysoev worked for rambler) They have recently switched to Debian and Ubuntu, resp. (mail.ru migrated even earlier) , for many reasons, including, package management and updating issues and more In case if either your Russian or googole translate are helpful.

And BTW, who is the main sponsor of FreeBSD? Isn't it that company that invented rectangles with rounded corners?

eulampios

Re: Linux updates just work?

I do quite like the MS VSS snaps which allow you to rollback driver installs and OS updates, should you require.

On Linux this is not necessary, you got one kernel. When a kernel gets updated, the old one is not discarded, so if it appears to be broken reboot to the latest stable kernel.

China is world's most malware-ridden nation

eulampios

Re: GNU Emacs

Windows RT uses about 8GB actually for the OS and preinstalled apps - including a full install of Office.

No, about 12gb. But this doesn't make any difference. So one would wonder what does it need it for, maybe it's just an indication of bloat? Preinstalled apps, why preinstall them ? Any GNU/Linux would then use 40g with installation. I am imagining Linux Mint iso 45gb (with preinstalled apps)

eulampios

Re: @Stuart Longland

Hello Stuart,

(2) this is just a hocus-pocus with key IDs

your link talks about the so-called "gpg/pp key ID collision", there is no problem with that, these are truncated versions of the fingerprints (hashes of the actual keys), these are not used to verify signatures, all more so, to forge a file signature. A key ID is used for the identification purposes. You can check you local public ring file (.gnupg./pubring.gpg that stores longer longer hashes) or run

gpg --list-keys --fingerprint

There is also a massage written by Jon that explains it even better.

(3) yes I referred to the iso hashes and signatures of the hash files, these are the ones you find published. CD's integrity is are checked not for security purposes but rather to see if the burned correctly.

(4) not applicable, I was talking about Linux, even if OEMs "finally grow up" and start shipping with Linux I am almost sure, to use a system of my choice, it would be great just because no MS tax is involved.

sha256, sha512 is not good defense? with salts and multiple iterations. Maybe when quantum computers become a reality...

( with no collisions known and yet no theoretically possible ones?) a salted sha512 password hashing is used in most distros about 5 or so now

It is easier just to hack a machine that signs packages, but one machine is not enough, since things are multiply signed, moreover, you'd have to collide hashes of the source code as well. In those cases when git is used for versioning, good luck succeeding there as well.

So risks is non-zero, yet (with modern technology) is infinitesimally small

--regards

eulampios

GNU Emacs

But Visual Studio is certainly one of the best IDEs on the planet.

I have used VS.for some time and have been using GNU Emacs. That's why I know that VS is a narrowly oriented IDE, a mouse clicking IDE.

*grep-mode ( a hyperlinking grep putput buffer)

*tons of prog languages, (La)TeX in VS? Any CAS'?

*running a shell (hence any command) on a region wit arguments?

*tex editing capabilities that can't be beat (vim is the only one that can compare to this), with elisp built into, hot keys etc

*tramp mode to run sudo/su/ssh etc

*dired mode - a file manager

*email client

*terminal emulator

*info-mode a help environment, fast and easy to navigate

*org-mode - spreadsheets, publishing and beyond

*calc (both standalone and embedded): can your ide perform calculations with infinite precisions? units conversion, differentiate and take integrals?

Its certainly slimmer than most Linux distributions though.

Yeah, right exactly: more than 12gb of Win RT < 5.6 gb Ubuntu, both with office , plus Ubuntu got much more, like GNU Emacs

<---------- ElReg, WTF, where the GNU Emacs icon?

eulampios
Facepalm

@AC, the power user of shell, aka powershell user

You also state that Visual Studio is a match to the GNU Emacs, Microsoft Equations plugin is more powerful/convenient than texlive suite, and that Microsoft Windows 8 RT is a slimmer system than GNU/Linux, Android or iOS, both on ARM and x86.

eulampios

Re: Malware

You are a bit behind the times. -- I am.

There are over 800 types of known malware that are written specifically to target Linux.. -- They are written already, contrary to what other commenters are saying? Nice, when will they finally start spreading? How do I get "infected"? Please, don't advise me to download, chmod and run it in the terminal.

And Android (based on Linux) has more Malware that Windows managed in ~ 15 years!

Yeah, it Android has many, very few people really saw one.

eulampios

@WIze

The general public don't know how to secure a machine.

Some sophisticated commercial software manufacturers don't know or care, so why demanding it from the general public? My own experience of installing variants of Ubuntu and Linux Mint has not yet concluded with a single malware infection case, moreover, in those cases a system once being installed to solve some serious Windows issues would not need any further intervention, it just runs and runs.

Anyways, I presume your knowledge about Linux a purely theoretical.

You should know, that unlike Windows users, GNU/Linux and *BSD users do not install from the unknown sources. The sources are known and trusted, called repositories, (or ports for *BSD)

Of course you have to be fixing the Windows mindset, and this Windows education (thanks to Microsoft and corruption for our schools) for the first few days. When a user tries to go out to the Web to download and install something. Instead of firing up a package manager to only search for and check the desired packages: "I had to do it on Windows, now this is too simple and logical to be true!"

We who use Linux/BSD usually don't do stupid things, however, our OS is not in the habit of betraying us either.

eulampios

@Chris

but no-one should be browsing* the Internet or plugging random USB sticks into

I do it all the time and nothing happens to me. Yes I do have a noscript (mostly to block the idiotic ad scripts) and the with AppArmor/SELinux profiling to guard against those Java/js and many more 0-day risks. A file won't execute by itself when a usb stick is inserted into the machine.

When I was a gullible Windows user (<2004) it happened to me many times both with many floppies and on IE.

On a proper server there might be some additional precautions and guards, like mount and AppArmor/SELinux policies. When it usually gets hacked it's not malware or a vulnerability related, but an ssh policy, bad password, poorly implemented custom software or cgi scripts

eulampios
Linux

@Stuart Longland

I dare say it'll only be a matter of time before malware specifically targetting Linux will be out there.

You dare too much, sir. Just want to point out to some inconsistencies in your argument (smells of Windows logic to me):

-- it's been a matter of time for 20 years now. Saying, it's not popular is incorrect statement. Think (web) servers, supercomputers, embedded devices etc

-- implementing your hypothetical trojaned debs and isos might a little harder than you think, you gotta poison the apt-keys first, since the apt system checks every package for it's gpg signature and some sha sum. As for the isos, again Ubuntu and everyone else publish the sha sums along with gpg/pgp signatures, you can routinely check against (I recall that a vanilla Windows didn't even have a util for md5sum)

-- equating Android with Windows from the malware pov popularity needs a leap of faith and a little ignorance/fud. I yet have to meet someone who had suffered from an Android malware, while almost all my friends experienced it on Windows.

MS Windows has no transparent permissions system, no mandatory sandboxinx container for an app (unique uid per every app) . Yes, a better solution is indeed a trusted repositories/ports.

Microsoft techies bust data centres, pull plug on Bamital botnet

eulampios

@Mic

how do you prevent uneducated users from installing malware?

You don't know? in many ways:

-- by creating trusted repositories or ports , no walled gardens here

-- by creating a transparent API that mandates the permissions of an application

-- by writing better software

-- by opening up their source code

-- by making the quality of the software their priority

etc

**************

eulampios

Re: chalk one for the good guys

Undoing what they have originally done?

eulampios

@JDX

Explain me JDX, how would they "infect" my Linux box to redirect away from where I want? Not all the universe lives by the laws invented by Microsoft

As for Android, don't install outside of gogleplay and read the permissions of an app before you install it. No need for microsoft coming for rescue