Anda di halaman 1dari 435

Free Yourself from Microsoft and the NSA...

Learn Linux and Libre Office!


Copyright, David Spring M. Ed.
Collegeintheclouds.org
FreeyourselffromMicrosoftandtheNSA.org
September !"#
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ii
Dedication
This book is dedicated to freedom !ioneers...
"ar# $ildall... %&'( )%&&'
'ary (as a computer programmer (ho in ")*+ invented both
the D, D-S operating system and the ./-S Computer Start
0p &rogram. 'ary is often called the 1father of the personal
computer.2 3he original MS 4indo(s operating system,
called MS5D-S (as a virtual copy of D, D-S 6 ma7ing
Microsoft the biggest copyright violator in history. 4e cover
more about 'ary 8ildall in Chapter ", Section #.
Thomas *enfield +ackson... %&,- . (/%,
9udge 9ac7son presided over the ")): 6 !!! trial of 0S
versus Microsoft and (rote a !* page 1Findings of Fact2
(hich document many of the events (e discuss in this boo7.
9udge 9ac7son ruled that Microsoft had repeatedly violated
the Sherman Antitrust Act and therefore should be bro7en up.
;is decision (as overturned by a corrupt Court of Appeals.
.ut his Findings of Fact still spea7 truth to in<ustice today.
0d1ard Sno1den
in 9une !"#, Ed(ard Sno(den released NSA documents
(hich changed the course of this boo7. 3hese NSA
documents reveal a massive spy program by the NSA, (ith
the help of Microsoft, and provide additional evidence that
support my claims of an NSA 1open bac7 door2 to the
4indo(s operating system. Ed(ard confirmed my research
that the NSA is spying on us. /n this boo7, (e e=plain ho(
they spy on us.
"lenn "reen1ald
4ithout the courage and determination of 'lenn 'reen(ald,
Ed(ard Sno(den>s story (ould have been buried by a (all
of NSA propaganda. /t is a frightening thing that (e currently
have so fe( real reporters (illing to spea7 truth to in<ustice.
4e must all more closely e=amine (here (e are getting our
1ne(s2 from.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age iii
2ichard Stallman
Computer programmer, founder of the 'N0 pro<ect and
the Free Soft(are Foundation, and advocate for the public
and scientific benefits of free soft(are programs. 'N0
stands for 'N0 is Not 0ni=. 0ni= is a closed source
operating system. 'N0 is basically <ust a <o7e that only a
computer programmer (ould understand. /t means
'N0?@inu= is a free operating system.
Linus Tor3alds
Computer programmer and developer of the free open
source @inu= operating system (hich is at the heart of the
@inu= Mint distribution. @inus built the @inu= operating
system in "))" and decided to give it a(ay so that
everyone (ould benefit. @inus currently develops and
maintains the @inu= 1core2 program for the @inu=
Foundation in .eaverton, -regon.
Clem Lefebvre
Founder of the Linux Mint project which is the Linux
distribution closest to Windows XP and Windows 7. It is
extremel important to us that people are happ with their
computer. !ur "oal is to brin" people what the need# what
the want and what the as$ for. People should not be
forced to mi"rate to somethin" new just because someone
else thin$s the should.%
Aaron Swartz...1986 - 2013
/nventor of ,SS A,eally Simple SyndicationB and advocate
for the principle that science and innovation, paid for (ith
public ta= payer dollars, belongs in the public domain. Aaron
called this basic human right 1the freedom to connect.2 Aaron
said 13here is no <ustice in follo(ing un<ust la(s. /t is time to
come into the light and oppose the private theft of public
7no(ledge. Sharing 7no(ledge is a moral imperative.2
4t is because of their de3otion to the free exchan5e of kno1led5e that 1e
still ha3e the abilit# to free oursel3es from the chains of Microsoft and the
NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age iv
On your keyboard, press CTRL+Click to jump to any chapter.
Free Yourself from Microsoft and the NSA...
Table of 6ontents
*reface7 6ould All the 6ons!irac# Theories Actuall# be True8
6ha!ter %... 9o1 Microsoft became a :ranch of the NSA.............%
"." ;idden @in7s bet(een Microsoft and the NSA.............................................
". 4hy @inu= is More Secure than 4indo(s.................................................."#
".# Emergence of the Evil Empire....................................................................")
".C 0S &rotects Microsoft Monopoly in trade for NSA .ac7door.....................#"
6ha!ter (... Su!er :u5s; 6#ber <ars; Disastrous =!dates and
:lackmail..........................................................................................'>
." Super .ugs and Cyber 4ars......................................................................CD
. 3he Flame Eirus and 4indo(s 0pdate Disasters......................................++
.# Microsoft .lac7mail 4arningF 0pgrade or DieG...........................................*"
.C 0EF/F 3he Microsoft 5 NSA 8ill S(itch........................................................**
6ha!ter ,... <h# 1e must end the Microsoft Mono!ol#..............&
#." 3op 3en ,easons to use @inu= instead of 4indo(s :................................)!
#. 4hy 4indo(s : .lue (ill not fi= the ,eal &roblems................................"!"
#.# 3he Fatal Fla( of the Microsoft 4indo(s Monopoly................................"!*
#.C 3he ,eal Cost of the Microsoft Monopoly................................................""*
6ha!ter '... Linux to the 2escue..................................................%(&
C." A .rief ;istory of @inu= -perating Systems............................................."#!
C. .enefits of @inu= Mint over @inu= 0buntu................................................."C#
C.# Four Steps to the Freedom of -pen Source 3ools..................................."C:
C.C /nstall @inu= Mint in a Eirtual Machine......................................................"++
6ha!ter >... Set u! and =se Linux Mint.......................................%>&
+." ;o( to use @inu= Mint Mate....................................................................."D!
+. Set up and use the Mate File Manager...................................................."D)
+.# Add Free &rograms to @inu= Mint Mate...................................................."*D
+.C Add a Shared Folder to @inu= Mint Mate..................................................":#
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age v
6ha!ter -... :ack =! Your Data and Dual :oot..........................%&
D." &rotect yourself from 4indo(s .ooby 3raps...........................................")!
D. Create multiple bac7ups of your system..................................................!C
D.# Dual .oot @inu= Mint (ith 4indo(s H& or 4indo(s *.............................""
D.C Dual .oot @inu= Mint (ith 4indo(s :......................................................#"
6ha!ter ?... :enefits of LibreOffice <riter..................................('>
*." 4hy @ibre -ffice 4riter is better than Microsoft 4ord.............................CD
*. CustomiIing the @ibre -ffice 4riter Main Menu.......................................D"
*.# Create your o(n Custom 3emplate..........................................................*!
*.C More Free 3ools for @ibre 4riter...............................................................:!
6ha!ter ... 9idden :enefits of Libre Office...............................(&%
:." Advantages of @ibre 4riter for Creating a &rint or E.oo7........................)
:. Create your o(n custom styles................................................................)*
:.# 0se @ibre -ffice Calc to create a chart....................................................#!:
:.C 0se @ibre -ffice /mpress to ma7e a slide presentation............................#"C
6ha!ter &... Additional Free O!en Source Tools........................,(%
)." Free Screen recording tools for @inu= Mint..............................................#
). Edit your video (ith -pen Shot Eideo Editor...........................................###
).# -pen Source Alternatives to NSA &artners..............................................##)
).C ;o( to use 4indo(s programs in @inu= Mint..........................................#+*
6ha!ter %/... Linux Mint @uick Start "uide................................,->
"!." .ac7 up your computer and partition your hard drive............................#DD
"!. Dual .oot @inu= Mint (ith 4indo(s H& or 4indo(s *..........................#**
"!.# Easy Steps and Free 3ools for 0sing @inu= Mint...................................#:+
"!.C Final Steps to Freedom..........................................................................#)D
About the Author.........................................................................................C!:
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age vi
*reface7 6ould All the 6ons!irac# Theories Actuall# be True8

AThis 1holesale in3asion of AmericansB and forei5n citiCensB !ri3ac# does
not contribute to our securit#D it !uts in dan5er the 3er# liberties 1e are
tr#in5 to !rotect.2 &aniel 'llsber" (une )* +*),
4elcome to the open source community and to our comprehensive step by step
guide on learning ho( to install and use free open source tools Asoft(areB on
your computer. -pen source means the soft(are is free and can be shared by
anyone (ith anyone for any purpose. -pen source is li7e a public library...free
and open 7no(ledge shared (ith the community for the common good. Free as
in Freedom. No patents, no hassles, no barriers, no limitsG
/f you are concerned about Microsoft handing over your data to the NSA, (e are
here to offer you a safer more secure option. /f you have had enough of 4indo(s
: viruses and the .lue Screen of Death and the never ending stream of model
changes and price increases, (e are here to offer you a less e=pensive and
more reliable alternative. -ur goal is to e=plain (hy you should install the free
open source tools called @inu= and @ibre -ffice on your home, school and (or7
computers 6 and then provide you (ith specific instructions on ho( to use these
free open source tools to free yourself from the chains of Microsoft and the NSA.
/n 9une !"#, former NSA agent Ed(ard Sno(den confirmed that Microsoft
(or7s closely (ith the NSA. 3his boo7 provides the shoc7ing hidden details of
that relationship and e=plains (hy it harms everyone from social activists to small
business o(ners. /f you are concerned about Microsoft handing over your data to
the NSA, (e are here to offer you a safer more secure option. /f you have had
enough of 4indo(s : viruses, the .lue Screen of Death and MicrosoftJs never
ending stream of model changes and price increases, (e (ill sho( you ho( to
s(itch to a less e=pensive and more reliable alternative.
-ur goal is to e=plain (hy you should install the free open source tools called
@inu= and @ibre -ffice on your home, school and (or7 computers 6 and then
provide you (ith specific instructions on ho( to use these free open source tools
to free yourself from the chains of Microsoft and the NSA. .ut this boo7 is about
much more than simply learning @inu= and @ibre -ffice. 8no(ledge is po(er. /f
you really (ant to be free then it is important to learn the truth. -nly the truth can
set us free. 3he truth in this case is rather shoc7ing. 3he truth is that there is a
group of very (ealthy po(erful people (ho (ant to control the entire (orld 6 and
to gain complete control, they intend to control both the internet and all of our
computers. 3his boo7 provides concrete evidence that at least some of the 1craIy
conspiracy theories2 are true.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age vii
3he shoc7ing details revealed in this boo7 includeF
...Microsoft (as 1given2 an e=emption from the Sherman Antitrust Act in trade for
giving the NSA access to all 4indo(s computers.
...3he NSA has access to every file on every one of the (orldJs t(o billion
4indo(s computers 6 and has had this access since ")):G
.... 3he NSA used the 1open bac7 door2 to 4indo(s computers to launch a
1cyber5attac72 against /ranian nuclear po(er and oil plants in !!) using an NSA
created super virus called Flame.
... /n early !"!, the Flame Super Eirus escaped and began infecting commercial
computers all over the (orld 6 and played a 7ey role in causing the largest
environmental disaster in the (orld 6 the .& 'ulf -il Spill.
... 3he Flame virus and its many cousins, (hich attac7 computers by pretending
to be 14indo(s 0pdates,2 have no( infected millions of computers.
... As bad as all of this is the (orst is yet to come. MicrosoftJs latest operating
system, 4indo(s : comes (ith an e=tremely dangerous startup program called
10EF/F (hich is not only capable of remotely controlling every part of your
computer 6 it is also capable of crashing the entire (orld economyG /n April !"C,
Microsoft (ill end support for 4indo(s H& computers 6 leaving hundreds of
millions of 4indo(s users unprotected from Flame and other viruses. /n <ust a
fe( simple steps, you can protect your e=isting computer and the data stored on
it. No( is the time to learn the full story about the relationship bet(een Microsoft
and the NSA so that you can protect yourself from the coming crash.
<ho is this 5u# and 1h# is he sa#in5 this craC# stuff8
.ecause many of the claims in this boo7 may sound craIy, / (ould li7e to briefly
e=plain (ho / am and (hy / (rote this boo7. 0p until recently, / (as a (ebsite
consultant, community college instructor and a loyal user of the Microsoft
4indo(s operating system and Microsoft -ffice (ord processing program.
;o(ever, in !", Microsoft made a radical change to the 4indo(s operating
system (hen it replaced 4indo(s H& and 4indo(s * (ith an entirely different
system Microsoft called 4indo(s : and (hich they no( call 4indo(s :." .lue.
3his ne( system is e=tremely difficult to learn and use 6 and it has several
1features2 (hich severely limit your freedom. / (as therefore in the process of
(riting a boo7 called 1@earn @inu= and @ibre -ffice 6 A Cure for the 4indo(s :
.lues2 in order to give people an alternative to 4indo(s :.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age viii
4m!ortant @uestions about =nusual As!ects of <indo1s
3his research into strange aspects of 4indo(s : and 4indo(s :." led me to
see7 out ans(ers to a series of Kuestions. 3hese Kuestions and their ans(ers
revealed several hidden connections bet(een Microsoft and the NSA.
First; 1h# has Microsoft been allo1ed to continue their mono!ol# of
com!uter s#stems e3en after t1o federal Eud5es found Microsoft 5uilt# of
re!eatedl# 3iolatin5 the Sherman Antitrust Act8 3he Microsoft Monopoly
e=emption occurred at the e=act same time Microsoft gave the NSA access to all
4indo(s computers. /n fact, the Microsoft Monopoly e=emption (as granted by
the same <udge (ho later became the F/SA court NSA <udgeG Could it be that our
government secretly agreed to allo( the Microsoft monopoly to continue in
e=change for Microsoft giving the NSA access to all 4indo(s computersL
Second; 1h# 1ould Microsoft risk their com!an# and offend their users b#
mo3in5 a1a# from a !o!ular o!eratin5 s#stem like <indo1s ? to an
extremel# unstable and com!lex o!eratin5 s#stem like <indo1s 8
3here (ere many strange things about 4indo(s : that did not ma7e sense. For
e=ample, (hy is the 4indo(s : operating system actually t(o different operating
systems (ith t(o different control panels and t(o different versions of the
/nternet E=plorer (eb bro(ser and t(o different sets of user interfacesL
An operating system this comple= has never e=isted before. Neither 4indo(s H&
nor 4indo(s * had more than one control panel or more than one (eb bro(ser.
Also, (hy are our user names and pass(ords for 4indo(s : no( stored on a
database at Microsoft rather than inside of our o(n computers as (as the case
(ith 4indo(s *L Such an invasion of privacy has never occurred before.
Third; 1h# 1ith <indo1s ; 1as Microsoft forcin5 all com!uter
manufacturers to mo3e a1a# from a sim!le com!uter startu! !ro5ram
called :4OS to a ne1 com!lex and unstable startu! !ro5ram called =0F48
4hy should Microsoft even care (hat program computer manufacturers use to
startup our computersL 4hy (as the development of 0EF/ done in secretL
4here did 0EF/ come fromL 4ho created itL 4hen (as it created and (hat is its
purposeL And (hy is 0EF/ ten times the siIe of ./-S if its only function is to tun
on the computer and then hand the process over to the operating systemL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age i=
Fourth; 1h# does the =0F4 startu! !ro5ram include a contro3ersial feature
called ASecure :ootF8 Since its inception, Secure .oot has raised alarm bells
among computer users because it gives Microsoft almost total control over our
computers by preventing us from loading any program (hich is not approved by
Microsoft. Members of the open source community have called this strange
process 1,estricted .oot2 Asee cartoon belo(B. 4here did secure boot come
fromL 4ho created it and (hat is its purposeL
Fifth; does Secure :oot included a A<indo1s $ill S1itchF 1hich
Microsoft Gor the NSAH could use to kill #our com!uter8 Not only did the
ans(er turn out to be yes, but the 7ill s(itch appears to be the main purpose of
4indo(s :G
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =
Sixth; ho1 does the <indo1s o!en back door 1ork8 it has been clear to
many computer users that since ")): Microsoft has used an Ao!en back doorF
to ma7e 1updates2 to our computers. 3his bac7 door (as created (hen Microsoft
introduced /nternet E=plorer C and embedded this (eb bro(ser into the 4indo(s
): operating system. / (anted to 7no( ho( this bac7 door (or7ed, (hether it
could be turned off Ait canJtB and (hat 7ind of changes it could ma7e in your
computer 6 even (ithout your permission. 4hat (as the connection bet(een the
open bac7 door and the increasing number of 4indo(s 0pdates containing
malicious code (hich crash 4indo(s computersL
Se3enth; 1hat 1as the Flame 3irus and ho1 is the Flame 3irus related to
<indo1s =!date !roblems8 /n 9une !", Microsoft admitted that a super
virus named Flame (as using the open bac7 door to remotely attac7 4indo(s
computers. 3his led me to research several more KuestionsF 4hat is the Flame
virusL 4ho created itL 4hen (as it createdL 4hat is its purpose and ho( does it
(or7L Also (hy have MicrosoftJs monthly updates gone craIy during the past
yearL 4hy are there so many reports of these updates crashing computersL Are
these security patches related to the Flame virus and?or the NSAL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =i
0i5hth; did the NSA Flame 3irus cause the :* Oil Disaster8 ,esearching the
history of the flame virus led to even more disturbing Kuestions about the
relationship bet(een Microsoft and the NSA. Several ne(spaper reports
confirmed that in !!), Microsoft played a 7ey role in the NSA attac7 on /ranian
Nuclear and -il Facilities via the development of the Stu=net and Flame super
viruses. 3hen, in !"!, the Flame virus escaped and began crashing not <ust
/ranian oil facilities but lots of other oil facilities around the (orld.
/ discovered evidence that the Flame virus led directly to the .& 'ulf -il Spill 6
the (orse environmental disaster in the history of the (orld.
Ninth; is it !ossible that the 6#ber <ar and the <ar on Terror are both
fake8 / discovered evidence that the so5called Cyber(ar is fa7e. 3here have
been cyber attac7s. .ut they have not come from either the /ranians or the
Chinese. /nstead, there is evidence that nearly all computer attac7s on 0S
computers are initiated by the NSA 5 in order to create the illusion of a cyber(ar. /
also discovered evidence that the 4ar on 3error is fa7e. 3here is no Al Maeda.
4hat passes for Al Maeda is merely a branch of the C/A. Nearly all terrorist
attac7s appear to have originated (ith the C/A in order to create the illusion of a
(ar on terror.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =ii
Al Maeda appears to be simply a front for the C/A and C/A paid operatives. 3he
ground to air missiles being used by these fa7e Al Maeda groups (ere given to
them by our o(n 0S government.
American ta= payers appear to be funding both sides of the (ar on terror.
.y 9une, !"#, / had uncovered some very disturbing ans(ers to all of the above
Kuestions. Ans(ers to all of these Kuestions are provided in more detail in
Chapters " and . Even before the Sno(den revelations, / came to the
conclusion that the real purpose of 4indo(s :, 0EF/, Secure .oot and the open
bac7 door to the 4indo(s operating system has little to do (ith (hat (e have
been told and more to do (ith Microsoft and the NSA ta7ing over total control of
our computers. / (as in the process of finishing this boo7 e=posing the problems
of 4indo(s : and outlining the connection bet(een Microsoft and the NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =iii
Then on +une -; (/%,; the incredible 0d1ard Sno1den articles ex!osin5
the relationshi! bet1een Microsoft and the NSA started to a!!ear.
4e no( 7no(, than7s to the Sno(den revelations in 9une !"# that .ig .rother
is do(nloading not only all of our phone calls and emails 6 but every document in
every 4indo(s computer. -ne slide in particular indicated that in !!* Microsoft
helped the NSA <ump start a secret mass surveillance program called &,/SM.

/ (as already a(are that in !!*, shortly after <oining the &rism program,
Microsoft launched a parallel program to provide the NSA (ith a 17ill s(itch2 on
all 4indo(s : computers via a ne( secret startup program called 0EF/ (ith an
ominous feature called Secure .oot. After the Sno(den revelations, / realiIed
that the most important aspect of this boo7 (as to (arn people about the
dangers of 4indo(s :, 0EF/ and Secure .oot and provide computer users (ith
a (ay to regain control over their computers by helping them s(itch to the @inu=
operating system. 3hus, / changed the name of the boo7 from 1@earn @inu= and
@ibre -ffice 6 A Cure for the 4indo(s : .lues to 1Free $ourself from Microsoft
and the NSA 6 @earn @inu= and @ibre -ffice.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =iv
3he goal of this boo7 is t(o foldF first to help you become more a(are of the
problems of using the Microsoft operating system 6 and especially the problems
associated (ith 4indo(s :, 0EF/ and Secure .oot 6 and to provide you (ith
step by step instructions on ho( to add and use the @inu= operating system and
the @ibre -ffice (ord processing program.
As in the 4iIard of -I, (e are told to ignore the man behind the curtain as our
o(n government ignores international la( and 7idnaps the elected &resident of
.olivia and holds him prisoner (hile they search his plane for a person (hose
only crime (as lea7ing the truth to the American people. 3he truth is that (e are
all being spied on and these massive spy programs are a clear violation of the C
th
Amendment to the 0S Constitution.
13he Cth and +th Amendments to the Constitution of my country, Article " of the
0niversal Declaration of ;uman ,ights, and numerous statutes and treaties
forbid such systems of massive, pervasive surveillance.2
Ed(ard Sno(den, 9une " !"#
As a reminder, here is (hat our 0S Constitution has to say about freedom of
speech and the right to privacy.
AM0NDM0NT 4... Congress shall ma7e no la( respecting an establishment of
religion, or prohibiting the free e=ercise thereofN or abridging the freedom of
speech, or of the pressN or the right of the people peaceably to assemble, and to
petition the government for a redress of grievances.
AM0NDM0NT 4I...3he right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and seiIures, shall not be
violated, and no (arrants shall issue, but upon probable cause, supported by
oath or affirmation, and particularly describing the place to be searched, and the
persons or things to be seiIed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =v
4hat Sno(den is saying and (hat / also believe is that our allegiance should not
be to a corrupt government or to any immoral la(s. ,ather (e should uphold the
Constitution of the 0nited States and (e should support the 0niversal
Declaration of ;uman ,ights.
Does the NSA control the Ministr# of Truth8
As in the boo7 "):C, po(er craIy people control the media. 3hey control
business. .ut their real ob<ective is not merely to control 7no(ledge and money 6
but to control people. ;o( they control us is through something called the shock
doctrine (hich is an endless (ar 6 a (ar against people, a (ar against our
environment and a (ar against the truth. .ecause 7no(ledge is po(er, these
(ealthy people (ant to control the internet. -ne (ay they control the transfer of
7no(ledge is by (aging a (ar against reporters and (histleblo(ers. Another (ay
they plan to control the transfer of 7no(ledge is by controlling all of our
computers. 3hey do this by controlling the bac7door to the 4indo(s operating
system on more than one billion 4indo(s computers around the (orld. 3he best
and easiest thing you can do to defeat their plan and to free yourself is by
learning @inu=, @ibre -ffice and other free open source tools.
3ry to imagine you are living in a (orld very different from (hat (e (ere raised to
believe, a (orld even (orse than -r(ell>s "):C. /magine a (orld in (hich the (ar
on terror is fa7e. /n this boo7, (e provide evidence that the goal of the NSA is not
to control terrorism 6 but to control and enslave people around the (orld. 3here
are no (eapons of mass destruction 6 only (eapons of mass distraction.
/magine the possibility that the cyber (ar is fa7e. /n this boo7, (e provide
evidence that the NSA not only has developed super bugs to attac7 other
nations, but that it is also using those same super bugs to launch fa7e attac7s on
businesses here in America to ma7e it loo7 li7e there is a cyber (ar 6 (hen in
fact the NSA is behind .-3; S/DES of the (ar 6 <ust li7e in the boo7 "):C.
/magine a (orld (here nearly everything you read in the ne(spaper and (atch
on 3E ne(s is fa7e. /magine a (orld in (hich elections are sold to the highest
bidder and political parties are simply friendly faces for .ig .rother.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =vi
3he evidence is all around us. 3hin7 about the ban7 deregulation of "))) (ith
the repeal of the 'lass Steagall Act 6 (hich led to the economic collapse of !!:
6 (hich led to the multi5trillion dollar bailout of the 1too5big5to5fail5and5too5big5to5
<ail2 4all Street ban7s. 3his bailout (as accomplished by robbing trillions of
dollars from the American people. 3he robbery is still going on.
Lies of the NSA
/f you have any doubts left at all that our o(n government is lying to us about
NSA spying, please (atch the follo(ing three minute $outube video produced by
&ro&ublica. httpF??(((.youtube.com?(atchLvOeptPuH70'm/
-regon Senator 4yden as7s a direct KuestionF 1Does the NSA collect data on
millions of AmericansL2 9ames Clapper in an obvious act of per<ury replied 1No
Sir.2 4hat is most amaIing about this lie is that 9ames Clapper still has a <ob.
Mean(hile, the NSA (ar machine uses fear to manipulate and control us.
NSA S9O6$ DO6T24N0 <A2N4N" S6AL0
S0I020 DAN"02... :ombs 1ill ex!lode an# minute!!!
;ide under your bed and trust us to protect you.
94"9 24S$ OF 4MM4N0NT ATTA6$ Gor ma#be an attack in
the next 1eek or so... es!eciall# if #ou li3e in DetroitH
Contact your Congressperson and as7 them to vote for more
funding for the NSA. Call no( (hile you still canG
0L0IAT0D 24S$ OF SOM0T94N" :AD *029A*S
9A**0N4N" SOM0<9020 4N T90 N0JT MONT9...
Stay indoors and report anyone (earing a suspicious
bac7pac7. Avoid traveling in a car, train, plane or boat.
ATTA6$ ST4LL *OSS4:L0... :=T O$ TO "O S9O**4N"...
/nternet Chatter no longer indicates an attac7 (ill happen soon.
Feel free to go into debt. ;o( about buying a ne( computerL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =vii
/n August !"#, our government announced the closing of 0S Embassies and
issued a (orld (ide travel alert for the entire month of August 5 (arning
Americans not to travel 6 during the biggest travel month of the year. Supposedly
this (arning is due to the threat of a possible terrorist attac7 from Al Maeda
based on un7no(n information from a 1very credible source.2
Supposedly, the timing of this threat is related to the end of the holy month of
,amadan and @aylet al5Madr, or the Night of &o(er, one of the holiest moments
on the Muslim calendar. /n August, !", /ran supposedly used this day to launch
a cyber attac7 on Saudi -il computers. ;o(ever, in this boo7, (e provide
evidence that the Saudi computer attac7 on the 1Night of &o(er2 in August !"
(as launched by our o(n NSA. /ran had nothing to do (ith it. 3here are several
problems (ith this ne( (arning from the NSA. First, the timing has nothing to do
(ith Muslim ;olidays and everything to do (ith funding the NSA. 3he (arning
came <ust days after Congress almost voted to defund the NSA spying program.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =viii
As for the 1credible un5named source2 one (onders if that refers to 9ames
Clapper 6 the head of 0S Spying (ho recently admitted to lying to Congress in
the 1least truthful2 (ay 5 or (as it the C/A paid ta=i driver (ho (arned about
1(eapons of mass destruction2 a fe( years agoL
-n August +, !"#, the Colbert ,eport aired the follo(ing clip on the 'lobal
3error 4arningF httpF??(((.colbertnation.com?the5colbert5report5
videos?C:#*?august5!+5!"#?global5terror5(arning
3he real purpose of the attac7 6 or threat of attac7 6 is to scare the American
people into providing hundreds of billions of additional ta= dollars to the NSA.
NSA Attack on the First Amendment Freedom of S!eech
-n August :, !"#, there (as another shoc7ing attac7 on the "
st
and C
th

Amendments. 3he email service used by Ed(ard Sno(den, @avabit, (as shut
do(n by the NSA for refusing to hand all of their data over to the NSA. 0ntil they
(ere shut do(n by the NSA, @avabit had #+!,!!! users 6 all of (hom no longer
have access to their email accounts. 3he NSA <ustifies this abuse (ith (hat they
call the 13hree ;op2 ,ule (hich they claim gives them the right to all of the data
of anyone (ho has any relationship to anyone (ho has any relationship to an
NSA suspect. Since Sno(den might have some relationship to a terrorist and
since the #+!,!!! @avabit users are on the same email database as Sno(den,
the NSA gets to do(nload all of the data of all C"!,!!! people.
KThis ex!erience has tau5ht me one 3er# im!ortant lesson7 1ithout
con5ressional action or a stron5 Eudicial !recedent; 4 1ould strongly
recommend a5ainst an#one trustin5 their !ri3ate data to a com!an# 1ith
!h#sical ties to the =nited States.F @adar @evison, Founder of @avabit
.elo( is a lin7 to one of the most shoc7ing videos / have ever (atchedF
httpF??(((.youtube.com?(atchLvO0i#8pIt0IEgQfeatureOcC5overvie(5
vlQlistO&@+!.D.).CCFAF!)CA
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age =i=
@evison addedF 14hat /Jm opposed to are blan7et court orders granting
government access to everything. /f the American people 7ne( (hat our
government (as doing, they (ould not be allo(ed to do it anymore. 4hat (e
have seen in recent years is their (illingness to use those la(s in (ays
personally / consider to be unconstitutional, unethical and immoral.R
Ed(ard Sno(den, spea7ing from Mosco( correctly noted, 1America cannot
succeed as a country (here individuals li7e Mr. @evison have to relocate their
businesses abroad to be successful.2 3he ne=t day, another 0S email encryption
provider, Silent Circle, shut do(n. Another 0S 1secure2 email service, ;ushmail,
caved and handed over their database to the NSA. -nce people realiIe that their
data is not safe (ith ;ushmail, they too (ill go out of business. 3he lesson here
is that the only safety for your data is by moving your cloud data and email
service to servers (hich are located outside of the 0nited States.
K4f #ou run a business; and the F:4 or NSA 1ant to turn it into a mass
sur3eillance tool; the# belie3e the# can do so; solel# on their o1n
initiati3e. The# can force #ou to modif# #our s#stem. The# can do it all in
secret and then force #our business to kee! that secret. Once the# do
that; #ou no lon5er control that !art of #our business. 4n a 3er# real sense;
it is not #our business an#more. 4t is an arm of the 3ast =S sur3eillance
a!!aratus; and if #our interest conflicts 1ith theirs then the# 1in. Your
business has been commandeered.K
Security Expert Bruce Schneier August 30 2013
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==
0conomic Suicide
3he problem (ith NSA surveillance is that our entire economy depends upon
email privacy for efficient communications. For the past ! years, the one bright
spot of the 0S economy has been our lead in technology and cloud computing.
;o(ever, businesses and individuals do not (ant their data handed over to their
competitors. 3hey have seen ho( the NSA handed over Airbus data to .oeing.
.usinesses (ill increasingly migrate their data to places they vie( are safer. 3he
systematic ta7eover or closure of companies such as @avabit, Silent Circle,
;ushmail, Microsoft, 'oogle, Apple, A-@ and all other 1partners2 of the NSA
mean that all of these companies (ill eventually be driven out of business 6
because their business model cannot succeed (hen their potential customers
7no( they are being run by and for the NSA. All of their employees (ill lose their
<obs. Some economists have estimated that American technology businesses
could lose over S"!! billion in cloud computing contracts (orld(ide over the ne=t
three years as businesses move their data overseas to avoid the NSA. ;o(ever,
cloud contracts are <ust the tip of the iceberg. As people around the (orld realiIe
that companies such as Microsoft and Apple cannot be trusted to protect their
data or their privacy, the total economic loss to the 0S (ill be in the trillions of
dollars and millions of =S technolo5# 1orkers 1ill likel# lose their Eobs . all
thanks to the c#ber monster called the NSA.
FThe =.S. 5o3ernment; in its rush to s!# on e3er#bod#; ma# end u! killin5
our most !roducti3e industr#. La3abit ma# Eust be the canar# in the coal
mine.F 9ennifer 'ranic7 Stanford Center for /nternet and Society
-n August ", !"#, the 'erman Federal -ffice for Security in /nformation
3echnology A.S/B (arned citiIens to a3oid <indo1s for bein5 Aan securit#
risk.F An English summary of the article is at the follo(ing lin7.
httpF??(((.testosteronepit.com?home?!"#?:?"?lea7ed5german5government5
(arns57ey5entities5not5to5use5(indo.html
Users of Windows 8 surrender control over their machine the moment they turn
it on. For that reason, experts at the BSI warned the erman Federal
!dministration and other "ey users a#ainst deployin# computers with Windows 82
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==i
,Tdiger 4eis, a professor at the .euth 0niversity of 3echnology in .erlin, and a
cryptographic e=pert, told $ie %eit in an intervie( that Microsoft (anted to
completely change computing by integrating 1a special surveillance chip2 in every
electronic device. 3hrough that chip and the processes of 4indo(s :, particularly
Secure .oot, 1users largely lose control over their o(n hard(are and soft(are.2
4ith the !!: ban7 bailout, the largest robbery in history occurred right in broad
daylight. Since then, tens of millions of <obs have been transferred to s(eatshops
in China (hile entire American cities li7e Detroit have been destroyed and driven
to ban7ruptcy. 4ill (e no( fall victim to an NSA induced recessionL
*olitical Suicide
At the same time that the NSA is bringing do(n internet companies, it is also
destroying freedom of the press. ,eporters have been threatened (ith <ail time
for refusing to hand over their sources to the 0S government. /n 'reat .ritain,
the government <ust forced the ne(s agency, 3he 'uardian, to destroy the hard
drive containing information lea7ed to them by Ed(ard Sno(den. /f (e no longer
have privacy or freedom of speech, ho( can any group critical of the government
organiIeL ;o( can any (histleblo(er safely contact any reporterL ;o( can
human rights groups get information from victims of human rights abusesL ;o(
can any client safely and privately communicate (ith any attorneyL ;o( can any
patient privately consult (ith any doctorL
Le5al Suicide... The 0nd of the 2ule of La18
Also in August !"#, online open source legal firm, 'ro7la(, announced that they
too are shutting do(n e=plaining that the (or7 they do is simply not possible if
they are under the control of the NSA. 3he American Civil @iberties 0nion and
several other freedom groups have filed la(suits trying to restore our C
th

Amendment right to privacy.
<ar is *eace
Freedom is Sla3er#
45norance is Stren5th
"eor5e Or1ell %&'
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==ii
&erhaps the most shoc7ing of all of the revelations in August !"# occurred (ith
the release on August !, !"# of the :+ page F/SA Court opinion (hich found
that the NSA had violated the .ill of ,ights 1tens of thousands2 of times.
http-..www.scribd.com.doc.)/+*)/071.FI234court4opinion4with4exemptions
4ritten by F/SA Court <udge 9ohn D. .ates on -ctober #, !"", on page "D, the
court noted that the NSA has repeatedly lied to the court about (hat it (as doingF
13his Court is troubled that the governments revelations regarding NSA
acKuisition of internet transactions ma7e the third instance in less than three
years in (hich the government has disclosed a substantial misrepresentation
regarding the scope of a ma<or collection program... repeated inaccurate
statements made in the governments submissions... freKuently and
systematically violating Athe F/SA Court ordersB.2 -n &age **, the court addedF
13he measures proposed by NSA for handling Aemails of millions of AmericansB
tend to ma=imiIe rather than minimiIe the retention of non5target information.2
-n &age *:, the court notedF 1Each analyst... is left to apply the proposed
minimiIation measures alone, from beginning to end, and (ithout the benefit of
his colleaguesJ prior revie(... the governments proposed measures seem to
enhance rather than reduce the ris7 of error... /n sum, the NSA collection results
in the acKuisition of a very large number of Fourth Amendment protected
communications that have no direct connection to any targeted facility and thus
do not serve a national need.2

5asicall# FI23 court jud"e (ohn &. 5ates had assumed the "o6ernment was
tellin" the truth and then he found out the "o6ernment was not tellin" the truth. In
fact# the 723 had been $eepin" the FI23 court in the dar$ since court o6ersi"ht
be"an in +**/. (ud"e 5ates found that the 723 had 6iolated the Fourth
3mendment ri"hts of 3mericans tens of thousands of times% each ear usin" the
7238s own stud 9see pa"e 1):. In fact the actual number of 6iolations ma be in
the hundreds of millions of times each ear as we now $now that the 723 is
doin" much more than the told (ud"e 5ates.
!n 3u"ust +, +*), we found out how the 723 "ot around restrictions placed on
it b the FI23 court was b pain" its Prism Partners% 9includin" ;icrosoft:
millions of dollars to do its dirt wor$ for it. <he 723 paid and continues to pa
millions of dollars to co6er the costs of major internet corporations in6ol6ed in the
Prism sur6eillance pro"ram after a court ruled that some of the 723=s acti6ities
were unconstitutional. <he material pro6ides the first e6idence of a financial
relationship between the tech companies and the 723. It is still not clear wh it is
o$a for pri6ate companies li$e ;icrosoft to do thin"s the 723 is not allowed to
do. http-..www.the"uardian.com.world.+*),.au".+,.nsa4prism4costs4tech4
companies4paid
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==iii
Also this summer, it (as revealed at a Congressional hearing that the NSA has
begun assembling scores of ne( cyber 1offensive2 and 1defensive2 teams, the
agencyJs most concrete step to(ard preparing the &entagon and intelligence
agencies for a ne( era of cyber (arfare and computer conflict. 3hese teams
consist not only of NSA spies but also private corporate contractors.
13he confluence of circumstances enabling mass surveillance has the potential
to permanently imperil Americans> civil liberties. ;o( (e respond (ill determine
(hether (e continue to function as a democracy.2
;eidi .oghosian, e=ecutive director of the National @a(yers 'uild.
Microsoft :lackmails <indo1s J* =sers
3he NSA (ants total control over our computers. 3heir plan to gain access to all
of our computers reKuires that 4indo(s users 1upgrade2 from 4indo(s H& to
4indo(s :. 3o ma7e this happen, in April !"#, Microsoft announced that they
(ill discontinue support for 4indo(s H& beginning in April !"C. Since then, they
have used a series of malicious 4indo(s updates to sabotage 4indo(s H& and
4indo(s * computers in an attempt to force uses to replace their current
computers (ith 4indo(s :.
3he only protection from these attac7s is to turn off 1Automatic 4indo(s
0pdates2 and install @inu= as a dual boot. Sadly, Microsoft has sabotaged the
4indo(s operating system in order to ma7e it more difficult to install @inu= as a
dual boot 6 but (e (ill sho( you ho( to get around these obstacles. 3he only
(ay to ta7e bac7 control over your personal or business computer is to learn ho(
to install and use @inu= and @ibre -ffice.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==iv
9o1 this book is or5aniCed
3his boo7 is divided into ten chapters. Each chapter has four sections. 3he first
chapter covers the rise of the Microsoft Monopoly and its hidden connections to
the NSA. 3he second chapter covers the frightening conseKuences of this
collusion bet(een Microsoft and the NSA. 3he third chapter covers some of the
ma<or dra(bac7s of 4indo(s :. / (ant to ma7e sure you are a(are of all of the
dra(bac7s of 4indo(s : in order to inspire you to ta7e the time to follo( through
(ith the rest of the boo7 and actually install @inu= on your computer. 3he fourth
chapter covers the history of open source alternatives. 3he fifth chapter revie(s
ho( to do(nload and use @inu= Mint in a virtual bo= inside of your normal
4indo(s computer. 3his (ill allo( you to see ho( easy it is to use @inu= and
@ibre -ffice (ithout ma7ing any ma<or changes to your current computer. 3he
si=th chapter e=plains (hy and ho( to bac7 up your computer and ho( to 1dual
boot2 @inu= (ith 4indo(s. 3his may seem hard to believe but Microsoft is
deliberately trying to crash your computer and prevent you from using @inu=. $ou
(ill see that @inu= is not only easier than 4indo(s, it is also much faster. 3he
remaining chapters cover additional free open source programs to use (ith @inu=
to free yourself from Microsoft and the NSA.
3his boo7 is the te=t portion of our complete ten (ee7 C! hour online course on
using @inu= and @ibre -ffice. Each chapter covers one (ee7 in our ten (ee7
course. Each of the C! sections covers one hour in our online course. -ur
course also includes C! videos demonstrating the s7ills discussed in each
chapter, C! activities to help you master these s7ills and "! video conference
classroom sessions, one hour per (ee7 for "! (ee7s. /f you are interested in
ta7ing our complete online course on using open source tools or learning more
about our programs, visit our (ebsite, colle5eintheclouds.or5 or email us for
information on the ne=t course offering. 4e have also posted this boo7 on our
boo7 (ebsite, free#ourselffrommicrosoftandthensa.or5 in case you (ant to
read the boo7 online or refer your friends to it.
Other :ooks and 6ourses b# Da3id S!rin5
3his boo7 is the first boo7 and course in our si= boo7, si= course series for
sharing 7no(ledge. /n our boo7s and courses you (ill learn ho( to use several
free 7no(ledge sharing tools including the @inu= -perating System, @ibre -ffice
for (ord processing, 9oomla for (ebsite management, EirtueMart for Ecommerce
and Moodle for Elearning.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==v
For more information about all si= of our boo7s and their related courses, visit our
main (ebsite, collegeintheclouds.org. ;ere you (ill also find lin7s to our $outube
channel (ith videos covering all of the topics in our boo7s and courses. /f you
have any Kuestions, feel free to post them on our (ebsite forumG
http&''colle#eintheclouds.or#'forum
Are you ready to learn the po(er and freedom of @inu= and @ibre -fficeL @etJs
get startedG
David Spring, M.Ed.
September "", !"#
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==vi
<hat is Linux8
:efore mo3in5 on to 6ha!ter One; 1e should first co3er this basic
Luestion... <hat is Linux8
@inu= is a free computer operating system that (or7s on almost any computer.
@inu= runs )!U of all super computers 6 because it is the fastest in the (orld.
@inu= runs :!U of the all stoc7 mar7ets 6 because it is the safest in e=istence.
@inu= runs *!U of all smart phones 5 because it is simple and easy to learn.
@inu= runs D!U of all /nternet servers 5 because it is very dependable.
@inu= runs +!U of all tablets 5 because it is the most versatile operating system.
@inu= is so versatile that it can run almost any Microsoft 4indo(s program 6
including MS -ffice. Most important, @inu= does not allo( the NSA to access to
the data on your computer. /n short, @inu= is the foundation for our global
economy and the largest shared technology in history. Linux is also a free o!en
source alternati3e to the <indo1s :lues!
3he general public has no idea (hat 0ni= is and does not care about the history
of @inu=. All they (ant is a simple dependable operating system they can use to
run their computers and programs and files. 3he general public is more li7ely to
be familiar (ith the name @inus because the great American physicist @inus
&auling (as very (ell 7no(n. ;is name is pronounced @ine 6 0s. 3hus, most
Americans are li7ely to pronounce @inu= as @ine 6 H because that is similar to
@ine5 0s &auling. /n my opinion, (ith the open source community, either
pronunciation is correct. 3his is because -pen Source is all about the freedom to
do (hatever you (ant. So pronounce @inu= any (ay you (ant. 3he important
thing about @inu= is not ho( (e pronounce it 6 but that (e actually learn ho( to
use it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ==vii
6ha!ter %... 9o1 Microsoft became a :ranch of the NSA
8no(ledge is po(er. /t is important to become a(are of the huge ris7 facing
computer users as a result of the merger of Microsoft and the NSA. 3his chapter
describes the evolution of the ominous relationship bet(een Microsoft and the
NSA 5 and ho( these t(o monsters have merged to form a super monster.
3his chapter is divided into four sections.
%.% 9idden Links bet1een Microsoft and the NSA
4e begin (ith the Sno(den revelations and summariIe the current state of the
merger of Microsoft and the NSA by e=posing several hidden relationships
bet(een them.
%.( <h# Linux is More Secure than <indo1s
3his section e=plains (hy @inu= is the (orld>s most secure operating system 6
secure enough to offer us protection from Microsoft and the NSA.
%., 0mer5ence of the 03il 0m!ire
3his section details the horrific history of Microsoft in the years leading up to their
merger (ith the NSA.
%.' =S *rotects Microsoft Mono!ol# in trade for NSA :ackdoor
3his section describes the trial of Microsoft in ")): that led to the ruling that
Microsoft must be bro7en up 6 and ho( a s(eetheart deal (as arranged to allo(
the Microsoft Monopoly to continue 6 in trade for becoming a branch of the NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
%.% 9idden Links bet1een Microsoft and the NSA
!i" "overnment an# !i" !u$ine$$ %ave mor&%e# into !i" !rot%er.'
.ill Moyers 9une "! !"#
<histleblo1er 0d1ard Sno1den re3eals that Microsoft is hel!in5 the NSA
s!# on com!uter users
As / e=plained in the &reface, / had uncovered some disturbing facts about
4indo(s : and (as in the process of finishing a boo7 about those problems
(hen on 9une D, !"#, a ) year old computer analyst named Ed(ard Sno(den
6 (ho had (or7ed for the 0S National Security Agency ANSAB for the past four
years and had (or7ed for the 10S intelligence community2 for the past eight
years 5 released 3op Secret evidence that Microsoft has been (or7ing (ith the
NSA to spy on 0S and foreign citiIens.
httpF??(((.guardian.co.u7?(orld?!"#?<un?!D?us5tech5giants5nsa5data
/ understood immediately that the Sno(den revelations (ere the missing piece of
the puIIle / (as trying to solve. 3hey provided crucial ans(ers to most of my
remaining Kuestions and confirmed ans(ers / had already gotten. For e=ample,
one could argue that the reason for the open bac7door to the 4indo(s operating
system, created in ")):, (as to reduce pirating of bootleg copies of the 4indo(s
operating system in China. /t has long been 7no(n that :!U of all 4indo(s
programs used in China are not authoriIed by Microsoft. So it made sense that
Microsoft (ould (ant to create a (ay to stop these illegal programs from
(or7ing. / also learned that Microsoft had (ritten the latest versions of 0EF/ and
Secure .oot in about !!*.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age
-n the surface, it might appear that the purpose of 0EF/ and Secure .oot (as to
control pirating of Microsoft programs in China. 3he trouble (ith this theory is that
the 4indo(s open bac7 door, 0EF/ and Secure .oot did not (or7 very (ell to
control pirating. .oth programs created many more problems than they solved.
So (hy (ere they thereL
3he Sno(den evidence Aand in particular the 3op Secret NSA slide presentationB
revealed a completely different and much more sinister purpose to the open bac7
door, the 0EF/ start program and the Secure .oot control program. /t (as pretty
clear that the company Ed(ard Sno(den (or7ed for in ;a(aii (as nothing but a
front for the NSA (hich has an annual budget of over S: billion. /t is also clear
that the purpose of the NSA office in ;a(aii, and (hat Ed(ard Sno(den (as
doing in ;a(aii, (as to spy on the Chinese using the various tools of the &,/SM
program. 4hat (as less clear (as the role that the Microsoft open bac7 door
played in all of this.
An important clue about MicrosoftJs involvement (ith the NSA is the NSA slide
(hich indicates that Microsoft <oined the &,/SM program at its inception in !!*.
3he reason this is important is that !!* is also the year that Microsoft too7 over
the EF/ computer startup program and changed its name to 0EF/. Shortly
thereafter, in !!:, Microsoft added the controversial 1Secure .oot2 feature to
0EF/. 3he timeline and the purpose of the NSA &,/SM program fit in e=actly (ith
the 1features2 of 0EF/ and Secure .oot. Could it be that the &,/SM program (as
the hidden fist behind the 0EF/ and Secure .oot gloveL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
3his NSA slide confirms that &,/SM does not merely collect emails but can also
go into a personJs computer and collect stored data from the hard driveF
3he fact that the NSA is able to gather stored data from the hard drives of
computers means that the NSA possesses a 17ey2 approved by Microsoft in order
to access the files and programs inside of our computers through the 4indo(s
open bac7 door. / had feared that people (ould say / (as craIy to assert that
Microsoft had given a 7ey to allo( the NSA access to 4indo(s computers. 3he
above slide (as the proof / needed to support the research / had done lin7ing
Microsoft to the NSA before the Sno(den revelations.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C
9o1 the NSA do1nloads documents from <indo1s 6om!uters
-n 9uly #", !"# 'lenn 'reen(ald released documents provided by Ed(ard
Sno(den on a top secret NSA program called H7eyscore Aa7a H8SB (hich is
used to do(nload and store documents from your 4indo(s computer.
httpF??(((.theguardian.com?(orld?interactive?!"#?<ul?#"?nsa5=7eyscore5
program5full5presentation
/n !!: H7eyscore used over *!! servers at "+! sites around the (orld. 3his
NSA mass surveillance program is much larger no(.
;undreds of thousands of analysts 6 mostly (or7ing for private consulting firms 5
can do(nload all of your data (ith no prior authoriIation reKuired and no legal
(arrant from any court is reKuired. ;o( do they do thisL First, the analyst opens
the H7eyscore database and clic7s on a lin7 called 1sho( me e=ploitable
machines.2
3his is narro(ed do(n by country and then by other factors called selectors.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +
A top secret !"! guide e=plains that analysts can begin surveillance on anyone
by clic7ing a fe( simple pull5do(n menus designed to provide both legal and
targeting <ustifications. -nce options on the pull5do(n menus are selected, their
target is mar7ed for electronic surveillance and the analyst is able to revie( the
content of their communications. A simple pull do(n menu called 1Foreign
Factors2 allo(s any analyst (ithout any supervision to clic7 on a button and
select one of a doIen reasons to target anyone. -nce the analyst has the
computers they (ant to target, they can search for all 4ord documents inside of
the 4indo(s computer. 3he documents are sorted by file names <ust as you see
them (hen you are loo7ing for files.
The Three 9o! 2ules includes 03er#one in the =S
;o(ever, the 13hree ;op2 rule revealed by the NSA at a Congressional hearing
in 9uly !"# confirms that the NSA not only targets those outside of the 0S, but
also those in contact (ith those outside of the 0S Athe first hopB and those (ho
are in contact (ith those (ho are in contact (ith those outside of the 0S Athe
second hopB and those (ho are in contact (ith those (ho are in contact (ith
those (ho are in contact (ith those (ho are outside of the 0S Athe third hopB. So
if someone outside of the 0S 1friends2 a person (ho is a friend of a friend of
yours on Faceboo7, you are added to the list of targets.
/n addition, if you live (ithin "!! miles of any 0S border, you are also a target as
the 1border2 is loosely interpreted to be "!! miles deepG /n short, the targets no(
include at least ))U of the 0S population. 3he opportunities to blac7mail people
and especially elected representatives Aala ;ooverB are staggering. Another NSA
(histleblo(er indicated that the NSA has targeted nearly every member of
Congress.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D
Not only is everyone no( under surveillance, but the data collected by the NSA is
given to all 7inds of groups... including private corporationsG
NSA :lanket S!#in5 on all Americans is =nconstitutional
3he reason blan7et searches of all 4indo(s computers are illegal is that it is a
clear violation of the Cth Amendment of the 0S Constitution 6 (hich reKuires a
(arrant before any single search can be made.
'
th
Amendment to the =S 6onstitution... 3he right of the people to be secure
in their persons, houses, papers, and effects, against unreasonable searches
and seiIures, shall not be violated, and no (arrants shall issue, but upon
probable cause, supported by oath or affirmation, and particularly describing the
place to be searched and the persons or things to be seiIed.
3he Cth Amendment in the .ill of ,ights reKuires that a (arrant describe the
e=act place to be searched, the e=act persons or things to be seiIed as (ell as
1probable cause2 that a crime has been committed before a search is started.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *
-f course, the NSA claims that they did get a court (arrant. .elo( is a copy.
/n fact, in !", the government as7ed for ",:!! F/SA (arrants, including blan7et
(arrants, and the court approved all of them. Sadly, the number of innocent
Americans spied on (as in the millions. So much for 1<udicial oversight.2
4hen the Founding Fathers (rote the Fourth Amendment, they didnJt intend for
secret courts to approve secret searches based on secret testimony by secret
(itnesses (ith secret <udgments resulting in secret sentences to secret prisons.
9o1 lon5 has Microsoft been secretl# sendin5 our data to the NSA8
3he ans(er to this Kuestion came on 9une "! !"# from an article published by
Matthe( Aid called 1/nside the NSA 0ltra Secret China ;ac7ing 'roup2 in the
<ournal Foreign &olicy. 3his article claims that a sub5group of the NSA called 3A-
has 1successfully penetrated Chinese computer and telecommunications
systems for almost %> #ears.F
htt!7MM111.forei5n!olic#.comMarticlesM(/%,M/-M%/MinsideNtheNnsaNsNultraNse
cretNchinaNhackin5N5rou!8!a5eO/;/
Matthe( Aid has spent more than + years documenting the history of the NSA
and in !!) (rote a boo7 called 13he Secret SentryF 3he 0ntold ;istory of the
National Security Agency.2
The Office of Tailored Access Operations, or TAO, has successfully
penetrated Chinese computer and telecommunications systems for
almost 15 years.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :
According to Matthe( Aid>s intervie(s (ith former NSA officials, 3A->s mission
includes hac7ing into Chinese computers and 1stealing the data stored on the
computer hard drives.2 3his confirmed that 3A- started in ")): 6 shortly after
Microsoft created the open bac7 door to the 4indo(s operating system.
-ne could loo7 at the fact that Microsoft created an open bac7 door in ")): and
3A- began hac7ing Chinese computers in ")): as a remar7able coincidence.
;o(ever, at e=actly the same time, in ")):, a special 7ey (as added to the
4indo(s operating system called NSA$0Y. 3his code (as discovered in ")))
after Microsoft programmers failed to remove it from a version of 4indo(s.
httpF??(((.(ashingtonsblog.com?!"#?!D?microsoft5programmed5in5nsa5
bac7door5in5(indo(s5by5"))).html
According to Andre( FernandeI, chief scientist (ith Cryptonym of Morrisville
North Carolina, the result of having the secret 7ey inside your 4indo(s
operating system is that 1it is tremendously easier for the NSA to load
unauthoriIed security services on all copies of Microsoft 4indo(s, and once
these security services are loaded, they can effectively compromise your entire
A4indo(sB operating system1.
.ac7 (hen the NSA 8ey (as discovered in "))), Microsoft claimed it (as all an
innocent mista7e and that they (ere not giving the NSA access to the 4indo(s
operating system. ;o(ever, the NSA slide sho( released by Ed(ard Sno(den in
9une !"# ma7es it very clear that Microsoft has been directly involved (ith the
NSA since at least !!*. /n addition, if you read the history of the 3A-, you (ill
see e=ample after e=ample of ho( they (ere able to access the hard drives on
computers in China and else(here beginning in ")):. /t is obvious that 3A- (as
able to accomplish (hat they did by using the 4indo(s open bac7 door and the
NSA 7ey to the 4indo(s operating system.
Even if one believes that the 4indo(s open bac7 door and the NSA 8ey and the
3A- program are all <ust a coincidence, there are doIens of other e=amples (e
(ill describe in this boo7 (hich also indicate a hidden connection bet(een
Microsoft and the NSA. 3hese hard to e=plain events include the continuing
e=istence of the Microsoft Monopoly even after being found guilty of multiple
violations of the Sherman Antitrust Act bet(een "))D to the present.
Another important e=ample is the secret development of 0EF/ and Secure .oot 6
beginning (ith the start of the &rism program in !!* and continuing to the
present day. 4e (ill sho( that at roughly the same time, from !!* to the
present, Microsoft helped the NSA develop the Stu=net and Flame viruses used
to attac7 /ran.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )
/n addition, Microsoft has been paid hundreds of millions of dollars to be the
technical advisers to the Department of ;omeland Security and recently received
a SD!! million dollar # year contract (ith the 0S Department of Defense.
Many other articles have confirmed this rather frightening relationship bet(een
Microsoft and the NSA 5 the (orldJs largest soft(are corporation and the (orldJs
most unethical spy agency in !!* and again in !!).
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!
The NSA Death Star of Data :ases... Ten times bi55er than the *enta5on!
3he scale of the data collected by the NSA (ith the cooperation of Microsoft has
been incredible. /n <ust the #! day period bet(een March " !"# and March #!
!"#, the NSA collected # billion pieces of intelligence on more than one hundred
million Americans. 3hese revelations have made it clear that the purpose of the
Microsoft bac7 door to our computers is not merely to provide updates and hinder
pirates 6 but also to assist the government in spying on us. /t is obvious that the
main purpose of 4indo(s :, 0EF/ and Secure .oot is to permit Microsoft and
the NSA to gain an increasing level of control over all of our computers.
3he NSA 0tah Spy Center is the (orld>s largest, most e=pensive data storage
center 5 lin7ed to ! listening posts in the 0S and more overseas. 3his NSA 0tah
data center is also lin7ed to more than *! Department of ;omeland Security
1/nformation Sharing Fusion Centers2 in the 0S.
3hese fusion centers do the same thing the NSA does... spy on innocent people.
/ntelligence gathering over time has added the formation of many public5private
intelligence sharing partnerships. -ne of many <oint NSA?corporate partnerships
is the Domestic Security Alliance Council ADSACB. 3his group includes many
large corporations such as .an7 of America, .oeing, 'oogle and Microsoft.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""
/n summary, the mission of the NSA and D;S has shifted from counter terrorism
to the vague phrases 1cyber (arfare2 and 1all haIards.2 Data collected and stored
by the NSA is not used merely to stop terrorists. /n fact, much of it is used to put
do(n peaceful political protests in the 0S Asuch as -ccupy 4all StreetB and
create terror in other countries Asuch as China, &a7istan and /ranB.
(hese systems allow analysts to listen to whatever emails they want, whatever
telephone calls, )rowsin# histories, *icrosoft Word documents. !nd it+s all done
with no need to #o to a court, with no need to even #et supervisor approval on
the part of the analyst., 'lenn 'reen(ald -pedne(s.com 9uly ) !"#
*lacin5 !ublic securit# in the hands of !ri3ate for !rofit cor!orations
3he private spy firm .ooI Allen, (here Ed(ard Sno(den (or7ed, is gro(ing at
an alarming rate. 3heir revenue Anearly all from the federal governmentB gre(
from one billion dollars per year in !!! to five billion per year in !"!.
3here are no( actually commercial companies selling spying tools to allo( you
or anyone else to spy on your neighbors and start your o(n version of the NSA.
/n should be obvious by no( that the 4indo(s operating system is not safe. .ut
in the ne=t section, (e (ill loo7 at (hy the @inu= operating system is secure.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
%.( <h# Linux is More Secure than <indo1s
A6om!arin5 the securit# of Linux 1ith that of Microsoft <indo1s is not
3er# instructi3e. Microsoft has done such a terrible Eob 1ith securit# that it
is not reall# a fair com!arison.F
.ruce Schneier -pen Source and Security ")))
My concern is not so much that Microsoft (ould shut do(n all of the 4indo(s
computers 6 but rather that a group of rogue hac7ers 6 or some rogue
government 5 (ill use the vulnerability created by Microsoft to shut do(n all of the
4indo(s computers 5 crashing the economy of the 0S or the entire (orld.

'iven the Sno(den revelations, you might (onder (hether it is possible to free
ourselves from mass surveillance by the NSA even if (e s(itched from Microsoft
to @inu=. /t is true that the NSA (ill still be able to monitor our internet and phone
activity.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#
.ut in s(itching to @inu=, the NSA (ill no longer be able to reach right inside of
our computers. 3he NSA (ill not be able to copy data that is in our computers,
they (ill no longer be able to loo7 at our personal files and they (ill no longer
have the po(er to shut do(n our computers or alter the programs in our
computers. 3he primary reason @inu= is more secure than 4indo(s is because
@inu= does not have an open bac7 door (hich allo(s anyone other than you to
stop or modify your computer (ithout your permission. So moving to @inu= is at
least a partial step in the right direction.
O!en Source is a more secure de3elo!mental model
A second reason open source is more secure than Microsoft is that it is a bottom
up, community driven development model rather than a top do(n corporate
driven development model. 3hroughout history, very little innovation has come
from the top do(n. 3he top mainly (ant to protect the status Kuo. 3hey are set up
to actively discourage change and innovation.
Mean(hile, open source is bottom up in that programmers are coming up (ith
solutions for their o(n problems. 3hey then share these solutions (ith others and
the (hole community benefits and moves for(ard in a rapid cycle of innovation 6
all due to a developmental model (hich encourages multiple points of vie(.
/n a !!* presentation sponsored by 'oogle, @inus 3orvalds, the originator of the
@inu= operating system, used the follo(ing diagram to illustrate the difference
bet(een open source and closed source program developmentF
htt!7MM111.#outube.comM1atch83O'J!n$9+Aok
@inus e=plained that open source program development creates more branches
to the tree (hich leads to more chec7s and balances, better decisions, more
efficient merging of ne( ideas and a stronger, faster and more secure program.
$ou build a better community by empo(ering everyone in the community.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C
A famil# is al1a#s stron5er and more secure than an# indi3idual.
-pen source programs li7e @inu= do not have to (orry about bloating their
programs (ith comple= code intended solely to maintain a monopoly. 3hey are
free to (rite simple codes that are easier to ma7e compatible (ith other soft(are
and run faster in your computer. 3he result is that @inu= uses eight different
1security modules> (hich protect your computer from hac7er attac7s.
9o1 the Linux Securit# S#stem <orks
3he @inu= operating system consists of a 1core2 (hich is surrounded by up to :
security modules to (hich are attached doIens of application e=tensions li7e the
Firefo= 4eb .ro(ser or the @ibre -ffice 4ord &rocessing program.
different securit# modules or 1alls to !rotect the Linux 6ore
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+
Even if a hac7er is able to brea7 through one of the security (alls, they simply
run into another security (all. .ecause different 1families2 of @inu= operating
systems uses different combinations of (alls, the diversity of @inu= operating
systems ma7es it difficult for hac7ers to brea7 into a @inu= computer.
DoesnPt Linux use a securit# s#stem de3elo!ed b# the NSA8
/n !!", the NSA developed a security module (hich (as eventually
incorporated as one of : security modules available in the @inu= core. 3his has
been misreported in the press as indicating that the NSA someho( controls
@inu=. ;o(ever, this module is simply a 1permissions2 system (hich has three
levels of permissions to gain access to the @inu= core. Moreover, it is only one of
eight different security modules (hich protects the @inu= operating system. /t is
nothing li7e the NSA 8ey (hich allo(s the NSA to directly access the Microsoft
4indo(s operating system and change programs inside of your computer.
Securit# 6om!etitions... Linux (; A!!le /; Microsoft /
3here has only been a couple of official competitions comparing the security of
@inu= (ith Microsoft and Apple. 3he first (as held at a ;ac7ers conference called
CanSec4est in !!:. 3he competition, called &(n-(n, offered free computers
and a cash priIe to anyone (ho could hac7 into an Apple, Microsoft or @inu=
computer that (as placed in public vie( at the conference. -n the second day of
the three day competition, one of the C!! attendees (as able to crac7 the Mac
security system 6 (inning S!,!!! and an Apple computer. -n the third day,
another hac7er (as able to crac7 the Microsoft computer 6 (inning S"!,!!! and
the 4indo(s computer. No one (as ever able to crac7 the @inu= computer.
3his competition (as repeated in March !"# 6 but this time (ith over S# million
in priIes available. .oth the Apple and Microsoft computers (ere hac7ed. .ut
even (ith millions of dollars in priIes at sta7e, no one (as successful in ta7ing
do(n the @inu=5based Chrome -S. @inu= remains the best choice for security5
conscious des7top users. 4hat is impressive about this result is that t(o different
versions of @inu= operating systems (ere able to (ithstand three days of highly
motivated attac7s of some of the (orldJs best hac7ers.
httpF??(((.Idnet.com?linu=5triumphant5chrome5os5resists5crac7ing5attempts5
*!!!!"##"?
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D
<h# is Linux so much secure than Microsoft8
3here are many problems (ith the Microsoft business model. -ne of them is that
Microsoft (ants AneedsB access to your computer to ma7e sure you are not using
a pirated version of their soft(are. 3hey therefore allo( programs to be changed
or disabled (ithout 1root2 access. -ne of the first steps in installing a @inu=
operating system on your computer is creating a uniKue pass(ord that only you
7no(. 3his is called the 1root2 access pass(ord. 4ithout this pass(ord, there is
no (ay to add or change any of the programs. ;o(ever, 4indo(s programs can
be installed or uninstalled (ithout the consent of the administrator Athat is youB
and (ithout any root pass(ord. 3his seems to be related to the Microsoft policy
of 7eeping an open bac7 door to your computer.
6ommunit# Securit# De3elo!ment is Stron5er than To! Do1n Securit#
Security development is much more robust in an open development model than
in a closed secret model. @inu= is safer because it is open source. -n September
"+, "))), one of nationJs leading security e=perts, .ruce Schneier (rote an
important article, called -pen Source and Security, (hich e=plains (hy open
source programming (ill al(ays result in a more secure system than closed
source programming. .ruce uses the term 1algorithm.2 $ou can thin7 of this as
being the pass(ords by (hich programmers protect programs from hac7ers.
1Cryptographic2 refers to processes for securing data such as encryption.
4hat .ruce points out in this article is that open source development provides
more feedbac7 to close the (ea7nesses in a security system. .ruce has (ritten
many boo7s and articles on this sub<ect since "))) and / encourage you to visit
his (ebsite and read some of them hereF httpF??(((.schneier.com?
3he problem (ith the Microsoft model is that it is done in secrecy. 3here is very
little feedbac7 and no chec7s and balances. /t therefore results in programs
(hich are easily hac7ed. 3his is (hy / have maintained throughout this boo7 that
the entire Microsoft business model is fatally fla(ed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*
3he Microsoft Monopoly model may ma7e billions of dollars. .ut it results in
e=tremely poor 6 and even dangerous 5 products such as 4indo(s :, 0EF/ and
Secure .oot.
NSA *a#in5 Forei5n "o3ernments to ille5all# s!# on Americans
-n 9uly #" !"#, yet another Sno(den release confirmed that the NSA pays
'C;M, the largest spy agency in 'reat .ritain, S"!! million per year to spy on
0S citiIens as one more (ay to evade 0S la(s against this practice.
httpF??(((.theguardian.com?u75ne(s?!"#?aug?!"?nsa5paid5gchK5spying5
ed(ard5sno(den
9o1 6or!orations and "o3ernment 6ollude to 6ircum3ent our 6i3il 2i5hts
13here are t(o types of la(s in the 0.S., each designed to constrain a different
type of po(erF constitutional la(, (hich places limitations on government, and
regulatory la(, (hich constrains corporations. ;istorically, these t(o areas have
largely remained separate, but today each group has learned ho( to use the
others la(s to bypass their o(n restrictions. 3he government uses corporations
to get around its limits, and corporations use the government to get around their
limits...-ur elected officials are often supported, endorsed and funded by these
corporations as (ell, setting up an incestuous relationship bet(een
corporations, la(ma7ers and the intelligence community. 3he losers are us, the
people, (ho are left (ith no one to stand up for our interests.2
:ruce Schneier +ul# ,% (/%,
htt!7MM111.bloomber5.comMne1sM(/%,)/?),%Mthe)!ublic)!ri3ate)
sur3eillance)!artnershi!.html
3here are many more problems (ith 4indo(s : (hich (ill cover in the ne=t
chapter. .ut hopefully you are getting the idea that 4indo(s : is nothing at all
li7e any previous version of 4indo(s. /t has been Kuite a (ild year for anyone
using Microsoft 4indo(s. .ut from the signs of recent developments Adescribed
later in this boo7B, things (ill only get (orse in the coming year. ,emember, you
only have until April !"C 6 less than one year 5 to figure out (hat you are going
to do to replace your 4indo(s H& operating system. And if you (ant to ta7e bac7
control over your computer, you have less time than that. So 7eep reading... and
may the source be (ith youG
<hatPs Next8
3he ne=t section begins (ith clarifying (hat an operating system is and then
provides a brief history of (hat has happened to the 4indo(s operating system
and ho( (e have gotten to (here (e are today. /t is the part of the boo7 / (rote
before learning about the Sno(den revelations on 9une D, !"#.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":
%., 0mer5ence of the 03il 0m!ire
K<e need to slau5hter No3ell GD2 DOSH before the# 5et stron5er....4f #ouBre
5oin5 to kill someone; there isnBt much reason to 5et all 1orked u! about
it and an5r#. You Eust !ull the tri55er. An# discussions beforehand are a
1aste of time. <e need to smile at No3ell 1hile 1e !ull the tri55er.K
Microsoft senior manager, David Cole, sent out an email defining a plan to
sabotage a competing operating system called D, D-SF September #!, "))",
3his is a boo7 / never thought / (ould have to (rite. ;o(ever, the fatal fla(s of
the ne( 4indo(s : operating system Ano( 7no(n as 4indo(s :." .lueB and the
0EF/ 6 Secure .oot Start program 5 have compelled me to e=plain (hy the @inu=
operating system is a much safer and more reliable option. /f an honest history of
personal computers is ever (ritten, the one year period from 9une !" to 9une
!"# (ill go do(n as a 1turning point2 in the change from the 4indo(s
commercial operating system to the @inu= free open source operating system. /n
a later chapter, (e (ill describe the advances made by @inu= during the past
year. .ut as great as these improvements have been, it (ould not have mattered
(ithout an even greater decline in the safety and function of the 4indo(s
operating system over the past year.
For nearly ! years, / (as a pretty loyal Microsoft 4indo(s user. From "):+ to
!!C, / (as an Adult Education instructor at .ellevue College in 4ashington
State 6 <ust a fe( miles from Microsoft corporate headKuarters in ,edmond
4ashington. More recently, / have taught courses in (eb design and computer
programming at Seattle Community College. / also do (eb design and consulting
for doIens of small business o(ners. -ver the past : years, / have taught
thousands of students 6 including hundreds of students (ho (or7 at Microsoft. /
(as influenced by my o(n negative e=periences (ith 4indo(s : and 4indo(s
:." .lue. .ut / am not (riting this boo7 based merely on those e=periences, / am
(riting it based on my e=periences (ith my thousands of students. / am certain
that 4indo(s : is so difficult to learn and use that many of my former students
(ill never be able to get past the obstacles 4indo(s : puts in their (ay. / (ant to
provide my students and others li7e them (ith an easier, safer, less e=pensive
and more reliable alternative.
My e=perience (ith Microsoft goes all the (ay bac7 to floppy discs and the
Microsoft Disc -perating System 6 also 7no(n as MS5D-S that (ere popular in
the "):!Js. / have also used nearly every version of 4indo(s.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")
,/ Years of Microsoft 9its Q Misses.... %&, to (/%,
/ had a negative e=perience (ith 4indo(s Eista. So / continued using 4indo(s
H& until 4indo(s * came out. For the past four years, / have used 4indo(s *
(ith -ffice !"!. / use it : hours a day D days a (ee7 to (rite articles and build
(ebsites. So until the summer of !", / (as a pretty typical and loyal Microsoft
4indo(s user.
<hat is an o!eratin5 s#stem8
-perating systems are the foundation of every computer. 3hey are the interface
bet(een computer hard(are and computer soft(are. 3hey affect ho( fast your
computer processes data and ho( organiIed the data is after it is processed.
-perating systems also have a great effect on the appearance of your computer
screen, ho( easy it is to use your computer and (hether or not your computer
(ill be safe from attac7s from viruses and hac7ers.
3here are three ma<or types of operating systems for personal computers. 3he
most common is the 4indo(s operating system. 3he second most common is
the Apple operating system. And the third most common is the @inu= operating
system A(hich includes the 'oogle Chrome operating systemB.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !
4ithin the 4indo(s operating system, there are several versions 6 (ith the t(o
most popular being 4indo(s H& and 4indo(s *. Currently over D!! million
people use the 4indo(s H& operating system and another :!! million use the
4indo(s * operating system. .oth the Apple -S and the 'oogle -S are related
to or based on the free open source @inu= operating system. /n fact, the most
popular laptop computer sold by AmaIon, the 'oogle Netboo7 is based on the
@inu= operating system. So millions of people are already using the @inu=
operating system6 even if they donJt 7no( itG
A :rief 9istor# of *ersonal 6om!uter 6ommercial O!eratin5 S#stems
Much of the follo(ing history (as ta7en from legal documents associated (ith
several la(suits including 0S v Microsoft A"))CB, Caldera versus Microsoft
A"))DB, 0S v Microsoft A"))*B, 0S v Microsoft A")):B and Comes v Microsoft
A!!*B. 4e cover the history of open source operating systems in Section #.
;ere (e cover ho( the Microsoft Monopoly (as created by sabotage another
much better commercial operating system.
httpF??thismatter.com?articles?microsoft.htm
httpF??(((.albion.com?microsoft?findings5".htmlVpgf/d5"!#":##
httpF??techrights.org?(i7i?inde=.php?&etitionWte=tW5Wovervie(
See the boo7 by 4endy ,ohm called 13he Microsoft FileF 3he Secret Case
Against .ill 'ates,2 published by ,andom ;ouse, September ")):.
Also seeF
httpF??ne(s.bbc.co.u7??hi?science?nature?"+)*C.stm
httpF??lists.essential.org?")):?am5info?msg!CD:!.html
httpF??(((.7ic7assgear.com?Articles?Microsoft.htm
httpF??online.(s<.com?article?S.)!C"**DC+*!"#D++!!.html
httpF??(((.ma=frame.com?D,?/nfo?fullstory?caWsuesWms.html
%&?, . %&&, Microsoft Dirt# Tricks Destro# Doctor Dos
/n ")C, 'ary 8ildall 1the father of &C soft(are2 (as born in Seattle 4ashington.
/n ")*, he graduated (ith a &;D in computer science from the 0niversity of
4ashington. -ne year later, in ")*#, 'ary developed a program called C&?M
AControl &rogram for MicroprocessorsB. 3his (as the first operating program for
personal computers. /n ")*D, 'ary started a company called Digital ,esearch,
/nc to promote this ne( operating system (hich he called D,5D-S ADigital
,esearch Disc -perating SystemB.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
C&?M Aa7a D,5D-SB Kuic7ly became the dominant personal computer operating
system in the late ")*!Js and early "):!s 6selling nearly one million copies.
'ary also developed a system called ./-S Aor .asic /nput -utput SystemB (hich
he used to start D, D-S. ./-S is a program on a chip (hich is separate from
the hard drive and is still used today to start most computers.
/n November ")**, .ill 'ates visited 'ary 8ildall and obtained a license to use
C&?M for S+!,!!! in cash. /n 9uly "):!, /.M contacted .ill 'ates because they
needed an operating system for their ne(ly planned personal computer. 'ates
supposedly told /.M to contact 8ildall. ;o(ever, /.M and 8ildall (ere unable to
agree on terms for a C&?M license. Some believe this (as because /.M got a
1better offer2 from .ill 'ates. -thers believe the fi= (as in all along.
Three 2easons to :elie3e the 4:M Deal 1ith Microsoft 1as 2i55ed
4hy (ould one of the (orld>s most important companies 5 /.M 6 developing one
of their most important products, the &ersonal Computer Aa7a the &CB, ma7e a
deal to produce an operating system for the &C (ith a tiny soft(are company
that had never produced a single operating systemL Some have pointed out that
.ill 'ates mother, Mary 'ates, (as good friends (ith /.M &resident 9ohn -pel
and she as7ed him to meet (ith her son. 4hile this is a nice story, it is not ho(
ma<or corporations do business. 4hat is rarely pointed out is that .ill 'ates
Senior (as a corporate attorney for technology based la( firm. As such, he li7ely
understood that /.M might face 1monopoly2 charges if they tried to control both
the hard(are and the soft(are for the &C. /.M (as under under a ")+D Consent
Decree (hich in turn (as based on a ")#+ Sherman Antitrust 9udgment against
/.M. /.M (as also litigating a ")D) MonopoliIation case against it 6 a case that
(as not resolved until "):.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age
1/.M had e=cluded competition in many (ays, including by systematically
acKuiring control over potential competitors and patents made by others... 3he
principal ob<ects of the AconsentB decree are to e=tirpate the practices that have
caused monopoliIation and to restore (or7able competition in the mar7et.2
httpF??(((.<ustice.gov?atr?cases?f!:!!?!:"C.htm
4ith the 0S 9ustice Department hanging over their heads, (ho could /.M trust to
help them control this ne( mar7etL Not 'ary 8ildall 6 (ho (as demanding over
"!U of the sales price of the &C to use his operating system. Mean(hile, .ill
'ates (as (illing to ma7e a deal for less than one percent of the sales price.
Never mind that the deal involved an operating system that .ill 'ates did not
even o(nG /t seems that an inside deal (as rigged all along to have Microsoft
pirate 'ary 8ildall>s operating system for /.M.
3he basis for this theory is that in April "):!, a programmer named 3im &aterson
(ith a company called Seattle Computer &roducts created a clone or mirror of
C&?M (hich 3im called MD-S 6 (hich stood for Muic7 and Dirty -perating
System. /n 9uly "):!, .ill 'ates 9unior met secretly (ith /.M representatives to
provide an operating system for a ne( computer (hich /.M had not even made
yet. 3hen, on 9anuary D, "):", Microsoft paid S+,!!! for the right to sub5license
this system. 3hen on 9uly *, "):", <ust before the public launch of the /.M &C,
Microsoft bought MD-S outright from &aterson for S+!,!!!.
Microsoft then gave /.M a license to use MD-S for free 6 but retained the right
to charge /.M competitors for use of this ne( operating system. So MS5D-S
began its monstrous life as a clone of D,5D-S 6 a pattern that Microsoft has
continued (ith many of its other products. 'ary 8ildall (as livid. ;e later saidF
,-ere we were, in #ood faith, in ne#otiations with IB* and they .Bill ates and
*icrosoft/ came in with a complete rip0off.,
4n his autobio5ra!h#; $ildall called MS)DOS A!lain and sim!le theftF
because its first (- s#stem calls 1orked exactl# the same as D2 DOS.
3his history (as described in a chapter of a !!C boo7 by ;arold Evans called
13hey Made AmericaF From the Stream Engine to the Search Engine.2. .elo( is
a Kuote from an article describing this boo7F
2Evans related ho( &aterson RXtoo7Y >a ride on> 8ildall>s operating system,
appropriated the >loo7 and feel> of X8ildall>sY C&?M operating system, and
copied much of his operating system interface from C&?M.R
httpF??(((.theregister.co.u7?!!*?!*?#!?msdosWpaternityWsuitWresolved?
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
3he Evans boo7 led to a defamation la(suit by &aterson 6 (ho claimed that his
system (as not the same as D, D-S. ;o(ever, the federal <udge in the case,
3homas Pilly, found in favor of Evans stating 1truth is an absolute defense to a
claim of defamation.2 3he 9udge also agreed that &aterson copied D, D-S,
including the first D functions, although &aterson renamed several of these. For
e=ample, 8ildall>s R,ead SeKuentialR function became RSeKuential ,eadR in MS
D-S (hile R,ead ,andomR became R,andom ,eadR.
The 4:M *ersonal 6om!uter...introduced to the !ublic on Au5ust %( %&%
For the first fe( years, the /.M &C initially came out to the public (ithout any
operating system. 3o settle a legal threat from 'ary 8ildall, /.M offered both MS
D-S and D, D-S as options. .ut /.M priced MS D-S at SC! and D, D-S at
S+! 6 leading to a big consumer preference for MS D-S. Despite the fact that
/.M gave Microsoft a huge price advantage, use of D, D-S continued to be a
significant factor as, due to several ongoing improvements made by 'ary 8ildall,
D, D-S (as a much better operating system than MS D-S.
%&&% Microsoft uses Mono!ol# !o1er to kill D2 DOS
/n the summer of "))", 'ary 8ildall sold D, D-S to Novell, a manufacturer of
high end servers and net(or7 systems. Microsoft recogniIed that this (as a
threat to their emerging monopoly and immediately tried to buy Novell. 4hen
Novell refused to be bought and instead appeared to be (or7ing out a deal (ith
/.M to promote D, D-S instead of MS D-S, Microsoft responded in the fall of
"))" by sabotaging their o(n operating system. 3he goal of this sabotage (as to
fool manufacturers and developers into thin7ing that D, D-S (as not reliable
and (as not compatible (ith the Microsoft operating system.
According to court documents in the Caldera v Microsoft "))D la(suit, here is
ho( Microsoft managers carried out this plotF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C
First, contrary to standard industry practice, Microsoft refused to give Novell 6 or
anyone doing business (ith Novell and D, D-S 6 a beta copy of their ne=t
version called 4indo(s #.". Second, Microsoft falsely stated that they did not
test D, D-S and thus could not insure it (as compatible (ith 4indo(s #.".
3hird, and most important, in December "))", a Microsoft programmer named
Aaron ,eynolds inserted a secret encrypted code into the final 4indo(s #." beta
6 a mar7eting release for computer manufacturers, revie(ers and developers 6
that triggered a fa7e error message (henever a computer (as running D, D-S
(ith 4indo(s. Microsoft sent out thousands of copies of this sabotaged 4indo(s
#." beta program 7no(ing it (ould cause revie(ers and computer manufacturers
to thin7 there (as a problem (ith D, D-S. 3his plot remained hidden until a
la(suit against Microsoft in "))D by Caldera, (hich had bought D, D-S from
Novell. .elo( is a summary of the evidenceF
-n September * "))", a senior manager at Microsoft, .rad Silverberg, sent an
email to 9im Allchin, another manager at Microsoft (ith concerns about D, D-SF

RAfter /.M announces support for dr5dos at Comde=...my best hunch is that they
(ill offer dr5dos as the preferred solution...they (ill also probably continue to
offer msdos at S"D+ Adrdos for S))B. drdos has problems running (indo(s
today, and / assume (ill have more problems in the future.R
/n plain English, Microsoft (as (orried that /.M might be having second thoughts
about giving too much po(er to Microsoft and had made a s(eetheart deal (ith
Novell to undercut 4indo(s by offering D, D-S at a lo(er price than 4indo(s.
Strangely, at the time and contrary to the claim in the above email, D, D-S did
not have any problems running 4indo(s. .ut that (as about to change.
9im Allchin sent .rad Silverberg a reply emailF
R$ou should ma7e sure it has problems in the future. F5BR.
-n September #!, "))", another Microsoft senior manager, David Cole, sent out
an email defining a plan to sabotage D, D-SF
R4e should surely crash the system... <he approach we will ta$e is to detect &>
&!2 / and refuse to load. <he error messa"e should be somethin" li$e =In6alid
de6ice dri6er interface.?Maybe there are several very sophisticated chec7s so
competitors get put on a treadmill... aaronr had some pretty (ild ideas... 3he
less people 7no( about e=actly (hat gets done the better.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +
Mr. Cole, Mr. Silverberg, and other Microsoft senior managers (ent on to discuss
ho( they (ould conceal the sabotaging code from the press and hide these
efforts from the public. 3he plan (as to blame the problems on D, D-S.
/n the ne=t t(o months, 4indo(s programmer, Aaron ,eynolds, a7a aaronr, did
the dirty (or7 of planting the secret cyber bomb inside of 4indo(s #." beta
(hich (as released to thousands of developers, revie(ers and computer
manufacturers in December "))". 3he damaging code (as encrypted 6 the only
lines of encrypted code in 4indo(s #.". .ut the author of the code left one line
unencrypted. 3hat line (as AA,D 6 the letters that 4indo(s developer Aaron
,eynolds used to tag his code.
3he function of the encrypted code (as a mystery until "))# (hen soft(are
sleuth Andre( Schulman bro7e the code and discovered its true purpose. ;e
(rote an article about it for Dr. Dobbs 9ournal. Mr. Schulman found that the code
searched for t(o tiny differences bet(een MS5D-S and D,5D-S, and (hen it
discovered these differences, it froIe the computer.
-n February "! ")), an internal Microsoft memo by .rad Silverberg that (as
released in the "))D la(suit e=plained the purpose of the malicious codeF
R4hat the guy is supposed to do is feel uncomfortable (hen he has bugs,
suspect the problem is D,5D-S and go out and buy MS5D-S and not ta7e the
ris7.R
@ater that year, Microsoft disabled the bug (hen it released 4indo(s #." to the
public. ;o(ever, by this point, the harm to the reputation of D, D-S had already
been done. Sadly, the Microsoft sabotage plan convinced computer
manufacturers to not ship D, D-S causing D, D-S sales to plummet.
At the !!D Comes versus Microsoft trial, the plaintiffs introduced the follo(ing
email from Microsoft Manager, 9im Allchin dated September ": "))#.
R4e need to slaughter Novell AD, D-SB before they get stronger..../f you>re
going to 7ill someone, there isn>t much reason to get all (or7ed up about it and
angry. $ou <ust pull the trigger. Any discussions beforehand are a (aste of time.
4e need to smile at Novell (hile (e pull the trigger.R
3he attorney for the !!D Comes versus Microsoft case (ent on to say...
1Microsoft is not <ust an aggressive competitor. /t is a competitor (ho is (illing to
brea7 the la( to destroy competition. 1
-n 9uly "" "))C, at the age of +, 8ildall suddenly died. /t (as reported that he
1fell in a bar and hit his head.2 /t (as also reported that he 1had a heart attac72
but the autopsy (as unable to determine the e=act cause of death. 8ildall (as
buried at Evergreen 4ashelli cemetery in North Seattle.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D
%&&, Microsoft uses Mono!ol# !o1er to kill <ord *erfect
3he ne=t challenge to the Microsoft Monopoly (as a (ord processor called 4ord
&erfect 6 (hich until "))# had a higher mar7et share than Microsoft 4ord. -ne
of the purposes for the constant model changes in 4indo(s (as to create
incompatibility (ith 4ord &erfect. Novell, (hich o(ned 4ord &erfect, recently
brought a la(suit against Microsoft for this predatory practice. As evidence that
Microsoft used model changes to give 4ord and -ffice an advantage, Novell
produced a "))C email from .ill 'ates that statesF
R/ have decided that (e should not publish these e=tensions. 4e should (ait
until (e have a (ay to do a high level of integration that (ill be harder for li7es
of Notes, 4ord&erfect to achieve, and (hich (ill give -ffice a real
advantage . . . 4e can>t compete (ith @otus and 4ord&erfect?Novell (ithout
this.R.... .ill 'ates "))C
3he failure to publish the e=tensions meant that 4ord &erfect (as not compatible
(ith 4indo(s )+ (hen it (as released in "))+ 6 and that led to the death of
4ord &erfect as sho(n on the follo(ing chartF
Market Share of <ord *erfect 3ersus <ord %&- to %&&?
'raph from Stan @iebo(itI, 0niversity of 3e=as at Dallas
httpF??lo(endmac.com?musings?!:mm?rise5of5microsoft5monopoly.html
%&&> to %&& Microsoft declares A1arF on Netsca!e Na3i5ator
/n the early "))!Js, Microsoft employed similar predatory tactics to eliminate
competition from several other popular programs (hich competed (ith -ffice.
.ut none of these attac7s compared to (hat (as coming ne=t. /n "))+, Microsoft
began (hat (as called the 1.ro(ser 4ars2 on a tiny company called Netscape. /t
(as a bit li7e the 0S going to (ar against 'renada as it (as not really a (ar at
all. ,ather it (as more li7e a Mobster ;it against a small grocery store cler7.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *
4eb bro(sers are used to help people navigate the internet. 3oday, the three
most common (eb bro(sers are Microsoft /nternet E=plorer, 'oogle Chrome and
MoIilla Firefo= 6 a (eb bro(ser (hich used to be called Netscape Navigator.
3he internet began in ")) and one year later, in "))#, the first graphical (eb
bro(ser for the general public (as released by students at the 0niversity of
/llinois. 3he (eb bro(ser (as called Mosaic.
/n "))C, members of the Mosaic team formed a ne( company called Netscape,
to produce a commercial version of Mosaic. /n December "))C, Netscape
introduced Navigator (hich Kuic7ly became very popular.
Microsoft did not introduce /nternet E=plorer until August "D "))+ (ith the
release of 4indo(s )+.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :
.et(een "))+ to"))*, Microsoft (aged an all5out (ar on Netscape (hich
resulted in /nternet E=plorer becoming the dominant (eb bro(ser 6 despite the
fact that Navigator (as much better in terms of accurately displaying (ebsitesF
httpF??(((.(ired.com?specialWmultimedia?!!:?mfWchromeWbro(ser(arsW"D"!
%&&- 6aldera 3ersus Microsoft
-n 9uly C, "))D, the ne( o(ner of D, D-S, called Caldera, sued Microsoft for
illegal conduct (hich 1destroyed competition in the computer soft(are industry.2
3he "))D Caldera la(suit (as based on the "))C 0S government la(suit (hich
found that Microsoft e=clusionary contracts violated federal la(s. /n the "))+
Microsoft consent decree, Microsoft agreed to stop its predatory practices 6 but
continued to use them. 3he "))D Caldera la(suit called the federal consent
decree 1too little, too late...No single organiIation should have absolute po(er.2
Caldera noted that D,5D-S sales doubled from S"+ million in "))! to S#! million
in "))". /ts sales in the first Kuarter of ")) soared again, to S"+ million in <ust
the first three months 6 an annualiIed rate of SD! million. .ut by the final Kuarter
of ")), D, D-S sales collapsed to <ust S".C million 6 an annualiIed rate of <ust
SD million 5 effectively destroying D, D-S.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )
3he Caldera la(suit also described a Microsoft misleading practice called
1Eapor(are.2 /n May "))! Microsoft issued a press release promising that MS
D-S + (ould soon offer features similar to D, D-S +. 3he actual MS D-S +
(as delivered in 9une "))", a year after it (as promised. Even then, it lac7ed the
comparable features. 3hus, the term vapor(are meant promoting a soft(are
product (hich does not actually e=ist in order to maintain mar7et share.
/n the ne=t section, (e (ill provide more details about ho( Microsoft destroyed
real innovators such as Netscape. .ut (hat must be understood is that this (as
not a competition (ith a level playing field among eKuals. /t (as blac7mail and
corruption intended to maintain the Microsoft monopoly (ith the 4indo(s
operating system.
3he only good ne(s is that 4indo(s : is so bad and so difficult to use that it (ill
finally open the door to customers demanding that manufacturers install @inu= as
an option on the computers that they sell.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!
%.' =S *rotects Microsoft Mono!ol# in trade for NSA :ackdoor
AMicrosoft enEo#s mono!ol# !o1erF and used that !o1er to Aset the !rice
of <indo1s substantiall# hi5her than that 1hich 1ould be char5ed in a
com!etiti3e market R 1ithout losin5 so much business as to make the
action un!rofitable.F
9udge 3homas &enfield 9ac7son November "))) Findings of Fact
/n this section, (e (ill revie( the legal actions bet(een Microsoft and the 0S
Department of 19ustice2. 3hese actions resulted in the 0S government protecting
the Microsoft Monopoly 6 despite numerous violations of the Sherman Anti5trust
Act 5 in trade for Microsoft giving the NSA a bac7door to the 4indo(s operating
system.
%&&' =S 3ersus Microsoft Gaka Microsoft Act 4H
-n 9uly "+, "))C, <ust four days after the sudden death of 'ary 8ildall, the 0S
Department of 9ustice AD-9B sued Microsoft for its predatory actions in using its
monopoly position to destroy D, D-S and 4ord &erfect. Sadly, the D-9 also
(or7ed out a >s(eetheart deal2 Consent Decree (ith Microsoft. ;o(ever, in
February, "))+, trial court 9udge Stanley Spor7in re<ected the s(eetheart deal.
;e found Microsoft guilty of violating several sections of the Sherman Antitrust
Act and ordered Microsoft to stop reKuiring computer manufacturers to enter into
straight<ac7et e=clusionary contracts. Microsoft appealed claiming the <udge (as
biased against them. /n 9une "))+, the Court of Appeals reversed the trial court>s
decision, sided (ith Microsoft and replaced 9udge Spor7in (ith 9udge 3homas
&enfield 9ac7son 6 (ho (as instructed to sign the toothless s(eetheart deal that
Microsoft had (or7ed out. 3his deal failed to punish Microsoft for past
destructive actions 6 as long as they promised not to do it againG 3he in7 (asn>t
yet dry on the agreement (hen Microsoft (as again destroying competitors.
%&&? =S 3ersus Microsoft Gaka Microsoft Act 44H
/n "))*, the 0S Department of 9ustice sought to have Microsoft held in contempt
for violating the "))+ Consent Decree 6 noting that Microsoft (as using the
same straight<ac7et e=clusionary contracts to destroy Netscape as they had used
to destroy D, D-S, 4ord &erfect and many other companies. Despite the
Federal District CourtJs entry of a preliminary in<unction on December "", "))*,
Microsoft publicly announced on December "+, "))* that any computer ma7er
that did not agree to license and distribute /nternet E=plorer could not obtain a
license to use MicrosoftJs 4indo(s operating system. Microsoft apparently 7ne(
that the 1fi= (as in2 and (hatever the trial court decided (ould be overturned by
the Court of Appeals. /n early ")):. the Court of Appeals reversed the trial court
and Microsoft (as again free to do (hatever it (anted.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"
%&& =S 3ersus Microsoft Gaka Microsoft Act 444H
-n May ":, ")):, the tactics used by Microsoft to 7ill Netscape led to a la(suit
brought by t(enty states against Microsoft. -n November + "))), federal <udge
3homas &enfield 9ac7son issued more than one hundred pages of findings. 3his
summary of (hat Microsoft did to Netscape Navigator is a chilling account of the
dangers of allo(ing any company to have monopoly po(er over any mar7et.
httpF??(((.<ustice.gov?atr?cases?f#:!!?ms<udge=.htm
:ill "ates Lau5hs and +okes 1hile testif#in5 at the =S Iersus Microsoft
trial on Au5ust (? %&&
Did :ill alread# kno1 that the Afix 1as inF re5ardless of 1hat ha!!ened at
this trial8 <atch the 3ideo of his comments and decide for #ourself.
.ill 'ates (as on the stand for about D hours. $ou can see the first three hours
.ill 'ates evading Kuestions on $outube from the follo(ing lin7sF
httpF??(((.youtube.com?(atchLvOmWm"KdKieE
httpF??(((.youtube.com?(atchLvO3yM*,p0Dc;c
httpF??(((.youtube.com?(atchLvO:4SvN,n<r)C
/n the third video, .ill as7s the attorney to define the (ord 1definition.2
For a Kuic7 overvie( of .ill>s comments, see the follo(ing + minute videoF
httpF??(((.youtube.com?(atchLvOe8c&=<D+to
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
At the trial, Microsoft produced video tapes (hich it later had to admit had been
falsified. During the trial, /ntel Eice &resident, Steven Mc'eady Kuoted Microsoft
Eice &resident &aul MaritI as stating that MicrosoftJs intention (as to 1cut off
NetscapeJs air supply2 by giving a(ay a clone of Netscape Navigator for free.
Driving Netscape out of business cost Microsoft hundreds of millions of dollars 6
and eventually even billions of dollars.
Netscape>s air supply (as their revenue. Microsoft (as able to use their
monopoly po(er to completely shut off Netscape>s revenue in less than # years.
httpF??(((.<ustice.gov?atr?cases?f")!!?"))).htm
3he <udge found that 1Microsoft en<oys monopoly po(er2 and used that po(er to
1set the price of 4indo(s substantially higher than that (hich (ould be charged
in a competitive mar7et Z (ithout losing so much business as to ma7e the action
unprofitable.2 Microsoft then used the artificially inflated price of 4indo(s to
offset their huge losses on /nternet E=plorer. 3he court also found that Microsoft
used variable pricing schemes to re(ard computer manufacturers (ho helped it
maintain its monopoly and punish manufacturers (ho offered competing
products.
3he court also found that in the summer of "))+, Microsoft also placed obstacles
in the path of Netscape in order to ma7e it difficult for Netscape to develop a (eb
bro(ser (hich (as compatible (ith 4indo(s )+. /n t(o meetings in 9une "))+,
Microsoft openly (arned Netscape leaders to not compete (ith /nternet E=plorer
6 using both threats and bribes.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##
4hen Netscape continued to develop Navigator, Microsoft (ithheld crucial
information from Netscape for three months 6 until -ctober "))+ 6 ma7ing it
impossible for Netscape to ma7e a bro(ser compatible for 4indo(s )+ until after
the crucial Christmas buying season. 3his (as similar to the tactics Microsoft had
used earlier to destroy D, D-S and 4ord&erfect. /n addition, in violation of the
"))C Consent Decree, the court described in detail ho( Microsoft used their
monopoly position along (ith a combination of bribery and blac7mail to arrange
1e=clusive contracts2 to use and promote /nternet E=plorer (ith #! leading
internet companies and the top ! computer manufacturers. /nterestingly, the
combination of all of these e=clusive contracts, s(eetheart deals and blac7mail
schemes li7ely cost Microsoft billions of dollars.
An 4m!ortant @uestion7 <h# did Microsoft s!end billions to control the
bro1ser market8
3he <udge concluded that the reason Microsoft destroyed Netscape (as to
control the mar7et for internet applications. ;o(ever, this point of vie( does not
ma7e any sense for several reasonsF
First of all, even today, "+ years after the trial, there is very little money to be
made in bro(ser applications.
Second, Netscape (as not ma7ing that much money compared to (hat Microsoft
(as already ma7ing. 3oday, all (eb bro(sers are given a(ay for free. 4hy (ould
anyone (ant a monopoly in a mar7et that did not ma7e any moneyL
3hird, bro(ser development (as undergoing rapid changes due to the ever
changing nature of (ebsites that the bro(sers needed to load. 3his rapid change
is still going on today. 3he overhead cost of supporting bro(sers (as and still is
e=tremely high. So the bro(ser mar7et has huge costs and very little return on
investment.
3he <udge thought that Microsoft simply (anted to maintain a monopoly on
everything and that Netscape Navigator might at some point be able to compete
(ith the 4indo(s operating system. .ut this is nonsense because bro(sers are
completely different from operating systems. /t made sense for Microsoft to 7ill
D, D-S because D, D-S (as a direct threat to the Microsoft 4indo(s
monopoly. /t also made sense for Microsoft to 7ill 4ord&erfect because
4ord&erfect (as a direct threat to MicrosoftJs most profitable product 6 MS
-ffice.
.ut it made no sense at all for Microsoft to spend hundreds of millions of dollars
6 even billions of dollars 5 and brea7 numerous federal la(s 5 in an effort to ta7e
over the bro(ser mar7et.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C
<h# did Microsoft 5i3e u! se3eral extremel# !rofitable mono!olies in order
to obtain an un!rofitable mono!ol#8
-ne of the most puIIling aspects of MicrosoftJs actions in "))D (as their
(illingness to ma7e deals (ith A-@ in order to 7ill Netscape. -n March !, "))D,
A-@ entered into an e=clusive partnership (ith its leading competitor Microsoft to
promote /nternet E=plorer. 3his (as a deal (hich .ill 'ates had strongly
opposed <ust t(o months earlier in 9anuary "))D. So (hat changed bet(een
9anuary and March of "))DL
Microsoft accorded A-@ free des7top placement that undermined its o(n MSN.
3he March " "))D agreement prohibited A-@ from e=pressing or implying to
subscribers or prospective subscribers that they could use Navigator (ith A-@.
Nor did it allo( A-@ to include, on its default page or any(here else, instructions
telling subscribers ho( to reach the Navigator do(nload site. /n order to gain
A-@>s acceptance of these restrictions,
3his deal is e=tremely unusual because Microsoft had also spent hundreds of
millions of dollars building MSN 6 (hich (as a direct competitor to A-@. 0nli7e
the bro(ser mar7et, people (ere (illing to pay hundreds of dollars per year for
internet provider email service. Even a + year old could see that it (ould be much
better to monopoliIe the internet provider mar7et than to monopoliIe the bro(ser
mar7et. Still, Microsoft agreed to promote A-@ right on the 4indo(s start screen
in order to get A-@Js agreement to promote /nternet E=plorer to their customers.
4hy either company (ould agree to promote their primary competitor in order to
7ill Netscape is a Kuestion (hich deserves to be loo7ed at more closely. /f this
(as only about monopolies and money, Microsoft never (ould have promoted
A-@ at the e=pense of MSN.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+
%&&? Microsoft :lackmails A!!le
Microsoft (ent even further in their Kuest to destroy Netscape by blac7mailing
their number one operating system competitor, Apple. From "))+ to "))D, Apple
promoted Netscape by including it as the default (eb bro(ser on every computer
they sold. /n early "))*, Microsoft threatened to discontinue the Apple version of
-ffice unless Apple s(itched to the /nternet E=plorer (eb bro(ser. 3his (ould
have cost Microsoft hundreds of millions of dollars, destroyed Apple and angered
millions of Apple computer users 6 and certainly lead to an anti5trust la(suit.
/nstead, in 9uly "))*, Apple fired their &resident 'il Amelio, A(ho had opposed
caving in to MicrosoftB, and replaced him (ith Steve 9obs 6 (ho promptly agreed
to MicrosoftJs demands by s(itching from Netscape to /nternet E=plorer. 4hy
(ould Microsoft endanger even their highly profitable -ffice monopoly to go after
a mar7et (hich made no moneyL
3he ne=t year, in March ")):, Steve 9obs terminated AppleJs -pen Doc
program, ma7ing Apple even more dependent on MS -ffice. 4hy (ould Steve
9obs do such a thing less than one year after .ill 'ates used MS -ffice to
blac7mail Apple into promoting a bro(ser that Steve 9obs 7ne( (as inferiorL
4ith Apple canceling -pen Doc, Microsoft -ffice (as left (ithout substantial
competition until the emergence of -pen -ffice in -ctober !!". Mean(hile,
Microsoft sho(ed no interest in the emerging search engine mar7et 6 (hich (as
soon ta7en over by 'oogle. 3his (as another highly profitable mar7et. 4hy didnJt
Microsoft go after 'oogle li7e they (ent after NetscapeL 'oing after Netscape at
the e=pense of these four other much more profitable mar7ets (ould eventually
cost Microsoft billions of dollars. So (hy did they do itL 4hy (as Microsoft so
motivated to destroy NetscapeL
<h# did AOL bu# Netsca!e for S' billion and then continue to !romote
4nternet 0x!lorer . essentiall# thro1in5 a1a# S' billion8
-n November C, ")):, in an e=tremely surprising move, A-@ purchased
Netscape for over SC billion in A-@ stoc7. ;o(ever, even after this purchase,
A-@ continued to promote /nternet E=plorer 5 over Netscape Navigator, a product
(hich A-@ no( o(ned.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D
3he claim (as that A-@ 1needed its relationship (ith Microsoft.2 3he fact is that
Microsoft had brought in fe(er than one million of A-@Js ten million customers in
")):. 3he other nine million A-@ got on its o(n. Adding Netscape as a mar7et
base and promoting Netscape (ould have given A-@ millions more customers
than they got from Microsoft. /t therefore appears that the purpose of spending
SC billion to buy Netscape (as to drive Netscape out of business 6 no matter the
costG 4hy did A-@ do thisL Certainly A-@ had no interest in helping Microsoft
achieve a bro(ser monopoly... -r did theyL
<hat caused Microsoft to chan5e its mind about the im!ortance of
bro1sers8
/n early "))+, Microsoft thought so little of the bro(ser mar7et that they had only
D programmers (or7ing on /nternet E=plorer ". .y "))), they had more than one
thousand programmers (or7ing on /nternet E=plorer C. /n 9anuary "))D, .ill
'ates (as strongly opposed to ma7ing a deal (ith A-@. 3hen in March "))D, he
suddenly changed his mind. 4hat happened that caused this sudden changeL
<h# did Microsoft decide to !lace 4nternet 0x!lorer inside of the <indo1s
o!eratin5 s#stem8
3his (as even stranger than trading four highly profitable mar7ets and spending
a billion dollars on a (orthless mar7et. /t is even stranger than A-@ spending
more than SC billion on the same (orthless product and then 7illing it. .eginning
in "))*, Microsoft came up (ith a plan to put /nternet E=plorer right inside of its
most important product 6 the 4indo(s operating system. 0p until this point,
/nternet E=plorer had been a separate program from the 4indo(s operating
system. /nstalling /nternet E=plorer into the 4indo(s operating system bordered
on insanity for several reasons.
First, 4indo(s is the most important part of the Microsoft monopoly. /t is the
foundation for the rest of the monopoly. ;istorically, the core of the operating
system is 7ept separate from all other programs in order to protect the core. All
other programs are added as modules to the core. &utting any optional coding in
the core increases the file siIe of the core and slo(s do(n loading of the core
and reduces the performance of the entire system.
Second, putting a (eb bro(ser into the core places the entire operating system
at ris7 from (eb based hac7er attac7s because it opens a bac7 door (hich
e=poses the core to direct attac7 by hac7ers. /nstalling /nternet E=plorer in the
core made it easier for malicious viruses to penetrate the system via /nternet
E=plorer to infect non5bro(sing parts of the system. No one in their right mind
(ould even consider doing this.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*
3hird, placing /nternet E=plorer in the core created huge additional coding
compatibility problems. &utting a comple= (eb bro(ser in the core <eopardiIed
the stability of the operating system. Specifically, it increased the li7elihood that a
bro(ser crash (ould cause the entire system to crash.
Fourth, putting /nternet E=plorer in the core of the 4indo(s operating system
also meant that users could not remove /nternet E=plorer (ithout crashing the
4indo(s operating system. Microsoft too7 this step despite numerous ob<ections
from their o(n computer manufacturers.
Fifth, merging 4indo(s (ith /nternet E=plorer also meant that businesses (ho
did not (ant their employees using the internet (ere denied a means of
preventing employees from using the internet. .efore this point, it (as easy for
employers to simply delete internet e=plorer from business computer. .ut once
/nternet E=plorer (as placed inside of 4indo(s, it could no longer be removed.
So Microsoft offended computer manufacturers, and even their most important
business customers <ust to get /nternet E=plorer in the core of the 4indo(s
operating system and thereby create an open bac7 door. ;o( strange is thatL
Nevertheless, for the ne( version of 4indo(s, code named Chicago and later
named 4indo(s ):, /nternet E=plorer C (as placed in the core and released to
the public on September #! ")):. 4indo(s ): (as supposed to be released
several months earlier so that computer ma7ers (ould be able to ta7e advantage
of the Christmas selling season. .ut at great financial harm to Microsoft and
computer manufacturers, 4indo(s ): (as delayed for several months in order to
place /nternet E=plorer C in the core. So this craIy integration decision (as made
even at the cost of putting 4indo(s ): out of the ")): Christmas buying season.
/n addition, Microsoft programmed 4indo(s ): to continue using /nternet
E=plorer 6 even if the user tried to ma7e Netscape Navigator the default bro(serG
/n particular, a ne( feature called 4indo(s 0pdates reKuired the use of /nternet
E=plorer. 3hese updates Athe open bac7 doorB introduced even more security
ris7s and privacy ris7s.
<hat 1as the real reason for this insane decision to !ut a 1eb bro1ser
inside of the 1orldBs most common o!eratin5 s#stem8
Microsoft must have had a very important reason to ta7e such huge ris7s. For
years, / thought the reason they too7 all these craIy steps (as to use the open
bac7 door to stop pirates from bootlegging 4indo(s and -ffice. 3he problem
(ith this theory is that the open bac7 door did not actually stop or even slo(
do(n bootlegging. /n addition, it did not e=plain (hat (as about to happen ne=t.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:
A :onus 6lue... The Mono!ol# "ame is ri55ed in MicrosoftPs Fa3or
-n April #, !!!, 9udge 3homas &enfield 9ac7son issued his conclusions of la(,
finding that Microsoft (as a monopoly and had violated Sections " and of the
Sherman Antitrust Act. -n 9une *, !!!, 9udge 9ac7son ordered a brea7up of
Microsoft. Microsoft (ould have had to be bro7en into t(o separate units, one to
produce the operating system, and one to produce other soft(are components
such as /nternet E=plorer and -ffice. 3his (ould have prevented Microsoft from
using a monopoly in some areas to create a monopoly in other areas.
Microsoft once a5ain 1ins in the 6ourt of A!!eals!
Microsoft immediately appealed the decision. 3his is (hen things suddenly
changed 6 and really got interesting. 3he federal court of appeals in 4ashington
DC 6 the same group that had overturned the "))+ trial court and replaced
9udge Spor7in Aby claiming he (as biased against MicrosoftB (ith 9udge 3homas
&enfield 9ac7son 5 found that 9udge 9ac7son (as also biased against Microsoft.
3hey therefore remanded the decision to a ne( <udge to determine a ne(
penalty. &erhaps this is (hy .ill 'ates (as not (orried during the trial. ;e 7ne(
the fi= (as in and (hatever happened at the trial (ould be overturned on appeal.
3here (ere many glaring problems (ith this decision by the Court of Appeals.
Most important, the court of appeals did not find a single fault (ith any of 9udge
9ac7son>s Findings of FactG 3hus, there (as no sho(ing of either bias or harm.
3hings got even stranger after this. -n September D, !!", <ust five days before
)?"" and the attac7 on the 4orld 3rade Center, the 0S Department of 9ustice
announced that it (as no longer see7ing to brea7 up Microsoft and (ould instead
see7 a lesser antitrust penalty. Microsoft then drafted a toothless settlement
proposal. 3his (as li7e allo(ing a ban7 robber to (rite up their o(n penalty.
3hen on November , !!", the Department of 9ustice reached an agreement
(ith Microsoft to settle the case by basically accepting MicrosoftJs proposal 6 a
proposal (hich meant ne=t to nothing in the (ay of changes for Microsoft. A year
later, on November ", !!, the ne( <udge (ho had been appointed by the Court
of Appeals, +ud5e $ollar)$otell# accepted the proposed toothless settlement.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)
3o add insult to in<ury, 9udge 8otelly put 1Microsoft .oard Members2 in charge of
monitoring the toothless agreement. Not surprisingly, these Microsoft .oard
Members have failed to find any further violations. Nine states ACalifornia,
Connecticut, /o(a, Florida, 8ansas, Minnesota, 0tah, Eirginia and
MassachusettsB did not agree (ith the settlement, arguing that it did not go far
enough to curb Microsoft>s anti5competitive business practices. 3hey therefore
appealed the decision. ;o(ever, on 9une #!, !!C, the DC appeals court
unanimously approved the settlement, re<ecting ob<ections that the sanctions
(ere inadeKuate. So after having three times been found to be in violation of the
Sherman Antitrust Act Ain "))C. "))* and again in ")))B, (ith over one hundred
pages of Findings of Facts about criminal acts on the boo7s against them,
Microsoft (as given a free ride. Microsoft could continue to use its monopoly
po(er to destroy any potential competitor.
Andre( Chin, an antitrust la( professor at the 0niversity of North Carolina at
Chapel ;ill, (ho had assisted 9udge 9ac7son in (riting the Findings of Fact, later
(rote that the settlement gave Microsoft 1a s!ecial antitrust immunit#.. under
terms that destro# freedom and com!etition... Microsoft no1 enEo#s
ille5itimatel# acLuired mono!ol# !o1er.F /n a !!+ 4a7e Forest @a( ,evie(
article, he (rote A+ud5e $otell#Bs final Eud5ment more closel# resembled
articles of surrender than a ne5otiated treat#.F
<h# did the De!artment of +ustice and the 6ourt of A!!eals allo1
Microsoft to continue 1ith their mono!ol#8
;o( does the game of Monopoly al(ays endL /t ends (ith one person getting a
monopoly (hich they then use to ta7e all of the money 5 (hile everyone else
goes bro7e. 3his is (hy monopolies are illegal. /t is because monopolies
A@4A$S eventually destroy any economy and any society (hich allo(s them to
continue unchec7ed. 3oday, "+ years after the Netscape trial, .ill 'ates is the
richest man in the (orld 6 (ith over S*! billion. At the same time, our economy is
in shambles (ith record unemployment, and record home foreclosures 5 all (hile
ban7s are robbing us blind. -ur political system is in even (orse shape (ith
elections sold to the highest bidder. Corporation lobbyists are (riting their o(n
la(s and there is a revolving door bet(een greedy corporations and a corrupt
government. ;o( is this possibleL 8eep reading. /t is about to get much (orse.
Ma# (//( +ud5e $otell# a!!ointed *residin5 +ud5e of the F4SA 6ourt
-n May ") !! Chief 9ustice ,ehnKuist appointed 9udge 8otelly to serve as
&residing 9udge of the 0nited States Foreign /ntelligence Surveillance Court ,
(hich is a *5year appointment. 3he F/SA Court is the Court that oversees the
conduct of the NSA. 3he &residing 9udge is the only <udge on the eleven <udge
panel (ho is actually told (hat the NSA is doing.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!
(//' +ud5e $otell# secretl# a!!ro3es NSA s!#in5
/n -ctober, !!", 'eorge .ush issued a top secret order allo(ing the NSA to
start a 1(arrantless2 domestic spying program 6 in direct violation of the C
th

Amendment. .ush as7ed phone companies and data companies to voluntarily
comply. Almost all did. /n March !!C, attorneys at the 9ustice Department
become a(are of (hat (as going on and demanded it be stopped. /n 9une !!C,
the head of the NSA, 'eneral ;ayden, held secret meetings (ith the head of the
F/SA court, 9udge 8otelly to come up (ith a (ay to continue the &resident>s
Surveillance &rogram Aor &S&B despite the ob<ections of the 9ustice Department
6 (ho had the audacity to suggest that the NSA needed a 1(arrant2 to spy on
millions of innocent Americans. -n 9uly "C, !!C, 9udge 8otelly signed a
1blan7et (arrant2 allo(ing the NSA to spy on almost anyone. ;er ruling (as a
secret not <ust to the public and Congress, but to all of 8otelly>s ten fello( <udges
on the F/SA court. -n May C, !!D, 9udge 8otelly signed another order, this
one authoriIing the bul7 collection of phone metadata from 0.S. phone
companies. 9udge 8otelly gave both Microsoft and the NSA a free ride. 4hat are
the odds that something this shoc7ing (ould happen by random chanceL
()t i$ a *an"aroo +ourt wit% a rubber $tam&.(
,ussell 3ice, Former NSA Analyst referring to the F/SA Court that approved all
NSA (arrants in !". 9une D !"#
+une (/%,... An Ans1er 0mer5es
/n 9une !"#, a (histleblo(er named Ed(ard Sno(den produced several 3op
Secret documents created by the National Security Agency ANSAB sho(ing that
the NSA (as (or7ing (ith several corporations to spy on Americans. 3he lead
corporation (as Microsoft. Another cooperating corporation (as A-@. -ne slide
in particular told a very frightening story. 3he notes for the follo(ing slide stateF
1): percent of the &,/SM data is based on $ahoo, 'oogle and Microsoft.
According to this NSA training presentation, the data (as ta7en 1directly from the
servers of these three companies.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C"
-ther documents confirmed that these companies made modifications to their
systems to allo( all of their data to be accessed by the NSA.
/f the NSA targets an individual, it virtually ta7e over that person>s data Rso the
target>s computer no longer belongs to him, it more or less belongs to the 0.S.
'overnmentR. Ed(ard Sno(den /ntervie( 9une !"#
/ loo7ed at this NSA slide for a long time. 3hen / began to (onder about ho( long
Microsoft had been involved in deals (ith the NSA. / also began to (onder about
the 1NSA 8E$2 (hich had been placed in the 4indo(s operating system in ")):
and discovered in "))). / began to (onder (hy the /nternet E=plorer open bac7
door had been placed in the 4indo(s operating system despite all of the
problems it created for Microsoft and continues to create for Microsoft. Could it
be that Microsoft and A-@ conspired (ith the NSA to ta7e out Netscape
NavigatorL 4hy (ould the NSA (ant to ta7e out NetscapeL
Suddenly, it da(ned on me that perhaps / had been loo7ing at MicrosoftJs actions
all (rong. &erhaps it (as never about money. &erhaps it (as about somethin5
more im!ortant than mone#7 control of the internet. Specifically, it (as about
NSA control of the internet. &erhaps the NSA felt that control of the internet (as
too important to leave to a fe( college 7ids from the 0niversity of /llinois.
3his (as not about creating a financial monopoly. /t (as about creatin5 a
!olitical mono!ol#. /t sounds pretty craIy. .ut (hat other e=planation is thereL /
decided to call this craIy theory the Microsoft NSA 6ons!irac# Theor#. Many
people (onJt believe this. .ut / am hoping they (ill at least thin7 about it. / also
decided to set up a (ebsite (ith an open public forum devoted to discussing this
topic and any additional evidence that might emerge to support or refute this
theory.
4hat / am hoping is that if you do not believe this theory, you (ill provide a
reasonable alternate e=planation for the follo(ing factsF
V"F Microsoft spent billions of dollars and violated numerous la(s to control a
mar7et (hich produces no income.
VF Microsoft made deals (ith several of their rivals to assist them in controlling
this (orthless mar7et.
V# F A-@ also spent four billion dollars to control this (orthless mar7et 6 and then
continued to promote their leading competitorJs product.
VCF .oth the 9ustice Department and the Court of Appeals gave Microsoft a 'et
out of 9ail Free card despite finding Microsoft guilty.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C
3he (ebsite is called Microsoftnsacons!irac#.or5. / loo7 for(ard to hearing
your comments and suggestionsG

0nli7e the Supreme Court, the F/SA court hears from only one side Z the
government. A single <udge signs most surveillance orders, (hich totaled nearly
",:!! in !". None of the reKuests from the NSA (ere denied and none of the
F/SA court findings (ere ever made public. Congressional oversight has also
been meaningless. 3he F/SA court signs a one5paragraph form once a year
stating that the NSA>s process Rcontains the reKuired elements.2
3s for the NSA, they no( spy on "+! countries and have more than *!! server
farms around the (orld. 2e6ent percent of the federal "o6ernment=s intelli"ence
bud"et now "oes to pri6ate contractors. Far from o6erseein" the a"encies#
members of @on"ress court them# hopin" to obtain business for companies that
contribute "enerousl to their campai"ns. Instead of protectin" democrac#
;icrosoft and the 723 are destroin" democrac.
As further proof that leaving the bac7door to the 4indo(s operating system is a
bad idea, in the ne=t chapter, (e (ill loo7 at the harm it has inflicted on Microsoft
customers in <ust the past year. .elo( is (hat (ill be left of the .ill of ,ights if the
NSA is allo(ed to continue spying on innocent Americans.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C#
<hatBs Next8
/n the ne=t chapter, (e (ill ta7e a closer loo7 at the conseKuences of 9udge
8otelly>s decision to let Microsoft continue (ith their predatory monopoly and her
eKually devastating decision to rubber stamp NSA spying on all Americans.
Creating this t(in headed monster 6 and allo(ing it to continue to e=ist 6 has
caused far more damage than anyone could have ever imagined.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age CC
6ha!ter (... Su!er :u5s; 6#ber <ars; Disastrous
=!dates and :lackmail
3his chapter summariIes the conseKuences of the merger of Microsoft (ith the
NSA. 3han7s to the 1open bac7door2 in the 4indo(s operating system, any
person or any business (ith a 4indo(s computer is no( faced (ith the ever
present danger of super viruses and cyber (arfare.
3his chapter includes the follo(ing four sectionsF
(.% Su!er :u5s and 6#ber <ars
3he section revie(s ho( super bugs (ere created by the NSA to attac7 /ran 6
but then escaped into the (ild and no( are attac7ing 4indo(s computers around
the (orld.
(.( The Flame Iirus and <indo1s =!date Disasters
-n the first 3uesday of every month, 4indo(s computer users are faced (ith a
decision. Do / accept the Microsoft 0pdates and ris7 crashing my computerL -r
do / ta7e my chances (ith the hac7ersL
(., Microsoft :lackmail <arnin57 =!5rade or Die!
Microsoft has said that on April : !"C, they (ill pull the plug on D!! million
4indo(s H& users 6 because they (ant you to buy 4indo(s :. 4e (ill give you
a better option.
(.' =0F47 The Microsoft ) NSA $ill S1itch
4indo(s : comes (ith a ne( start program called 0EF/ 6 (hich includes a
hidden 7ill s(itch controlled by Microsoft and the NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C+
(.% Su!er :u5s and 6#ber <ars
AShould 1e shut this thin5 do1n8F Mr. -bama as7ed, according to members
of the presidentJs national security team (ho (ere in the room. 3old it (as
unclear ho( much the /ranians 7ne( about the code, and offered evidence that
it (as still causing havoc, Mr. -bama decided that the cyber attac7s should
proceed. 5 From a !" Ne( $or7 3imes article about a top secret 4hite ;ouse
meeting in August !"!.
Should 1e shut this thin5 do1n8
3his Kuestion should be as7ed about the relationship bet(een Microsoft and the
NSA. /nstead, it (as as7ed about the first ma<or cyber attac7 in history 6
launched in !!) and !"! by the 0S against /ran 6 using the NSA open bac7
door to the 4indo(s operating system. /n this chapter, (e (ill loo7 at the
conseKuences of 9udge 8otelly !! decision to allo( the Microsoft Monopoly to
continue combined (ith her !!C decision to allo( the NSA unlimited po(er to
spy on all Americans. .ecause (e (ill be getting into areas (hich some might
thin7 of as 1conspiracy theories2 (e (ill first consider the Kuestion of (hether our
government ever lies to us. 4e (ill then loo7 at ho( the NSA used the 4indo(s
open bac7 door to develop 1super bugs2 to attac7 computers in /ran in !!) 6
and (hat happened after these super bugs escaped and began infecting
corporate computers around the (orld in !"!. 3here is substantial evidence that
one of the NSA super bugs led directly to the (orld>s (orst environmental
disaster 6 the .& 'ulf -il Spill. 4e (ill then revie( ho( these super bugs began
ta7ing do(n personal computers of millions of 4indo(s users in !" 6 a
problem (hich still e=ists today and is getting (orse (ith every passing month.
Does our 5o3ernment e3er lie to us8
-n March " !"# at a Senate /ntelligence Committee hearing, -regon Senator
,on 4yden as7ed Director of National /ntelligence 9ames ClapperF 1Does the
NSA collect any type of data at all on millions or hundreds of millions of
AmericansLR Clapper, (ho (as under oath committed per<ury by saying 1No Sir.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age CD
/n 9une !"#, Clapper admitted he did not tell the truth and gave a series of
e=cuses 6 claiming he responded in the 1least untruthful manner.2 Nevertheless,
for a public official to lie to Congress and the American people is a felony. At the
very least, Clapper should have been fired. ;e should also spend some time in
<ail. /f (e cannot trust public officials to tell Congress the truth (hen they are
under oath, (hy should (e believe anything they tell us (hen they are not under
oathL Sadly, this is not the only e=ample of our government lying to us.
/n the boo7 1"):C2 'eorge -r(ell predicted that a fa7e 1permanent (ar2 (ould
be used to manipulate people into accepting a loss of all of their freedoms.
Could our o(n government be capable of spreading false information to
manipulate the American peopleL 4e 7no( that in the early ")D!>s, the C/A
developed plans to attac7 targets in the 0S and then blame the attac7s on
Castro as a prete=t for an invasion of Cuba. 4e also 7no( that in ")DC, the 'ulf
of 3on7in incident (as fa7ed in order to <ustify the Eietnam 4ar. 3hese are <ust
a fe( of hundreds of e=amples of our government lying to us to maintain po(er.
For more, read 1A *eo!les 9istor# of the =nited States2 by ;o(ard Pinn
Oil <ars; Shock Doctrine; and <ea!ons of Mass Distraction
3he corporate controlled leaders of the 0S have long coveted the /ranian -il
Fields. /n April ")+#, the C/A spent millions of dollars to overthro( /ran>s
democratic elected &rime Minister, Mosaddegh and replace him (ith a puppet
dictator5 the evil Shah of /ran. /n -ctober !!, this same C/A (rote a report
called the National /ntelligence Estimate, claiming that /raK had 1(eapons of
mass destruction.2 3he source for this information turned out to be a con man
and former /raKi ta=i cab driver (ith the code name 1Curve .all.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C*
3his fa7e 1(eapons of mass destruction2 claim led to the /raK 4ar 6 costing
trillions of dollars and 7illing over one million people 6 but allo(ing our
corporations to ta7e over the /raKi -il Fields. More recently, 0S corporations
have ta7en over @ibyan -il Fields. .ut the real priIe is still /ran.
/n 9une !!:, Naomi 8lein (rote a boo7 called The Shock Doctrine7 The 2ise
of Disaster 6a!italism. /n this boo7, she provides several e=amples of ho( the
0S government has used fear and fa7e disasters to manipulate the 0S public
into supporting actions that (ere against their o(n best interests. /s the current
Cyber 4ar another e=ample of disaster capitalismL @et>s loo7 at the facts.
O!en :ack Doors and :roken <indo1s
As (e have covered in the previous chapter, the security problems for 4indo(s
actually started in September "))* (hen Microsoft first came out (ith /nternet
E=plorer C. 0nli7e /nternet E=plorer ", and # A(hich (ere essentially copies of
the Mosaic (eb bro(serB, /nternet E=plorer C (as directly tied into the 4indo(s
operating system. 3his open bac7door is ho( Microsoft delivers 1automatic
4indo(s security updates2 (henever you are online.
/n 9une, !"#, Ed(ard Sno(den released a series of 3op Secret slides created
by the NSA ANational Security AgencyB confirming that another purpose of the
4indo(s open bac7 door6 and maybe even the main purpose of the open
bac7door 5 is to spy on everyone. .ut (hen Microsoft left the bac7door to all of
our computers open, this caused and still causes a huge security ris7 for all of us
(ho o(n 4indo(s computers. 3he ris7 is that Super Eiruses (ill eventually be
able to use the same bac7door used by 4indo(s 0pdates and the NSA to get
inside of our computers and cause all 7inds of havoc.
(//? to (/%/ NSA De3elo!s Flame and Stuxnet Iiruses to attack 4ran
/n May !", ,ussian cyber security e=perts discovered a super bug named
Flame that they described as being the largest super bug ever built. Flame (or7s
by going through the 4indo(s open bac7 door and is capable of recording audio,
video, screen shots, 7eyboard activity, net(or7 activity and altering programs and
files on the 4indo(s C drive. Flame is capable of (iping out a computerJs hard
drive using a module called 4iper to delete pictures, documents and programs.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C:
-n 9une "), !", the 4ashington &ost published an article claiming that the
Flame virus (as developed by the NSA 1at least five years prior2 5 meaning about
!!*. 3he plan started as a proposal by 'eneral Cart(right (hich (as approved
by 'eorge .ush in !!D. 3he code name for the secret pro<ect (as -lympic
'ames and the purpose of Flame (as to collect intelligence in preparation for a
cyber attac7 on /ranian nuclear facilities. 3he Flame spying of /ranian computers
began in !!* and (as used to provided detailed information on /ranian
computers and facilities. 3he actual attac7 used a much smaller super bug called
Stu=net. 3he first attac7s on /ran by Stu=net began in 9une !!) and gre( larger
in !"! under -bama.
AFlame 1as desi5ned to masLuerade as a routine Microsoft =!date.F
httpF??articles.(ashingtonpost.com?!"5!D5")?(orld?#+CD!*C"W"Wstu=net5
computer5virus5mal(are
0nfortunately, according to a 9une ", !" article in the Ne( $or7 3imes, in the
summer of !"!, the Flame virus bro7e free from /ran, got onto the internet and
began attac7ing computer systems around the (orld. 3his led to a top secret
meeting at the 4hite ;ouse in August !"! to address this problem.
1Should (e shut this thing do(nL2 Mr. -bama as7ed, according to members of
the presidentJs national security team (ho (ere in the room. 3old it (as unclear
ho( much the /ranians 7ne( about the code, and offered evidence that it (as
still causing havoc, Mr. -bama decided that the cyber attac7s should proceed.
/n March !"#, 0S Cyber Command and National Security Agency chief 'eneral
8eith Ale=ander told Congress that "# of his C! Cyber Command teams are
focused on 1offensive operations.2 According to Ed(ard Sno(den, here is ho(
the NSA plans and launches offensive cyber attac7s on other nationsF
Stage -neF /ntercept all data... more than t(o trillion intercepts per year.
Stage 3(oF Data Mining... through several trillion files of data.
Stage 3hreeF Eulnerability Assessment.. @oo7 for (ea7ness in the cyber security
of other countries in order to develop cyber sabotage plans.
Stage FourF Design Q /mplement Attac7s on other countries. Acts of <ar!
-n 9une ", !"#, 9ames .amford posted an article on (ired.com e=plaining
ho( the NSA developed a super bug to bring do(n computers in /ran in !"!.
httpF??(((.(ired.com?threatlevel?!"#?!D?general57eith5ale=ander5cyber(ar?
R3he cyber (eapon that came to be 7no(n as Stuxnet (as created and built by
the NSA in partnership (ith the C/A and /sraeli intelligence... Armed (ith that
intelligence, net(or7 e=ploitation specialists then developed soft(are
implants...that mapped out a blueprint of the net(or7 and then secretly
communicating the data bac7 to the NSA.R
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C)
.oth the Stu=net and Flame super bugs (or7ed only on Microsoft 4indo(s
computers. 3he t(o bugs served different purposes. Flame (as used to e=tract
data about the /ranian net(or7s and record conversations through computer
microphones (ithout the /ranians 7no(ing they (ere being spied on. Stu=net
(as used to ta7e control of the /ranian computers and use them to attac7 crucial
settings (ithin the /ranian infrastructure. .ut (ith both viruses, clearly, the NSA
(as using the 4indo(s bac7 door and the Microsoft NSA 8ey to attac7 /ran.
Did 4ran reall# launch a c#ber 1ar counter attack8
According to many articles in the 0S &ress, there is a cyber (ar going on
bet(een the 0S and /ran. 3he 0S press and NSA claim that (ithin t(o years of
the Stu=net attac7 by the NSA, the /ranians (ere able to copy the Flame super
bug (ith their o(n super bug and send it bac7 to infect computers in Saudi
Arabia and the 0S.
/n August !", a devastating virus (as unleashed on Saudi Aramco, the giant
Saudi state5o(ned energy company. 3he mal(are infected #!,!!! computers 6
erasing three Kuarters of the companyJs stored data, destroying everything from
documents to email to spreadsheets and leaving in their place an image of a
burning American flag. 3hen a series of denial of service attac7s too7 AmericanJs
largest financial institutions offline in September through December !".
All of these recent cyber attac7s have been blamed on /ran. ;o(ever, there are
three problems (ith this claim that the /ranians are attac7ing us. First, the
/ranians strongly deny that they are attac7ing computers in the 0S or any(here
else. 3he /ranians 7no( that any attac7 on 0S (ould lead to increased funding
for the NSA to launch even more attac7s on them. 3hey (ould be entering a
battle they could not possibly (in. After all, the 0S military spends S",!!! billion
per year (hile the /ranian military spends only S"! billion per year.
Second, the super virus being used is the less po(erful Flame virus. As a
conseKuence, every one of the cyber attac7s has resulted in only minor damage
to 0S computers. No blo(n up nuclear po(er plants. No destroyed hydroelectric
dams. Not even a minor po(er outage. 9ust a series of headlines about ho( (e
are being attac7ed by the /ranians 6 and sales of tens of thousands of
replacement 4indo(s computersG /f the attac7s (ere really coming from /ran,
(hy did they not use the Stu=net virus 6 (hich is capable of causing much more
harm than the Flame virusL
3hird and most important, the Flame virus (hich attac7ed Saudi Arabia contained
a section of code (hich referred to the &ersian 'ulf as the AArabian "ulf.F 3he
term Arabian 'ulf is used primarily by the 0S Military 6 never by the /raniansG
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +!
Since about !!), various branches of the 0S armed forces have issued
directives to their members to use the RArabian 'ulfR (hen operating in the
area. httpsF??en.(i7ipedia.org?(i7i?&ersianW'ulfWnamingWdispute
/n /ran, it is considered an insult to the long history of their country to refer to the
&ersian 'ulf as the Arabian 'ulf. A Saudi historian said Rfrom a scientific and
historical point of vie(, it has been called the &ersian 'ulf since Ale=ander the
'reat.R 3he 0nited Nations has ruled that only the name &ersian 'ulf should be
used. /ran is so concerned about this name that it has banned airlines (ho do not
use the term &ersian 'ulf (hen flying in /ranian air space. /n May, !", /ran
even threatened to sue 'oogle Maps for failing to use the term 1&ersian 'ulf.2
/magine if your (orst enemy sent you a bad email (hich included a severe insult
to your mother. $ou could copy the email and send it bac7 to them. .ut (ould
you leave the insult to your mother in the ,eply emailL No one (ould leave such
a harmful insult in the code (hen it could easily be removed. 3herefore, for all of
the above reasons, it (as not /ranians (ho attac7ed the Saudi Arabia computers.
9o1 the NSA benefits from creatin5 a Fake 6#ber1ar
Cyber 4ar leads to increased funding for the NSA. /f the NSA (ants increased
funding from Congress, the best (ay to get it is to scare Congress into believing
that there is a cyber (ar going on. .ut there are other benefits. 3he attac7 on
Saudi Arabia li7ely led to the sale of #!,!!! more 4indo(s computers. 3he fa7e
Cyber 4ar has also led the Saudis into see7ing closer cooperation (ith the NSA.
/t also leads to huge business opportunities for NSA affiliated security firms as
corporations rush to have their corporate data protected. Most of all, an
atmosphere of Fear, 0ncertainty and Doubt AF0DB creates political support in the
0S for e=pansion of the NSA surveillance programs. 3he NSA is the biggest
benefactor of this fa7e cyber (ar Aboth financially and politicallyB. 3his is (hy the
NSA 5 (ith the cooperation of Microsoft 5 has created a surveillance monster.
-ne of the 3op Secret documents released by Sno(den (as &residential &olicy
Directive ! 6 (hich (as a memo from &resident .arac7 -bama directing 0. S.
intelligence agencies to dra( up a list of targets for 0.S. Cyber Attac7s.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +"
A!ril (/%/ :* "ulf Oil S!ill is the <orst 0n3ironmental Disaster in 9istor#...
Thanks in !art to Microsoft :lue Screen of Death
At "" pm ES3 on April !, !"!, a date that (ill live in infamy, .&>s Deep(ater
;oriIon -il ,ig e=ploded 7illing "" (or7ers and spe(ing millions of gallons of
to=ic sludge into the 'ulf of Me=ico 7illing birds, fish and other (ildlife from
@ouisiana to Florida. 3he spill too7 three months to contain and (ill ta7e more
than #! years Aif everB to clean up. 3he economic loss, <ust to .& is over SC
billion and the actual cost to the American people and to the environment is
beyond calculation. 4hile companies such as ;alliburton (ere blamed for an
inadeKuate (ell seal, the real initial cause of the !"! 'ulf -il Spill as been
largely covered up by the corporate media. 3here is no( no Kuestion that
computer problems associated (ith the Microsoft 4indo(s operating system
(ere to blame. 3he only Kuestion no( is (hether the Flame virus 6 and by
e=tension the NSA 6 (ere also to blame.
-n 9uly # !"!, at a government hearing to determine the cause of the oil spill,
the oil rig>s chief electronic technician, Mi7e 4illiams 6 (ho miraculously survived
the e=plosion 6 described the events leading up to the disaster. 3he full details
of his testimony are listed on the follo(ing (eb page.
httpF??techrights.org?!"!?"!?"?deep(ater5update?
Mi7e 4illiams testimony sounded e=actly li7e (hat happens today
(henever a 4indo(s computer is attac7ed by the Flame Eirus. According
to Mr. 4illiams, for months, the computer system on the ill fated .& oil rig
had been loc7ing up, producing (hat the cre( called the 1blue screen of
death.2 ANoteF 3he .lue Screen of Death most commonly occurs on
4indo(s computers after a faulty updateB. 4hen the computers (ere do(n,
the safety eKuipment did not (or7 and the (ell could not be monitored.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +
Five (ee7s before the e=plosion, in March !"!, Mi7e 4illiams had been
sent to the oil rig to fi= the computer problem. Mi7e testified, 13he computer
screen (ould <ust turn blue. $ou>d have no data coming through.R
Mi7e e=plained that (ith the computer froIen, the drillers did not have access to
crucial data about (hat (as going on in the (ell. Mr. 4illiams described the
4indo(s computer system as 1a very unstable platform2 and 1bad soft(are2 that
(as the root cause of most of the drilling problems. 3his buggy 4indo(s based
control system left drillers blind (hen it crashed daily and (as responsible for
safety system bypasses that eventually destroyed the (ell seal and led to the
e=plosion. -n page C of the hearing transcript, Mr. 4illiams statedF
AFor three to four months 1eP3e had !roblems 1ith this
com!uter sim!l# lockin5 u!. Tsometimes it 1as a blue screen;
sometimes a froCen dis!la#U V <e had ordered re!lacement
hard dri3es from the manufacturer. <e had actuall# ordered an
entire ne1 s#stem; ne1 com!uters; ne1 ser3ers; ne1 e3er#thin5
to u!5rade it from the 3er# obsolete o!eratin5 s#stem that it 1as
usin5.F httpF??techrights.org?!"!?"!?"?deep(ater5update?
3hus, according to Mr. 4illiams, the computer problems began in 9anuary
!"!. .et(een the manufacturer and the rig, they could not get the bugs
(or7ed out of the ne( operating system. 3hey couldnJt get the old soft(are
to run correctly on the ne( operating system. Microsoft 0pdates 6 instead
of fi=ing the problem actually made the problems (orse.
Did the NSA created Flame 3irus !la# a role in the :* "ulf Oil Disaster8
/n the follo(ing pages, (e provide many e=amples of (hat happens (hen the
Flame Eirus leads to faulty 4indo(s 0pdates. ;aving personally e=perienced
this problem, it sounds to me li7e the (ild Flame virus is e=actly (hat caused the
problem. 4e 7no( that the Flame virus (as first introduced in /ran in !!). NSA
officials did not notice it had escaped into the (ild until the summer of !"!. .ut
it is entirely possible that the Flame virus escaped into the (ild as early as !!).
/n support of this theory, /ranian computer programmers claimed that the Flame
virus had attac7ed their -/@ F/E@D C-M&03E,S in addition to their nuclear
facility computers. 13he AFlameB virus penetrated some fields 6 one of them (as
the oil sector,2 'holam ,eIa 9alali, an /ranian military official told the country[s
state radio.
3he !"! 'ulf -il Spill has severely harmed not only the economy of the 'ulf
Coast 6 but also the entire 0S economy as the cost has been passed along to
the American people in the form of higher gas prices.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +#
3he Microsoft5 NSA open bac7 door and the unstable 4indo(s operating system
(as at least in part to blame for the (orst environmental disaster in the history of
the (orld. 3his is (hat happens (hen the (orld puts up (ith a computer
monopoly and loo7s the other (ay as it becomes 1partners2 (ith the NSA.
The <ar on Terror...9o1 man# Americans are actuall# terrorists8
According to a !!C report by the AC@0, the Department of ;omeland Security
forced .lue Cross of Michigan to do a detailed search of the records of D million
of their members. 3here (ere D,!!! false positives 6 people the computer
thought might be terrorists. ;o(ever, after further research of all D,!!! people,
the number of actual terrorists that (ere found (ere PE,-. So in my opinion, the
odds of an American being an actual terrorist is less than the odds of being
struc7 by lightening. /t is certainly not (orth sacrificing the 0S Constitution and
the &rivacy rights of all #!! million Americans. Al Maeda appears to be simply a
front for the C/A and C/A paid operatives. 3he ground to air missiles being used
by these fa7e Al Maeda groups (ere given to them by our o(n government.
No( that (e have lin7ed the NSA 6 Microsoft connection to the Cyber(ar and to
the (orld>s (orst environmental disaster, in the ne=t section, (e (ill loo7 at ho(
the 4indo(s bac7 door has created havoc for millions of personal computers.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +C
(.( The Flame Iirus and <indo1s =!date Disasters
AFlame 1as desi5ned to masLuerade as a routine Microsoft
=!date.F httpF??articles.(ashingtonpost.com?!"5!D5
")?(orld?#+CD!*C"W"Wstu=net5computer5virus5mal(are
+une (/%(7 The Flame Su!er Iirus creates an unsol3able securit# !roblem
for e3er# Microsoft *6
-n 9une !", Microsoft issued a public (arning that the Flame super virus (as
using 1Microsoft 0pdates2 to attac7 4indo(s computers in the 0S.

/magine you are a hac7er and you learn that Microsoft has created an open
bac7door to every Microsoft &C in order to apply their updates and ma7e sure
you arenJt using a bootleg copy of 4indo(s. 4ouldnJt you (ant to go through
this bac7door and see (hat is in the houseL 3his is (hat happened (ith the
spread of the Flame virus in the summer of !". .elo( is a summary of the
Flame virus and ho( it (or7s and (hat Microsoft is doing to try to control it.
3he infamous Flame virus can infect Microsoft &Cs by tric7ing them into believing
its malicious payload is actually an update from Microsoft. Flame gains access to
your computer by ma7ing copies of security certificates for Microsoft 0pdates.
3hough they appear to be digitally signed by Microsoft, the certificates are
actually coo7ed up by the people behind Flame, thereby tric7ing &Cs into
accepting them as legitimate. Microsoft revealed that the Flame virus can use the
fa7e certificates to spoof Microsoft>s o(n 4indo(s 0pdate service. As such,
4indo(s &Cs can receive an update that claims to be from Microsoft but is in
fact a launcher for the mal(are.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ++
-nce infected, a &C thin7s the file that loads Flame is actually a 4indo(s
0pdate from Microsoft. Flame uses a certificate that chains to the Microsoft ,oot
Authority and improperly allo(s code signing. So (hen a 4indo(s 0pdate
reKuest is received, Flame provides a binary signed certificate that appears to
belong to Microsoft. 3he unsuspecting &C then do(nloads and e=ecutes the
binary file, believing it to be a legitimate 4indo(s 0pdate file. 3he binary is not
the Flame virus itself but a loader for Flame 6 (hich then spies on the infected
computerAsB.
3he Flame virus employs a man5in5the5middle attac7 to steal data, listen in on
audio conversations, and ta7e shots of screen activity. /f this sounds a lot li7e
(hat Ed(ard Sno(den says the NSA is doing, it is because it is. 3o try to control
this super virus, Microsoft issued a series of Security &atches as described
belo(. .ut these only made a bad situation much (orse.
+une (/%( Microsoft introduces a +ek#ll and 9#de Monster of an o!eratin5
s#stem called <indo1s
Also in 9une !", Microsoft introduced a ne( operating system called 4indo(s
:. -ne purpose of this ne( operating system is to ma7e 4indo(s more 1mobile
friendly.2 ;o(ever, another lesser 7no(n purpose of 4indo(s : is to add ne(
security measures called 0EF/ and Secure .oot to combat pirates and
bootleggers Aand apparently to also increase the ability of the NSA to control
computers in China and else(hereB.
4e (ill discuss these security features and problems in greater detail in a later
chapter. ;o(ever, it is important to 7no( that 4indo(s : is radically different, not
only from 4indo(s *, but also from any other operating system that has ever
e=isted.
-ne of the many things that ma7e 4indo(s : so different is that it consists of t(o
different operating systems that have been patched together. First, there is a ne(
Metro operating system (hich controls many of the security functions in addition
to the mobile functions. Second, there is a modified version of the 4indo(s *
Des7top operating system. 3he problem (ith trying to tie these t(o operating
systems together is that 4indo(s : has t(o of nearly everything 6 including t(o
different control panels and t(o different versions of /nternet E=plorer. 3hese
different programs cause une=pected conflicts 5 (hich means that 4indo(s :
can be e=tremely unstable.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +D
+une (/%( <indo1s 6rashes durin5 first Media Launch
3his is (hy 4indo(s : has been freeIing up and crashing computers ever since
the first day it (as introduced on 9une ":, !" at a presentation in @os Angeles.
3o see this problem in action, (atch the follo(ing t(o minute video posted on
9une "), !" and no( seen by more than # million peopleF
httpF??(((.youtube.com?(atchLvON"I=Da#t!fg
<indo1s freeCes in its first introduction to the 1orld.
During the official presentation of the ne( Microsoft Surface tablet, former
4indo(s Eice &resident Steven Sinofs7y opens up the Metro version of /nternet
E=plorer 6 using the ne( 4indo(s : operating system 5 and the system froIe.
Not even repeatedly <abbing on the device>s home button 5 the touch5sensitive
area (ith the 4indo(s logo on the long side of the tablet 5 (ould bring the tablet
bac7 to life. /ronically, the line Sinofs7y had to deliver (hile holding the dead
tablet (as R/ can bro(se smoothly.R
3his public demonstration of the instability of 4indo(s : should have been a
(arning to all of us.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +*
3he public launch 5 (hen sales of 4indo(s : (ould officially begin 5 (as
originally scheduled for September !". /t (as delayed until the end of -ctober
in a last ditch effort to resolve the ma<or problems before selling 4indo(s : to
the public. .ut even in November, there (ere (idespread reports on public
forums of 4indo(s : crashing computers Aincluding my o(n computerB. -n
November " !", the head of Microsoft, Steven .allmer, announced that that
4indo(s chief e=ecutive, Steven Sinofs7y, (as leaving Microsoft for unspecified
reasons.
Au5ust (/%( the Flame Su!er Iirus 6ontinues to S!read
.y August !", the Flame virus had spread from industrial and oil rig computers
to personal computers. 3he most (orrisome thing about these super viruses is
ho( they get into our computers in the first place. 3hey enter via an 1official2
update to the 4indo(s operating system. A user thin7s they are simply
do(nloading a legitimate patch from Microsoft, only to install Flame instead.
Flame spreading through 4indo(s updates is more significant than Flame itself.
My first personal e=perience (ith the Flame virus began (ith the August !"
automatic update from Microsoft. At the time, the media claimed that the Flame
virus only infected a fe( hundred computers and (as part of a 1cyber (ar2 trying
to stop the /ranians from developing nuclear (eapons. Supposedly, in order to
put a mon7ey (rench in /ranian computers, our o(n government created the
Flame Super .ug. ;o(ever, once in the (ild, Flame Kuic7ly began infecting
millions of computers 6 including my o(n. /t too7 me many months to get rid of
this virus.
*atch Tuesda# =!dates turn into :lack Tuesda# Ni5htmares
As most 4indo(s H& and 4indo(s * users 7no(, Microsoft releases updates
and security patches on the second 3uesday of every month. 3his (as originally
7no(n as 0pdate 3uesday or &atch 3uesday.
.ut because some of these patches have caused millions of computers to crash
Adue to unforeseen compatibility problems (ith other programsB, the second
3uesday of every month has also become 7no(n as .lac7 3uesday 6 (here
4indo(s computer users around the (orld hold their breath and pray as they
push the update button.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +:
*atch Tuesda# is often follo1ed b# 6rash <ednesda#
August !" (as a really bad month for Microsoft, including security problems in
a common controls library Athis is the library associated (ith the /nternet E=plorer
open bac7 doorB. 3he issue is that (hen the computer do(nloads a 4indo(s
0pdate and has to restart to configure, the configuration fails and you get a
message stating Rreverting configurationR, then (indo(s restarts. After restarting,
the configuring (indo(s message appears again and fails again hence you get
stuc7 in a never ending loop.
Se!tember (/%( 9acker "an5 boasts of unlimited su!!l# of su!er 3iruses
-n September *, !", Computer 4orld published a rather frightening article
e=plaining that an elite hac7er gang called Elder(ood had e=ploited eight /nternet
E=plorer Aopen bac7 doorB fla(s and (ere planning on attac7ing many more.
httpF??(((.computer(orld.com?s?article?)#"!+"?EliteWhac7erWgangWhasWunlimit
edWsupplyWofWIeroWdayWbugs
No3ember (/%( The Stuxnet Su!er Iirus S!reads to lar5e cor!orations
/n November !", Chevron admitted that it had become the first 0S corporation
to have a similar virus called Stu=net infect its computers. 4hile Stu=net (as
meant to destroy things, Flame and 'auss (ere designed to spy on people. /n
addition, the open door super viruses continued to plague personal computers as
is sho(n by the follo(ing blog post from November "), !".
1/ thin7 / got the flame virus A4indo(s *B. / have been onto the Microsoft support
page and follo(ed various RcuresR all to no avail. / have been into control panel
and gone through the (indo(s troubleshooting advice and it tells me that it has
found and fi=ed problems (ith my 4indo(s update and installed ) updates.
4hen / clic7 to restart / get the same failure message. /t seems to recycle the
startup procedure # times before it eventually gets to my des7top page, and
(hen / loo7 at my update history there is a long list of failed installations.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +)
No3ember (/%( Microsoft *ublic Launch of <indo1s
/n late -ctober !", Microsoft came out (ith an offer (here (e could 1upgrade2
from 4indo(s * to 4indo(s : for only SC!. .ut because my computer is so
important to my (or7, / (anted to try 4indo(s : out on a trial basis before /
made the leap. My caution (as based in part on my negative e=perience (ith
4indo(s Eista and in part on the fact that 4indo(s : (or7ed in a completely
different (ay than 4indo(s *. So / do(nloaded a trial version of 4indo(s :. /
also do(nloaded a trial version of -ffice !"#.
<indo1s is still not reliable e3en after the !ublic launch
My e=perience (ith 4indo(s : (as eerily similar to an article published on
November !, !"F httpF??tech.fortune.cnn.com?!"?""?!?(indo(s5:57illed5
my5pc?
.elo( is a Kuote from this articleF
1/>m not the first person to have issues migrating from 4indo(s * to 4indo(s :.
A number of users have ta7en to social media outlets li7e 3(itter and Faceboo7
to vent their frustration. Many report that their systems have completely crashed
as a result of the upgrade... 3he Microsoft engineers told me the issues / (as
having (ere uniKue and (ould probably only impact &C users (ho have the
e=act same configuration as my computer, (hich they estimated to be around
!!,!!! computers. / found it hard to believe that the (orld>s largest chip ma7er,
/ntel, and the (orld>s largest &C manufacturer, @enovo, had anything on the
mar7et today that couldn>t tal7 (ith 4indo(s : 6 that (ould be ridiculous, rightL /f
Microsoft doesn>t get its act together, it could soon face a revolt that could put the
company on the path to technological irrelevance.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D!
:lack Tuesda# =!dates mer5e 1ith <indo1s !roblems
.eginning in December !", .lac7 3uesday disasters became more freKuent.
-n .lac7 3uesday in December !", the monthly 4indo(s updates again
crashed my computer 6 along (ith millions of other computers around the (orld.
My computer (as still suffering from the deadly August !" 4indo(s Super
Eirus AFlameB update and / assumed this (as the underlying problem. ;o(ever,
(ith every monthly 4indo(s 0pdate since, my computer has gro(n
progressively more ill. 3he follo(ing comments (ere posted on a forum along
(ith doIens of reports of Microsoft users complaining that the December !"
update crashed their computersF
14indo(s update is telling me there is -NE more update MS"5!*: 6 Critical
must be do(nloaded and installed. / am terrified about doing that and restarting
the machine, rather (ait for Mayan prophecy to prove itself true this Friday but if
there (ill be no end of this (orld, (hat shall / do to prevent 4indo(s from
crashing my computer and ending my (orldL2
14indo(s recently installed ne( patches. 0pon reboot A/ (as sleeping and
never sa( it, / am no( stuc7 in 4indo(s update2 configuration hell. 3he
computer <ust reboots over and over Aeven after / try to get it into safe modeB
and / get the error message that (indo(s 1update did not configure properly.
4indo(s is reverting to last configuration.2 / cannot get past this. / am stuc7 in
this never ending nightmare.2
:lack Tuesda# *roblems continue in +anuar# (/%,
-n 9anuary : !"#, Microsoft released patches for " vulnerabilities in 4indo(s,
but did not come up (ith a fi= for the /nternet E=plorer A/EB bug that cyber
criminals have been e=ploiting for at least a month. 3hat vulnerability (as one of
several e=ploited by an elite hac7er group 1Elder(ood.R
.elo( are <ust a fe( of the hundreds of posts about 4indo(s updates crashing
computers in 9anuary !"#.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D"
1/ am SC,E4EDGGG 3he darn machine performed an update overnight and no( /
canJt get anything to (or7. Every single screen F,EEPESGGG / have conference
calls in hours and / cannot prepare for anything. 3;E 4-,S3 update ever.2
1;opefully there (ill be a fi= for this \fi=J. / need the fol7s at MS-F3 to do
something about it and fast. 0pdates are supposed to help, not hurt. 3ried a
system restore. .ut then my system goes and uploads the latest (indo( update
(hen / go to shut the system do(n only to have the same problem again.2
1Any suggestions to those of us (ho are stuc7 in this startup?reboot cycleL /Jve
tried everything and the problem seems to be getting (orse. 3his latest update
has rendered my des7top unusableG / no( 7eep getting a blue screen of death.
1$esterday morning -M' 4indo(s managed to get through the 1let me decide
(hat to install2 and decided for meG My computer is no( dead for good.2
1My computer tried to patch 4indo(s :... but that crashed my computer. After
that, it failed to reboot. Further chec7ing revealed my hard drive died. So much
for my ne( 4indo(s : computerG No (onder &C sales are do(nG2
1Fran7ly / doubt hac7ers could do as much damage as Microsoft did (ith this
poorly (ritten update ] /Jll ta7e my chances (ith the ;ac7ers. /Jll let some other
&oor Saps be MicrosoftJs unpaid .eta 0pdate 3esters ]2
14ell, add me to the list. / have a ;& (ith 4indo(s : / got it for Christmas. At
first, it (or7ed greatGG 3hen / 7ept getting the blue screen of death and it says to
go online. 4hen / try to go online, a fe( seconds later my computer goes blue
screen of death againG ASent from my /&AD because / canJt use my computerB.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D
3he updates have completely ruined both my motherJs and my boyfriendJs &Cs.
4E@@ D-NE M/C,-S-F3GGG No( (e all need ne( computers.2
1After updating last night automatically, my (hole 4indo(s : system is scre(ed
up. Start screen is glitched permanently, (ith the tiles sho(ing the (rong image,
the charm bar doesnJt even sho( any icons, and the volume bar has completely
disappeared. /Jve restarted multiple times, no dice. My ne( computer is dead in
the (ater. 4 am seriousl# considerin5 s1itchin5 to Linux because <indo1s
sim!l# does not 1ork.F
1/ have had several updates sitting in the Kueue, but (as reluctant to install after
the update in December caused me to pay S"+! in computer recovery fees. .ut
the system (as running so poorly, / finally gave in and attempted install of a fe(
updates last night. / have e=perienced no less than "! blue screen of death
events since. / have started in safe mode and attempted several restores. 3here
are still "D 1critical2 updates uninstalled and / am not (illing to try them again.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D#
/n March, !"#, the 4indo(s updates (ent from bad to (orse
1&ersonally / have suffered at the hands of the ill5conceived Microsoft Soft(are
Empire for too many years. 3his latest upgrade from 4indo(s * to 4indo(s : is
horrendous. /t brought my computer to a cra(l. ,ebooted several times and
even had to conduct a hard reboot. / have removed the 4indo(s patches. Still
my computer (onJt (or7.2
Microsoft ArecallsF a !atch after it does more harm than 5ood
/n February, !"#, Microsoft issued 4indo(s Security 0pdate 8.:##C that
addressed a vulnerability that an attac7er can e=ploit. /f you (ere gullible enough
to install this update on .lac7 3uesday in February, Microsoft advised you in an
obscure security blog post on April " !"# that you should manually uninstall
the patch whether your machine #ot toasted or not. (here+s a fair chance the
patch will send your computer into an endless cycle of the Blue Screen of $eath.
Microsoft said that users should uninstall this security update because it caused
1system errors.2 Microsoft has not specified e=actly (hat 1system errors2 are
being caused by this update. .ut according to numerous reports, the April !"#
update is causing more than errors Z many computers are unable to boot
because of itG
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age DC
.elo( are some forum posts on the April !"# 4indo(s 0pdate.
1April !"# update ruined my pc, no( it (onJt boot correctly, (onJt restore from
AN$ restore points. / have (asted days on this and / am thoroughly pissed.
&osted from my i&odF nothing else (or7s on any of my (indo(s pcJsG 1
1&atch 3uesday al(ays sends me into a cold s(eat. / have read so many horror
stories attributing to the updates. 3rouble is you feel compelled to install themG
3he April !"# &atch 3uesday (as a disaster for my computer. 3he computer
(as (or7ing normally until / tried to boot it this morning. /t (ill boot -8 to a
normal loo7ing screen, but then the screen gets display glitches, and neither the
mouse nor the 7eyboard (ill (or7 after that. / tried multiple reboots and different
system restore points, but none of them (ill fi= the problem. &ray for me.2
1April !"# update has been an absolute flop. Came into the room to find my &C
shutting do(n. @ogged in and nothing but application errors. Everything on
startup died. None of my office suite loadsG 3his is an absolute <o7e. Never again
(ill / install a 4indo(s update. Linux is lookin5 better all the time.F
3his (as the second time in t(o months that Microsoft had to pull a bad security
patch. httpF??(((.info(orld.com?t?microsoft5(indo(s?microsoft5(ithdra(s57b5
:##C5second5botched5automatic5update5year5"D#+
3hen, at the end of April !"#, a 0nited States Department of @abor (ebsite (as
hac7ed. Clic7ing on the site caused a computer running 4indo(s (ith /nternet
E=plorer : to do(nload malicious soft(are. 3he super virus ta7es advantage of a
1remote code e=ecution fla(2 in /nternet E=plorer..
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D+
Ma# (/%, Microsoft issues Me5a =!date... ,%;/// u!dates in a sin5le da#!
/ (ill never forget the May "C !"# 4indo(s 0pdate. -n .lac7 3uesday in May
!"#, Microsoft unleashed their most ridiculous update ever. 4hile the press
claimed that there (ere only ## updates, anyone (ith a Microsoft computer 7ne(
better. / (as stunned by the notice on my screen (hich stated that there (ere
more than ,%;/// u!dates bein5 installed on m# com!uter.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age DD
4hy have there been so many disastrous 4indo(s updates in the past fe(
monthsL /t is as if Microsoft is deliberately sabotaging all of our computers to
force us all to upgrade to 4indo(s :. -r is it <ust the open bac7 doorL
3he urgency of finishing the @inu= boo7 became even more apparent as the
problems (ith Microsoft seem to be getting (orse over time. After the May
update, / turned off 4indo(s updates to prevent any further damage to my
computer. .ut / 7ne( this (as not a long term solution because over time, my
o(n computer (ould become more vulnerable to attac7. 3his is because
4indo(s has a fundamental security fla(. /n order to leave it open to Microsoft
updates 6 the same door is also open to hac7ers 6 and there is no (ay to really
close it even if you turn off updates. No( / (as rushing to finish the boo7 on
@inu= in order to protect my o(n computerG
+une (/%, Another *atch Tuesda# causes more crashed com!uters
3he 9une "" !"# updates included a patch of its certificate handling
infrastructure and patches for code (hich could allo( information disclosure,
denial of service and remote code e=ecution. Another patch fi=ed ": fla(s in
/nternet E=plorer. All had the tag 1E=ploit code li7ely,2 indicating some very
serious problems. ;ere are a fe( 9une forum posts from pcsupport.about.comF
13he computer updated automatically installing these patches. 3hen it (onJt
start even after + attempts of auto repair. /t tells me the &C cannot start because
of a patch. @uc7ily / have installed @inu= in case 4indo(s does not (or7.2
13he latest MicroSuc7 update has completely crashed my laptop. 3han7fully /
run @inu= on my t(o pcs. MS * is being (iped off my laptop as / type.2
13his update this morning (iped my &CG / lost all the folders that (ere on my
des7top including thousands of pictures of my childrenG Can anyone help meL2
1/ did the 9une update and shut my computer do(n and / lost data that (as on
my computer after the restart. / am furious. / am sic7 and tired of this.2
1/ had the same problem. / used @inu= Mint "+ live CD to save my files to an
e=ternal ;ard Drive.2
13he first time / encountered this 1Microsoft5approved virus2 called /nternet
E=plorer "! update it bro7e my updater AND caused my system to slo( do(n
by about !H so / called MS and had to pay S)). 4hat a (asteG 3hey did
nothing. No( every time / go to bed my system tries to reinstall this virus and
brea7s everything. /tJs beyond obno=ious that it 7eeps scre(ing up my system
A(ith a half hour shutdo(n and lengthy boot up <ust to unsuccessfully retry the
updateB, itJs totally hopeless that it CA@@S 3;/S SC,E4ED50& S3A3E A
S0CCESSF0@ 0&DA3EG2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D*
Ma# (/%, 6#ber attacks a5ainst =S cor!orations on the rise.
According to the Ne( $or7 3imes, a ne( (ave of cyber attac7s is stri7ing
American corporations, prompting (arnings from federal officials, including a
vague one issued by the Department of ;omeland Security. 3his time, officials
say, the attac7ersJ aim is not espionage but sabotage, and the source seems to
be in the Middle East. 3he targets have primarily been energy companies, and
the attac7s appeared to be probes, loo7ing for (ays to seiIe control of their
processing systems. 3he attac7s are continuing. 3he Department of ;omeland
Security said it needs to e=pand its cyber security force by D!! hac7ing
specialists to 7eep pace (ith the rising number of threats.
+une (/%, <histleblo1er 0d1ard Sno1den re3eals Microsoft is 1orkin5
1ith NSA to s!# on <indo1s com!uter users
,eading the 3op Secret reports released by Ed(ard Sno(den sent chills do(n
my spine. / had <ust completed studying the ne( 4indo(s Startup program
called 0EF/ (ith Secure .oot and / (as <ust about finished (riting this boo7 to
e=pose this ma<or scandal. ;o(ever, Ed(ard Sno(den helped me understand
that / had only <ust been loo7ing at the tip of a rather ugly iceberg. / spent many
more days and nights do further research on the connections bet(een the NSA
and Microsoft. /t lined up e=actly (ith my research on 0EF/, Secure .oot,
4indo(s : and the open bac7 door.
+ul# (/%, *atch Tuesda# confirms more holes in <indo1s
Microsoft released seven more patches. All e=cept one of them close critical
vulnerabilities. 3he company has closed a total of #C holes in 4indo(s, /nternet
E=plorer, -ffice and many other products, among them the 4indo(s 7ernel
vulnerability that has affected the 4indo(s privilege system for over a month.
19uly !"# patches brea7 net(or7ing. .e(areG Anyone 7no( of a fi=L System
restore isnJt (or7ing.. 3his update has been a MASS/EE pain. /t has has
crashed # different soft(are programs and several others. Not good Microsoft.2
1After installing the 9uly updates /Jve run into massive problems. Some
applications no longer (ant to open and / can not successfully system restore.2
19uly ) !"# patches installed last night. No( my machine boots (ith a random
.S-D. / cannot even get into safe mode, nor system recovery, nor any of the
usual (ays to try to fi= MicrosoftJs mess. All of them results in a .S-DG2
1MS is is using 4indo(s 0pdates to crash 4indo(s * to try to force us to buy
4indo(s :. My des7top running on H& freeIing every !mins]./ should have
learned from the terrible updates earlier this year to not install them anymoreG2
1,andom .lue Screen -f Death A.S-DB after ": patches from 3uesday, 9uly ),
!"#. Cannot loo7 at the debug file, cannot stop the problem from the .S-D.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D:
Many people have claimed that the August !"# Microsoft 0pdates (ere the
(orst on record. 3he only solution left is to simply turn off Microsoft 0pdates and
install @inu= as a bac7up or primary access system to your files.
9o1 to Turn Off <indo1s =!dates
At some point, the ris7 of 4indo(s 0pdates crashing your computer (ill be
greater than the ris7 of hac7ers crashing your computer. /f and (hen you reach
this point, the follo(ing are steps you can ta7e to turn off 4indo(s 0pdates.
3hese steps apply mainly to 4indo(s * and 4indo(s H&. /f you have a 4indo(s
: computer, the updates are the least of your problem. My advice is to ta7e the
4indo(s : computer bac7 (here you got it and as7 for a refund.
9o1 to turn off <indo1s =!dates in <indo1s ?
-pen the Control &anel and clic7 on 4indo(s 0pdate. 3hen clic7 on Change
Settings. /n the section called 1/mportant 0pdates2 use the drop do(n arro( to
select 1Never chec7 for updates.2 3hen clic7 -8.
9o1 to turn off <indo1s =!dates in <indo1s J*
3here are t(o different methods that may or may not (or7.
First MethodF -pen the Control &anel and clic7 on System. 3hen clic7 on the
Automatic 0pdates tab. 3hen unselect the 18eep my computer up to date2 bo=.
AAlternately you may need to select 13urn off automatic updating.2 3hen clic7 -8.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D)
Second MethodF -pen the Control &anel and clic7 on Administrative 3ools. 3hen
clic7 on Services. @oo7 for the service called Automatic 0pdates. Select it.
3hen right clic7 on it and select &roperties. 3hen change the 1Startup 3ype2 to
Disabled. 3hen clic7 -8.
/f you turn off 4indo(s 0pdates, it is important to 7eep bac7ups of your data and
to install @inu= in a dual boot so that you can access your data even if A(henB
your 4indo(s operating system ever crashes. 3hese topics are covered in detail
in a later chapter. .ut first, let>s turn to some of Microsoft>s other shady dealings.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *!
(., Microsoft :lackmail <arnin57 =!5rade or Die!
AYou 1ould be a fool to use an#thin5 but Linux.F
3homas .ushnell, 'oogle 3echnical &ro<ects Director, April ), !"
-n April :, !"#, Microsoft announced that they (ill eliminate security support for
4indo(s H& on April :, !"C. 3his (ill leave more than D!! million 4indo(s H&
users (ithout a safe and viable solution to operate their computers. / 7ne( that
many of my students used 4indo(s H& and / (orried about (hat (ould happen
to them 6 and hundreds of millions of other H& users 5 (hen Microsoft pulls the
rug out from underneath them in April !"C. For me, this announcement (as the
final stra(. / began (riting this boo7 to help my students learn ho( to s(itch from
the 4indo(s operating system to the free @inu= operating system.
4hat (ill these hundreds of millions of H& users do (hen their computers are
brought do(n by hac7ers in April !"CL Some may for7 over S+!! to get
4indo(s : and -ffice !"# installed on their current computers.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *"
/t is clear that the main reason Microsoft is discontinuing 4indo(s H& Support is
to force H& users to pay for 4indo(s :. -thers may get so mad that they (ill for7
over S",!!! to move to an Apple computer. .ut (hat about the millions of people
(ho are <ust scrapping by and barely have enough money for food and shelterL
/t (as evident to me that my students (ould be vulnerable to computer attac7s
and therefore forced to 1upgrade2 to 4indo(s :.
The <indo1s J* Train <reck comin5 in A!ril (/%'... The =ltimate
6om!uter 6rash! Even those (ho do have the money to pay Microsoft for
4indo(s : (ill be in for a rude a(a7ening 6 because 4indo(s : is nothing at all
li7e 4indo(s H& or 4indo(s *. /nstead, 4indo(s : is riddled (ith problems that
(ill li7ely cause many users to see7 out other solutions to their computer needs.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *
3o encourage H& users to 1upgrade2 to 4indo(s :, Microsoft announced that
they are offering a 1"+U off2 special deal on upgrading to their 4indo(s :
operating system and -ffice !"#.
;opefully, having read our boo7 this far, you no( have a better understanding of
(hy (e should all ma7e the move to the @inu= free open source operating
system instead of paying the Microsoft blac7mailers. / am certain that even if
4indo(s : got all of their reliability problems (or7ed out and did not crash
computers, most of my students (ould simply not be able to handle the
comple=ity of all the ne( 4indo(s : commands 6 let alone feel comfortable
having an open bac7 door to the NSA inside of their computers. .
The Search for a :etter Alternati3e :e5ins
After learning that Microsoft (as going to pull the rug out from under hundreds of
millions of 4indo(s H& users, / began a Kuest in search of other better options.
-ne option (ould be to spend S",!!! or more on an Apple computer. 3he
problem here is that many people cannot afford to spend an e=tra thousand
dollars. 3hat is (hy they (ere still using 4indo(s H& instead of 4indo(s *. /n
addition, Apple is a monopoly lin7ed to the NSA <ust li7e Microsoft.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *#
For the first time, / began to seriously consider free open source programs as the
only other available option.
/ (as a(are that the number one selling laptop at AmaIon.com, the 'oogle
Chromeboo7, used the @inu= operating system A(hich 'oogle calls Chrome -SB.
3he Chrome boo7 is made by Samsung and sells for <ust S+!. /t (eighs <ust .C
pounds, has a battery life of D.+ hours, uses 0S. and # ports and has a
reliable and fast "D '. Solid State Drive 6 (ith additional capacity provided by
0S. flash drives. 4hen as7ed (hy 'oogle chose to use the @inu= operating
system on their internal computers and on their Chrome -S, the 'oogle
3echnical &ro<ects Director 3homas .ushnell said it (as about security. ;e said
that 'oogle (as a target for hac7ers and that the @inu= operating system (as the
safest operating system in e=istence.
AYou 1ould be a fool to use an#thin5 but Linux.F
3homas .ushnell, 'oogle 3echnical &ro<ects Director, April ), !"
.ut the Chromeboo7 is pretty limiting. 'oogle Chrome is limited to using 'oogle
Docs. 4hat / (as loo7ing for (as a solution (hich (ould (or7 on any computer
and run any program. Since the 'oogle Chrome operating system (as based on
the @inu= 0buntu operating system, @inu= 0buntu (as my ne=t stop. / tried four
versions of 0buntu. .ut they all had serious problems (ith their filing system.
0buntu loo7s li7e the Apple interface and the 'oogle Chrome interface because
the Apple operating system and the 'oogle Chrome operating system are close
cousins of the 0buntu operating system. .ut all of these operating systems have
filing systems (hich are more difficult to use than the 4indo(s filing system. /
really (anted something that (as as close as possible to 4indo(s so that my
students (ould not have to face a steep learning curve.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *C
Linux Mint... A free o!en source 3ersion of <indo1s J* and <indo1s ?
3hen / tried a free open source program called @inu= Mint Mate. / (as stunned.
3he Start Menu and filing system not only (or7ed almost e=actly li7e 4indo(s
H& and 4indo(s *, in many (ays it (as betterG
@inu= Mint comes (ith a free open source (ord processor called Libre Office '.
@ibre -ffice is better than Microsoft -ffice !"# and can (or7 (ith all of my 4ord
and E=cel and &o(er &oint documents. /t even (or7s (ith &DF and ;3M@
documents. @ibre -ffice C comes pre5installed on @inu= Mint "+ Mate 6 along
(ith hundreds of other free open source programsG / 7ne( immediately this (as
the option that could help my students and anyone avoid the 4indo(s :
nightmare that (ould befall them in April !"C. / began (riting this boo7 on ho(
to install and use @inu= Mint "+ Mate and @ibre -ffice.
<indo1s :lues... comin5 soon to a store near #ou
3he same day as the ridiculous Microsoft May Mega 0pdate, 3uesday, May "C,
!"# Microsoft announced that they (ould be coming out (ith a patch for
4indo(s : called 4indo(s : .lue and they (ould give a(ay 4indo(s : .lue
free to anyone (ho had the misfortune of buying 4indo(s :. /n the
announcement, Microsoft e=ecutives admitted that 4indo(s : suffered from
ma<or problems. .ut they promised to post a free patch in their store to fi= these
problems. 3hey assured us that this patch (ould bring bac7 the Start .utton Aor
at least (hat they called a 1Start 3ip2B and the ability to log directly into the
normal des7top screen rather than the ne( Metro 3iles screen.
3he problem (ith this 1solution2 is that it does nothing to fi= the underlying
structural problems of 4indo(s :. /n an effort to ma7e 4indo(s more tablet
friendly, Microsoft has destroyed the entire structure of 4indo(s * and replaced
it (ith a tin7er toy. 3he tin7er toy (ill remain 6 even if you log into the des7top
version of the tin7er toy.
4indo(s : differs radically from 4indo(s *. /t is not <ust that it relies on a tile5
based Start screen rather than the traditional start button and Start menu. -r that
it has t(o completely different interfaces 6 the traditional des7top screen (hich
comes up for some applications and the tile based screen (hich comes up for
other applications. /t is the entire structure of 4indo(s : that is the problem. 3he
differences bet(een 4indo(s : and 4indo(s * can be seen in the fact that
Microsoft issued *#) ma<or updates to 4indo(s : in the first si= months after it
(as releasedG
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *+
/n short, anyone unfortunate enough to be inflicted (ith a 4indo(s : heart attac7
is being offered a bo= of band aids. 3hey (ill eventually figure out that 4indo(s
: .lue is no better than 4indo(s : .lac7. -ffering victims of the 4indo(s :
.lues a free band5aid (ill do nothing to solve this problem. 3he only real solution
this leaves us is to move to an operating system that actually (or7s.
The 3er# next da#; Ma# %>; (/%, Microsoft issued another AJ* =!5rade to
<indo1s or DieF <arnin5.
Microsoft is really pulling out all of the stops to force people to give up 4indo(s
H&. After the May !"# .lac7 3uesday disaster, / 7ne( / needed to (or7 harder
on finishing this boo7 sho(ing people ho( to move to @inu=. 3here (ere t(o
ma<or problems. 3he first (as that documentation on @inu= has been (ritten
almost e=clusively by computer programmers 6 (ho ma7e using @inu= much
harder than it needs to be. / resolved to create a ne( 7ind of @inu= manual 5 one
that (as (ritten in plain English and included simple steps (ith a lot of screen
shots sho(ing my students (hich buttons to push and in (hich order.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *D
(.' =0F47 The Microsoft)NSA $ill S1itch
We call Windows 8.1 2Windows 3rison 4dition5 )ecause it5s desi#ned to re6uire
people to send data to *icrosoft servers, and of course, *icrosoft will hand over
any of that data to the US #overnment on re6uest. It puts the users in prison,7
,ichard Stallman 9uly !"#
/n this section (e (ill cover (hat is perhaps the most frightening part of the
Microsoft5NSA program to ta7e control over our computers. /t is a ne( program
called 0EF/. /t can be more accurately thought of as the Microsoft5NSA 8ill
S(itch. Microsoft has reKuired that this sinister 1feature2 be added to all 4indo(s
: computers.
Microsoft has created man# obstacles to !re3ent #ou from addin5 to Linux
As / continued my research, a much bigger problem emerged. Sadly, Microsoft
does not (ant people to use @inu=. Microsoft seems to be doing everything they
can to 7eep their corporate monopoly. 3hey (ant the money that (ill come from
forcing H& users to pay S+!! each to change to 4indo(s :. 3here are D!!
million 4indo(s H& users in the (orld today and Microsoft (ants all #!! million
to spend S+!! each to 1upgrade2 to 4indo(s : and -ffice !"#. 3hat is S#!!
billion dollars that Microsoft stands to lose if fol7s ever learn that they can get a
much more stable and reliable (ord processing system for free.
4n (/%(; Microsoft re3enue 1as S?( billion.
3he 4indo(s operating system is the 7ey to maintaining the Microsoft computer
monopoly. So Microsoft has placed all 7inds of malicious roadbloc7s, obstacles
and traps to prevent people from using @inu=.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age **
<hat is a Start =! *ro5ram8
3o understand (hat the problem (ith 0EF/ and Secure .oot is, it is helpful to
7no( a little bit about ho( computers start up. 4hen you push the &-4E, -N
button on your computer, this initiates a Start 0p program. ;istorically, the
universal startup program (as called ./-S (hich stands for :asic 4n!ut Out!ut
S#stem. 3his Start 0p program is installed by the computer manufacturer. ./-S
determines (hat program boots ne=t and in (hat order. 3ypically, the ne=t
program to boot is the 4indo(s .oot Manager. 3his starts 4indo(s (hich then
can be used to start 4indo(s based programs such as MS -ffice. 3here are free
open source versions of all of these things as sho(n belo(F
:4OS 3ersus 6ore :oot
./-S is a very old and stable system that allo(s you to have four or more
operating systems installed into four or more 1partitions2 on your computer.
.ecause ./-S is not a free open source program, and because it slo(ed do(n
the performance of @inu=, a group of @inu= programmers spent several years
developing an e=tremely fast, safe and free Startup program called Core .oot.
4hile Core .oot is free and could easily be installed on all computers,
manufacturers have continued to use ./-S until 4indo(s : came out in !".
0F4 turns into a monster called =0F4
Also during the past " years (hile Core .oot (as being developed, a
commercial Start 0p program called 0EF/ (as being developed. 0EF/ stands for
0nified E=tensible Firm(are /nterface. 0EF/ is based on a program called EF/
(hich (as an attempted by /ntel to update ./-S.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *:
EF/ did not have the Secure .oot 1feature2 and neither did 0EF/ until about !!:.
0EF/ has been criticiIed for not solving any of the problems of ./-S. @i7e ./-S,
0EF/ reKuires t(o separate drivers 6 one for the firm(are and one for the
operating system. 3his ma7es 0EF/ slo( and difficult to (or7 (ith. .ut the
biggest complaint about 0EF/ is that it placed control for programs in the hands
of computer manufacturers such as ;& and soft(are companies such as
Microsoft rather than in the hands of the computer o(ner AyouB.
/n fact, for computer users, Secure .oot is li7e putting on a pair of handcuffs.
3his does not stop hac7ers from attac7ing your computer 6 because hac7ers are
e=perts at removing handcuffs. .ut it does ma7e it harder for you to (or7 (ith
your computer 6 because no( you need to learn ho( to remove the Secure .oot
handcuffs before you can install @inu=.
-ne of the ne( 1features2 of 4indo(s : is something called 1Secure .oot.2 4hile
it does very little to protect your computer, it does ma7e it much more difficult to
add another operating system, such as @inu= to your computer. .eginning (ith
0EF/ version ., 0EF/ added a ne( feature called Secure .oot. 3his uses a
special 7ey, (hich is nothing more than a digital image, to be activated before
any operating system, or any other program can be loaded into the computer.
3here are several absurd things about this feature. First, Secure .oot is not a
very secure system. 3his is because digital images are easily copied. ,ecall that
fa7e digital images (ere used by Flame to attac7 Microsoft Security 0pdates. 4e
are no( all (ell a(are that this digital signature system does not (or7. Second,
generic 7eys are already in e=istence to bypass the system. /t seems that
everyone has been given a 7ey to your computer e=cept youG 3hird, Secure .oot
adds huge costs to computers because manufacturers have to pay private
companies to have Secure .oot and 0EF/ installed. For all of these reasons,
Core .oot is a much less e=pensive and more effective security system. Core
boot lets you control the final configuration. 3his is not only the most secure
system 6 it is also the easiest system for the end user... (hich is you.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *)
Despite all of these issues, and despite the fact that Secure .oot is an optional
feature of 0EF/, Microsoft has reKuired all computer manufacturers to use 0EF/
(ith Secure .oot on all of their 4indo(s : computers. /f Microsoft (as really
concerned about speed or security, they (ould have insisted on using Core .oot.
So the insistence on 0EF/ (ith Secure .oot seems to have only one purpose 6
to ma7e it difficult to impossible to install @inu= on your computer 6 in order to
maintain the Microsoft 4indo(s monopoly Aand?or to help the NSAB. 3o ma7e
matters (orse, Microsoft has insisted that manufacturers use a special 7ey
controlled by Microsoft 6 rather than a 7ey controlled by the manufacturer. 3his
gives Microsoft total control over your computer 6 not <ust the bac7door and the
front door 6 but also the Startup program. 3his is a very frightening development.
-ne of the (orst of these monopolistic predatory practices is forcing computer
manufacturers to sign e=clusive agreements to prevent manufacturers from
loading a free @inu= operating system into computers (hich have the 4indo(s
operating system. .ecause many users find it difficult to add an operating system
to their computer, a far better option (ould be to have it come pre5installed on all
computers so that all users (ould have to do to activate it is to clic7 on a button.
3he Kuestion is (hy computer manufacturers have not already added @inu= to
the computers they sell. After all, @inu= is free and can easily be installed in
computers by the manufacturer. 3hey could then sell their computers for a
hundred dollars cheaper (ith a fully functional operating system. 3his (ould also
give their customers a choice. /f they also (ant the Microsoft 4indo(s operating
system, they could pay an e=tra hundred dollars for it. .ut they (ould not have to
buy 4indo(s <ust to get the computer they (ant. Microsoft prevents this from
happening by forcing manufacturers to sign restrictive licensing agreements.
6anPt 1e Eust turn off Secure :oot8
$ou can 6 sort of. $ou can s(itch from Secure .oot mode to legacy mode. .ut
this is not the same as going bac7 to the old ./-S Start 0p program that starts
all 4indo(s H& and 4indo(s * computers. $ou still have the 0EF/ program
controlling (hether your 4indo(s : computer starts and the 7ill s(itch is still
there. 3here are reports of fol7s s(itching to the 0EF/ @egacy mode only to have
Microsoft s(itch the mode bac7 to secure boot at the ne=t Microsoft 0pdate. And
there is no (ay to close this bac7door to your computer because as (e no(
7no(, /nternet E=plorer is tied into the 4indo(s operating system. Finally, the
0EF/ code is ten times bigger than the ./-S code. 4hat do you thin7 all of that
e=tra code is all aboutL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :!
:ut isnPt =0F4 some nice !ro5ram that 1as created b# a non)!rofit 5rou!8
Since 0EF/ (ith Secure .oot is capable of destroying the entire (orld economy,
it is (orth understanding ho( this nuclear (eapon came into being. Microsoft
claims to be an innocent bystander in the creation of Secure .oot. .ut the facts
tell other(ise. According to the 0EF/ official story, around the turn of the century,
/ntel (anted to update the ./-S Startup program to help their chips start up
faster. So they used an 1open source2 operating system called .SD to create a
ne( Startup program called EF/ AE=tensible Firm(are /nterfaceB. 3here are
several things fishy about this official story. First, .SD stands for the .er7eley
Soft(are Distribution. /t (as created in the early "))!Js at the 0niversity of
California at .er7eley and is a free open source operating system. Fast for(ard
to !!!. /ntel (ants a better Startup program. Does it ma7e any sense that a
hard(are company li7e /ntel (ould try to (rite any soft(are program 6 much less
a program that controls the Startup of every computerL 3his is li7e Microsoft
deciding that they (ere going to start ma7ing their o(n computer chipsG
.esides if /ntel had really (anted a modern fast Startup program, they could
have simply have used the free open source Core .oot program that (as being
developed by the @inu= community. /n addition, EF/ (as not that fast or that
smart. /t (as slo(er than Core .oot because it used the same comple= driver
process that ./-S used. At any rate, according to the official story, in !!+ /ntel
gave up on the EF/ pro<ect and donated the EF/ code to the 0EF/ Forum 6 a non5
profit group that suddenly appeared li7e magic out of the middle of no(here
(hose mission it (as to create a modern Startup program. Naturally, /ntel and
Microsoft (ere on the .oard of this ne( nonprofit organiIation.
3he 0EF/ verification or signing mechanism is identical to the Microsoft
4indo(s signing mechanism 6 a process that has already been attac7ed and
compromised by the Flame virus.
/n !!D, 0EF/ made version ".! (hich (as not much different than EF/. .ut it
(as important enough for .ill 'ates to give a 8ey Note Speech about 0EF/F
13hese are changes across the board, in terms of ho( hard(are and soft(are
(or7 together. /f (e thin7 about boot, (e>re finally moving a(ay from the old
./-S to this unified e=tensible firm(are interface and that gives us ne(
fle=ibility and capability.R :ill "ates <4N906 (//- $e#note S!eech
0EF/ version ".! in !!D (as not that different from ./-S. /n particular, it did not
include secure boot. Neither did version ." (hich (as released on 9anuary *,
!!*. So (hat the hec7 (as .ill 'ates tal7ing about in his !!D speechL
Could it be that .ill 7ne( something completely different (as in the (or7sL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :"
.eginning in !!:, <ust a fe( months after Microsoft <oined the NSA &,/SM
program, strange things began to happen. 3he biggest change (as (ith version
.. 4ith version ., the purpose began to change, the tools began to change
and even the code began to change. Suddenly instead of being merely an
update to ./-S, 0EF/ became a nuclear (eapon (ith the addition of Secure
.oot. 3he 0EF/ manual gre( to be nearly ,!! pages.
4ho could have done thatL &ay no attention to that man behind the curtain A(ho
also happens to be the richest man in the (orldB. 3hen 0EF/ version .# (as
released in April !"" 6 <ust D months before the 1developer2 release of 4indo(s
: at a Microsoft Developer conference in September !"". 3he Secure .oot
contracts and certificates (ere not released until !". 3his seemed to be an
attempt to hide the real nature of Secure .oot until the release of 4indo(s :.
03idence that Microsoft created =0F4 and Secure :oot
Microsoft has denied having been involved in creating the 0EF/ and Secure .oot
3(in monsters. ;o(ever, there are four convincing facts (hich refute their claim.
First, 0EF/ file names use bac7 slashes for separators. Microsoft is the only
company in the (orld (hich uses bac7slashes in their file names. All other
programmers use for(ard slashes.
0xam!le of =nix For1ard Slash File Namin57
?home?davidspring?Documents?file.t=t
0xam!le of the same file 1ith Microsoft :ack1ard Slash File Namin57
CF^0sers^davidspring^Documents^file.t=t
3he open source community uses for(ard slashes to define file names. 3his is
because @inu= and .SD are both based on 0ni= and 0ni= uses For(ard slashes
for file names and bac7(ard slashes for the 1escape2 function. .ut there is one
company in the (orld that is arrogant enough to (rite their o(n computer
languages (hich uses bac7(ard slashes for file names. 3he company (ho uses
bac7(ard slashes for file names is Microsoft. And the 0EF/ file namesL 4ell,
they all no( use bac7(ard slashes. 3his is very odd because the 1official2 story
claims that 0EF/ (as based on .SD and .SD uses for(ard slashesG
Security e=perts are mad at Microsoft for insisting on programming (ith
bac7(ard slashes as it creates a huge security ris7. 3his is because all 0,@s use
for(ard slashes 6 including (eb pages (hich protect sensitive business data.
-ne e=ample of this danger occurred in !!C. Active Server &ages AAS&B is a
Microsoft programming language. /n !!C, it (as discovered that AS& has a
huge security fla( associated (ith bac7 slashed file names.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :
1.y using a bac7slash instead of a for(ard slash you could access secure
AS&.NE3 resources that normally reKuired authentication. So, if accessing
(((.e=ample.net?secure?private.asp= is supposed to be a protected (eb page
reKuiring authentication, anyone (ho (ants to could still access the file by
entering the 0,@ as (((.e=ample.net?secure^private.asp=. Even if you set
N3FS permissions to bloc7 anonymous users, AS&.NE3 still allo(ed access.2
Mark :urnett; 9ackin5 the 6ode and Stealin5 the Net1ork
/t is clear that in (riting 0EF/ (ith bac7 slashed file names, Microsoft has not
learned its lesson about (hat a dangerous practice this is. 3hey have no( tied
insecure bac7 slashed file names to the most dangerous computer (eapon ever
produced. 3his is (hy / maintain that 0EF/ and Secure .oot should be avoided
at all costs. 3here is nothing safe about either of these 1features.2 Computer
manufacturers should replace 0EF/ and Secure .oot (ith Core .oot 6 (hich of
course uses the standard and secure for(ard slash file names. /n any case, the
fact that 0EF/ has been changed to bac7 slashed file names is clear evidence
that the t(o latest versions of 0EF/ (ere actually (ritten by Microsoft
programmers. /t is also clear that Secure .oot (as (ritten by Microsoft and
added to 0EF/ at the very last minute. /t is also clear that Secure .oot (as
(ritten specifically for 4indo(s :. 3hus, MicrosoftJs finger prints are all over the
crime scene. And ma7e no doubt about it 6 0EF/ (ith Secure .oot is a crime
against humanity. /t doesnJt ta7e Sherloc7 ;olmes to figure out (here 0EF/ really
came from or (hat the real purpose of 4indo(s : is.
Second, the 0EF/ security signing mechanism is identical to the Microsoft
4indo(s security signing. / do not mean similar. / mean /DEN3/CA@. Many
sections of 0EF/ code even begins (ith the (ord 1(in.2
3hird, the versions of 0EF/ since Microsoft <oined this pro<ect are completely
different from the version of 0EF/ (hich e=isted before Microsoft <oined the
pro<ect. As <ust one e=ample, the original versions of 0EF/ did not have secure
boot and made no mention of anything li7e secure boot in their plans.
Fourth, before Microsoft <oined the pro<ect, the source code for EF/ (as open and
publicly available. After Microsoft <oined, a cloa7 of secrecy covered the pro<ect.
No one 7no(s for sure e=actly (hat is in the bloated 0EF/ code 6 (hich is ten
times bigger than either the ./-S code or the Core .oot code.
The Secure :oot $ill S1itch is different from the <indo1s AA!!sF $ill
S1itch that has been discussed in the media
A 8ill S(itch is a program (hich can remotely delete soft(are and edit code
(ithout the userJs permission. 3here are at least t(o 7no(n 8ill S(itches on the
4indo(s : operating system 6 these are the Secure .oot 8ill S(itch and the
Apps 8ill S(itch.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :#
3here has been some confusion in the media about (hich Microsoft 8ill S(itch is
the most dangerous. / (ant to ma7e it clear that / have no problem (ith the ne(
4indo(s : Apps 8ill S(itch (hich is capable of destroying any programs you
purchase through the Microsoft Apps Store. Anyone (ho buys an app through
the Microsoft Apps store deserves to have their programs nu7ed (ithout (arning.
3he Apps 8ill S(itch does not 7ill your entire computer and does not prevent you
from installing an alternate operating system. /n fact, all it ta7es is a comparison
of the silly programs at the Microsoft Apps store to the C!,!!! free programs at
the @inu= store to get people rushing out to do(nload @inu=.
4e have managed to get a picture of the 4indo(s : Secure .oot 8ill S(itchF
$ou can see that the <indo1s Secure :oot $ill S1itch comes (ith four
safety loc7s to prevent accidental discharge. 3his is very similar to the safety
mechanisms for any other nuclear device. .efore activating the 7ill s(itch, the
staff member A(ith super 7ey security clearanceB (ould first have to disable all
four safety loc7s. 3hey then (ould turn the 7ill s(itch to the -N position before
activating (ith the big red button affectionately 7no(n as the Doomsday
Machine. Naturally Microsoft has promised to only use this device against pirated
copies of their soft(are. Members of the open source community have
complained that 0EF/ and Secure .oot (ill prevent users from adding @inu=.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :C
Microsoft claims that that Secure .oot is needed for safety reasons. ;o(ever, if
Microsoft (as even remotely concerned about safety, they (ould not leave the
bac7 door open to all Microsoft operating systems. Microsoft had already created
problems for 1dual booting2 a @inu= operating system (ith 4indo(s *. 4e (ill
discuss these problems further in the section on dual booting. .ut it is apparent
that Microsoft is doing everything in its po(er to maintain its monopoly.
Microsoft 4indo(s has since "))* had 7no(n malicious features... features to
spy on the user and restrict (hat the user can do, (hich are in fact digital
handcuffs, and it has 7no(n bac7 door security problems (hereby Microsoft can
change anything about your program remotely. ;o(ever, these attempts at
censorship may bac7fire for Microsoft. As users become more a(are that
Microsoft is trying to limit their ability to use open source operating systems this
may actually increase the interest in using them. 0sers (ill realiIe that the (ay to
ta7e bac7 control over their future is to first ta7e bac7 control of their computer.
Secure :oot adds a ne1 3erb to the 0n5lish Lan5ua5e7 :rick
3han7s to Secure .oot, a ne( verb has been added to the English @anguage. /t
is bric7 6 as in 1Secure .oot <ust bric7ed my computer.2 3he verb comes from the
noun 1bric72 (hich is a heavy useless bloc7. Sadly, if you try to do anything
Secure .oot does not li7e, it might shut do(n your computer and prevent it from
turning on again 6 turning your computer into a heavy useless bloc7 a7a a bric7.
3here are no( numerous reports of 0EF/ and Secure .oot bric7ing computers
that attempt to install @inu=.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :+
Microsoft>s solution to the bric7ed computer problem is to buy a ne( official 7ey
from Microsoft. &erhaps this is the ne( Microsoft business model.
/n a later chapter, (e (ill sho( you ho( to turn of secure boot. 3here are many
reports that some computer manufacturers simply turn off @inu= operating
systems. 3hese include @enovo, 3oshiba and Samsung. .ut even turning off
Secure .oot and Microsoft 0pdate is <ust a temporary fi= 6 since Microsoft still
retains control over every computer (ith 4indo(s :?0EF/?Secure .oot installed
on it. 3he only real solution is to not buy a computer (ith 4indo(s : installed on
it and demand that computer manufacturers use Core .oot instead of
0EF/?Secure .oot. Even though 4indo(s : is the greatest attac7 on our
freedom since the East /ndia Corporation came up (ith the Stamp Act 6 a move
that started the American ,evolution 6 do not e=pect much help from our
government. A better solution is to file and run for office at the ne=t election.
/n the meantime, the best thing you can do to ta7e bac7 control of your computer
is finish reading this boo7 and learn ho( to install and use @inu= and @ibre -ffice
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :D
on your o(n computer. 4e (ill revie( the best available solutions to all of these
4indo(s : problems in later chapters. 3he reason this boo7 is so long is not
because @inu= is hard to learn. ,ather it is because of all the Microsoft traps.
The Secure :oot Tra! is challen5ed in 6ourt
-n March D, !"#, an :,!!! member group in Spain called ;ispalinu= filed a
complaint against Microsoft protesting that the ne( 1Secure .oot2 feature in
4indo(s : (as simply another attempt to maintain the Microsoft Monopoly by
ma7ing it more difficult for fol7s to add @inu= to their computers.
10EF/ Secure .oot (ith Microsoft 7eys is Rdesigned to bloc7 non5Microsoft
soft(are. 3his is not a side5effect. /t is its main purpose and is spelled out as
such in Microsoft>s o(n documentation... -ne of the options allo(ed by 0EF/ is
the digital signature of drivers and applications, permitting complete control over
the start5up system. Microsoft, as the sole o(ner of the private 7ey, (hich
matches up (ith the public 7ey held in the memory of computers running
4indo(s :, is the only party that can authoriIe AsignB the soft(are components
in 0EF/, the only party that can sign the boot of the operating system, and the
only party that can sign the communications bet(een the operating system and
0EF/. 3o attain this goal, Microsoft has to use all its influence and po(er in the
mar7et to force computer and component manufacturers to accept its monopoly
in the 7ey generation system.R ;ispalinu= @ead Attorney 9ose @ancho
/n 9une !"#, the American Civil @iberties 0nion filed a la(suit against the NSA
for violations of the "st and Cth Amendments to the 0S Constitution. ;opefully,
this boo7 (ill help more people understand the connection bet(een Microsoft
and the NSA and help them ta7e steps to free their computers from this attac7 on
their privacy.
03er#thin5 to 5ain and nothin5 to lose
/t is important to understand that you do not need to give up your current
operating system or (ord processing programs to install open source tools on
your computer. $ou can have @inu= and 4indo(s open at the same time and
s(itch bac7 and forth bet(een them <ust li7e s(itching bac7 and forth bet(een
your (eb bro(ser and a 4ord document. $ou can even use open source tools
li7e @ibre -ffice to (or7 (ith, save and send 4ord documents. And you can use
the @inu= operating system to run 4indo(s programs. /n fact, nearly anything
that you currently do using e=pensive Microsoft programs you can do better,
easier and safer using free open source tools.
4e (ill sho( you ho( to safely install and use open source tools so you can test
them side by side (ith (hatever you are currently using 5and decide for yourself
(hether you (ant to <ump permanently to open source. -pen source tools put
you in control of your computer and your life. No more patches, no more
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :*
upgrades, no more hasslesG /n other (ords, you have nothing to lose and
everything to gain by learning more about the many benefits of open source
tools. -nce you give it a try, you (ill probably (onder (hy you (aited so long.
3hat is ho( (e all feel the first time (e are e=posed to open source programs.
Many organiIations have seen the (riting on the (all and already made the
move from 4indo(s to @inu=.
<hatPs Next8
3he above are <ust a fe( benefits of @inu= over 4indo(s. /n the ne=t t(o
chapters, (e (ill describe ! more reasons for using the @inu= operating system
instead of 4indo(s :. /f you are in a hurry to get started adding @inu= to your
computer, you can s7ip these chapters and move directly to Section . .ut if you
really (ant to understand the inner (or7ings of 4indo(s : and @inu=, there is a
lot of important information in the ne=t t(o chapters that is (orth 7no(ing.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ::
6ha!ter ,... <h# 1e must end the Microsoft Mono!ol#
<e must end the Microsoft Mono!ol# before it ends us.
C%a&ter 3 in+lu#e$ t%e followin" four $e+tion$,
,.) <op <en >easons to use Linux instead of Windows A
,.+ Wh Windows A 5lue will not fix the >eal Problems
,., <he Fatal Flaw of the ;icrosoft Windows ;onopol
,.1 <he >eal @ost of the ;icrosoft ;onopol
In the first two chapters of this boo$# we pointed out se6eral major problems of
Windows A none of which ha6e been fixed% b Windows A.) 5lue. <hese
problems include ;icrosoft=s collusion with the 723 to create an open bac$ door
to all of our computers. <his open bac$ door also created a securit ni"htmare
which has led to a constant stream of super bu"s# updates% and computer
crashes. 3s if this was not bad enou"h# Windows A has added two more
problems b attemptin" to create the world=s first dual% operatin" sstem 9ha6in"
two separate control panels: and imposin" a monstrous startup pro"ram called
B'FI with a horrific add on called 2ecure 5oot. <hese two pro"rams are simpl a
friendl face put on the ;icrosoft4723% Cill 2witch which "i6es ;icrosoft
and.or the 723 complete control o6er an computer that has this startup pro"ram
installed on it. <he onl wa to a6oid this problem is to not bu a Windows A
computer.
2adl# stain" with Windows XP or Windows 7 are no lon"er 6iable options
either. ;icrosoft has announced that the will stop securit support for Windows
XP on 3pril A +*)1. 5ut the realit is that Windows Bpdates themsel6es are no
lon"er trustworth. ;icrosoft is so insistent that we all update% to Windows A that
the appear to be deliberatel sabota"in" their own updates and crashin"
Windows XP and Windows 7 computers in an effort to force fol$s to bu a
Windows A computer. <hus# there is onl one option for fol$s who want to "et
bac$ control o6er their computers. <hat option is to $eep usin" our current
computer hopefull with the 5I!2 startup pro"ram 4 and turn off Windows
Bpdates. <hen# to retain access to our data in the e6ent of a Windows crash#
add Linux in a dual boot% confi"uration and switch o6er to usin" Linux as our
primar operatin" sstem.
5ecause ;icrosoft has placed man obstacles in our wa in an effort to pre6ent
ou from addin" Linux to our computer# in this chapter we will pro6ide se6eral
more reasons ou should add Linux to ou computer. '6en if ou are not
concerned about ;icrosoft or the 723 $illin" our computer. <his chapter
pro6ides a summar of the man hu"e benefits ou will "et b addin" Linux to
our computer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :)
,.% To! Ten 2easons to use Linux instead of <indo1s
I hate Windos !. "ate it ith a passion. # passion as hot as a thousand
suns. The problem ith Windos ! is that $icroso%t decided to sho&e a
hi'hly ine%%icient touch(based user inter%ace onto millions o% )C users
usin' non(touch desktops and notebooks... %orcin' people sittin' behind
desktops and notebooks to chan'e their ork %lo on a him is simply
askin' too much. #nd belie&e me, a%ter tryin' %or months to like Windos
!, I still hate it.* Adrian Hughes Forbes Magazine
http-..www.forbes.com.sites.adrian$in"slehu"hes.+*),.*,.)1.wh4windows4A4
is4 the4first4windows4release4i4absolutel4hate.
/n this section, (e (ill revie( "! important reasons to ma7e the s(itch to @inu=
rather than shelling out another S+!! for 4indo(s : and -ffice !"#. ;opefully
after reading this article, you (ill have a better understanding of (hy (e should
all ma7e the move to the @inu= free open source operating system.
W%7 Linux costs less... 4n fact; it is free!
/n our previous article, (e pointed out the 1impending doom2 of the 4indo(s H&
operating system in April !"C and the fact that replacing 4indo(s and -ffice
(ith the ne(er versions (ill cost about S+!!. Mean(hile @inu= Mint (ith @ibre
-ffice is free.
@etJs say, you buy a ne( computer every couple of years. .y this point, you have
been through the ringer of MS D-S, through 4indo(s )+, ):, ME, !!#, H&,
Eista, * and no( 4indo(s :. $ou have also been through many versions of
-ffice. Each time 4indo(s destroys your computer, you pay several hundred
dollars for an upgrade that often (or7ed (orse than the version you could no
longer use because it (as 1no longer supported.2 Fol7s are starting to add up the
cost of all of these ne( versions. /n most cases, it comes to more than S!! per
year <ust for soft(areG /f you have a family and several computers, or a small
business (ith several computers, the cost Kuic7ly e=ceeds S",!!! per year.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )!
Microsoft typically sells S*! billion in soft(are every year 6 and ma7es more than
S! billion in profit every yearG .ut instead of passing along some of these
savings to their customers, Microsoft is no( increasing prices in a very hidden
(ay by moving to a 1soft(are as a service2 ASAASB model (hereby you only rent
their soft(are for a month or a year at a time instead of buying it. /ronically, for all
the money (e are sin7ing into these over5priced products, (e are getting a
product that is (orse than an open source option (e can get for free. My mom
had a sayingF 1Fool me once, shame on you... fool me t(ice, shame on me.2
W(7 Linux is more de!endable than <indo1s
4e have already given many e=amples sho(ing that 4indo(s : is an unstable
system (ith numerous technical problems (hich cause it to freeIe or crash
causing the .lue Screen of Death. 3he reason 4indo(s : is so unstable is that
Microsoft is trying to combine a 1metro2 -perating System (ith a traditional
14indo(s *2 des7top -perating System. 3hese are fundamentally incompatible
ob<ectives and as incompatible as trying to combine (ater (ith oil. 3he 4indo(s
: operating system ends up not (or7 (ell for either mobile or des7top usage.
3he 4indo(s : underlying programming is so different from the 4indo(s *
des7top structure that 4indo(s : has been plagued (ith a series of technical
crashes right from the initial public launch. 3hese are in addition to the ongoing
technical problems (ith viruses and crashes that have plagued all past versions
of Microsoft 4indo(s.
Linux Mint %> Mate Start screen and menu
@inu= Mint Mate does not suffer from any of these technical problems. $ou (ill
therefore be able to get your (or7 done (ithout (orrying about your computer
crashing and losing all of your data. 3he follo(ing are all more e=amples of ho(
undependable 4indo(s : really is.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )"
<indo1s still has :oot Loo! !roblems
&roblems have continued to plague 4indo(s :. A (hole list of 4indo(s : crash
problems is posted on the follo(ing (ebsiteF
httpF??crashctrl.com?!"#?!?surface5pro57no(n5issues5bugs5Kuic75fi=es?
3his is the sarcastic comment from a computer repair analystF
1Ah, (oe be unto you. For you have fallen into the Secure .oot @oader loop due
to a Firm(are &anic. / (eep for you. &lease note that the terms Secure .oot
@oader @oop AS.@@B and Firm(are &anic are both arbitrary terms that / created
to attach to these hard(are failures. / feel they are the best description available
(ith the information at hand. Microsoft has not stated (hat is actually happening
(hen S.@@ occurs. Most assume it is a dead SSD but (ho 7no(sL2
W,7 Linux is much safer...<indo1s lea3es im!ortant securit# information
on text files 1hich hackers can easil# access
4indo(s : leaves identity and security information e=posed to hac7ers. @inus
Mint doesnJt. $ou are therefore less li7ely to suffer from identity theft or being
attac7ed by viruses if you s(itch to @inu= Mint. 3he reason 4indo(s computers
are so easily attac7ed is because they are designed to be attac7ed.
<h# <indo1s is much more likel# to 5et Iiruses than Linux
3he biggest problem (ith 4indo(s is that Microsoft leaves the 1bac7 door2 open
to your computer so that they can reduce pirating Aand help the NSAB. 3he bac7
door is a lin7 bet(een 4indo(s and /nternet E=plorer. .ecause this bac7door is
open, hac7ers have learned ho( to go in the same bac7door that Microsoft uses
to access your computer for updates. 3his is (hy 4indo(s computers are so
vulnerable to viruses, ad (are, and spy (are. /t has been estimated that the
average 4indo(s computer is infected (ithin C! minutes of going online. 3his is
also (hy you need antiviral programs if you are using 4indo(s. @inu= does not
leave the bac7door open because they do not care (here you got your copy of
@inu= from.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )
.ut there are other features that ma7e @inu= more dependable than 4indo(s.
For e=ample, @inu= uses folder, file and program authoriIation management.
3here are thus several levels of security in @inu=. /n 4indo(s you can do pretty
much anything to the system. $ou can go inside the system folder and delete
(hatever you (antF 4indo(s (on>t complain even if you delete critical files.
@inu= doesn>t allo( that. Every time you reKuest to do something that has to do
(ith the system, an administrator pass(ord is reKuired. Many important files are
hidden from vie( and you have to turn off file hiding even to see them. 3his
means that viruses can>t delete or modify (hat they (ant in the @inu= system as
easily as they can in the 4indo(s system.
W'7 Linux is Faster... <indo1s runs slo1 because it has bloated soft1are
Chec7 out the follo(ing comparison of three different tablet systemsF
Tablet Total S!ace Free S!ace OS Took X Free
Apple /&ad # '. : '. C '. ::U
Asus Android # # '. : '. C '. ::U
MS Surface # '. "+ '. "* '. CDU
Anote that the Asus Android uses a version of the @inu= operating systemB
The <indo1s o!eratin5 s#stem uses an incredible %? ": of disc s!ace 6
over C times more than Apple or Android. 3his is (hy Apple and Android are
many times faster than 4indo(s :. /n addition, the MS Surface needs t(ice the
(or7ing ,AM as the Asus Android, A to C '. instead of " to " '.B but is much
slo(er at everything. /n other (ords, Apple and Android use C '. (hile
4indo(s : uses "* '.. 3his is a real problem if you are loo7ing at video games
and (ant to avoid latency issues. No dedicated gamer is going to (ant a slo(,
bloated operating system.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )#
"ro1th of Microsoft <indo1s File SiCe o3er Time
Microsoft 4indo(s has not al(ays been so huge. .elo( is a table sho(ing the
increase in file siIe over time using data from 4i7ipedia.org.
<indo1s
Iersion
Years 2ecommended
2AM GM:H
2ecommended S!ace
on 9ard Dri3e GM:H
4indo(s #." ")) to "))C " "+
4indo(s )+ "))+ to "))* : +!
4indo(s ): ")): to "))) C +!!
4indo(s ME !!! to !!" DC ,!!!
4indo(s H& !! to !!D +D ,!!!
4indo(s ES !!* to !!: ",!!! "+,!!!
4indo(s * !!) to !"" ,!!! M. !,!!!
4indo(s : !" to no( C,!!! M. !,!!!
4hy has 4indo(s gro(n so much bigger than any other operating systemL And
(hy is 4indo(s : so much bigger than earlier versions of 4indo(sL 3his does
not even include the file siIe e=pansion due to all of the monthly updates. 4hat
is in all of this secret 4indo(s codingL No one 7no(s. .ut it canJt be good 6
especially for someone (ith an older computer that li7ely does not even have
more than " '. of ,AM. -n many older computers, 4indo(s : (ill not even runG
<h# does #our <indo1s com!uter 5et slo1er da# after da#8
.ut as slo( as 4indo(s is (hen it is ne(, it gets even slo(er over time.
4indo(s has a number of design fla(s, resulting in it becoming slo(er and
slo(er and not lasting very long. $ou>ve probably heard more than once
someone say RMy computer is getting sluggishR. 3here are several things that
cause 4indo(s computers to slo( do(n. -ne is all of the patches intended to
protect the open bac7door from hac7ers. 3he other is fragmentation because
4indo(s does not do a good <ob of using disc space efficiently. $ou may thin7
this is <ust ho( computers (or7. 4ell, try @inu= and you>ll be surprised. Five
years from no(, your system (ill be <ust as fast as the day you installed it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )C
-., /in#ow$ 8 0ou+% S+reen +au$e$ 1orilla Arm...
4indo(s : 3ouch Screen causes ergonomic fatigue and in<uries (hen used on a
des7top or laptop. 3he ideal position for humans at (or7 is eyes up and hands
do(n. @inu= Mint allo(s you to use your computer efficiently (ith your hands
do(n at your side resting on the 7eyboard and your eyes loo7ing straight ahead
at the vertical monitor. 0sing 4indo(s : touch (ith des7tops and laptops
reKuires lifting your arms to perform difficult hand motions on the touch screen
straining your bac7 and arms. 0sing 4indo(s : touch (ith tablets forces your
eyes and head to loo7 do(n, straining your nec7. /n a recent study, researchers
at the ;arvard School of &ublic ;ealth loo7ed at (hether using a tablet in various
seating configurations can cause head and nec7 strain.
3hey found that using a tablet on your lap for e=tended periods may raise the ris7
of nec7 and shoulder discomfort and potentially musculos7eletal problems
because it forces the user to loo7 do(n at a steep angle. 3his causes head and
nec7 fle=ion and is a particularly haIardous for users (ho are doing a lot of
typing. 0sing touch5screen computer tablets strains muscles in the head and
nec7 more than a des7top or laptop computer (ould.
<he ideal wor$ confi"uration is ees up and hands down.
>eachin" up to a lap top with a 6ertical touch screen strains arms and wrists.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )+
<he worst wor$ confi"uration is head down... it is a pain in the nec$D
3he ideal solution for getting (or7 done is a vertical screen and a horiIontal
7eyboard. 3his is (hy laptops and des7tops are easier to use and less tiring. /t is
because they use a vertical screen for the eyes and a horiIontal 7eyboard for the
hands. &utting your hands on a vertical screen or putting your eyes on a
horiIontal tablet (ill eventually cause fatigue and chronic stress. /n other (ords,
traditional laptops and des7tops are better than tablets and touch screen laptops
and des7tops. Ne( is not al(ays better. Apple>s Steve 9obs once said he>d never
launch a touchscreen laptop because of (hat he called Rgorilla armR. R4e>ve
done tons of user testing on this,R he said bac7 in !"!, Rand it turns out it
doesn>t (or7. 3ouch surfaces don>t (ant to be vertical. /t gives great demo, but
after a short period of time you start to fatigue, and after an e=tended period of
time, your arm (ants to fall off.R Studies have sho(n that users of des7top
touchscreens report a Rsignificant increase of discomfort in the shoulder, nec7
and fingersN and that the electric signals from shoulder muscles tell the same
story.2 R4e concluded that the more freKuent use of their hands and fingers in
unsupported 6 arms (ere off the chair armrests 6 and stretched arm postures,
(hich (as necessary to perform touch gestures on the display, could be the main
cause of their greater body discomforts,R says '(anseob Shin of the 0rban
National /nstitute of Science and 3echnology. 3his problem (as also covered in
the 9anuary !"# issue of Scientific AmericanF
httpF??(((.scientificamerican.com?article.cfmLidO(hy5touch5screens5(ill5not5
ta7e5over
In late +*)+ ;icrosoft bro$e from the pac$. It made a billion4dollar "amble that
personal computin" is ta$in" a new direction. <he "amble was Windows A# and
the direction is touch. 3t first# ou mi"ht thin$# <ouch has been incredibl
successful on our phones# tablets# airport $ios$s and cash machines. Wh not
on our computersE... I=ll tell ou wh not- because of "orilla arm.% <here are
three bi" differences between these hand touch screens and a P@=s screen-
an"le# distance and time inter6al...Fou=re not just tappin" bi"# fin"er4friendl
icons. Fou=re trin" to ma$e tin# precise mo6ements on the "lass# on a 6ertical
surface# at arm=s len"th.%
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )D
<he public mi"ht dismiss 2te6e (obs as just someone sain" bad stuff about
;icrosoft. 5ut when er"onomics experts start writin" in 2cientific 3merican# the
public is "oin" to at some point find out that Windows A <ouch laptops are a
fundamentall flawed desi"n. <here is no patch% for such a "larin" flaw.
-6, /in#ow$ 8 2an# 1e$ture$ are 3rror 4rone
Windows A introduces a bunch of complicated fin"er "estures that are 6er
erratic and eas to "et wron". I often ha6e to do the same motion three times to
"et it to wor$. If somethin" doesn=t wor$# users don=t $now whether the did the
"esture wron"# or if the "esture doesn=t wor$ in the current context# or if the
need to do a different "esture entirel. <his ma$es it hard to learn and remember
the "estures. 3nd it ma$es actual use hi"hl error4prone and more time4
consumin" than necessar.

Above are ei"%t of t%e /in#ow$ 8 new %an# "e$ture$
It was the erratic nature of the hand motions and hidden hot corners that "ot me
worried about whether m students would be able to learn Windows A. I thin$
man of them will not be able to do these hand motions because the are hard to
memoriGe and do not alwas wor$. ;an are not e6en "oin" to "et a touch
screen as the prefer to use a mouse and $eboard. 2o the new ;etro interface
did not ma$e an sense at all. If ou want to use our mouse and $eboard to
open or close almost anthin"# ou need to learn about what is hidden behind the
new hot spots in the four corners of our computer screen. Fou also need to
learn more than a doGen shortcuts usin" a combination of $es on our
$eboard. Fou also need a lot of patience. <he interface is littered with swipe
ambi"uit# where similar 9or identical: "estures ha6e different outcomes
dependin" on subtle details in how the=re acti6ated or executed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )*
5elie6e it or not# the followin" is a real Windows A command to open an
application- <o re6eal the list of currentl runnin" applications- ou need to first
swipe from the screen=s left ed"e# and then immediatel re6erse direction and do
a small swipe the other wa# and finall ma$e a 0*4de"ree turn to mo6e our
fin"er to a thumbnail of the desired application. <he sli"htest mista$e in an of
these steps "i6es ou a different result. For example# start swipin" from the ri"ht
to the left and ou will either scroll the screen horiGontall or re6eal the charm
bar# dependin" on exactl where our fin"er first touched the screen. <his is
simpl a 6er bad desi"n that as users "i6e up will dri6e them awa from
;icrosoft and force them to loo$ for other options. 5elow is an example of how
Windows A replaces simple commands with complex fin"er motions.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ):
-5, Linux +ome$ wit% a full6 fun+tionin" /or# 4ro+e$$in" &ro"ram.
Linux comes with a full functionin" Word Processin" pro"ram called Libre !ffice
which can be used to open# edit and send ;icrosoft Word documents.
;icrosoft Windows does not come with anthin" as ;icrosoft !ffice costs
hundreds of dollars 'X<>3.
-8 Linux offer$ %un#re#$ of a##itional free tool$
Linux ;int also comes with a software center which allows ou to download
hundreds of additional free tools with just the clic$ of a button.
<his is one of the bi""est ad6anta"es of Linux o6er Windows. If ou want to add
special abilities to our computer# ou do not need to bu them as thousands of
free pro"rams can be added to our Linux operatin" sstem with just the clic$ of
a button. <hese free pro"rams include ima"e editors such as HI;P# des$top
recorders# 6ideo plaers and 6ideo editors. 3ll of these tools are nicel or"aniGed
b cate"or with re6iews in the 2oftware ;ana"er.
W&7 Linux brin5s #our old com!uter back to life
.ecause its code is so bloated to begin (ith and gets even (orse over time (ith
all of the patches, 4indo(s uses much more hard(are po(er <ust to ma7e it
(or7. .ut for most users, (ho surf the (eb, read and (rite emails, there is really
no need to be buying a ne( computer every three years. @inu= runs very (ell on
older computers 6 ma7ing them faster than the day they (ere ne(.
W%/7 Linux *romotes *ersonal Freedom
@inu= and R-pen SourceR soft(are are RfreeR. 3his means their license is a Rfree
licenseR, and the most common is the '&@ A'eneral &ublic @icenseB. 3his license
states that anyone is allo(ed to copy the soft(are, see the source code, modify
it, and redistribute it as long as it remains licensed (ith the '&@.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ))
4hat is so important about freedomL /magine if Microsoft doubles the price for a
4indo(s or -ffice license to S",!!! per year per computer. -r imagine if the
NSA decides to shut do(n your computer. /f you>re tied to 4indo(s, there>s
nothing you can do. $ou and your business are stuc7 (ith a single monopoly and
Microsoft can charge (hatever they (ant and you (ill have to pay it.

4ith -pen Source, if a particular pro<ect or support company dies, or even ta7es
their pro<ect in a direction you do not li7e, all the code remains open to the
community and people can 7eep improving it. /f this pro<ect is especially useful to
you, you can even do this yourself. $ou>re free to do (hatever you (ant (ith
open source soft(are.
Iopefull# the past three chapters will help ou better understand wh ;icrosoft8s
das for dominatin" the world8s computer operatin" sstems are numbered. <he
mi"ht be able to hide the truth for a little while. 5ut the Windows A operatin"
sstem is so bad that at some point# users will start loo$in" for other solutions.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!!
,.( <h# <indo1s :lue 1ill not fix the 2eal *roblem
Frankl#; 4 think the ne1 Start button 1ill onl# make ex!erienced <indo1s
users an5r# ) 3er# an5r#. 4tBs certainl# 5oin5 to confuse the li3in5
da#li5hts out of a lot of other1ise sane <indo1s users. 4n s!ite of 1hat
#ou ma# ha3e read in some 1ell)kno1n !ublications; there sim!l# is no
Start menu in <in.%. No 1a#; no ho1 ) all 1e 5et is a Start button; and itBs
a sham... The bottom line7 <indo1s .% K:lueK is more of the same
nonsense.F 4oody @eonhard, info(orld.com
htpF??(((.info(orld.com?t?microsoft5(indo(s?(indo(s5blue5microsoft5blo(s5it5
"):!LpageO!, t
/n May !"#, the ne( head of the Microsoft 4indo(s : program claimed that
Microsoft had fi=ed over *!! problems since 4indo(s : first came out in -ctober
!". She also said that 4indo(s :." .lue (ould address many of the remaining
issues. /n this chapter, (e (ill e=plain (hy 4indo(s :." .lue does not address
the real problems of 4indo(s : 6 because the (hole 4indo(s : concept is
fundamentally fla(ed. /n 9une !"#, / do(nloaded the latest version of 4indo(s
: to demonstrate these problems. .ut before (e get into the details, / (ant to
ma7e it clear that the -N@$ solution to the 4indo(s : problems is for Microsoft
to abandon the entire thing. Microsoft needs to do (hat Apple has done and (hat
@inu= has done and create separate operating systems for mobile devices and
des7top computers. /n trying to be everything for everyone, 4indo(s : (inds up
doing nothing (ell for anyone. Microsoft also must get rid of the 4indo(s bac7
door, 0EF/ and Secure .oot. .ut because of its 1deal2 (ith the NSA, this is
simply not going to happen.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!"
Microsoft not only has a structural problem (ith their 4indo(s : operating
system, but they also have a structural problem (ith ho( decisions are made at
Microsoft. First, the Microsoft upper management ignored the advice of their o(n
computer programmers in scraping the 4indo(s * des7top structure Aand a
separate mobile systemB. 3hen they ignored the advice of thousands of beta
testers (ho pointed out nearly every problem (e are no( covering in this boo7.
3he upper management at Microsoft then ignored the failure of 4indo(s : at the
media launch in 9une !". 3hey released 4indo(s : (hile it (as still unstable
and loaded (ith bugs in -ctober !" 6 simply to try to ta7e advantage of the
Christmas shopping season. 3hen they tried to blame other programs for the fact
that 4indo(s : 7ept crashing. No( (e find out that they have also sold out their
customers by giving the NSA access to 4indo(s computersG 3o 1fi=2 these
problems, they are claiming that adding bac7 a 1Start 3ip2 (ill ma7e everything
better. .ut 4indo(s : .lue is simply putting lipstic7 on a pig.
.eneath the lip stic7, there is still going to be a terribly dysfunctional pig of an
operating system. And / mean that literally. 4indo(s : ta7es up an incredible "!
'. right out of the bo=. 3his does not include the -ffice (ord processing
program or any of doIens of other programs (hich come by default (ith @inu=.
4indo(s is C!!U bigger than either Apple or @inu=. 4indo(s : is a slo( pig that
eats up all the resources on your computer 6 thus slo(ing do(n everything else.
-bviously adding even more patches on this pig (ith 4indo(s : .lue is only
going to ma7e the problem (orse. No( for the details about the real problems
(ith 4indo(s : that (ill not be fi=ed by 4indo(s : .lue.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!
*roblems Not Fixed b# <indo1s .% :lue
/n the last section (e pointed out ten ma<or problems of 4indo(s : 6 none of
(hich are fi=ed (ith 4indo(s : .lue.
V"F @inu= costs less... /n fact, it is freeG
VF @inu= is more dependable than 4indo(s :
V#F @inu= is much safer...4indo(s : leaves important security information on te=t
files (hich hac7ers can easily access
VCF @inu= is Faster... 4indo(s : runs slo( because it has bloated soft(are
V+F 4indo(s : touch screen causes 'orilla Arm.
VDF 4indo(s : hand gestures are error prone
V*F @inu= comes (ith a fully functioning 4ord &rocessing program.
V:F @inu= offers hundreds of additional free tools.
V)F 4indo(s : slo(s do(n and crashes older computers.
V"!F 4indo(s : limits your freedom
4e (ill no( loo7 at four more problems (hich 4indo(s :." does not fi=.
W%7 The <indo1s .% Start Ti! has the same !roblem as <indo1s
.elo( is the ne( 4indo(s :." .lue Des7top screen (ith the ne( 4indo(s :."
Start 3ip in the lo(er left corner <ust to the left of the blue 1e2F
3he problem (ith this 4indo(s :." Start 3ip is that (hen you clic7 on it, it ta7es
you to the 4indo(s Metro screen and a completely different operating system
than is used on the des7top. 3his ne( Start 3ip is nearly identical to the 4indo(s
: Start 3ip (hich (as in the same place and also too7 you to the metro screen.
.y contrast, the 4indo(s * Start button 7ept you on the des7top screen and
brought up a (ell5organiIed menu of programs. 3hese programs (ould also
open in the des7top screen and could be overlapped 6 allo(ing you to move
Kuic7ly bet(een programs.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!#
W(7 There is no 1a# to !ermanentl# disable the hated Metro screen7
Above is only about one third of the Metro screen. 3o see the rest of it, you have
to use the scroll bar on the bottom.
W,7 "oin5 back and forth bet1een a metro screen and a deskto! screen 1ill
dri3e #ou craC#
4indo(s :." still reKuire that you go bac7 and forth bet(een the Metro screen
and the original des7top screen to open and use programs and applications. For
e=ample, if you are (or7ing on a 4ord document and you (ant to open an
application, or even the control panel, you need to first left clic7 on a hidden hot
corner Aor Start 3ipB to go bac7 to the metro screen. $ou then need to right clic7
on another hidden portion of the metro screen to open up the All Applications lin7.
$ou then need to left clic7 on this All A!!s lin7 to get to the A**S screen belo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!C
$ou then need to use the scroll bar at the bottom of the screen to scroll through
doIens of applications to find the one you are interested in. $ou then need to
right clic7 on that application to open it. -nce open, it is very difficult to close the
application because often there is no E=it button. Even if you do figure out ho( to
close it, instead of going bac7 to the list of applications 6 (hich is (here you
came from, you are ta7en bac7 to the des7top screen.
@etJs say, you clic7ed on an application only to find it (as not the application you
needed. So you close it. /deally, you (ould e=pect to be ta7en bac7 to the list of
applications so that you could immediately open another application. .ut
because you are ta7en bac7 to the Des7top, you no( need to repeat all of the
above steps to reach a ne( application. .y this point, you have li7ely forgotten
(hy you even (anted the application 6 and you have also lost your train of
thought about that 4ord document you (ere (or7ing on. 4hen users can not
vie( t(o or three applications and documents on the des7top simultaneously,
they must 7eep information from the des7top in their short5term memory (hile
they activate another (indo( on another screen.
All of this s(itching bac7 and forth bet(een screens is a problem because
human short term memory is very poor. .ut in addition, (henever they (ant to
s(itch (indo(s they (ill have to ta7e their mind off of their primary focus and
devote attention to bringing up another screen. 3his is simply not a very efficient
(ay to do multitas7ing. -ther problems include hidden 1hot corners2, luc7y
charms, 1flat screens2 and a variety of other pop ups that come and go (ithout
any rational basis. 3hese problems (ill drive former 4indo(s users completely
craIy. At some point, many (ill start loo7ing for something else 6 anything else.
W'7 Microsoft has made it difficult for inde!endent 5amin5 !ro5rammers to
build a!!s for <indo1s
Several gaming manufacturers are so upset (ith 4indo(s : that they have
announced that they are moving their games to @inu=. &art of the problem for
builders of computer games is that the bloated nature of Microsoft code slo(s
do(n their computer games. 3he other part of the problem is that Microsoft
demands a #!U cut of all the games sold (hich (or7 (ith 4indo(s :. Some
developers of popular games got so fed up (ith the ne( bloated code in
4indo(s : that they moved their games to the free @inu= operating system.
-n February "C, !"#, 'abe Ne(ell, co5founder of video game company Ealve,
saidF R4indo(s : is a catastrophe for everyone in the &C space.R
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!+
/n another intervie(, Ne(ell statedF
14indo(s : (as li7e this giant sadness. /t <ust hurts everybody in the &C
business. ,ather than everybody being all e=cited to go buy a ne( &C, buying
ne( soft(are to run on it, (eJve had a !_ percent decline in &C sales Z itJs li7e
Rholy co( thatJs not (hat the ne( generation of the operating system is
supposed to do.R 3hereJs supposed to be a C! percent upta7e, not a ! percent
decline, so thatJs (hat really scares me. 4hen / started using it / (as li7e R-h my
god...R / find X4indo(s :Y unusable... Steam users have been as7ing us to
support gaming on @inu=. 4eJre happy to bring rich forms of entertainment and
our community of users to this open, customer5friendly platform.2
3hat is (hy Ne(ell is no( moving his Steam game empire to @inu=.
NoteF 'abe Ne(ell spent over a decade (or7ing at Microsoft on 4indo(s before
cofounding the Ealve ASteamB 'aming platform. So he is an e=pert on the
4indo(s operating system. /f 4indo(s : is unusable for 'abe, (hat chance
does the average user have of ma7ing it (or7L
No( that (e have covered many of the problems not fi=ed by 4indo(s :." .lue,
in the ne=t chapter, (e (ill e=pose the real underlying problem (ith 4indo(s :. /t
is a problem (hich can not be fi=ed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!D
,., The Fatal Fla1 of the Microsoft <indo1s Mono!ol#
4 Eust 5ot a ne1 com!uter 1hich came 1ith <indo1s !reinstalled on it. 4
ha3e one Luestion... 9o1 can 4 5et rid of <indo1s 8 A user Kuestion
posted on one of many blogs dealing (ith 4indo(s : problems.
@uestions about <indo1s 1orth thinkin5 about
;ave you ever (ondered (hy the Microsoft 4indo(s operating system is so
much larger Aand so much slo(erB than the @inu= or Apple operating systemsL
And (hy is it that 4indo(s is so much more susceptible to viruses and hac7er
attac7sL And (hy does the 4indo(s operating system need doIens to hundreds
of 1updates2 every month 6 (hile @inu= can go si= months (ithout any patchesL
4hy is it that Microsoft ma7es such a lousy operating system even though it has
tens of thousands of full time programmersL 4hy it is that 4indo(s : has such
an insane structureL 4hy do (e even need a deeply fla(s Secure .oot (hen (e
already have a free open source Core .ootL 4hy am / so confident that
4indo(s : .lue (ill not be able to address the most important fla(s of 4indo(s
:L
The fatal fla1 is the Microsoft Mono!ol# :usiness Model
3o ans(er these Kuestions, (e need to understand that the structure of the
Microsoft (ay of doing things is totally different from the @inu= (ay. / understand
the Microsoft (ay because, from "):+ to !!C, / had hundreds of Microsoft
students attend my courses at .ellevue College. / have spent thousands of hours
tal7ing (ith Microsoft employees. / probably 7no( more about (hat is going on at
Microsoft than most of the employees at Microsoft. Some of those students (ere
responsible for coming up (ith creative (ays to stop pirates from ma7ing bootleg
copies of 4indo(s. /magine that (as your <ob. 4hat (ould you doL ;o( (ould
you stop the piratesL
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!*
3he ans(er is that it is impossible to stop pirates from copying 4indo(s because
it is a digital program (hich is easily copied. All you can do is add comple= 7eys
and other gimmic7s (hich prevent pirated versions of 4indo(s from (or7ing. .ut
for every gimmic7 you come up (ith, the pirates can come up (ith a counter
gimmic7. So all the gimmic7s really do is add more bloated code to the already
bloated code of 4indo(s. 3his is a huge reason (hy 4indo(s is so much more
bloated than @inu=. @inu= does not care if you copy their operating system 6 in
fact they encourage it. .ut Microsoft does care about copies. So Microsoft uses a
series of gimmic7s to thro( mon7ey (renches in the path of the pirates.
The First MaEor "immick... 4nternet 0x!lorer ' and the o!en back door
3he pirating problem got much (orse for Microsoft in the "))!Js as the internet
itself (as used to spread pirated copies of 4indo(s as (ell as information on
ho( to attac7 4indo(s. So Microsoft decided to turn 4indo(s from a stationary
target to a moving target. /n "))D, Microsoft came out (ith 4nternet 0x!lorer 6
(hich (as their first attempt at a (eb bro(ser. 3he first three versions (ere
separate programs (hich ran on 4indo(s. /n fact, the first three versions of
/nternet E=plorer (ere actually 1borro(ed2 from Netscape. .ut a strange thing
happened (ith 4nternet 0x!lorer ' (hen it (as added to 4indo(s ):. Suddenly,
instead of being a separate program, /nternet E=plorer (as no( an integral part
of 4indo(s 6 and has been ever since.
/nternet E=plorer ", Q # (ere separate programs outside the operating
system. .ut /nternet E=plorer C (as placed inside the operating system. 4;$L
3hin7 about this. 4hy (ould anyone in their right mind tie the (eb bro(ser code
directly to the operating system codeL @inu= doesnJt do this. 3here is no doubt
that tying these t(o things together ma7es the programming for each much more
difficult 6 and slo(s do(n both the bro(ser and the operating system. 4ith all of
these dra(bac7s, Microsoft must have had a very good reason for doing this.
Some mista7enly thought that Microsoft (as trying to monopoliIe the bro(ser
business. .ut this (as not the case at all. At the time, bro(sers (ere being given
a(ay for free. 3here (as and still is very little money to be made by monopoliIing
the bro(ser business. 3he initial motivation for Microsoft to lin7 /nternet E=plorer
to 4indo(s (as because they (anted to maintain the 4indo(s monopoly. 3he
only (ay to do this (as by adding /nternet E=plorer integration to 4indo(s. Allo(
me to e=plain ho( this (hole process (or7s. /t is important to 7no( because this
is the 1bac7 door2 (hich / refer to throughout this entire boo7.
Facts that confirm Microsoft relies on an o!en back door to #our com!uter
/f you start (ith the understanding that the most important thing for Microsoft is
money 6 (hich means protecting the 4indo(s monopoly, then this (ill start to
become more obvious. @etJs loo7 at a couple of important factsF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!:
Fact W%7 You cannot uninstall 4nternet 0x!lorer from <indo1s
3his is true of 4indo(s H&, 4indo(s Eista, 4indo(s * and 4indo(s :. $ou can
1turn /nternet E=plorer off2 from the 4indo(s feature list 6 (hich hides /nternet
E=plorer but does not remove it.

Many users Aand especially programmersB have recogniIed that the most
vulnerable part of any 4indo(s operating system is /nternet E=plorer. .ecause
most of them hate /nternet E=plorer and (onJt use it, there is a natural tendency
to try to get rid of it. .ut if you actually succeeded in getting rid of it, you (ould
crash 4indo(s. 3his is in part because 4indo(s relies on the core engine (hich
runs /nternet E=plorer.
Fact W(7 Microsoft =!dates come in throu5h 4nternet 0x!lorer
;ave you ever (ondered (hat all the updates are aboutL Microsoft calls them
security updates. .ut many of these are not at all about protecting your
computer. 3hey are about protecting the Microsoft 4indo(s monopoly. 3he idea
is to constantly 7eep changing your 4indo(s settings Acreating a moving targetB
to prevent pirated copies of 4indo(s from fully functioning. 4ithout these
constant updates, there (ould be no Microsoft 4indo(s monopoly.
Fact W,7 0ach 3ersion of the <indo1s o!eratin5 s#stem is tied to a
!articular t#!e of 4nternet 0x!lorer
-ne of the many problems of trying to continue to run 4indo(s H& is that it (ill
not (or7 on any version of /nternet E=plorer past /nternet E=plorer :. 4hy is thisL
Some have claimed that Microsoft is doing this deliberately to try to force
4indo(s H& users to upgrade to 4indo(s * or 4indo(s :. 3his could be. .ut /
thin7 there is a different more fundamental reason. / thin7 it is because the
security functions of 4indo(s and the security functions of /nternet E=plorer are
tied together at the hip. 3his is (hy 4indo(s H& can run the latest versions of
MoIilla Firefo= and 'oogle Chrome (eb bro(sers but cannot run the three latest
versions of /nternet E=plorer. /n other (ords, instead of Microsoft being entirely
evil, they could simply be stuc7 bet(een a roc7 and a hard place. 3his is simply
the only (ay they can maintain their monopoly.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!)
Fact W'7 The structure of <indo1s makes it more ob3ious that there is a
direct connection bet1een the o!eratin5 s#stem and 4nternet 0x!lorer
4indo(s : is actually t(o different operating systems (hich have been tied
together. For the sa7e of convenience, / (ill call these the Metro Mobile
o!eratin5 s#stem 6 (hich runs the Metro screen and functions 6 and the
<indo1s ? Deskto! o!eratin5 s#stem (hich runs the des7top functions. 3he
reason integration is so bad bet(een the des7top and the metro screen is that
they are completely different operating systems. 4hat Microsoft has done is
create a 9e7yll and ;yde combination of t(o separate operating systems and
then tried to hide this fact (ith one log in screen. 4indo(s : .lue cannot 1fi=2 this
problem because it is an inherent part of the structure of 4indo(s :.
<indo1s O Metro NSA O!eratin5 S#stem Y <indo1s ? O!eratin5 S#stem
3here are many (ays this is revealed. First, you can have either the metro
screen or the des7top active 6 but you cannot have bothG 4hen you first log in,
you are forced to visit the Metro Mobile -perating System. 4indo(s :." (ill
allo( you to go directly to the des7top. .ut all it is really doing is allo(ing you to
choose the des7top operating system (hen you first boot up your computer.
Second, the file structure is different for the t(o operating systems. /f you go
deep into the 4indo(s : Des7top E=plorer File Manager, you can still see that
many of the functions say 14indo(s *2 on them. 3his ma7es it pretty clear that
the des7top is still 4indo(s *. ;o(ever, many of the functions of 4indo(s *
have been removed and placed in the Metro Mobile operating system. 3his
includes all of the applications and the search functions and the security
functions. 3his is (hy you are forced bac7 to the Metro screen before you can go
to the Applications screen or the Search screen. 3hird, many of the abilities in
4indo(s *, such as the ability to control the siIe and location of open (indo(s,
are missing in the Metro Mobile operating system. -ne of the most obvious
problems here is the inability to overlap open program (indo(s. -r you can see
all of one application, but only part of anotherF
$ou cannot overlap any applications or get is an application and the metro screen
side by side or the metro screen and the des7top side by side.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""!
Fourth; the Metro O!eratin5 S#stem uses a different 3ersion of 4nternet
0x!lorer. 3he clearest indication that these are separate operating systems is
that they use t(o different versions of /nternet E=plorerG 3his is the Metro NSA
O!eratin5 S#stem 3ersion of 4nternet 0x!lorer
Clic7 on the /nternet E=plorer icon in the Metro screen and you get the Metro
version of /nternet E=plorer. Note that the bro(ser screen opens in full screen
mode (ith the 0,@ bo= at the bottom.
<indo1s ? Deskto! O!eratin5 S#stem 3ersion of 4nternet 0x!lorer
Change from the Metro Mobile operating system to the 4indo(s * operating
system by clic7ing on the Des7top icon in the Metro Start screen. 3hen clic7 on
the /nternet E=plorer /con on the des7top and you get the 4indo(s * version of
/nternet E=plorer complete (ith the traditional navigation buttons. 3o remove any
doubt at all about (hether these are separate versions of /nternet E=plorer, leave
the 4indo(s * /nternet E=plorer running and (hile on the des7top hover over the
upper left corner hot spot. 3his (ill bring up a small icon sho(ing the Metro
Mobile version of /nternet E=plorer is still running.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age """
/ hope that no( you are starting to get the picture that (e are dealing (ith t(o
completely separate operating systems (ith t(o completely separate versions of
/nternet E=plorerG
Fifth; 1ith <indo1s ; #ou cannot !erform man# functions . includin5
resettin5 #our !ass1ord; unless #ou are online
3his is one of the most sinister and least 7no(n 1features2 of 4indo(s :. 4e
covered this in our first chapter. .ut as7 yourself... (hy should Microsoft care
about (hat your pass(ord isL And (hy (ould they (ant to store your pass(ord
on their databaseL 4ith 4indo(s H& and 4indo(s *, you have complete control
over your user account and your pass(ord for your computer. 9ust clic7 on
Change your &ass(ord. 3hen type in your current and ne( pass(ord. 3here (as
no need to be online to change your pass(ord (ith 4indo(s * and Microsoft did
not care (hat your pass(ord (as. After all, it is your computer, isnJt itL
;o(ever, (ith 4indo(s :, you must be online to change your pass(ord.
Even to get to the pass(ord screen reKuires follo(ing some very hidden steps.
First, you need to start /nternet E=plorer. 3hen you need to clic7 on one of the left
side hidden hot corners to bring up the Five Magic Charms. 3hen you need to
clic7 on the bottom charm, called Settings. 3hen you need to clic7 on a lin7 called
Change &C settings. 3his ta7es you to the ne( Metro Control &anel. 3hen you
clic7 on 0sers. 3his ta7es you to the 4indo(s : Metro -perating System 0ser
Account screenF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""
Notice that your account (ith 4indo(s : is no( tied to your email address.
Ne=t, clic7 on Change your &ass(ord. /f you are not online, you (ill see this
(arningF
;o(ever, if you are online (hen you try to reset your pass(ord (ith 4indo(s :,
you are ta7en to the follo(ing pass(ord reset screenF

The Latest Microsoft "immick7 Secure :oot is reall# A*rotect the Microsoft
Mono!ol#F 2estricted :oot
Also in !", it became clear that it (ould not be easy to move from 4indo(s :
to a @inu= operating system because 4indo(s : is using a ne( 1feature2 called
Secure .oot to control (hich operating systems are loaded onto your computer.
Microsoft is forcing computer manufacturers to use special 17eys2 controlled by
Microsoft to be installed on all computers. 4indo(s : is not about mobile
computing or the metro interface. All of that is pure distraction. 4indo(s : is
gaining total control over your computer. 3his is (hy 4indo(s : has introduced a
(ay to control the log in process on your computerJs front door. 3his is also (hy
4indo(s : reKuires manufacturers to use the Secure .oot loc7ing mechanism
on all of their 4indo(s : computers. /t is to give Microsoft total control over every
computer so that Microsoft can shut do(n any 4indo(s : computer (hich does
not have the official Microsoft 7eys. 3his is (hat some have called the 4indo(s :
8ill S(itch. -f course, for this plan to (or7, Microsoft also has to get people to
stop using 4indo(s H&. So &hase of the plan is to shut do(n support for
4indo(s H& on April :, !"C. Shortly thereafter, someone Acough, the NSA,
coughB (ill unleash a virus (hich (ill put an end to all of the bootlegged copies of
4indo(s H&. 3he fact that this (ill ta7e do(n D!! million computers is beside the
point. /t is the profit that counts. 3his is profit not only for Microsoft, but for
computer manufacturers (ho (ill get to sell millions of additional computers 5
because 4indo(s : is so bloated that it (onJt run on those old H& computers.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""#
3his still leaves 4indo(s * computers. 3hese do not have the Microsoft 8ill
S(itch and they (ill continue to be supported by Microsoft 0pdates until !!.
'ee, / (onder if the bootleggers (ill figure out a (ay to ma7e bootleg copies of
4indo(s *L -h, (ait, they already haveG /n that case, / (onder if Microsoft Aa7a
the NSAB (ill stand idly by and (atch hundreds of millions of bootleg H&
computers be turned into bootleg 4indo(s * computers.
/f you (ere Microsoft, (hat (ould you doL / have an idea. 4hy not send out
updates that (ipe out the 4indo(s * computers tooL /t doesnJt have to happen
all at once. /t can be a little change here and a little change there. &retty soon the
4indo(s * computers start to slo( do(n and die and then then everyone (ill
have to get a 4indo(s : computer. Eventually, Microsoft Aa7a NSAB (ill have
total control over (hether or not every computer even starts.
All of the e=amples sho(n above 6 and many more 5 are (hy the 4indo(s :
system is fundamentally fla(ed and cannot be fi=ed. 3hey can ma7e some minor
cosmetic changes. 3hey can even give you the choice bet(een entering the
Metro Mobile operating system first or the 4indo(s * Des7top operating system
first. 4hat they cannot do is turn t(o different operating systems into one.
3his means that all of the functions and applications must be accessed through
the Metro screen and that commands and functions (hich (or7 on one of these
operating systems (ill not (or7 and may not even be accessible on the other.
4hat all of this comple=ity (ill do ho(ever is help maintain the Microsoft
4indo(s monopoly 6 because it is so comple= that pirates (ill have trouble
bootlegging and copying it 6 at least for a (hile. 4hat Microsoft fails to
understand is that in ma7ing it too difficult for pirates, they have also made using
their soft(are too difficult for their o(n customers. -nce these customers really
understand ho( difficult it is to learn and use 4indo(s : 6 and ho( insecure it is
6 they (ill run in droves to(ards Apple and @inu=. And if the fact that Microsoft
no( controls even the pass(ord on your computer doesnJt get you to move to a
less invasive operating system, then nothing (ill.
<h# the Microsoft Total Domination *lan 1ill fail
0nfortunately for all of us, this 4indo(s Secure .oot plan is doomed to fail. 3he
Flame virus has sho(n hac7ers ho( to brea7 the Microsoft digital image
signature 7ey used (ith 4indo(s 0pdates. 3his same digital image 7ey is used
to loc7 do(n computers (ith the 4indo(s : Secure .oot. /t is only a matter of
time until the only ones (ho do not have a 7ey to every 4indo(s : computer are
the people (ho bought 4indo(s : computers.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""C
No( Microsoft is not going to use their 8ill S(itch to shut do(n every 4indo(s :
computer. 3hey only (ant to shut do(n bootlegged copies of 4indo(s :. .ut in
creating this nuclear (eapon of the computer age, Microsoft Aa7a NSAB has
created a monster that they (ill not be able to control. /magine some hac7er
group gets ahold of this nuclear 8ill S(itch. 3hey can and (ill use it to ta7e do(n
every 4indo(s : computer. All that is reKuired is to change the 7eys to the
Secure .oot Start program and 4indo(s : computers (ill refuse to start. 3his is
li7e the landlord having the ability to change the 7eys on your house. A good
landlord (ill not loc7 you out of your house 6 but a bad landlord (ill . $our
computer is the home for all of your data. Computers are not only the home for
your data 5 they are the home for the essential data of every business in the
(orld. /magine (hat (ould happen to the (orldJs economy if someday all of the
(orldJs computers (ere to suddenly shut do(n.
Three 1arnin5 si5ns #our <indo1s 6om!uter has been hacked.
Despite all of the Microsoft gimmic7s designed, all these gimmic7s have done is
add more (ays that hac7ers can attac7 your computer. 3herefore, as a public
service, (e are providing three sure fire signs you can use to tell if your 4indo(s
computer has been hac7ed. First, if you notice the Microsoft no( fails to
authoriIe programs it used to find acceptable, you may have a problemF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""+
Second, if there seems to be an abnormally high number of security updates on
&atch 3uesday, you may have a problemF

3hird, if you see additional users (ho you do not recogniIe on your 4indo(s :
log in screen, it is very li7ely that Microsoft security has been compromised.
A suspicious 4indo(s @ogin screenF
/f any of these three things start happening to your 4indo(s : computer, please
reboot using a more secure operating systemG
As bad as this disaster (ould be. 3here is an even greater threat created by the
Microsoft Monopoly 6 and it is already happening. 4e (ill revie( this threat in
the ne=t section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""D
,.' The 2eal 6ost of the Microsoft Mono!ol#
4e have no( revie(ed more than a doIen benefits of the @inu= operating
system over 4indo(s :. 'iven the functional benefits of @inu= and the fatal fla(s
of 4indo(s :, it is difficult to imagine anyone going (ith 4indo(s : if they really
understand all of its fla(s. .y no(, you should understand (hy 4indo(s : is
completely different from 4indo(s H& or 4indo(s *. Still, it is li7ely that
Microsoft (ill be able to fool millions of people simply (ith the huge force of their
billion dollar per year advertising campaigns. 3he only Kuestion is ho( many
people they (ill be able to fool before fol7s find out (hat a fla(ed product they
are getting (ith 4indo(s :. No(, (e (ill loo7 at MicrosoftJs plan to convince us
that (e should spend S+!! on 4indo(s : and MS -ffice !"#... and signs that
(ord is already starting to get out that 4indo(s : is a disaster. 4e (ill also loo7
at some of the more hidden costs of the Microsoft monopoly.
Sales of <indo1s are >/X less than same !eriod sales of <indo1s ?
A .loomberg report on March "C !"# claimed that Microsoft has only sold ".+
million Surface tablets. 3his includes one million Surface ,3s Athe cheaper
version (ith an operating system that is even (orse than 4indo(s :B... / (onder
ho( many Surface ,3 buyers 7no( that they (ill be very limited in the programs
they can runL 3his limitation is pretty (ell hidden on the MS Surface (ebsite. ".+
million Surface tablets (as only half the number Microsoft e=pected to sell in the
first si= months.
Mean(hile, in the same si= month period, Apple sold C+ million /pads. So A!!le
is outsellin5 Microsoft ,/ to % in the tablet market. 3he total mar7et (as over
"+! million tablets sold. So MS has gotten less than " percent of the mar7et 6
despite a record one billion dollar advertising campaign. -ne Microsoft analyst
summed it up this (ayF (hin#s .at *icrosoft/ were )ad at the )e#innin# of the
year and they are #ettin# worse.7
Net Applications, a research firm that uses an ob<ective basis for determining
operating system usage, recently reported that the 4indo(s : adoption rate is
(orse than Eista 6 (hich had previously held the record as MicrosoftJs (orst
product. At D months, the 4indo(s * adoption rate (as "U and 4indo(s Eista
(as at C.+U. 4indo(s : still hasnJt hit CUF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""*
<hat is the current market share for <indo1s 8
According to data from Net Applications, in 9une !"# 4indo(s H& had #*U of
the mar7et compared to 4indo(s * (hich had CCU. 4indo(s Eista had C.DU
and 4indo(s : finally moved over +U 5 still the (orst beginning performance of
any Microsoft operating system. As a (hole, 4indo(s accounted for )U of all
traffic (hile Apple Mac -S H captured *U Aleaving only ".#U for @inu=B. 4indo(s
H& is losing mar7et share at a rate of about one half percent per month. 3his
means that 4indo(s H& (ill still be above #!U of the mar7et in April !"C. 4ith
a total mar7et of billion computer users in the (orld, (hat (ill these D!! million
4indo(s H& users do on April : !"C (hen their 1security updates2 end and their
only replacement choices are 4indo(s : or something elseL
Ste3e :allmer loses S,'/ billion in %/ #ears and S,' billion in a sin5le da#
-n 3hursday, 9uly ": !"#, Microsoft revealed for the first time that it had lost
S)!! million due to (ea7 demand for 4indo(s : and poor sales of its Surface
tablet. 3he ne=t day, Microsoft stoc7 fell "".C percent for a total loss of S#C billion.
Microsoft still has about S:: billion in cash. ,evenue is still about S:! billion per
year and profit is about S! billion per year. ;o(ever, company value as
determined by stoc7 price has plunged from SD!+ billion in !!! to SD+ billion in
August !"# for a loss by Microsoft shareholders of S#C! billion. 3his decline in
stoc7 price came despite Microsoft trying to raise its stoc7 price by buying bac7
S+! billion in stoc7 during the past + years. 'iven the outrage over Microsoft>s
close relationship (ith the NSA, it is li7ely that Microsoft value (ill continue to
decline in the future.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "":
6an Microsoft Marketin5 con3ince us to bu# a fatall# fla1ed !roduct8
According to Forbes MagaIine, Microsoft plans to spend a record S".+ billion
dollars trying to convince us to buy 4indo(s :. 4hile spending this massive
amount of money, the Microsoft mar7eting department (ill tell us that 4indo(s :
is an improvement on 4indo(s * because it is 1touch screen friendly2 and
therefore (or7s better on tablets. 3hey (ill tell us that 4indo(s : is simply
Microsoft becoming more li7e Apple. 3here is also a plan to introduce Microsoft
.lue this summer as an updated version of 4indo(s :. 3he name 14indo(s
.lue2 seems to be yet another blunder by Microsoft as it (ill li7ely <ust remind
4indo(s users of their past bad e=periences (ith the 4indo(s .lue Screen of
Death Asee e=ample belo(B.
Au5ust ( (/%, =!date Microsoft Sales 5o from bad to 1orse
/n August !"#, Microsoft reported that it actually spent more on advertiIing last
year than it made in Surface sales. Anytime a company spends more on
advertising a product that it gets bac7 on sales, there is a ma<or problem.
Microsoft>s response is that they (ill spend yet another billion on advertising. .ut
(ord is getting out that 4indo(s :." .lue and Surface are both terrible products.
4hat is needed is not more advertising 6 but better products. Despite all of these
problems, the CE- of Microsoft is optimistic about the success of 4indo(s :. /n
-ctober !", at a 4indo(s : launch event in Ne( $or7, Steve .allmer pointed
out that D*! million computers (ill need upgrading in the ne=t fe( years and that
C!! million more (ill be sold annually Aall than7s to 4indo(s crashing all of our
computersB.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "")
At S+!! per computer to Microsoft for 4indo(s : and -ffice, that is a lot of
money. /f Steve .allmer is right, the real cost of all of these upgrades to 4indo(s
: and -ffice !"# (ill be close to S!! billion 6 or S+! billion per year each year
for the ne=t four years.
/ have a different point of vie(. / (or7 (ith real students in the real (orld. / have
seen ho( they struggled (ith 4indo(s * and everything before that. / am certain
that many of these students (ill NEEE, be able to use 4indo(s :. So in
conclusion, Microsoft has shot themselves and all of the rest of us in the foot by
producing an operating system (hich is basically non5functional. 4hat in the
(orld (ere these guys thin7ingL /nstead of spending hundreds of millions of
dollars on mar7eting, Microsoft should have hired a fe( teachers and (e could
have (arned them that simplicity is more important than glitter. 4hat (ill happen
(hen users around the (orld discover that 4indo(s : is nothing at all li7e
4indo(s *L
@argely due to huge upgrades in computer hard(are Aboth storage and speedB,
the average person replaces their computers every three to five years. 3his
means that in the ne=t five years, nearly one billion fol7s are going to gradually
learn that Microsoft has stuc7 a 7nife in our bac7s. / predict that many of those
fol7s are going to do e=actly (hat / have done. First, they (ill continue to use
4indo(s * as a temporary solution. Second, they are going to start loo7ing
around for other alternatives 6 and by other alternatives, / am not tal7ing about
Mac. / am tal7ing about other alternatives that (ill (or7 (ell (ith 4indo(s based
programs and are not controlled by the NSA. 3his is (hy (e all need a revie( of
all of the available operating systems. /t is because at some point, (e all are
going to have to find another option.
9o1 much do 1e s!end on commercial !ro5rams and ho1 much 1ill 1e
sa3e b# mo3in5 to o!en source tools8
/t has been estimated that there are around t(o billion internet capable personal
computers in the (orld today. /t has also been estimated that over #!! million
ne( personal computers have been sold each of the past t(o years. 3hus, it is
believed that the average user replaces their laptop every four years. -f the t(o
billion computers, about C+U run 4indo(s * and another C!U run 4indo(s H&.
Microsoft has announced that in April !"C, they (ill discontinue support and
security updates for 4indo(s H&. 3his means that more than D!! million
4indo(s H& users (ill suddenly find their computers basically unprotected in
April !"C. Microsoft has (arned that 1using H& after April !"C (ill be at your
o(n ris7.2
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!
-n April : !"# Microsoft also announced that they (ould give "+U discounts for
4indo(s H& users (ho (anted to upgrade to 4indo(s : and -ffice !"#. H&
users can get 4indo(s : in combination (ith -ffice !"# for SC**. Many families
have t(o or three H& computers in their homes 6 meaning the cost for upgrading
could easily reach S",!!! or more. 4hat (ill these D!! million people doL /f you
are Microsoft, your hope is that everyone (ill upgrade to 4indo(s :. ;o(ever,
as (ord gets out that 4indo(s : has ma<or problems, some people (ill opt for
4indo(s * 6 (hich Microsoft has said they (ill support until !!.
Most fol7s are not a(are that computer manufacturers pay Microsoft to install the
4indo(s operating system on their computers. 3his cost varies from model to
model. .ut it is reasonable to assume that the average cost is about one hundred
dollars per computer. Manufacturers pay this fee not because they thin7 that
4indo(s is such a terrific operating system. .elieve me, they get an earful every
time one of their 4indo(s based computers crash. .ut they realiIe that Microsoft
currently has a monopoly on the computer mar7et and that the only (ay they are
going to sell a computer is if 4indo(s is installed on it. So they pay the hundred
dollars and add it to the price of their computers. /n other (ords, (hen
manufacturers offer computers (ith free open source operating systems, each of
us (ill save S"!! per computer. 4hile Microsoft offers a 1deal2 to manufacturers
to get them to install 4indo(s on their computers, Microsoft is much less
generous to those (ho already have 4indo(s * on their computers. 0pgrading
from 4indo(s * to 4indo(s : &ro (ill cost an incredible S!!. 3han7fully, there
is no need to upgrade to 4indo(s : since 4indo(s * is actually better than
4indo(s :. .ut the cost of the 4indo(s operating system does not end there 5
because your computer (ill not (or7 (ithout additional soft(are for everything
from games to (ord processing and accounting. 3hese 4indo(s based
programs can cost several hundred dollars. 3hese programs need updating
every year (hich is (hy fol7s typically spend hundreds of dollars per year on
4indo(s based programs.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""
3han7fully, @inu= Mint is capable of running 4indo(s programs. .ut more
importantly, @inu= offers thousands of free alternatives to 4indo(s programs. /n
many cases, these free programs are actually better than their e=pensive
commercial cousins. 3hen there is the cost of lost productivity and computer
repair to consider. 3he average person is forced to either spend hundreds of
dollars on computer repair (hen their laptop crashes 6 or spend hundreds to
thousands of dollars buying a ne( computer. ;aving a more reliable computer
(hich does not reKuire constant updates and virus protection programs can save
a person hundreds to thousands of dollars every year. .ut all of this is nothing
compared to the loss of productivity associated (ith a computer crash. 3his
problem can literally cost you a (ee7Js (ages 6 or even put you out of business.
So the real savings of learning to use open source tools can be much higher
every year.
*ublic Schools and the 6omin5 <indo1s Train <reck
-ne group in particular that is concerned about price is our public schools.
School districts all over the country are turning to portable computers as a (ay to
provide students (ith a better high tech learning opportunity. 3hey are also
loo7ing at computers as opening the door to lo(er cost and more current
electronic te=t boo7s as (ell as other ne( online learning opportunities. ;o(ever,
school districts are on a very limited budget.
-ne school district in 4ashington State, the @a7e 4ashington School District,
recently spent S+!! per student to buy every secondary school student in their
school district a portable laptop. 3his school district (hich is located in ,edmond,
the home city of Microsoft, obviously had 4indo(s * and Microsoft -ffice
installed on all !,!!! of these computers. 3he total cost (as S"! million. .ut
had they used an -pen Source operating system and an open source -ffice
program, the cost (ould have li7ely been closer to S#!! per student or SD million
for all !,!!! students. The difference of S' million dollars could ha3e !aid
for / additional teachers in their school district!
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
A @a7e 4ashington School District administrator recently announced that they
(ill li7ely be 1upgrading2 to 4indo(s : this summer. At a cost of about S"!! per
student times !,!!! students this (ill be another S million 6 or another C!
teachersG 3he real issue (ill come (hen students are unable to use 4indo(s :
and their classrooms come to a grinding halt. At some point, / see even the @a7e
4ashington School District moving to(ards open source tools so they can hire
more teachers instead of thro(ing money do(n the Microsoft drain.
Theyll get sort of addicted, and then well somehow figure out how to
collect some time in the net decade. Bill ates 8uly 9 1::8
4e are reaching a turning point. 3his turning point is only in part due to price.
Many fol7s (ould gladly pay an e=tra fe( hundred dollars per year <ust to have a
reliable computer for saving and processing documents. .ut (hat they are li7ely
not (illing to do is pay a fe( hundred dollars for a system (hich is less usable
and less reliable. Safety is a ma<or reason (hy the vast ma<ority of (eb servers
in the (orld, including the 'oogle Servers, run on @inu= open source programs
and operating systems. -bviously, price is not an issue to 'oogle. 3heir primary
concern is 7eeping their servers and their (ebsites up and running. 3he real
tipping point comes (hen fol7s realiIe that 4indo(s is neither reliable nor
functional. All that is needed is a catalyst to force users to ta7e that crucial first
step to(ards open source. / predict that the April : !"C deadline cutting off
support for 4indo(s H& (ill be that catalyst. /nstead of forcing fol7s to pay them
for 4indo(s :, (hat Microsoft (ill really be doing is slitting their o(n throat.
-nce fol7s learn ho( much easier open source is, and ho( much money they
can save, they (ill happily move to open source tools such as @inu=.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#
Linux is better for 4nno3ation
Another reason open source has pulled ahead of commercial rivals is that open
source programmers are allo(ed to be more creative than private, commercial
programmers. Commercial programs are based on patents and monopolies
(hich are the enemies of innovation. -pen source has fe(er rules and fe(er
obstacles. -pen source programmers do not have to (orry about (hether they
are violating someone elseJs patent or ho( to prevent someone else from
violating their patent. 3hey therefore can focus on simply designing a clear and
safe program 6 rather than a comple=, bloated program intended more to create
or protect a patent than to help the end users.
O!en source tools !romote better com!atibilit#
Another benefit of open source is compatibility. 3here are many (ays to create,
open, manage and send MS 4ord documents and &DF documents (ith @inu=
and its free (ord processor @ibre -ffice. $ou can even automatically save
documents in several formats at the same time (ith @ibre -ffice 4riter.
O!en source tools offer better mi5ration bet1een formats
An increasingly important benefit of open source is safer and easier (ebsite and
Eboo7 migration. Microsoft loads literally pages of programming garbage into the
beginning of every 4ord DocH document. 3his e=tra code has to be eliminated
(hen pasting 4ord documents into (ebsite pages 6 or it (ill slo( do(n your
(ebsite and even crash it. @ibre -ffice allo(s easy conversion to ;3M@ and?or
Eboo7 formatsG
O!en Source Tools are as =ser Friendl# as 6ommercial *ro5rams
/t used to be that open source tools (ere only for computer gee7s (ho built their
o(n computers and installed an open source operating system because it (as
free. -ne often had to 7no( computer programming <ust to (or7 (ith open
source tools. ;o(ever, in the past fe( years, there have been ma<or advances in
open source tools such that today, open source tools are actually better and
more user friendly than their commercial rivals. 3hey are safer, more reliable and
offer more features and functions. 4e therefore predict that it is <ust a matter of
time until more people realiIe this and ma7e the move to open source tools.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C
Free O!en Source O!tions to 0x!ensi3e 6ommercial *ro5rams
3he open source tools (e cover in the follo(ing articles include the Linux
O!eratin5 S#stem A(hich replaces MS 4indo(sB and Libre Office A(hich
replaces MS -fficeB. /n our other educational (ebsites and boo7s, (e cover
more open source tools including 9oomla (eb building tools and EirtueMart
online store building tools. -ther e=amples of free open source tools include the
Moodle @earning Management System. /n fact, there are no( thousands of free
open source tools available for do(nload (ith more tools available every day.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+
9o1 can somethin5 free be better than somethin5 that costs >// dollars8
/n the follo(ing articles, (e (ill e=plain (hy the @inu= -perating System
combined (ith @ibre -ffice (ord processor is better than the 4indo(s :
operating system (ith Microsoft -ffice. .ut the first Kuestion (e should address
is ho( is it possible for something that is free to be better than something that
costs S+!!L 4hen people first hear about @inu= as an option to 4indo(s, their
first reaction is that they need something that can process their normal 4ord
documents and run their 4indo(s programs. 3hey are shoc7ed to find out that
@inu= can run 4indo(s programs and even more shoc7ed to find out that @ibre
-ffice can open and process their 4ord documents. 3he ne=t most common
reaction is to claim that there must be a catch. Anything free cannot possible be
as good as something that costs S+!!. .ut consider other important things (hich
are free and usefulF 3he 'oogle Search Engine, (hich runs on @inu=, is free and
is the most popular (ebsite in the entire (orld. &ublic libraries are also free and
do a great <ob of helping people gather information.
.ut if you still have trouble believing that @inu= can be better than 4indo(s, give
it a try. Eery fe( (ho ma7e the move to @inu= ever go bac7 to the insecure
4indo(s operating system.
9idden 6osts of the Microsoft <indo1s Mono!ol#
Microsoft updates and bloated code and vulnerability to computer viruses mean
that all of our computers (ill slo( do(n and crash over time. 3his means (e (ill
be not only reKuired to buy ne( 4indo(s programs 6 costing hundreds of dollars
per year 6 but (e (ill also needlessly be reKuired to buy a ne( computer every #
to + years. 3his doubles the profit Microsoft gets due to its monopoly. Assuming
there are more than one billion computer users in the (orld today and that each
one is forced to needlessly spend an e=tra thousand dollars to buy a ne(
computer once their Microsoft computer finally crashes, the real direct cost of
<indo1 1ill e3entuall# exceed one trillion dollars from us to Microsoft!
.ut even a trillion dollars is a drop in the buc7et compared to other hidden costs
of the Microsoft monopoly.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D
First, consider the horrific (or7ing conditions that Microsoft imposes on (or7ers
around the (orld. Microsoft and Apple have both shot themselves in the foot by
outsourcing both their manufacturing and their customer service to s(eat shops
in China and /ndia. -n May , !"#, Microsoft announced that they (ould hire
1several thousand (or7ers.2 All of the ne( hires (ill be in China 6 (here they
already have thousands of (or7ers. Steve .allmer said at a press conference in
Shanghai, 1/ visited China last about one year ago in May and it is remar7able to
me ho( much has changed. At Microsoft this is an incredibly e=citing time.2
Monopolies harm the entire (orld economy by destroying the rights of (or7ers
Microsoft alone suc7s S*! billion per year out of the economy. Add Apple and
other monopolies and the total loss is over S!! billion per year. Moreover, the
computer monopolies are <ust part of a much larger corporate monopoly system
that has gro(n li7e a cancer on the 0S and (orld economy and political system
in the past #! years.
Mono!olies harm e3er#one in the 1orld
Microsoft is <ust li7e the predatory monopoly ban7ing system (here <ust a fe(
mega ban7s control over half of the (orldJs (ealth and li7e the energy monopoly
(here <ust a fe( mega oil companies control nearly all of the (orldJs energy
resources. And <ust li7e the information monopoly (here <ust a fe( families
control most of the (orld ne(s distribution on 3E, radio and print. As a direct
result of this concentration of (ealth and po(er in the hands of a fe(, the State
and National ta= burden has transferred from the rich to the poor and (hat is left
of the middle class. As a percent of income, since "):! and the rise of
monopolies li7e Microsoft and Apple, the federal ta= burden on the average
middle class family has increased by over S",!!! per year in current dollars. 3he
State ta= burden has also increased by about S",!!! per year.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*
And if you or a member of your family has the audacity to (ant to go to college,
that hidden ta= burden has tripled to the point (here the total college debt is over
S" trillion. 3his does not even include s7yroc7eting costs for everything from
gasoline to health care 6 all due to the concentration of (ealth and po(er in a
fe( corporate monopolies controlled by a fe( (ealthy crime families (hich
control our economic and political systems. 3his is (hy our nation and planet are
crippled by the (orst economic crash since the 'reat Depression.
.ut the greatest hidden cost of continuing to support the Microsoft monopoly is
the harm that Microsoft has done to our Democracy. Microsoft billionaires have
used their e=treme (ealth to buy State and National elections, and evade paying
billions of dollars in ta=es by hiding their profits in offshore ta= havens. /f they are
not going to be loyal to the American consumers (ho created their (ealth, then
(hy in the (orld should (e continue to give them our hard earned moneyL
The Sil3er Linux Linin5 behind the dark Microsoft 6loud
3here is a silver lining to this dar7 cloud. /f all one billion Microsoft 4indo(s
users decided to use @inu= and @ibre -ffice instead of 4indo(s : and -ffice
!"#, that (ould be a savings to the general public of more than S+!! billion
dollars. 3his is a savings of S"!! billion per year for the ne=t five years for all of
the (orldJs computer usersG 3he only Kuestion remaining is (hat should (e use
to replace 4indo(s :L /n the ne=t article, (e (ill provide a brief history of the
evolution of open source operating systems. 4e (ill then provide a comparison
of three open source operating systems to three closed source commercial
operating systems.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":
6ha!ter '... Linux to the 2escue
Chapter C includes the follo(ing four sectionsF
C." A .rief ;istory of @inu= -perating Systems
C. .enefits of @inu= Mint over @inu= 0buntu
C.# Four Steps to the Freedom of -pen Source 3ools
C.C /nstall @inu= Mint in a Eirtual Machine
/n this chapter, (e (ill first learn about open source tools. .ecause open source
is more about building communities over the long term rather than ma=imiIing
profits over the short term, novices often have a hard time understanding the
huge diversity of open source options 6 (hich is the opposite of closed source
monopolies. Diversity does add to the learning curve of open source tools. .ut it
also is the reason that open source tools are leading a (hole ne( (ave of
innovation in computer technology.
4e (ill then revie( ho( to 1e=periment2 (ith the @inu= Mint "+ operating system
by installing it onto a free virtual machine (ithin you current 4indo(s operating
system on your current computer. 3his (ill allo( you to see for yourself the
benefits of @inu= Mint before installing it as a dual boot Aor dual operating systemB
on its o(n portion of your computer>s hard drive.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")
'.% A :rief 9istor# of Linux O!eratin5 S#stems
<e 1orked 3er# hard on creatin5 a name that 1ould a!!eal to the maEorit#
of !eo!le; and it certainl# !aid off7 thousands of !eo!le are usin5 Linux
Eust to be able to sa# K4B3e 5ot Linux. <hat a cool nameK.
@inu= 3orvalds Developer of the @inu= -perating System, March, "))#
4hile ))U of us (ere going through the ordeal of trying to (or7 (ith either the
Microsoft horiIontal monopoly or the Apple vertical monopoly, there has been a
third option gro(ing in the (eeds. Free open source tools, such as @inu=, began
in the early "))!Js (hen some very for(ard thin7ing computer programmers
insisted on freedom from the rigid patent structure imposed by commercial outfits
li7e Microsoft and Apple.
3he free soft(are movement began in "):C (hen ,ichard Stallman left M/3 and
founded 'N0 in order to create free soft(are programs. 'N0 is a recursive
acronym for 1'nu is Not 0ni=.2 ,ichard Stallman stated that 'N0 is a 1technical
means to a social end.2 3he social end he (as referring to (as freeing
7no(ledge from the clutches of private corporate monopolies 6 much as 3homas
9efferson advocated for public schools as being an essential foundation of our
Democracy.
,ichard (as follo(ing the e=ample of ;enry Ford, (ho had challenged patents
that had been used in ")"" to monopoliIe the development of the automobile.
After overcoming this patent restraint on innovation, the automobile (as able to
develop rapidly. ,ichard Stallman argued that the same freedom from patent
restrictions (ould lead to innovation in the soft(are industry that (ould benefit
everyone. ,ichard also argued that scientific advances (ere best accomplished
in a process of openness and cooperation rather than corporate secrecy.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#!
;is goal (as to bring a free soft(are operating platform into e=istence. Stallman
(anted computer users to be free to study the source code of the soft(are they
use, free to share the soft(are (ith other people, free to modify the behavior of
the soft(are, and free to publish their modified versions of the soft(are. /n "):),
'N0 published the first 'eneral &ublic @icense A'&@B under (hich soft(are is
legally shared freely.
-ne thing missing from the 'N0 pro<ect (as a stable 17ernel2 or core (hich is at
the heart of the operating system. 3he 7ernel can also be thought of as the
foundation of a house. 'N0 had made all of the components of the house, such
as the (alls and the roof and the plumbing and electrical devices. .ut the
foundation they had built it on 6 a 7ernel called ;0,D 6 (as too comple= and too
unstable.
In )00)# a simple# stable $ernel was created b Linus <or6alds. <he $ernel was
called Linux since it was based in part on the Bnix operatin" sstem. <he Bnix
operatin" sstem was a pri6ate sstem owed b 3<J< which for man ears had
allowed fol$s to use their pro"ram for free# but in )070 3<J< decided to start
char"in" to use their B7IX pro"ram. ;ost pro"rammers paid the fee. 5ut some#
includin" Linus <or6alds# decided to create their own operatin" sstem.
I belie6e !pen 2ource is the ri"ht thin" to do the same wa I belie6e science is
better than alchem. Li$e science# !pen 2ource allows people to build on a
solid base of pre6ious $nowled"e# without some sill hidin"... ou can ne6er do
as well in a closed en6ironment as ou can with open scientific methods.
Linu$ 0orval#$ 2005
@inus 3orvalds developed the @inu= -perating System in "))". 3his is @inus (ith
the @inu= &enguin. @inus no( (or7s for the @inu= Foundation in .eaverton -,.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#"
3he proper name for the @inu= operating system is 'N0?@inu=. ;o(ever, as this
is difficult to say and remember, most people simply refer to it as @inu= and refer
to the pro<ect (hich supports much of (hat goes into it as the 'N0 pro<ect.
,ichard Stallman protests that calling 'N0?@inu= <ust @inu= fails to recogniIe the
role that 'N0 plays in building the entire operating system. ;o(ever, in this boo7
(e (ill use the simple term @inu= as our goal is to spread the use of this
operating system and a simple term is more li7ely to spread usage than a
comple= term.
:SD; another free o!en source o!eratin5 s#stem is de3elo!ed . and also
!aid for b# the !ublic
4hile @inu= (as the (orldJs first free open source operating system, it (as soon
<oined by another free operating system called .SD (hich stands for the
.er7eley Soft(are Distribution. 3his pro<ect started in the "):!Js (ith a nearly
finished free open source operating system released in 9une "))". /t (as also
based in part on the 0ni= operating system and therefore is a cousin of the @inu=
operating system. ;o(ever, la(suits by similar commercial operating systems,
held up release of .SD until "))C (hen a court decision held that over ))U of
the .SD system did not violate any patents. 3here are currently several versions
of the .SD free operating system.
4hat is important to understand about both the @inu= and .SD operating
systems is that both of them (ere initially funded primarily by public ta= payer
dollars. 3he .SD pro<ect (as at the 0niversity of California at .er7eley. Nearly all
of the funding therefore came from ta=es paid by the citiIens of the State of
California (ith some help from the 0S federal ta= payers. @inu= 3orvalds also
points out that the only reason he (as able to devote several years to creating
the @inu= operating system (as that the citiIens of Finland paid for his college
education. /n Finland, citiIens can attend college for only S+!! per year. @inus
spent : years getting his MasterJs Degree Aand (or7ing on the operating
systemB. So (e really should than7 the citiIens of Finland for the fact that (e all
can no( benefit from the (orldJs safest operating system.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#
Microsoft and A!!le take ad3anta5e of free o!en source o!eratin5 s#stems
4hile Microsoft and Apple have both accused each other of violating their
patents, the irony is that they have both used free open source components to
improve their o(n operating systems. 3he Apple operating systems in particular
is based almost entirely on the .SD operating system. 3hus, Apple is a close
cousin of the 0ni= and @inu= operating system. .ecause .SD and @inu= are
shared over the internet, both pro<ects had a strong interest in developing the
internet net(or7ing portion of their free operating systems. As the importance of
the internet gre( in the "))!s, Microsoft adopted most of this free open source
net(or7ing code into their o(n commercial operating system. 3herefore,
regardless of the operating system you are currently using, you are already using
some free open source code. 3here are many other e=amples of technological
development paid for by the public. 3he entire internet (as built by public
universities (ith public ta=payer dollars. 3he (ireless 4/F/ system (as also
created using public ta=payer dollars. Even current development of open source
programs is done largely by programmers at public universities (ho (ant to
share code (ith programmers at other public universities. 3he only Kuestion is
(hy any of us should continue to pay for products (hich (ere all created by our
ta= dollars. 4hen products are created by the public, they ought to remain free
and in the public domain. So there is something (rong (ith the current system of
the public paying the costs and private monopolies ta7ing the profits.
O!en Source 4nitiati3e 3ersus the Free Soft1are Foundation
Despite the fact that the 'N0?@inu= operating system (as free and (as the
safest and most versatile operating system in the (orld, adoption and refinement
of the 'N0?@inu= operating system gre( slo(ly. 3he first complete version, @inu=
".!, (as not released until "))C. /ronically, there is a dra(bac7 to the (ord 1free.2
.usinesses and the general public tend to thin7 of the (ord 1free2 as in no cost or
1cheap2 or 1not very good.2 ,ichard Stallman tried valiantly to clarify that the
term AfreeF meant free as in Afreedom2 and that freedom from patent
restrictions (as and still is important. .ut businesses and the public failed to
recogniIe that their freedom (as being ta7en a(ay by the Microsoft and Apple
monopolies. Many business o(ners thought that free open source programs
(ere a communist attac7 (hich threatened their belief in capitalism.
3o encourage (ider adoption of the @inu= operating system, a group split off from
the Free Soft(are Foundation in the mid5"))!s and formed the O!en Source
4nitiati3e. /nstead of emphasiIing the fact that the soft(are (as free, they
pointed out the benefits of the soft(are being open source 6 meaning that the
source code (as free of patent restrictions and could be freely shared. 3his led
to businesses such as 'oogle, AmaIon and Faceboo7 adopting version of the
@inu= open source operating system. 3hese groups then devoted some funds
bac7 to the further development of open source operating systems. ;o(ever, this
ne( organiIation led to a split bet(een ,ichard Stallman and @inus 3orvalds 6 a
difference of opinion (hich still e=ists today.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "##
O!en Source Deskto! 4nterfaces
-ne problem (ith the @inu= operating system in ")) (as that you had to 7no(
computer programming to use it. 3herefore several groups began (or7ing on
open source 'raphic 0ser /nterfaces or '0/s so that a person could simply clic7
on a series of buttons (ith a mouse rather than typing a bunch of computer
programming (ith a 7ey board 6 thus ma7ing @inu= more user friendly. 3he
interface appears on a computer screen (hich is also called a des7top. At some
point, this interface became called a 1Des7top Environment2 or DE.
<he first open source des$top interface# called 783 for 7 8e$*to&
3nvironment# was started in )00/. 5ecause some parts of C&' were not open
source# a second and full open source operatin" sstem# called 19:M3; was
started in )007. H7!;' stands for H7B !bject ;odelin" 'n6ironment. <his was
the first major for$ in the road for the Linux operatin" sstem. '6en toda# there
are still Linux 2stems based on H7!;' and others based on C&'. 3 branch off
of the Linux tree is called a for$-
Linux takes o3er the <eb Ser3er Market
.ecause any computer programmer can do (hatever they (ant (ith @inu=, there
Kuic7ly became many for7s of @inu=. Most of these for7s (ere special branches
intended to run servers. Servers are special computers that host (ebsites and
control traffic on the internet. 3he main reason most servers use the @inu=
operating system is that it is safe and dependable. 0nli7e a personal computer
(hich is usually on only a fe( hours a day, (eb servers are typically on C hours
a day. $ou therefore need an operating system that does not crash regardless of
(hat it is confronted (ith. $ou also need an operating system (hich is safe from
viruses and hac7er attac7s.
.ecause servers are built and run by e=perienced computer programmers, most
of them chose to use @inu=. .ut they also for7ed @inu= into highly specialiIed
versions (hich are not that appropriate for the average person to use to run their
o(n personal computer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#C
"NOM0 % and ( Shells
3he 'N-ME pro<ect developed a free open source graphic user interface (hich
is used to display the free open source @inu= operating system on a normal
personal computer. 'nome (as started in about !! to improve the
appearance and structure of 'nome ". 3hese incredibly smart people (ere
interested in long term cutting edge innovation more than short term Kuarterly
profits. For years, @inu= had been a tool used mainly by 'ee7s and computer
programmers (ho (ould build their o(n computers from scratch. /t is actually
easier than you might thin7 to thro( together a fe( computer components and
create a lo( cost high po(ered computer. .ecause they (anted freedom, they
(ould also install their o(n operating systems 6 (hich (ere nearly all offshoots
of @inu=. .ut to use these early @inu= operating systems, you pretty much had to
be good (ith computer programming. 4hile some of the computer could be
controlled using the 'N-ME interface, many functions still reKuired entering
computer commands into a portion of the 'N-ME interface called the 1terminal.2
3hin7 of terminal as in deadly illness. ,eKuiring any computer programming at all
eliminates ))U of us (ho (ill never learn computer programming. / personally
7no( several computer programming languages and have taught computer
programming. So / am not really tal7ing about myself. / am tal7ing about my
students. /t ta7es real focus and dedication to get good at computer programming
and most people simply do not have the time or interest to really learn it.
Distributions . also kno1n as Distros
Distributions are pac7ages of free open source programs that are built on top of
the @inu= foundation. 3he pac7age includes a (ord processing program, an
image processing program and any of thousands of other possible programs.
Some distributions use the 'nome Shell, some use the 8DE shell and?or several
different shells. 4hen you do(nload a @inu= operating system, (hat you are
really do(nloading is one of the many distributions of @inu=. 3he oldest of these
distributions is Debian 6 (hich began in "))# using a very early version of the
@inu= operating system. Fedora (as introduced a couple of years later. 3his
distribution is sponsored by a commercial @inu= based company called ,ed ;at
(hich has revenue of over one billion dollars per year. .elo( is a !"# 9une list
of the five most popular distributions Aor open source soft(are pac7agesB based
on number of page hits per day according to distro(atch.comF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#+
@inu= Mint is the first @inu= distribution to average over C,!!! page hits per day. /t
has been the leading @inu= distribution for the past t(o years. 0buntu is a for7 of
Debian that (as started in !!C to offer a consistent release and update cycle. /t
(as the most popular distribution until about !"" (hen it (as replaced by Mint.
Mint is a for7 of 0buntu that (as started in !!D to offer users a more 4indo(s5
li7e operating system.
Linux Distributions Famil# Tree
Above are five of more than one hundred @inu= distributions. Mageia is a
relatively ne( open source distribution (hich (as started in !"! and is based
on a commercial @inu= distribution called Mandriva. Mandriva (as liKuidated by a
French court in !"! and all of their programmers (ere fired. Some of these
programmers formed a ne( company called Mageia to carry on (ith the
Mandriva distribution. .ut Mageia is not as (ell organiIed or as simple to use as
the @inu= Mint distributions 5 (hich is (hy (e recommend @inu= Mint.
Linux =buntu
0buntu (as started in !!C by a South African businessman named Mar7
Shuttle(orth. ;is company is called Canonical and his goal (as to create a more
user friendly operating system. ;e chose the 1Debian2 version of @inu= as his
base and added more friendly user interfaces over time. @i7e Debian, 0buntu is
based on the 'nome shell. 4hile 0buntu and Mint are technically called
1distributions2 or 1distros2, they can also be thought of as 1s7ins2 (ith @inu= as the
brain. 0buntu released a version called 4arty 4arthog in !!C. 3his (as the first
(idespread public adoption of an operating system other than MS 4indo(s and
Apple Mac. 3he main benefit of 0buntu bac7 in !!+ (as that it (as free. /t (as
therefore used in cheap computers in schools and in poor countries, (hich often
could not afford hundreds of dollars per student every year for 4indo(s based
operating systems and related soft(are. Sadly, 0buntu (as not very stable and it
crashed a lot. /t (as also not very easy to use. Many of the functions are hidden
and the file structure is not very logical. 4orst of all, to really use it, you still had
to learn a series of computer programming commands to operate their 1terminal.2
3his meant that 0buntu (as not a good choice for most beginners.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#D
The Linux Mint *roEect starts in (//-
In +**/# a "roup of computer pro"rammers# led b @lem Lefeb6re# split off from
Bbuntu and be"an the Linux Mint project. <he ;int interface and file structure
are much more li$e the Windows interface and file structure. <his was a hu"e
impro6ement o6er Bbuntu but nowhere near as mature as Windows XP# which
had a )* ear lead o6er Linux ;int. (ust as >ome was not built in a da# it too$
se6eral ears for the Linux ;int team to create a stable reliable product.
Development, appearance and user friendliness accelerated in !!) (ith the
introduction of the 0buntu Soft(are Manager. 3his ne( tool, used by both
0buntu and Mint, (ould eventually put open source operating systems ahead of
commercial operating systems (hich lac7 this feature. 3han7s to a very large
community of supporters, Mint (as able to close the gap (ith 4indo(s by !"!.
3heir latest version, @inu= Mint "+ Mate, introduced in May !"# and featuring
@ibre -ffice C, is in many (ays substantially better than 4indo(s *. 4e (ill
revie( these benefits in the section on @inu= Mint. .ut even ignoring the fact that
Mate is free, it is better than 4indo(s 6 and can (or7 (ith either 4indo(s based
programs 6 or (ith thousands of free open source programs, such as @ibre
-ffice, (hich easily converts Microsoft -ffice documents.
Lord of the 2in5s... "NOM0 , Di3ides the O!en Source 6ommunit#
2adl# be"innin" in +*))# there was a hu"e contro6ers in the open source
communit. <his contro6ers still exists toda. <he computer pro"rammers who
controlled the H7!;' + project decided to abandon Hnome + in fa6or of a more
mobile friendl structure which the called H7!;' ,. <he introduction of Hnome
, created ha6oc as 1nome 3 eliminate# man6 &o&ular feature$ of 1nome 2.
In particular# it eliminated the tree structure used to or"aniGe the file mana"er. It
was therefore not well accepted. In fact# the founder of Linux# Linus <or6alds#
issued a statement describin" Hnome , as a mista$e and a step bac$wards. <his
debate is still "oin" on toda. In man was# this debate is similar to the
contro6ers o6er Windows A which abandoned Windows XP and Windows 7 in
fa6or of a more mobile friendl structure.
<he problem with abandonin" a sstem which is popular is that it reKuires
millions of people to learn an entirel new and different process. 3he other
problem (ith any ne( computer program is that it tends to be unstable and crash
a lot. 3his is because computer programs are comple= and have unforeseen bad
interactions (ith other computer programs. Despite these problems, 0buntu (ent
along (ith the 'N-ME # group and released their first 'N-ME # version in
!"". 3oday, all 0buntu operating systems are based on 'N-ME #.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#*
Linux Mint AMateF is born
In response to the H7!;' , crisis in +*)) 9see below:# the Linux ;int team
made a rather brilliant mo6e. Instead of placin" all of their e""s in the Hnome ,
bas$et li$e Bbuntu did and an"erin" half of their users the decided to
+ontinue #evelo&ment of 1nome 2 wit% Linux Mint Mate% 4 and also de6elop
a new operatin" sstem# called Linux ;int @innamon% based on Hnome ,.
Linux ;int comes in four different fla6ors or 6ersions.
/n addition, @inu= Mint is available in t(o more versions. 3hese are the 8DE
pro<ectJs version of @inu= and the HFCE version of @inu=F
Mint HFCE is not very good because its file manager is pretty limited. ;o(ever,
Mint 8DE is very interesting in that it is very similar to Mint Mate. 3o ma7e
matters more confusing, each of the four options above is available in a =# bit
version for computers (ith less than C '. of ,AM and a =DC bit version for
computers (ith C '. or more ,AM. /f this sounds as confusing as the @ord of the
,ings trilogy, that is because it is. -ne of the dra(bac7s of -pen Source is that
anyone is free to do (hatever they (ant. So there are lots of open source options
and you (ill need to get use to a diversity of options and opinions if you (ant the
benefits of open source.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#:
=nderstandin5 Linux Di3ersit#
-ne of the perceived dra(bac7s of @inu= is comple=ity. @inu= comes in many
different flavors (hich are called distributions Aor distros for shortB. 3his is actually
a good thing since there is strength in diversity and because diversity helps
promote innovation. 3here are also many versions of 4indo(s and Mac
-perating Systems. .ut (ith 4indo(s and Mac, the main purpose of their
version changes seems to be to force their customers to pay them for the update
to the ne( version 6 (hich is often (orse than the old version. 4ith @inu=,
diversity is more related to meeting different needs 6 not to create more profits.
.elo( are <ust a fe( of the many branches off of the @inu= treeF
A 7ey difference bet(een the various @inu= options is the 'raphic 0ser /nterface.
-ther differences include the File Manager and the other free programs that
come pac7aged (ith each option. 4e (ill handle this comple=ity by
recommending (hat is currently the simplest, most stable and most po(erful
interface 6 Linux Mint %> Mate. /ts screens loo7 Kuite similar to 4indo(s * and
4indo(s H& screens 6 so if you have been using 4indo(s * or H&, you (ill feel
right at home. /n my opinion, Linux Mint %> Mate is currently the best operating
system in the (orld. /t uses a very easy file manager called 6aEa.
@inu= Mint "+ Cinnamon is also pretty good but it suffers from some minor
'N-ME # issues (hich are still being (or7ed out. /n response to the very bad
'nome # file manager, @inu= Mint Cinnamon developed a much better file
manager called Nemo. @inu= Mint 8DE is interesting and comes (ith a good file
manager called Dolphin. .ut it also still has some minor issues. 0buntu suffers
from many problems (hich are discussed further in the ne=t section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#)
Linux Mint %> Mate Deskto! 1ith Start Menu o!en
4hat is important to understand about @inu= operating systems is that there is
really no need to upgrade or get updates unless you really (ant to. Some fol7s
have e=pressed concerns about the rapid release cycles (ith open source
programs such as @inu= Mint Mate. Ne( versions are released about every si=
months. Novices fear it (ill be difficult 7eeping up (ith all the updates and ne(
versions. -thers use @inu= Mint Maya because it is a 1long term release2 Aor @3SB
(hich (ill be supported until !"*.
;o(ever, unli7e 4indo(s, (hich leaves the bac7 door open to hac7er attac7s,
@inu= does not leave the bac7 door open. 3hus, there is no need for a monthly
1update2 and there is no need for an annual 1upgrade2 <ust to have a safe and
secure operating system. And there is no need for long term support. 4hile @inu=
Mint "+ Mate (ill only be supported until April !"C 6 you can safely 7eep using it
for the ne=t hundred years if you (ant. 3he only reason to upgrade is if you (ant
some ne( features. .ecause a lot of people (ant the most recent version, @inu=
Mint offers a (ay to bac7up and copy all of your data (henever you (ant to
update to a ne(er version. .ut try to avoid getting caught up in the craIe over
the latest gadgets. 3he primary reason (e recommend @inu= Mint "+ over @inu=
Mint "C is that Mate version "+ comes (ith @ibre -ffice C pre5installed 6 (hereas
it has to be added as an update to @inu= Mint "C.
@ibre -ffice C does have some huge benefits over @ibre -ffice #. So it is (orth
using @inu= Mint "+ to get these advantages automatically installed. @inu= Mint
"+ also comes (ith the 0EF/ Secure .oot signatures reKuired by Microsoft.
6urrent "nome *roblems
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C!
3he difference bet(een 'nome # and 'nome (as not as great as the
difference bet(een 4indo(s : and 4indo(s *. .ut because many popular
features from 'nome (ere removed in 'nome #, there (as an open rebellion
in the open source community and huge resistance to 'nome # 6 much li7e
there is huge resistance against the move from 4indo(s * to 4indo(s :. Even
people (ho are open to change (ill resist change (hen it is a step bac7(ards.
4hat does the future hold for open source computer operating systemsL
/n late !", the 'nome # team admitted they made a mista7e (ith 'nome #
and issued a public statement that in !"#, they (ould re5introduce many of the
features they had previously abandoned. /n March !"#, the 'nome team
introduced 'nome #.: (hich includes a ne( 1Classic mode. 2 0nfortunately
'nome #.: classic mode failed to restore any of the important features many
people li7ed about 'nome . /n addition, 'nome # also got rid of the popular
Nautilus File Manager and replaced it (ith a much (orse File Manager (hich the
'nome # team calls 1File.2 Even the 1Classic2 mode still uses the bad file
manager. 3his thing is so bad that you cannot do even the most basic tas7s 6
such as right clic7 to create a ne( file or a ne( folder. So things seem to be
going from bad to (orse (ith 'nome #. -n the plus side, the @inu= Mint team
has actually improved the Nautilus File Manager and renamed it as the Nemo file
manager for use (ith their 'nome # based Cinnamon distribution. 3he Nemo file
manager is very similar to the Ca<a file manager (hich @inu= Mint uses on their
'nome based Mate distribution. @inu= Mint Cinnamon is therefore
incorporating many of the features (hich have only been available in Mint Mate.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C"
/f they are smart, the 'nome team (ill follo( the Mint pro<ect and introduce a
ne( platform called 'nome C to ma7e it clear that they are moving a(ay from all
the problems caused by 'nome #. 'nome C could bring a reunion of the open
source community. 3his (ill not affect @inu= Mint Mate. .ut it (ill mean that @inu=
Mint Cinnamon (ill become more similar to @inu= Mint Mate. /t could be that by
!"C, (e (ill see a ne( operating system from @inu= Mint (hich integrates all of
the best features of @inu= Mate (ith the ne( innovative features of @inu=
Cinnamon. At the same time, / predict that there is going to be a ma<or shift a(ay
from Microsoft 4indo(s. Sales of 4indo(s : are do(n nearly !U from
comparable time period sales of 4indo(s *. 4hen fol7s learn that 4indo(s : is
nothing at all li7e 4indo(s *, this gap should gro( even greater. 3he (ord (ill
eventually get out on the internet no matter ho( much money Microsoft spends
on advertising.
Ti!!in5 *oints and the Structure of Scientific 2e3olutions
In the boo$# <he 2tructure of 2cientific >e6olutions# <homas Cuhn explains that
re6olutions do not happen "raduall. People are hi"hl resistant to chan"e. <he
clin" to existin" beliefs until somethin" drastic# a tri""erin" e6ent# forces them to
consider somethin" new. <hat tri""erin" e6ent ma be the &ouble Whamm of
;icrosoft endin" support for Windows XP and at the same time trin" to force
users to adopt the fundamentall flawed Windows A operatin" sstem.
-nce "!U of the people become a(are that there is a better option 6 (hich is
also free 6 and an option (here they can continue to safely use their current
computers and current 4ord documents, change can spread li7e (ildfire to the
rest of the population. -nly time (ill tell if this (ill actually happen. .ut given ho(
hard it is to learn 4indo(s :, / am thin7ing that many people (ill decide to ma7e
the move to @inu=.
.ecause the most (idely 7no(n @inu= distribution is 0buntu, in the ne=t section,
(e (ill loo7 more closely at the benefits of @inu= Mint over @inu= 0buntu.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C
'.( :enefits of Linux Mint o3er Linux =buntu
/n the last section, (e pointed out that @inu= Mint uses a better file manager than
@inu= 0buntu. /n addition, @inu= Mint has a user interface (hich more closely
resembles 4indo(s H& and 4indo(s *. /n this section, (e (ill revie( some
other benefits of @inu= Mint over @inu= 0buntu.
Linux Mint 3ersus =buntu o!eratin5 s#stem
9o1 to ObEecti3el# 6om!are O!eratin5 S#stems
Many claim that because @inu= operating systems are all free, you should simply
set up a free virtual machine on your current computer and install several @inu=
distributions in order to see for yourself (hich one you li7e best. For some, this
advice ma7es sense. / have personally installed more than one doIen different
@inu= distributions on a virtual machine in order to evaluate them. ;o(ever, this
is poor advice for the general public as many (ould not even 7no( (hat to loo7
for in a (ell structured operating system. /t is not efficient for every person to be
spending hours, days and even months and years conducting their o(n
research. 3herefore, belo( is a summary of important factors / used to determine
that @inu= Mint is a better distribution for most users than @inu= 0buntu.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C#
Fi3e 4m!ortant 6haracteristics of an 4deal O!eratin5 S#stem
Some have claimed that there is an inherent conflict bet(een a simple, fast and
light(eight operating system versus a customiIable and full featured operating
system. ;o(ever, @inu= has solved this conflict by separating the base operating
system from the features or additional programs you run on the base system.
3here are more than +!,!!! programs you can install on any @inu= distribution.
@inu= Mint has also sho(n that it is possible to have both a fast and fully featured
operating system (ith @inu= Mint. Nevertheless, there are a fe( features (hich
are more important to an operating system that may not be apparent to the
casual user. .elo( (e (ill loo7 at five of these essential features and see ho(
@inu= Mint compares to @inu= 0buntu.
-1, <eliabilit6 includes stabilit of the code# not needin" freKuent updates#
protection from 6iruses and of course not crashin".
-2, 3a$6 Setu& means it does not reKuire installin" extra tools to operate and
can achie6e a state of maximum usabilit with onl a few minor adjustments.
-3, =ile :r"anize# means the file structure can be Kuic$l confi"ured in an open
and simple tree structure of folders and files so that all files and all tools can be
Kuic$l and reliabl accessed.
->, 3a$6 ?$e means that there are no hidden files or tools. 3ll files# tools and
menus are clearl labeled to assist the no6ice in learnin" how to use the
operatin" sstem
-., @er$atile means that it is compatible with other pro"rams.
<h# Linux Mint %> Mate <on
3he reason Mate (on is because there is not much (rong (ith it.
<eliabilit6- Linux ;int ;ate is a 6er stable sstem which has reKuired almost
no updatin" or re6isions in the past + ears. Bbuntu is less reliable primaril
because it is based on Hnome , which is under"oin" rapid chan"es while ;int
;ate is based on the more stable Hnome +.
3a$e of $et u&- Linux ;int and Linux Bbuntu are both fairl eas to install. Fou
just clic$ on a few buttons to install and confi"ure either. We will first co6er how to
set it up in a 6irtual machine and later how to set it up as a dual boot so that it
can run parallel with the Windows operatin" sstem on our current computer.
=ile Stru+ture- <he file structure of ;ate is similar to the ;icrosoft File 2tructure.
2adl# the biggest problem of 0buntu is that they recently gutted their file
manager such that you no longer have the ability to vie( your folders in a tree
structure. 3he biggest advantage of Mint over 0buntu is that it comes (ith a tree
vie( file manager li7e 4indo(s H& and 4indo(s *.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "CC

3a$e of u$e
;ate is 6er eas to use because it is or"aniGed much li$e the Windows XP and
Windows 7 operatin" sstems. <he ;int ;ate des$top and start screen are 6er
similar to Windows XP and Windows 7. <his ma$es ;int much easier to learn for
people con6ertin" from Windows XP and Windows 7. Bbuntu can be rather
challen"in" because much li$e Windows A man important commands are
hidden from 6iew. For example# with Bbuntu# it is Kuite difficult to chan"e the
menus and or place shortcut icons on the des$top.
;int ;ate=s interface uses a tas$ bar at the bottom of the window. <he tas$ bar
has a small popup menu that lists most of the applications and settin"s on our
computer. It=s ver6 $imilar to /in#ow$ 5 Start menu# lettin" ou browse our
installed applications b ho6erin" o6er different cate"ories. When ou open up
an app# ou=ll see a button appear on the tas$bar# just li$e in Windows Lista#
Windows 7 and Windows XP. Fou can e6en add a few shortcuts to the side of
our tas$bar li$e Windows= old Kuic$ launch.
MintA$ menu i$ mu+% ea$ier to brow$e; $in+e it li$t$ all 6our a&&$ b6
+ate"or6 in a familiar wa. It ma ha6e a smaller tas$ bar with harder4to4see
shortcuts# but be"inners should be able to find anthin" the=re loo$in" for just b
openin" ;int=s main menu.
=buntu !romotes AmaCon!
A ma<or benefit of @inu= Mint is better respect for your privacy. /n -ctober !",
0buntu released version "."! (hich, for the first time, featured a lin7 to
AmaIon.com in its main menu. .elo( is the @inu= 0buntu Start ScreenF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C+
/t is easy to delete this lin7. .ut (hat angered many 0buntu users is that 0buntu
no( collects data on user des7top activity and for(ards it to AmaIon. Many
0buntu users are no( bombarded by ads from AmaIon after using the 0buntu
Search .o= A(hich is no( lin7ed to AmaIonB.
,ichard Stallman has described the integration of 0buntu (ith AmaIon as
1spy(are.2 See the follo(ing D minute $outube video for a fuller e=planation of
,ichard StallmanJs concerns about the AmaIon?0buntu invasion of your privacyF
http-..www.outube.com.watchE6M@PA@7p46$sc
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "CD
-ne of the advantages of free soft(are is that users historically have been able
to protect themselves from malicious features. 3o recover our right to privacy, (e
have to either convince the 0buntu developers to stop spying on us 5 or (e need
to move a(ay from 0buntu to(ards a pro<ect li7e @inu= Mint (hich does not spy
on us. / should add that even if 0buntu stopped spying on us, / (ould still
recommend @inus Mint Mate because it has a much better file manager. Also
0buntu has a problem in that, li7e 4indo(s :, many important commands are
hidden from vie(. $ou can navigate the Dash (ith your mouse, but it is incredibly
complicated for beginners, hiding a lot of your apps under e=pandable menus
and small icons. 3hat means bro(sing for apps is a pretty bad e=perience (hen
you are using 0buntu.
@er$atilit6... ;ate# which comes with Libre !ffice pre4installed# can ha6e a
pro"ram called Wine added to it. 5etween Wine and Libre !ffice# ou can use
almost an pro"ram and process almost an document outputtin" the
document in almost an form ou want.
=sin5 and 4nstallin5 A!!s
.oth 0buntu and Mint come (ith a set of preinstalled apps that cover most of
your needsF an office suite, a (eb bro(ser, a music player, and a video player.
.oth 0buntu and Mint also have their o(n app stores that ma7e it easy for
beginners to find, research, and do(nload ne( apps.
6ustomiCation
Linux ;int ;ate also allows ou to customiGe e6er inch of our computer# from
shortcuts to the siGe of our menus to the wa windows wor$. Bbuntu# howe6er#
has done awa with a lot of this latel. It does still offer some preferences# but it=s
much more ?what ou see is what ou "et? than ;int# which has loads of settin"s
for twea$in" e6erthin" down to the minute details of our interface. ;an
be"inners ma not care about this# but if ou=re a tech sa66 user loo$in" to learn
about Linux# ou=ll probabl find more thin"s to ?pla with? in ;int. 2o sa
"oodbe to the dail hassles of Windows and the constant fees for annual
updates and sa hello to the freedom of open source operatin" toolsD In the
followin" articles# we will be"in with a re6iew of installin" and usin" the Linux
;int on a 6irtual machine.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C*
'., Four Ste!s to the Freedom of O!en Source Tools
1/sn>t it ironic that the proprietary soft(are developers call us communistsL
4e are the ones (ho have provided for a free mar7et, (here they allo( only
monopoly. ] the only (ay to escape from monopoly is to escape from
proprietary soft(are, and that is (hat the free soft(are movement is all about.
4e (ant you to escape and our (or7 is to help you escape. 4e hope you (ill
escape to the free (orld...Everyone is (elcome in the free (orld, come to the
free (orld, live (ith us in freedom.2
2ichard Stallman AFree Soft1are in 0thics and *racticeF (//
Four Ste!s to the Freedom of O!en Source
/f you are cautious li7e me, you are going to (ant to test the (aters gradually
before actually ta7ing the plunge to open source. 4e have the perfect program
for you. 3han7fully, there is a (ay to (ade into this ocean of freedom one step at
a time. 3he follo(ing are four simple steps you can ta7e that (ill allo( you to try
out open source tools (ithout changing anything about the operation of your
current computer.
Ste! W%7 =se Iirtual :ox to 6reate a Iirtual Machine
.;ote& (hese directions are intended mainly for Windows <3 and Windows =
users. -owever, there are similar tools for Windows 8 and !pple users/.
/n this section, (e (ill sho( you ho( to use a free open source tool called Eirtual
.o= to create a virtual computer inside of your normal computer. 3his (ill allo(
you to install any operating system you (ant inside of your virtual machine so
that you can test the operating system and see ho( (ell you li7e it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C:
Ste! W(7 4nstall Linux Mint in a Iirtual Machine
0sing Eirtual .o= to install a virtual machine on your computer and then installing
a copy of @inu= Mint into the virtual machine (ill allo( you to e=periment (ith
@inu= Mint before installing it on your real computer. $ou can continue to use
4indo(s to run your regular programs (hile you learn ho( to use the @inu=
operating system in a safe test environment. 4e (ill also sho( you ho( to set up
a shared folder (hich (ill be accessible to both operating systems. 3his (ill allo(
you to go bac7 and forth and compare the systems directly.
/f you (ould li7e you can also install @inu= 0buntu in a Eirtual Machine
$ou can also install @inu= 0buntu into a virtual machine on your computer. 3his
(ill allo( you to compare @inu= Mint to @inu= 0buntu side by side.
Ste! W,7 4nstall Linux Mint in a ADual :ootF on #our 2eal 6om!uter
3hird, once you agree that @inu= Mint (ith @ibre -ffice is a better option than
(hat you are currently using, (e (ill sho( you ho( to install @inu= as a Dual
.oot on your real computer. And you still can use your normal 4indo(s
operating system to run your 4indo(s programs. ;aving a dual boot is very
useful to help you recover your files in the event that the 4indo(s program
crashes 6 (hich you 7no( it (ill eventually do. 4e (ill sho( you ho( to do all of
this in our section on dual booting. $ou can use the dual boot for as long as you
li7eG At some point, it (ill da(n on you that you havenJt used 4indo(s in years...
Ste! W'7 Ditch <indo1s and Li3e 9a!!il# 03er After
-nce you are confident that @inu= Mint (ith @ibre -ffice and 4ine do everything
you (ant to do 6 and much better than 4indo(s ever did, after say a year goes
by and you have never even bothered opening your 4indo(s operating system,
then you can delete the 4indo(s program and move for(ard (ith a full @inu=
Mint operating system. 4hen you are ready to let go of the security blan7et, (e
(ill sho( you ho( to ta7e the final steps to freedom. Alternately, if you (ant to
7eep 4indo(s around as a security blan7et Aeven though it is not secureB, you
can install 4indo(s into a virtual machine. Even if you are rich and can afford
thousands of dollars for Microsoft programs, you still are going to be very happy
you too7 the time to learn ho( to use @inu= and @ibre -ffice. So letJs get startedG
4e (ill begin (ith Step "F /nstalling Eirtual .o= on your home computer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C)
Ste! W%7 =se Iirtual :ox to 6reate a Iirtual Machine
4e (ill no( do(nload a copy of the simplest and most stable version of the
@inu= Mint operating system (hich is Mate. 4e (ill then do(nload a virtual
machine called Eirtual .o= to place it in. 0sing a virtual machine is the safest
(ay to test any operating system before installing it on your real computer.
Do1nload Linux Mint %> Mate
<o 6isit the main site for Linux ;int "o to- http-..linuxmint.com..
Iere ou will see that the Linux ;int project offers se6eral operatin" sstems.
<he two most popular are Mate and Cinnamon. <he difference between them is
that ;ate is the stable 6ersion and @innamon is the cuttin" ed"e 6ersion.
Bnfortunatel# @innamon was somewhat unstable in Lirtual 5ox. It $ept openin"
new windows. <his feature can be disabled. 5ut there will still be problems. For
example# it can be difficult with @innamon to set a custom bac$"round ima"e.
<han$full# there are no problems at all with Linux ;ate. It is incredibl stable and
eas to use. We will therefore download ;ate instead of @innamon. Lersion )N
of ;int is called !li6ia 9includin" !li6ia )N @innamon and !li6ia )N ;ate:.
'6en with Linux ;int !li6ia )N ;ate# there are se6eral 6ersions. We want the
6ersion with the codecs. In addition# for a Lirtual ;achine# we want the ,+ bit
6ersion which is intended for machines with less than 1 H5 of >3;. !ur 6irtual
machine will onl ha6e ) H5 of >3;. If we were "oin" to install it as a dual boot
on a normal modern computer with 1 to A H5 of >3;# then we would pic$ the
/1 bit 6ersion. 3o get the @inu= Mint operating system, go to the follo(ing pageF
http-..www.linuxmint.com.download.php
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+!
&ownload the MA03 32 bit 6ersion to our &ownloads folder. It is a lar"e file so
ou should be at a hi"h speed internet connection and e6en then it ma ta$e a
while. If ou ha6e a /1 bit computer with 1 H5 or more of >3;# then also
download the /1 bit 6ersion to e6entuall put into a dual boot on our computer.
&o the downloads one at a time and ma$e sure one is completed before startin"
the other. 5e patient. 'ach download will ta$e about ,* minutes and can be
found in our &ownloads folder when ou are done. After clic7ing on the # bit
do(nload lin7, you (ill be ta7en to the 1mirrors2 page. Scroll do(n to the 0S and
pic7 one of the mirror locations to actually do(nload the file. Select Save File.
3hen clic7 -8. No( the do(nload begins. 'ive it a full #! minutes to complete
the do(nload before do(nloading and setting up your Eirtual Machine.
Do1nload Iirtual :ox
.efore (e install the @inu= Mint "+ Mate operating system on our laptop, (e first
need to install and set up Eirtual .o= on our home computer. 3his is not much
different than installing any other program on our computer. Eirtual bo= can be
installed on any computer (ith any -perating system and allo(s you to run
multiple -perating Systems on the same computer at the same time.
For each ne( operating system (e add, (e (ill create a separate 1virtual
machine2 set up specifically for that operating system. For our purpose, (e can
7eep our normal 4indo(s operating system on our computer and learn ho( to
use the @inu= operating system inside of Eirtual .o=. 3his does reKuire some dis7
space and memory. /f this is lac7ing, you can also place @inu= on a stic7 or flash
drive and practice (ith it that (ay.
-ne option to install Eirtual .o= is to go to the virtual bo= (ebsite and do(nload
the Eirtual .o= Manual. /t is only #C pages. 3han7fully, (e can Kuic7ly install
Eirtual .o= (ithout reading the manualG Different versions of Eirtual .o= are
available for different host operating systems. 4e (ill install the Eirtual .o=
version for a 4indo(s * DC bit host. .ut if you have a # bit computer or a Mac,
<ust clic7 on that do(nload option instead.
4e (ill then install @inu= Mate Mint # bit -perating system as the 1'uest2
operating system. After setting up the @inu= Mint Mate # bit operating system,
(e (ill install the Eirtual .o= 1'uest Additions2 as this (ill allo( us to set up a
1shared folder2 bet(een our host operating system and our guest operating
system.
4e (ill no( sho( you ho( to do this set up by do(nloading the guest operating
system to your Do(nloads folder and uploading it to a Eirtual .o= machine from
your Do(nloads folder. .ut you could instead place the guest operating system
on a Flash Drive and load it into Eirtual .o= from the Flash Drive.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+"
4nstallation of Iirtual :ox
'o to the Eirtual .o= Do(nloads pageF
https-..www.6irtualbox.or".wi$i.&ownloads
3he base pac7age includes all of the components. Clic7 on the latest version to
do(nload it. /t is a big )+ M. folder, so be patient. Do not attempt to start it until it
is fully do(nloaded. 3hen go to your Do(nloads folder and start the installF
,ight clic7 on the Eirtual .o= /con and select ,un as Administrator. 3his (ill start
the installation process. 9ust clic7 Ne=tF

3hen clic7 /nstall. 3hen clic7 Finish. After clic7ing Finish, you (ill see the
follo(ing Eirtual .o= Start ScreenF
6han5e #our 9ome 6om!uter :4OS settin5s
.efore creating a Eirtual Machine, (e need to first change one of the settings in
the ./-S section of our home computer. -ur tas7 is to enable Eirtual Machine
Support ASEM supportB in our ;ost computer ./-S settings. First, turn off your
home computer. 3hen push the start button to turn it bac7 on. Immediatel hit t%e
=10 *e6 after pressin" the 2tart button to brin" up the 5I!2 screen. 9<his is the
$e for 5I!2 start on IP computers. Fou ma need to press a sli"htl different
$e for a different manufacturer:.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+
<hen clic$ on the ri"ht arrow of our $eboard three times to reach the S6$tem
Confi"uration screen. <hen use the down arrow on our $eboard to select
S@M $u&&ort. 9on some computers it will sa @irtualization 0e+%nolo"6B. 2L;
stands for 2ecure Lirtual ;achine. 3hen press the Enter 7ey on your 7eyboard to
enable SEM Support. 3hen clic7 on F"! 7ey on your 7eyboard to save the ne(
settings and E=it ./-S. $our computer should automatically restart. -r you can
restart it manually. Either (ay, log in. 3hen, (hen your des7top comes up, you
should see a Eirtual .o= shortcut 7ey on your des7top.
Set u! #our Iirtual Machine
Clic7 on the Eirtual .o= /con on your des7top to open the Eirtual .o= Start
screen.
3hen clic7 on NE4 to create a ne( virtual machine. $ou (ill see the follo(ing
screenF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+#
0se the do(nload arro( to select Linux for the type and =buntu for the version.
A@inu= Mint is in the same family as @inu= 0buntuB. 'ive your Eirtual Machine a
descriptive name such as @inu= Mint "+ Mate. 3hen clic7 on Ne=t. 3he default
memory is +" M.. Double the memory siIe to "!C. 3hen clic7 ne=t.
3his brings up the ;ard Drive screen. @eave it set for 6reate a 3irtual hard
dri3e no1. 3hen clic7 Create. 3his brings up the ;ard Drive File 3ype screen.
@eave it set for ED/ and clic7 Ne=t. 3his brings up the Storage screen. @eave it
set for D#namic and clic7 Ne=t.
3his brings up the file location and siIe screen. : '. is the minimum for @inu=
Mate and all of the programs that come (ith it. ": '. is better as this allo(s you
to add and test many other free open source programs that are available for it.
3hen clic7 Create.
@lic$ on Settin"$ to impro6e the settin"s. For the Heneral 3d6anced tab# ma$e
the 2hared clipboard and &ra" and &rop bidirectional.
/ncrease the display to ": M. and enable #D acceleration. 3hen clic7 -8.
No( that (e have our virtual machine set up, (e are no( ready to install @inu=
Mint "+ Mate on our Eirtual Machine. 3hat is the sub<ect of the ne=t section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+C
'.' 4nstall Linux Mint in a Iirtual Machine
4nstallin5 Linux Mint into a 3irtual machine is a 5reat 1a# to learn more
about the benefits of Linux Mint 1ithout makin5 an# chan5es to #our
<indo1s o!eratin5 s#stem.
/n the last section, (e set up a Eirtual Machine. /n this section, (e (ill install
@inu= Mint Mate "+ into that virtual machine. Assuming (e have already
do(nloaded the operating system /S- file and created a virtual machine in
Eirtual .o= for it, the ne=t step is to open virtual bo= and select the machine (e
(ant to use.
3hen clic7 on the Start buttonF
Clic7 -8F
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "++
Clic7 on the tiny folder (ith the green arro( to bro(se to the @inu= Mint install
folder. Clic7 on the Do(nloads folder and scroll to the @inu= Mint file to select itF
3hen clic7 Start. $ou may see a couple of Notices. Clic7 -8 for each. 3his (ill
start the @inu= Mint "+ operating system installation process. /f a screen appears
(ith a bunch of 1ca<a2 file managers, <ust clic7 the H by each one to delete them.
3his (ill bring up the follo(ing @inu= Mint installation screen.
@lic$ on )n$tall Linux Mint which is in the upper left corner-
<his will brin" up the )n$tall /el+ome screen. Choose the language and clic7 on
Continue. Ma7e sure you are connected to the internet and clic7 ContinueF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+D
<his warnin" onl applies to the ' &ri6e inside of Lirtual 5ox. 2o lea6e it set for
3ra$e 8i$+ and clic$ )n$tall 9ow. Choose a time Ione and clic7 Continue.
Select a language. 3hen clic7 Continue.
'nter our name# user name and passwords. 2ettin" to lo" in automaticall will
sa6e time when rebootin" while installin" and uninstallin" pro"rams. <hen clic$
@ontinue. No( (e get the slide sho( (hich you can read (hile @inu= is being
installed. 3he slide sho( e=plains some of the features that come (ith @inus Mint
Mate such as a (eb bro(ser, file manager, (ord processor, soft(are do(nload
center, customiIation options and a help center. 3here is an entire community of
users (ho can help you solve problems 6 in addition to lots of tutorials.
4hen the operating system has been installed, the follo(ing screen (ill appearF
Clic7 ,estart No(. 3his (ill only restart your Eirtual Machine, not your actual
laptop. 3fter restart# press 3nter on our $eboard. @lose the Ielp screen.
5elow is what our des$top loo$s li$e. @lic$ Menu which is in the lower left
corner-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+*
@inu= Mate has t(o Start MenusF With ;ate# there are two start menus. 3bo6e is
the =avorite$ Menu. @lic$ on 3ll 3pplications to reach the A&&li+ation$ Menu.
4nstall =!dates
3he first step after installing Mate is updating all of the tools that come (ith Mate.
3o do this, clic7 on the Menu icon in the lo(er left corner. <hen clic$ on t%e
Control Center which is in the left column. Ne=t clic$ on S6$tem; then ?&#ate
Mana"er. Enter your pass(ord. 3hen clic$ on )n$tall ?&#ate$. @lic$ !C to all
Kuestions. <his one time update will ta$e about N minutes to complete. When
the are done# ou will be returned to the 2tart screen. <o insure there are no
more updates# clic$ on ;enu# @ontrol Panel# Bpdate ;ana"er a"ain. <his time
the list should be empt. @lose the Bpdate ;ana"er and the @ontrol @enter.
When the upload is done# it is a "ood idea to restart Linux. <o do this# clic$ on the
;enu-
<hen clic$ >estart. @on"ratulationsD Fou now ha6e a full updates Linux ;int
;ate operatin" sstem installed. In the next chapter# we will learn how to use it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+:
C%a&ter .... Set u& an# ?$e Linux Mint
6ha!ter > includes the follo1in5 four sections.
>.% 9o1 to use Linux Mint Mate
>.( Set u! and use the Mate File Mana5er
>., Add Free *ro5rams to Linux Mint Mate
>.' Add a Shared Folder to Linux Mint Mate
/n the last chapter, (e revie(ed ho( to install Eirtual .o= and @inu= Mint into
your 4indo(s based computer. /n this chapter, (e (ill learn ho( to use @inu=
Mint including ho( to change the appearance of the des7top, ho( to use the file
manager, ho( to add free programs to Mint and ho( to set up a shared folder
bet(een @inu= Mint and your 4indo(s C Drive.
Nearly all of the steps for using @inu= Mint are the same (hether you are using
Mint inside of a virtual machine Aas (e discussed in Chapter CB or (hether you
have installed @inu= Mint in its o(n separate partition of your hard drive Aas (e
(ill discuss in Chapter DB. 3he benefit of setting up a separate partition over a
virtual partition is first that programs (ill run much faster Abecause they do not
have to run through the bloated 4indo(s programB, second that you (ill not
need a 1shared folder2 for transferring documents bet(een 4indo(s and @inu=
Abecause @inu= Mint in its o(n partition allo(s you to access the entire 4indo(s
C DriveB and third that should the 4indo(s partition eventually crash, you (ould
have be able to access to all of your data if @inu= is in its o(n separate partition
but you (ould not be able to access your data if @inu= is inside of a virtual
partition in your 4indo(s partition. So in this chapter (e (ill sho( you ho( to
use @inu= Mint in 4indo(s so you can see ho( it (or7s. 3hen in the ne=t chapter
(e (ill sho( you ho( to install @inu= Mint in its o(n separate partition. 5elow is
what the Linux ;int &es$top will loo$ li$e when we are done-

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+)
>.% 9o1 to use Linux Mint Mate
3his section e=plains ho( to use the @inu= Mint operating system to change the
appearance of your des7top and set up Kuic7 launch icons on your des7top.
-ne of the big benefits of @inu= Mint Mate is the ability to control nearly every
aspect of the appearance and function of your des7top 6 something you have
almost no control over (ith 4indo(s :G
/n our last chapter, (e created a virtual machine and installed Linux Mint %>
Mate ,( bit version in this virtual machine. /n this chapter, (e (ill sho( you ho(
easy it is to use the @inu= Mint Mate operating system. ;ere is the initial Start
screen for @inu= Mint MateF
Clic7 on Menu in the lo(er left corner to bring up the Fa3orites menu7
-ur first tas7 (ill be to install a custom des7top bac7ground image.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D!
Add a 6ustom Deskto! :ack5round 4ma5e
-ne of the most important (ays to personaliIe your computer is to install your
favorite images to see (hen your computer first turns on. 3his can be an image
of your family or anything else you li7e. 4ith 4indo(s H& and 4indo(s *, it (as
very easy to change the bac7ground image. ;o(ever, (ith 4indo(s :, it is very
difficult. @uc7ily, @inu= Mint Mate has a (onderful system for adding any of
thousands of bac7ground images to your des7top 6 including your o(n personal
images. 3o install a ne( bac7ground image, clic7 on 6ontrol 6enter in the main
menu.
Clic7 on A!!earance7
3hen clic7 on the :ack5round 3abF
3here are about one doIen bac7ground images here. .ut there are thousands
more you can get by clic7ing on the lin7F "et more back5rounds onlineF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D"
3here are "#) pages of bac7grounds or over "C!! choices. $ou can also create
your o(n images "!C pi=els (ide by *D: high. .e sure to optimiIe the file siIe
to 7eep it under "!!8.. 3hen upload it to your Do(nloads folder. 4hen selecting
a ne( des7top image, ma7e sure that there are not a lot of graphics on the left
side of the image as this is (here (e (ill be placing our des7top Kuic7 lin7 icons.
/f you do not get the chance to get outdoors much, choose a light blue image (ith
a lot of s7y for your des7top image. -n page "" is one such image. .ut you can
do(nload several images and choose bet(een them later.
3o get this image, clic7 on '-F
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D
3hen right clic7 on the image and choice Sa3e 4ma5e AsF
3his brings up your Mint Mate Do(nloads folder.
Change the name of the image to something more descriptive and clic7 Save.
After do(nloading all of the images you (ant to the Mate Do(nloads folder, e=it
Firefo= bro(ser to go bac7 to the Appearances &references .ac7ground screenF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D#
Clic7 AddF
.y default, Mate loo7s in your *ictures folder to see if there are any images.
Clic7 on :ack5rounds in the left column above. 3his is (here the default
bac7ground images are 7eptF
3hen clic7 on Linux Mint Nadia extra to open this folderF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "DC
3his is (here all of your default bac7ground images are 7eep. 3he location isF
File Mana5er; usr; share; back5rounds; LinuxmintNnadia)extra. 4e can right
clic7 on any of these images to delete them from our default list. -r (e can add
images to this list by moving them from the Do1nloads folder to this list. 4e
could also <ust navigate from this bro(se function to the Do1nloads folder and
leave the images there. .ut this (ill clutter up the Mate Do(nloads folder and run
the ris7 of accidentally deleting your bac7ground image in the future.
Ne=t clic7 on your 9ome folderF
3hen clic7 on the Do1nloads folderF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D+
<hen select the ima"e ou want to turn into add to Wallpaper and clic$ !pen-

<his automaticall adds this ima"e to our list of options and applies this ima"e
to our des$top. >epeat to add more ima"es to this list. <o remo6e ima"es from
the list# clic$ on an ima"e and then clic$ on &elete.
C%an"e 6our 8e$*to& 0%eme
In addition to chan"in" the 5ac$"round ima"e# we can chan"e the theme% used
to displa open Windows. @lic$ on the 3ppearance Preferences 0%eme tab-
We could also "et man more themes. 5ut for now# clic$ on @ustomiGe which will
ta$e us to the pre4installed options.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "DD
;int X is the default theme. 5ut there are se6eral themes inside of ;ate ou can
select. @lic$ on ;ist.
@lic$ on the /in#ow !or#er tab-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D*
<here are about +* tab displa options# <o select the option closest to Windows
7# clic$ on /inMe. <hen clic$ @lose.
We now ha6e a Windows li$e theme and a li"ht blue des$top bac$"round.
@lose the @ontrol @enter.
<he next issue is to learn how to set up and use the Mate =ile Mana"er. <hat is
the topic of our next section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D:
>.( Set u! and use the Mate File Mana5er
0%i$ $e+tion ex&lain$ %ow to $et u& an# u$e t%e Linux Mint =ile Mana"er.
0%i$ in+lu#e$ +%an"in" t%e $tru+ture of t%e file mana"er to ma*e it
fun+tion Cu$t li*e t%e /in#ow$ D4 or /in#ow$ 5 file mana"er.
In this section# we will re6iew how to set up and use the Linux ;int ;ate File
;ana"er. <he ;int ;ate file mana"er# which is called CaCa# is one of the most
important reasons to choose Linux ;int ;ate o6er Linux Bbuntu or Windows A or
3pple. <he @aja File ;ana"er is similar to the File ;ana"er that comes with
Windows 7 and Windows XP. While this file mana"er can be added to Linux
Bbuntu# it wor$s best with Linux ;int ;ate. <o open this file mana"er# clic$ on
our 2ome folder in the upper left corner of the ;int ;ate des$top. !r
alternatel# open the ;enu in the bottom left panel and clic$ on 2ome Folder.
5elow is what the @aja file mana"er loo$s li$e usin" the Winme theme we
installed in the last chapter-
5 default# this folder opens in the )+on @iew at )**O. 3 more efficient 6iew is
@ompact Liew at //O. @lic$ on the &rop down arrow next to Icon Liew to select
Com&a+t @iew-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D)
<his will brin" up the @ompact Liew. <his is similar to the List% 6iew in Windows
XP and Windows 7. <he @ompact Liew is especiall important if ou ha6e a lot of
files and folders-
3lso b default# the ;ate @aja File ;ana"er shows the 4la+e$ Liew in the left
column. @lic$ on the &rop &own arrow to the ri"ht of Places to select 0ree Liew-
<ree Liew will cause @aja to loo$ and function li$e the 'xplorer File ;ana"er in
Windows XP and Windows 7. @han"in" to <ree Liew will cause some important
arrows to appear to the left of folders in the left panel which ha6e sub4folders-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*!
@lic$ on the Iome Folder to re6eal all of the subfolders in this folder-
(ust as ou can do with Windows 7# ou can create additional folders and create
our own folder structure. @lic$ on the &es$top folder to open it. <hen ri"ht clic$
on the white wor$space to brin" up the followin" screen-
@lic$ on Create =ol#er to place a new folder on our des$top. Hi6e it a name.
Fou can also put a file on the des$top. >i"ht clic$ on the wor$space and clic$ on
@reate &ocument# 'mpt File. Hi6e the file a name.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*"
Movin" =ile$ an# =ol#er$
Fou could ha6e opened the @urrent &ocuments folder first and then created this
file in it. Iowe6er# ou can also create the document and then mo6e it into the
folder either b selectin" it in the file mana"er and then dra""in" it to the @urrent
&ocuments folder in the File ;ana"er-
!r ou can close the file mana"er and simpl dra" the document to the @urrent
&ocuments folder in the &es$top-
A## A&&li+ation Laun+%er' )+on$ to our 8e$*to&
We next need to add some 3pplication Icons to the &es$top. <his is also done
much easier in ;int ;ate than in Bbuntu. @lic$ on the 2tart ;enu. <his brin"s up
the =avorite$ screen-
<hen clic$ on All A&&li+ation$ in the upper ri"ht corner. <his chan"es the main
menu from the Fa6orites screen to the 3pplications screen-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*
<hen clic$ on :ffi+e,
<he most important application is Libre!ffice Writer# which is the open source
6ersion of ;icrosoft Word. @lic$ on this application. <hen hold down on this
selection and dra" the icon to the des$top.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*#
@lic$ on Libre !ffice Writer Kuic$ start icon to ma$e sure it wor$s-
We will co6er how to use Libre !ffice in another article. 5ut it basicall wor$s just
li$e Word +**, with a fixed menu structure. @lose Libre !ffice Writer.
C%an"e 8e$*to& Settin"$
Fou can also control which default icons appear on our des$top b "oin" to
;enu# Preferences# &es$top 2ettin"s-
We can delete the home or computer Kuic$ start icon here if we want less on our
des$top. !r add the <rash icon if we want the trash can on the des$top.
Mo#if6 t%e Main Start Menu
<o modif the items that appear on the main 2tart menu# ri"ht clic$ on the menu-
<hen clic$ on 'dit ;enu-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*C
For menu cate"ories to appear in the main menu# the need to ha6e menu items
in them. For example# we could select 'ducation# but this menu item will not
appear until after we ha6e added some education pro"rams.
@lic$ on each of the 3pplication cate"ories in the left column to brin" up a list of
possible menu items in the middle column. 2elect or unselect these to create
our own custom menu of the items ou are most li$el to use.
In the next section# we will explain how to add more free open source pro"rams
to our computer and how to add a shared folder% so ou can share documents
with one of our normal Windows folders.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*+
>., Add Free *ro5rams to Linux Mint Mate
A hu5e benefit of Linux o3er <indo1s is the abilit# to add thousands of
free !ro5rams 1ith Eust the click of a button. This section describes ho1
to add free !ro5rams to #our Mint s#stem and ho1 to add =S: su!!ort to
transfer files bet1een o!eratin5 s#stems in #our Iirtual Machine.
!ne of the bi""est ad6anta"es of Linux o6er Windows is that there are tens of
thousands of free open source pro"rams which ou can add to customiGe our
computer. In this article# we explain how to use the Linux ;int 2oftware ;ana"er
to add an of more than /,#*** pro"rams to our computer. We will then re6iew
how to add a 2hared folder so ou can share documents between Linux ;int
;ate and ;2 Windows. We will also re6iew how to acti6ate a B25 Flash &ri6e to
share documents between ;ate and Windows.
A## =ree 4ro"ram$
Ho to the 2tart ;enu and clic$ on 3dministration# then 2oftware ;ana"er-
Linux offers all $inds of free pro"rams for students and schools. @lic$ on S+ien+e
an# 3#u+ation. <here is a Bbuntu education primar pac$a"e and an edu4
secondar pac$a"e.
5oth ta$e up nearl one "i"abte.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*D
@lic$ on Install. <hen chec$ on the pro"rams to see what was installed-
A+tivate 6our ?S! =la$% 8rive
<his step is not needed when installin" Linux ;int in its own partition# but is
needed to access our B25 flash dri6e with ;int when it is in a 6irtual partition.
2ome fol$s prefer the con6enience of usin" a flash dri6e in addition to or instead
of a shared folder for transferrin" data to and from their Lirtual operatin" sstem.
We need to add a special Lirtual 5ox extension called 'xtension Pac$ in order to
acti6ate our B25. <o "et this free extension# open the Firefox browser in Linux
;int and "o to the followin" pa"e- https-..www.6irtualbox.or".wi$i.&ownloads
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "**
@lic$ on the 3xten$ion 4a+*; All Su&&orte# 4latform$. <hen download the file
to our Iome computer &ownloads folder. 7ext install the @irtual !ox
3xten$ion 4a+*. <his is a different file than the L5ox 3dditions file and must be
installed in a different wa. <hen in the Lirtual 5ox start screen# select the
!peratin" sstem ou want# then clic$ =ile; 4referen+e$ in t%e to& menu-
<his brin"s up a different settin"s screen than we ha6e used before-
@lic$ on 3xten$ion$,
<his was automaticall installed when I ran the pac$a"e.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*:
If it has not been installed# clic$ on the upper ri"ht icon# called )n$tall 4a+*a"e,
@lic$ !C or install. Fou will see a notice which sas-
@irtual !ox ?S! 8evi+e 8river Su++e$$full6 )n$talle#.
Set u& a filter for t%e ?S! =la$% 8rive
7ext we can install the B25 Flash &ri6e in our home computer. 5e sure to put
the Flash &ri6e in a B25 + port. 9:03, @)<0?AL !:D 8:3S 9:0
<3C:19)E3 ?S! 3 4:<0SF 0%e ?S! =la$% 8rive mu$t be in a ?S! 2 &ortF
<hen open Lirtual 5ox and select the !peratin" 2stem ou want to use. <hen
clic$ on Settin"$; ?S!,
,i"ht clic$ on the "reen plus si"n to brin" up all of the B25 de6ices currentl
wor$in" on our computer-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*)
We want to add a B25 Flash &ri6e to the filters# but we do not want to add other
B25 items such as our computer camera or mouse. <he problem is that if we
actuall "et these transferred to the L;# the will not be a6ailable for the
computer until the L; is closed. Lo"itech is m mouse and one of these is the
camera for m computer. <he Kuestion is which one of these is the Flash &ri6eE
<o determine this# safel remo6e the flash dri6e. <hen loo$ at the list a"ain-
7ow we $now that the de6ice we want to add to the filter is called ?S! =la$%
Memor6. Put the stic$ bac$ in. <hen add it to the B25 filter list.
7ow that we ha6e the B25 filter set and the extension pac$a"e installed# start up
the Lirtual ;achine. <hen in the ;ate <op Panel# clic$ on 8evi+e$. Io6er o6er
the B25 Flash &ri6e which shows that it is captured. If it is not alread selected#
clic$ on the B25 &e6ice to select it-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":!
Ho to our file mana"er 9Iome folder: to see if the B25 is acti6e. It will probabl
not be there. >emo6e the flash dri6e and then put it bac$ into its port 9ma$in"
sure ou are puttin" it into a B25 + port and not a B25 , port:. 3 B25 icon will
appear in the lower ri"ht corner.
@lic$ on :&en ?S! wit% t%e =ile Mana"er- <his should now show an option for
the B25 Flash &ri6e. Iowe6er# dependin" on the B25 de6ice ou are usin"# this
option mi"ht not show up. <here are a couple of thin"s ou can do to fix this
problem. First# it could be that the B25 is reco"niGed# but not mounted. If ou
ho6er o6er it in the B25 &e6ices menu as we did abo6e and it sas it is captured#
then the B25 is reco"niGed. <he next step is to see if it is mounted. <o determine
this# "o to Menu; A&&li+ation$; 4referen+e$ an# +li+* on 8i$+$. 2elect the
B25 &e6ice and it will indicate if it is mounted and where.
<his B25 is mounted in the ;edia folder. 2ometimes the B25 is mounted in the
root folder. If it is mounted in a folder# ou do not ha6e permission to 6iew# ou
can add ourself to the folder usin" the Bser steps we describe in the next
section when we show ou how to add a 2hared Folder. If the B25 is not shown
as ;ounted# tr a different B25 stic$. <o see the B25# open the file mana"er-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":"
If the file mana"er is set for <ree Liew# ou should see our B25 here. Fou
should also see it in our File 2stem.;edia folder-
Fou ma be able to access it from our @omputer icon-
<o deacti6ate the B25 in the L;# be sure to ri"ht clic$ on it# then clic$ on 'ject.
!therwise the B25 ma not wor$ in our Iost computer.
7ow that we ha6e B25 access# in the next section we will re6iew how to set up a
shared folder between our Linux ;int and Windows operatin" sstems.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":
>.' Add a Shared Folder to Linux Mint Mate
<his section describes how to add a shared folder to our Lirtual ;achine.
3ddin" a shared folder allows ou to easil share and transfer documents
between operatin" sstems.
Set u& a S%are# =ol#er wit% @irtual !ox
Lirtual 5ox offers the abilit to share a folder between our Windows operatin"
sstem and an operatin" sstem ou ha6e installed in Lirtual 5ox. <o do this#
the Lirtual 5ox settin"s for this machine need to be correctl set. <urn off Linux
and "o to the Lirtual 5ox 2tart screen. @lic$ on Settin"$; 1eneral A#van+e#
and enable 2hared @lipboard and &ra" and &rop. 2et both for 5idirectional-
)n$tall @irtual !ox 1ue$t A##ition$
5efore we create the shared folder# we need to "et and install Lirtual box
3dditions to Linux ;int. First download the latest 6ersion of Huest 3dditions from
the Lirtual 5ox website. <hen !pen Linux ;int. <hen in the top panel# "o to the
Lirtual 5ox menu P&e6ices8 and select P)n$tall 1ue$t A##ition$G
3 6irtual disc will "et mounted in Linux.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":#
@hec$ 3lwas Perform this action. <hen clic$ !C. <hen clic$ >un-
'nter our password. Huest 3dditions will ta$e some time to install.
<pe in Fes. <hen hit 'nter. It will ta$e a while to finish. Press return $e when it
sas so 9after it8s finished:. L5!X 3&&I<I!72 is now installed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":C
<he next step is to turn off Linux. <hen in the ;ain ;enu# "o to the Lirtual 5ox
2tart screen and select Settin"$ 9ellow wheel below:.
@lic$ on 2hared Folders in left column below-
2elect Ma+%ine =ol#er$. <hen clic$ the small "reen A## fol#er icon.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":+
@lic$ on the drop down arrow and select ot%er. <hen na6i"ate to a new folder
called S%are# on our Windows @ dri6e. Please ma$e sure the folder is named
2hared with a capital 2.
@hec$ 3uto ;ount. <hen clic$ !C-
2tart our Linux ;int sstem and open the main menu. !pen the Iome Folder-
!pen the File 2stem. <hen the ;edia Folder-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":D
We could open the shared folder b ri"ht clic$in" on it and clic$in" >un as 3dmin
then addin" our admin password each time. 5ut a better wa is to add oursel6es
as an owner% of this shared folder. <o do this "o to ;enu# @ontrol Panel#
2stems# Bser Hroups-
@lic$ on Bsers and Hroups in the 2stems area of the @ontrol @enter-
@lic$ on Mana"e 1rou&$. 2croll down to 6boxsf 9which stands for Lirtual 5ox
2hared Folder: and clic$ on it-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":*
7otice that the box to the left of our name is empt b default. <his is wh we
cannot automaticall open the 2hared folder. @hec$ this box to be added to the
6boxsf "roup. <his will brin" up the 3uthoriGe screen. 'nter our password. <hen
close the screen. In order for Hroup @han"e settin"s to ta$e effect# ou need to
restart the ;ate operatin" sstem. Ho to ;enu# Quit# >estart to acti6ate the
chan"e in Bser Hroup permissions. !nce our operatin" sstem is bac$ up
a"ain# 6erif that ou ha6e been added to this "roup b chec$in" it a"ain. Fou
ma ha6e to repeat chec$in" the add to "roup% box. 5ut it will e6entuall ta$e.
<hen "o bac$ to our Iome folder and open the File 2stem media folder- An6
u$er wit%in t%e vbox$f "rou& %a$ full a++e$$ to an6 $%are# fol#er$. !pen
Iome folder# then file sstem# then media folder-
@on"ratulationsD Fou now ha6e access to our 2hared folder. 7ow ou8d ha6e a
2hared folder wor$in" on our ;ate operatin" sstem and ou can share data
between our ;ate !2 and Windows operatin" sstems without the need to use
a flash dri6e. If ou want to hide the L5!X 3dditions Icon which is on our
des$top# "o to ;enu# @ontrol Panel# personal# &es$top settin"s. <hen unchec$
mounted 6olumes. <hen clic$ @lose. 7ow that we ha6e co6ered how to install
and use Linus ;int ;ate in a 6irtual machine# in the next chapter we will learn
how to install Linux ;int in a dual boot with its own partition space on our
computer. <his will allow ou to access our data e6en in the e6ent that Windows
crashes and refuses to start.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "::
6ha!ter -... :ack =! Your Data and Dual :oot

6ha!ter - :ack =! Data and Dual :oot includes the follo(ing four sectionsF
-.% *rotect #ourself from <indo1s :oob# Tra!s
-.( 6reate multi!le backu!s of #our s#stem
-., Dual :oot Linux Mint 1ith <indo1s J* or <indo1s ?
-.' Dual :oot Linux Mint 1ith <indo1s
.ooting is a computer slang term for starting up your computer. Dual booting
means creating t(o different (ays for starting up and accessing the data on your
computer. For e=ample, you could start up your computer using the 4indo(s
operating system or the @inu= operating system.
As (e e=plained at the beginning of the last chapter, the benefit of setting up a
separate partition for @inu= over a virtual partition is first programs (ill run much
faster Abecause they do not have to run through the bloated 4indo(s programB,
second you (ill not need a 1shared folder2 for transferring documents bet(een
4indo(s and @inu= Abecause @inu= Mint in its o(n partition allo(s you to access
the entire 4indo(s C DriveB and third should the 4indo(s partition eventually
crash, you (ill still have access to all of your data because @inu= (ill still be able
to run.
/n a sane (orld, steps for dual booting (ould fit on one page. ;o(ever, Microsoft
has spent billions of dollars doing everything they can to maintain their monopoly
and prevent you from adding @inu= to your computer. 3his includes placing
several booby traps in your (ay. 3he purpose of this chapter therefore is to sho(
you ho( to overcome these obstacles.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":)
-.% *rotect #ourself from <indo1s :oob# Tra!s
Mi+ro$oft #oe$ not want 6ou to u$e Linux. 0%e6 %ave +reate# numerou$
boob6 tra&$ w%i+% are im&ortant to *now about. 0%i$ $e+tion review$ %ow
to ba+* u& 6our #ata an# over+ome ob$ta+le$ Mi+ro$oft %a$ +reate# to
ma*e it %ar#er for 6ou to in$tall Linux.
&ual bootin" simpl means to install more than one operatin" sstem on our
computer. <he point of dual bootin" is to allow ou to test and experiment with a
new operatin" sstem# such as Linux# while still $eepin" our old operatin"
sstem# such as Windows. In a sane world# not so dri6en b the profit moti6e# we
could simpl add Linux in a simple dual boot next to our Windows operatin"
sstem with just the clic$ of a couple of buttons. In fact# in a sane world# Linux
would come pre4installed b all computer manufacturers and we would not e6en
need to dual boot it. 3fter all# it is free and would cost computer manufacturers
nothin" to install on all computers and "reatl impro6e safet. <he entire process
of installin" or acti6atin" Linux should ta$e more than a few seconds. Iowe6er# it
is important to reco"niGe that we are not li6in" in a sane world. <he reason Linux
does not come pre4installed is because ;icrosoft has blac$mailed computer
manufacturers with hidden exclusionar% contracts. ;icrosoft has billions of
dollars at sta$e and has done e6erthin" in their power to create obstacles to
pre6ent ou from dual bootin" Linux onto our computer. In this chapter# we will
explain some of these traps with the hopes that it will help ou better understand
wh ou should not s$ip an steps includin" bac$in" up all of our data.
!enefit$ of 8ual !ootin"
<he first Kuestion we should address is wh e6en dual boot in the first placeE
Wh not simpl lea6e Linux in Lirtual 5ox and continue usin" it inside of the
Windows operatin" sstemE <here are se6eral reasons to dual boot Linux. First#
when Windows e6entuall crashes# if Linux is inside of Windows ou will lose
both Linux and Windows and all of our data. If Linux is in a dual boot# ou can
still start and run our computer usin" Linux. 2econd# Linux will not be anwhere
near as fast inside of Lirtual 5ox as it will be in a dual boot. <hird# it is much
easier to set up file sharin"# B25 dri6e access# @& access and printin" access
with a dual boot. Fourth# if ou want to e6entuall "et rid of Windows# switchin" to
the Linux 5oot loader and creatin" a dual boot is a "ood first step.
/%en 6ou $%oul# not #ual boot
<here are a few circumstances when dual bootin" is not a "ood idea. <he most
common problem is if ou ha6e an older computer with a limited amount of >3;.
Fou ma wind up slowin" down our computer with a dual boot. 3lso# if ou ha6e
a limited amount of space on our hard dri6e# ou ma not want to dual boot.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")!
3 dual boot be"ins b di6idin" up the space on our hard dri6e. 3 solution to this
problem is to "et a /1 H5 B25 Flash &ri6e or a ) <5 B25 'xternal &ri6e and
offload data ou do not normall need such as old picture folders onto one of
these. &oin" this will free up space on our hard dri6e which can then be used
for a dual boot.
2i$tor6 of t%e /in#ow$ 86nami+ 4artition !oob6 0ra&
<han$s to ;icrosoft# we will ha6e to "i6e ou two different sets of instructions for
creatin" a dual boot a relati6el simple process if ou ha6e Windows XP or
Windows 7 installed on our computer# and a second much more complex
process for those who ha6e the misfortune of ha6in" Windows A installed on their
computer. Wh has dual bootin" been turned into such a complex processE
We will start with a bit of histor. !nce upon a time# bac$ in the )00*s# our
computer was di6ided into four simple partitions. <he reason for this was to allow
ou to add operatin" sstems if ou wanted. 9Fou can thin$ of a partition li$e
addin" walls in a house to create extra rooms. Fou can either ha6e one bi"
house with no rooms or partition our computer house into two to four rooms:.
5ecause Windows is a bit of a bull# it often too$ up the first two partitions one
for the Windows 2tart pro"ram# called 2stem# and one for the main Windows
pro"ram which was placed on the @ dri6e. <o see what these two partitions
loo$ed li$e on a Windows XP computer from +**,# "o to Control 4anel;
A#mini$trative 0ool$; Com&uter Mana"ement; Stora"e; 8i$* Mana"ement,
5ecause there are two partitions left# ou could install Linux on one of them.
Iowe6er# because ;icrosoft reall does not want ou to install Linux# fast
forward to +*)* and loo$ at Windows 7 partitions on a common laptop from IP-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")"
7otice the differenceE !n a Windows 7 IP laptop# all four partitions ha6e been
ta$en. We now ha6e a partition called IP4<!!L2 which controls the 5I!2
computer start settin"s and we ha6e another partition called >'@!L'>F
which is the bac$up folder for our Windows 7 pro"ram 9but not the data on our
@ &ri6e:. <oda# ;icrosoft will happil allow ou to create a fifth partition e6en
thou"h the limit is four partitions. What will happen if ou nai6el clic$ on 3&&
P3><I<I!7 is that ;icrosoft will chan"e all of our partitions from 5asic
partitions to &namic partitions.
<here are two problems with ;icrosoft automaticall chan"in" static partitions to
dnamic partitions. <he first problem is that 6ou +annot in$tall Linux onto a
86nami+ 4artition. <he second problem is that while it is eas to con6ert 5asic
Partitions to &namic Partitions# it is 6er difficult to con6ert &namic partitions
bac$ to 5asic Partitions. What ;icrosoft is doin" in creatin" such a de6ious trap
is addin" one more hidden obstacle to pre6ent ou from installin" Linux on our
computer. @lic$in" on the 3&& P3><I<I!7 button is one of se6eral ;icrosoft
5oob <raps. &namic% partitions are nothin" but a scam to pre6ent ou from
installin" Linux. <his brin"s us to our first rule-
<?L3 -1, 9ever tru$t Mi+ro$oft to #o an6t%in" a$$o+iate# wit% ba+*in" u&
6our #ata; &artitionin" 6our +om&uter or a##in" anot%er o&eratin" $6$temF
)f 6ou $till t%in* 6ou +an tru$t Mi+ro$oft for an6t%in"; &lea$e rerea# t%e
&refa+e an# fir$t t%ree +%a&ter$ of t%i$ boo*F
<han$full# ou are readin" this boo$. 2o hopefull# ou will not fall 6ictim to the
&namic Partition 5oob <rap. 5ut let8s di" a little deeper to expose what a farce
the four used partitions shown in the Windows 7 panel abo6e reall are and
how these four partitions ha6e been set up on purpose to pre6ent ou from
addin" Linux to a Windows 7 computer.
In addition to 5asic Partitions# historicall# if ou wanted more than four partitions#
ou could turn the fourth partition into an 3xten#e# Partition. 2o ou would then
ha6e three 5asic partitions and one 'xtended partition. !n this extended
partition# ou could ha6e as man lo"i+al% partitions as ou want.
2o ima"ine that ou are IP and ou want to ta$e up two additional partitions for
IP <!!L2 and >'@!L'>F. <he simple and polite option is to create an
'xtended Partition and put both of these files as lo"ical partitions in the 'xtended
Partition. <his would "i6e ;icrosoft the two partitions that the want# "i6e IP the
two partitions the want and still lea6e one option 5asic Partition plus an
unlimited number of lo"ical partitions in the 'xtended Partition created b IP.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")
<here is onl one reason for IP to ta$e up the last two 5asic partitions instead of
creatin" an extended partition and that is to fill up all of the partitions thus
tri""erin" the ;icrosoft &namic Partition 5oob <rap should ou tr to add Linux
to our operatin" sstem. In other words# what ;icrosoft and IP did was
conspire to pre6ent ou from addin" Linux to our computer.
/%6 woul# 24 %el& Mi+ro$oft $abota"e 6our +om&uterH
It is important to understand that for man ears# ;icrosoft has wor$ed with
computer manufacturers to create a Planned !bsolescence pro"ram which
forces ou to bu a new computer e6er couple of ears whether ou want to or
not. When e6erone is forced to bu a new computer e6er couple of ears# both
;icrosoft and IP ma$e billions of dollars. !nce ou understand that the onl
thin" that matters to either of these corporations is short term profit# ou will be in
a better position to protect ourself from the thin"s the do to ou to maximiGe
profits. If fol$s e6er started usin" Linux# it would "reatl reduce computer sales.
First# Linux is a smaller faster pro"ram than Windows. 2o it wor$s on older
computers and helps them run faster and last lon"er. 2econd# Linux is a much
safer operatin" sstem because it does not lea6e the bac$door open. Fou do not
ha6e to worr so much about super 6iruses destroin" our computer.
5ut ;icrosoft and IP will lose billions if ou use Linux to extend the life of our
current computer. <his is wh Linux does not come pre4installed on IP
computers. It would be li$e a car manufacturer "i6in" us the option of installin" a
F>'' en"ine which lasts for one million miles and uses almost no "asD 2o IP
has as much financial interest in pre6entin" ou from usin" Linux as ;icrosoft
does.
Iere is how IP added these two partitions. First# let8s loo$ at the >'@!L'>F
pro"ram. (ust a few ears a"o# when ou bou"ht an IP computer# the would
ship it with Windows XP on a &L& disc or a couple of @& discs. Fou then put the
disc into the @& plaer on our new computer to install it. If ou wiped out our
computer# ou could re4install Windows from the &isc. 'ach of these discs cost
less than one dollar to ma$e. 2o wh put did IP install this extra cop of Window
7 in a new partition on our computer where it is ta$in" up )7 H5 of spaceE
3lso exactl how will ou acti6ate this pro"ram if our computer has crashedE
Finall# e6en if ou did find a wa to acti6ate the >eco6er pro"ram from an
internal dri6e on our computer# there is no warnin" that acti6atin" this IP
>eco6er pro"ram will not onl wipe out all of the data on our @ dri6e but it will
also wipe out an pro"rams ou ha6e installed on our computer 37& it will wipe
out an additional operatin" sstem ou ha6e installed 9such as Linux: and it will
wipe out an data and documents ou ha6e installed on our Linux partition. <he
IP >eco6er pro"ram is a 6er dan"erous &estructi6e >eco6er% pro"ram
which destros e6erthin" in its path.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")#
It short# ou do not want a Windows >eco6er partition on an internal dri6e on
our computer. Fet if ou "o to the IP forums# ou will see lots of helpful% tips
written b IP experts on how to create a dual boot of Linux with Windows. <he
Kuestions from innocent no6ices usuall start with- I notice that all four partitions
ha6e been ta$en b ;icrosoft and IP. Which one should I delete in order to dual
boot LinuxE <he IP 'xperts then tell ou to do craG thin"s li$e deletin" our
2stem partition or our IP <!!L2 partition. 'ither of these thin"s will toast our
computer. 3nd then "uess what... ou "et to bu a new IP computer creatin"
e6en more profit for ;icrosoft and IP. 3nd with an luc$ at all# ou will "i6e up on
trin" to install Linux. <his leads us to >ule R+-
<?L3 -2, 9ever tru$t 24 to #o an6t%in" a$$o+iate# wit% ba+*in" u& 6our
#ata; &artitionin" 6our %ar# #rive or a##in" anot%er o&eratin" $6$temF
<he final thin" to be aware of is that to ha6e a &ual 5oot with Windows# Windows
must be "i6en the first two partitions. Windows will not boot well if anthin" is in
front of it. <han$full# Linux plas much nicer. <here is no problem bootin" Linux
from an extended partition. In fact# we recommend it.
Ma*e an# follow a 4lan to Safel6 !a+*u& all of 6our #ata
!ur plan is to first bac$up the our computer data usin" se6eral different
methods to bac$up se6eral different files and folders. <his includes the followin"
A steps-
2tep R)- Hather our bac$up tools.
2tep R+- !r"aniGe our files into folders.
2tep R,- @lean Bp and &efra"ment our disc.
2tep R1- @op our data on a B25 Flash &ri6e.
2tep RN- @reate a cop of our @ &ri6e and &ata on a B25 'xternal &ri6e.
2tep R/- @reate a cop of our >eco6er ;edia file onto a B25 Flash &ri6e.
2tep R7- @reate a B25 Flash &ri6e cop of our IP >eco6er Partition.
2tep RA- ;a$e a record of all of our Windows pro"ram $es.
!nce we ha6e bac$ed up all of our data# in the next section# we will delete the
>eco6er partition and shrin$ the @ dri6e partition in order to create space to add
Linux. We will use the free space to create an 'xtended Partition for &ual 5oot of
Windows XP or Windows 7 and Linux usin" a Linux installation tool. In the final
section in this chapter# we will discuss how to install a dual boot with Linux if ou
ha6e the misfortune of ownin" a Windows A computer. <his includes o6ercomin"
the latest obstacles ;icrosoft has placed in our wa# a ni"htmare called 2ecure
5oot which is not secure but ma$es it more difficult to add Linux to a computer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")C
Ste& -1, 1at%er 6our ba+*u& tool$
While Windows has a bac$up pro"ram# it does not wor$ that well. In case our
computer completel crashes and ou cannot e6en restart it# ou reall want to
store our important data in some other place besides on our computer. Fou
also want a sstem where ou can do at least monthl bac$ups and preferabl
e6en wee$l bac$ups. In the past# we would use @&s and &L&s to bac$ up our
data. 5ut these tend to "et scratched and man computers no lon"er e6en ha6e
@& dri6es. 2o instead# we will use a 6ariet of B25 external dri6es. We will need
to "et se6eral tools and follow se6eral steps to bac$ up our computer.
First# we will need a 32 1! ?S! =la$% 8rive to cop all important ima"es and
files to. <his flash dri6e can then be used to transfer files to a 2hared Partition
dri6e later which will then be a6ailable to both the Windows and Linux operatin"
sstems after we ha6e installed Linux as a dual boot. If ou do not alread ha6e
a ,+ H5 B25 Flash &ri6e# this will cost about S,*.
2econd# at step RN# we need a 1 0erab6te ?S! external %ar# #rive to create a
complete sstem bac$up. ; current sstem# shown on the @ &ri6e below# ta$es
up about ),* H5. 2o in "ettin" a ) <erabte B25 external hard dri6e# I can ma$e
/ bac$up copies before I need to start erasin" them to ma$e room for new ones.
<his is one per wee$ for six wee$s or one per month for six months. <he point of
this bac$up is to restore our computer to its current state 9as opposed to the
reco6er bac$up which deletes all of our current files and pro"rams and restore
the computer to the state it was in the da ou bou"ht it:. 3 )<5 B25 hard dri6e
will cost about S7*. If ou are on a limited bud"et# ou can s$ip this step as our
important data will be on the ,+ H5 Flash &ri6e and our Windows >eco6er file
will be on a separate B25 flash dri6e.
<hird# at step RN# we need to install a free pro"ram for ma$in" bac$up copies of
our complete sstem. 2ince Windows 7 Iome 'dition does not actuall allow us
to bac$ up the entire Windows operatin" sstem# and since the software that
comes with our external B25 Iard &ri6e often does not wor$# we will create this
sstem bac$up usin" a free tool called Ma+rium <efle+t.
Fourth# in 2tep /# we will need anot%er >1! or more =la$% 8rive to create
reco6er media% also usin" ;acrium >eflect. I ha6e used the 2an&is$ )/ H5 for
this. 5ut the reco6er media file is onl ).7 H5 so almost an dependable flash
dri6e will do. <his will cost about S)*.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")+
If ou open ; computer% ou will see that the C lo+al #i$+ is about ),* H5 and
the 8 <e+over6 folder is about )7 H5.
Fifth# we will need anot%er 32 1! =la$% 8rive to create a cop of the >eco6er
&isc folder which comes with IP. It is important to note that this >eco6er disc# if
it were e6er used# would wipe out all of our pro"rams and sstem chan"es we
ha6e made includin" partition chan"es and an documents and pro"rams
associated with Linux to return the computer bac$ to the initial condition it was in
the da we bou"ht it. 2o this >eco6er should be considered the option of last
resort.% <he benefit of creatin" this reco6er flash dri6e which can be done onl
once is that we can delete the partition with the >eco6er folder which will free
up a partition for us to add Linux to our computer. <his will cost about S,*.
2ixth# we will need to use a free tool for "ettin" the $es% to our important
Windows pro"rams. 3fter we ha6e completed all of these bac$up steps# we will
be read to delete the bac$up partition and be"in installin" Linux into the
resultin" empt space.
We will also need an A H5 to )/ H5 B25 flash dri6e to put our open source
operatin" sstem pro"ram9s: on. <his will also cost about S)*.
Ste& -2, :r"anize an# +on$oli#ate 6our file$ into fol#er$.
<o bac$ up our ima"es# documents# files# folders and other data# first# "o to the
office suppl store and pic$ up a reliable ,+ H5 Flash &ri6e. <his is "enerall
enou"h to hold all our ima"es# 6ideos and documents. If ou are li$e most
Windows users# our files will be stored in three or four different places. First# ou
will ha6e them stored in M6 8o+ument$. 5ut ou ma also ha6e ima"es stored
in a folder called M6 4i+ture$ and more documents on our @ &ri6e. @reate
folders and consolidate all files and folders inside of just a few folders.
Ste& -3, Clean ?& an# 8efra"ment 6our #i$+.
;icrosoft Windows does not do a 6er "ood job of or"aniGin" our files on the @
dri6e. <his can ma$e it difficult later on to shrin$ our @ dri6e. 2o before ou
ma$e a cop of our files to a B25 Flash &ri6e# ou should ta$e a couple of
minutes to clean up and defra" our disc. <o do this with Windows XP or
Windows 7# "o to the 2tart ;enu and clic$ on +ontrol &anel. <hen clic$ on
4erforman+e )nformation an# 0ool$. <hen clic$ on :&en 8i$+ Cleanu&-

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")D
@lic$ :7 to delete these unneeded files. When done# "o bac$ to 4erforman+e
)nformation; 0ool$; A#van+e# 0ool$. <hen clic$ on :&en 8i$* 8efra"menter.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")*
2elect the C 8rive and clic$ on 8efra"ment 8i$*. It will ta$e se6eral minutes to
analGe the disc and e6en more time to defra"ment it.
Ste& ->, Co&6 6our im&ortant #ata to a ?S! =la$% 8rive
<hen insert the ,+ H5 flash dri6e in a B25 port. <hen ri"ht clic$ on these folders
to cop them to the Flash &ri6e which is shown below as >emo6able &is$ F-
<ransfer each folder to the Flash &ri6e. Fou should also chec$ the C 8rive to see
if ou want to cop an of those folders. <his includes an pro"rams ou ma
want to cop. 7ext chec$ the 4i+ture$ folder and the @i#eo$ folder and the
8ownloa#$ folder and the 4ro"ram$ folder. When ou ha6e all of our folders
copied# then safel remo6e the flash dri6e and label it with the date of the cop. It
is useful to ha6e two flash dri6es so that ou can cop a second one later and
then delete the current one alternatin" between two Flash dri6es.
Ste& -., Create a +o&6 of 6our C 8rive an# 8ata on a ?S! 3xternal 8rive.
<here are lots of reliable# compact and economical B25 external hard dri6es. It is
useful to "et one with a B25 ,.* connection which is ten times faster than B25
+.*. 5ut anthin" will do. I used a B25 ,.* ) <5 'xternal Iard &ri6e. 7ext# if ou
want to use B25 ,.*# ou need to fi"ure out which B25 ports on our computer
are B25 , 6ersus B25 +. If ou loo$ 6er close# the B25 , ports will ha6e the
followin" smbol-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "):
; laptop has two B25 , ports on the left side and two B25 + ports on the ri"ht
side. 7ext download the free ;acrium >eflect pro"ram-
http-..www.macrium.com.reflectfree.aspx
3fter installin" this pro"ram# the >eflect icon will be placed on our des$top.
@lic$ on the Icon to open the pro"ram-
@lic$ on the option PCreate an )ma"e of t%e &artitionI$B reJuire# to ba+*u&
an# re$tore /in#ow$K located in the top left hand pane of the application
window to start the bac$up wiGard. It is hi"hli"hted in red in the pre6ious ima"e.
<he wiGard should start as shown below. Fou will note that all partitions are
displaed in the wiGard# but onl the sstem partition and the @ partition ha6e
been selected because these are what are needed to restore the current sstem.

7ext we select a location for the bac$up. 3ssumin" our B25 external dri6e is
plu""ed into a B25 port# select it. In m case# the destination was the F dri6e-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "))
@lic$ 7ext. It will then ta$e a disc ima"e. @lic$ Finish.

@lic$ !C to run the bac$up. 3ssumin" the 2stem and @ dri6es are selected#
clic$ 7ext-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !!
<o bac$ up )N* H5 in data will ta$e about 1N minutes. When the bac$up has
completed clic$ A:7A to shut down the messa"e box and then clic$ AClo$eA to
close the bac$up window. Four sstem is now bac$ed up. 5elow is what the
bac$up file will loo$ li$e in the ;acrium screen-
<he file is sa6ed as an X;L file. @lose the ;acrium pro"ram. <o 6iew the bac$up
file in Windows# clic$ on the Start ;enu# then Com&uter# then clic$ on the ?S!
2ar# 8rive. <o eject the B25 hard dri6e# clic$ on the eject icon. When is sas
2afe to >emo6e B25# then remo6e the B25.
Ste& -6, Create a +o&6 of 6our <e+over6 Me#ia file onto a ?S! =la$% 8rive.
In addition to creatin" a complete sstem bac$up on our hard dri6e# ;acrium
>eflect Free 6ersion also helps ou create rescue media% for our Windows 7
bac$up plan. We will put this rescue media on a separate B25 Flash &ri6e.
First# insert the Flash &ri6e into the B25 port. 3lso ma$e sure ou ha6e opened
our web browser and that it is connected to a hi"h speed internet connection
and that ou ha6e at least one hour to complete this tas$. <hen open ;acrium
>eflect and clic$ on the :t%er 0a$*$% tab-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !"
@lic$ on Create bootable re$+ue me#ia. 0%en +lic$ Fes-
Lea6e it as /in#ow$ 43 and clic$ 7ext.
Put in a + H5 or more Flash &ri6e to put the >escue ;edia on. We also need
internet access to download the followin" file from ;icrosoft.
3ssumin" we are attached to the internet# and that we ha6e a B25 Flash dri6e
plu""ed in to our computer# clic$ 7ext. <he file is )./7 H5.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !
3fter the file has downloaded the followin" screen will appear-
Windows will want to install this folder inside of pro"ram files. Instead clic$
!row$e and select our Flash dri6e and install the folder there. <hen clic$ 7ext.
3fter it is complete. @lic$ @lose. <hen "o bac$ to the >escue ;edia WiGard
screen-
;acrium >eflect needs to initialiGe this pen dri6e. 3ll existin" data will be lost if
ou continue but this warnin" onl applies to an data on our B25 dri6e
9which should be blan$:. 2o for Proceed with operationE clic$ Fes. We now ha6e
a reco6er media on our Flash &ri6e.
In the next section# we will ma$e a cop of the IP >eco6er partition and also
ma$e a record of our Windows pro"ram $es.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !#
-.( 6reate multi!le backu!s of #our s#stem
!ne of the primar obstacles created b ;icrosoft is ta$in" up all of the partitions on
our hard dri6e. If ou simpl add a partition for Linux# ;icrosoft will con6ert all of our
partitions into a form which can not be used to install Linux. In this section# we will show
ou how to safel ma$e room for Linux on our hard dri6e.
In this section# we will remo6e a Partition. First# let=s re6iew our existin" partitions.
3s we noted in the last section# pre4Windows A computers tpicall come with a
maximum of four primar partitions on a sin"le hard dri6e. 3 dual boot uses one
of these partitions to place Linux on after installin" Windows 7 on the first
partition. 2adl# if ou ha6e an IP computer with Windows 7 installed on it# ou
will li$el ha6e an obstacle in that all four partitions ha6e been used b Windows
7 and the IP bac$up and restore processes. <o 6erif how man partitions are
ta$en on our Windows 7 computer# "o to Control 4anel; A#mini$trative 0ool$;
Com&uter Mana"ement; Stora"e; 8i$* Mana"ement,

<here are alread four primar partitions on this IP computer. <hese are @ dri6e#
IP <!!L2# >'@!L'>F and 2F2<';. <a$in" up all four a6ailable primar
partitions is not 6er polite of IP and ;icrosoft. It is almost as if the do not want
ou to install Linux because ou mi"ht find out ou li$e Linux better.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !C
LetK$ loo* at t%e o&tion$ for w%i+% &artition to eliminate,
:&tion -1, C #rive- <his not onl has our documents# it mi"ht also ha6e the
Windows 5oot files. &o not delete this partitionD
:&tion -2, 24L0::LS- <his has some hot $es support includin" hardware
dia"nostics and also the Kuic$ web button. >emo6in" this ma 6oid our
warrant and ma$e it difficult to sol6e hardware problems. <he IPT<!!L2
partition contains the 5I!2 emer"enc start up pro"ram. &o 7!< delete this
unless ou are @'><3I7 ou ha6e a bac$up bios on a flash dri6e that ou $now
will run. <here is a special procedure to bootin" from bios 6ia a flash dri6e.
:&tion -3, <3C:@3<M- Fou could place the reco6er pro"ram 9)7H5: on a ,+
H5 flash dri6e or onto N &L&s. <he N &L&s would be a lo"istical ni"htmare and
the ,+ H5 Flash dri6e will cost about S,*. 5ut this >eco6er pro"ram is not that
useful because if it is e6er used it will destro all chan"es to our computer and
restore the computer to the ori"inal state it was in when ou first bou"h it. We will
show ou how to create a replacement ori"inal state reco6er B25 below so that
we can delete this partition.
:&tion ->, SMS03M- 3ccordin" to a ;icrosoft forum post# Windows 7 will not
boot if the 2stem partition is deleted. <his partition must be the first acti6e
partition and therefore should not be altered or mo6ed.
!ur plan is to first create a B25 >eco6er disc. <hen we will delete the IP
>eco6er partition so we can ha6e room to place Linux on the 'xtended partition.
Creatin" a S%are# 4artition
<here is another problem in that all of our data and files are inside of the @ dri6e
which ri"ht now is onl accessible from Windows 7. What we want is a S%are#
4artition which is accessible to both Windows 7 and Linux ;int. <hus at a
minimum# we need two new partitions- first# a Linux Partition and then a shared
partition. We will later re6iew how to create a shared partition. 5ut if ou ha6e a
new computer# ou should simpl completel uninstall Windows 7 and then re4
install it so that it ta$es up fewer partitions. For now# we will show ou how to add
Linux without uninstallin" our Windows 7 partitions.
Create an 24 <e+over6 ?S! =la$% 8rive
<here are man benefits of the B25 Flash &ri6e reco6er option o6er reco6er
&L& dis$s option- <he &L& dis$ option reKuires N dis$s which could be
scratched and corrupted. 3lso there are man $inds of &L& discs and man of
these will not wor$. 3lso the discs need to be pre4numbered and then entered in
the correct order. <his means that the B25 option is easier to create and more
reliable o6er time. (ust be sure to label this B25 when ou are done with it and
do not tr to use the B25 for anthin" else.
4rint out t%e$e in$tru+tion$ a$ 6ou will %ave to +lo$e all ot%er &ro"ram$
w%ile +reatin" t%i$ <e+over6 8i$*.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !+
Bse a blan$ B25 flash dri6e with at least ,+ H5 of memor. Bse a name brand
from a manufacturer ou trust. 3lso temporaril disable Windows Bser 3ccount
@ontrol if Bser 3ccount @ontrol is enabled. &oin" so decreases the chances of
encounterin" problems durin" the process.
2ow to #i$able ?$er A++ount Control,
Bser 3ccount @ontrol informs ou when a software pro"ram is trin" to ma$e
chan"es to our computer that reKuire administrator4le6el permission. Bser
3ccount @ontrol displas differentl for 2tandard user accounts and 3dministrator
accounts.
?$er A++ount Control wit% Stan#ar# u$er a++ount$
'nter the 3dministrator password# and clic$ Me$ to continue. If ou do not $now
the 3dministrator password# ou cannot continue.
?$er A++ount Control wit% A#mini$trator a++ount$
If ou are lo""ed into an 3dministrator account# Bser 3ccount @ontrol as$s
permission for a pro"ram to ma$e chan"es to the computer.
?$er A++ount Control for A#mini$trator
8i$ablin" ?$er A++ount Control
@lic$ Start# Control 4anel # and then clic$ ?$er A++ount$. <hen clic$ C%an"e
?$er A++ount Control $ettin"$ .
<o turn off Bser 3ccount @ontrol# mo6e the slider to the bottom 99ever notif6:.
<hen clic$ :7. <hen restart our computer for this chan"e to ta$e effect.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !D
Save t%e 24 re+over6 file to a ?S! fla$% #rive
IP reco6er software allows ou to ma$e only one reco&ery backup . <hese
bac$up files contain the ori"inal operatin" sstem# dri6ers# and application
software that shipped with the computer. ;a$in" a cop of this file ta$es about ,*
minutes. &isconnect from the Internet and close all other software. <hen insert
the flash dri6e. If a window opens as$in" ou if ou want to use the flash dri6e for
files or bac$up# just close the window. <his is not "oin" to be a bac$up. It will be
a reco6er tool. From the Windows &es$top# clic$ Start# and enter reco6er
mana"er into the 2earch field. 3lternatel# select Start N All 4ro"ram$ N 24 N
24 <e+over6 Mana"er N 24 <e+over6 Me#ia Creation

If a Bser 3ccount @ontrol messa"e opens# clic$ Me$ or enter our lo"in
password# whiche6er is reKuired. 3 >eco6er ;ana"er window opens. @lic$
<e+over6 Me#ia Creation 7!<'- If >eco6er ;edia @reation is not a6ailable
9"raed out:# then a reco6er ima"e has alread been created. &ue to license
restrictions# onl one set of reco6er media can be created. 3n new reco6er
media must be ordered online or obtained usin" another method.
<e+over6 Mana"er, <e+over6 Me#ia $ele+tion
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !*
2elect >e+over6 Me#ia Creation wit% a ?S! fla$% #rive # and clic$ 9ext.
@lic$ Create re+over6 me#ia wit% a ?S! fla$% #rive # and then clic$ 9ext .3
6erification window opens# showin" the hard dri6e locations for remo6able discs.
2elect the location for our B25 flash dri6e# and then clic$ 9ext.
3 >eco6er ;ana"er messa"e opens statin" that the flash dri6e will be
formatted. @lic$ :7 to format the B25 flash dri6e and continue. 7!<'-
Formattin" this flash dri6e deletes an files on the dri6e.
Wait while the software creates our reco6er media. >eco6er ima"e creation
happens in two sta"es. First# the software copies the files to the B25 flash dri6e.
2econd# the software 6erifies the files that files were copied successfull. 3
screen displas for each process. @lic$ =ini$% when >eco6er ;ana"er has
created the reco6er media.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !:
7ext# we need to ma$e sure we safel remo6e the B25. If a warnin" comes up
that the B25 cannot safel be remo6ed because it is still runnin"# then turn off
the computer before remo6in" the B25. 2tore the B25 flash dri6e in a safe#
protected place. If ou attempt to sa6e another reco6er ima"e to a B25 flash
dri6e after successfull sa6in" one reco6er ima"e# a screen displas statin" that
onl one reco6er set is allowed. <he onl choice is to clic$ :7 and exit the
pro"ram. <o 6erif that our reco6er ima"e has been made# clic$ on the
>eco6er ;ana"er and attempt to create another reco6er. Fou should see a
screen notin" that our reco6er file was successfull made.
<emove t%e re+over6 &artition
While ou can remo6e the IP >eco6er partition throu"h the Windows Partition
;ana"er# we will instead use the IP >eco6er ;ana"er to remo6e this bac$up
file because the IP tool is safer than the Windows tool. <his IP tool is the same
tool we used to create the B25 Flash &ri6e of the >eco6er file.
<o remo6e the reco6er partition# clic$ Start# tpe >eco6er in the search field#
and clic$ on <e+over6 Mana"er when it appears in the pro"ram list to open the
>eco6er ;ana"er window. @lic$ A#van+e# o&tion$.
2elect the <emove re+over6 &artition option and clic$ 9ext.
When prompted to 6erif that ou want to delete the partition# select the Me$
option# and clic$ 9ext. 3llow the remo6al process to continue and restart the P@.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !)
7ow chec$ to see if the partition was remo6ed. Ho to @ontrol Panel# 3dmin <ools#
@omputer ;ana"ement# 2tora"e# &is$ mana"ement-
We now ha6e onl three partitionsD ;ission accomplishedD
Ma*e an# =ile 4ro#u+t 7e6$ for /in#ow$ 5 an# :ffi+e 2010
<he easiest wa to "et the product $es for Windows and !ffice is to use the free
!elar+ A#vi$or. 2tore these $es on a jump dri6e 4 not on our @ &ri6e. <his
wa if the computer crashes completel# we can reinstall e6erthin" usin" the
product $es. Ia6in" the product $es helps if the ori"inal installs were done
online and we do not ha6e @&s to reinstall pro"rams from. <o download 5elarc
3d6isor# "o to- http-..www.belarc.com.freeTdownload.html
<hen "o to &ownloads folder and find this file. >i"ht clic$ and select <un a$
a#mini$trator. It will create a local screen with all of our software and hardware
information includin" all product $es. 3ll of our P@ profile information is $ept
pri6ate on our P@ and is not sent to an Web ser6er.
7ow that we ha6e bac$ed up all of our files and remo6ed the IP >eco6er
partition# we are almost read to dual boot Linux onto our computer. <here are
onl a couple of thin"s we still need to do. <he first is to create a bootable flash
dri6e with Linux ;int ;ate on it. <he second is to shrin$ our @ dri6e to create
more room for Linux ;int. We will co6er both of these tas$s in the next section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "!
-., Dual :oot Linux Mint 1ith <indo1s J* or <indo1s ?
This section re3ie1s ho1 to add Linux Mint to a com!uter that alread# has
<indo1s J* or <indo1s ? on it so that #ou can use either s#stem. This
1ill allo1 #ou to kee! the <indo1s o!eratin5 s#stem on #our com!uter
1hile #ou are learnin5 ho1 to use Linux Mint.
We will now show ou how to create a &ual 5oot sstem on our home computer
so that ou can ha6e more than one operatin" sstem. &ual bootin" means
installin" two operatin" sstems on one hard dis$ and bein" able to boot into
either of them. <his article explains how to install Linux ;int )N alon"side
Windows 7# but it will also wor$ for an other 6ersion of ;int. If ou ha6e a
Windows Lista or XP computer# the instructions are about the same. Windows
XP# Windows Lista and Windows 7 all use a boot process called !):S and a
partition table based on the Ma$ter !oot <e+or# 9;5>:. Iowe6er# if ou ha6e a
Windows A computer# ou should read this chapter and also the next chapter for
how to deal with the problems presented b Windows A. <his is because
Windows A uses a completel different boot process# called ?3=) with secure
boot# and a completel different partition table arran"ement# called 1ra&%i+
4artition 0able or HP<.
<here are man pitfalls to the dual boot process with Windows and man tutorials
on the process fail to adeKuatel warn users about potential problems. 2o we will
pro6ide a more complete set of instructions in this and the next chapter.
<he main purpose of this dual boot is to allow ou to $eep our current Windows
sstem to run our current Windows pro"rams# and then use Linux ;int to run
free open source pro"rams and to access files for the rest of our wor$ and pla.
5ut a dual boot is also extremel useful if 9when: our Windows operatin" sstem
crashes. Ia6in" a second safer and more reliable operatin" sstem will allow
ou to protect our important files and continue "ettin" our wor$ done e6en if
our Windows operatin" sstem crashes. 5elow is what a dual boot startup
option loo$s li$e with the Windows 5oot ;ana"er. We will show ou two was to
do a dual boot 4 one wa $eeps the Windows 5oot ;ana"er and adds Linux to it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ""
<he other wa replaces the Windows 5oot ;ana"er with a better boot mana"er
called the H>B5 + 5oot ;ana"er which automaticall adds Windows to it.
8ownloa# t%e Linux Mint 1. x6> bit )S: file from
http-..www.linuxmint.com.download.php
5ecause I am installin" Linux ;int on a /1 bit computer with at least 1 H5 of
>3;# I ha6e selected the /1 bit 6ersion. 5ut if ou ha6e a computer with less
than 1 H5 of >3; which is a ,+ bit computer# then select the ,+ bit 6ersion of
Linux ;int ;ate. !n the next screen# scroll down the list to our countr and pic$
one of the download centers. <his will brin" up the &ownload 7otification screen.
@lic$ 2a6e. It is a 6er lar"e ) H5 file and ma ta$e up to an hour to download.
5e patient and do not tr to access the file until it is full downloaded.
<he next step is to download B7etbootin to create a Li6e B25.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
?$e ?9etbootin to +reate a Live ?S! =la$% 8rive
B7etbootin allows ou to create bootable Li6e B25 dri6es for Linux distributions.
Fou will need a B25 Flash &ri6e which is at least + H5. It should be empt and in
a format of F3<,+. <o 6erif that our B25 is F3<,+# in our Windows computer#
"o to 2tart# ; @omputer and ri"ht clic$ on the B25 &ri6e. <hen clic$ on
4ro&ertie$,
If it is not F3<,+# clic$ on 4ro&ertie$; =ormat to reformat it. !nce formatted#
note the ;ount Point 9&ri6e Letter: of the dri6e 9in m case it is &-:. Fou will need
to $now this later. >emo6e an other B25 dri6e 9includin" external hard dri6es:
connected to our P@ except for the one ou want to use for the installation.
8ownloa# ?9etbootin to 6our +om&uter
Ho to the followin" lin$ to download it. http-..unetbootin.sourcefor"e.net.
<here are three different 6ersions of B7etbootin# one for Windows# one for Linux
and one for ;ac !2 X. <he resultin" B25 dri6es are bootable onl on P@s 9not
on ;acs:. Pic$ the 6ersion for our current operatin" sstem and download it-
B7etbootin 9&ownload Windows Lersion or &ownload Linux Lersion &ownload
;ac !2 X Lersion:
3dditional dependencies 9Linux Only:- Fou will need the pac$a"es syslinux and
p7zip-full installed. @lic$ on the Windows &ownload option.
<hen sa6e this file to our &ownloads folder. Fou won=t ha6e to install it# it will run
directl from the downloaded file. <hen "o to our &ownloads folder and find the
file B7etbootin 2etup.exe. >i"ht clic$ on the file and select <un a$
A#mini$trator,
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "#
2elect the 8i$* )ma"e option. <hen browse for and select the Linux ;int )N I2!
which should also be in our &ownloads folder. ;ar$ sure the <ar"et <pe is set
for our B25 &ri6e and that the &ri6e is set for the ;ount point 9&:. <hen turn off
all other pro"rams. <hen clic$ !C. <he bootable li6e% B25 creation process will
ta$e a few minutes. 5e patient. When it is done# it will show a screen confirmin"
ou ha6e a Li6e B25. Cli+* 3xit rat%er t%an reboot as we need to first chan"e
the 5I!2 boot order. ;a$e sure to label our Li6e B25 and do not use this B25
flash dri6e for anthin" else. <he next step is shrin$in" the 6olume on the
Windows @ partition and then resettin" our 5I!2 boot order 9see below:.
S&e+ial in$tru+tion$ for +reatin" a Live ?S! if u$in" t%e Linux ver$ion
If usin" the Linux 6ersion of B7etbootin# ma$e the file executable b "oin" to
Properties4UPermissions and chec$in" ?'xecute.? <hen start the application. Fou
will be prompted for our password to "rant the application administrati6e ri"hts#
then the main dialo" will appear# where ou select a distribution and install tar"et
9B25 &ri6e:# then reboot when prompted.
S%rin* t%e @olume on t%e /in#ow$ C 4artition
!ur next tas$ is to resiGe the Windows @ partition. <his will "i6e us the space we
need to add partitions for Linux ;int. We must be careful with shrin$in" the @
dri6e to not reformat it as this would cause us to lose all of the data on the @
dri6e. 3lso be sure to lea6e much more room in the @ dri6e than ou thin$ ou
need. <his is because Windows is not 6er "ood about where it puts data and will
reall slow down if more than 7*O of the disc space is ta$en. 2o for example# if
ou alread ha6e )N* H5 on the @&# ou should "i6e the @ &ri6e +** H5 to
minimiGe slowin" down.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "C
3lternatel# ou could defra"ment ou @ dri6e e6er couple of wee$s. 95ecause
Linux is much better at or"aniGin" data# it will not slow down just because the
disc is "ettin" full:.
<o use the automatic install method# it is important to resiGe the @ dri6e before
we install Linux. We will therefore use the Windows Partition ;ana"er to resiGe
the @ &ri6e. In Windows XP or Windows 7# "o to 2tart 5utton and clic$ on the
Control 4anel. <hen clic$ on A#mini$trative 0ool$; then Com&uter
Mana"ement# then Stora"e; then 8i$+ Mana"ement.
3fter deletin" the >eco6er Partition in the last chapter# we ha6e )7 H5 of
Bnallocated space and a lot of H5 in the @ dri6e. What we want to do is to mo6e
about half of the space from the @ dri6e to the Bnallocated space so we can use
this to install Linux. @lic$ on the C #rive box abo6e to select it. <hen ri"ht clic$ to
brin" up the 4artition 3#it screen-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "+
@lic$ on S%rin* @olume. It will ta$e Windows a couple of minutes to fi"ure out
how much space is a6ailable on the @ dri6e to shrin$. It will then displa the
followin" screen-
&o not trust the siGe a6ailable to shrin$ space% as it is not accurate. If we
actuall too$ all of the space# Windows would Kuic$l slow down to a crawl.
Instead onl ta$e about half of the space that is indicated as a6ailable. 3fter
puttin" in that number# clic$ S%rin*. It will ta$e a few minutes for the @ dri6e to be
resiGed. When it is done shrin$in"# the space will be mo6ed to the Bnallocated
space. 7ow we can close Windows.
C%an"e t%e !oot :r#er in 6our +om&uter !):S $ettin"$
!ur next step is to set the boot order in 5I!2 to use the B25 Li6e Flash &ri6e
instead of the Windows 5oot ;ana"er. <his reKuires turnin" off and restartin"
our computer. !3=:<3 <3S0A<0)91 M:?< C:M4?03< 0: C2A913 023
!::0 :<83<; 4<)90 :?0 A C:4M := 023 <3S0 := 02)S S3C0):9 a$
6ou will not %ave a++e$$ to t%i$ $+reen w%ile 6ou are in$tallin" Linux MintF
7ow that we ha6e created a Li6e B25 with B7etbootin# lea6e the Li6e B25 in the
B25 port or if ou too$ it out# reinsert it. <he next step is to chan"e the 5I!2
5oot !rder so that the Li6e B25 is the first item selected. >estart our computer
and press the appropriate button 9usuall F)# F+# F)+# or '2@: while our
computer is startin" to "et to our 5I!2 menu.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "D
<hen use the ri"ht arrow on our $e board to select S6$tem Confi"uration.
<hen use the &own arrow to select !oot :&tion$. <hen press 'nter on our
$eboard to start the 5oot !ptions screen.
It ma appear as if the onl options are @& >!; or Flopp &isc. Iowe6er# select
!oot :r#er to brin" up another screen. <hen select ?S! 8i$*ette on 7e6O ?S!
2ar# 8i$+. @lic$ =6 to raise it to the top of the list. <hen clic$ =10 to sa6e and
close the settin"s. <his will chan"e the startup order to boot B25 b default. !n
>estart# the B25 screen appears and starts the Linux ;int installer.
)n$tall Linux Mint in a 8ual !oot on 6our +om&uter
We will use the Linux ;int installer to create install Linux ;int. While there are
other was to create partitions# doin" it directl with the Linux ;int installer is the
most reliable method. 3fter bootin" from the Li6e B25# ou will "o throu"h an
installation process which is 6er similar to the installation process of Linux ;int
on Lirtual 5ox. <his is another reason to install Lirtual 5ox to "i6e ou a chance
to practice installin" Linux in a safe en6ironment. <he first screen ou will li$el
see after our computer restarts will be the followin".
<his will start the Linux ;int )N operatin" sstem installation process and brin"
up the followin" screen-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "*
@lic$ on the circular disc which sas )n$tall Linux Mint. It is in the left side of
our screen. <his will brin" up the )n$tall /el+ome screen. @hoose the
lan"ua"e and clic$ on Continue. <he next screen recommends that ou connect
to the internet. Fou do not reall need to be connected to the internet as ou can
add updates later. 2o clic$ Continue.
)n$tallation 06&e S+reen an# :&tion$
!ne major difference between a Lirtual 5ox installation and a real dual boot
installation is that when ou "et to the place in the installation where ou are
"i6en se6eral options# #o 9:0 $ele+t u$in" t%e entire #i$+. <his would wipe
out our @ &ri6e and all of our dataD 5e aware that the Installation <pe screen
options will be different dependin" on the operatin" sstem ou currentl ha6e on
our computer. 5elow is the Installation <pe screen which appeared when we
installed Linux ;int into Lirtual 5ox. 7ote that there are onl four options-
Iowe6er# when we install Linux ;int as a dual boot with Windows 7# we suddenl
ha6e a fifth option called )n$tall Linux Mint alon"$i#e /in#ow$ 5'.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ":
<he reason this is the default option is that if ou lea6e it set for this option# Linux
;int will automaticall create our new partitions for ou and install Linux ;int in
whate6er free space ou ha6e on our hard dri6e. Let=s ta$e a closer loo$ at
these options before we select one.
)n$tallation :&tion 1, 0%e Automati+ )n$tall :&tion
<he automatic install method has both ad6anta"es and drawbac$s. <he benefit
of the automatic install option is that ou do not ha6e to learn about partitions or
"o throu"h the hassles of creatin" our own partitions. If ou are not 6er "ood
with computers# this is definitel the option ou should ta$e. (ust clic$ on Install
and then run throu"h the same confi"uration screens we used to install Linux
;int into Lirtual 5ox. 3fter automaticall creatin" partitions for and installin"
Linux ;int )N# the new partitions as seen from inside Windows 7 will loo$ a lot
different. <his ima"e shows the partitions from the computer used for this tutorial
after the dual4boot operatin" has completed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ")
<here are howe6er a few drawbac$s of the automatic install method. First# it will
onl create two partitions one for Linux ;int and another for a swap% partition.
<he Linux 5oot ;ana"er# called H>B5 + will be installed into the Linux ;int
partition and so will all of our data. 97ote that Windows also installs all of our
data on its partition which is called the @ dri6e:. <his means that whene6er ou
want to chan"e our operatin" sstem# ou will need to ma$e a cop of all of
our data on a B25 Flash &ri6e# then replace the old operatin" sstem with the
new one# then reinstall our data into the new operatin" sstem. Fou would not
ha6e to do this if our data was on a different partition than our operatin"
sstem. <he second drawbac$ of the automatic install method is that Linux will
automaticall replace the Windows 5oot ;ana"er with the Linux 5oot ;ana"er
9called H>B5 +:. <his is not that bi" of a loss as the Windows 5oot ;ana"er is a
piece of jun$. 5ut it would be nice if Linux would at least warn ou of what it is
doin" before ou clic$ on the Install 7ow button. <he third drawbac$ of the
automatic install method is that ou need to shrin$ the @ dri6e before ou install
Linux ;int and ou ha6e no control o6er the siGe of an of the partitions.
3 fourth drawbac$ is that ou do not "et a chance to learn how partitions wor$ on
our computer. 2ince $nowled"e is power# if ou reall want control o6er our
computer# it is worth learnin" about partitions. <his will also help ou better
understand some of the major pitfalls of Windows A and the B'FI partition
mana"er which we will be co6erin" in more detail in the next chapter. 2o e6en
if ou decide to use the automatic install method# ou mi"ht want to ta$e a few
minutes to read throu"h the rest of this chapter. We will next show a second
more customiGable wa to install Linux a wa in which ou ta$e control o6er
how our computer "ets di6ided up.
)n$tallation :&tion 2, 0%e 8o Somet%in" 3l$e' Met%o#
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age !
Iopefull# ou $now that ou should not clic$ on the 'rase &isc and install Linux
;int% option as this will erase all of the data on our @ dri6e. 5ut ou can select
?8o $omet%in" el$e.? <his will allow ou to safel create custom partitions in
our partition table. <hen clic$ )n$tall 9ow. <his will brin" up the Linux
4artitionin" 0ool. <his shows our current partition table and allows ou to
create our own partitions. Iere ou can not onl create partitions but also resiGe
existin" partitions and delete partitions ou no lon"er want. Fou screen ma loo$
sli"htl different from the followin" screen-
If ou ha6e followed our ad6ice and deleted the IP >eco6er Partition# our
install screen will loo$ sli"htl different than the screen abo6e.
3bo6e are two partitions. <he first one# sda) is the Windows 2stem partition
with a siGe of about )** ;5. <he second one# sda+# is the Windows @ &ri6e. <he
@ dri6e abo6e has ,+* H5. Fou should also ha6e some free space where the IP
>eco6er partition used to be and where we shran$ the @ &ri6e. Fou should also
ha6e a partition called sda, which holds the IP <!!L2 partition. <he sda,
partition ma be hidden below the free space.
5 default# the Linux ;int installer wants to create one root partition and one
swap partition for ou durin" the automatic% installation. 5ut it is much better to
ha6e four partitions for Linux ;int rather than two partitions. We will create a root
&artition; a $e&arate %ome &artition; a $wa& &artition an# a boot &artition.
<he purpose of the boot partition is to help load the sstem independentl of the
operatin" sstem just as the Windows 2stem partition boots Windows. <he
root partition will hold Linux just as the @ &ri6e holds the Windows operatin"
sstem. Iowe6er# instead of placin" our data# ima"es and documents on the @
&ri6e as Windows does# we will create a separate 2ome partition for our
documents called .home. <his wa# we can chan"e operatin" sstems without
mo6in" our documents. <o $eep thin"s or"aniGed# refer to the followin" table-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age "
4artition
9ame
4artition
Mount 4oint
4artition Size 4artition Lo+ation 4artition
06&e
5oot .boot N** ;5 .de6.sdaN see notes 'xt1
>oot . )N 4,* H5 .de6.sda/ 'xt1
Iome .home ;ost of H5 .de6.sda7 'xt1
2wap )4 1 H5 .de6.sdaA swap
<he file tpe for all partitions is lo"ical. <he boot partition should be created first
and be in the be"innin" position. <he mount point for swap should be left blan$.
Linux 4artition =ile Lo+ation 9ame$
Linux uses different terms for hard dri6e and partition files than Windows.
Windows does not reall ha6e partitions but instead calls e6erthin" dri6es% such
as @ or & dri6e. Linux calls the first hard dri6e .de6.sda and it partitions .de6.sda)
.de6.sda+# etc. 8ev% is short for &e6ice% and $#% is short for 2tora"e &ri6er. If
ou ha6e a computer with a second hard dri6e# the second hard dri6e would be
called .de6.sdb and the partitions would be called .de6 .sdb) .de6.sdb+# etc. <he
extended partition is alwas called .de6.sda1 and the first lo"ical partition inside
of the extended partition is alwas called .de6.sdaN.
:verview
<he objecti6e in settin" up our four partitions is to install Linux ;int )N on the
same hard dri6e# with H>B5# Linux ;int8s boot loader# installed in the boot
partition of Linux ;int# lea6in" the Windows 7 boot pro"rams untouched. 3fter
creatin" partitions for and installin" Linux ;int# the new partitions as seen from
inside Windows 7 will loo$ a lot different. <his ima"e shows the partitions from
the computer used for this tutorial after the dual4boot operatin" has completed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age
Create 6our fir$t Linux 4artition... 0%e !oot 4artition
<o create a new partition# select the free space as shown below and clic$ A##.
0%i$ $te& will %ave to be re&eate# for ever6 &artition 6ou nee# to +reate.
5 default# the installer will create the first and subseKuent partitions as Lo"i+al
partitions. <his is exactl what we want.
!ur first partition will be the boot partition. Bse N** ;5 to 0** ;5 for the siGe
and Oboot as the Mount &oint. Lea6e the ?$e a$ 6alue unchan"ed. ;a$e sure
the location is set for the !e"innin". <hen clic$ :7.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
Create 6our $e+on# &artition... 0%e <oot 4artition
@lic$ on the Free 2pace a"ain and clic$ on A88. For the root partition# the
minimum dis$ space recommended is A 1!. 2ince resiGin" the dis$ on a runnin"
sstem is not an eas tas$# I "a6e it +*#*** ;5# or +* H5. 3fter settin" the
;ount Point as Forward 2lash# clic$ :7.
Create 6our t%ir# &artition... 0%e 2ome 4artition
@lic$ on the Free 2pace a"ain and then clic$ on 3&&. <he partition mounted
at .home should be allocated most of the a6ailable dis$ space. Hi6e it a 6alue of
)** to ,** H5. Lea6e the file sstem at the default and use O%ome as the Mount
&oint. <hen clic$ :7.
Create 6our fourt% &artition... 0%e Swa& 4artition
@lic$ on the =ree S&a+e a"ain. <hen clic$ on A88. <he last partition will be for
2wap# dis$ space that the sstem ma use for 6irtual memor. 2elect $wa& area
from the ?$e a$ dropdown menu and lea6e the mount point blan$. 3ssi"n it a
suitable dis$ space. <he rule of thumb is to match the >3; on our computer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C
; computer has 1 H5 of >3; so I set it for 1 H5. <hen clic$ :7.
5ac$ to the Partition <able# ou should now see the partitions ou just created.
<he partitions should be listed as $#a.# $#a6; $#a5 and $#a8. 7ot 6isible on this
screen shot# are the pre4existin" Windows partitions# which are $#a1 and $#a2.
With Windows XP or Windows 7 installations which onl use the first two
partitions# the Linux boot partition will be listed as sda , and the Linux root
partition will be listed as sda N. 3lso the Linux root partition ma be indicated as
Linux ;int )1 e6en thou"h it is actuall Linux )N. &o not worr. <his was just a
tpo"raphical error and will not affect the installation of Linux )N. <o format
partitions# the sdaN# sda/ and sda7 partitions abo6e ha6e the Format boxes
chec$ed. If our partitions are not chec$ed# ou should clic$ on these boxes to
format these three partitions. Iowe6er# leave t%e S/A4 &artition un+%e+*e#.
0wo o&tion$ for Set t%e 8evi+e to !oot Loa# t%e )n$tallation
If ou did the 2omethin" 'lse% option rather than the 3utomatic Install% option#
ou also ha6e the option of decidin" which 5oot ;ana"er ou want to use. <his
important decision comes in the area called 8evi+e for boot loa#er
in$tallation.%
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +
<he boot loader is the pro"ram which starts ri"ht after 5I!2 or B'FI and which
displas a screen allowin" ou to choose which operatin" sstem ou want to
load. If ou alread ha6e Windows XP# Windows 7 or Windows A installed on
our computer# then ou alread ha6e a boot loader called /in#ow$ !oot
Mana"er installed. Fou can lea6e Windows 5oot ;ana"er in place. !r ou can
replace the Windows 5oot ;ana"er with the Linux 5oot ;ana"er which is called
1<?! 2. 9H>B5 stands for the Hrand Bni6ersal 5oot Loader and is a tribute to
3lbert 'instein and his Hrand Bnified Field <heor:. <he step of where to put the
H>B5 + boot loader occurs after ou ha6e set up all of our Linux partitions. It is
the final step just before clic$in" on Install 7ow which will be"in the Linux
installation process. If ou do nothin"# b default# the Linux installation will
replace the Windows 5oot ;ana"er with H>B5 +. Fou can "et the Windows
5oot ;ana"er bac$ later if ou want. 5ut one of m bi""est complaints about
Linux is the failure to pro6ide users with a clearer choice about their options so
that users can ma$e the decision for themsel6es. In the meantime# we will re6iew
the pros and cons of both options and present the steps for each option. First#
we will re6iew the pros and cons of each option.
:&tion 1, Allow 1rub 2 to <e&la+e t%e /in#ow$ !oot Mana"er
If ou just clic$ install now# Hrub + will replace the Windows 5oot ;ana"er. <he
benefit of this is that if Windows e6er crashes# or ou e6er decide to "et rid of
Windows completel or put Windows inside Lirtual 5ox# ou can still use the
Linux 5oot Loader to start the Linux operatin" sstem. 5ecause Windows is far
more li$el to crash than Linux# this option ma$es some sense.
H>B5 + will "i6e ou ten seconds to choose which operatin" sstem ou want to
use. If no choice is made# H>B5 + will start Linux. <he drawbac$ of replacin" the
Windows 5oot ;ana"er with H>B5 + is that in the hard to belie6e e6ent that ou
decide ou do not li$e Linux and ou want to "o bac$ to Windows# ou will ha6e
to "o throu"h the hassle of replacin" H>B5 + with the Windows 5oot ;ana"er.
<here are se6eral was to do this so this is not that bi" of a deal. If the H>B5 +
boot mana"er is used# it will "i6e ou a 2tart screen allowin" ou to select Linux
or Windows. 2hould ou choose Windows and press 'nter# then the H>B5 +
boot loader will chain load or start the Windows 5oot Loader. 2o the Windows
5oot loader is still there. It is just hidden awa and not in the first position.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D
:&tion 2, Leave t%e /in#ow$ !oot Mana"er alone an# allow it to +%ain loa#
t%e 1<?! 2 boot loa#er
If ou lea6e the Windows 5oot loader in the first position# it will "i6e ou a screen
at 2tart Bp and allow ou to choose either Windows or Linux. If ou choose
Linux# then the Windows 5oot loader will chain load first H>B5 + for a fraction of
a second which will load Linux. In other words# the Linux 5oot Loader H>B5 + is
also still there. It is just hidden. <here is one extra step ou will ha6e to do if ou
choose this option. Fou will ha6e to start up Windows and use a free pro"ram
called 3a$6 !C8 to add an 'ntr to the Windows 5oot Loader for Linux.
!therwise# the Windows 5oot Loader will not e6en $now Linux is there. !ne
added benefit of the H>B5 + boot loader is that it automaticall reco"niGes all of
the operatin" sstems that are a6ailable. If there is more than one operatin"
sstem a6ailable# H>B5 +will present ou with a list of them at 2tart Bp and let
ou choose which one ou want to load. 2o ou do not need 'as 5@&.
2ow to +%oo$e between t%e$e two o&tion$
If ou are not reall sure ou want Linux# then ou should probabl choose the
second option. Iowe6er# if ou are not reall sure ou want Linux# ou should
probabl not install a dual boot in the first place and simpl $eep Linux ;int in
Lirtual 5ox. <he whole point of our chapter on settin" up a Lirtual 5ox and
installin" Linux in the Lirtual 5ox is to "i6e ou the opportunit to see how much
better Linux is than Windows. In addition# we had se6eral chapters discussin" all
of the securit problems of Windows. 2o it is difficult to ima"ine anone readin"
this boo$ and still ha6in" doubts about whether the should add Linux to their
computer. 7earl e6erone who uses Linux comments that the more the use
Linux# the less the ha6e a need to use Windows. 'ntire ears will "o b without
e6en once openin" Windows. 2o while I can see a need for $eepin" Windows
around just in case ou e6er need it#% I cannot reall see a case for $eepin" the
Windows 5oot ;ana"er around. <he Windows 5oot ;ana"er is so poorl written
that it will not wor$ unless it is in the 6er first partition# called de6.sda). H>B5 +
will wor$ in an partition.
<he Windows 5oot ;ana"er is so dumb that it cannot tell if there are other
operatin" sstems on our hard dri6e without the help of some other pro"ram
tellin" it. 5 comparison# the H>B5 + boot loader is not onl capable of $nowin"
where the Windows 5oot Loader is and the Linux ;int 5oot Loader is# it can also
automaticall detect an other boot loaders on an other operatin" sstems ou
mi"ht install to our hard dri6e. I do not recommend ha6in" more than two
operatin" sstems on our hard dri6e. Fou are better off testin" operatin"
sstems with Lirtual 5ox. Iowe6er# if ou ha6e H>B5 + as our boot loader# ou
can ha6e as man operatin" sstems as ou want and H>B5 + will automaticall
find and list all of them. Prett nice. <here are man other problems with the
Windows 5oot ;ana"er and man other ad6anta"es of the H>B5 + boot loader
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *
9for example# H>B5 + will e6en let ou set a bac$"round ima"e to our loadin"
screen:. 2o m ad6ice is to "o ahead and replace the Windows 5oot ;ana"er
with H>B5 +.<his is wh we present the steps for this option first. 5ut at the end
of this section# we will also present the steps for $eepin" the Windows 5oot
;ana"er and addin" Linux as an entr to it.
Ste&$ to allow 1<?! 2 to re&la+e t%e /in#ow$ !oot Mana"er
Pre6iousl# we used the Linux Partition <ool to add four partitions and create a
Partition table that loo$s li$e the followin"-
<o replace the Windows 5oot ;ana"er with the Linux 5oot ;ana"er# simpl clic$
on Install 7ow. <hat8s it. Fou are done. <he rest of the Installation is almost
exactl li$e the installation of Linux on Lirtual 5ox.
/%at #oe$ O#evO$#a meanH
<he term .de6.sda% abo6e stands for de6ice stora"e dri6e 3%. 2ince our
computer has onl one hard dri6e# it is $nown as 2tora"e &ri6e 3 or sda.
Whate6er is placed in this little box will control the loadin" process for this entire
hard dri6e. <raditionall# each hard dri6e has exactl one ;aster 5oot >ecord
9;5>:. 'ach ;5> has onl two parts. <he first part is the 5oot Loader or 5oot
;ana"er and the second part is the Partition <able. 3bo6e we can see the
Partition <able. 5ut the 5oot Loader is hidden from 6iew. @urrentl# the boot
loader is a de6ice called the Windows 5oot ;ana"er which I belie6e is actuall
on the first partition sda). <his is wh ou should ne6er mo6e sda) if ou want to
use Windows. If ou clic$ )n$tall without ma$in" an chan"es# the Windows 5oot
;ana"er 9on sda): will be o6er4ridden b H>B5 + 9which is actuall on sdaN:.
<his is not a bi" deal as H>B5 + will automaticall add the Windows 5oot
;ana"er to the H>B5 + 2tartup screen and "i6e ou a choice of loadin"
Windows if ou wish throu"h a process called @hain Loadin".
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :
/%at 1<?! 2 i$ reall6 #oin"
H>B5 + ta$es up more space than is allowed on the ;aster 5oot >ecord. It
therefore uses this space on the ;aster 5oot >ecord 9which is not a partition: to
redirect to the partition where H>B5 + is reall at 9sdaN:. <he main H>B5
pro"ram then examines all of the partitions to see if there are an operatin"
sstems and an other boot mana"ers 9which H>B5 calls loaders:. What H>B5
finds is then listed on the 2tart Bp screen.
<he H>B5 main code is tpicall in the first lo"ical partition in the extended
partition which is alwas sdaN. 5ut in realit# H>B5 is in whate6er partition ou
called Oboot. In addition# the H>B5 code is also at the be"innin" of the root
partition 9.: of an Linux operatin" sstem. 3s for the 5I!2 pro"ram# it is not e6en
on our hard dri6e. Instead# it is inside of a little memor chip inside of the mother
board of our computer that comes just before our hard dri6e. <he main job of
5I!2 is to turn on other thin"s in the computer and set the correct current. 2o it
is li$e an !n4!ff 2witch. !nce e6erthin" is turned on# 5I!2 loo$s for the first
5oot ;ana"er it can find which will hopefull be at the 6er be"innin" of the hard
dri6e on sda in the case of H>B5 or sda) with Windows.
=ini$% )n$tallin" Linux Mint
3fter "oin" throu"h the same install screens we went throu"h when installin"
Linux ;int into Lirtual 5ox# ou will come to the restart screen. @lic$ on <e$tart
9ow. <hen while our computer is temporaril off# remove t%e ?S! Live $ti+*.
!therwise# it will tr to install Linux ;int a"ain instead of "oin" to the H>B5 +
screen or the Windows 5oot ;ana"er.
?$in" t%e 1<?! 2 Startu& $+reen
When our computer starts# ou will find man entries on the H>B5 + screen.
<he first entr in the list will be Linux ;int )N. Press 'nter on our $eboard to
start ;int )N. <he first Windows entr is actuall the Windows 5oot ;ana"er
which is still on the partition called sda). <o start Windows# use the down arrow
on our $eboard to select this. <hen press 'nter to start it. @lic$in" on this will
simpl brin" up the Windows 5oot ;ana"er and ou will ha6e to clic$ on
Windows 7 a"ain to "et to the @ dri6e. <he second Windows entr is our
Windows >eco6er dri6e. @lic$in" on this will ta$e ou to a series of Windows
>eco6er steps familiar to those who ha6e tried to reco6er Windows after it has
crashed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )
2o it is best to select the first Windows option on the list if ou want to start the
Windows operatin" sstem instead of the Linux operatin" sstem.
Ste&$ to u$e t%e /in#ow$ !oot Mana"er in$tea# of 1<?! 2
In order to lea6e the Windows 5oot Loader alone# we need to chan"e the Linux
installation boot loader to the 5oot Loader partition we created which is sdaN.
<his is what the 8evi+e for boot loa#er in$tallation dropdown menu should
loo$ li$e before ou clic$ )n$tall 9ow.
3fter installation has completed successfull# the computer should reboot into
Windows. 5efore Windows reboots# it will start chec$in" the resiGed @ dri6e for
consistenc. Let the chec$ complete. 3fter the chec$ has completed# lo"in.
A## Linux Mint to t%e /in#ow$ !oot Mana"er wit% 3a$6 !C8
5ecause the Windows 5oot ;ana"er is $ind of dumb# there is no wa to boot into
Linux ;int )N until an entr for it is added to the Windows boot menu. <he next
tas$ is to download and install 'as5@&. &o a Hoo"le search if ou want to
download this free pro"ram. 3fter 'as5@& has been installed in our Windows
operatin" sstem# start it. @lic$ on A## 9ew 3ntr6 tab. While there# clic$ on the
LinuxO!S8 tab# then select 1<?! 2 from the 06&e dropdown menu. H>B5 +#
not H>B5 Le"ac# is the 6ersion of H>B5 used b Linux ;int )N.
'dit the 9ame field to match the distribution ou are addin" it for. 3ppl the
chan"es b clic$in" the A## 3ntr6 button. @lic$ on the 3#it !oot Menu tab. Fou
should see how the entries will appear on the boot menu. 'xit 'as5@& and
restart the computer. Fou can alwas chan"e# resiGe or delete partitions later if
ou need to b bootin" into Linux ;int and usin" the free 14arte# partition
mana"er which comes with Linux ;int. In the next section# we will loo$ at how to
create a dual boot with Linux and Windows A.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!
-.' Dual :oot Linux Mint 1ith <indo1s
<indo1s is com!letel# different from <indo1s ? or <indo1s J* in that
Microsoft has added man# more obstacles to !re3ent #ou from addin5
Linux. This section co3ers !recautions #ou should take in order to add
Linux Mint to a com!uter 1hich alread# has <indo1s G1ith =0F4H on it.
In this section# we will re6iew our options for dual bootin" with Linux ;int if ou
ha6e the misfortune of ownin" a Windows A computer. !ne of the man
problems of Windows A is that it uses a new $ind of startup pro"ram called B'FI.
=0F4 stands for =n1arranted 0limination of #our Freedom
and 4nde!endence Aor something li7e thatB.
!ne of the more dubious features of B'FI is called Se+ure !oot a*a t%e
Mi+ro$oft 7ill Swit+%. We co6ered the histor of B'FI in an earlier chapter.
5efore we re6iew the steps for addin" Linux ;int as a dual boot to Windows A#
we will re6iew the problems with 2ecure 5oot and B'FI. <hese problems are so
horrific that our ad6ice is rather than installin" Linux ;int as a dual boot with
Windows A we hope ou will stron"l consider returnin" our Windows A
computer to the store where ou bou"ht it and insist on a refund. It is li$el that
ou ha6e an old Windows 7 or XP computer sittin" around the house. &ual
bootin" either of these older computers would be a much better and safer option
than $eepin" a rather dan"erous Windows A computer. Iere8s wh-
4roblem -1, Se+ure boot i$ not $e+ure
2ecure boot uses a combination of $es to pre6ent ou from downloadin" an
pro"ram ;icrosoft feels is not safe. <he problem is that some of the $es are
public and the rest ha6e been hac$ed in the past and will be hac$ed a"ain in
the future. 2o the onl one bloc$ed from installin" pro"rams to our computer b
secure boot is ou. ;icrosoft has left the bac$door to our computer open since
)007. With Windows A# the ha6e now also left the front door to our computer
open. 2ecure 5oot opens up the 2tartup pro"ram to attac$ because it uses the
same top down easil copied di"ital ima"e sstem the ;icrosoft Windows uses
to protect its open bac$ door. <his lulls users into a false sense of securit that
the are co6ered when the are not.
4roblem -2, Se+ure boot i$ #an"erou$ an# +oul# +ra$% t%e entire worl#
e+onom6
7earl e6er business in the world uses computers to mana"e their business and
store their data. Ima"ine what would happen to the econom if all of the
computers were brou"ht down due to a secure boot failure.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"
'6en if ou are willin" to trust that ;icrosoft will not push the Cill button
deliberatel or accidentall the real problem is that hac$ers can and will use
this Cill button. <hin$ of the Flame 6irus onl much worse. 2ecure 5oot is li$e a
di"ital nuclear weapon in the hands of economic terrorists.
4roblem -3, Se+ure boot limit$ 6our free#om
With e6er prior 6ersion of Windows# ;icrosoft allowed ou to decide whether a
pro"ram was safe to load to our computer. With 2ecure 5oot# it will be ;icrosoft
who will "et to decide what is acceptable to load to our computer. Load the
wron" pro"ram and our computer mi"ht no lon"er start. <hin$ of it as the police
ownin" the $es to our home and tellin" ou whether ou can "o in or not.
4roblem ->, Se+ure boot will *ill $oftware innovation
7earl all inno6ations ha6e come from the thousands of small time pro"rammers
who write applications for themsel6es and then share them with others. <hese
pro"rammers will be tossed out of business with 2ecure 5oot as most will not be
able to jump throu"h all of the hoops imposed b ;icrosoft to "et a si"ned $e.
4roblem -., Se+ure !oot i$ ver6 #iffi+ult for man6 u$er$ to #i$able
2upposedl we ha6e the option of turnin" off secure boot. <he problem is that
there are four major families% of secure boot and e6er manufacturer has a
different implementation of secure boot. Without an consistenc# this means that
there are literall doGens of different $inds of secure boot sstems.
5elow we will show ou screen shots of how to disable secure boot with some of
the most common sstems. 5ut the actual pathwa to find and disable secure
boot can be much different on our computer. First ima"ine how hard it would be
to disable secure boot without our detailed instructions and screen shots. <hen
ima"ine how difficult it would be for our mother to disable secure bootDD
4roblem -6, 3ven if 6ou #i$able $e+ure boot; ?3=) $till %a$ %u"e &roblem$
2ecure boot is just the tip of the iceber" in terms of all of the problems of B'FI.
B'FI specifications are a secret. 5ut what is $nown about them is that the are
thousands of pa"es lon".
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
2ubtractin" the dri6er code# the siGe of B'FI is actuall lar"er than the siGe of the
entire Linux Cernel. What is in all of these thousands of files and lines of codeE
;an of the files in B'FI be"in with a win% prefix meanin" that the were
written b ;icrosoft for ;icrosoft and ;icrosoft does not want to let us $now what
is in this code.
<he B'F! 6erification mechanism is identical to the ;2 Windows si"nin"
mechanism. <hese ha6e alread been successfull attac$ed b the Flame 6irus.
3ll of the codin" of the B'FI si"nin" mechanism start with the word WI7.
B'FI is also written with ;icrosoft bac$ slashes as path separators just li$e
;icrosoft file paths ma$in" it easier for hac$ers to attac$ it. 5ecause B'FI is
new it is certain to ha6e man bu"s and will ha6e unpredictable reactions with
man other pro"rams. In particular# most of the new code affects boot loaders
such as H>B5 + and the Windows 5oot ;ana"er.
3ccordin" to a leadin" expert on boot loaders# ?3=) allow$ t%ou$an#$ of
entr6 &oint$ to !oot Servi+e$ an# %a$ an in+re#ible number of bu"$... )t i$
+lear t%at nobo#6 %a$ ever te$te# t%i$ +o#e... Se+ure !oot i$ Cu$t a
#i$tra+tion. 0%e real &roblem i$ ?3=).
>ed Iat &e6eloper ;atthew Harrett# <he Future is Iere and it is Iorrible.
http-..www.outube.com.watchE6ML+a"N;,Q7/B
Incredibl# there is no wa to $now about what is in the B'FI pro"ram or what
$inds of bu"s ha6e been disco6ered because all members of the B'FI forum
must si"n an oath of secrec. '6en B'FI documentation is $ept under secure
files reKuirin" B'FI passwords to access.
<his is the exact opposite of how the open source communit wor$s where
e6erone $nows about all bu" reports and e6erone wor$s to"ether and shares
ideas and solutions to fix the bu"s.
4roblem -5, 0%ere i$ a $afer free o&en $our+e o&tion to ?3=) +alle# Core
!oot
If either ;icrosoft or computer manufacturers reall cared about safet# the
would ha6e installed the @ore 5oot 2tart up pro"ram. It is faster and safer than
B'FI. 5 placin" the passwords and control of the computer in the hands of the
actual owner 9ou:# there is no set of $es to be copied. 3 ma$er of processors#
called 3;&# now full supports @ore 5oot. 2o manufacturers do ha6e an eas
option. !ur hope is that if enou"h people return their Windows A computers and
demand a computer with @ore 5oot# we will e6entuall be able to put this
Windows A.B'FI.2ecure 5oot 7i"htmare behind us.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##
4roblem -8 Claim$ t%at t%ere are a#vanta"e$ to ?3=) are fal$e
We are currentl bein" subjected to a wa6e of propa"anda trin" to con6ince us
that B'FI has some $ind of benefit. For example# the claim that B'FI can
handle partitions bi""er than + <erabtes. Well# so can @ore 5oot. '6en the old
5I!2 can as lon" as the are di6ided between partitions. If ou ha6e more than
two terabtes of data# ou should not be puttin" so much data on a sin"le hard
dri6e anwa. Fou should use a second hard dri6e if onl for safet reasons.
Fou will also hear that B'FI allows ou to ha6e a much lar"er number of
partitions. <his is also not true. @ore 5oot has the same partitionin" abilit as
B'FI and e6en the old 5I!2 sstem will let ou ha6e as man partitions as ou
want as lon" as ou use the fourth partition to create an extended partition.
Fou will also be told that 2ecure 5oot protects a"ainst >oot Cit infections. It does
not. 3none capable of creatin" a root $it attac$ is also capable of creatin" fa$e
$es similar to the process used b the Flame 6irus. 2o do not be fooled. <he
onl purpose of B'FI is to maintain and expand the ;icrosoft monopol. If ou
want our sstem to be safe and under our control# then install and use Linux. If
ou reall want securit# then ou need to "et a computer with @ore 5oot.
4roblem -9, 3ven if 6ou want to in$tall a Linux 8i$tribution w%i+% +ome$
wit% t%e ?3=) Se+ure !oot *e6$; 6ou are better off #i$ablin" $e+ure boot
A=03< in$tallin" Linux.
3s of (une +*),# se6eral Linux distributions includin" Bbuntu# ;int )N and
Fedora now come with the necessar ;icrosoft $es to permit installation with
secure boot enabled. Iowe6er# ou should still disable secure boot after the
installation has been completed. <here are two reasons for this. First# ;icrosoft
can switch $es at an point in the future and there "oes our Linux operatin"
sstem and all of our data with it. 2econd# the $es ma not allow ou to install
other pro"rams ou want with our Linux sstem. In fact# ou should also disable
;icrosoft Bpdates as this can also wind up deletin" our Linux sstem. Windows
A will wor$ 9mabe e6en better: without secure boot enabled and without all of
the monthl updates from ;icrosoft. 3nd so will Linux and all of our other
pro"rams. We will therefore re6iew some tips for settin" up a dual boot with Linux
and Windows A. We will then show ou how to disable secure boot in some of
the most common brands
4roblem -10, /%6 not Cu$t "et ri# of ?3=)H
Bnfortunatel# it is Kuite difficult to "et rid of B'FI or replace B'FI with @ore
5oot because B'FI is not on our hard dri6e. <he onl wa ou can "et rid of
B'FI is to return the computer to the store where ou bou"ht it# demand a refund
and demand the option to bu a computer with @ore 5oot on it. It is also not li$el
that Windows A will wor$ on anthin" other than B'FI because B'FI and
Windows A were basicall made for each other.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C
/%6 6ou $%oul# in$tall a #ual boot of Linux before #i$ablin" Se+ure !oot
<here is a "reat deal of misinformation on Linux forums about how to install a
dual boot of Linux with Windows A. <his is because the partition sstem for
Windows A and especiall the partitionin" for 5oot ;ana"ers with Windows A
and the B'FI sstem is completel different than it was with Windows 7 and the
5I!2 sstem. 3s ou ma recall in the last chapter# with Windows 7 9or XP: with
the 5I!2 sstem# the Windows 5oot ;ana"er was in two places. First# it was in
the source of the hard dri6e 9before an of the partitions:. <he area was called
sda.% <hen it was also in the Windows 2stem partition at the be"innin" of the
"roup of partitions. <he area was called sda).%
When we installed Linux in the 5I!2 sstem with the 3utomatic Install% method#
the default installation placed H>B5 + in the sda slot. In other words# H>B5 +
replaced the Windows 5oot ;ana"er. H>B5 + automaticall reco"niGed where
the second cop of the Windows 5oot ;ana"er was and included it in the H>B5
+ startup screen allowin" us to boot into either Linux or Windows 7 9or XP:.
With the 2omethin" 'lse% installation method# we could also create an extended
partition and place whate6er items we wanted in as man partitions as we
wanted. 2o we could ha6e a separate data partition and boot partition in addition
to our normal >oot partition and swap partition. <hin"s were prett simpl and
prett flexible. Ciss all of that "oodbe with B'FI.
First# the initial partition arran"ements are different dependin" on what 6ersion of
Windows A was installed in our computer. <he basic 6ersion of Windows A
comes with two partitions one for a sstems file and the other for our Windows
@ dri6e. <he Pro 6ersion of Windows A comes with four partitions. If ou are self4
installin" Windows A# ou do not ha6e to create an partitions because B'FI will
create then for ou. 5elow is a 1 partition 6ersion of Windows A-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+
<here are three smaller sstems partitions and one main Windows A 9@ &ri6e:
partition. <he remainin" space is called 8rive 0 ?nallo+ate# S&a+e. Iowe6er#
one of the man problems with B'FI is that there is no lon"er an space to put
the 5oot ;ana"er in front of the hard dri6e. In other words# assi"nin" a boot
mana"er to the sda slot no lon"er wor$s. <his is a major boob trap as Linux
users ha6e been used to usin" sda to place the H>B5 + boot mana"er in.
Instead of placin" the boot mana"er in sda# B'FI places the Windows boot
mana"er in one of the partitions. <echnicall# it is in a folder called 3=).
<he second craG thin" to understand about B'FI is that all of t%e boot loa#er$
are &ut in t%e $ame &artition . <his is the opposite of 5I!2 where each boot
loader was put in a different partition. <his is wh it is a mista$e to disable 2ecure
5oot before installin" Linux. !n some sstems# when ou disable secure boot#
B'FI automaticall con6erts to le"ac% mode and when ou install Linux# this
uses the 5I!2.;5> partition sstem. 2uddenl# the H>B5 + boot loader is put in
the wron" partition leadin" to a ni"htmare series of problems. 5elow is the
screen of a person who tried to install Linux Bbuntu with 2ecure 5oot turned off-
7otice that the file was an ;5> or ;aster 5oot >ecord file. B'FI and Windows A
ha6e a 6er hard time with this. 2o sa6e ourself some "rief and in$tall Linux
wit% ?3=) turne# on an# Se+ure !oot turne# on. Installin" Linux with B'FI
turned on is the best wa to be sure that B'FI automaticall places H>B5 + in
the correct partition. !nl after Linux and Hrub + are in the correct partitions
then we can disable secure boot and li6e somewhat happil e6er after.
=ir$t; S%rin* t%e C #rive to +reate unallo+ate# $&a+e
In the B'FI partition screen abo6e# there is unallocated space. Iowe6er# it is
li$el that ou will not ha6e an unallocated space on our computer and that all
of the space will be ta$en up b the @ dri6e. <herefore the first step ou should
do before installin" Linux is to select the partition with the @ dri6e and shrin$
it to create some unallocated space.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D
Follow the steps and screen shots we used to shrin$ the @ dri6e in the last
chapter. >emember that Windows does not wor$ well without a lot of extra
space. 2o if ou ha6e 7* H5 of data in Windows# lea6e at least )** H5 for the @
dri6e. <he rest can be left unallocated. <his remainin" space can be used to
install Linux and ou can decide exactl how much ou want for Linux durin" the
Linux installation.
Se+on#; +reate t%e Linux Live ?S! =la$% 8rive
B'FI is prett inflexible. It onl wor$s with x/1 bit operatin" sstems. 2o choose
a x/1 bit 6ersion of Linux. 3lso B'FI will onl install 6ersions of Linux with si"ned
$es. <his includes the latest 6ersions of Bbuntu# ;int and Fedora 9and possibl
others b the time ou read this boo$:. !ur recommendation is to download the
Linux ;int )N ;ate x/1 bit I2! to our download folder. <hen create an
installation Li6e B25 with B7etbootin as we described abo6e.
0%ir#; +%an"e t%e boot or#er to ?S!
!pen B'FI b pressin" on the 2tart button and then clic$in" F)*. Ho to the 5oot
!rder screen and ;o6e B25 to the top of the list just as in the last section.
=ourt%; re$tart 6our +om&uter u$in" t%e Live ?S!
Place the Li6e B25 Flash &ri6e in our B25 port and restart our computer. It
should now boot into the installation screens for Linux ;int )N ;ate. Follow these
screens until ou "et to the Installation <pe screen-
B'FI is so complex that there is reall onl one wa for a normal person to ma$e
sure that the Linux 5oot Loader 9H>B5 +: "ets installed into the correct B'FI
partition. <hat wa is to use the automatic install method b lea6in" the
Installation <pe set for )n$tall Linux Mint alon"$i#e /in#ow$ 8' and then
clic$ on Install 7ow. <his will ta$e ou to the same confi"uration screens we
co6ered for a Lirtual 5ox installation of Linux ;int. 8o not $ele+t 3ra$e 8i$+'
a$ t%i$ will #elete all of t%e information on 6our C 8rive.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*
/%6 6ou $%oul# not u$e t%e Somet%in" 3l$e Cu$tom 4artition o&tion
If ou are bra6e# and want to set up our own partitions# ou can clic$ on
2omethin" 'lse% and then set up our partitions. 5ut do not create a boot
partition because H>B5 must "o in the B'FI boot partition not in its own
partition. 3lso do not chan"e the ;ount Point to sda because this will not wor$.
'6en with these precautions# the installation will not result in a dual boot option.
<o "et this# ou will need to open our Linux ;int operatin" sstem and clic$ on
the 2oftware ;ana"er and install the Bbuntu &isc >epair extension. <here is an
explanation of how to use this to fix B'FI to create a dual boot. Iowe6er# if ou
ma$e e6en the sli"htest mista$e# our computer8s "oose will be coo$ed.
5efore attemptin" the 2omethin" 'lse option# I ur"e ou to watch the followin"
short Fou <ube 6ideo. http-..www.outube.com.watchE6MTc'wjAb55@1
4ra+ti+al ?3=) Se+ure !oot 4art 3, ?3=) #ual boot $etu& wit% Linux
!n @hannelintel N minutes published on Feb ++ +*),
In this 6ideo# 5rian runs into a problem with bein" unable to brin" up the H>B5 +
menu after settin" up custom partitions. <owards the end of this 6ideo# he is
forced to use the Bbuntu Partition >epair tool in order for the Hrub menu to wor$
properl. Ie describes this Bbuntu tool as performin" ma"ic.% I belie6e the
mista$e he made was that he onl set two mount points for Hrub in his custom
partition when in fact B'FI ma reKuire four different points. I thin$ all Bbuntu
tool is doin" is ma$in" sure that all of the B'FI partition points are made
correctl. <his issue is discussed more full on the Bbuntu and Linux ;int
forums.
5ut thin$ about this. If one of the lead en"ineers from Intel the "roup that
supposedl created B'FI is unable to correctl set up custom partitions# what
chance does the "eneral public ha6e in settin" up custom partitionsE I thin$ the
odds are close to Gero. <his is wh I recommend onl usin" the custom install
option called Install Linux ;int alon"side Windows A.% It is the onl wa to insure
that all of the partitions ha6e been correctl set. 2o please just use the Install
Linux ;int alon"side Windows A% option abo6e. <hen clic$ on Install 7ow.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:
3fter installin" Linux ;int and rebootin" our computer# ou will be presented
with the standard H>B5 + screen which will allow ou to select which operatin"
sstem ou want to use. 7ow that we ha6e installed Linux in a dual boot# we can
safel turn off the B'FI secure boot feature.%
2ow to #i$able $e+ure boot an# remove t%e #i"ital %an#+uff$
2ecure 5oot is enabled b default on all computers that are manufactured with
Windows A. ;icrosoft8s ori"inal plan did not include a wa to disable secure boot
until there was an uproar of protest b open source pro"rammers. ;icrosoft then
chan"ed the specifications to pro6ide a wa to disable secure boot. Iowe6er# the
specification did not pro6ide a consistent wa to disable secure boot. <hus# each
computer manufacturer will ha6e a different process. !ur "oal with all of the
followin" screen shots is to help ou fi"ure out a wa to turn secure boot off.
>e"ardless of what brand of computer ou ha6e# the "eneral plan is to start our
computer and then immediatel 9within two seconds: press one of the Function
$es repeatedl to open up B'FI. <he most common $es to launch B'FI are
F/# F)*# F)) or F)+. !nce we are in B'FI# we clic$ on tabs until we find
somethin" called 2ecurit or 2ecure 5oot. We will then disable 2ecure 5oot.
!ccasionall# we will also need to disable other thin"s for this chan"e to ta$e
effect. <hen we will sa6e the confi"uration and restart our computer to be"in the
Linux ;int installation process.
9ote, )f 6ou %ave a /in#ow$ A<M +om&uter; 6ou will not be able to #i$able
$e+ure boot an# 6our onl6 o&tion$ will be to return t%i$ Cun* to t%e $tore
w%ere 6ou "ot it or t%row it in t%e #um&$ter an# fin# a #ifferent +om&uter.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)
S%oul# 6ou enable Le"a+6 Mo#eH
3s we discussed before# ha6in" Windows A in B'FI mode and trin" to install
Linux in Le"ac mode creates lots of problems. <herefore ou should first tr to
in$tall Linux w%ile 6our +om&uter i$ in ?3=) mo#e and sa6e Le"ac mode for
a bac$up plan. 2witchin" to Le"ac tpicall disables secure boot automaticall.
2o if ou are ha6in" trouble disablin" secure boot# this ma be an option.
Iowe6er# Le"ac ma force ou into a traditional ;5> partition table. <his is wh
ou should tr to use B'FI mode first as this will allow ou to sta with the newer
HP< partition table.
9ote, 9earl6 all Linux #i$tribution$ now wor* wit% ?3=) enable# an# t%u$
Le"a+6 mo#e %o&efull6 will not be nee#e#. Some ?3=) $+reen$ +all Le"a+6
mo#e (Com&atibilit6 Su&&ort Mo#ule( or $im&l6 (CSM(.
8i$able Se+ure !oot on an 24 #e$*to& Com&uter
While the computer is off# put in our Li6e B25 with Linux ;int on it created as
described in the last section. <hen turn on the computer and immediatel press
the F)* $e repeatedl# about once e6er second# until the @omputer 2etup
Btilit opens. Bse the left and ri"ht arrow $es to select the Se+urit6 menu.
Bse the down arrow $e to select Se+ure !oot Confi"uration. <hen press
'nter. <he 2ecure 5oot @onfi"uration warnin" displas. Press F)* to continue.
5elow is the 2ecure 5oot @onfi"uration screen-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!
Bse the up and down arrow $es to select Se+ure !oot # then use the left and
ri"ht arrow $es to disable it.
Press F)* to accept the chan"es. <hen use the arrows to select FIL' in the top
menu. Bse the down arrow to select 2a6e @han"es and 'xit. Press F)* a"ain#
then press 'nter twice to restart the computer with 2ecure 5oot disabled. 3s
soon as the computer starts# a messa"e appears indicatin" that the boot mode
has chan"ed.
<pe the four4di"it code shown in the messa"e. <hen press 'nter to confirm the
chan"e. 7!<'- 7o text field displas for the code. <his is expected beha6ior.
When ou tpe the numbers# the code is lo""ed without a text field. .
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C"
8i$ablin" Se+ure !oot on an 24 noteboo* +om&uter
;ost IP noteboo$ computers use the Insde 5I!2. Bse the instructions in this
section to enable or disable 2ecure 5oot on our IP noteboo$ computer. <he
are about the same as the steps abo6e onl the screens and names are different.
While the computer is off# put in our Li6e B25 with Linux ;int on it created
just as described in the last chapter. <hen turn on the computer and immediatel
press the 3SCA43 *e6 repeatedl# about once e6er second# until the 2tartup
;enu opens. Bse the left and ri"ht arrow $es to select the Se+urit6 menu.
Bse the ri"ht arrow $e to choose the S6$tem Confi"uration menu# use the
down arrow $e to select !oot :&tion$ # then press 3nter. <his ta$es ou to the
5oot !ptions menu. Bse the down arrow $e to select Se+ure !oot. Press the
3nter $e# then use the down arrow $e to modif the settin" to 8i$able#.
Press 3nter to sa6e the chan"e. <hen use the left arrow $e to select the =ile
menu# use the down arrow $e to select Save C%an"e$ an# 3xit # then press
3nter to select Me$ . <he @omputer 2etup Btilit closes and the computer
restarts. When the computer has restarted# the !peratin" 2stem 5oot ;ode
@han"e screen appears# promptin" ou to confirm the 5oot !ptions chan"e.
<pe the code shown on the screen. <hen press 'nter to confirm the chan"es.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C
/%6 Linux i$ a mu+% more $e+ure o&eratin" $6$tem t%an /in#ow$
3t the be"innin" of this chapter# I promised I would present a more detailed
explanation of wh Linux is more secure than Windows. I owe ou that much
since I just encoura"ed ou to turn off secure boot.
2ome claim the reason Linux is more secure is because it is not as much of a
tar"et as ;icrosoft. If a person is a hac$er# the are "oin" to "o after the
operatin" sstem with the most computers. While this appears to ma$e sense# it
is not wh Linux is safer and it is not wh those reall concerned with securit#
includin" the International 2pace 2tation and the Los 3lamos 7ational Laborator
ha6e mo6ed to Linux. !thers ha6e claimed that it is because Linus <or6alds is
smarter than 5ill Hates. While this ma be true# this is also not the reason Linux
is more secure than Windows. Linus <or6alds did not desi"n the Linux securit
sstem b himself and 5ill Hates li$el had nothin" to do with the Windows
securit sstem.
Linux i$ $afer be+au$e it i$ o&en $our+e
!n 2eptember )N# )000# one of nation8s leadin" securit experts# 5ruce 2chneier
wrote an important article# called :&en Sour+e an# Se+urit6# which explained
wh open source pro"rammin" will alwas result in a more secure sstem than
closed source pro"rammin". Ie uses the term al"orithm.% 5ut ou can thin$ of
this as bein" the passwords and processes b which pro"rammers protect
pro"rams from hac$ers. <he term crpto"raphic refers to processes for securin"
data such as encrption.
What 5ruce points out in this article is that open source de6elopment pro6ides
more feedbac$ to close the wea$nesses in a securit sstem. 5ruce has written
man boo$s and articles on this subject since )000 and I encoura"e ou to 6isit
his website and read some of these. http-..www.schneier.com.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C#
<he problem with the ;icrosoft de6elopment model is that it is done in secrec.
<here is 6er little feedbac$ and 6er little in the wa of chec$s and balances. It
therefore results in pro"rams which are easil hac$ed. <his is wh I ha6e
maintained throu"hout this boo$ that the entire ;icrosoft business model is
fatall flawed. <he ;icrosoft ;onopol model ma ma$e billions of dollars. 5ut it
results in extremel poor products such as Windows A# B'FI and 2ecure 5oot.
8i$tribute# *e6$ an# &a$$wor#$ ver$u$ +entrall6 +ontrolle# *e6$ an#
&a$$wor#$
<here is another fundamental reason wh B'FI and 2ecure 5oot will not wor$.
5oth of these pro"rams are top down and controlled from a central point 4
;icrosoft. <he therefore ha6e a sin"le point of failure. Linux and @ore 5oot on
the other hand are desi"ned from the bottom up. <he are controlled b the local
user ou. <here is much "reater safet in millions of local $es 6ersus a few
centrall controlled $es. Ima"ine if there were onl a few $es which could open
e6er loc$ on e6er home in 3merica. <hie6es would ha6e no problem ma$in"
copies of these $es and all homes would be in dan"er. <he reason wh loc$s
wor$ is because each home has a different $e. '6en if a croo$ could cop our
$e# the would onl ha6e access to a sin"le home. <he would need to start
o6er and cop a second $e to "ain access to a second home and a third $e to
"et access to the third home. In other words# the di6ersit inherent in Linux is a
crucial part of the Linux safet structure.
<he Iome% for our data is our computer and ;icrosoft with B'FI and
2ecure 5oot creates exactl that unsafe centrall located $e structure. '6en
worse# these are di"ital $es 4 ma$in" them e6en easier to cop.
<he benefit of Linux is that there is no sin"le $e. When ou install Linux# ou
create our own $e to access our own Linux sstem. '6en if a cber4thief could
brea$ our password# the would onl ha6e access to a sin"le computer. <his is
the benefit of the Linux sstem it is that the $es are created from the bottom
up whereas with the ;icrosoft sstem# the $es are created from the top down.
2o one final reason to mo6e towards Linux and open source is that in the lon"
run not onl will ou ha6e a more secure computer# but we will all ha6e a much
safer world.
<his completes our chapter on dual bootin" Linux with Windows. In the next
chapter# we will loo$ at addin" Libre !ffice to Windows. We will then loo$ at usin"
Libre !ffice in either Windows or Linux and comparin" it to ;icrosoft !ffice.
Finall# we will also loo$ at some of the terrific free pro"rams we can add to Linux
to help it wor$ e6en better.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age CC
6ha!ter ?... :enefits of LibreOffice <riter
3his chapter includes the follo(ing four sectionsF
*." 4hy @ibre -ffice 4riter is better than Microsoft 4ord
*. CustomiIing the @ibre -ffice 4riter Main Menu
*.# Create your o(n Custom 3emplate
*.C More Free 3ools for @ibre 4riter
@ibre -ffice C is a (ord processing program (hich comes installed automatically
(ith @inu= Mint "+ 6 and can also be installed separately on any 4indo(s or
Apple computer. /n this chapter, (e (ill revie( several reasons (hy @ibre -ffice
4riter is better than MS 4ord.
/n Section *.", (e (ill first revie( four different 7inds of documents to better
understand (hy different documents reKuire different tools. 4e (ill then revie(
the history of @ibre -ffice. 4e (ill ne=t describe several benefits of @ibre -ffice
over Microsoft -ffice. .ecause @ibre -ffice can be used on either @inu= or
4indo(s, these tips apply (hether or not you are using @inu=.
/n Section *., (e (ill revie( ho( to easily customiIe the interface of @ibre 4riter
so that it has the (ord processing tools you li7e to use most readily available.
/n Section *.#, (e (ill revie( ho( to create a custom template for @ibre 4riter
documents. 3his is very useful if you (ould li7e to use @ibre 4riter to (rite and
organiIe an E .oo7 or &rint .oo7.
/n Section *.C, (e cover several other free and popular tools (hich can be added
to ma7e @ibre 4riter even better.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C+
?.% <h# Libre Office <riter is better than Microsoft <ord
03en if MS Office (/%, 1ere free; #ou 1ould still be better off usin5 Libre
Office. :ut the truth is that MS Office (/%, is not free. 4n fact; it is 3er#
ex!ensi3e. The com!lete 3ersion; 1ith *ublisher costs nearl# S-//.
<h# Libre <riter is better than MS <ord for creatin5 sim!le documents
No matter (hat type of document you are (riting, @ibre 4riter is better than
Microsoft 4ord. /n this section, (e (ill first revie( several different categories of
documents and then describe specific benefits of using @ibre 4riter over
Microsoft 4ord.
LibreOffice <riter is similar to MS <ord (//,
-n first impression, the @ibre -ffice 4riter menu loo7s very similar to the MS
4ord !!# menu. 3his is in itself a benefit because hundreds of millions of
people around the (orld use the 4indo(s H& operating system (ith MS 4ord
!!# to create and edit their documents. $ou should install and learn @ibre -ffice
because, on April : !"C, Microsoft (ill be ending support for both 4indo(s H&
and MS -ffice !!#. Shortly after this, hac7ers (ill gradually destroy the
computers of these users by ta7ing advantage of an open bac7 door to 4indo(s
H& (hich (as created by Microsoft in ")):. Microsoft is hoping that 7illing the
4indo(s H& computers (ill force users to shell out hundreds of dollars for
4indo(s :." and -ffice !"# 6 programs that are vastly different from 4indo(s
H& and MS -ffice !!#. 3han7fully, there is another option. 9ust install the free
program @inu= Mint "+ Mate 6 (hich comes (ith @ibre -ffice C already installed.
&roblem solvedG
LibreOffice <riter also has :etter Tools for creatin5 com!lex documents
4hile @ibre-ffice 4riter loo7s similar to MS 4ord !!#, there is much more to itG
/n fact, @ibre-ffice 4riter offers a (hole range of tools to create comple=
documents that are not present on any version of MS 4ord. 3o understand ho(
@ibre 4riter is better than MS 4ord, (e (ill first cover four different types of
documents and then describe several benefits to sho( ho( @ibre 4riter is much
better than 4ord for creating comple= documents li7e C!! page boo7s.
Four T#!es of Documents
Microsoft 4ord treats pretty much all documents the same. .ut @ibre-ffice
comes (ith different levels of tools for different 7inds of documents. Although
there is some overlap, documents can be divided into roughly four categoriesF
Sim!le Documents li7e articles under "! pages in length.
6om!lex Documents li7e chapters under +! pages in length.
Multile3el :ooks li7e &rint on Demand boo7s under +!! pages in length.
<ebsites and 0books 6 (hich are the same length as a multilevel boo7 but
(hich have several additional characteristics.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age CD
Different T#!es of Documents reLuire Different $inds of Tools
4hen (riting a comple= five hundred page boo7, one of the biggest problems
any prospective author runs into is trying to 7eep their boo7 organiIed. /t is
important to understand that different types of documents reKuire different 7inds
of organiIational strategies and different 7inds of tools. .elo( is a table outlining
four different types of documents and strategies for creating and organiIing each
of them. 3his is follo(ed by a brief discussion of each type of document.
Document T#!e Maximum
W *a5es
W 4ma5es
Mo3e 1ith
Outline
Le3els
St#le T#!es
Simple Articles "! !
Cut?&aste
-ne
;eader 3ype
Manual Format
Styles
Comple=
Chapters
+! "!!
Cut?&aste
3(o
;eader 3ypes
Default Format
Styles
Multilevel &DF
and &-D .oo7s
+!! ",!!!
Separate
Folders
3hree
;eader 3ypes
Custom Format
Styles
Eboo7s Q
4ebsites (ith
Multiple &ages
+!! ",!!!
Separate
Folders
3hree
;eader 3ypes
;3M@ tags and
CSS Style Sheet
Sim!le Documents
Simple documents, li7e simple (ebsites or a single article, are typically under ten
pages and have only a fe( images. 3here is not much need for a published
outline or table of contents and there is typically one one header type and one
style type 5 such as a single font family and a single font siIe. Any formatting
changes to this default style can Kuic7ly be done manually by selecting the te=t
and then clic7ing on the icon, such as :old; in the Format 3oolbar. 3he article is
divided into topics 5 each (ith a topic heading in bold. Each topic is divided into
one or more paragraphs. 3his process (or7s (ell for short simple documents.
.ut it can create bad habits (hich turn into a disaster (hen trying to create
longer more comple= documents. Either MS 4ord or @ibre 4riter handles these
simple documents in about the same (ay. 3he structure of a simple document isF
Article Title
To!ic %... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic (... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic ,...6onclusion
3opic # &aragraphs 3e=t and /mages
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C*
6om!lex Documents
Comple= documents are up to +! pages in length and may have up to "!!
images. Comple= documents are more li7ely to come (ith a simple 3able of
Contents. Comple= documents are more than <ust a combination of simple
documents 6 because the formatting is no( better done by using a predefined
template (ith custom 1styles.2 3he @ibre -ffice template manager handles
templates and styles much better than MS 4ord. An e=ample of a comple=
document is a chapters (ith several sections. 3he structure of a comple=
document isF
Table of 6ontents... 6ha!ter Title
Section % Title
To!ic %.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic %.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic %.,...6onclusion
3opic # &aragraphs 3e=t and /mages
Section ( Title
To!ic (.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic (.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic (.,...6onclusion
3opic # &aragraphs 3e=t and /mages
Section , Title
To!ic ,.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic ,.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic ,.,...6onclusion
3opic # &aragraphs 3e=t and /mages
Multile3el :ooks
Multilevel &DF or 1&rint on Demand2 boo7s have up to +!! pages. .y multilevel, /
am referring to the fact that boo7s this long should come (ith a t(o to three level
3able of Contents 6 involving at least t(o different styles of headings. 3his is
(here @ibre -ffice 4riter e=cels. /t allo(s us to navigate among the various
sections of our boo7 (ith a uniKue tool called the 1Navigator.2 -nce done, @ibre
-ffice helps you e=port the resulting document as a &DF (ith full control over
both formatting and editing 6 another set of features not found in MS 4ord. 3he
structure of a multilevel boo7 isF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C:
3able of Contents
6ha!ter % Title
Section %.% Title
To!ic %.%.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic %.%.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic %.%.,...6onclusion
3opic # &aragraphs 3e=t and /mages
Section %.( Title
To!ic %.(.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic %.(.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic %.(.,...6onclusion
3opic # &aragraphs 3e=t and /mages
6ha!ter ( Title
Section (.% Title
To!ic (.%.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic (.%.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic (.(.,...6onclusion
3opic # &aragraphs 3e=t and /mages
Section ( Title
To!ic (.(.%... 4ntroduction
3opic " &aragraphs 3e=t and /mages
To!ic (.(.(... Main To!ic
3opic &aragraphs 3e=t and /mages
To!ic (.(.,...6onclusion
3opic # &aragraphs 3e=t and /mages
<ebsites and 0books
4ebsites and Eboo7s are very similar as both are formatted using ;3M@ tags
and CSS style sheets. .oth (ebsites and Eboo7s reKuire precise segregation of
images 6 meaning that the images are actually separate files Asuch as 9&E'
filesB (hich are placed in separate folders and then inserted as lin7s inside of the
;3M@ te=t document. ;aving spent many years building hundreds of (ebsites
and teaching courses in (ebsite design and construction, / am acutely a(are of
ho( difficult this process can be for the average (riter. @ibre -ffice 4riter has
numerous tools to ma7e this process much easier.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C)
4e (ill provide an overvie( of @ibre 4riter tools for creating &rint .oo7s and
Eboo7s in our ne=t chapter. .ecause this is a some(hat comple= topic, (e cover
ho( to use @ibre -ffice 4riter to create a &rint on Demand boo7 and?or an Eboo7
in our ne=t boo7 5 (hich is called 6reate #our o1n 0book usin5 Libre Office
<riter. ;o(ever, it is important to 7no( ho( @ibre 4riter does a much better <ob
helping you organiIe a comple= several hundred page boo7 than MS 4ord. 3he
beauty of @ibre 4riter is that it not only (or7s (ell for creating simple documents
but it also has all 7inds of tools for organiIing increasingly comple= documents.
@ibre -ffice 4riter is designed to be not only a (ord processor 5 li7e MS 4ord
!!# 5 but also an idea organiIer.
9istor# of Libre Office '
-nce you learn (hat a po(erful (ord processing tool @ibre 4riter is, you might
start to (onder (here such an incredible tool came from. 3he ans(er is that it
(as created gradually over a period of several years by thousands of
programmers (or7ing in the open source community. .ut it all started (ith a free
open source (ord processing program called Star -ffice (hich (as created in
'ermany and brought to the 0S in !!" and renamed -pen -ffice. /n 9anuary,
!"", -pen -ffice became encumbered (ith commercial conflicts. 3he ma<ority
of -pen -ffice developers left and started a ne( free open source pro<ect called
@ibre -ffice. /nitially, @ibre -ffice (as a clone of -pen -ffice. ;o(ever, over the
past three years, than7s to the (or7 of thousands of contributors, @ibre -ffice
has made huge strides in first matching and then passing Microsoft -ffice. 3he
latest version, @ibre -ffice C, (as released in February !"# and offers many
incredible features.
Fi3e Ad3anta5es of Libre Office o3er MS Office (/%, for sim!le documents
3here are at least five ma<or advantages of @ibre -ffice C over MS -ffice !"#
for creating simple documents.
First, @ibre -ffice costs much less. /n fact, it is free.
Second, @ibre -ffice is easier to install and reKuires much less space on your
computer.
3hird, @ibre -ffice is easier to use because it uses a single (ell structured menu
Ali7e 4ord !!#B rather than the ever changing 1ribbons2 of 4ord !!*, 4ord
!"! and 4ord !"#.
Fourth, @ibre -ffice is the (orld>s most compatible and versatile (ord processor.
/t can convert bet(een file formats and open different file formats. /t can also run
on several different operating systems.
Fifth, @ibre -ffice also offers D+! additional free tools, called e=tensions (hich
can be added to @ibre -ffice from the @ibre -ffice E=tension directory.
.elo( (e offer more details about each of these five advantages.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +!
W% Libre Office costs much less. 4n fact; it is free
Even if MS -ffice !"# (ere free, you (ould still be better off using @ibre -ffice
C. .ut the fact is that MS -ffice !"# is not free. /n fact, it is incredibly e=pensive.
3he complete version, (ith &ublisher costs nearly SD!!.
A big change in -ffice !"# compared to past versions of -ffice is that instead of
it being licensed for one user, it is only licensed for one computer. So if you have
three different computers in your house, and you (ant to use -utloo7, you are
loo7ing at spending S)!!. 3his is on top of paying a couple hundred dollars each
for 4indo(s : and (hatever you paid for your computers.
3o offset this dramatic increase in price, Microsoft is no( also offering something
called Office ,->. 3his allo(s you to rent -ffice for S"! per month. -ver the
normal four year life of a computer, this comes to SC:!. At this rate, 'od only
7no(s (hat they (ill charge to use the ne=t version of -ffice. No( imagine you
are running a small business (ith ten employees. 3o figure out (hat -ffice (ill
cost, <ust multiple all of the above numbers by ten. So the first reason move to
@ibre -ffice is to get off of the Microsoft price increase treadmillG
W( Libre Office is easier to install and reLuires less s!ace on #our
com!uter
-ne of the biggest advantages of @inu= Mint "+ Mate over Microsoft 4indo(s :
is that @inu= Mint comes (ith the (orldJs best (ord processor 5 @ibre -ffice C 5 for
free and it is preinstalled on @inu= MintG .y comparison, Microsoft 4indo(s :
does not come (ith any (ord processor 6 and to get MS -ffice !"# (ill cost
you hundreds of dollars over and above the cost of 4indo(s :. 3o install -ffice
!"#, you need to first go to the Microsoft store and set up an account and give
them your credit card number. $ou eventually get to the Do(nload page and
have to load this huge -ffice program file. /f you are using -ffice #D+ you also
get the <oy of paying monthly bills (ith your credit card. .ut (ith @ibre -ffice, if
you are using @inu=, it is already preloaded. /t comes free (ith @inu= Mint. /f you
are using 4indo(s and (ant to add @ibre -ffice, it is a simple matter of <ust
clic7ing on a couple of buttons. As for space, MS -ffice reKuires # '. on your
hard drive. @ibre -ffice is only +C+ M..
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +"
Do1nload and 4nstall Libre Office ' for <indo1s
3here is no need to do(nload or install @ibre -ffice if you are using @inu=. /t is
already there. ;o(ever, if you (ant to try @ibre -ffice side by side (ith MS -ffice
(hile in 4indo(s, you can easily do(nload it and install it. 3o get a free
do(nload of @ibre -ffice C for 4indo(s, go to their (ebsiteF
httpF??(((.libreoffice.org?
3hen clic7 on Do(nloads. -r go straight to the Do(nloads page.
httpF??(((.libreoffice.org?do(nload?
Clic7 on the Main 4nstaller to do(nload the file. 3hen save the file and the help
pac7 in your Do(nloads folder. 3hen run the @ibre -ffice file as an administrator
to install it onto your 4indo(s computer.
3hen clic7 on 4riter to create a ne( documentF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +
3here should no( be a @ibre -ffice icon on your des7top. /t doesn>t get any
easier than thisG
W, Libre Office is easier to use because it has a traditional menu
For many years, Microsoft used a simple fi=ed menu to allo( access to important
functions. .elo( is the -ffice !!# 4ord simple Menu.
$ou could customiIe this menu in many (ays to have Kuic7 access to (hatever
tools you used most. Each of the main tabs such as File; 0dit and Iie1 offered
fi=ed vertical drop do(n menus so that it (as very easy for even a novice to learn
and remember (here various tools (ere at.
4ith -ffice !!*, the simple fi=ed menu (as replaced (ith a comple= ribbonF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +#
3he File tab from 4ord !!# (as replaced by a 4indo(s icon in the upper left
corner. 3his (as very confusing to many novices. Clic7ing on the ;ome 3ab, the
/nsert 3ab or any other tab displayed a ne( horiIontal menu called a Aribbon2
instead of the traditional drop do(n menu. Above is the ribbon for the 19ome2
tab. 3he problem (ith the ribbons is that each contains many more choices than
the simple !!# 4ord vertical drop do(n menus. 3his not only meant a steeper
learning curve 6 but also slo(ed do(n (ord processing as you had to loo7
through many choices to find the one you (ant. Fol7s describe it as loo7ing for a
needle in a rather big hay stac7. /n addition, many of the functions (ere indicated
only by a very small icon 6 rather than the te=t menu items used (ith 4ord !!#.
3hus, one also had to remember (hat each icon did. ;aving been an adult
education instructor for more than ! years and having taught many students
both 4ord !!# and 4ord !!*, / can say for certain that 4ord !!# is easier
for students to learn than !!*.
/ can also confirm that the ribbon is one of the stupidest things Microsoft has ever
done. .elo( is the -ffice !"! 4ord ;ome Menu ,ibbon.
3his (as an improvement over the !!* 4ord menu because it replaced the
terrible 4indo(s icon (ith the traditional 1File2 tab. .ut it still used the craIy
ribbon. 3hus many still felt li7e they (ere loo7ing for a needle in a haystac7.
.elo( is the 9ome tab on the -ffice !"# 4ord menu.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +C
3here is a ne( tab called Desi5n (hich covers some of the functions (hich used
to be in the /nsert tab or the &age @ayout tab. 3his is a slight improvement
because it places fe(er choices on the /nsert and &age @ayout tabs. .ut the
SAI0 and SAI0 AS function have gotten much (orse. Clic7ing on File brings up
the same options. .ut clic7 on File, then clic7 on Sa3e or Sa3e As and you (ill
be in for a big surprise. 3he Sa3e function no( defaults to S7y Drive Aif you do
not li7e S7y Drive, then too bad for youB. 3he Sa3e As function adds an almost
useless intermediary screen to slo( you do(n.
.elo( is the @ibre -ffice 4riter Menu in 4indo(s A(hich uses 3imes Ne(
,omanB.
.elo( is the @ibre 4riter Menu in @inu= Mint A(hich uses a font called @iberationB
3his is the best part about @ibre -ffice. Sanity has returned. /f you have a
4indo(s H& computer (ith 4ord !!# 6 (hich is the case (ith one in three
computer users today 6 then you (ill have a much easier time using @ibre -ffice
than using MS -ffice !"#. Even if you have spent the past three years using
-ffice !"!, you (ill have an easier time using @ibre -ffice that MS -ffice !"#.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ++
W' Libre Office can con3ert bet1een file formats and o!en different file
formats 1ithout subEectin5 users to a bunch of fake 1arnin5s.
@ibre -ffice 4riter is not only compatible (ith all versions of Microsoft 4ord and
E=cel, it is also compatible (ith Microsoft &ublisher and Adobe &DF. /t is also
compatible (ith ;3M@ formatting used to create (ebsites and e5publishing
documents. /t has also resolved issues of past open source programs in
providing a more consistent display of tables, headers and footers.
You do not e3en need to install Linux to use Libre Office. Libre Office '
comes in 3ersions for <indo1s; A!!le and Linux. 4t is time for all of us to
Eoin the ,/ million !eo!le alread# usin5 Libre Office!
Libre Office <riter offers man# 6om!atibilit# Tools
Any time you (ant to open and (or7 (ith any document (ith @ibre -ffice, <ust
clic7 on this icon to open @ibre -ffice. 3hen clic7 on the 14riter2 icon to bring up
the 4riter document edit screen. $ou can create the document in @ibre -ffice
and then save it as a -DF or a 4ord document or even an ;3M@ file.

ODF O O!en Document Format (hich is the standard -pen Source document.
3he ending e=tension for an -DF document is odt.
@ibre-ffice 4riter also comes (ith a Document Conversion 4iIard for converting
documents bet(een @ibre-ffice and MS -ffice. -pen any doc or doc= document
(ith @ibre-ffice 4riter, then clic7 on File, 4iIards, Document Converter.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +D
3his brings up a simple tool for converting three ma<or types of 4ord documents.
Select 4ord document and @ibre-ffice 4riter (ill then create a copy of all MS
4ord Doc and DocH documents to -D3 files 6 (hile still retaining all of the MS
4ord Doc and DocH files. / (as able to convert D: Doc and DocH files to -D3
documents in a matter of a couple of minutes using this tool. @ibre -ffice also
comes (ith a 4eb 4iIard (hich can turn your document into an Eboo7. 9ust
clic7 on File, 4iIards, 4eb &age 4iIard.
6on3ersion 4ssues and MS Office Sabota5e
3here is almost no problem converting bet(een MS 4ord !!# D-C documents
and @ibre -ffice -D3 documents. 3he one real e=ception to this rule is that 4ord
te=t bo=es do not convert (ell. 3e=t bo=es should therefore be changed to
images before conversion. 3here is also not much of a problem using @ibre
4riter to convert @ibre -ffice -D3 documents to MS 4ord !!* D-CH
documents. ;o(ever, there are occasionally problems using MS 4ord to convert
D-CH documents to -D3 documents. 3he biggest problem is that D-CH
documents handle images in a much different (ay that -D3 or D-C documents.
3here is no benefit to the (ay D-CH handles images. /nstead it appears to be a
deliberate attempt to punish people (ho use either D-C or -D3 documents. /t
creates compatibility problems (hich force people to buy the latest version of MS
-ffice. For this reason, if you have friends (ho you (ant to share a file (ith (ho
use MS -ffice, (e recommend that you create the file as a <ord (//, DO6 file
rather than a <ord (//? DO6J file.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +*
4ith recent advances by @ibre -ffice, you may be able to save -D3 documents
as 4ord !!* documents and have the images turn out o7ay. 9ust chec7 the file
after you create it. Sadly, Microsoft is also (or7ing hard on ma7ing D-CH not
compatible (ith @ibre -ffice, so be careful and do not assume anything.
3here also seems to be a slight problem converting from one operating system to
another. /n a recent series of tests / did on file conversion using a very large
document (ith ! images, / (as able to convert documents bac7 and forth
bet(een file systems several times as long as / stayed inside of 4indo(s * using
MS -ffice !"! and?or @ibre -ffice C. / (as also able to convert bac7 and forth
bet(een file types in @inu= Mint using @ibre-ffice C. / (as also able to import
numerous files that had been converted bet(een DocH to Doc and DocH to -D3.
;o(ever, one document (hich had started out as Doc H in MS -ffice !"! and
then converted to -D3 and then converted bac7 to Doc H in MS -ffice !"! and
then imported to @inu= Mint and opened in @ibre-ffice 4riter (as corrupted and
most of the document (as lost. 3he lesson from this test is to create a bac7up of
any document you (ant to convert from one format to another 6 especially if you
are e=porting a document from 4indo(s?MS -ffice to @inu= Mint?@ibre-ffice.
2eal 3ersus Fake <arnin5 Messa5es
@ibre -ffice gives you a standard (arning (hen saving an -DF document as a
4ord documentF
3he odds are that the correct formatting is preserved over )!U of the time. So
feel free to convert -D3 documents to 4ord documents and 4ord documents to
-D3 documents. @ibre -ffice is very compatible (ith 4ord !!# and usually
compatible (ith 4ord !!*, 4ord !"! and 4ord !"#. /f you are (or7ing (ith
something really important, first ma7e a copy of the document. 3hen convert the
copy. 3hen chec7 the document for the correct formatting after you have saved it.
;o(ever, the (arnings are much more ominous (hen using MS -ffice. MS
-ffice claims that it can open an -D3 document. .ut <ust try it and you (ill get
this (arningF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +:
There is actuall# no !roblem 1ith the ODT document; but Microsoft is trying
to fool you into thin7ing that @ibre -ffice is not a good program. Clic7 on -8 and
you (ill get yet another ominous (arningF

Clic7 $es and the document opens (ithout any problem. ;o(ever, it does not
open as an -D3 document. /nstead it opens as a 4ord documentG 3his 7ind of
conduct is revolting because it is (orse than dishonest. /t is dishonest
manipulation. 3hen try to save a 4ord document as an -D3 document and you
(ill get this (arningF
Clic7 $es and there is no problem saving the document. 3hen close MS -ffice
and open @ibre -ffice and open the ne( -D3 document. 4hat you (ill find is
that there is no problem at all (ith the document.
;ote& (here may )e a pro)lem with ima#es when movin# to a different operatin#
system due to the way ima#es are stored in *S >ffice. So always ma"e a copy
of files )efore movin# them to a different operatin# system.
So even though @ibre -ffice and MS -ffice both claim to be able to open and
save documents in many formats, only @ibre -ffice does it (ithout a bunch of
ominous (arnings. 3he (arnings above are e=actly the 7ind of fa7e (arnings
Microsoft used to destroy D, D-S and 4ord &erfect in the early "))!Js. Despite
t(o different federal courts telling Microsoft to stop doing this, Microsoft
continues to lie to computer users in an effort to maintain their monopoly.
'iven that nine out of ten users still use and share 4ord doc or doc= files, / still
recommend sharing documents as 4ord !!# doc files. 3his means using the
@ibre -ffice SAI0 AS button and then selecting doc instead of the default open
document te=t file format A(hich uses the odt e=tensionB. .ecause fe( people
are a(are of MicrosoftJs attempts to sabotage @ibre -ffice, it is best to simply
save any documents you (ant to share as 4ord !!# documents in order to
avoid frightening your friends.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age +)
Another option is to save any document you (ant to share as a &DF and then
send that. .oth @ibre -ffice and MS -ffice can save documents as &DF
documents 6 but (ith @ibre -ffice, it is not done through the Save as type
function. /nstead it is done through File, Send As and then select &DF.
W> Libre Office offers (// additional free tools; called extensions 1hich can
be added to Libre Office from the Libre Office 0xtension director#.
3hese tools, themes and templates allo( you to even further customiIe and
e=pand the ability of your @ibre -ffice (ord processor. 4e cover ho( to add
e=tensions to @ibre-ffice 4riter at the end of the ne=t session.
/n the ne=t section, (e (ill first revie( ho( to customiIe the @ibre-ffice 4riter
menu bar and tool bars. 4e (ill then demonstrate ho( to add an e=tension and
provide a list of recommended e=tensions.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D!
?.( 6ustomiCe the Libre <riter Main Menu
The benefit of customiCin5 a toolbar is to add an# icons #ou like to use
and hide an# icons #ou ne3er use.
/n this section, (e (ill describe ho( to customiIe the main menu of @ibre-ffice
4riter. After installing @inu= Mint "+ and before starting to use @ibre-ffice, go to
the @inu= Mint control panel and clic7 on Appearances. ;ere you can install a
better bac7ground image 6 slightly dar7er so it is not so glaring on the eyes. $ou
can also changed the theme to a 4inWMe 3heme to ma7e the contrast in the
4indo( screen shots better. $ou should also right clic7ed on three applications
to put them on the des7top. 3hese are @ibre-ffice 4riter, Firefo= 4eb .ro(ser
and 3a7e Screenshot. 3hen clic7 on @ibre-ffice 4riter to open a ne( document.
;ere is my first screen shot of my ne( des7top 6 ta7ing (hile (riting this article.
Title :ar; Main Menu; Standard Toolbar and Formattin5 Toolbar
.efore (e begin changing the top menu, (e should first outline the four ro(s in
the top menu.
3he top ro( is the title bar. 3he second ro( is the menu bar. 3he third ro( is the
standard toolbar and the fourth ro( is the formatting toolbar.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D"
4e changed the color of 3itle bar by clic7ing on Menu, Control Center,
Appearances, 3hemes.
3he second ro( is the Main Menu. /t has nine menu items (hich (or7 in almost
the same (ay as 4ord !!#. 3he third ro( is the Standard 3oolbar. 3he fourth
ro( is the Formatting 3oolbar. 3hese last t(o toolbars can be deleted or modified
by going to the Main Menu and clic7ing on Eie(, 3oolbars.
3he first thing (e (ill do is turn off the ruler by going to Eie(, ,uler and
unchec7ing the bo= to the left of the (ord ,uler. 3his (ill give us more space in
the 4or7space and ma7e our display screen and screen shots less confusing.
Ne=t, (e (ill customiIe the Standard 3oolbar. 4e (ill then customiIe the
Formatting 3oolbar.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D
6ustomiCe the Standard Toolbar
3he benefit of customiIing a toolbar is to add any icons you li7e to use and hide
any icons you never use. 3o customiIe any toolbar, go to Eie(, 3oolbars,
CustomiIe. 3his brings up the CustomiIe 4indo(.
Clic7 on the 3oolbars tab.
3o add a command or icon, chec7 on it. 3o remove an e=isting command,
unchec7 its bo=. 4e (ill remove four commandsF Document send as email,
Format &aintbrush, Data Sources and Nonprinting characters. 3hen clic7 -8.
6ustomiCe the Formattin5 Toolbar
3o customiIe the formatting toolbar, clic7 Eie(, 3oolbars, CustomiIe to go bac7 to
the 3oolbars 3ab. 3hen use the Drop do(n arro( to the right of the (ord
Standard to select the Formatting 3oolbar. 4e (ill unchec7 : commands. 3hese
are 9ustify, @eft to ,ight, ,ight to @eft, Numbering, .ullets, Decrease /ndent,
/ncrease /ndent and ;ighlighting. 3hen (e (ill add one very useful command
called Select All. 3hen clic7 -8. 4e no( have a much simpler menu that (ill be
easier to (or7 (ith.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D#
;aving fe(er icons on the menu also allo(s us to narro( the screen siIe of the
@ibre-ffice 4riter (indo(. 3he benefit of this is that (e can have t(o documents
open side by side 6 to transfer content from one document to another. -r (e can
have one or more documents open in a cascade on the right side of our screen
(hile having our (eb bro(ser open on the left side of our screen. .elo( is a
screen shot of (hat my des7top loo7s li7e (ith three documents on the right in a
cascade and the (eb bro(ser on the left.
.eing able to have multiple (indo(s open side by side is one of the most
important reasons to turn off any unneeded icons. /t (ill also ma7e it easier for
you to remember (here the remaining icons are on your main menu.
Turn off <ord 6om!letion
A common complaint about @ibre-ffice 4riter is the very annoying (ord
completion function. 3his is a function (hich tries to complete long (ords for you.
3he problem is that most of the time, it guesses (rong and ma7es it harder for
you to type in the (ord you really (ant to use. 3o turn off 4ord Completion, go to
3ools, AutoCorrect -ptions. 3hen clic7 on the 4ord Completion tab. 0nchec7
Enable 4ord Completion. 3hen clic7 -8.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age DC
6ustomiCe Tools O!tions
-ur ne=t tas7 is to modify a fe( of the settings on the 3ools, -ptions (indo(.
Clic7 on 3ools, -ptions.
3ype in your name. 3hen clic7 on the Memory tab.
/f you insert a lot of images in your documents and (rite rather large and
comple= documents, one of the biggest problems (ith the default settings on
@ibre-ffice 4riter is the lac7 of memory. 3his can slo( do(n your (ord
processing and even crash the application. Another problem is that @ibre-ffice
(ill try to remember your last "!! steps. 3his (ill also use up memory. 3o solve
both of these problems, reduce the number of steps to !. 3hen increase the
'raphics Cache to "!! M. and increase the time to +! minutes. 3hen clic7 on
@oad?Save, 'eneral and raise the AutoSave time from "+ minutes to every #!
minutes.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D+

Addin5 0xtensions
.elo( is an e=ample of ho( to install a free e=tension. 3o reach the @ibre -ffice
E=tensions directory, go to htt!7MMextensions.libreoffice.or5M
3hen clic7 on 0xtensions.
3here are currently "): e=tensions (hich are listed by 1;ighest ,ated2, 1Most
Do(nloads2 1,ecently 0pdated2 and 1Ne(est2 $ou can also change the category
to <ust display e=tensions for 4riter, /mpress or Calc. 3o chec7 out the e=tensions
for 4riter, select these and then clic7 on Search. Scroll do(n a couple of pages
and you (ill find the follo(ing clip art e=tensionF

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age DD
3his e=tension not only gives you clip art, it also helps improve the appearance of
your tool bar icons. Clic7 on the E=tension to go to its page. Clic7 on the latest
release to do(nload it. Save the in your Do(nloads folder. 3hen open @ibre
-fficeF
3hen select 3ools, E=tension Manager.
$ou can also reach the E=tension Manager inside of @ibre 4riter by clic7ing on
3ools, E=tension Manager.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D*
/n the E=tension Manager screen, clic7 ADDF
3his opens up a bro(ser (indo(. Find the e=tension in your Do(nloads folder
and select it. 3hen clic7 -8. 3hen select All =sers. 3hen Acce!t the @icense
Agreement. Clic7 on the Close button at the bottom of the screen. $ou (ill need
to restart @ibre -ffice to access the e=tension. After installation, the e=tension (ill
be listed in the E=tension Manager (hich can be reached from the 3ools Menu
on the @ibre -ffice screen or the @ibre 4riter screen. After restarting @ibre -ffice,
clic7 on 3e=t Document to open @ibre 4riterF
4e no( have much nicer icons on the main menu 6 and a bunch of clip art in the
1'allery2 folder.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D:
Other !o!ular extension
.elo( are <ust a fe( of the many e=tensions you can add to @ibre -ffice.
*DF 4m!ort
3his e=tension enables you to ma7e minor modifications to the te=t of e=isting
&DF files (hen the original source files do not e=ist or you are unable to open the
source files. A4henever possible, modify the source and regenerate the &DF to
obtain the best results.B 4hen the e=tension is installed, &DF is listed as a choice
in the File 3ype drop5do(n list in the File ` -pen dialog. 3he best results can be
achieved (ith the &DF?-DF hybrid file format, (hich this e=tension also enables.
;ybrid &DF?-DF files (ill be opened in @ibre-ffice as an -DF file (ithout any
layout changes.
*resenter 6onsole
&rovides e=tra control over /mpress presentationsN for e=ample, the presenter
has ability to see the upcoming slide, the slide notes, and a presentation timerZ
(hile the audience sees only the current slide.
*rofessional Tem!late *ack 44
&rovides more than "! templates for 4riter, Calc, and /mpress. Available in
several languages. After you have installed this e=tension, you (ill find the
templates under File ` Ne( ` 3emplates and Documents.
Tem!late 6han5er Gfor <riterH
Adds t(o ne( items to the File ` 3emplates menu in 4riter that allo( you to
assign a ne( template to the current document or to a folder of documents. All
styles and formatting (ill be loaded from that template and the document (ill
behave as it (as created using that template.
Smart "aller# creates graphicsF
/n the ne=t section, (e (ill revie( ho( to create your o(n custom template for
your @ibre-ffice 4riter documents.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age D)
?., 6reate #our o1n 6ustom Tem!late
03en 1ith sim!le documents; it is useful to use a custom tem!late.
/n this section (e (ill revie( ho( to create your o(n custom template 6 (hich
can then be used as a model for creating all of your future documents.
A Look at the Default Tem!late
@ibre -ffice 4riter comes (ith a predefined template (hich cannot be changed. /t
can be found by going to Tools; O!tions; LibreOffice <riter; :asic Fonts.
Change the default font from @iberation Serif to @iberation Sans. 3hen clic7 -8.
No( clic7 on 3ools, -ptions to go bac7 to this screen. $ou (ill see that all of the
settings (ere changed to @iberation Sans. ;o(ever, if you clic7 on default, this
(ill restore the initial value of Serif. As Sans is much easier for many people to
read, clic7 @iberation Sans, then -8. $ou (ill no( see that all of the te=t in your
documents has changed from Serif to Sans and that the Default Style in your
Formatting 3oolbar has changed to @iberation Sans. 3o ma7e further changes in
your default document, (e need to create a custom template.
6reate #our o1n custom tem!late
A template is a special document (hich is used as a pattern for creating other
documents. 3o create a ne( blan7 template, clic7 on File; Ne1; Text Document
to open a ne( blan7 page. 4e can turn any document into a template by clic7ing
on File; Sa3e as Tem!late.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *!
3his brings up the 3emplate Manager. .y default, there are four categories of
templates. ;o(ever, t(o of the categories do not have any templates in them.
Clic7 on M# Tem!lates to place our ne( custom template in this category. 3hen
clic7 Sa3e. 'ive your ne( template a name and clic7 Accept.
So far our template is the same as the default template (e created (ith 3ools,
-ptions, @ibre 4riter Fonts. 3o further define our ne( custom template, clic7 on
File; Ne1; Tem!lates.
3his brings up the 3emplate Manager again 5 only this is a more comple=
template manager (ith four tabs at the topF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *"
3here is no( a single template in the My 3emplates category. Clic7 on My
3emplates to select it.
/f (e (ant to import a template (hich (as do(nloaded from the /nternet, (e
could clic7 on /mport and then bro(se to the ne( template. ;o(ever, (hat (e
really (ant to do is edit the ne( template (e <ust made. 3o do this, double click
on M# Tem!lates.
3hen clic7 on M# 6ustom Tem!late.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *
3his is the screen (here (e e=port any template (hich (e have created in order
to use our template on other computers or to post on the internet for other users
to copy. 3o ma7e it the default template for all of our ne( documents, clic7 on Set
as default. 3hen clic7 on 0dit.
3his (ill create something (hich loo7s <ust li7e a blan7 4riter document. .ut
instead of an -D3 e=tension at the end of the file name, it (ill have an OTT
e=tension. 3o define the page (idth and margins on our custom template, go to
Format; *a5e. 3hen clic7 on the *a5e tab.
/f you are (riting a boo7 or an eboo7, it is important to set the correct page (idth
at the beginning because this also determines the ma=imum image siIe.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *#
3he default page has very small margins of !.*) inches. Subtracting t(ice this
amount from the page (idth of :.+ inches leaves a te=t area of about D.) inches.
Most simple documents have a margins of one inch and a te=t area of D.+ inches.
;o(ever, most eboo7 readers have a screen (idth of D inches and most boo7s
also have a te=t area of D inches. Since my main usage of @ibre 4riter is to
create boo7s and eboo7s, / (ill set the left and ri5ht mar5ins for %.(> inches.
3his (ill result in a te=t area of D inches. / also recommend increasing the to!
and bottom !a5e mar5ins to %.// inches. 3his (ill result in a page height of )
inches. 3hen clic7 Apply. 3hen clic7 -8.
Add 6ustom St#les to #our 6ustom Tem!late G3ersus manual formattin5H
4ith simple documents, a common (ay to modify any te=t is by using the manual
icons in the Formatting 3oolbar at the top of the page. For e=ample, to change
the sub<ect title to bold, you (ould first select it and then clic7 on the bold icon.
3he problem (ith manual formatting is that if you ever (ant to change the font
type, font siIe or color of your sub<ect titles, you (ould need to go through the
entire document and ma7e the changes manually 6 one at a time. 3his can be a
nightmare if your document is +! pages long. A better faster and more consistent
(ay to control formatting is by using 1Styles2 to change any selected te=t.
4e (ill cover styles in more detail in the ne=t chapter 6 because styles are
essential for creating comple= documents. ;ere (e (ill simply create a couple of
custom styles to add to your custom template as a (ay to help you get started on
using style formatting instead of manual formatting. 3o create custom styles in
our custom template, (e first need to open our custom template by going to File;
Ne1; Tem!lates, then clic7ing on the template to select it. 3hen clic7 on 0dit. 3o
bring up the Styles 4indo( in the template, clic7 on Format; St#les and
Formattin5.
4e (ill format ;eading to use (ith our template. .ut first, (e (ant to 1doc72 the
Styles 4indo( to the left side of our template (or7space. 3o do this, grab the top
of the (indo( (ith your pointer and hold do(n your pointer to drag it to the left
side of the screen until your pointer is right at the edge of the screen. 4hen you
see the guide shado( turn on, release the pointer and the Style 4indo( (ill
snap in place.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *C
/n the ne=t chapter (e (ill (or7 more (ith the various types of styles. .ut for
no(, (e (ill customiIe a 1hierarchical2 style called ;eading . 4e (ill use
;eading to create our Document, Article, and Section 3itles. 3hen (e (ill use a
similar process (ith ;eading " to create our Chapter 3itles. 3o modify the
;eading style, clic7 on it to select it. 3hen right clic7 and select 1Modif#.2 3his
brings up the &aragraph Style ;eading Edit 4indo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *+
4e (ill first change the font. So clic7 on the Font tab.
;eading is currently set for .old /talic "C point. 4e (ant <ust .old, but "D point.
3hen clic7 Apply. Ne=t clic7 on the /ndents and Spacing tab.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *D
Change .efore 3e=t indent to Iero and First @ine /ndent to Iero. Also reduce
Above &aragraph spacing to &oint -ne inches and increase .elo( &aragraph
Spacing to &oint -ne inches.
3hen clic7 Apply. 3hen clic7 -8. Ne=t, clic7 on 9eadin5 %, then right clic7 and
select Modif#. .y default, ;eading " is set for .old "D point (hich is e=actly
(hat (e (ant. Clic7 on the /ndent and Spacing tab and change these to match
the ;eading settings e=cept reduce the .elo( &aragraph setting to Iero. Also
change the font color to green and ma7e it underline. 3hen clic7 Apply and -8.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age **
6reate a File 2eminder
-ur final tas7 is to create a reminder that the first step in creating a ne(
document is giving the document a title, then giving it a file name by copying and
pasting it into a folder. .elo( this (e (ill type in a brief first sentence.
Select this 9eadin5 ( text and re!lace it 1ith #our title. Then select it a5ain;
co!# it and click on File Sa3e to !lace it in a folder and 5i3e it a file name
.egin your first paragraph by replacing this te=t.
Clic7 File Sa3e to save these changes to your custom template. 3hen File
6lose. No( on any open 4riter document, clic7 File; Ne1; Text Document to
create a ne( document. 3o give this document a file name, select the title te=t
and replace it (ith your title.
Notice that the template even saves the Style 4indo( being doc7ed. 3o save this
ne( document, select the title, then copy it. 3hen clic7 on File, Save. 3hen select
the folder you (ant to put the document in. .elo( (e have selected the Des7top.
.ut in general, (e (ant to place documents inside of the Documents Folder.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *:
4e can create category folders inside of the Documents folder if (e (ant and
place the document there.
-nce the correct folder is chosen, paste the title name into the 1Name2 bo= and
clic7 Save. As you enter te=t on your ne( document, each time you enter a ne(
sub<ect title, <ust select it and instead of clic7ing on the :old icon, clic7 on
;eading # instead. 3his (ay if you ever (ant to change the font on all of your
sub<ect title headings to a different color, all you need to do is change the font
color on ;eading #. /f you placed your document in the Des7top folder, @ibre
4riter (ill also place an icon for this document on the Des7top.
4e no( have our first custom template and our first document. /n the ne=t
section, (e (ill add more free tools to @ibre 4riter.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age *)
?.' More Free Tools for Libre <riter
There are o3er -';/// free o!en source tools a3ailable in the Linux Mint
Soft1are 6enter. Man# of these also 1ork 1ith Libre <riter.
/n this section, (e (ill add several more tools to @ibre -ffice 4riter to help ma7e
creating documents easier.
Turn off the Touch *ad
A nagging problem in (riting articles (ith @ibre 4riter is that the pointer and
screen and scroll bar all tend to <ump around if you have a sensitive touch pad.
3his is not the fault of @ibre 4riter. /nstead, it is an issue (ith ho( @inu= Mint
handles the touch pad on your 7eyboard. /f you use a mouse li7e / do, you have
t(o options. 3he easiest (ay to stabiliIe your pointer is to open the 6ontrol
6enter in your Mint Menu and clic7 on the Mouses /con (hich is in the ;ard(are
section.
3his brings up the Mouse *references (indo(.
Clic7 on the Touch!ad tab and then chec7 1Disable touchpad (hile typing.2 3his
(ill 7eep the touch pad off (hile you are typing and about t(o seconds after you
stop typing.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :!
Add a Free Touch *ad 6ontrol Tool
0nfortunately, for many of us, this is not good enough. 4e need the touch pad to
be completely off to 7eep the pointer from accidentally <umping. 3o get a better
tool to control the touchpad, clic7 on the Soft(are Center (hich is also in the Mint
Menu. 3hen type in 1gpointing5device5settings2 in the Search .o=. 3his (ill bring
up t(o results. 3he i#:D version is for # bit computers and the unmar7ed
version is for =DC bit computers.
Clic7 install. 3his adds a ne( entry to the Control Center called &ointing Devices.
First clic7 on Mouse &references and turn off 1Disable 3ouchpad (hile typing2 as
the Mouse settings override the &ointer settings. 3hen clic7 on the &ointer icon to
bring up the 'pointing Device Settings 4indo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :"
Clic7 Disable touchpad 6 or disable (hile other devices are connected. 3hen
clic7 -8. $our touch pad (ill no( stay off for as long as your computer is turned
on. Note ho(ever, that (hen you restart your computer, you (ill need to repeat
the processF unchec7 Disable 3ouchpad, then clic7 -8. 3hen open it again and
chec7 Disable 3ouchpad again. 3hen clic7 -8.
=se 9istor# Master to 4ncrease the Number of 2ecent Documents
4hen you first open @ibre 4riter, it is common to loo7 through a list of ,ecent
Documents to find one you recently (or7ed on and (ould li7e to use again. 3his
list is found by going to File, ,ecent Documents. .y default, the ma=imum
number of ,ecent Documents stored in @ibre 4riter is ten. 3han7fully, there is a
simple e=tension that allo(s you to increase the number of documents in ,ecent
Documents to (hatever you (ant. 3o get this e=tension, go toF
httpF??e=tensions.services.openoffice.org?pro<ect?;istoryMaster.
@i7e nearly all -pen -ffice e=tensions, ;istory Manager also (or7s (ith @ibre
-ffice. Clic7 on "et 4t to do(nload it. 3hen save the e=tension to your Do(nloads
folder. 3o install this e=tension, go to Tools; 0xtension Mana5er and clic7 on the
ADD button. 3hen bro(se to the e=tension to select it.
Accept the terms. 3his puts the ;istory Manager in the Active E=tensions folder.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :
4hile (e are here, (e (ill also add t(o more e=tensions from the @ibre-ffice
e=tensions manager. 3hese are called O!en 6li! Art and 0*6 . (hich is a flo(
chart creator. Ne=t, close all documents and close @ibre-ffice. 3hen restart
@ibre-ffice 4riter and go to Tools; Add Ons; 9istor# Mana5er.
Change the @ist SiIe from "! to ! so you can have more files in your list of
,ecent Files. 3hen clic7 on A!!l# 6han5es and (ait for one minute. 3hen close
;istory Manager. /t (ill ta7e a (hile for your list of recent documents to increase.
.ut each time you open and close a document (ith @ibre-ffice, ;istory Manager
(ill add it to the ,ecent Documents list. ;istory Manager also add a ne( menu
item to the File @ist called 2ecent Documents of the same T#!e.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :#
Add a :etter Screen 6a!ture Tool
3he default screen capture tool that comes (ith @inu= Mint has a couple of minor
problems. 3he biggest problem is that it does not really optimiIe the image file
siIes of images very (ell. .ecause my instructional guides involve a lot of
images, the result is that my article, chapter and boo7 file siIes (ind up being too
big. /n addition, if / post images (ith large file siIes on my (ebsites, the loading
time is slo(ed do(n considerably. 3han7fully, there is an e=cellent screen
capture tool called Shutter available in the Soft(are Manager. 0sing this tool, you
can reduce your image file siIes (hich ma7es your documents smaller and your
(eb pages load faster. 3o add this tool to your computer, go to the Main Menu
and clic7 on Soft(are Manager.
Enter shutter into the search bo=. 3hen clic7 on Shutter to reach its screen. 3hen
clic7 on 4nstall.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :C
3o put Shutter on your des7top, clic7 on the Mint Menu and clic7 on
Accessories.
3hen right clic7 on Shutter and drag it to the des7top. 3hen clic7 on Shutter to
open it. Clic7 on 0dit; then *references to open the &references (indo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :+
Change the image format to +*0" and select Automaticall# co!# to cli!board.
3hen set capture for a delay of # seconds. 3hen clic7 Close.
3here are several (ays to capture images (ith Shutter. 3o capture a region, clic7
on Selection. 3o capture any particular open (indo(, clic7 on the dropdo(n
arro( to the right of 4indo(. 3o capture a comple= dropdo(n menu, clic7 on the
Menu /tem. .elo( is an e=ample of shutter capturing a comple= menu.
3his same image is placed in the Shutter (or7space.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :D
$ou can also edit images by clic7ing on Edit.
3his is (hat the image loo7s li7e after adding some arro(s and te=t to help clarify
(here a person should clic7 to open the 3emplate Manager.
4e no( have a screen capture tool (hich saves 9&E' images and allo(s
editing of screen captures.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :*
Set Libre Office as Default 0ditor
3he default te=t editor for @inu= Mint, (hich is called &luma, does not have very
many editing options. /f you go to the 6aEa File mana5er and right clic7 in the
(or7space to create a ne( document, @inu= Mint (ill open a te=t Editor called
&lumaF
4e (ould rather have the Mint file manager open Libre <riter because this is
the 1orldBs best text editor 3o ma7e this change, go to 6ontrol 6enter; Other;
*referred A!!lications; s#stem tab; set Text 0ditor for Libre Office.
No( open the file manager and right clic7 on the (or7space and select 6reate
Document; 0m!t# File.
3hen clic7 on the ne( file to open it. /t should no( open in @ibre 4riter.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ::
Add #our !rinter to Linux Mint
3o install your printer on @inu= Mint is usually a pretty simple matter. 'o to
Control &anel, &rintersF
3hen clic7 on *rinters. 3hen clic7 on ADD
Select the printer you (ant to use, then clic7 For1ard. @inu= Mint (ill search for
a driver for this printerF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age :)
3ype in the name you (ant to use for this printer. 3hen clic7 A!!l#.
Clic7 *rint Test *a5e.
CongratulationsG $ou no( have your printer hoo7ed up to @inu= Mint.
<hatBs Next
3his completes our customiIation of @ibre-ffice 4riter. /n the ne=t chapter, (e
(ill revie( the benefits of @ibre -ffice 4riter for creating comple= documents,
print boo7s and eboo7s. 4e (ill then ta7e a loo7 at LibreOffice 6alc to see ho(
easy it is to create a chart (ith @ibre-ffice. Finally, (e (ill revie( ho( to create a
presentation (ith LibreOffice 4m!ress.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )!
6ha!ter ... 9idden :enefits of Libre Office
Chapter : includes the follo(ing four sectionsF
:." Advantages of @ibre 4riter for Creating a &rint or E.oo7
:. Create your o(n custom styles
:.# 0se @ibre -ffice Calc to create a chart
:.C 0se @ibre -ffice /mpress to ma7e a slide presentation
3he first section describes seven fantastic tools (hich @ibre 4riter provides to
help you (rite and organiIe a print and?or eboo7.
3he second section revie(s ho( to create your o(n custom styles and add them
to your custom template.
3he third section demonstrates ho( easy it is to create a chart using @ibre Calc.
3he fourth section revie(s ho( to ma7e a slide presentation (ith @ibre /mpress.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )"
.% Ad3anta5es of Libre <riter for 6reatin5 a *rint or 0:ook
Microsoft 4ord tends to treat all documents as if they (ere simple documents. /t
is li7e trying to build a house (ith only a hammer and a sa(. @ibre -ffice also
includes the hammer and sa(. .ut it also provides you (ith a set of blueprints
for organiIing the construction process and a (hole team of specialists for doing
the foundation, framing, dry(all, plumbing and electrical tas7s.
3he initial interface, tool bars and menus of @ibre 4riter do a great <ob of creating
and editing simple documents. /n addition, @ibre -ffice also offers a (hole range
of tools for creating, organiIing and editing very comple= documents such as C!!
page boo7s.
Se3en Tools Libre <riter offers for or5aniCin5 com!lex documents
3he follo(ing are seven e=tremely important tools @ibre 4riter offers to help you
organiIe your &rint .oo7 and?or Eboo7.
First, the Libre <riter Master Document can be used to combine documents
into an overall 3able of Contents.
Second, the Libre <riter Na3i5ator can be used to navigate bet(een files and
sub5files in the Master document.
3hird, the <riter St#les <indo1 (hich allo(s precise control over every aspect
of every document.
Fourth, the *a5e St#les function allo(s different formatting of different pages.
Fifth, 4riter *ara5ra!h St#les can be tied into a @in7able 3able of Contents.
Si=th, as of 9uly !"#, 4riter C." offers an incredible ima5e o!timiCation tool .
essential for publishing an E.oo7 or posting your articles to a (ebsite.
Seventh, 4riter also offers advanced *DF im!ort and ex!ort functions.
.elo(, (e (ill revie( all seven of these tools.
W% Libre <riter Master Document
-ne of the ma<or problems of (riting a boo7 is that the file siIe gets so large that
it eventually crashes your (ord processor and?or freeIes your computer. 3his is
especially true if your boo7 includes hundreds of images. 3he benefit of the @ibre
4riter Master Document is the ability to (rite each chapter as a separate
document and then tie them altogether at the end into an overall Master
document. 3o create a Master document for (riting a boo7, clic7 on File; Ne1;
Master Document. 3here is a close relationship bet(een this Master document
and the @ibre 4riter Navigator (hich is described ne=t. 0sage of the Master
document and Navigator is beyond the scope of this boo7. .ut (e do cover it in
detail in our ne=t boo7 (hich is called 6reate #our o1n 0book . 1ith Libre
Office.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )
W( The Libre <riter Na3i5ator
3he Navigator helps you <ump bac7 and forth in a document not <ust by heading
styles, but by any type of ob<ect you care to nameF tables, frames, images, lin7s,
or anything else. For this to (or7 (ell, you need to 7eep your tables and images
(ell named and (ell organiIed. Moreover, since the Navigator is a floating
(indo(, you can place it any(here on the screen, so that it doesn>t reduce the
siIe of the editing (indo(. 3his is important (hen editing even and odd paged
documents (here you (ant to set up the editing (indo( to display t(o pages
side by side. 3o open Navigator, go to Iie1; then Na3i5ator.
/n addition, the Navigator can be used as a multilevel outline and a table of
contents for a master document made up of smaller documents. 3his is very
important (hen you are (riting and organiIing a print boo7 or an eboo7 (hich is
C!! hundred pages long and is therefore best divided into "! smaller documents,
files or chapters each of (hich is about C! pages long. 3he longer the document,
the more you need the @ibre 4riter Navigator and Master Document.
W, The St#les and Formattin5 <indo1
Another floating (indo(, Styles and Formatting, places all of @ibre-ffice>s five
categories of styles 5 paragraphs, characters, frames, pages, and lists 5 (ithin
easy reach and allo(s easy creation and modification of styles. $ou can easily
and Kuic7ly apply any style to your document in order to see (hat it loo7s li7e. 3o
reach the Styles 4indo(, go to Formattin5; St#les.
4e (ill cover style formatting options in greater detail in the ne=t section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )#
W' <riter *a5e St#le O!tions
/n 4ord, you can ad<ust some limited page features such as margins columns.
.ut all paragraphs have the same alignment and different formatting for different
pages is difficult. 4riter>s addition of page styles gives you far more fle=ibility. .y
careful use of the -rganiIer tab, you can set your document to change page
styles automatically, so that a First &age style is al(ays follo(ed by a @eft &age
and a @eft &age by a ,ight &age. Since headers and footers are also attached to
page style, you can also use different header and footer styles automatically to
create a different layout for the left or even pages than you have on the right or
odd pages. 3o reach the &age Styles Default Style screen, go to Format, &ages.
W> 9ierarchical *ara5ra!h St#les linked to #our Table of 6ontents
4ord generates tables of contents using e=isting templates. ;o(ever, the result
is not editable, and invariably loo7s bad. 4riter provides a far (ider range of
possibilities. $ou can ad<ust the position of all the components of a table of
contents entry, or determine (hether they appear at all. Each level of the table
includes its o(n editable paragraph style, and, (hile 4riter, li7e 4ord, assumes
you (ill use heading styles to create entries, you can also manually enter other
mar7ers if you (ish. 3he result is a far more fle=ible set of design options (hich
can be easily edited and updated. 3o see the (indo( lin7ing the Styles to your
3able of Contents, clic7 on /nde=es and 3ables. 3hen clic7 on Styles.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )C
W- <riter 4ma5e O!timiCation Tool
4ith 4riter C.", all you need to do to optimiIe any image in any document is to
right clic7 on it.
3his brings up a (hole selection of image ad<ustment options. 3he most
important of these for those (ishing to publish their information as an eboo7 or
(eb page is the 1compress graphic2 tool.
Clic7 on 6alculate to determine the e=act file siIe after compression.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )+
3he tool also automatically converts inefficient &N' images into efficient 9&E'
images. /t is typical for image file siIes to be reduced my :!U or more 6 meaning
your (eb page (ill load four times faster than if you had used images (hich (ere
not optimiIed. /n addition, &DF documents can be transferred much more rapidly
if the images are optimiIed.
W? Ad3anced *DF 4m!ort; 0dit and 0x!ort O!tions
.oth 4riter and 4ord support saving a file as &DF. ;o(ever, 4ord provides only
basic options. 4riter>s E=port to &DF function provides an e=haustive set of
options for those (ho (ant them. /nstead of 4ord>s vague options for Kuality,
4riter lets you set the e=act image Kuality and resolution. $ou can also set
e=actly ho( lin7s in the original are handled and set the details of the initial vie(
for the &DF (indo(. Most important, you can add a free tool to @ibre 4riter (hich
allo(s you to not only create &DF documents 5 but also to import them and edit
themG 'iven the importance of &DF creation to modern print on demand
publishing, if you are (riting a self publish boo7, you really should use @ibre
4riter. 3o reach the @ibre 4riter &DF e=port (indo(, go to File, E=port as &DF.
4e (ill cover all seven of these tools plus many more in our ne=t boo7, called
6reate #our o1n 0book 1ith Libre Office <riter. ;o(ever, because Styles are
so important even if you are not (riting a boo7, (e (ill spend some more time on
this topic in the ne=t section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )D
.( 6reate #our o1n custom st#les
4t is a 5ood idea to kee! the St#les <indo1 o!en and sna!!ed to the left
side of #our document 1indo1 1hene3er #ou are creatin5 a com!lex
document or ebook in order to ha3e Luick access to all fi3e t#!es of
st#les.
$ou can bring up the Styles 4indo( by clic7ing on F%% on your 7eyboard or by
clic7ing on Format; St#les in the Main Menu. 3he top bo=es in the Style 4indo(
are the five categories of styles on the left and style edit functions on the rightF
/f you plan on (riting an E boo7, or posting your articles on a (ebsite, you should
consider changing from the traditional (ay of formatting te=t Aby manually
specifying the font (eight and siIe of each lineB to using styles to format te=t. For
e=ample, you can have a style called ;eading for Section 3itles (hich is
defined to be font siIe "C and font (eight bold. 3hen instead of selecting the te=t
for your title and selecting the font siIe and font (eight, you simply select the
style called ;eading .
3he benefit of using styles instead of manually changing te=t is that your Eboo7
(ill automatically create an outline or 3able of Contents based on listing all of the
style entries (hich have been defined as ;eadings. For e=ample, chapter titles
might use a style called heading " (hile sections in the chapter might use a
smaller style called heading . Another benefit of using styles is that should you
decide you (ant to change the section headings to a larger font 5 such as "D 5
and you (ant to change the font color to blue, all you need to do is change the
style definition and all of the ;eading styles (ill automatically be updated to the
ne( style. A third benefit of getting in the habit of using styles is that your boo7
(ill have a more consistent appearance and therefore be easier to read and
understand. A fourth benefit of using styles is that they can be easily converted to
CSS Style Statements for use in creating a CSS Style Sheet 6 (hich is the file
that controls the appearance of your ;3M@ based eboo7.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age )*
:efore Addin5 St#les #ou must first clear all Manual St#les
Manual styles and eboo7 styles do not mi= (ell. 0nfortunately, manual
formatting, (hich is also called direct formatting, can not be over5ridden by
applying a style to it. 3herefore before applying any styles to your document, you
first need to clear or remove all manual styles. 3o do this, open your document
and clic7 on SE@EC3 A@@. 3hen in the top menu, clic7 on Format, Clear Direct
Formatting. Alternately, you can go through your document and individually
replace all direct formatting (ith style formatting. 3he problem (ith this is that it is
difficult to tell if a particular set of bold te=t (as formatted manually or (ith a
style. After selecting te=t, you need to pay careful attention to the Style .o=. /f
you have bold te=t and it still reads 1Default Style2 then it (as manually
formatted. /f it reads 1;eading2 follo(ed by a number then it has already been
styled (ith that ;eading Style.
St#le 6ate5ories 3ersus St#le "rou!s
@ibre 4riter divides styles into five categories. 3hese are page styles, paragraph
styles, character styles, frame styles and list styles. 4ithin a given category,
styles can be further divided into style groups. .elo( is a brief description of
each of the five style categories.
6reate a 6ustom *a5e St#le
&age styles control the appearance of an entire page. @ibre 4riter allo(s us to
define different styles for different pages. For e=ample, different sections of the
boo7 can have different page styles. 3he 1default2 page style is reached by going
to Format; *a5e.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ):
;o(ever, you can create a custom page style by clic7ing on the *a5e St#les
4con in the Styles (indo(.
3hen right clic7 on Default St#les and select Ne1.
3ype in the name of the ne( page style. 3hen clic7 A!!l#. 3hen clic7 O$. 3he
ne( custom page style (ill sho( up in the list of page styles in the Style 4indo(.
6reate a 6ustom *ara5ra!h St#le
&aragraph styles are the most common type of style. 3hey are styles (hich can
be applied to an entire group of te=t such as a paragraph or a sub<ect title.
-ne of the most common usages of paragraph styles is to create and format a
3able of Contents for your document.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ))
;o(ever, not all paragraph styles can be used for this purpose. @ibre 4riter uses
1@evels2 to structure the 3able of Contents. 3he 3itle is the 3op @evel (hich may
be the same of the entire boo7. 3his is follo(ed by @evel " (hich is li7ely to be
used for the names of chapters. @evel is li7ely to be used for Section 3itles. 3he
follo(ing image sho(s a list of paragraph styles (hich can be selected and then
applied to the 3able of Contents @evels. /n addition to the styles on this list, any
custom styles (hich you create (ill also appear on the list. /n fact, one of the
benefits of creating a custom style is to insure that it sho(s up on this list. 3o
insert a 3able of Contents 6 or to simply see this list 6 go to /nsert, /nde=es and
3ables. 3hen select /nde=es and 3ables. 3hen select the Styles tab.
/f you (ant to change a paragraph style for all of your documents, you should
ma7e the changes in your Document 3emplate. 3o change a single document,
use the Style 4indo( for that document.
3o create a ne( custom paragraph style, first clic7 on &aragraph Styles /con in
the Styles 4indo( to bring up the list of &aragraph Styles.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!!
3hen right clic7 on the Default Style Aor a ;eading Style or (hatever style you
thin7 is closest to the style you (ant to createB. 3hen select Ne(.
/t is important (ith custom styles to add a number such as " to the beginning of
the name of your custom style as this (ill cause your custom styles to al(ays
sho( up at the top of the paragraph styles list.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!"
6reate 6ustom 6haracter St#les
Character styles control special (ords or phrases (ithin a paragraph. 3his
includes (ords that you (ant in bold. 3o bring up the list of Character Styles,
clic7 on the 1a2 at the top of the Styles (indo(.
3he 1Emphasis2 character style is li7e clic7ing on /talic in the top menu. 3he
1Strong Emphasis2 character style is li7e clic7ing on .old in the top menu. 3he
difference is that if at some point in the future, you (ant to change the style of all
bold (ords, it can be easily done by modifying the character style 6 (hereas if
you use manual formatting, you (ill need to go through your entire document and
change each bold (ord one at a time.
0liminate the =nderline from 4nternet Links
Character styles are also used to define the style of /nternet @in7s and /nde=
lin7s. So if you (ant to change your internet lin7s on all of your documents so
that they are not underlined, first open your default template by clic7ing on File,
Ne(, 3emplates, then selecting the default template and clic7ing on Edit. 3hen in
the Style 4indo(, clic7 on Character @in7s. 3hen clic7 on /nternet @in7 to select
it. 3hen right clic7 and select Modify. 3hen clic7 on Font Effects. For underling,
change the selection from Single to 4ithout A(hich is <ust above Single in the
listB. 3hen clic7 Apply. 3hen clic7 -8.
$ou should also eliminate the underline from the 1Eisited /nternet @in7s2 (hich is
at the very bottom of the list of character lin7s.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!
Add an =nderline 6haracter St#le to #our 6ustom Tem!late
3here is one common formatting option (hich is not in the list of default character
styles. 3his is the underline function. 3o create an 0nderline character style in
your default template, first open the template to the edit screen. 3hen clic7 on the
character icon at the top of the Style 4indo(. 3hen select the default style and
clic7 ne(.
Name the character style 0nderline. 3hen set the @in7ed (ith to 1None.2 3hen
clic7 on Font Effects and change the 0nderline from 14ithout2 to Single. 3hen
clic7 Apply. 3hen clic7 -8.

A!!l# St#les @uickl# and 0asil#
3he most common (ay to apply a style is to select the te=t you (ant to style and
then clic7 on the Styles icon (hich is at the far left side of the formatting tool barF
Clic7ing on this icon brings up the formatting optionsF
0sing the Apply Styles drop do(n arro( to bring up the current Apply Styles listF
Clic7 on the drop do(n arro( to the right of the current style bo= to bring up a list
of all styles than have been used so far in your document.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!#
/f you (ant a ne( style you haven>t used yet, clic7 on M-,E to bring up the
Styles bo= (ith all of the styles. Clic7 on the drop do(n arro( at the bottom of the
styles list and you (ill see that there are many different 1groups2 of stylesF
-ne of the more important groups of styles for an Eboo7 are ;3M@ styles.
4hile all of these styles are preformatted, meaning that you <ust need to clic7 on
them to apply them, it is useful to 7no( (hat the preformatting is in case you
(ant to change it to something else. 9ust clic7 on the style and the font type and
(eight (ill be displayed on the formatting tool bar.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!C
Modif# an 0xistin5 St#le
Any style changes you ma7e in any document (ill only apply to that document.
3o permanently modify a style, you must edit the template. 3o change a style
from the Style 4indo(, first select the Style Category you (ant by clic7ing on
one of the five Category /cons at the top of the Style 4indo(. 3hen, right clic7 on
the style you (ant to change and select Modify. .elo( (e have selected the
&aragraph styles category and (ithin this (e have selected the Default styleF
3his brings up the &aragraph Styles Edit screen (ith several tabs that can be
changedF
Clic7 on the font tab to change the font family, siIe and (eight. 3hen clic7 Apply.
3hen clic7 -8.
=!date a document from a modified tem!late
<o appl all of the stles of our modified default template to an existin"
document# first sa6e and close all of our open documents and close Libre
!ffice. <hen restart Libre !ffice and open an document ou want to appl the
new template to. 5efore the document opens# the follo(ing message (ill appear.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!+

7ote that this messa"e onl appears when chan"in" the default template. Clic7
0pdate Styles to change the styles in the document. .e a(are that you only get
one chance to update a document this (ay. /f you clic7 8eep -ld Styles, the old
styles (ill remain and then must be changed (ithin the document itself.
Addin5 tem!lates from other sources
@ibre -ffice has lots of templates you can add. 3o see the list of templates, go toF
httpF??templates.libreoffice.org?template5center
Select the category called .oo7 3emplatesF
Clic7 on it to open itF 3hen clic7 on the Iipped file to save it in your Do(nloads
folder. 3o open the Iipped folder, clic7 on the ;ome folder. 3hen clic7 on the
Do(nloads folder. 3hen right clic7 and unIip the folder (ith E=tract ;ere.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!D
Each of the five folders can be opened and then the files inside can be opened
one at a time and saved as templates. $ou can also find more free templates,
including 8indle Eboo7 templates at the -pen -ffice E=tension Directory.
httpF??e=tensions.services.openoffice.org?
Nearly all -pen -ffice 3emplates and E=tensions also (or7 for @ibre -ffice.
<h# a $indle Tem!late8
3he AmaIon 8indle is the most popular type of Eboo7 reader. ;o(ever, the
8indle has a very narro( si= inch screen (hich is too narro( to read documents
that (ere (ritten on a regular page siIe AAC or letterB. 3his template overcomes
that problem by using a AD page siIe (ith customiIed margins that fits (ell on
the 8indle screen. 3he document can be e=ported as a &DF in order to be read
on the 8indle.
<hatBs Next8
3his completes our basic introduction to formatting and using @ibre 4riter. /f you
are interested in creating your o(n &rint .oo7 or Eboo7, you should consider
reading our complete boo7 on this topic called 6reate #our o1n 0book =sin5
Libre <riter. /n this boo7, (e go into more detail on creating a Master document
and 3able of Contents as (ell as creating custom styles for an eboo7,
/n the ne=t section, (e (ill revie( ho( to use @ibre -ffice Calc to create a
custom chart. 3hen (e revie( ho( to use @ibre -ffice /mpress to create a
custom presentation.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!*
., =se Libre Office 6alc to create a chart
3he @ibre -ffice Calc chart creation process is very similar to the process used
(ith the MS -ffice !!# E=cel chart (iIard. /n many (ays, it is even simpler.
;aving spent many years ma7ing hundreds of charts and teaching others ho( to
ma7e charts, and having spent the past three years dealing (ith the ridiculous
process used by the -ffice !"! E=cel Chart 4iIard, / am e=tremely impressed
by the @ibre-ffice C Chart 4iIard. /t is a much more logical process than the ne(
-ffice chart (iIard. 3o open @ibre -ffice Calc from the 4riter Menu, clic7 on File;
Ne1; S!readsheet.
3his (ill bring up the Calc 4indo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!:
4e (ill convert the follo(ing table to a chartF
4indo(s Eersion ,ecommended Space
on ;ard Drive AM.B
4indo(s #." "+
4indo(s )+ +!
4indo(s ): +!!
4indo(s ME ,!!!
4indo(s H& ,!!!
4indo(s ES "+,!!!
4indo(s * !,!!!
4indo(s : !,!!!
Copy and paste this simple table into the Calc table and save as 14indo(s -S
File SiIe /ncrease over 3ime2F
Select the data cells, then clic7 on the ,ed 1Chart2 /con in the top menu. 3his
creates a chartF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!)
/t also brings up a chart editing screenF
Clic7 on .ar to turn the chart into a bar chartF
3hen run through the four steps. Add a 3itle, and move the legend to the bottom
of the chart. 3hen clic7 Finish to display the chartF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"!
Double clic7 on the chart to edit it. ,ight clic7 on either a=is, then clic7 on Format
Axis to bring up the follo(ing screenF
Clic7 on 2e3erse Direction. 3his changes the order. .elo( is the chart (ith the
order changed, but all of the bars are still the same colorF
Clic7 on this a=is again to increase the font siIe from "! ,egular to "C .old.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #""
Ne=t, (e (ant to change the color of the 4indo(s Eista, 4indo(s * and
4indo(s : bars so they are different from the first four bars. 3o change the color
of an individual bar is tric7y. First, you have to double clic7 on the bars to select
all of them. 3hen you have to select an individual bar by clic7ing on it once.
Above (e have selected the 4indo(s : bar. Note that this brings up some small
green bars to indicate that the individual bar has been selected. 3hen double
clic7 on the individual bar to bring up the edit screenF
Select the color you (ant for that bar. 3hen clic7 -8.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"
,epeat the steps to change the color of the 4indo(s ES and 4indo(s * bars.
Ne=t, (e (ant to change the data range from +!!! to !!!!. Clic7 on the
;oriIontal A=is to select it. 3hen right clic7 and select Format. /n the scale tab,
unchec7 Automatic and change the ma=imum value from +!!! to !!!!. 3hen
clic7 -8.
@ast, select the 3itle and right clic7 on it. 3hen select Format 3itle. 'o to the Font
3ab and increase the font to "C bold. .elo( is our finished chart.
/n the ne=t section, (e (ill create a slide sho( using @ibre-ffice /mpress.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"#
.' =se Libre Office 4m!ress to make a slide !resentation
The most im!ressi3e feature of Libre Office 4m!ress is the abilit# to define
a 3ariet# of custom back5round colors and effects.
-ur ne=t mission is to create a Slide &resentation (ith @ibre-ffice /mpress
similar to the follo(ing slide.
3o open @ibre-ffice /mpress from the 4riter Menu, clic7 on the .lue bo= belo(
the Edit Menu itemF
3hen clic7 on &resentationF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"C
Clic7 on Format, Slide Design and you (ill see that there is only one design to
choose from.
3o get more, clic7 on @oad at the bottom of the screen.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"+
6han5in5 the *resentation :ack5round Area
Clic7 on the tilted paint buc7etF
Clic7 on the Colors 3abF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"D
.y default, the color selection table is set for a table called 3ango. ;o(ever,
there are many other Color Selection 3ables (e can use. Clic7 on the folder icon
to bring up this listF
Clic7 on 4eb, then clic7 -penF
No( (e have a selection of (eb safe colors. Ne=t clic7 on the 'radient 3abF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"*
3hen clic7 on Add and type in the name of the ne( bac7ground you (ant to
createF
3hen clic7 -8
3hen change the color from ,ed to .lue.
3hen clic7 -8, then clic7 Modify, then -8. No( that (e have created the
bac7ground color option (e (ant, (e are ready to change the bac7ground of the
slides. 3o change the bac7ground of a single slide, select Eie( Normal. 3o
change the bac7ground of all of the slides, select Eie(, then Master, then Slide
MasterF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #":
-nce the master slide has been selected, clic7 Format, then &age, then clic7 on
the .ac7ground tab. 0se the drop do(n arro( to select 'radient. 3hen select the
bac7ground (e created aboveF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #")
3hen clic7 -8F
3hen clic7 Close Master Eie(. Select a slide and then clic7 on the ne( master
(e created to see your ne(ly created bac7ground color on an e=isting slide.
3his concludes our chapter on @ibre -ffice tools. /n the ne=t chapter, (e (ill loo7
at additional tools (hich you can use to free yourself from Microsoft and the
NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #!
6ha!ter &... Additional Free O!en Source Tools
6ha!ter & includes the follo1in5 four sections
&.% Free Screen recordin5 tools for Linux Mint
&.( 0dit #our 3ideo 1ith O!en Shot Iideo 0ditor
&., O!en Source Alternati3es to NSA *artners
&.' 9o1 to use <indo1s !ro5rams in Linux Mint
Section )." describes ho( to add a free open source screen recording tool called
2ecord M# Deskto! to your @inu= Mint operating system. 3his is an e=cellent
(ay for teachers to share information (ith your students and for alternative ne(s
groups to post stories to $outube.
Section ). describes ho( to use a free open source video editor called O!en
Shot to edit create video introductions, combine video sections and edit videos 6
including adding sound trac7s prior to posting your videos to $outube.
Section ).# describes a variety of other (ays to use open source tools to free
yourself from Microsoft and the NSA. 3hese include s(itching from the 'oogle
Search Engine to the Duck Duck "o GDD"H Search Engine 6 and s(itching your
email organiIer from Microsoft -utloo7 to a free open source tool called
Thunderbird. 3his tool (or7s in combination (ith a more secure email service
called ,iseup.net to give you the option of encrypting your emails.
Section ).C describes ho( to use 4indo(s programs (ith @inu= by installing a
free program called &lay on @inu=.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #"
&.% Free Screen recordin5 tools for Linux Mint
Adding a free open source screen recording tool called ,ecord My Des7top to
your @inu= Mint operating system is an e=cellent (ay for teachers to share
information (ith students and for ne(s groups to post stories to $outube.
/n this section, (e (ill revie( tools for creating your o(n screen casts.
Tools for creatin5 screen casts.
3he @inu= Mint Soft(are Manager offers several free tools for creating screen
casts. 3o revie( these tools, open the Mint Menu and clic7 on the Soft1are
Mana5er.
3hen clic7 on Sound and Iideos. 3he most popular video caster is called
Cheese. ;o(ever, it has some problems. So (e (ill instead install ,ecord My
Des7top. /f you enter this term in the Search .o=, you (ill see that ,ecord My
Des7top comes in t(o parts. 4e need both the 'raphical Front End and the
,ecording .ac7 End. Clic7 on each, then clic7 install. /f you have an older =# bit
computer, for the bac7 end choose the #:D option Asee options belo(B.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #
4e (ill first install the '38 version of ,ecord My Des7top. 3hen (e (ill install
the normal version of the user interface for ,ecord My Des7top.
Clic7 /nstall for each.
Ne=t go to the Mint Menu, Applications, Sound and Eideo and drag the icon to
the des7top.
Clic7 on the icon to open the ,ecord My Des7top (indo(
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##
/n addition to the Main 4indo(, there is a small red icon in the system tray (hich
you can also use to control the program.
The Main <indo1
3he Main 4indo( includes a previe( of your des7top. Note that you can use
your mouse to define an area (ithin the des7top previe( to record 6 or select a
(indo( to record. /f you select a 4indo(, and you (ant to post the video on
$ou3ube, the (indo( should have a ratio of "D (ide by ) high. For e=ample, if
you create a slide presentation, ma7e the ratio "D inches (ide by ) inches high.
A narro(er (indo( (ill result in blac7 bars on both sides of the video.
Iideo and Sound @ualit# Settin5s
-n the top5right corner of the Main 4indo(, there are t(o sliders labeled 1Eideo
Muality2 and 1Sound Muality2. 3hese control the Kuality of the encoded file and
thus it>s file siIe. 3o publish videos over the internet, the video Kuality should be
set for +!U and the Sound Muality should be set for "!!U. Ma7e sure the
Enable Sound Muality bo= is chec7ed. /f it is not, the video (ill have no sound
recordingG
Ad3anced Tab
.eneath the audio and video Kuality settings, there is a large button named
1Advanced2. Clic7ing that (ill bring a ne( (indo(, that (ill allo( you to set a vast
number of options, and fine tune the behavior of the program. ;o(ever, (e (ill
leave these advanced settings alone.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C
Sa3e As and @uit
-n the bottom5right corner, there are 1Save As2 and 1Muit2 buttons. Clic7ing the
1Save As2 button (ill present you (ith a save5file dialog, (hich (ill allo( you to
pic7 a destination and file5name for the encoded file. 3he 1Muit2 button e=its the
program. ;o(ever, to stop the video, use the button in the tas7 bar.
The Task :ar 4con
3he other main element of the program is the icon in the 3as7 .ar. ,ight clic7 on
this icon to bring up some options.
3he icon in the tas7 bar (ill change color and shape depending on (hat the
video recorder is doing. 3he icon (ill be a red circle (hen the video is stopped. /t
(ill change to a gray bo= (hile the video is being recorded. $ou can right clic7 on
the 'ray SKuare to either &ause the video 6 in (hich case the icon (ill change to
a couple of thin bars. -r from the 'ray .o=, you can clic7 on Stop (hich (ill stop
the video and bring up the file coding progress (indo(.
3here are t(o (ays to start a recording. Either clic7 on ,ecord from the Main
4indo( 6 or <ust left clic7 on the ,ed Circle /con in the tas7 bar. Either (ay, the
red circle (ill change to a gray bo= and you have started recording.
3here are also t(o (ays to stop a recording. Either left clic7 on the gray bo= 6 or
right clic7 on the gray bo= and select Stop. .elo( is a summary of the tas7 bar
icon changes and actions.
Task :ar 4con Left 6lick 2i5ht 6lick
,ed Circle
Stopped Starts a ne( recording Sho(s 3ray menu
'ray .o=
,ecording Stops the recording &auses the recording
3(o thin bars
&aused ,esumes recording ,esumes ,ecording
Define an area for recordin5
3here are three (ays of selecting the area on (hich you (ill confine the
recording.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+
O!tion %7 =se the Full screen !re3ie1 thumbnail on the main 1indo1.
3o select on the thumbnail, simply left clic7 on it and drag the mouse. ,elease it
(hen you have covered the area that you (ant recorded. ,ight clic7ing on the
previe( (ill restore the recording area to full screen.
O!tion (7 =se the ASelect <indo1F button.
3o confine the recording to one (indo(, clic7 on the 1Select 4indo(2 button. 3he
cursor (ill change to a cross. No( clic7 on the (indo( you (ish to record and
the area (ill be selected. 0sing the 1Select 4indo(2 button (ill only set the area.
/f you move the (indo(, the area (ill remain unchanged. .y default the (indo(
decorations (ill be included in the recording area. 3his can be changed at
Advanced5aMisc. This is the o!tion 1e 1ill use to dis!la# slide
!resentations 1e are recordin5.
O!tion ,7 =se the ASelect Area on ScreenF function of the task bar icon.
3o select an area (ith the tas7 bar icon, right clic7 then select 1Select Area on
Screen2. 4hen you do that, a screen shot of your des7top is pic7ed and then
over laid as full screen over your des7top. @eft clic7 and drag to select an area.
4hen you release the mouse button, the over laid screen shot (ill disappear.
$ou can also right clic7 to cancel the selection process. After you have finished
using any of the above methods, the area you have selected (ill be sho(n in the
previe( (indo(. Depending on your settings, an optional frame might also
appear on your real display, around the recording area.
2ecordin5
At this point, you 7no( ho( to select your screen and then start, stop and pause
a recording. $ou can start a test recording by either left clic7ing on the tray icon,
or left clic7ing the record button on the main (indo(. 4hen you start a recording
session, the main (indo( (ill hide itself. 4hile you are recording, the ,ed Dot
(ill turn into a gray folder. 4hile recording, you can pause the recording for any
amount of time. 4hen you are done, left clic7 on the gray sKuare in the tas7 bar
to stop the recording. 3his causes a ne( (indo( to appear, the encoding
process monitor.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D
2ecordin5 *rocess Monitor
.y default, ,ecord My Des7top brea7s do(n the overall recording process into
t(o separate steps. First, the video is recorded and cached in a temporary folder
in the hard drive. Second, the file is encoded into an -'' video file. 3he
encoding (indo( loo7s li7e thisF
Depending on the video Kuality you have selected, it could ta7e several minutes
to encode your video. .ut if you have set the video Kuality to +!U, you should be
able to load a + to "! minute video in less than minutes. As the (arning reads,
clic7ing on Cancel (ill irreversibly stop the process and discard the remaining
part of the recording. 4hen the encoding ends, the main (indo( (ill reappear,
unless you have manually hidden it through the tray icon pop up5menu.
After that, you can go at the location you chose to save the file Adefault is out.ogg
in your home directoryB and (atch your session in your favorite media player.
Note that the E@C Media &layer by default loo7s for videos in the My Eideos
folder. So if the video has been saved in the ;ome folder, use the File Manager
to transfer it to the Eideos folder.
Sound recordin5
Sound recording is the most comple= part of any video recording. $ou have t(o
options. $ou can either leave the default settings in place, in (hich case the
video (ill probably use the normal microphone on your computer. 3he problem is
that if the fan on your computer is running, the mic (ill also pic7 up this sound.
3he first step to sound recording is to ma7e sure that it is enabled. /n the main
(indo(, as sho(n in the above picture, the chec7 bo= in the red circle should be
enabled. /f not, sound recording (ill be completely disabled.
/f you (ant better sound Kuality, then you (ill need to change the mic setting to
your headphone mic. 0nfortunately, ,ecord My Des7top does not do a very good
<ob in this area. $ou can also change the Mint sound settings by going to Control
&anel and clic7ing on Sound. Select and configure your headphones. ;o(ever,
even this may not cause ,ecord My Des7top to recogniIe your headphone mic.
o get better Kuality sound, you (ill therefore need to install another tool from the
Soft(are Manager called 8M/H.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*
3ype in the (ord mi=er into the Soft(are Manager search bo= to see our choices.
Select 8M/H and /nstall it. After installing it, go to the Mint Menu and drag the
8M/H icon to the des7top. Clic7 on it to activate it. 3his places an /con in the
lo(er tas7 bar. Clic7 on this icon to open it. 3hen select the Master ChannelF
Select the ;eadset. 3hen clic7 -8. 4ith Current mi=er, select Capture Devices
and ma7e sure that the ;eadset is chosenF
From the icon in the lo(er tas7 bar, right clic7 and select Audio Setu!
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:
Clic7 on Audio 9ard1are Setu! and change the Sound Card to the ;eadset.
3he sound tab lets you configure the Kuality of the sound capture, or the
recorded ports.
Note that there are separate volume controls for the audio plugs in the bac7 and
front of your computer if your motherboard has both. No( ma7e a test recording
to see if the headset mic (or7s.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)
The Ad3anced <indo1
3here are several settings (hich can be ad<usted (ith the Advanced 4indo(.
;o(ever, in general, you should not need to change any of these settings.
Files
3he first tab you (ill encounter is titled Files and loo7s li7e thisF
3he Files tab contains t(o optionsN -ver(rite E=isting Files and 4or7ing
Directory. 3he 1-ver(rite E=isting Files2 option has to do (ith ho( the program
deals (ith e=isting files, bearing the same file name in the same location, (ith the
one you chose for your recording. 4hen this option is turned off AdefaultB e=isting
files are not touched at all. /nstead the ne( recording is saved (ith a number
post fi=ed at it>s file name.
So, if you choose to save your recording as recording.ogg in your home directory
and there is already a file named li7e that, the ne( one (ill instead get saved as
recording.ogg.". /f recording.ogg." e=ists too, the ne( file (ill be named
recording.ogg. and so on. /f the 1-ver(rite E=isting Files2 option is turned on,
e=isting files are deleted (ithout any prompt. So, be careful (ith this setting.
3he 14or7ing Directory2 option is the location in (hich the temporary files
AcacheB are stored, during the recording. 3his applies only (hen you are not
performing encoding on the fly. Ma7e sure that the location you have set is
(ritable by your user, has enough space available and does not introduce
latency in the program. 3he amount of space that is needed can vary a lot,
depending on the settings of the recording and the amount of activity on the
screen. -n my setup, at "+fps and a resolution of ":! = "!C, (ith average
screen activity, there might be needed , to - ": of s!ace; !er hour of
recordin5. 4f #ou do 3ideos in blocks of %/ minutes or less; then #ou 1ould
onl# need % ": of s!ace.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##!
*erformance
3he &erformance tab holds four options that should probably not be changed.
3he 1Frames &er Second2 option controls the freKuency (ith (hich screen shots
are ta7en. Setting it to a higher value (ill produce smoother recordings, but it (ill
reKuire more processing po(er. @eave 1Encode on the Fly2 turned off. @eave
1Pero Compression2 turned on. Also leave Muic7 Subsampling turned off and
leave 1Full shots At Every Frame2 turned off.
Sound
3hese settings should also probably be left as is. 3he 1Channels2 option sets the
number of channels in the resulting audio stream. /t can be " AmonoB or
AstereoB. 4hen your sound source is only a microphone, selecting more than one
channel is completely unnecessary and (ill only increase the siIe of your files.
3he 1FreKuency2 setting Aor 1sample rate2 as it is commonly calledB, is probably
the most defining factor for the Kuality of a recording. 3he default is !+!, (hich
is more than enough for speech, but if you are recording music, you might need
to get it at CC"!!. 3he 1Device2 option should contain an A@SA or -SS sound
device, depending on ho( your copy of recordMyDes7top (as compiled. 3he
default is the (ord DEFA0@3, (hich is an alias for the front end, (hich means
that it (on>t try to change that setting. /nstead it lets the bac7 end determine that,
based on the sound system that is used. 4hen using A@SA, the default setting
for the device, in the bac7 end, is h(F!,!. 3his is the hard(are plug in and it can
only accept channels and freKuency values, that the sound card supports
natively. 3his means that (hile you may have set your recording to mono at
!+! ;I, it might use stereo at C:!!!;I. /n order to have precise control, you
need to use the soft(are plug in for the sound device field, (hich is plugh(F!,!.
3he above settings capture sound directly from the sound card. /f you (ish to use
9AC8 instead, clic7 the 10se 9ac7 For Audio Capture2 chec7 bo=. 3he channels,
freKuency and device fields (ill be grayed out. 3his happens because these
settings are no( provided by the 9ac7 server.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##"
.efore enabling 9ac7 capture, you should ma7e sure that a 9ac7 server is
running. After that you should see a list of available ports. /f you see a (arning
message saying that <ac7WlspA(hich needs to be installedB hasn>t found any
ports, ma7e sure that you have a running server. 3o get a more current list of
available ports, hit refresh. 3he initial selection (ill determine ho( many capture
ports are registered by recordMyDes7top. -f course these ports can later be
remapped, (ith the help of tools li7e K<ac7ctl.
Misc
3he fourth and last tab in the advanced (indo( is called Misc. /n this tab you (ill
find various options (hich are meant to be used less freKuently. Do not change
any of the settings on the M/SC tab.
/f you can only save videos to your ;ome folder, then transfer videos from this
folder to the videos folder (ith the File Manager. 3hen open E@C media player
and go to My Eideos to play it.
Sol3in5 common !roblems.
/f you have no sounds. 3here is a program called 9ac75mi=er you may (ant to try.
/n order to record sound from a microphone, you have to set it through a mi=er
li7e 8mi=. ,ecord My Des7top (ill not set anything itself but rather it (ill start
recording from any preselected source. Another reason for no sound might be
the presence of more than one sound card. /n that case, ma7e sure you>ve set
the right one. 0nless you 7no( that you have more than one sound card, do not
change the device setting.
/n the ne=t section, (e (ill loo7 at ho( to edit our video (ith the -pen Shot video
editing programming program.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##
&.( 0dit #our 3ideo 1ith O!en Shot Iideo 0ditor
3his section describes ho( to use a free open source video editor called O!en
Shot to edit create video introductions, combine video sections and edit videos
6 including adding sound trac7s prior to posting your videos to $ou 3ube.
3he most popular video editing program is called open shot. Another popular
video editor is called &itivi
3hen drag the -pen Shot @auncher to the Des7top. 3hen clic7 on it to open it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ###
Clic7 on File, Ne( &ro<ect to start a ne( pro<ect.
Name the ne( pro<ect.
3hen clic7 other and place the pro<ect in the Eideos folder. For pro<ect file, select
"!C=+*D "D=) &A@. 3hen clic7 on Save &ro<ect.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##C
6reate a Ne1 Title
3here is a + second /ntroduction built into the beginning of the ne( pro<ect. 3his
is used to insert a title for your video. Clic7 on 3itle, Ne( 3itle to create a title.
Clic7 on the Start ;ere drop do(n arro( to choose the template you (ant to use.
4e (ill select -val . 3hen clic7 Create Ne( 3itle. 3hen fill in the bo=es.
$ou can change the font if you (ant or even install /n7scape to use the Advanced
Editor to ma7e more changes. 3hen clic7 Apply.
3hen clic7 on File, /mport File and choose a video file to begin. 3hen clic7 on the
Eideo to start it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##+
3he 3itle starts out five minutes long. So (e (ill need to cut most of this out. 4e
can also add another Closing screen at the end of the video using the same tool.
3o add an audio trac7 to play (ith the video, first find a free audio trac7 Ausually
all that is needed is to create the video at the end of the videoB. 3his is a lin7 to
thousands of optionsF
httpF??videolane.com?!""?!*?free5royalty5free5music5do(nload5sites5for5videos?
3hen do(nload the audio trac7 by right clic7ing on the audio trac7 lin7 and then
choose 1Save 3arget As.2 3his should put the audio trac7 in your do(nloads
folder. Ne=t in -pen Shot, clic7 on File, /mport Files. 3his (ill add the audio trac7
to the list. Ne=t, add the screen shot video follo(ed by a closing 3itle video.
.elo( are all of the si= clips (e have loaded for this pro<ect.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##D
.efore (e add these clips to the video, (e should add a second trac7 so (e
have an audio trac7 and a video trac7. 3o add a ne( trac7, clic7 on the &@0S
sign. 3o add a video or audio trac7 to the pro<ect trac7, (hich is also called the
Eideo 3imeline, select the clip and drag it to the 3imeline. 4e (ill put the audio
on 3rac7 3(o and the Eideos on 3rac7 -ne.

3he first audio trac7 is too long. 3o cut a clip, use the scissors. 3o shorten a clip,
use the blue arro(s. .elo( is our finished video (ith a + second introduction, a
+! second video and t(o closing titles. /n the second trac7, the audio trac7, there
is an audio clip at the beginning and another audio clip at the end.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##*
3o vie( the video, move the red arro( to the beginning of the video trac7s. 3hen
clic7 on &@A$ at the bottom of the previe( screen. 3o e=port or upload the video,
clic7 on File, E=port or File 0pload.
,
Clic7 on 0x!ort Iideo. /f you (ant to e=port the video to $ou3ube, you should
create a $ou3ube compatible file. 3o vie( the video, transfer it to your video
folder (ith the file manager, then open it (ith E@C Media &layer. For more
information on using the -pen Shot Eideo editor, visit their online 0sers ManualF
httpF??(((.openshotusers.com?help?".#?en?
3o convert and optimiIe a longer file, use a video transcoder. A popular free
video transcoder is called 3ransmageddon. /n the ne=t section, (e (ill loo7 at
free open source tools to further free you from Microsoft and the NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##:
&., O!en Source Alternati3es to NSA *24SM *artners
The NSA no1 collects !hone records on , billion !ri3ate communications
!er da#! 4n addition; the# ha3e access to all of the communications
!rocessed b# their A!ro3iders.F
In this section# we will loo$ at free open source alternati6es to the top nine 723
pro6iders. In case ou do not $now what an 723 pro6ider is# the 723 has
produced a <op 2ecret presentation explainin" their direct access to the
databases of their pro6iders. Please do not share this information with anone as
it is after all <op 2ecret. !n (une +0# +*),# the Washin"ton Post published 1
more 723 slides from the documents the had been "i6en b 'dward 2nowden.
<hese slides referred to se6eral lar"e tech companies as pro6iders.%
http-..www.washin"tonpost.com.wp4sr6.special.politics.prism4collection4
documents.EhpidMG)
7ote that ;icrosoft is pro6ider number one. <he slides indicate that the 723 has
access to all of each pro6iders ser6ers and databases without an further re6iew
from the pro6iders. 3ccordin" to the slides# the 723.F5I ?deplos "o6ernment
eKuipment on pri6ate compan propert to retrie6e matchin" information from a
participatin" compan# such as ;icrosoft or Fahoo and pass it without further
re6iew to the 723?. <his is a 6iolation not onl of our own B2 @onstitution# but
also of uni6ersal human ri"hts to pri6ac and freedom. We therefore propose the
followin" Freedom Pled"e.%
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age ##)
I pled"e to ta$e steps to free mself# m friends and m famil of 723 pro6iders
as soon as possible b findin" free open source alternati6es to those
corporations who pro6ide the data of innocent people to the 723.%
4e (ill first outline some of the best free open source alternatives in each
general category. 4e (ill then describe specific steps for moving to a better (eb
bro(ser, search engine, email address, and email organiIer.
Free O!en Source Alternati3es to NSA *ro3iders
Function NSA &rovider Free -pen Source Alternatives
-perating System Microsoft
Apple
@inu= Mint "+ Mate
httpF??(((.linu=mint.com?
4eb .ro(ser Microsoft /nternet E=
'oogle Chrome
MoIilla Firefo=,
httpF??(((.moIilla.org?en5
0S?firefo=?ne(?
4eb Search 'oogle Search
Microsoft .ing
Duc7 Duc7 'o
httpsF??duc7duc7go.com?
Email Service 'mail A-@
Microsoft $ahoo
,iseup.net
httpsF??help.riseup.net?en
Email Des7top Client Microsoft -utloo7 MoIilla 3hunderbird
httpsF??(((.moIilla.org?en5
0S?thunderbird?
Email Encryption Enigmail _ 'N0 &rivacy 'uard
httpF??(((.enigmail.net?home?inde
=.php
Eideo Conferencing
AEoice -ver /& callsB
Microsoft S7ype
'oogle 3al7
9itsi Encrypted video chat
httpsF??<itsi.org?
Social Net(or7ing Faceboo7
'oogle &lus
Friendica
httpF??friendica.com?
/nstant Messaging A-@ A/M
'oogle 3al7
&idgin
httpF??(((.pidgin.im?
4eb .ro(ser Add
-ns
;33&S Every(here,
httpsF??(((.eff.org?https5
every(here
Eideo &ublishing 'oogle $outube Media'oblin
httpF??(((.mediagoblin.org?
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C!
4e previously sho(ed you ho( to install and use the @inu= Mint operating
system. @inu= Mint comes (ith @ibre -ffice 4ord &rocessor, MoIilla Firefo= 4eb
.ro(ser and 3hunderbird Email -rganiIer preinstalled. So <ust by installing @inu=
Mint, you are (ell on your (ay to(ards freedom from Microsoft and the NSA. /n
this article, (e (ill ta7e four more steps to improve our online security.
First, (e (ill reset our search engine to Duck Duck "o;
Second, (e (ill get a ne( more secure email address from riseu!.net.
3hird, (e (ill use our ne( email address to set up an account (ith Thunderbird.
Fourth, (e (ill add t(o tools to 3hunderbird to give us the option of encrypting
our email. 3hese are 0ni5mail 1ith "nu *ri3ac# "uard.
2eset #our Search 0n5ine to Duck Duck "o
Duc7 Duc7 'o is a very effective search engine (hich does not collect your data.
@inu= Mint ma7es it very easy for you to set Duc7 Duc7 'o as your default
search engine, -pen your Firefo= (eb bro(ser 6 (hich comes (ith @inu= Mint.
3hen clic7 on the dropdo(n arro( on the left side of the search bo= and clic7 on
Manage Search Engines.
3his brings up the Search Engines (indo(.
Clic7 on Duck Duck "o. 3hen clic7 on Mo3e =! to move it to the top of the list.
Also in the Firefo= menu, clic7 on 0dit; *references.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C"
$ou can ma7e the Duc7 Duc7 'o Search Engine your home page Ainstead of
@inu= MintB by replacing the @inu= Mint lin7 (ith the follo(ing lin7.
httpsF??duc7duc7go.com?
"et a more secure email address from riseu!.net
A more secure email address simply means an email address that is hosted on a
server (hich is not under the direct control of the NSA. 3his e=cludes A-@,
'MA/@ and $A;--. /f you have a (ebsite, you can use an email address
associated (ith your (ebsite 6 assuming the (ebsite server is not run by the
NSA. .ut <ust in case you don>t have a (ebsite yet, (e (ill add a ne( more
secure email address through a group called ,iseup.net.
<arnin5 about =S 0mail Ser3ice *ro3iders7
3he ,iseup server is currently located inside of the 0nited States. 3his means it
is sub<ect to NSA blan7et (arrants 6 similar to @avabit. 3he only solution to this
problem is to find and use an email provider (ith a server outside of the 0nited
States and not o(ned by a person or corporation inside the 0nited States. /n
addition, servers in four other NSA partner countries should also be considered
1not safe.2 3hese are 'reat .ritain, Canada, Australia and Ne( Pealand.
Currently, there is no simple option. 4e (ill therefore describe the ,iseup Email
and Encryption process to sho( you the safest current option. /f and (hen a
simpler and?or safer option becomes available, (e (ill post information about it
on our (ebsite and issue an updated version of our Eboo7. &lease <oin our
email list if you (ould li7e to be 7ept informed about this evolving topic.
,iseup (or7s directly (ith 3hunderbird. So once (e have our secure ,iseup
email address, (e can create our account (ith 3hunderbird. 3hen 3hunderbird
(or7s directly (ith an encryption program called Enigmail 6 (hich is in the @inu=
Mint Soft(are Manager.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C
So ,iseup, 3hunderbird and Enigmail 6 together (iith @inu= Mint 5 ma7e a terrific
security team. 3o get a free ,iseup email address, go to their (ebsite and clic7
on ,eKuest an account. httpsF??mail.riseup.net?
3here are t(o (ays to get an account. /f you 7no( t(o people (ho already have
,iseup accounts, you can get a special code from each of them and then get an
account immediately. For the rest of us, fill out the brief form and (ait about C
hours. ;opefully, you (ill get an email telling you that you have a ne( account.
3he ,eKuest Form pass(ord page can be a challenge. 0se special characters
such as V and U. 3he pass(ord must contain letters numbers and symbols. 3ype
in a couple of sentences about yourself. 3hen clic7 Finish.
Another benefit of ,iseup.net is that they also sponsor group lists. So you can
replace your $ahoo or 'oogle group (ith a ,iseup group. Eisit user.riseup.net
from there, you can change your pass(ord, add email aliases, set up email
filters, change your Kuota, and reKuest help. 3o create an email list from e=isting
email addresses, log in in mail.riseup.net. 3hen clic7 on Address .oo7. 3hen clic7
on .ro(se. Clic7 on the email addresses that you (ish to add. 3hen select from
the pull5do(n menu 1Create a ne( contact list in my address boo72 . Clic7 on
Add. 3hen name the address list
3he Confirmation Email, sent to an email address you listed on your reKuest form
(ill loo7 li7e this.
Your account has been approved and is ready for use. You are receiving this
notice because your email address is listed as a contact for this account.
You can check and send mail by visiting https://mail.riseup.net
For documentation on your riseup.net email account, see https://help.riseup.net
To edit your account settings, visit https://user.riseup.net
-nce you have your email address from ,iseup, there are t(o (ays you can
chec7 your email. First, you can go to ,iseup and chec7 your email (ith 4eb
Mail. Second, you can do(nload the email to 3hunderbird and then read it even
(hen you are off line. 4e (ill first loo7 at ,iseup 4eb Mail.
Lo5 in to and use 2iseu! <eb Mail
Do not use MS /nternet E=plorer 6 0se Firefo=. 3o chec7 your email, go to the
,iseup.net home page. httpsF??help.riseup.net?en
3hen clic7 on @og in to 4eb Mail. 3his (ill ta7e you to a secure page (ith the
(eb addressF httpsF??mail.riseup.net?
3he log in section is on the left (ith a ne(s section on the right. 3here are t(o
log in forms. -ne is called SKuirrel 4eb mail and the other is called /M& 4eb
mail. 4e (ill use the SKuirrel option. .ut you can log in using either. 4hen you
log in, use only your user name and not the briseup.net part. 3hen type in your
pass(ord.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C#
3his (ill bring up your Email screen.
Clic7 on options to see the -ptions (indo(F
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #CC
Clic7 on Dis!la# *references to ad<ust your preferences.
;ere you can set your preferred theme color, font style, and language. 3here are
many additional preferences on this page. 4hen you are done setting up your
account, clic7 on Sign -ut. 4e (ill ne=t set up our 3hunderbird Email -rganiIer.
9o1 to =se the Iirtual $e#board to 6heck #our <eb Mail
/f you are using a computer in a public setting such as a library, you can enter
your pass(ord by using the ?irtual @ey)oard. /t offers your system another layer
of protection from "ey0lo##er programs. 8ey5logger programs are designed to
monitor a user>s physical 7ey stro7es to figure out pass(ords, user names and
other vital information. Eirtual 7eyboards allo( users to circumvent this security
vulnerability, by letting the user enter her?his pass(ord using the mouse.
3o use the ?irtual @ey)oard, go to the ,iseup secure page listed above. 3hen
clic7 on Eirtual 8eyboard to activate it.
Set u! Thunderbird 0mail 6lient
3hunderbird is an email organiIer similar to Microsoft -utloo7 but (ithout the
connection to the NSA. 3hunderbird is automatically installed on @inu= Mint and
has many features including includingF /MA& and &-& support, multiple
accounts, Kuic7 search, advanced spam controls, ,SS, virtual folder vie(s,
message filtering, address boo7, and support for -pen&'& encryption.
Start the Account <iCard
'o to the Mint Menu and drag the 3hunderbird icon to the des7top. 3hen clic7 on
3hunderbird to open it. /t (ill as7 you if you (ant a ne( email address. 3hese
cost S" per year. So clic7 on S7ip this and use my e=isting emailF
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C+
Clic7 on Continue. /f the (iIard does not open, choose the menu item 0dit Z
Account Settin5s. Then click on Add Mail Account. 0ither 1a#; #ou 1ill 5et
to the Mail Account. 3hunderbird (ill pull the incoming and outgoing settings
into the ne=t (indo(. No( you need to decide if you (ant to use /MA& or &-&. /t
(ill by default pic7 /MA&. /f you (ant &-& to 7eep your email on your o(n
computer, change the selection to &-&. 3his (ill change the /ncoming setting.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #CD
3hen clic7 Done. 3his (ill add your account to 3hunderbird.
Clic7 on "et Mail and select your email address to load your emails. 3here are
t(o icons in the upper right. Clic7 on the Calendar icon to bring up this screen.
Clic7 on the 3as7s /con in the upper right.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C*
For1ardin5 other email addresses to #our riseu!.net email account
Each email address is a little different. .ut all email accounts allo( you to
for(ard e=isting email accounts to a ne( email account. As for the e=isting
emails, these are harder to transfer. Consider leaving them and processing them
(ith your old email provider.
4m!ort addresses from #our former email box.
First, (e need to go to our old email provider and e=port a copy of our address
boo7 as a te=t or comma separated file. -pen you old account and clic7 on
Contacts, then 3ools, then E=port. 3hen store this on our computer in the
Do(nloads folder. Ne=t, from the 3hunderbird /nbo= tab, clic7 on 3ools /mport.
Select Address :ook. 3hen select Next.
@eave it set for te=t file and clic7 Next.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C:
Change the Drop Do(n arro( at the bottom to All Files. 3his (ill bring up the file
you (ant. 3hen select it. 3hen clic7 -pen. 3hen for the (indo( called /mport
Address .oo7, clic7 -8. 3hen clic7 Finish. $ou can no( send a test email to your
old email address or anyone on your address list. 3o get help (ith 3hunderbird,
go to their help page. httpsF??support.moIillamessaging.com?en50S?home
4m!ro3e #our 0mail Securit#
From the upper right corner of the /nbo= tab, clic7 on the bo=.
3hen clic7 on preferences, then account settings. For enhanced message
security, consider setting up Enigmail (ith 3hunderbird to get -pen&'& setup.
EnigmailF get started in no time encrypting and decrypting emails and verifying
that emails you receive are from the people (ho you e=pect them to be
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #C)
6reate an O!en *"* ke# !air usin5 Seahorse
Seahorse is a free tool for creating and managing -pen&'& 7eys, securely
storing pass(ords, and creating and managing SS; certificates. 3o get
Seahorse, go to the Mint Menu and clic7 on the Soft(are Manager and type
Seahorse into the Search bo=.
3here are several versions of Seahorse. 4e (ill stic7 (ith the main one. Clic7 on
it to open it. 3hen clic7 on /nstall. 3hen type 0ni5mail into the Search bo=.
Clic7 on this, then clic7 on /nstall. 3hen go to the Mint Menu, Applications,
&references, then &ass(ords and 8eys and clic7 on Seahorse to open it.
Clic7 on File, Ne(. 3hen select &'& 8ey.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+!
Enter your personal information, select your 7ey encryption type, 7ey strength,
and (hen you (ant your 7ey to e=pire. $our name can be anything you (ant, not
necessarily your real name. /f you (ant to use your -pen&'& 7ey for encrypting
email, put the email address you (ant to use (ith encryption in the 1Email
Address2 bo=. $ou do not need to clic7 on the Advanced option. 9ust clic7 on
Create.
3hen type in a strong pass(ord t(ice. ;o(ever be careful to store this pass(ord
in a reliable place or use something you can remember. /f you ever forget this
pass(ord, you (ill lose all emails and data associated (ith this pass(ord.
3ype in something and move the mouse to get random data for the 7ey.
/t (ill ta7e a couple of minutes to generate the 7ey so be patient. -nce you have
your public private 7ey pair, it (ill sho( up at the top of the list.
$ou can manage the 7ey options, e=port the public 7ey, change the pass(ord,
delete and?or revo7e the 7ey, and perform other 7ey ad<ustments through the
Seahorse user interface.
4hen restarting 3hunderbird, the blac7 bo= is no( hidden. 3o get it to sho( all of
the time, right clic7 in the tool bar to bring up the hidden menu bar. 3hen clic7 on
the bo= to the left of the menu bar.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+"
3his is much better.
4nstall 0ni5mail and 2un the O!en*"* Setu! <iCard
After you have generated your 7ey pair, and have do(nloaded Enigmail, open
3hunderbird and from the /nbo= tab, restart 3hunderbird and get the Menu to
sho( as above. 3hen clic7 on 3ools, Addons, E=tensions and verify that Enigmail
is installed properly.
/f it says 1Disable2 that means it is installed. Close the Addons Manager tab.
3hen clic7 on the ne( top5menu entry O!en*"* ` Setu! <iCard. Select Yes
and hit Next. 4e <ust (ant to sign outgoing emails for some and not all. So clic7
No. 3hen ne=t. Si5nin5 does not encr#!t emailsZit places your digital
signature on your outgoing emails to allo( others to verify that you sent the
email. /t is recommended not to si5n all of #our out5oin5 emails as it strongly
lin7s you to everything you send out via unencrypted email directly to yourself.
/tJs best <ust to encrypt emails to people you 7no( (ho supports encryption.
Choose (hether you (ant to encrypt all of your outgoing emails by default. This
is not recommended as it is cumbersome if your recipient doesnJt support
encryption.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+
$ou can setup encryption rules later on, (hich (ill enable you to al(ays send
encrypted emails under conditions you determine. So leave it set for No. 3hen
clic7 Ne=t. For 1Ma7e -pen &'& 4or7 More ,eliably2 clic7 $ES. 3hen clic7 Ne=t.
Choosing $ES (ill ma7e changes in 3hunderbird recommended by -pen&'&.
3his (ill disable ;3M@ composing meaning you (ill not be able to send ;3M@
ne(sletters through this account. Clic7ing ne=t, the follo(ing screen appears.
Select an e=isting 7ey to use. 3hen clic7 Ne=t.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+#
,evie( the proposed changes. 3hen clic7 Next. 3hen clic7 Finish.
6lick on <rite to send an email7
$ou can no( send an encrypted email by clic7ing on -pen&'& and selecting
Encrypt message. @et>s send a test email. 3he follo(ing screen appears.
Clic7 on Create &er ,ecipient ,ules. 3his (ill create a special rule for this
person.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+C
Choose the Action to be applied upon matching the rule. For this e=ample,
choose =se the follo1in5 O!en*"* ke#s7 and press the Select $e#GsHV
button. /n the bo= that pops up from that button, select the -pen&'& 7ey for the
person to (hom youJre sending email.
/f you donJt have their public 7ey, press the Do1nload missin5 ke#s button, at
the bottom of the (indo( (hich (ill search the 7ey servers for the emailAsB you
entered in the matching bo=. 3here are four possible data bases the 7ey may be
stored in. /f you try all four and they all say 1Sorry2 then this person does not
have a 7ey and cannot receive your encrypted email. Clic7 Cancel to end
encryption for this person. 3he ne=t thing you need to do is send your friend a
copy of this boo7 and encourage them to install @inu= Mint on their computer and
follo( the steps described in this chapter. $ou can then e=change 7eys (ith them
6 or have both of you post your public 7eys and then you (ill be able to
e=change encrypted emails (ith them.
<hat is all of this about !ublic and !ri3ate ke#s8
-pen&'& splits its 7eys in t(o partsF !ublic and !ri3ate 7ey (ith different
purposes. 3he public 7eyF used to encrypt a message. /t can and should be
available to everybody. 3he private 7ey is used to decrypt a message. /t needs to
be stored securely. Access is restricted by pass(ord.
$e# exchan5e7 .efore one can send encrypted emails to a peer it is reKuired to
have the public 7ey of this person. 3herefore before a secure communication can
happen bet(een t(o partners it is reKuired to e=change the public 7eys of each
other. 3here are multiple (ays the public 7ey can be distributed. 3he most
common (ay is to upload the 7ey to a 7ey server. 3he second (ay is to publish
the 7ey on a (ebsite 6 li7e a personal or a club (ebsite.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #++
3he third (ay is to send by email to specific correspondence partners. 3o e=port
a 7ey by any of these three (ays, open 3hunderbird, then clic7 on -pen&'&.
3hen select 8ey Management. 3hen clic7 File, Send public 7ey by email. -r
select the 7ey you (ant to send, then right clic7 to see several options.
<hat about sendin5 encr#!ted emails 1ith <indo1s or A!!le8
3here are so many security holes (ith both 4indo(s and Apple, that this (ould
be pretty much a (aste of your time. .elo( are the comments on this sub<ect
from the fol7s at ,iseup.net.
14indo(s is not recommended for use as a secure communication platform.
3he tendencies in 4indo(s lean to(ards very la= security. 3here is also a
multitude of prebuilt e=ploits for (indo(s that ma7e it easier for attac7ers to
compromise. 3hese include (idespread distribution of mal(are?tro<ans?viruses
that could log 7ey stro7es, bypassing encryption schemes and?or logging other
information. Also targeted hac7ing and mal(are installation is actively used by
governmental agencies (ith 4indo(s being most susceptible. Also use of an
unencrypted file system, main encryption tool is proprietary and cannot be
scrutiniIed for e=ploits, bac7 doors, or other (ea7nesses. Also user accounts
are administrators by default. Also since 4indo(s is proprietary and closed5
source, there is no outside scrutiny for defects, bac7 doors, or anything that
1phones home2. $ouJre trusting Microsoft completely (ith (hatever secrets you
choose to put on your computer. Microsoft does not have a good trac7 record in
terms of protecting privacy.
Mac -S H is not recommended for use as a secure communication platform.
4hile there are fe(er e=ploits and a better security model than (indo(s, -S H
has demonstrated a poor security patch speed and has a large Kuantity of
proprietary soft(are ma7ing it not capable of scrutiny for defects, bac7 doors, or
anything that 1phones home2. Furthermore, it offers features that can be
e=ploited by hac7ers or abused by governments or corporations. For e=ample
the (eb cam can be remotely turned on, offered as a 1feature2 if the laptop gets
stolen, (hich could be abused or e=ploited to violate your privacy. Also the file
system not encrypted by default and may have inadeKuate security.2
No( that (e have a secure email system, in the ne=t section (e (ill loo7 at ho(
to get a more secure startup program than either ./-S or 0EF/.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+D
&.' 9o1 to use <indo1s *ro5rams in Linux Mint
!n this section we will re"iew how to use a free #inu program called $lay
On #inu to install and use %indows &ased programs such as 'icrosoft
Office in #inu 'int.
Fol7s are usually shoc7ed to learn that not only can @ibre -ffice open and
manage MS 4ord documents but @inu= can open and manage MS 4indo(s
programs. -f course, if you follo(ed the steps to set up your computer in a Dual
.oot of 4indo(s and @inu=, you may be (ondering, (hy not <ust use 4indo(s to
run 4indo(s based programsL 3here are several reasons to run 4indo(s
programs in @inu= rather than 4indo(s.
First, you may not (ant to ta7e the time to shut do(n @inu= and open 4indo(s.
/n (riting an eboo7, you may (ant to go bac7 and forth bet(een the AmaIon
8indle A(hich is only available currently as a 4indo(s programB and Sigil A(hich
is mainly a @inu= programB. &lay -n @inu= creates a 1virtual 4indo(s machine2
inside of @inu= (hich allo(s you to vie( 8indle .oo7s inside of @inu=.
Second, you may not trust the 4indo(s operating system any more. For
e=ample, you have been using 4indo(s H& and it is after April !"C. .ecause
4indo(s H& is no longer supported by Microsoft, even opening 4indo(s H&
after April !"C (ill be a ris7y business. 3han7fully, all of the programs you once
ran on 4indo(s H&, such as MS -ffice, can also be run on @inu= using &lay -n
@inu=.
3hird, you may eventually (ant to get rid of 4indo(s completely 6 either
because you don>t (ant to be monitored by the NSA or you (ant to free up space
for @inu= on your hard drive 6 or you <ust don>t li7e Microsoft. @earning ho( to use
&lay -n @inu= (ill ma7e this decision easier once you 7no( that your 4indo(s
programs can still be run even if you deleted the 4indo(s partition from your
computer.
*la# on Linux 3ersus <ine
4ine is the most common @inu= program used to play 4indo(s based programs.
;o(ever, 4ine can be difficult to learn and use. &lay -n @inu= has a much better
0ser /nterface 6 meaning you <ust clic7 on buttons rather than entering computer
commands into a terminal. 4e (ill therefore use &lay -n @inu=.
Do1nload *la# on Linux
&lay -n @inu= is most easily do(nloaded from the @inu= Mint Soft(are Center.
3ype 4ine into the search bo= but do not select 4ine. /nstead select &lay on
@inu=.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+*
3hen clic7 /nstall. /t is a big program and (ill ta7e a (hile to install. Note that &lay
-n @inu= (ill install (hatever versions of 4ine you need for any 4indo(s
program so you do N-3 need to also install 4ine.
During installation, it (ill as7 you to accept the Microsoft license. Chec7 the bo=
and clic7 $es to finish the install. During installation, if you have a @ibre 4riter
document open do not (orry of the 4riter fonts become compressed. 3his (ill
resolve itself once the install is complete. Also do not (orry if the installation
progress bar becomes stuc7 at D*U. 4ait a fe( minutes. 3hen close the
Soft(are Manager. $ou should no( find &lay -n @inu= listed in your Mint
Applications Menu under 'ames.
First, ma7e sure you are connected to the /nternet. 3hen move &lay -n @inu= to
your des7top and clic7 on the icon to open it. /t may (arn you that you are
missing a program.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+:
'o to the Soft(are Center, search and install this e=tra program.
-n your first use, the &lay on @inu= (iIard (ill appear.
Clic7 Ne=t. 3hen Ne=t again.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #+)
/f you are using @inu= Mint "+, it may say that an updated version, C.." is
available. For most older 4indo(s programs, it is not necessary to update to
C..". /f you are using @inu= Mint "D, it may simply come (ith version C..".
4nstall a ASu!!ortedF <indo1s *ro5ram... 0xam!le 4nternet 0x!lorer
/nternet E=plorer : (as and still is a terrible (eb bro(ser. Firefo=, (hich comes
free and pre5installed on @inu= Mint is much better. So you may be (ondering
(hy (e are sho(ing you ho( to install /E : on @inu= Mint. 3he ans(er is that if
you are building (ebsites, you (ill (ant to revie( ho( they loo7 on /nternet
E=plorer as many people still have and use /E as their (eb bro(ser.
3he other reason (e are sho(ing you ho( to install /nternet E=plorer is to
convince you that it is a stand alone program and does not need to be placed
inside of the heart of the 4indo(s operating system for it to (or7. 3he fact that
/nternet E=plorer (or7s in @inu= is strong evidence that the only reason Microsoft
placed a (eb bro(ser inside of their operating system is to deliberately create an
insecure operating system so that NSA could access all data from all 4indo(s
computers.
3o install any &lay -n @inu= A&-@B supported 4indo(s program is very easy.
9ust open &-@ and clic7 on the /NS3A@@ button at the top of the screen. 3his
brings up the /nstall Menu.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D!
$ou can revie( all of the supported programs by clic7ing on the various
categories. 3here are more than one hundred supported 4indo(s programs 6
including -ffice !!#, -ffice !!* and -ffice !"! Ayou (ill need your Microsoft
17ey2 to use these programs. .ut /nternet E=plorer : is free so (e (ill use this as
an e=ample to get you started. Clic7 on 4nternet to vie( all of the 4indo(s
/nternet programs you can install. Scroll do(n and select /nternet E=plorer :.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D"
3hen clic7 on /nstall. 3his (ill bring up the &-@ /nstallation 4iIard.
Clic7 Ne=t. &-@ (ill first do(nload (hatever version of 4ine is needed for the
4indo(s program you are installing. &-@ (ill then do(nload /nternet E=plorer :.
&lay on @inu= (ill then open the /E : install screen.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D
:e careful to read each screen as #ou install 40 . Do Not install 0pdates and
the Malicious Soft(are ,emoval 3ool. 0nchec7 this bo=F
3hen clic7 Ne=t. Clic7 on the ,estart No( button to finish the process. 3his (ill
not restart your computer or your @inu= Mint program. /t (ill merely restart the
&-@ virtual machine. $ou should no( have an /nternet E=plorer : icon on your
des7top.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D#
$ou (ill also have an /E : lin7 on your &lay on @inus start screen.
Clic7 on either of these to start /nternet E=plorer. <hen 40 comes u!; choose
custom settin5s and kee! current search en5ines 1ithout an# u!dates. And
turn off accelerators. And turn off the smart screen filter.
$ou can add .ing Search or $ahoo search to /E :. .e a(are that both of these
search engines are basically run by the NSA and are heavily censored.
As a home(or7 e=ercise, use the same process to install the free 8indle ,eader.
4nstall an =nsu!!orted <indo1s !ro5ram
3here are some programs (hich do not yet have an automatic script (ritten. 3he
process for installing them is very similar. Clic7 on the /nstall button. 3hen clic7
on 1install a non5listed program2 (hich is at the bottom of the ne=t screen. A
(iIard (ill appear. Clic7 Ne=t. 3hen install a program in a ne( virtual drive. 3hen
clic7 Ne=t. For the program name, type in a short descriptive name, (ith no
spaces, such as 8indle&revie(er. Clic7 Ne=t, then Ne=t again. .ro(se to the
installation file (hich may be a CD, autorun.e=e or do(nloaded .e=e file. 3hen
run through the normal installation steps <ust as you (ould if you (ere installing it
into the 4indo(s operating system.
<hat is terrific about *la# on Linux is that #ou no lon5er need to !a# the
AMicrosoft <indo1s TaxF Eust to use <indo1s based !ro5rams.
<hatBs Next8
/n the final chapter, (e (ill provide a 1Muic7 Start2 revie( of the most essential
steps for installing @inu= Mint as a Dual .oot on your computer. 4e (ill then
cover some important final steps to free yourself from Microsoft and the NSA.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #DC
6ha!ter %/... Linux Mint @uick Start "uide
6ha!ter %/ includes the follo1in5 four sections7
%/.% :ack u! #our com!uter and !artition #our hard dri3e
%/.( Dual :oot Linux Mint 1ith <indo1s J* or <indo1s ?
%/., 0as# Ste!s and Free Tools for =sin5 Linux Mint
%/.' Final Ste!s to Freedom
/n the previous nine chapters, (e presented detailed information not only on (hat
steps to ta7e to install @inu= Mint, but also (hy you should ta7e these steps.
;o(ever, if you are already convinced about (hy you should install @inu= Mint,
this last chapter is a condensed version of the boo7 (hich focuses only on the
ho( of installing @inu= Mint. 3hese steps assume that you are part of the :!U of
all 4indo(s users (ho are using 4indo(s H& or 4indo(s * and are loo7ing for
a safer alternative by dual booting @inu= (ith 4indo(s. /f you are using 4indo(s
:, or any other computer (ith 0EF/, as (e e=plained in the last chapter, there
really is no safe (ay to run such a computer and your best bet is to return it to
(here you bought it and as7 for a refund.
Section "!." is a condensed version of sections D." and D. (hich lists the steps
for bac7ing up your computer and creating space for @inu= on your hard drive.
Section "!. is a condensed version of section D.# 6 only instead of providing
several options, (e describe <ust the recommended steps for dual booting @inu=
Mint (ith 4indo(s H& or 4indo(s *. .
Section "!.# is a brief summary of the most important steps to ta7e in using
@inu= Mint 6 including a list of important free e=tensions you should consider
adding to Mint from the Mint Soft(are Center.
Section "!.C describes the most important step (e all must ta7e at if (e truly
(ant to be free from Microsoft and the NSA. 3his step is to boycott any computer
(hich has the 0EF/ startup chip on it 6 including all 4indo(s : computers 6 and
demand that our ne=t computer has the 6ore :oot startup program.

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D+
%/.% :ack u! #our com!uter and !artition #our hard dri3e
3he first step before setting up a dual boot (ith @inu= Mint is creating at least
one bac7up of your current computer. -nce this is done, (e (ill partition or
divide the hard drive in order to create room to add @inu= Mint.
&ual bootin" simpl means to install more than one operatin" sstem on our
computer. <he point of dual bootin" is to allow ou to test and experiment with a
new operatin" sstem# such as Linux# while still $eepin" our old operatin"
sstem# such as Windows. ;icrosoft has billions of dollars at sta$e and has done
e6erthin" in their power to create obstacles to pre6ent ou from dual bootin"
Linux onto our computer. In chapter /# we presented se6eral was to bac$ up#
partition and install Linux as a dual boot on our computer. In this chapter# we will
summariGe onl the most recommended processes for a computer which is
currentl usin" Windows XP or Windows 7.
Ma*e an# follow a 4lan to Safel6 !a+*u& all of 6our #ata
!ur plan is to first bac$up the our computer data usin" the followin" 0 steps-
2tep R)- Hather our bac$up tools.
2tep R+- !r"aniGe our files into folders.
2tep R,- @lean Bp and &efra"ment our disc.
2tep R1- @op our data on a B25 Flash &ri6e.
2tep RN- @reate a cop of our @ &ri6e and &ata on a B25 'xternal &ri6e.
2tep R/- @reate a cop of our >eco6er ;edia file onto a B25 Flash &ri6e.
2tep R7- @reate a B25 Flash &ri6e cop of our IP >eco6er Partition.
2tep RA- &elete the >eco6er partition.
2tep R0- ;a$e a record of all of our Windows pro"ram $es.
In the next section# we will shrin$ the @ dri6e partition and use the free space to
create an 'xtended Partition for &ual 5oot of Windows XP or Windows 7 and
Linux usin" a Linux installation tool.
Ste& -1, 1at%er 6our ba+*u& tool$
In case our computer completel crashes and ou cannot e6en restart it# ou
reall want to store our important data in some other place besides on our
computer. We will need to "et se6eral tools and follow se6eral steps to bac$ up
our computer. First# we will need a 32 1! ?S! =la$% 8rive to cop all important
ima"es and files to. If ou do not alread ha6e a ,+ H5 B25 Flash &ri6e# this will
cost about S,*.
2econd# we need a 1 0erab6te ?S! external %ar# #rive to create a complete
sstem bac$up. <he point of this bac$up is to restore our computer to its current
state as opposed to the reco6er bac$up which deletes our current files and
pro"rams and restore the computer to the state it was in the da ou bou"ht it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #DD
3 )<5 B25 hard dri6e will cost about S7*. If ou are on a limited bud"et# ou can
s$ip this step as our important data will be on the ,+ H5 Flash &ri6e and our
Windows >eco6er file will be on a separate 1 H5 B25 flash dri6e.
<hird# at step RN# we need to install a free pro"ram for ma$in" bac$up copies of
our complete sstem. We will create this sstem bac$up usin" a free tool called
Ma+rium <efle+t.
Fourth# in 2tep /# we will need anot%er >1! or more =la$% 8rive to create
reco6er media% also usin" ;acrium >eflect. <he reco6er media file is onl ).7
H5 so almost an dependable flash dri6e will do. <his will cost about S)*.
Fifth# we will need anot%er 32 1! =la$% 8rive to create a cop of the >eco6er
&isc folder which comes with IP. It is important to note that this >eco6er disc# if
it were e6er used# would wipe out all of our pro"rams and sstem chan"es we
ha6e made includin" partition chan"es and an documents and pro"rams
associated with Linux to return the computer bac$ to the initial condition it was in
the da we bou"ht it. 2o this >eco6er should be considered the option of last
resort.% <he benefit of creatin" this reco6er flash dri6e which can be done onl
once is that we can delete the partition with the >eco6er folder which will free
up a partition for us to add Linux to our computer. <his will cost about S,*.
2ixth# we will need to use a free tool for "ettin" the $es% to our important
Windows pro"rams. 3fter we ha6e completed all of these bac$up steps# we will
be read to delete the bac$up partition and be"in installin" Linux into the
resultin" empt space.
We will also need a 1 to A H5 B25 flash dri6e to put our open source operatin"
sstem pro"ram9s: on. <his will also cost about S)*.
Ste& -2, :r"anize an# +on$oli#ate 6our file$ into fol#er$.
<o bac$ up our ima"es# documents# files# folders and other important data# first#
"o to the office suppl store and pic$ up a reliable ,+ H5 Flash &ri6e. <his is
"enerall enou"h to hold all our ima"es# 6ideos and documents.
If ou are li$e most Windows users# our files will be stored in three or four
different places. @reate folders and consolidate all files and folders inside of just
a few folders.
Ste& -3, Clean ?& an# 8efra"ment 6our #i$+.
5efore ou ma$e a cop of our files to a B25 Flash &ri6e# ou should ta$e a
couple of minutes to clean up and defra"ment our disc. <o do this# "o to the
2tart ;enu and clic$ on +ontrol &anel.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D*
<hen clic$ on 4erforman+e )nformation an# 0ool$. <hen clic$ on :&en 8i$+
Cleanu&-
@lic$ :7 to delete these unneeded files. When done# "o bac$ to 4erforman+e
)nformation and 0ool$ and clic$ on A#van+e# 0ool$. <hen clic$ on :&en 8i$*
8efra"menter.
2elect the C 8rive and clic$ on 8efra"ment 8i$*. It will ta$e se6eral minutes to
analGe the disc and e6en more time to defra"ment it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D:
Ste& ->, Co&6 6our im&ortant #ata to a ?S! =la$% 8rive
Insert the ,+ H5 flash dri6e in a B25 port. <hen ri"ht clic$ on these folders to
cop them to the Flash &ri6e which is shown below as >emo6able &is$ F-
When ou ha6e all of our folders copied# then safel remo6e the flash dri6e and
label it with the date of the cop.
Ste& -., Create a +o&6 of 6our C 8rive an# 8ata on a ?S! 3xternal 8rive.
<here are lots of reliable# compact and economical B25 external hard dri6es. It is
useful to "et one with a B25 ,.* connection which is ten times faster than B25
+.*. 5ut anthin" will do. 7ext download the free ;acrium >eflect pro"ram-
http-..www.macrium.com.reflectfree.aspx
3fter installin" this pro"ram# the >eflect icon will be placed on our des$top.
@lic$ on the Icon to open the pro"ram-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #D)
@lic$ on the option PCreate an )ma"e of t%e &artitionI$B reJuire# to ba+*u&
an# re$tore /in#ow$K located in the top left hand pane of the application
window to start the bac$up wiGard. It is hi"hli"hted in red in the pre6ious ima"e.
<he wiGard should start as shown below. Fou will note that all partitions are
displaed in the wiGard# but onl the sstem partition and the @ partition ha6e
been selected because these are what are needed to restore the current sstem.

7ext we select a location for the bac$up. 3ssumin" our B25 external dri6e is
plu""ed into a B25 port# select it. In m case# the destination was the F dri6e-
@lic$ 7ext. It will then ta$e a disc ima"e. @lic$ Finish. <hen clic$ !C to run the
bac$up. 3ssumin" the 2stem and @ dri6es are selected# clic$ 7ext. <o bac$ up
)N* H5 in data will ta$e about 1N minutes.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*!
When the bac$up has completed clic$ A:7A to shut down the messa"e box and
then clic$ AClo$eA to close the bac$up window. Four sstem is now bac$ed up.
<he file is sa6ed as an X;L file. @lose the ;acrium pro"ram. <o 6iew the bac$up
file in Windows# clic$ on the Start ;enu# then Com&uter# then clic$ on the ?S!
2ar# 8rive. <o eject the B25 hard dri6e# clic$ on the eject icon. When is sas
2afe to >emo6e B25# then remo6e the B25.
Ste& -6, Create a +o&6 of 6our <e+over6 Me#ia file onto a ?S! =la$% 8rive.
In addition to creatin" a complete sstem bac$up on our hard dri6e# ;acrium
>eflect Free 6ersion also helps ou create rescue media% for our Windows 7
bac$up plan. We will put this rescue media on a separate B25 Flash &ri6e. First#
insert the Flash &ri6e into the B25 port. 3lso ma$e sure ou ha6e opened our
web browser and that it is connected to a hi"h speed internet connection and that
ou ha6e at least one hour to complete this tas$. <hen open ;acrium >eflect and
clic$ on the :t%er 0a$*$% tab-
@lic$ on Create bootable re$+ue me#ia. <hen clic$ Fes.
Lea6e it as /in#ow$ 43 and clic$ 7ext.
Put in a + H5 or more Flash &ri6e to put the >escue ;edia on. We also need
internet access to download the followin" file from ;icrosoft.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*"
3ssumin" we are attached to the internet# and that we ha6e a B25 Flash dri6e
plu""ed in to our computer# clic$ 7ext. <he file is )./7 H5. Windows will want to
install this folder inside of pro"ram files.
Instead clic$ !row$e and select our Flash dri6e and install the folder there.
<hen clic$ 7ext. 3fter it is complete. @lic$ @lose. <hen "o bac$ to the >escue
;edia WiGard screen. ;acrium >eflect needs to initialiGe this pen dri6e. 3ll
existin" data will be lost if ou continue but this warnin" onl applies to an
data on our B25 dri6e 9which should be blan$:. 2o for Proceed with operationE
clic$ Fes. We now ha6e a reco6er media on our Flash &ri6e. We will next ma$e
a cop of the IP >eco6er partition and then ma$e a record of our Windows
pro"ram $es.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*
Ste& -5, Create a ?S! =la$% 8rive +o&6 of 6our 24 <e+over6 4artition.
If ou ha6e a Windows XP computer# ou can li$el s$ip this step as our
reco6er partition is li$el alread on a separate @& and onl two partitions ha6e
been ta$en on our hard dri6e. <o see what our current partitions loo$ed li$e on
a Windows XP computer# "o to Control 4anel; A#mini$trative 0ool$;
Com&uter Mana"ement; Stora"e; 8i$* Mana"ement,
5ecause there are two partitions left# ou could install Linux on one of them.
Iowe6er# fast forward to +*)* and loo$ at Windows 7 partitions on one of the
most common laptop from IP-
7otice the differenceE !n a Windows 7 IP laptop# all four partitions ha6e been
ta$en. We now ha6e a partition called IP4<!!L2 which controls the 5I!2
computer start settin"s and we ha6e another partition called >'@!L'>F
which is the bac$up folder for our Windows 7 pro"ram 9but not the data on our
@ &ri6e:. If and onl if all four partitions ha6e been ta$en# then we need to create
a B25 Flash &ri6e cop of this reco6er partition in order to delete it from the
hard dri6e. Bse a blan$ B25 flash dri6e with at least ,+ H5 of memor. Bse a
name brand from a manufacturer ou trust. <hen be sure to label this B25 when
ou are done and do not tr to use this B25 >eco6er for anthin" else.
8i$able ?$er A++ount Control
<emporaril disable Windows Bser 3ccount @ontrol if Bser 3ccount @ontrol is
enabled. &oin" so decreases the chances of encounterin" problems durin" the
process.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*#
8i$ablin" ?$er A++ount Control
@lic$ Start# Control 4anel # and then clic$ ?$er A++ount$ .
<hen clic$ C%an"e ?$er A++ount Control $ettin"$ .
<o turn off Bser 3ccount @ontrol# mo6e the slider to the bottom 99ever notif6:.
<hen clic$ :7. <hen restart our computer for this chan"e to ta$e effect.
4rint out t%e$e in$tru+tion$ a$ 6ou will %ave to +lo$e all ot%er &ro"ram$
w%ile +reatin" t%i$ <e+over6 8i$*.
Save t%e 24 re+over6 file to a ?S! fla$% #rive
IP reco6er software allows ou to ma$e only one reco&ery backup . <hese
bac$up files contain the ori"inal operatin" sstem# dri6ers# and application
software that shipped with the computer. ;a$in" a cop of this file ta$es about ,*
minutes. &isconnect from the Internet and close all other software. <hen insert
the flash dri6e. If a window opens as$in" ou if ou want to use the flash dri6e for
files or bac$up# just close the window. <his is not "oin" to be a bac$up. It will be
a reco6er tool. From the Windows &es$top# clic$ Start# and enter reco6er
mana"er into the 2earch field. 3lternatel# select Start N All 4ro"ram$ N 24 N
24 <e+over6 Mana"er N 24 <e+over6 Me#ia Creation

Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*C
If a Bser 3ccount @ontrol messa"e opens# clic$ Me$ or enter our lo" in
password# whiche6er is reKuired. 3 >eco6er ;ana"er window opens. @lic$
<e+over6 Me#ia Creation 7!<'- If >eco6er ;edia @reation is not a6ailable
9"raed out:# then a reco6er ima"e has alread been created. &ue to license
restrictions# onl one set of reco6er media can be created. 3n new reco6er
media must be ordered online or obtained usin" another method.
<e+over6 Mana"er, <e+over6 Me#ia $ele+tion
2elect >e+over6 Me#ia Creation wit% a ?S! fla$% #rive # and clic$ 9ext.
@lic$ Create re+over6 me#ia wit% a ?S! fla$% #rive # and then clic$ 9ext .3
6erification window opens# showin" the hard dri6e locations for remo6able discs.
2elect the location for our B25 flash dri6e# and then clic$ 9ext.
3 >eco6er ;ana"er messa"e opens statin" that the flash dri6e will be
formatted. @lic$ :7 to format the B25 flash dri6e and continue. 7!<'-
Formattin" this flash dri6e deletes an files on the dri6e.
Wait while the software creates our reco6er media. >eco6er ima"e creation
happens in two sta"es. First# the software copies the files to the B25 flash dri6e.
2econd# the software 6erifies the files that files were copied successfull. 3
screen displas for each process. @lic$ =ini$% when >eco6er ;ana"er has
created the reco6er media.
7ext# we need to ma$e sure we safel remo6e the B25. If a warnin" comes up
that the B25 cannot safel be remo6ed because it is still runnin"# then turn off
the computer before remo6in" the B25. 2tore the B25 flash dri6e in a safe#
protected place. If ou attempt to sa6e another reco6er ima"e to a B25 flash
dri6e after successfull sa6in" one reco6er ima"e# a screen displas statin" that
onl one reco6er set is allowed. <he onl choice is to clic$ :7 and exit the
pro"ram. <o 6erif that our reco6er ima"e has been made# clic$ on the
>eco6er ;ana"er and attempt to create another reco6er. Fou should see a
screen notin" that our reco6er file was successfull made.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*+
Ste& -8, 8elete t%e <e+over6 &artition.
While ou can remo6e the IP >eco6er partition throu"h the Windows Partition
;ana"er# we will instead use the IP >eco6er ;ana"er to remo6e this bac$up
file because the IP tool is safer than the Windows tool. <his IP tool is the same
tool we used to create the B25 Flash &ri6e of the >eco6er file. <o remo6e the
reco6er partition# clic$ Start# tpe >eco6er in the search field# and clic$ on
<e+over6 Mana"er when it appears in the pro"ram list to open the >eco6er
;ana"er window. @lic$ A#van+e# o&tion$.
2elect the <emove re+over6 &artition option and clic$ 9ext. When prompted
to 6erif that ou want to delete the partition# select the Me$ option# and clic$
9ext. 3llow the remo6al process to continue and restart the P@. 7ow chec$ to
see if the partition was remo6ed. Ho to Control 4anel; A#min 0ool$; Com&uter
Mana"ement; Stora"e; 8i$* mana"ement,
We now ha6e onl three partitionsD ;ission accomplishedD
Ste& -9, Ma*e a re+or# of all of our /in#ow$ &ro"ram *e6$.
<he easiest wa to "et the product $es for Windows XP or Windows 7 and
!ffice is to use the free !elar+ A#vi$or. 2tore these $es on a jump dri6e 4 not
on our @ &ri6e. <his wa if the computer crashes completel# we can reinstall
e6erthin" usin" the product $es. Ia6in" the product $es helps if the ori"inal
installs were done online and we do not ha6e @&s to reinstall pro"rams from. <o
download 5elarc 3d6isor# "o to- http-..www.belarc.com.freeTdownload.html
<hen "o to &ownloads folder and find this file. >i"ht clic$ and select <un a$
a#mini$trator. It will create a local screen with all of our software and hardware
information includin" all product $es. 3ll of our P@ profile information is $ept
pri6ate on our P@ and is not sent to an Web ser6er.
7ow that we ha6e bac$ed up all of our files and remo6ed the IP >eco6er
partition# we are almost read to dual boot Linux onto our computer. <here are
onl a couple of thin"s we still need to do. <he first is to create a bootable flash
dri6e with Linux ;int ;ate on it. <he second is to shrin$ our @ dri6e to create
more room for Linux ;int. We will co6er both of these tas$s in the next section.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*D
%/.( Dual :oot Linux Mint 1ith <indo1s J* or <indo1s ?
3his section revie(s ho( to add @inu= Mint to a computer that already has
4indo(s H& or 4indo(s * on it so that you can use either system.
We will now show ou how to create a &ual 5oot sstem on our home computer
so that ou can ha6e more than one operatin" sstem. &urin" this process# we
will replace the Windows 5oot ;ana"er with a better boot mana"er called the
H>B5 + 5oot ;ana"er which automaticall adds Windows to it.
8ownloa# t%e Linux Mint 1. x6> bit )S: file from
http-..www.linuxmint.com.download.php
5ecause I am installin" Linux ;int on a /1 bit computer with at least 1 H5 of
>3;# I ha6e selected the /1 bit 6ersion. 5ut if ou ha6e a computer with less
than 1 H5 of >3; which is a ,+ bit computer# then select the ,+ bit 6ersion of
Linux ;int ;ate. <hen on the next screen# scroll down the list to our countr and
pic$ one of the download centers. <his will brin" up the &ownload 7otification
screen. @lic$ 2a6e. It is a 6er lar"e ) H5 file and ma ta$e up to an hour to
download. 5e patient and do not tr to access the file until it is full downloaded.
<he next step is to download B7etbootin to create a Li6e B25.
?$e ?9etbootin to +reate a Live ?S! =la$% 8rive
B7etbootin allows ou to create bootable Li6e B25 dri6es for Linux distributions.
Fou will need a B25 Flash &ri6e which is at least + H5. It should be empt and in
a format of F3<,+. <o 6erif that our B25 is F3<,+# in our Windows computer#
"o to 2tart# ; @omputer and ri"ht clic$ on the B25 &ri6e. <hen clic$ on
4ro&ertie$.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #**
If it is not F3<,+# clic$ on 4ro&ertie$; =ormat to reformat it. !nce formatted#
note the ;ount Point 9&ri6e Letter: of the dri6e 9in m case it is &-:. Fou will need
to $now this later. >emo6e an other B25 dri6e 9includin" external hard dri6es:
connected to our P@ except for the one ou want to use for the installation.
8ownloa# ?9etbootin to 6our +om&uter
Ho to the followin" lin$ to download it. http-..unetbootin.sourcefor"e.net.
<here are three different 6ersions of B7etbootin# one for Windows# one for Linux
and one for ;ac !2 X. <he resultin" B25 dri6es are bootable onl on P@s 9not
on ;acs:. Pic$ the 6ersion for our current operatin" sstem and download it-
<hen sa6e this file to our &ownloads folder. Fou won=t ha6e to install it# it will run
directl from the downloaded file. <hen "o to our &ownloads folder and find the
file B7etbootin 2etup.exe. >i"ht clic$ on the file and select <un a$
A#mini$trator,
2elect the 8i$* )ma"e option. <hen browse for and select the Linux ;int )N I2!
which should also be in our &ownloads folder. ;ar$ sure the <ar"et <pe is set
for our B25 &ri6e and that the &ri6e is set for the ;ount point 9&:. <urn off all
other pro"rams. <hen clic$ !C. <he bootable li6e% B25 creation process will
ta$e a few minutes. When it is done# it will show a screen confirmin" ou ha6e a
Li6e B25. Cli+* 3xit rat%er t%an reboot as we need to first chan"e the 5I!2
boot order. Label our Li6e B25 and do not use this B25 for anthin" else.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*:
S%rin* t%e @olume on t%e /in#ow$ C 4artition
!ur next tas$ is to resiGe the Windows @ partition. <his will "i6e us the space we
need to add partitions for Linux ;int. <o use the automatic install method# it is
important to resiGe the @ dri6e before we install Linux. We will therefore use the
Windows Partition ;ana"er to resiGe the @ &ri6e. In Windows XP or Windows 7#
"o to 2tart 5utton and clic$ on the Control 4anel. <hen clic$ on A#mini$trative
0ool$; then Com&uter Mana"ement# then Stora"e; then 8i$+ Mana"ement.
3fter deletin" the >eco6er Partition# we ha6e )7 H5 of Bnallocated space and a
lot of H5 in the @ dri6e. What we want to do is to mo6e about half of the space
from the @ dri6e to the Bnallocated space so we can use this to install Linux.
@lic$ on the C #rive box abo6e to select it. <hen ri"ht clic$ to brin" up the
4artition 3#it screen. @lic$ on S%rin* @olume. It will ta$e Windows a couple of
minutes to fi"ure out how much space is a6ailable on the @ dri6e to shrin$. It will
then displa the followin" screen-
&o not trust the siGe a6ailable to shrin$ space% as it is not accurate. Instead ou
should onl ta$e about half of the space that is indicated as a6ailable. 3fter
puttin" in that number# clic$ S%rin*. It will ta$e a few minutes for the @ dri6e to be
resiGed. When it is done shrin$in"# the space will be mo6ed to the Bnallocated
space. 7ow we can close Windows.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #*)
C%an"e t%e !oot :r#er in 6our +om&uter !):S $ettin"$
!ur next step is to set the boot order in 5I!2 to use the B25 Li6e Flash &ri6e
instead of the Windows 5oot ;ana"er. <his reKuires turnin" off and restartin"
our computer. !3=:<3 <3S0A<0)91 M:?< C:M4?03< 0: C2A913 023
!::0 :<83<; 4<)90 :?0 A C:4M := 023 <3S0 := 02)S S3C0):9 a$
6ou will not %ave a++e$$ to t%i$ $+reen w%ile 6ou are in$tallin" Linux MintF
7ow that we ha6e created a Li6e B25 with B7etbootin# lea6e the Li6e B25 in the
B25 port or if ou too$ it out# reinsert it. <he next step is to chan"e the 5I!2
5oot !rder so that the Li6e B25 is the first item selected. >estart our computer
and press the appropriate button 9usuall F)# F+# F)+# or '2@: while our
computer is startin" to "et to our 5I!2 menu.
<hen use the ri"ht arrow on our $e board to select S6$tem Confi"uration.
<hen use the &own arrow to select !oot :&tion$. <hen press 'nter on our
$eboard to start the 5oot !ptions screen.
It ma appear as if the onl options are @& >!; or Flopp &isc. Iowe6er# select
!oot :r#er to brin" up another screen. <hen select ?S! 8i$*ette on 7e6O ?S!
2ar# 8i$+. @lic$ =6 to raise it to the top of the list. <hen clic$ =10 to sa6e and
close the settin"s. <his will chan"e the startup order to boot B25 b default. !n
>estart# the B25 screen appears and starts the Linux ;int installer.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:!
)n$tall Linux Mint in a 8ual !oot on 6our +om&uter
We will use the Linux ;int installer to create install Linux ;int. While there are
other was to create partitions# doin" it directl with the Linux ;int installer is the
most reliable method. 3fter bootin" from the Li6e B25# the first screen ou will
li$el see after our computer restarts will be the followin".
<his will start the Linux ;int )N operatin" sstem installation process and brin"
up the followin" screen-
@lic$ on the circular disc which sas )n$tall Linux Mint. It is in the left side of
our screen. <his will brin" up the )n$tall /el+ome screen. @hoose the
lan"ua"e and clic$ on Continue. <he next screen recommends that ou connect
to the internet. Fou do not reall need to be connected to the internet as ou can
add updates later. 2o clic$ Continue.
)n$tallation 06&e S+reen an# :&tion$
When ou "et to the place in the installation where ou are "i6en se6eral options#
#o 9:0 $ele+t u$in" t%e entire #i$+. <his would wipe out our @ &ri6e and all
of our dataD When we install Linux ;int as a dual boot with Windows 7# we ha6e
a fifth option called )n$tall Linux Mint alon"$i#e /in#ow$ 5'.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:"
<he reason this is the default option is that if ou lea6e it set for this option# Linux
;int will automaticall create our new partitions for ou and install Linux ;int in
whate6er free space ou ha6e on our hard dri6e. Let=s ta$e a closer loo$ at
these options before we select one.
)n$tallation :&tion 1, 0%e Automati+ )n$tall :&tion
<he benefit of the automatic install option is that ou do not ha6e to learn about
partitions or "o throu"h the hassles of creatin" our own partitions. (ust clic$ on
Install and then run throu"h the confi"uration screens. 3fter automaticall
installin" Linux ;int# the new partitions as seen from inside Windows 7 will loo$ a
lot different. <his ima"e shows the partitions from the computer used for this
tutorial after the dual4boot operatin" has completed.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:
<here are howe6er a few drawbac$s of the automatic install method. First# it will
onl create two partitions one for Linux ;int and another for a swap% partition.
<he Linux 5oot ;ana"er# called H>B5 + will be installed into the Linux ;int
partition and so will all of our data. 97ote that Windows also installs all of our
data on its partition which is called the @ dri6e:. <his means that whene6er ou
want to chan"e our operatin" sstem# ou will need to ma$e a cop of all of
our data on a B25 Flash &ri6e# then replace the old operatin" sstem with the
new one# then reinstall our data into the new operatin" sstem. Fou would not
ha6e to do this if our data was on a different partition than our operatin"
sstem. <he second drawbac$ of the automatic install method is that Linux will
automaticall replace the Windows 5oot ;ana"er with the Linux 5oot ;ana"er
9called H>B5 +:. <his is not that bi" of a loss as the Windows 5oot ;ana"er is a
piece of jun$. 5ut it would be nice if Linux would at least warn ou of what it is
doin" before ou clic$ on the Install 7ow button. <he third drawbac$ of the
automatic install method is that ou need to shrin$ the @ dri6e before ou install
Linux ;int and ou ha6e no control o6er the siGe of an of the partitions.
In @hapter /# we went throu"h all of the steps of doin" a manual installation.
Iowe6er# since we ha6e alread shrun$ the @ dri6e and we actuall want the
H>B5 + 5oot ;ana"er to replace the Windows 5oot ;ana"er# and since the
automatic install is less li$el to ha6e errors than a manual install# in this Quic$
2tart Huide we will simpl select the 3utomatic Install option called Install Linux
;int alon"side Windows 7 9or Windows XP:. <hen clic$ )n$tall 9ow.
Choose a time Ione and clic7 Continue. Select a language. 3hen clic7 Continue.
'nter our name# user name and passwords. 2ettin" to lo" in automaticall will
sa6e time when rebootin" while installin" and uninstallin" pro"rams. <hen clic$
@ontinue. 7ow we "et the slide show which ou can read while Linux is bein"
installed. <he slide show explains the features that come with Linus ;int ;ate.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:#
=ini$% )n$tallin" Linux Mint
3fter "oin" throu"h the install screens## ou will come to the followin" screen-
@lic$ on <e$tart 9ow. <hen while our computer is temporaril off# remove t%e
?S! Live $ti+*. !therwise# it will tr to install Linux ;int a"ain instead of "oin"
to the H>B5 + screen or the Windows 5oot ;ana"er.
?$in" t%e 1<?! 2 Startu& $+reen
When our computer starts# ou will find man entries on the H>B5 + screen-
<he first entr in the list will be Linux ;int )N. Press 'nter on our $eboard to
start ;int )N. <he first Windows entr is actuall the Windows 5oot ;ana"er
which is still on the partition called sda). <o start Windows# use the down arrow
on our $eboard to select this. <hen press 'nter to start it. @lic$in" on this will
simpl brin" up the Windows 5oot ;ana"er and ou will ha6e to clic$ on
Windows 7 a"ain to "et to the @ dri6e. <he second Windows entr is our
Windows >eco6er dri6e. @lic$in" on this will ta$e ou to a series of Windows
>eco6er steps familiar to those who ha6e tried to reco6er Windows after it has
crashed. 2o it is best to select the first Windows option on the list if ou want to
start the Windows operatin" sstem instead of the Linux operatin" sstem. 5elow
is the initial Linux ;int screen ou will see after it is installed-
7ow that we ha6e Linux ;int installed on our computer and we $now how to
access it after turnin" on our computer# in the next section# we will re6iew how to
use Linux ;int and how to add some important free pro"rams to it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:C
%/., 0as# Ste!s and Free Tools for =sin5 Linux Mint
3his section e=plains ho( to use the @inu= Mint operating system to change the
appearance of your des7top, set up Kuic7 launch icons on your des7top and
install important free programs to e=pand the function of @inu= Mint.
Iere is the initial 2tart screen for Linux ;int ;ate-
@lic$ Menu which is in the lower left corner-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:+
@inu= Mate has t(o Start Menus
With ;ate# there are two start menus. 3bo6e is the =avorite$ Menu. @lic$ on 3ll
3pplications to reach the A&&li+ation$ Menu.
4nstall =!dates
3he first step after installing Mate is updating all of the tools that come (ith Mate.
3o do this, clic7 on the Menu icon in the lo(er left corner. <hen clic$ on t%e
Control Center which is in the left column. Ne=t clic$ on S6$tem; then ?&#ate
Mana"er
Enter your pass(ord. 3hen the follo(ing screen (ill appearF
<hese are alread selected. @lic$ on )n$tall ?&#ate$. @lic$ !C to all Kuestions.
<his one time update will ta$e about N minutes to complete. When the are done#
ou will be returned to the 2tart screen. <o insure there are no more updates#
clic$ on ;enu# @ontrol Panel# Bpdate ;ana"er a"ain. <his time the list should be
empt. @lose the Bpdate ;ana"er and the @ontrol @enter. When the upload is
done# restart Linux. <o do this# clic$ on the ;enu. <hen clic$ >estart.
@on"ratulationsD Fou now ha6e a full updates Linux ;int ;ate operatin" sstem
installed. !ur next tas$ will be to install a custom des$top bac$"round ima"e.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:D
A## a Cu$tom 8e$*to& !a+*"roun# )ma"e
Linux ;int ;ate has a wonderful sstem for addin" an of thousands of
bac$"round ima"es to our des$top includin" our own personal ima"es. <o
install a new bac$"round ima"e# clic$ on Control Center in the main menu.
@lic$ on A&&earan+e. <hen clic$ on the !a+*"roun# <ab-
<here are about one doGen bac$"round ima"es here. 5ut there are thousands
more ou can "et b clic$in" on the lin$- 1et more ba+*"roun#$ online-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:*
<here are ),0 pa"es of bac$"rounds or o6er )1** choices. Fou can also create
our own ima"es )*+1 pixels wide b 7/A hi"h. 5e sure to optimiGe the file siGe
to $eep it under )**C5. <hen upload it to our &ownloads folder. When selectin"
a new des$top ima"e# ma$e sure that there are not a lot of "raphics on the left
side of the ima"e as this is where we will be placin" our des$top Kuic$ lin$ icons.
If ou do not "et the chance to "et outdoors much# choose a li"ht blue ima"e with
a lot of s$ for our des$top ima"e. !n pa"e )) is one such ima"e. 5ut ou can
download se6eral ima"es and choose between them later.
<o "et this ima"e# clic$ on H!. <hen ri"ht clic$ on the ima"e and choice Save
)ma"e A$. <his brin"s up our ;int ;ate &ownloads folder.
@han"e the name of the ima"e to somethin" more descripti6e and clic$ 2a6e.
3fter downloadin" all of the ima"es ou want to the ;ate &ownloads folder# exit
Firefox browser to "o bac$ to the 3ppearances Preferences 5ac$"round screen
and clic$ 3&&. 5 default# ;ate loo$s in our 4i+ture$ folder to see if there are
an ima"es. @lic$ on !a+*"roun#$ in the left column abo6e. <his is where the
default bac$"round ima"es are $ept-
<hen clic$ on Linux Mint 9a#ia extra to open this folder. <his is where all of
our default bac$"round ima"es are $eep. <he location is =ile Mana"er; u$r;
$%are; ba+*"roun#$; LinuxmintLna#ia-extra. We can ri"ht clic$ on an of
these ima"es to delete them from our default list. !r we can add ima"es to this
list b mo6in" them from the 8ownloa#$ folder to this list. We could also just
na6i"ate from this browse function to the 8ownloa#$ folder and lea6e the
ima"es there. 5ut this will clutter up the ;ate &ownloads folder and run the ris$
of accidentall deletin" our bac$"round ima"e in the future.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #::
7ext clic$ on our 2ome folder-
<hen clic$ on the 8ownloa#$ folder to select the ima"e ou want to turn into add
to Wallpaper and clic$ !pen. <his automaticall adds this ima"e to our list of
options and applies this ima"e to our des$top. >epeat to add more ima"es. <o
remo6e ima"es from the list# clic$ on an ima"e and then clic$ on &elete.
C%an"e 6our 8e$*to& 0%eme
In addition to chan"in" the 5ac$"round ima"e# we can chan"e the theme% used
to displa open Windows. @lic$ on the 3ppearance Preferences 0%eme tab.
<hen clic$ on @ustomiGe which will ta$e us to the pre4installed theme options.
;int X is the default theme. 5ut there are se6eral themes inside of ;ate ou can
select. @lic$ on ;ist.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #:)
@lic$ on the /in#ow !or#er tab-
<here are about +* tab displa options# <o select the option closest to Windows
7# clic$ on /inMe. <hen clic$ @lose. We now ha6e a Windows li$e theme and a
li"ht blue des$top bac$"round. @lose the @ontrol @enter.
A## A&&li+ation Laun+%er' )+on$ to our 8e$*to&
We next need to add some 3pplication Icons to the &es$top. @lic$ on the 2tart
;enu. <his brin"s up the =avorite$ screen-
<hen clic$ on All A&&li+ation$ in the upper ri"ht corner. <his chan"es the main
menu from the Fa6orites screen to the 3pplications screen-
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)!
<hen clic$ on :ffi+e,
<he most important application is Libre!ffice Writer# which is the open source
6ersion of ;icrosoft Word. @lic$ on this application. <hen hold down on this
selection and dra" the icon to the des$top.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)"
7ow add Firefox browser to the des$top usin" the same process. @lic$ on ;enu.
<hen clic$ on )nternet. <hen ri"ht clic$ =irefox. <hen clic$ 8e$*to&. :r Cu$t
#ra" t%e i+on to t%e #e$*to&.
C%an"e 8e$*to& Settin"$
Fou can also control which default icons appear on our des$top b "oin" to
;enu# Preferences# &es$top 2ettin"s. We can delete the home or computer
Kuic$ start icon here if we want less on our des$top. !r add the <rash icon if we
want the trash can on the des$top.
Turn off the Touch *ad
A nagging problem in (riting articles (ith @ibre 4riter is that the pointer and
screen and scroll bar all tend to <ump around if you have a sensitive touch pad.
3his is not the fault of @ibre 4riter. /nstead, it is an issue (ith ho( @inu= Mint
handles the touch pad on your 7eyboard. /f you use a mouse, you have t(o
options. 3he easiest (ay to stabiliIe your pointer is to open the 6ontrol 6enter
in your Mint Menu and clic7 on the Mouse /con in the ;ard(are section.
3his brings up the Mouse *references (indo(.
Clic7 on the Touch!ad tab and chec7 1Disable touchpad (hile typing.2 3his (ill
7eep the touch pad off (hile you are typing and seconds after you stop typing.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)
A## =ree 4ro"ram$ wit% t%e Linux Mint Software Mana"er
!ne of the bi""est ad6anta"es of Linux o6er Windows is that there are tens of
thousands of free open source pro"rams which ou can add to customiGe our
computer. <o add pro"rams# "o to the 2tart ;enu and clic$ on 3dministration#
then Software Mana"er,
Add a Free Touch *ad 6ontrol Tool
3o get a better tool to control the touchpad, clic7 on the Soft(are Center (hich is
also in the Mint Menu. 3hen type in 1gpointing5device5settings2 in the Search
.o=. 3his (ill bring up t(o results. 3he i#:D version is for # bit computers and
the unmar7ed version is for =DC bit computers.
Clic7 install. 3his adds a ne( entry to the Control Center called &ointing Devices.
First clic7 on Mouse &references and turn off 1Disable 3ouchpad (hile typing2 as
the Mouse settings override the &ointer settings. 3hen clic7 on the &ointer icon to
bring up the 'pointing Device Settings 4indo(.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)#
Clic7 Disable touchpad 6 or disable (hile other devices are connected. 3hen
clic7 -8. $our touch pad (ill no( stay off for as long as your computer is turned
on. Note ho(ever, that (hen you restart your computer, you (ill need to repeat
the processF unchec7 Disable 3ouchpad, then clic7 -8. 3hen open it again and
chec7 Disable 3ouchpad again. 3hen clic7 -8.
Add a :etter Screen 6a!ture Tool
3he default screen capture tool that comes (ith @inu= Mint has a couple of minor
problems. 3he biggest problem is that it does not really optimiIe the image file
siIes of images very (ell. 3han7fully, there is an e=cellent screen capture tool
called Shutter available in the Soft(are Manager. Enter shutter into the search
bo=. 3hen clic7 on Shutter to reach its screen. 3hen clic7 on 4nstall.
3o put Shutter on your des7top, clic7 on the Mint Menu and clic7 on
Accessories. 3hen right clic7 on Shutter and drag it to the des7top. 3hen clic7
on Shutter to open it.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)C
Clic7 on 0dit; then *references to open the &references (indo(. Change the
image format to +*0" and select Automaticall# co!# to cli!board. 3hen set
capture for a delay of # seconds. 3hen clic7 Close. 3here are several (ays to
capture images (ith Shutter. 3o capture a region, clic7 on Selection. 3o capture
any particular open (indo(, clic7 on the dropdo(n arro( to the right of 4indo(.
3o capture a comple= dropdo(n menu, clic7 on the Menu /tem.
Set Libre Office as Default 0ditor
3he default te=t editor for @inu= Mint, (hich is called &luma, does not have very
many editing options. /f you go to the 6aEa File mana5er and right clic7 in the
(or7space to create a ne( document, @inu= Mint (ill open a te=t Editor called
&luma. 4e (ould rather have the Mint file manager open Libre <riter because
this is the 1orldBs best text editor 3o ma7e this change, go to 6ontrol 6enter;
Other; *referred A!!lications; s#stem tab; set Text 0ditor for Libre Office.
Add #our !rinter to Linux Mint
3o install your printer on @inu= Mint is usually a pretty simple matter. 'o to
Control &anel, &rinters. 3hen clic7 on *rinters. 3hen clic7 on ADD. Select the
printer you (ant to use, then clic7 For1ard. @inu= Mint (ill search for a driver for
this printer. 3ype in the name you (ant to use for this printer. 3hen clic7 A!!l#.
CongratulationsG $ou no( have your printer hoo7ed up to @inu= Mint and you are
(ell on your (ay to gaining your freedom from Microsoft and the NSA.
<hatBs Next
/n the ne=t section, (e (ill revie( some final steps to gaining and retaining your
freedom.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)+
%/.' Final Ste!s to Freedom
!s flowers )eneath *ay5s footstep wa"en,
!s stars from ;i#ht5s loose hair are sha"en,
!s waves arise when loud winds call,
(hou#hts sprun# where that step did fall...
! rushin# li#ht of clouds and splendor,
! sense awa"enin# and yet tender
Was heard and felt A and at its close,
(hese words of Boy and fear arose...
Cise li"e Dions after slum)er, in unvan6uisha)le num)er.
Sha"e your chains to earth li"e dew, which in sleep had fallen on you.
We are many A they are few... We are many A they are fewE
*erc# Shelle#; %%&; after the slau5hter of !ro)democrac# !rotesters in
Manchester 0n5land.
/n this section, (e (ill cover steps you can ta7e to continue your progress
to(ards freedom. As / did the research for this boo7, / often as7ed myself 6 ho(
could things have ever gotten this badL 4hy have (e allo(ed the Microsoft?NSA
monopoly go on so long that this Evil Empire is no( on the verge of total control
over )!U of the (orld>s t(o billion computersL /t is easy to blame government
corruption combined (ith corporate greed. .ut (e elected the criminals (ho no(
run our government and (e continued to buy soft(are from a company that has
repeatedly ripped us off and sold us out.
/ am as guilty as anyone. For years, / taught courses in ho( to use Microsoft
programs (ithout the slightest clue that / (as harming my students more than
helping them. /t (as really not until the 4indo(s : disaster that / began to realiIe
(hat (as happening. 4hat really (o7e me up (as the research / did on 0EF/
and 1secure boot.2 .y the time the Sno(den revelations came out in 9une !"#,
/ had already confirmed that Microsoft had colluded (ith the NSA to create the
Flame virus and that there appeared to be a plot to use 0EF/ to gain complete
control of our computers. 3he Sno(den revelations simply turned my concerns
from a strong suspicion to an outright certainty.
3here are technical steps you can do to move to(ards privacy and freedom. /n
Chapter ), (e revie(ed several concrete steps to regain your freedom. 4e (ill
not revie( them again here. .ut they includedF
First, resetting your search engine to Duck Duck "o;
Second, getting a ne( more secure email address from riseu!.net.
3hird, using your ne( email address to set up an account (ith Thunderbird.
Fourth, adding t(o tools to 3hunderbird to give you the option of encrypting our
email. 3hese are 0ni5mail 1ith "nu *ri3ac# "uard.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)D
9o1 1ill kno1led5e be shared in the future8
3his is our last chance to go into detail on ho( the choice of computer start up
programs, and in particular =0F4 3ersus 6ore :oot, plays a crucial role in our
ability to create and share 7no(ledge. 3his issue (ill determine (hat 7ind of
future (e (ill have and (hat 7ind of future (e (ill (e leave for our children. 4ill
it be a (orld (here our children control access to their o(n 7no(ledge and to the
tools needed to create 7no(ledge 6 or (ill it be a future in (hich the monopoly of
Microsoft and the .ig .rother po(er of the NSA control access to the tools of
7no(ledge and the nature of the 7no(ledge they have access toL
This book is not Eust about the securit# ad3anta5es of Linux o3er <indo1s
.ecause the connection bet(een Microsoft and the NSA has been in the ne(s
recently, there is a tendency for us to loo7 at @inu= as a (ay to regain our
freedom from the NSA. 3here are certainly security advantages in a dispersed
system such as @inu= over a centrally controlled system such as MS 4indo(s.
;o(ever, merely putting @inu= on your system 5 (ithout also ta7ing other steps 5
(ill not guarantee your safety or security. Even those D!! million people (hose
4indo(s H& systems are going to put at ris7 (hen Microsoft abandons them on
April : !"C should loo7 at this as a 1blessing in disguise2 because this (ill give
them the motivation to get informed 6 and 7no(ledge is po(er. As for those (ho
have moved to @inu= because of complaints about ho( difficult it is to use
4indo(s :, (e should loo7 at this as an opportunity to (a7e up and learn about
other important and needed changes that urgently need to be made if (e are
truly to be free from the control of corporate monopolies.
Sadly, there is an even greater threat to our safety than all of the bac7 doors
inside of 4indo(s :. 3hat threat is the =0F4 Start =! *ro5ram and the tool
Microsoft has placed inside of 0EF/ called Secure .oot. ,ichard Stallman has
more accurately called this 1feature2 of 4indo(s : 1,estricted .oot.2 / am
therefore ta7ing this opportunity to e=plain the dangers of 0EF/ and Secure .oot
and to provide a path for(ard 6 specific action (e can ta7e no( 6 to insure that
our children have control over their o(n computers and control over their o(n
futures. 3his future is not only dependent on using @inu= and @ibre -ffice instead
of 4indo(s and MS -ffice 6 it is even more dependent on using a free open
source startup program called 6ore :oot instead of using the ultra5secret and
e=tremely dangerous startup program called 0EF/.
<hat is a Start =! *ro5ram and <h# is it im!ortant8
4hen you push the -N button on your computer, the first program that starts is
not the operating system. /t is not 4indo(s or @inu=. /nstead, it is a program
(hich sets up the computer po(er functions and ma7es sure everything is
running o7ay. 3he start up program turns on the operating system>s 1boot
manager2 (hich in turn turns over control of your computer to (hichever
operating system you have selected (ith the boot manager.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #)*
3he reason the Start 0p program is important is that, if it does not run properly,
you (ill not have any access to your computer or your data. 3hin7 about this.
4ith 4indo(s * and 4indo(s H&, both of (hich use the ./-S startup program, if
your operating system crashes, you can still start up your computer and press on
F", F, F"! or Escape to go into your computer>s ./-S Start 0p program and try
to ta7e steps to repair your computer. $ou can even use ./-S to install and use a
different operating system. ;o(ever, (ith 0EF/ and the 4indo(s : system, if
your Start 0p program fails to start, your computer (ill become as useless as a
big bric7 6 thus the phrase 1Microsoft <ust bric7ed my computer.2
<hat are :4OS; =0F4 and 6ore :oot8
./-S is a Start up program that (as (ritten in ")*+ by 'ary 8ildall. ./-S stands
for .asic /nput -utput System. 4ith the release of 4indo(s : in -ctober !",
Microsoft>s certification reKuirements no( reKuire that all computers include the
terrible 0EF/ startup chip. 0EF/ is a radically different start up program (hich is
many times larger and more comple= than ./-S. 3he pro<ect (as originally
started by /ntel around "))), but (as greatly e=panded by Microsoft in !!D. 3he
term 0EF/ stands for 0nified E=tensible Firm(are /nterface. Core .oot is a free
open source start up program that (as started around !!! to overcome some of
the problems of ./-S and provide a more secure alternative to 0EF/.
<here is the Start u! *ro5ram and 1ho controls it8
3he primary processor on your computer is called the ;ard Drive. 3he ;ard
Drive contains any .oot @oaders, operating systems and all of the programs and
data you have on your computer. 3he hard drive is a little chip (hich is smaller
than your little finger (hich is made by a chip manufacturer such as /ntel or AMD.
3he start up program is not on the hard drive. /nstead, it is on another chip inside
of your computer (hich starts before the hard drive. .elo( is an A4A,D ./-S
S3A,3 0& C;/& detached from its spot on the computer mother board.
4hen you press on the &o(er button of your computer and then press on the
appropriate function 7ey 6 (hich varies from one computer manufacturer to the
ne=t 6 during the first three seconds, you can bring up a user interface to ad<ust
settings in your Start 0p &rogram. Start up chips (ith their start up programs are
made by <ust a fe( manufacturers. 3hese include American Megatrends AAM/B,
/nsyde Soft(are and &hoeni= 3echnologies Aformerly A(ard Soft(areB.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #):
/n !!+, /ntel handed over the EF/ pro<ect to Microsoft (ho created a 1non5profit2
corporation called 0nified EF/ Forum to promote 0EF/. 3he 0EF/ forum also
includes AMD, American Megatrends, Apple, Dell, ;&, /.M, /nsyde, /ntel, @enovo
and &hoeni= 6 in addition to Microsoft. Since Microsoft too7 over the 0EF/
pro<ect, there have been several versions of 0EF/. Eersion .! (as published on
-ctober : !!:. Eersion .# (as published on May : !!) and Eersion .#."
(as published on April : !"".
Secure .oot is a 1feature2 Microsoft added to 0EF/ in Eersion .#. 3his feature
prohibits the computer from (or7ing unless it has a 1certified signature2 (hich is
typically supplied by Microsoft. 4ith the release of 4indo(s : in -ctober !",
Microsoft>s certification reKuirements no( reKuire that computers include the
0EF/ plus secure boot startup program. 3his is (hy nearly all computers no(
come (ith the 0EF/ startup program.
<h# 6ore :oot andMor :4OS are better than =0F4
Microsoft Aand the NSAB (ill li7ely spend more than one billion dollars trying to
convince us that ./-S (as old and had had to go 6 (hile 0EF/ is ne( and
therefore more secure. ;o(ever, there is considerable evidence that the move
from ./-S to 0EF/ and the design of 0EF/ and Secure .oot has nothing to do
(ith security and everything to do (ith retaining control over our computers and
NSA access to our computers. ;ere (e (ill address several myths about ./-S
and then loo7 into the false claims made about 0EF/.
3he NSA (ould li7e you to believe that 0EF/ is more secure from a ,oot8it
Attac7 System A,A3SB than ./-S. A root7it attac7 Aor ,A3B is an attac7 (hereby
the attac7er gains access to the ,oot Administrator &ermissions of your
computer and therefore has total control over your computer. 3here is a basic
problem (ith this claim about 0EF/ being better at stopping these attac7s than
./-S. Nearly all of these so5called ,A3S occur inside of the ;ard Drive at either
the .oot @oader level or more commonly at the operating system level 6 for
e=ample, by follo(ing the path of the Stu=net and Flame viruses using the
4indo(s open bac7 door to attac7 computers.
3o revie(, the computer consists of the Start 0p Chip (hich starts the .oot
@oader (hich starts the -perating System (hich runs the other programs. So
,A3S occur at the operating system level, not at the Start 0p level. 3here is a
simple reason for this. 4hen you are on the internet, you are using the operating
system (hich is on the hard drive. 3he start up program is on a separate chip
(hich is not even active at this point. 3here is no access to the start up chip
A(ithout disassembling the computerB and it (ould be much harder to go
unnoticed even if you could change the Start 0p program.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age #))
The man# desi5n fla1s of =0F4 include7
First =0F4 1as and still is de3elo!ed in secrec#. As security e=perts have
often pointed out, secrecy has a lac7 of feedbac7 and is thus a model for failure.
Second; =0F4 is an enormous !ro5ram 1ith o3er ?/// files and more than
%// M: of code. 3here is safety in simplicity. More code simply leads to more
(ays to attac7 the system.
Third; =0F4 has Bcall homeF feedback loo!s 1hich 1ere not !resent on
:4OS and are not !resent on 6ore :oot. 3his is perhaps the (orst shortcoming
of 0EF/. ./-S and Core .oot are almost completely separate from the operating
system. 3herefore attac7s on the operating system rarely if ever affect the start
up program. ;o(ever, because secure boot (ill not (or7 (ithout a 1call home2
open bac7 door, =0F4 is the first start u! !ro5ram to e3er ha3e a call home
feedback loo!. 3his feedbac7 loop (ould ma7e it possible for an attac7er (ho
gains access to the AuthoriIed Certificates to re(rite the code on the start up
chip much more easily than could be done (ith either ./-S or Core .oot.
Fourth; the Secure :oot AuthoriCed 6ertificate !rotection method has
alread# been sho1n to be o!en to successful attack. 3his is (hat Stu=net
and Flame both did (ith the 4indo(s operating system.
Fifth; =0F4 is 1ritten in in a sim!le com!uter lan5ua5e called 6 1hereas
:4OS 1as 1ritten in a more difficult Aassembl#F lan5ua5e. 3hin7 of it as
./-S being (ritten in @atin (hile 0EF/ is (ritten in plain English. 4hich language
do you thin7 (ould be more secure from casual hac7ersL
Sixth; =0F4 uses Microsoft !ro5rammin5 lan5ua5es (hich use bac7(ard
slashes for file names. 3his has also led to easy attac7s to the 4indo(s
operating system. /f one has 0EF/, these same attac7s could go directly to the
Start up chip due to the 1call home2 open bac7 doors in 0EF/.
According to security e=perts, 0EF/ is 1their (orst nightmare.2 /nstead of having
to merely replace the hard drive or replace the operating system li7e they
currently do, businesses (ill be forced to replace their entire computerG
Securit# ex!ert; :ruce Schneier calls the certificate s#stem Kcom!letel#
broken.K (he pro)lem for all of us, naturally, is if the certificate system was
hac"ed, allowin# the )ad #uys to for#e certificates. .(his has, of course,
happened )efore./ !re we finally ready to accept that the certificate system is
completely )ro"enF7
htt!s7MM111.schneier.comMblo5Marchi3esM(/%(M/(M3erisi5nNhacked.html
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!!
=0F4 1as successfull# attacked before it 1as e3en released to the !ublic!
/n September !", security researchers discovered security shortcomings in
4indo(s : Aa7a 0EF/B that create a means to infect the ne( operating system
(ith root7it mal(are. /talian security consultants /3SEC discovered the security
hole follo(ing an analysis of the 0nified E=tensible Firm(are /nterface A0EF/B.
KThe ne1 =0F4 !latform is as insecure as the old :4OS technolo5#; itBs still
3ulnerable to the old attacks...<ritin5 a bootkit couldnBt be an easier task
for 3irus 1riters 1ith the =0F4 frame1ork a3ailable; much easier than 1ith
:4OS 1hen the# needed to code to be 1ritten in !ure assembl# lan5ua5e.F
Marco 'iuliani, Director of /3SEC, in the articleF
;ac7ing 0EF/... Ne( Eicious 0EF/ boot7it vulnerability found for 4indo(s :
httpF??(((.theregister.co.u7?!"?!)?")?(in:Wroot7it?

@inus 3orvalds, the founder of the @inu= pro<ect is also not impressed (ith 0EF/.
AThe real !roblem; 4 feel; is that cle3er hackers 1ill b#!ass the 1hole
G=0F4H ke# issue either b# 5ettin5 a ke# of their o1n Gho1 man# of those
!ri3ate ke#s ha3e sta#ed reall# !ri3ate a5ain8 Oh; thatPs ri5ht; !rett# much
none of themH or the#Pll Eust take ad3anta5e of securit# bu5s in si5ned
soft1are to b#!ass it 1ithout a ke# at all.F
@inus 3orvalds on 4indo(s :, 0EF/ and Fedora 9une "! !"
httpF??(((.Idnet.com?blog?open5source?linus5torvalds5on5(indo(s5:5uefi5and5
fedora?""":*
<h# =0F4 is a TroEan 9orse
-ne of the most common tric7s used by hac7ers to gain access to your computer
is (hat they call a 3ro<an ;orse attac7. 3he attac7 is based on fooling you to
do(nload a program (hich you really should not do(nload. 3his is the eKuivalent
of inviting the thieves to enter your home. 3he thieves then change the loc7s on
your doors (hile you are not loo7ing and then come bac7 later to steal all of your
data. 3he first 3ro<an attac7 Microsoft initiated (as by inserting 4indo(s /nternet
E=plorer and D@@ files ADynamically @in7ed @ibrariesB into the 4indo(s operating
system in ")): (ith the introduction of 4indo(s ):. 4e have all seen ho( many
problems this open bac7 door has created for our computers. .ut the 0EF/ scam
is much (orse 6 because it is ta7ing a start program (ith no real security
problems A./-SB and replacing it (ith a start program (hich is literally loaded
(ith security problems A0EF/B and then trying to convince us that this (ill
someho( improve the security on our computers.
Lack of 6hoice is a Lack of Freedom
3he (orst part of all is that (e are not even being given a choice of (hether to
accept 0EF/ or not. This is because all <indo1s and A!!le com!uters are
bein5 s1itched o3er to the =0F4 start !ro5ram. 4e no longer have the choice
of buying a 4indo(s or Apple computer (ith either Core .oot or ./-S.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!"
Microsoft is once again using its monopoly po(er to force all computer
manufacturers to use 0EF/. So today, (e are all being forced to pay for and use
an e=tremely dangerous system.
4f nearl# all com!uters no1 ha3e =0F4; 1hat com!uter should 4 bu#8
$ou still have at least four optionsF
O!tion W%7 $ee! #our current com!uter.
@inu= (or7s really (ell in a dual boot (ith 4indo(s H& and if the 4indo(s H&
operating system ever goes do(n, you still have a terrific @inu= operating system.
$ou can even put 4indo(s H& into Eirtual .o= if you (ant even more security.
O!tion W(7 2e!air an# old dead com!uters #ou ha3e.
/t is li7ely that the old computer in your closet can be made to (or7 li7e ne( <ust
by replacing the hard drive chip. / have done this myself and it is not hard. .ut if
you are not thrilled about opening your computer, then ta7e it to a repair store.
$ou can li7ely get a ne( hard drive installed for less than S!!. 3his (ill give you
another computer (hich you can give to your 7ids (hen they go to college.
O!tion W,7 :u# a <indo1s J* or <indo1s ? com!uter from a used
com!uter store
3here are often very good used computers at the used computer stores. Any
./-S computer 6 including any 4indo(s H& or 4indo(s * computer 5 (ill be
safer than any 4indo(s : 0EF/ computer.
O!tion W'7 4f #ou reall# must bu# a ne1 com!uter; consider bu#in5 a
"oo5le 6hrome :ook.
'oogle Chrome .oo7s already come (ith a version of @inu= called Chrome -S.
Chrome .oo7s also include a version of the Core .oot startup program. .ecause
Chrome .oo7 computers are only ne( computers that do not suffer from the
0EF/ start up program, Chrome .oo7s are the only safe ne( computers on the
mar7et today. Chromeboo7s are also e=tremely ine=pensive 6 because you do
not have to pay hundreds of dollars for the Microsoft5NSA Monopoly.
3here are ho(ever a couple of dra(bac7s of Chromeboo7 laptops. 3he most
obvious dra(bac7 is that Chromeboo7s do not come (ith much storage on the
hard drive. 3he best solution to this problem is to 7eep most of your data on a DC
'. 0S. thumb drive Aor if you have a lot of data, put it on a one terabyte
e=ternal 0S. drive. 3his is (ay safer than leaving your data on any computer.
3he most important dra(bac7 is that Chromeboo7s all come (ith an incomplete
operating system called Chrome -S (hich is not very good for anything other
than bro(sing the internet. 4hat 'oogle (ants us to do is use the 'oogle
Chrome .ro(ser to access their online servers and use 1'oogle Docs2 for (ord
processing files stored on their servers.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!
3he problem (ith this is that (e no( 7no( that the NSA has access to all 'oogle
Servers. 3his is better than Microsoft because at least the NSA cannot bric7 you
computer. .ut it is still not freedom. 3han7fully, there is a free solution to this
problem. /f you really (ant privacy and freedom, all you need to do is modify your
Chromeboo7 by changing the operating system to the @inu= Mint operating
system. .ecause the process for adding @inu= Mint to a Chromeboo7 varies from
model to model, (e do not have instructions for this in this boo7. .ut (e (ill
provide instructions for ho( to do this (ith selected recommended models on our
home (ebsite, collegeintheclouds.org, along (ith a special forum (here you can
as7 Kuestions about ho( to s(itch your Chromeboo7 to @inu= Mint.
3here are currently several versions of the 'oogle Chromeboo7. 0nfortunately,
some are Kuite difficult to add @inu= Mint to. 3he t(o that / recommend are the
Acer 6? 6hromebook and the *ixel 6hromebook. 3he Acer C* is an ideal tool
for students. /t is ine=pensive, costing only S!! and light(eight at less than #
pounds. /t is compact at "" c inches and has a battery life of four hours. 3he
&i=el (as released in February !"# and costs S"#!!. /t features a bigger "#
inch screen (ith a bac7lit 7eyboard. 3he (eight is <ust over # pounds. /t uses a
fast /ntel i+ dual core ".: ';I processor. /t has C '. ,AM DC '. solid state
drive. /t has a battery life of + hours. Most important, it includes the ability to add
a second startup program (hich ma7es it easier to install @inu= Mint.
Late :reakin5 Ne1s about a 2e3olutionar# Ne1 6om!uter O!tion
-n September "", !"#, Acer, ;&, 3oshiba, and Asus introduced ne( Chrome
-S laptops featuring /ntel ;as(ell processors. 3he ne( Chromeboo7s are
e=pected to offer much longer battery life than their predecessors 6 up to double
the battery life. / do not recommend the 3oshiba model as there is a problem
installing @inu= Mint (ith it. ;o(ever, ;& (ill be introducing a "C inch
Chromeboo7, the biggest chrome boo7 to date. 3he cost (ill be S)) and have a
"D '. SSD. ;o(ever, none of these are actually on the mar7et. 3hus there is as
yet no (ay to 7no( (hich (ill be able to add @inu= Mint or ho( easy that process
might be. 3here is no Kuestion that either of these options, Acer or ;&, (ill be
less e=pensive for public schools than MS 4indo(s computers because 'oogle
does not charge a licensing fee to use the @inu= operating system.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!#
,esearch firm N&D says Chromeboo7s represent !5+U of the S#!!5or5less
computer mar7et. /n education, more than +,!!! schools use Chromeboo7s for
their students, representing more than !U of school districts in the 0S. An April
!"# study of " school districts by /DC found that s(itching from &Cs to
Chromeboo7s saved school districts over S",!!! per year per student.
3he study found that Chromeboo7s reduced the need for additional /3 staff to
support their deployments, reKuiring D)U less labor to deploy and )U less
labor to support than des7top &Cs or laptop &Cs. Chromeboo7s> high reliability
increased actual teaching and educational administration time by reducing the
time lost in managing des7top &Cs or laptop &Cs by :U.
Finally, the Solid State Drives are obviously more durable and user friendly that
the older drives. According to this study, Chromeboo7s are already the number
operating system in schools 6 right behind 4indo(s * and in front of 4indo(s
H&. /t is my humble opinion that the ne( Acer Chromeboo7 6 (ith an : hour
battery life and much faster processor and a (eight (ell under # pounds 5 is
going to ta7e the school student mar7et by storm.
Acer has said that this ne( laptop (ill be available as soon as November !"#.
Since these are ne( computers, (e are not able to provide instructions on ho(
to add @inu= Mint to them. ;o(ever, (e (ill be posting instructions on our
(ebsite, colle5eintheclouds.or5. 4e (ill also provide a forum and email
ne(sletter list (here you can sign up for updated information as it is available.
=se Alternati3e Ne1s Sources instead of the 6or!orate Nonsense Media
/f (e have learned anything from the Sno(den revelations, it is that (e cannot
rely on the corporate controlled main stream media to 7eep us informed about
(hat our government is doing to us. 3his means that (e have to consciously
see7 out alternate sources of information. -ne 7ey resource for the Sno(den
revelations has been 'lenn 'reen(ald and the5uardian.com. -ther important
sources include democrac#no1.or5; o!edne1s.com; alternet.com;
counter!unch.com; commondreams.or5 and Cerohed5e.com. Some of these
are regarded as left leaning (ebsites and others are regarded as right leaning
(ebsites. .ut (e need to move a(ay from the left versus right distraction and
recogniIe that the current greatest threat to our freedom is not the left or the
right, but rather it is corporate fascism 6 or the corporate control of government
and of people.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!C
3here are also several other e=cellent (ebsites to get information about ne(
developments in open source tools. 3hese include the @inu= Mint (ebsite and
the @ibre -ffice (ebsite. -ther e=cellent (ebsites for 7eeping up on open source
technology includeF
http-..forums.linuxmint.com.
http-..as$.libreoffice.or".en.Kuestions.
http-..libreplanet.or".wi$i.;ainTPa"e
http-..en.libreofficeforum.or".
http-..techri"hts.or".Estories
http-..www.techdirt.com.
6ommunit# Or5aniCin5
Another (ay to become better informed about the evolving story of open source
tools is to <oin or start a local open source community. 3here are open source
communities all over the (orld being organiIed through a group called @ibre
&lanet. 3o a search on this term to find a group near you and the time and
location of their ne=t meeting.
httpF??libreplanet.org?(i7i?@ibre&lanetF@ocalW3eams?@ist
3here are also many @inu= forums (here you can post Kuestions to and read
ans(ers to Kuestions posted by other beginners. httpF??(((.linu=.org?forums?
3here are also many 1linu= user groups2 5 also 7no(n as @0's.
httpF??en.(i7ipedia.org?(i7i?CategoryF@inu=WuserWgroups
httpF??dir.yahoo.com?computersWandWinternet?soft(are?operatingWsystems?uni=?lin
u=?userWgroups?
A Linux =ser "rou! GL="H or "N=MLinux =ser "rou! G"L="H is a private,
generally non5profit organiIation that provides support and?or education for @inu=
users, particularly for ine=perienced users. 3he term commonly refers to local
groups that meet in person, but is also used to refer to online support groups that
may have members spread over a (ide area and (hich may not have physical
meetings. 3hese groups may meet at a local library, at a community college, at
someone>s home or even at a local bar. 3here is so much happening (ithin the
open source community that it is difficult for any one person to 7eep up (ith it all.
.uilding a group of friends and a local email list for sharing ideas is an important
step for learning about the latest changes.
3here are several @0' lists on the 4eb. /f you are considering founding a @0',
your first tas7 should be to find any nearby e=isting @0's. Gour )est )et may )e
to Boin a DU already esta)lished in your area, rather than foundin# one.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!+
A Linux =ser "rou! meetin5 at a communit# colle5e.
3here are @inu= 0ser 'roups in all +! 0S states plus "!! other countries,
including ,ussia, China, /ndia, Canada and most of 4estern and Eastern
Europe. Even if you do not have time to go to a local meeting, you can still sign
up for their email list. Many of these groups (ill even help you install @inus
operating systems and other open source tools on your computer.
"et in3ol3ed 1ith #our !ublic schools; !ublic colle5es and !ublic libraries
3here are many (ays that you can help introduce and share @inu= (ith the rest
of your community. 3al7 (ith teachers and administrators at public schools about
the financial and educational benefits of using free open source educational tools
in the public schools. Attend school board meetings and let school board
members 7no( that you (ould li7e more course offerings in open source tools in
your school district. $ou can also visit your local community college and as7
instructors and administrators for more course offerings on ho( to use @inu=,
@ibre -ffice and other free open source tools. $ou can also visit your local public
library and offer to start a once a month discussion group on ho( to install and
use @inu=, @ibre -ffice and other free open source tools.
"et *oliticall# Acti3e
Corporate monopolies, such as Microsoft, and the billionaires (ho o(n them,
have invested millions of dollars buying elections and destroying democracy. 3he
only (ay (e (ill be able to re5establish a fair and level playing field for small,
innovative, ne( businesses and restore a gro(ing economy is if all of us become
more politically active. 3his means attending local monthly meetings of the
political party of your choice. $ou can either try to help ta7e bac7 the ,epublican
or Democratic parties from the billionaires. -r, if you thin7 the ma<or political
parties are beyond help, you can do (hat ,ichard Stallman has done and
support the 'reen &arty 6 or any other third party. 3he reason political activism is
so important is that apathy leads to a corporate ta7eover of our democracy. None
of us can be truly free until all of us are free 6 and that (ill not happen by sitting
on the couch (atching the corporate 3E brain(ashing programs.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!D
6onclusion... 4s a better future around the corner8
4hile @inu= is a very small percent of the current overall computer laptop and
des7top mar7et, it is li7ely to become the primary operating system in our public
schools in the ne=t three years. 3he 'oogle Chromeboo7 durable and
dependable solid state drive, (hich does not need a fan, is as li7ely to drive this
change as the S!! price. /n addition, the fact that a student can use the laptop
for the entire day (ithout recharging the battery is a huge plus for public schools.
For many schools, there (ill be a temptation to simply stay (ith the Chrome -S
operating system. Sadly, this is a very limited operating system (hich may give
students and teachers a bad idea of the real potential (ith @inu=. Converting the
operating system to the @inu= Mint operating system has no cost. .ut it does ta7e
about one hour Aor lessB to run through the steps of changing the operating
system to @inu= Mint. 3he benefit is that you not only get a better file manager,
but you get @ibre -ffice C and access to thousands of other free programs. / am
confident that once schools realiIe ho( easy it is to convert an economical
Chromeboo7 to a po(erful full featured laptop, school districts (ill rush to provide
Chromeboo7s to more students. 3hen once students learn ho( much easier
@ibre -ffice is that MS -ffice, (e could have an entirely different future for the
sharing of 7no(ledge both in and out of our public schools.
This is an e3ol3in5 stor# and 4 !lan on !ostin5 u!dates about chan5es in
free o!en source technolo5# on our book 1ebsite and our course 1ebsite .
colle5eintheclouds.or5.
<hatBs Next8
-ne of the huge benefits of open source tools is that @ibre -ffice is a great tool
for anyone (ishing to publish either an eboo7 or a (ebsite. Sadly, the
instructions for using @ibre -ffice to do either of these things is pretty limited. /
am therefore in the process of completing a boo7 on using @ibre -ffice for (riting
an eboo7. / am also nearly finished (riting a boo7 on using another free open
source tool, called 9oomla for building an educational or business (ebsite.
Finally, in the coming months, (e (ill start offering online courses on both of
these sub<ects 6 and on ho( to install and use @inu= Mint. $ou can learn more
about all of these educational opportunities by visiting our main (ebsite
colle5eintheclouds.or5. $ou can also post any Kuestions you may have on our
course forum (hich is also on the same (ebsite. 3han7 you for ta7ing the time to
read this boo7. / hope you (ill consider sharing the lin7 to this boo7 (ith your
family, friends and neighbors.
,egards,
David Spring
September "", !"#
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!*
About the Author
David Spring has a Master>s Degree in Education from the 0niversity of
4ashington. ;e has taught adult education courses for more than ! years at
several colleges in 4ashington State including .ellevue College, Seattle Central
Community College and Shoreline Community College. ;e lives near Seattle
4ashington (ith his daughter Sierra Spring and his partner EliIabeth ;anson,
her son Chris ;anson, several cats and four free gnomes.
8avi# S&rin"; 3lizabet% 2an$on an# our four free "nome$.
Free $ourself from Microsoft and the NSA % David Spring M. Ed. &age C!:

Anda mungkin juga menyukai