I am a long suffering Sony Vaio Notebook user. A while back, spyware and adware had rendered my machine almost inoperable. A well meaning sysadmin at my then client's site had taken pity and "healed" my notebook for me. I was most grateful.
Unbeknownst to me, he had also over-written all factory settings without making a recovery CD first. One would imagine that a sysadmin would have more sense than that. Sony no longer supports the model I own and their customer service reps apologize profusely for not being any help to me - fat lot of good that does. They suggested that I look up third party vendors of Sony parts and buy a recovery CD from them. Its easier said than done but I have been trying without any luck so far. I would hate to throw away a perfectly usable computer for not being able to round up a recovery CD - that would be a shame.
It's a pity that ISPs don't to more to protect computers on their network and that hackers haven't found more exciting things to occupy their time and talents with. I do hope tinkering with the innards of consumer electronics gets to me more fun, challenging and remunerative than exploiting Microsoft operating system weaknesses.
Unbeknownst to me, he had also over-written all factory settings without making a recovery CD first. One would imagine that a sysadmin would have more sense than that. Sony no longer supports the model I own and their customer service reps apologize profusely for not being any help to me - fat lot of good that does. They suggested that I look up third party vendors of Sony parts and buy a recovery CD from them. Its easier said than done but I have been trying without any luck so far. I would hate to throw away a perfectly usable computer for not being able to round up a recovery CD - that would be a shame.
It's a pity that ISPs don't to more to protect computers on their network and that hackers haven't found more exciting things to occupy their time and talents with. I do hope tinkering with the innards of consumer electronics gets to me more fun, challenging and remunerative than exploiting Microsoft operating system weaknesses.
Comments