Feeds

That ‘Microsoft’ RTFM page (and sundry spoofs)

In the Whitehouse

  • alert
  • submit to reddit

High performance access to file storage

Updated Our inboxes are filling with links to a rogue "How to RTFM" page posted supposedly on Microsoft's Web site.

For those of you who have never worked in tech support, RTFM means Read The Fscking Manual. If this page for lamers really did appear on Microsoft.com it would be hilarious/disgraceful/career-limiting for the poster etc.

But it's a hoax and as such not very funny. It's not a very clever hoax at that - although we can say that because we already know the trick.

Here is the URL in full: http://www.microsoft.com&item%3Dq209354@hardware.no/nyheter/feb01/Q209354%20-%20HOWTO.htm".

Everything before the @sign is irrelevant. The real URL starts at hardware.no which is - you guessed it - a Norwegian computer news site. And no, before you ask, Hardware.no is not trying to hoax anyone: it saved this as a local page when writing about RTFM a year or so ago.

For this Microsoft RTFM page did the rounds last February, on a site called hwnd.net, which appears now to be moribund. We wrote about it at the time too. By this reckoning, it should resurface again sometime in December.

And thanks to our Opera-loving users who point out that this much-loved web browser supplies a security warning when you click on the above link. It tells you that the site address contains a user name (i.e. the bit before the @sign), tells you what the real server is and asks you if you really want to go to the site.

As one reader comments: "Let's all sit down and count down till Microsoft "borrows" this feature for IE 7.0 or something..."



Now for a big fat Register welcome to

Whitehouse.org

. Post-September 11, we received several emails pointing to this Web site, telling us that the US Government's web site had been hacked. These quickly died down - but lately we're getting the same reports. Simmer down: Whitehouse.org is a spoof - as opposed to a hoax - of the US government site. It makes not so gentle fun of the Bush administration, and sometimes it's very funny.



The "real" Whitehouse site is whitehouse.gov. Do not confuse with Whitehouse.com, a hardcore porn merchant. ®

Related story

Spoofed story pokes fun at Gore
'MS antipiracy' hoax triggers paranoia attacks
McDonalds hit by spitting email hoax

High performance access to file storage

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.