It is difficult to categorize all the different forms of FUD used to attack Linux because the inventors of such FUD are, well, inventive. In this section I will attempt to categorize the FUD and appropriate counter-arguments as best I can.