next up previous contents
Next: Inventing weaknesses for your Up: The anatomy of FUD Previous: The anatomy of FUD   Contents

Exaggerating your Opponent's weaknesses

This is the most insidious form of FUD because it is the most difficult to counter. It is especially useful for drawing attention away from incidents of #2 (full-scale fabrication of new weaknesses for your opponent). For example: ``You don't have to troll the net for freeware solutions, edit reams of config files and be a power user to config WinNT or Win9X'' ( http://bbs.msnbc.com/bbs/msnbc-scitech/posts/ol/49648.asp ). Note the careful conjunction of exaggeration (``edit reams of config files''), truth (``be a power user'') and outright fabrication (the implication that one must troll the net for freeware solutions in order to configure Linux).




1998-12-02