To anyone=(To go public or not to go public that is the question...)
Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
To anyone=(To go public or not to go public that is the question...)
I don't know whether to help people in my community discover linux or not. I mainly just want these questions answered I have been thinking about for a few months now.
1) Since Linux is Open Source, doesn't that mean it would easier for crackers and "Bad People" to write malicious code? (Viruses, Trojan Horses, etc.)
2) How do I know ,without viewing that gibberish you (plural) call source code, that there isn't some secret Super-User login that the coders put in?
3) What's with the Lindows people, their going to give Linux a bad name?
4) How fast could the Linux community respond to a virus?
1.) Not necessarily. They can see the code but that doesn't mean that all Linux boxes are the same. Plus the way regular users and then root is setup, if your regular user gets a virus in most cases the whole system wouldn't get affected since a regular user doesn't have full permissions on the system, usually only for their home directory.
2.) View the code to make sure for yourself.
I highly doubt that would happen since if anyone who does find it will usually report it since everyone has access to the source itself.
3.) Just ignore them and they'll surely die out hopefully.
4.) Fairly fast, faster than Microsoft does. Look how quickly updates and patches come out. Microsoft still has known vulnerabilities that they still deny don't exist. Plus if your smart enough, you can always patch it yourself maybe..
Well anything is possible, but still I find it a very difficult task to make a trojan or virus to possibly break this. Also to consider that not all distro's are specifically the same, with different configurations and such.
script kiddies arn't gonna take the time to mess with linux and most if not all respectable hackers either hate windows or windows users for one reason or another
I think open source is a lot better. A person can try to make their code as safe as possible but there is always some things you might overlook. So having a bunch of people able to see how the program works will generally make it safer.
The other side of that would be "Security by Obscurity" which is what Microsoft tries to do. But I think that's exactly what attracts hackers. It's a challenge to try and hack something that no one knows about.
I don't think that any opensource coders would put backdoors in their code. I think basically all the coders use their own programs. Most programs get written because they need it themselves. So writing a backdoor would also create a weakness in their own system.
it's impossible to have a backdoor in open source software, because anybody could see it and use it. ipso facto, any backdoor becomes a huge revolving frontdoor.
If this were ever to happen, nobody would use the software, useless as it would obviously be, hundreds of people would write to the author with email about the problem, and within hours somebody would have released patches or a new version which had the gaping hole completely fixed.
In most cases, it requires root access to install programs and such that are capable of stealing info and taking over a PC.
Linux security may not be as great as OpenBSD, which was designed around security, but it is many times over better than M$.
And keep in mind, most distros do not have al the security up to powerful. You can do that yourself.
I would say the best thing to do is not to download and install any program which transmits info over the web. Things like Kazaa and Seti are apps that use your computer for their work. I am sure security breachs can be found in that software for someone to use.
And no, from my understanding Linux does not have a backdoor like Winblows. Even if one was put in, someone out there would create a patch for those that want it.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.