"Why Linux Will Never Suffer From Viruses Like Windows"
Hi,
Why Linux Will Never Suffer From Viruses Like Windows; Quote:
Other useful links in Links for Helpful Linux articles & books |
Important lesson about "Internet articles" ... anyone can write them, but very often they're not worth reading. This is one. (Not yours, Gary ...)
The vulnerabilities of Microsoft's system, in home editions, is Microsoft's own inexplicable business choice. It is a very conscious decision to, having equipped their system with an excellent role-based security model that permeates the entire system, to turn it all off and to tell mom-n-pop users nothing about how to turn it on. They actually omit fundamental system administration tools from those editions, and you can't tell me it was done to save disk-space ... |
Member Response
Hi,
I do agree that Microsoft has limited the user. My point was the more people that look at the problem the sooner the issue can be resolved. Not by a singular minded team with stringent rules or guidelines then add in 'egos'. |
I agree with the article. However, I think that some distros will suffer from viruses just like Window$. Look at Android, it has tons of malware. I think some of the mainstream distros like *buntu will also suffer.
I think that there is some correlation between system adoption and number of viruses, but it is not always linear. It also depends on proprietary vs FLOSS and on security practices. |
Here's my take on the issue:
"The nail that sticks it's head up is sure to be hammered down first." Linux, UNIX, and Mac HAVE all, in the past, been claimed to be invulnerable to malware. This has been completely disproved as the malware now infecting Mac OSX machines is now some of the most destructive and dangerous malware around. Linux has only one invulnerability. No two systems are exactly alike on any level. Which is the only saving grace Linux has. BSD, Mac, and Solaris systems are all alike because they have few to no clones. If malware does infect these systems the malware can be devastating. Windows, now, is NOT a primary target for malware anymore. It's just too difficult now to even effectively target a Windows machine due to all the saturation anti-virus and anti-malware software has made. Windows has at least a good dozen or more "FREE" anti-virus and anti-malware tools available anyone can use: Avast Home Edition Microsoft Security Essentials Comodo Internet Security Avira Antivirus Spybot Search and Destroy Clam Antivirus MalwareBytes (free scanner only) SUPERAntiSpyware (free scanner only) SOPHOS Anti-Rootkit Microsoft RootKit Revealer Microsoft Windows Defender (former Giant Anti-Malware) BitDefender Rescue Disk Realistically it's hit or miss with Windows and since Security Essentials has been available for free from Microsoft Update, anyone can get free protection that isn't intrusive or system resource heavy, and if you need tools, plenty extras exist. I'd dare say a malware author would have only nowadays a 10% success rate at targeting Windows, but with Mac OSX, BSD, and Solaris systems he might have a 50% chance. BSD, Mac, and Solaris have tools to prevent this but none are really on-access scanners. Everything is just a passive Scanner. With things like drive-by downloads, active content media attacks (using JavaScript, Flash, and other embedded formats), as well as complex things like source CVS and SVN attacks to insert malware into the code are on the rise because attackers know these systems are vulnerable and can be hit with the right attack. The only as I said that saves Linux is, no two systems are exactly alike across the distributions. If you attack Ubuntu you'll only hit Ubuntu, if you attack Red Hat, you'll only hit Red Hat. |
Windows should just stop making every user an administrator.
That would stop a LOT of these problems. They tried to get rid of the habit of making everyone an administrator but they completely ruined it by implementing the UAC in such a way, everyone now hates it so much they will never ever get a chance to even implement anything even remotely like it. As for Linux and Mac I totally agree with the previous poster. But i also believe that when Mac usage is high enough and many virusen come out for it, the antivirus writers will step in and create tools to battle them. |
Windows by default recommends, through Baseline Security documentation, only 2 administrator accounts, the root and primary should exist on a single computer, with the root account disabled and password protected. Any subsequent users added should be added to the Users group with, if needed, Power User level status, otherwise, normal user settings per account.
UAC doesn't prevent everything from running, all it does is ask if you want to run a program with enhanced permissions, and if you're on a network prompts a user for administrator credentials before proceeding. It's perfectly useless. You're thinking about Data Execution Prevention (DEP). By default DEP on most systems is set only for system critical programs only, but it can be set to system-wide all programs for better protection of the system. |
Quote:
Why Linux Desktop Will Never Suffer From Viruses Like Windows Quote:
it is the OEM and the BIGGEST problem is PEBKAC or in this case between the finger and eyes even on RHEL6.3 if root installs the malware and then allows SE to run it .... or dose this " setenforce=0" it will RUN unfortunately the failed vista and now win7 have taught "the average windows user" to NOT even read that unintelligible warning ( raise your hand here if YOU ,without google, can decipher the windows warnings ) to just click "yes" to EVERYTHING this might be some good reading http://www.itworld.com/it-management...-linux-desktop the linux server ??? is being exploited mainly the unsupported versions that people are running a fedora 5 SERVER today ??? or a RHEL3 server or the old RH9's that are not inside a local net |
Quote:
Quote:
If you think UAC is useless, then so is sudo. But after i discoverd how powerfull it really is, i could not live without it. Quote:
|
Actually UAC and Sudo are fairly much useless on a single user system like a Home PC. UAC and Sudo work well in Networked environments where users often don't need access to certain tools of the OS. In this aspect UAC works perfectly as a permission enforcement agent, but for a home PC user it's more or less a nuisance.
The most logical anti-virus and anti-malware sadly is something many people either lack or choose not to use... Common Sense If you visit only legit websites, don't download illegal software, don't use software pirating tools, etc. more than likely you only run a 5% chance of ever getting any significant infection. At best, I've always recommended these tools for people... Comodo Internet Security (with all settings for heuristics and detection set at highest levels) Spybot Search and Destroy (with immunization) DEP enabled for all programs iTunes, AmazomMP3, and 7Digital.com for legal and inexpensive multimedia downloads. UAC set to minimal level but not disabled Use FireFox as a web browser, not IE to avoid ActiveX. It's not much but it works almost all the time when people stick to common sense. |
Quote:
second, the whole idea behind the limited user/UAC or Sudo isn't only to prevent user accidental user damage to system, but also to prevent viruses/malware from running with administrator privileges. Quote:
Quote:
|
with only one user sudo is a "BLEEP"
the first thing on suse12.1 was use a REAL root password AND make a root home folder get ride of as much "sudo" junk and use "su" and "su -" NOW if there were kids ( well she is now a collage Grad but when YOUNG ...) su and su - are fine till the near teens THEN you will need "sudo " for limited use the PC party line Quote:
http://www.youtube.com/watch?v=IBH4g_ua5es or http://www.youtube.com/watch?v=MalBJ...endscreen&NR=1 but as ALWAYS use the TOOL that is BEST FOR YOU!!!!!!!! Quote:
Active X just to install updates but the answer to all this IS to make the company's that sell the CRAP buggy code legally RESPONSIBLE for the program look at the PLC that have root passwords HARD-CODED in as "12345" or a backdoor( factory testing) that uses the mac address AS the password the "foreverday holes " |
hehe, i remember working at mcdonald's, and i was reading the manual for warming slot computers (thermostat/timer/display) and the 'administrator' password was 1234, hehe. talk about silly, oh well, it wasn't common knowledge on how to even put the thing into 'program' mode, but still, not exactly secure.
|
Quote:
|
Member Response
Hi,
Or 'password'. :) Remember or guessing is a certainty. Surprised by how many people that never change it. Don't forget 'toor'. |
All times are GMT -5. The time now is 08:26 AM. |