Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
We're not going to write your Masters' thesis for you. If you need sources go through the CVE database for the last n years and first normalize the vulnerabilities in regards to scope and severity. That should take about a 6 to 18 months alone, depending on how far back you go, then after that start counting and analyzing.
Trade press articles won't help because nowadays the trade press is entirely beholden to advertising money from M$ partners as well as occasional direct influence. Then there are more than a handful of "former" microsofters posing now as journalists and even researchers. One such scammer recently got into the US administration and posed as a Director of the Cybersecurity and Infrastructure Security Agency for a while before being detected and ejected.
If you don't have 18 months of full-time equivalents skilled research to plow into your question, you might start with a much smaller sampling of malware, such as ransomware and mitigations such as OpenZFS or the absolute immunity that GNU/Linux enjoys.
tldr; for all practical purposes there are only two browsers (rendering engines) on the market, both suck
Last edited by Turbocapitalist; 11-21-2020 at 04:58 AM.
Reason: tldr
"Windows is safer - it has got the better anti-virus programs"
Truly, M$ resellers do say that and I am sure that most believe it. I've even run into them blocking deployment of an OpenBSD router (base + dnsmasq + WoL) until it could be proven that it was running an "anti-virus" program. ClamAV to the rescue.
However, before we digress too much, it would be good to read an answer to berndbausch's question in #3 above.
If that is what you mean then you need to provide MUCH more information, and may find no one to do your homework for you.
What do you mean by "safer"? Safer in what sense? Safer for what? Safer FROM what? Safer for whom?
No matter what your answers to THOSE questions: If Kernel security is your focus, the answers are far different than answers for a distribution. Also, answer may differ markedly for different distributions. If you cannot focus your question at either end, you would need to write several books to definitively answer the questions that result, and those answers would only be valid until the next kernel release or distribution update.
A web search for "windows linux security compared" will turn up a number of articles.
Quote:
"Windows is safer - it has got the better anti-virus programs"
That's because it needs them.
Excellent anti-virus programs are available for Linux. I have used both Comodo and AVG Free for Linux without issues, and others are readily available.
The biggest security danger in any OS, though, is PEBCAC--the person between the chair and the keyboard.
The biggest security danger in any OS, though, is PEBCAC--the person between the chair and the keyboard.
I fully agree. Today's malware techniques are far away from the legacy disguised executables of the 90s. I've seen entire (mswindows) networks and servers hijacked despite payed antivirus software running and up-to-date.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.