In comp.os.linux.advocacy, Roy Schestowitz
<newsgroups@xxxxxxxxxxxxxxx>
wrote
on Wed, 01 Aug 2007 17:26:11 +0100
<4474679.Kpdg5i9k91@xxxxxxxxxxxxxxx>:
> ____/ Doug Mentohl on Wednesday 01 August 2007 14:51 : \____
>
>> "The top three vulnerable vendors in 2006 were Microsoft, Oracle and Apple"
>>
>> http://www.iss.net/documents/whitepapers/X_Force_Exec_Brief.pdf
>
> This aligns with something that I posted here last year, but I don't know if
> it's the same study. Oracle, Apple and Microsoft always lead the chart. Linux
> (the kernel at the least) is apparently the most secure.
>
> How secure are Linux, Window and Mac OS?
>
> ,----[ Quote ]
> | Overall it looks like the Linux kernel turns out to be the most
> | secure system. Not only does it have virtually no security holes
> | that lead to system access, it's also very resilient to remote
> | attacks, two areas where both Windows and Mac OS X aren't doing
> | very well.
> `----
>
> http://www.masuran.org/node/29
>
I for one wish this were clearer. AFAICT, most of Windows
problems are in the application/GUI area (e.g.
'Open' = 'Execute' is somewhere in Explorer now), and
it is far from clear, apart from one case, where the
Windows kernel (NTOSKRNL.EXE) gets involved at all.
However, clearly there's at least one problem therein,
as a theoretically perfect kernel would disallow any
system crashes (BSODs), even if every program in Windows
apart from NTOSKRNL.EXE were infected with some sort of
weird virus.
There is also the BadBunny multihost-capable OO macro
virus. This virus is mostly harmless on a properly setup
Linux system (although it can destroy and infect a user's
own files), but it does count as an infectious agent
(Sophos and Symantec both call it a worm). Clearly the
kernel, apart from the file I/O, doesn't get all that
involved.
(BTW, Masuran is apparently having some technical problems;
I am unable to locate this article.)
--
#191, ewill3@xxxxxxxxxxxxx
"Your mother was a hamster and your father smelt of
elderberries!" - Monty Python and the Holy Grail
--
Posted via a free Usenet account from http://www.teranews.com
|
|