Some computers come with security software windows 7 and mac os x already have

2.    Match the words with a similar meaning. Check any unknown words in a dictionary.
1.   To delete                        a. Expenses, costs
2.   Malicious                       b. To duplicate
3.   Charges                          c. Harm
4.   To replicate                   d. To remove
5.   Scam                               e. Safe
6.   Identity                          f. Harmful
7.   Secure                             g. Fraud
8.   Damage                          h. Personal information

READING
1.    Go through the text to find this information about.
a)    malware which pretends to be something harmless;
b)   malware which copies itself;
c)    email which pretends to be from a bank;
d)   fake security warnings;
e)    malware which collects various types of personal information.
 
2.    Read the text carefully. Then test your knowledge by taking a                     brief quiz about Internet Security.


INTERNET SECURITY

The online world is an amazing place but, like real world, there are some risks. 
There are a number of malicious software (malware) programs           that can cause damage to computers or collect information without your knowledge. These include virusesworms, Trojans, spyware and other malware. 
Malware is often downloaded from spam emails or websites that          are not properly protected
A secure website usually starts with https:// where the ‘s’ stands for a secure web server.
Some malware is designed to copy itself and spread to other connected                     computers. This type of malware is known as a virus
In computers, the virus spreads by infecting files on a shared space like a network file system 
or by email, downloaded from the Internet or from removable medium like a USB stick, CD or DVD.
Computer worms are similar self-replicating programs, except they can       spread without human help. There are other harmful computer programs that can be part of a virus, 
but they do not have the ability to replicate. 
For       example, spyware. This type of malware spies on users’ activities, usually  to steal financial details or passwords. A Trojan is a type of malicious program that pretends to be a trusted file. A Trojan pretends to be something interesting and harmless, such as a game, but when it runs it may have harmful effects.

Malicious links disguised as security warnings have become a popular  tactic with cybercriminals. These official-looking notices warn you that your computer has a virus and try to scare you into clicking the link or download a program to fix it, but in reality the link leads to malware. 
The  word for this type of scam is scareware.
Phishing is a type of scam in which an email pretends to be from a bank or from a social networking site to trick  you into giving out personal information. For example, a phishing email may claim that “unauthorized charges” were made on your credit card and   that you need to immediately verify your information. 
The details are then          used to steal people’s money, or steal their identity in order to commit crimes.
The best defense against Internet threats is good antivirus software. It checks all the files that come in and out of your computer.
If it finds malware, it safely removes it. To remain effective, antivirus software must be         regularly updated. Another important part of protecting your computer is using a ‘firewall’. 
A firewall checks which websites and malware are try ing to access your computer and helps prevent any unauthorized access. Most operating systems have built-in firewalls, however, make sure they are turned on.
Viruses and other malware are often included in spam. It is another term for unwanted email advertisements. Many spam emails aren’t trying to sell you something – they’re trying to steal your money or personal information, like phishing emails. 

There are a few other things you can do to protect yourself when you’re online:

Ø Don’t open any attachment you weren’t expecting.

Ø Make backup copies of your files regularly.

Ø Use strong passwords for all your Internet accounts.

Ø Avoid using public Wi-Fi for shopping and banking to keep your payment details safe [10,15].

3.    Do a brief quiz below to test your knowledge about Internet Security.

Internet Security Quiz
1.    Viruses, worms, and Trojans are all examples of _ .
a)   pets that can be seen in a zoo;
b)   phishing;
c)   malware;
d)   scareware.
2.    What is malware?
a)   hardware that controls a computer without the user’s knowledge;
b)   faulty software;
c)   hardware that detects and removes viruses from a computer;
d)   software created to cause harm to a computer system or data.
3.    What is a virus?
a)   a program that makes user feel unwell;
b)   a program which replicates itself and spreads to other computers via attachments;
c)   a program that monitors user’s activities;
d)   a program that stops a computer from working.
4.    Malware can be downloaded through _ .
a)   spam emails;
b)   infected computers;
c)   unsafe websites;
d)   all above.
5.    What is spyware?
a)    malware that harms your computer by deleting or altering files and stopping programs from running;
b)   malware that tricks you into thinking it’s software you need to buy;
c)    malware that collects information from a computer and sends it to cybercriminals;
d)   malware that pretends to be a trusted file.
6.    What is the purpose of phishing?
a)   controlling computer without user’s knowledge;
b)   sending a program that replicates itself and spreads to other com- puters via attachments;
c)   sending a malicious link disguised as a security warning;
d)   sending an email that is designed to trick the user into giving away personal information.
7.    What should be used to remove malware from a computer?
a)   a filter;
b)   antivirus software;
c)   encryption;
d)   a firewall.
8.    How can one safeguard against phishing?
a)   Install a firewall.
b)   Don’t believe everything you read on the Net.
c)   Make backup copies of your files regularly.
d)   Don’t follow a link from the email you don’t trust.
9.    What is the purpose of a firewall?
a)   to detect viruses on a system and prevent them from attacking it and spreading;
b)   to prevent unauthorized connections coming into and out of a network;
c)   to prevent from illegal copying and distribution of copyrighted software, information, music, etc.;
d)   to prevent a hacker from logging on to the computer.
10.  Which of the following is a simple way to stay safe online?
a)   Don’t open email attachments from unknown people.
b)   Run and update antivirus programs.
c)   Don’t give out personal information.
d)   All above.

4. Match the words that go together in the text “Internet Se- curity”. Check that you know the meanings of the phrases. Then complete the sentences below.
 

1) commit

a) program

2) unauthorized

b) firewalls

3) phishing

c) access

4) antivirus

d) email

5) security

e) information

6) self-replicating

f) crimes

7) built-in

g) software

8) verify

h) warning

1.    Virus is a       that interferes with a computer’s hardware or operat- ing system.
2.    Some computers come with security software. Windows 7 and Mac OS X already have   .
3.         can protect you from infected email attachments, Internet worms, and fake websites.
4.    Cybercriminals __ by stealing people’s money or their identity data.
5.         is disguised to look like official communications from a legiti- mate website.
6.    Once installed, spyware programs can have      to user’s activities
 such as Internet surfing habits and browser activity.
7.    If you _     about your identity on a fake website, scammers can use these details to withdraw money from your bank account.
8.    When you visit a malicious site your browser will display a red_ message.

MODAL VERBS

Modal verbs show the speaker’s attitude or feelings about a situa- tion. Modal verbs are can, could, may, might, must, have to, need, ought to, will, would, shall, should, etc.
Ø Modal verbs are followed by the infinitive without to, (except for
ought to, have to, to be to). Sorry, I can’t come. I have to meet Nick.
Ø Modal verbs come before the subject in questions and are fol- lowed by ‘not’ in negations (except for have to). Could I use your computer? You shouldn’t send sensitive data over the network. I didn’t have to scan all the files yesterday.
Ø Modal verbs take no – s in the third person singular (Present Sim- ple) (except for have to). Tom must use a strong password. Jane has to check her spam folder regularly not to miss an important email.
1. Choose the correct item.
1.    Can you / Do you can install the latest antispyware program?
2.    I can to / can follow the link contained in the email.
3.    Do I should / Should I keep my antivirus software updated?
4.    Sorry that I didn’t could / couldn’t come to the meeting last week.
5.    Should a secure site / Does a secure site should start with https://?
6.    IT security specialists must be / must to be experts in their field.
7.    I don’t remember my password, I have create / have to create a new account.
8.    Malware may / mays harm your computer.

Modal verbs are used to express:
a.        Ability
Can / Be able to (ability in the present / future)
A virus can damage files on your computer. will be able to speak perfect English very soon.
Could / Was / were able to (= managed) (ability in the past) are both used for either repeated or single actions.
She could / was able to dance for hours when she was young. (repeated action)
He couldn’t / wasn’t able to pass his driving test. (a single action)
2. Fill in: can / can’t, could / couldn’t, was / were / wasn’t able to, will / won’t be able to. More than one option is possible.
1.    What     _ we do?
2.    Phillip _     come to the meeting next week because he’s fallen ill.
3.    Oh no, my battery’s dead! I _     use the laptop.
4.    Claire tried but she    _ delete the virus.
5.    When Alice was five she _     read and write.
6.    It took all evening but I _     scan all the files.
7.    Although there was traffic, we _     get to the conference on time.
8.    Paul _     use online banking but he doesn’t do it very often.
b.       Possibility / Probability
May / Might / Could + Simple Infinitive = perhaps. It’s possible that something will happen in the future or perhaps it’s true at the moment.
Pete may / might / could pass his test this time. (It’s possible that he will pass his test).
Might is the past form of may. Might can also be used for present situations.
A public Wi-Fi connection might be unencrypted.
Should / Ought to + Simple Infinitive = something is probable now or in the future.
Tom should / ought to pass his exams.
c.        Asking for permission, giving and refusing permission Can (informal) / Could (more polite)
Can / Could I delete this file? Of course you can. / I’m afraid you can’t
/ mustn’t.
May / Might (very formal)
May / Might I see your driving license, please? Certainly you may./
No, I’m afraid you may not.
d.       Request / Offer / Suggestion
Can (informal request) Can you help me?
Could (polite request) Could you help me with the encryption pro- gram?
Would you like (polite offer) Would you like the latest update?
Shall I / we, Can I / we (Do you want me / us to …?) (informal offer
/ suggestion)
Shall I help you with your computer’s security?
Shall we install a new antivirus?

3. Fill in: can / could, may / might, shall, would you like. More than one option is possible.
1.    _     I have your name, please?
2.    _     to come with us for a coffee?
3.    Spam emails     encourage you to click on links to unsafe websites.
4.     Are you having problems with the Internet connection? _    I help you?
5.    –     _ I use your password?  I’m afraid you     _.
6.    _      you please check my computer for viruses?
7.     Are you going out this evening?  We’re not sure. We       stay at home.
8.    –     _ I phone my father? He’s a computer expert.  No thanks.

e.        Advice / Obligation / Necessity / Prohibition
Should + Simple Infinitive (= It is the best thing to do; I advise you to do it) You should create a strong password (general advice).
You shouldn’t do something. = It isn’t a good thing to do.
You shouldn’t trust everything you read on the Net.
Had better (=It’s a good idea  strong advice for a specific situation).
I think you’d better call them straightaway.
Must (strong obligation, duty or personal feelings of necessity = It’s necessary; I’m obliged to).
You must stop when the traffic light is red. I must see a doctor.
Have to (obligation or external necessity = It’s necessary; I’m obliged to).
You have to pay the bill by the end of the month (that’s the rule).
Must is used only for present and future situations. Have to is mostly used for past situations instead of must. To form questions and negations of have to we use do / does (Present Simple) and did (Past Simple).
Did you have to stay late at work yesterday? Yes, I had to email some urgent letters.
Need (modal verb) / Need to (It’s necessary = have to).
Need I pay now? Unfortunately, I need to work this evening.
Needn’t + Simple Infinitive = don’t have to = don’t need to (it’s not necessary to do sth in the present or future).
You needn’t take an umbrella. It isn’t raining. You don’t have to /
don’t need to do it now. You can do it later.
Mustn’t (= it’s forbidden; don’t do it). You mustn’t be late for the meeting.
Can’t (= you aren’t allowed to). You can’t enter the account without a password.

4. Rephrase the sentences using modal verbs.
Example: It’s a good idea to back up the files. You’d better back up the files.
1.    I advise you to transfer files via a secure connection.
2.    Do not download unknown files.
3.    Students are obliged to be on time for all their classes.
4.    It isn’t a good thing to open email attachments from people you don’t know.
5.    I advise you to turn on a firewall.
6.    You don’t need to contact technical support. Jim has already called them.
7.    It’s necessary to use mail encryption to send sensitive data.
8.    It is the best thing to keep your antivirus software updated.
9.     It’s a good idea to set user access levels on your laptop.
10.  You are not allowed to make any changes to the system.
11.  Don’t use a public Wi-Fi for shopping and banking.
12.  It’s necessary for you to create a strong password to stop criminals from accessing your private information.

5. Correct the mistakes.
1.  I have email some urgent letters.
2.  You can’t to access the network.
3.  You don’t must be late for the exam.
4.  Sasha can’t remove malware from his computer yesterday.
5.  Do I could use your laptop?

6.  Translate the following sentences into Russian.
1.    Существует ряд Интернет угроз, с которыми мы можем столкнуться в сети: кража личных данных, шпионское программное обеспечение, фальшивые антивирусы и другие вредоносные программы.
2.    Хорошее антивирусное программное обеспечение должно предлагать защиту в режиме реального времени.
3.    – Что может заблокировать несанкционированный доступ к компьютеру из сети? – Вероятно, это брандмауэр.
4.    Однажды установив антивирусное программное обеспечение, вам необходимо обновлять его регулярно.
5.    – Я не уверен, какой антивирус подойдет для моего компьютера. Что вы можете мне посоветовать? – Попробуйте загрузить бесплатную пробную версию вот этого программного обеспечения. Оно предоставляет защиту высокого уровня без замедления работы вашего устройства.
6.     Тебе бы лучше сделать резервные копии твоих файлов в сети, другими словами, в облаке. – Какая разница? – Когда ты хранишь информацию в облаке, она сохраняется на сервере в Интернете. Ты всегда можешь иметь доступ к своим файлам, даже если компьютер поврежден.
7.    Вам не следует открывать почтовые приложения, полученные от незнакомых людей или нажимать на ссылку, содержащуюся в письме. Иначе вы можете стать жертвой кибермошенничества.
8.     Мне помочь тебе с программой по шифрованию? – Да, пожалуйста. Я не могу полностью разобраться в ней.
 
SPEAKING
1.    Work in groups. Discuss the Internet threats. Use the information from the text and your own knowledge.
2.    Do you agree with the given in the text tips for staying secure online? Why? Work in small groups, then share your opinion with the class.
3.    What additional precautions, (except those described in the text) should we all take to protect our computers while using the Internet? Work in pairs. Make a list of at least three protections.

answersLogoWhite

User Avatar

Wiki User

8y ago


Being based on the Unix operating system Mac OS X comes with built in security. Macs do not need the kind of security software that a computer running the Windows operating system requires. Yes, its right that Mac system come with security software, some times if you need antivirus then you can install avast! Free Antivirus for Mac and Bitdefender Antivirus and make your mac system secure.

User Avatar

Wiki User

8y ago

User Avatar

User Avatar

Wiki User

12y ago

The recent Mac Defender incident proved that Mac’s are not that
secure as it was before. If you want you can purchase a Mac
antivirus from Kaspersky, Symantec. ESET or F-secure.

Add your answer:

Earn +

20

pts

Q: Do mac computers come with security software?

Write your answer…

Aug 19, 2013 4:58 AM in response to bholtzkener

Note that you may have problems if Microsoft Security Essentials (or any antivirus) tries to search viruses in the Mac OS X partition because Windows can’t write on it. If this app tries to do anything in this partition, Windows may crash.

Instead of making a complete scan, run a custom scan by choosing only the Windows partition and not your OS X one

Aug 19, 2013 5:48 AM in response to bholtzkener

you aren’t telling us enough, there is no reason unless there are errors.

Check the disk first with Propertites — hardware — for errors. Chkdsk is handy to run on next restart

Never seen a problem or scanning HFS. Maybe if you are using 3rd party driver to mount it which you don’t mention so I doubt that is it.

Aug 19, 2013 8:04 AM in response to bholtzkener

HFS+ is the filesystem used by OS X. Windows can’t read or write in volumes formatted in HFS by default, but when you install the Windows support software, a HFS+ read driver is installed to access to your OS X partition

Aug 19, 2013 8:10 AM in response to mende1

So, then I shold not expect security essentials to work.

I see no reason that a scan should need to write to the OSX partition or indeed anywhere, it’s just a scan afterall.

I’ll look into the custom scan.

Thanks

Aug 19, 2013 8:27 AM in response to bholtzkener

Security essentials works fine on Windows 7 in a Bootcamp partition. Windows is completely separate from OSx and when you boot into Windows and run security essentials it has nothing to do with OSx.

You should try asking about security essentials and Windows 7 on a Windows forum.

Aug 19, 2013 2:10 PM in response to The hatter

OK

I ran a scan disk on the partition and it ran cleanly to completion.

I then scanned only the bootcamp partition with security essentials. it ran cleanly.

I then selected my LaCie USB3 disk which is formatted in OSX mode. not NTFS. The scan failed with the BSOD stating that there was a Bad_Pool_Call.

So I’m happy to scan only the Bootcamp partition.

I’ll raise this in the Windows support group, but I suspect they will say its a deficiency in the bootcamp interface modules. I can’t help but agree.

Thanks to all for your constructive comments.

Barry

Aug 19, 2013 3:19 PM in response to bholtzkener

But wait there’s more

I selected the Macintosh OSX disk and it scanned without causing the BSD.

So FWIW, I suspect the Windows BootCamp interface as the cause of the BSD.

$0.02

(an Apple issue)

IT Essentials (Version 7.00) – IT Essentials 7.0 Chapter 12 exam Answers

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

IT Essentials v7.0:

1. Which two location data sources can locator apps use to determine the position of a mobile device? (Choose two.)

  • cellular towers
  • WiFi hotspots
  • the sandbox
  • remote lock
  • an app source

Explanation: In addition to GPS, mobile device locator apps can use cellular towers and WiFi hotspots to determine the position of a mobile device. The device sandbox, remote lock, or an app source (Play Store or iTunes) are other features and functions related to security and app downloading.

2. What are two ways that iOS differs from Android? (Choose two.)

  • iOS uses an All Apps button whereas Android uses a Home button.
  • iOS has a physical Home button, but Android uses navigation icons.
  • In iOS, the icon for an app represents the app itself. Deleting the icon in iOS deletes the app. In Android, the icon on the Home screen is a shortcut to the app.
  • In iOS, apps can only appear on screens, whereas in Android, apps can appear on screens and in folders.
  • In iOS, folders are created by dragging one app on top of another app, but in Android folders must be created from the home screen menu.

Explanation: Apple iOS devices have a physical Home button that has many uses. One of the uses of the Home button is navigation between screens. Android uses navigation icons instead of a physical Home button. In addition, much like a Windows OS, apps in Android are represented by icons that are shortcuts to the actual app. In iOS, the icons are the apps. Deleting an icon in Android deletes only the shortcut. However, the entire app is deleted from an iOS device when its icon is deleted.

3. What are two purposes of the passcode lock feature on mobile devices? (Choose two.)

  • to help prevent theft of private information
  • to prevent unauthorized use of the device
  • to erase all personal data from the device
  • to return the device to the default factory state
  • to restore and re-synchronize the device
  • to remotely lock the device if it is stolen

Explanation: The passcode lock feature on mobile devices helps prevent theft of private information and places the device into a power saving state. Personal data will not usually be erased from some mobile devices unless the number of failed passcode login attempts exceeds a threshold. Remote lock allows the device to be locked from a remote location. A factory reset returns the device to the original operation state when the device was first purchased. Various applications such as email or cloud storage can provide synchronization capabilities to be able to restore and re-synchronize information such as user data, contacts, and email on a mobile device.y other device features and actions.

4. Refer to the exhibit. What two statements are true about the mobile operating system screen shown? (Choose two.)

  • The area enclosed by the red rectangle contains navigation icons.
  • The area that is highlighted displays background processes and indicators.
  • This is a Windows Phone screen.
  • This is an Android screen.
  • This is an iOS screen.

Explanation: The highlighted area shows the Android operating system navigation icons. From left to right they are Back, Home, and Recent Apps.

5. Which two methods are commonly used to remove the default restrictions and protections added to mobile operating systems? (Choose two.)

  • rooting
  • jailbreaking
  • rootkit execution
  • device update
  • system backup

Explanation: Mobile operating systems are usually protected by a number of software restrictions. Rooting and jailbreaking are two methods for removing restrictions and protections added to mobile operating systems. They are a means of circumventing the usual operation of the device operating system to gain superuser or root administrator permissions.

6. A Linux administrator wants to backup current files in a data directory and store them in a new directory on another disk. Which two commands would be needed? (Choose two.)

  • cd
  • cp
  • rm
  • mv
  • mkdir

Explanation: The mkdir command is used to create the new directory and the cp command is used to copy files from one directory to another.

7. A file called new_resume has the following file permissions: rw-r-x--x . What two facts can be determined from these permissions? (Choose two.)

  • The user has full access to the file.
  • Members of the group have read and execute access to the file.
  • Other people have read and execute access to the file.
  • Group members are able to modify the file.
  • The user is able to read and modify the file.
  • Other people have no access to the file.

Explanation: Read, write, and execute permissions are assigned to each file. The permissions are listed in groups of three. The first group of three permissions references users, the second references group members, and the third references others. The first position of each of the three permissions is the R or read permission, the second is the W or write permission, and the third is the X or execute permission. If any position has a dash, the associated group does not have permission for that category. In this case, the user hasread and write access (rw-). Group members haveread and execute access (r-x). Other people haveexecute only access (–x).

8. What is a good source for safely downloading Android apps?

  • iTunes
  • Google Play
  • freeware sites
  • the Apple App Store

Explanation: Google Play ensures that the app is compatible with the mobile device and is a trusted source for apps.

9. What represents apps in the Windows Phone interface?

  • buttons
  • icons
  • tiles
  • widgets

Explanation: The Windows Phone OS uses tiles to represent apps. Tiles are rectangles that can display active content. When tapped, they open the associated app. Tiles can be resized to unclutter screens and to reflect the relative importance of the app.

10. What is the result of doing a factory reset on a mobile device?

  • The operating system will be updated with the most recent updates and patches.
  • All user data and settings will be deleted.
  • The operating system will be deleted and all user data is transferred to the Cloud.
  • A complete backup of the device is done and all viruses and malware are removed.

Explanation: After a factor reset, a mobile device is left in the same state that it was when it left the factory. The operating system software would not be altered but all user data, settings, and third party applications would be deleted. Backups should be done prior to a factory reset. Updates or patches to the operating system could be done before or after the factory reset.

11. What is the name of the Windows Phone 8.1 digital, or virtual, assistant?

  • Bing
  • Cortana
  • Nova Launcher
  • Spotlight

Explanation: Siri is the well-known digital, or virtual, assistant that is available in iOS. Windows Phone also has a digitial assistant. It is called Cortana.

12. What is Wi-Fi calling?

  • a method used to push apps to smartphones
  • a convenient way to securely and digitally make payments with mobile devices
  • a government emergency alert service for smartphones
  • a way to make mobile phone calls over a wireless data network
  • a method for sharing data between two mobile devices

Explanation: Wi-Fi calling is a way that a mobile phone can use a wireless data network to make phone calls as if it were connected to a cellular network. In cases where cell phone coverage is inadequate, calls can be placed from places that have open Wi-Fi networks.

13. What is the purpose of signature files used to secure mobile devices and operating systems?

  • They contain a record of historical and pending firmware and software updates.
  • They contain a list of all user passwords.
  • They contain a log of digital certificates and encryption keys associated with the user.
  • They contain sample code from known viruses and malware that is used by security software to identify malicious software.

Explanation: Antivirus and antimalware software compare the contents of a disk with sample virus and malware code included in signature files. If a comparison is found, the user can be notified and the virus can be isolated or removed.

14. What is a purpose of the boot manager program?

  • It manages antivirus signature files, encryption keys, and certificates when a device boots.
  • It automates the POST and checks the disk for bad sectors during a boot.
  • It checks the validity of hardware and software on the device after a factory reset.
  • It allows the user to select the OS to use to boot the device.
  • It allows the user to determine which apps are automatically opened during the boot process.

Explanation: Many devices have multiple operating systems installed in different partitions. When a device boots, the boot manager asks the user to select the OS to use. The boot manager then directs the BIOS to the correct partition so that the device can continue to boot by using the selected OS.

15. An administrator is re-imaging a large number of Mac OS X machines. What built-in tool or command can be used to remotely boot the computers?

  • mstsc
  • Netboot
  • Time Machine
  • Finder

Explanation: Netboot is a built-in tool on the Mac OS that allows for remotely booting the computers. Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. MSTSC is used to open the Windows Remote Desktop utility. Time Machine is an automatic backup utility built into the Mac OS.

16. What tool or command is used in the Mac OS X to navigate the file system?

  • File Explorer
  • Task Manager
  • Finder
  • mstsc

Explanation: Finder is similar to the Windows File Explorer tool and is used to navigate the Mac OS file system. The mstsc command is used to open the Windows Remote Desktop utility. The Task Manager tool on Windows allows a user to view all running applications.

17. Which model does Apple use to provide iOS apps to customers?

  • iCloud
  • Xcode
  • sandbox
  • walled garden

Explanation: Apple uses a walled garden model for the iOS apps. The apps must be submitted to and approved by Apple before they are released to users.

18. Android apps run primarily based on privileges enabled by the user. Sometimes an Android app requires extra privileges to access system components. How do Android apps run to accomplish both situations?

  • Android apps run in a sandbox.
  • Android apps run in a guest mode.
  • Android apps run in a walled garden.
  • Android apps run through a proxy service.

Explanation: Android apps run in a sandbox and have only the privileges enabled by the user. If an app needs to obtain permissions, a prompt will appear and the user can grant permissions through settings.

19. Which navigation icon on the system bar of an Android device is used to return to the previous screen?

  • Back
  • Home
  • Menu
  • Recent Apps

Explanation: The Back icon, if pressed, returns to the previous screen.

20. Which statement describes the iOS app icons on a mobile device screen?

  • Each icon is a shortcut of the app.
  • Each icon represents the actual app.
  • Each icon represents an instance of the actual app.
  • Each icon links to multiple instances of the actual app.

Explanation: On the iOS interface, each app on screen is the actual app, not a shortcut.

21. What is the purpose of using the auto-brightness feature on a mobile device with an LCD screen?

  • to conserve battery power
  • to reduce the interference from sunlight
  • to prevent the burn-in effect on the screen
  • to display text messages with better contrast

Explanation: The LCD screen for most mobile devices uses the most battery power. Lowering the brightness or using the auto-brightness feature helps conserve battery power.

22. Which statement describes the Touch ID in iOS devices?

  • It is used as the passcode.
  • It is the encryption key set by the user.
  • It is the hash value of the user fingerprint.
  • It is used to set the touch screen sensitivity.

Explanation: Apple uses a technology known as Touch ID in which the user sets up a template fingerprint scan that is converted into a unique hash and stored within a secure cache on the iOS device. The hash is used to authenticate with the user.

23. Which cloud-based storage service does Microsoft provide for backups?

  • iCloud
  • Dropbox
  • OneDrive
  • Google Sync

Explanation: Data on mobile devices must be backed up periodically to ensure that it can be recovered if needed. Most mobile operating systems come with a user account linked to the cloud services of the vendor, such as iClould for iOS, Google Sync for Android, and OneDrive for Microsoft.

24. A mobile device user notices that the system update includes an update of the Primary Rate ISDN (PRI). What is the function of the PRI?

  • It is the configuration of radio frequencies used on the device.
  • It is the data rate setting of the user account with the carrier service.
  • It is the configuration of the data rates between the device and the cell tower.
  • It is the configuration information that the device needs to communicate on networks other than the carrier network.

Explanation: In addition to mobile operating system updates, there are two other types of updates for mobile device radio firmware. They are called baseband updates and consist of the Preferred Roaming List (PRL) and the Primary Rate ISDN (PRI). The PRL is configuration information that a cellular phone needs to communicate on networks other than the carrier network. The PRI configures the data rates between the device and the cell tower. This ensures that the device is able to communicate with the tower at the correct rate.

25. A Linux PC user notices that the PC freezes on startup and exhibits kernel panic where there is a stop screen. What is a possible cause for the issue?

  • LILO has been deleted.
  • GRUB has been corrupted.
  • A driver has become corrupted.
  • Deja Dup has been turned off in the system.

Explanation: When a driver in a Linux system has been corrupted or a piece of hardware is failing, the system will freeze on startup and exhibits kernel panic where there is a stop screen.

26. What command is used to open a text editor in a Linux system?

  • grep
  • ifconfig
  • ls
  • vim

Explanation: The vim command is used to open a text editor; ls displays files within a directory; grep searches for strings of characters within a file; and ifconfig displays information about the network interface card.

27. Which Linux file system introduced the journaled file system, which can be used to minimize the risk of file system corruption in the event of a sudden power loss?

  • ext2
  • ext3
  • CDFS
  • NFS

Explanation: The ext3 file system is considered a journaled file system that was designed to improve the existing ext2 file system. A journal, the main feature added to ext3, is a technique used to minimize the risk of file system corruption in the event of sudden power loss.

28. What is the most commonly used method to close an application that appears to be frozen on an OS X-based computer?

  • Use Force Quit.
  • Use Task Manager.
  • Access the Status menu.
  • Access the Notification Center.

Explanation: To use Force Quit, right-click on the application icon that is not responding from the Dock and close the application.

29. Which file system is the primary file system used by Apple in current Macintosh computers?

  • ext2
  • ext3
  • CDFS
  • HFS+
  • APFS

Explanation: To use Force Quit, right-click on the application icon that is not responding from the Dock and close the application.

30. An instructor is discussing facts about different mobile device operating software. The instructor states: “The mobile devices have a feature called Spotlight that is a search tool that provides information from many sources.” To which OS does this relate: iOS, Android, or both?

  • iOS
  • Android
  • both

31. An instructor is discussing facts about different mobile device operating software. The instructor states: “This OS uses the system bar, displayed at the bottom of every screen, to navigate apps and screens.” To which OS does this relate: iOS, Android, or both?

  • Android
  • iOS
  • both

32. An instructor is discussing facts about different mobile device operating software. The instructor states: “This OS can be used by programmers to operate devices like laptops, smart TVs, and e-book readers.” To which OS does this relate: iOS, Android, or both?

  • Android
  • iOS
  • both

33. An instructor is discussing facts about different mobile device operating software. The instructor states: “The icon on the Home screen is a shortcut to the app.” To which OS does this relate: iOS, Android, or both?

  • Android
  • iOS
  • both

34. An instructor is discussing facts about different mobile device operating software. The instructor states: “WIFI hotspots are a location data source that can be used by locator apps to determine the position of a mobile device.” To which OS does this relate: iOS, Android, or both?

  • both
  • iOS
  • Android

35. An instructor is discussing facts about different mobile device operating software. The instructor states: “Remote backups are a cloud-enabled service for mobile devices.” To which OS does this relate: iOS, Android, or both?

  • both
  • iOS
  • Android

36. An instructor is discussing facts about different mobile device operating software. The instructor states: “GPS signals are used to enable geocaching, geotagging and device tracking on these mobile devices.” To which OS does this relate: iOS, Android, or both?

  • both
  • iOS
  • Android

37. An instructor is discussing facts about different mobile device operating software. The instructor states: “The start voice control function can be performed with the home button.” To which OS does this relate: iOS, Android, or both?

  • iOS
  • Android
  • both

38. An instructor is discussing facts about different mobile device operating software. The instructor states: “To synchronize a mobile device to a PC, iTunes must be installed on the PC.” To which OS does this relate: iOS, Android, or both?

  • iOS
  • Android
  • both

39. An instructor is discussing facts about different mobile device operating software. The instructor states: “When the device roams out of the range of any Wi-Fi networks, it can connect to the cellular data network if this feature is enabled.” To which OS does this relate: iOS, Android, or both?

  • both
  • iOS
  • Android

IT Essentials v6.0:

1. Which two security precautions will help protect a workplace against social engineering? (Choose two.)

  • performing daily data backups
  • encrypting all sensitive data stored on the servers
  • registering and escorting all visitors to the premises
  • ensuring that all operating system and antivirus software is up to date
  • ensuring that each use of an access card allows access to only one user at the time

2. Which two characteristics describe a worm? (Choose two.)

  • executes when software is run on a computer
  • is self-replicating
  • hides in a dormant state until needed by an attacker
  • infects computers by attaching to software code
  • travels to new computers without any intervention or knowledge of the user

3. Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

  • adware
  • phishing
  • stealth virus
  • worm

4. What is the primary goal of a DoS attack?

  • to facilitate access to external networks
  • to prevent the target server from being able to handle additional requests
  • to obtain all addresses in the address book within the server
  • to scan the data on the target server

5. Which type of attack involves the misdirection of a user from a legitimate web site to a fake web site?

  • SYN flooding
  • DDoS
  • DNS poisoning
  • spoofing

6. Which password is the strongest?

  • qwerty
  • Abc123
  • Im4ging!
  • Gd^7123e!
  • pAssword

7. Which three questions should be addressed by organizations developing a security policy? (Choose three.)

  • What assets require protection?
  • How should future expansion be done?
  • What is to be done in the case of a security breach?
  • When do the assets need protecting?
  • What insurance coverage is required?
  • What are the possible threats to the assets of the organization?

8. The XYZ company has decided to upgrade some of its older PCs. What precaution should the company take before the disposal of the remaining older computers?

  • Perform a high-level format of the hard drive.
  • Remove the RAM from the motherboard.
  • Data wipe the hard drive.
  • Destroy the monitor.
  • Remove the CPU.

9. Which two file-level permissions allow a user to delete a file? (Choose two.)

  • Read
  • Modify
  • Read and Execute
  • Write
  • Full Control
  • List Contents

10. What is the name given to the programming-code patterns of viruses?

  • grayware
  • mirrors
  • signatures
  • virus definition tables

11. What is the most effective way of securing wireless traffic?

  • WPA2
  • SSID hiding
  • WEP
  • wireless MAC filtering

12. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

  • Any traffic that comes into port 25 allows outgoing port 113 to be used.
  • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
  • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
  • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.

13. What are two physical security precautions that a business can take to protect its computers and systems? (Choose two.)

  • Perform daily data backups.
  • Implement biometric authentication.
  • Lock doors to telecommunications rooms.
  • Replace software firewalls with hardware firewalls.
  • Ensure that all operating system and antivirus software is up to date.

14. What is the minimum level of Windows security required to allow a local user to restore backed up files?

  • Write
  • Read
  • Create
  • Full

15. What is the purpose of the user account idle timeout setting?

  • to log a user out of a computer after a specified amount of time
  • to display a timeout message if a user has not typed a keystroke in a particular amount of time
  • to turn the computer off if the user has not typed anything after a specified amount of time
  • to create a log message of how long the computer was not used

16. Which two security procedures are best practices for managing user accounts? (Choose two.)

  • Disable authentication.
  • Limit the number of failed login attempts.
  • Restrict the time of day that users can log into a computer.
  • Enable AutoRun.
  • Enable port forwarding.

17. Which Windows Firewall option allows the user to manually allow access to the ports required for an application to be allowed to run?

  • Manage Security Settings
  • Automatically
  • Turn off Windows firewall
  • Turn on Windows firewall

18. Which two Windows default groups are allowed to back up and restore all files, folders, and subfolders regardless of what permissions are assigned to those files and folders? (Choose two.)

  • Administrators
  • Power Users
  • Backup Operators
  • Access Control Assistants
  • Cryptographic Operators

19. A manager approaches a PC repair person with the issue that users are coming in to the company in the middle of the night to play games on their computers. What might the PC repair person do to help in this situation?

  • Limit the login times.
  • Use Event View to document the times logged in and out of the computer.
  • Use Device Manager to limit access to the computer.
  • Enable power on passwords in the BIOS.

20. Which question would be an example of an open-ended question that a technician might ask when troubleshooting a security issue?

  • Is your security software up to date?
  • Have you scanned your computer recently for viruses?
  • Did you open any attachments from a suspicious email message?
  • What symptoms are you experiencing?

Explanation: Close-ended questions generally have a fixed or limited set of possible responses, such as “yes” or “no”. Open-ended questions imply no limited or fixed set of replies but rather generally prompt the responder to provide more meaningful feedback.

21. Which action would help a technician to determine if a denial of service attack is being caused by malware on a host?

  • Disconnect the host from the network.
  • Log on to the host as a different user.
  • Disable ActiveX and Silverlight on the host.
  • Install rogue antivirus software on the host.

22. A technician is troubleshooting a computer security issue. The computer was compromised by an attacker as a result of the user having a weak password. Which action should the technician take as a preventive measure against this type of attack happening in the future?

  • Check the computer for the latest OS patches and updates.
  • Verify the physical security of all offices.
  • Ensure the security policy is being enforced.
  • Scan the computer with protection software.

Explanation: As part of the fifth step of the troubleshooting process, technicians should apply preventive measures whenever possible. Most company security policies include a section on password complexity and length requirements. Ensuring that this policy is being enforced can help prevent attackers from being able to compromise systems through password cracking.

23. It has been noted that the computers of employees who use removable flash drives are being infected with viruses and other malware. Which two actions can help prevent this problem in the future? (Choose two.)

  • Set virus protection software to scan removable media when data is accessed.
  • Configure the Windows Firewall to block the ports that are used by viruses.
  • Disable the autorun feature in the operating system.
  • Repair, delete, or quarantine the infected files.
  • Enable the TPM in the CMOS settings.

24. A virus has infected several computers in a small office. It is determined that the virus was spread by a USB drive that was shared by users. What can be done to prevent this problem?

  • Destroy the USB drive.
  • Activate Windows Firewall.
  • Change the passwords on the computers.
  • Set the antivirus software to scan removable media.

Explanation: To prevent the problem, the antivirus software should be configured to scan removable media. Destroying the USB drive will prevent that device from spreading the virus to other computers, but will not prevent future transmission of viruses from USB drives. Windows Firewall is a useful tool, but it does not prevent the spread of viruses.

25. A user is browsing the Internet when a rogue pop-up warning message appears indicating that malware has infected the machine. The warning message window is unfamiliar, and the user knows that the computer is already protected by antimalware software. What should the user do in this situation?

  • Allow the software to remove the threats.
  • Click the warning window to close it.
  • Update the current antimalware software.
  • Close the browser tab or window.

26. In what situation will a file on a computer using Windows 8.1 keep its original access permissions?

  • when it is copied to the same volume
  • when it is moved to the same volume
  • when it is copied to a different volume
  • when it is moved to a different volume

27. What security measure can be used to encrypt the entire volume of a removable drive?

  • EFS
  • TPM
  • BitLocker To Go
  • NTFS permission

28. A user calls the help desk reporting that a laptop is not performing as expected. Upon checking the laptop, a technician notices that some system files have been renamed and file permissions have changed. What could cause these problems?

  • The file system is corrupted.
  • The laptop is infected by a virus.
  • The display driver is corrupted.
  • The file system has been encrypted.

29. Which two operating systems can be upgraded to Windows XP Home? (Choose two.)

  • Windows 95
  • Windows 3.1
  • Windows 98
  • Windows 98 SE
  • Windows NT workstation

30. A customer using a Windows XP computer is complaining that a new card reader is not working. A technician tests the card reader on a Windows 7 computer and does not detect any problems. What are two possible solutions to the problem with the XP computer? (Choose two.)

  • Install additional RAM.
  • Modify the options in the BIOS.
  • Install the driver from the CD provided with the card reader.
  • Download and install the driver from the manufacturer of the card reader.
  • Update the CMOS firmware.

31. A technician is replacing an internal hard drive used as a secondary drive on a PC. After connecting the new hardware and powering up the computer, an “OS not found” error message is displayed. What is the most probable cause for that error message?

  • The power supply is faulty.
  • The hard drive jumper is set incorrectly.
  • The motherboard needs replacing to be able to support the new hard drive.
  • The USB port has too many attached devices to supply adequate power.
  • The BIOS needs updating.

32. A technician is upgrading an older PC with a dual core CPU. When the PC restarts, it is slower than it was before the upgrade. The Performance tab from the Task Manager displays only one CPU graph. What is the most probable solution to this problem?

  • Replace the HDD with a higher capacity hard drive.
  • Overclock the CPU.
  • Increase the amount of RAM available.
  • Update the BIOS firmware to support the dual core CPU.

33. A laptop that is running Windows XP displays “Missing NTLDR” after the POST. What are the two most probable reasons for this problem? (Choose two.)

  • Boot.ini is missing or damaged.
  • There is a conflict with a newly installed device.
  • BOOTMGR has been corrupted.
  • The boot order is not set correctly in the BIOS.
  • The index service is not indexing in the correct locations.

34. Several times during the last few days, a user has experienced the Blue Screen of Death when plugging an external hard drive into a laptop via USB. What is a possible solution for this problem?

  • Reinstall the operating system.
  • Upgrade the operating system.
  • Research the STOP error and the name of the module that produced the error.
  • Research the boot error beep code to identify the source of the error.

35. A computer repeatedly locks without any error message. Which two conditions may be the cause of the problem? (Choose two.)

  • The UAC has been turned off.
  • The user has breached the user security policy.
  • The computer has a virus.
  • The index service is not running.
  • The CPU needs to be upgraded.
  • An update has corrupted the operating system.

36. What are two possible solutions to any Windows computer restarting continuously and never displaying the desktop? (Choose two.)

  • Upgrade the processor.
  • Upgrade the video card.
  • Press F8 to open the Advanced Options menu and choose Disable Automatic Restart on System Failure.
  • Reset the hard drive jumpers.
  • Run chkdsk /F /R from the recovery console.
  • Access the BIOS and change the boot order options.

37. A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. On the network switch all the interface lights are on, except for the interface connected to the PC. The LED on the network card is off. What is the most likely cause of this problem?

  • The network switch is faulty.
  • The gateway needs to be fixed.
  • The network cable is faulty.
  • The PC has an incorrect IP address for the DNS server.

38. Users in a recently installed wireless network are complaining of slow data transfer and frequent loss of connectivity. The technician checks that the wireless security is correctly implemented, and there is no evidence of unauthorized users on the network. Which two problems might the technician suspect? (Choose two.)

  • The wireless signal is too weak.
  • The DHCP server is faulty.
  • There is interference from outside sources.
  • The antenna on the access point is too powerful.
  • The network passwords need to be reissued to the users.

39. A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the technician notices that all of them have an IP address in the 169.254.x.x range. What is the most likely cause of this problem?

  • The DNS server is not operational.
  • The Internet connectiion is down.
  • The gateway address is incorrect.
  • The DHCP server is not operational.

40. A technician is working on a laptop that has a dark display. After attaching an external display and verifying that it works, the technician now has a better idea as to the problem. What could be the problem?

  • The display driver is incorrect.
  • The motherboard has failed.
  • The CPU has failed.
  • The power inverter of the LCD screen or backlight lamp has failed.

41. A technician replaces a laptop keyboard that was no longer functioning, and has verified that the newly replaced keyboard functions properly. What is the final step the technician should take as part of the troubleshooting process?

  • Ask a list of closed-ended questions.
  • Research the problem.
  • Document all findings, actions, and outcomes.
  • Implement preventive measures.

42. A user complains that when a page is printed on a laser printer, the page smears when touched. What is a possible cause of this issue?

  • The laser assembly is faulty.
  • The EP drum is damaged.
  • The pickup rollers are defective.
  • The fuser has failed.

43. A technician finds that occasionally when a network printer is restarted, clients are unable to print to it, receiving a “Document failed to print” message. What is a probable cause of this?

  • The drum is damaged.
  • The printer does not have enough memory.
  • The toner level in the EP cartridge is low.
  • The power supply on the printer is failing.
  • The printer is configured to get an IP address using DHCP.

44. A user complains that a printer is outputting random characters instead of the desired document. What is a probable cause of this?

  • There is dirt or debris in the printer.
  • The printer does not have enough memory.
  • The pickup rollers are defective.
  • An incorrect print driver is installed.

45. A freshly installed Windows 7 laptop is plugged into the network and configured with an IP address. The technician then attempts to ping the laptop from another computer. While the laptop is able to connect to other devices, the ping requests fail. What is the likely cause?

  • The network drivers for the NIC are out of date.
  • The port speed for the NIC is incorrect.
  • TPM must be enabled.
  • The Windows Firewall is blocking ping requests.

46. A computer displays this message when the computer boots: “MBR has been changed or modified.” What could cause this problem?

  • The CMOS battery has failed.
  • A RAM module is not fully inserted into the memory slot.
  • A virus has altered the Windows kernel.
  • A boot sector virus has altered the master boot record.

47. Users are complaining that they are receiving spam from the email account that belongs to a co-worker. What could cause this problem?

  • A virus has damaged the master boot record on the system that is used by the co-worker.
  • The network adapter on the computer that is used by the co-worker is malfunctioning.
  • The email account belonging to the co-worker was hijacked because of malware.
  • The email client belonging to the co-worker is not configured properly.

48. A technician is troubleshooting a laptop that has the power light on and the hard drive spinning. However, the laptop only displays vertical lines that change color. What is the problem?

  • The BIOS is corrupt.
  • The LCD screen has failed.
  • The backlight lamp has failed.
  • The LCD screen inverter has failed.

49. A technician is troubleshooting a laser printer that outputs blank paper for all print jobs including printer test pages. What is a probable cause?

  • The laser printer does not have adequate memory.
  • The drum is failing to hold a charge.
  • The drum wiper blade is worn.
  • The fuser has failed.

50. A technician arrives and asks a customer, “Can you describe the problem?” The customer replies, “All email messages that I send have the wrong date. I have restarted the computer several times, but this does not seem to help.”
What could be the problem?

  • The MBR is corrupted.
  • The CPU voltage is set too low.
  • The CMOS battery has failed.
  • The hard drive is beginning to fail.

51. A technician is troubleshooting a Windows 7 laptop infected with a virus that has damaged the master boot record. The technician has booted the laptop using the installation media and is attempting to repair the laptop from the command line interface. Which two commands can the technician use to repair the corrupt master boot record? (Choose two.)

  • regedit
  • chkdsk
  • regedt32
  • bootrec /fixboot
  • bootrec /fixmbr

52. A file called new_resume has the following file permissions: rw-r-x–x . What two facts can be determined from these permissions? (Choose two.)

  • Other people have no access to the file.
  • Members of the group have read and execute access to the file.
  • The user is able to read and modify the file.
  • Group members are able to modify the file.
  • Other people have read and execute access to the file.
  • The user has full access to the file.
  • 2004-06-05 1:41 am

    Anonymous

    This is a very well argued point. Some of the things mentioned are absolutely spot on, such as “nowhere to hide” referring to the poor design decisions in windows, such as the auto-update method, default security settings, firewall, registry, etc. To many things that should have been taken care of long ago, not now finally with sp2. The section dealing with zero tolerance is good, but smacks of mac-zealotry. There is no mention of other OS, as if to imply that macos is the only nice neighboorhood there is. If the article was intellectually honest and thorough, linux, BSD (yes the reason for macos security), and other various OSes would have been mentioned as better and longer lasting examples of good communities. Also, the reality of the macos software market is rather puny. Most of the software written for macos is hobbyist type of software. There is no commercial interest in macos as a spyware platform.

  • 2004-06-05 1:48 am

    Anonymous

    A good article, and a good read, but i think it should be more technical.. 7,5/10 ;)

    The article do not explores the arquitecture of Mac Os X, this is one of the reasons of why Mac Os X, and unixs in general are muuuuuuuuuuuch moooooooooore secure than windows…

    Though, i’m ingenuous, so i want to think that LongHorn will have a better arquicteture in what respects to security..

    Probably, Microsoft could call Apple to make it ;)

  • 2004-06-05 1:56 am

    Anonymous

    I agree with you, Greg, about other OSes. I’m sure *BSD and Linux users also have zero tolerance for crapware. However, I have to say your idea of the Mac market being puny is misguided. The Mac software market is considerably larger than Linux in many markets…especially consumer. So the Mac is the #1 alternative OS to target for crapware in my opinion. Thing is, almost nobody does. Funny, isn’t it? ;)

    Jared

  • 2004-06-05 2:00 am

    Anonymous

    The apple community isn’t as badly riddled with hackers nor warez groups. Ever try to find warez for mac stuff, good luck, and if you do itll probably be porno free. You dont have community control when you server 97% of all desktops, what you have is a democracy out of control.

  • 2004-06-05 2:03 am

    Anonymous

    I’m not an OS zealot. I’ve been using windows since it came out and am comfortable with it and efficient on it. But the security is a HUGE problem.

    Professionally I’m still dependent on some windows-only apps, but I don’t use IE much, preferring Mozilla, which seems a little more secure and less high-jackable. I also keep SUSE on a dual boot and I write my own business software in Java, just in case I decide to give up MS in the future. So this security stuff is effecting me and my planning big-time.

    Good for Mac that it’s avoided this hell.

  • 2004-06-05 2:07 am

    Anonymous

    I gave up on Windows…

    The people all around me are still using it. They ask me: “what should I do about the pop-ups?”, “why is this crashing?” (still on Win98…), “do I have a virus?”

    I used to know. I used to marvel at my answers. I used to install software upon software. Anti-virus, pop-up blockers, defragmenters, registry cleaners, optimizers, security updates, patches … on and on.

    Then, I started to learn UN*X and I settled on FreeBSD. Of course, the price I had to pay was the learning curve. Yes, I had to un-learn Windows and learn that it was not the center of the universe.

    I guess, Mac OS people are faced with the same “problem”. They will have to read the documentation, they will have to inquire about how things are done on their Mac. They won’t be able to ask nephew Bob or neighbour Sam to fix their machine (because Bob and Sam are Windows people, most likely).

    I mean, I find it great. I can solve ALL my problems, when I have problems. I use google, maybe try a few newsgroups, all my questions have been answered.

    The price for ignorance is annoyance. (pop-ups on Windows)

    The price for peace of mind is time investment. (to overcome the learning curve of another OS)

  • 2004-06-05 2:11 am

    Anonymous

    I have to agree with you here Josh. The communities that support this crap don’t really use macs.

    How many teenagers are killed becasue they got drunk and wrecked their new model Mercedes Benzes and Cadillac’s every year?

    Does this mean these cars are safer to wreck? Or that the types of people driving them are usually not the same types of people who get drunk and drive wreckless?

    It isn’t just about market share.

  • 2004-06-05 2:15 am

    Anonymous

    no matter how many press releases microsoft ships, they will always have a product riddled with security problems, secret backdoors, keys given to foreign powers, etc. this is because microsoft is a corrupt and evil company.

    the basic rule is that a corrupt company cannot make a good product. one could look at the usa with their corrupt government and notice the same thing. the people are getting screwed. with microsoft, the customer is getting screwed.

  • 2004-06-05 2:19 am

    Anonymous

    Does this mean these cars are safer to wreck?

    Yes, actually. Mercedes (up until their quality started slipping recently) have been praised for their “panzer-quality” steel bodies (to steal a phrase from C&D). Certainly, a Mercedes will protect you far better in a crash than Kia.

  • 2004-06-05 2:20 am

    Anonymous

    I don’t think that the BSD layer in Mac Os X is the “unique” reason for the good security of Mac Os X…

    There are a lot of technologies that secure Os X and aren’t from BSD..

    A Big example: FileVault, Keychain with X.509 support, encription of disk images, root account disabled by default, SmartCard & Biometric authentification support and other opensource technologies that do not relates directly with BSD like kerberos, OpenSSH, OpenSSl..

    And all the configuration of this its as easy as all Apple products…

    Well, you can check out how secure is Mac Os X at:

    http://www.apple.com/macosx/features/security/

    Of course, there are Operating Systems more secure than Mac Os X, like OpenBSD (it seems that if you want security bsd is the way to go..) but with Mac Os X you don’t only have security, you have it in a way that its easy, and you have in way where you can run software from mayor developers..

    Actually if you think that the reason of why there aren’t software with spy/adware in the mac is that there aren’t any comercial interest i’ll think that you have little know of who makes this software..

    They aren’t the same than the companies that send ads trough it.. Generally They are hackers that sell black lists of proxy servers… And actually, i think that to this hackers 12-15 millon of users of Mac Os X without antivirus or any protection matter, and enough..

    And i’m not saying it, is Steve Linford of Spamhaus who says it..

    http://www.theregister.co.uk/2004/05/14/spam_club/

    Sorry if my english isn’t good ;P, i’m spanish..

  • 2004-06-05 2:21 am

    Anonymous

    The reason macs have so few virus and spyware is because nobodys going to make any money from it, or have any fun from that.

    U could take down every mac and the world and it would hardly effect the internet, or hardly amase and great DOS system. This artical was written because everyone ignores OSX users and will continue to. Osx has suffered from several remote root hacks, yet nobody has written attacks for it yet.. this artical says the problem lays in the lack of trojan writers not apple. So get our there virus writers and crash some mac systems, its the only way mac users will feel valuable.

  • 2004-06-05 2:27 am

    Anonymous

    Good job missing the point and attacking a detail. Linux advocates never are very difficult to spot.

  • 2004-06-05 2:41 am

    Anonymous

    didnt you read the article, he made the point that even if we are irrelvent because we dont have a huge market shared we’re doomed to be more secure because hey why target something that only has a 2% market share. So what if your the most targetted os, that doesn’t save you have having to deal with it. If we are irrelevent at least we’re safe from the lack of motivation of virus writers.

    Of course you suggesting that viruses go and show up mac users shows your type of personality. The Mac community doesn’t want YOUR type. WE for one don’t wish viruses on the windows community UNLIKE you guys we actually loathe bad stuff happening on anyone and dispise illegal stuff such as warez and we PAY for our Music thank you very much.

  • 2004-06-05 2:42 am

    Anonymous

    If my point was too obtuse to put a finer point on it its about market share. Who here really believes if apple had 90% of the market.. and microsoft 10% .. 90% of virus’s would still be written for windows? Its jsut a stupid thought yet mac ppl want to believe it. As for OSX security .. yer its unix .. so what !!! osx isnt even a sever operating system.. its nice to pretend that u have military grade security (steve jobs lies to u once again but mac users dont take no crap right ?? haha mac users would pay for sp1 and sp2 and not complain.. osx updates sound familiar).. but its got all the holes unix has always had. DNS smtp etc etc But hey apples been patching them! slowly.. (doesnt this ring a bell to microsoft and sun linux and EVERY OTHER IT COMPANY)

    If ppl ran massive databases, and functional internet systems on apple perhaps ppl would bother attacking it. As is what would be the point the only thing u could get from a mac user is a beta copy of the next fud artical claiming stupidly and incorrectly that macs rule because of the users. Funny how even the reg admits the worst thing about apple is its users… because they lie manipulate and crap on endlessly about steve jobs distorted reality field.

    U go guys!

  • 2004-06-05 2:54 am

    Anonymous

    1) The point about Apache vs IIS is a good point. Like I said earlier having the bigger market doesnt mean you dont have to deal with it.

    2) We don’t pay for OS updates, we get them for free because Security does matter. And at least with ever revision of OS X its actually been a worthwhile upgrade. Looking forward to Tiger.

    3) Ive seen people run macs as servers, they do have apache, ftp and ssh servers built in that you can turn on. And hell theres an even professional server software, you know OS X server… it runs on those nice g5 Xserves… so there :-p

  • 2004-06-05 2:58 am

    Anonymous

    “If my point was too obtuse to put a finer point on it its about market share. Who here really believes if apple had 90% of the market.. and microsoft 10% .. 90% of virus’s would still be written for windows? Its jsut a stupid thought yet mac ppl want to believe it”

    Of course not, but do you really think that there would be 959 vulnerabilities/viruses in only one month? Like the article says:

    http://www.informationweek.com/shared/printableArticle.jhtml?articl…

    ” As for OSX security .. yer its unix .. so what !!! osx isnt even a sever operating system.. its nice to pretend that u have military grade security (steve jobs lies to u once again but mac users dont take no crap right ??”

    http://www.apple.com/server/macosx/

    “haha mac users would pay for sp1 and sp2 and not complain.. osx updates sound familiar).. but its got all the holes unix has always had. DNS smtp etc etc But hey apples been patching them! slowly.. (doesnt this ring a bell to microsoft and sun linux and EVERY OTHER IT COMPANY)”

    Are you comparing a service pack with a release like Puma 10.1, Jaguar 10.2, Panther 10.3?

    Version numbering do not matter, and by the way Windows 2000 is 5.0 and Windows Xp is 5.1……

    “If ppl ran massive databases, and functional internet systems on apple perhaps ppl would bother attacking it. As is what would be the point the only thing u could get from a mac user is a beta copy of the next fud artical claiming stupidly and incorrectly that macs rule because of the users. Funny how even the reg admits the worst thing about apple is its users… because they lie manipulate and crap on endlessly about steve jobs distorted reality field.”

    You can run oracle sybase and other big massive databases in Mac Os X..

    As –_==Josh==_– says:

    bigger Marketshare != more vulnerabilities

    Apache vs IIS

    I’m not sure if i should report abuse to your comment.. But its awful and whithout any facts..

  • 2004-06-05 3:07 am

    Anonymous

    I think the article’s point is valid concerning viruses. It is true that Macs make it much harder for a virus to hose the system files since root is disabled by default.

    Another reason that Windows users have more viruses is because they are less educated about computers and that they are cheapskates compared to Mac users. Spyware is attractive because it promises useful stuff w/o having to pay for it. mac users generally are more affluent and so are less liable to fall prey to something-for-nothing schemes.

    Linux users are cheapskates, too, but we’re more savvy than Windows and Mac users so that’s why we don’t have problems.

    The marketshare argument is not totally invalid, however. For example, RiscOS does not have very good security but there are very few viruses written for it because no one really even knows it exists. Macs would have more viruses if they had Windows’s marketshare but the situation would not be 90-10 as it is now.

  • 2004-06-05 3:14 am

    Anonymous

    Effect: result or consequence of action.

    Affect: produce effect on.

    Phew! I needed to get that off my chest. No big deal, though, I realize not everyone here is a writer or profusely fluent in the English language. So, those people are excused. Their opinion is more important than their grammar and spelling.

    This long ad-nauseum verbose from Gruber-doober is, as it seems, more founded on emotion and pseudo-scientific reasoning than actual fact.

    It can, in some instances, be easier to code a virus for UNIX than Microsoft Windows. Simple script files can wipe out entire directories! AAAAAH!

    If Mac OS-X were the major OS running servers and most home PC’s than there would be a cornucopia of viruses, malware, spy, blah, blah, blah, and so forth, out there for it. Numbers do make a difference.

    1. Anyone with a broadband connection with no anti-virus and no firewall on any system is taking a risk regardless of architecture.

    2. Securing any OS is a good thing.

    3. Most surveys I found on the web based their data on percentage of market share. Which will skew and misrepresent the data and interpretation of the data.

    4. Hackers (and all those fun people) would bother with OS-X if it were the number one OS running most of the servers and PC’s out there. Sheer numbers do make a difference.

    5. There is mucho-deniro to be made in the security business. If Apple’s market share ever becomes a major contender in the IT, Networking and personal computing markets be prepared to see a proportional rise in malicious coding of any kind and security software. This is big business.

    6. Yes, there are more stupid users on Windows. Why? Because they vastly outnumber the morons on Macs. That’s all. Those knowledgeable in security on Windows are as intolerant of crapware as anyone on an OS-X system. It all comes down to the individual. I’ve met some pretty stupid people on all sides of the OS fence.

    7. In this day and age there are so many tools, freeware, software available to any PC user (yes, Macs are P.C’s. It’s simply an acronym for Personal Computer) that there is no excuse for being hit by any virus, worm or trojan of any kind.

    8. Software companies absolutely love to spread fear, uncertainty and doubt.

    9. Be vigilant, read a book on your system and secure it.

    10. My architecture is safer than yours. Don’t believe it. That’s the biggest myth out there.

    11. If any lucrative enterprise turns you into an advocate of their system. They have you by the balls. Hey, they want you on their side! You’re the best free advertising they can get! Duh!? You’ll buy their system, you’ll tell your friend, grandma, and so forth. Hello?!

  • 2004-06-05 3:18 am

    Anonymous

    One of the difference between Windows and OSX is that most Windows users are administrator of their machine. On OSX every time a software requires root access the system open a Window asking if you grant the rights to do something as root.

    The problem with windows is that all doors are opened by default wich lead to bad coding habits from programmers. For example some applications do not run properly if you are not administrator.

    SP2 fixes some of the issues but not all of them.

  • 2004-06-05 3:27 am

    Anonymous

    Compare RealOne under Windows and under OSX. Under windows it’s one of the most feared crapware products. Under OSX it’s.. it’s.. just another player. Strange isn’t it?

  • 2004-06-05 3:31 am

    Anonymous

    Glenn, Thank God there is someone in here with a head on their shoulders! It amazes me that people have such short term memories. They don’t remember the days when Macintosh actually had more viruses than Windows!

    _==Josh==_, Ok, lets look at the stats for Apache vs IIS…

    Linux 59.7%

    Win 2000 19.6%

    Unknown 5.2%

    Win NT9x 4.7%

    Windows 3.5%

    FreeBSD 2.6%

    SolarisSunOS 2%

    Win 2003 0.6%

    AIX 0.4%

    IRIX 0.3%

    BSDOS 0.2%

    Unix 0.2%

    Remaining 1%

    Today alone:

    Linux (98.3%)

    Win 2000 (1.7%)

    These stats came from Zone-H.org!

    So your right Josh, enough said!

  • 2004-06-05 3:44 am

    Anonymous

    Again, someone trying to pull a “I’m right, here’s my fact, you can’t argue”. Well his facts are flawed.

    One sentence of his text make me laugh :

    Windows apologists have long argued that the only reason the Mac has been so strikingly free of security exploits is that it has such a smaller market share than Windows. This argument ignores numerous facts, such as that the Mac’s share of viruses is effectively zero; no matter how you peg the Mac’s overall market share, its share of viruses / worms / Trojans is significantly disproportionate.

    Duh ! That’s normal, you can’t expect a share market of, say 10% to receive 10% of the virus. Virus makers use a simple algorithm in their brain to pick a target OS for their virus. Which OS is more popular ? Windows. Let’s write for Windows then.

    So the share market, or any “proportional” comparison doesn’t work. The OS with the biggest market share will always get nearly 100% of the crap / virus.

    Keep the exact same OSes, swap the share market, and suddenly, I’m 100% sure, Mac gets all the crap.

    There’s an other reason for this: Windows is the de-facto OS for everyones. Mac is a small community. As he even say so in his text, when a crap is created for Mac, the community is talking about it and taking action. Well that’s easy to say, as the community is small. They don’t get most of the dummy joes who have a dozen virus on their PC and do nothing about it, which help propagate the crap.

    John Gruber is discussing why this happens and ultimately concludes that it doesn’t matter why, what it matters is that you can’t argue with facts.

    Well sorry John, but all this is arguable, because your so-called “facts” are simply arguable.

  • 2004-06-05 3:54 am

    Anonymous

    OK im sorry im a bit confused by your data. Those %’s represent the % of apache servers/OS right? So your telling me that 59.7% of apache servers are running linux?

    That cant be right. Since:

    69(apache marketshare) * 0.597 = 41.2%

    You telling me that linux is running 41.2% of the internet?!? No I dont think so.

    Today alone:

    Linux (98.3%)

    Win 2000 (1.7%)

    What does that mean?

  • 2004-06-05 3:54 am

  • 2004-06-05 3:55 am

    Anonymous

    Actualy, you’re wrong. Very, very wrong.

    First problem is that small dealers supply with software, just so that they can sell Apple. In our country there’s very rare Mac user that’s completely *legal*.

    As for Warez like:

    Warez never was Apple software place. Apple users always preffered Hotline, which was for a long time THE only aka.Warez-FTP.Windows software.

    Try going on Hotline servers, what do you find. Apple software mostly.

    btw. Ever heard of Surfers serials??? I bet they exists only for the *legal* users. Fancy software (even more than Serialz for Windows), released in a very frequent fashion.

    Few examples:

    Just as on Windows. I don’t know anyone without Fetch (illegal offcourse, Fetch is Shareware). Sad thing is that Fetch is being used illegaly even on OSX (OSX provides FTP client in Finder, dammit’).

    It’s not religion you’re talking about. It’s people, some are using their brains with decency in mind and some are not. But that’s not even nearly connected to the fact which OS people use. Personally I know a lot of people trough my bussines.

    In % of companies and users I know.

    Most legalized, Linux: Hell, most of them bought Linux. And all server software. Anyone could download it for free. Example: Need an enterprise server. CentOS for free or RH for $2000. RH, for sure. Support is what counts here. I could always download RH for free (ok, I did, but that didn’t stopped me to buy boxed edition while it was available). Only me personaly, I’ve got two RHES, and bought 11 others for companies.

    Then Windows. Maybe there’s a fact that most of the companies use M$ Office only. And they always buy that little DTP soft whey need. (I avoid home users)

    MacOS is the worst of all. (I know very few Mac home users, but none has spent even 1$ for software, (if they don’t use OS9) MacOSX which came with computer was replaced with ^_- *NEW* version downloaded on P2P). Companies that use Macs are way off 100% (maybe 40%) legalized.

  • 2004-06-05 3:55 am

    Anonymous

    1. Yeah, but how big is the risk depends on what Operating System are using you, and what precautions are you taking..

    2. Of course!

    3. All surveys are relative, like all porcentages and market share numbers.. Don’t take it seriusly, means nothing..

    4. So, you know personally all the hackers in the world to know that they have no interest in Mac Os X or other Oses..

    It’s true that Mac Os X isn’t the major Os that run servers neither windows is. Its Linux, and its Apache (And the same vulnerabilities that affect Apache will probably Affect to Windows, Mac Os X and any other os running Apache). Anyways… Do you see Linux having more viruses than windows because it has more market share than windows in the server market?

    NO

    5. Yeah, we know that, Intego knows that.. ;)

    6. I don’t think there are more stupid windows users, probably there are more windows users with little know of computers & security, but i don’t call them stupids..

    Anyway, what the article says, is that if some software on mac side contains spyware or any other malicius ware, the mac users will know because it will be news around all mac centric sites.. And mac users, generally will manifest an attitude of repulse to the software maker, and will unistall the software. Windows users generally use the software anyways, or make little utilities to protect them, but continue to use the software (example: kazaa = kazaa lite).

    7. Are you perfect? I think at least your machine isn’t perfect, and there will be ways of infect/infiltrate in your system, much more when you are using windows. So i think there are excuse, think in those uses with little know of computers, they shouldn’t need to know how to protect their system. And they shouldn’t need to know what freeware tools need to install and how to use them to remain secure.

    Because this freeware tools & software you say isn’t included with windows!

    8. What software companies? Intego?

    9. I think you mean: Pay for a book on how to secure your system, because the makers of the os you already buyed do not want to include/make the tools and documentation you need to protect your system.

    10. NO IT’S NOT A MYTH. The next time you say something similar, try to do it with facts.

    11. Well, Do nos surprise me, that a person that call all people stupid, thinks that all the people can be manipulated and that they do not have enough personality and common sense to do what they wants. If they wants to recommend a system to their family/friends they can.

    It’s not free advertising, it’s speak of their own experiences.. Well you can only do this if you live in a country with liberty.

  • 2004-06-05 4:01 am

  • 2004-06-05 4:06 am

    Anonymous

    Each process you take from root access to user access aids in the security of the system. Not very usefull though when u think about it, is it fine that the program cant crash your computer when it can read all your user access files? Thats why in windows i sometimes run ie in a different user process to my own. Yes u can do this under linux of course but it has still disproved the REAL usefulness of the argument about root security. No application shuold be able to be taken over.. and internet apps will have to be run in a .net security model (or java) where it has DOSENT have YOUR user rights.

    Root exploits have been avalible for linux and OSX.. look up the name server vunrability. This points out that macosx is responsible for code they dont write.. thats used in their operating system! (as well as apache etc)

    Military grade security is nothing but marketing hype… u dont break into a system using brute force but with vunrabilities and so a large key size makes no difference.

    Each us soldier runs windows 2000 on his backpack.

    Apple treats u like suckers because the first 2 public non beta versions of osx has known bugs they refused to fix. I still get updates for windows 98 sometimes for free. Microsoft has always worked with driver manufacturers and fixed problems for free that they didnt even cause. (Hello knowledgebase)

    I know u can run oracle and servers on osx.. after all Apple didnt write those parts.. its really just unix. The point is so few ppl use them a virus isnt going to get far.

    Theres so much unix code in osx shared with linux.. when ppl get bored of hacking windows and move onto linux (after all windows pcs are soon to be sp2 api level security, .net model sandbox and noex compatable support (AMD only)) youll get something to fight against to ;)

  • 2004-06-05 4:18 am

    Anonymous

    First I’ no Mac lover, more like opposite

    If Mac OS-X were the major OS running servers and most home PC’s than there would be a cornucopia of viruses, malware, spy, blah, blah, blah, and so forth, out there for it. Numbers do make a difference.

    Yes, and no. Apple has one big flaw, and that’s file forks (You can prepend anything on that with a little of programming knowledge). Just like Windows provides Command in registry (which is no problem if that wouldn’t allow virus or malware to prepend on .exe). Otherwise Mac is way more secure than Windows. No browser or mail which has his internal organs inside the core OS, which is hard to say for IE, Otlook and Office

    1. Anyone with a broadband connection with no anti-virus and no firewall on any system is taking a risk regardless of architecture.

    Windows is *THE* OS without firewall here. OSX has one.

    2. Securing any OS is a good thing.

    As I said if your user interface is part of the core OS, then this is suggested. Otherwise securing goes to little details.

    3. Most surveys I found on the web based their data on percentage of market share. Which will skew and misrepresent the data and interpretation of the data.

    Most of the surveys are very inaccurate.

    4. Hackers (and all those fun people) would bother with OS-X if it were the number one OS running most of the servers and PC’s out there. Sheer numbers do make a difference.

    Hacker uses OS he preffers and that’s the system he’ll invade. And btw. there’s more Unix on NET than Windows. At least servers. (As much as I say OSX is no *NIX, I must admit that most of the services is the same as other *NIX)

    5. There is mucho-deniro to be made in the security business. If Apple’s market share ever becomes a major contender in the IT, Networking and personal computing markets be prepared to see a proportional rise in malicious coding of any kind and security software. This is big business.[i]

    Hope not, Apple is even more greedy than M$. And second point, yes, it would mean increase

    [i]6. Yes, there are more stupid users on Windows. Why? Because they vastly outnumber the morons on Macs. That’s all. Those knowledgeable in security on Windows are as intolerant of crapware as anyone on an OS-X system. It all comes down to the individual. I’ve met some pretty stupid people on all sides of the OS fence.

    Nope, Mac users are more stupid. At least mostly. That was fault of OS9<=.

    8. Software companies absolutely love to spread fear, uncertainty and doubt.

    And if there’s no problem, they produce one.

    10. My architecture is safer than yours. Don’t believe it. That’s the biggest myth out there.

    If you use Windows and he not. Yes, his architecture is SAFER.

    11. If any lucrative enterprise turns you into an advocate of their system. They have you by the balls. Hey, they want you on their side! You’re the best free advertising they can get! Duh!? You’ll buy their system, you’ll tell your friend, grandma, and so forth. Hello?!

    Yes, Apple sucks more than M$ in that department

  • 2004-06-05 4:43 am

    Anonymous

    “Root exploits have been avalible for linux and OSX.. look up the name server vunrability. This points out that macosx is responsible for code they dont write.. thats used in their operating system! (as well as apache etc)”

    Why is bad that Apple/Mac Os X is responsible for code that they don’t write? Apple contributes and patches BSD in the same way that they incorporate the contributions and patchers from the open source community. Is this bad? Can you explain to me why?

    And its logic that software that share the same code has the same vulnerabilities.. It could be a problem if it wasn’t patched..

    “Military grade security is nothing but marketing hype… Each us soldier runs windows 2000 on his backpack.”

    I think that when Apple speaks about Military grade security they are refering to The Pentagon and other agencies..

    “Apple treats u like suckers because the first 2 public non beta versions of osx has known bugs they refused to fix.”

    What bugs?

    And, from win 98 to win xp there are only 2 os versions..

    The update cicle of microsoft is much more slow..

    I think it’s dificult for any company to patch older oses, when you have to patch other things in 3-4 versions of more recent oses, this already happen in linux world with apache 1.x & apache 2.x. Anyways, Microsoft have much more resources and money to support older oses, and they charge more for their oses. I don’t think you can blame so much Apple for this.. And i think, that in the case that Apple hasn’t patched some bugs from mac os x 10.0/10.1 could be because the market share of this versions of the oses is so so small.. I don’t know any user that haven’t upgraded to jaguar or panther… Anyways, could you say to me of what bugs are you speaking?

    “Theres so much unix code in osx shared with linux..”

    Are you working at SCO? This isn’t true, first linux is not unix based, it come from minix.. BSD shares nothing with the linux kernel, they are completely didferent code bases, neither does the mach kernel that Mac Os X & Darwin uses..

    Other thing it’s the base applications & software, generally they are the same..

    “when ppl get bored of hacking windows and move onto linux (after all windows pcs are soon to be sp2 api level security, .net model sandbox and noex compatable support (AMD only)) youll get something to fight against to ;)

    Yeah, Service Pack 2 it’s as magic as Harry Potter, and will make windows the most secure operating system!

    So that all the hacker will have to switch to Linux to continue to make damage on systems.. ;)

  • 2004-06-05 4:48 am

    Anonymous

    actually, windows xp has a firewall..

    A very bad & buggy one.. but has it..

  • 2004-06-05 5:15 am

    Anonymous

    I don’t think there’s much of a point in the my OS is better than yours pissing contest, because I agree with others who say that the plethora of Windows spyware, adware, and trojans is due to its large marketshare. This is not because people write viruses due to its share, but because a large number of computer-illiterate people use windows.

    Viruses and other malware that require little or no user-interaction to attack are inexcusable on any OS, but so much of this stuff mentioned in the article is adware or trojans, which by definition require users to be foolish enough to run. The hiding-places problem arises because of windows extensibility. All these viruses hijack tools MS has provided for developers to change elements of the shell or operating system. You can’t have the extensible functionality without also providing hiding places for viruses. You can’t have the Google bar without also allowing for the Hotbar. I’m sure on OS X that there are many good places to hide malicious software: I’m pretty sure that the OS uses init scripts in which you could start up malicious daemons and then there are the various startup folders, and an evil installer could replace useful binaries with evil ones at will. This is a problem with any OS and you can’t defeat it without educating users or putting them into a straitjacket.

  • 2004-06-05 5:17 am

    Anonymous

    Its bad because whos responsibliy is it that 20 year old bind code had problems?.. Thats the problem.. WHOS responsibilty is it? http://techrepublic.com.com/5100-6264-5097756.html

    Apple has to lock down its own OS code.. yer open source can help but its apples resonsibliy to check every update for bind for its users.. apple dosent have the money or expereince to fix all the bugs in the default and common unix/linux apps osx users use.

    Apple cant claim that unix is secure .. and then rely on open source authors to make that come true. Or they can.. but its not their claim to make.

    The bugs i heard about in original osx were pretty well reported, and the outcry of mac users that they would have to buy an upgrade to osx just to get it to work with their hardware. I cant be bothered looking it up sorry … I do remember my friends brand spanking new mac G4 with osx would hard lock up everytime the power saving kicked in.

    Imagine if microsoft sold pcs with windows on them.. and that happened every time u left the pc for 5 min. It would be outrage.. but mac ppl didnt even complain that much about that one!

  • 2004-06-05 5:20 am

    Anonymous

    Pessimest wrote:

    Amongst Top 1000 Corporates Web Servers :

    54% – Microsoft IIS

    20% – Apache

    15% – NetscapeEnterprise Server

    11% – Others

    (http://www.port80software.com/surveys/top1000webservers/)

    Dude, just though I’d point this out. If you go to the port80 software homepage, and look at what they sell.

    “Port80 Software Web Server Modules for Microsoft IIS:

    Port80 Software tools enhance Microsoft’s Internet Information Services (IIS) Web server — empowering Web sites and applications with the most secure, optimized, high performance functionality for customers and business users, exposing control to server-side functionality for developers, and streamlining tasks for administrators.

    All products are available for a free 30-day trial download or for purchase.”

    Do your research properly, next time.

  • 2004-06-05 5:32 am

    Anonymous

    The whole virus problem is directly related to how much control the makers want you to have over your system. Not to put too fine a point on it, but MS stopped making their OS for USERS a long time ago. We have adware and spyware not just because of stupid users, but also because there’s a hell of a lot of money that these companies are investing in MS compilers to write spyware and MS servers to glean the results! It’s not that MS condones what they do, but they’re not committed to YOUR [you, at the keyboard, not the “masses”] user experience either.

    I was just reaming MS on another post for their software assurance scheme. It all comes down to control…With all the problems with rogue programs and registry entries, why isn’t there a freely available tool to simply verify your OS. It’s not like the last OS update [sans patches which you really should get] was a year and a half ago!!! It’s fine that it’s closed source, but why can’t they provide a manifest of all the OS files and checksums for an up-to-date system and let me run against that… Why can’t I get a complete list of every package installed, when, what files it modified…and my approval for ALL of the modifications…plus the ability to COMPLETELY remove all the changes. If piracy is SO important…where’s the “List my licenses now” button!!! I strive to have legal software, and I’d like my computer to be able to prove it a the touch of a button!!! Then I can dig out my keys and have every thing in tip-top shape for the auditors. My opinion is that if I have 1 computer I should have license management for that computer in an easy to read report I can print from time to time. If I have even two computers I should be able to sync the license managements between them just by normal networking and updates made to 1 should automatically happen to the other….given my say-so of course.

    But you won’t find those features anywhere on a MS roadmap. You can find some third parties willing to sell you other options, but it should be part of the OS. It would also nearly eliminate spyware/adware/malware because you the user would be able to see every single program and understand what it does…or at least look up against a database on your own. Personally, I belive MS WANTS the situation to get really bad so the masses beg for “trusted computing” and heavy-duty DRM on their machines to “protect” them. What’s really needed is 100% accountability for your machine…not some “secret sause” restore function, but a genuine “reset” button that automatically wipes out all the changes and brings all the files to factory fresh! Considering all the time and energy MS puts in to database servers and Code management the features I’d like to see to manage a PC are perfectly reasonable…but MS makes too much money looking the other way!

    Like I said in my post below on SA, this is a great point to sell any other OS with! These are the features admins want. They want to push a button and get all the license info & share that with a server to analyze it and compare it to their bill. They don’t want any other programs running they didn’t authorize. ME, the admin of 1 or 200 computers wants absolute control…and the tools to make them do what I want…not MS, not dell, not Adobe, but what I want them to do..on the time table that I set. Give me that an the virus problems will drastically diminish!

  • 2004-06-05 5:39 am

    Anonymous

    running a variety of operating systems, including xp, freebsd, slackware, redhat.

    and then i have my trusty ibook loaded with panther and yellowdog.

    i enjoy working with all my systems, but i just _use_ my ibook. on my other systems, there are varying levels of “fiddling around”.

  • 2004-06-05 5:46 am

    Anonymous

    ” I’m pretty sure that the OS uses init scripts in which you could start up malicious daemons and then there are the various startup folders,”

    Of course!, but if you want to write in those folders you will need an admin password..

    And of course, the users need to educate, but its more easy to learn to secure in Mac Os X than on Windows, because Apple provides easy tools for it..

  • 2004-06-05 5:49 am

    Anonymous

    The truth is that Windows is used on over 90% of personal computers, Mac OS is used by approximately 1.8%, Does anyone really care about 1.8%, I work for a consulting and services company and our applications run on Windows and Linux as well as Solaris and SGI. We had 12 Mac developers at one time to service our Mac user base, we cut out Mac development and no longer even consider Mac development because at the time we only had 3 clients that ran a Macintosh environment, this was after tbe release of OS X, now we have 1. Does it make sense for us to continue Mac developement efforts and to even bother with 1 client, no it doesnt. The same goes with virus writers or as the author puts it crapware authors, why are they going to bother with the Mac. Nothing even remotely interesting is being done on the Mac in this industry. It might be interesting to mention that the very first viruses were written for UNIX so the preaching and clueless ranting of the Linux and Mac communities that they are invulnerable to viruses, to put it quite frankly, is a bunch of crap. Mac OS X has had its fair share of security blunders lately, and Apple even released a patch that didnt even fix the problem. Linux has its fair share of advisories

    http://www.linuxsecurity.com/advisories/

    Why dont people make such a big deal about this? Because Microsoft is the evil empire, the demon in the night that steals children and sucks the flesh from their bones. Everyone considers Microsoft the enemy, everyone is quicker to point out Microsofts flaws than their own. The arguements over Linux and Mac OS X being superior have gone from totally technical reasoning to “Bill Gates is rich enough”. “Microsoft is a monopoly” blah, blah, blah. Just because Microsofts platform had more viruses for it does not mean that Mac or Linux are superior, they arent.

  • 2004-06-05 6:08 am

    Anonymous

    Lets talk about those for a moment. Linux Kernel vunerabilities exist and yes their are problems, However, most of the problems come from other weaker links such as Other Peoples Software. There should be no reason for a personal version of linux to have a ton of servers however n00bs just like windows n00bs install everything. Hell there have been vunerabilities for XMMS!

    Now lets look at Windows. I for one would love, just love to see the number of vunerabilities that other written software has. We of course can’t since the OS is a much better way to crack it since its security is just plain designed wrong. So assuming Windows was secure Id love to see the millions of security vunerabilities generated by normal VB.Net programmers.

  • 2004-06-05 6:11 am

    Anonymous

    Always beware he who first uses the word “zealot:”

    Check the “Linux” advisories from this link:

    http://www.linuxsecurity.com/advisories/

    1.”Conectiva: kde Insufficient input sanitation”

    KDE is not Linux

    2.”Conectiva: mailman Multiple vulnerabilities”

    mailman is not Linux

    3. “FreeBSD: core:sys Buffer cache invalidation vulnerability”

    Neither FreeBSD nor core:sys is Linux

    4. “Gentoo: Heimdal Buffer overflow vulnerability”

    Heimdal is not Linux

    5. “Gentoo: mc Multiple vulnerabilities”

    mc is not Linux

    6. “Gentoo: Apache 1.3 Multiple vulnerabilities”

    Apache is not Linux

    7. “Gentoo: MySQL Symlink vulnerability”

    MySQL is not Linux

    8.”Mandrake: kolab-server Plain text passwords”

    kolab-server is not Linux

    9.”Mandrake: mailman Password leak vulnerability”

    mailman is not Linux

    So, #1 doesn’t affect me, although I use KDE. I don’t use Connectiva. #2 doesn’t affect me since I use neither mailman, nor Connectiva. #3 doesn’t affect me because I use neither FreeBSD (presently) nor core:sys. #4 doesn’t affect me since heimdal isn’t installed on my boxes. #5 doesn’t affect me since I don’t use mc. #6 doesn’t affect me since I don’t use apache. #7 doesn’t affect me since I don’t use MySQL. #8 & 9 don’t affect me since I don’t use Mandrake, mailman nor kolab-server.

    So what’s the lesson for today kids, besides the fact the FreeBSD is not Linux? Linux is a kernel boys and girls. That’s right! Hard as it may seem to believe, but databases, desktops, mail servers and such really aren’t Linux!

  • 2004-06-05 6:20 am

    Anonymous

    “Root exploits have been avalible for linux and OSX.. look up the name server vunrability. This points out that macosx is responsible for code they dont write.. thats used in their operating system! (as well as apache etc)”

    “Its bad because whos responsibliy is it that 20 year old bind code had problems?.. Thats the problem.. WHOS responsibilty is it? http://techrepublic.com.com/5100-6264-5097756.html“

    Yeah, but what it’s better thousand of eyes searching in the code for bugs/vulnerabilities, or only a few developers in one company?

    And actually, those vulnerabilities were addresed..

    I think that having code that it’s revised by independent developers and intelnal developers its good..

    Anyways I Think you should read two times the link you provided..

    Because, of this ten vulnerabilities none its enabled by default in Mac Os X. And normal users do not use BIND or SendMail.., i believe that those who use this know when a vulnerability affects to these technologies, or at least they should visit security website frecuently..

    “Apple has to lock down its own OS code.. yer open source can help but its apples resonsibliy to check every update for bind for its users..”

    Yeah, it’s Apple responsability, and they patched it..

    You can find any OS without vulnerabilities, people aren’t perfect, people write software, so this software aren’t perfect.. This has any relation with the fact that Mac Os X is built to be more secure.

    “Apple cant claim that unix is secure .. and then rely on open source authors to make that come true. Or they can.. but its not their claim to make.”

    And actually, Microsoft can claim that Windows is the most secure operating system? ;) , Apple do not says that is the most secure os.. It says that its built to be secure, and they take security as a priority, you can say that an os is secure independently if it has vulnerabilities.

    “The bugs i heard about in original osx were pretty well reported, and the outcry of mac users that they would have to buy an upgrade to osx just to get it to work with their hardware. I cant be bothered looking it up sorry …”

    I remember of a security vulnerability that was addresed firt in jaguar and week after in puma and was criticized… But i think its logic because probably Apple must adapt the patch for the older os..

    I don’t know if it is what you are refering..

    ” I do remember my friends brand spanking new mac G4 with osx would hard lock up everytime the power saving kicked in.”

    I can’t undestand what are you saying in this paraprhase could you or anyone translate it to spanish..

    My english is so bad ;)

  • 2004-06-05 7:01 am

    Anonymous

    What if I were unfortunate enough to get MacKaZaA and put in my root password when asked by the installer, only to find billions of popups crowding around my screen. What part of a Mac or any OS prevents an app run by a mistaken user from taking over their system? I mean, spyware and trojans and junk isn’t going to affect a properly locked-down corporate machine, but there’s nothing protecting an uninformed home user. Maybe the only answer is to have some authority who decides what is good and what is evil who will only allow you to run the potentially evil software after warning you severely. That is scary.

  • 2004-06-05 7:19 am

    Anonymous

    So what’s the lesson for today kids, besides the fact the FreeBSD is not Linux? Linux is a kernel boys and girls. That’s right! Hard as it may seem to believe, but databases, desktops, mail servers and such really aren’t Linux!

    Fair enough. If your only prepared to consider viruses/malware/vulnerabilities for Linux (the kernel), you can’t go making arguments about Windows security using anything but the NT kernel. If Linux promoters want to rabbit on about IIS vulnerabilities, Apache (and any other web server) on Linux is fair game. Same goes for IE and Open Source browsers, SQL Server and MySQL etc, Windows Explorer and KDE or Gnome, Exchange and sendmail and postfix…

    If the arguments for Apache are taken as gospel, then surely it’s right to argue that Windows Server makes the better DNS server as it’s had many fewer vulnerabilities over the last few years.

  • 2004-06-05 7:22 am

    Anonymous

    You could play the same game with windows you know.

    IE isn’t the windows kernel

    Outlook isn’t the windows kernel

    Explorer isn’t the windows kernel

    etc…

    When people refer to ‘Linux’ in this context, they usually mean Linux+stuff that at least makes it usefull like X, a desktop environment, the GNU tools, etc.

  • 2004-06-05 7:33 am

    Anonymous

    I think the difference, is that you can install linux, and do not need to install anything more..

    But you can’t install windows without Internet Explorer, or Outlook…

  • 2004-06-05 7:53 am

    Anonymous

    That article, while good, was flame bait for sure

  • 2004-06-05 7:56 am

    Anonymous

    “If your only prepared to consider viruses/malware/vulnerabilities for Linux (the kernel), you can’t go making arguments about Windows security using anything but the NT kernel.”

    Linux is only the kernel, that’s my only point.

    “If Linux promoters want to rabbit on about IIS vulnerabilities, Apache (and any other web server) on Linux is fair game.”

    Exactly the point. Compare one web server to another. Compare Apache to IIS and see what you get.

    “Same goes for IE and Open Source browsers,SQL Server and MySQL ”

    Agreed, but do be aware, that is not what was happening in this original post. A link was posted claiming to be a list of “Linux” vulnerabilities, and that list included a FreeBSD vulnerability, and FreeBSD isn’t Linux. Apps to apps comparisons are reasonable. A Connectiva vulnerability is often only a Connectiva vulnerability. The same is true of Mandrake or Gentoo. And just because that vulnerability exists in a given distro, doesn’t mean it affects everyone who uses that distro. (Yes, this is not always the case. There are exploits that affect all distros across the board) Not a one of the Gentoo vulnerabilities affect my machines, as those apps are not installed. And the Mandrake & Connectiva exploits I can completely ignore. My point is, due to the multitude of choice in Linux, the vulnerabilities often do not have the same impact on ALL users at the same time, as with other OS, because the Linux field isn’t homogenous as other OS.

    Imagine comparing exploits of say Mandrake & XP in a given year. That comparison would have to take into consideration that Mandrake has 4 CDs of apps, vs XP’s one. So of course you would expect Mandrake to actually have MORE (4 times more as a very loose ballpark figure?) vulnerabilities published in one year, if you are counting each of those apps as part of the OS.

    “surely it’s right to argue that Windows Server makes the better DNS server as it’s had many fewer vulnerabilities over the last few years.”

    Really? If sendmail has had too many published holes, I would recommend someone check out Postfix. Bind vulnerabilities too numerous? Why not maradns or djbdns?

  • 2004-06-05 7:58 am

    Anonymous

    >You could play the same game with windows you know.

    No you cannot, you can run Linux without kde/ mailman etc.

    You cannot run Windows witout explorer or ie.

  • 2004-06-05 8:00 am

    Anonymous

    “You could play the same game with windows you know.”

    Really? Please name the web server, database and mail server that are included on the XP install CD then.

  • 2004-06-05 8:16 am

    Anonymous

    What makes an OS? Thats basically changed over the years, i get windows media encoder for free .. and video serving is quite a well used feature. Id argue that these days the operating system is a LOT more than it used to be.

    If i want to enjoy my windows experience id use

    Media encoders and streaming services,

    Email, Web client AND server, messenger client, ftp server, vpn, .. well basically where does it end?

    From the users point of view, all these are fundamental parts of the operating system (buy osx cause of itunes etc). With a few more web standards the new definition of an operating system will include internet server functionality as it almost does now. Who uses linux macosx or windows WITHOUT the internet? When u buy an OS how important is it that it comes with internet server applications? Its pretty fundamental these days.

    Apple has the resonsibility to its users of the security of all the code in its normal use. A secure operating system isnt much use if not connected to the internet.

    Ms has to make sure each of its server and client solutions arent vunrable, apple, linux, sun have the same responsibilites.

    The prob my friend had with his mac was the sound card driver (internal apple sound card) would crash when the power saving cut in, either stopping sound completely or locking his computer into a hard lock.

    Everything has problems, nothing is secure.

  • 2004-06-05 9:56 am

    Anonymous

    i want a Windows that i can live without this crap explorer.

    where i can get it?

  • 2004-06-05 10:03 am

    Anonymous

    You can run windows without explorer and internet explorer. Just because Microsoft says that you have to run them, doesn’t mean that it’s true. Look at people running litestep (or whatever is popular nowadays) and firefox.

    Windows can be really secure, if you know what you are doing. However, I find Mac OS X to be much more secure by default, which is what matters when you are talking to not so experienced computer users. I am an OS X user myself, but I don’t dislike Windows. I just like the way OS X does stuff alot better.

  • 2004-06-05 11:05 am

    Anonymous

    Some things are much more secure than others, and some things have much less problems than others, it’s the way life work.

    Most Windows users think that problems (error messages, .dll conflicts, registrery corruption ect.) are a normal part of computing. A real problem for them would be a hd crash or motherboard failure. If you ask them if they have problems with their computers they’ll say no at first. If you dig a little deeper that they had tons of problems over the years, but think it’s their fault and/or that this is a normal part of computing.

    Now Mac users can behave much the same way in surface…Mac users will brag that they don’t have problems with their machines but it’s a way to say “almost no problems”. Once a Windows user dig a little deeper, he may find that the Mac user had one problem or two so then he’ll say: “You see? Macs have problems too! ” like it was an argument in itself…

    There are much fewer bugs and problems in Mac OS X than in Windows but it’s just not easy to summarize in a few phrases.

    One thing that’s easy to summarize, Since it’s roll-out more than 3 years ago there is -ZERO- viruses reported for Mac OS X. Mac users don’t claim Mac OS X could never have any viruses, they claim there is none, wich is a fact, get over it. Anyone thinking it could degenerate from zero to anything like on Windows is delirious. Whatever you argue, at the end of the day Mac OS X is magnitudes more secure than Windows, weither it could be potentially as insecure is pretty much irrelevent until we really see a trend in Mac OS X attacks.

    There is no way a program can automaticaly launch at startup on OS X without asking the admin password first so it can install itself in the startup item folder. Coupled with the lack of a critical mass of Mac users (no it’s not about popularity, a Mac virus would have plenty of press), a Mac OS X virus wouldn’t go very far, propagation wise.

    Someone mentionned in the thread that Mac users were more likely to pirate software, which is an blatant lie. Just look at the number of all software sold each year, you’ll see that Mac OS software has a disproportionate amount of software sold. Much more than the 2 or 3% which is the share of all computer sold Apple supposedly have. This either means the Mac -installed- based is at least like 5% because Macs are used much longer, and that Mac users buy more of their software, and probably it means both.

    Do you want to know the secret of the success of the iTunes Music Store? Apple doesn’t reveal the proportion of Mac users buying music on the iTMS for “strategic” reason. These numbers would probably show that Mac users buy 25% to 50% of all the digital music sold online in the US.

    Sorry to sound elitist or something, but Mac users seem to be more honnest and that -also- explains why we are not spamming, spying and attacking each others with malware.

  • 2004-06-05 1:29 pm

    Anonymous

    For six years I’ve owned a Mac, and wasted countless hours trying to justify my choice. I’ve been called a zealot,stupid,queer,retarded,and various other names that the dark side uses to make it’s point.

    I’ve stopped defending,and am now content to observe,after winning a bet that has stood for 5 years.

    My best friend,and his crew,who are sound stage and light pros,(roadies),have been playfully digging at me since I bought a Mac,and I said once,” some day you will see the light.”, and ever since the friendly war has been on.

    Last year management replaced 5 inhouse PCs, and purchased 5 laptops,two for the leads and 3 floaters,which are all loaded with XP,and various apps related to live sound.

    They have had problems,but nothing more than they are used to. ( crash in middle of concert and 5000 people screaming threats)

    Three weeks ago, a visiting act came to the auditorium,and the sound guy had a Mac laptop with OS 10.3, and he was running the light show, a 52 channel Midas board, various hardware, Pro Tools, Final Cut Pro, Photoshop, and a number of other apps related to live recording/performing, and all at once.

    After seeing this display of stability/performance, first hand and close up, they said “screw this”, went over managements head, bought 2 brand new 17″ Mac laptops that were loaded with high priced software,2 gigs of ram, a 200 gig external HD, an analogue digital interface, some other expensive goodies,and they charged it to the company.

    Their enthusiasm and learning curve have suddenly increased,and they’re fighting to get a couple more.

    The reason was,that they are so overwhelmed by technology for the industry,that any tool at any price,that can reduce operating cost, learning time and maintainance time, improve sound quality, and have a longer life cycle, is a tool that they should have.

    (and they have the best of everything)

    Me, I get a month at a lovely secluded cabin, with a real nice fishing boat, a freezer full of shrimp and steaks, and a weekend with the manager’s sister inlaw, as a vendetta.

    (don’t know if they can pull that one off)

  • 2004-06-05 2:52 pm

    Anonymous

    You cannot run Windows witout explorer or ie.

    Sure you can, and you can also remove them. Just because uninstallers aren’t provided, doesn’t mean that it can’t be done.

  • 2004-06-05 3:00 pm

    Anonymous

    Really nice story! And not more off-topic than the discussion above. The point of John Gruber is that it’s somewhat pointless to argue about why Windows users are facing crapware and security problems and Mac users don’t. At the end, facts are facts. And it wasn’t the Mac users who faced Sasser, Netsky, dialers, spyware and the like. As long as things stay like that, the “why?” is completely irrelevant…

    As I always say: Everybody uses the OS he deserves.

    Nice holidays!

  • 2004-06-05 3:01 pm

    Anonymous

    I think the author miss one important issue. It’s compatibility.

    One of the problem that goes related to market-share problem is the compatibility, both software and hardware. I think MS have the responesibility to get most hardwares to be working well in Windows, and that’s something Mac does not have. The thruth is, if there is no windows, AMD&Intel wouldn’t compete, nVidia&ATI wouldn’t compete. And we probably still stuck in the 3D voodoo day, where DirectX5 still compete with OpenGL. Oh wait, may be there would be no OpenGL either. So, Mac today wouldn’t benefit from today latest and greatest Video Card. Just like Mac, Microsoft try to get their Windows to be backward compatible w/ the old software(both microsoft & 3rd party). except their list is bigger. And take more time, more resource to be taken care of. And therefore, more loophole. The most interesting thing about security is, it’s all comedown to user awareness. Yes, Windows have more $hitware, but it also got software to taken care of that.(the last time I run both spybot & Adaware, I have none of the $hitware, about 3month after I previously ran them) Not to mention the reason those $hitware are on the user computer in the firstplace is because user gave their right to do so, even as admin most of the time. Of cause, many don’t think about that. Even if Mac have less than 10% of marketshare, but all their user do install the $hitware themself, then who is it to blame.

  • 2004-06-05 3:11 pm

    Anonymous

    “Sure you can, and you can also remove them. Just because uninstallers aren’t provided, doesn’t mean that it can’t be done.”

    But how many people do that, given that uninstallers aren’t provided. With Linux there are users who:

    1. Run KDE, but not Gnome.

    2. Run Gnome, but not KDE.

    3. Run neither KDE or GNOME.

    4. Won’t have X installed at all, particularly on servers, so have no GUI.

    Those in group #1 won’t be affected by Gnome exploits.

    Those in group #2 won’t be affected by KDE exploits.

    Those in group #3 won’t be affected by KDE or GNOME exploits.

    Those in group #4 won’t be affected by KDE, GNOME or X expoits.

    Whereas, with Windows, if an exploit is discovered in explorer.exe, an overwhelming majority of users WILL be affected by that exploit.

  • 2004-06-05 3:18 pm

    Anonymous

    In 2001 Apple had the courage to introduce a OS that was not downward compatible, the last few years have shown that MS should do the same.

    Those 90% really deserve real security, not something flawn.

  • 2004-06-05 3:19 pm

    Anonymous

    Windows is attacked waaaaaaay more than other platforms mainly because there’s a of people out there that hates Microsoft and Bill Gates.

  • 2004-06-05 3:22 pm

    Anonymous

    “Windows is attacked waaaaaaay more than other platforms mainly because there’s a of people out there that hates Microsoft and Bill Gates.”

    Mac is attacked way less than Windows due to a superior security model, built into the system from the ground up.

  • 2004-06-05 3:23 pm

    Anonymous

    In my previous post (http://www.osnews.com/comment.php?news_id=7272&offset=15&rows=30#24…), I forgot to mention that the stats were website defacements per webserver OS.

    Then “The Pessimist” posts some stats(?) of webserver marketshare claiming IIS is way in the lead. So I did a little research of my own… Netcraft (http://news.netcraft.com/archives/web_server_survey.html), shows the following:

    Apache – 67.05%

    Microsoft – 21.48%

    SunONE – 3.25%

    Zeus – 1.49%

    I couldn’t find any other potentially unbiased survey’s, however, there were a lot of other pages that quoted stats similar to Netcraft’s. The stats make sense. Let’s see, should I pay a ton of money for IIS and Windows 2000/2003 server, or $0 for Linux and Apache… Hmmm.

    Someone else also stated that Apple users don’t tolerate spyware and viruses. I’ll tell you what. I don’t tolerate the things on my computers! I have a Netgear wireless router protecting my home network from outside attacks, I run anti-virus software to make sure I don’t download a virus from websites. Since I have been using the Internet with computers, I have only seen one virus on my computers. Back in 1998, a virus found my wife’s computer on the net using a dialup connection. I figured out what happened, and started using firewall software directly afterwords. Nothing since then.

    I’ll tell ya what. If Mac’s had something more to offer than video editing and overpriced hardware, I might consider it. However, since I enjoy playing games, editing sound, editing graphics, working on my website… I prefer paying only around $700 to have a really fast computer to do all that.

  • 2004-06-05 3:26 pm

    Anonymous

    “Mac is attacked way less than Windows due to a superior security model, built into the system from the ground up. ”

    I didn’t mention this because this is given fact. Fact that a lot of people just refuse to believe.

    To all of you “closet” Mac users out there, you know who you are, clean your closets and come out!

    I just spent past 6+ hours fixing Trojen Horse ridden PC’s after work. How’s that for office productivity. Nuf said.

  • 2004-06-05 3:30 pm

  • 2004-06-05 3:39 pm

    Anonymous

    “Fact that a lot of people just refuse to believe.”

    <tinfoil hat> Yeah I wonder why certain interests like to trash the Unix security model as they do. </tinfoil hat>

    “To all of you “closet” Mac users out there, you know who you are, clean your closets and come out!”

    Well I don’t have a Mac, but I was VERY happy when Apple switched to a Unix-like base. Plus, they distributed all of their changes back to khtml. What’s not to like?

  • 2004-06-05 3:56 pm

    Anonymous

    “Can you imagine a new windows from scratch?”

    Are you suggesting their might be “issues” with a x.0 release?

  • 2004-06-05 3:58 pm

    Anonymous

    Since I have been made head of IT in our US operations, I have been slowly replacing the I-need-constant-attention PC’s to Macs. My next sneaky plan is to replace the again NT server with OSX Server. Hehe.

    My boss would be the last one to switch to Mac. He just cannot believe that Mac is a computer…. he watches Mac users easily doing awesome stuff from about 10 feet away…with his eyes blinking and with a blank stare. Our staff calls him the “Ultimage Closet Mac Guy” amongst themselves.

    I routinely open all of his email attachments which his XP can’t open and yet if anything goes wrong with the network or if any character in his Excel is out of wack, he automatically asks me “is it the Mac thing that’s causing problems?”

    I offered to buy him a 15″ Powerbook with my own money…and he refused!

    Yet he spends hours upon hours doing his video/music/graphics hobby at home using Windows XP and usually gives up….

    I am just waiting for one day his XP gets trojaned and loses everything…then maybe he’ll switch. I see him updating his virus thingy and patches like mad everyday.

    Well….some people just have to try to find out for themselves.

  • 2004-06-05 4:12 pm

    Anonymous

    “1. Run KDE, but not Gnome.

    2. Run Gnome, but not KDE.

    3. Run neither KDE or GNOME.

    4. Won’t have X installed at all, particularly on servers, so have no GUI.

    Those in group #1 won’t be affected by Gnome exploits.

    Those in group #2 won’t be affected by KDE exploits.

    Those in group #3 won’t be affected by KDE or GNOME exploits.

    Those in group #4 won’t be affected by KDE, GNOME or X expoits.”

    Ah, strength derived from diversity, isn’t it a beautifull thing?

  • 2004-06-05 4:26 pm

    Anonymous

    “ll tell ya what. If Mac’s had something more to offer than video editing and overpriced hardware, I might consider it. However, since I enjoy playing games, editing sound, editing graphics, working on my website… I prefer paying only around $700 to have a really fast computer to do all that.”

    Let’s get this out of the way, I am a Mac user. That said, I do not have the technical savy to tell which OSes are more secure in theory. What I care about is actual use, and OS X simly doesn’t have problems with viruses, adware, etc. Perhaps the Mac OS COULD have those problems, but it DOESN’T at this point, so I am not sure why more people do not buy low-level Macs (eMac and iBook) for uses that are not demanding of Windows-specific software.

    As to the note about paying $700 for a fast computer, look at the eMac: $799 for a fine computer (though it has a built-in monitor, so you can’t save money there or swap out). For $999 you get a great DVD burner (x10) and a few other things.

    My point: Apple needs to advertise the low end — they are great for people who need basic things (Office, web browsing, web creation with Dreamweaver, FileMaker for basic database) or great video editing, AND THEY CURRENTLY HAVE NO VIRUSES OR ADWARE PROBLEMS.

  • 2004-06-05 6:18 pm

    Anonymous

    …the worst thing about apple is its users… because they lie manipulate and crap on endlessly…

    hey you must be a mac user (^_^)

  • 2004-06-05 6:52 pm

    Anonymous

    no, i don’t want half-OS, i want full OS by meaning of the term OS. so i can not only surf, i can do surf, play games , develop applications etc.

    so u can’t run Windows w’out explorer, it’s part of OS, get it. if u remove it, u’ll lose some futures.

  • 2004-06-05 6:59 pm

    Anonymous

    So, Mac OS X is more secure than Windows. Great.

    I still believe marketshare is the main cause. I try to look at the world using pure logic. And for me, the marketshare argument represents one of the finest examples of clean logic.

    Or that, despite the Mac’s relatively small market share, a successful virus / worm / Trojan attack against Mac OS X would likely garner significantly more notoriety and fame; considering the recent publicity given to non-exploited Mac OS X vulnerabilities

    Nonsense. Would a major Mac virus hit prime-time news? No. Would a major Windows virus hit the prime time news? Yes, they do. Conclusion: If a cracker wants attention, what does he do? Choice seems simple to me.

  • 2004-06-05 7:11 pm

    Anonymous

    Something that seems to be forgotten in many of these conversations is that using firefox or mozilla on a Windows box does not protect you from all ie-based vulnerabilities. Read the fine print on the MS security advisories, and you will see that in many cases you do not have to be using ie for the vulnerability to be exploited.

  • 2004-06-05 7:49 pm

    Anonymous

    I try to look at the world using pure logic. And for me, the marketshare argument represents one of the finest examples of clean logic.

    No, it is a prime example of simple logic, logic that doesn’t take into account architectural differences, and compromises made on Microsoft’s side to ensure backwards compatibility with older software.

    Let’s not even get into their relatively low emphasis on quality control.

    If you’d spend a little more time thinking about this example of yours, then perhaps you’d at least be open to the possibility that it’s not a linear relationship — marketshare to number of vulnerabilities.

  • 2004-06-05 7:59 pm

    Anonymous

    Hey Maharadjah.

    Since you enjoy correcting the language usage of others, you should know that “PC” is not an acronym as you state.

    Here you are qouted:

    “…available to any PC user (yes, Macs are P.C’s. It’s simply an acronym for Personal Computer)”

    If you check the definition of “PC” at http://dictionary.reference.com/search?q=pc you will discover that it is an abbreviation, not an acronym.

    Now, for something related to the topic at hand. You state that UNIX has the weakness of script files wiping entire directories out. What you ignore is that:

    A) User permissions keep this from being a problem in most UNIX environments. For it to be a serious threat typically requries a root kit which is unlikely to even have an effect on properly configured systems.

    B) Windows also contains this vulnerability and they can be executed by ANY user and run as “System” unless a group policy is placed on the system to prohibit such activity.

  • 2004-06-05 8:04 pm

    Anonymous

    logic that doesn’t take into account architectural differences

    Of course I agree with you that a *nix based OS is generally more secure than a Windows OS– but I’ll keep on emphazising the fact that if Linux (for example) takes over the desktop market, we’ll see a serious increase in viruses. It might be harder to crack a *nix based system, but it isn’t impossible. And as soon as it’s done for the first time, the second time won’t be that hard anymore. Let alone the 100th time.

    But, at this moment, a *nix based system is indeed more secure, that’s a fact. Too bad the usability aspect has been negelcted for too long (it’s improving, definitely).

  • 2004-06-05 8:12 pm

    Anonymous

    Of course I agree with you that a *nix based OS is generally more secure than a Windows OS– but I’ll keep on emphazising the fact that if Linux (for example) takes over the desktop market, we’ll see a serious increase in viruses.

    I am not disagreeing that there will be a large number of new viruses for Linux, just that (for example) if Linux gains 20% market share, it’ll have less than 20% of all new viruses (I say “new viruses” so as to keep in mind that Windows viruses have been popping up for a long time, meaning that only the number of viruses created in any given year would be counted).

    It might be harder to crack a *nix based system, but it isn’t impossible.

    Again, no argument here.

    And as soon as it’s done for the first time, the second time won’t be that hard anymore. Let alone the 100th time.

    Damn, I wish I could remember where I read about that one BSD virus… it was so very long ago (pre FreeBSD, NetBSD, and OpenBSD etc.), and there haven’t been any BSD virus plagues that I’ve seen or heard of.

    But, at this moment, a *nix based system is indeed more secure, that’s a fact. Too bad the usability aspect has been negelcted for too long (it’s improving, definitely).

    Some of them are more secure, for sure, and I’d also agree that most suffer from usability issues WRT the general population, but niether that “fact,” nor the usability issues were a part of my argument.

  • 2004-06-05 8:23 pm

    Anonymous

    “Another reason that Windows users have more viruses is because they are less educated about computers and that they are cheapskates compared to Mac users”

    I will agree with you about uneducated users. However, any OS with as much market share as Windows is bound to have a large amount of uneducated users. I have a buddy of mine that has a Mac and is very, very uneducated. Its not just Windows people. The interesting thing is that many computer educated people I know tend to aviod Macs…

    Now about cheapskates using Windows, I hope you realize how stupid of a reason this is that someone uses Windows. At the time I built my system, it was nearly $2000 for everything. I could have afforded a Mac, but chose not to buy one for various reasons. Not only did I get a far bigger bang for the buck, I got a system where I dont have hardware lock in (even if I could get OS X on a non Apple machine, the EULA doesnt allow it). I also chose Windows since I am most comfortable with it, has been super reliable for me, and runs most any application that I need it too.

  • 2004-06-05 8:31 pm

    Anonymous

    Windows just is terrible and 10s of millions keep using. People keep telling Microsoft by the sales that they want a fairly good running OS with a lot of security holes.

    Microsoft is just doing their job by giving what their customers want. It’s the bad part of modern capitalism. Make a razor or a light bulb that doesn’t last and people will buy more when it stops working. It’s the same as Windows and cheapo Dell computers.

    As the great english writer Dorothy Sayers said we’ve become a throw away(junk)society.

  • 2004-06-05 9:16 pm

    Anonymous

    Please show me how to strip explorer from XP, Win2000 and Win2003, i think its a mission impossible. Explorer is a vital piece of software.

  • 2004-06-05 9:24 pm

    Anonymous

    >Here’s a billion-dollar question: Why are Windows users

    >besieged by security exploits, but Mac users are not?

    Because Windows is unsecure.

    Please make the deposite on my suisse bank. Contact me on my private e-mail for details.

  • 2004-06-05 9:48 pm

    Anonymous

    Please show me how to strip explorer from XP, Win2000 and Win2003, i think its a mission impossible.

    http://www.litepc.com/

    And that’s just an easy way to do it. You can do absolutely everyving done by this software manually, although it’ll take more time, effort and skill than most people have. I never said it would be easy, just that it’s possible.

    The linked to software makes it easy.

  • 2004-06-05 9:53 pm

    Anonymous

    “, I got a system where I dont have hardware lock in (even if I could get OS X on a non Apple machine, the EULA doesnt allow it). I also chose Windows since I am most comfortable with it, has been super reliable for me, and runs most any application that I need it too. ”

    Ok I just want to clear this up. You buy a mac its not hardware LOCK IN. It seems that way cause everyone may be using X86 and as such you have to go through the royal pain of recompiling certain apps but your certainly not stuck in it. A BIOS in X86 machine is Proprietary, macitoshes use OpenFirmware for crying out load, not to mention the PPC is well documentated. In fact Id venture to say its the OS thats the real lock in, because getting it to work on any other machine but a mac is a royal pain including other PPC ones, ALL the BSDs have a PPC port, Linux runs on PPC for crying out loud as well as some other rare oses like Morph OS if i remember correctly. So what if Windows doesnt, even if it did youd need a special mac version since all those programs were compiled on an X86 machine need to be remade for the PPC architecture.

  • 2004-06-05 10:26 pm

    Anonymous

    >http://www.litepc.com/

    So you need to buy a package then install that then strip out some stuff from a package you have payed for, and loose support to go with it, to find out it really does not work the way as i should when you strip out those things. Real Microsoft logic i have to admit it. anymore GREAT examples?

  • 2004-06-05 10:29 pm

    Anonymous

    Nonsense. Would a major Mac virus hit prime-time news? No. Would a major Windows virus hit the prime time news? Yes, they do. Conclusion: If a cracker wants attention, what does he do? Choice seems simple to me.

    Yes. It would make prime time news.

    You are seriously underestimating Apple’s position in the media. Most media outlets are very quick to point out every little insignificant problem – in contrast to rather large problems on Windows – there’s almost a strange delight in it (much like as seen in forums).

    Examples include: how articles tend to be written about small exploits (that haven’t even been exploited) in OS X with a slant like “Oh, they still haven’t fixed this”. Whereas, a Windows exploit that HAS crippled companies is often brought to light as “Well, Windows is now working on the problem so we should commend them for that.” Not to downplay security on either platform, but the point is that the media loves a good Apple “scandal”.

  • 2004-06-05 10:57 pm

    Anonymous

    Uhm– I was talking about “Prime Time News”. That doesn’t include /., OSNews.com and yer local tech forum….

    I mean TV, serious newspapers etc.

    Do I have to explain everything??

  • 2004-06-05 11:15 pm

    Anonymous

    Might as well talk about them, hmmm? Okay, let me start with the first one.

    Who here really believes if apple had 90% of the market.. and microsoft 10% .. 90% of virus’s would still be written for windows? Its jsut a stupid thought yet mac ppl want to believe it.

    *raises hand* I do. I know that if Apple had more of the market, their wouldn’t be this tremendous increase in viruses, trojans, spyware, adware, etc. The system is simply not built to make this kind of stuff easy. Sure, we can go on all day long about Windows’ market share, how Microsoft’s excuse for having so many security problems is the result of their software being so popular. But who are we kidding? Just go down the long list of exploits and problems present in Windows and tell me they’re not design flaws.

    As for OSX security .. yer its unix .. so what !!! osx isnt even a sever operating system.. its nice to pretend that u have military grade security (steve jobs lies to u once again but mac users dont take no crap right ??

    OS X isn’t Unix. It is, however, based to a large extent on FreeBSD for a lot of things. This makes it inherently more secure due to the Unix-like way of doing things. Users that don’t have administrative privs, for example, the types of permissions on files, etc. These are things that can’t do anything but help the security of the overall system. I don’t particularly care if Steve Jobs says it’s military grade or not. The military and government use Windows, so obviously their standards are pretty low. Considering OS X supports a lot of the encryption schemes the goverment likes to use, such as AES, I’d find OS X to be a more secure solution for government/military operations than Windows.

    aha mac users would pay for sp1 and sp2 and not complain.. osx updates sound familiar).. but its got all the holes unix has always had. DNS smtp etc etc But hey apples been patching them! slowly.. (doesnt this ring a bell to microsoft and sun linux and EVERY OTHER IT COMPANY)

    It depends on what SP1 and SP2 contained. I get OS X updates all the time that are absolutely free. These include bug fixes, security updates, etc. I do not mind, however, paying for new features and new functionality. These types of feature increases come with the new versions of OS X such as Jaguar, Panther, and soon to be Tiger.

    If ppl ran massive databases, and functional internet systems on apple perhaps ppl would bother attacking it. As is what would be the point the only thing u could get from a mac user is a beta copy of the next fud artical claiming stupidly and incorrectly that macs rule because of the users. Funny how even the reg admits the worst thing about apple is its users… because they lie manipulate and crap on endlessly about steve jobs distorted reality field.

    I’ve run massive databases on OS X using nice things like MySQL and PostgreSQL. I’ve also run functional Internet systems on OS X. Since it includes, or allows the installation of, industry standard daemons for running these types of software like BIND, Apache, Sendmail, etc. There are security problems with these types of software, of course, but any time you open something up to the Internet in that fashion you run the risk of being insecure. That’s why there are people who work to fix problems there. They’re still not as insecure or unstable as the Windows/Microsoft equivalents.

    By the way, what is “The reg”? I’m assuming “The Register”, which most of the time can hardly be taken as anything but satire. As far as the worst thing about Apple being its users, I’d have to disagree. For that statement to be true, the worst thing about any successful, stable software would be the community that uses and supports it. I find that a little ridiculous. Look at the average Windows user and tell me that community is something to brag about. How many Windows users even know what the registry is? And knowledge of the registry is required to even halfway know what is installed on your system.

  • 2004-06-06 5:05 am

    Anonymous

    “f my point was too obtuse to put a finer point on it its about market share. Who here really believes if apple had 90% of the market.. and microsoft 10% .. 90% of virus’s would still be written for windows?”

    You are way off base with your figures. If the market share were 50/50 most of the malware would still be written for Windows. Why? In a word, “EASY”. Any 12 year old can download what it takes to do Windows malware.

    In the cae of your 90/10 split there would still be more viruses for Windows simply because of the greater progamming skills required to write for the Linux/Unix world. MS made it so easy to do which is why it is done so often and so successfully. Almost anyone can write a virus for Windows. Far fewer can do so for Linux/Unix.

    Bill

  • 2004-06-06 6:17 am

    Anonymous

    …and that includes Roberto, who just couldn’t resist taking a potshots at “zealots”…

    If we are to follow your logic, then the best way to make Windows more secure is to increase other OSes market share, so that they become more attractive to malware writers. So, if you really are interested in security (and not just spending time and energy to defend a multibillion dollar monopoly), you should really promote OS diversity and tell people to run Linux and OS X.

    It’s quite ironic: Windows advocate defend Microsoft dismal security record by constantly repeating the market share argument, yet they spend as much energy putting down alternative OSes, whose increased use could actually help Windows security.

    So put your money where your mouth is and do your part to increase Windows security: promote Linux and OS X. Because in the end it doesn’t really matter if Windows gets more viruses because of its market share. The hard, cold facts is that, right now in the real world (as opposed to the hypothetical world in which market shares would be reversed), Windows is a lot more vulnerable than other OSes – and that has consequences for all of us.

    (By the way, I don’t believe that market share explains everything, like the fact that you can make a file executable in Windows simply through its extension. But that’s another subject entirely.)

  • 2004-06-06 7:06 am

    Anonymous

    Uhm– I was talking about “Prime Time News”. That doesn’t include /., OSNews.com and yer local tech forum….

    I mean TV, serious newspapers etc.

    Do I have to explain everything??

    Well, considering I KNEW what you meant to begin with, no explaination was needed.

    My post WAS regarding, as you put it, “Prime Time News” and “TV, serious newspapers etc.”. My only mention of forums was in a parenthetical aside.

    Maybe you need to lay off the coffee or something, Jeez.

  • 2004-06-06 7:17 am

    Anonymous

    >Dipshit.

    No need to start trowing in these kind of words, your future

    comment will be signed as spam.

    >Read my post again. I did say that it was possible to do it

    >all manually, if you fancy that.

    You cannot strip explorer from windows.

    In Linux you can REALLY decide what you need/want to install

    they only things you cannot remove is Linux itself the kernel but you can strip that also. That is the point not that there are some programs that can strip out pieces of windows ut at the same time loose complete compatability with windows.

  • 2004-06-06 1:20 pm

    Anonymous

    I am confused, what are you people talking about?

    Virus? What is virus? Oh, you mean that email attachment from fake senders I receive daily , one that says “Norton Antivirus removed infected file?”

    I guess, I should have to disable my Norton Antivirus to finally find out what are these viruses.

    Trojans- are you talking about recent movie? Haven’t seen anything from Troy on my computer. I must be stupid: I do not install KaZaa to share (wink-wink) music and porn, and do not click on URLs saying “get rich quick by installing that application.”

    Spyware- I know what it is! Yes, this is what Ad-Aware looking for. Yes, it finds lots of spyware on my disk, it calls it “tracking cookies.” Finds nothing else.

    I know a little about computers, but somehow I think that these cookies can be planted on your hard drive by any browser running on any OS.

    What, no “tracking cookies” in your MacOS? Did you look for them? Sure not!

    Hackers owning computers. Not sure how it can be done, but guess that if I *disable* automatic patching of my OS and make sure a firewall is *not enabled* on my computer I can get someone to own my computer eventually, regardless of the type of OS.

    ++++++++++++++END OF SARCASM

    By the way, I like numbers too. Here are numbers for you to think about:

    The worst Windows worm/virus managed to infect close to 10 million computers. OK, make it 25 million, why not? I am generous.

    Microsoft Windows user base is 500+ million users, many more if you consider pirated software.

    It means, the worst virus managed to infect 5% of Windows user base.

    Now, tell me that you can’t find 5% of stupid (eh, uneducated) Linux or MacOS users to become victims of spyware, adware, worms (due to not patched systems), trojans because of installing some crap, hacks and other kinds of criminal software.

    Windows is an example of when 5% means a lot. Linux and MacOS: 5% of their user base is nothing. Nothing is less interesting to criminals comparing with 25 million targets.

    As anther example: we all know how often people report VISA credit cards stolen.

    You know, in Russia there are (were) types of credit cards only working in Russia and few small parts of Europe.

    Dare to name these Russian credit cards? Dare to point to an article telling how often they are stolen and abused?

    What, no? It must mean that Russian issued credit cards only valid in Russia are inherently more secure than VISA and if they are to get world wide acceptance- will stay secure.

    Case closed.

  • 2004-06-06 2:43 pm

    Anonymous

    No need to start trowing in these kind of words, your future comment will be signed as spam.

    Sure there is, when logic fails, it’s time to have some fun.

    You cannot strip explorer from windows.

    You most certainly can, it’s just not a cakewalk the first time around. I’ll bet it would shock you to know that we can go into outer space in this day and age too…

    In Linux you can REALLY decide what you need/want to install they only things you cannot remove is Linux itself the kernel but you can strip that also.

    Mostly true. If you’re calling the entire OS “Linux,” you could always go with a different kernel, like the Hurd, or a BSD (like those waky Debian folks are doing).

    That is the point not that there are some programs that can strip out pieces of windows ut at the same time loose complete compatability with windows.

    No. The point is that you’ve closed yourslef off from options just because they’re not officially supported.

  • 2004-06-06 2:53 pm

    Anonymous

    First off I use Linux for both home and work. I was at one time what you could call a Windows fanboy believing my OS was the best thing to sliced bread. Just last year I switched to Linux after being a Windows slave since the first release of Windows. There are many reasons why I switched to Linux and one was security. At least in my opinion Linux systems will always be more secure to a Windows system unless Microsoft can make significant changes.

    I don’t believe the impact of viruses, spyware, etc have on an OS is based solely on popularity as some would claim but instead on the security policies in place for that particular OS. Windows is mostly prone to attack because of poor security due to offering a super easy to use OS and that has holes still not fixed. By default a Windows installation sets up the user as an Administrator who has total control of the system. Most common users are not I.T knowledgable and as such don’t realize how bad this is to run 24/7 as the Administrator while connected to the Net. Whether they purchase a turnkey system or do the installation themselves most users will not know to set up Limited User accounts and run from that instead of the Administrator account. I’ve seen people on Linux forums bitch because when they want to install a program and a window pops up requesting for the root (Administrator) password. I’ve seen one guy ask “I don’t want to be asked this so how do I run as root all the time?”. Of course no one answers that question knowing this person is most likely ignorant to how PC security should be. Instead Linux users try to teach such people good methods of keeping there PC or Network secure.

    Since switching to Linux I haven’t had issues with Spyware, pop ups or even viruses. As far as I was informed viruses for Linux so far were created by inhouse developers to test security policies in Linux distros. This testing proved significant differences in the way a virus would react in a particular OS. In simple terms for Linux unless the user enters the root password for the virus then the virus really can’t run. Though I still advise people to use scanners such as those from McAfee, Kaspersky or ClamAV to at least be prepared since these at least offer cross network platform scanning and adds that little extra bit of security.

    I’ve gone from years of using Windows to Linux and I’ll put my money on Linux any day. Sure I can’t use WineX to run every DirectX game I get my hands on but at least I won’t suffer continual headaches, time and financial loss with Linux as I did when using Windows. Once a user gets passed the misconception that using Linux is difficult and not all distros run everything from a Terminal then they’ll realize the freedom and security they have missed over the years. Don’t believe me then try one of the many LiveCD (demo) for distros such as SuSE Linux, Linspire, etc.

  • 2004-06-06 6:11 pm

    Anonymous

    In simple terms for Linux unless the user enters the root password for the virus then the virus really can’t run.

    This is too simple. A virus can run on Linux/UNIX, it can infect any binary application user installed himself as a non-root, it can send itself to any number of computers, and it can destroy all use data.

    And if that virus is really bad, it could try to guess root password by using any of password attacks, and it has all time it needs to do so.

    In simple terms:

    Windows users: they live in houses made from the wood. A fire destroys user property and a house.

    Linux users, good ones: they live in houses build from the steel. A fire destroys user property but leaves house intact.

    Good news for Windows users: new computers come with recovery CDs, a recovery (rebuilding empty house) takes 1-2 hours at most.

    Bad news for both Linux and Windows users: it is your property that is most valuable: your data, your files, your email. It does not matter what OS you use- user data loss is very much possible, even if you are not root (not administrator).

    That is why, if you are home user it is almost irrelevant if you run your single user computer as a root or not.

    It is relevant on multiuser computers: servers. For home users it is not.

  • 2004-06-06 8:28 pm

    Anonymous

    Wow. A man with a clue!

    I agree completely with your points, and wish that others around here would begin to realize how right you are.

  • 2004-06-06 10:09 pm

    Anonymous

    Except that file attachments in Linux are never executable by default, nor can they be made executable through their file extension. It’s a small detail, but it’s enough to make Linux significantly more secure than Windows, especially considering that most people still use Outlook Express under Windows.

    But that’s besides the point.

    Whatever justifications and rationalizations pro-MS advocates come up with, a simple truth remains: right now, in the real world, malware is a serious problem for Windows system, and a practically non-existent problem for GNU/Linux. Sure, this may change once Linux gains market share, but it’s still just conjecture: we’ll have to wait and see.

    Also, as I’ve said before, if you’re serious about Windows security and do agree that the market share argument is valid, then you should actively encourage people to switch to OS X and/or Linux. Like it or not, claiming that market share is responsible for the malware situation on Windows is in fact an argument in favor of a varied OS ecosystem.

    I have yet to see any pro-MS poster acknowledge this simple logical fact…

  • 2004-06-07 4:29 am

    Anonymous

    >There is no commercial interest in macos as a

    >spyware platform.

    >I have to say your idea of the Mac market being puny is

    >misguided. The Mac software market is considerably larger

    >than Linux in many markets…especially consumer. So the

    >Mac is the #1 alternative OS to target for crapware in my

    >opinion. Thing is, almost nobody does. Funny, isn’t it? ;)

    Misguided, perhaps, but his point that there’s no commercial interest in macos as a spyware platform is dead on. Most mass mailings, the old style snail-mail spam we put up with every day, are generally advertisers targeting the largest audience possible. Spyware and Adware is a constant issue for windows because it’s such a large market. Even if windows were as secure and non-tolerant as Macs are supposedly, if Mac had the market windows does, the advertising community would be trying every which way they could to get their ads and spyware through the cracks. Fewer, more difficult cracks, to be sure, but their determination would still be there. Where there’s a will, as they say, there’s a way. Advertisers would likely have to be more inventive, but that’s the miracle of windows. They don’t have to, it’s too easy. Why bother with Macs if Windows is so much easier? At least for the commercial driven Spy/Adware. Malicious stuff is a different story altogether.

  • 2004-06-07 12:09 pm

    Anonymous

    The Independent, a british broadsheet covered the Mac OS X Trojan devoting most of a page to it (no link as I read it in the physical paper, not all of which goes online). When windows worms come around (again and again) the most they get is a few column inches in a side bar. The reason a mac malware is news, a windows malware is the status quo.

  • 2004-06-07 1:42 pm

    Anonymous

    //3. All surveys are relative, like all porcentages and market share numbers.. Don’t take it seriusly, means nothing..//

    That statement immediately sends your opinions to the Recycle Bin.

    Surveys are pointless? What business school did you go to?

    More. On.

  • Some bad sectors cannot be repaired under windows
  • Soma не запускается windows 10
  • Solidworks для windows 7 x64
  • Solwin пасьянс скачать для windows 10
  • Solutions brother com windows скачать драйвера