Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: NVDave

Heh... have to agree with you! Have had to maintain both Windows and Unix systems and I certainty agree with you, Unix systems can be hell! Never had so many silly problems with just printing! Oh well...

With that said... the latest versions of Unix or Linux or whatever you want to use... have similar interfaces as Windows. When they get to the same...look out, you can’t beat a free user programmed OS.

Yes...heh, they really do have to do away with the awful requirements of a Unix professional just to keep things going - after all, in today’s world, every teenager should be able to maintain a system! Unix is not ready for that yet but it is getting there... Windows is there now...


19 posted on 08/05/2010 12:34:32 AM PDT by Deagle
[ Post Reply | Private Reply | To 17 | View Replies ]


To: Deagle

A really secure OS and working environment will require someone manage it. There’s no way around this.

The reason why is that the OS, applications, etc can’t do anything more than give you tools to implement your security model. There’s no way you can automate the creation and maintenance of your security model on a computer.

I’ll give an example: Let’s say we work together on some project. Doesn’t matter what. Let’s say you’re my boss, and you’re a member of the design/review team of some classified product or something where we don’t want everyone in the company seeing what we’re working on.

OK, we need to set up a group for all the members of the project group, so that all members of the group can read/write the files. Let’s say that someone high up in marketing wants to be able to read the files, but we don’t want to allow him to make changes. Well, we now need to have read/write/modify privs for every member of the group, and he doesn’t get write/modify privs.

You, as a manager, need to be able to see management stuff, performance reviews, etc - so those files and programs need another security ID that the workers bees don’t have.

With this trivial example, you see why security will never be something that can be delivered as a turn-key solution, no matter the OS. Both Windows and Unix can do what needs to be done in the example above, with very similar concepts, but someone needs to implement this security model using the tools provided by the OS. The difference is that so many Windows systems run with the user as an Administrator to make sure everything “just works” and with all users as “administrator” they can get around much of the security - and running as Administrator means that any exploit code given to them runs with full access to everything. In Unix, most of the time I’m running as a plain user, and when I need root access, I “su” or “sudo” to perform what needs doing.

Most of the exploits on Windows would be stopped or mitigated if the Windows security model would be set up by more people to eliminate users running as Administrator. Microsoft could help out a lot here too, if they’d make it more difficult (or annoying) for users to run as Administrator by default.

When it comes to vulnerabilities and exploits, I view many of these as a software reliability issue. The #1 issue that I’d change if I had a magic wand to wave over the US software industry to improve s/w reliability (and therefore reduce security exploits) is to banish C, C#, C++, etc from the software industry and require a language like Ada be used. In the old days, we had a saying that expressed how we felt about software reliability from various programming languages:

“C is a language for consenting adults, Pascal is a language for children and Ada is a language for hardened criminals.”

In today’s computing environment, there’s lots of for-real criminals with for-real criminal gangs behind them. If we really want reliable software, we need to ditch the “hippy languages[1]” of the late 60’s and early 70’s and start using modern languages with very tight and explicit specification requirements.

What the US needs now is a model OS written in Ada, with the source code available to all comers. Just put it out there as a easily licensed product of the US government, much as TCP/IP started in the 80’s.

[1] I call C/C#/C++/etc “hippy languages” for their lack of enforcing discipline on the programmer. Want to use an array name as a pointer? “Do it if it feels good, man!” Want to cast a number into a pointer? Groovy, baby. Both Unix and Windows fail in this aspect. VMS (the older VMS, before OpenVMS) was written in a proprietary language called “Bliss-32” which was more explicit about what was happening to pointers. The most secure OS I’ve known of, Multics, was written in IBM’s PL/I, which was a powerful language which was around before Ada, but PL/I had the type, bounds and other checking that I associate with software reliability.


22 posted on 08/05/2010 1:14:15 AM PDT by NVDave
[ Post Reply | Private Reply | To 19 | View Replies ]

To: Deagle
Yes...heh, they really do have to do away with the awful requirements of a Unix professional just to keep things going - after all, in today’s world, every teenager should be able to maintain a system! Unix is not ready for that yet but it is getting there... Windows is there now...

I guess that's why my wife is called on often to support (fix) four or five friends' Windows machines. But I agree that Windows is WAY above 1980s Unix (can't speak to anything post-90s).

41 posted on 08/05/2010 6:49:57 AM PDT by sionnsar (IranAzadi|5yst3m 0wn3d-it's N0t Y0ur5:SONY|TV--it's NOT news you can trust)
[ Post Reply | Private Reply | To 19 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson