Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: driftdiver
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.

"Show me just what Mohammed brought that was new, and there you will find things only evil and inhuman, such as his command to spread by the sword the faith he preached." - Manuel II Palelologus

2 posted on 12/06/2007 10:02:07 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: goldstategop

“The very architecture of UNIX makes it impossible for malware to run without user permission being granted.”

You mean there’s no such thing as a root exploit, or a buffer overrun that assumes priviledges? Unix is unhackable?


8 posted on 12/06/2007 10:05:53 AM PST by brownsfan (America has "jumped the shark")
[ Post Reply | Private Reply | To 2 | View Replies ]

To: goldstategop

“The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.”

And people are usually the weakest part of any security program. This is gonna be fun to watch as long as you don’t own a mac.

Apple has been quietly issuing security fixes. Last one I saw included about 35 patches. Many are browser, video, or audio related.


9 posted on 12/06/2007 10:06:02 AM PST by driftdiver
[ Post Reply | Private Reply | To 2 | View Replies ]

To: goldstategop
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted.

"Impossible" is a very big word -- and a serious lure to hackers.

There are certainly ways to get around the issue -- for example, by cleverly hacking into or mimicking software that does have permission to run.

The point being -- you'll be saying "impossible" until your machine gets eaten.

24 posted on 12/06/2007 10:18:21 AM PST by r9etb
[ Post Reply | Private Reply | To 2 | View Replies ]

To: goldstategop
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.

No just plain text files which I actually love.

62 posted on 12/06/2007 10:57:38 AM PST by Lx ((Do you like it, do you like it. Scott? I call it Mr. and Mrs. Tennerman chili.))
[ Post Reply | Private Reply | To 2 | View Replies ]

To: goldstategop
The very architecture of UNIX makes it impossible for malware to run without user permission being granted.

So the administrators of the minicomputers infected with the Morris worm gave it permission to run?

95 posted on 12/06/2007 12:50:28 PM PST by whd23
[ Post Reply | Private Reply | To 2 | View Replies ]

To: goldstategop
The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.

Not only is OS X Unix;
it is based on BSD Unix which was built to be hack proof
starting in the late '70s under a DARPA(DOD) contract.

112 posted on 12/06/2007 5:12:00 PM PST by Uri’el-2012 (you shall know that I, YHvH, your Savior, and your Redeemer, am the Elohim of Ya'aqob. Isaiah 60:16)
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson