To: driftdiver
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.
"Show me just what Mohammed brought that was new, and there you will find things only evil and inhuman, such as his command to spread by the sword the faith he preached." - Manuel II Palelologus
2 posted on
12/06/2007 10:02:07 AM PST by
goldstategop
(In Memory Of A Dearly Beloved Friend Who Lives In My Heart Forever)
To: goldstategop
“The very architecture of UNIX makes it impossible for malware to run without user permission being granted.”
You mean there’s no such thing as a root exploit, or a buffer overrun that assumes priviledges? Unix is unhackable?
8 posted on
12/06/2007 10:05:53 AM PST by
brownsfan
(America has "jumped the shark")
To: goldstategop
“The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows.”
And people are usually the weakest part of any security program. This is gonna be fun to watch as long as you don’t own a mac.
Apple has been quietly issuing security fixes. Last one I saw included about 35 patches. Many are browser, video, or audio related.
To: goldstategop
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted. "Impossible" is a very big word -- and a serious lure to hackers.
There are certainly ways to get around the issue -- for example, by cleverly hacking into or mimicking software that does have permission to run.
The point being -- you'll be saying "impossible" until your machine gets eaten.
24 posted on
12/06/2007 10:18:21 AM PST by
r9etb
To: goldstategop
Still not a threat. The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows. No just plain text files which I actually love.
62 posted on
12/06/2007 10:57:38 AM PST by
Lx
((Do you like it, do you like it. Scott? I call it Mr. and Mrs. Tennerman chili.))
To: goldstategop
The very architecture of UNIX makes it impossible for malware to run without user permission being granted. So the administrators of the minicomputers infected with the Morris worm gave it permission to run?
95 posted on
12/06/2007 12:50:28 PM PST by
whd23
To: goldstategop
The very architecture of UNIX makes it impossible for malware to run without user permission being granted.And there is no registry to write to, unlike in Windows. Not only is OS X Unix;
it is based on BSD Unix which was built to be hack proof
starting in the late '70s under a DARPA(DOD) contract.
112 posted on
12/06/2007 5:12:00 PM PST by
Uri’el-2012
(you shall know that I, YHvH, your Savior, and your Redeemer, am the Elohim of Ya'aqob. Isaiah 60:16)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson