Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Why Linux Will Never Suffer From Viruses Like Windows
Hot Hardware ^ | 4 September 2012 | Jesse Litton

Posted on 09/05/2012 12:51:34 PM PDT by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-24 next last

1 posted on 09/05/2012 12:51:39 PM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; stylin_geek; ...

2 posted on 09/05/2012 12:52:19 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
only as long as they allow anyone to write un-sandboxed software for it.

:(){ :|:& };:
is NOT recommended to be run as root in a bash shell. ;)

/johnny

3 posted on 09/05/2012 12:56:25 PM PDT by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bwahhahahhaaa

yeah right, nothing is 100% unless its turned off


4 posted on 09/05/2012 12:58:09 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Sometimes reading FR is slacking off and sometimes it is a productive use of time. This time it is the latter.

Thanks.


5 posted on 09/05/2012 1:01:50 PM PDT by cicero2k
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I think a large part if it is the technical abilities of the typical user of windows vs linux. The test will be how Mac fairs in the next few years because I’ve not met many windows users who can change looking seriously at windows 2012.


6 posted on 09/05/2012 1:03:17 PM PDT by DonaldC (A nation cannot stand in the absence of religious principle.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver
Of course, the article never claimed that Linux was 100% immune.

But you knew that, right?

7 posted on 09/05/2012 1:10:01 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

bump


8 posted on 09/05/2012 1:13:00 PM PDT by GeronL (The Right to Life came before the Right to Pursue Happiness)
[ Post Reply | Private Reply | To 2 | View Replies]

To: GeronL

ping


9 posted on 09/05/2012 1:16:29 PM PDT by QBFimi (When gunpowder speaks, beasts listen.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: GeronL

Yup not even virus writers support IX..... ;)


10 posted on 09/05/2012 1:16:32 PM PDT by Bidimus1
[ Post Reply | Private Reply | To 8 | View Replies]

To: GeronL

Yup not even virus writers support IX..... ;)


11 posted on 09/05/2012 1:16:34 PM PDT by Bidimus1
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce

Yes, that was my point. You’re right the author doesn’t overstate the strength of Linux but many people do. In all fairness its not usually linux that gets hacked, but the installed software.

We just had a client who had one of their linux web server hacked (Ubuntu) through installed software. It appeared to be a completely scripted hack but opened up some serious issues. Intruder installed a phishing site on their server and leveraged access to the DB server through Mysql. The DB server gave them complete access to the corporate network.


12 posted on 09/05/2012 1:23:22 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: driftdiver
Yup. Security is never "just install this OS and all your probelms are solved."

It's an attitude and a process.

13 posted on 09/05/2012 1:25:46 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 12 | View Replies]

To: ShadowAce

3. Because the penguin does not have near as long an enemies list as Bill Gates does


14 posted on 09/05/2012 1:27:44 PM PDT by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: driftdiver

“yeah right, nothing is 100% unless its turned off”

No guarantees on that, either. Ever heard of a ‘Wake-on-LAN-ping’?


15 posted on 09/05/2012 1:36:37 PM PDT by MeganC (The Cinemark theatre in Aurora, CO is a 'Gun Free Zone'. Spread the word.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

Open source is much over-rated when it comes to protection from exploits.

In fact, in many cases it makes exploits easier.

There are any number of open source projects in wide use that are frequent targets of hacks.


16 posted on 09/05/2012 1:50:48 PM PDT by Zeppo ("Happy Pony is on - and I'm NOT missing Happy Pony")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Yup. Security is never “just install this OS and all your probelms are solved.”

It’s an attitude and a process.

________

I ran a super secure computer system for over 20 years and it is still in service even though hardware support is now very difficult to come by. Why is it still in service? It has a 100% record of never being hacked and has never failed for any mission it was assigned to. Mind you it came close a couple of times but still managed to carry through to the end.

It also has ZERO connection to the outside world. No internet access whatsoever. Today that really is the only way a computer system will be hacker-proof.


17 posted on 09/05/2012 1:58:19 PM PDT by The Working Man
[ Post Reply | Private Reply | To 13 | View Replies]

To: MeganC; driftdiver

driftdiver: “yeah right, nothing is 100% unless its turned off”

MeganC: No guarantees on that, either. Ever heard of a ‘Wake-on-LAN-ping’?

I was once a sysadmin. In that past life I said “turned off” along with ALL wires disconnected. A sledge hammer also helps improve security, but the bosses wouldn’t let me.


18 posted on 09/05/2012 2:29:17 PM PDT by Peet (Everything has an end -- only the sausage has two.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Peet

Turn Vlad The Impaler loose on the writers of malicious code.

Until the penalties for doing this trash catch up with their consequences thing will stay the same.

BTW, as the man said, NOTHING is completely secure.


19 posted on 09/05/2012 4:55:18 PM PDT by BwanaNdege (Man has often lost his way, but modern man has lost his address - Gilbert K. Chesterton)
[ Post Reply | Private Reply | To 18 | View Replies]

To: ShadowAce

Are “permissions”, (sorry, old Unix term), used with Linux?

If so, would you please discuss their significance to the security of a system?


20 posted on 09/05/2012 8:46:38 PM PDT by Graewoulf ((Traitor John Roberts' Obama"care" violates Sherman Anti-Trust Law, AND the U.S. Constitution.))
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson