Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rightwingextremist1776

What you find, in “real life” is that not all so-called “vulnerabilities” are useful for anything at all. All that may happen with many of the so-called vulnerabilities is that something does’t work and something crashes and nothing more. In other words, it simply can’t be turned into anything useful for a virus or for a hacker to gain control of your computer.

And that’s the way it turns out in “real life” — with the Macintosh computers. The viruses don’t exist for the Macintosh and hackers don’t control Macintosh computers (unless you’re handing out your passwords or making them to be “password” :-) ... ).

As far as no one coming “knocking on the door” — I’ve got several machines on their own direct outside IP addresses, hooked into the Internet 24/7 and I see lots of “hammering away” at these computers. So, it’s not for the lack of trying. It’s just that nothing happens. It may be hard to believe for some, but that’s simply the facts of the matter.

I just just looking over the logs of one of the computers this morning. I see over 17,000 attempts in just 24 hours on one machine. Some are innocuous and others are not. But, all in all — nothing happens with these Macintosh computers and they are about as secure as one could ever wish it to be in real life.

So, it’s not for the lack of trying, not for the lack of being on the Internet 24/7 — and the bottom line result is — no viruses and no hacker gaining control of my Macintosh computers. That’s from years and years of usage this way.

So, like I said — when the big security disaster happens for the Mac OS X operating system, be sure to let me know...


38 posted on 06/13/2007 4:57:54 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 35 | View Replies ]


To: Star Traveler
Look, I’m not going to argue with you on this. I just want to say this again.....If someone wanted to put the time into exploiting your system because they thought it would give them access to something of value, they would do it regardless of platform. Just because you haven’t been exploited doesn’t mean it can’t or won’t happen IF someone really wants to. I’m sure the logs on your other machines bear this out. They aren’t looking for Macs because there aren’t enough of them to matter. They are looking for Microsoft and Linux platforms because there are more of them to exploit AND there are more exploits to choose from.
My argument isn’t which is the better platform. All I’m saying is don’t be fooled by a false sense of security...that’s all.

Don’t put so much faith in your platform.

39 posted on 06/13/2007 5:10:28 PM PDT by rightwingextremist1776
[ Post Reply | Private Reply | To 38 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson