No reason to make that correlation. Mac OS X != Linux.Supposedly the first Linux botnet already exists, so the first Mac botnet can't be far away.
No reason to make that correlation. Mac OS X != Linux.Supposedly the first Linux botnet already exists, so the first Mac botnet can't be far away.
Filevault doesn't do anything against hacking. It just encrypts your home directory when you are not logged in. So if someone stole your laptop when it was shut down they couldn't get your encrypted files. If someone hacked into your system while you are logged in, your files are all unencrypted and easily copied or opened.
It hasn't been an issue for nearly nine years.
No reason to make that correlation. Mac OS X != Linux.
Just a quick look at your computer management console, users and groups on windows would be enough...
Why do you need so many user groups or SUPPORT_bla.bla accounts?![]()
If your on snow leopard, do a get info on the main drive the OS is on. Take a look at the permissions groups. See anything funny in there? Try deleting it. You can't. BACK DOOR!
Precisley. Safari is neither OS X, nor is it embedded into OS X. Furthermore, one reason most financial institutions run *NIX based systems and servers is for the unmitigated security. The overriding reason for the proliferation of +millions of viruses in the wild is that with Windows, it's actually been possible to hack, compromise, and write self-replicating viruses for. Back in the nineties, while the previous Mac OS held only 4-9% market share, there were 20,000 viruses in the wild, capable of compromising the system - so much for the security through obscurity myth.Yes I read it.
All I saw was one claim. But how many hacks of real world UNIX/Linux/BSD based systems have we seen. As I have previously said, most of the worlds webservers (well over 80%) run some kind of *NIX based system, servers are where the big money really is, and yet it is Windows PCs that get hacked...
Why? Because they are easier to hack.
And I'm aware that he hacked the mac first 2 years running at hack to own. However he didn't hack OS X, he hacked Safari, which like most browsers is a weak link. However unlike Windows, the browser is a separate entity from the OS, so a critical weakness can be avoided by using a different browser (eg FireFox). In Windows, because IE is embedded into Windows Explorer (the shell of the OS), any browser security issues are a potentially much greater flaw.
Wow, Snow Leopard doesn't do good Address Space Layout Randomization. Big f*cking deal. If you authenticate and install some malware kext (for example), that won't save you anyway.
Macmel I enjoyed your post and arguments very much, right up to the point you started quoting vulnerabilities without reference.
You claim that IIS has had no RCE vulnerabilities - so what is CVE-2009-3023 ? Its an RCE vulnerability from this year in the IIS FTP server component.
CVE-2008-0075 is another RCE, and since 2006 there have been 12 vulnerabilities in IIS and related components that are rated HIGH.
I saw no relevance going back more than three years, but I also have to say that I am trying to be even handed here.
Over the same period there have been 24 Apache vulnerabilities rated as HIGH. So I make that twice as many.
These are all ratifiable from: http://web.nvd.nist.gov/view/vuln/search?execution=e2s1
And why, do you suppose, that it has been both "the natural" and "the successful" target, amongst the fairly large share of UNIX servers around the globe?The guy actually has arguments. Where are yours? I am actually beginning to think that actually Windows is safer. It's just the natural target.
If you don't frequent porn, gambling or hacker sites, you only install software from legitimate, reputable sources, you think twice before entering your administrator password and you use your Mac like the vast majority of users, your chances of being hacked or installing a trojan are slim to none.
And why, do you suppose, that it has been both "the natural" and "the successful" target, amongst the fairly large share of UNIX servers around the globe?
That means that if you're part of the NSA or whatever ABC agency MS caters to for it, you get full access to every file and encryption key stored on every PC connected to the internet. This probably includes cluster servers, MS based NAS, or even data-center systems and resources. It for sure includes all MS based SOHO systems.
Anyone cares to respond to the Microsoft guy I pasted on my post instead of repeating that "if there are no viruses is because is better"? Does anyone actually believe that if anyone gave away $1000000 for a Mac virus in a contest, it would take more than one day for someone to get the money (same for Windows)?
The guy actually has arguments. Where are yours? I am actually beginning to think that actually Windows is safer. It's just the natural target.
It's interesting that you post an exchange between two anonymous people discussing their views on certain aspects of security in each OS... But what bit exactly do you expect anyone to reply to? It's a conversation between two people, half the time arguing about incorrect terminology and the other half correcting the misunderstood aspects of OS operations in the specific context of the conversation.
Edit: Why are you talking about a $1,000,000? DO you have a $1,000,000 to put up to prove your point? No? So why are you telling me it'd "only take a day" as if you've done the experiment? YOU ARE SPECULATING about something that hasn't happened in the real world, please don't try and form your argument around it.
Sorry to burst your bubble, but this isn't comprehensive conclusive PROOF of anything. Proof is the documentation of irrefutable facts.
Macmel, maybe I am confused in the quoting and responding you did... did you write this?
"IIS had 8 vulnerabilities since 2003, ZERO of which were rated "highly" or "extremely" critical, and only four rated at "moderate" which means they're at worst DoS attacks, all of which were in optional off-by-default components.
Apache has had 26 in the same time period, including 2 "highly critical" (remote code execution) and 10 "moderate" vulnerabilities.
How do you explain that? Not a SINGLE reported remote code execution vulnerability against IIS. Not even one. In 6+ years. Seriously, how are you arguing against that?
American Express is using IIS on at least three of their websites:
http://searchdns.netcraft.com/?posit...canexpress.com
Although those are just public facing sites. Their on-premise extranets are much more likely to be IIS.
Intel and AMD both use IIS:
http://searchdns.netcraft.com/?posit...host=intel.com
http://searchdns.netcraft.com/?restr...sition=limited
Look at the top uptimes for webservers tracked by netcraft:
http://uptime.netcraft.com/up/today/top.avg.html
Out of the top 50, only ONE is running Apache! All of the rest are Windows Servers!"
That what I took issue with, the unreferenced and untrue statements about the IIS vulnerabilities - if you were quoting someone else then my issue is with him/her.
Stu
It's interesting that you post an exchange between two anonymous people discussing their views on certain aspects of security in each OS... But what bit exactly do you expect anyone to reply to? It's a conversation between two people, half the time arguing about incorrect terminology and the other half correcting the misunderstood aspects of OS operations in the specific context of the conversation.
Edit: Why are you talking about a $1,000,000? DO you have a $1,000,000 to put up to prove your point? No? So why are you telling me it'd "only take a day" as if you've done the experiment? YOU ARE SPECULATING about something that hasn't happened in the real world, please don't try and form your argument around it.
Sorry to burst your bubble, but this isn't comprehensive conclusive PROOF of anything. Proof is the documentation of irrefutable facts.
-Applications on OS X frequently requires root privileges in order to install (like, say, Firefox, VMWare, Quicksilver, etc). In fact, one big gap in the OS X security model is that every installation asks the user for their password without a Secure Attention Sequence, meaning that it's trivial to steal a Mac user's password.
It is a conversation between two guys in which one of them is explaining why the general arguments used against Microsoft are wrong.
I'm not saying is proof of anything, I'm just saying the guy is giving arguments why Windows by design is safer than OSX.
I don't know enough about computers to say it is or itsn't so. All I know is OSX doesn't have ASLR, for example, or their general lazyness to correct vulnerabilities (to the point they downgraded flash to a previous vulnerable version with the release of their latest OS and it took more than 3 weeks to solve in .1). On the Mac side, I only hear the "we don't have virus argument".
Now that you ask it, things that are mentioned in that conversation I would like to see discussed:
- The top server applications for Windows Server (IIS, SQL Server) have way, way better security track records than their Linux equivalents.
- Users do not have write access to system directories on Windows. They never did. Even Administrators don't have write access by default on Vista or Win7 without elevating.
- One of the key advantages of the registry is its security model. Users have read/write access only to their per-user hive, and have only read access to the system hive.
- Apps on Windows do not run as root. Most installers require admin privileges because this is how managed environments control who can and can't install software, and because admin privileges are required to register per-machine shared libraries, per-machine association handlers (like file extension / MIME type handlers, etc), and so on. But lots of applications can install per-user as well, or only install per-user (like Google Chrome) and don't ever require admin privileges to install.
-Applications on OS X frequently requires root privileges in order to install (like, say, Firefox, VMWare, Quicksilver, etc). In fact, one big gap in the OS X security model is that every installation asks the user for their password without a Secure Attention Sequence, meaning that it's trivial to steal a Mac user's password.
- Security on Snow Leopard is a joke. There's no ASLR, no SAS or UIPI. NX support still isn't as good as Windows. BOTH systems grant read-only access to system files by default.