Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Re: MS

Originally posted by davy the bunny
I don't think that this statement is entirely true. . . with all of the recent big name virii (nimda, Code Red and whatever that even more current was called) it was due to bad practice of users and admins not updating their software. I should just hope that we mac users are able to trust Apple a bit more than they can trust MS and that maybe we're just a little smarter than those who choose not to update. . .
In the case of the most recent major Windows virus, even some of Microsoft's own computers were affected because they had not been patched. Despite protests by Microsoft apologists, it is not as simple as applying patches as Microsoft releases them. The choice is often to apply the patch and run the risk that the patch takes your system down, or defer running the patch and run the risk that the virus takes it down.
 
Re: MS

Originally posted by davy the bunny
I don't think that this statement [about Microsoft] is entirely true. . . with all of the recent big name virii (nimda, Code Red and whatever that even more current was called) it was due to bad practice of users and admins not updating their software. I should just hope that we mac users are able to trust Apple a bit more than they can trust MS and that maybe we're just a little smarter than those who choose not to update. . .

Certainly it is not entirely true, but your statement is just as misleading.
  1. Consider that the last virus (Slammer) exploited a known vulnerability that had been patched by Microsoft in SQL server 2000 (point in your favor). However "bad practice of users and admins" is Microsoft FUD. Why? Microsoft was one of the (many) companies guilty of not applying their own patches which allowed the worm to infect. It's nearly impossible for most IT departments to keep up with the flood of patches because they introduce instability in the platform. Also consider this is Micrsoft SQL Server we're talking about, now imagine IT trying to control who opens what e-mails and what features are enabled in what e-mail readers of every notebook and desktop computer used by their employees. Hmm...
  2. Consider SQL server leaves this vulnerability (and many others) in the default install. This is common with Linux and Windows installations in which their default install in highly promiscuous. Apple's Security Update patch involves an application that is default off, and hard to turn on so most users are protected from attack even if they don't apply the patch. Note: Apple could go a bit further in terms of security in areas where they feel that the extra security causes confusion to the user (i.e. the fact that any member of the staff group can install in /Applications).
  3. Consider that Apple's core code where most of these remote and local vulnerabilities are found (Darwin/BSD/Unix apps) is open-source. Microsoft offers a highly restrictive "shared-source" license in which if you are among the lucky few who can view it, you cannot announce any vulnerabilities you find (at all), nor can you patch them and recompile on your own computers.
  4. Consider the numerous reports of various Windows IE vulnerabilities (and others) that weren't addressed for months after they were reported. Some were never addressed until the reporter went public many months later. Possibly some will never be addressed. We don't know
  5. Consider the turnaround time for the sendmail vulnerability being found to when the patch was available was one day. (Not because Apple developers are all that, and Microsoft "sux", but because the core code had already been patched by the sendmail developers and Apple simply ran ported and recompiled.)
  6. Consider in the two cases you mention (Code Red and Nimda) and the one I did (Slammer), the affected machines are Windows not Unix. That even though a Mac user (say) is immune, their internet service dropped off the planet in all three cases because of infected Windows machines clogging the bandwidth and taking down peering points across the world.
  7. Consider no administrator running a public web server can go a day without a scan occuring on their machine by Nimda or Code Red. Yet, that administrator is paying for that bandwidth (to their colocation/ISP/whatever).
  8. Consider that over a year ago, Bill Gates declared security the top priority at Microsoft. Security of Windows hasn't increased one bit (because that might mean sacrificing some of the developer-centric conveniences of the OS). Instead we've gotten by this initiative is Palladium DRM. In other words the word "security" is being co-opted to mean "security for us (and the media conglomerates), not you."

I'm not saying Microsoft "sux", I'm saying that Microsoft could do a little more to ensure their operating system (Windows) and their products (IIS, SQL Server, Outlook, Word, Excel, etc.) are a bit more secure. Whenever Microsoft had to choose between security and something else (say extensibility), security has gotten the shaft.

Critical data gets destroyed, public websites pay for others to do a distributed denial of service attack on them, internet transactions fail, websites fail or get defaced, workers site idle while their machines are being repaired, sysadmins waste time rebuilding machines, draconian IT policies hinder productivity, money is spent on worthless Virus checkers (don't believe me? When was the last virus on the Mac?). That's a lot of wasted money and serious stuff!

Until Microsoft's attitude changes, their products represent a disporportionate danger to users of its products as well as (unfortunately) any internet-connected user or internet-enabled machine. :-(

Even if I were to forswear Microsoft products (silly) and work at keeping my machines "secure" (costly), I'll still get smashed by the "second-hand smoke" coming out of less secure machines out there. Due to a quirk of licensing, the manufacturer of software not liable for things that they would be if the product wasn't software creating a negative externality in our economic system, because a developer (of an operating system, application, website, whatever) has no legal incentive to think about security (which can end up being very costly). But that doesn't mean we should blame the customer. Nor does it mean that we should allow developers to be so cavalier with our computers, our information, our livelihood.

Those of us who are Microsoft customers as well as those of us who aren't should demand better and not give into myths that the current level of viruses "simply bad practice of users or admins" or believe it when Microsoft advertises "99.999%" reliability or "security is a top concern".

Take care,

terry
 
I got the update now I can't get email!

I just installed the patch, now I'm getting I'm getting error messages stating that I can't send messages because it refused to allow a connection on port 25 and can't receive messages cause it refused to allow a connection on port 110.

Shoot, everything was working fine too. Any suggestions? Help!
 
Port 25 is SMTP (the mail-sending port) and port 110 is POP (mail receiving). What are your settings in the mail app you're using re servers? If you're using an external (ISP) server then patching sendmail shouldn't change how this works.
 
MS

to MisterMe:
I am definitely not a MS apologist if that's what you were trying to say and yes you do run the risk of something going wrong by installing a patch, that's part of what I was saying when I said that we could trust Apple a little more. So I definitely see your point, but I still think that end users don't care enough about their computers.

to tchay:
Well illustrated, my statement may have been somewhat misleading because you are definitely right about the risk of installing the patches and something going wrong. Instead I'll say that, in my experience with Windows Computers, if one takes enough time to learn about their system [to turn off things that may be harmful] and run regular maintenance [to check for virii] and not double-click on everything that they see then maybe you'll be as lucky as I have been up to this point and not have your system directly affected by any of these kinds of issues. But again, I'll qualify this by saying that this is only in my experience. . .
 
Wierd, it works now...

Must have been something wrong with the the ISP servers at adelphia. This happened before, but it's weird how it happened coincidentally after I had installed the security update.
 
If you you turned on WebDAV or other modules in Apache by modifying your httpd.conf file, this update will save your modified version as httpd.conf.applesaved and create a new one for you.

You will need to move the edits into the new file to re-establish your Apache modules.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.