Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Same reason theres antivirus software for Macs.

I assume by that answer you mean, to detect windows based malware. And yes, that command does (or did) have that ability. But before Windows became popular, business *nix OS's were the main target and unlike what you stated, had virus problems.

Yes, certainly not as bad as Windows has the problem, but that is the price you pay for being >90% of the PC marketshare and it isn't the point either. You claimed *nix has no viruses or is immune to viruses. Untrue.
 
The graphs are biased in that the data presented only shows a small subset of the type of infections that target Windows systems to make it appear like MS has made big impact on malware infecting the platform. This is not a "huge difference" in concerns to the bigger picture.

This type of malware would have never been such as big issue if MS would have used a better default implementation of discretionary access controls in Windows XP in the first place.

So, are we really going to give MS props for fixing an issue that could have been mostly prevented prior to the release of Windows XP?

Yeah, we are. Because in two-thousand and one, the internet was still in its infancy, and you could download programs like dreamweaver off of someone's personal website - complete with a crack - as a zip file. Additionally, auto-run for USB was a continuation of auto-run for CD, which didn't have that problem when Windows 98 came out, because CD burners didn't exist and auto-run could only be taken advantage of by large corporations. Notice how the floppy disk/LS-120 drive doesn't have autorun?

So actually, lets commend Microsoft for being forward thinking enough to include auto-run for USB, and for altering the functionality of the OS 11 years after it shipped, without claiming a Sarbanes-Oxley upgrade "fee" is necessary.
 
So, are we really going to give MS props for fixing an issue that could have been mostly prevented prior to the release of Windows XP?
I'd like to see Apple deal with Window's major malware problems. In fact, I'd like to see any other software company deal with it. Never before Windows has an OS had so much malware, simply due to the fact that none other OS has been anywhere near the popularity and usage of Windows. The fact that Microsoft are not just turning a blind eye and leaving it to Anti-Virus software vendors is brilliant. At least Microsoft update and fix their old products unlike Apple.

Take a look at Apple at the moment. They're struggling to keep one bogus bit of software out of OS X systems. I think that Microsoft are doing a better job in terms of malware prevention at the moment. Not that Apple needs to do anywhere near the amount of work Microsoft need to, but that MacDefender should have been squashed like a bug months ago; and yet it still surfaces today.
 
I'd like to see Apple deal with Window's major malware problems. In

I think MS does deserve some kudos on handling malware. Its been a rough road where the had a number of missteps in handling security. I think they have a good process in place and can only be good for consumers.

As for apple, there secretive, closed mouth corporate culture flies in the face of what many security analysts call for - complete transparency. Just look at how they handled the MacDefender issue.

As an owner of Macs, I'd like to see apple being a little more upfront when malware starts infecting Macs.
 
I'd like to see Apple deal with Window's major malware problems.

That wouldn't have been possible in the first place.
Never before Windows has an OS had so much malware, simply due to the fact that none other OS has been anywhere near the popularity and usage of Windows.

It's also due to horrible design and extreme negligence by MS.

For example, Before 03-04, MS had no such thing as user-permission prompts (among other missing security features.) Windows XP shipped with FIVE open ports. And this was in 2001! Can you believe that? XP shipped insecure by default in an environment that was already teeming with Windows viruses. MS really had no viable, effective concept of security in any of its operating systems until Vista. Which finally caught Windows up to where everyone else had been for years.
 
Last edited:
Yeah, we are...

Malware that can be prevented with a better default implementation of DAC shouldn't occur in the first place. It's not like knowledge of how to do so was not available at the time Windows XP was released.

Notice how the floppy disk/LS-120 drive doesn't have autorun?

Notice how Windows still has tons of malware issues even with a vector related to autorun being eliminated?

So actually, lets commend Microsoft for being forward thinking enough to include auto-run for USB, and for altering the functionality of the OS 11 years after it shipped

Wow, it only took 10 years!

In fact, I'd like to see any other software company deal with it.

Most other OSs dealt with the issue over ten years ago by having a better default implementation of DAC.

Never before Windows has an OS had so much malware, simply due to the fact that none other OS has been anywhere near the popularity and usage of Windows.

If you look at examples such as Apache and MS IIS, the examples show that malware incidence rates are a function of both target softness and market share. But, the examples also show that target softness is the more determining factor.

Take a look at Apple at the moment. They're struggling to keep one bogus bit of software out of OS X systems.

Struggling is relative in this case because Windows is more plagued by rogue AV malware, such as FakePAV, than OS X. FakePAV damages a Windows installation much more than MACDefender does to OS X.

Regardless, the most touted security feature, UAC, of post XP Windows OSs has not shown itself to be very robust.

Within the list of public and unpatched zero-days linked below, there is an example of a "win32k.sys" vulnerability that could potentially be exploited to bypass UAC. It has been known for 318 days and counting.

http://www.vupen.com/english/zerodays/

Below is a guide to help turn that vulnerability into an exploit.

http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/

This following link shows all the "win32k.sys" vulnerabilities that have been found so far in just this year.

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k+2011

The following link leads to another thread about a UAC bypass vulnerability.

https://forums.macrumors.com/posts/12825218/
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.