There is currently no way to remotely infect (a destructive, spreading virus - again, not a trojan) even a vanilla OS X installation. This has been the case for OS X's entire existence, and has always been the case for xNIX systems.
Wow. You *have* to be joking.
It has nothing to do with popularity, but how NT was designed fundamentally. YOu may know this but not many do. So many useless services running in the background (which M$) has gotten better at correcting but it still isn't eliminated.
Rubbish. Don't attack other people's understanding when your own is so bad.
There is no difference between UNIX and NT in terms of "fundamental" design with regards to background processes (or "services", if you prefer) running.
The history of UNIX is *littered* with background "services" being exploited, due to their poor design and poor coding. One could make an argument that NT should have learned from those mistakes rather than making its own, but any suggestion there are "fundamental" differences is either gross ignorance or deliberate deception.
*nix at its core is designed for scalability but not so much workstation use or remote administration.
No OS "at its core" is designed for "workstation use or remote administration". These are user space level features.
I disagree. Windows is inherently less secure because of it's long history of compatability. Applications are accustomed to having open access to key directories within the operating system, such as windows, system32. It becomes difficult to control access without disabling the ability to install many (most?) apps.
This is a (trivially fixed) application issue, it has nothing to do with the OS.
Fixing it *does* break badly written applications, but it also demonstrates that the OS itself is not the problem.
On the Mac, the historic convention has been to install apps in a local directory. If apps are installed this way, they have less privilege and can cause less damage.
Where applications are installed is (largely) irrelevant to the privileges they run with. Added to which, UNIX has a fundamentally insecure concept - SUID root - that genuinely does allow any application open slather to the system, regardless of what user runs it (the Classic environment - and by extension any Classic apps - do this).
Also interesting that apparently "historic convention" on the Mac apparently only started in 2000 with OS X, yet apparently for Windows we must go back to the days of Windows 9x, if not 3.x.
I'm willing to bet that 70%+ of online use on OS X is done from an administrator account.
I would be happy to lay down $100 that more like 99% of Mac users use an admin account for day to day use.
Nor is there any really compelling reason not to, as the additional security gained from not doing so is relatively insignificant.