I've never trotted out that "No viruses!" line, and I correct people who do. I know people who get far too gung ho into the fanboyism and it annoys me.
But there really aren't any viruses.
I've never trotted out that "No viruses!" line, and I correct people who do. I know people who get far too gung ho into the fanboyism and it annoys me.
I'm just saying that no software is perfect. There have been instances where a few virus/trojans have appeared for OS X. Granted it was 10.5 but maybe its "perfect" now, but give people time. If someone really wants to make a trojan for OS X they will.
I suppose viruses and security holes are two separate things. Trojans a third? How many more bad things are there?
In which "dictionary" are you finding this definition?You mean a worm. A virus by definition requires execution through manual user intervention. A worm uses a security hole to propagate itself across a network.![]()
Mac having no viruses? Really??? Of course Mac's can get viruses... Every computer/OS can.
Mac's just have less, due to the "less interest". /sarcasm
Needless to say I remember this very topic in 2006 when first virus" aka trojan to Mac OS was introduced:
You'd think that an OS with 5%-10% of the market share would have 5%-10% of the viruses...
More secure than what? Windows XP yes. Windows Vista? Maybe. Windows 7? Hell no.
CharlieMiller said:So until this year, applications on Apple were way easier to exploit than Windows. This is because Apple had weak ASLR and no DEP while Windows had full ASLR and DEP. This year, Snow Leopard has DEP, so its no longer trivial to exploit. In fact, I have lots of bugs in Safari that I easily could have exploited on Leopard but will be very difficult on Snow Leopard. So it used to be that that it was much worse, but now its mostly comparable (although still slightly behind)
RuntPacket: How effective do you think various exploit mitigation technologies are in deterring exploitation? If OSX could get real ASLR of all userland and kernel space, would your job get a substantially harder?
It'd be harder. Right now they have DEP+some ASLR. Of the executable code, which is what you really care about for DEP bypass, they randomize all but one library and the executable. So the amount of code you have is already small (so its already hard), but it'd be way harder if there was NONE - which is what full ALSR would give you.
There's nothing in Windows 7 that makes it more secure than OS X technically, besides full ASLR, considering that UAC and the system's other security measures are regularly and easily bypassed by malware.
Yeah actually, there have been no proof of concept or real VIRUSES written. Maybe it can be done, but no one has been able to do it. Yes there are Torjans out there that require someone to fall for it, but these are 2 different animals. Find me self-propagating virus and I will be worried.
A Virus is a self replicating program that requires no human interaction to spread. To do this it must take advantages of "holes" in a system, because systems are not designed to allow a program to do this for obvious reasons. A security hole may enable the creation of a Virus, however often times you need a number of holes in a number of layers in order to create an effective virus.
Quite differently is a Trojan. Just like the horse, this is just a program designed to look like something else. No system is immune to these, because you are tricking the computer user into thinking they are doing one thing, when really they are doing something else.If I rename your Chrome browser to "Firefox", that is a Trojan, just not a harmful one.
It was a toyota camry that was stolen and recovered four different times.What I also liked in that story is how her car was "always" getting stolen. How many times was it stolen? The same car? Recovered multiple times, only to be stolen again? Or kept buying new ones? And she never learned?
I have family in the country, and they do indeed leave doors unlocked. But they're also smart people, and understand that you don't do that in the city.
"Viruses" are so nineties. It's now called malware. Get it straight you people.![]()
Why would she keep the keys in the glovebox when she grew up keeping them in the visor?![]()
I just remembered the time when each time you reinstalled Windows XP (the first one, without any service packs), on the first boot when you were connected to the internet (and every subsequent boot until you found the solution), a message would greet you saying that some process has failed and the computer will power off in 45 seconds. You had 45 seconds to find the solution each time, or else the system would crash. It was caused by some code that automatically attacked any computer that had that specific security hole. Temporarily stopping it was as simple as relaunching the process that failed, but finding how to do that on various forums took ages with your computer rebooting every 45 seconds.