Bruce,

Again, however, you missed my point.  If the unix OS and the services
running under unix, along with the directories, users and virtual paths are
compiled properly, there is a substantially significant reduction in the
probability of actual successful attack of the server

I don't think you've heard what everyone is saying.  There seems to be so
much bias for or against a particular OS that the big picture is being lost.
The same argument applies to Windows, or any other OS for that matter.  Of
course hardening an OS lessens the risk.  That in no way supports the
argument that *nix is more secure.

Pardon my butting in.

EVERY OS is prone to attack, just some make better targets due to CM.

CM = CRITICAL MASS

There are MORE MS machines of every flavor in the world today. This makes boxes running MS OS the biggest and albeit the easiest targets. This is mostly because "PEOPLE", (So called sys admins and executives), do the in-DUH-vidual thing and use "administrator" user name and any of the following:
http://geodsoft.com/howto/password/common.htm

Passwords should be a thing of the past. Pass phrases or VERY LONG passwords should be standard. As well as LOCKING down un required ports.

AND ignore known issues that updates have been issued to fix.

This applies to MS, Linux (Think root kits), programs designed to run on either!

The only OS / app that has not been exploited to my knowledge is Mac OS 8.x to 9.x. Why????? Simply because they are the SMALLEST TARGET and the least likely to provide a gain or bragging rights.

All of this grand standing / bragging of "WHICH OS IS BEST" goes to a machine being configured with SECURITY in mind. SECURITY and EASE OF USE / INSTALLING ANY PROGRAM are often two significantly different things.

Just my 2 cents.

Greg.


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to