On Mon, 2011-02-14 at 06:46 +0000, Rob wrote: > > From reading replies here this is what I understand tell me what is > right or wrong or if I do not understand some thing. > > 1 Unix ,Linux and Mac has a protected Kernel not like windows and all > admid are not really true admid in Unix ,Linux and Mac . The root user is really a true admin id, as is the 'Administrator' account on Windows. As far as I know all these have a 'protected' kernel, but it is not a black and white issue it is the degree of protection and as with any security measure it is only as strong as the weakest part.
> > 2 Linux and Mac is base of Unix . Unix came first, linux is built to be a 'sort-of' unix but is developing beyond being a clone of some old unix system. > > 3.windows NT and windows 2000 was more secure OS almost has good has > Unix at the time. No, NT and 2000 shared a lot of code and had many security problems, unix code was older, better tested and more secure > > 4.windows NT /windows 2000/ windows XP make use of a account user of > levels of permission for user by the admid By default yes, but this can be changed by the admin-user and restricted accounts set up, however that didn't happen often and most home users didn't set a ordinary account up. > > 5.DOS , windows 2x ,windows 3x and windows 9x had no security at all > has evey thing ran has one user with full admid mode. pretty much, most small computers were originally designed with a single user and not much thought given to security > > 6.Even secure OS windows NT and windows 2000 also windows XP malware > can still make it way out of the user account profile and infect > system files . > > This cannot happen in Unix ,Linux and Mac it cannot leave the account > profile . Ahh wrong, malware is ever changing, malware will attempt to 'leave the account' we call it privilege escalation by exploiting any weakness in the implementation of security measures. There are a lot of different types of malware and some don't even bother with your user account they target parts of the computers system such as the networking software or communications systems (i.e. tcp/ip or rcp) to gain access to your computer. In security there is never a 'can' or 'cannot' only 'has' and 'hasn't yet' > ------------------------------------ To unsubscribe from this list, please email [email protected] & you will be removed.Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/LINUX_Newbies/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/LINUX_Newbies/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
