Yeah, good points.  So  if their are holes!  You are at fault, not the 
database.  You might as well go with SQL server for CYA! : - )

Allan


----- Original message -----
From: "Roger Binns" <[EMAIL PROTECTED]>
Date: 1/31/2005 11:42:46 AM
Subject: Re: RE(1):  [sqlite] SQLite Advocacy

> > Not true at all.  In fact, from experience, the Linux OS is 
> > much more full of holes than Windows.  It appears most hate 
> > Microsoft so thier OS gets the most virus and hackers.  All 
> > I can say is we independently did a test with Linux and Windows 
> > we isntalled a default OS and put it on the net without a 
> > firewall.  Windows was never hacked, but Linux was hacked in 
> > a day and they took root access to the point where we could 
> > not get back in.  
> 
> That is one of the most insignificant tests.  Typically the
> "holes" are going to depend on what applications and services
> you have installed on the operating system.  For Linux, the
> default installs have almost no exposed services.  The same is
> mostly true of using XP SP2.  And there are many many
> counter examples to your data point anyway.  The logic is the
> same as saying that some airline hasn't had a crash yet
> this year therefore it must be safer than the other ones.
> 
> But it does raise a good point for SQLite.  SQLite is not
> exposed as a service in *any* way.  It is just a library.
> You cannot hack into it over the network.  You can hack into 
> an application using SQLite, but you can do the same for
> an application using SQL Server, or anything else.  SQLite
> buys you one less point of exposure.  (The same is true of
> any other embedded database.)
> 
> What SQLite and other open source/free projects give you is
> freedom of choice.  You can get support from whomever you want.
> You can get maintenance from whomever you want.  There is
> no lockin.  So if you want to pay lots of money for 30 minute
> response times, you can.  If you want to pay almost no money
> for one month response times, you can.  If you don't like how
> long whomever you choose to pay, you can drop them and pick
> someone else.  With Microsoft, you get only what they offer
> with no choice.  You get to go where they want to go today.
> And try to get a customisation out of Microsoft ...
> 
> How about proper research on how long it takes to get systems
> hacked:
> 
> http://www.honeynet.org/papers/trends/life-linux.pdf
> http://www.schneier.com/blog/archives/2005/01/linux_security_1.html
> 
> And some counter-FUD:
> 
> http://www.theregister.co.uk/2004/10/22/linux_v_windows_security/
> http://www.wired.com/news/linux/0,1411,66022,00.html?tw=wn_tophead_1
> http://www.newsfactor.com/perl/story/19649.html
> http://www.securitypipeline.com/showArticle.jhtml?articleID=26805728
> http://www.fcw.com/fcw/articles/2004/0503/feat-linux3-05-03-04.asp
> 
> Roger
> 

Reply via email to