Another interesting point to note. Linux is as secure as the person running/admistrating is alert.
If you are running your os with highest priviliged user, then forget security. If you don't verify the software which are not from repo(provided we trust official repos), then chances of getting infected is higher. If the hacker has physical access to the machine, then all security provisions stand naked. Os can just provide provisions for security and can be configured to be secure. The os can't do anything if one link in the chain of trust is broken (read official repo trust) -- ubuntu-in mailing list ubuntu-in@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-in