|
|
|
|
|
|
Posted: Mon Mar 30, 2009 6:35 pm
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 6:52 pm
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 7:11 pm
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 7:19 pm
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 7:26 pm
|
|
|
|
lazycommie 124-C lazycommie ...but you really should just switch to a *nix based OS... And watch coders start churning out *nix based viruses like crazy. Don't forget that the reason that your precious Linux is so safe is because no one gives two ******** about them. Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application.
Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information.
Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_<
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 7:45 pm
|
|
|
|
AlcoholicPancake lazycommie 124-C lazycommie ...but you really should just switch to a *nix based OS... And watch coders start churning out *nix based viruses like crazy. Don't forget that the reason that your precious Linux is so safe is because no one gives two ******** about them. Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application. Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information. Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_<
Remember that the ONLY reason Windows is around on desktop PC's anymore is because it's pre-installed anymore. You are also forgetting that Linux and UNIX(Mostly BSD variants for UNIX, as AT&T still owns the original UNIX) control the vast majority of computers once you take servers into account. If it were about numbers, why aren't there any Linux viruses?
I can answer that. It's because of how user permissions are set up, as well as how memory permissions are handled. On *nix, a virus(which for *nix would be a script) would have to have init edited for it to be a startup program, which requires sudo privileges(when run from non-root, and you NEVER run as root, on some distros it's literally impossible, same with any properly configured server) and the root password to edit, and to do any major system changes would also need the same.
Viruses on Windows spread because of how it's user permissions and memory permisssions were designed. They were developed for a pre-internet era, when virii were not an issue unless you left a floppy in the drive when booting. This was, in part, deliberate and in part CWD. The NSA required Microsoft provide numerous backdoors and security flaws in the Windows kernel. A lot of those have been patched with the release of the NT kernel, but the CWD factor(whcih is the greatest threat) remains unchanged. Any program running in memory can get nearly unlimited permissions by starting as a system process. While the new thing that came out with Vista requiring you to hit "ok" a dozen times corrects the fact that Joe Random User is a moron who clicks any .exe he seees, to a limited extent(Joe will still hit "ok" anyway), that does not change the memory permissions issue, which is something that Microsoft does not seem intent to ever correct. In addition, Windows is vulnurable due to it's "automatic updates", as that leaves a port open where an IP can easily be spoofed and a payload delivered as if it were an update(a process that dates back to the era of punchcards, actually, where one would fake the punch cards to look like an update and release them at the right time for an update, and Joe Random Operator would unknowingly run them).
Unless you make a BIOS level virus, you won't be able to make a workable virus for *nix, and even then it won't be able to do anything involving the network if you use even remotely decent security(say, a software firewall), and would require the virus to be delivered via a deliberate alteration to the EPROM, which you're not going to pull off without physical access to the box and a lot of expensive tools...and several hours.
ETA: The reason a lot of the US military uses Windows(although not as much as you may think, as most of the things requiring decent security run a specialized flavor of UNIX or another, much more obscure OS I can't remember the name of, depending on security required) is money. MS pays the right people and so it gets installed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 8:04 pm
|
|
|
|
lazycommie AlcoholicPancake lazycommie 124-C lazycommie ...but you really should just switch to a *nix based OS... And watch coders start churning out *nix based viruses like crazy. Don't forget that the reason that your precious Linux is so safe is because no one gives two ******** about them. Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application. Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information. Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_< Remember that the ONLY reason Windows is around on desktop PC's anymore is because it's pre-installed anymore. You are also forgetting that Linux and UNIX(Mostly BSD variants for UNIX, as AT&T still owns the original UNIX) control the vast majority of computers once you take servers into account. If it were about numbers, why aren't there any Linux viruses? I can answer that. It's because of how user permissions are set up, as well as how memory permissions are handled. On *nix, a virus(which for *nix would be a script) would have to have init edited for it to be a startup program, which requires sudo privileges(when run from non-root, and you NEVER run as root, on some distros it's literally impossible, same with any properly configured server) and the root password to edit, and to do any major system changes would also need the same. Viruses on Windows spread because of how it's user permissions and memory permisssions were designed. They were developed for a pre-internet era, when virii were not an issue unless you left a floppy in the drive when booting. This was, in part, deliberate and in part CWD. The NSA required Microsoft provide numerous backdoors and security flaws in the Windows kernel. A lot of those have been patched with the release of the NT kernel, but the CWD factor(whcih is the greatest threat) remains unchanged. Any program running in memory can get nearly unlimited permissions by starting as a system process. While the new thing that came out with Vista requiring you to hit "ok" a dozen times corrects the fact that Joe Random User is a moron who clicks any .exe he seees, to a limited extent(Joe will still hit "ok" anyway), that does not change the memory permissions issue, which is something that Microsoft does not seem intent to ever correct. In addition, Windows is vulnurable due to it's "automatic updates", as that leaves a port open where an IP can easily be spoofed and a payload delivered as if it were an update(a process that dates back to the era of punchcards, actually, where one would fake the punch cards to look like an update and release them at the right time for an update, and Joe Random Operator would unknowingly run them). Unless you make a BIOS level virus, you won't be able to make a workable virus for *nix, and even then it won't be able to do anything involving the network if you use even remotely decent security(say, a software firewall), and would require the virus to be delivered via a deliberate alteration to the EPROM, which you're not going to pull off without physical access to the box and a lot of expensive tools...and several hours. ETA: The reason a lot of the US military uses Windows(although not as much as you may think, as most of the things requiring decent security run a specialized flavor of UNIX or another, much more obscure OS I can't remember the name of, depending on security required) is money. MS pays the right people and so it gets installed.
Well, you have all that correct... No denying that.
Although, on the part about the US Military, not fully true. All their servers set up over seas running communications between different divisions and groups ( though you'd think it'd be more secure ) use Windows Server. Not sure which edition, I know that up until about 2 years ago it was Windows Server 2003 though. The systems you're thinking about that run a *nix based server are things like IRS, FBI, NSA, and divisions such as that. All Military servers ( At least USMC servers ) are running Windows based Servers.
That is of course, unless you're talking about JWICS, SIPRNET and NIPRNET computers, which I still believe are Window's based, but could possibly be *nix based.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 8:09 pm
|
|
|
|
AlcoholicPancake lazycommie AlcoholicPancake lazycommie 124-C lazycommie ...but you really should just switch to a *nix based OS... And watch coders start churning out *nix based viruses like crazy. Don't forget that the reason that your precious Linux is so safe is because no one gives two ******** about them. Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application. Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information. Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_< Remember that the ONLY reason Windows is around on desktop PC's anymore is because it's pre-installed anymore. You are also forgetting that Linux and UNIX(Mostly BSD variants for UNIX, as AT&T still owns the original UNIX) control the vast majority of computers once you take servers into account. If it were about numbers, why aren't there any Linux viruses? I can answer that. It's because of how user permissions are set up, as well as how memory permissions are handled. On *nix, a virus(which for *nix would be a script) would have to have init edited for it to be a startup program, which requires sudo privileges(when run from non-root, and you NEVER run as root, on some distros it's literally impossible, same with any properly configured server) and the root password to edit, and to do any major system changes would also need the same. Viruses on Windows spread because of how it's user permissions and memory permisssions were designed. They were developed for a pre-internet era, when virii were not an issue unless you left a floppy in the drive when booting. This was, in part, deliberate and in part CWD. The NSA required Microsoft provide numerous backdoors and security flaws in the Windows kernel. A lot of those have been patched with the release of the NT kernel, but the CWD factor(whcih is the greatest threat) remains unchanged. Any program running in memory can get nearly unlimited permissions by starting as a system process. While the new thing that came out with Vista requiring you to hit "ok" a dozen times corrects the fact that Joe Random User is a moron who clicks any .exe he seees, to a limited extent(Joe will still hit "ok" anyway), that does not change the memory permissions issue, which is something that Microsoft does not seem intent to ever correct. In addition, Windows is vulnurable due to it's "automatic updates", as that leaves a port open where an IP can easily be spoofed and a payload delivered as if it were an update(a process that dates back to the era of punchcards, actually, where one would fake the punch cards to look like an update and release them at the right time for an update, and Joe Random Operator would unknowingly run them). Unless you make a BIOS level virus, you won't be able to make a workable virus for *nix, and even then it won't be able to do anything involving the network if you use even remotely decent security(say, a software firewall), and would require the virus to be delivered via a deliberate alteration to the EPROM, which you're not going to pull off without physical access to the box and a lot of expensive tools...and several hours. ETA: The reason a lot of the US military uses Windows(although not as much as you may think, as most of the things requiring decent security run a specialized flavor of UNIX or another, much more obscure OS I can't remember the name of, depending on security required) is money. MS pays the right people and so it gets installed. Well, you have all that correct... No denying that. Although, on the part about the US Military, not fully true. All their servers set up over seas running communications between different divisions and groups ( though you'd think it'd be more secure ) use Windows Server. Not sure which edition, I know that up until about 2 years ago it was Windows Server 2003 though. The systems you're thinking about that run a *nix based server are things like IRS, FBI, NSA, and divisions such as that. All Military servers ( At least USMC servers ) are running Windows based Servers. That is of course, unless you're talking about SIPRNET and NIPRNET computers, which I still believe are Window's based, but could possibly be *nix based.
I remember a book released(declassified) back in the late 90's by the government that went over OS security levels in various military and government applications, and which were used for what. *nix was roughly in the middle, as far as rating went, whereas windows was used for much lower security things. The name of the higher security OS's slips me still, since I don't have a hard copy of said book available, but makes *nix look like Windows. It also only ran on specific and rather obsolete hardware.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 8:16 pm
|
|
|
|
lazycommie AlcoholicPancake lazycommie AlcoholicPancake lazycommie Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application. Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information. Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_< Remember that the ONLY reason Windows is around on desktop PC's anymore is because it's pre-installed anymore. You are also forgetting that Linux and UNIX(Mostly BSD variants for UNIX, as AT&T still owns the original UNIX) control the vast majority of computers once you take servers into account. If it were about numbers, why aren't there any Linux viruses? I can answer that. It's because of how user permissions are set up, as well as how memory permissions are handled. On *nix, a virus(which for *nix would be a script) would have to have init edited for it to be a startup program, which requires sudo privileges(when run from non-root, and you NEVER run as root, on some distros it's literally impossible, same with any properly configured server) and the root password to edit, and to do any major system changes would also need the same. Viruses on Windows spread because of how it's user permissions and memory permisssions were designed. They were developed for a pre-internet era, when virii were not an issue unless you left a floppy in the drive when booting. This was, in part, deliberate and in part CWD. The NSA required Microsoft provide numerous backdoors and security flaws in the Windows kernel. A lot of those have been patched with the release of the NT kernel, but the CWD factor(whcih is the greatest threat) remains unchanged. Any program running in memory can get nearly unlimited permissions by starting as a system process. While the new thing that came out with Vista requiring you to hit "ok" a dozen times corrects the fact that Joe Random User is a moron who clicks any .exe he seees, to a limited extent(Joe will still hit "ok" anyway), that does not change the memory permissions issue, which is something that Microsoft does not seem intent to ever correct. In addition, Windows is vulnurable due to it's "automatic updates", as that leaves a port open where an IP can easily be spoofed and a payload delivered as if it were an update(a process that dates back to the era of punchcards, actually, where one would fake the punch cards to look like an update and release them at the right time for an update, and Joe Random Operator would unknowingly run them). Unless you make a BIOS level virus, you won't be able to make a workable virus for *nix, and even then it won't be able to do anything involving the network if you use even remotely decent security(say, a software firewall), and would require the virus to be delivered via a deliberate alteration to the EPROM, which you're not going to pull off without physical access to the box and a lot of expensive tools...and several hours. ETA: The reason a lot of the US military uses Windows(although not as much as you may think, as most of the things requiring decent security run a specialized flavor of UNIX or another, much more obscure OS I can't remember the name of, depending on security required) is money. MS pays the right people and so it gets installed. Well, you have all that correct... No denying that. Although, on the part about the US Military, not fully true. All their servers set up over seas running communications between different divisions and groups ( though you'd think it'd be more secure ) use Windows Server. Not sure which edition, I know that up until about 2 years ago it was Windows Server 2003 though. The systems you're thinking about that run a *nix based server are things like IRS, FBI, NSA, and divisions such as that. All Military servers ( At least USMC servers ) are running Windows based Servers. That is of course, unless you're talking about SIPRNET and NIPRNET computers, which I still believe are Window's based, but could possibly be *nix based. I remember a book released(declassified) back in the late 90's by the government that went over OS security levels in various military and government applications, and which were used for what. *nix was roughly in the middle, as far as rating went, whereas windows was used for much lower security things. The name of the higher security OS's slips me still, since I don't have a hard copy of said book available, but makes *nix look like Windows. It also only ran on specific and rather obsolete hardware.
Hmm, I've probably heard it's name before, but it just didn't mean anything to me then... Oh well, I'll look around and see if I can find that name of what you're talking about.
Other than Windows though, the only other system I know the the Military uses is ( I believe it was at least ) Solaris, and that's only for a few things that I know of.
Anyway, my ride's here, and so I need to head off and get out of here. Take it easy, and it was fun talking biggrin
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Mon Mar 30, 2009 8:24 pm
|
|
|
|
AlcoholicPancake lazycommie AlcoholicPancake lazycommie AlcoholicPancake lazycommie Actually, that's quite full of s**t. When you count servers, not just desktop machines, *nix outnumbers Windows OS's considerably. The reason Linux and UNIX are not virus-riddled is simple. They are actually designed decently and not CWD(coded while drunk) or deliberately compromised to create a market for stuff to try and stop up the gaping security flaws. Frankly, Windows is so poorly designed and so deliberately insecure that to consider it usable as a desktop machine is a stretch, and it should never even be considered for any serious application. Whereas that may be true about Windows being shitty as hell, 124 is correct. Not many people use *nix based OS's on their PC's therefor it'd make more less sense to make viruses for those systems. More people use Windows OS on their PCs so it's easier just to write viruses for that OS, because you can infect more people and steal more information. Also, you'd be suprised how many things use Window's Servers ( Though I don't know WHY they would )... The United States Military for example... >_< Remember that the ONLY reason Windows is around on desktop PC's anymore is because it's pre-installed anymore. You are also forgetting that Linux and UNIX(Mostly BSD variants for UNIX, as AT&T still owns the original UNIX) control the vast majority of computers once you take servers into account. If it were about numbers, why aren't there any Linux viruses? I can answer that. It's because of how user permissions are set up, as well as how memory permissions are handled. On *nix, a virus(which for *nix would be a script) would have to have init edited for it to be a startup program, which requires sudo privileges(when run from non-root, and you NEVER run as root, on some distros it's literally impossible, same with any properly configured server) and the root password to edit, and to do any major system changes would also need the same. Viruses on Windows spread because of how it's user permissions and memory permisssions were designed. They were developed for a pre-internet era, when virii were not an issue unless you left a floppy in the drive when booting. This was, in part, deliberate and in part CWD. The NSA required Microsoft provide numerous backdoors and security flaws in the Windows kernel. A lot of those have been patched with the release of the NT kernel, but the CWD factor(whcih is the greatest threat) remains unchanged. Any program running in memory can get nearly unlimited permissions by starting as a system process. While the new thing that came out with Vista requiring you to hit "ok" a dozen times corrects the fact that Joe Random User is a moron who clicks any .exe he seees, to a limited extent(Joe will still hit "ok" anyway), that does not change the memory permissions issue, which is something that Microsoft does not seem intent to ever correct. In addition, Windows is vulnurable due to it's "automatic updates", as that leaves a port open where an IP can easily be spoofed and a payload delivered as if it were an update(a process that dates back to the era of punchcards, actually, where one would fake the punch cards to look like an update and release them at the right time for an update, and Joe Random Operator would unknowingly run them). Unless you make a BIOS level virus, you won't be able to make a workable virus for *nix, and even then it won't be able to do anything involving the network if you use even remotely decent security(say, a software firewall), and would require the virus to be delivered via a deliberate alteration to the EPROM, which you're not going to pull off without physical access to the box and a lot of expensive tools...and several hours. ETA: The reason a lot of the US military uses Windows(although not as much as you may think, as most of the things requiring decent security run a specialized flavor of UNIX or another, much more obscure OS I can't remember the name of, depending on security required) is money. MS pays the right people and so it gets installed. Well, you have all that correct... No denying that. Although, on the part about the US Military, not fully true. All their servers set up over seas running communications between different divisions and groups ( though you'd think it'd be more secure ) use Windows Server. Not sure which edition, I know that up until about 2 years ago it was Windows Server 2003 though. The systems you're thinking about that run a *nix based server are things like IRS, FBI, NSA, and divisions such as that. All Military servers ( At least USMC servers ) are running Windows based Servers. That is of course, unless you're talking about SIPRNET and NIPRNET computers, which I still believe are Window's based, but could possibly be *nix based. I remember a book released(declassified) back in the late 90's by the government that went over OS security levels in various military and government applications, and which were used for what. *nix was roughly in the middle, as far as rating went, whereas windows was used for much lower security things. The name of the higher security OS's slips me still, since I don't have a hard copy of said book available, but makes *nix look like Windows. It also only ran on specific and rather obsolete hardware. Hmm, I've probably heard it's name before, but it just didn't mean anything to me then... Oh well, I'll look around and see if I can find that name of what you're talking about. Other than Windows though, the only other system I know the the Military uses is ( I believe it was at least ) Solaris, and that's only for a few things that I know of. Anyway, my ride's here, and so I need to head off and get out of here. Take it easy, and it was fun talking biggrin
I'll try and find the book.
Twas fun talking with you about this stuff.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Posted: Sat Apr 04, 2009 6:01 am
|
|
|
|
|
|
|
Posted: Sat Apr 04, 2009 3:16 pm
|
|
|
|
|
|
|
|
|
Posted: Sat Apr 04, 2009 10:06 pm
|
|
|
|
|
|
|
Posted: Sat Apr 04, 2009 11:02 pm
|
|
|
|
|
|
|
|
|
|
|
|