> This cannot happen in Unix ,Linux and Mac it cannot leave the account
> profile .
>Ahh wrong, malware is ever changing, malware will attempt to 'leave the
>account' we call it privilege escalation by exploiting any weakness in
>the implementation of security measures. There are a lot of different
>types of malware and some don't even bother with your user account they
>target parts of the computers system such as the networking software or
>communications systems (i.e. tcp/ip or rcp) to gain access to your
>computer. In security there is never a 'can' or 'cannot' only 'has' and
>'hasn't yet'


The systenm files or acess to  tcp/ip or network setting,msconfig or registry 
would generate any response if a user or malware tried to acess it , the 
typical response you do not have system privilege contect system adimd or how 
ever typical response comes up like in windows acess denied or what ever.

My understanding  NT and windows 2000 also windows XP malware can still make it 
way out of the user account profile and infect system files has the way the OS 
works.Has the The concept of "root" "admin" and "users" with different levels 
of system access does nothing on windows do to the way the OS works with out 
starting from scrach.



> 3.windows NT and windows 2000 was more secure OS almost has good has
> Unix at the time.

>No, NT and 2000 shared a lot of code and had many security problems,
>unix code was older, better tested and more secure

What do you mean.



>The root user is really a true admin id, as is the 'Administrator'
>account on Windows. As far as I know all these have a 'protected'
>kernel, but it is not a black and white issue it is the degree of
>protection and as with any security measure it is only as strong as the
>weakest part.



sorry what are you trying to say has the root user just has way to much power 
to run ,install,remove stuff or even acess system setting or
system files and this is very very very dangerous has they say one should never 
try to run has root user on any OS.

Well they say one should make a limited user acoount that does not have 
permission  to run ,install,remove stuff,change stuff ,acess system setting or
system files when one is internet surfing and in theory the malware will not 
have permission to run ,install,remove stuff,change stuff ,acess system setting 
or system files.But the problem is there flaws in windows that malware can 
bypass the acess denied to do those things .

Also they say that active-x should be turn off has it is extremely dangerous to 
the extreme and other Javascript and flash should be tighten up too.Has most 
people are very lazy with security settings.



------------------------------------

To unsubscribe from this list, please email 
[email protected] & you will be removed.Yahoo! Groups 
Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/LINUX_Newbies/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/LINUX_Newbies/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to