On Oct 18, 2006, at 8:19 PM, Tim Newsham wrote:

Its not that simple. Windows boxes are a heckuva lot easier to populate with the software that creates botnets. They're an open infection vector.

I don't agree at all. There are sufficient server and client vulnerabilities in *BSD, linux, OS X and windows. Many of the attacks don't even rely on any software vulnerability but on the poor judgement and bad practices of end users. These same problems exist in the unix population. The software for all aspects of a the malware would be substantially similar across all existing popular platforms. The only major differentiator is the return on investment. Writing attacks for windows makes more economical sense for attackers.

Please. Windows is *full* of holes, and by default, it essentially runs as "root" (or the Windows equivalent).

(Just like Linspire, which sucks too.)

I've had linux machines on the wide-open net for years with nary an issue (save a RedHat machine in 1999 or so that got rooted when it was sitting in my home at the end of a T1 line.)

Go ahead, put your XP machine up on a raw, unfiltered IP connection. See how long it lasts.

jim

Reply via email to