On Thursday 05 July 2001 02:48, tazmun wrote:
> > >> It is not perfect, but relaxation beyond that lets in the sort
> > >> of
> >
> > nonsense you see in Windows all the time. <<
>
> Ok, I too am curious exactly what is meant here?  I've had my
> computer in windows mode to all the sites I am aware of to check
> security and as far as I know it is secure as it is possible to be.
>  My systems don't even allow file transfer on TCP/IP, they use
> another protocol for that so the TCP/IP is only for web access.My
> knowledge of hacking etc is very limited.  It is implied that it is
> easier to hack a windows system then it is a Linux system...if this
> is so why and how?

Well, for one, Windows 9x through to XP are all single-user systems, 
but that is not the big reason.

Windows NT and Windows 2000 are very crackable _WHEN_ you put 
Microsoft applications on them though, running standalone, they are 
probably as secure as any immature unix.

You see, when Windows 3.1 was fresh out, WordPerfect held 90% of the 
word-processor market.  How did it come about that just a few years 
later, Word was king and WordPerfect was "incompatible"?

When you have an operating system, you make Application Programming 
Interfaces or APIs that other software writers then use to make their 
programs work with your system.  Microsoft did this.  But for their 
own programs, they realized that they could use their special 
knowledge of their system (and it was truly theirs though the 
underlying DOS definitely was _not_.) to let Word run faster, more 
efficiently, and more feature-laden because it did not have to work 
through APIs for everything, it could _directly_ access the kernel.

In linux or unix, a program that can _directly_ access the kernel is 
a kernel module.  There are walls for everything else, and APIs for 
requesting and receiving kernel services.  It would be a cardinal sin 
to write something that atempted to violate the walls between apps 
and system.  Just as when X crashes, the keyboard is locked, the 
mouse won't move, chances are the kernel is fine and a telnet or 
webmin access or ssh into the machine will show it.

WINE (Wine Is Not an Emulator) runs many programs for linux that were 
designed to run under windows.  It does so by providing services 
through analogues of the Windows APIs.  WordPerfect for linux uses 
WINE, and runs.  Microsoft Office programs strangely do not appear to 
fully run under WINE though sometimes they will show some splash 
screens and graphics.

OK  so even IF you get by all the holes and erase the NSA key in your 
windows replacing it with one of your own, and change the third key 
as well so that cryptographic services run properly, and no one can 
load security software on your machine without your knowledge.  And 
if you manage to stay away from sites that contain trojans in the 
downloads they offer, you are still subject to some horrid things.

For example, you might receive a reply from a trusted source you just 
mailed.
SCENARIO:
"I'll get back to you as soon as I can on the matter.  In the mean 
time, take a look at this"

There sits an .xls file.  Since your mail had nothing to do with 
numbers, you dump it.

TOO LATE!  It is a middleware exploit cruising one of the 
superhighways into the core of your system and it was borne by a 
variant of the KAK virus (Kagou antiKro$soft says, Not Today).

Now what happens?  Do you send out weird replies to email?  Yes, fro 
a limited time.

Meanwhile next time you are on the internet, this little program 
opens up and connects to an IRC server, and it goes to a hidden chat 
room using a secret key and reports to its master.  It gives the 
secret, random port it has chosen for communication with your 
computer, its secret, randomly generated,  name, perhaps accepts a 
message containing the SUB7 server, and waits for orders.

And maybe a few days or years later, your ISP, if he's a good one, 
and believe me the big ones want to ignore this problem, comes to you 
and asks if he can inspect your programs because your computer was 
one of three thousand that participated in a Distributed Denial of 
Service  (DDoS) attack against the Bank of America, or some server 
offering free security software, or....

Or if you are really unlucky, you get a knock at your door from the 
FBI because your computer was a relay in a really BIG cybercrime.

Up to now, Windows machines were available only with very limited 
socket capabilities.  They can send huge, fragmented UDP packets and 
ICMP packets with malformations, but their ability to mangle TCP/IP 
packets and spoof IP addresses just wasn't there.  Windows XP changes 
that.

And the crackers and sociopathic juveniles of the world, who were 
limited to armies of cockroaches before now will find they command 
cockroaches with nuclear backpacks.  

And naturally, the folks using the net are saying "thin is beautiful" 
and equipping themselves with routers and small devices to handle 
firewalling.  What is going to be required in this brave new world 
with armies of CAPABLE internet Zombie soldiers running XP is the 
Network Computer....  with stateful packets, almost everywhere there 
is now a router.

You see, the DDoS attack is just packets that your computer will 
ignore.  It is a flood of them that will take up all your bandwidth 
right where you connect to your ISP.  And it is fairly simple for the 
ISP to configure a few router rules to stop them before they hit the 
choke point.

But the new packet capability would be looking like replies to sent 
queries.  The router cannot guard this situation--it has to be 
something that can say  "no no no, you are not a reply because I 
never sent that request".

I think user-friendly.org has it right. Linux is like a 
cancer--growing and spreading, popping up in unlikely places, and 
Microsoft is more like Tourette's Syndrome.

Civileme

Reply via email to