Not to argue the point but NT is a version that was "hardened" for business use, Windows (WFW, 3.11, 98, whatever you want to use as the baseline) was created as a consumer friendly OS, not a simplified Mainframe.
-----Original Message----- From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Wednesday, May 18, 2011 1:54 PM To: NT System Admin Issues Subject: RE: Interesting news from Apple Windows NT was never created as a consumer product. Choices were made in Windows XP that made it inherently less secure in order to not scare off the consumer users and because of poorly behaved applications, even then. We are still paying that price. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com -----Original Message----- From: John Cook [mailto:john.c...@pfsf.org] Sent: Wednesday, May 18, 2011 1:51 PM To: NT System Admin Issues Subject: RE: Interesting news from Apple Big difference is that 'nix was created as more of a professional level OS and Windows was created as a consumer product. It's pretty hard to "get the cat back in the bag" once it's out. -----Original Message----- From: Ben Scott [mailto:mailvor...@gmail.com] Sent: Wednesday, May 18, 2011 1:36 PM To: NT System Admin Issues Subject: Re: Interesting news from Apple On Wed, May 18, 2011 at 12:25 PM, John Aldrich <jaldr...@blueridgecarpet.com> wrote: > Mostly I was thinking of the typical Windows type > stuff where they trick you into downloading an EXE file and running it. Same thing can happen on Linux. And from the sound of the report, that's what's hitting the Mac's. It's really just a social engineering attack: Trick the user into downloading and running malicious software. There's not much you can do to combat that, except have the admins take away the ability for users to run software. And that won't help home users who are their own admins. "There are seldom good technological solutions to behavioral problems." (Ed Crowley) The one thing traditional *nix systems have going for them is that it's easier to lock down the environment, since they've been doing that pretty much from the start. Just mount /tmp and /home with "noexec" and users can't execute anything they can write to. In the Windows world, you've got to deal with a fsckton of crappy software that breaks in weird ways when you try this or other nominally sensible things. And I include Windows itself in that. Here's a fun trick: Copy WINVER.EXE to EXAMPLE.LNK. It will still run via several methods, such as the command line. So you either block .LNK files from running -- breaking *all user shortcuts*, including "Recent Documents" -- or you allow an obvious path for attackers. Great job Microsoft. But that's not a security model thing, it's a crappy implementation thing. You can work around it with enough time and money. And someday Microsoft might fix their bugs, at least. Dealing with the crappy third-party software... well, hopefully one has enough pull with one's vendors to have them fix their bugs. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY STATEMENT: The information transmitted, or contained or attached to or with this Notice is intended only for the person or entity to which it is addressed and may contain Protected Health Information (PHI), confidential and/or privileged material. Any review, transmission, dissemination, or other use of, and taking any action in reliance upon this information by persons or entities other than the intended recipient without the express written consent of the sender are prohibited. This information may be protected by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other Federal and Florida laws. Improper or unauthorized use or disclosure of this information could result in civil and/or criminal penalties. Consider the environment. Please don't print this e-mail unless you really need to. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY STATEMENT: The information transmitted, or contained or attached to or with this Notice is intended only for the person or entity to which it is addressed and may contain Protected Health Information (PHI), confidential and/or privileged material. Any review, transmission, dissemination, or other use of, and taking any action in reliance upon this information by persons or entities other than the intended recipient without the express written consent of the sender are prohibited. This information may be protected by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other Federal and Florida laws. Improper or unauthorized use or disclosure of this information could result in civil and/or criminal penalties. Consider the environment. Please don't print this e-mail unless you really need to. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin