M Hazell wrote:

> Here's my real world example:
> 
> A couple of years ago I had a small home network hooked up behind a x86
> Linux box running iptables, etc, all nicely patched and up to date in line
> with my slightly fanatical security bias :)

Linux, not Mac OS, which is the entire point.

The Classic Mac OS runs *NO* services vulnerable to attack. Let's talk 
apples and apples, here, so to speak.

Windows is vulnerable via windows shares (and dozens, if not hundreds of 
MS-induced security flaws). Linux is vulnerable depending on your 
services and security setup.

If you turn off file sharing, the classic Mac OS is utterly 
invulnerable, even to Kevin Mitnick because there is NO avenue of 
attack. (Mitnick, btw, is just soooo overrated...much of his vaunted 
'hacking' was 'social engineering' as he called it. 'Running a con' is 
what it's been called for decades...)

You could probably do a denial-of-service attack on it with a ping 
flood, but that would just cause it to not get out on the internet.

There are no software holes because the Mac OS just didn't *do* that much.

Moreover, Excel barfing on files is a known, chronic problem...

Today, with OSX there are points of attack, but compared to Linux it's 
considerably more secure.

I would lay great odds that the entire problem with your Windows box was 
that you downloaded a trojan somehow.

The rules of Computer Security:

If you let the bad guy run programs on your computer, it's not your 
computer anymore. (Don't run services people can exploit.)

If you get conned by the bad guy into running a program on your 
computer, it's not your computer anymore. (Don't run trojan horse programs.)

If you let the bad guy touch your computer, it's not your computer 
anymore. (Remember physical security...keep you console in a locked or 
otherwise secured room. This is the rule that the mafia guy failed to 
follow.)

If you follow these three rules, you have a secure system. Of course, 
the divvil's in the details...while rule's 2 and 3 are pretty easy to 
implement, rule 1 is the one you have to keep up on patches with, and 
requires you to know your computer system really well.

That said, there are so *many* fish out there running unsecured Windows 
systems on 24/7 broadband connections, no one's gonna *bother* with 
trying to hack a Mac on a dial-up connection...just like no one's gonna 
bother stealing my rusty, 20-year-old dented up faded green Honda wagon.

-- 
Bruce Johnson
University of Arizona
College of Pharmacy
Information Technology Group

Institutions do not have opinions, merely customs




-- 
PCI-PowerMacs is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
 -- Sonnet & PowerLogix Upgrades - start at $169   |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

PCI-PowerMacs list info: <http://lowendmac.com/lists/pci-powermacs.shtml>
  --> AOL users, remove "mailto:";
Send list messages to:   <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:   <mailto:[EMAIL PROTECTED]>
For digest mode, email:  <mailto:[EMAIL PROTECTED]>
Subscription questions:  <mailto:[EMAIL PROTECTED]>
Archive:<http://www.mail-archive.com/pci-powermacs%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to