I think that sums it up great right there...people find holes where the biggest shares are to exploit the most users...if i wrote a virus to attack linux it would probobly propogate through 2-3 machines before contained. Write a virus for windows and you get hundreds of thousands in one shot"As Linux becomes more common, we'll see more attacks against it"
Originally posted by: Drakkon
I think that sums it up great right there...people find holes where the biggest shares are to exploit the most users...if i wrote a virus to attack linux it would probobly propogate through 2-3 machines before contained. Write a virus for windows and you get hundreds of thousands in one shot"As Linux becomes more common, we'll see more attacks against it"
Well i didnt but this guy did: http://blogs.msdn.com/michael_howard/archive/2004/10/15/242966.aspxOriginally posted by: n0cmonkey
Originally posted by: Drakkon
I think that sums it up great right there...people find holes where the biggest shares are to exploit the most users...if i wrote a virus to attack linux it would probobly propogate through 2-3 machines before contained. Write a virus for windows and you get hundreds of thousands in one shot"As Linux becomes more common, we'll see more attacks against it"
Compare IIS's history to Apache's.
... Interestingly, most of the flaws listed by US-CERT are application bugs rather than security holes in the underlying OS. This is likely due to the more stringent QA testing that operating systems undergo before release. ...
Exactly. This study means two things, jack and ******. With a couple dozen major variants of *NIX, is it surprising that they have more bugs than a more homogeneous platform? Should bugs from the CoreOS of xyz platform be counted the same as bugs from notepad.exe, as this study seems to do? What about DOS attacks versus misspelled text versus root-level compromise? Are these all worth the same? Assessing security by counting bugs from vague categories is pretty worthless.apparently some bugs are listed multiple times on the list.
I would like to see a breakdown of bugs exploitable by an unauthorized external user.
If you browse through the list, it seems a lot of the MS vulnerabilities are available to unauthorized remote users, while a large number of the *nix bugs are only exploitable if the attacker has already logged into the box via some other means.
While local exploits are definitely a problem, they aren't nearly as much of a threat as remotely exploitable bugs.
Pro-active security is the only valid security model for any platform still.
Originally posted by: Drakkon
Well i didnt but this guy did: http://blogs.msdn.com/michael_howard/archive/2004/10/15/242966.aspxOriginally posted by: n0cmonkey
Originally posted by: Drakkon
I think that sums it up great right there...people find holes where the biggest shares are to exploit the most users...if i wrote a virus to attack linux it would probobly propogate through 2-3 machines before contained. Write a virus for windows and you get hundreds of thousands in one shot"As Linux becomes more common, we'll see more attacks against it"
Compare IIS's history to Apache's.
More people use Apache 2.0 though than IIS 6.0, thus less vulnerabilities were found![]()