vulnerability of Linux

John Summerfied debian at herakles.homelinux.org
Mon Nov 28 13:18:37 UTC 2005


Rudolf Kastl wrote:

>>The likelihood of someone writing a single virus attacking more than one
>>(counting Mozilla ant tbird as one) _and_ getting it to spread is fairly
>>small.
>>
>>Years ago (I was using the then recent RHL 7.3) , Kaspersky released a
>>virus scanner client for Linux. I pressed them for a catalogue of known
>>Linux viruses. They came up with a list of five, some of which I'd
>>heard. At least one was a worm (doesn't spread in email), one was maybe
>>a problem in RHL 6.2.
>>
>>
>>
>>>- Have updated systems! update your system daily. Yum must program your
>>>yum or apt updates to run at least daily.
>>
>>That is plain stupidity. It is worse than securing your system sensibly
>>and applying _no_ updates.
> 
> 
> no its not. if thats your policy fine. it shouldnt be an end users
> policy though.
> 
Justify yourr assertion: I gave reasons for mine.
> 
>>If you blindly apply updates as they appear, you will get a broken
>>system, nothing surer.
> 
> 
> end users have no clue and thus cant select what they need. actually
> with only backported fixes nothing should break with tested updates.

If users want that kind of support they better pay for it. Fedora Core 3 
did in fact break just as I said, with USB not working, at least on 
certain laptops.



>

> 


-- 

Cheers
John

-- spambait
1aaaaaaa at computerdatasafe.com.au  Z1aaaaaaa at computerdatasafe.com.au
Tourist pics http://portgeographe.environmentaldisasters.cds.merseine.nu/

do not reply off-list




More information about the fedora-list mailing list