Mystery of chroot

David Boles dgboles at gmail.com
Mon Jul 23 01:32:58 UTC 2007


on 7/22/2007 5:55 PM, monty19@ hotmail.com wrote:
>  >Sounds like you have limited experience with doz "security". Malware 
>  >that targets its security flaws is extraordinarily easy to acquire in 
>  >doz, and difficult to eradicate, short of reinstalling the whole OS 
> and >apps. It's even possible (easy, so I hear)
> 
> So you admit you have no actual experience to counter his 'limited' 
> experience...
> 
>  >to acquire malware in the interval between installation and completion 
>  >of installing security updates online from M$.
> 
> Do you really think that given adequate access (i.e. throw it up on the 
> internet with no firewall) to a Linux system with known vulnerabilities 
> this would not also be possible between the interval you install that 
> system and manage to update it? What makes you believe then that Windows 
> should magically behave any better.
> 
> Of course, you can spin an updated install disk with the latest packages 
> so that this is not the case with your Linux system. Of course, you can 
> slipstream the install for any of Microsoft's more recent operating 
> systems and expect the same.
> 
> Look, I am no fan of a lot of Microsoft's business and marketing 
> tactics; Microsoft has been inching it's way out of my computing 
> experience slowly but surely over the last couple years. But this is the 
> same kind of FUD Microsoft likes to spread about any of the *nix 
> operating systems.
> 
> A generic Fedora 7, Fedora 6, Fedora 5, (how far do you want to go 
> back), Solaris, Mac OS X, etc. install is likely to have security flaws 
> prior to being updated that are remotely exploitable under the proper 
> circumstances.
> 
> If you don't use yum or a similar tool to install any security updates 
> to your Fedora installation, fail to run a firewall, and carelessly 
> click on links, and open unexpected email attachments then you are no 
> better than the masses of Windows users who fail to install their 
> windows updates, fail to run a firewall, and carelessly click on links, 
> and open unexpected email attachments.
> 
> The difference is that because you are not running Windows you will 
> probably go just a bit longer than them before managing to infect your 
> system with one form of malware or another, only because most malware 
> written today is directed at the much larger number of Windows computers 
> out there.
> 
> I run Mac OS X on my laptop and linux on everything else, resorting to 
> Windows Vista for only an occasional game that I might want to play with 
> friends. i might run Windows once a week tops.
> 
> However, my wife uses Windows exclusively. She has no real interest in 
> Linux, Mac OS X, and so on. She is diligent about installing those 
> Critical and Recommended Windows updates, has the basic Windows Firewall 
> set up, and uses common sense when browsing the web and reading email. 
> She has NEVER had a problem with viruses, spyware, pop-ups, or any other 
> form of malware.
> 
> Conversely I have seen Linux and even Mac users who believe their system 
> is an iron fortress simply for the fact that they are not running 
> Windows, only to find root kits and other nastiness installed on their 
> system down the road.
> 
> And people will cry that the only way in which you can correct an 
> infected Windows system is to reinstall the operating system, but I 
> would argue that from my professional and personal experience that 99% 
> of the time this is completely untrue. Again, do you really believe that 
> when a system becomes infected with this garbage that there is no sound, 
> technical, and methodical manner in which you can remove these programs, 
> and restore the system? There are some truely nasty pieces of malware 
> out there that will employ tactics such as attempting to reinstall 
> themselves if all components are not removed, etc. I have had a 
> miserable time cleaning up more than a few of these, but I have never 
> had to give up on a machine and reinstall it, though time wise it may 
> have been just as effective to reinstall one or two of them.
> 
> Oh, and how does most of this start? User browses to website X and 
> recieves popup Y that says you can get this absolutely nifty free 
> program that installs super cool item Z (instant message icons, games, 
> screensavers, and whatever crap), and Joe user thinks hey, what a great 
> deal, and goes on and install it beginning the mess...
> 
> Really, your poorly informed arguments do nothing for improving the 
> cause of Linux.
> 
> With respect,
> Jason
> 
> P.S. I believe the operating systems name is Windows, not 'doz'; 
> demeaning a product or making silly attacks against its name really are 
> no way to make your case against the company.

Clap. Clap. Well said

-- 

  David

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 187 bytes
Desc: OpenPGP digital signature
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20070722/6cbbb220/attachment-0001.sig>


More information about the fedora-list mailing list