quote:
Originally posted by ScottB:
Come on, Brian. I run a Linux box and four Macs at home and not ONE single virus/spyware/rootkit violation ever.
With a sample size of one (Linux machine), you can't draw very many conclusions.
How about a larger sample size?
I worked for a company that offered "dedicated servers". I forget the exact figures, but they had about 500 Linux machines. The customer was responsible for maintaining the software. Many of them did not bother to patch and upgrade the box as required, and guess what? They got compromised, a root kit was installed, the boxes started port scanning and running IRC bots, they bacame FTP "warez" repositories, etc.
I got to deal with cleaning many of them up. At one point, we started installing Linux kernels without loadable modules support because someone created a loadable module that could hide itself and any rogue processes that are running or connections that are open. This meant that simply re-installing a fresh copy of "ps" and "netstat" wouldn't show what was going on.
The point is, ANY operating system needs to be patched with security fixes as they are made available. There have been security problems with the following software which runs under Unix (including Linux):
Qpopper (provides POP3 services)
Bind (provides nameserver service)
Sendmail (provides SMTP services)
wu-ftpd (provides FTP services)
SSHD version 1 (provides secure shell services)
There's many more.
Bottom line..if you think security is just an XP problem, I hope you have a good firewall.
[ July 06, 2006, 07:15 PM: Message edited by: brianl703 ]