NOD32 on Linux
AV3
arvimide at earthlink.net
Thu Feb 3 22:52:51 UTC 2011
On Feb/3/2011 11:2624 AM, Smoot Carl-Mitchell wrote:
> On Thu, 2011-02-03 at 11:09 -0500, AV3 wrote:
>
>> You may be right, but it seems more likely to me that only users folders
>> would be at risk, not the system folder. So the makers of malware would
>> have more limited rewards to look forward to. When confronted with Unix
>> underpinnings of Mac OS X, the makers of malware for the old Mac OS just
>> shriveled up and died.
>
> There are still attack vectors into Unix and Unix like systems (Linux).
> Daemons running with root privileges or setuid programs are a problem,
> since if you obtain root privileges, you can do anything. The SELinux
> framework if you enable it does mitigate some of these issues by
> restricting application permissions further to specific folders or
> files.
>
> A user can thwart these measures by doing dumb things like using the
> root account for everyday tasks or executing a trojan horse sent as an
> email attachment or embedded as a link in a web page as root.
>
I agree that these risks exist, but they are far more manageable than
the continuing Windows approach of "patching makes perfect." It baffles
me that Microsoft won't risk password protections, when Mac users
adopted them without a murmur and MacOS X has been growing. There hasn't
been any Mac OS X malware "in the wild," but one shouldn't underestimate
the cleverness of trojan horse come-ons.
--
++====+=====+=====+=====+=====+====+====+=====+=====+=====+=====+====++
||Arnold VICTOR, New York City, i. e., <arvimideQ at Wearthlink.net> ||
||Arnoldo VIKTORO, Nov-jorkurbo, t. e., <arvimideQ at Wearthlink.net> ||
||Remove capital letters from e-mail address for correct address/ ||
|| Forigu majusklajn literojn el e-poŝta adreso por ĝusta adreso ||
++====+=====+=====+=====+=====+====+====+=====+=====+=====+=====+====++
More information about the ubuntu-users
mailing list