Sponsored Content
Top Forums UNIX for Advanced & Expert Users Unix more secure than windows Post 302460309 by remi75 on Wednesday 6th of October 2010 11:37:33 AM
Old 10-06-2010
Computer

Quote:
Originally Posted by tip78
well that's mostly because there's not much viruses for *nix Smilie
but we all know rootkit for example
and if you will take some executable file from inet and execute it on *nix it can do everything especialy under root

but that's only viruses.. in all other unix is the best
btw you forgot chrooting - unix exclusive Smilie
per the definition of a virus, it just doesnt exist on Unix(s)

to install SUCCEFULLY a rootkit on a unix machine , 1 you need a real shell account disk space and many other things and a not secured at all system , like writable folders / readable files to whom it shoulnt etc
basically if u rootkit a unix machine, to me , it wasnt enought secured so you dont even need to root-kit it Smilie

2 you will have to know the exact version of the kernel which is related ALSO to know how it was compiled Smilie unless you find a compiler on the server Smilie
yes real world servers never install a compiler on the machine Smilie


bascally : with windows : you lunch a browser and go on the internet : 99.9% you got a virus in about 20 minutes.
with unix .... never .
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how can i secure the unix box?

i am new to the unix i am running solaris 9 i like it better than windows... anyway i am looking on how can i secure the box in terms of software any freedownloads would be a plus as well.... also what commands will be useful to see if there has been a security breech on the unix box? ... (1 Reply)
Discussion started by: rmuhammad
1 Replies

2. Shell Programming and Scripting

title bar manipulation in F-Secure SSH Client for Windows

Hello All, I was wondering if the titlebar in "F-Secure SSH Client for Windows" is changeable. Currently I see the host name in the title bar. I would like to add "user@host" to the title. So when I log on to a particular box and do a ssh to another box the title should dynamically... (3 Replies)
Discussion started by: ssikhar
3 Replies

3. UNIX for Dummies Questions & Answers

how unix called as secure

hi .. This is sanjeev , new at the world of unix , i want to know why unix/linux is called as secure ? as i am new , please suggest me what os i should use ? i am having laptop of 256 ram . thanks in advance regards sanjeev (5 Replies)
Discussion started by: sanjeev1
5 Replies

4. AIX

How to use SSH Secure File Transfer tool from windows to AIX without password?

If I use SSh Secure File Transfer tool on Windows, I want to transfer file from windows to AIX without password, how to do it? (6 Replies)
Discussion started by: rainbow_bean
6 Replies

5. Shell Programming and Scripting

Transfer files from linux server to windows using secure ftp (sftp)

HI, I have to transfer files from linux server to windows using secure ftp (sftp) .Kindly help me out. (3 Replies)
Discussion started by: manushi88
3 Replies

6. Cybersecurity

Secure Laptop composition with UNIX/Linux and Windows 7

Hello I have a problem: want to build secure laptop for simple user ( that's me :D ) with the VPN and virtualization. Laptop would be for work at home and travel , so security for wirelles networks and comfort using Mobile 3G internet with dongle (not to have problem with drivers) is also... (1 Reply)
Discussion started by: edgkkk
1 Replies

7. UNIX for Advanced & Expert Users

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (0 Replies)
Discussion started by: dhrajj
0 Replies

8. Linux

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (3 Replies)
Discussion started by: dhrajj
3 Replies

9. Programming

Secure FTP from Windows to UNIX

Looking for a way to secure ftp files from Windows to Unix through batch script. This may not be related to Unix/Linux environment, but hoping some solution. Our desktop (Win 7) does not have sftp installed in our machine (DOS-Command Window). We have SSH tools like Winscp, PSFTP (PuTTY),... (4 Replies)
Discussion started by: bobbygsk
4 Replies
cr(1)							      General Commands Manual							     cr(1)

NAME
cr - converts text files between nix EOL and dos EOL SYNOPSIS
cr - | + <input file> <output file> DESCRIPTION
Text files, such as tle files, that come from a dos source usualy have the ^M symbol at the end of every line. Cr converts files between the dos newline format and the normal *nix newline format by stripping the ^M to convert dos to *nix, using the '-' option, or adding ^M to a *nix file to create the proper dos file when the '+' option is used. Although this extra character is not often a problem, programs like seesat5, which are data driven will encounter parsing problems when the extra character is present. It is these problems that cr is intended to repair. Options - | + One or the other of these options is required. The '-' option is used to remove ^M from all newlines found in the dos file. The '+' option is used to add ^M to every newline found in a *nix file. input file Fully delineated path to the input file. As this program is used in the dos environment as well, standard input is not used. output file Fully delineated path to the output file. As this program is used in the dos environment as well, standart output is not used. SEE ALSO
seesat5(1), seesat5(7), SEESAT5.INI(5), tle(5) BUGS
Cr is not an inteligent program. It methodicaly replaces/removes the offending character when it finds it in the correct context. Newline sequences found in contexts other than 'newline' will be replaced/removed just like those found in the proper context. Passing a binary file through cr is not advised, for this reason. Send all inqueries to Dale Scheetz <dwarf@polaris.net>. Debian Linux 2 April 96 cr(1)
All times are GMT -4. The time now is 01:09 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy