Sponsored Content
Top Forums UNIX for Advanced & Expert Users Unix more secure than windows Post 302461114 by Corona688 on Friday 8th of October 2010 02:27:22 PM
Old 10-08-2010
Quote:
Originally Posted by methyl
@remi75
A bit naive.

There are unix and Linux trojans, viruses and exploits in the wild but in general an unprotected non-Microsoft server can survive longer on the Internet before being hacked because of the sheer volume of robohackers etc. targetting Microsoft platforms. The threat to unix and Linux systems is real.
There's of course threats to UNIX systems, but they're hardly the same as the threat to Windows ones. Windows exploits are frequently administrator-or-bust and user-oriented -- most Windows systems aren't servers hence can't be logged into remotely, but need (or at least have) administrator to run, making security quite all-or-nothing. UNIX systems can usually be logged into remotely(even a restricted login can still function as part of a botnet) or induced to do things via web requests, hence much more effort put into dictionary attacks, poking application-level software, or even user-level software -- i.e. not exploiting the kernel or even a daemon, but a common and poorly-programmed PHP script...
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

how can i secure the unix box?

i am new to the unix i am running solaris 9 i like it better than windows... anyway i am looking on how can i secure the box in terms of software any freedownloads would be a plus as well.... also what commands will be useful to see if there has been a security breech on the unix box? ... (1 Reply)
Discussion started by: rmuhammad
1 Replies

2. Shell Programming and Scripting

title bar manipulation in F-Secure SSH Client for Windows

Hello All, I was wondering if the titlebar in "F-Secure SSH Client for Windows" is changeable. Currently I see the host name in the title bar. I would like to add "user@host" to the title. So when I log on to a particular box and do a ssh to another box the title should dynamically... (3 Replies)
Discussion started by: ssikhar
3 Replies

3. UNIX for Dummies Questions & Answers

how unix called as secure

hi .. This is sanjeev , new at the world of unix , i want to know why unix/linux is called as secure ? as i am new , please suggest me what os i should use ? i am having laptop of 256 ram . thanks in advance regards sanjeev (5 Replies)
Discussion started by: sanjeev1
5 Replies

4. AIX

How to use SSH Secure File Transfer tool from windows to AIX without password?

If I use SSh Secure File Transfer tool on Windows, I want to transfer file from windows to AIX without password, how to do it? (6 Replies)
Discussion started by: rainbow_bean
6 Replies

5. Shell Programming and Scripting

Transfer files from linux server to windows using secure ftp (sftp)

HI, I have to transfer files from linux server to windows using secure ftp (sftp) .Kindly help me out. (3 Replies)
Discussion started by: manushi88
3 Replies

6. Cybersecurity

Secure Laptop composition with UNIX/Linux and Windows 7

Hello I have a problem: want to build secure laptop for simple user ( that's me :D ) with the VPN and virtualization. Laptop would be for work at home and travel , so security for wirelles networks and comfort using Mobile 3G internet with dongle (not to have problem with drivers) is also... (1 Reply)
Discussion started by: edgkkk
1 Replies

7. UNIX for Advanced & Expert Users

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (0 Replies)
Discussion started by: dhrajj
0 Replies

8. Linux

Issues with passwordless sftp2 from windows to Linux using F-Secure SSH Client

Hi, I am facing problems whie trying to do a passwordless ssh to Unix box from windows. Public key was generated using F-secure. When the F-secure client attempts it connects without password but when I try to use sftp2 in command line it prompts for password. I have tried several options and... (3 Replies)
Discussion started by: dhrajj
3 Replies

9. Programming

Secure FTP from Windows to UNIX

Looking for a way to secure ftp files from Windows to Unix through batch script. This may not be related to Unix/Linux environment, but hoping some solution. Our desktop (Win 7) does not have sftp installed in our machine (DOS-Command Window). We have SSH tools like Winscp, PSFTP (PuTTY),... (4 Replies)
Discussion started by: bobbygsk
4 Replies
bsod(6x)                                                        XScreenSaver manual                                                       bsod(6x)

NAME
bsod - Blue Screen of Death emulator SYNOPSIS
bsod [-display host:display.screen] [-foreground color] [-background color] [-window] [-root] [-mono] [-install] [-visual visual] [-delay seconds] [-fps] DESCRIPTION
The bsod program is the finest in personal computer emulation. bsod steps through a set of screens, each one a recreation of a different failure mode of an operating system. Systems depicted include Windows 3.1, Windows 95, Windows NT, MS-DOS, AmigaDOS 1.3, Linux, SCO UNIX, BSD UNIX, HPUX, Solaris, Tru64, VMS, HVX/GCOS6, IBM OS/390, OS/2, MacOS (MacsBug, Bomb, Sad Mac, and OSX), Atari ST, Apple ][+, and NCD X Terminals. OPTIONS
bsod accepts the following options: -window Draw on a newly-created window. This is the default. -root Draw on the root window. -mono If on a color display, pretend we're on a monochrome display. -install Install a private colormap for the window. -visual visual Specify which visual to use. Legal values are the name of a visual class, or the id number (decimal or hex) of a specific visual. -delay delay The delay between displaying one crash and another. -only which Tell it to run only one mode, e.g., -only HPUX. -fps Display the current frame rate and CPU load. ENVIRONMENT
DISPLAY to get the default host and display number. XENVIRONMENT to get the name of a resource file that overrides the global resources stored in the RESOURCE_MANAGER property. X RESOURCES
Notable X resources supported include the following, which control which hacks are displayed and which aren't. doWindows, doNT, doWin2K, doAmiga, doMac, doMac1, doMacsBug, doMacX, doSCO, doAtari, doBSD, doLinux, doSparcLinux, doHPPALinux, doBlitDamage, doSolaris, doHPUX, doApple2, doOS390, doTru64, doVMS, doMSDOS, doOS2, doHVX, and doATM. Each of these is a Boolean resource, they all default to true, except for doAtari, doBSD, doSparcLinux, and doHPPALinux, which are turned off by default, because they're really not all that interesting looking unless you're a fan of those systems. There are command-line options for all of these: e.g., -bsd, -no-bsd. (Also note the -only option.) BUGS
Unlike the systems being simulated, bsod does not require a reboot after running. SEE ALSO
X(1), xscreensaver(1), http://www.microsoft.com/, http://www.apple.com/, http://www.sco.com/, http://www.kernel.org/, and http://www.amiga.de/. TRADEMARKS
Microsoft Windows, Microsoft Windows 95, and Microsoft Windows NT are all registered trademarks of Microsoft Corporation. Apple Macintosh is a registered trademark of Apple Computer. Amiga is a registered trademark of Amiga International, Inc. Atari ST is probably a trade- mark, too, but it's hard to tell who owns it. Linux is a registered trademark of Linus Torvalds, but it isn't his fault. OS/2 is a regis- tered trademark of International Business Machines Corporation. COPYRIGHT
Copyright (C) 1998-2003 by Jamie Zawinski. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. No representations are made about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. No animals were harmed during the testing of these simula- tions. Always mount a scratch monkey. AUTHOR
Concept cribbed from Stephen Martin <smartin@mks.com>. This version is by Jamie Zawinski <jwz@jwz.org>, with contributions from many oth- ers. X Version 11 5.15 (28-Sep-2011) bsod(6x)
All times are GMT -4. The time now is 01:29 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy