DHS and M$
tom marinis
tmarinis99
Mon May 17 11:49:33 PDT 2004
--- Joel Hammer <Joel at hammershome.com> wrote:
> On Sat, Jul 19, 2003 at 06:57:17AM -0500, David A. Bandel
> wrote:
>
> > did I miss anything?
>
> Yes, you did. The IS professionals they are going to hire
> don't know squat
> about anything but windows. Thus, they will need to buy MS
> boxes with everything
> pretty much set up for them.
Actually, in David's own subtle way, he said just that...
> Besides, Homeland Security is about making America safer,
> which means
> protecting the American economy, which means MS$ Uber Alles.
Which was my original point at general at linux-sxs.org,
condensed considerably...
> And, if Homeland Security went with linux, every hacker in the
> Middle
> East would be trying to hack into their computers, and they
> would have
> the source code to help them. With windows, I suspect that
> only a handful
> of trusted friends (Russia, Israel, France, China, and a few
> others),
> have the windows source code. And, they likely don't want to
> advertise
> it and therefore won't bother hacking around with Homeland
> Security,
> which isn't directed against them, anyway.
Uhm, sorry Joel.
Bullshit.
I may see a new trend that MS might demand H.S. to go with,
but I don't see this kind of thing being able to happen
at all with Open Source.
Since when has Unix gotten over 75,000+ viruses
to protect itself from, have remote system back doors and
other garbage letting in all the goofs on the internet?
Even though Unix is around 15 years older, MS Windows and
Dos are afflicted by at least 3 new viruses every day.
{ Symantec gave that estimate on their newest Anti-Virus
Software products last year. I hear it now may be going
higher. }
>From what I've heard, seen, read, Linux and most of the
other Unix-like systems out there, although suseptable to
worms, I'm unaware of the more than 3 to 5 viruses that
the community is aware of currently for the Linux/UNIX OS.
If someone does write a virus for Linux, don't you think
someone, somewhere, would eventually find out who wrote it, and
find out something is wrong with that file or program?
Don't you think, when he's found out, that this guy's email,
website, ftp-site would be written up and in the future flagged
for all others to know?
Unless this guy is a real dumbass, and accidentally
incorporated this so-called virus into a program that he was
developing, that he's gonna get black-listed by the community?
Oh, it's been tried, but the virus or a corrupted file
doesn't get or spread very far. Case in point;
OpenBSD's ftpsite in Alberta got broken into last year, and
someone fooled around with the latest OpenSSH package at the
time.
A simple check of the MD5 checksum proved the file at the
site did not match the file that was already checked.
Theo went quickly through the source, and the source from
the FTP site was proved that it was a hacked version. Let's
just say for the next 4 hours the 15 messages from Theo to the
misc at openbsd.org were, shall we say, quite blue....
Round trip time, 6 hour after a person posted was the
the program later replaced.
3 people that I know of that were on the misc at openbsd.org
mailing list ( which I'm also a member of ) admitted that
they had downloaded the offending program, and installed it.
All 3 people performed re-installs.
Theo never found out from where, but he give the
University of Calgary's System Admin a tongue lashing
for letting a student change something group permissions
at the ftp site.
Just try to get something like that turn around time from MS
on a defective piece of software.
So, I'm sorry Joel, that's a MS story about the
source code for the kernel being abused by those
people from the middle east.
__________________________________
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com
More information about the Linux-users
mailing list