moin, moin,
One of the advantages of m$ is that not every box can be a server, which
limits what can be done and also limits the services it can offer. Does that
really make it any more secure?
Last time I was working with a group of NT admins was when back-orifice came
out for win2k and was Open Sourced. At the time back-orifice was the best
remote admin tool for an m$ box available. If it could get a workstation it
would own the PDC. I think it worked for all flavors of m$.
Most m$ boxen, however, don't have a PDC and most are using a weak OS like
95 or 98. I would think a little C would make it possible to launch a
network attack, though. Is that correct?
Linux, OTOH, is definitely a powerful beast even if you've toned it down.
Easy enough to add stuff again: apt-get install ... :).
The real issue here is that we need to help those who are adminning machines
to make sure they've got security updates installed. Real easy to do with
debian. I've got a cron and a couple of lines of shell script that handles
most of it automagically. Gets *only* security updates.
Doing the same with others dists, in my experience, sucks. Mandrake might be
there with urpmi. RedHat might have it, but you have to pay for it. Security
updates should be *free*, as in beer! I don't care who the vendor is. Will
sun ever go there? I doubt it :(. m$? Not as long as they can charge for it
:(. There should also be a way to separate security updates from improvements
and other cruft.
Actually, I want to start pushing debian to categorize their security
updates: remote exploit, local exploit, physical exploit. Each of those
categories should list root or user access. An example is lilo updates. I
really don't care. If someone's in my house I have a bigger problem than
worrying about whether or not he knows more about Linux than I :). JLF
probably sees that differently :).
cioa,
der.hans
--
#
der.hans@LuftHans.com home.pages.de/~lufthans/
www.Aligo.com
# A t-shirt a day keeps the noose (tie) away. - der.hans