[Ti] Understanding security threats(was Re: Intel Mac Mini?)

Chris Olson chris.olson at astcomm.net
Thu Mar 2 05:55:13 PST 2006

On Mar 2, 2006, at 12:36 AM, Lists wrote:

> But if that's the way he wants to play, then that's what he'll do.   
> Meanwhile I'll do the things that I believe safeguard me, including  
> running regular backups.

Thank you Mr. Lists.

George Ou, the ultimate Windows fanboy over at ZDNet, likes to point  
this out all the time:

George is right about one thing; they just haven't gotten exploited  
on the Mac.  The types of vulnerabilities that affect the Mac (buffer  
overflows, privilege escalation, etc.), are the serious kind where  
one day you'll find your machine with the Opener rootkit installed in  

Mac OS X is comprised of many open source components like Apache,  
PHP, tnftpd, etc..  If you look at the open source camps (Linux,  
FreeBSD, etc.) where these open source components are developed  
you'll see that FreeBSD, for instance, patches vulnerabilities in PHP  
sometimes SIX MONTHS before Apple rolls a patch into one big Security  
Update.  Security Update 2006-001 fixed 20 different security holes  
in Mac OS X.  Some of them have existed for MONTHS that were patched  
in Linux and BSD systems long ago.

PGP Key:  http://astcomm.net/~chris/PGP_Public_Key/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listserver.themacintoshguy.com/pipermail/titanium/attachments/20060302/d34401a3/attachment-0001.html

More information about the Titanium mailing list