[Ti] Understanding security threats(was Re: Intel Mac Mini?)
Chris Olson
chris.olson at astcomm.net
Thu Mar 2 05:55:13 PST 2006
On Mar 2, 2006, at 12:36 AM, Lists wrote:
> But if that's the way he wants to play, then that's what he'll do.
> Meanwhile I'll do the things that I believe safeguard me, including
> running regular backups.
Thank you Mr. Lists.
George Ou, the ultimate Windows fanboy over at ZDNet, likes to point
this out all the time:
http://blogs.zdnet.com/Ou/?p=165
George is right about one thing; they just haven't gotten exploited
on the Mac. The types of vulnerabilities that affect the Mac (buffer
overflows, privilege escalation, etc.), are the serious kind where
one day you'll find your machine with the Opener rootkit installed in
it.
Mac OS X is comprised of many open source components like Apache,
PHP, tnftpd, etc.. If you look at the open source camps (Linux,
FreeBSD, etc.) where these open source components are developed
you'll see that FreeBSD, for instance, patches vulnerabilities in PHP
sometimes SIX MONTHS before Apple rolls a patch into one big Security
Update. Security Update 2006-001 fixed 20 different security holes
in Mac OS X. Some of them have existed for MONTHS that were patched
in Linux and BSD systems long ago.
--
Chris
-------------------------
PGP Key: http://astcomm.net/~chris/PGP_Public_Key/
-------------------------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://listserver.themacintoshguy.com/pipermail/titanium/attachments/20060302/d34401a3/attachment-0001.html
More information about the Titanium
mailing list