Joke Collection Website - Cold jokes - Why is Linux safer than Windows?
Why is Linux safer than Windows?
1) Under Windows, when the administrator user logs in, the virus can freely infect any file in the system; Ordinary users cannot modify system files under ubuntu.
There are many Windows users and researchers, many virus Trojans and many attacks. Attacking Windows end users has many commercial benefits, such as stealing qq numbers and bank transaction passwords. The more people who have interest-driven research, the more "achievements"; Linux is not popular at present, so there are few viruses.
Two: Trojan horse
be the same as the above
Three: rogue software
be the same as the above
Four: Common attacks and intrusions
Same as above, but it needs to be added that attackers usually attack from two directions:
A) end users, stealing personal information
B) servers can make huge profits at one time, such as attacking banks, IBM AIX/ HP -UX, etc. ubuntu is not counted at present, so it is very safe.
5. Differences in system design architecture
1.Win2k has no stack protection and is easy to overflow. /Win2k malloc attack is not strengthened. WinXP is slightly strengthened, but it is relatively easy; Win2003 has been strengthened a lot, and the attack is very difficult. Now, all chips have stack non-executable protection. XP sp2 and 2003 have already used this function, which will make overflow attacks difficult.
Many versions of Linux kernel after 2.2.6 turned on the stack protection function by default, while the 2.4 kernel had an unofficial PAX kernel patch a long time ago, which strengthened the attack on overflow attacks. It can be said that it has reached the standard of 2003, and the current version of kernel 2.6 has this function built in.
3. Big server chip+OS: SPARC+SOLAIC/PowerPC+AIX/PA+HP -UX, etc. In 9x, there is a stacked compulsory protection mechanism of chip+kernel.
4.4. The characteristics of the Linux file system itself, any folder or file has no owner, all groups and other users, and the permissions for reading, writing and executing can be set respectively, and great efforts have been made in the distribution and management of permissions, so it is difficult to endanger the security of key system files by logging in as an ordinary user. These are all functions that the file system of windows does not have. Compared with Windows, Unix permission mechanism is indeed an innate advantage, but the kernel of NT4 is VMS, which is also a branch of Unix, so the security mechanism is not weak in practical use.
The key is that its positioning is mainly used by a single user, and its positioning is different.
Six: open source
When hackers and engineers discover system vulnerabilities at the same time, windows closes the source code, while UBUNTU opens the source code. Hackers just take advantage of vulnerabilities, while engineers can fix vulnerabilities themselves in the case of open source, but they can only wait for patches in the case of closed source. UBUNTU open source has fans all over the world to fix the system, while windows can only wait for Microsoft to fix it.
Seven: Other suggestions about Ubuntu security.
1. Turn off all external services, such as ssh.
2. Open iptables so that only people who need to access you can connect to you.
When hackers and engineers discover system vulnerabilities at the same time, windows closes the source code, while UBUNTU opens the source code. Hackers only use vulnerabilities, and engineers can fix vulnerabilities themselves in the case of open source, but they can only wait for patches in the case of closed source. UBUNTU open source has fans all over the world to fix the system, while windows can only wait for Microsoft to fix it.
Most hackers (real hackers, not those who use Trojans to sabotage) are devoted to the research of operating systems and spare no effort to fix loopholes in operating systems. Although these people often have a bad impression on Windows, they are also willing to do something for Win. Of course, what they do more is to fix vulnerabilities for Unix/linux, so often once the vulnerabilities of linux systems are discovered, patches will be produced. As for Windows, if everything waits for the engineer to come, Guibo Qigong will come out, not to mention the shock wave and shock wave.
3. The real direct benefit is to attack a large number of individual users and large commercial machines to obtain data. The former is easier to implement, while the latter, as you can see, uses IBM AIX/HP-UX in finance, all of which are placed in the intranet, so it is difficult to be attacked. It is very difficult to attack public WEB servers and mail servers because they only open 1 external services. At this time, it is very difficult to attack this service, such as apache, the administrator will not install any software on it, and the attack methods are much less, so now the attacks are all turned to attack the client, and the client naturally casts a large net, so the target of the attack is turned to the windows user group.
- Previous article:A clean stream in online celebrity (a clean stream in online celebrity, Tik Tok)
- Next article:What is it like to be a funny person?
- Related articles
- Is it true that the Japanese subway is crowded with pregnancy?
- What is the state of Baby Zhang destroyed by rumors?
- Who were the stingy people in history?
- I have a dream joke since I was a child.
- My efforts are regarded as jokes by others. Why?
- In which episodes of all the Pleasant Goat and Big Big Wolf animations do the mechanical sheep appear?
- He was bravely chased by the goddess Gao Yuanyuan, and his charm is still over half a year old. Why is Zhang Yadong fascinating?
- I saw a foreign movie with dwarfs when I was a child. They come from a place and want to go back. How many children live in Barbie's house?
- A sad sentence worth reading: I have been by your side, but I have no time to walk into your heart.
- I don't know how to wait for him.