• Future Linux security POLL
    16 replies, posted
As Linux gets more and more popular it attract more and more hackers/exploiters. Based on the security settings in place now, do you think there will ever be a security exploit to attack Linux user's computers?
Of course. If linux were to become more mainstream, someone would exploit. Most security lies in being smart, though.
[QUOTE=snuwoods;25667718]Of course. If linux were to become more mainstream, someone would exploit. Most security lies in being smart, though.[/QUOTE] But I feel Linux is more protected, maybe it is a false sense of security, but I do think that because Linux distro groups are relatively small they could have a fix sooner than a corporation.
Any OS will have exploits. This includes major ones and small ones. Linux already had some pretty big exploits. These get fixed quickly tho. Unlike certain companies the Linux community doesn't play the "if they don't know about the exploits we're safe" game. When an exploit is found it is fixed.
Fortunately, since we're working with an open-source operating system, we can patch literally any exploit within a couple of hours. that's not to say that there isn't some old phantom virus deep in the source code that somebody committed 15 years ago, but I wouldn't call it likely.
[QUOTE=Boris-B;25668630]Any OS will have exploits. This includes major ones and small ones. Linux already had some pretty big exploits. These get fixed quickly tho. Unlike certain companies the Linux community doesn't play the "if they don't know about the exploits we're safe" game. When an exploit is found it is fixed.[/QUOTE] That's why I think the smaller development studios give the users faster response time, unlike Windows where you have to wait for a service pack or a patch that could take weeks or months.
We get exploits fairly regularly. It's actually easier to find exploits in open-source OSes because you can see the source. We can just patch them more quickly (as long as people stay up to date).
Is security a top priority to development studios, or is it over looked since what they have now is working?
Nothing like exploit-less program exists. There were already found numerous exploits before, but generally, there isn't that many of them, and they are patched within hours.
[QUOTE=toaster468;25668890]Is security a top priority to development studios, or is it over looked since what they have now is working?[/QUOTE] Usability is usually top, with security often falling at a close second.
maybe a mod should rename the poll "Will a serious Linux security exploit ever happen:"
Of course. Major exploits have happened before (though usually with third party software such as Apache).
There are a lot of security holes in Linux (most of them because of third-party software though, so..) But most of them are local user priviledge exploits (you already have a usable user on the system, and then use the exploit to gain access to root), so all you have to do is keep an eye on who you let on your system.
Most security lies in the stupidity of the users. If you insert an USB stick you don't know and run the autorun on it, you're dumb. If you install packages from somewhere else than the package manager, you should be careful. If you leave your laptop on unlocked in a public place and leave it, you're dumb.
what a fucking stupid poll
Everything has major security exploits. It's just that Linux tends to get fixed quicker than other OSes.
With Linux: -You have access to the source code, so there's no change that you are unable to code a fix. -Everyone has access to the source code, so anyone can come out with that fix. They're also free to share their fix. -Fixes usually come out quicker, and package management for every applications (almost) means you won't miss that fix. -Security is taken a lot more seriously as a whole in Linux, and the code quality is higher. It's harder to find holes, and it's not because the OS isn't used. Linux has a large server marketshare, where exploits matter a lot.
Sorry, you need to Log In to post a reply to this thread.