Language Selection

English French German Italian Portuguese Spanish

Linux is Spoiling Me!!

Filed under
Linux
Microsoft

After reading an article about how tests have shown that antivirus solutions, in spite of their struggle to keep Windows systems protected, have fallen behind malware threats (MS Security Essentials among these)--and one company has actually fallen prey of hackers itself--, I realized that Linux is spoiling me.

Really, just about 18 months ago, such news would have caused a state of crisis followed by a detailed investigation of all possible AV solutions, even if mine was among the best rated.

Today, I just grin at the news because I don't even have an antivirus installed.

rest here




re: Spoiling me

Everytime I read one of these Windows is a malware magnet articles, I wonder WTF?

Are those people exceptionally unlucky? Are they running a pirated version of Windows OS so that it can't be updated? Are they too stupid to download one of several FREE anti-virus apps (4 of the free ones rank EXCELLENT in the test they quote). Is it just FUD from Linux Fanboys? Or what?

it's a combination

of ignorant (meaning they just don't know) and idiocy (they don't care to know or do anything about it it when they do).

I can set up a Windows machine from the start with anti-virus apps and other security tools as well as best practices and hardly ever have a problem with malware.

At the same time, I am awash and surrounded by countless, seemingly hundreds of people who fall into one of the two previously mentioned categories with endless and continuous tales of woe. Most of them pertaining to not using the tools and best practices.

Based on my own experience of repairing and maintaining windows systems over the past 15 years, I have no doubt in my mind that MS ships crippled systems to facilitate the the survival of their more lucrative business of licensing access to the source code and software to the many cottage industry players that provide 3rd party devices, software and services built around Windows.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Android Leftovers

Tidelift Backed by Former Red Hat Chairman and CEO Matthew Szulik

  • Open source startup Tidelift snags $15 mln Series A
    Boston-based Tidelift, an open source startup, has secured $15 million in Series A funding. General Catalyst, Foundry Group and former Red Hat Chairman and CEO Matthew Szulik led the round. In conjunction with the funding, Larry Bohn, managing director at General Catalyst, Ryan McIntyre, co-founder and managing director at Foundry Group and Szulik have all joined Tidelift’s board of directors.
  • Tidelift raises $15M to find paying gigs for open-source developers maintaining key projects
    Tidelift wants to give open-source developers a way to earn some money for contributing to important open-source projects and while helping the companies that are using those projects in key parts of their business, and it just raised $15 million to build those connections. General Catalyst, Foundry Group, and former Red Hat CEO Matthew Szulik co-led the Series A founding round into the Boston-based startup, the first time the 17-person company has taken financing, said Donald Fischer, co-founder and CEO of Tidelift. The other co-founders — Havoc Pennington, Jeremy Katz, and Luis Villa — share a wealth of open-source experience across companies like Red Hat and organizations like The Wikimedia Foundation and the Mozilla Foundation.
  • Tidelift Raises $15M Series A To Make Open Source Work Better--For Everyone

today's howto

Linux and CPU Security

  • 22 essential security commands for Linux
    There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.
  • CVE-2018-3639: Spectre Variant 4 Vulnerability Affects the Linux Kernel
    A Spectre variant 4 vulnerability has been identified in the Linux kernel and represents a very dangerous threat to all affected machines. All system administrators are urged to apply the latest updates as soon as possible to mitigate any possible impact.
  • Spectre Number 4, STEP RIGHT UP!
    In the continuing saga of Meltdown and Spectre (tl;dr: G4/7400, G3 and likely earlier 60x PowerPCs don't seem vulnerable at all; G4/7450 and G5 are so far affected by Spectre while Meltdown has not been confirmed, but IBM documentation implies "big" POWER4 and up are vulnerable to both) is now Spectre variant 4. In this variant, the fundamental issue of getting the CPU to speculatively execute code it mistakenly predicts will be executed and observing the effects on cache timing is still present, but here the trick has to do with executing a downstream memory load operation speculatively before other store operations that the load does not depend on. If the CPU is convinced to speculatively execute down this victim path incorrectly, it will revert the stores and the register load when the mispredict is discovered, but the loaded address will remain in the L1 cache and be observable through means similar to those in other Spectre-type attacks.