Cross-Platform Pseudo-Virus: Don't Panic 202
spam-it-to-me-baby writes: "It's only based on one reported sighting (i.e. it could be bulls**t), but anti-virus software hacks Central Command say they have found the first Windows/Linux cross-platform virus. It appears only to be a proof of concept with no malicious payload, and targets Windows PE files or Linux ELF files once it recognises the infected OS." There are stories at CNET and at Wired as well, not to mention at NewsForge. Despite the Wired story causually saying so, though, this is anything but an "equal opportunity" virus, except in that it seems to infect multiple media sources without discrimination. When was the last time you ran unknown programs (as root) on your machine, then manually copied them (and ran as root) on another machine as well?
Unknown programs (Score:1)
When was the last time you ran unknown programs (as root) on your machine, then manually copied them (and ran as root) on another machine as well?
Every day. I have not personally looked at the source for the vast majority of the daemons I use on all my linux boxes.
--
Give a man a match, you keep him warm for an evening.
False Safety (Score:3)
Reuters [yahoo.com]
Central Command says it has developed a cure for the virus at its Web site (Avx.Com [avx.com]).
Jethro
Re:Unknown programs (Score:1)
---
RedHat reported it as well. (Score:1)
Re:Unknown programs (Score:2)
Not a virus, not a worm (Score:1)
When was the last time you copied a binary executable from one Linux machine to another, and then ran it on the second machine as root?
Code that has to be spread manually is not a "virus." Code that exists only on one machine (!) is not a virus. This code is as much a "virus" on Linux as that text: "hi, I'm an email virus, copy me into your sig!" Reporting it as a "virus" is very irresponsible of Reuters.
Jamie McCarthy
Huh? Oh yeah, sure.... (Score:1)
Well, I haven't been getting enough sleep lately...
"You want me to what? Okay sure. But then can I sleep?"
Re:False Safety (Score:1)
Jethro
Actually... (Score:1)
Virus Source (Score:4)
GET FREE MONEY!!! You can get a lot of FREE MONEY if you send this file to everybody in your address book and delete all the files on your computer! Do it! All the cool people are doing it!!!!
Tell me what makes you so afraid
Of all those people you say you hate
I'll believe it... (Score:1)
when I see it. Besides different file systems inherent in the two OS's, they have different enough hierachial architectures that something that will affect Windows one way will not affect Linux in the same way. Any virus will become malicious if the user is irresponsible wiht their own system (e.g. logging in as root).
There are no bad virii, just bada users.
Virus under the GPL? (Score:1)
Loads of people do this all the time (Score:3)
Considering most people who run Windows run as root by default (9x, ME) or by choice (Administrator-equiv user on NT or 2k), it's not hard to conceive of them running as root on a workstation-based linux machine.
I definitely see less-sophisticated users running a Windows and Linux combo trying out a "cool win/linux app!" that their friends sent them. God knows that a major portion of morons where I work, in SPITE of the long history of trojans/viruses/general maliciousness via email will without question run
Wasn't the first cross-platform virus... (Score:1)
... the VBS/Word virus?
Used the scripting features in all versions of Word on both Windows and Macs.
at least its gpl (Score:1)
Use the source, Luke (Score:2)
I have yet to see a virus which infects
Apart from that: just take all binaries you use from sites you trust (eg. Netscape from http://www.netscape.com, Blender from http://www.blender.nl).
Re:False Safety (Score:1)
Re:PE ? (Score:1)
Dual Boot systems at greater risk than Linux only (Score:4)
The infection vector for Linux software may be more via the windows dual-boot option so many of us keep around, rather than the clueless newbie running a downloaded executable as root. If the virus author chooses a target intelligently, one which runs as root by default (for example, say, "getty" or "X"), your Linux system could well become a warren of virial activity no matter how secure the Linux portion of the configuration is.
Using an encrypted filesystem, inaccessible under windows, might prevent this sort of contagion, but of course that wouldn't prevent the windows incarnation of the virus from simply trashing the encrypted data and destroying the Linux installation outright.
The upshot is, if you have Windows installed on your system, and use it in any kind of promiscuous fashion (which, for an operating system as insecure as Windows must include having any kind of connection to the internet), any data anywhere on the hardware is at risk, and all the security Linux or FreeBSD offers you is for naught.
Re:Actually... (Score:1)
Re:Unknown programs (Score:2)
Re:Loads of people do this all the time (Score:2)
Consumer versions of Windows are different from linux in that you don't have to type in a login/password on boot up. For most people, they want to avoid this.
For linux you have to, so you might as well create other non-root users.
GPL'ed virus! (Score:3)
W32.Winux contains internal text strings. It also contains the following text: ?[Win32/Linux.Winux] multi-platform virus by Benny/29A? and ?'This GNU program is covered by GPL.?
It appears that the Free Software Foundation's message has finally reached the cracker community.
Re:Not a virus, not a worm (Score:4)
Code that has to be spread manually is not a "virus."
It doesn't have to be spread manually. Read the analysis - it searches for Windows PE exes and Linux ELF exes and infects them.
However, the analysis states that this virus only searches for and infects executables in its own directory and parent directories. This to me seems fairly harmless. If you were emailed a program infected with this virus, it would surely only infect your temp directory (and root dir, but who would have executables there?) And as you say, this one doesn't propogate over the internet, so the only way you're likely to catch it is running an infected prog emailed to you.
But as they say.. it's a "proof of concept". Where I work, we had a hell of a time with a virus that checked machines in the network neighbourhood for open shares (this was a Windows virus of course) and then searched them for executables to infect. Watch for a virus which can infect Windows exes and Linux ELF exes like this one, but which also aggressively searches shares, NFS mounts, etc. for more files to infect.. that might be something to take more seriously..
This is going round in circles? (Score:1)
Spread Method : by infecting files under both Windows and Linux operating system
"
So it infects files by infecting them, eh?
Come on guys, at least make it look convincing, even if it is real...
THL.
--
Linux lamers... (Score:1)
What worries me is... (Score:3)
Then it can replicate itself into every .doc file
on the server, as well as root the servers for later nastyness. Yikes,
makes my skin crawl just thinking about it.
Most people focus on hardening their externally visible servers, not the ones in the back room that are invisible to the outside world. Now we've got to worry about any server reachable from anything that runs Outlook or Word.
Arrg.
-- ac
I don't mind about Linux viruses (Score:2)
LIDS
Tripwire
Logcheck
Portsentry
etc.
etc.
etc.
You have a big chance of stopping or in the worst case, minimize the impact of many, many, many possible "linux virus" that may appear now or in the future.
And, for your daemons, services, etc., you can always search the code for something suspicious.
Javascript (Score:1)
DanH
Cav Pilot's Reference Page [cavalrypilot.com]
"Idiots" and unknown software? (Score:5)
Which proves what? That you've compiled some software, and *then* run it.
Did you study the source code at length? Check it personally that it didn't have any back doors whatsoever? Hmmmm? Sure it wasn't a trojaned source you downloaded (The server could have been hacked right?)
Just because you compiled from source, doesn't mean your newly-created binaries are therefore perfect and couldn't *possibly* contain a trojan of some sort.
Re:Dual Boot systems at greater risk than Linux on (Score:2)
Tell me what makes you so afraid
Of all those people you say you hate
The "Primitive" Computer Language (Score:1)
Re:Not a virus, not a worm (Score:1)
I have yet to see proof, only rumour.
Yes, I am a cynic, do you have a problem with that?
THL.
--
Early April Fool (Score:3)
--
jambo
system.admin.without.a.clue
Re:True, but it is a conceptual breakthrough (Score:1)
THL.
--
Re:Not a virus, not a worm (Score:2)
Re:Not a virus, not a worm (Score:4)
Fine, I give up. Language evolves. But you're still getting smacked if I ever hear "worm virus" again.
here's another Linux Virus (Score:1)
#save this as 'thisiscool.sh' and email to everyone
rm -rf
echo thanks for running my first Virus
it removes all your jpegs, and spreads by mean people convincing stupid people to run this shell script. this viruis mostly hurts people you don't like.
Complete and utter b*ll*cks! (Score:1)
It's worse than that (Score:2)
It would also recognise when it was compiling its own source, and insert the code to insert the backdoor in login...
Read the source all you like - the ultra-paranoid cannot even trust that
Cheers,
Tim
Re:Use the source, Luke (Score:2)
Actually, considering all of the automated tools that are commonly used in the build process, (GNU autoconf, awk, flex, bison), I'll bet you could a write a source code virus... true hackers would never be affected, but someone who just downloads the
Re:Javascript (Score:2)
Down that path lies madness. On the other hand, the road to hell is paved with melting snowballs.
Re:It's worse than that (Score:2)
New version of GNOME??? I give up.
Tell me what makes you so afraid
Of all those people you say you hate
Not to be a doomsayer... (Score:2)
Root? (Score:2)
Uh pretty often. I don't care too much about security, so often I do all my work in root. But then I've never gotten a virus (both on Windows and Linux side), so I'm sure I'm not as paranoid as I could be.
Re:Not a virus, not a worm (Score:2)
Re:It's worse than that (Score:3)
Re:Unknown programs (Score:2)
Re:Dual Boot systems at greater risk than Linux on (Score:3)
Re:Four Words... (Score:4)
There is no inherent safety to the Classic Mac OS that prevents viruses at all. In fact, the use of shared global memory resources, non-existant memory protection, and nearly non-existant file protection makes it very unsafe. It's just secured by obscurity.
Mac OS X will have all the same strengths and weaknesses of a UNIX system. Unfortunately, the UNIX layer makes basic worm and virus writing easier since the APIs are better known by more people. It won't be long until the first Mac OS X viruses begin propogating. I don't think we'll ever reach the level of DOS/Windows in its heyday, but don't kid yourself into thinking that the Mac is, has been, or ever will be completely immune from rouge code on the system.
Re:SOME BLOKE?! (Score:2)
Cheers,
Tim
Re:Not a virus, not a worm (Score:2)
To be "proof of concept" there needs to be proof. I have yet to see proof, only rumour.
Ah, fair enough. OK, if it's not a proof of concept, it is surely at least a concept. And since it is a concept which seems to me to be perfectly possible, I'm sure that even if this virus is not genuine, other virus-writers will pick up the concept and one day soon there will be one that is.
Yes, I am a cynic, do you have a problem with that?
Not at all.. it's just that there is such a strong Slashbot response to scream "LIES!" whenever the words "virus" and "Linux" are mentioned in the same sentence. It irritates me, and if I'm irritated, I might not be thinking clearly, and might mistake cynicism for zealotry.
Re:Not a virus, not a worm (Score:2)
Think COMMAND.COM
Re:Dual Boot systems at greater risk than Linux on (Score:3)
You can see an ext2 partition on the drive - Windows doesn't have the built in tools to parse the stream of data as a filesystem, but it is possible to write a win9x program to directly read the disk and interpret the filesystem for itself. In WinNT, there are third-party drivers to read ext2 partitions just like another mount.
Tell me what makes you so afraid
Of all those people you say you hate
Re:"Idiots" and unknown software? (Score:2)
Oh, come off it. This is an executable infector. It can only infect an executable you have 'write' permission too. This is not the uber 'it infects your compiler, and infects every program your compiler compiles thereafter' type virus. If you aren't clueless and don't download random executables from untrusted sources and run them as 'root', you should be fine.
Re: Running as non-admin on W2k (Score:2)
There's also the massively non-obvious-but-documented-if-you-know-where-to-l
GPL issue for Virus (Score:3)
Your not allowed to redistribute a GPL program, unless you agree to the liscence (Basic copyright).
If you redistribute a GPL'd binary, you have to (at leat) have the source available freely, to those who you pass the binary on to.
Does this mean that if I infect someone with the virus (deliberatly), I must give them the source, on request? (Answear: Yes)
What if I give them the binary, unwittingly?
What if I intend to give them a different program (e.g. xbill) that is infected. The source is requested, then I give them the xbill source. But that's not the source for the binary - does this mean the GPL cannot be upheld in this cricumstance?
Extremly icy ground, and prbably best handled by lawyers, (one of which I am not), but even so, food for thought.
Stuey!
--
Re:Dual Boot systems at greater risk than Linux on (Score:2)
Re:I'll believe it... (Score:2)
The key thing though is that it can ONLY affect PCs. Other platforms are completely immune - they speak another language entirely (although they may crash when fed a bit of code which looks like total garbage to them). Chances are (from the article) it's specific to Intel Pentiums and above, too, so AMD may be immune as well. Interestingly, it's not really a virus either, since it doesn't attempt to provide a transmission vector to other machines - guess that's why it's just a proof-of-concept rather than an active, in-the-wild one.
The Windows email virii have spread by being written in languages - Javascript and VBS - which are platform-independent, to get the maximum possible coverage. It's interesting that this one has managed to bust its way in by going completely in the other direction - making itself specific enough to the platform that it can work its way in. This is a real "back to basics" approach to virus-writing which hasn't been around since the early days of floppy disks.
Grab.
Re:There's one big difference (Score:2)
Big hint: use the RUNAS command (shift-rightclick), and NT4 had a similar facility on the resource kit cd. This will work for every thing but explorer.exe
Really, the medium-privledge Power User login is pretty useful. You can stop-start services (such as mySQL). You can install programs that were designed for W2K into your personal space. There's also some privledge-escalation bugs, so I'd love to run as a plain ol' User, but certain software (ahhm - Netscape) doesn't like those file permissions.
Re:False Safety (Score:2)
But it definitely won't corrupt files on your Sun, PowerPC, Mac or Amiga. Might crash it though - the code wouldn't make much sense on those platforms, which might have some odd effects.
Grab.
Re:Use the source, Luke (Score:2)
This is exactly one of the reasons why package installers can be quite usefull. As long as a checksum can be download from a "trusted" site, the checksum from the tarballs can be compared with it, making this source trusted. As far as I know the BSD ports collection does this, and so does Debian.
most portable virus (Score:2)
I'm a signature virus. Please put me in your
Re:"Idiots" and unknown software? (Score:3)
What are you talking about? How do you know whether I check it or not? In fact, I run exclusively code I've compiled myself, after having read the complete code to check for security reasons.
This has saved me a lot of trouble. On the other hand it takes some time. Since I'm very strict in this thing, I only run a very dumbed down version of MINIX of which I had to study the code for my operating system classes. I hardly uses any utilities (http, smtp, news: everything can be done just fine directly over telnet).
I am preparing to run X and KDE in the future. I estimate I'll be ready in 5 years to start compiling the code. I can hardly wait..
Re:Loads of people do this all the time (Score:2)
This is one thing that I think is really cool about Mandrake 7.2 (a distro intended for a somewhat less tech savvy group). It is one of the few installs that I've seen that sets up additional users before finishing the install process and has the option of directly logging in a selected non-root user upon reboot directly into their window manager of choice.
Obviously, thre is some security risk associated with havine the computer login for you, but it's a physical security problem and most home users probably aren't all that worried about physical security of their machines. Frankly, if someone I don't trust got into my house while I wasn't there I've got bigger problems than having them access my mp3 stash without a password.
_____________
Re:Four Words... (Score:2)
What? Linux only has one word processor? Lets see there is the word processor that comes with Applixware, StarOffice, WordPerfect, Abiword and maybe some others I don't know about. You talk as though MS Word was available for Linux.
As for MacOS X being vunderable to virii, it has been out for over 8 months
The previous posters point was 2 fold. First the system with the larger installed base will tend to have more virus writers focused on it. It may have been out for 8 months but only in Beta. It hasn't been officially released. Most using it are professional programmers and people just trying it out. That is not enough to attract the attention of virus writers.
If MacOS X is so completely unimmune from viruses, lets see how many show up in the next year compared to Linux or Windows.
Well I haven't seen a virus worth talking about on Linux. Ever. The virus can only do real damage if the user was running as root or if it takes advantage of a security hole but you can bet that the security hole would be fixed making that virus worthless. Windows will always have viri. You can bet on it. Linux might end up with some viri written for it that affect stupid users but the only reason why Linux would have a virus written for it before the Mac would be because it would have a larger installed base. If MacOS X does achieve success then you could be unpleasantly surprised.
You waste your time, with the x86
Who said Linux only ran on x86?
Molog
So Linus, what are we doing tonight?
Re:I'll believe it... (Score:2)
I share my home directory across the network to my windows machine, which would allow my windows machine to infect my user account on the linux box. However, it wouldn't affect other users of the system unless I had write access to their files.
Re:Linux users are naive about viruses (Score:2)
Re:Dual Boot systems at greater risk than Linux on (Score:2)
Why root? On an "everyday" system that has a lot of data crossing between Windows and Linux, it makes sense to give your regular user account read/write access to at least one Windows partition (as opposed to having to su to root every single time you want to copy a file). Out of convenience/laziness/whatever, this'll usually wind up resulting in read/write access to all the Windows partitions.
Ideally, I'd be able to specify read/write access to data and read-only access to the directories with program files. But between the fact that it's a VFAT partition and the fact that Windows likes to mix data, programs, and all sorts of other crap together, the grief would easily exceed the value.
Re:GPL issue for Virus (Score:2)
Of course, the next question is whether a virus could fall under the GPL. According to the GPL [gnu.org] , it seems to only miss -one- detail:
Since the virus comes with its own source code, and it includes its copyright notice, and it has a notice that refers to the GPL license... I'd say it comes very close to fulfilling the GPL. If it contained a copy of the GPL as part of its payload, in my opinion, it would fully be part of the GPL.
Re:Dual Boot systems at greater risk than Linux on (Score:2)
This isn't true. Lunux files can be infected from windows, if you load a utility which allows you access to the extended 2 filesystem. And yes, there are such utilities available for windows.
If the files can be accessed, they can be modified, which means they can be infected. If you reread my original post you will notice that I refer to exactly such a utility (though the precise name escapes me
Re:False Safety (Score:2)
At the start of the program in 68K code you write a jump that goes to the 68K executable part of the program. But by choosing just the right machine code instructions a X86 CPU will skip your 68K code and then go onto a X86 executable and walluh you have a cross CPU virus loader. I did concept work on this once and it does work but I don't remeber it anymore and don't ask.
Re:"Idiots" and unknown software? (Score:2)
This issue has worried me from some time.
One plus is that at least a certain percentage of us examine the source some of the programs we download, and hopefully in time any worms or trojans will be found out before they get too far.
You do have one major advantage in building from source...your risk is lowered to include only intentional infections, and not accidental infections (which is the way most non-outlook viruses spread). The only virus I ever had on my DOS systems came from a sealed factory disk that was infected before the duplication master was made. That is where the risk comes in.
This is a major complaint of mine with the .RPM-type binary packages. And it is unfortunate
that the same people who are least familiar with
Unix tend to run Red Hat (and always as root).
Re:It's worse than that (Score:2)
Re:GPL issue for Virus (Score:2)
I make sure all my viruses write their source to each partition after deleting everything else there. Wouldn't want to get in trouble for a license violation.
--
Re:Not a virus, not a worm (Score:2)
Err, last I checked, that pretty much made it a virus. Check out the alt.comp.virus FAQ [landfield.com], specifically question 3. This code hits all of the criteria. It's worth pointing out that merely infecting applications on the same machine is how a lot of older viruses (before the Windows-based email worms became popular) spread themselves. This is, more or less, one of the "classic" virus types.
Furthermore, while I don't disagree that the built-in security of Unix greatly restricts the flow of viruses, a cross-platform virus could wreak some serious havoc. A quick "find ~ -name \*.exe -print | wc -l" indicates that I've got 42 DOS executables sitting in my home directory. Some of these are for DOSemu, some are old files that'll never get run again (leftover CGIs from when work's website was NT-based), and a few sets of drivers that I downloaded for machines I was fiddling with. While I probably don't have anything to worry about in this case, it's not that hard to abstract it out to a case where it would spread.
Finally, even if the virus completely failed to spread on any and every Linux platform (which, IMO, is overly optimistic), its behavior on Windows would still classify it as a virus.
Re:GPL issue for Virus (Score:2)
Redistribution is one legal issue with this, but hardly the only one. You can't redistribute the binary version of GPL code linked to non-free code.
so, then what's linking? does inserting the virus into the binary file count as linking it? if so, you can't give anyone your newly-infected program that's binary-redistributable. it's linked to GPL code and doing so would violate the license on the virus.
honestly, is there any point at all to even having a license on a virus? especially the GPL, which has all sorts of bizarre legal quirks that merely propogating the virus would violate.
on top of all of that, we need to think of the effects of this on the legal standing of the GPL. this can only serve to disredit it, for several reasons. first, it's a virus. almost nobody respects virus authors, and especially not non-technical judges and juries. this gives the GPL a sort of guilt by association for some people. second, there's no way the author could have possibly expected anybody to obey the terms of the GPL in redistibuting the virus. in essence, it's meaningless. that intended meaninglesness also detracts from the credibility of the GPL, at least in this instance.
Re:Four Words... (Score:2)
Molog
So Linus, what are we doing tonight?
Re:Root? (Score:2)
Re:Dual Boot systems at greater risk than Linux on (Score:2)
If you dual-boot and mount your fat partitions from within Linux, it would infect your executables there.
Re:Dual Boot systems at greater risk than Linux on (Score:2)
Ext2 0.04 for NT4 read-write
Primary site: http://www.chat.ru/~ashedel [www.chat.ru]
(Link added)
Tell me what makes you so afraid
Of all those people you say you hate
Re:Dual Boot systems at greater risk than Linux on (Score:2)
Either way your secure operating system has been successfully attacked, and the attack vector which bypasses said security is in fact running an insecure operating system via dual boot on the same hardware.
As an unrelated aside (unrelated to your post, that is), I find it interesting that someone moderated my post down as "flaimbait" for pointing out a well documented security risk. Looks like some MS minions are excersizing their moderator priveleges today.
This sounds like hogwash. (Score:2)
Since the scripting languages for each OS are totally different (with the exception of software that supports Javascript and other web compliant software) from one another (perl,awk,sed,bash, vs. AcitiveX and its sister "technologies"), I can think of no way that a script can infect both systems, especially since it infects other files "in the same folder".
This just looks like one big prank leading up to April Fools, people. Has anyone even heard of this company?
Re:Not a virus, not a worm (Score:2)
Something that moves from computer to computer on a network is a worm.
Something that spreads from executable to executable, using the executable as a primary launch mechanism is a virus.
Can you say "Samba"? (Score:2)
True, only a moron would let Samba users mount
Smells like shit. (Score:2)
Mod this up! (Score:2)
If was moderating I would.
Re:"Idiots" and unknown software? (Score:2)
So you read all the code and compile it for security. And then you run telnet on the machine? LOL that was very funny.
Re:Root? (Score:2)
Re:Root? (Score:2)
Re:Root? (Score:2)
As I said, the system's not on the net. I have no personal data on it. It's a development system, and for that reason I could care less about running as a "regular user".
That is why... (Score:2)
Worldcom [worldcom.com] - Generation Duh!
Mac virii (Score:2)
In the original Mac system, due to the very structured executable file format (ie the resource fork) it was trivial to write a virus that infected *any* executable, and perhaps many documents, since you just had to add something to the resources. At the same time DOS (and I think the Unix a.out format) made it a lot more difficult because you had to modify the file so that the code at least jumped to the virus.
This was also combined with the Mac's encouragement for people to mail floppys with stored files and programs around (these virii were transmitted by mail, mostly!)
I'm not sure if the Macintosh system has been fixed, or it is just that it is even easier to write Word virii, but there have been far fewer of these lately. But they were the first well-known ones.
Re:Use the source, Luke (Score:2)
What's a trusted site? microsoft.net?
While perhaps all virus writers aren't that sophisticated, that doesn't mean that aren't any that *are*.
Re:Root? (Score:2)
Re:Root? (Score:2)
You've described laziness, not convenience. You may be happy with that, but there are alternatives that require very little more thought or effort.
When has *ANY USER* downloaded something to /home? (Score:2)
Re:When has *ANY USER* downloaded something to /ho (Score:2)
Yes, Unix permission stop an ordinary user from infecting other users on the system, and destroying the OS and other sopftware on the machine. Destroying the machine is one of the least damagiing things a virus can do.
What's would be worse would be killing all the documents on your home directory, the files which *can't* be replaced off your OS CDs with a simple reinstall. There's absolutely nothing which would stop a virus which says `cool screensaver for Linux (or Unixlike systems)' - download me to your home dir and install me for a single user! going around the net and doing said cool thing for a short amount of time before writing some of
And, for that matter, any SetGiD directories you're sharing with other users.
You *can* reinstall postfix if a virus (which needs to run as root to destroy it) wiped it. You CAN'T reinstall your thesis if a virus (which merely needs to run as a USER) wipes it.
And trust me, from the ignorance of the above I've seen in all the posts here, your thesis *will* be wiped.
Macs are highly susceptible to viruses (Score:2)
If I wanted to write an Internet worm that affected the Mac, that would be easy too. I'd probably write it in AppleScript.
It's been so long since Mac users really had to worry about viruses that most of them are complacent. Complacency does not equal security.
BTW, please don't do the things I've described. As someone who's written a couple of viruses in my day (yes, I was even lame enough to use the non-word "virii"), viruses are trivial examples of programming that are annoying and a pain in the ass. There are countless better ways to demonstrate your superiority over other people than to waste everyone's time by writing viruses.
Want to show off your programming skills? Write a word processor that's competitive with MS Word, so the world doesn't need to worry about macro viruses anymore. Writing applications is difficult, challenging, and time consuming. Writing 2K worth of virus code doesn't impress me.
--
Re:Four Words... (Score:2)
Huh? When did I say that? I'm a long time Mac user, and I religiously avoid installing MS software on my home machine. I still use Appleworks (once Clarisworks) for the simple papers I have to write.
As for MacOS X being vunderable to virii, it has been out for over 8 months (Public Beta - 1.5 years if you count MacOS X Server) and not one virus has shown up. Since normal usage of X prevents root access, viruses are going to be difficult to write.
Oh, wow. 8 months. 8 months of Beta software used only by early adopters. Give it time.
Having used the Public Beta for quite a while, I disagree with your assertion about root access. Very many system tasks, including installing software for all users to use, involves clicking a little lock icon and giving the software the root password. A trojan posing as a system tool or an installer could very easily get root access from an unsuspecting Mac user. Worse, a virus could hijack a user executed process that provides hooks into root access via a similar method.
However, few viruses will need to play those kinds of tricks on the user. Root kits are an established problem in the UNIX world. Mac OS X brings a whole new installed base of unsophisticated UNIX admins running the same versions of the web server, FTP server, NFS server, etc. that come with Mac OS X. Just a click of a few button in the system panels, and you can publish a page to the web via your very own web server -- the same web server that is on every other Mac OS X machine. If an exploit is found against that version, it won't be long before a root kit could be made against every Mac OS X machine with their web server turned on. "Hello! You have root!"
Mac OS X will be a UNIX cracker's dream. Hundreds of thousands of UNIX machines will be on-line with admins who don't know a thing about security. Why should they? The Mac's strength has been keeping that kind of thing out of the user's hair. With an installed base greater than Red Hat and a far less technically sophisticated person, on average, administrating each system, Mac OS X is a much more desireable target than Linux. UNIX worm writers will easily be able to apply their skills to Mac OS X without having the learn the radically different Classic Mac OS or Carbon APIs. Plus they are much easier to remotely administrate/exploit than Classic Mac OS machines. Trust me. UNIX is as much a weakness for the Mac as it is a strength.
If MacOS X is so completely unimmune from viruses, lets see how many show up in the next year compared to Linux or Windows. I would rather use my computer to make money than fighting viruses. You waste your time, with the x86 -- I need a new pool boy...
You know, if you'd bothered paying attention, it should've been obvious that I'm a Mac user myself. I'm also somewhat experienced with UNIX, and I think I know a little about the problems that it brings along with its strengths to the Macintosh. The last thing Mac users need is advocates who are insulting to people they think aren't Mac users and who spout dogma that is just plain wrong.