SANS/FBI Release Top 20 Security Vulnerabilities 268
theBraindonor writes "SANS Institute and the FBI have compiled a listing of the The Twenty Most Critical Internet Security Vulnerabilities. The list is broken down into two groups: Windows Systems and Unix Systems." The list of Unix vulnerabilities is also a list of the network programs I (and presumably many others) use most. It's a good thing there's BugTraq.
The number one vulnerability for Windows boxen is: (Score:4, Informative)
Not any particular 'sploit, but on the page, IIS is THE NUMBER ONE vulnerability for Windows boxen.
Like Mr. Valentine said, "[Microsoft's] products are not engineered for security". Or something like that.
--j
Re:The number one vulnerability for Windows boxen (Score:2)
Re:The number one vulnerability for Windows boxen (Score:2)
The number one vulnerability for Windows boxen is: (Score:2)
Re:The number one vulnerability for Windows boxen (Score:2)
Re:The number one vulnerability for Windows boxen (Score:3, Informative)
As to the submitter saying the vulnerable UNIX apps are basically a laundry list of apps he uses daily, that's too bad. Never once have I needed to put NFS, rlogin, or FTP into production. I was always taught that the "r" meant "raped".
#8 = Internet Explorer. (Score:5, Interesting)
If you are using IE, your computer is vunerable to numerous security breaches.
If this is installed on EVERY Windows computer by default, I believe that this should be rated higher than those vunerabilities in applications that are only installed by default on SOME Windows versions (IIS).
Re:#8 = Internet Explorer. (Score:2, Interesting)
Re:#8 = Internet Explorer. (Score:2)
Not in the sense people who talk about verifying means. Mozilla would probably take at least 1k man years to verify. If you don't understand what I mean, take a look at e.g. this [nec.com], which should give you an idea of what verifyable programming means.
Re:#8 = Internet Explorer. (Score:4, Insightful)
Yes. If you're not downloading security updates.
But the same is true for everything else on the list. Conversely, if you are constantly keeping up to date on security patches then you are considerably less vulnerable.
I believe the point you were trying to make is that it's the only client program on the list - all the others are servers. And I'm honestly surprised that neither Outlook nor Outlook Express made the list - they're considerably more problematic with regards to security IMO (but I'm not a "professional" in this context).
As to why it's not #1 - well, first there's a lot fewer vulnerabilities listed. Additionally the extent of the vulnerabilities are not as large. Relatively few virii/trojans/etc. spread via IE, while there are still IIS servers out there spamming the world with Code Red. Secondly, as a client program it is somewhat more secure than a server by design. I could be running a totally unpatched client that's vulnerable six ways to Sunday, but if I don't surf to your site (or open a local infected file with the client) then I can't be infected. Servers, however, are vulnerable if they're running - I don't have to invite you to break into my system, I left the door open with a lovely "Open House" sign up.
Re:#8 = Internet Explorer. (Score:5, Insightful)
Software vendors should be required to supply security patches in isolation, and WITHOUT ANY additional licensing requirements.
Re:#8 = Internet Explorer. QWZX (Score:2)
There has never been, to my knowledge, any clause in a security update for IE that changed the EULA in such a negative manner.
I wholly agree with flacco that such clauses in security updates are unacceptable.
Re:#8 = Internet Explorer. (Score:3, Interesting)
One thing to note is that keeping up with patches is not enough for securely using IE. Microsoft has had a bad track record for not providing a proper patch until the bug is fully exposed, so there are constantly windows where you are vulnerable. For example, there is presently a bug in the certificate software that allows a man-in-the-middle attack on an SSL connection, making the authentication useless (you are just as vulnerable to an attack with or without it). Because of this I wouldn't online bank with it.
Yet dispite this, Outlook has had a worse track record for security attacks in the wild. Many outlook vectored viruses have done things such as emailing random documents from your disk. It wouldn't take much to take these viruses and modify them to find and send Money or Quicken files to a foreign email address.
Re:#8 = Internet Explorer. (Score:2)
Very much agreed. Of course, if people would just stop disclosing vulnerabilities then it wouldn't be a problem. Right?
Yes, that was heavy sarcasm.
For example, there is presently a bug in the certificate software that allows a man-in-the-middle attack on an SSL connection
Been fixed, allegedly, under all supported browsers and OS's. I saw the patch for my system last time I did an update (and I'm doing another one tonight). And I'm pretty sure my system is near the bottom tier for support at this point.
there is little you can do from a system or procedural perspective beyond keeping up with patches
That's true for all systems on all OS's. Or is Slapper just a figment of the Internet's imagination?
Not even gonna touch Outlook. I use it at work under duress, and refuse to at home. Oh, and there's a new virus out there that's doing pretty much what you suggest - it's gathering private information (including keystrokes) and emailing the data back to some email address. It's using vulnerabilities that have been patched for over a year now, but, surprise, not everyone has updated.
Re:#8 = Internet Explorer. (Score:2)
>there is little you can do from a system or procedural perspective beyond keeping up with patches
That's true for all systems on all OS's. Or is Slapper just a figment of the Internet's imagination?
My comments were related to your discussion of how IE was the only client software on the list, and your surprise that Outlook didn't make the list. My comments followed a discussion of a configuration solution and procedural solution to the problem of Outlook viruses. I don't see why you would ask me if that statement is true for all systems on all OSes since I already provided a counter example. I don't see the relevance of Slapper, as, AFAIU, it infects server software.
Re:#8 = Internet Explorer. (Score:2, Interesting)
By default, every windows box has both available. I haven't tried it lately, but there have been times when uninstalling SMB from a windows box has been far more difficult than uninstalling IE. Furthermore, for the most part, IE needs to be used in order to compromise your system. Don't use it, and you're (somewhat) more safe. (Of course, there are a lot of MS applications that will happily use it for you, so you're still screwed...)
But, if you install NT, 2K, or XP, you've got null sessions available as soon as you boot the box, before you even touch the keyboard.
Reference SMBDie - QED.
Re:#8 = Internet Explorer. (Score:3, Informative)
True, but keep in mind that since Outlook/Outlook Express use IE to render HTML content, email is an attack vector for a lot of IE vulnerabilities. For example, check out the Technical Details sections of these [microsoft.com] two [microsoft.com] security bulletins. This is pretty significant, as "open[ing] a local infected file" becomes very easy for the average user to do without realizing it.
Re:#8 = Internet Explorer. (Score:5, Insightful)
Clientside security is still a joke. Clients get attention in the places where they "asynchronously" give up control to foreign command, like embedded scripts in email and virtual machines for things like Java. But the overwhelming majority of client code was designed assuming that it interacts in good faith with the rest of the world.
The flood of server-side vulnerabilities will slow. Desktop environments will get more and more homogenous. The payoff for writing a single exploit will grow. You should expect not only to see more client-targetting attacks, but also more attacks leveraging the ancient and festering weaknesses in global Internet routing and in DNS.
Consider that today, Internet routing is being subverted with some regularity to play pranks on IRC and to hijack address space for spamming. These are high-risk, low-reward enterprises. It's only a matter of time before smarter people figure out how to use the same tricks to more productive ends.
Re:#8 = Internet Explorer. (Score:2)
Yes. If you're not downloading security updates.
"2 October 2002: There are currently 20 unpatched vulnerabilities." [pivx.com] - tho it looks like that's counting a few that are patched in 6 but not 5.5, which is rather strange. I mean why would you keep 5.5 if you're patching everything?
Lather, rinse, repeat (Score:4, Informative)
And if memory serves, the Unix list is exactly the same, with perhaps the exception of Apache. The r* services, sendmail, yep, all still there. Who in their right mind uses r* and sendmail on anything connected to the public internet?
Anyone correct me on whether the others have changed? They all look familiar to me.
well if you really wanna know (Score:3, Informative)
http://www.sans.org/top20/top20_Oct01.htm is the list from 2001
http://www.sans.org/topten.htm is the list from 2000
Re:Lather, rinse, repeat (Score:3, Interesting)
OTOH, I wonder if next year Lindows will be on the list, with our favorite practice of running users as root.
Re:Lather, rinse, repeat (Score:4, Insightful)
Actually, as the article pointed out, sendmail hasn't had any serious problems in the past 2 years. Quite frankly, it's quite powerful and its default install is kinda simple to use except (except!) for that stupid map command to build virtual users, access tables and the likes.
It's not the end of the world if you use it, just like it's not the end of the world if you use proftpd.
Re:Lather, rinse, repeat (Score:2)
>install is kinda simple to use except (except!)
>for that stupid map command to build virtual
>users, access tables and the likes.
This doesn't have to be all that difficult either. Red Hat, for example, has the init script rebuild those files automatically for you when you run the init script. Just add the entries you need, and type:
Matt
Re:Lather, rinse, repeat (Score:2)
Re:Lather, rinse, repeat (Score:2)
Oops, that'll teach me to preview even simple posts. I of course meant:
makemap hash access <access
Re:Lather, rinse, repeat (Score:2, Interesting)
Why... (Score:3, Interesting)
Re:Why... (Score:2)
Everything below it (except maybe SSH - they should be tied for second, IMO) is either relatively uncommon or an old old old vulnerability.
Apache on Unix isn't +ACM-2 because it's bug-riddled doom-ware - it's because it's +ACo-comparitively+ACo- bad.
I'd take it as a mark of honor that the Unix world's second biggest vulnerability isn't that big of a vulnerability after all.
Re:Why... (Score:2)
now, granted it is EASIER to find vunerabilities in Apache, but the numbers (both CVE and number of servers than run Apache) are probably why it is rated so high.
Misconfiguration (Score:4, Insightful)
They're not saying that Apache is insecure but rather that it is a potential risk if the admin is not sufficiently competent.
Re:Misconfiguration (Score:3, Insightful)
"but rather that it is a potential risk if the admin is not sufficiently competent."
You see, if the admin is a groking wizard with luser hate-filled eyes, whatever box he installs will be Fort Knox, regardless of the OS.
Take your typical $36k/yr MCSE admin, and any system they setup will be like grated cheese.
It's called experience, savvy, knowledge, tenacity, and not a little geekiness. And it's worth money.
So, if you're a CIO and you don't want your company name to appear on the marketplace section of the Wall Street journal under the heading "Hacker steals 50,000 credit cards from..." then pay your good admins, even if they look like they're sleeping in meetings, even if their tie rotation schedule becomes glaringly apparent.
Security is like seatbelts. The instant you need it it's too late to put it on. You have to put it on before.
Good admins: When it looks like they are not doing anything, that when they've done everything right.
Oh, and that list for windows: If you didn't already know all of that by heart, there's no chance in hell you'd get anywhere near production servers at our company.
And now for something ot: There was a story a few days ago here about what would happen to the DNS system if the root servers for
Re:Why... (Score:2)
The other might be... well, it is a UNIX list, and it would be quite a hunt to find anything for UNIX that -is- quite as bad as IIS.
I'll tell you why (Score:2)
Obviously there is a large enough portion to support spammers, otherwise I'd not be getting so many requests for formail.pl in my logs (always set to email from some aol.com email address, most recently f2@aol.com, and sending to another fake address, most recently phishtank@yahoo.com, with a subject of my server name and a body of "w00t").
Re:Why... (Score:2)
Don't forget that entire waves of worms starting from Code Red were targetted solely at one single vulnerability (which was actually patched a couple of months before Code Red actually struck).
Re:Why... (Score:2)
Missed a couple of big ones (Score:5, Insightful)
But they seem to have really had to reach to get 10 for Unix.
Man... how much did this 'study' cost?
Re:Missed a couple of big ones (Score:2)
Almost all Exchange servers have Outlook. It's needed for some admin tasks.
Re:Missed a couple of big ones (Score:2)
Because IE is an integral part of the operating system, which would cause errors as far as the eye could see if you disabled it, of course.
Actually, since on every windows server there exists internet explorer, I claim that IE is a part of the server.
Social Engineering (Score:5, Insightful)
If you can get the information that you want (eg passwords) from a person who knows the information, all the patches in the world won't protect your network...
Re:Social Engineering (Score:2, Insightful)
Not forgot, deliberately left out. This document is limited in scope to only Windows and Unix vulnerabilities.
If they had tried to make this more encompassing (say, by including physical security or common weaknesses in operational processes) the document would be so long no one would read it.
Re:Social Engineering (Score:2)
Firewalls that accept traffic by default? (Score:3, Insightful)
This seems like a really bad idea. Giving people a list of port they should block traffic to implies that they needn't properly lock down their rulesets properly, andd have accept as the default policy.
Re:Firewalls that accept traffic by default? (Score:2)
Not again (Score:5, Insightful)
Plus, you don't even need to spend on AV software from snake oil vendors.
All that's needed is to make the 'Edit' command the default in the registry for all types of WSH-recognized extensions, such as .js and .wsh. Unfortunately the default is 'Open', which executes the script.
Once you do this you can simply sit there and watch the script worms hit - the only thing you'll see are instances of Notepad all over the place (with the code, to boot). Quite funny (in a sick sort of way).
Re:Not again (Score:4, Interesting)
But the most overlooked part of Windows 2000 and above is Microsoft's implementation of the Windows Management Instrumentation (WMI) API. With this interface an admin can script against any Microsoft Class and has full rights to change, modify, stop, start, etc. The box is yours. And it's installed by default!
Currently, it's a little under the radar, so many are unaware of it's implementation, but remote scripting is completely available and documented, just need the first exploit to overcome the security context and Houston we have a problem.
Cool idea (Score:2)
Re:Cool idea (Score:2)
Sorry, don't have the list.
Re:Cool idea (Score:3, Informative)
If you have ActivePerl installed (recent build) you might want to do the same to the .pl extension, just in case.
YOU ARE WRONG! (Score:2, Flamebait)
What we need is a greater knee-jerk reaction. A few months ago I got rid of WSH using "format c: /q /u". Now running OSX on new iMac, and old PC is a lovely Linux firewall. I think the top 10 Windows problems might not bother me now. ;)
Now if only ... (Score:4, Funny)
Free Clue: if you didn't get in on the first 2000 tries, go waste someone else's bandwidth!
Re:Now if only ... (Score:5, Funny)
Re:Now if only ... (Score:2)
version number hiding is not the way to go. (Score:4, Insightful)
Same with the bugbear[sp] worm at this moment. "Check all the shares on the system. Found one! Let's copy to there." Zwoooosh there goes another sheet of paper through the printer.
For administrative purposes, being able to find out what version of software is running is essential. In a company with tens of locations and thousands of computers, nobody will be able to keep a list of software installed on all these things, let alone keep track of the versions.
A weekly scan by the corperate IT department and they know what MTAs and versions are there, what FTP servers and version, what DNS servers and versions are there. An update is released? Just inform the right people (i.e. the LAN administrators, not the people who own these servers). An exploit has become known? At least you know how vulnerable you are instead of panicing and trying to get (obsolete) lists from all over the place.
So yeah, version number hiding doesn't reduce the attackrate but does reduce the ability to act.
A lopsided comparison (Score:2)
#W10 Windows Scripting Host (Score:2)
I have to disagree with their evaluation of item W10, Windows Scripting Host [sans.org]. They're essentially blaming it for improper use by mail clients (I never heard of anything other than Outlook or Outlook Express having problems with .vbs scripts run through WSH -- Word macros, while VB, are not VBScript, and don't go through WSH. IE embeds vbscript and jscript, again not through WSH, so while I guess you could download a .vbs, you'd have to be a moron to tell it to run automatically). Sure, they do include the line, "While administrators should always keep applications like browsers, mail clients and productivity suites patched and updated, patching these applications to eliminate their susceptibility to a particular worm is an incomplete (and no better than reactive) solution to the risks posed by scripting," but that's paramount to suggesting all scripting is bad. Would it be bash's fault if mutt auto-ran .sh extensions? Or would it be perl's fault if mutt did the same thing with .pl extensions? No, it wouldn't, so to fault WSH for Outlook/OE problems is pretty ludicrous.
WSH is a very useful tool when used properly, just as bash or perl are very useful when used properly. Misuse by one or several applications does not mean the tool itself is at fault. A better thing to blame would be running as administrator (in NT-based Windows systems) full-time, rather than as a non-admin user. Again, this is directly parallel to running as root 24/7 in a unix system. You wouldn't do it there, so why do it in Windows? (Win9x is dead, let it rest in peace.)
Re:Ever heard of a UID? (Score:2, Interesting)
Given that Win doesn't have group ownership for files, it really doesn't matter if your running as admin or guest. You can still use WSH as a guest and be able to fuck with system files, you just can't play with the registry...nice security model, it doesn't exist for files on Win systems.
Perl on the other hand can't mess with files if the UID for the process doesn't have permission to...ooohhh, file security.
Re:Ever heard of a UID? (Score:2, Insightful)
You'd be right, if your system is using FAT16/32, though why you'd ever use that on an NT-based system (note my comment about NT-based Windows systems, and Win9x being dead), I don't know. Use NTFS, setup proper permissions (should be setup by default, if you installed using NTFS), and you have a better ACL system than the default user/group/other UNIX permission system (yes, I know various unices have better ACL systems, and various filesystems for Linux do as well, but most people use ext2 at the moment, which just does ugo by default -- you can add patches that do real ACLs, but last I checked that wasn't part of 2.4).
Just taking a quick look of C:\Windows on my XP system, I see:
So how is it, again, that Windows doesn't have group ownership?
Re:Ever heard of a UID? (Score:2)
"lugonn" has apparently never used an NT-based Windows.
I am disappointed... (Score:5, Funny)
Re:I am disappointed... (Score:2)
It's more of a "feature"...
-WS
Re:I am disappointed... (Score:2)
Yeah, and neither did "driving over the webserver with a pickup truck". Who'd have thought?
It's about security vulnerabilities anyway, not brute force denial of service attacks.....
W10 (Score:2, Funny)
1. Windows
2. Windows
3. Windows
4. Windows
5. Windows
6. Windows
7. Windows
8. Windows
9. Windows
10. Windows
Re:W10 (Score:2)
Missing the most obvious vulnerability... (Score:5, Insightful)
All of these are ridiculous... (Score:3, Insightful)
Re:All of these are ridiculous... (Score:3, Insightful)
It seems incredable to me too that anyone with the title of "administrator" could NOT already be doing this, but then there is reality.
FTP? (Score:2, Insightful)
The openSSH sftp client really sucks, it's barely usable, no frills, almost seems like a "proof of concept" as it were. It gets the job done, barely.
So our customers need to upload files. With FTP in IE and Netscape and Mozilla, they can drag and drop the files into the browser and log in and send the files.
Another option is to use HTTP PUT, but since our clients are uploading 50 meg files, no progress feedback is a killer there. Is there some open source client-side-java-pretty-HTTP-PUT-uploader out there? Even then you have to have your clients have Java installed, something that can't really be counted on.
Other options.... Put putty on the site and make them install it and use sftp.. Not an ideal option, but somewhat workable.
So where is the drop in replacement for FTP? Why isn't anyone working on this?
Re:FTP? (Score:2)
FTP as a protocol is horrible for security.
Their SNMP experts aren't experts... (Score:4, Interesting)
Overall the top20 list is a good summary as always.
However, I can't believe the lack of knowledge about at least the SNMP portion of it. SNMP *used to use* clear-text community strings in the first and second versions of the protocols. The following statement, along with others in the section:
'SNMP uses an unencrypted "community string" as its only authentication mechanism. Lack of encryption is bad enough...'
Is spreading simply incomplete information. At a minimum, it should be suggested that all users upgrade their SNMP enabled software to version 3 compliant SNMP agents and to disable the version 1 and version 2 SNMP protocols. All of the major network vendors, as well as software vendors implement the v3 protocol so there is very little excuse for not using it (and, worst case you can deploy v3->v1 proxies near v1-devices to minimize the transmision distance of clear-text v1 community strings). *Please* change the wording to suggest that people upgrade their equipment to SNMPv3 compliant software, which will take care of at least the insecure problems with the protocol.
Re:Their SNMP experts aren't experts... (Score:2)
I completely agree, but they been sent similar infomation before and they were clueless, and I mean clueless. Quite disappointing.
Makes me lose faith in the rest of their list.
But maybe they will listen to you Wes.
Re:Their SNMP experts aren't experts... (Score:2)
Which, um, I guess means "trust no one, mannnnnn".
bind? (Score:2)
#1 in both (all) systems (Score:2)
Either base system can be secure or as full of holes as your mother. Apply the relevant patches in a timely manner, and you're mostly ok (so far).
Clueful users do not generally get rooted. In either system.
Out of the mouths ... (Score:2, Funny)
I love W5... (Score:3, Interesting)
It seems to me that, since it points out the the scans are often run as "System" by the legitimate users, then by properly crafting a response to an inquiry, and puttting my machine out there, the real vulnerability is to the systems, like the domain controllers, which scan (potentially trojaned) remote machine, without dropping "System" priviledge first.
It seems to me that an exploit using SAMBA source code ought not to be that hard to write...
-- Terry
meaningful typo (Score:4, Funny)
Nearly all Linux systems and many other Unix systems come with Apache installed and often by fault enabled.
Although I presume that they meant to say 'by default enabled', I (like many others) feel that it is an error to have most facilities enabled by default. Thus the default is IMHO a fault.
I would much rather have various facilities disabled by default, with easily-accessible tools which enable those facilities (and give appropriate security warnings). Manufacturers, like sun, who ship machines with everything and their dogs enabled should be hung by their toes and beaten mercilessly with burnt-out '286s.
The standard defence that most of these systems ship to sites with well-traind sysadmins who know what to disable is silly. If a site has well-trained sysadmins, then they should know how to enable the required facilities. Sites without well trained sysadmins probably don't have good security, either, and most desparately need to have all of those holes covered when the system ships.
For admins who care more about getting a system running easily than they do about security, vendors like sun could have a program (named 'goahead-shootme') that enables all facilities just like the old (de)fault had it. Better yet, of course, would be a simple menu-driven / GUI program that allowed you to turn on/of various facilites and daemons (and possibly even provided an explanation of why). -- Bastille Linux comes to mind...
Usual Suspects Haven't Gone Away After YEARS (Score:3, Informative)
Re:Usual Suspects Haven't Gone Away After YEARS (Score:2)
From the user's side, yes, if you provide Garbage In, you should not expect Good Stuff Out, but from a programmer's perspective, for non-critical applications, the right thing to do is to return some kind of error message to the user, and for critical applications, it's worth spending the effort to find the best way to respond to bad input, since there are applications like controlling jet airplanes or chemical plants where simply printing an error message to the console isn't good enough. But the minimum acceptable behavior should be the applicable equivalent of the error handling in the old Unix "ed" editor, which responded to bad input by printing a "?" back to the user, who was presumed to know what he or she was doing and understand why the input was wrong.
If you're running anything connected to the Internet, you have to expect more than just the Garbage In that you get from users making typing mistakes - you should expect deliberately malicious exploration of boundary conditions, and design your program to survive them. Otherwise you're just crunchy and good with ketchup.
Windows Vulnerabilities (Score:2)
Web administrators too often conclude that since Microsoft's Internet Information Server (IIS) is exceptionally prone to compromise (see W1. Internet Information Server), the open-source Apache web server is completely secure. While the comparison with IIS may be true, and although Apache has a well-deserved reputation for security, it has not proved invulnerable under scrutiny.
It amazes me how often these vulnerabilities are caused by things that they teach in beginning programming classes, like bulletproofing your code.
snmp and userids (Score:3, Informative)
As for userid's and passwords - I've seen equally week NT setups - even more common for people to use no passwords on NT, since Win clients are connecting. As for tracking what a user is doing - ps anyone? Lets see you track what an authenticated user can do with RPC on a windows network.
Shatter exploit? (Score:2, Informative)
Those other flaws are weak in comparison to one where someone can own your university network.
Most critical internet security vulnerabilities (Score:2, Informative)
The register points to [theregister.co.uk] the 2002-09-27 SANS/FBI top 20 most critical internet security vulnerabilities [sans.org]. 2000 [slashdot.org]'s top vulnerability, BIND weaknesses, dropped to Unix number 3 last year [slashdot.org], and number 9 this year.
Re:Well, that settles that argument (Score:3, Funny)
Re:Well, that settles that argument (Score:2, Insightful)
So according to these lists, Linux is 2^20 times better than Windows.
Now just learn to interject "Security through obscurity doesn't work!" and "Security is a process, not a product!" whenever they seem like they might be relevant and you could be a /. security expert like me.
Re:Well, that settles that argument (Score:5, Insightful)
Just my worthless
Re:Well, that settles that argument (Score:2)
Re:Well, that settles that argument (Score:4, Interesting)
Saying that "The Twenty Most Critical Internet Security Vulnerabilities" is the same as the top ten Windows vulnerabilities plus the top ten Unix vulnerabilities, is just plain stupid.
Re:Am I the only one that noticed... (Score:4, Insightful)
However, 4(w4, w5, w7, w10) of the Win vulnerabilities are integral parts of the OS so you can't remove/fix them without hosing your PC.
Gee, which OS is more secure...looks like *nix again. So no, they are completely different.
Even one vulnerability is too many ! (Score:2)
You sez:
"...the fact that only one(u10) Unix vulnerablity has to do with
the OS itself, and the rest are program related. All of which can
easily be removed without harm to your boxen."
While the above is TECHNICALLY CORRECT, please remember, when it comes to VULNERABILITY, even ONE is TOO MANY !
Re:Well, that settles that argument (Score:2, Redundant)
Re:Well, that settles that argument (Score:2)
Re:Clueless FBI (Score:5, Insightful)
Apache is optimized and was originally designed for Unix. FTP is a standard Internet protocol that likely had its origins in Unix. While the problems you state afflict Windows and Unix alike, they cannot be "traced to Windows." They should be under a generic category for all systems, as HTTP and FTP servers are, in general, large security risks, if caused by nothing more than improper setup.
Re:Clueless FBI (Score:2, Interesting)
Sometimes people anthropomorphize too much (Score:2)
Re:NO MACS is GOOD NEWS (Score:2, Insightful)
No. Didn't think so.
-WS
Re:How to block null sessions in Win2k? (Score:2, Informative)
Go to --> Administrative Tools --> Local Security Settings --> Local Policies --> Security Options
Select "Additional restrictions of anonymous connections" in the Policy pane on the right
From the pull down menu labeled "Local policy setting", select "No access without explicit anonymous permissions"
Click OK
Weak passwords are a legit weakness (Score:2)
Re:Security Through Obscurity (Score:2)
Re:brilliant. (Score:2)