Well we've also agreed on things before, and that is the beauty of healthy debate =). Your one of the few on here I take seriously, so take that as a complement.
K, backatcha.
Now yes the *nix can usually keep it contrained to the user and not su. But since osx is only based on unix and BSD, it has exploits other *nix's don'
It's not that it's based on BSD - it IS (almost) BSD, with all of the eye candy layered on top of it. One can (and I have, at times) strip away the aqua eye candy, and run straight X - I prefer my own implementation of tom's windows manager - and you're strictly in BSD land. Or - strictly a Gnome desktop. A bunch of us were leading others on the web on how to do that back in the 10.0 days - just because we could (and - we weren't entirely sure of this newfangled OS X, despite living through beta).
The singular thing that keeps it from being a straightforward BSD is the non-BSD kernel - Mach. And I point that out as a Mach kernel programmer in my earlier life. While Mach is indeed a *nix kernel, I always found it odd that that choice was made.
So - once under the aqua layer, and above the non-standard (for BSD) kernel - it's very much a very nice BSD implementation - right down to the Open Firmware (shades of Ultrix!!).
Now that being said, let's fast forward to today, and win7 is still the most secure os to date.
I'm not being a fanboy - I sincerely do not know how you arrive at that, nor what evidence supports it.
I'd go along with "most secure MS OS to date" - but most secure? When my absolute safety depends on it, I'd choose OpenBSD.
Just like *nix, most infections are trapped in the user domain, and unless they are complete idiots with their sytem, and run full admin all the time,
ok. But - it's only fair to point out that OS X users have enjoyed that protection for nearly a decade - and further, rather than relying on ACLs, even privileged users had to sudo first before being granted the access to that damage.
Now about my "hacking" days. I really wasn't a real hacker per se, as most (probably not you) people have the definition of a real hacker completely wrong.
Ja wohl.
What I was, is more along the lines of a script kiddie/program cracker, making modifications to sub7 servers to be undetectable, port scanning, packag
It's only fair to warn you that up until that time, and for nearly two decades before it, I used to read raw hex dumps of memory, xlate portions into op codes mentally, and inject fixes to defective code from there. (thank you, Ward Christensen)
And until broadband was fully established, I could whistle (unassisted) modem codes into a handset at 1200 baud and connect to whatever I needed to when hardware was p*ssing me off. (thank you Capt Crunch)
I've written symmetric multiprocessors completely in assembly, whole cloth, from bare metal.
You might give that a go, then move on to stripping away parts of Windows, transparent to the user, and replace its entire i/o and job processing for data acquistion or the like, reassembling the OS on your way out, leaving no trace - and then see what you think of Windows' process management and security.
That said, they gained my respect in Win2k, XP sp2, and now Win7 - but - it's still Windows.
This was also during my early teen years, and even single digits. Once I started reading stories of people getting caught, and tossed in jail, I immed
Good boy - seriously, no downcasting nor sarcasm. 2600 is no way to live. No way at all.
Keep in mind all of this is 100% self taught, and my actual education is in liberal arts lol... but now I'm at a crossroads. I really like the mobile
There's not a thing wrong with being an autodicact so long as you remember this maxim:
Don't believe everything you think.
You'll find to your chagrin that things that are making perfect sense today need to be deconstructed and reassembled to be seen for what they really are. Mark these words.
But back on topic. When mac does get hit, it'll be just like most windows users. 100% user error, either an email or porn site they shouldn't have ope
We'll just have to see.
And to blow us all away, the scariest thing is, they are inching closer and closer to quantum computing. And when that happens, no networked computer
I think you'd do well to also read by Stephenson, In The Beginning Was The Command Line (now available as a free PDF download(yeah, great, they're charging for it again - but not if you know where to
look), and also his Snow Crash - not to mention Gibson's Neuromancer.
And if you'd like to know the epigenesis of the title, Burning Chrome (one of Gibson's best short stories, that begins, "It was the night we burned chrome...") - that's a reference to fusing nickel chromium (nichrome) junctions from the only tech we had available when we used to burn our own ROMs, prior to UVPROMs, EEPROMs and the like.
Seriously - cut OS X and Linux a bit more slack and trust me - they're mighty secure indeed.