lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue Feb 28 08:15:25 2006
From: maillists at thelonecoder.com (Stephen Johnson)
Subject: Question about Mac OS X 10.4 Security

Mac's have always held the distinction of being more secure by, among other
things, not being a target.  -- Due to the lack of extensive use, virus and
mal ware writers have ignored taking the time to write virus for Macs.

Simple philosophy -  Why climb the wall , when you can walk through the
door.  

Windows is easier and more prolific, until that changes, we are not going to
see major attacks on the mac platform.

JMHO


On 2/28/06 12:04 AM, "Ferdinand Klinzer" <Klinzer@....de> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hey Guys,
> 
> What you think about the latest Mac OS X 10.4.x Security flaws?
> I think it will go fast then it goes like Windows Systems more and
> more Trojan Horse and other security bugs...
> 
> I only want make a thread about what you think?
> 
> Cheers
> 
> Ferdinand 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.1 (Darwin)
> 
> iD8DBQFEBAQoivpgT1glX4cRAow2AJ4xcl8to6Vtzb/mAccqjSG0WuE1jwCeJpeV
> OKrrslBaBNxiV1GcLHgvcPU=
> =bNj4
> -----END PGP SIGNATURE-----
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

-- 
Stephen Johnson
The Lone Coder

http://www.ouradoptionblog.com
*Join us on our adoption journey*

stephen@...lonecoder.com
http://www.thelonecoder.com

*Continuing the struggle against bad code*
--


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ