Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: cymbeline
> What do Apple and the Unix crowd do about security vulnerabilities?

Apple does what Microsoft -used- to do. They issue patches from time to time, mostly irregularly, when required by discovery of a new vulnerability.

Microsoft used to do that, but the much higher rate of vulnerabilities and thus patches for Windows (compared to MacOS) drove Windows datacenter and business IT managers crazy, because they have to roll out those patches after testing, to hundreds or thousands of client machines. It’s impossible to do that irregularly, so Microsoft finally got pushed to do monthly patch releases (hence, “Patch Tuesday”, the second Tues of each month). Each Patch Tuesday typically has between half a dozen and 2 dozen patches rolled up into it.

Linux distros issue updates to their packages constantly, so it’s up to the user (or IT manager) to decide when to update their machines. Everything is in the open, no secrets, so it’s easier to manage piecemeal.

23 posted on 01/29/2020 6:39:41 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 19 | View Replies ]


To: dayglored

Hey DGR, I found a CD I made umpteen years back that has Windows ME with all the updates. I think it was one of those platforms that didn’t require any interaction with Microsoft to activate, just the key I wrote on the case. Do you think it’s young enough to handle most of the current environment without extensive modifications? Not games, just seeing the internet and performing basic interactions.

And thanks for staying on top of stuff - your past postings have saved me time.


27 posted on 01/29/2020 9:11:23 PM PST by MikelTackNailer (Time is what no one gets more of.)
[ Post Reply | Private Reply | To 23 | View Replies ]

To: dayglored

“Apple does what Microsoft -used- to do.”

I’ve never understood why the networking software seems to have so many security holes. Something’s wrong with the basic design it seem to me. Perhaps its because to get certain desirable features, there’s a byproduct of security holes. If that’s the case then the security holes are in there by design.

An invasion of your computer consists of an outsider injecting executable code in you computer and having it executed. It is simple for the operating system to recognize incoming data that is intended to be executed.
Its execution should be denied unless permission is granted by the user.

Come to think of it, there’s no telling what’s in the various software updates we get, even from Microsoft. Oh those rooms full of programmers, none of whom sees the total picture, trying to get stuff out on time.


32 posted on 01/30/2020 4:34:44 AM PST by cymbeline
[ Post Reply | Private Reply | To 23 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson