Language Selection

English French German Italian Portuguese Spanish

Windows Security vs. Linux Security

Filed under
OS

If you’ve switched to Ubuntu from Windows, there’s a very good chance that the security failings of Windows featured in your decision. By any measure, Microsoft’s record on security within its products is appalling. A new and serious security warning appears seemingly on an ongoing basis, and a new and devastating virus makes news headlines with similar frequency (usually described as “a PC virus” rather than what it actually is: a Windows virus).

One argument is that Windows is the target of so many viruses merely because it’s so popular. Although it’s true that some of the underground crackers who write viruses dislike Microsoft, there’s also little doubt that Windows has more than its fair share of security issues.

The situation is certainly getting better but, even so, Microsoft’s latest operating system, provides many good examples of why it’s an easy target. Upon installation, the default user is given root powers.

More Here




More in Tux Machines

CNCF (Linux Foundation) and 10 Years of OpenStack

  • Linux Foundation Partners With CNCF on Kubernetes Certs, Training

    The Linux Foundation and Cloud Native Computing Foundation (CNCF) announced today they are collaboratively developing a Certified Kubernetes Security Specialist (CKS) certification expected to be available in November. At the same time, the two open source consortiums announced the availability of a training course dubbed “LFS244 – Managing Kubernetes Applications with Helm.” The CNCF is an arm of The Linux Foundation. Clyde Seepersad, senior vice president and general manager for training and certification at The Linux Foundation, says the Certified Kubernetes Security Specialist (CKS) certification will require IT professionals to be certified in Kubernetes management fundamentals as a prerequisite. The goal is to expand the amount of cybersecurity expertise IT professionals can bring to bear while also managing Kubernetes clusters, he says. The exam for the certification covers cluster setup, cluster hardening, system hardening, microservice vulnerabilities minimization, supply chain security, monitoring, logging and runtime security.

  • 10 Years of OpenStack
  • New Training Course Teaches Kubernetes Application Management with Helm

Restricted Hardware and Open Hardware (Raspberry Pi, Arduino Nano)

  • Ryzen Embedded signage system offers secure boot

    EFCO’s “VideoStar100” signage player runs Linux or Win 10 on a Ryzen Embedded V1000 or R1000 with up to 4x simultaneous 4K displays plus 2x GbE, 4x USB, 2x serial, and optional “SecuBoot” security.

  • Raspberry Pi add-on offers dead reckoning GNSS with RTK support

    SparkFun’s “GPS-RTK pHAT” for the Raspberry Pi features u-blox’s 184-channel ZED-F9R module for ADR of up to 4x concurrent GPS, GLONASS, Galileo, and BeiDou links with 20cm accuracy when linked to an RTK base station. SparkFun has launched a $250 Raspberry Pi add-on board for “highly accurate and continuous position” in automotive, robotic rover, and other unmanned vehicle applications, including asset tracking. The GPS-RTK Dead Reckoning pHAT for Raspberry Pi showcases u-blox’s 184-channel ZED-F9R GNSS receiver module, which supports up to 4x concurrent location signals from sources including BeiDou, Galileo, GLONASS, GPS, and QZSS. Sparkfun also announced a $160 Raspberry Pi 4 Hardware Starter Kit 4GB (see farther below).

  • A hand-following AI task lamp for your desk

    Gao’s 3D-printed device uses a USB camera to take images of the work area, and a Python image processing routine running on a PC to detect hand positions. This sends instructions to an Arduino Nano, which commands a pair of small stepper motors to extend and rotate the light fixture via corresponding driver boards.

Mozilla Explains VPN and Neglects GNU/Linux

  • No-judgment digital definitions: VPNs explained

    Many of us spend multiple hours a day using the internet to do everyday things like watching videos, shopping, gaming and paying bills, all the way to managing complex work projects and having confidential video calls. A virtual private network (VPN) is one of the best ways to stay private and secure online, and keep your personal data protected. [...] Connecting to a public WiFi network is at times convenient, like when you’re without internet service or can’t get any bars on your phone. On the other hand, connecting to public WiFi can be a risky endeavor. It’s impossible to be sure that someone else isn’t connecting to the same network to snoop on what you’re doing. Even if your traffic is encrypted they can still see which sites you are visiting. And if you’re using an app that doesn’t have encryption — and even today, many don’t — then they can see everything you are doing. When you’re at home, the risk of bad actors showing up on your home network is lower. However, your internet service provider (ISP) can track and share your online activities because all the data that you access on the web is routed through your ISP’s network, some of which may not be encrypted. A VPN can prevent ISPs from spying on you by encrypting your traffic to your VPN provider no matter where you are.

  • Mozilla VPN Goes Live …But Not For Linux Users

    Mozilla’s VPN service has officially launched in six countries, but Linux users will find they can’t take advantage of the tech just yet. The new subscription-based privacy service is available to web surfers in the USA, the UK, Canada, New Zealand and several other locales from today. But, frustratingly for tux fans, it requires a Windows, Android, and/or iOS system to use. The good news is that Mozilla VPN Linux support is on the way. The company hasn’t shared an exact timeline on when to expect it but says it is “coming soon” to more devices and platforms. The benefits of using a VPN are fairly well known at this point: better security on public wi-fi; anonymous surfing and no IP logging; and network-level encryption. And since Mozilla VPN runs on over 280 servers in 30+ countries it should provide dependable with less downtime too.

Purism "Investing in Real Convergence" and Purism Librem 14

  • Investing in Real Convergence

    Like “privacy” and “security” the word “convergence” has become a popular term these days. When words like these become popular, companies tend to redefine them to match whatever they happen to sell. For instance when Google says they protect your privacy they mean “from everyone but us.” When Apple says they are secure, they mean “as long as you give us full trust and total control.” When most people think of the promise of convergence they think of what I’ll refer to as “real convergence”–the idea of a single, portable computer that has your data and applications and that can be a desktop computer, a laptop or a pocket computer. To summarize: real convergence means taking your desktop computer with you in your pocket wherever you go. Fake convergence is the opposite: stretching a phone to fit on a larger screen.

  • Purism Librem 14

    The next generation of Librem laptop brings a lot to the table. Gigabit throughput over native RJ45 enables you to enjoy blazing-fast download speeds, security, and reliability. Compared to the Librem 13, the Librem 14 has a similar device footprint while the Intel 10th Gen Comet Lake i7 is much more powerful.