Ergebnis für URL: http://www.esecurityplanet.com/views/article.php/3665801
   #[1]eSecurity Planet » Feed [2]alternate [3]alternate [4]alternate

   IFRAME: [5]https://www.googletagmanager.com/ns.html?id=GTM-PHQ8H39

     * [6]Facebook
     * [7]LinkedIn
     * [8]Twitter

   [9]eSecurity Planet
   Search
   ____________________ (BUTTON) Search

   (BUTTON)
   (BUTTON)
     * [10]Best Products (BUTTON)
          + [11]Cybersecurity Companies
          + [12]Vulnerability Management
          + [13]EDR
          + [14]NGFW
          + [15]IAM
          + [16]CASB
          + [17]Intrusion Detection and Prevention
          + [18]Threat Intelligence
          + [19]SIEM
          + [20]Network Access Control
          + [21]UEBA
          + [22]Governance, Risk & Compliance
          + [23]Web Application Firewall
     * [24]Networks (BUTTON)
          + [25]What is Network Security?
          + [26]How to Secure a Network
          + [27]Network Security Threats
          + [28]Network Security Tools
     * [29]Cloud
     * [30]Threats
     * [31]Trends
     * [32]Endpoint
     * [33]Applications
     * [34]Compliance

   Search
   ____________________ (BUTTON) Search

Linux vs. Windows: Which is Most Secure?

   [35]Kenneth van Wyk
   March 16, 2007
     * [36]Facebook
     * [37]Twitter
     * [38]LinkedIn
     * [39]Email
     * [40]Print

   eSecurity Planet content and product recommendations are editorially independent.
   We may make money when you click on links to our partners. [41]Learn More.


   Editor's Note: A lot has changed since this article was written so we decided to
   take another look at the topic. Check out the new article, [42]Is Linux Really
   More Secure than Windows?, to see what the findings are ... you might be
   surprised (or not).

   I'm more secure on Linux than I am on Windows. Yup, that's right. I have no doubt
   whatsoever that I am.

   I started down this path by comparing how secure I am on a Mac vs. on Windows,
   then I compared [43]Mac vs. Linux. To complete that trifecta, I guess it's only
   fair to compare the end-user data security aspects of Windows against Linux.

   Before I get into my rationale, though, just a little more background is in
   order. I started using a UNIX desktop way back in college and was always
   comfortable there. At my first couple of jobs after college, I mostly used UNIX
   workstations from Dec and Sun as my primary desktops.

   Later, I started using Windows-based systems at the office, but never felt quite
   at home. I was constantly frustrated by the frequent reboots, lack of serious
   security capabilities (from my perspective), and such. Then, following a brief
   foray in OS/2, I quickly gravitated to running Linux at home so I could once
   again have a real multi-tasking working environment.

   Nowadays, my primary desktop is on a Macbook Pro - the best computer I've ever
   owned, without any doubt.

   But, I still run a Debian Linux infrastructure for my company, with a couple
   Samba servers at its core. It's not uncommon for the Linux systems to go over a
   year in between reboots. And, I still use XP on another laptop from time to time,
   generally when a customer requires it or I absolutely must run something like
   ActiveX controls on a web site. I try my best to learn how to best use the
   security features of each OS I use, naturally.

   So, with that background in mind, it's clear my views are somewhat biased.
   However, I consider myself very open-minded and will always give credit where
   it's due. Heck, some of my best friends use Windows (but I do my best to talk
   them into OS X anyway).

   o True to UNIX.It's tough to be entirely fair here, since Windows isn't UNIX in
   any sense. But my point here is that Linux does follow the security features and
   capabilities it inherited from UNIX quite closely. In particular, the notion of
   an administrative (root) user that maintains and operates the system, and desktop
   users who only run the software on the system, is completely ingrained in most
   Linux distributions.

   Now it's true that many Linux users ignore these features and run all their
   software from a root-level account anyway, but that's a choice that they've made.
   The system defaults to protecting the operating system components from its user's
   actions (intentional or otherwise). That feature alone must account in large
   degree for the dearth of viruses and other malicious vermin on Linux and UNIX
   platforms.

   Windows, on the other hand, started life as a single user system, with that
   single user being all-powerful. Although that's no longer the case, the general
   attitude can still be found in many Windows-based software products - many of
   which just can't be installed and/or run properly without desktop administrator
   privileges. This is all changing for the better, but it took Microsoft far too
   long to adopt this default-secure configuration practice.

   Qualitative score: Windows gets a D+ while Linux gets an A-.

   o "Bummer of a birthmark"Many of us no doubt remember Gary Larson's Far Side
   comic strip in which two deer are standing around, and one of the deer has a big
   bulls-eye target on his chest... You get the picture.

   Well, in many ways, that's the sad state of affairs for Windows users these days.
   It's true that phishers, virus writers, and other miscreants could target other
   operating systems, but by and large they don't.

   As other operating systems gain market share, that's likely change, but by my
   thinking, Linux isn't going to be the next big target. So, until and unless that
   target "birthmark" finds its way onto another victim, it's "bummer of a
   birthmark" time for Windows users. (Hint: the "birthmark" itself is your
   Outlook/Internet Explorer combination!)

   Qualitative score: Windows gets an F while Linux gets an A.

   o User data confidentiality. All those commands that I grew comfortable with on
   UNIX (e.g., chmod, chown, umask) for protecting or sharing my data are in Linux
   and are easy for me to work with. Although the features are relatively on the
   light side as industrial strength file access control goes, the tools and
   capabilities are readily available and they work pretty darned well.

   While it's true that Windows has equivalent commands and GUI interfaces for
   protecting one's data, I've always found them to be awkward at best, and
   generally defaulting to open (world read-write) unless I go out of my way to lock
   down my own files.

   Now, to be fair, I have to point out that the Windows NTFS file system has a
   phenomenally powerful set of features when it comes to file/directory access
   control and auditing. Indeed, when used properly, an NTFS file system can be very
   tightly configured to the needs of a user or application. The problem is that so
   few people do it or even know how to do it.

   One other factor here is the availability of third-party file and disk encryption
   products. Here Windows clearly has the upper hand, and I'm noticing more and more
   corporate laptops employing disk encryption as a standard configuration item. (I
   guess we can thank the likes of the U.S. Veterans Administration for that.)

   Qualitative score: Windows gets a B- while Linux gets a B+.

   o Patch practices. Here Windows shines (finally). With Windows Updatebeing
   readily available and running by default as of XP SP2, things are finally looking
   up for Windows users. From the perspective of an end-user seeking to keep his
   computer up to date with the current vendor-supplied security patches, Windows
   sure does make things easy.

   Linux isn't too far in the distance, though. Most Linux distributions do a
   respectable job at automated security patch management. Many are opt-in, however,
   and the interface varies from one distribution to the next, making it a bit less
   easy to do things properly for a typical end-user.

   The elapsed time from notification to patch, on the other hand, can vary
   substantially. Overall, and again from a highly subjective viewpoint, I give a
   slight edge to Linux, but I do feel that Microsoft has made great advances in the
   past few years.

   Qualitative score: Windows gets an A- while Linux gets a B+.

   With these scores in mind, I have absolutely no doubt that my data is safest on a
   Linux system than on a Windows system. And that ends my three-way comparison of
   the user-level security in OS X, Windows, and Linux. I've tried to be as fair as
   I can, and have given credit where each is worthy of it - and wrath where it's
   not.

   My overall winner remains Apple's OS X, which offers the best of both worlds
   (UNIX and Windows-like) to me. I have the native desktop apps that I need to do
   business, and underneath it all is the familiar face of UNIX. I'm at $HOME.

   In closing, I should also say that a person determined to keep her data secure
   can certainly use any of these three operating systems successfully. There's
   enough good in the worst of them (and bad in the best of them) that what matters
   most is really learning how to use all the security capabilities of the OS you're
   most comfortable with.

Get the Free Cybersecurity Newsletter

   Strengthen your organization's IT security defenses by keeping up to date on the
   latest cybersecurity news, solutions, and best practices. Delivered every Monday,
   Tuesday and Thursday
   Email Address ____________________
   [ ] By signing up to receive our newsletter, you agree to our Terms of Use and
   Privacy Policy. You can unsubscribe at any time.
   (BUTTON) Subscribe

   Previous article
   [44]Mac vs. Linux: Which is More Secure?

   Next article
   [45]Email Administrator Best Practices
   [46]Kenneth van Wyk Avatar
   [47]Kenneth van Wyk
   Kenneth R. van Wyk is an internationally recognized information security expert
   and author of the O'Reilly and Associates books Incident Response and Secure
   Coding. In addition to providing consulting and training services through his
   company, KRvW Associates, LLC, he currently holds numerous positions--the
   Director of Cigital's Research Labs, monthly columnist for online security portal
   eSecurityPlanet, and Visiting Scientist at Carnegie Mellon University's Software
   Engineering Institute.

Subscribe to Cybersecurity Insider

   Strengthen your organization's IT security defenses by keeping abreast of the
   latest cybersecurity news, solutions, and best practices.
   Email Address
   ____________________
   [ ]
   By registering, you agree to the Terms of Use and acknowledge the data practices
   outlined in the Privacy Policy. You may unsubscribe from these newsletters at any
   time.

   (BUTTON)
   Subscribe
   Search
   ____________________ (BUTTON)

IT Security Resources

     *

[48]Cybersecurity Management Lessons from Healthcare Woes
       May 30, 2024
       AI-generated image of healthcare cross icon on cyberspace.
     *

[49]What Is Cloud Security Management? Types & Strategies
       May 30, 2024
       Abstract glowing shield with cloud icon on dark binary code background.
     *

[50]Top 6 Database Security Solutions Available in 2024
       May 30, 2024
       Virtual shield with keyhole on abstract digital cyberspace background.
     *

[51]Top 6 Managed Detection & Response (MDR) Providers in 2024
       May 29, 2024
       Cyberthreat hunting concept illustration.

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

     * 1 [52]ManageEngine Log360
     * 2 [53]Dashlane

   [54]See full list

Get the Free Newsletter!

   Subscribe to Cybersecurity Insider for top news, trends & analysis
   Email Address ____________________
   [ ] By signing up to receive our newsletter, you agree to our Terms of Use and
   Privacy Policy.
   (BUTTON) Subscribe

Related Articles

     * Illustration of a wifi icon on a virtual circuit grid.

[55]Wireless Network Security: WEP, WPA, WPA2 & WPA3 Explained
       [56]Trends
       April 29, 2024
     * Microphone with waveform on purple background.

[57]8 Binge-Worthy Cybersecurity Podcasts in 2024
       [58]Trends
       April 26, 2024
     * Featured graphic for HackerGPT.

[59]HackerGPT 2.0 Unveils New AI Cyber Defense Strategies
       [60]Trends
       March 15, 2024

   (BUTTON)

   eSecurity Planet is a leading resource for IT professionals at large enterprises
   who are actively researching cybersecurity vendors and latest trends. eSecurity
   Planet focuses on providing instruction for how to approach common security
   challenges, as well as informational deep-dives about advanced cybersecurity
   topics.
     * [61]Facebook
     * [62]LinkedIn
     * [63]Twitter

   Advertisers

   Advertise with TechnologyAdvice on eSecurity Planet and our other IT-focused
   platforms.
   [64]Advertise with Us

   Menu

     * [65]Privacy Policy
     * [66]Terms
     * [67]About
     * [68]Contact
     * [69]Advertise
     * [70]California - Do Not Sell My Information

   Our Brands

     * [71]Privacy Policy
     * [72]Terms
     * [73]About
     * [74]Contact
     * [75]Advertise
     * [76]California - Do Not Sell My Information

   Property of TechnologyAdvice.
   © 2024 TechnologyAdvice. All Rights Reserved
   Advertiser Disclosure: Some of the products that appear on this site are from
   companies from which TechnologyAdvice receives compensation. This compensation
   may impact how and where products appear on this site including, for example, the
   order in which they appear. TechnologyAdvice does not include all companies or
   all types of products available in the marketplace.
   ×

References

   Visible links:
   1. https://www.esecurityplanet.com/feed/
   2. https://www.esecurityplanet.com/wp-json/wp/v2/posts/7533
   3. https://www.esecurityplanet.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
   4. https://www.esecurityplanet.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&format=xml
   5. https://www.googletagmanager.com/ns.html?id=GTM-PHQ8H39
   6. https://www.facebook.com/eSecurityPlanetcom-201643516537315/
   7. https://www.linkedin.com/company/esecurity-planet/
   8. https://twitter.com/eSecurityPlanet?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
   9. https://www.esecurityplanet.com/
  10. https://www.esecurityplanet.com/products/
  11. https://www.esecurityplanet.com/products/top-cybersecurity-companies/
  12. https://www.esecurityplanet.com/products/vulnerability-management-software/
  13. https://www.esecurityplanet.com/products/edr-solutions/
  14. https://www.esecurityplanet.com/products/top-ngfw/
  15. https://www.esecurityplanet.com/products/best-iam-software/
  16. https://www.esecurityplanet.com/products/casb-security-vendors/
  17. https://www.esecurityplanet.com/products/intrusion-detection-and-prevention-systems/
  18. https://www.esecurityplanet.com/products/threat-intelligence-platforms/
  19. https://www.esecurityplanet.com/products/siem-tools/
  20. https://www.esecurityplanet.com/products/network-access-control-solutions/
  21. https://www.esecurityplanet.com/products/best-user-and-entity-behavior-analytics-ueba-tools/
  22. https://www.esecurityplanet.com/products/grc-tools/
  23. https://www.esecurityplanet.com/products/top-web-application-firewall-waf-vendors/
  24. https://www.esecurityplanet.com/networks/
  25. https://www.esecurityplanet.com/networks/network-security/
  26. https://www.esecurityplanet.com/networks/how-to-secure-a-network/
  27. https://www.esecurityplanet.com/networks/network-security-threats/
  28. https://www.esecurityplanet.com/networks/types-of-network-security/
  29. https://www.esecurityplanet.com/cloud/
  30. https://www.esecurityplanet.com/threats/
  31. https://www.esecurityplanet.com/trends/
  32. https://www.esecurityplanet.com/endpoint/
  33. https://www.esecurityplanet.com/applications/
  34. https://www.esecurityplanet.com/compliance/
  35. https://www.esecurityplanet.com/author/kenneth-van-wyk/
  36. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&t=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet
  37. https://x.com/intent/tweet?text=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
  38. https://www.linkedin.com/shareArticle?url=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F&title=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&summary=A%20point%20by%20point%20comparison%20of%20the%20two%20OSes%2C%20with%20a%20subjective%20conclusion%20as%20to%20which%20offers%20better%20security.%20Plus%3A%20some%20thoughts%20on%20Apple%20security.&mini=true
  39. mailto:?subject=Linux%20vs.%20Windows%3A%20Which%20is%20Most%20Secure%3F%20%7C%20eSecurity%20Planet&body=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows%2F
  40. https://www.esecurityplanet.com/trends/linux-vs-windows/
  41. https://www.esecurityplanet.com/editorial-policy/
  42. https://www.esecurityplanet.com/features/article.php/3933491/Is-Linux-Really-More-Secure-than-Windows.htm
  43. https://www.esecurityplanet.com/trends/mac-vs-linux/
  44. https://www.esecurityplanet.com/trends/mac-vs-linux/
  45. https://www.esecurityplanet.com/mobile/email-administrator-best-practices/
  46. https://www.esecurityplanet.com/author/kenneth-van-wyk/
  47. https://www.esecurityplanet.com/author/kenneth-van-wyk/
  48. https://www.esecurityplanet.com/threats/cybersecurity-lessons-from-security-breaches-in-healthcare/
  49. https://www.esecurityplanet.com/cloud/cloud-security-management/
  50. https://www.esecurityplanet.com/products/database-security-tools/
  51. https://www.esecurityplanet.com/products/top-mdr-solutions/
  52. https://link.technologyadvice.com/37318448-c229-4c45-9423-8fdbc4f43820?country=DE&targeting_set_uuid=91ce16bc-5d5e-47c7-b28b-695df2015356&position=1&placement=sidebar&layout=vertical&source=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows&auid=50b19842-3f62-45af-ab81-96736ca092e6&
  53. https://link.technologyadvice.com/69fb0c5d-7b58-4b72-9f54-e7cfc3bbdbe2?country=DE&targeting_set_uuid=7c88d8f3-ff15-4aa0-95ac-b060f9da2bf9&position=2&placement=sidebar&layout=vertical&source=https%3A%2F%2Fwww.esecurityplanet.com%2Ftrends%2Flinux-vs-windows&auid=50b19842-3f62-45af-ab81-96736ca092e6&
  54. https://esecurityplanet.com/products/top-cybersecurity-companies/
  55. https://www.esecurityplanet.com/trends/the-best-security-for-wireless-networks/
  56. https://www.esecurityplanet.com/trends/
  57. https://www.esecurityplanet.com/trends/top-cybersecurity-podcasts/
  58. https://www.esecurityplanet.com/trends/
  59. https://www.esecurityplanet.com/trends/hackergpt/
  60. https://www.esecurityplanet.com/trends/
  61. https://www.facebook.com/eSecurityPlanetcom-201643516537315/
  62. https://www.linkedin.com/company/esecurity-planet/
  63. https://twitter.com/eSecurityPlanet?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
  64. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_button
  65. https://www.esecurityplanet.com/privacy-policy/
  66. https://technologyadvice.com/terms-conditions/
  67. https://www.esecurityplanet.com/about/
  68. https://technologyadvice.com/contact-us/
  69. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_contact-us
  70. https://technologyadvice.com/privacy-policy/ccpa-opt-out-form/
  71. https://www.esecurityplanet.com/privacy-policy/
  72. https://technologyadvice.com/terms-conditions/
  73. https://www.esecurityplanet.com/about/
  74. https://technologyadvice.com/contact-us/
  75. https://solutions.technologyadvice.com/advertise-on-esecurity-planet/?utm_source=esecurityplanet&utm_medium=portfolio_footer&utm_campaign=advertise_contact-us
  76. https://technologyadvice.com/privacy-policy/ccpa-opt-out-form/

   Hidden links:
  78. https://www.esecurityplanet.com/
  79. https://www.esecurityplanet.com/trends/the-best-security-for-wireless-networks/
  80. https://www.esecurityplanet.com/trends/top-cybersecurity-podcasts/
  81. https://www.esecurityplanet.com/trends/hackergpt/
  82. https://www.esecurityplanet.com/
  83. https://technologyadvice.com/
  84. https://datamation.com/
  85. https://webopedia.com/
  86. https://enterprisenetworkingplanet.com/
  87. https://eweek.com/
  88. https://project-management.com/
  89. https://serverwatch.com/
  90. https://itbusinessedge.com/


Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)