Successfully reported this slideshow.
Your SlideShare is downloading. ×

File On Cory Resilient Fake TI Gang Stalker #flushyourmeds

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Archive*today*org also Archived to PERMA*CC ... ;
Run Kali VirtualBox on Linux Mint instead of Mac OS or
Windows and you'l...
Andrew Tate Was A Pimp #flushyourmeds
How is a Pimp A Good Role Model for Society AKA Planet Earth??? ... ;
Scott Barry
14...
Published in CodeX
Thami Memel Follow
Aug 7, 2021 · 6 min read · Listen
Save
5 Reasons Why Linux is More Secure Than
Windo...
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Upcoming SlideShare
Linux
Linux
Loading in …3
×

Check these out next

1 of 30 Ad

More Related Content

Similar to File On Cory Resilient Fake TI Gang Stalker #flushyourmeds (20)

Advertisement

Recently uploaded (20)

File On Cory Resilient Fake TI Gang Stalker #flushyourmeds

  1. 1. Archive*today*org also Archived to PERMA*CC ... ; Run Kali VirtualBox on Linux Mint instead of Mac OS or Windows and you'll get better numbers Linux has "Sudo" ... ; Windows is a Malware Magnet and so is Mac OS ... ; You claiming "Linux is the easiest to hack is bogus" People disable IPPCUPS and Change the Passwords ... ; Many Servers Online require a Key For SSH and are hardened, Most Internet Servers are on Linux or BSD. A PC World Article Contradicts your view that "Linux is the most easiest to hack platform" I spoofed my Mac Address, I run Linux on RAM Disk as a Live OS "VENTOY" so there ... ; https://www.pcworld.com/article/508291/why_linux_is_more_secure_than_windows.html ' Hey, I'm Running a Live Operating System Through Ventoy on 64Bit, So even if you did something, it would erase Everything on Reboot (RUNS ON RAM DISK). So your point is what, A PC World Article Contradicts your view that "Linux is the easiest to Hack" Platform. And you forgot FreeBSD, which is another one with Permissions. Why Linux Is More Secure Than Windows You lost the debate Cory Resilient, God is Imaginary, Andrew Tate was Pimp with Webcam WH BUS and Pimps are Beta Males ... ; KNM Adam Green And SomeOrdinaryGamers said Andrew Tate was A Pimp Beta Male and not a Good Role Model ... ; 1. Privileges Linux systems are by no means infallible, but one of their key advantages lies in the way account privileges are assigned. In Windows, users are generally given administrator access by default, which means they pretty much have access to everything on the system, even its most crucial parts. So, then, do viruses. It’s like giving terrorists high-level government positions. With Linux, on the other hand, users do not usually have such “root” privileges; rather, they’re typically given lower-level accounts. What that means is that even if a Linux system is compromised, the virus won’t have the root access it would need to do damage systemwide; more likely, just the user’s local files and programs would be affected. That can make the difference between a minor annoyance and a major catastrophe in any business setting. How About Them Apples??? (sudo) (su) (passwd) *disabled all Ports and it shows all ports closed on "nmap -Pn -O localhost" ; The Ext4 Filesystem is also more stable and efficient ... ; And Ventoy lets me run Linux as a Live OS on Ram Disk ... ; Did you know I was running a Live Linux OS on Ram Disk ... ; You claiming "Linux is the Least Secure" is all Bunk and Bogus ... ; --Scott A. Barry ... ; Gmail - PC World https://mail.google.com/mail/u/0/?ik=dae0085a38&view=pt&... 2 of 2 1/15/23, 06:11
  2. 2. Andrew Tate Was A Pimp #flushyourmeds How is a Pimp A Good Role Model for Society AKA Planet Earth??? ... ; Scott Barry 14 min ago Comments Andrew Tate Was A Pimp #flushyourmeds How is a Pimp A Good Role Model for Society AKA Planet Earth??? ... ; by Scott A. Barry / Scott A Barry / Scott Barry … ; Scott Alan Barry is an Atheist Holocaust Denier Dunce … ; Write a comment… © 2023 Scott Barry ∙ Privacy ∙ Terms ∙ Collection notice Substack is the home for great writing Andrew Tate Was A Pimp #flushyourmeds - by Scott Barry https://flushyourmeds.substack.com/p/andrew-tate-was-a-p... 1 of 2 1/15/23, 03:58
  3. 3. Published in CodeX Thami Memel Follow Aug 7, 2021 · 6 min read · Listen Save 5 Reasons Why Linux is More Secure Than Windows When you hear the word Linux, probably the first thing that will cross your mind is a terminal filled with a lot of commands. This might be true for servers running Linux, but it’s not all. Open in app Sign up Sign In Search Medium 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 1 of 8 1/15/23, 04:41
  4. 4. Nowadays, more and more people are using Linux as their operating system, and even though the market share isn’t as big as Windows, many new Linux users choose it for its security and stability. In this article, I will try to show the main reasons why Linux is generally more secure than Windows, and why you should probably switch to Linux if you can. The Numbers Usage share of operating systems for servers (source Wikipedia) When it comes to security, servers are the most concerned. Servers on the internet store and transfer important data, and they can’t afford to be compromised. In the picture above, we can see that more and more servers use Unix operating systems, which are dominated by Linux. It might also surprise you that Microsoft uses Linux to run its cloud and other services. But keep in mind that while security plays a role in that market difference, there are other reasons such as Linux being generally free and open source, and a lot more stable than windows. So why is Linux More Secure Than Windows? • User Permissions 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 2 of 8 1/15/23, 04:41
  5. 5. • Software Installation • Open Source • Updates • Security through obscurity User Permissions Linux will ask for an admin password whenever a system-wide operation is launched When you install Windows, it will create an administrator account and give you full access to do basically whatever you want with the operating system using the magical “Run as administrator” option. Linux, on the other hand, doesn’t allow such permissions by default, it will allow you to use your home directory freely, but whenever you want to do a system-level operation you need to provide the root password. Now for this point, Windows can be as secure as Linux if configured properly, but for decades the way the default installation of Windows handles user permission is wrong and risky. A user can easily run a program as an administrator in Windows, while in Linux you have to enter the root password whenever you want to do so, this way you can notice when a script or a program tries to do something system-wide. Software installation 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 3 of 8 1/15/23, 04:41
  6. 6. Users can install whatever software they need without browsing the web To install software on Windows, users generally go to the internet, search for an EXE or MSI file, download it and install it. This is a huge security risk since you never know if this source can be trusted or not. Linux on the other hand uses something called package managers. To put it simply, a package manager is responsible for downloading the programs you need from trusty sources called repositories. Repositories are usually managed by the community, and packages take a long process to get verified and accepted. They also make things easier for the user, since there is no search on the internet nor any lookup for download files, all you have to do is enter a simple command. There are also many GUI applications on Linux that act like an interface for the package manager, and allow the user to browse and install the software in a more beginner-friendly way. Microsoft tried to fix that problem by introducing the Windows Store, but we all know that nobody uses it, since Windows users are used to it the wrong way now. Also, the Windows store is slow and doesn’t include most applications. Open Source 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 4 of 8 1/15/23, 04:41
  7. 7. Source: CVE Details Linux is an open-source operating system, which means that the source code for it is available for anyone to see and modify, you can even create your personal Linux distribution and commercialize it if you want and nobody will stop you. At first, you might think that this is a security risk since bad people can look at the code. But the benefits outweigh the risks in this case. Since even more, developers and researchers all over the world find bugs and exploits and send patches almost every day to the Linux source code, which makes it safer and more secure over time. Open platforms historically undergo a lot of scrutiny, but there are a lot of advantages to having an open source platform from a security standpoint. — Sundar Pichai In contrast, Windows is proprietary software owned by Microsoft, and no matter how many talented developers Microsoft hires, finding exploits will never be as fast as in Linux since there is a big community behind it. 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 5 of 8 1/15/23, 04:41
  8. 8. Also, unlike Windows, Linux distributions promote open source software. So most applications you will find on Linux are open source and benefits from the same thing. Updates Using only 2 commands users can update all system and software packages For windows, automatic updates are only available for the system and a few other Microsoft software. Generally, the software developers are responsible for implementing updates, which some don’t implement at all. This leaves the users with outdated applications on their systems. And it is one of the biggest security risks since it makes the system full of vulnerabilities that could easily be exploited. Linux instead makes it easy to get updates and security patches not only for the system but also for the applications, just by using one or two commands only. All thanks to the package managers. Note: Another reason why people love Linux is that during updates 99% of the time, you don’t need to restart your computer, even when you update the system. Security through obscurity 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 6 of 8 1/15/23, 04:41
  9. 9. Source: Wikipedia Even though Linux is running the majority of servers in the world, its user base when it comes to desktops is very low compared to Windows at only 2%. While malware and viruses that target Linux exist, they are usually geared towards web servers and network devices, and not Linux desktop devices. On the other hand, Windows has a huge desktop user base at around 76%, this makes it a profitable target not only for real “Hackers”, but also for “script kiddies” and “crackers” who use the many tools available to exploit Windows. Final Words Despite all of that, user actions are what matters in the end. Windows can be as safe as Linux if it is piloted by a good user who takes security measures into consideration. The point where Linux beats Windows the most in my opinion is that it makes it hard for you to screw up because it gives you good security options by default and pushes you to do the right thing. Microsoft could learn a lot from the way Linux does that. And as the developers of the most used desktop operating system in the world, they should implement better default options for security to combat nowadays risks. Thanks to Domenico Nicoli Linux Windows Cybersecurity Security Tech 96 3 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 7 of 8 1/15/23, 04:41
  10. 10. Sign up for CrunchX By CodeX A weekly newsletter on what's going on around the tech and programming space Take a look. Get this newsletter By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices. About Help Terms Privacy Get the Medium app Your email 5 Reasons Why Linux is More Secure Than Windows | CodeX https://medium.com/codex/5-reasons-why-linux-is-more-sec... 8 of 8 1/15/23, 04:41
  11. 11. Richard Stallman's personal site. https://stallman.org For current political commentary, see the daily political notes. RMS's Bio | The GNU Project How I do my computing My computer As of 2022 I use a Thinkpad x200 computer, which has a free initialization program (Libreboot) and a free operating system (Trisquel GNU/Linux). It was not sold that way by Lenovo, however; small businesses buy them used, recondition them, and install the free software. This is one of the computers endorsed by the FSF. I've used other Thinkpad models with similar moral virtues since 10 or so years ago. Before using such Thinkpads, I used the Lemote Yeeloong for several years. At the time, it was the only laptop one could buy that could run a free initialization program and a free operating system. But it was never sold with a free operating system. Lemote has not sold such a computer for many years. Before that, I used an OLPC for some weeks. The OLPC uses a nonfree firmware blob for the WiFi, so I could not use the internal WiFi device. That was no big problem -- I used an external WiFi adaptor. I stopped using it because the OLPC project decided to make their machine support Windows, so I did not want to appear to endorse it by visibly carrying it around. I could have continued using it privately with its free software installation, but I had no need for another computer to use only privately. The result that then seemed likely, millions of children running Windows on the OLPC, did not occur. Instead we saw millions of children running Windows on the Intel Classmate, or nowadays a Chromebook that sends the child's personal data to Google. Before that I used machines that ran completely free GNU/Linux systems but had nonfree BIOSes. I tried for about 8 years to find a way to avoid the nonfree BIOS in some commercial machine. How I do my Computing https://stallman.org/stallman-computing.html 1 of 11 1/15/23, 04:41
  12. 12. GNU/Linux distro I do not have a preferred GNU/Linux distro. I recommend all the ethical distros — namely, those that are composed 100% of free software. I've chosen not to make judgments comparing the ethical distros in practical ways. That is a secondary issue for me, and I'd rather not distract people from the primary (ethical) issue. Anyway, many others could do practical reviews and comparison better than I can. Indeed, I am not in a position to compare free distros on practical criteria because I have not tried them all. To try them would be a lot of work, and there are other more useful things for me to work on. What I do on my computer Mostly I use a text console, for convenience's sake. Most of my work is editing text and that is more efficient on a text console. On the text console, the touchpad can't cause me any trouble if I touch it by accident. I do use X11 for tasks that need a graphical interface. I have no preferred graphical environment or window manager. Since my own practical interest in using graphical environments is small, I don't want to spend time comparing them. My choice of text terminals is not an ethical issue, just my own personal preference. On the ethical level, I think it is important for free software to provide convenient free graphical user interface software, which is why the GNU Project launched three projects to develop that. The third one, GNOME, was a success. I spend most of my time editing in Emacs. I read and send mail with Emacs using M-x rmail and C-x m. I have no experience with any other email client programs. In principle I would be glad to know about other free email clients, but learning about them is not a priority for me and I don't have time. I edit the pages on this site with Emacs also, although volunteer helpers install the political notes and urgent notes. I have no experience with other ways of maintaining web sites. In principle I would be glad to know about other ways, but learning about them is low priority for me and I have other things to do. How this site is maintained This site is maintained in a very simple way. I edit the pages such as this one manually as HTML. I only know simple HTML; helpers who know more wrote the parts at the top and bottom of pages, and the more complex formatting on the home page. Volunteer helpers install the political notes every day after receiving the text of each note from me by email. How I do my Computing https://stallman.org/stallman-computing.html 2 of 11 1/15/23, 04:41
  13. 13. A cron job "rolls over" the political notes page every two months. The photo galleries are generated with this perl script. The search feature on the site is done with this code. An explanation of the concept of designing a "user experience" also shows why I find the idea loathsome. This is why I want stallman.org to remain simple: not a "user experience" but rather a place where I present certain information, views and action opportunities so you can see them. Would you like to volunteer to help keep this site going? Write to rms at the site gnu.org. How I use the Internet • I have used the Internet since it first existed. I never used UUCP, though occasionally I sent emails to addresses that specified further transmission via UUCP. • I am careful in how I connect to the internet. Specifically, I refuse to connect through portals that would require me to identify myself, or to run any nontrivial nonfree Javascript code. I use LibreJS to prevent nonfree Javascript code from running.. I don't mind giving an identity that isn't really me, in order to connect, if that works. That does not violate my privacy. I often connect in a person's home. The person of course knows who I am, but I have no objection to that. What I would object to is putting my identity in a database that can be searched. I prevent that by changing my mac address at each location. • I am careful in how I use the Internet. I generally do not connect to web sites from my own machine, aside from a few sites I have some special relationship with. I usually fetch web pages from other sites by sending mail to a program (see https://git.savannah.gnu.org/git/womb/hacks.git) that fetches them, much like wget, and then mails them back to me. Then I look at them using a web browser, unless it is easy to see the text in the HTML page directly. I usually try lynx first, then a graphical browser if the page needs it. I occasionally also browse unrelated sites using IceCat via Tor. Except for rare cases, I do not identify myself to them. I think that plus Tor plus LibreJS is enough to prevent my browsing from being associated with me. IceCat blocks tracking tags and most fingerprinting methods. I never run nonfree Javascript on my browser, unless LibreJS finds it to be trivial. How I do my Computing https://stallman.org/stallman-computing.html 3 of 11 1/15/23, 04:41
  14. 14. I never pay for anything on the Web, because that generally requires running nonfree Javascript code in my browser. It also requires identifying myself. I never identify myself to buy any product. I avoid paying with credit cards generally. That page describes a very few exceptions. For freedom's sake, insist on paying cash. When a business pressures you to pay in an identified way, it's your chance to defend freedom by saying, "If you won't take my cash, no sale!" • I would not mind paying for a copy of an e-book or music recording on the Internet if I could do so anonymously, and it treated me justly in other ways (no DRM or EULA). But that option almost never exists. I keep looking for ways to make it exist. • For searching, I often DuckDuckGo. Thanks to Tor and LibreJS, it does not identify me. I used to use searx to search specifically for images, but this no longer works: specifying search for images now depends on nonfree Javascript code. Unless and until this is fixed, I no longer use searx. I also sometimes use ixquick.com. My usual precautions should stop them from knowing it is me. Since several years ago, I cannot directly access Google search. It sends me a broken CAPTCHA. I suspect the reason it tries to send me a CAPTCHA is that I am coming through Tor. I would answer the CAPTCHA if that worked, but it does not. I suspect that the reason the CAPTCHA is broken is that it depends on nonfree Javascript that it tries to run in my computer. I refuse to let that run. I am not willing to let Google see where I am, so I won't bypass Tor. However, the Librex proxies have worked around that problem. They enable me to access Google Search indirectly, and they work correctly through Tor with LibreJS enabled. Social media • I do not use any social networking sites because that way of working is inconvenient for me. That doesn't mean I think they are all unethical. Some are, some are not. Social networking sites raise their own set of ethical issues, completely different from the ethical issues of distributing software ( free vs proprietary), and there are big differences between them. I have a Twitter account called rmspostcomments, which I use to log in on other sites How I do my Computing https://stallman.org/stallman-computing.html 4 of 11 1/15/23, 04:41
  15. 15. to post comments on articles. I never post on Twitter. Someone made an account stallman_feed which I'm told posts something about my political notes. Any other Twitter account that claims to be mine is an impostor. The rms account on gnusocial.no repeats the political notes from this site, but I do not post on it directly. That site runs GNU Social. Aside from those two, any account on a social networking site that says it is mine is an impostor. I do not post on 4chan. I have nothing against it in the abstract, but I am told a lot of the posts nowadays are right-wing bigotry which I condemn totally. I have occasionally answered questions for interviews for 4chan, but I have never posted anything there. Any posting there that says it is by me is by an impostor. • I have never had a Facebook account. Some impostor created a Facebook account using my name. The page is not mine. I reject Facebook because it requires each used (i.e., person used by Facebook) to have just one account, which means that all the person's activities are grouped together. It also insists on knowing the person's usual name, and it is starting to demand a series of different photos. I am proud to identify myself when stating my views; I can afford to do that because I am in a fairly safe position. There are people who rationally fear reprisals (from employers, gangsters, right-wing extremists, left-wing conformity enforcers, or the state) if they sign their name to their views. For their sake, let's reject any social networking site which insists on connecting an account to a person's real identity. Of course, Facebook is bad for many other reasons as well. E-mail service People sometimes ask me to recommend an email service. The two ethical issues for an email service are (1) whether you can use it without running any nonfree software (including nonfree Javascript code from the site), and (2) whether it respects your privacy. For issue 1, see the FSF's page. On issue 2, I have no way to verify that any email service is satisfactory. Therefore, I have no recommendation to offer. However, I can suggest that it may be wise to use an email service that is not connected with your search engine. That way you can be almost sure that your email contents don't influence your search results. You shouldn't identify yourself to a search engine in any case. How I do my Computing https://stallman.org/stallman-computing.html 5 of 11 1/15/23, 04:41
  16. 16. Programming languages • The most powerful programming language is Lisp. If you don't know Lisp (or its variant, Scheme), you don't know what it means for a programming language to be powerful and elegant. Once you learn Lisp, you will see what is lacking in most other languages. Unlike most languages today, which are focused on defining specialized data types, Lisp provides a few data types which are general. Instead of defining specific types, you build structures from these types. Thus, rather than offering a way to define a list-of-this type and a list-of-that type, Lisp has one type of lists which can hold any sort of data. Where other languages allow you to define a function to search a list-of-this, and sometimes a way to define a generic list-search function that you can instantiate for list-of-this, Lisp makes it easy to write a function that will search any list — and provides a range of such functions. In addition, functions and expressions in Lisp are represented as data in a way that makes it easy to operate on them. When you start a Lisp system, it enters a read-eval-print loop. Most other languages have nothing comparable to `read', nothing comparable to `eval', and nothing comparable to `print'. What gaping deficiencies! I skimmed documentation of Python after people told me it was fundamentally similar to Lisp. My conclusion is that that is not so. `read', `eval', and `print' are all missing in Python. Some fans of Clojure say it is a variant of Lisp. I disagree, because it lacks one of the fundamental features of Lisp: cons cells, out of which we construct lists. While I love the power of Lisp, I am not a devotee of functional programming. I see nothing bad about side effects and I do not make efforts to avoid them unless there is a practical reason. There is code that is natural to write in a functional way, and code that is more natural with side effects, and I am not a partisan of either way. I limit my campaigning to issues of freedom and justice, such as the injustice of nonfree software. Lisp is no harder to understand than other languages. So if you have never learned to program, and you want to start, start with Lisp. If you learn to edit with Emacs, you can learn Lisp by writing editing commands for Emacs. You can use the Introduction to Programming in Emacs Lisp to learn with: it is free as in freedom, and you can order printed copies from the FSF. How I do my Computing https://stallman.org/stallman-computing.html 6 of 11 1/15/23, 04:41
  17. 17. You can learn Scheme (and a lot of deep ideas about programming) from Structure and Interpretation of Computer Programs by Abelson and Sussman. That book is now free/libre although the printed copies do not say so. Please don't buy books (or anything) from Amazon! • My favorite programming languages are Lisp and C. However, since around 1992 I have worked mainly on free software activism, which means I am too busy to do much programming. Around 2008 I stopped doing programming projects. As a result, I have not had time or occasion to learn newer languages such as Perl, Python, PHP, Ruby, Lua, Go, Scala, Rust, and so on. Therefore, I don't have an opinion about them as languages. If you want to learn C, but you already know how to program in some other language, I recommend you try my GNU C Language Introduction and Reference Manual. I read a book about Java, and found it an elegant further development from C. But I have never used it. I did write some code in Java once, but the code was in C and Lisp (I simply happened to be in Java at the time ;-). • By contrast, I find C++ quite ugly. The flaws of C++, as I recall from when I studied the matter around 1990, include syntax and semantics. As for syntax, its grammar is ambiguous, and it is gratuitously incompatible with C, which blocks the smooth upgrade path from C to C++. As for semantics, the abstract object facility of C++ is designed around the case where the real type of an object is known at compile time. However, in that case, abstract objects are equivalent to a naming convention for functions to call. The case where abstract objects add real power to a language is when the type is not known until run time. C++ does handle that, but it seems to be an afterthought, a poor relation. I suspect that I would find plenty of ugliness in the template library, but I don't know. That was added to C++ after I studied it. How to learn programming First, read a textbook about programming in some language, then manuals for several programming languages including Lisp. If they make natural intuitive sense to you, that indicates your mind is well-adapted towards programming. How I do my Computing https://stallman.org/stallman-computing.html 7 of 11 1/15/23, 04:41
  18. 18. If they don't make intuitive sense to you, I suggest you do something other than programming. You might be able to do programming to some degree with a struggle, but if you find it a struggle you won't be very good at it and you won't enjoy it. What's the point of programming if it is a struggle instead of a fascination? After that, you need to read the source code of real programs (or parts of them) and figure out what they do. Then start writing changes in them, to add features, or fix bugs if you can find out about specific bugs to fix. Ask some good programmers who are familiar with the code of those programs to read and critique your changes. If you fix bugs in a free program that others are developing, the developers are likely to be glad to get fixes from you and will tell you the way to write them to make them good to install. Look at their TODO list for features they would like to add, and implement some. You will find it is a great satisfaction when the developers incorporate your changes. Do this over and over and you will become good at developing software. Please use your programming capability only for good, not for evil. Don't develop nonfree software, or Service as a Software Substitute. Design systems not to collect personal information, and to allow anonymous use. Non-free software issues I firmly refuse to install non-free software or tolerate its installed presence on my computer or on computers set up for me. However, if I am visiting somewhere and the machines available nearby happen to contain non-free software, through no doing of mine, I don't refuse to touch them. I will use them briefly for tasks such as browsing. This limited usage doesn't give my assent to the software's license, or make me responsible its being present in the computer, or make me the possessor of a copy of it, so I don't see an ethical obligation to refrain from this. Of course, I explain to the local people why they should migrate the machines to free software, but I don't push them hard, because annoying them is not the way to convince them. Likewise, I don't need to worry about what software is in a kiosk, pay phone, or ATM that I am using. I hope its owners migrate them to free software, for their sake, but there's no need for me to refuse to touch it until then. (I do consider what those machines and their owners might do with my personal data, but that's a different issue, which would arise just the same even if they did use free software. My response to that issue is to minimize activities which give them any data about me.) That's my policy about using a machine once in a while. If I were to use it for an hour How I do my Computing https://stallman.org/stallman-computing.html 8 of 11 1/15/23, 04:41
  19. 19. every day, that would no longer be "once in a while" — it would be regular use. At that point, I would start to feel the heavy hand of any nonfree software in that computer, and feel the duty to arrange to use a liberated computer instead. Likewise, if I were to ask or lead someone to set up a computer for me to use, that would make me ethically responsible for its software load. In such a case I insist on using free software exclusively, just as if the machine were my own property. As for microwave ovens and other appliances, if updating software is not a normal part of use of the device, then it is not a computer. In that case, I think the user need not take cognizance of whether the device contains a processor and software, or is built some other way. However, if it has an "update firmware" button, that means installing different software is a normal part of use, so it is a computer. Skype, Zoom, WhatsApp, and any nonfree noninteroperable communication program, are special cases because of their network effect. Using Skype to talk with someone else who is using Skype is encouraging the other to use nonfree software. Doing so regularly is pressuring the other to use nonfree software. So I refuse to use Skype under any circumstances. More information about Skype. More information about Zoom. Streaming medias and DRM issues • Streaming media dis-services such as Netflix and Spotify require nonfree client programs that impose digital restrictions mechanisms (DRM) intended to stop the user from saving a copy of the data being streamed through her own computer. You should never use DRM that you can't break, so you should not use these dis-services unless you can break their DRM. An additional injustice of these and other streaming client programs is that they impose unjust contracts (EULAs) which restrict the user more strictly than copyright law itself. I do not agree to EULAs, period, and I urge you to join me in rejecting them. These streaming dis-services are malicious technology designed to make people antisocial. (If you don't have a copy, you can't share copies.) Rejecting them is of the highest ethical priority. A friend once asked me to watch a video with her that she was going to display on her computer using Netflix. I declined, saying that Netflix was such a threat to freedom that I could not treat it as anything but an enemy. I did not want to watch anything through Netflix or Spotify even on someone else's computer. How I do my Computing https://stallman.org/stallman-computing.html 9 of 11 1/15/23, 04:41
  20. 20. Out, out, damned Spotify! Flick off Netflix! • Every product with Digital Restrictions Management (DRM) is an attack on your freedom. Therefore, one should not buy or tolerate any product with DRM handcuffs unless one personally possesses the means to break the handcuffs. For instance, don't use encrypted DVDs unless you have DeCSS or another comparable free program. And never use a Bluray disk unless you find a way to break its handcuffs. Don't use the Amazon Swindle or other e-book readers that trample readers' freedoms. Don't use music or video streaming "services" that impose DRM. (If they require a nonfree client program, it is probably for DRM or some sort of surveillance of users.) Miscellaneous • I never used Unix (not even for a minute) until after I decided to develop a free replacement for it (the GNU system). I chose that design to follow because it was portable and seemed fairly clean. I was never a fan of Unix; I had some criticisms of it too. But it was ok overall as a model. • In the mid 90s I had bad hand pain, so bad that most of the day I could only type with one finger. The FSF hired typists for me part of the day, and part of the day I tolerated the pain. After a few years I found out that the pain was due to the hard keys of my keyboard. I switched to a keyboard with lighter key pressure and the problem mostly went away. My problem was not carpal tunnel syndrome: I avoid that by keeping my wrists pretty straight as I type. There are several kinds of hand injuries that can be caused by repetitive stress; don't assume you have the one you heard of. See a doctor and find out. • I find it bizarre that people now use the term "coding" to mean programming. For decades, we used the word "coding" for the work of low-level staff in a business programming team. The designer would write a detailed flow chart, then the "coders" would write code to implement the flow chart. This is quite different from what we did and do in the hacker community -- with us, one person designs the program and writes its code as a single activity. When I developed GNU programs, that was programming, but it was definitely not coding. Since I don't think the recent fad for "coding" is an improvement, I have decided not to adopt it. I don't use the term "coding", unless I am talking about a business programming team which has coders. • Why I coined the name POSIX. How I do my Computing https://stallman.org/stallman-computing.html 10 of 11 1/15/23, 04:41
  21. 21. Return to Richard Stallman's home page. Please send comments on these web pages to rms@gnu.org. Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2015, 2018, 2019, 2022 Richard Stallman Verbatim copying and distribution of this entire article is permitted in any medium, provided this notice is preserved. How I do my Computing https://stallman.org/stallman-computing.html 11 of 11 1/15/23, 04:41
  22. 22. https://www.emertxe.com/embedded/why-linux-is-more-secure-than-other-operating-systems/ https://www.emertxe.com/embedded/why-linux-is-more-secure-than-other-operating-systems/ https://www.emertxe.com/embedded/why-linux-is-more-secure-than-other-operating-systems/ SO WHAT ARE YOU TRYING TO PROVE ANYWAYS I HAVE MORE SHIT!!!!!! ; Why Linux Is More Secure than Other Operating Systems? A brief about OS Before getting into why is linux more secure than other operating systems, let us have a look into the brief on Operating Systems. Operating System is a software, that manages all hardware resources associated with the computer. Generally, Operating System is comprised of number of pieces such as the Boot loader, the Kernel, Daemons, Desktop environment and applications. Typically, OS is deployed in any system when multi-tasking required to be performed, which is achieved by resource management functionality of the OS as mentioned above. Along with that, the user also requires interface with the system to interact and invoke various applications. In modern day OS, these interfaces (popularly known as GUI) are expected to provide best-in-class User Experience (UX) to the users, by making it easy to use the system. Linux Linux is a free, open-source software OS distribution built around Linux Kernel. It was first developed for personal computers based on x86 architecture. From initial days, Linux has grown leaps and bounds which is now supporting every popular architecture that we can think of (ex: ARM). To suite any type of user / customer requirements, Linux has a number of different versions. They are called as “distributions” or “distros” in short. Popular
  23. 23. distributions are Ubuntu (Normal user), Suse / Redhat (Enterprise servers), Cent OS (Cloud platforms). In fact, Android is also based on Linux Kernel, which has become very popular OS for mobile phones and embedded devices. There are more flavor/versions of Linux available other than the above mentioned. Linux and Security Linux systems are rarely infected by malware such as viruses, worms etc, thereby making it as a very secure OS. As a normal user, we will never come across a situation where Antivirus software is been sold for Linux. This means, Linux is inherently secure and there are many reasons associated with it. Let us look into the key reasons that describes why is linux more secure than other operating systems. What makes Linux secure? Privileges To start with, Linux has clearly defined privileges at multiple levels, thereby restricting access. For example, there is a ‘root’ level access rights (which you can relate with ‘administrator’ in any OS) which are not given to any normal user. Users are given access only to lower level accounts with limited access. When a Linux system is compromised, virus or malware will not get the root access to damage system wide. Only local files and programs of users will be affected, as the normal user will not have access permission to all the files in the system. This leads to least effect of virus in systems with Linux. As Linux users don’t have root access, it is difficult to cause damage on Linux. Let us take the example of file permissions! The example below contains local files and permissions. The permission information of each file or directory is mentioned as a combination of 9 characters for three levels (owner, group and all users) with three different permissions (read, write and execute). Considering drwxrwxr-x, where d in drwxrwxr-x stands for directory, first rwx represents owner permissions which applies only to owner of the directory. This won’t impact the action of other users. The second set of rwx is the group permissions and third set of r-x denotes permission for all users. Similar permission information for all the files in a particular user’s directory is given below. Fig 1: Example for user permissions
  24. 24. Also in Linux, “everything is a file” (which is popularly known as Virtual File System) which includes, directory, a normal file, character device, block device, hard-drive, keyboards and printers etc. Since, everything is a file in Linux, access restriction can be done, thereby making Linux as a secure OS. An example of different types of files is given below. Fig 2: Example – Directory, block device, character device and permissions OPEN SOURCE As most of you may be aware, Linux Kernel is an open source software. This means the code is developed and maintained by set of highly passionate individuals who is often called as “community”. Since the beginning of Linux, its creator Linus Torvalds has been a strong supporter of getting more “eye-balls” looking into the code. This means the more people see the code and review or test it, the quality improves. Even though this concept applies to all open source software development, for Linux it is followed very religiously. The Linux Kernel development happens in a highly process oriented, engineered approach. The whole source code is divided into multiple subsystems (ex: Memory management) which is maintained by a subsystem maintainers. This maintainer, with a set of reviewers thoroughly review each and every change that is getting into the mainline Kernel thereby making it secure by design. The image given below gives a glimpse of this development process.
  25. 25. Fig 3: Linux Kernel – Development Process Along with entry level quality control, developers will keep providing fixes for security vulnerabilities / issues in terms of “patches”. A patch is a piece of software designed to fix bugs. By regular release of patches for Linux Kernel, users can upgrade their Kernel to keep it stable and secure. Check out the Linux CVE link to get a view of these patches. Memory management Memory access and management plays a key role in security of an OS. There are various memory management models adapted by different Operating Systems. In this blog, let us compare Linux with another operating system – VxWorks. In OS like VxWorks, ‘flat memory model’ is been followed, where user space and kernel space are not well separated. Here, the system allocates memory in the physical address space. Typical VxWorks doesn’t have virtual memory support (however it can be added / enabled). Since physical memory is directly available for access, security threat prevails in this Operating System, as the malware programs can manipulate the memory and eventually bring down the system. Whereas in Linux, user space and kernel space are well separated. Here, actual physical address allocated for any process will not be displayed to users. For example, try printing
  26. 26. address of parent process and child process created using fork() system call. Address of both parent and child processes will be the same which is the virtual address. This is because, any application can access only the virtual address which is mapped to the physical address. Due to this, no damage can be made to actual physical address space. This way of managing memory makes Linux more secure. Find image below which describes virtual address – physical address mapping. Fig 4: Physical address – virtual address mapping Having this kind of memory management approach has got its own disadvantages a well. • Example-1: When the user application invokes a system call, there is a soft interrupt triggered from the user-space to kernel space which introduces delay. • Example-2: When the virtual address needs to be translated into physical address, the translation process will introduce some delay. This is one of the reasons why Linux is not preferred much for Real Time Systems (RTS), as linux it not matching up to the time expectations imposed by Real Time Operating Systems (RTOS). Recording system events A log file is maintained where file accesses and system accesses are written to it in Linux. If some user tries to enter into safe system file, these can be reviewed by the system administrator. Failed login attempts, security issues etc., are also written and available for system administrator to study later. Hence, by maintaining a log file to record system events, effective monitoring and preventive actions can be taken in Linux. Log files contain messages about the system, kernel, services and applications running on it. There are different types of log files available for different kind of information. Most of the log files are located in /var/log directory.
  27. 27. Fig 2: Example – /var/log files The following list contains various types of log files and what they contain. 1. /var/log/messages General message and system related stuff 2. /var/log/auth.log Authentication logs 3. /var/log/kern.log Kernel logs 4. /var/log/qmail/ Qmail log directory (more files inside this directory) 5. /var/log/yum.log Yum command log file. 6. /var/log/mysqld.log MySQL database server log file 7. /var/log/lighttpd/ Lighttpd access and error logs directory 8. /var/log/maillog Mail server logs 9. /var/log/cron.log Crond logs (cron job) 10. /var/log/httpd/ Apache access and error logs directory 11. /var/log/boot.log System boot log 12. /var/log/secure or /var/log/auth.log Authentication log 13. /var/log/utmp or /var/log/wtmp Login records file We can monitor all kind of above mentioned logs using their respective log files and this monitoring helps in improving the security better. SELinux SELinux is a security enhancement to Linux which allows users and administrators have more control over file access. It provides a flexible mandatory access control (MAC) system built into the Linux Kernel. Any process or application that is currently running as a user, has permissions to access objects such as files, sockets etc. In general, when a file is created by a person he will have read, write permissions and he can grant access to users and groups or change the owner of the file. This may leave critical files exposed to users who doesn’t require the access at all. System administrator cannot enforce security to every file in the system. Considering another scenario where a developer is executing files from home directory and may view log files. They may use sudo or su commands where it puts system files under risk. To avoid this, SELinux comes into play, where access control requirements can be fine-tuned.
  28. 28. With this, system administrator can define what a process or user should do. Hence SELinux takes Linux to next level of security making it more secure. In conclusion, system administrators should decide on how strict the policies should be for their server environment. MAC kernel helps in protecting system from the applications that could cause damage to the system. This is a next level of security in Linux. Conclusion Security is a very fast and evolving topic! Given the fact that Linux is an Open Source and many “eye-balls” are watching it, many of the security issues are taken care by releasing frequent patches. Added go that there are some OS design level aspects like memory management, user / kernel memory space separation, virtual memory, log management, file access control makes it all the more secure when it comes to security. However, Linux systems are not certainly flawless, no operating system is. Using Linux can reduces the chances of security breach. What makes an Operating System secure is purely based on how the OS is used. Linux in wrong hands may lead to security breach. User’s choice matters the more in making Linux a secure OS, whatever the flavor may be! Happy Learning!!
  29. 29. Get a life and you won't be worried about mine. Your a rookie. And Linux is the easiest to hack out of them all lol your on drugs 😆 🤣 On Sat., Jan. 14, 2023, 5:28 p.m. Scott Barry, wrote: I need Print Screen and Evidence, not some bragging, Prove that you hacked me, I accessed that Grabify Link in "Tor" on a Seperate Browser, My Mastodon shows my Connection Changes IPAddress from time to time, and you bragging proves nothing, you cannot get a shell on Linux, because it has true permissions, unlike Mac OS, Andriod, and Windows which ARE Mainstream and Backdoored, so what's your point, Scammer Dot Info also exposed you in an article titled "Warning Do Not Interact with this Person". So where the hell are you at? Where is the Reverse Shell or The Pass-The-Cookie Attack anyways? You claim you got a permanent reverse shell which I think is just a "pigment of your imagination". You don't have to preach Jesus to me, I do not Believe in GOD and there are other TIs that also Do Not Believe in GOD, you are just a Whiney Script Kiddie or Kali Kiddie as they call them who Threatens other people over a Petty Useless Chmod Shell Script, Your big ego is wasting my time, I could do other things. I do not use Kali all the Time, I use Other OSes for Productivity and Getting Shit Done, you would never Use Kali TO Pay Your Bills and do Day To Day Things, You would run it in Virtual Machine and Test People's SEC in an Ethical way insteading of flaiming on them over petty Chmod (.sh) Script File like a whiney script Kiddie with a Big Ego Problem who has never contributed to the actual Hacker Community or anyone in OPSEC ... ; What your proving to me is you are a constant complainer with an Ego Problem it was just some Chmod Commands And you snapped over that like a Schizophrenic and now you want to destroy me over some Chmod Commands that do not mean shit anyways, that sounds like a big ego schizophrenic, Where are the raster images to prove your point? I have yet to see that and the Grabify was accessed in Tor that time so you got the Wrong IPAddress lookup the Location, it's not even near my house, far far away, the IPAddress did not actually match my IP address, at best you could do a denial of service and my main Desktop Here is the Nmap Scan of Localhost to prove my damn point that you do not have a Reverse Shell on my Linux System : redacted@redacted:~$ sudo nmap -Pn -O localhost Starting Nmap 7.92 ( https://nmap.org ) at 2023-01-15 01:22 UTC Nmap scan report for localhost (127.0.0.1) Host is up (0.000070s latency). All 1000 scanned ports on localhost (127.0.0.1) are in ignored states. Not shown: 1000 closed tcp ports (reset)
  30. 30. Too many fingerprints match this host to give specific OS details Network Distance: 0 hops OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 1.57 seconds So where's the proof of the Reverse Shell??? I Do not See it!!! Javascript was in a Tor Browser that time, you got a (3-Piece-Node) ... ; I used the Brave AppImage File and Opened Up ("TOR") that time ... ; Plus this ISP Changes IPAddresses From Time TO Time ... ; And My Mac Address is F0f0f0f0f0f0 if you look that up ... ; --Scott A. Barry ... ; Scott Barry 4:33 AM (1 minute ago) to Cory This message has been deleted. Restore message https://www.emertxe.com/embedded/why-linux-is-more-secure-than-other-operating-systems/ https://www.youtube.com/watch?v=ZYWPyTRXssg Why is GNU/Linux the Most Secure Desktop Operating System? Why Linux is More Safe Than Windows https://www.youtube.com/watch?v=KJnrsGqyw3U https://www.youtube.com/watch?v=_AQ2B4LYgGg Windows is More Secure than Linux https://www.youtube.com/watch?v=_AQ2B4LYgGg Switch to Linux? The Real Privacy OS https://www.youtube.com/watch?v=3Dg4WIfvwWk And Your Point is What? Windows is a Virus Magnet ... ; Mac OS is also a Virus Magnet ... ; Linux has Sudo and SU and you can change the Passwords ... ; Tails OS Review - The Ultimate Privacy Linux Distro https://www.youtube.com/watch?v=xZkudBtPgiE Open Source will ALWAYS be More Secure ... ; https://stallman.org/stallman-computing.html ... ; Even Richard Stallman A Jewish Man Uses Linux ... ; Windows and Mac OS are Clearly Virus Magnets ... ; So Where Is Your Point, I changed My Passwords w Passwd All My Ports are closed "nmap -Pn -O Localhost" https://medium.com/codex/5-reasons-why-linux-is-more-secure-than-windows-1d036c3d3324 To Prove your point already PROVE IT!!! ... ; --Scott A. Barry ... ;

×