To:"Mike Swier" <mswier@YAHOO.COM>
Date: Thu, 31 Mar 2005 15:26:24 -0500 (EST)
From:"Security Pipeline Newsletter" <secured@techwire.com>
Subject: [SPN] Security Pipeline - 03.31.2005 - Win vs. Lin III Security Pipeline Newsletter | Windows More Secure Than Linux? Like Heck! | 03.31.2005
Security Pipeline Newsletter
www.SecurityPipeline.com
Thursday, March 31, 2005


In This Issue:
  • Editor's Note: Windows More Secure Than Linux? Like Heck!
  • Top Security News
        - Microsoft Releases Major Windows Server 2003 Update
        - CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List
        - Internet Music Theft Likely To Survive Supreme Court Decision
        - More News...
  • Editor's Picks
        - The 10 Worst Security Practices
        - Wayne Rash: VoIP 911 Problems Could Kill You
        - Rob Enderle: Let's Avoid A Spyware Witch-Hunt
        - More Picks...
  • Voting Booth: Windows Vs. The World
  • Get More Out Of Security Pipeline
  • Manage Your Newsletter Subscription


    ------- Advertisement -------------------
    Join InformationWeek for a FREE, on-demand TechWebCast on
    Wily J2EE Application Performance Series 2005, Part 1:
    Understanding the Application Crisis Lifecycle. The first
    of the 2005 Wily series on application performance management.
    Register and view now:
    http://www.techweb.com/today/j2ee012505

    -----------------------------------------

    Editor's Note: Windows More Secure Than Linux? Like Heck!

    Readers were pretty skeptical of a recent study that found Microsoft Windows to be more secure than Linux.

    They said the study was unfair because it compared Red Hat Linux — a relatively unsecured distro — to Windows. Readers cited their own experience finding far more problems with Windows than Linux. And they said the fact that Microsoft funded the study guaranteed a pro-Windows outcome.

    The original articles:

    - Report: Linux Vulnerabilities More Numerous And Severe Than Windows

    - Controversial Report Finds Windows More Secure Than Linux

    - Blog: Perfectly Good Rants Gone To Waste

    - Blog: Earthquakes, Fire, Mudslides, Riots

    In an e-mail with the subject line "poor journalism and M$ bias," reader Chris Updegrove, of Sacramento, Calif., wrote:

    "A significant flaw in the title of your March 22, 2005 article 'Report: Windows Security Beats Linux' is that Red Hat Enterprise server is not Linux, but a Linux distribution. The title of the article calls the bias of InformationWeek into question." Updegrove read the article on our sister site, InformationWeek.com. "An unbiased title would read something like 'Microsoft-Funded Report Claims Windows Security Beats Red Hat Linux.' An unbiased journalist would have asked tougher questions about the testing criteria, and would have made a point of informing the reader that more secure Linux distributions like Slackware and Gentoo were not part of the comparison.

    "Over 40 Linux distributions are available for comparison, yet only one commercial version of a Linux distribution was used for the security comparison. Marketing-communications firm AvanteGarde recently published the results of a penetration test which examined the security of Microsoft Windows, Macintosh OS X, and Linspire's distribution of Linux. The Windows boxes were compromised within four minutes, while the Linspire and Mac OS X boxes were not compromised at all. To make the conclusion 'Windows security beats Linux' without first clarifying what Linux is, without scrutinizing the testing criteria, or comparing the report to similar reports is misleading and inaccurate.

    "Many Windows security vulnerabilities are reported in security forums, newsgroups, and in IRC channels months, if not a year or more before Microsoft acknowledges the vulnerability and makes it 'public.' The average number of days of risk per vulnerability reported in your article is not accurate if that number is based on the date Microsoft acknowledges the vulnerability. You may want to attend Defcon 13 this year, where you will learn about the Windows security vulnerabilities you will write about next year (when they are made 'public')."

    Updegrove raises a point made by several readers: that Red Hat is only one Linux distro, and not the most secure one, and a more fair comparison would have pitted Windows against other distros.

    Eric Wagner (no relation to me) wrote: "I think the problem is comparing Red Hat to Windows. We run 30+ Debian boxes and two Red Hat boxes. I'll give you one guess as to the only ones we've had problems with."

    Brandon Bohannon: "There are more secure Linux distributions. I subscribe to a Linux security newsletter and every Friday they have a list of vulnerabilities by distribution, and Red Hat and Fedora almost always have the most vulnerabilities. Researchers need to run one of their studies on Windows vs. EnGarde Secure Linux, or Slackware. EnGarde hasn't had a vulnerability reported since July 2004, and Slackware hasn't had one reported since November 2004. Researchers probably pick Red Hat because it's the most commercialized."

    Dave Nelson, information security officer for the City of Virginia Beach, Virginia, said a skilled systems administrator is more important to security than which operating system is used.

    ""The system being secured by the most talented admin is the one I'll take every day of the week," he said. "Operating systems come and go but knowledge is here to stay. Find yourself an admin who knows your system inside and out, then tell everyone else to take a leap."

    He added that most security problems come not from software vulnerability, but from user error.

    Joseph S. Vislocky, chief information officer for Wilmac Corporation, said: "As to whether Linux is more secure than Windows, I can only judge by real-life experience. I have Linux in use as firewall/router at all Internet interface points in my organization. During the evolution of our security scheme, we have been attacked regularly via Internet attacks, viruses and spyware. Some of the attacks have been marginally successful on both the Linux and Windows machines. I have found that successful attacks on Windows are more numerous and onerous to cleanse. Ultimately, I believe that with the proper level of expertise, Linux can be made far more punch-proof than Windows can be. There are just too many things that Microsoft doesn't document well (or at all) that can hurt you."

    Steve Ellison, technical analyst II at the University of Pitt-Bradford, said Linux is designed to be more secure than Windows. "Case in point is user creation. Linux has you create and log in with a standard (read: non-privileged) user account. When you need the extra privileges you can su to root. Windows, on the other hand, creates your primary account as an administrator. Conveniently enough, it also leaves the account wide open by not making you specify a password."

    He added: "In the end, the level of security of any system is proportionate to the skill and knowledge of its user. I think that everyone would agree with me that the average Linux user is more knowledgeable then the average Windows user. So, one can infer that Linux is more secure because it is in the right hands."

    Readers said that the study's funding from Microsoft guaranteed a pro-Microsoft outcome.

    A reader signing his name as "Tony" said: "Have you ever heard of a case where Microsoft funded an study, the study determined that Linux was more secure, and the study was published?"

    Peter Spearing with the Akron Municipal Court Data Processing Department said: "Anyone who is old enough to have quit believing in the tooth fairy knows that nobody funds a report that is going to come up with conclusions that are against their interests. If Red Hat or Novell/SuSE funded a report on the subject I'd feel exactly the same way. I also think the whole subject is essentially a religious argument. Any networkable operating system can be attacked via said network. Use good sense, stay aware of the threats, and make backups."

    Patrick Durling: "You said 'In the end, the researchers note rightly, what's important is not who funded the study, but rather how the study was conducted.' You would be more correct to say, 'what's important is not who funded the study, but rather how the results of the study were interpreted.' Since it's possible the results were interpreted subjectively, it's important to understand the motivations of those who conducted the study. It is then logical that the person who funded the study would have an effect on the way the results would be interpreted. To believe this is not so is naive."

    Readers also commented on my criticisms of New York and New Yorkers.

    Jody Cody: "Aahhh, stuff it in your keister!!" Jody was one of several readers to use the word "keister," which is a fine word that should be used more often.

    Pat Babcock: "Don't be too hard on the New Yorkers. You'd be cranky, too, if you had to live with the realization that the light at the end of the tunnel was New Jersey."

    More Noteworthy Articles

    Microsoft Releases Major Windows Server 2003 Update: The first service pack for the server software includes numerous security fixes, as well as application updates to Internet Explorer and Outlook Express -- all meant to "reduce customer pain centered on server security."

    The 10 Worst Security Practices: Sometimes one whopper of a mistake can be more instructive than a binder's worth of best practices. We interviewed more than a dozen security consultants to arrive at our list. See which ones apply to you, and then learn how to do things better.

    Wayne Rash: VoIP 911 Problems Could Kill You: Voice over IP and cell service can't be relied on for 911 calls. That means that ripping out your conventional phone service could be a dangerous -- even deadly -- proposition.

    CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List: CoolWebSearch, adware that generates more than $300 million a year for its maker, is the "Ebola" of adware, and easily the most significant spyware threat on the Internet, an anti-spyware security firm says.

    Macs Becoming More Attractive Target For Attacks: As the Mac regains popularity, more vulnerabilities will likely surface. Mac users should watch out for spyware in particular.

    For more opinions, links, and humor about security, technology, and the Internet, see Wagner's Weblog. This week: Longhorn could be a tough sell for Microsoft; a LiveJournal user describes how he did his own detective work and, with a little luck, tracked the guys who stole his credit card; battlefield robo-docs; and links to anti-spyware resources elsewhere on the Internet.

    That's it for this week. Watch your keisters.

    Mitch Wagner
    Editor, Security Pipeline
    mwagner@cmp.com
    www.SecurityPipeline.com


    Keep Getting This Newsletter
    Don't let future editions of Security Pipeline Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam whitelist:

    secured@techwire.com

    If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.


    Top Security News

    Microsoft Releases Major Windows Server 2003 Update
    The first service pack for the server software includes numerous security fixes, as well as application updates to Internet Explorer and Outlook Express -- all meant to "reduce customer pain centered on server security."

    CoolWebSearch, Dubbed Adware's "Ebola," Tops Spyware Threat List
    CoolWebSearch, adware that generates more than $300 million a year for its maker, is the "Ebola" of adware, and easily the most significant spyware threat on the Internet, an anti-spyware security firm says.

    Internet Music Theft Likely To Survive Supreme Court Decision
    Even if entertainment companies win their Supreme Court battle for new authority to protect movies and music on the Internet, lawyers say it won't be easy to shut down the decentralized computer links used to trade songs and films.

    IPods Attract Sticky Fingers
    IPods are walking away from their rightful owners in New York subways, college dorms, and high schools. Victims, usually teen-agers, complain that they're out the hardware and downloaded music.

    Supreme Court Kicks Off Arguments In Grokster Suit
    The mostly silver-haired Supreme Court debated the file-swapping, instant-messaging world of the justices' grandchildren, openly worrying that allowing lawsuits to protect Internet movie and music rights could stunt development of the next iPod or other cool high-tech gadget.

    New Technology Reveals Invisible Fingerprints
    The technique, involving a tight beam of X-Rays, brings out fingerprints that wouldn't otherwise be visible to the naked eye. Also, investigators won't have to treat the fingerprints with powder, which alters them and blocks later chemical analysis.

    Pixalert Provides Porn Protection
    The software blocks inappropriate images from any source, including gateways, media, USB ports, 3G cellular, and Wi-Fi hotspots.

    Macs Becoming More Attractive Target For Attacks
    As the Mac regains popularity, more vulnerabilities will likely surface. Mac users should watch out for spyware in particular.

    Symantec's AntiVirus Vulnerable To Denial-Of-Service Attacks
    Symantec's Norton AntiVirus line has a pair of vulnerabilities that hackers could exploit to crash or hang a targeted PC.

    Stolen Laptop Exposes Data of 100,000
    A thief recently walked into a University of California, Berkeley office and swiped a computer laptop containing personal information about nearly 100,000 alumni, graduate students and past applicants, highlighting a continued lack of security that has increased society's vulnerability to identity theft.

    PC Tools Upgrades Anti-Spyware With Improved Keylogger Protection
    Spyware Doctor 3.2 also adds partial support for real-time protection, improved protection against spyware that attempts to re-install itself after it's been uninstalled by users, and against harmful cookies.

    TSA Passenger Screening Program Not Ready For Takeoff
    GAO says transportation security agency hasn't made enough progress on key issues of data sharing with airlines and privacy.

    Security Flaw Found In Trillian IM Client
    The popular client contains a security flaw that could allow a hacker to gain control of a person's computer.

    IE 'Unsafe' 98 Percent Of 2004, Say Consultants
    Mozilla and Firefox users were unsafe only 15 percent of the time.

    Feds Rule Banks Must Tell Customers Of Security Gaffes
    Banks must warn consumers when information has been accessed without authorization if that "could result in substantial harm or inconvenience to the customer."

    First IM Phishing Attack Hits Yahoo
    Yahoo Messenger users are getting IM spam with links to a bogus Web site that looks like an official Yahoo page. The site asks them to log in with their Yahoo username and password. Users who fall for the ploy give hackers access to any information in their Messenger profile, as well as full access to their contact, or buddy, list.

    Identity Theft Scaring Off Online Consumers
    Millions of consumers are switching banks and avoiding online shopping out of fear of having their personal data stolen by crooks, a research firm says.

    GAO: SEC Data Controls Not Strong Enough
    The Securities and Exchange Commission hasn't effectively implemented IT controls to protect the integrity, confidentiality, and availability of its financial and sensitive data, congressional auditors find.

    Despite Latest Patches, Firefox Still Beats IE On Security
    The Mozilla Foundation pushes out a new version of Firefox to patch three vulnerabilities, and experts say greater adoption is spurring security repairs needed.

    Symantec Rolls Out Hosted E-Mail Security
    Managed security service will fight spam and viruses while offering ease of use and a lower price, vendor says.


    Editor's Picks

    The 10 Worst Security Practices
    Sometimes one whopper of a mistake can be more instructive than a binder's worth of best practices. We interviewed more than a dozen security consultants to arrive at our list. See which ones apply to you, and then learn how to do things better.

    Wayne Rash: VoIP 911 Problems Could Kill You
    Voice over IP and cell service can't be relied on for 911 calls. That means that ripping out your conventional phone service could be a dangerous -- even deadly -- proposition.

    Rob Enderle: Let's Avoid A Spyware Witch-Hunt
    As the fervor to eliminate spyware grows, we need to come up with definitions of what is -- and isn't -- spyware, before we start banning legitimate and useful adware and other applications.

    Blog: There's Nothing More Fun Than A Bad Example
    The difference between the successful security manager and the failure can be summed up in two words: Plan ahead.

    Prospective Harvard Students Tossed For Hacking Admissions System
    119 prospective Harvard students used a published exploit to find out their admissions status. The exploit was easy to follow, but does that make what they did acceptable?

    A User's Guide To 802.1x Access Control And Authorization
    The IEEE's 802.1x standard plays a central role in many new security and access-control products. To take advantage of it, you must understand how authentication messages traverse your network. We show you the ins and outs of this emerging standard.

    ABCs Of Remote Access
    Get the fundamentals on connecting up remote users, including information and best practices on Virtual Private Networks, IPsec, SSL VPNs, and other technologies and business issues for remote access.

    Q&A With Allstate Security Boss Kim Van Nostern
    The veteran IT manager describes doing business in a highly regulated environment, the risks of thinking buying products will solve your security problems, and how her longtime experience in the technology and business sides of the company help her provide effective security.

    How To Defend Yourself Against An "Evil Twin" Wi-Fi Attack
    In an evil twin attack, hackers trick users into logging onto a wireless access point, and use the connection to steal IDs and passwords. Learn how to protect yourself by properly configuring your wireless devices and using good security practices.

    Opinion: IM Users Need Better Education About Phishing Dangers
    Reports are starting to indicate that the phishers have discovered the instant messaging waters. Is anyone surprised? You shouldn't be if you understand the inherent vulnerability of messaging systems of all types. However, in IM's case it's the naivete of users that's really causing the problem.

    Via Desktop Pipeline: Last Minute Tax Choices: PC or CPA?
    Taxpayers continue to wonder whether they are better off using tax software or calling their local accountant.
    Subscribe to the Desktop Pipeline Newsletter

    Via Advanced IP Pipeline: 'Net Freedoms' Face Challenges
    It's easy to write off last week's story about Clearwire potentially blocking VoIP competitors as just a small, isolated case in the grander game of telecom. But it's just as easy to see the incident as another brick in the wall being built against a free and open Internet, something that shouldn't be taken for granted anymore.

    Via Advanced IP Pipeline: Cinderella Story Is Over For VoIP
    VoIP providers are starting to face tough regulatory and competitive environment.

    ("Caddyshack" references are always appropriate. -- mitch w.)

    Subscribe to the Advanced IP Pipeline Newsletter

    Via Network Computing: Desktop Management: Wrangle Your PC Into Submission
    Instead of getting out of Dodge when it's time to wrangle PCs into submission, take our advice: All a modern-day computer cowpoke needs is a thoroughbred management strategy. Saddle up, and we'll explain.
    Subscribe to the Network Computing newsletters

    Via InformationWeek: Langa Letter: Little-Known Options For Syncing Files In Windows
    Do you work on files in more than one location or on more than one PC? Fred Langa offers an overview of tools built right into Windows that can help.

    (Fred recommends the Briefcase as one choice for synching multiple PCs, and explains how it works. I've been staring at that darn Briefcase icon on various Windows desktops for a quarter of my life, and only now, after reading Fred's article, do I know what the heck it is. -- mitch w.)

    Subscribe to InformationWeek and its newsletters


    Voting Booth: Windows Vs. The World

    Cast Your Vote Now!
    Which operating system is more secure?

  • Windows
  • Linux
  • Mainframes
  • Macs
  • VMS
  • BSD
  • The skill of the administrator matters more than which platform you use.

    Answer, or we'll subject you to a marathon viewing of the 1983 TV series "Manimal."

    Poll Results: Staying Informed On IT Topics
    We asked: What's your favorite way to stay informed on IT topics?

  • Using a Web browser to surf to tech sites and blogs: 40%, 91 votes
  • Reading e-mail newsletters I subscribe to: 27%, 60 votes
  • Reading a printed magazine I can hold in my hands: 15%, 34 votes
  • Using an RSS reader or service to gather Web articles: 9%, 21 votes
  • Calling the Psychic Friends Network: 7%, 16 votes
  • I'd rather not read about IT topics: 2%, 4 votes

    Like I said last week: I was surprised by the relatively low performance of e-mail newsletters (27 percent of respondents), given that the overwhelming majority of respondents to our polls come from the newsletter. It's not too surprising that print magazines should score low (15%) in a poll conducted by a Webzine.

    I was surprised by the relatively low results for RSS (9 percent); other studies of our readers have ranked RSS as being more popular. But maybe I shouldn't have been surprised, after all, this is an e-mail newsletter, and my gut feeling is that people who use RSS don't like e-mail newsletters, and vice-versa.

    Finally, the relative popularity of our two joke answers — "the Psychic Friends Network" and "I'd rather not read about IT topics" — makes me take the whole poll with a grain of salt.

    This poll ran roughly concurrently across the entire line of TechWeb Pipeline sites; we'll bring you the overall results in an upcoming newsletter.

    And, finally, if you have anything to say about Windows security vs. other platforms, staying informed on IT topics, or any other subject, give me a shout-out at: mwagner@cmp.com. We'll publish the best of your responses.


    Get More Out Of Security Pipeline

    Try Security Pipeline's RSS Feed
    Security Pipeline's content is available via RSS feed: Get RSS link. The feed is also auto-discoverable to many RSS readers from the Security Pipeline home page. Note: RSS feeds are not viewable in most Web browsers. You need an RSS reader, Web-based service, or plug-in to view RSS. Find out which RSS readers the Pipeline editors recommend.

    Check Out Our Security Product Finder
    Don't reinvent the wheel. Find the right off-the-shelf product to do the job. How do you find the right one? Two words ... Product Finder:
       - Firewalls
       - Vulnerability Assessment
       - Enterprise Anti-Spam
       - Security Appliances

    Discover All The Pipelines
    Security Pipeline is part of a large series of specialized IT sites from the TechWeb Network. Find out more about the Pipelines on the TechWeb Network Pipeline Publications page. Every Pipeline site has its own newsletter. Give them a try!

    Recommend This Newsletter To A Friend
    Do you have a friend or colleague who might enjoy this newsletter? Please forward it to him or her and point out the subscription page.


    ------- Advertisement -------------------
    Join InformationWeek for a FREE, on-demand TechWebCast on
    Wily J2EE Application Performance Series 2005, Part 1:
    Understanding the Application Crisis Lifecycle. The first
    of the 2005 Wily series on application performance management.
    Register and view now:
    http://www.techweb.com/today/j2ee012505

    -----------------------------------------

    Manage Your Newsletter Subscription

    We take your privacy very seriously. Please review our Privacy Policy.

    Security Pipeline Newsletter
    A free service of Security Pipeline and the TechWeb Network.
    Copyright (c) 2004-2005 CMP Media LLC
    600 Community Drive
    Manhasset, NY 11030