So are we done pretending that Linux is the most secure operating system now...

So are we done pretending that Linux is the most secure operating system now? Because we've had these kinds of root exploits for as long as there's been Linux servers. And I've been the one that had to patch dozens of systems every damn time, as far back as 1998.

Other urls found in this thread:

cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3238
support.microsoft.com/en-au/kb/3135020
twitter.com/SFWRedditImages

What would you suggest instead?

Windows?

>implying Windows is any more secure
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3238

BSD, perhaps, but Windows isn't bad these days.

Let's put it this way. I patch the Windows servers for serious problems a lot less often. I also patch the other application software less often.

>I patch the Windows servers for serious problems a lot less often.

>less updates = good thing

Are you literally retarded?

Dude there's no such thing as a bulletproof OS. So the least problems it the best.

It's like politics. You pick the shiniest turd.

No one cares about your opinion, or you experience. You are literally nobody.
sage

>gets burrhurt
>tries to use the defeatist tactic

Go to bed, kid.

DirtyCOW was the tipping point for my IT department, the last of the servers are going to Windows.

not an argument
see
sage

>least problems
>Windows

pick one and only one

quit making shit up. Has not even been found in the wild, and requires physical access. Already patched. You don't work in the industry, you know nothing.
sage

Ok

>So are we done pretending that Linux is the most secure operating system now
yes, we established that Linux is the most secure operating system now

>Pointing to a single patched exploit is enough to prove that an operating system is the most/least secure.
Do you not understand how comparisons work?

>requires physical access
It's fucking nothing, fuck outta here Pajeet.

>DirtyCOW
>requires physical access
What? No.

Tried exploit code on Slackware 14.2.
Needs mmap which needs ghc as adependency.
Slackware does not ship with these and compiling took a long time.(ghc requires 4.3 gb).
Code wouldnt work because it calls on madvise and 14.2 has madvise2.
Didnt work.

>same here

Still some faggot try to use this meme CVE as a FUD against linux. Maybe this is the 10th times i see this crap in catalog.

Yeah, and all for a local exploit.
This is all they have got on us.
Anyways, getting back to not giving a shit.

>Applies kernel update
>Three second reboot
>First Linux kernel vulnerability in ages fixed
>Apply updates to Windows server
>Takes ninety minutes
>Seven minutes after reboot, fully functional again
>Oh look, those updates unlocked more updates that were dependant on them.
>Eventually secured until next month's updates

windows doesn't patch anything but crytical bugs / blue screen etc. i.e. Really obvious ones
>thinks you're more secure
kek

Hey, it's patched now, dingus. Linux is perfectly safe.

Hopefully that windows server belongs to somebody else and not (you).

I have around 45 Windows servers that behave exactly as described for Windows 2008 and Windows 2012.

The only saving grace is that I no longer have to update my Windows 2003 servers.

I dont even think Slackware 14.2 was vulnerable in the first place.
I generated a modular kernel from the huge kernel which isnt the same as the standard linux kernel though.

Actually this is where Windows is horrible. Look at this shit:

support.microsoft.com/en-au/kb/3135020

Something like half of these are "addresses random BSOD" and "addresses random data corruption". Serious shit, which for some fucking reason is mostly missing from Windows Update.

Yes, you too can download 300+ updates on a fresh install so that you can fix issues like "removes a font", but wait until your business critical server starts blowing shit up and hey, here's a massive list of updates to go and find yourself.

>I've been the one that had to patch dozens of systems every damn time, as far back as 1998.


You sir are a liar.

Proportionally that's great

are any of these memory exploits even applicable to hardened kernels (protecting memory/execution) and sandboxed processes?

>The Windows and OSX kernels are secure
>Immediately deploying security patches and spreading awareness is a bad thing

They're not applicable to huge kernels.
So far from my testing.

>most secure
Its a childish mind that thinks in absolutes and hyperbola.
Security is relative to threat. If there were an absolutely secure OS, only the system would be in command. Making it unusable by people.