Date: Fri, 11 Dec 2009 12:29:44 +0100 From: $witch <a.spinella@rfc1925.net> To: "Anton Shterenlikht" <mexas@bristol.ac.uk>, freebsd-questions@freebsd.org, freebsd-current@freebsd.org Subject: Re: Root exploit for FreeBSD Message-ID: <op.u4rt7sclqr96hw@zeta> In-Reply-To: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 10 Dec 2009 15:41:41 +0100, Anton Shterenlikht <mexas@bristol.ac.uk> wrote: >> From my information security manager: > > FreeBSD isn't much used within the University (I understand) and has a > (comparatively) poor security record. ...... > > Hi, almost all of you remark how FreeBSD is more-secure-than-others-OS, will add nothing to varius comments. but i look in syslogs of some FreeBSD internet server and there is a great evidence that some "botnets" are (again) tryng simple combination of uid/pwd. starting from Dec 8 01:00:34 (CET) hundreds of zombies are looking for a valid username. it mean that most of the matter is our; the FreeBSD users. we are the only ones that will (or will not) patch the systems; i love the FreeBSD security while it is MOSTLY based on KNOWLEDGE of users than on a PERFECT code. cheers Alessandro -- "If 386BSD had been available when I started on Linux, Linux would probably never had happened." Linus Torvalds
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.u4rt7sclqr96hw>