Bob_M said:
I believe most people that CAN setup linux/unix systems from scratch know how to properly protect their systems from the rest of the world. Us Microshaft users are typically plug and play and good old bill appearantely doesn't not protect MS by default, and would rather have us upgrade to the newest version (which is the safest ever blah blah), than fix the holes. Don't get me wrong, I'm an MS user, because I wan't plug and play computers, but I also like to tweak. *shrug*
I believe you're correct. Those that CAN set up 'nix boxes are typically 'techies' to some degree.
In the /. discussion, a major point was Macs ship 'locked down' and MS machines are shipped open to the world. I believe I saw a headline yesterday that MickeySoft is 'considering' shipping the OS in locked down mode rather than open mode. Duh...
I went through a lot of 'lookin' when I set up my peecee here - the CheechWizard server. Bottom line is my only liability is worms and break-ins because I get my mail with my Mac. I don't need a virus checker but I did need a configurable firewall. Norton and McAfee were too structured (plug and play) and disrupted too many services (as Windows XP's firewall apparently can). Tiny Personal Firewall is all I use. It's been online over 2 years and *as far as I know* it has not been broken into or otherwise compromised. I have file and printer sharing open to the world, but that just means someone has to know the password to get in. I can even watch people as they try to get in via alternate ports by ftp, etc., but no success to date.
If you want to 'look' at your machine, there are several places to do it. But note: Just because you machine can be scanned doesn't mean it is vulnerable.
They each over hype things a bit, but give you an idea of where your box stands. Remember, these
do not address e-mail viruses, but rather check for vulnerabilities that the MSBlaster worm used and other port vulnerabilities which someone could potentially use to break into your computer.
My favourite is:
https://www.grc.com - the scanner is at:
https://www.grc.com/x/ne.dll?bh0bkyd2
https://scan.sygate.com/ Is another.
https://www.pcflank.com/test.htm Is yet another.
Don't let "This port has responded to our probes. This means that you are not running any application on this port, but it is still possible for someone to crash your computer through known TCP/IP stack vulnerabilities." bug you too much. As long as you keep OS patches current and in place you shouldn't have a problem. There's a lot of FUD spread by the firewall and virus folks.