You have ten seconds to explain why your using an Operating System made out of garbage.
How much exploits do each of those OS's have if you compare the numbers relative to their market share on desktop, and on server markets?
Also, which Windows do these tables use, the consumer versions (Win 7/8/10) or Windows Server? The latter should be used, optimally.
>mfw the link to microcuck literally works!
What is this sketchy website?
>I use my own OS that has no security exploits because I haven't released the code
I like your memes, prajeet
>Also, which Windows do these tables use, the consumer versions (Win 7/8/10) or Windows Server? The latter should be used, optimally.
are you fucking suggesting that microsoft will fix the server version but leave the vulnerability untouched in the consumer versions?
are you stupid?
>majority of the exploits for currysoft wendys is code execution
>majority of the exploits for gano/loonatix is denial of service
holy fuck jesus will microsoft ever get their shit together
because I don't prioritize security,
Will probably set up a comfy ssd with OpenBSD once i need it, docs are godly and installation is incredibly simple. Don't know what to do with the absence of TRIM support.
Could you explain the difference and significance of this difference to a poor newfaggot like myself?
that's exactly what im saying
he's probably the one who made a very similar thread earlier
in honor of this thread here's a picture of two guys who dont like each other standing awkwardly in the same room
Not a big surprise desu. Windows is primarily a desktop OS, Linux a server OS.
In the internet, servers are there to respond to clients' requests. A denial of service attack aims to stop them from doing so. I.e. if a server crashes, it obviously can't respond anymore, so it's factually useless. It doesn't necessarily means it's broken, though, most times a reboot will fix it.
Code execution is by comparison much harder and much more dangerous to pull off, an attacker can execute his own code in your computer, meaning he can get absolute control. He can then add it to his botnet, log passwords or just erase all your data.
Code execution is obviously easier to pull this off on a desktop pc than on a server, because most users are retards and will click on every blinking gif that catches their eye. Denial of service attacks are only really useful on a server, so it makes little sense to look for one on Windows.
Regarding the Linux exploits. How are those exploitable? If I lock down all ports but the one for, let's say, Apache, is the OS still remotely exploitable? Like are those exploits in the NTP client or in wet or apt or in openssl? Or are we talking about cryptic bugs like "if the FAT table in a flash drive contains thus entry, the kernel panics". I guess I'll have to go through the list myself...