Forum: Poser - OFFICIAL


Subject: OT - Boycott SONY and let them know!!!

logansfury opened this issue on Nov 11, 2005 ยท 44 posts


kawecki posted Fri, 11 November 2005 at 8:12 PM

It is common to say that all systems are hackeable or unsecure and Windows is most hacked just because it is most used. This is not true, Windows is hackeable because is unsecure. There are no ways to hack a secure system, a secure system has no elements to allow the hackers enter. A simple analogy, you have a light bulb with a password protected switch to turn off the light. It is always possible that some breaks the code and turn off the light. Now you have another system that has no switch, there's no way to turn off the light, no codes to break. You can argue that you can cut the wires, but for cutting the wires you have to break the wall and cut the wires, then the system is not more the original system and is not working anymore! In other words, if you uninstall Linux and install Windows, Linux will not exist anymore. Basic requirements for a secure operational system 1) In user mode. There is no way to install something that can alter the operational system. You can only install programs. If the program doesn't work properly, it can crash but never will affect other users or the operational system. Installation of Sony junk or any virus is impossible because requires the modification of the operational system that is not allowed in used mode. 2) Supervisor mode You can install programs or modify the operational system. If the modification doesn't work properly will affect all users. In supervisor you have risk of hackers or virus, but all the risk are removed if the operational system doen't allow automatic installation of software or operational system modification. No more automatic updates, no more autorun, no more hidden installations, no java script installs. To install some update there is always a two step process. 1) Download 2) Install with confirmation (optional for more security, you must comfirm with a password for any installation). For more security you can run some antivirus between steps 1 and 2. Any operational system that fulfilles those requirements will be secure and inpossible to be hacked, hijacked or virused.

Stupidity also evolves!