I would say your friends are essentially correct.
To put an extreme example, there is only so much an operating system can
do for security-unconscious users that will grant root permissions to an
unknown executable that promises adult content or the Linux port of
"Angry Birds."
Knowledgeable and determined attackers can only be fended-off with an
active security policy.
However, the Linux software distribution model based on well-maintained
centralized repositories will probably help in making casual infections
more difficult. If those repos are compromised, though...
L
_______________________________________________
Linux-audio-dev mailing list
Linux-audio-dev@email-addr-hidden
http://lists.linuxaudio.org/listinfo/linux-audio-dev
Received on Thu Mar 22 20:15:02 2012
This archive was generated by hypermail 2.1.8 : Thu Mar 22 2012 - 20:15:02 EET