Barney's Blog

Blog archive

Mailbag: Red Hat Security

Readers share their thoughts on open source security in general, and the recent Red Hat hack in particular:

I think that Red Hat getting hacked was a good thing. I am a die-hard Linux user, but I do not go with the crowd that thinks that if you are using any non-Microsoft OS, then you are safe from bad ware. Humans make mistakes; the software that we create will have bugs, and bugs lead to holes, and holes are how the bad boys get in. The sooner everyone starts thinking about security, the better.

I have to admit that I do feel safer using Linux and Firefox while I am surfing the Web, just as the people in the Twin Towers felt safe on Sept. 11, 2001, just before the planes hit.
-Raymond

I have countered for years that Mac and open source operating systems are not targets -- not because they are so secure, but because there were so few of them. The more that are out there, the more they will be hacked. The hackers want quantity. It only makes sense that they will concentrate their efforts where they will get the most results for the least amount of work.
-Bernie

It is Microsoft's licensing that really burns me up, not so much whether it has a better product than others. I'm not sure why those who clamor around Microsoft don't get that. While there have been some who have made silly claims about open source and its security, at least a company that uses FOSS or OSS can hire someone (if they don't possess in-house talent) to review code to ensure that everything is up to snuff. I have a few clients who have done just that with Internet-facing Linux systems -- and it is one thing you cannot do with closed source, no matter who it is. And that is the difference and is why I will always look for an open source alternative for anything I use and recommend.
-Anonymous

And Doug's dad gets the final word on professors teaching students how to hack:

Interesting comments on the hackers. Although I consider hackers and scammers the enemy, you do have to understand the enemy if you want to have a chance to defeat him. However, one area which seemed to be ignored was the use of information gained by hacking. Helping riders get free lifetime transportation on the T is certainly not an appropriate use. When we discovered weaknesses in military installation security, we went to the responsible organization so they could correct them.
-Dad

Check in tomorrow for more reader letters! And if you want to share some of your own comments, fill out the form below or send an e-mail to [email protected].

Posted by Doug Barney on August 27, 2008


Featured

  • Microsoft to Shut Down Skype Services

    Microsoft will discontinue its Skype telecommunications and video calling services on May 5, 2025, marking the end of the platform's decades-long run.

  • Microsoft Confirms End of HoloLens Mixed Reality Hardware

    Microsoft officially announced this week that it is discontinuing its HoloLens mixed reality hardware, marking the end of its efforts in the space.

  • Microsoft Rolls Out Final Cumulative Update for Exchange Server 2019

    On Monday, Microsoft released the last major update for Exchange Server 2019. The aging Exchange Server is set to lose support on Oct. 14, 2025.

  • Windows 11 Installation Streamlined for New Devices

    Microsoft is introducing new policy changes that will give IT administrators greater control over Windows 11 updates during the initial setup of new devices.