Skip to Content
6-15-2007 @ 3:09PM
Strongmark: All of those examples appear to be at least 15 years old.Any OS is subject to Trojans because infection is contingent on the user executing the code, instead of automatic replication. If you launch an application and authorize it by typing in your password, it's not really the fault of any OS if that application starts logging keystrokes or does a rm -rf /.If, instead, we are talking about viruses then I would argue that, yes, OS X is more secure simply due to its UNIX underpinnings - especially the way user permissions are handled. Marketshare may play a part in OS X's relative security - but that is certainly not the only (or largest) factor.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.