Off-Topic > Off-Topic - Tiny Core Lounge
How secure is Tinycore/Microcore ?
cURIOUSgEORGE:
You clearly were trying to be wise but that's okay. You could have simply said what you just did say "The subject of computer security and hacking is so complex that it cannot be covered in a few sentences here.
There are many books that cover various aspects of computer security."
As far as my attitude, ??? ??? ??? ??? ??? haha ya gotta be kidden me,settle down buddy
Anyways it is what it is, take care and thanks. ???
cURIOUSgEORGE:
Thanks for the response Guy, and it was very much appreciated. I wonder roughly how many users Tinycore has. I also am wondering what advantages TC has without a frugal install, just out of curiosity.
Jakob Bysewski:
As gerald_clark already pointed out, there is no easy answer to this question.
The direction in which you'd want to research depends on your definition of security (secure against non-permitted mofification of files, secure against reading your files from anywhere, secure against corrupting data, etc.). There are different layers in which this security may be enforced.
What I personally like about the linux philosophy, is that you can do all of your application work without root-rights (which is sometimes hard on a windows system, where you have to use mis-behaving software [which is misbehaving because microsoft does not enforce certain design paradigmas]) and that binaries, data and configuration are clearly separated (as opposed to windows, where there is no central enforced storage for these things - if you just backuped your documents, you may have lost important settings on reinstall).
Your definition of security should also include a definition of trust: whom do you trust? The Tinycore repository? Some public download server? Sourcecode which you downloaded from the - supposed - author? The linux kernel? Your filesystem?
Every action implicates trust in something, at lest in the right outcome of the commands I gave my system. When you think in depth about this, it gets harder and harder.
As an example:
I have to trust into my harddisk, that it will not fail while I don't have a backup in place. Most users I know, do not have a backup or they do it only once in a while. But when I tell you, that the chance your harddisk fails within 3 years after purchase is about 5% you may come to the conclusion, that loosing or at least corrupting your data due to harddisk failure might be more likely than an evil person hijacking your computer...
tinypoodle:
--- Quote from: cURIOUSgEORGE on January 07, 2011, 11:08:43 AM --- You clearly were trying to be wise but that's okay. You could have simply said what you just did say "The subject of computer security and hacking is so complex that it cannot be covered in a few sentences here.
There are many books that cover various aspects of computer security."
--- End quote ---
That would be exactly how I (and I guess others than me) have interpreted the post in the first place. And it was indeed simply stated.
^thehatsrule^:
For the record, it would not have been "bannable" - so you can relax.
I do think that your questions are more general, so perhaps a security oriented forum or related would be more suitable as I doubt you'll find answers you want here IMO.
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version