Open and Closed Source Systems

Submitted by: Submitted by

Views: 169

Words: 1230

Pages: 5

Category: Science and Technology

Date Submitted: 04/07/2014 09:30 AM

Report This Essay

In this paper, I will try to talk generally about Open Source versus Closed

Source systems. But when I have to give examples, I will stick to Windows

servers as one of the leading closed source systems and GNU Linux system as one

of the very common open source systems.

 

Bug Free:

    Closed Source Operating Systems don't reveal their source code; as a result the

only people who can debug the source code are some of those who work in the

company.

    The Open Source systems, as the name indicate, make all their source code

available to the public. Everyone who knows enough programming skills, and is

willing to read the source code, can debug it. They read the source and debug it for their own reasons: maybe to help the Open-Source community or to learn or even to make their own

personalized version of the product; the possibilities are limitless. As the

debugging process gets this much world-wide spread, the Open Source products

become relatively bug free.

Exploits:

    Severe exploits that allows remote or local users to hack the machine are

discovered in closed source operating systems. When such an exploit is

discovered, users will have to wait for the company to release a patch; this

process is usually slow and takes months. So in the meantime, all the users of

the vulnerable "closed source" operating system will suffer this vulnerability

for the time being. For example, IIS exploit allows a 13 year old kid to hack

into any Windows servers!

    Open source operating systems might be vulnerable as well - maybe not as much as

the closed source systems. If an exploit is found many of the open source community will run to help. Patches are released faster than you can imagine; in a matter of days or even hours.

Price:

    In MS not only do you have to pay for the OS, but also for all the add-ons. When it comes

to IDS (Intrusion Detection Systems), the situation just gets worse. Any of the

known and effective IDS solutions are...