Submitted by: Submitted by TIFBABE66
Views: 169
Words: 1230
Pages: 5
Category: Science and Technology
Date Submitted: 04/07/2014 09:30 AM
In this paper, I will try to talk generally about Open Source versus Closed
Source systems. But when I have to give examples, I will stick to Windows
servers as one of the leading closed source systems and GNU Linux system as one
of the very common open source systems.
Bug Free:
Closed Source Operating Systems don't reveal their source code; as a result the
only people who can debug the source code are some of those who work in the
company.
The Open Source systems, as the name indicate, make all their source code
available to the public. Everyone who knows enough programming skills, and is
willing to read the source code, can debug it. They read the source and debug it for their own reasons: maybe to help the Open-Source community or to learn or even to make their own
personalized version of the product; the possibilities are limitless. As the
debugging process gets this much world-wide spread, the Open Source products
become relatively bug free.
Exploits:
Severe exploits that allows remote or local users to hack the machine are
discovered in closed source operating systems. When such an exploit is
discovered, users will have to wait for the company to release a patch; this
process is usually slow and takes months. So in the meantime, all the users of
the vulnerable "closed source" operating system will suffer this vulnerability
for the time being. For example, IIS exploit allows a 13 year old kid to hack
into any Windows servers!
Open source operating systems might be vulnerable as well - maybe not as much as
the closed source systems. If an exploit is found many of the open source community will run to help. Patches are released faster than you can imagine; in a matter of days or even hours.
Price:
In MS not only do you have to pay for the OS, but also for all the add-ons. When it comes
to IDS (Intrusion Detection Systems), the situation just gets worse. Any of the
known and effective IDS solutions are...