Windows and Linux Systems

Submitted by: Submitted by

Views: 282

Words: 602

Pages: 3

Category: Other Topics

Date Submitted: 07/24/2013 08:56 AM

Report This Essay

Windows and Unix/Linux Systems

Ashlee Jackson

Devry University

With the arrival of the World Wide Web, there are now an increasing number of applications on the Internet. This makes it necessary to have security on the web. Companies should realize that network and computers are very vulnerable to outside hackers and attacks from viruses without protection. Also, many viruses can cause computers to crash and become useless, causing time and money to be wasted. It is important to understand the information needs to be protected. If the access to the building is weak or communication to and from is visible, it can be violated.

There are undeniably software level vulnerabilities. The most critical browser-based security vulnerability affects only the local user-level account on the desktop. Some examples for both windows and Unix/Linux consist of the vulnerabilities of the Mozilla browser vs. the Internet Explorer browser (Petreley, 2004). Almost every useful feature in Linux is a feature that does not have access to the vulnerable parts of a Linux system. Linux does not have a history of being a single-user system. Therefore it has been designed to separate users from applications and files that may affect the entire operating system.

Linux Servers are more secure when compared to other competitors. Most of the software that is developed for Linux servers is designed to have the highest levels of security to prevent hackers and virus attacks. The vulnerability of the software is all up to how long a hacker is willing to attempt to hack each individual software component of the servers that you are using. This limits the access to the important sections of your Linux servers and provides even more security. Like windows, Linux does not support .exe files. Most of the viruses in windows are being spread with .exe files. Registry is another place where viruses put their information. Even if you delete the file, it rewrites its information from registry and...