1. Virus 1) logs on to Windows as administrator users. Viruses can infect any files in the system. Common users in Ubuntu cannot modify system files. 2) There are many Windows users, many researchers, a large number of viruses and Trojans, and a large number of attacks. Attacking Windows End users has a lot of commercial interests, such as stealing QQ numbers, the more people who steal banking and transaction passwords, the more results, and the less common linux is. Ii. Trojan
1. Virus
1) in Windows, all users log on as administrators. Viruses can infect any files in the system. In Ubuntu, common users cannot modify system files.
2) There are many Windows users, many researchers, a large number of viruses and Trojans, and a large number of attacks. Attacking Windows End users has a lot of commercial interests, such as stealing QQ numbers, the more people who steal banking and transaction passwords, the more results, and the less common linux is.
Ii. Trojan
Same as above
Iii. rogue software
Same as above
Iv. Common attacks and intrusions
Same as above, but it should be added that attackers usually attack in two directions:
A) terminal users steal personal information
B) The server, one-time access to huge benefits, such as the attack bank IBM AIX/HP-UX and other large machines, the current Ubuntu neither, so very secure
V. Differences in system design architecture
1. win2k has no stack protection, and it is easy to overflow/Win2k malloc attacks. WinXP is slightly enhanced, but it is relatively easy. Win2003 has enhanced a lot and is difficult to attack, currently, all chips have stack unexecutable protection. After XP sp2 and 2003 use this feature, which makes it difficult to implement overflow attacks.
2. many versions of Linux kernel 2.6 and later have enabled stack protection by default, and the 2.4 kernel has been installed with unofficial PAX kernel patches long ago, enhancing the defense against overflow attacks, it can be said that the standard 2003 has been reached for a long time, and the current version of kernel 2.6 has built-in this function.
3. Large server chips + OS: iSCSI + Solaric/PowerPC + AIX/PA + HP-UX etc. In 9x years there is a chip + Kernel stack unexecutable Protection Mechanism
6. Other suggestions on Ubuntu Security
1. Disable all external services, such as ssh
2. enable iptables so that only those who need to access you can connect to you.