Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Researchers Say Kelihos Gang Is Building New Botnet

samzenpus posted more than 2 years ago | from the look-who's-back dept.

Security 110

alphadogg writes "The cyber-criminal gang that operated the recently disabled Kelihos botnet has already begun building a new botnet with the help of a Facebook worm, according to security researchers from Seculert. Security experts from Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, announced that they took control of the 110,000 PC-strong Kelihos botnet on Wednesday using a method called sinkholing. That worm has compromised over 70,000 Facebook accounts so far and is currently distributing a new version of the Kelihos Trojan."

Sorry! There are no comments related to the filter you selected.

They're "PUNY MORTALS"... apk (-1)

Anonymous Coward | more than 2 years ago | (#39544093)

I can only say that, because of this -> http://www.google.com/search?sclient=psy-ab&hl=en&site=&source=hp&q=%22HOW+TO+SECURE+Windows+2000/XP%22&btnG=Search&gbv=1&sei=oNt4T_-HNeLr0gGn9rGsDQ [google.com]

* Complete with Adamantium Skeleton, Neutronium Skin, & behind an impenetrable 100,000 megavolt forcefield secure...

(By yours truly... it just works!)

APK

P.S.=> I can't be infested setup that way (neither do users of it for years straight), also being armed with good common sense on how you use the web to stay uninfested by the machinations of 'lesser beings' - especially when no matter what kind of tech they use, it shows how to 'burn it out' cleanly & non-destructively, with tools users already own/have, or should... lol! apk

Re:They're "PUNY MORTALS"... apk (-1, Offtopic)

GmExtremacy (2579091) | more than 2 years ago | (#39544103)

Shut up and use Gamemaker like all true professionals do.

Dear GmExcrement... apk (-1)

Anonymous Coward | more than 2 years ago | (#39544237)

Sore I beat you to 1st post? Too bad... lol!

* Grow up, quit 'stalking/trolling' me too please - it gets old fast. It really does.

(Especially when first most likely also considering you're a brand spanking new 7 digit trolling account alter-ego (that some other dolt I have dusted around here in technical computing issues is using, yet again, ala tomhudson = Barbara not Barbie type users to troll/stalk me with...))

Know what this person in the security community said to me recently, verbatim, regarding fools like yourself? Take a read:

"I don't actually get time for many sites such as slashdot anymore, but certainly see my fair share of trolls on the MyWot (Web of Trust (I'm a moderator there, and MyWot includes hpHosts in their "ratings")) and Malwarebytes forums, and you're correct - it's always either users of malicious software/sites, or the owners of such, that are doing it." Mr. Steven Burn - services@it-mate.co.uk -> hpHOSTS/malwarebytes http://hosts-file.net/?s=Download [hosts-file.net]

(I think that says it all, as to what I think about you, which is pretty much what anyone else reading is going to be thinking too!)

APK

P.S.=> It was a good note to any/all malware makers of any kind out there because there's people out there, to the tune of 1,000,000 views++ who are just like me - proof to their puny machinations... apk

Re:Dear GmExcrement... apk (-1, Offtopic)

GmExtremacy (2579091) | more than 2 years ago | (#39544277)

True professionals use Gamemaker. This is a simple fact of the universe. You know this. You agree with me completely.

Now fuckin' use Gamemaker.

Re:Dear GmExcrement... apk (0)

Anonymous Coward | more than 2 years ago | (#39544283)

i 3 u.
let us all secure windows! it is somewhat possible, at least as possible as securing anything else.
seriously, though...people who know about hosts files don't get compromised, or if they do they are cleansed within hours.
most windows infections are a joke! got a rootkit? don't panic, hit it with cheat engine until it crashes then delete it! wow didn't even need to reboot!

Yes.. Secure Windows! (0)

anubi (640541) | more than 2 years ago | (#39544891)

let us all secure windows!

Amen!

Just last night, I experienced a "drive-by" download of the "S.M.A.R.T. HDD" virus.

First, Firefox closed all by itself. I thought at the time "Oh well, another hostile JavaScript"...but its required to talk to Business sites. Better shut down and restart Windows to rid myself of it.

When I did, my Windows 7 machine restarted funny, black background, then suddenly all these windows popped up telling me my hard drive was terribly sick. Words like "critical" were flashing in red on several windows. Damn near made me soil my pants. It all looked so legit, especially the way vendors bundle all sorts of software from vendors I have never heard of in machines these days. The "S.M.A.R.T. Check" window then informed me I only had a trial version of their software and offered a payment opportunity if I wanted an immediate upgrade, or I could give it an administrator password to continue. I smelled a rat.

I put the machine to sleep.

I logged onto Google from an uncompromised machine running K-Meleon under WIN95. And verified I had this thing.

To Microsoft's credit, their "system restore points" worked. I was able to restore the system to a point baselined a week ago, and the virus disappeared.

Not satisfied yet, I got a fresh download of "Windows Defender" definitions and ran a quick scan. Nothing found. Later that night, I set the machine to do a "full scan" and it found a backdoor and a password stealer.

I get the idea the backdoor and password stealer were part of the "S.M.A.R.T." package, but needed an admin password to install them, and thats why quickscan did not find them.. Maybe someone else who has seen this beast can enlighten me.

While I am impressed that Microsoft's virus scanner found these ( according to the sources on Google, this is a hard-to-find polymorphic virus ), I have this question:

Why is it we have all this authentication, administrator and user privilege levels, and yet a rogue program can install itself in such a manner - from a restricted user account - so as to survive a reboot?

From an administrator account, yes, administrators need to install permanently residing software... but lowly users? Any software we install should be sandboxed to our own user account, and definitely not survive a reboot!

The fact I could recognize this as rogue software, and that Microsoft provided me with the methods of recognizing and removing it shows we have come a long way, but there is quite a bit left to go - things like what I just experienced should never happen.

If this "echelon" thingie our taxpayer dollars are funding actually works, can it be programmed to also look for virus signatures - so that the emitter of these signatures gets a knock on their door from 3-letter secret government agencies? Dammit, I am paying for this as a taxpayer - put all this snooping to some good use if you are going to snoop in the first place. I want some of that "safety" I have sacrificed my privacy for.

Re:Yes.. Secure Windows! (0)

Anonymous Coward | more than 2 years ago | (#39545155)

"Why is it we have all this authentication, administrator and user privilege levels, and yet a rogue program can install itself in such a manner - from a restricted user account - so as to survive a reboot?"

Because Windows has to survive the reboot! :( slashdot ate my less than 3 :( :( :(

captcha : adultery
the real reason any thing bad happens.

oh and I wasn't kidding about Cheat Engine, you can fuck up all kinds of programs with it, even the ones that are designed to fuck you!

Re:Yes.. Secure Windows! (0)

Anonymous Coward | more than 2 years ago | (#39546517)

Why is it we have all this authentication, administrator and user privilege levels, and yet a rogue program can install itself in such a manner - from a restricted user account - so as to survive a reboot?

Which part of "Microsoft product" did you not understand?

apk wins yet again, 2 more times? (0)

Anonymous Coward | more than 2 years ago | (#39553791)

By reducing his naysayers to downmod w/ no technical justifications or disproving facts he posts twice here now. Poor trolls like gmextremacy. His kind can't win vs. apk.

Re:apk wins yet again, 2 more times? (1)

GmExtremacy (2579091) | more than 2 years ago | (#39558895)

How comical! How comical! APK has already been annihilated. Hillbilly Mutt 20 agrees, and he's an existentialist Armageddon.

How could you possibly delude yourself to such an extreme degree that you believe that someone like APK, who doesn't use the legendary Gamemaker to solve all of his problems, could beat a Gamemaker advocate such as I? The hilarity of such a mindset is simply astounding!

A youtube video for GmExcrement (lol) (0)

Anonymous Coward | more than 2 years ago | (#39560313)

As to the 'success' (not) of your trolling http://www.youtube.com/watch?v=zVmBAd76kak [youtube.com]

Re:A youtube video for GmExcrement (lol) (1)

GmExtremacy (2579091) | more than 2 years ago | (#39560579)

I know of your true power, APK. I know of it all! I've defeated you time and time again. Don't you dare make me trick into so I can your buttsnap. Don't you dare.

Now fuckin' use Gamemaker instead of your shitty hosts file.

Ur peers @ /. disagree w/ U (54:1++ ratio) (0)

Anonymous Coward | more than 2 years ago | (#39561485)

22++ SLASHDOT USERS EXPERIENCING SUCCESS USING HOSTS FILES QUOTED VERBATIM:

---

"I want my surfing speed back so I block EVERY fucking ad. i.e. http://someonewhocares.org/hosts/ [someonewhocares.org] and http://winhelp2002.mvps.org/hosts.htm [mvps.org] FTW" - by UnknownSoldier (67820) on Tuesday December 13, @12:04PM (#38356782)

"this is not a troll, which hosts file source you recommend nowadays? it's a really handy method for speeding up web and it works." - by gl4ss (559668) on Thursday March 22, @08:07PM (#39446525) Homepage Journal

"I use a custom /etc/hosts to block ads... my file gets parsed basically instantly ... So basically, for any modern computer, it has zero visible impact. And even if it took, say, a second to parse, that would be more than offset by the MANY seconds saved by not downloading and rendering ads. I have noticed NO ill effects from running a custom /etc/hosts file for the last several years. And as a matter of fact I DO run http servers on my computers and I've never had an /etc/hosts-related problem... it FUCKING WORKS and makes my life better overall." - by sootman (158191) on Monday July 13 2009, @11:47AM (#28677363) Homepage Journal

"I actually went and downloaded a 16k line hosts file and started using that after seeing that post, you know just for trying it out. some sites load up faster." - by gl4ss (559668) on Thursday November 17, @11:20AM (#38086752) Homepage Journal

"Ever since I've installed a host file (http://www.mvps.org/winhelp2002/hosts.htm) to redirect advertisers to my loopback, I haven't had any malware, spyware, or adware issues. I first started using the host file 5 years ago." - by TestedDoughnut (1324447) on Monday December 13, @12:18AM (#34532122)

"Better than an ad blocker, imo. Hosts file entries: http://www.mvps.org/winhelp2002/hosts.htm [mvps.org] " - by TempestRose (1187397) on Tuesday March 15, @12:53PM (#35493274)

"^^ One of the many reasons why I like the user-friendliness of the /etc/hosts file." - by lennier1 (264730) on Saturday March 05, @09:26PM (#35393448)

"They've been on my HOSTS block for years" - by ScottCooperDotNet (929575) on Thursday August 05 2010, @01:52AM (#33147212)

"I'm currently only using my hosts file to block pheedo ads from showing up in my RSS feeds and causing them to take forever to load. Regardless of its original intent, it's still a valid tool, when used judiciously." - by Bill Dog (726542) on Monday April 25, @02:16AM (#35927050) Homepage Journal

"you're right about hosts files" - by drinkypoo (153816) on Thursday May 26, @01:21PM (#36252958) Homepage

"APK's monolithic hosts file is looking pretty good at the moment." - by Culture20 (968837) on Thursday November 17, @10:08AM (#38085666)

"I also use the MVPS ad blocking hosts file." - by Rick17JJ (744063) on Wednesday January 19, @03:04PM (#34931482)

"I use ad-Block and a hostfile" - by Ol Olsoc (1175323) on Tuesday March 01, @10:11AM (#35346902)

"I do use Hosts, for a couple fake domains I use." - by icebraining (1313345) on Saturday December 11, @09:34AM (#34523012) Homepage

"It's a good write up on something everybody should use, why you were modded down is beyond me. Using a HOSTS file, ADblock is of no concern and they can do what they want." - by Trax3001BBS (2368736) on Monday December 12, @10:07PM (#38351398) Homepage Journal

"Let me introduce you to the file: /etc/hosts" - by fahrbot-bot (874524) on Monday December 19, @05:03PM (#38427432)

"I use a hosts file" - by EdIII (1114411) on Tuesday December 13, @01:17PM (#38357816)

"I'm tempted to go for a hacked hosts file that simply resolves most advert sites to 127.0.0.1" - by bLanark (123342) on Tuesday December 13, @01:13PM (#38357760)

"put in your /etc/hosts:" - by Anonymous Coward on Friday December 03, @09:17AM (#34429688)

"A hosts file certainly does not require "a lot of work" to maintain, and it quite effectively kills a LOT of advertising and tracking schemes. . In fact, I never would have considered trying to use it for ddefending against viruses or malware." - by RocketRabbit (830691) on Thursday December 30 2010, @05:48PM (#34715060)

---

And, THERE YOU GO DIRECT QUOTES FROM SLASHDOT USERS TOO, & ON HOSTS FILES USEFULNESS TO THEY AS WELL!

---

* THE HOSTS FILE GROUP 30++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

BANNER ADS & BANDWIDTH:2011 -> http://hardware.slashdot.org/comments.pl?sid=2139088&cid=36077722 [slashdot.org]
HOSTS MOD UP:2010 -> http://yro.slashdot.org/comments.pl?sid=1907266&cid=34529608 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1490078&cid=30555632 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1869638&cid=34237268 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1461288&threshold=-1&commentsort=0&mode=thread&cid=30272074 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1255487&cid=28197285 [slashdot.org]
HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1206409&cid=27661983 [slashdot.org]
HOSTS MOD UP:2010 -> http://apple.slashdot.org/comments.pl?sid=1725068&cid=32960808 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1743902&cid=33147274 [slashdot.org]
APK 20++ POINTS ON HOSTS MOD UP:2010 -> http://news.slashdot.org/comments.pl?sid=1913212&cid=34576182 [slashdot.org]
HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1862260&cid=34186256 [slashdot.org]
HOSTS MOD UP:2010 (w/ facebook known bad sites blocked) -> http://tech.slashdot.org/comments.pl?sid=1924892&cid=34670128 [slashdot.org]
HOSTS FILE MOD UP FOR ANDROID MALWARE:2010 -> http://mobile.slashdot.org/comments.pl?sid=1930156&cid=34713952 [slashdot.org]
HOSTS MOD UP ZEUSTRACKER:2011 -> http://it.slashdot.org/comments.pl?sid=2059420&cid=35654066 [slashdot.org]
HOSTS MOD UP vs AT&T BANDWIDTH CAP:2011 -> http://tech.slashdot.org/comments.pl?sid=2116504&cid=35985584 [slashdot.org]
HOSTS MOD UP CAN DO SAME AS THE "CloudFlare" Server-Side service:2011 -> http://it.slashdot.org/comments.pl?sid=2220314&cid=36372850 [slashdot.org]
HOSTS and BGP +5 RATED (BEING HONEST):2010 http://tech.slashdot.org/comments.pl?sid=1901826&cid=34490450 [slashdot.org]
HOSTS & PROTECT IP ACT:2011 http://yro.slashdot.org/comments.pl?sid=2368832&cid=37021700 [slashdot.org]
HOSTS MOD UP:2011 -> http://yro.slashdot.org/comments.pl?sid=2457766&cid=37592458 [slashdot.org]
HOSTS MOD UP & OPERA HAUTE SECURE:2011 -> http://yro.slashdot.org/comments.pl?sid=2457274&cid=37589596 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1197039&cid=27556999 [slashdot.org]
0.0.0.0 IN HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1143349&cid=27012231 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://it.slashdot.org/comments.pl?sid=1198841&cid=27580299 [slashdot.org]
0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1139705&cid=26977225 [slashdot.org]
HOSTS MOD UP:2009 -> http://hardware.slashdot.org/comments.pl?sid=1319261&cid=28872833 [slashdot.org] (still says INSIGHTFUL)
HOSTS MOD UP vs. botnet: 2012 -> http://it.slashdot.org/comments.pl?sid=2603836&cid=38586216 [slashdot.org]
HOSTS MOD UP vs. SOPA act: 2012 -> http://yro.slashdot.org/comments.pl?sid=2611414&cid=38639460 [slashdot.org]
HOSTS MOD UP vs. FaceBook b.s.: 2012 -> http://yro.slashdot.org/comments.pl?sid=2614186&cid=38658078 [slashdot.org]
HOSTS MOD UP "how to secure smartphones": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2644205&cid=38860239 [slashdot.org]
HOSTS MOD UP "Free Apps Eat your Battery via ad displays": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2734503&cid=39408607 [slashdot.org]

---

* So, what was that you were saying, GmExcrement? You're outnumbered, out-thought, & just plain outgunned, by yours truly (and your peers here) on hosts files.

APK

P.S.=> Of course, there's also the words of a security researcher as well in regards to the efficacy in gains for speed, security, & more using hosts files too - A DIRECT QUOTE from a respected security pro (from securityfocus.com, a division of SYMANTEC/NORTON) on the note of HOSTS files too?

Resurrecting the Killfile

Oliver Day, 2009-02-04

FROM -> http://www.securityfocus.com/columnists/491 [securityfocus.com]

---

PERINTENT QUOTES/EXCERPTS:

"The host file on my day-to-day laptop is now over 16,000 lines long. Accessing the Internet â" particularly browsing the Web â" is actually faster now."

and

"The most popular appear to have started as a means to block advertising and as a way to avoid being tracked by sites that use cookies to gather data on the user across Web properties. More recently, projects like Spybot Search and Destroy offer lists of known malicious servers to add a layer of defense against trojans and other forms of malware."

and

"This is a solution I've seen used in small communities around the Internet. Not application-based killfiles, but diving down through the network stack and blocking things at a lower level using host files. The host file is the first file that applications query when looking for an address on the network. Each of the hosts considered as unwanted guests can be given an entry in the host file pointing to 127.0.0.1, the default loopback address, effectively blocking them."

---

So, vs. yourself, GmExcrement? Well, you KNOW I've just GOTTA SAY IT (in my usual inimitable style, complete with documented proofs vs. your b.s.):

This? This was just "too, Too, TOO EASY - just '2EZ'", and you always make it thus for me... thanks for making me look good!

... apk

Re:Ur peers @ /. disagree w/ U (54:1++ ratio) (1)

GmExtremacy (2579091) | more than 2 years ago | (#39561919)

How comical! How comical! They're all 100% incorrect. Gamemaker reigns supreme. If they were True Puter Experts, like me, they'd be using Gamemaker!

Turn to dust and die now!

"Rinse, Lather, & Repeat", troll... lol! apk (0)

Anonymous Coward | more than 2 years ago | (#39562329)

http://it.slashdot.org/comments.pl?sid=2759981&cid=39561485 [slashdot.org]

* Says it all... you've been massively 'pwned', and you know it.

APK

P.S.=>

"Turn to dust and die now!" - by GmExtremacy (2579091) on Tuesday April 03, @01:08PM (#39561919)

Why? So I can be just like you, utterly destroyed/dusted by what's in the link I posted above?? No thanks... but, thanks for making ME, look good by the same token there!

Yes - You have been "pwned", royally (you know it, I know it, everyone/anyone reading knows it)...

... apk

Re:"Rinse, Lather, & Repeat", troll... lol! ap (1)

GmExtremacy (2579091) | more than 2 years ago | (#39562431)

I am one who cannot be defeated by someone like you. You, one who doesn't even use Gamemaker, cannot possibly hope to comprehend my true ferocity!

I'm a buttnude extremist! I have the power! I have the Gamemaker!

You agree with me 100%. That's why you're cowering in the corner and trying to save your public image by saying you're right. But you know otherwise. You know you're 100% wrong.

Re:"Rinse, Lather, & Repeat", troll... lol! ap (0)

Anonymous Coward | more than 2 years ago | (#39562457)

Appears /. and security experts defeated you here http://it.slashdot.org/comments.pl?sid=2759981&cid=39561485 [slashdot.org]

Security Community vs. GmExcrement... apk (0)

Anonymous Coward | more than 2 years ago | (#39561703)

"I don't actually get time for many sites such as slashdot anymore, but certainly see my fair share of trolls on the MyWot (Web of Trust (I'm a moderator there, and MyWot includes hpHosts in their "ratings")) and Malwarebytes forums, and you're correct - it's always either users of malicious software/sites, or the owners of such, that are doing it." Mr. Steven Burn - services@it-mate.co.uk -> hpHOSTS/malwarebytes http://hosts-file.net/?s=Download [hosts-file.net]

* That's what folks from the security community KNOW about your trolling myself on hosts file usage gmexcrement:

Think anyone else thinks differently of you? No way.

APK

P.S.=> Between THAT, & this post link next below (where I easily "shut down" your b.s. trolling with statements from other security pros, AND, your /. peers on hosts files benefits they received (added speed, more "layered-security"/"defense-in-depth", & even added 'anonymity' to an extent)):

http://it.slashdot.org/comments.pl?sid=2759981&cid=39561485 [slashdot.org]

You FAIL, troll... no questions asked!

... apk

How many of those where linux pc's again? (-1)

Anonymous Coward | more than 2 years ago | (#39544099)

RIiggggghhhhhhhttt thought so.

Re:How many of those where linux pc's again? (5, Insightful)

Gaygirlie (1657131) | more than 2 years ago | (#39544147)

The OS in question bears no relevance here: it's a trojan, something a user installs on his or her own, and thus could just as easily apply to Linux, too. Linux isn't some magic bullet that is immune to trojans; as long as whatever happens to be the payload can access user's files and see what the user does and can make network connections that's all it needs, having root access is just a bonus, not a necessity.

Re:How many of those where linux pc's again? None (2, Insightful)

Anonymous Coward | more than 2 years ago | (#39544249)

Linux isn't some magic bullet that is immune to trojans

repeat after me, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel, Linux is the kernel

as long as whatever happens to be the payload can access user's files and see what the user does and can make network connections that's all it needs

How do you pretend to deliver that payload exactly? Heck, every Linux distribution out there is totally different from the others, they have different, ABIs (elibc, glibc, uclibc), different kernel versions which are also patched differently. They run different window managers and different desktops environments. People running Linux are also more educated.

So yeah, I have yet to see a malicious ELF executable being distributed on Facebook - LOL!

Re:How many of those where linux pc's again? None (2)

Mitchell314 (1576581) | more than 2 years ago | (#39544279)

People running Linux are also more educated.

Isn't the front line of defense in security a vigilant and knowledgeable userbase, not the OS/kernel? Yeah, yeah, I know, it's a free-ponies-for-all pipe dream.

Re:How many of those where linux pc's again? None (4, Insightful)

monkeyhybrid (1677192) | more than 2 years ago | (#39544437)

How do you pretend to deliver that payload exactly? Heck, every Linux distribution out there is totally different from the others, they have different, ABIs (elibc, glibc, uclibc), different kernel versions which are also patched differently. They run different window managers and different desktops environments. People running Linux are also more educated.

And nearly all will run bash, python and perl scripts. A malicious payload doesn't have to be a compiled binary.

Re:How many of those where linux pc's again? None (0)

Anonymous Coward | more than 2 years ago | (#39547577)

wrong, some will run busybox with ash (android, TVs, routers and other embedded devices) other will run bash 3, others bash 2..

Re:How many of those where linux pc's again? None (0)

Anonymous Coward | more than 2 years ago | (#39548727)

Yes, and we all know every script/file we save on Unix/Linux defaults to have the executable flag set.

Oh wait, no it doesn't.

So yes, that would work, if the user:
1) accepts the download of the malicious trojan.
2) manually sets the executable bit of the file
3) doesn't bother to look at the contents of the -readable- script.
4) manually runs the script.

Compared to windiows where:
1) it just runs.

Re:How many of those where linux pc's again? None (1)

Lotana (842533) | more than 2 years ago | (#39555317)

So yes, that would work, if the user:
1) accepts the download of the malicious trojan.
2) manually sets the executable bit of the file
3) doesn't bother to look at the contents of the -readable- script.
4) manually runs the script.

I run Linux and love it, but even though my view is biased even I have to admit that no system is immune to the dancing pigs problem [wikipedia.org] .

Lets say the trojan is a new game on Freshmeat and distributed as an rpm or deb package for Linux and exe install file for Windows. User will happily dpkg the file on their system and that will be the end of that.

You would very easily have a full project on Sourceforge with the code perfectly clean, but have the pre-compiled binaries specially modified. Sure you won't get those people that compiled from source, but will get the majority that just get the binary. Compiling source for Windows is even more rare, since compilers are more rarely present.

Even in your own example of a python script: Do you honestly think that the user goes through every line of the script before he runs it? At most they will open it and give a quick scrollthrough. Make it sufficiently large and convoluted, and I will bet that the user will just give up and run it to see what it does. All of this assumes that he will be suspicious about anything in the first place: He downloaded the trojan in the first place means that he is sold on running it. Really the only time some python script will start ringing alarm bells is if it starts asking for the elevated priveladges. Thus it first needs to be socially engineered to convince the user that it will be installing some helpful application.

Re:How many of those where linux pc's again? None (2)

PigleT (28894) | more than 2 years ago | (#39547191)

It's a simple case of majority-ism. Most facebook users will be on Windows and probably IE, so if you're going to make a trojan, to make your job easy that's who you target.

Security isn't limited to exploits in the scope of a user's OS; it's all about privacy, and messing in their web-identified spaces also counts as a security violation.

Re:How many of those where linux pc's again? None (1)

mybeat (1516477) | more than 2 years ago | (#39548699)

People running Linux are also more educated.

My grandma is running Linux, I wouldn't call here that educated.

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39544645)

Someone needs to teach you about GNU/Linux and how it works. See unlike Mac and Microsoft Windows there is a system to thwart malicious applications from running rampant. Part of this is that the core software is free. No, not no cost. I mean free. The users can actually examine the code. The second and likely just as important part of this is users aren't expected to download random applications or manually apply security updates. This is all automated through something called a repository! Now that you know please stop saying "Linux" isn't a magic bullet. It is a magic bullet in comparison to Apple and Microsoft platforms. And unlike Apple's and Microsoft's cloning attempts there is nothing to deny users the right to install anything they want. However given the average user can follow no more than two or three simple directions it meets a perfect balance of total lock down (Apple) and totally insecure (Microsoft).

Re:How many of those where linux pc's again? (1, Funny)

Anonymous Coward | more than 2 years ago | (#39544753)

apt-get install trojan
E: Unable to locate package trojan

Nope, doesn't work.

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39550513)

apt-get install trojan
E: Unable to locate package trojan

Nope, doesn't work.

That's because you didn't try sudo apt-get install trojan.

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39545101)

Linux isn't some magic bullet that is immune to trojans

Of course it isn't. However, unlike any OS that Microsoft has ever sold, security is part of the basic design, not something that's tacked on later as an afterthought. And, as others have pointed out, Linux isn't a monoculture, the way Windows is. There are only a few versions of Windows out there, all of them, almost without exception, using the same file manager and desktop environment. Most of them use the same email client and office suite, as well as the same web browser. Find a vulnerability in any of them and you've got a way to take over millions of PCs. Not only is each Linux distro different, but you have a number of different Desktop Environments in use, each with a different set of potential security issues, along with several popular browsers, different office/productivity programs and a number of email clients. From the perspective of the people running these botnets, Linux is just more work to hack than it's worth to them.

Linux "'FUD' of the day" b.s. quoted as proof (0)

Anonymous Coward | more than 2 years ago | (#39545701)

"However, unlike any OS that Microsoft has ever sold, security is part of the basic design, not something that's tacked on later as an afterthought" - by techno-vampire (666512) on Sunday April 01, @09:34PM (#39545101) Homepage

SeLinux bolted on MAC (mandatory access control), "after the thought" which allows what Windows had LONG before it for security, in ACL (access control lists)...

* Hmmm - guess you didn't know that but stated it anyhow, & I am guessing more out of ignorance of that fact, than "FUD" spreading though... right?

(Must be, because it's the truth).

APK

P.S.=> I don't really have anything personal against you techno-vampire, but I did want to point out the error in your statement with a specific concrete example of fact vs. its falsehood... apk

Windows NT based OS & C2 secure (0)

Anonymous Coward | more than 2 years ago | (#39545731)

Windows NT based OS had that security certification before Linux per the "orange book" (look that up if you need to). No OS exists has A levels, afaik @ least from widely used commercial or not mainstream PC/Server Operating Systems, & only HP/UX afaik, has achieved B2 level status.

APK

P.S.=> On C2 ratings? Honestly, I am not even sure Linux has that! However, now? It probably does (with SeLinux @ least, which WAS added onto Linux by the NSA, & only "after-the-thought" - per my last post to techno-vampire here -> http://it.slashdot.org/comments.pl?sid=2759981&cid=39545701 [slashdot.org] )... apk

Re:How many of those where linux pc's again? (2)

Billly Gates (198444) | more than 2 years ago | (#39545981)

I am sick and tired of this MS FUD. ... why do I keep coming here?

Your bias is based on 10 to 15 year old facts on depreciated or nearly depreciated kernels and apis. I think it is a sign of insecurity to blindly follow something when facts are contrary.

Last week a slashdotter said in a straight face that he is waiting for the first ever unix virus as they do not exist and was gloating. I kindly reminded him where did the term root*kit came from? Root sounds like a Linux account if you ask me.

I have seen financial institutions SuSE Enterprise Servers hacked with a rootkit installed running a Russian Phishing scheme. The admins said We use UNIX ITS SECURE bla bla. Sigh.

Back to the topic, Windows 7 supports ASLR, DEP, sandboxing, privilege separation, and other many improvements that I do not see in Linux.

If you know the ram address of a particular .SO in linux you can get it through a buffer overflow. In Windows Vista and higher you can't as the ram address is randomized. Windows has anti virus scanners that actually block malware and shield. Linux does not.

  This blind zeolotry reminds me of those who hate evolution so much they make all sorts of crazy theories like people walking with dinosaurs 5,000 years ago and global warming is a hoax etc. This is because they feel threatened their religion and beliefs are somehow under attack by anyone who is not a (R) or evangelical. It is harmful for those in IT who will refuse to take precaution to secure their linux systems.

I have seen malware in ads written in javascript that exploit the flash/java/browser and will run fine under Linux because the exploit is multiplatform. I hope your anti virus is up to date. Oh, thats right Linux which is written in C just like Windows could not possible suffer from buffer overflows, stack smashing, and other things

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39546247)

I am sick and tired of this MS FUD.

FUD? Are you denying, then, that well over 90% of all the viruses found "in the wild" target MS Windows and that the rest target the Mac OS? Are you claiming that there is, currently, malware out there designed to target Linux? If so, I'd like to know about it because I've never heard of it.

As far as root kits go, you either need to have access to a machine to install one or you need to trick somebody into giving your installer root access, just as you need to get Administrator rights under Windows. Unlike Windows, however, people running Linux aren't in the habit of installing programs they found on random websites; we get our software from distro-specific repositories where everything's been checked out before it's made available.

Windows has anti virus scanners that actually block malware and shield. Linux does not.

That's because Windows needs them. At the present time, Linux doesn't. Some day, probably, it will, and they'll be written, distributed and used. For the time being, however, I don't need to waste disk space or CPU cycles on them.

Re:How many of those where linux pc's again? (1)

Billly Gates (198444) | more than 2 years ago | (#39546299)

Tons of malware target Linux.

SQL injections, *root*kits, and php vulnurabilities all target Linux or the LAMP stack. Linux hosts the servers with the fast pipes and the sensitive credit card data. The Windows PCs serve as the bots to launch the attacks

Rootkit can be installed by an exploit. The whole oh just do not be root and click on shit is 1990s security. All you need to do is exploit php or your sql database and I can get your server to run my code and then install the rootkit to hide it.

Its that out of date attitude I am talking about. Windows Server become popular because of security over Unix believe it or not. Until W2k came and discovered it had the same problems because it was also written in C. The same attitude how those Linux servers were comprimised as the admins never updated their servers as they read slashdot comments saying Linux is a magic bullet and can never be hacked.

Of course I do admit this flaw is 1990s common sense security practice not to click on something and run it so it is the fault of the user regardless of the OS.

Do not click on stuff, keep your pc updated, stop using XP and IE 6/7, and run anti virus software and you are pretty secure.

Re:How many of those where linux pc's again? (1)

Gaygirlie (1657131) | more than 2 years ago | (#39546367)

Are you claiming that there is, currently, malware out there designed to target Linux? If so, I'd like to know about it because I've never heard of it.

http://www.theregister.co.uk/2011/10/04/linux_repository_res/ [theregister.co.uk] , https://en.wikipedia.org/wiki/Linux_malware#Threats [wikipedia.org] , http://www.darknet.org.uk/2011/01/java-based-cross-platform-malware-trojan-maclinuxwindows/ [darknet.org.uk] and so on. How about the cross-platform one for OpenOffice, BadBunny or what its name was? And so, you should be able to use Google sufficiently even on your own. Or hell, if you happen to be running SSH or HTTP servers go and take a look at your log files, you'll see plenty of attempts and many of those target Linux-boxes.

As far as root kits go, you either need to have access to a machine to install one or you need to trick somebody into giving your installer root access

It's easy enough to fool people into running stuff they shouldn't, and there are vulnerabilities even on Linux that allow stuff to gain root access. Just look through last year's Slashdot news if you wish, there was several high-profile vulnerabilities reported.

Re:How many of those where linux pc's again? (1)

eldorel (828471) | more than 2 years ago | (#39546571)

OK, screw my mod points. I have to comment on this.

There is a big difference between a virus or trojan that takes advantage of a flaw in the operating system and one that relies on brute forcing the password to a privileged user account or tricking a user into handing over the password directly.


I support networks for a living, and we also deal with lots of small businesses and residential systems.
The single biggest infection vector on any operating system is third party browser plugins such as flash or java.
However, when one of our linux users has a java virus, it only gets access to their user directory. A simple reboot stops the virus, because all of the Home directories have the execute bit disabled.
A quick follow up scan once a week with avg for linux or clamav, and they are no longer infected.

Yes, There are a few nasty rootkits that use privilege escalation, but on linux those are few and far between.
To quote the link YOU posted,

few if any are in the wild, and most have been rendered obsolete by Linux updates

On windows, we have to deal with executable files dropped into 20 different locations, a few hundred ways for a virus to execute at startup, and ways for the virus to easily hid itself behind processes that are supposed to be there.
(hello svchost.exe, how many viruses did you execute today?


I really wish you people would stop trying to compare apples to elephants, and start looking at things in a more reasonable method.

Here, I'll start by making a nice little table.

Problem: ............... Mac/Windows ..... Linux (desktop) .... Linux (server)
Stupid users ............... YES .......... YES.................... YES
Java Viruses ............... YES .......... YES.................... NO
Flash Viruses .............. YES .......... YES ................... NO
Brute Force Password ........YES .......... YES.................... YES
Users install Random crap ...YES .......... NO..................... NO
Use admin pass frequently .. YES .......... Maybe.................. NO

Feel free to add more to this table, but just this much makes my point.
EVERYTHING IS VULNERABLE TO STUPID AND BADLY TRAINED USERS/ADMINS.


In my experience, Linux distros respond faster to discovered threats and mitigate actual compromises better than WIndows or MacOSX.
Linux distros also usually don't train users to do things that are known to be dangerous, such as downloading and executing unknown/untrusted binaries.
NOR does linux require a huge financial investment in order to have code vetted, signed off and added to the repositories.

Re:How many of those where linux pc's again? (1)

Gaygirlie (1657131) | more than 2 years ago | (#39546637)

EVERYTHING IS VULNERABLE TO STUPID AND BADLY TRAINED USERS/ADMINS.

That is the whole point I've been making all along: even Linux cannot guard against users doing stupid stuff, or against applications having vulnerabilities. Some people try to paint Linux as being completely invulnerable to anything whatsoever and that is the thing I have an issue with: you should never assume your system is secure just because it is Linux.

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39546577)

Interesting. Thank you. Wikipedia mentions that there are about 850 known Linux viruses, mostly obsolete because the vulnerabilities they exploited have been patched. And, I gather, none of them are currently known to be in the wild. How many Windows viruses are there currently known of and active?

What I find most interesting, however, is the cross-platform attacks. Please note, that I never said that Linux malware is completely impossible, I said that it's nowhere near as much of a danger to Linux as it is to Windows. (Or, if I didn't exactly say that, it's what I meant to say.)

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39560711)

How many people use Windows by comparison to Linux? Almost 95% (Windows marketshare on PC's &/or Servers combined) vs. 1.2% (Linux marketshare on PC's &/or Servers combined).

"Badware" makers don't target a small group: They go after the masses to maximize the "ROI" of their time put in creating said badwares.

What proves this, AND, proves "Linux != invulnerable"?

Android... Android = a linux (because it uses a linux core, not Windows or MacOS X BSD etc./et al).

Android shows this on another computing platform: Smartphones.

I.E.-> It's got the most marketshare/usershare there and it is being rampantly attacked because of it, no questions asked, and for the same reasons I noted above? It's why Windows gets attacked the most, no questions asked.

The 'badware maker' of today is after your money or personal information (such as credit card #'s): It's all about the benjamins!

So, just like pickpockets do, they go where the crowds are to victimize them (especially less security-saavy end users/noobs, because they're easier to victimize).

Criminals are criminals, in the real world or 'cyberspace' and they act exactly the same in the same patterns, going where the masses of noobs are to victimize them.

APK

P.S.=> Everyone here tends to "troll me" and it's largely because they *think* "I hate Linux" well, new NEWS/NewsFlash/Clue: I don't & used it almost exclusively all thru May-Sept. 2010 & liked it (while I was in Europe travelling/touring it, & my family members there gave me a laptop I setup KUbuntu 10.10x on) - it did the job.

I just don't like FUD is all, & when I can correct it, with facts to the contrary? I do... that's all! apk

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39562305)

"Linux != invulnerable"?

I known it's probably a waste of time arguing with AC, but there's one thing I have to point out: I never said that Linux is invulnerable. I didn't because it's not. It is, however, much better at security than Windows and far, far faster at plugging security holes once they're found. If nothing else, not having to wait for Patch Tuesday to distribute things makes it more efficient. And, I might add, the only FUD in this discussion is the straw-men people like you keep coming up with to "prove" me wrong.

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39547665)

this guys is nuts

I am sick and tired of this MS FUD. ... why do I keep coming here?

don't come here then. there are plenty of ms fanboism websites out there where you can make friends that share the same reality distortion field as you.

Last week a slashdotter said in a straight face that he is waiting for the first ever unix virus as they do not exist and was gloating. I kindly reminded him where did the term root*kit came from? Root sounds like a Linux account if you ask me.

A trojan and a rootkit are totally different things, get your facts up and NO, nobody asked you anything.

I have seen financial institutions SuSE Enterprise Servers hacked with a rootkit installed running a Russian Phishing scheme.

I've seen plenty of ms software houses being hacked too, what's your point?

Back to the topic, Windows 7 supports ASLR, DEP, sandboxing, privilege separation, and other many improvements that I do not see in Linux.

WRONG! You clearly know nothing about Linux. So far, it is YOU that is spreading FUD. Is a Google search too hard work for you?

ASLR - http://en.wikipedia.org/wiki/Address_space_layout_randomization#Linux [wikipedia.org]
From wikipedia:
Linux has enabled a weak form of ASLR by default since kernel version 2.6.12 (released June 2005).[6] The PaX and Exec Shield patchsets to the Linux kernel provide more complete implementations. Granted pax is not usually found in desktop boxes (in exception to Fedora installs).

DEP - http://en.wikipedia.org/wiki/NX_bit#Linux [wikipedia.org]
The Linux kernel currently supports the NX bit on x86-64 CPUs and on x86 processors that implement it, such as the current 64-bit CPUs of AMD, Intel, Transmeta and VIA.

sandboxing - http://en.wikipedia.org/wiki/Chroot [wikipedia.org]
ARE YOU KIDDING? Never heard of a chroot Jail?

privilege separation
are you telling me Linux doesn't have privilege separation? Really??? never heard of root accounts and apache accounts etc..?

Dude you are lame as hell! Are you really complaining about people spreading FUD about windows while making the most distorted and bold claims I saw about Linux? Not only that but you are also making yourself a fool by demonstrating a complete lack of knowledge about systems other than microsoft.

Re:How many of those where linux pc's again? (1)

mug funky (910186) | more than 2 years ago | (#39546235)

so it's not security through obscurity, it's security through diversity.

either variant of linux on it's own is not a large enough target.

this is how wild plants survive better than crops...

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39546313)

Not completely, of course, but I'm comming to think it's an important factor. One of the reasons the Potato Blight devistated Ireland so thoroughly, you know, is that almost all of the farmers were growing the same breed of potato, which happened to be exceptionally suseptable to the disease. It's the same thing with Windows. Since most Windows users use the same programs for their work, they're all wide open to the same malware. Just using Firefox, Thunderbird and/or LiberOffice can make Windows safer simply because whatever security holes they have aren't the ones being targetted.

Re:How many of those where linux pc's again? (1)

Gaygirlie (1657131) | more than 2 years ago | (#39546379)

However, unlike any OS that Microsoft has ever sold, security is part of the basic design, not something that's tacked on later as an afterthought.

You've never heard of SELinux, Tomoyo Linux et. al. then.

Re:How many of those where linux pc's again? (1)

techno-vampire (666512) | more than 2 years ago | (#39546619)

I'm quite familiar with SELinux, TYVM. AIUI, SELinux was developed when it became apparant that the original security scheme was no longer adaquate. And, although it's only supposed to be watching for security threats, most of the alerts I've had to deal with have had to do with real stupid bugs, such as a program trying to walk all of /proc for no good reason.

A concept Linux took from Windows? (0)

Anonymous Coward | more than 2 years ago | (#39547699)

http://it.slashdot.org/comments.pl?sid=2759981&cid=39545701 [slashdot.org]

?

Absolutely & no questions asked, as to WHO achieved C2 security before whom, OS' wise.

* Want more, as to ideas & architectures Windows had before Linux?

Ok:

1.) SMP, & thus, ENTERPRISE READY SERVERS for Linux couldn't happen until things very like Windows NT-based OS' had in completion ports + re-entrant kernelmode code.

2.) True usermode threads (instead of a single 'round robin' to a single kernelmode thread as Linux had due to process fork type structuring in process mgt.)

3.) Lastly but FAR FROM LEAST? What the NSA "bolted on" to Linux via SeLinux, in MAC (mandatory access control) which IS a copy of what Windows NT-based OS had LONG before Linux ever did, in ACL (access control lists) @ the filesystem, & registry levels - I noted that in the 1st link I posted above in fact.

APK

P.S.=> In fact, on C2 security level ratings, per the "orange book"? I am not even SURE if Linux has achieved that rating yet (though I imagine it probably has, per the NSA "bolting on" to Linux what existed for ages beforehand for security in Windows, ACL vs. MAC)... apk

Re:How many of those where linux pc's again? (1)

ozmanjusri (601766) | more than 2 years ago | (#39546521)

The OS in question bears no relevance here:

Can you show us any current Linux trojans?

Can YOU show us more Linux users by %? (0)

Anonymous Coward | more than 2 years ago | (#39547783)

Show us more users by % of marketshare/usershare on PC's & Servers combined that make Linux worth attacking as much as Windows is by malware makers? No, you cannot (1.2% = Linux marketshare/user mind share, vs. nearly 95% for Windows).

Malware makers target the MOST used OS on any given computing platform, period. Attacking Linux would be a waste of their time & efforts essentially - not enough return by %'s, & they ARE "playing the percentages" on PC's &/or Servers.

* This makes for better "ROI" for them, because they are just like pickpockets who go to crowded places like city streets, malls, train & bus stations to victimize NOT security professionals (too difficult), but rather, ordinary "noob" users who are NOT security-saavy.

So... again: What proves that on smartphones, another computing platform in mainstream use by the masses?

Well, again, you know: ANDROID does!

(It is definitely a Linux variant (because it uses a Linux kernel, unless you can show us it uses Windows or MacOS X's BSD core instead)).

Online malware makers in general today are nothing more than thieves after your monies or personal information, & they behave EXACTLY as they do...

APK

P.S.=> As far as Linux RECENT showings in security AND IN A SERIOUS AREA? Ok:

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org] , & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture... apk bus stations to victimize NOT security professionals (too difficult), but rather, ordinary "noob" users who are NOT security-saavy.

So... again:

Re:How many of those where linux pc's again? (1)

powerspike (729889) | more than 2 years ago | (#39544257)

They are running a "Business". You try to maximize your profits. More infections means more money to them. Time Vs Effort. It'll wildly more profitable to go after large targets like windows (and even Mac OSX these days), instead of things like BSD and Linux. They are Already up to 70k Accounts according to the summary, do you even think that there is that many people using Facebook from a linux system?

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39544281)

And Apache is still number 1 and still less infected than IIS

Re:How many of those where linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39544491)

It's amazing how many times this gets pointed out, only to be dismissed as comparing apples and oranges. On a relative scale, a lot of people deploying apache and IIS are just as clueless as the desktop browser users we're comparing them to. Installing php software willy-nilly with no regard for security, etc.

How many people actually use linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39544293)

Riighterr!!!! Knew so - how's Android (a Linux) doing, security-wise for years now? Torn up! Where an OS is used the most, it will be targetted, attacked, & abused most - period. That comparison pretty much proves it with real-world results any idiot knows. The badware makers target the biggest mass with 1 shot they can on that computing platform, be it pc's/servers or smartphones.

Re:How many people actually use linux pc's again? (1)

lister king of smeg (2481612) | more than 2 years ago | (#39544963)

Firstly Android while having a Linux kernel does not act like linux, it rose not require a password to install software like you do in Linux this is done by the people implimenting Android because they want it to be easy and in know way intemadating to the users so they make it easy to use at the expense of security. Secondly most of the Android malware are trojan apps that are installed by users trojans are a User security issue not a os security issue. And third Android is based on Java whichever you hear about security problems with all the time. It is a major attack vector for many opperating systems. Also many Android systems are unlatched because updates are left up to the phone companies whichever have little instive update the phones.

Re:How many people actually use linux pc's again? (0)

Anonymous Coward | more than 2 years ago | (#39545653)

Android=Linux w/ most users on smartphones proves my point, that the most used OS on a given computing platform becomes *the* major target for malware makers to take pot shots at (and at users monies or personal information etc.). Much of the same per your 'excuses' goes on with Windows (which has the majority usershare on PC's and Servers combined) too but not as badly as it used to because it's been redesigned with UAC accounting for 1 of your excuses regarding passwords or user privelege levels. Lot of excuses versus the results, but the results are the results on either computing platform, which make my point quite clear by real world results. Lastly, it's Dalvik, not Java (strictly speaking) also.

Re:How many people actually use linux pc's again? (1)

ozmanjusri (601766) | more than 2 years ago | (#39546627)

Riighterr!!!! Knew so - how's Android (a Linux) doing, security-wise for years now? Torn up!

Actually, no. More of a beat up.

Despite Microsoft attempting to buy scare stories with free phones, malware on Android is rare and generally easily removed.

"Microsoft is offering five Android malware victims a free Windows Phone 7 phone. The catch? You need to share your rage against Android with the Twitterverse."

http://securitywatch.pcmag.com/none/291668-microsoft-offers-free-windows-phones-to-android-malware-victims [pcmag.com]

"Advanced users are already wary of alarmist declarations from security vendors, and though the malware threat for Android is growing, many consider it overblown, especially when compared to Windows and other desktop operating systems".

http://androidcommunity.com/symantec-backs-off-of-android-malware-claims-after-researchers-cry-foul-20120201/ [androidcommunity.com]

security firms that warn of Android malware 'charlatans and scammers'

http://www.zdnet.com/blog/hardware/are-security-firms-that-warn-of-android-malware-charlatans-and-scammers/16412 [zdnet.com]

"M$ CON$PIRACY", eh? Here's some links 4U too (0)

Anonymous Coward | more than 2 years ago | (#39547417)

"Despite Microsoft attempting to buy scare stories with free phones, malware on Android is rare and generally easily removed." - by ozmanjusri (601766) on Monday April 02, @03:24AM (#39546627)

So is Windows malwares (even rootkits): What was your point? To show that my point, that the MOST USED OS on any given computing platform will be attacked & abused?? Thank you then I suppose for helping me make my point!

* Trying to make it out like some "M$ CON$PIRACY" though, on YOUR PART in "buying stories"? Please... lol! It's a FACT & widely known that ANDROID, a linux variant (because it surely doesn't use Windows or MacOS X @ its core) is being torn up... why?? See my original posts on 'the most used OS on any given computing platform will become the preferred target of malware makers'... period.

APK

P.S.=> Here's some "food 4 thought" on that very account since you like posting links? I can too, by the truckload (from reputable sources including the security community):

3,325% increase in malware targetting ANDROID:

http://blog.webroot.com/2012/02/17/report-3325-increase-in-malware-targeting-the-android-os/ [webroot.com]

Security firms: Android malware set to skyrocket â The Register

http://www.theregister.co.uk/2011/09/15/android_malware_skyrockets/ [theregister.co.uk]

Android Malware May Have Infected 5 Million Users - Slashdot

http://yro.slashdot.org/story/12/01/28/0431251/android-malware-may-have-infected-5-million-users [slashdot.org]

More than $1 million stolen from Android users in 2011, mobile threats to increase in 2012

http://www.bgr.com/2011/12/14/more-than-1-million-stolen-from-android-users-in-2011-mobile-threats-to-increase-in-2012/ [bgr.com]

Android bug lets attackers install malware without warning â The Register

http://www.theregister.co.uk/2011/09/20/google_android_vulnerability_patching/ [theregister.co.uk]

(Would you like MORE? I have, oh, roughly another 100++)...

... apk

Re:"M$ CON$PIRACY", eh? Here's some links 4U too (1)

ozmanjusri (601766) | more than 2 years ago | (#39547611)

FUD.

MORE facts from 2011 then (vs. UR "FUD") (0)

Anonymous Coward | more than 2 years ago | (#39547817)

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (very bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins: (lol)

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org] , & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS: (very recent):

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach: (lol)

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

* You get the picture...

APK

P.S.=> Linux Security Blunders DOMINATE in 2011, despite all /. "FUD" for years saying "Linux = SECURE" (what a crock of shit that's turning out to be, especially on ANDROID where it can't hide by "security-by-obscurity" anymore & is in the hands of non-tech users galore - & EXPLOITS ARE EXPLODING ON ANDROID, nearly daily)

... apk/b

Fabled "'5-9's' uptime" & Fortune 500 data (0)

Anonymous Coward | more than 2 years ago | (#39547885)

IF it will all even FIT (might not), but here goes:

367++ TOP FORTUNE 100/500 (or best 100 to work for per CNN Money) COMPANIES, EDUCATIONAL INSTITUTIONS, &/or GOVERNMENT AGENCIES USING WINDOWS (over other solutions like Linux) both in HIGH TPM ENVIRONS, & FROM "TOP 100 COMPANIES TO WORK FOR" (per CNN Money 2011):

---

38 HIGH TPM & 99.999% "uptime" examples:

---

XEROX: Managing 7++ million transactions a day for office devices for its customers using Windows Server 2003 + SQLServer 2005 64-bit with 99.999% uptime!

NASDAQ: The U.S.' LARGEST STOCK EXCHANGE, Since 2005 has had Windows Server 2003 + SQLServer 2005 in failover clusters running the "official trade data dissemination system" for them in 24x7 fabled "5-9's" 99.999% uptime, doing 64,000 transactions PER SECOND (compare London Stock Exchange using Linux @ 3,000 per second)

FUJIFILM GROUP: Tracks data for its imaging, information, & documentation for its products & services using Windows Server 2003 w/ a custom SAP solution on SQLServer 2005, achieving 99.999% uptime.

HILTON HOTELS: Manages 1.4 Billion records a day for customers in 1000's of their hotels worldwide - for 370,000 rooms & catering services forecasts (switching from 6 *NIX systems to 1 Windows Server 2003 + SQLServer 2005 clustered failover system using a data warehouse with 7 million rows & 99.998% uptime).

MEDITERRANEAN SHIPPING COMPANY: Manages & Tracks 7 million containers out of 116 countries daily using Windows Server 2003 + SQLServer 2005 in failover clusters with 99.999% uptime.

SWISS INTERNATIONAL AIRLINES: Serves 70 airport destinations worldwide, with 6,500 employees + 110 branch offices via Windows Server 2003 & Active Directory with 99.95% uptime (all while growing their business 30% per year). THEIR PREVIOUS LINUX SYSTEM COULD ONLY HANDLE 250 concurrent users - the Windows one handles over 500++ users concurrently/simultaneously!

UNILEVER: Global consumer good leader, migrated to mySAP on SQLServer 2005 + Windows Server 2003 & scaled UP their operations by over 200% & yet saved money + have 99.999% uptime!

MOTOROLA: Using System Management Server, Windows Server 2003 & SQLServer 2005 to conduct inventory of 65,000 desktops from a single location (e.g. for system updates corporate & worldwide).

NISSAN: Uses Windows Server 2003 to manage 50,000 employees' email & calendaring (w/ out VPN, & using Exchange Server 2003) for local AND remote + mobile users.

TOYOTA MOTOR SALES: Reduced the # of techs needed per dealership (1,000's worldwide) from 7, to 1 using Windows Server 2003.

SIEMENS: 420,000++ people, 130 business units over 190 countries managed in Windows Active Directory

REUTERS: Managing 3,000 servers worldwide @ customer sites internationally (using only 4 managers to do so, remotely).

DELL COMPUTER: Managing 130,000 servers & 100,000 PC's worldside using Windows Server 2003 + 40 million customers' data worldwide.

LEXIS NEXIS: Searches BILLIONS of documents each second delivering news, legal, & business information.

HSBC: Deploys System Center solutions to 15,000 Servers worldwide & 300,000 desktops using Windows Server 2003.

RAYOVAC: Chose Windows Server 2003 over Linux to manage their infrastructure - saving 1 million dollars estimated in software, staffing, & support costs.

JETTAINER/LUFTHANSA/U.S. AIRWAYS: managing shipping to 3,000 flights to 400 airports every day.

CONTINENTAL AIRLINES: Manages crew communication systems, log on/log off, schedules, & shifts using Windows Server 2008 worldwide.

JET BLUE AIRWAYS: Managing 12 million flights & their data annually + ticketing, finance, & personnel too.

TIMEX: Using Windows + Exchange Server for remote personnel & executives (for their ENTIRE workforce)

7 ELEVEN STORES: Chose Windows Server 2003 over Linux with a 20% TCO (total cost of ownership savings not only ESTIMATED, but actually REALIZED!), managing 1,000's of in-store servers via AD worldwide.

STATE OF ILLINOIS GOVERNMENT: Chose Windows Server 2003 over Linux to manage its ENTIRE infrastructure, state-wide, in 1,000's of offices remotely, back to central.

SWITZERLAND'S DEPARTMENT OF FOREIGN AFFAIRS: Managing 666 servers in 156 nations internationally.

REGAL ENTERTAINMENT GROUP: Used to run its POS concession & tickets systems @ 1,000's of theaters worldwide on Linux - Switching to Windows Server 2003 + Windows "Embedded" lowered their total cost of ownership (TCO), substantially as well as giving them better uptime.

CARNIVAL CRUISE LINES: Manages 1,000 shipboard & land based servers using Windows Server 2003 & Server Center.

QUALCOMM INCORPORATED: A wireless technology leader using Windows Server 2003 for managing 6,000 employees via an Active Directory Network in a Secured Network & Communications Infrastructure via Group Policies on AD, resulting in 33% less IT costs.

STARBUCKS: Managing 1,000's of store locations servers worldwide to HQ via Windows Server 2003 Active Directory.

RADIOSHACK: Upgrading from UNIX servers to Windows Server 2003 saved several millions in hardware, software, systems mgt., & support costs (chosen over LINUX in fact) - consolidated in-store servers by 50% from 10,200 to 5,100.

TOMMY HILFIGER: Using Windows Server 2003 they reduced their IT costs by 30%.

VIRGIN ENTERTAINMENT GROUP: Processes 400,000++ SKU's & 7.5 MILLION transactions per second analyzed in REAL TIME!

INFORMATION RESOURCES INC.: Manages over 123 terabytes of data providing consumer behaviour insights, advanced analytics, & decision analysis tools for consumer package goods, healthcare, retail, & financial sectors.

NcSOFT: Korean international gaming software company manages 400,000 users connecting to its game service SIMULTANEOUSLY using Windows Server 2003.

PING: Manages 400 end + servers & desktops for users via Windows Server 2003 Active Directory (& saved 40% less time vs. their old setup on Linux) from a single location.

TDC: Communications leader that is in 12 nations, using Windows Server 2003 to analyze data from 70 disparate (different) systems worldwide centralizing the data + analysis in SQLServer 2005.

GAMEWORKS: A high-tech gaming & restaurant chain, reduced helpdesk costs by 50% using Windows Server 2003 & AD Networks + Group Policies.

SHOP DIRECT: Shop Direct, operating under a number of brands including Littlewoods, Very, Woolworths, Marshall Ward, Kays and Great Universal, employs no less than 10,000 workers, 10% of whom work remotely. In addition, the Group also intends to migrate no less than 350 servers from Windows Server 2003 to Windows Server 2008 R2. The combination of Windows 7 and Windows Server 2008 R2 facilitates scenarios in which remote workers are no longer relying on Virtual Private Networks, but instead use the evolved DirectAccess technology. Another advantage of using Windows 7 Enterprise and ultimate is that the operating systems include BitLocker and BitLocker To Go encryption by default, which serves to protect the sensitive data of employees working remotely.

KBR/Kellogg Brown & Root: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.KBR.com [netcraft.com]

MICROSOFT THEMSELVES: The "shoe maker wears his own shoes" a sure mark of quality -> http://uptime.netcraft.com/up/graph?site=microsoft.com [netcraft.com]

---

37++ MORE FORTUNE 100 COMPANIES RUNNING WINDOWS (OVER OTHER SOLUTIONS LIKE LINUX-UNIX etc./et al), from -> http://money.cnn.com/magazines/fortune/fortune500/2010/full_list/ [cnn.com]

---

TRAVELERS INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.travelers.com [netcraft.com]

PHILIPP MORRIS: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.pmi.com [netcraft.com]

ENTERPRISE HOLDINGS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.enterpriseholdings.com [netcraft.com]

TYSON FOODS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tyson.com [netcraft.com]

HESS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hess.com [netcraft.com]

SUNOCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sunocoinc.com [netcraft.com]

HONEYWELL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=honeywell.com [netcraft.com]

HUMANA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.humana.com [netcraft.com]

GENERAL DYNAMICS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=generaldynamics.com [netcraft.com]

STATE FARM INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.statefarm.com [netcraft.com]

COMCAST: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.comcast.com [netcraft.com]

DISNEY: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=disney.go.com [netcraft.com]

SYSCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sysco.com [netcraft.com]

KRAFT FOODS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kraftfoodscompany.com [netcraft.com]

PEPSI: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pepsico.com [netcraft.com]

INTERNATIONAL HOLDINGS CORP.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=intlfcstone.com [netcraft.com]

DOW CHEMICAL: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.dow.com [netcraft.com]

MARATHON OIL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.marathon.com [netcraft.com]

UNITED TECHNOLOGIES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utc.com [netcraft.com]

WELLPOINT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wellpoint.com [netcraft.com]

COSTCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.costco.com [netcraft.com]

BRISTOL MYERS SQUIBB: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bms.com [netcraft.com]

AMERISOURCE-BERGEN: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.amerisourcebergen.com [netcraft.com]

KROGER: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.kroger.com [netcraft.com]

UNITED HEALTH GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unitedhealthgroup.com [netcraft.com]

MCKESSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.mckesson.com [netcraft.com]

BERKSHIRE HATHAWAY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.berkshirehathaway.com [netcraft.com]

CONOCO-PHILLIPS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.conocophillips.com [netcraft.com]

CHEVRON: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.chevron.com [netcraft.com]

EXXON-MOBIL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.exxonmobil.com [netcraft.com]

PLAINS ALL-AMERICAN PIPELINE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=paalp.com [netcraft.com]

INTL FCStone Inc.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=intlfcstone.com [netcraft.com]

WELLPOINT: Runs their domain on IIS7 -> http://uptime.netcraft.com/up/graph?site=www.wellpoint.com [netcraft.com]

CHRYSLER: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.chryslergroupllc.com [netcraft.com]

CHINA NATIONAL PETROLEUM: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cnpc.com.cn [netcraft.com]

ENEL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.enel.com [netcraft.com]

DOW JONES: Runs their domain on IIS (oddest mix I ever saw) -> http://uptime.netcraft.com/up/graph?site=www.dowjones.com [netcraft.com]

---

(2006 BEST COMPANIES TO WORK FOR/TOP 100 FORTUNE 100-500 COMPANIES TO WORK FOR -> http://money.cnn.com/magazines/fortune/bestcompanies/full_list/ [cnn.com]

64++ 2011 BEST COMPANIES TO WORK FOR/TOP 100 FORTUNE 100-500 COMPANIES TO WORK FOR -> http://money.cnn.com/magazines/fortune/bestcompanies/2011/full_list/ [cnn.com] )

"TOP 30 MEMBERS USING WINDOWS FROM BOTH 2006 & 2011 TOP 100 COMPANIES TO WORK FOR:"

---

VALERO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=valero.com [netcraft.com]

GRIFFIN HOSPITAL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=griffinhealth.org [netcraft.com]

VISION SERVICE PLAN/VSP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=vsp.com [netcraft.com]

J.L. SMUCKER: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=smucker.com [netcraft.com]

S.C. JOHNSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scjohnson.com [netcraft.com]

BOSTON CONSULTING GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=bcg.com [netcraft.com]

PLANTE & MORAN: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=plantemoran.com [netcraft.com]

HOMEBANC MORTGAGE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=homebanc.com [netcraft.com]

REPUBLIC BANCORP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=republicbancorp.com [netcraft.com]

BAPTIST HEALTHCARE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=ebaptisthealthcare.org [netcraft.com]

ALSTON & BIRD: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alston.com [netcraft.com]

KIMLEY-HORN & ASSOCIATES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=kimley-horn.com [netcraft.com]

---

(OVER 1/2 of the TOP 30 (12 of 20 of the 2006 &/or 2011 pack) are using Windows & QUALCOMM #23 + STARBUCKS #29 exist already above using Windows in capacities besides running their websites!)

---

QUIKTRIP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=quiktrip.com [netcraft.com]

DAVID WEEKELY HOMES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=davidweekleyhomes.com [netcraft.com]

ROBERT W. BAIRD: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=rwbaird.com [netcraft.com]

ALCON LABS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alconlabs.com [netcraft.com]

AMERICAN FIDELITY INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=afadvantage.com [netcraft.com]

TDINDUSTRIES: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=tdindustries.com [netcraft.com]

MARRIOTT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=marriot.com [netcraft.com]

CAMDEN PROPERTY TRUST: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=camdenliving.com [netcraft.com]

SCOTTRADE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scottrade.com [netcraft.com]

JM FAMILY ENTERPRISES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=jmfamily.com [netcraft.com]

STEW LEONARDS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=stewleonards.com [netcraft.com]

METHODIST HEALTH: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=methodisthealth.com [netcraft.com]

DPR CONSTRUCTION: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=dpr.com [netcraft.com]

UMPQUA BANK: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=umpquabank.com [netcraft.com]

BINGHAM LOANS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=bingham.com [netcraft.com]

NUSTAR ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=nustarenergy.com [netcraft.com]

PAST TOP 30, into the 30-100 range now (of the "top 100 fortune 100 companies to work for" from CNN Money)

CHESAPEAKE ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=chk.com [netcraft.com]

SOUTHERN OHIO MEDICAL CENTER: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.somc.org [netcraft.com]

PCL CONSTRUCTION: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.pcl.com [netcraft.com]

AMERICAN FIDELITY ASSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.afadvantage.com [netcraft.com]

BALFOUR BEATTY CONSTRUCTION: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.balfourbeattyus.com [netcraft.com]

DEVON ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.devonenergy.com [netcraft.com]

BAPTIST HEALTH S. FLORIDA: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.baptisthealth.net [netcraft.com]

SHARED TECHNOLOGIES: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.sharedtechnologies.com [netcraft.com]

JOHNSON FINANCIAL GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.johnsonbank.com [netcraft.com]

NOVO NORDISK: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.novonordisk-us.com [netcraft.com]

BAKER DONELSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bakerdonelson.com [netcraft.com]

PERKINS COLE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.perkinscoie.com [netcraft.com]

MILLENIUM/TAKEDA ONCOLOGY CO.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.millennium.com [netcraft.com]

AFLAC: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.aflac.com [netcraft.com]

CHILDREN'S HEALTHCARE OF ATLANTA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.choa.org [netcraft.com]

OHIOHEALTH: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.ohiohealth.com [netcraft.com]

EOG Resources: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.eogresources.com [netcraft.com]

PUBLIX GROCERY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.publix.com [netcraft.com]

ARKANSAS CHILDREN'S HOSPITAL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.archildrens.org [netcraft.com]

GILBANE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.gilbaneco.com [netcraft.com]

ERNST & YOUNG: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ey.com [netcraft.com]

SRCTech: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.srcinc.com [netcraft.com]

CARMAX: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.carmax.com [netcraft.com]

KIMPTON HOTELS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kimptonhotels.com [netcraft.com]

BRIGHT HORIZONS: Runs their domain on Windows/IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.brighthorizons.com [netcraft.com]

KPMG: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.us.kpmg.com [netcraft.com]

MERIDIAN HEALTH: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.meridianhealth.com [netcraft.com]

CH2M HILL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ch2mhill.com [netcraft.com]

EVERETT CLINIC: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.everettclinic.com [netcraft.com]

MORNINGSTAR: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=corporate.morningstar.com [netcraft.com]

DARDEN RESTAURANTS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.darden.com [netcraft.com]

CERN: Runs their website on Windows -> http://uptime.netcraft.com/up/graph?site=www.cern.ch [netcraft.com]

GOULDS PUMPS: (former Fortune 500 I worked for) Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.gouldspumps.com [netcraft.com]

AXA FINANCIAL: (former company I worked for) Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.axa.com [netcraft.com]

---

20++ UNITED STATES GOVERNMENT - STATES USING WINDOWS:

---

STATE OF CALIFORNIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ca.gov [netcraft.com]

STATE OF PENNSYLVANIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pa.gov [netcraft.com]

STATE OF TEXAS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.texas.gov [netcraft.com]

STATE OF CONNECTICUT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ct.gov [netcraft.com]

STATE OF ALASKA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.alaska.gov [netcraft.com]

STATE OF FLORIDA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.florida.gov [netcraft.com]

STATE OF ILLINOIS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.illinois.gov [netcraft.com]

STATE OF KENTUCKY: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.kentucky.gov [netcraft.com]

STATE OF MARYLAND: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.maryland.gov [netcraft.com]

STATE OF MONTANA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.montana.gov [netcraft.com]

STATE OF NEVADA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.nevada.gov [netcraft.com]

STATE OF NEW MEXICO: Runs their domain on Windows/IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.newmexico.gov [netcraft.com]

STATE OF NORTH CAROLINA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ncgov.com [netcraft.com]

STATE OF SOUTH CAROLINA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sc.gov [netcraft.com]

STATE OF OHIO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ohio.gov [netcraft.com]

STATE OF SOUTH DAKOTA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sd.gov [netcraft.com]

STATE OF WASHINGTON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=washington.gov [netcraft.com]

STATE OF WEST VIRGINIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wv.gov [netcraft.com]

STATE OF WISCONSIN: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wisconsin.gov [netcraft.com]

STATE OF WYOMING: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wyoming.gov [netcraft.com]

---

90++ TOP RANKED UNIVERSITIES USING Windows (from -> http://colleges.usnews.rankingsandreviews.com/best-colleges/rankings/national-universities/ [rankingsandreviews.com] )

---

Baylor University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.baylor.edu [netcraft.com]

Texas Tech University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ttu.edu [netcraft.com]

Temple University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.temple.edu [netcraft.com]

Drexel University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=drexel.edu [netcraft.com]

Pace University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pace.edu [netcraft.com]

Southern Methodist University (SMU): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.smu.edu [netcraft.com]

Colorado State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.colostate.edu [netcraft.com]

Washington University in St. Louis: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wustl.edu [netcraft.com]

Hofstra University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hofstra.edu [netcraft.com]

DePaul University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.depaul.edu [netcraft.com]

Texas A&M University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tamuk.edu [netcraft.com]

Clarkson University: -> http://uptime.netcraft.com/up/graph?site=www.clarkson.edu [netcraft.com]

Fordham University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.fordham.edu [netcraft.com]

Texas Christian University (TCU): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tcu.edu [netcraft.com]

Florida A&M University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.famu.edu [netcraft.com]

St.John Fisher University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sjfc.edu [netcraft.com]

St.John's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stjohns.edu [netcraft.com]

Kent State University of Ohio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kent.edu [netcraft.com]

Ball State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=cms.bsu.edu [netcraft.com]

Jackson State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.jsums.edu [netcraft.com]

North Dakota State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ndus.edu [netcraft.com]

South Carolina State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scsu.edu [netcraft.com]

Northern Illinois University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.niu.edu [netcraft.com]

South Dakota State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sdstate.edu [netcraft.com]

Michigan University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cmich.edu [netcraft.com]

Indiana State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.indstate.edu [netcraft.com]

Indiana University of Pennsylvania: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.iup.edu [netcraft.com]

Texas Southern University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tsu.edu [netcraft.com]

Northern Arizona University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=nau.edu [netcraft.com]

Tennessee State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tnstate.edu [netcraft.com]

East Tennessee State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.etsu.edu [netcraft.com]

Oakland University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.oakland.edu [netcraft.com]

SUNY College of Environmental Science and Forestry: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.esf.edu [netcraft.com]

University of Southern California (USC): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usc.edu [netcraft.com]

University of Pittsburg (Pitt): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=pitt.edu [netcraft.com]

University of California (UCLA): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ucsc.edu [netcraft.com]

University of Massachusetts (UMASS): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=uml.edu [netcraft.com]

University of Texas @ El Paso: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utep.edu [netcraft.com]

University of Texas @ San Antonio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utsa.edu [netcraft.com]

University of Tulsa: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utulsa.edu [netcraft.com]

University of Ohio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ohio.edu [netcraft.com]

University of North Carolina @ Charlotte: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uncc.edu [netcraft.com]

University of Colorado @ Denver: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ucdenver.edu [netcraft.com]

University of Wyoming: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uwyo.edu [netcraft.com]

University of Cincinnati: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uc.edu [netcraft.com]

University of South Florida: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usf.edu [netcraft.com]

University of Nevada @ Reno: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unr.edu [netcraft.com]

University of Idaho: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uidaho.edu [netcraft.com]

University of Missouri - Kansas City: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.umkc.edu [netcraft.com]

University of Montana: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.umt.edu [netcraft.com]

University of New Orleans: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uno.edu [netcraft.com]

University of Northern Colorado: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unco.edu [netcraft.com]

University of Toledo: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utoledo.edu [netcraft.com]

University of the Pacific: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pacific.edu [netcraft.com]

University of St. Thomas: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stthomas.edu [netcraft.com]

University of San Francisco: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usfca.edu [netcraft.com]

Colorado Tech University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.coloradotech.edu [netcraft.com]

Wichita State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wichita.edu [netcraft.com]

Wilmington University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=wilmu.edu [netcraft.com]

Widener University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.widener.edu [netcraft.com]

Catholic University of America: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cua.edu [netcraft.com]

Clark University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.clarku.edu [netcraft.com]

Lynn University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.lynn.edu [netcraft.com]

Morgan State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.morgan.edu [netcraft.com]

Spalding University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=spalding.edu [netcraft.com]

Biola University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.biola.edu [netcraft.com]

Edgewood College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=edgewood.edu [netcraft.com]

Immaculata University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.immaculata.edu [netcraft.com]

American University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.american.edu [netcraft.com]

Pepperdine University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pepperdine.edu [netcraft.com]

Barry University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.barry.edu [netcraft.com]

Benedictine University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ben.edu [netcraft.com]

Cardinal Stritch University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stritch.edu [netcraft.com]

Bowie State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bowiestate.edu [netcraft.com]

Texas Women's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=twu.edu [netcraft.com]

Our Lady of the Lake University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ollusa.edu [netcraft.com]

Clark Atlanta University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cau.edu [netcraft.com]

Trinity International University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tiu.edu [netcraft.com]

Trevecca University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.trevecca.edu [netcraft.com]

Alliant International University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.alliant.edu [netcraft.com]

California Institute of Integral Studies: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ciis.edu [netcraft.com]

Capella University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.capella.edu [netcraft.com]

National-Louis University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.nl.edu [netcraft.com]

North Central University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ncu.edu [netcraft.com]

Trident University International: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.trident.edu [netcraft.com]

U/bnion Institute and University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.myunion.edu [netcraft.com]

Walden University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.waldenu.edu [netcraft.com]

New School NYU: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.newschool.edu [netcraft.com]

Yeshiva University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.yu.edu [netcraft.com]

(90 of the 200 "top 50" run Windows for their domain)

---

TOP 50/200++ RANKED NORTHERN REGIONAL UNIVERSITIES USING Windows (from -> http://colleges.usnews.rankingsandreviews.com/best-colleges/rankings/regional-colleges-north [rankingsandreviews.com] )

---

LeMoyne College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.lemoyne.edu [netcraft.com]

Loyola University Maryland: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.loyola.edu [netcraft.com]

Providence College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.providence.edu [netcraft.com]

Alfred University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alfred.edu [netcraft.com]

Canisius College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.canisius.edu [netcraft.com]

Bentley University: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.bentley.edu [netcraft.com]

Scranton University: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.scranton.edu [netcraft.com]

Quinnipiac University: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.quinnipiac.edu [netcraft.com]

Emerson College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.emerson.edu [netcraft.com]

Mount St. Mary's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.msmary.edu [netcraft.com]

Hood College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hood.edu [netcraft.com]

Nazareth College: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.naz.edu [netcraft.com]

Iona College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.iona.edu [netcraft.com]

SUNY - New Paltz: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.newpaltz.edu [netcraft.com]

Notre Dame of Maryland University: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.ndm.edu [netcraft.com]

St. Bonaventure University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sbu.edu [netcraft.com]

Arcadia University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.arcadia.edu [netcraft.com]

Assumption College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.assumption.edu [netcraft.com]

Salve Regina University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.salve.edu [netcraft.com]

College of St. Rose: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.strose.edu [netcraft.com]

Kings College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kings.edu [netcraft.com]

Monmouth College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.monmouth.edu [netcraft.com]

Sacred Heart University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sacredheart.edu [netcraft.com]

Salisbury University: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.salisbury.edu [netcraft.com]

SUNY College - Oneonta: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.oneonta.edu [netcraft.com]

Manhattanville College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.mville.edu [netcraft.com]

Roger Williams University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.rwu.edu [netcraft.com]

Saint Francis University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.francis.edu [netcraft.com]

Mercyhurst College: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.mercyhurst.edu [netcraft.com]

Towson University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=towson.edu [netcraft.com]

Gannon University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.gannon.edu [netcraft.com]

(32 of the "top 50" run Windows for their domain)

---

TOP 50/200++ RANKED SOUTHERN REGIONAL UNIVERSITIES USING Windows (from ->

Re:Fabled "'5-9's' uptime" & Fortune 500 data (1)

ozmanjusri (601766) | more than 2 years ago | (#39548621)

Nutcase FUD.

Illogical off-topic ad hominem attack fail FUD (0)

Anonymous Coward | more than 2 years ago | (#39548949)

See subject-line above... it's THAT simple (along w/ my other posts to you & the concrete, visible, & VERIFIABLE information they contain vs. your "FUD").

APK

P.S.=> You're also resorting to the "last resort" of trolls, name tossing... that only tells me you're ALL OUT OF ACES in this game of poker! apk

Re:How many of those where linux pc's again? (0)

tomhath (637240) | more than 2 years ago | (#39544871)

Probably very few, because very few people use a Linux distro for web browsing (less than 2% last I heard).

Why so few Vista clients? (0)

Anonymous Coward | more than 2 years ago | (#39544167)

I'm surprised very few infected clients are Vista. Any particular reason for that?

Re:Why so few Vista clients? (1)

SJHillman (1966756) | more than 2 years ago | (#39544229)

Relatively low (compared to XP/Win7) and continually declining marketshare would be my guess.

Re:Why so few Vista clients? (1)

Khyber (864651) | more than 2 years ago | (#39546699)

Because Vista was so shitty that even malware crashed before being able to execute.

Two deadly vectors of infection... (3, Insightful)

mspohr (589790) | more than 2 years ago | (#39544195)

Another reason I'm glad I don't use Facebook or Windows.

Re:Two deadly vectors of infection... (3, Insightful)

SJHillman (1966756) | more than 2 years ago | (#39544243)

As a previous poster pointed out, trojans care not if it's Windows, Linux, Mac OSX or BSD because the user is the weak link, not the OS. All you need is 1) a trojan for that OS and 2) a user that gives the trojan permissions - most infections I've come across on Windows lately do not have administrator permissions unless the user does. Likewise, Facebook isn't so much the weak link as users are because they'll click on anything.

Re:Two deadly vectors of infection... (1)

Charliemopps (1157495) | more than 2 years ago | (#39544287)

If thieves only targeted a certain model of car because it was very popular and therefor the parts valuable (which is actually the case) you would still be doing yourself a favor by avoiding that model of car, even if you were diligent about where you parked it and buying a security system for it.

Run as admin (special UAC type) & always clean (-1)

Anonymous Coward | more than 2 years ago | (#39544375)

In Windows - HAVING to answer to UAC & even more than say, Linux? Having to literally LOG IN to do things, just like normal users do! I call it a 'limited admin' mode in fact, it works.

How?

Ok (& my systems are setup thus in fact, bit of a pain, but stops bogus installers from malware 'automagically & invisibly' using your current logon privelege level to bypass UAC & other high-security restrictions)

This is how:

These are most of, if not ALL, of the registry areas to set this up in to make that happen with the settings to examine & change are as follows in gpedit.msc &/or regedit.exe:

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Admin Approval Mode for the Built-in Administrator account

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v FilterAdministratorToken

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin

(Set as PROMPT FOR CREDENTIALS)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Behavior of the elevation prompt for standard users

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorUser

(Set as Automatically deny elevation requests)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Detect application installations and prompt for elevation

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v EnableInstallerDetection

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Only elevate UIAccess applications that are installed in secure locations

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v EnableSecureUIAPaths

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Run all administrators in Admin Approval Mode

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Switch to the secure desktop when prompting for elevation

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Virtualize file and registry write failures to per-user locations

OR

HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v EnableVirtualization

(Set as ENABLED)

---

Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop

OR

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableUIADesktopToggle

(Set DISABLED)

---

* There you go... you can do all of what you state, & more, easily enough, but instead by using NATIVE TOOLS already present in Windows itself in, gpedit.msc or regedit.exe!

(More like that is in my 1st post in the link it stores:

http://it.slashdot.org/comments.pl?sid=2759981&cid=39544093 [slashdot.org]

Which was #1 post in this posting also - it works)

APK

P.S.=> To even FURTHER enhance that, albeit @ the application level?

You can use taskmgr.exe, & set UAC Virtualization ENABLED on ANY RUNNING APP too: Further sealing it off from infecting/infesting other running apps or the entire OS by every users' profile, by simply right clicking on running apps & changing their UAC virtualization level (this prevents ENTIRE OS & all users profiles from infestation, isolating it to 1 single user only (ala a test profile used to test possibly virus ridden programs, OR, to isolate problem programs like webbrowsers in the past & Adobe's JAVA products or javascript using tools (since those latter 2 are the PREVAILING largest infectors out there now, in JAVA &/or ADOBE apps))... apk

Re:Run as admin (special UAC type) & always cl (-1)

Anonymous Coward | more than 2 years ago | (#39545121)

Don't you have some hosts file to edit or something? Please give those of us who read at -1 a break.

Unjustified moddown = best you got? (0)

Anonymous Coward | more than 2 years ago | (#39545823)

Plus to troll me after, by AC also?? From the security community for you & others of "your kind" that give me a hard time on hosts files:

"I don't actually get time for many sites such as slashdot anymore, but certainly see my fair share of trolls on the MyWot (Web of Trust (I'm a moderator there, and MyWot includes hpHosts in their "ratings")) and Malwarebytes forums, and you're correct - it's always either users of malicious software/sites, or the owners of such, that are doing it." Mr. Steven Burn - services@it-mate.co.uk -> hpHOSTS/malwarebytes http://hosts-file.net/?s=Download [hosts-file.net]

* So, that "all said & aside"? Do you *think* that others here aren't thinking the same of YOU (or anyone else) that tries to give me a hard time about hosts files usage for added security, speed, & even better "anonymity" vs. tracking online?

Not even a "nice try" troll, & blowing your mod points + trolling me by AC replies afterwards gives your "game" (weak) away as well on how you did it, and the 'why' of it Mr. Burn describes above I strongly suspect as well...

APK

P.S.=> My hosts file updates "automagically" every 15 minutes here via a program I wrote for it to do so, so... no, I don't have to raise a finger to do it (and that program? Mr. Burn of malwarebytes/hpHOSTS says it is 'excellent' & has given me space to host it as well in fact - I'll have it out for anyone to use, gratis, shortly in fact)... apk

Re:Unjustified moddown = best you got? (1)

eldorel (828471) | more than 2 years ago | (#39546667)

I'm going to leave my uid on this so you can't just dismiss it as another troll.


DEAR APK,
I've already had to scroll past this same post twice IN THIS THREAD ALONE.

You have copy/pasted the exact same set of directions to just about every security related article for the past several months.
We've all already seen it, and it's just wasting space.

If you want to inform new people, fine.

Put together your own web site, post all of these directions in a single place where you can keep them up to date, and post a link WHEN IT"S RELEVANT, AS PART OF A POST THAT HAS DIRECT BEARING ON THE DISCUSSION AT HAND.

No one cares who else thinks your idea is nifty, and trying to pat yourself on the back/inflate your ego here on slashdot just irritates those of us with mod points.



You want to get the word out? Great! Here's what you need to do.

1) Write up a step by step paper with these directions, include .REG files with the settings ready to be merged, and possibly even simple scripts to implement the changes.

2) Get a native english speaker to act as editor for your paper, to avoid the hard to parse portions of your manner of communicating, and then hammer out the exact meaning you want to convey.

3) THEN, send your paper to people who are willing to test this out. Get people in the industry to help you iron out the problems, and then update your web page again.


After you have something more useful than 2 pages of random registry keys people will start talking about your idea. They will find problems (broken programs, headaches, etc.) and then you can fix them.


But again, POSTING THE SAME CRAP TO SLASHDOT 10 TIMES A DAY IS ONLY GOING TO GET YOU IGNORED AS ANOTHER CRACKPOT TRYING TO SELL SOMETHING.
Also, go register an actual slashdot account. Posting AC doesn't help your image.

Good luck.



Feel free to send me a rough draft of your paper if you ever get around to writing it. (consider this your first newsletter subscription)

Eldorel

I've got a BETTER multi-part reply for you (0)

Anonymous Coward | more than 2 years ago | (#39547369)

Don't LIKE it? Don't read it. It's that simple... I doubt you even understand it, because IT IS on topic (especially about running as an administrator, because of the person I replied to noting that much).

" post a link WHEN IT"S RELEVANT, AS PART OF A POST THAT HAS DIRECT BEARING ON THE DISCUSSION AT HAND." - by eldorel (828471) on Monday April 02, @03:40AM (#39546667)

See above, "rinse, lather, & repeat"...

I.E.-> You can make running as an administrator LIMITED like other users are, to avoid malware installing & that's what those particular settings help for.

(Your reply only tells me you don't realize that much & didn't read the poster's reply before mine...)

---

"No one cares who else thinks your idea is nifty, and trying to pat yourself on the back/inflate your ego here on slashdot just irritates those of us with mod points." - by eldorel (828471) on Monday April 02, @03:40AM (#39546667)

Ok then, I'll let others who used the guide I wrote up, point-by-point, tell you how things worked out for them instead of my stating it:

---

Across 15-20 or so sites I posted it on back in 2008... & here is the IMPORTANT part, in some sample testimonials to the "layered security" methodology efficacy:

---

SOME QUOTED TESTIMONIALS TO THE EFFECTIVENESS OF SAID LAYERED SECURITY GUIDE I AUTHORED:

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=2 [xtremepccentral.com]

"I recently, months ago when you finally got this guide done, had authorization to try this on simple work station for kids. My client, who paid me an ungodly amount of money to do this, has been PROBLEM FREE FOR MONTHS! I haven't even had a follow up call which is unusual." - THRONKA, user of my guide @ XTremePcCentral

AND

"APK, thanks for such a great guide. This would, and should, be an inspiration to such security measures. Also, the pc that has "tweaks": IS STILL GOING! NO PROBLEMS!" - THRONKA, user of my guide @ XTremePcCentral

AND

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=3 [xtremepccentral.com]

"Its 2009 - still trouble free! I was told last week by a co worker who does active directory administration, and he said I was doing overkill. I told him yes, but I just eliminated the half life in windows that you usually get. He said good point. So from 2008 till 2009. No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008. Great stuff! My client STILL Hasn't called me back in regards to that one machine to get it locked down for the kid. I am glad it worked and I am sure her wallet is appreciated too now that it works. Speaking of which, I need to call her to see if I can get some leads. APK - I will say it again, the guide is FANTASTIC! Its made my PC experience much easier. Sandboxing was great. Getting my host file updated, setting services to system service, rather than system local. (except AVG updater, needed system local)" - THRONKA, user of my guide @ XTremePcCentral

---

AND, here are some times I was modded up for it around here on /.:

* THE APK SECURITY GUIDE GROUP 18++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

APK SECURITY GUIDE:2009 -> http://it.slashdot.org/comments.pl?sid=1361585&cid=29360367 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://yro.slashdot.org/comments.pl?sid=1218837&cid=27787281 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&cid=25093275 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://tech.slashdot.org/comments.pl?sid=1885890&cid=34358316 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=154868&cid=12988150 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&threshold=-1&commentsort=0&mode=thread&no_d2=1&cid=25092677 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://tech.slashdot.org/comments.pl?sid=1027095&cid=25747655 [slashdot.org]
APK SECURITY TEST CHALLENGE LINUX vs. WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=267599&threshold=1&commentsort=0&mode=thread&cid=20203061 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://yro.slashdot.org/comments.pl?sid=1638428&cid=32070500 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://books.slashdot.org/comments.pl?sid=168931&cid=14083927 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26941781 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://it.slashdot.org/comments.pl?sid=416702&cid=22026982 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&cid=30649722 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&threshold=-1&commentsort=0&mode=thread&cid=30649722 [slashdot.org]
APK SECURE SETUP FOR IP STACK:2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14211084 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14210206 [slashdot.org]
MICROSOFT SECURITY:2010 -> http://news.slashdot.org/comments.pl?sid=1546446&cid=31106612 [slashdot.org]

---

This made me LAUGH THE MOST:

"Feel free to send me a rough draft of your paper if you ever get around to writing it. (consider this your first newsletter subscription)." - by eldorel (828471) on Monday April 02, @03:40AM (#39546667)

LMAO - OK: Show us you've done 1/10th of what I have in the art & science of computing (while you were still in diapers I wager) + BEFORE I did, & to better acclaim? Then, maybe, I'd take your "advice"...

----

Windows NT Magazine (now Windows IT Pro) April 1997 "BACK OFFICE PERFORMANCE" issue, page 61

(&, for work done for EEC Systems/SuperSpeed.com on PAID CONTRACT (writing portions of their SuperCache program increasing its performance by up to 40% via my work) albeit, for their SuperDisk & HOW TO APPLY IT, took them to a finalist position @ MS Tech Ed, two years in a row 2000-2002, in its HARDEST CATEGORY: SQLServer Performance Enhancement).

WINDOWS MAGAZINE, 1997, "Top Freeware & Shareware of the Year" issue page 210, #1/first entry in fact (my work is there)

PC-WELT FEB 1998 - page 84, again, my work is featured there

WINDOWS MAGAZINE, WINTER 1998 - page 92, insert section, MUST HAVE WARES, my work is again, there

PC-WELT FEB 1999 - page 83, again, my work is featured there

CHIP Magazine 7/99 - page 100, my work is there

GERMAN PC BOOK, Data Becker publisher "PC Aufrusten und Repairen" 2000, where my work is contained in it

HOT SHAREWARE Numero 46 issue, pg. 54 (PC ware mag from Spain), 2001 my work is there, first one featured, yet again!

Also, a British PC Mag in 2002 for many utilities I wrote, saw it @ BORDERS BOOKS but didn't buy it... by that point, I had moved onto other areas in this field besides coding only...

Being paid for an article that made me money over @ PCPitstop in 2008 for writing up a guide that has people showing NO VIRUSES/SPYWARES & other screwups, via following its point, such as THRONKA sees here -> http://www.xtremepccentral.com/forums/showthread.php?s=ee926d913b81bf6d63c3c7372fd2a24c&t=28430&page=3 [xtremepccentral.com]

It's also been myself helping out the folks at the UltraDefrag64 project (a 64-bit defragger for Windows), in showing them code for how to do Process Priority Control @ the GUI usermode/ring 3/rpl 3 level in their program (good one too), & being credited for it by their lead dev & his team... see here -> http://ultradefrag.sourceforge.net/handbook/Credits.html [sourceforge.net] or here http://sourceforge.net/tracker/?func=detail&aid=2993462&group_id=199532&atid=969873 [sourceforge.net]

AND lastly: http://g-off.net/software/a-python-repeatable-threadingtimer-class [g-off.net] where I got other programmer's work WORKING RIGHT (in PyThon no less, which I just started learning only 2 week ago no less) by showing them how to use a "Dummy Proxy Function" as I call it, to make a RepeatTimer class (Thread sub-class really) to take PARAMETERIZED FUNCTIONS, ala:

def apkthreadlaunch():
                                      getnortonsafeweb(sAPKFileName = "APK_1_NortonSafeWeb360Extracted.txt".rstrip())

a = RepeatTimer(900, apkthreadlaunch) # 900 is 15 minutes... apk

Where it was NOT working for many folks there, before (submitted to the maker of the RepeatTimer class no less, & yes, it WORKS!)

----

There's a hell of a lot more too!

(E.G.-> Like my helping the netscape team out of a bug @ NTCompatible.com, Mr. Christophe Portneuve on his SysInfo VCL for Delphi coders, Arstechnica's Coolmon author (on proper bug trapping & detecting performance counters) & SetiSpy's Roelof J. Englebrecht (he's passed too bad) on setting his apps CPU priority low when it was idle or minimized... the list goes on, but that will do for now!)

APK

P.S.=> I don't take advisement from "wannabes" - especially ones that give advice & yet haven't done anything I know of vs. what I have (especially exceeding it, and you? Afaik, you have not & can't even scratch the partial list above)... apk

Re:I've got a BETTER multi-part reply for you (1)

eldorel (828471) | more than 2 years ago | (#39548545)

(sigh)
Fine, you're awesome, incredible, and one of the most accomplished programmers the world has ever seen.

I don't care, and it doesn't negate anything that I said.

You act like a dick with low self esteem who likes to blow his own horn on other peoples web sites.
No one cares what you have done when we can look at and test the actual information you are presenting, so quit with the self promotion.

I wasn't being condescending, nor was I trying to be insulting.
Instead I was simply pointing out that while you've got a few good ideas, your presentation of it is crap.

You have the exact same information that you've been presenting for over a decade splattered all over the internet in anonymous posts and articles referenced by people who saw the potential in what you're trying to push.

However, you've been resting on your laurels instead of actually becoming an important reference for the industry.

Knowledgeable professionals already know how to lock down UAC.
Most of them do it using GPO's instead of registry edits, and about 90% of what you've been shouting about is referenced in at least 3 of the books I have on the shelf for my techs to reference.

You aren't trying to bring this to the attention of people like me.
You need to reach the MCSE/A+ certified "technicians" out there doing 95% of the day to day maintenance.
Instead you waste your days being a jackass on slashdot.

So, feel free to ignore my advice and continue attacking people who try to tell you things.
I'm not going to waste time of breath shouting at someone who has decided that the entire rest of the world must be wrong.


As for your personal attacks on my experience, have fun.
I don't need random strangers to pat me on the back and puff up my ego.
I get more than enough of that from the customers and other IT professionals who call me when they have a problem they can't solve.

Eldorel

Thanks 4 1st thing you said (I didn't say it) (0)

Anonymous Coward | more than 2 years ago | (#39548919)

"Fine, you're awesome, incredible, and one of the most accomplished programmers the world has ever seen." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

See subject-line above: I also omitted this in my notes on things I've done too - since you're about telling me "how great I am"!

(Me? I can "get the job done", & I've stated that many times in fact on /., nothing more)

I have professionally on MANY levels in the art & science of computing (tech, network admin, & programmer/analyst - software engineer) on millions of lines sized systems of Client-Server design for business too (where the "steady eddy" money is)):

Dr. Mark Russinovich of Microsoft/SysInternals fame (former co-contractor/co-worker of mine in the 90's for Sunbelt Software)):

We have also had our disagreements before too! That doesn't mean I don't respect he, even though we had differences over time...

(I.E.-> Over memmgt & what-not where in the end? VISTA had to reduce their cache loading aggressiveness even, proving my point that dedicating "ALL FREE RAM TO CACHE" in Windows, wouldn't work, & where memory optimizers can unfreeze/unhalt exchange servers + more... & I've even earlier, pre that debate @ Windows IT Pro, corrected the design of one of his apps in pagedefrag.exe (hardcodes to both registry hive locations, pagefile.sys location, & more + how/where to overcome that in NT Native API code, beneath the UserMode stuff we generally access, etc./et al)).

He's not perfect, nobody is, but he does DAMN fine work when he does (processexplorer.exe being the "prime example").

---

"I don't care, and it doesn't negate anything that I said." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

Actually, it does a HELL OF A JOB SHOWING YOU'RE NOT IN ANY POSITION TO CRITICIZE ME AS A PEER IN COMPUTING... period.

---

"You act like a dick with low self esteem who likes to blow his own horn on other peoples web sites. " - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

When attacked? That reply of mine surely shows who the 'talk a lot/done nothing' mere "ne'er-do-wells" are though (guess who I am referring to now?).

In regards to your name tossing? LOL:

You not only ACT like an illogical troll, utilizing the "ULTIMATE FAIL" of ad hominem attack attempts, but you clearly are NOT MY PEER in the computer sciences also (much less my superior in accomplishments in it before you were born I suspect).

---

"No one cares what you have done when we can look at and test the actual information you are presenting, so quit with the self promotion." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

Oh, really? You SURELY seemed to care enough to issue that "foaming @ the mouth" profanity laden off-topic illogical failing ad hominem attack of yours though, didn't you? Especially since my reply has "SILENCED YOU"... lol!

---

"I wasn't being condescending, nor was I trying to be insulting." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

Oh, really? What is calling me a 'dick' then??

"Instead I was simply pointing out that while you've got a few good ideas, your presentation of it is crap." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

OPINIONS VARY (here's one you can verify):

---

SOME QUOTED TESTIMONIALS TO THE EFFECTIVENESS OF SAID LAYERED SECURITY GUIDE I AUTHORED:

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=2 [xtremepccentral.com]

"I recently, months ago when you finally got this guide done, had authorization to try this on simple work station for kids. My client, who paid me an ungodly amount of money to do this, has been PROBLEM FREE FOR MONTHS! I haven't even had a follow up call which is unusual." - THRONKA, user of my guide @ XTremePcCentral

AND

"APK, thanks for such a great guide. This would, and should, be an inspiration to such security measures. Also, the pc that has "tweaks": IS STILL GOING! NO PROBLEMS!" - THRONKA, user of my guide @ XTremePcCentral

AND

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f&t=28430&page=3 [xtremepccentral.com]

"Its 2009 - still trouble free! I was told last week by a co worker who does active directory administration, and he said I was doing overkill. I told him yes, but I just eliminated the half life in windows that you usually get. He said good point. So from 2008 till 2009. No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008. Great stuff! My client STILL Hasn't called me back in regards to that one machine to get it locked down for the kid. I am glad it worked and I am sure her wallet is appreciated too now that it works. Speaking of which, I need to call her to see if I can get some leads. APK - I will say it again, the guide is FANTASTIC! Its made my PC experience much easier. Sandboxing was great. Getting my host file updated, setting services to system service, rather than system local. (except AVG updater, needed system local)" - THRONKA, user of my guide @ XTremePcCentral

---

Here's more (from your PEERS on /., in regards to my posts on securing Windows):

---

* THE APK SECURITY GUIDE GROUP 18++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

APK SECURITY GUIDE:2009 -> http://it.slashdot.org/comments.pl?sid=1361585&cid=29360367 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://yro.slashdot.org/comments.pl?sid=1218837&cid=27787281 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&cid=25093275 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://tech.slashdot.org/comments.pl?sid=1885890&cid=34358316 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=154868&cid=12988150 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&threshold=-1&commentsort=0&mode=thread&no_d2=1&cid=25092677 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://tech.slashdot.org/comments.pl?sid=1027095&cid=25747655 [slashdot.org]
APK SECURITY TEST CHALLENGE LINUX vs. WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=267599&threshold=1&commentsort=0&mode=thread&cid=20203061 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://yro.slashdot.org/comments.pl?sid=1638428&cid=32070500 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://books.slashdot.org/comments.pl?sid=168931&cid=14083927 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26941781 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://it.slashdot.org/comments.pl?sid=416702&cid=22026982 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&cid=30649722 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&threshold=-1&commentsort=0&mode=thread&cid=30649722 [slashdot.org]
APK SECURE SETUP FOR IP STACK:2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14211084 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14210206 [slashdot.org]
MICROSOFT SECURITY:2010 -> http://news.slashdot.org/comments.pl?sid=1546446&cid=31106612 [slashdot.org]

---

"You have the exact same information that you've been presenting for over a decade splattered all over the internet in anonymous posts and articles referenced by people who saw the potential in what you're trying to push." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

Except I can PROVE I've been doing it longer, per this tidbit(s):

To "immunize" a Windows system, I effectively use the principles in "layered security" possibles!

http://www.bing.com/search?q=%22HOW+TO+SECURE+Windows+2000%2FXP%22&go=&form=QBRE [bing.com]

I.E./E.G.-> I have done so since 1997-1998 with the most viewed, highly rated guide online for Windows security there really is which came from the fact I also created the 1st guide for securing Windows, highly rated @ NEOWIN (as far back as 1998-2001) here:

http://www.neowin.net/news/apk-a-to-z-internet-speedup--security-text [neowin.net]

& from as far back as 1997 -> http://web.archive.org/web/20020205091023/www.ntcompatible.com/article1.shtml [archive.org] which Neowin above picked up on & rated very highly.

That has evolved more currently, into the MOST viewed & highly rated one there is for years now since 2008 online in the 1st URL link above...

Which has well over 500,000++ views online (actually MORE, but 1 site with 75,000 views of it went offline/out-of-business) & it's been made either:

---

1.) An Essential Guide
2.) 5-5 star rated
3.) A "sticky-pinned" thread
4.) Most viewed in the category it's in (usually security)
5.) Got me PAID by winning a contest @ PCPitStop (quite unexpectedly - I was only posting it for the good of all, & yes, "the Lord works in mysterious ways", it even got me PAID -> http://techtalk.pcpitstop.com/2007/09/04/pc-pitstop-winners/ [pcpitstop.com] (see January 2008))

---

"However, you've been resting on your laurels instead of actually becoming an important reference for the industry. ." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

I've got those "laurels" (from back decades ago into the 21st century) when I actually gave a DAMN about that that is (early in my career, not as needed now).

Do you? No, obviously. There's 2 kinds of people out there, per Clint Eastwood (one of my film heroes):

"Those with guns, & those who dig (YOU DIG)"

There's those that write about people who DO, and those who DO, in other words...

Plus? Well, clearly, OPINIONS VARY!

( & some of your "experts" (per only SOME of what I posted above and earlier in reply to yourself)? I have proven WRONG, even in security?)

A very current example you can ask Mr. Steven Burn of malwarebytes/hpHOSTS on??

My overturning ArcaVir/Arcabit on an executable I wrote being falsely flagged as a malware due to their NOT understanding an executable compression engine I utilizing (faster loads, easier to protect vs. res hack & disassembly & to protect vs. viral infestation too as a bonus via sizechecks @ startup of an app, etc./et al)...

Ask him yourself.

So much for the "experts" out there...

Good as they may be? They make mistakes.

What I find as a problem is that these "alleged 'security gurus'" MANY ARE NOT CODERS - they merely 'use' what folks like myself create for them to use.

Without coding know-how? You're NEVER going to understand HOW AN API (or OS for that matter) TRULY works.

---

"Knowledgeable professionals already know how to lock down UAC." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

I don't post such information for they, for the same reasons you note - I post it, in forums where 'normal users' tend to be vs. "pros", because THEY ARE THE ONES TO REACH, not the "security pros" (many of whom I have LITTLE to NO RESPECT FOR in fact).

---

"Most of them do it using GPO's instead of registry edits, and about 90% of what you've been shouting about is referenced in at least 3 of the books I have on the shelf for my techs to reference. " - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

What do you *think* my noting to use gpedit.msc or secpol.msc in my replies here WERE ABOUT? LOL, man... you blew it BADLY there.

---

"You aren't trying to bring this to the attention of people like me." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

No? What were my posts on how to secure Windows then or even speed it up, since 1997?? Posts to "pros", or ordinary folks on forums who are NOT PROS in security???

---

"You need to reach the MCSE/A+ certified "technicians" out there doing 95% of the day to day maintenance. " - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

I did with a Mr. Don Parker (look him up) & in my guides I quoted his saying the have no problems in them for what they're intended to do - enlighten end users on how to secure a Windows system, with an EASY TO USE FREE TOOL TOO, no less, that is highly esteemed (CIS Tool).

Before you shoot your mouth off @ me with bogus accusations? I suggest you research a WEE bit more... because as is, right now?? You have to "EAT YOUR WORDS"... how do they taste, flavored with the 'bitter taste of defeat' as well as your FOOT IN YOUR MOUTH???

---

"Instead you waste your days being a jackass on slashdot." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

More name tossing... & about "wasting time on /.": What are YOU DOING HERE THEN? Hmmm??

Until you've done a FRACTION of what I have in the art & science of computing? Please... lol, make me laugh some more.

---

"So, feel free to ignore my advice and continue attacking people who try to tell you things." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

Calling me names is "telling me things"? Ok 'sure' (sarcasm). It's NOT MY FAULT you cannot show anything visible, concrete, or verifiable as I can as to what I have done in the art & science of computing for the gain of others on MANY levels.

---

"I'm not going to waste time of breath shouting at someone who has decided that the entire rest of the world must be wrong." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

WELL, you're free to disprove anything I've written here then, vs. your illogical ad hominem attacks on myself, which have failed badly, in the light of facts I put out vs. them... pretty simple.

---

"As for your personal attacks on my experience, have fun." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

No, that's ok - your lack of that does the job for me, especially considering you're attempting to attack me via illogical off-topic ad hominem attacks & failing.

---

"I don't need random strangers to pat me on the back and puff up my ego." - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

You said I was "tooting my horn" though, so I used the words of others (including your /. peers, see above).

That's all... you know: THE THINGS YOU CANNOT SHOW or also things you have not done in the arena of computing that I have.

You attack me? This is the result.

---

"I get more than enough of that from the customers and other IT professionals who call me when they have a problem they can't solve. " - by eldorel (828471) on Monday April 02, @10:27AM (#39548545)

LOL, I can show a TON of that myself, & on security in coding for large insurers, security of systems (large financial firms) & many, Many, MANY information systems for companies since 1994 professionally on all of those grounds in programming/analyst work alone... it goes "up, Up, UP & AWAY" if I were to toss on the tech &/or network admin work I've done since then also.

APK

P.S.=> So much for your 'critique' because point-by-point, in my usual INIMITIABLE documented style with proofs? Well... you didn't do so well (just like you cannot show you are a peer of mine in computing via accomplishments in computer sciences (and certainly NOT before me, or as many times, in as many varied places & what I posted is SO FAR SHORT of what I actually COULD? It's not funny!)... apkquote

http://www.xtremepccentral.com/forums/showthread.php?s=672ebdf47af75a0c5b0d9e7278be305f [xtremepccentral.com]

Re:Run as admin (special UAC type) & always cl (1)

Nikker (749551) | more than 2 years ago | (#39546465)

But I'm not a computer programmer and I want something that Just Works! I pay my hard earned money for my copy of Windows why should I have to sort through thousands of lines of codes just to get my system work properly?

This is why Windows will never truly be a Real OS.

If Windows != "a REAL OS" then... (-1)

Anonymous Coward | more than 2 years ago | (#39547461)

"But I'm not a computer programmer and I want something that Just Works! I pay my hard earned money for my copy of Windows why should I have to sort through thousands of lines of codes just to get my system work properly?" - by Nikker (749551) on Monday April 02, @02:43AM (#39546465)

Then you wouldn't like Linux then w/ sudo & tty terminals work, for starters in reply to your response, & the UAC settings I noted? Only a few registry edits (or using gpedit.msc/secpol.msc) - minutes of work on FAR LESS than 1,000's of settings/lines of code, etc./et al.

* Plus - Using a tool like CIS Tool makes securing Windows, even Windows 7, easy.

---

"This is why Windows will never truly be a Real OS." - by Nikker (749551) on Monday April 02, @02:43AM (#39546465)

Lastly, per my subject-line above, especially? Well...

IF Windows isn't a "real OS", then home come it's so widely used by home users (94.5% vs. 1.2% Linux vs. 4.3% for MacOS X)

AND

How come these Fortune 100-500 companies use it so much?

To wit:

367++ TOP FORTUNE 100/500 (or best 100 to work for per CNN Money) COMPANIES, EDUCATIONAL INSTITUTIONS, &/or GOVERNMENT AGENCIES USING WINDOWS (over other solutions like Linux) both in HIGH TPM ENVIRONS, & FROM "TOP 100 COMPANIES TO WORK FOR" (per CNN Money 2011):

---

38 HIGH TPM & 99.999% "uptime" examples:

---

XEROX: Managing 7++ million transactions a day for office devices for its customers using Windows Server 2003 + SQLServer 2005 64-bit with 99.999% uptime!

NASDAQ: The U.S.' LARGEST STOCK EXCHANGE, Since 2005 has had Windows Server 2003 + SQLServer 2005 in failover clusters running the "official trade data dissemination system" for them in 24x7 fabled "5-9's" 99.999% uptime, doing 64,000 transactions PER SECOND (compare London Stock Exchange using Linux @ 3,000 per second)

FUJIFILM GROUP: Tracks data for its imaging, information, & documentation for its products & services using Windows Server 2003 w/ a custom SAP solution on SQLServer 2005, achieving 99.999% uptime.

HILTON HOTELS: Manages 1.4 Billion records a day for customers in 1000's of their hotels worldwide - for 370,000 rooms & catering services forecasts (switching from 6 *NIX systems to 1 Windows Server 2003 + SQLServer 2005 clustered failover system using a data warehouse with 7 million rows & 99.998% uptime).

MEDITERRANEAN SHIPPING COMPANY: Manages & Tracks 7 million containers out of 116 countries daily using Windows Server 2003 + SQLServer 2005 in failover clusters with 99.999% uptime.

SWISS INTERNATIONAL AIRLINES: Serves 70 airport destinations worldwide, with 6,500 employees + 110 branch offices via Windows Server 2003 & Active Directory with 99.95% uptime (all while growing their business 30% per year). THEIR PREVIOUS LINUX SYSTEM COULD ONLY HANDLE 250 concurrent users - the Windows one handles over 500++ users concurrently/simultaneously!

UNILEVER: Global consumer good leader, migrated to mySAP on SQLServer 2005 + Windows Server 2003 & scaled UP their operations by over 200% & yet saved money + have 99.999% uptime!

MOTOROLA: Using System Management Server, Windows Server 2003 & SQLServer 2005 to conduct inventory of 65,000 desktops from a single location (e.g. for system updates corporate & worldwide).

NISSAN: Uses Windows Server 2003 to manage 50,000 employees' email & calendaring (w/ out VPN, & using Exchange Server 2003) for local AND remote + mobile users.

TOYOTA MOTOR SALES: Reduced the # of techs needed per dealership (1,000's worldwide) from 7, to 1 using Windows Server 2003.

SIEMENS: 420,000++ people, 130 business units over 190 countries managed in Windows Active Directory

REUTERS: Managing 3,000 servers worldwide @ customer sites internationally (using only 4 managers to do so, remotely).

DELL COMPUTER: Managing 130,000 servers & 100,000 PC's worldside using Windows Server 2003 + 40 million customers' data worldwide.

LEXIS NEXIS: Searches BILLIONS of documents each second delivering news, legal, & business information.

HSBC: Deploys System Center solutions to 15,000 Servers worldwide & 300,000 desktops using Windows Server 2003.

RAYOVAC: Chose Windows Server 2003 over Linux to manage their infrastructure - saving 1 million dollars estimated in software, staffing, & support costs.

JETTAINER/LUFTHANSA/U.S. AIRWAYS: managing shipping to 3,000 flights to 400 airports every day.

CONTINENTAL AIRLINES: Manages crew communication systems, log on/log off, schedules, & shifts using Windows Server 2008 worldwide.

JET BLUE AIRWAYS: Managing 12 million flights & their data annually + ticketing, finance, & personnel too.

TIMEX: Using Windows + Exchange Server for remote personnel & executives (for their ENTIRE workforce)

7 ELEVEN STORES: Chose Windows Server 2003 over Linux with a 20% TCO (total cost of ownership savings not only ESTIMATED, but actually REALIZED!), managing 1,000's of in-store servers via AD worldwide.

STATE OF ILLINOIS GOVERNMENT: Chose Windows Server 2003 over Linux to manage its ENTIRE infrastructure, state-wide, in 1,000's of offices remotely, back to central.

SWITZERLAND'S DEPARTMENT OF FOREIGN AFFAIRS: Managing 666 servers in 156 nations internationally.

REGAL ENTERTAINMENT GROUP: Used to run its POS concession & tickets systems @ 1,000's of theaters worldwide on Linux - Switching to Windows Server 2003 + Windows "Embedded" lowered their total cost of ownership (TCO), substantially as well as giving them better uptime.

CARNIVAL CRUISE LINES: Manages 1,000 shipboard & land based servers using Windows Server 2003 & Server Center.

QUALCOMM INCORPORATED: A wireless technology leader using Windows Server 2003 for managing 6,000 employees via an Active Directory Network in a Secured Network & Communications Infrastructure via Group Policies on AD, resulting in 33% less IT costs.

STARBUCKS: Managing 1,000's of store locations servers worldwide to HQ via Windows Server 2003 Active Directory.

RADIOSHACK: Upgrading from UNIX servers to Windows Server 2003 saved several millions in hardware, software, systems mgt., & support costs (chosen over LINUX in fact) - consolidated in-store servers by 50% from 10,200 to 5,100.

TOMMY HILFIGER: Using Windows Server 2003 they reduced their IT costs by 30%.

VIRGIN ENTERTAINMENT GROUP: Processes 400,000++ SKU's & 7.5 MILLION transactions per second analyzed in REAL TIME!

INFORMATION RESOURCES INC.: Manages over 123 terabytes of data providing consumer behaviour insights, advanced analytics, & decision analysis tools for consumer package goods, healthcare, retail, & financial sectors.

NcSOFT: Korean international gaming software company manages 400,000 users connecting to its game service SIMULTANEOUSLY using Windows Server 2003.

PING: Manages 400 end + servers & desktops for users via Windows Server 2003 Active Directory (& saved 40% less time vs. their old setup on Linux) from a single location.

TDC: Communications leader that is in 12 nations, using Windows Server 2003 to analyze data from 70 disparate (different) systems worldwide centralizing the data + analysis in SQLServer 2005.

GAMEWORKS: A high-tech gaming & restaurant chain, reduced helpdesk costs by 50% using Windows Server 2003 & AD Networks + Group Policies.

SHOP DIRECT: Shop Direct, operating under a number of brands including Littlewoods, Very, Woolworths, Marshall Ward, Kays and Great Universal, employs no less than 10,000 workers, 10% of whom work remotely. In addition, the Group also intends to migrate no less than 350 servers from Windows Server 2003 to Windows Server 2008 R2. The combination of Windows 7 and Windows Server 2008 R2 facilitates scenarios in which remote workers are no longer relying on Virtual Private Networks, but instead use the evolved DirectAccess technology. Another advantage of using Windows 7 Enterprise and ultimate is that the operating systems include BitLocker and BitLocker To Go encryption by default, which serves to protect the sensitive data of employees working remotely.

KBR/Kellogg Brown & Root: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.KBR.com [netcraft.com]

MICROSOFT THEMSELVES: The "shoe maker wears his own shoes" a sure mark of quality -> http://uptime.netcraft.com/up/graph?site=microsoft.com [netcraft.com]

---

37++ MORE FORTUNE 100 COMPANIES RUNNING WINDOWS (OVER OTHER SOLUTIONS LIKE LINUX-UNIX etc./et al), from -> http://money.cnn.com/magazines/fortune/fortune500/2010/full_list/ [cnn.com]

---

TRAVELERS INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.travelers.com [netcraft.com]

PHILIPP MORRIS: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.pmi.com [netcraft.com]

ENTERPRISE HOLDINGS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.enterpriseholdings.com [netcraft.com]

TYSON FOODS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tyson.com [netcraft.com]

HESS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hess.com [netcraft.com]

SUNOCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sunocoinc.com [netcraft.com]

HONEYWELL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=honeywell.com [netcraft.com]

HUMANA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.humana.com [netcraft.com]

GENERAL DYNAMICS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=generaldynamics.com [netcraft.com]

STATE FARM INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.statefarm.com [netcraft.com]

COMCAST: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.comcast.com [netcraft.com]

DISNEY: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=disney.go.com [netcraft.com]

SYSCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sysco.com [netcraft.com]

KRAFT FOODS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kraftfoodscompany.com [netcraft.com]

PEPSI: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pepsico.com [netcraft.com]

INTERNATIONAL HOLDINGS CORP.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=intlfcstone.com [netcraft.com]

DOW CHEMICAL: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.dow.com [netcraft.com]

MARATHON OIL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.marathon.com [netcraft.com]

UNITED TECHNOLOGIES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utc.com [netcraft.com]

WELLPOINT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wellpoint.com [netcraft.com]

COSTCO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.costco.com [netcraft.com]

BRISTOL MYERS SQUIBB: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bms.com [netcraft.com]

AMERISOURCE-BERGEN: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.amerisourcebergen.com [netcraft.com]

KROGER: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.kroger.com [netcraft.com]

UNITED HEALTH GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unitedhealthgroup.com [netcraft.com]

MCKESSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.mckesson.com [netcraft.com]

BERKSHIRE HATHAWAY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.berkshirehathaway.com [netcraft.com]

CONOCO-PHILLIPS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.conocophillips.com [netcraft.com]

CHEVRON: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.chevron.com [netcraft.com]

EXXON-MOBIL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.exxonmobil.com [netcraft.com]

PLAINS ALL-AMERICAN PIPELINE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=paalp.com [netcraft.com]

INTL FCStone Inc.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=intlfcstone.com [netcraft.com]

WELLPOINT: Runs their domain on IIS7 -> http://uptime.netcraft.com/up/graph?site=www.wellpoint.com [netcraft.com]

CHRYSLER: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.chryslergroupllc.com [netcraft.com]

CHINA NATIONAL PETROLEUM: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cnpc.com.cn [netcraft.com]

ENEL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.enel.com [netcraft.com]

DOW JONES: Runs their domain on IIS (oddest mix I ever saw) -> http://uptime.netcraft.com/up/graph?site=www.dowjones.com [netcraft.com]

---

(2006 BEST COMPANIES TO WORK FOR/TOP 100 FORTUNE 100-500 COMPANIES TO WORK FOR -> http://money.cnn.com/magazines/fortune/bestcompanies/full_list/ [cnn.com]

64++ 2011 BEST COMPANIES TO WORK FOR/TOP 100 FORTUNE 100-500 COMPANIES TO WORK FOR -> http://money.cnn.com/magazines/fortune/bestcompanies/2011/full_list/ [cnn.com] )

"TOP 30 MEMBERS USING WINDOWS FROM BOTH 2006 & 2011 TOP 100 COMPANIES TO WORK FOR:"

---

VALERO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=valero.com [netcraft.com]

GRIFFIN HOSPITAL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=griffinhealth.org [netcraft.com]

VISION SERVICE PLAN/VSP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=vsp.com [netcraft.com]

J.L. SMUCKER: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=smucker.com [netcraft.com]

S.C. JOHNSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scjohnson.com [netcraft.com]

BOSTON CONSULTING GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=bcg.com [netcraft.com]

PLANTE & MORAN: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=plantemoran.com [netcraft.com]

HOMEBANC MORTGAGE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=homebanc.com [netcraft.com]

REPUBLIC BANCORP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=republicbancorp.com [netcraft.com]

BAPTIST HEALTHCARE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=ebaptisthealthcare.org [netcraft.com]

ALSTON & BIRD: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alston.com [netcraft.com]

KIMLEY-HORN & ASSOCIATES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=kimley-horn.com [netcraft.com]

---

(OVER 1/2 of the TOP 30 (12 of 20 of the 2006 &/or 2011 pack) are using Windows & QUALCOMM #23 + STARBUCKS #29 exist already above using Windows in capacities besides running their websites!)

---

QUIKTRIP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=quiktrip.com [netcraft.com]

DAVID WEEKELY HOMES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=davidweekleyhomes.com [netcraft.com]

ROBERT W. BAIRD: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=rwbaird.com [netcraft.com]

ALCON LABS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alconlabs.com [netcraft.com]

AMERICAN FIDELITY INSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=afadvantage.com [netcraft.com]

TDINDUSTRIES: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=tdindustries.com [netcraft.com]

MARRIOTT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=marriot.com [netcraft.com]

CAMDEN PROPERTY TRUST: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=camdenliving.com [netcraft.com]

SCOTTRADE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scottrade.com [netcraft.com]

JM FAMILY ENTERPRISES: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=jmfamily.com [netcraft.com]

STEW LEONARDS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=stewleonards.com [netcraft.com]

METHODIST HEALTH: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=methodisthealth.com [netcraft.com]

DPR CONSTRUCTION: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=dpr.com [netcraft.com]

UMPQUA BANK: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=umpquabank.com [netcraft.com]

BINGHAM LOANS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=bingham.com [netcraft.com]

NUSTAR ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=nustarenergy.com [netcraft.com]

PAST TOP 30, into the 30-100 range now (of the "top 100 fortune 100 companies to work for" from CNN Money)

CHESAPEAKE ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=chk.com [netcraft.com]

SOUTHERN OHIO MEDICAL CENTER: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.somc.org [netcraft.com]

PCL CONSTRUCTION: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.pcl.com [netcraft.com]

AMERICAN FIDELITY ASSURANCE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.afadvantage.com [netcraft.com]

BALFOUR BEATTY CONSTRUCTION: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.balfourbeattyus.com [netcraft.com]

DEVON ENERGY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.devonenergy.com [netcraft.com]

BAPTIST HEALTH S. FLORIDA: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.baptisthealth.net [netcraft.com]

SHARED TECHNOLOGIES: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.sharedtechnologies.com [netcraft.com]

JOHNSON FINANCIAL GROUP: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.johnsonbank.com [netcraft.com]

NOVO NORDISK: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.novonordisk-us.com [netcraft.com]

BAKER DONELSON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bakerdonelson.com [netcraft.com]

PERKINS COLE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.perkinscoie.com [netcraft.com]

MILLENIUM/TAKEDA ONCOLOGY CO.: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.millennium.com [netcraft.com]

AFLAC: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.aflac.com [netcraft.com]

CHILDREN'S HEALTHCARE OF ATLANTA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.choa.org [netcraft.com]

OHIOHEALTH: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.ohiohealth.com [netcraft.com]

EOG Resources: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.eogresources.com [netcraft.com]

PUBLIX GROCERY: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.publix.com [netcraft.com]

ARKANSAS CHILDREN'S HOSPITAL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.archildrens.org [netcraft.com]

GILBANE: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.gilbaneco.com [netcraft.com]

ERNST & YOUNG: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ey.com [netcraft.com]

SRCTech: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.srcinc.com [netcraft.com]

CARMAX: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.carmax.com [netcraft.com]

KIMPTON HOTELS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kimptonhotels.com [netcraft.com]

BRIGHT HORIZONS: Runs their domain on Windows/IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.brighthorizons.com [netcraft.com]

KPMG: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.us.kpmg.com [netcraft.com]

MERIDIAN HEALTH: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.meridianhealth.com [netcraft.com]

CH2M HILL: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ch2mhill.com [netcraft.com]

EVERETT CLINIC: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.everettclinic.com [netcraft.com]

MORNINGSTAR: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=corporate.morningstar.com [netcraft.com]

DARDEN RESTAURANTS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.darden.com [netcraft.com]

CERN: Runs their website on Windows -> http://uptime.netcraft.com/up/graph?site=www.cern.ch [netcraft.com]

GOULDS PUMPS: (former Fortune 500 I worked for) Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.gouldspumps.com [netcraft.com]

AXA FINANCIAL: (former company I worked for) Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.axa.com [netcraft.com]

---

20++ UNITED STATES GOVERNMENT - STATES USING WINDOWS:

---

STATE OF CALIFORNIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ca.gov [netcraft.com]

STATE OF PENNSYLVANIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pa.gov [netcraft.com]

STATE OF TEXAS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.texas.gov [netcraft.com]

STATE OF CONNECTICUT: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ct.gov [netcraft.com]

STATE OF ALASKA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.alaska.gov [netcraft.com]

STATE OF FLORIDA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.florida.gov [netcraft.com]

STATE OF ILLINOIS: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.illinois.gov [netcraft.com]

STATE OF KENTUCKY: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.kentucky.gov [netcraft.com]

STATE OF MARYLAND: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.maryland.gov [netcraft.com]

STATE OF MONTANA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.montana.gov [netcraft.com]

STATE OF NEVADA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.nevada.gov [netcraft.com]

STATE OF NEW MEXICO: Runs their domain on Windows/IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.newmexico.gov [netcraft.com]

STATE OF NORTH CAROLINA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ncgov.com [netcraft.com]

STATE OF SOUTH CAROLINA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sc.gov [netcraft.com]

STATE OF OHIO: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ohio.gov [netcraft.com]

STATE OF SOUTH DAKOTA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sd.gov [netcraft.com]

STATE OF WASHINGTON: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=washington.gov [netcraft.com]

STATE OF WEST VIRGINIA: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wv.gov [netcraft.com]

STATE OF WISCONSIN: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wisconsin.gov [netcraft.com]

STATE OF WYOMING: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wyoming.gov [netcraft.com]

---

90++ TOP RANKED UNIVERSITIES USING Windows (from -> http://colleges.usnews.rankingsandreviews.com/best-colleges/rankings/national-universities/ [rankingsandreviews.com] )

---

Baylor University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.baylor.edu [netcraft.com]

Texas Tech University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ttu.edu [netcraft.com]

Temple University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.temple.edu [netcraft.com]

Drexel University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=drexel.edu [netcraft.com]

Pace University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pace.edu [netcraft.com]

Southern Methodist University (SMU): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.smu.edu [netcraft.com]

Colorado State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.colostate.edu [netcraft.com]

Washington University in St. Louis: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wustl.edu [netcraft.com]

Hofstra University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hofstra.edu [netcraft.com]

DePaul University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.depaul.edu [netcraft.com]

Texas A&M University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tamuk.edu [netcraft.com]

Clarkson University: -> http://uptime.netcraft.com/up/graph?site=www.clarkson.edu [netcraft.com]

Fordham University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.fordham.edu [netcraft.com]

Texas Christian University (TCU): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tcu.edu [netcraft.com]

Florida A&M University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.famu.edu [netcraft.com]

St.John Fisher University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sjfc.edu [netcraft.com]

St.John's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stjohns.edu [netcraft.com]

Kent State University of Ohio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kent.edu [netcraft.com]

Ball State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=cms.bsu.edu [netcraft.com]

Jackson State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.jsums.edu [netcraft.com]

North Dakota State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ndus.edu [netcraft.com]

South Carolina State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=scsu.edu [netcraft.com]

Northern Illinois University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.niu.edu [netcraft.com]

South Dakota State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=sdstate.edu [netcraft.com]

Michigan University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cmich.edu [netcraft.com]

Indiana State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.indstate.edu [netcraft.com]

Indiana University of Pennsylvania: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.iup.edu [netcraft.com]

Texas Southern University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tsu.edu [netcraft.com]

Northern Arizona University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=nau.edu [netcraft.com]

Tennessee State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tnstate.edu [netcraft.com]

East Tennessee State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.etsu.edu [netcraft.com]

Oakland University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.oakland.edu [netcraft.com]

SUNY College of Environmental Science and Forestry: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.esf.edu [netcraft.com]

University of Southern California (USC): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usc.edu [netcraft.com]

University of Pittsburg (Pitt): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=pitt.edu [netcraft.com]

University of California (UCLA): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ucsc.edu [netcraft.com]

University of Massachusetts (UMASS): Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=uml.edu [netcraft.com]

University of Texas @ El Paso: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utep.edu [netcraft.com]

University of Texas @ San Antonio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utsa.edu [netcraft.com]

University of Tulsa: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utulsa.edu [netcraft.com]

University of Ohio: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ohio.edu [netcraft.com]

University of North Carolina @ Charlotte: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uncc.edu [netcraft.com]

University of Colorado @ Denver: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ucdenver.edu [netcraft.com]

University of Wyoming: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uwyo.edu [netcraft.com]

University of Cincinnati: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uc.edu [netcraft.com]

University of South Florida: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usf.edu [netcraft.com]

University of Nevada @ Reno: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unr.edu [netcraft.com]

University of Idaho: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uidaho.edu [netcraft.com]

University of Missouri - Kansas City: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.umkc.edu [netcraft.com]

University of Montana: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.umt.edu [netcraft.com]

University of New Orleans: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.uno.edu [netcraft.com]

University of Northern Colorado: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.unco.edu [netcraft.com]

University of Toledo: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.utoledo.edu [netcraft.com]

University of the Pacific: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pacific.edu [netcraft.com]

University of St. Thomas: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stthomas.edu [netcraft.com]

University of San Francisco: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.usfca.edu [netcraft.com]

Colorado Tech University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.coloradotech.edu [netcraft.com]

Wichita State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.wichita.edu [netcraft.com]

Wilmington University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=wilmu.edu [netcraft.com]

Widener University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.widener.edu [netcraft.com]

Catholic University of America: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cua.edu [netcraft.com]

Clark University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.clarku.edu [netcraft.com]

Lynn University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.lynn.edu [netcraft.com]

Morgan State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.morgan.edu [netcraft.com]

Spalding University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=spalding.edu [netcraft.com]

Biola University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.biola.edu [netcraft.com]

Edgewood College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=edgewood.edu [netcraft.com]

Immaculata University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.immaculata.edu [netcraft.com]

American University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.american.edu [netcraft.com]

Pepperdine University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.pepperdine.edu [netcraft.com]

Barry University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.barry.edu [netcraft.com]

Benedictine University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ben.edu [netcraft.com]

Cardinal Stritch University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.stritch.edu [netcraft.com]

Bowie State University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.bowiestate.edu [netcraft.com]

Texas Women's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=twu.edu [netcraft.com]

Our Lady of the Lake University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ollusa.edu [netcraft.com]

Clark Atlanta University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.cau.edu [netcraft.com]

Trinity International University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.tiu.edu [netcraft.com]

Trevecca University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.trevecca.edu [netcraft.com]

Alliant International University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.alliant.edu [netcraft.com]

California Institute of Integral Studies: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ciis.edu [netcraft.com]

Capella University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.capella.edu [netcraft.com]

National-Louis University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.nl.edu [netcraft.com]

North Central University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.ncu.edu [netcraft.com]

Trident University International: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.trident.edu [netcraft.com]

Union Institute and University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.myunion.edu [netcraft.com]

Walden University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.waldenu.edu [netcraft.com]

New School NYU: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.newschool.edu [netcraft.com]

Yeshiva University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.yu.edu [netcraft.com]

(90 of the 200 "top 50" run Windows for their domain)

---

TOP 50/200++ RANKED NORTHERN REGIONAL UNIVERSITIES USING Windows (from -> http://colleges.usnews.rankingsandreviews.com/best-colleges/rankings/regional-colleges-north [rankingsandreviews.com] )

---

LeMoyne College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.lemoyne.edu [netcraft.com]

Loyola University Maryland: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.loyola.edu [netcraft.com]

Providence College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.providence.edu [netcraft.com]

Alfred University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=alfred.edu [netcraft.com]

Canisius College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.canisius.edu [netcraft.com]

Bentley University: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.bentley.edu [netcraft.com]

Scranton University: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.scranton.edu [netcraft.com]

Quinnipiac University: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.quinnipiac.edu [netcraft.com]

Emerson College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.emerson.edu [netcraft.com]

Mount St. Mary's University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.msmary.edu [netcraft.com]

Hood College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.hood.edu [netcraft.com]

Nazareth College: Runs their domain on IIS (mix) -> http://uptime.netcraft.com/up/graph?site=www.naz.edu [netcraft.com]

Iona College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.iona.edu [netcraft.com]

SUNY - New Paltz: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.newpaltz.edu [netcraft.com]

Notre Dame of Maryland University: Runs their domain on Windows (mix) -> http://uptime.netcraft.com/up/graph?site=www.ndm.edu [netcraft.com]

St. Bonaventure University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sbu.edu [netcraft.com]

Arcadia University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.arcadia.edu [netcraft.com]

Assumption College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.assumption.edu [netcraft.com]

Salve Regina University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.salve.edu [netcraft.com]

College of St. Rose: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.strose.edu [netcraft.com]

Kings College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.kings.edu [netcraft.com]

Monmouth College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.monmouth.edu [netcraft.com]

Sacred Heart University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.sacredheart.edu [netcraft.com]

Salisbury University: Runs their domain on IIS -> http://uptime.netcraft.com/up/graph?site=www.salisbury.edu [netcraft.com]

SUNY College - Oneonta: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.oneonta.edu [netcraft.com]

Manhattanville College: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.mville.edu [netcraft.com]

Roger Williams University: Runs their domain on Windows -> http://uptime.netcraft.com/up/graph?site=www.rwu.edu [netcraft.com]

Saint Francis University: Runs their domain on Windows -&

apk wins again (0)

Anonymous Coward | more than 2 years ago | (#39550087)

By reducing his naysayers to downmod w/ no technical justifications or disproving facts he posts.

Re:If Windows != "a REAL OS" then... (1)

Nikker (749551) | more than 2 years ago | (#39556107)

Successful troll is successful.

Re:If Windows != "a REAL OS" then... (0)

Anonymous Coward | more than 2 years ago | (#39560253)

Wasn't a "troll" from me: It was just imparting the truth - that Windows is a "real operating system", with proofs.

APK

P.S.=> With a truckload of data to support it from the Fortune 100/500, top-notch educational institutions, best companies to work for etc./et al... apk

Re:If Windows != "a REAL OS" then... (1)

Nikker (749551) | more than 2 years ago | (#39561943)

Sorry let me rephrase that.

You were successfully trolled.

Vs. this link? LMAO, "NOT"... apk (0)

Anonymous Coward | more than 2 years ago | (#39562237)

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547461 [slashdot.org]

APK

P.S.=> It truly "boggles the mind" there are jackasses floating around the web that attempt to deny known facts, but worse, that waste time 'trolling' (harassing) others... trolls like yourself, obviously! Grow up, do something useful with your life instead... apk

Re:Vs. this link? LMAO, "NOT"... apk (1)

Nikker (749551) | more than 2 years ago | (#39562521)

*Drops baited hook in water, makes popcorn, sits back, enjoys show.
BTW. Copy pasta is great! Needs a little salt

Re:Two deadly vectors of infection... (2)

mspohr (589790) | more than 2 years ago | (#39544383)

So why does this only infect Windows? Are Linux and Mac users smarter? Are all Facebook users incredibly stupid? Do only Linux and Mac users realize that it's stupid to type in your password for some random software? Are only Windows users smart enough to remember their administrator passwords? Does god hate Windows? Do the people who write trojans hold a particularly low opinion of Windows users? Are they trying to educate Windows users? Is that possible? I know a few Windows users and they don't seem that stupid. Some of my best friends use Windows but they don't have a clue about this "administrator" stuff. Should we try to explain it to them our just charge them money to clean up their computers? I think that after that whole thing with the Greeks and Trojans that people should be on to them by now... I mean its been like thousands of years. I really don't want to believe that Windows users are stupid, I'd rather blame Microsoft. Mac and Linux don't seem to have these problems with Greeks and Trojans and stupid users...

Re:Two deadly vectors of infection... (1)

grcumb (781340) | more than 2 years ago | (#39545119)

I have mod points, but tragically there's no +1 troll option.

Re:Two deadly vectors of infection... (1)

mspohr (589790) | more than 2 years ago | (#39545395)

You could try "+1 Funny".

Re:Two deadly vectors of infection... (1)

grcumb (781340) | more than 2 years ago | (#39546045)

You could try "+1 Funny".

I could, but I was trying for a "+1 Funny" myself.

Re:Two deadly vectors of infection... (1)

dkf (304284) | more than 2 years ago | (#39546969)

So why does this only infect Windows? Are Linux and Mac users smarter?

I suspect that there are a few reasons for targeting Windows.

  1. Low-intelligence users (who also tend to have reduced spending power) gravitate to cheap available pre-built hardware running the default OS. That points to Windows.
  2. Windows was historically bad at security, so blackhats gained a lot of experience there. This has got to be a major factor and it can't be helped now.
  3. Windows is much better at security now, but Microsoft hasn't quite got the usability of security right. There are just a few too many security-related confirmation dialogs popping up that users are still not quite careful enough about it.

Overall, it's a bunch of small stuff and things that just happend that way that adds up in combination to a problem.

Are all Facebook users incredibly stupid?

There are lots of Facebook users due to their (FB's) extensive market penetration; enough of the users are incredibly stupid (or at least duped by automated "social" tricks) to make it worthwhile targeting them.

Look, the real problem is that some people are incredibly stupid. For as long as that's true, there will be criminal scum who try to make a living by duping them. It's been happening for thousands of years (there must've been confidence tricksters in ancient Sumeria) and the use of computers and the internet is just the latest manifestation. Since you can't fix stupid (except by removing all the warning labels from things) we're stuck with running after the criminals to stop them.

Re:Two deadly vectors of infection... (1)

Tom (822) | more than 2 years ago | (#39547293)

As a previous poster pointed out, trojans care not if it's Windows, Linux, Mac OSX or BSD because the user is the weak link, not the OS.

True in theory.

Real life begs to differ, though. Geeks regularily forget about real life. In your head, your password policy grants your users great passwords at a theoretical complexity of 10^18. In real life, the actual complexity is closer to 10^7 due to patterns.

Same with the trojans and other malware. Yes, theoretically some classes of malware could be just as easily targeted on OS X or Linux. In reality, though, OS X has about 15% market share and less than 1% virus share, while Linux has 5% market share and much less than 1% virus share.

Speculations about whether that's for reasons of technology, psychology or ROI may be interesting, but the simple facts are that the number of known malwares for all non-windows OSes combined doesn't even register as a rounding error in the count of windows malware, and does not even remotely resemble the respective market shares.

Re:Two deadly vectors of infection... (0)

Anonymous Coward | more than 2 years ago | (#39548741)

You "anything" link doesn't work ! I have clicked it like 10 times, and nothing happens !

is facebook the new preferred target for attacks? (1)

Anonymous Coward | more than 2 years ago | (#39544391)

seems prime for that.. with the average smart user there having the i.q. of a 90s aol'er.

Re:is facebook the new preferred target for attack (0)

Anonymous Coward | more than 2 years ago | (#39544675)

Facebook users are needy narcissists. They think that if they don't accept/aggree to anything that is offered to them that they won't be liked.

Anonymous (3, Funny)

Anonymous Coward | more than 2 years ago | (#39544721)

We all knew Anonymous would strike again. Why aren't the authorities doing something about these criminals?

Maybe what we need to do is make it so that nobody can access the internet without supplying a sample of their DNA. And then make it so that all communications from the user to the internet are logged in an extremely verbose manner, and have a system of spy networks at the ready to detect subversive behavior. The governments could intentionally put things like porn or questionable books like Fahrenheit 451, 1984, or The Diary of Anne Frank on the internet and then arrest civilians when they try to access them.

I wish I were in a position of power where I could institute a program like that in the United States of America. For too long we have strayed from the Lord's Path, and we need a true leader to bring this country back in the right direction.

Source - Seculert Blog (0)

Anonymous Coward | more than 2 years ago | (#39547471)

And once again the astroturfing M$ shills are high (0, Interesting)

Anonymous Coward | more than 2 years ago | (#39548823)

Pro-Microsoft 7 digits IDs who have infested /. are playing apologists once again.

Geez astroturfing shills give us a break: stop feeling so insecure about your insecure Windows. We (desktop Linux users) do not even represent 2% of the desktop market. We're not going to conquer anytime soon your (stupid) user base.

It has been mentioned that the big variety of Linux kernels / distros / browsers was making life much harder to some would be bot-author that would dream of writing a Linux bot.

Then there's also the documented fact that any remote user exploit on any Windows system means remote admin rights (what was the last super SNAFU for MS: any "remote desktop enabled" Windows could be "root'ed" right!? I know, I know, the term "rooting" comes from "root" from the Un*x world, so if the term comes from the Un*x world it means Un*x system are more vulnerable no?!).

The logic and arguments of these M$ shills is saddening.

Thankfully they're fighting the wrong battle: we're moving away from the desktop apps to the browsers apps and they're totally missing that.

They keep hanging to their last delusion: that the desktop will continue to matter.

Good luck M$ shills: you're not fighting desktop Linux or OS X. You're fighting Android and iOS and you're in for a reality check.

Ok, a challenge then... apk (0)

Anonymous Coward | more than 2 years ago | (#39549091)

You're MORE THAN WELCOME to disprove my points in these posts then (which have clearly 'silenced' the "Pro-*NIX people" easily - OR, reduced them to name tossing profanity laden illogical off-topic ad hominem failing attacks directed MY way (the sure sign of "penguin defeat", lol, every damn time)):

http://it.slashdot.org/comments.pl?sid=2759981&cid=39545701 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39545731 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547699 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547783 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39544293 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547817 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547885 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39544375 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39547461 [slashdot.org]

http://it.slashdot.org/comments.pl?sid=2759981&cid=39544093 [slashdot.org]

APK

P.S.=> The "classic" today was watching my 'naysayers' be reduced to illogical off-topic ad hominem attacks directed my way, that failed in the light of facts I posted vs. them:

http://it.slashdot.org/comments.pl?sid=2759981&cid=39548919 [slashdot.org]

and

http://it.slashdot.org/comments.pl?sid=2759981&cid=39548949 [slashdot.org]

Go for it, & good luck - you'll NEED it! apk

Re:And once again the astroturfing M$ shills are h (0)

Anonymous Coward | more than 2 years ago | (#39549233)

FFS, give it a rest with the "MS Shills" bullshit.

Read the first +5 Insightful post in this thread. It's a trojan horse, not a virus that infects a machine via an exploitable hole, but something that purports to be something else to the user, and then the *user* elects to install said trojan. This has absolutely *nothing* to do with the underlying OS and has absolutely *everything* to do with the end-users gullibility.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?