German Parliament May Need To Replace All Hardware and Software To Stop Malware 189
jfruh writes: Trojan spyware has been running on computers in the German parliament for over four weeks, sending data to an unknown destination; and despite best efforts, nobody's been able to remove it. The German government is seriously considering replacing all hardware and software to get rid of it. From the ITWorld article: "After the attack, part of the parliament’s traffic was routed over the federal government’s more secure data network by the Federal Office For Information Security, Der Spiegel reported. Some Germans suspect that the Russian foreign intelligence service SVR is behind the attack. On Thursday, the parliament will discuss how to address the situation."
Sure (Score:5, Insightful)
Re:Sure (Score:5, Insightful)
Seems they should track down the source of any possible hardware infections before replacing all hardware. A) So they can better understand the threat and how it was perpetrated. And B) So they can, as you say, make sure they don't reinfect themselves.
It is hard enough to purge a single computer of tenacious malware, let alone an entire network!!
Re: (Score:3, Interesting)
Given that it is possible implant spyware into the BIOS, the firmware of graphics boards and micro-controllers of hard disk drives, replacing hardware is the only solution.
Re: (Score:3)
or, you virtualize it??
not sure if that's better or worse. maybe its just sideways. sometimes, that can be good enough, though!
How do they know it's the Russians, not NSA?? (Score:2)
or, you virtualize it??
Talk about virtualization ...
Who was the one tapping into Angela Merkel's phone?
NSA or the Russians?
Since they can't even get rid of the thing how in the world they know that thing came from Russia, not NSA?
I always thought the Germans are equipped with critical thinking skill, apparently I couldn't be more wrong
Re: (Score:2)
Re: (Score:2)
We have always been at war with Eastasia
FTFY
Re: (Score:2)
Just replacing hardware is useless. It will just get re-infected (if it was infected in the first place...). You need to isolate and understand the malware first.
Re: (Score:3)
Likely they do and they a pretty furious about it but for reasons of diplomacy they are saying nothing. They are making the issue quite public in a passive aggressive way to inform those responsible how much it will all cost and letting them know there will be repercussions. Problem with NSA back doors, once the show up in traffic other players can trace them back in, find and exploit the hole in security. Especially once the discover it in their own equipment and say nothing but seek to make use of it whe
Re: (Score:2)
While I actually doubt they understand it (the German BSI doing the analysis is not that competent with regards to technology and they are certainly not fast), I think you may be on to something with regards to what they are making public. Obviously, they are pissed, and they may be trying to tell everybody something along the lines "do this again, and forget any treaties or cooperation from us".
Currently, they are saying it was eastern European, but they may be making that up. After all, the NSA will have
Re: (Score:2)
Likely they have caught Russia and China listening in but they know they did not create the holes in the first place (so unauthorised traffic going all over the place). So you can imagine how frustrated they are right now, made to look stupid and incompetent by a so called ally. So the whole passive aggressive reaction of claiming they have to scrap the entire system and start again because that ally refuses to come clean and tell them about all the holes they created and how they were created and how to r
Re: (Score:2)
Re: (Score:2)
Yes, but which hardware/software!?!
You need to figure that out first. Not only so you don't needlessly replace certain hardware, but also so you understand the source of the infection.
You could replace every piece of hardware and get reinfected from a restored data file!!!!
Re: (Score:2)
Re:Sure (Score:5, Insightful)
They need to look at their network's topology as well. One compromised network segment shouldn't allow an attacker complete and unfettered access to everything else.
WAN-wise, they should look at building something like SIPRNet or NIPRNet so as little traffic as possible is on the Internet, even flying over a VPN. The ideal is physically separate cables and leased lines, coupled with some form of IPSec so that it would be very difficult for someone to set up a rogue machine and attack that network. Long term, it might be wise to even consider a different protocol than IP just because it would make hidden routers or bridges a lot more difficult.
There are other tools that come to mind. App-V and Citrix for example, which would allow people to access and use an application, but not physically copy the data or access the OS directly on the application servers. Not a 100% solution, but it is a way to keep things separated.
Reversing this concept, there might be offices that need to have no machines on the Internet, but workers can use App-V, RDP, or Citrix to access a terminal server so they can browse the web on a virtual desktop that cannot access the physical internal machines.
There are a lot of security tools that are usable. VDI comes to mind as an extension to virtualization. Virtualization goes without saying because it separates what programs run on from the hardware, so if a VM is compromised, there is still a hypervisor to punch through before hardware can be re-flashed and attacked.
The trick is defense in depth, be it at the desktop level (for machines that are terminals used by numerous people, a utility like DeepFreeze is useful), at the network topo level (so a compromise in Receiving doesn't trash Finance), at the network appliance level, the server level, and of course, the HUMINT factor with policies, and physical security.
Re: (Score:2)
Reversing this concept, there might be offices that need to have no machines on the Internet, but workers can use App-V, RDP, or Citrix to access a terminal server so they can browse the web on a virtual desktop that cannot access the physical internal machines.
Why not just run "Internet" on a program on the local machine that can't access anything on the local machine? Sure, in your way, they'd be more secure because nobody would write a generic virus for a customer Citrix over Appletalk application that connects to a terminal server that gets the Internet.
Re: (Score:2)
Why not just run "Internet" on a program on the local machine that can't access anything on the local machine?
Isn't that how a browser is supposed to work?
Re: (Score:2)
Sandboxes are so 1998. Just ask Adobe and Java.
Re: (Score:2)
Re: (Score:2)
If you need security and your local LAN network topology doesn't make one of your firewalls look like a ethernet switch, you are not doing it right. The days of a 3 zone Trust, DMZ, Untrust firewall model are long gone.
For $5k I can buy a 34 port firewall. I've been using netscreen ^w Juniper SSG-140 with a bunch of 8 port ethernet cards with most things on their own zone. Too bad it looks like that line will soon be EOL and I haven't found anything to replace it at the right price point.
Re: (Score:2, Insightful)
I think you misunderstood. There is no hardware infection, they're just having problems getting their machines (a certain software, created by Microsoft) under control so they're just throwing everything out and starting from scratch. They could also go along each machine with a Linux disk and wipe the thing.
Re: (Score:2)
Re: (Score:2)
I think you misunderstood. There is no hardware infection, they're just having problems getting their machines (a certain software, created by Microsoft) under control so they're just throwing everything out and starting from scratch. They could also go along each machine with a Linux disk and wipe the thing.
Somebody probably figured out the cost of sending people around to each machine with a Linux disk versus an updated hardware refresh that is probably already on the budget anyway, and decided it will be cheaper to do the hardware refresh early rather than clean the computers, and then do the hardware refresh a few months later.
Re: (Score:2)
Seems they should track down the source of any possible hardware infections before replacing all hardware.
"No! Shut them *all* down, hurry! Listen to them, they're dying R2! Curse my metal body, I wasn't fast enough, it's all my fault!"
Re: (Score:2)
They'll replace everything, then one person will plug in their phone over USB to put some emails on their new workstation and it'll begin all over again.
Or a USB key!
Re: (Score:2)
That they found on the ground in the parking lot.
"I wonder what is on this?" - Famous last words.
Re: (Score:3)
Indeed. It also seems that some people are unwilling to let experts look at their computers. No surprise this is not stopping.
It should also be noted that Germany is one of the countries where arrogance has long since replaced actual skill on government level.
Re: (Score:2)
Government: "where arrogance replaces actual skill"
Re: (Score:2)
If BND officials knew about this and said nothing, then that would be treason. You know, the kind that used to get you shot and now gets you a decade behind bars, even in Germany. I doubt they knew. They might have been complicit in industrial espionage of the NSA though (which also is treason). They are trying to not hand over the evidence, but they have admitted to having it, so they cannot just delete it. And at this time, this is still only political, although the courts are getting involved now.
One thi
Re: (Score:2)
Speaking of nukes, I wonder how many betrayals Germany needs to decide it has to re-arm and acquire its own arsenal since it obviously can't rely on the US anymore? Because it seems the NSA wonders too, and is determined to find out.
Parliament will discuss this? (Score:5, Insightful)
Re:Parliament will discuss this? (Score:5, Funny)
They'll probably outlaw trojans infecting government PCs and that solves the issue.
Re: (Score:2)
Yeah, but...
Re: (Score:2)
There should be a law.....
Isn't it funny that politicians actually do think like this, or at least act like they do? "Hey I helped pass a law that made it illegal for children to starve! I CARE about children!" No one seems to mind that all the law does is issue tickets and assess fines for children who choose to starve....
Re: (Score:3)
What they forget is that there is one important difference between politicians and engineers: Laws engineers come up with CANNOT be broken.
Re: (Score:2)
Re: (Score:2)
Here's the gravity laws. Good luck breaking them, but I'm not responsible for any injury!
Re: (Score:3)
Naw. REAL engineers knows that anything can be broken. Same for politicians and lawyers.
Support real people.
Well... I'm an engineer and I don't agree. You won't be breaking the 2nd law of thermodynamics any time soon... However...
That's not to say laws often cannot be OVERCOME by the application of effort, time and money in sufficient quantities.
For instance, the law of gravity says that things fall down.... But if you try hard enough and apply enough resources, you can overcome that and build an airplane... Or launch something into deep space, never to return...
Re: (Score:2)
For instance, the law of gravity says that things fall down
Oh please.
I'm an engineer
A "software engineer" by any chance?
Re: (Score:2)
For instance, the law of gravity says that things fall down
Oh please.
I'm an engineer
A "software engineer" by any chance?
Electrical Engineer by degree and professional experience, Software engineer by majority of professional experience but I have dabbled in mechanical engineering, systems engineering and more at work. Don't get me started on my hobbies....
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
The German folks I know call them "Abgeordneten".
Re: (Score:2)
The average MP in Germany is a lawyer or maybe a teacher. They do not know squat about anything concerning the real world. They also suck at being lawyers or teachers, otherwise they would not have switched careers.
Russia (Score:2, Funny)
Infecting HD BIOS, other flash? (Score:2)
Some of the things that might b
Re: (Score:2)
Well darn.. I guess they will just have to replace the whole country then...
Seriously, it may be hard to find, but SURELY there is somebody who has enough knowledge and skill to do it, no matter who is responsible or what's involved...
Re:Infecting HD BIOS, other flash? (Score:4, Interesting)
Absolutely there are people who could find all of it, and it may be possible to build or find a combination of tools to address all of the possible hiding spots they're able to think of. The problem is that those skilled people don't scale. As for the tool suite, while someone's attempting to assemble it, someone else is working hard at evading what's going into the suite - and even if they do put something effective together fast, how much confidence will there be that it actually got everything? It's like running a hastily cobbled together antivirus package on an already-infected system.
XKCD 1425 [xkcd.com] is actually somewhat relevant here in that a cleaning solution is that research team project, but Germany doesn't have the time to wait for it - better to EOL some equipment 2-5 years early and replace it than to wait for a solution that won't be available until have of that equipment would be EOL anyway.
And frankly, it's like something I tell my customers probably too often for my wallet's good: "I can fix it and I'd love to have you pay me to do so, but it's not worth you paying for my time to do so when we can replace it for around the same cost."
Re:Infecting HD BIOS, other flash? (Score:4, Insightful)
Maybe this is the best approach, but I'd be wary about just launching a wholesale "replace it all" approach unless I knew a couple of things first.
1. What the problem was, exactly, and where did it come from in general...
2. How it spreads around...
3. That the thing is contained...
Further, before I go and start ripping out stuff to replace it, I'd want to be 100% sure that the problem will NOT infect the new hardware and systems. So when someone starts saying we have to replace stuff to get rid of this problem that's infected it, I start to get dubious.. But if like you, they say something along the lines of "Well, we could remove it from your current equipment for X and it would take us y time, or we could just replace the old infected equipment with new for less. We suggest you just replace the old stuff, it's cheaper/faster/better."
Re: (Score:2)
They know the current system is infected, that they can't clean it (because they can still see signs of the active infection), and that effectively they're reduced to paper or ad hoc replacements to avoid using the infected system.
Given a choice between A) work with it as-is B) Let separate groups that can't do "A" come u
Re: (Score:2)
The end of Windows XP was a great example - I had customers who still had some XP boxes that were perfectly capable of running Windows 7 - PentiumM/Core/Core2 systems with 1-2 GB of RAM, etc. Adding RAM and purchasing a license for Win7Pro for those then installing, updating, installing software, etc. for 1-3 PCs per office wasn't something I could recommend t
This is the modern reality. (Score:4, Informative)
The reality of today is that, if you communicate any secrets, you must consider the possibility of your communications being tapped/intercepted. It is even possible that hardware is compromised before you even buy it [scientificamerican.com].
With backdoors, BIOS hacking and packet sniffing being part of the daily talk on slashdot, you have to be prepared to communicate end-to-end with multiple levels of pre-planned encryption. That said, I don't think I've ever said anything that needs that much security, but a nation-state might have.
Re: (Score:3)
Yup. "State of the art" keeps moving forward in malware. It may well outpace security research. That's the reality. Who's next? Who can best address this issue? Do we need to fundamentally redesign computer systems with a security first mindset, and how long will that last against tomorrow's threats?
I don't know who started the cyberwar, but I do know that the West is fully committed to perpetrating it, especially the US. Even against our own people. This was bound to come round and bite us in the ass. You
Re:This is the modern reality. (Score:4, Interesting)
you buy a cpu chip and you get the instruction set manual. you write code to that and your code runs.
are you sure that you are talking to hardware, or is there a virtual jail you are in and can't even know it?
some think that intel chips are like that and what 99.999% of us see is the virtual layer that we're 'allowed' to see.
can you prove it one way or the other? can you be sure? intel (etc) pumps out so many variations of cpu and so often, who could know?
more tinfoil: you might submit a chip design, but is that absolutely what you are getting back? for those that could tell the diff, is their allegiance bought off?
things are too complex. we can't know many of these things. sad but true.
you can't do anything about hidden layers but you can design apps, networks and storage so that you assume bad behavior and make sure that it does not ruin your day. currently, WE DON'T DO THIS, and I'm of the mind that we should. assume all hardware is booby trapped and go from there. there is no other way to be secure in your systems and data. and it will costs lots of redundancy and intentional variety (if you even can do that, I'm not entirely sure it can be done) but if we don't, we really can't say we have 'trusted' computing. not in the personal sense of trust.
Free computers (Score:4, Funny)
If you explain the situation, the NSA would be glad to give you some free computers for your parliament.
Re: (Score:2)
If you explain the situation, the NSA would be glad to give you some free computers for your parliament.
Don't they have some now that their program has been scaled back?
Re: (Score:2)
If you explain the situation, the NSA would be glad to give you some free computers for your parliament.
The computers were shipped a week ago - they overheard Ms. Merkel talking about the issue on her cell phone.
Re: (Score:2)
Good Luck With That! (Score:2)
Question... (Score:2)
Germans suspect that the Russian foreign intelligence service SVR is behind the attack. On Thursday, the parliament will discuss how to address the situation.
So if this isn't enough, what constitutes an act of war these days?
Re: (Score:2)
Germans suspect that the Russian foreign intelligence service SVR is behind the attack. On Thursday, the parliament will discuss how to address the situation.
So if this isn't enough, what constitutes an act of war these days?
You got to say "I break with thee.. I break with thee!" and then throw doggy dodo on their shoes to make it official...
(Anybody know where that quote comes from?)
Re: (Score:2)
Getting a new computer to stop malware... (Score:4, Insightful)
They don't trust their own security services. (Score:5, Interesting)
Parliamentarians will have to decide if they want to call in the help of counterintelligence experts from the Bundesamt für Verfassungsschutz (BfV), the domestic intelligence service of Germany.
Some members of parliament have expressed concerns about the involvement of the BfV, Der Spiegel reported. Some are also refusing help from the foreign intelligence service, the Bundesnachrichtendienst, because the agency would gain access to the legislative process. Armin Schuster, a member of parliament for the CDU, criticized those concerns.
Schuster told Der Spiegel that he thinks it is “crazy” that some would rather be spied upon by a foreign intelligence agency then letting their own agencies help.
Heh, they're afraid that one set of taps would probably be replaced with another, which would probably be cc'ed to the CIA.
Re: (Score:2)
The problem is that BfV is hopelessly penetrated by US intelligence, as news in Germany has been in last few months. It's a huge scandal, where reporters blew in the open the fact that BfV was basically helping US intelligence spy on everything and everyone in Germany, ranging from Chancellor herself to straight up industrial espionage of German companies.
There has been a massive government effort to sweep these news under the rug, which suggests that BfV managed to get some very heavy dirt on almost everyo
Re: (Score:2)
I stand corrected.
WTF? (Score:5, Insightful)
This article is so full of WTF I just can't belive it. I guess it is some form of poor translation of german source.
1) All software and hardware in the German parliamentary network might need to be replaced.
So they will replace all servers, routers, switches etc.? Or just client machines?
2) Trojans introduced to the Bundestag network are still working and are still sending data from the internal network to an unknown destination
So maybe just fucking block all outbound traffic from the Bundestag network and enable it back on a white list basis like it should be anyway?
3) In May, parliament IT specialists discovered hackers were trying to infiltrate the network.
Just fucking WOW! Shouldn't it be an assumption (that hacker are trying to inflitrate government network) not a discover?
4) Some are also refusing help from the foreign intelligence service, the Bundesnachrichtendienst, because the agency would gain access to the legislative process.
I guess the legislative *process* should not be a secret to anyone?
IMO this is just some bullshit article citing politicians not technical piece. I guess it is really hard to work for any central government bureau since *any* of your action no matter sane or stupid will be judged not by technical merits but by political fucking around. I really do pity the actual IT staff behind this mess.
Re: (Score:2)
But these statements that "entire network needs to be replaced" - who said that? Their CIO or just some politician (probably from the opposition)? I *really* find it hard to belive that in order to secure your network you need to replace ALL THE HARDWARE. Such statements (REPLACE ALL THE HARDWARE) just prove that the staff (or person issuing such statements) have no idea how the breach came to life. And if they have no idea what makes them think that replacing hardware (not security policies, not the staff,
Re: (Score:2)
Maybe just put all printers in separated VLAN and allow client access them only via print servers?
network partitioning/firewalls (Score:3)
I call BS. Their parliament is not partitioned and isolated behind firewalls so they can at least drop the malicious outgoing / incoming traffic at the perimeter?
They don't have a spy agency capable of tracking this down and at least isolating it?
There's no competent network/system admins?
It's one thing to acknowledge you've been exposed, it's another to let it continue. Maybe they do deserve to be hacked.
Re: (Score:2)
> I call BS.
I call it too.
> There's no competent network/system admins?
I was once working under a guy trained in CS at Bundeswehr (German Federal Defence) and I recall this guy as the most sane CIO I happen to work with. It may be just the one guy was sane or more likely that his training was OK. Nevertheless in such scenario you do not relay on belief that your staff is competent - you just hire external auditing/security company to assure you (or not) about that. And that is what that guy would to.
Should have used Kapersky.. (Score:2)
Should have used Kapersky..
Oh, wait...nevermind [slashdot.org]
Sourceforge (Score:4, Funny)
Critical government computers (Score:3)
Don't connect the computers to the internet. Eliminate all inputs to computers (except for desktop systems, where they hardwire the keyboard and mouse.) Requests for information outside the network are sent to IT, and IT sanitizes all data that goes into or out of the system.
Government security means lives, this is no place for half measures.Legislators need to learn that they have to put up with the nuisances of a truly secure system.
So how is that DRM in hardware working out? (Score:4, Insightful)
If they can't remove it, it is because they can't find it. They can't find it because it is living in the boot processor code or the firmware of io devices or both.
The best place to hide unremovable firmware is in the protected boot code of the boot processor that is only there to provide for security control for the DRM subsystem.
There have been talks each of the last few years at Breakpoint about how broken the boot firmware is. Maybe now people will start to take notice.
Re:So how is that DRM in hardware working out? (Score:4, Interesting)
Or they're just incompetent. There is to date not a single virus in the wild that uses boot processor code or device firmware (plenty of proof of concepts). The problem being is that if you target a firmware, you a) have to know very well what you're doing and b) any platform differences across devices render your exploit unusable and c) it generally doesn't have a method of spreading itself. Works well if you're targeting an embedded platform and you know they're all the same (eg. PLC's for uranium centrifuges) but doesn't work very well for 10-years worth of every model Dell, HP, Acer and Gateway computer out there.
It's simple incompetence solved by a boot disk that wipes the hard drive without interacting with it. But 'oh noes, save my documents because we haven't made backups for the last 2 decades' and the virus is right back the minute the user logs in.
The Greens want to revert to open source software (Score:5, Interesting)
Industry should outlaw reprogrammable roms (Score:2)
If a component ever needs new firmware it should be provided by the operating system when subsystem is initialized never to be stored anywhere except the systems main persistent store.
This is a no-brainer win-win for everyone. Manufacturers reduce risk associated with firmware updates and reduce costs from smaller bill of materials.
Users win by retaining the ability to recover from ownage by wiping persistent storage.
Also please enough of the computers within computers crap. I'm looking at you Intel. Ven
Re: (Score:2)
You really have no idea how complex the software is that runs on some embedded devices? A simple hard drive has an OS in and of itself just to maintain your high speed caches. Firmware is generally not the problem though, and it isn't here either. Reprogramming the firmware to do anything useful (streaming data out of a network port it doesn't have) is nigh impossible.
Hidden Malware (Score:5, Interesting)
Ok so a machine came into the shop with a pile of BHOs and other malware. I did the normal scans, found 96 of them, cleaned them up and everything ok. A specific malware site came back. Now I did rootkit scans, in depth scans. Nothing found but Chrome and Firefox was clean, only IE 10 suffered.
Busting my brains on this, I set home page to be null. Worked ok except when IE was restarted. Nothing in the registry, services, hidden files/folders that could account for this. Everytime I started IE, back it came.
So thinking logically I realised that there was no malware on the system and that IE was calling it somehow when it loaded. A few minutes later I discovered that the shortcut link was appended with a http address to the malware site! A very simple infection that no amount of scanning could fix.
Re: (Score:2)
Holy shit!
Thanks a lot for the explanation. This happened to my parents a month ago, and I couldn't understand why everything looked clean, but IE was somehow infected.
I removed every link to IE I found, and put a big Firefox icons everywhere they could be looking for Internet.
Replace everything by the same thing, sure ... (Score:3)
Replacing all windows7 installs by new windows7 installs will for sure remove the possibility of the same malware hitting again. DOH!
Maybe change platform.
There are 2 other OS to consider, MacOS and Linux.
An important organization should always have 2 completely different platforms.
Not only 2 different browsers on the same OS, but different OS. And by different I don't mean a Microsoft-different who state the XP is not NT and is not Win7. It's all windows!
Same goes for Linux, where redhat or debian is not different, it stays Linux. Sunos may be different.
They can't trace the source???? (Score:2)
The usual thing: Amateurs at work. (Score:2)
We all know this: IT setups vital to work but so unprofessional words fail to describe it.
I would smack around the people responsible so hard, they would have their head still spinning when the IT setup has been completely redone.
I consider it bizar that taxpayers money and national security is put to risk by idiots running the parliaments IT.
This is material for some legal repercussions by the President of the Bundestag IMHO.
He should shaft the MPs so hard they never dare to do something like this again.
My
now is the time to get secured (Score:2)
Windows (Score:2)
Stop using Windows. Problem 85% solved. Then work on the other 15%.
Re:This would never have happened under Hitler! (Score:5, Informative)
>> No computers in 1945...
Turn in your geek card.
(http://www.computerhistory.org/timeline/?category=cmptr - see the entry about the Z3 in 1941)
Re: (Score:2)
It's Turing complete. It's a computer.
Re: (Score:3)
Correction: With minor hacking it's Turing complete:
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Re: This would never have happened under Hitler! (Score:4, Informative)
Uh, check your history - the German government used many of what were called at the time computers to keep track of their progress on certain 'projects'. IBM supplied the machinery...
It was punched card tabulators, sorters, and printers, but they were programmed (arranged/wired) to perform calculations.
Re: Are these the Germans... (Score:4, Informative)
Oh, they are switching back to Windows...
http://microsoft-news.com/germ... [microsoft-news.com]
Re: (Score:2)
Re:Are these the Germans... (Score:5, Insightful)
>"Are these the Germans that cut over to Linux a few years ago, saving a 'ton' of money?"
No, these are the Germans that did not and are now still suffering with tons of malware...
Re: Are these the Germans... (Score:2)
Except "those Germans" that thought going to Linux would save them a ton of money are now going back to Windows. Apparently they found the investment involved in maintaining a 'free' operating environment too much work/too expensive.
Huh.
http://microsoft-news.com/germ... [microsoft-news.com]
Re:Are these the Germans... (Score:5, Insightful)
I doubt anyone on Slashdot believes any platform is invulnerable to malware. But if the shoe fits wear it- MS-Windows is perhaps more than a thousand times more prone to malware than Linux in the real world.
Re: (Score:2)
"MS-Windows is perhaps more than a thousand times more prone to malware than Linux in the real world"
Perhaps because it is 1000 times more likely to be user in the real world?
Re: (Score:2)
Re: (Score:2)
1. No
2. No.
3. No.
So much nonsense in one post. Incredible. I'm sure everything else you say is equally awesome, and will listen intently to every word you say. /s
Re: (Score:3)
Are these the Germans that cut over to Linux a few years ago, saving a 'ton' of money?
Probably not, most linux machines have little use for MSI installers.