With what is going on in the world right now, I would like to point everyone's attention to the fact that there are people on the Fediverse that unironically shill hard for Micro$hit and Wangblows, FOR FREE.
@mona@SuperSnekFriend It was caused by a technical design problem how such sort of functionality is only possible to implement as a kernel module in the NT kernel on windows.
Such kind of functionality can be implemented as a daemon on GNU/Linux and that daemon crashing won't crash the whole system.
Linux modules crashing often causes Linux to crash, although Linux can handle some kind of bugs and oops instead.
@hispanicweeb@bae.st@SuperSnekFriend@poa.st luv you're so mad about it you're tagging me in this when it's not even a windows issue or caused by the operating system itself but an anti virus program that pushed an untested patch that corrupted the system
if you're gonna be a whiny little faggot at least be right lmao
@SuperSnekFriend Such shilling has nothing to do with freedom, so it gratis shilling.
They're actually paying to do so, as they've paid for a windows "license", are looking at the ads in windows and surrendering all their private information to microsoft so they can sell it.
@SuperSnekFriend Such shilling has nothing to do with freedom, so it shilling for gratis.
They're actually paying to do so, as they've paid for a windows "license", are looking at the ads in windows and surrendering all their private information to microsoft so they can sell it.
@mona >its an anti virus that installs itself deep into the system to prevent things like ransomware Rasomware? You mean the kind of proprietary software that GNU/Linux isn't vulnerable to?
Most file corruption bugs on GNU/Linux at worst just make a daemon stop working without breaking the whole system and you can repair daemons over ssh without having to manually reboot the server twice.
The root issue is how windows design is so flawed that an antivirus is required.
@Suiseiseki@freesoftwareextremist.com@SuperSnekFriend@poa.st its an anti virus that installs itself deep into the system to prevent things like ransomware their update created a driver that loads at boot and breaks the system the fix isboot to safe mode delete corrupted file let windows boot normally the single point of failure is insane though every massive company using the same AV someone's getting fired and losing a whole lot of market share
@mona >windows is the most popular there for the most attacked windows is *not* the most popular OS.
MINIX (in Intel's ME backdoor) and Android (which uses the kernel, Linux) are the most popular OS's, followed by GNU/Linux, then BusyBox/Linux etc and then windows.
Even based off useragents from normie sites (which is not), windows usage is *dropping*, while Android and GNU/Linux usage is increasing.
The reason why windows is attacked so often is because its security is swiss cheese and so effective virus's etc are very easy to write, plus everyone runs the exact same configuration, as microsoft severely limits the basic ability to configure the OS and *properly* disable unwanted things without them being auto-activated later - thus you write one virus and can go ham with every single system until microsoft maybe works around the bug several months later.
Many very valuable systems, that are very important run GNU/Linux and therefore exploiting those is very tempting.
But it's very hard to write a virus that will work on more than a small percentage of GNU/Linux systems, as everyone has a different configurations and some love hardening their systems to be almost inpenetrable with SELinux.
For example the xz-utils backdoor utilized systemd, but every system that didn't run systemd, or didn't install the backdoored version (typically new released of software and tested before going into general release) were not vulnerable to it.
Some choose to run gnuTLS instead of openssl and those aren't vulnerable to any attacks against openssl (but those are still extremely rare).
windows furthermore has a poor security model, where people are encouraged to install arbitrary .exe's and kernel modules from the internet and trust that the proprietary malware authors serve their interests (they don't), while on GNU/Linux everything is checked and signed properly and installed via a package manager.
It's actually possible to have a secure OS on GNU/Linux, as it's possible to have only 100% free software installed.
Using the same AV may not be a problem if it's possible to configure it and add extra hardening if wanted and if the developers don't have a remote backdoor that they push updates that brick the system over.
@Suiseiseki@freesoftwareextremist.com windows is the most popular there for the most attacked thus needing extra anti viruses the default anti virus that ships on the system is fine and does everything you need with no extra software needed people purchase these anti viruses for extra features or more aggressive polices depending on the company
the failure is on humans and companies all buying the same AV and expecting there to never be a point of failure the company is fucking done after this