[citation][nom]QJT[/nom]To answer peoples Q's about Linux being more secure..."Most people use Microsoft Windows, and pirates want to do as much damage (or control) as possible: therefore, they target Windows. But that's not the only reason; the Apache web server (a web server is a program located on a remote computer that sends web pages to your browser when you ask for them), which is open source software, has the biggest market share (against Microsoft's IIS server), but it still suffers from much fewer attacks/flaws than the Microsoft one.Linux uses smart authorization management. In Windows you (and any program you install) usually have the right to do pretty much anything to the system. If you feel like punishing your PC because it just let your precious work disappear, you can go inside the system folder and delete whatever you want: Windows won't complain. Of course, the next time you reboot, trouble begins. But imagine that if you can delete this system stuff, other programs can, too, or just mess it up. Linux doesn't allow that. Every time you request to do something that has to do with the system, an administrator password is required (and if you're not an administrator on this system, you simply can't do it). Viruses can't just go around and delete or modify what they want in the system; they don't have the authorization for that.More eyes make fewer security flaws. Linux is Open source software, which means that any programmer in the world can have a look at the code (the "recipe" of any program), and help out, or just tell other developers "Hey, what if blah blah, isn't this a security flaw?"." -- http://www.whylinuxisbetter.net/index.php?lang=[/citation]
Not true. And NT based Windows kernel (NT 4.0 / 5.0 / 6.0) has the exact same user rights management as any POSIX based system (Unix / Linux). A user logged into a Windows machine can not delete anything in \windows folder or any other folder with user read only rights. In any POSIX system if your logged in as root you can nuke /usr/sbin, /usr/bin, /bin, /sbin, /boot, and /var with wild abandon, upon which your system will destroy itself in short order.
The difference is that company's like Dell / HP have the default first user set as administrator. To avoid the ~EVIL~ "login screen" the OEM's like to have auto-login setup with the user being in the administrators group if not just a renamed administrator account. This is the functional equivalent of logging into a Linux machine as root and doing everything that way. Everything just seems "to work" but its a good way to blow your system up or get a virus. It got so bad that MS had to directly limit the power of the administrator account using UAC to prevent people from blowing their own system up while being logged in as administrator. And the latest NT 6 kernel actually has no "administrator" account just an elevated rights user account. The system goes through great lengths to prevent the user from doing anything dangerous, hence all the guides telling people to turn off UAC to get programs working.
Apache is more secure because its an awesome piece of software. And BTW it runs on windows too, so you can build a secure webserver using MS 2003 / 2008 + Apache and just uninstall IIS.