mirror of
https://github.com/nbeaver/why-linux-is-better.git
synced 2025-08-22 13:33:04 +02:00
Merge branch 'edneville-master'
This commit is contained in:
33
readme.rst
33
readme.rst
@@ -125,7 +125,7 @@ and to dig deeper if you are interested.
|
|||||||
|
|
||||||
If you are an experienced Linux user,
|
If you are an experienced Linux user,
|
||||||
this document is a test of the theory that the fastest way to get feedback
|
this document is a test of the theory that the fastest way to get feedback
|
||||||
is to be publically wrong about something people care about.
|
is to be publicly wrong about something people care about.
|
||||||
Corrections and additions are welcome.
|
Corrections and additions are welcome.
|
||||||
|
|
||||||
If you are a Windows user:
|
If you are a Windows user:
|
||||||
@@ -428,7 +428,7 @@ wanted to reserve the remaining space for control characters.
|
|||||||
|
|
||||||
--- Ibid, p.232
|
--- Ibid, p.232
|
||||||
|
|
||||||
Though the comittee first formed in 1961,
|
Though the committee first formed in 1961,
|
||||||
it wasn't until late 1963
|
it wasn't until late 1963
|
||||||
that they finally agreed to include a lowercase alphabet,
|
that they finally agreed to include a lowercase alphabet,
|
||||||
largely because of the influence of the
|
largely because of the influence of the
|
||||||
@@ -1556,6 +1556,31 @@ since applications do not lock files by default.
|
|||||||
|
|
||||||
.. TODO: CR LF \r\n newlines?
|
.. TODO: CR LF \r\n newlines?
|
||||||
|
|
||||||
|
-----------------------------------------
|
||||||
|
Lack of granular execution access control
|
||||||
|
-----------------------------------------
|
||||||
|
|
||||||
|
Windows does not have a similar concept to `sudo`_/`doas`_/`please`_
|
||||||
|
(`sudo`, but with regex). Users cannot run arbitrary commands as a given
|
||||||
|
user without knowledge of the alternate user's password (see
|
||||||
|
`runas`).
|
||||||
|
|
||||||
|
This creates difficulty for large multi-user systems when assigning
|
||||||
|
roles without administrator access. Performing tasks that need to step
|
||||||
|
outside of low privilege is not a simple matter without divulging the
|
||||||
|
alternative user's credentials.
|
||||||
|
|
||||||
|
Unix systems support the SUID execute bit (normally mode 4755) on a
|
||||||
|
binary which, when executed switches process ownership to the file
|
||||||
|
owner, not the user that executed it. This is sorely lacking in
|
||||||
|
Windows and would change the access landscape if it were implemented,
|
||||||
|
many organisations could then solve many issues where users execute
|
||||||
|
programs as a privileged user when they wouldn't otherwise need to.
|
||||||
|
|
||||||
|
.. _sudo: https://www.sudo.ws/
|
||||||
|
.. _doas: https://man.openbsd.org/doas
|
||||||
|
.. _please: https://gitlab.com/edneville/please
|
||||||
|
|
||||||
-----------------------------------------
|
-----------------------------------------
|
||||||
Lack of control over desktop environment.
|
Lack of control over desktop environment.
|
||||||
-----------------------------------------
|
-----------------------------------------
|
||||||
@@ -2525,7 +2550,7 @@ which have the same `issues with signal-to-noise ratio`_ that most forums have.
|
|||||||
|
|
||||||
By contrast, projects like the Linux kernel and the Debian project
|
By contrast, projects like the Linux kernel and the Debian project
|
||||||
maintain accountability and clarity
|
maintain accountability and clarity
|
||||||
by publically tracking and acknowledging bugs,
|
by publicly tracking and acknowledging bugs,
|
||||||
even when it is embarrassing to do so
|
even when it is embarrassing to do so
|
||||||
[#brown_paper_bag_release]_ [#runs_rm_r_as_root]_.
|
[#brown_paper_bag_release]_ [#runs_rm_r_as_root]_.
|
||||||
|
|
||||||
@@ -2619,7 +2644,7 @@ they will report bugs caused by the actual applications,
|
|||||||
not ones caused by malware.
|
not ones caused by malware.
|
||||||
|
|
||||||
Most Linux distributions use cryptographically secure package managers
|
Most Linux distributions use cryptographically secure package managers
|
||||||
which is a signifiantly better security model
|
which is a significantly better security model
|
||||||
than downloading unsigned executables over a network
|
than downloading unsigned executables over a network
|
||||||
and then granting them administrative privileges.
|
and then granting them administrative privileges.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user