I wonder why did you make such an omission. Perhaps to create an appearance of support for your completely invalid claims?
First I fail to see how my claim is invalid. It's popular belief that software X is more secure than software Y simply because it is less desirable for someone to attack.
So how do you compare exploits seen by a Linux shell provider with exploits you have seen being a Windows shell provider?
Ummm because my point was that machines with higher value (ie: ones customers use/have access to) are of more likely to be attacked...
And you conveniently did not mention that you counted exploits on a poorly run shell server vs. Windows "server" that never runs anything you didn't put on it (and they apparently still were copromised, just less often than your shell servers).
I mentioned my compromised MS-DOS machine more as a joke (I was probably 12, running a BBS gave the wrong person sysop...)
I think the Linux servers were maintained pretty well actually but what do I know? Oh and I clearly mentioned the difference between users having access to my Linux servers and not my Windows Servers.
If it's too hard for you guys to see my point because I mentioned Linux and Windows in the same post and got your panties in a bunch then think about this...
My console is connected to the internet. To an attacker it's a lower value target than say a PC on the same network that I do my online banking on. Just because my console is lower value to an attacker doesn't inherently doesn't make it any more or less secure than my PC.