OK, screw my mod points. I have to comment on this.
There is a big difference between a virus or trojan that takes advantage of a flaw in the operating system and one that relies on brute forcing the password to a privileged user account or tricking a user into handing over the password directly.
I support networks for a living, and we also deal with lots of small businesses and residential systems.
The single biggest infection vector on
any operating system is third party browser plugins such as flash or java.
However, when one of our linux users has a java virus, it only gets access to their user directory. A simple reboot stops the virus, because all of the Home directories have the execute bit disabled.
A quick follow up scan once a week with avg for linux or clamav, and they are no longer infected.
Yes, There are a few nasty rootkits that use privilege escalation, but on linux those are few and far between.
To quote the link YOU posted,
few if any are in the wild, and most have been rendered obsolete by Linux updates
On windows, we have to deal with executable files dropped into 20 different locations, a few hundred ways for a virus to execute at startup, and ways for the virus to easily hid itself behind processes that are supposed to be there.
(hello svchost.exe, how many viruses did you execute today?
I really wish you people would stop trying to compare apples to elephants, and start looking at things in a more reasonable method.
Here, I'll start by making a nice little table.
Problem: ............... Mac/Windows ..... Linux (desktop) .... Linux (server)
Stupid users ............... YES .......... YES.................... YES
Java Viruses ............... YES .......... YES.................... NO
Flash Viruses .............. YES .......... YES ................... NO
Brute Force Password ........YES .......... YES.................... YES
Users install Random crap ...YES .......... NO..................... NO
Use admin pass frequently .. YES .......... Maybe.................. NO
Feel free to add more to this table, but just this much makes my point.
EVERYTHING IS VULNERABLE TO STUPID AND BADLY TRAINED USERS/ADMINS.
In my experience, Linux distros respond faster to discovered threats and mitigate actual compromises better than WIndows or MacOSX.
Linux distros also usually don't train users to do things that are known to be dangerous, such as downloading and executing unknown/untrusted binaries.
NOR does linux require a huge financial investment in order to have code vetted, signed off and added to the repositories.