evolutionkid
Registered
I couldn't find a thread that addressed this topic already, so I'm throwing it out there for discussion...
Background: I'm a former Windows user (at home anyway, I still have to use it at work), I switched a little over a year ago. I've done tech support for a long time, and I'm a self-declared "power user" in Windows (comfortable editing the registry, using the MS-DOS shell, etc). I've never dealt with spyware or viruses on my own Windows machines, and have often helped others rid their Windows boxes of that stuff.
I still feel somewhat new to the Mac/OSX world, but I'm getting better. I'm slowly getting comfortable with Terminal.app and UNIX commands. I decided a long time ago that as a security "best practice" I would run my OSX user account as a standard user. I realize that there are currently no known viruses/malware for OSX, but I guess I just figured I'd play it safe in case something shows up in the wild one day. I created a separate administrator account and I only use it when absolutely necessary. So far that's been fine -- I can still install software etc, I just have to provide the admin credentials first. If I have to 'sudo' to do something, I just log into that admin account and do it from there. I've only run into a couple problems with this, and they're minor. One example is that Software Update behaves weird when you're a standard user -- I figured out that it reads from and writes to a system-wide prefs file that I don't have write access to as a standard user. Also, sometimes it's annoying to have to switch user accounts just to run a simple 'sudo' command. Anyway, here's...
The Point: What do you long time OSX users think of running as standard vs. administrator? Am I just being paranoid about threats that don't exist? I've heard that even if I was running as administrator in OSX, I'd still have to provide credentials to touch anything system critical...is that true? Is it possible that I (or some yet-to-be-devised malicious software) could 'accidentally' touch system or kernel level files if I run as admin, or would I *always* have to provide 'sudo' credentials to do any real damage? What are your thoughts? Any articles on the web you can link to regarding this?
Thanks for chiming in, I'm curious as to what people think about this...
Background: I'm a former Windows user (at home anyway, I still have to use it at work), I switched a little over a year ago. I've done tech support for a long time, and I'm a self-declared "power user" in Windows (comfortable editing the registry, using the MS-DOS shell, etc). I've never dealt with spyware or viruses on my own Windows machines, and have often helped others rid their Windows boxes of that stuff.
I still feel somewhat new to the Mac/OSX world, but I'm getting better. I'm slowly getting comfortable with Terminal.app and UNIX commands. I decided a long time ago that as a security "best practice" I would run my OSX user account as a standard user. I realize that there are currently no known viruses/malware for OSX, but I guess I just figured I'd play it safe in case something shows up in the wild one day. I created a separate administrator account and I only use it when absolutely necessary. So far that's been fine -- I can still install software etc, I just have to provide the admin credentials first. If I have to 'sudo' to do something, I just log into that admin account and do it from there. I've only run into a couple problems with this, and they're minor. One example is that Software Update behaves weird when you're a standard user -- I figured out that it reads from and writes to a system-wide prefs file that I don't have write access to as a standard user. Also, sometimes it's annoying to have to switch user accounts just to run a simple 'sudo' command. Anyway, here's...
The Point: What do you long time OSX users think of running as standard vs. administrator? Am I just being paranoid about threats that don't exist? I've heard that even if I was running as administrator in OSX, I'd still have to provide credentials to touch anything system critical...is that true? Is it possible that I (or some yet-to-be-devised malicious software) could 'accidentally' touch system or kernel level files if I run as admin, or would I *always* have to provide 'sudo' credentials to do any real damage? What are your thoughts? Any articles on the web you can link to regarding this?
Thanks for chiming in, I'm curious as to what people think about this...