39. FSF: GPL, LGPL, FDL Free Software Foundation (FSF), General Public License (GPL), Lesser General Public License (LGPL), Free Documentation License (FDL)
59. Dr Nic Peeling+Dr Julian Satchell, Analysis of the Impact of Open Source Software : Virus for Win 60.000, 40 for Mac, 5 for commercial Unix versions, (perhaps) 40 for Linux Evans Data’s Summer 2004 Linux Development Survey : 92% sistem Linux belum pernah terinfeksi virus, 78% sistem Linux belum pernah di- crack Evans Data's Spring 2004 survey: hanya 40% pengguna non-Linux belum ada serangan keamanan dan 32% pengguna non-Linux pernah mengalami 3 kali atau lebih serangan David A. Wheeler, Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!
60. Sandvine, Juni 2004: 80% spam dikirim oleh PC Win yang terinfeksi ScanIT Browser Security Test Group, 2004: 98% waktu Internet Explorer dilaporkan vulnerable s/d serangan remote yang berbahaya dan tidak tersedia patch untuk memperbaikinya, dibandingkan 17% Opera dan 15%Mozilla/Firefox Hanya 7 hari pada tahun 2004 Internet Explorer dilaporkan aman dari serangan remote ( unstoppable ) David A. Wheeler, Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!
61. David Hammon/Secunia, August 2005: Internet Explorer masih lebih berbahaya daripada Firefox (PLBOS) ... David A. Wheeler, Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!
67. C|Net, vnunet, honeynet project, 2004: rata-rata mesin Linux unpatched dapat "hidup" dalam waktu tiga (3) bulan, Win dalam hitungan menit s.d bulan Petreley, 2004 : vulnerability di Win yang kritis: 50%, RH Linux: 10% ... David A. Wheeler, Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers!
68. David A. Wheeler, Why Open Source Software / Free Software (OSS/FS, FLOSS, or FOSS)? Look at the Numbers! Bugtraq Vulnerability Database
69. $ nmap localhost Starting nmap 3.93 ( http://www.insecure.org/nmap/ ) at 2005-12-17 00:02 WIT Interesting ports on localhost (127.0.0.1): (The 1665 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 22/tcp open ssh 631/tcp open ipp 6000/tcp open X11 Nmap finished: 1 IP address (1 host up) scanned in 1.212 seconds