This report just out by Nicholas Petreley takes a good hard look at both OS’s from a security standpoint, comparing design charateristics and the way vurlnerablilities en inherrent buildup of the OS influences the actual severity of exploits and how this is messured most effectivly.
Though the arcticle is clearly anti-MS biased, I found it a insighfull [...]
Well, I have now basicly given up the use of sysadmin privilege as default, resolving to use admin rights only when needed.
In order to actually acomplish this best-practice behaviour, my resource is primairily Aaron Margosis’ blog, and some of the tools he has published there.
And on top of this, I have switched my primairy user account [...]