lolz dude, Iceyn1pples totally just rocked your bed. Especially if the word "fail" is the best you can come up with. He even presented facts, which time and time again, you fail to present in any of your arguments.
If you actually read this whole thread and every other thread where I have to argue with fan boys about PC vs Macs, and the people who are always anti-Mac use zero facts.
Do you know what POSIX is? How about a true multi user environment? Windows lacks these things, and even in Windows 7 there is for the first time an "almost" multi-user environment. The fact that the user "System," in every previous version of Windows had no password, means it is by design less secure.
Please reference Data to back up your claims
FACT # 1: Just because I claimed that this is a fact, does not make it a real fact because there is no proven data to back it up.
http://forums.serverwatch.com/showthread.php?t=18220
That forum post contains a plethora of links from security experts. However, let me just touch the basics on why it is more secure:
1) Everything is contained in that user's environment, the system user (root) has it's own environment and it's own group,usually called wheel. In Unix based OSes POSIX sets of permissions contain information in the inodes (index nodes) for read, write, and execute. Then there is a set of permissions for owner, group and everyone. With out the proper authentication, you cannot go beyond what your permissions are set to, period. Windows lacks this, so a script kiddie can escalate access once they break into a user account. This changed in Vista and improved in Windows 7, but just running as "administrator," with no authentication, is still by design less secure.
2) Self contained environemnts. If your user account gets hijacked, it doesn't have access to anything outside your home folder, via POSIX standards
3) POSIX is an IEEE standard, with standard compliance, which has millions upon millions of opens source developers looking at it. More eyes, means less margin of error. Which is why security patching, is generally better on open source based systems. Though, Microsoft has had a lot of experience hot fixing and patching their OS, they aren't bad at it by any means.
4) Since POSIX uses the index node (inode) bits to determine what a file can do you do not have to rely on file extensions. Where as in Windows an executable is a .exe and in Unix based OSes, it matters not what the extension is, it matters if the execute bit is enabled or not. Relying on a single point of failure, like a file extension is never a good idea. Also, things execute and install with out authentication.
5) Unix has been around since the late 1960s, and POSIX since the 80s. It is more tried, tested and proven than any other OS out there. That is why Unix based OSes run the Internet, they run the DNS servers, and they run high end networks. Companies have been switching, due to security concerns. Google just switched all their users to Macs, and while they will not publicly disclose why, if you Google search on it, it was due to Microsoft Windows and security concerns. It is pretty safe to assume that Google can afford the best security experts in the world, since they are one of the top tech companies in the world.
The user does not need to download any code. The code is pushed from the website onto the user's computer - only interaction required is that the user visits the malicious site by accident, this is remote, the hacker is not physically at the computer to hack it. A hack is a hack is a hack, no matter how you look at it. Wheather it is done with brute force, or with sneaky code from a webpage, the MAC was hacked and controlled remotely.
The hacker did not comment about the exploit out of respect for Apple. Apple was informed of the exploit and patched it. If he commented, then he would have apple and their friendly lawyers at his door seeking compensation for the damages caused.
I have already touched on this in many ways. Most websites these days are driven by CMSes, which are content management systems. These include millions of lines of code and usually rely on certain set technologies. Things like: CSS, Python, Perl, Ruby on Rails, HTML, Java, PHP, .NET and other web technologies. This is fairly new, and filled with security holes. The zero day exploit that was used in the webkit browsers, affected all webkit browsers. It was OS Independent. Chrome and Safari are the two largest used Webkit browsers. Firefox had a memory bug, and since Firefox runs on all systems, the bug could have been used to exploit Linux, Mac OS X, and Windows. When you have a very small hand full of web developers working on something that has 10s of thousands of lines of code, possibly 100s of thousands written in over 5 different languages all playing together you are going to have tons of security holes.
Now, back to POSIX. This is how it works, and if you cannot understand this I suggest you read up on how open source Unix based OSes work. If I were to visit that guy's webpage logged in as my user account, which by default is not an admin (since I use a separate admin account to administer the computer via POSIX) and my machine got injected with that malicious code, the only thing that would be hacked is my user account. The root user, and all system files would be still untouched, because you would then have to escalate code even further to actually fully hack the system. Though, most malicious code these days hijacks your account and wants to you buy fake software to fix it, so hackers aren't really interested in hacking your system.
Just look at how many Windows machines out there are botnets and look at any other OS. There isn't any, because it just harder to hack the system. Also, all those security holes in web browsers are pretty much patched these days and developers are finally getting ahead of the game.
http://www.infosecurity-us.com/view/16815/apple-releases-snow-leopard-update-with-56-security-fixes/
Now, if you want to discuss this further I am willing to, but please do your homework before doing so. Otherwise you can just do a search on this forum for my posts on this subject. Since I have had to repeat myself a billion times, I really don't want to do it again. Just to recap.
-There are zero known viruses in the wild for any Unix based OS. Make sure you know what a virus is over malware or spyware, they are different
-Unix based OSes use a modular approach, and Windows uses a monolithic approach. Allowing you to easily configure a Unixed based OS to be way more secure by adding so many different levels of security.
-Ultimately, hackers no longer target systems, they target end users. End users are easily fooled to install malicious software or to go malicious websites and 99 times out 100 hack their own machines. Another popular one is embedded viruses/malware into pirated software and then let the user download it and install it on their PC. So, really, you could be running the most secure OS in the world but if you are an uneducated user and install malicious software on there yourself, the OS is not to blame. The end user is.