I've been thinking... NAS and LimeTech have been doing great work in keeping unRAID vulnerability-free, in the software department. But the number one vulnerability that users have is not things like Shell-shock and the like, it's malware from other local stations. And I'd really like to see some brainstorming as to how this can be better addressed. Yes, you could say it's not our problem, because it's mostly related to user behavior, but it's not necessarily the unRAID user's behavior, it's
I've been giving this problem some thought, and did some experimenting. If you set a file to read-only permissions (chmod 444 file.ext), and set it to an owner other than your own userid (e.g., root), that file cannot be deleted or written to from a Windows box via SMB, no matter the share settings. I tested with the DOS/Windows "attrib -R" command, and it was unable to make the file writable (if the owner is me, attrib WOULD make the file writable). I believe that no virus operating through SMP