First: That thread is ancient history in terms of computing.
Second: The OP left himself WIDE open via foolish use of ssh.
Find us a verifiable example of a modern Snow Leopard machine with all the appropriate security precautions (owned and used as a personal computer and NOT something in one of these 'hacking contests') being *successfully* hacked from a remote location. Bet you can't find even one.
In a perfect world, if "all the appropriate security precautions" are taken then few boxes would be pwned, regardless of what OS they're running.
I think you're missing the big picture. If we lived in a perfect world, filled with perfect people, that did everything perfectly, nothing bad would ever happen.
But alas, it's not a perfect world. And finding out "the appropriate security precautions" required of a given OS isn't something anyone is going to learn from 5 minutes of googling the subject. Even if luck might allow you to find the a good Web page on OS X security it's likely out of date unless it was updated that morning. But for that matter you could spend a couple of decades working as a network admin and still get rooted unless you constantly keep up with the latest exploits and security threats.
Meanwhile, in the real world:
Little Johnny slaps in his Snow Leopard DVD and installs it using defaults and ends up with a very secure system. He keeps up with updates and he has a very safe system. He's understandably impressed!
But then in a few weeks, he becomes interesting in running a Web server, and maybe making money in the Web hosting business. So, after 5 minutes of googling and research on the subject, Johnny starts opening ports and starting up all the daemons that he'll need to run Apache, PHP, Perl, MySQL, and other neat stuff. And you setup port forwarding on his router so the outside world can visit his awesome Web server. He learn a great deal of how to do all of this neat server stuff from reading a Web page full of great OS X security advice written by some dude named "t3h r0xx0rz".
Johnny downloads a bunch of groovy PHP scripts that let him do some really cool stuff. He starts learning PHP and writes his very own script to send email off his OS X server. He gets a static IP from his ISP, and he submits his site to Google's index so the whole world can find it.
Johnny calls up his friends and offers them a deal -- unlimited Web hosting with full shell access for just $5 a month. And more than a dozen of his friends jump at that opportunity of a lifetime. He's soon surprised by the number of strangers from around the world asking about getting shell accounts that must have found his site from searching the Web.
Johnny begins to dream of moving out of his mom's basement once the profits from his hosting business start pouring in. Johnny likes thinking about that idea, so he pours himself a beer, and as he sits down and relaxes. He can't help but congratulates yourself on being able to figure out how to operate a budding Web hosting company and takes pride in the fact that it only required about 60 minutes of time spent on learning everything he'd need to know to master his new vocation. He lifts his glass and toasts his new identify -- "Johnny Webmeister".
All seem well at this point. What could possibly go wrong? Little Johnny believes with all his heart what he's read and heard other say so often -- that "no one has ever hacked an OSX" box. It's obvious to Johnny that he made the right choice in regards to choosing the right OS to use, because he knows OS X is impervious to attack.
But for some strange reason, Johnny's server is boarded by all manner of script puppies and other dark forces from around the globe within just a matter of a few days. Some days later, Johnny is horrified to discover that his box has been rooted, all his MySQL databases are toast, and he soon learns his ISP has yanked his network connection because his compromised OS X box was used to send out 1,394,078 SPAM emails to various Hotmail and AOL mailboxes last week.
Making matters even worse, his imagery girlfriend calls him a loser to his face and then dumps him. The next day, Little Johnny's friends learn that Johnny has been taken away for a 30 day stay in a psychiatric hospital downtown. One of Johnny's friends, whose father is a lawyer, takes Johnny to court since he's paid for a year's worth of hosting in advance. The judge awards damages to Johnny's friend, and since Johnny has no money the judge seizes Johnny's Mac Pro and awards it to the successful litigant. As the scene fades to black we see Little Johnny in a straightjacket, all alone in a darkened room, crying out to his pet cockroach that lives underneath his bed, "They said it was bulletproof!"
This is just one type of compromises that happen all the time, largely because so many people in the OS X love to keep the legendary tale alive that OS X is bulletproof, 100% secure, and so on... blah, blah, blah.
Let's not continue to kid ourselves about OS X security. Living in denial helps no one -- Little Johnny's dream of becoming a successful Webmeister didn't have to die!