On Thu, 27 Dec 2001 22:28:38 +0530
"zohar" <[EMAIL PROTECTED]> spewed into the bitstream:

> CALDERA says that it providing a solution of UNIX and LINUX integrating
it.
> What other than networking is the same between this two OS.

Shorter list would be what's different.

Let's see, what's the same (list incomplete):
POSIX compliance
filesystem structures (single tree versus idiotic, changing alphabet soup)
regex
designed to be multi-tasking, multi-user (true multi-tasking, not
pre-emptive)
boot sequence (BSD or SysV)
use of semaphores
use of pipes
uniformity of location for config files (/etc)
etc., etc., etc.

> 
> I have heard many times in last few days that normal firewall can only
> blocks the packets that come from Windows while they are not effective
on
> the packets that come from other OS. Can you give me some more knowledge
> related to it. Which Firewall can handle this kind of situation.

Who is the ill-informed that passed on this bit of misinformation?
While different OS' react differently to various situations (sending a
SYN-ACK as the initial packet, XMAS tree scans, martian packets, etc.),
thus the ability to "fingerprint" an OS via TCP, the RFC's are fairly
explicit about how IP, ICMP, BGP, etc., work.  So there's really little
variation to a legitimate IP packet, and all UNIX/Linux firewalls will
discard garbage (I have no clue if this is true with "other than
UNIX/Linux OS'", but that's over 106 flavors of UNIX last time I looked).

The current Linux firewall code is not only very robust, it's stateful. 
It can perform NAT (both source and destination), and a myriad other
things including rudimentary port scan detection, searching for strings
inside of packets, etc., etc., ...

> 
> On one site it was mentioned that an e-mail can be multiparty other than
> pure HTML or text and this are more likely to contain ActiveX and
scripting
> like more powerful programs which are made able to run some malicious
code.
> Please say something more about this and which mail application can
better
> handle this.

This is a M$ problem.  UNIX will not automagically allow this.  You must
save the malicious attachment, make it executable, then deliberately run
it (assuming it would even run on your system).  Would anyone go to that
much trouble when a simple `rm -Rf /*` will do?

> 
> What is UPX file compressor of Visual Basic.

Visual Basic?
Folks here speak Perl, C, C++, and more, but there's no such thing as
Linux Visual Basic.

Ciao,

David A. Bandel
-- 
Focus on the dream, not the competition.
                -- Nemesis Racing Team motto
Internet (H323) phone: 206.28.187.30
_______________________________________________
Linux-users mailing list
Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users

Reply via email to