On Thu, 27 Dec 2001 22:28:38 +0530 "zohar" <[EMAIL PROTECTED]> spewed into the bitstream:
> CALDERA says that it providing a solution of UNIX and LINUX integrating it. > What other than networking is the same between this two OS. Shorter list would be what's different. Let's see, what's the same (list incomplete): POSIX compliance filesystem structures (single tree versus idiotic, changing alphabet soup) regex designed to be multi-tasking, multi-user (true multi-tasking, not pre-emptive) boot sequence (BSD or SysV) use of semaphores use of pipes uniformity of location for config files (/etc) etc., etc., etc. > > I have heard many times in last few days that normal firewall can only > blocks the packets that come from Windows while they are not effective on > the packets that come from other OS. Can you give me some more knowledge > related to it. Which Firewall can handle this kind of situation. Who is the ill-informed that passed on this bit of misinformation? While different OS' react differently to various situations (sending a SYN-ACK as the initial packet, XMAS tree scans, martian packets, etc.), thus the ability to "fingerprint" an OS via TCP, the RFC's are fairly explicit about how IP, ICMP, BGP, etc., work. So there's really little variation to a legitimate IP packet, and all UNIX/Linux firewalls will discard garbage (I have no clue if this is true with "other than UNIX/Linux OS'", but that's over 106 flavors of UNIX last time I looked). The current Linux firewall code is not only very robust, it's stateful. It can perform NAT (both source and destination), and a myriad other things including rudimentary port scan detection, searching for strings inside of packets, etc., etc., ... > > On one site it was mentioned that an e-mail can be multiparty other than > pure HTML or text and this are more likely to contain ActiveX and scripting > like more powerful programs which are made able to run some malicious code. > Please say something more about this and which mail application can better > handle this. This is a M$ problem. UNIX will not automagically allow this. You must save the malicious attachment, make it executable, then deliberately run it (assuming it would even run on your system). Would anyone go to that much trouble when a simple `rm -Rf /*` will do? > > What is UPX file compressor of Visual Basic. Visual Basic? Folks here speak Perl, C, C++, and more, but there's no such thing as Linux Visual Basic. Ciao, David A. Bandel -- Focus on the dream, not the competition. -- Nemesis Racing Team motto Internet (H323) phone: 206.28.187.30 _______________________________________________ Linux-users mailing list Archives, Digests, etc at http://linux.nf/mailman/listinfo/linux-users