Sponsored Content
The Lounge What is on Your Mind? Is M$ safer than UN*X(-LIKE)?? Post 302210888 by Texasone on Wednesday 2nd of July 2008 07:44:55 AM
Old 07-02-2008
Well the virus scanner on a server is a definiate since probably 70% of your clients are going to have a M$ Windows box, and most viruses are Windows aimed. I am going to add stuff to my computer like virus protection, but I already had IPtables setup via FireStarter at the time. But the orginal statement was saying that, as I have found, the average Windows user doesn't know the difference between Windows virus and PC virus and believe that all viruses and malware in Windows works on almost any PC.

For example, I called an Internet Service Provider, I won't say who though, and asked them if their internet security that they offer through their internet connection only protected Windows PC's or does it cover other OS such as UNIX or UNIX-like and the response I received was: Don't those viruses affect all computers?
Not bashing windows users, but people just need to understand the difference between PC viruses and Windows viruses and Linux viruses, etc...
 

3 More Discussions You Might Find Interesting

1. What is on Your Mind?

Nuclear Elephant iPhone Wipe making your iPhone Safer for Resale

For those with the iPhones here might read up how to wipe your personal data off the phone before reselling or trade-in. ;) source: Nuclear Elephant: iPhone Wipe June 1, 2008: Making your iPhone Safe for Resale Since my posts regarding the iPhone restore mode being insufficient for wiping... (0 Replies)
Discussion started by: sparcguy
0 Replies

2. UNIX for Dummies Questions & Answers

# /UNIX.org file deleting is safer or not

Hi All, Please tell me the use of # /Unix.org file it has reserved a huge disk space, I want to know is it safer to truncate or delete. Thanks - Rukshan.:) (1 Reply)
Discussion started by: rukshan4u2c
1 Replies

3. UNIX for Advanced & Expert Users

Why is editing a file by renaming the new one safer?

Hello: I've been reading about ways to edit files from the command line, and I've found two websites which state that the following is the safest way to edit a file: command original > new mv new originalThat is, renaming the newer file to the previous one. This is what the websites I mentioned... (8 Replies)
Discussion started by: Cacializ
8 Replies
CONDOM(1)						      General Commands Manual							 CONDOM(1)

NAME
condom - protection against viruses and prevention of child processes SYNOPSIS
condom [options] [processid] DESCRIPTION
condom provides protection against System Transmitted Viruses (STVs) that may invade your system. Although the spread of such viruses across a network can only be abated by aware and cautious users, condom is the only highly effective means of preventing viruses from entering your system (see celibacy(1)). Any data passed to condom by the protected process will be blocked, as specified by the value of the -s option (see OPTIONS below). condom is known to defend against the following viruses and other malicious afflictions: o AIDS o Herpes Simplex (genital varieties) o Syphilis o Crabs o Genital warts o Gonhorrea o Chlamydia o Michelangelo o Jerusalem When used alone or in conjunction with pill(1), sponge(1), foam(1), and/or setiud(3), condom also prevents the conception of a child process. If invoked from within a synchronous process, condom has, by default, an 80% chance of preventing the external processes from becoming parent processes (see the -s option below). When other process contraceptives are used, the chance of preventing a child process from being forked becomes much greater. See pill(1), sponge(1), foam(1), and setiud(3) for more information. If no options are given, the current user's login process (as determined by the environment variable USER) is protected with a Trojan rough-cut latex condom without a reservoir tip. The optional ``processid'' argument is an integer specifying the process to protect. NOTE: condom may only be used with a hard disk. condom will terminate abnormally with exit code -1 if used with a floppy disk (see DIAG- NOSTICS below). OPTIONS
The following options may be given to condom: -b brand brands are as follows: trojan (default) ramses sheik goldcoin fourex -m material The valid materials are: latex (default) saranwrap membrane WARNING! The membrane option is not endorsed by the System Administrator General as an effective barrier against certain viruses. It is supported only for the sake of tradition. -f flavor The following flavors are currently supported: plain (default) apple banana cherry cinnamon licorice orange peppermint raspberry spearmint strawberry -r Toggle reservoir tip (default is no reservoir tip) -s strength strength is an integer between 20 and 100 specifying the resilience of condom against data passed to condom by the protected process. Using a larger value of strength increases condom's protective abilities, but also reduces interprocess communication. A smaller value of strength increases interprocess communication, but also increases the likelihood of a security breach. An extremely vigorous process or one passing an enormous amount of data to condom will increase the chance of condom's failure. The default strength is 80%. -t texture Valid textures are: rough (default) ribbed bumps lubricated (provides smoother interaction between processes) WARNING: The use of an external application to condom in order to reduce friction between processes has been proven in benchmark tests to decrease condom's strength factor! If execution speed is important to your process, use the ``-t lubricated'' option. DIAGNOSTICS
condom terminates with one of the following exit codes: -1 An attempt was made to use condom on a floppy disk. 0 condom exited successfully (no data was passed to the synchronous process). 1 condom failed and data was allowed through. The danger of transmission of an STV or the forking of a child process is inversely proportional to the number of other protections employed and is directly proportional to the ages of the processes involved. BUGS
condom is NOT 100% effective at preventing a child process from being forked or at deterring the invasion of a virus (although the System Administrator General has deemed that condom is the most effective means of preventing the spread of system transmitted viruses). See celibacy(1) for information on a 100% effective program for preventing these problems. Remember, the use of sex(1) and other related routines should only occur between mature, consenting processes. If you must use sex(1), please employ condom to protect your process and your synchronous process. If we are all responsible, we can stop the spread of STVs. AUTHORS and HISTORY The original version of condom was released in Roman times and was only marginally effective. With the advent of modern technology, condom now supports many more options and is much more effective. The current release of condom was written by Ken Maupin at the University of Washington (maupin@cs.washington.edu) and was last updated on 10/7/92. SEE ALSO
celibacy(1), sex(1), pill(1), sponge(1), foam(1), and setiud(3) EUNUCH Programmer's Manual CONDOM(1)
All times are GMT -4. The time now is 06:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy