Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Trivial Unix Architecture question Post 70588 by Neo on Monday 2nd of May 2005 08:57:16 AM
Old 05-02-2005
Quote:
Originally Posted by vibhor_agarwali
Hi,

I am becoming very curious as to why viruses attach only Windows system and not any UNIX and Linux.

Does that has to do something with the architecture or something else.
Yes, it has a lot to do with the architecture. Many viruses are transmitted because of the "closeness" between the Windows user interface and the operating system, Visual Basic exploits, etc, which are used by virus writers.
 

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

trivial awk question

i posted a reply the other day and needed an answer to this question while i was clarifyiing a few matter.. "how to compare to date variable in string format without having to compare word for word".. my reply was to try to use awk to compare the strings.. I wasn't quite sure if i remembered how... (2 Replies)
Discussion started by: moxxx68
2 Replies

2. UNIX for Dummies Questions & Answers

File Transfer that is not so trivial I guess

I have three computers A, B and C. To login to B and C I should use A because it has a SSH key. I don't have any other way of accessing these two computers. Now, if I need to transfer a file between B and C, I am unable to find a way that would work... because I don't know how to authenticate... (1 Reply)
Discussion started by: Legend986
1 Replies

3. Programming

A trivial XOR doubt in a program

Hi, I am trying to reverse a string using the following program utilizing the Exclusive OR bit operation: int main() { char str = "Quraish"; char *p = str, temp; char *q = str + strlen(str) - 1; while ( p != q ) { if (*p != *q) { *p ^= *q; *q ^= *p; *p ^= *q;... (1 Reply)
Discussion started by: royalibrahim
1 Replies

4. UNIX for Dummies Questions & Answers

UNIX box architecture

Hi Gurus, I am new to UNIX environment. We have our DataStage tool installed on UNIX box.We have Dev,test and Prod environments.The architecrue is as given below. Now my problem is I am not able to know what is meant by Physical name,Logical name,Cluster etc. also we need to do failover in case a... (5 Replies)
Discussion started by: pratyusha
5 Replies

5. Shell Programming and Scripting

Doubt in this trivial awk code

Hi, What is the difference in the following two awk one-liners? awk -F, '{s++} END {if (s == 1 && $4 > "09:10:00") {print $2, $4}}' f1 awk -F, '{s++} s == 1 && $4 > "09:10:00" {print $2, $4}' f1 Even though, all the 2nd column values have duplicate records, the first code does not give any... (4 Replies)
Discussion started by: royalibrahim
4 Replies

6. Programming

Trivial doubt about C function pointer

Hi, In the below C code, #include <stdio.h> void print() { printf("Hello\n"); } int main() { void (*f)() = (void (*)()) print; f(); (*f)(); } I wonder, how the syntaxes "f()" and "(*f)()" are treated as same without any error? Is this an improvement or ANSI/ISO... (1 Reply)
Discussion started by: royalibrahim
1 Replies

7. UNIX for Dummies Questions & Answers

A question about Unix Architecture.

I want to know the memory capacity and types of memories, processor and more... What kind of aplications this OS attends? Archicture/system classification (Hybrid, monolithic, multitasking, micro-kernel, layered, Another..? Explain it to me... I really need to understand and know that. Any... (3 Replies)
Discussion started by: AlissonManson
3 Replies

8. What is on Your Mind?

Forum Trivial Pursuit - New Computer Science and Mathematics Trivia for UNIX.com

I have added a new experimental "Computer Science and Mathematics Trivia - True or False" section in the discussions, currently under the tags box. In the future, I plan to Expand this feature to add more trivia categories from math, science and technology. Keep track of correct and... (20 Replies)
Discussion started by: Neo
20 Replies
CONDOM(1)                                                     General Commands Manual                                                    CONDOM(1)

NAME
condom - protection against viruses and prevention of child processes SYNOPSIS
condom [options] [processid] DESCRIPTION
condom provides protection against System Transmitted Viruses (STVs) that may invade your system. Although the spread of such viruses across a network can only be abated by aware and cautious users, condom is the only highly effective means of preventing viruses from entering your system (see celibacy(1)). Any data passed to condom by the protected process will be blocked, as specified by the value of the -s option (see OPTIONS below). condom is known to defend against the following viruses and other malicious afflictions: o AIDS o Herpes Simplex (genital varieties) o Syphilis o Crabs o Genital warts o Gonhorrea o Chlamydia o Michelangelo o Jerusalem When used alone or in conjunction with pill(1), sponge(1), foam(1), and/or setiud(3), condom also prevents the conception of a child process. If invoked from within a synchronous process, condom has, by default, an 80% chance of preventing the external processes from becoming parent processes (see the -s option below). When other process contraceptives are used, the chance of preventing a child process from being forked becomes much greater. See pill(1), sponge(1), foam(1), and setiud(3) for more information. If no options are given, the current user's login process (as determined by the environment variable USER) is protected with a Trojan rough-cut latex condom without a reservoir tip. The optional ``processid'' argument is an integer specifying the process to protect. NOTE: condom may only be used with a hard disk. condom will terminate abnormally with exit code -1 if used with a floppy disk (see DIAG- NOSTICS below). OPTIONS
The following options may be given to condom: -b brand brands are as follows: trojan (default) ramses sheik goldcoin fourex -m material The valid materials are: latex (default) saranwrap membrane WARNING! The membrane option is not endorsed by the System Administrator General as an effective barrier against certain viruses. It is supported only for the sake of tradition. -f flavor The following flavors are currently supported: plain (default) apple banana cherry cinnamon licorice orange peppermint raspberry spearmint strawberry -r Toggle reservoir tip (default is no reservoir tip) -s strength strength is an integer between 20 and 100 specifying the resilience of condom against data passed to condom by the protected process. Using a larger value of strength increases condom's protective abilities, but also reduces interprocess communication. A smaller value of strength increases interprocess communication, but also increases the likelihood of a security breach. An extremely vigorous process or one passing an enormous amount of data to condom will increase the chance of condom's failure. The default strength is 80%. -t texture Valid textures are: rough (default) ribbed bumps lubricated (provides smoother interaction between processes) WARNING: The use of an external application to condom in order to reduce friction between processes has been proven in benchmark tests to decrease condom's strength factor! If execution speed is important to your process, use the ``-t lubricated'' option. DIAGNOSTICS
condom terminates with one of the following exit codes: -1 An attempt was made to use condom on a floppy disk. 0 condom exited successfully (no data was passed to the synchronous process). 1 condom failed and data was allowed through. The danger of transmission of an STV or the forking of a child process is inversely proportional to the number of other protections employed and is directly proportional to the ages of the processes involved. BUGS
condom is NOT 100% effective at preventing a child process from being forked or at deterring the invasion of a virus (although the System Administrator General has deemed that condom is the most effective means of preventing the spread of system transmitted viruses). See celibacy(1) for information on a 100% effective program for preventing these problems. Remember, the use of sex(1) and other related routines should only occur between mature, consenting processes. If you must use sex(1), please employ condom to protect your process and your synchronous process. If we are all responsible, we can stop the spread of STVs. AUTHORS and HISTORY The original version of condom was released in Roman times and was only marginally effective. With the advent of modern technology, condom now supports many more options and is much more effective. The current release of condom was written by Ken Maupin at the University of Washington (maupin@cs.washington.edu) and was last updated on 10/7/92. SEE ALSO
celibacy(1), sex(1), pill(1), sponge(1), foam(1), and setiud(3) EUNUCH Programmer's Manual CONDOM(1)
All times are GMT -4. The time now is 08:03 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy