Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Help with a report on Unix and Win 2000

  • 30-01-2002 1:35pm
    #1
    Registered Users, Registered Users 2 Posts: 96 ✭✭


    Hi Everyoone, I am in the middle of writing a report on Unix and Win 2000 and I was wondering if anyone had any input, documents or handy links I ccould use,

    The Title is:

    Compare And Contrast Win2000 and Unix under the following headings:

    Topics System Administratiion
    System Monitoring
    Networking
    Security

    Any help would be much appreciated!!


Comments

  • Registered Users, Registered Users 2 Posts: 6,265 ✭✭✭MiCr0


    google will sort that quick smart


  • Closed Accounts Posts: 1,026 ✭✭✭sisob


    on the subject of security there is the obvious point of how quickly potential security threats are found when you have the source code.

    a good example is when a piece of software X which had been closed source for years was released with source, a years old security hole was fixed. somone else might remember what piece of software it was.

    there should be loads of evidence you can cite about how closed source systems are security nightmares.

    if you want a balanced arguement you can also say that if a hacker finds a flaw in the source before an "hounourable citizen" there is a security risk. but personally i think that this isnt a very strong arguement as the hole would be closed before major damage is likely to have occured.

    when you have the source code most security problems are likely to be found during beta testing - unlike closed source when the majority of problems are found when your web sever starts professing alegence to the "l33t haxors of the north" ;-)

    i could write pages on how much better open source is - pitty my leaving cert english teacher wouldnt accept it as an essay


  • Closed Accounts Posts: 3,859 ✭✭✭logic1


    Do a quick search for "security through obscurity" it should turn up quite a few topics.

    .logic.


Advertisement