I'am sorry if my explanation is completely illogical...but this is what I figured out ........pls inform me if my notion is completely wrong.....
In a system like Windoze
---->DLL--->EXE (RAM)---->Compiled but no check for size of compiled output.
In GNU/Linux OS
---->object/.so----->binary/daemon(RAM)---->Compiled and checked for size of compiled o/p.
And as for shell scripts, and rpm's which we blindly execute sometimes........pls do a md5 verification to check for trusted signatures........
So it's 98% safe to open mails on a linux system than any other system........these days a lots of executable stuff on the prowl.....
bothered abt bugs in the system......well the community is so alert that you'll definitely know abt it before the hacker knows it.........
hope this leads us somewhere,
bijucyborg
.On a sidenote : Guys what do think abt Bill gates
getting knighthood for >>Services to global enterprise<<<
__________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free web site building tool. Try it! http://webhosting.yahoo.com/ps/sb/
Sometime Today, BIJU KRISHNAN assembled some asciibets to say:
---->DLL--->EXE (RAM)---->Compiled but no check for size of compiled output.
In GNU/Linux OS
---->object/.so----->binary/daemon(RAM)---->Compiled and checked for size of compiled o/p.
It isn't clear what point you're trying to make here.
And as for shell scripts, and rpm's which we blindly execute sometimes........pls do a md5 verification to check for trusted signatures........
most shell scripts do not have md5 signatures attached. Even if they do, how will you verify that the signature has not been altered?
community is so alert that you'll definitely know abt it before the hacker knows it.........
if the hacker doesn't find out, then how will he fix it? I personally hope that the hacker is the first person to find out so that he can fix the bug before any one else finds it.
Philip