![]() |
2008-04-14
, 10:45
|
Posts: 3,841 |
Thanked: 1,079 times |
Joined on Nov 2006
|
#12
|
![]() |
2008-04-14
, 12:18
|
Posts: 244 |
Thanked: 10 times |
Joined on Jan 2007
|
#13
|
![]() |
2008-04-14
, 12:59
|
|
Posts: 868 |
Thanked: 474 times |
Joined on Oct 2007
@ Capital District, NY, USA
|
#14
|
Lets also look at it this way.
Coding is complex. The internet tablet is a custom kernel on an armel processor. A very very very very small nitch of the linux users out there. Some one would have to write, or compile the app to run, you would have to install it... its actually a much rarer thing than most people imagine.
![]() |
2008-04-14
, 14:35
|
Posts: 3,841 |
Thanked: 1,079 times |
Joined on Nov 2006
|
#15
|
![]() |
2008-04-14
, 15:40
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#16
|
![]() |
2008-04-14
, 18:20
|
Posts: 3,841 |
Thanked: 1,079 times |
Joined on Nov 2006
|
#17
|
![]() |
2008-04-14
, 18:48
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#18
|
Yep, if malicious software gets installed, no firewall or anything else would help.
I know Windows firewalls (at least the good ones) can specify not only port, but also application, and say "the browser can go out to port 80, any other app can't". And so on. This isn't easy to do on Linux or Unix. It wouldn't be that useful either, even if iptables could do it, because on Windows it's much more common that every application do their input/output directly, while on *nix you can often just communicate through the daemon or service that usually handles that kind of traffic (e.g. for sending email you almost never try to send data directly on port 25, instead you use the sendmail (or equivalent) program)).
Out of the box there's almost nothing listening to any TCP/IP or UDP port on the NIT, so someone breaking their way into your NIT isn't much of an issue. However, if you install something that happens to be a trojan there's very little you can do to avoid it doing whatever harm it wants. This is such a serious situation that the only thing that helps is "don't do that". On any platform.
![]() |
2008-04-14
, 19:00
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#19
|
I would say it's a lot easier than people say. All I need to do is make a new build of pidgin or firefox and post them here. I would have several hundred installs within a few days.
That said it's all about risk. I have a pre-school daughter. Do I fret about "sexual predators"? Not really, day to day I'm more worried about her falling down the stairs or running into the street. In the case of the NIT's there are much bigger fish to fry before I'm going to become worried about malware.
Oh and iptables can block by process, uid, gid, and other criteria. If it's blocking is not good enough it can shunt the connections through a userspace daemon to do more complex actions.
![]() |
2008-04-14
, 19:03
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#20
|
There is the built in linux firewall which is controlled by /sbin/iptables. Very powerful, and very difficult to configure, if you have never used it before. It is an excellent way to block tcp/udp ports.
I hope this helps,
Craig...
I hope this helps,
Craig...
N800, Think Outside Kbd, 8GB SDHC Card (OCZ, ext2), and 8GB SD Card (Patriot formatted as VFAT)
Zaurus SL-6000, IR Keyboard, 1GB SD Card