The traditional Unix Common Desktop Environment should satisfy long-time Unix users, though most people are likely to find it to be crude and dated. The GNU Network Object Model Environment is a modern desktop environment that strives for simplicity, similar to Mac OS. Gnome has all the features modern users expect in a desktop, though experts may be disappointed by the fact that many decisions are left out of the hands of the user. Experts are more likely to prefer the K. Desktop Environment, which provides a configuration switch for nearly everything that could be done in more than one way. KDE is the most popular desktop environment for Unix.
Windows 2000 offers only the default Windows user interface. The Windows shell is dated in comparison to Gnome or KDE. Though consistency and familiarity are beneficial, Windows lacks user-interface features like multiple window focus models and virtual desktops that are common to almost all Unix graphical environments. The Windows interface does offer several different color schemes and animated mouse cursors.
Windows and Solaris both offer similar technologies to assist physically impaired users in accessing and using the system. Such technologies include adjustable styles in the user interface, screen readers and magnifiers. Solaris comes with better built-in support for software-based assistive technologies, including on-screen keyboards and screen readers than Windows 2000 Server does.
Windows 2000 Server is licensed based on the number of processors and the number of users accessing the system at once. Additional processors or users result in additional fees. Solaris is now being offered free of charge. There are per-processor subscription fees for service and support, which are significantly lower than a Windows 2000 Server license. Standard and premium support packages include telephone support, for which Microsoft charges additional fees. Standard support for Windows 2000 Server products ends on June 30, 2005.
Sun currently provides support for six versions of Solaris, with full support available on three and no end of life date yet announced for two. Major components of Solaris are expected to be released under an open-source license, allowing users to modify the system. Merely viewing Windows source code legally is nearly impossible, and making changes is strictly forbidden.
The clear separation of components of Solaris gives it an inherent security advantage over Windows 2000 Server. Specific features further separate the two operating systems in the field of security. Access control lists in Windows 2000 allow administrators to express sophisticated permissions for access to files, but file permissions cannot express a complete security policy on a Windows server since many Windows APIs are not based on the use of files as an abstraction layer
Solaris supports similar access control lists, which provide for a more complete security policy on a system where nearly all operations are performed through file access. Solaris also supports role-based access controls, which allow for permissions based not only on the user account a process is running under, but also on what task, or role the user is currently performing. Role-based access controls allow the administrator to restrict potential damage from a security breach to the areas to which a given service requires access. For additional security, Solaris containers allow processes to run inside sealed areas of the system, with a network interface being the only way to communicate with the rest of the system. A process running inside a container is no more dangerous than if it were running on a different physical machine connected by a network. When containers are properly used, attacking one service to gain access to another becomes ineffectual.
Virus and worm outbreaks have affected Windows users for years, but self-spreading malware is rare in the Unix world. The SQL Slammer worm of 2003 crashed systems ranging from automatic teller machines to control systems is nuclear power plants. Microsoft likes to pretend that the proliferation of malware is due to the popularity of Windows, not anything having to do with its design. Worms, including the highly disruptive Nimda and Code Red have consistently plagued users of Microsoft's Internet Information Server, which has just over 20% of the web server market. Apache, which has nearly 70% has been relatively free of malware and has never had an outbreak on the scale of Nimda or Code Red. Malware authors may prefer to code for the most popular software, but only do so as long as it is convenient. The inherent security of a platform is the primary factor that determines the likelihood...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now