Idiot's Guide to Faking it with Jargon

The computer industry and it's infinite banks of acronyms and terse jargonese has given rise to the rhetoric technician; a special breed of entrepeneur who gets paid large sums of money to make erroneous and confounding statements using acronyms that strike fear into the heart of professionals. This is a white paper from an actual company that worked for an actual group of Dr.s (like degrees and all) who were doing actual research. The Dr.s actually hired them for a bit. Read....

The difference is that attaching a computer running UNIX on your network is inherently open, whereas a computer running Mac OS or Windows NT on your network is inherently closed. Much of the hacking of systems on the Internet is based on finding and exploiting flaws and bugs in the UNIX operating system. For example, under some versions of UNIX, if you send mail with the first line with more than 255 characters without a LF, any characters past the 256th would run as code with supervisor access. This allows you to send mail that could run code in the root of the computer! Another common attempt is to crash a login program which would then exit that account to the shell, giving you shell access in an otherwise captive account. Such problems simply don't exist on servers run under Mac OS and Windows NT. As there's no command shell to exit to, nor is there any way to send code over the link, there is no security problem with accounts. Even if a potential hacker were able to exit out of the FirstClass Server, the result would be that their link would instantly be terminated as it's FirstClass that's providing the link in the first place.