Ask them, I have no clueÂ
- if you know what you are doing, you can do the same thing with Windows, just that its not set-up the same way out of the box.
I like this quote:
The operating system is secure as the person using it.
(and the most secure system is one not connected to the internet and has no USB, Floppy, or CD-ROM's
)