RISKS Volume 23

Total Page:16

File Type:pdf, Size:1020Kb

RISKS Volume 23 The Risks Digest Volume 23: Issue 1 Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Volume 23: Issue 1 Friday 7 November 2003 Contents Credit agencies sending our files abroad David Lazarus via Paul Saffo Crypto screwup: Sensitive Israeli missile test inadvertently broadcast Craig S. Bell A new risk for electronic voting Jeremy Epstein California Halts E-Vote Certification Kim Zetter via Monty Solomon Touch screen voting -- like Web site maintenance? William Nico Irish Labour Party urges suspension of e-voting until flaws addressed Patrick O'Beirne E-ZPass, UPS, and Newark Airport Susan Landau Microsoft puts a price on the heads of virus writers NewsScan Microsoft patches their patched patches Robert Bruce Thompson via Dave Farber Remember those jokes about "if AT&T built cars?" Daniel P.B. Smith http://catless.ncl.ac.uk/Risks/23.01.html (1 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 Duh! an electronic signature! Geoff Kuenning Paying employees is not rocket science Paul Robinson Another victim of the d__n bad-word filter! Adam Abrams REVIEW: "High Integrity Software", John Barnes Rob Slade Info on RISKS (comp.risks) Credit agencies sending our files abroad (via Dave Farber's IP) <Paul Saffo <[email protected]>> Fri, 07 Nov 2003 08:47:57 -0800 David Lazarus <[email protected]>, *San Francisco Chronicle*, 7 Nov 2003 [PGN-ed] sfgate.com/article.cgi?file=/c/a/2003/11/07/MNG4Q2SEAM1.DTL IP Archives at: http://www.interesting-people.org/archives/ interesting-people/ Two of the three major credit-reporting agencies (Equifax, Experian and TransUnion, each holding detailed files on about 220 million U. S. consumers) are in the process of outsourcing sensitive operations abroad, and a third may follow suit shortly. Privacy advocates say the outsourcing of files that include Social Security numbers and complete credit histories could lead to a surge in identity theft because U.S. laws cannot be enforced overseas. For their part, the credit agencies say the trend is a necessary cost-cutting move in light of new legislation that would allow all consumers to obtain free copies of their credit reports. (TransUnion http://catless.ncl.ac.uk/Risks/23.01.html (2 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 states that would cost them as much as $350 million a year.) "The application of American law in a foreign country is difficult, if not impossible," said Sen. Dianne Feinstein. "Therefore, the more companies move overseas, the less American law can control the uses for which personal data is put. And this can only represent an increasing threat to the privacy of our citizens." Sen. Barbara Boxer said she would ensure that the matter was raised as senators and House members completed changes to the Fair Credit Reporting Act. "This information is very significant, and I intend to make sure that the conferees who are finalizing the bill are aware of the *Chronicle*'s investigation in hopes that they will protect Americans from such outrageous invasions of privacy," Boxer said. Crypto screwup: Sensitive Israeli missile test inadvertently broadcast <"Craig S. Bell" <[email protected]>> Thu, 06 Nov 2003 22:38:47 GMT A security lapse by Israel Aircraft Industries apparently permitted an internal screening of a missile test to be accessible by satellite dish, unencrypted. http://www.haaretz.com/hasen/spages/357662.html [PGN-ed; also http://catless.ncl.ac.uk/Risks/23.01.html (3 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 http://www.newsday.com/news/nationworld/wire/ sns-ap-israel-missile-test,0,409849.story?coll=sns-ap- nationworld-headlines ] A new risk for electronic voting <Jeremy Epstein <[email protected]>> Thu, 6 Nov 2003 15:56:08 -0500 The RISKS of electronic voting have been discussed often enough in this forum that I won't repeat them further (cf. Rebecca Mercuri's piece in RISKS-22.96). Last week's election in Fairfax County (Virginia) had a new risk I haven't seen covered before. They use WinVote machines, made by Advanced Voting Solutions of Frisco, Tex. These are essentially Windows laptops with a touchscreen and an 802.11 wireless net. (More about that in another RISKS article one of these days.) Seems that during the election, at least eight of the machines failed (out of almost 1000 in use county-wide), and were taken out of the polling places to a central repair facility, and then brought back after some form of "repair" was made (a reboot at the polling place did not solve the problem). The seals were broken, but the voting officials in the precincts were told to resume using them. The result was a lawsuit by the Republican party http://catless.ncl.ac.uk/Risks/23.01.html (4 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 seeking to invalidate the votes from those machines. There aren't enough votes at stake that it would change any of the election results. Of course, the real problem is that without any sort of physical (paper) record, it's impossible to prove what really happened when the machines were being "repaired". In addition, the "hi tech" vote counting (which was supposed to occur by uploading the results from every precinct to a central computer over a dial-up line) overloaded the servers, and "More than half of precinct officials resorted to the old-fashioned telephone to call in their numbers or even drove the results to headquarters, elections officials said. A handful of precincts went back to paper ballots." The only thing that's surprising here is that the election officials were surprised. See http://www.washingtonpost.com/wp-dyn/articles/A1397-2003Nov5. html California Halts E-Vote Certification (Kim Zetter) <Monty Solomon <[email protected]>> Tue, 4 Nov 2003 19:16:59 -0500 Kim Zetter, Wired.Com, 3 Nov 2003 SACRAMENTO, California -- Uncertified software may have been installed on http://catless.ncl.ac.uk/Risks/23.01.html (5 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 electronic voting machines used in one California county, according to the secretary of state's office. Marc Carrel, assistant secretary of state for policy and planning, told attendees Thursday at a panel on voting systems that California was halting the certification process for new voting machines manufactured by Diebold Election Systems. The reason, Carrel said, was that his office had recently received "disconcerting information" that Diebold may have installed uncertified software on its touch- screen machines used in one county. He did not say which county was involved. However, Secretary of State spokesman Douglas Stone later told Wired News that the county in question is Alameda. ... http://www.wired.com/news/politics/0,1283,61068,00.html Touch screen voting -- like Web site maintenance? <William Nico <[email protected]>> Wed, 5 Nov 2003 09:02:54 -0800 (PST) The 4 Nov 2003 election in Pleasanton, CA had only a School Board choice on the ballot. However, the "Instructions", which comprised the opening page on the touch screen voting machine, were wholly focused in detail on the gubernatorial recall election of 7 Oct 2003! Irish Labour Party urges suspension of e-voting until flaws http://catless.ncl.ac.uk/Risks/23.01.html (6 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 addressed <"Patrick O'Beirne" <[email protected]>> Mon, 03 Nov 2003 19:39:55 +0000 http://www.labour.ie/press/detail.tmpl?SKU=20031103143251 Press Release Gilmore urges suspension of e-voting until flaws addressed Eamon Gilmore TD, Labour Spokesperson on Environment and Local Government Issued on Monday 03 November, 2003 The Labour Party has called for the suspension of plans to extend electronic voting until the e-voting system has been changed. The call was made today (Monday) by the Labour Party Spokesperson on Local Government and the Environment, Eamon Gilmore TD, at a Press Conference to launch a study of electronic voting system which was commissioned by the Labour Party. The report was prepared by two Labour Party members, Shane Hogan and Robert Cochran who are both experienced IT specialists. Deputy Gilmore said: "The report identifies a number of major flaws and deficiencies in the electronic voting system which the Government plans to extend to all areas of the country for the Local and European Elections next year. The major defects are:- * No integrated end-to-end test of the entire system has been conducted to date. The testing of the Integrated Election Software (IES) software was http://catless.ncl.ac.uk/Risks/23.01.html (7 of 21)2005-04-15 12:18:07 The Risks Digest Volume 23: Issue 1 carried out by the UK based Electoral Reform Society in 2002. However for this test the random mix feature of the IES was disabled. An integrated end-to-end test would generally be considered a key part of the implementation of any new technology. * Formal Methods were not used to prove the accuracy of the software. Formal Methods refer to a set of mathematically based techniques that are used in the development of safety-critical software such as airplane navigation or life support machines. The Department of the Environment has not made the actual source code publicly available but it is clear from the technology used and source code review that formal methods were not used and that therefore there are bugs in the software.

  1984
Recommended publications
  • Jül Spez 0467.Pdf
    EMULATING SIMULA IN TURBO PASCAL by Morton John Canty EMULATING SIMULA IN TURBO PASCAL M. J. Canty 1. lntroduction Although the computer language SIMULA /1,2/ is now over 20 years old it remains an excellent general purpose programming tool as well as a popular and powerfuf simulation language, the purpose for which it was originally developed. SIMULA is an extension of ALGOL 60, which it contains as a true subset, and its advanced concepts have served as a model for modern object-oriented languages such as SMALLTALK. The properties which make SIMULA especially suitable for simulation tasks are 1. a hierarchic cfass concept with inheritance, 2. sophisticated list handfing facilities and 3. concurrent programming capability. Of these three, the most essential property to allow for programming of discrete time simulation tasks is the third one, concurrent programming. By this is meant the ability to sustain parallel autonomous entities (called processes or co-routines) in memory. Allowing an arbitrary number of such processes to interact with each other along a time axis forms the basis of SIMULA's model for discrete time simulation. Although virtually all major programming languages have been implemented in one form or another on personal computers, SIMULA is a notable exception. Perhaps the main reason for this is that, while enjoying great popularity in Europe, SIMULA is not as well known on the North American continent. Pascal belongs to the same Afgol famify as SIMULA, and the dialect Turbo Pascal of the firm Borland Interna­ tional has become one bf the most wide spread high-levef languages for MS-DOS personal computers.
    [Show full text]
  • A Domain-Specific Embedded Language for Probabilistic
    AN ABSTRACT OF THE THESIS OF Steven Kollmansberger for the degree of Master of Science in Computer Science presented on December 12, 2005. Title: A Domain-Specific Embedded Language for Probabilistic Programming Abstract approved: Martin Erwig Functional programming is concerned with referential transparency, that is, given a certain function and its parameter, that the result will always be the same. However, it seems that this is violated in applications involving uncertainty, such as rolling a dice. This thesis defines the background of probabilistic programming and domain-specific languages, and builds on these ideas to construct a domain- specific embedded language (DSEL) for probabilistic programming in a purely functional language. This DSEL is then applied in a real-world setting to develop an application in use by the Center for Gene Research at Oregon State University. The process and results of this development are discussed. c Copyright by Steven Kollmansberger December 12, 2005 All Rights Reserved A Domain-Specific Embedded Language for Probabilistic Programming by Steven Kollmansberger A THESIS submitted to Oregon State University in partial fulfillment of the requirements for the degree of Master of Science Presented December 12, 2005 Commencement June 2006 Master of Science thesis of Steven Kollmansberger presented on December 12, 2005 APPROVED: Major Professor, representing Computer Science Director of the School of Electrical Engineering and Computer Science Dean of the Graduate School I understand that my thesis will become part of the permanent collection of Ore- gon State University libraries. My signature below authorizes release of my thesis to any reader upon request. Steven Kollmansberger, Author ACKNOWLEDGMENTS This thesis would not be possible without the ideas, drive and commitment of many people.
    [Show full text]
  • Harmless Advice∗
    Harmless Advice ∗ Daniel S. Dantas David Walker Princeton University Princeton University [email protected] [email protected] Abstract number of calls to each method: The what in this case is the com- when This paper defines an object-oriented language with harmless putation that does the recording and the is the instant of time aspect-oriented advice. A piece of harmless advice is a compu- just prior to execution of each method body. In aspect-oriented ter- what advice tation that, like ordinary aspect-oriented advice, executes when minology, the specification of to do is called and the when pointcut control reaches a designated control-flow point. However, unlike specification of to do it is called a . A collection of ordinary advice, harmless advice is designed to obey a weak non- pointcuts and advice organized to perform a coherent task is called aspect interference property. Harmless advice may change the termination an . behavior of computations and use I/O, but it does not otherwise in- Many within the AOP community adhere to the tenet that as- oblivious fluence the final result of the mainline code. The benefit of harmless pects are most effective when the code they advise is to advice is that it facilitates local reasoning about program behavior. their presence [11]. In other words, aspects are effective when a More specifically, programmers may ignore harmless advice when programmer is not required to annotate the advised code (hence- mainline code reasoning about the partial correctness properties of their programs. forth, the ) in any particular way. When aspect- In addition, programmers may add new pieces of harmless advice oriented languages are oblivious, all control over when advice to pre-existing programs in typical “after-the-fact” aspect-oriented is applied rests with the aspect programmer as opposed to the style without fear they will break important data invariants used by mainline programmer.
    [Show full text]
  • Poker, a Process-Interaction Simulator and Controller for Use in Collaborative Simulation
    POKer, a Process-Interaction Simulator and Controller for use in Collaborative Simulation Andriy Levytskyy, Eugene J.H. Kerckhoffs Delft University of Technology Faculty of Information Technology and Systems Mediamatica Department Zuidplantsoen 4, 2628 BZ Delft, The Netherlands e-mail: [email protected] and a subset of it, a process interaction world-view Keywords [20], which is of particular interest to us. This world- Discrete-Event simulation, Process-Interaction view gained its popularity due to the easiness of world-view, operational semantics, scripting mapping real-world processes into this formalism, languages, Python. and easiness of comprehending the essence of the process by a human. The above, as well as special application Abstract requirements for the simulation system we seek, In this paper we present the ideas and inspired us to develop our own special-purpose implementation of a small process-interaction kernel simulation software while trying to preserve its and cover its evolution from operational semantics connection to the formal background. In this paper of process-oriented simulation languages to the we present the ideas and implementation of a small current state of the kernel as (simulation) core of a process-interaction kernel and cover its evolution collaborative environment controller. from operational semantics of process oriented simulation languages to the current state of the kernel as (simulation) core of a collaborative 1. Introduction environment controller. Simulation as problem-solving methodology has been widely adopted in many practical domains. 2. View on the environment Users are free to select from a number of available general-purpose simulation software [14, 4] or, in 2.1.
    [Show full text]
  • Instalación Y Administración De Servicios De Correo Electrónico
    Servicios de red e internet Instalación y administración de servicios de correo electrónico Raquel Castellanos Crespo Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo INDICE Características del servicio de correo electrónico Elementos del servicio de correo electrónico -Agentes de correo electrónico. - Servidores de correo electrónico. Open relay y Smart host - Clientes de correo electrónico: entorno-DOS, gráficos y navegadores. - Direcciones, cuentas de correo y servidores DNS - Protocolos y servicios de descarga de correo: SMPT, ESMTP, POP, IMAP. Funcionamiento del servicio de correo electrónico Cuentas de correo, alias y buzones de correo Estructura de mensajes de correo electrónico - Cabecera, cuerpo, MIME Monitorización y registros del servicio de correo electrónico Servicio de correo electrónico vía web Correo seguro - Firma digital y cifrado de mensajes Veracidad del correo - Correo basura ("SPAM”) fraude, engaño, cadenas y virus informáticos 2 Servicios de red e internet | Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo Características del servicio de correo electrónico Correo electrónico (correo-e, conocido también como e-mail ), es un servicio de red que permite a los usuarios enviar y recibir mensajes y archivos rápidamente (también denominados mensajes electrónicos o cartas electrónicas) mediante sistemas de comunicación electrónicos. Principalmente se usa este nombre para denominar al sistema que provee este servicio en Internet, mediante el protocolo SMTP, aunque por extensión también puede verse aplicado a sistemas análogos que usen otras tecnologías. Por medio de mensajes de correo electrónico se puede enviar, no solamente texto, sino todo tipo de documentos digitales.
    [Show full text]
  • Writing Cybersecurity Job Descriptions for the Greatest Impact
    Writing Cybersecurity Job Descriptions for the Greatest Impact Keith T. Hall U.S. Department of Homeland Security Welcome Writing Cybersecurity Job Descriptions for the Greatest Impact Disclaimers and Caveats • Content Not Officially Adopted. The content of this briefing is mine personally and does not reflect any position or policy of the United States Government (USG) or of the Department of Homeland Security. • Note on Terminology. Will use USG terminology in this brief (but generally translatable towards Private Sector equivalents) • Job Description Usage. For the purposes of this presentation only, the Job Description for the Position Description (PD) is used synonymously with the Job Opportunity Announcement (JOA). Although there are potential differences, it is not material to the concepts presented today. 3 Key Definitions and Concepts (1 of 2) • What do you want the person to do? • Major Duties and Responsibilities. “A statement of the important, regular, and recurring duties and responsibilities assigned to the position” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/classifierhandbook.pdf • Major vs. Minor Duties. “Major duties are those that represent the primary reason for the position's existence, and which govern the qualification requirements. Typically, they occupy most of the employee's time. Minor duties generally occupy a small portion of time, are not the primary purpose for which the position was established, and do not determine qualification requirements” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/positionclassificationintro.pdf • Tasks. “Activities an employee performs on a regular basis in order to carry out the functions of the job.” SOURCE: https://www.opm.gov/policy-data-oversight/assessment-and-selection/job-analysis/job_analysis_presentation.pdf 4 Key Definitions and Concepts (2 of 2) • What do you want to see on resumes that qualifies them to do this work? • Competency.
    [Show full text]
  • Comparative Programming Languages CM20253
    We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist And there are many more factors we could talk about in making choices of language The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design The End There are many languages out there, both general purpose and specialist We have briefly covered many aspects of language design And there are many more factors we could talk about in making choices of language Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages And then the interopability of languages becomes important For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project For example, can you easily join together code written in Java and C? The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important The End Or languages Often a single project can use several languages, each suited to its part of the project And then the interopability of languages becomes important For example, can you easily
    [Show full text]
  • Answers to Selected Exercises
    Programming Languages - Principles and Practice 2nd Edition by Kenneth C. Louden Thomson Brooks/Cole 2002 Answers to Selected Exercises Copyright Kenneth C. Louden 2002 Chapter 1 1.2. (a) function numdigits(x: integer): integer; var t,n: integer; begin n := 1; t := x; while t >= 10 do begin n := n + 1; t := t div 10; end; numdigits := n; end; (c) numdigits x = if x < 10 then 1 else numdigits(x / 10) + 1 (e) function numdigits(x: Integer) return Integer is t: Integer := x; n: Integer := 1; begin while t >= 10 loop n := n + 1; t := t / 10; end loop; return n; end numdigits; (g) class NumDigits { public static int numdigits(int x) { int t = x, n = 1; while (t >= 10) { n++; t = t / 10; } return n; } } Kenneth C. Louden Programming Languages – Principles and Practice 2nd Ed. Answers - 2 1.5. (a) The remainder function, which we shall write here as % (some languages use rem or remainder), is defined by the integer equation a = (a / b) * b + a % b. The modulo function, which we shall write here as mod (some languages use modulo) is defined by the properties 1. a mod b is an integer between b and 0 not equal to b, and 2. there exists an integer n such that a = n * b + a mod b. When both a and b are non-negative, it can be shown that a % b = a mod b. But when either (or both) of a and b are negative these definitions can produce different results. For example, –10 % 3 = –1, since – 10 / 3 = –3 and –3 * 3 – 1 = –10.
    [Show full text]
  • M. Craig Weaver Society for Worldwide Interbank Financial
    M. Craig Weaver 106 Lakewood Drive Coatesville, PA 19320 (484) 712-0479 [email protected] S UMMARY Software Engineering professional with extensive experience in the design and development of system networking software and layered network architectures. A team-oriented communicator with the ability to solve complex problems using strong analytical skills. Effectively analyzed, designed and developed global networking software products on platforms ranging from micro, server, and mid-range to mainframe computers. Core strengths: • Software design, specification, and programming • Team Management • Software Quality Assurance Testing • Network troubleshooting and problem solution • Software problem analysis and solution • Burroughs Network Architecture expert • Complex protocol design and implementation • Networking and layered network architectures T E C H N I C A L S KILLS LANGUAGES JavaScript, C++, C, ALGOL, FORTRAN, HTML, Intel Assembler, Pascal, and others. PLATFORMS UNIX Systems; Microsoft Windows based systems (WINNT/WIN2000/WINXP); Unisys A-Series; Unisys V-Series; Unisys Clearpath; Unisys ES7000; Burroughs Large Systems; Burroughs Medium systems; Intel Processor based communications processor cards; Burroughs CP9500/B900. P ROFESSIONAL E XPERIENCE Society for Worldwide Interbank Financial Telecommunication (SWIFT) 2008 – 2014 International Member Owned Banking Cooperative Manassas, Virginia SENIO R SOFTWARE ENG INEER – CONTRACT FIN Renewal Project – Moving the SWIFT financial application software from Unisys machines (ALGOL) to HP UNIX machines (C++) • Tested ALTOS conversion tool. Created test cases from canonical ALGOL forms, converting them using ALTOS, then comparing the ALGOL and C++ test results. Diagnosed discrepancies and either designed solutions or required changes to the tool. • Converted Unisys ALGOL into UNIX C++ code. Tested, debugged and maintained the converted C++ code.
    [Show full text]
  • Sail Tutorial
    I i Stanford Artificial Intelligence Laboratory October 1976 Memo AIM-290 Computer Science Department Report No. STAN-B-760575 SAIL TUTORIAL Length: 19 ft. I HEADBOARD &y Beam: 6 ft. 6 in. / Draft: 4 ft. llY2 in. ;’ /: Weight: 700 Ibs. minimum / - ,;’ it JUMPER STRUTS .i’ BA-ITEN POCKET <~>hI . f I . / . : ~ / ..I . ! '\ t : i : MAINSAIL .L%.. i b; SPREADER JIBSTAY .> ‘--~ MAST - BACKSTAY - . ,RDS SHROUDS CENTERBOARD TRUNK &‘ ,:- CENTERBOARD 4 Research sponsored by National Institutes of Health and Advanced Research Projects Agency ARPA Order No. 2494 COMPUTER SCIENCE DEPARTMENT Stanford University St anford Artificial Intelligence Laboratory October 1976 Memo AIM-290 Computer Science Department Report No. STAN-G-76-575 . SAIL TUTORIAL bY Nanoy W. Smith SUMEX-AIM Computer Project Department of Genetic6 Stanford University Medic&l Center ABSTRACT This TUTORIAL is designed for a beginning user of Sail, an ALGOL-like language for the PDP 10. The first part covers the basic statements and expressions of the language; remaining topics include macros, records, conditional compilation, and input/output. Detailed examples of Sail programming are included throughout, and only a mini,mum of programming background is assumed. This -manual was prepared as part of the SUMEX-AIM computing resoutce supported by the Biotechdogy Resources Program of the National Institutes of Health under grant RR- . 00735. Printing and preparation for publication were supported by ARPA under Contract M DA903076-C-0206. The views and conclusions contained in this document are those of the author(s) and should not be interpreted as necessarily representing the oficial policies, either expressed or implied, of Stanford *University, NIH, ARPA, or the V.
    [Show full text]
  • Introduction to Unix: Ftp://Wks.Uts.Ohio-State.Edu/Unix Course/Unix Book.Ps And
    UNIX System Administration Frank G. Fiamingo [email protected] University Technology Services The Ohio State University September 23, 1998 1991-1998 University Technology Services, The Ohio State University, Baker Systems Engineering Building, 1971 Neil Avenue, Columbus, OH 43210. All rights reserved. Redistribution and use, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions must retain the above copyright notice, this list of conditions, and the following disclaimer. 2. Neither the name of the University nor the names of its contributors may be used to endorse or promote products or services derived from this document without specific prior written permission. THIS PUBLICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. THIS PUBLICATION MAY INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. UNIX is a registered trademark of The Open Group. Sun, SunOS, Solaris, SPARC, NFS, NIS, NIS+, JumpStart, OpenWindows, Sunview and SunInstall are trademarks or registered trademarks of Sun Microsystems, Inc. Ultrix, Digital UNIX and DEC are trademarks of Digital Equipment Corporation. HP-UX is a trademark of Hewlett-Packard Co. IRIX is a trademark of Silicon Graphics, Inc. AIX is a trademark of International Business Machines, Inc. AT&T is a trademark of American Telephone and Telegraph, Inc. GNU is a trademark of the Free Software Foundation. X Window System is a trademark of Massachusetts Institute of Technology. Ethernet is a registered trademark of Xerox Corporation. Netscape is a copyright of Netscape Communications Crop. Mosaic is a copyright of the National Center for Supercomputing Applications at the University of Illinois, Urbana-Champaign. All other products mentioned are trademarks of their respective owners.
    [Show full text]
  • Grundkurs Raditex AB Göran Hasse
    Unix Grundkurs Raditex AB Göran Hasse april 1996 PREFACE.TXT G Hasse - Kap 0 Sida 1 - Copyright (c) 1995 Raditex AB I sin strävan att göra nyttig och praktisk kursdokumentation försöker Raditex AB Utbildning ständigt att förbättra dokumentationen. Vi gör en tydlig skillnad mellan facklitteratur och kursdokumentation inom området. Facklitteratur måste vara komplett samt ge en allmän översikt över ett större område. Kursdokumentationen ska belysa det- ta område samt vara specifik. Speciellt ska kursdokumentationen spegla den praktiska vardagen man möter när man arbetar inom ett specifikt område. Detta innebär att kursdokumentation presenterar verkliga konfigura- tionsfiler och ger mängder av praktiska tips och ideer. GPL - © - 1998 - Kap 0 Sida 2 - G Hasse INDEX.TXT INNEHÅLLSFÖRTECKNING ============================ Introduktion 0 En introduktion till öppna system 1 En presentation av Raditex 2 Introduktion om Unix och vad Unix är 3 Vad kostar Unix 4 Unix som skiktat operativsystem 5 Vad vi ska lära oss om Unix-kommunikation 6 Definitionen av öppna system 7 Historien om hur Unix kom till 8 Hjälp i Unix 9 Manualen - 1 10 Manualen - 2 11 Manualen - 3 12 Online Help 13 Hjälp i program Kapitel 1 Att logga in 0 Vad innebär det att logga in 1 Vad som händer vid inloggningen 2 Vilka program används 3 Gemensam inloggningsfil 4 Hur du byter password 5 Hur du loggar ut 6 Övningar: Att logga in och ut 7 Lösningar: Att logga in och ut Kapitel 2 Textredigering 0 Editering av text 1 Editorn vi 1 2 Editorn vi 2 3 Editorn vi 3 4 Editorn vi 4 5 Editorn vi 5
    [Show full text]