October 2005 Geoffrey Mainland and Matt Welsh

Total Page:16

File Type:pdf, Size:1020Kb

October 2005 Geoffrey Mainland and Matt Welsh O CTOBER 2005 VOLUME 30 NUMBER 5 THE USENIX MAGAZINE OPINION Musings RIK FARROW OSES FreeBSD 5 SMPng MICHAEL W. LUCAS Better Tools for Kernel Evolution, Please! MARC E. FIUCZYNSKI Solaris 10 Containers PETER BAER GALVIN SYSADMIN DNS-based Spam Rejection HOBBIT Finding Trojans for Fun and Profit BORIS LOZA ISPadmin: Embedded Hardware ROBERT HASKINS SECURITY Security Through Obscurity: A Review of a Few |of FreeBSD’s Lesser-Known Security Capabilities DAVI D MALONE Surviving DDoS Attacks SRI KANTH KANDULA NETWORKING Distributed, Adaptive Resource Allocation for Sensor Networks GEOFFREY MAINLAND AND MATT WELSH BOOK REVIEWS Book Reviews ELIZABETH ZWICKY AND ADAM TUROFF USENIX NOTES The USENIX Association Financial Report for 2004 ...and much more CONFERENCES Linux Kernel Developers Summit; International Workshop on Wireless Traffic Measurements and Modeling (WitMeMo ’05);Workshop on End-to-End, Sense and Respond Systems, Applications, and Services (EESR ’05); MobiSys 2005:The Third International Conference on Mobile Systems, Applications, and Services; HotOS X:Tenth Workshop on Hot Topics in Operating Systems;VEE ’05: First International Conference on Virtual Execution Environments; Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI ’05) The Advanced Computing Systems Association Upcoming Events ACM/IFIP/USENIX 6TH INTERNATIONAL 3RD SYMPOSIUM ON NETWORKED SYSTEMS MIDDLEWARE CONFERENCE DESIGN AND IMPLEMENTATION (NSDI ’06) NOVEMBER 28–DECEMBER 2, 2005, GRENOBLE, FRANCE Sponsored by USENIX, in cooperation with ACM SIGCOMM http://middleware05.objectweb.org and ACM SIGOPS MAY 8–10, 2006, SAN JOSE, CA, USA http://www.usenix.org/nsdi06 19TH LARGE INSTALLATION SYSTEM Paper titles and abstracts due: October 10, 2005 ADMINISTRATION CONFERENCE (LISA ’05) Final paper submissions due: October 17, 2005 Sponsored by USENIX and SAGE DECEMBER 4–9, 2005, SAN DIEGO, CA, USA 5TH SYSTEM ADMINISTRATION AND NETWORK http://www.usenix.org/lisa05 ENGINEERING CONFERENCE (SANE 2006) Organized by Stichting SANE and co-sponsored by Stichting NLnet, USENIX, and SURFnet 2ND WORKSHOP ON REAL, LARGE MAY 15–19, 2006, DELFT, THE NETHERLANDS DISTRIBUTED SYSTEMS (WORLDS ’05) http://www.sane.nl/sane2006 DECEMBER 13, 2005, SAN FRANCISCO, CA, USA Paper submissions due: October 24, 2005 http://www.usenix.org/worlds05 2006 USENIX ANNUAL TECHNICAL 3RD INTERNATIONAL IEEE SECURITY IN STORAGE CONFERENCE (USENIX ’06) WORKSHOP MAY 30–JUNE 3, BOSTON, MA, USA Sponsored by IEEE Computer Society Task Force on Information http://www.usenix.org/usenix06 Assurance (TFIA) in cooperation with IEEE Mass Storage Systems Paper submissions due: January 17, 2006 Technical Committee (MSSTC) and USENIX DECEMBER 13, 2005, SAN FRANCISCO, CA, USA http://www.ieeeia.org/sisw/2005 15TH USENIX SECURITY SYMPOSIUM (SECURITY ’06) JULY 31–AUGUST 4, VANCOUVER, B.C., CANADA 4TH USENIX CONFERENCE ON FILE AND http://www.usenix.org/sec06 STORAGE TECHNOLOGIES (FAST ’05) Paper submissions due: February 1, 2006 Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), and IEEE TCOS 7TH SYMPOSIUM ON OPERATING SYSTEMS DECEMBER 13–16, 2005, SAN FRANCISCO, CA, USA DESIGN AND IMPLEMENTATION (OSDI ’06) http://www.usenix.org/fast05 NOVEMBER 6–8, SEATTLE, WA, USA http://www.usenix.org/osdi06 Paper submissions due: April 24, 2006 7TH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (WMCSA 2006) Sponsored by IEEE Computer Society in cooperation with USENIX APRIL 6–7, 2006, SEMIAHMOO RESORT, WA, USA http://research.ihost.com/wmcsa2006/ Paper submissions due: October 1, 2005 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events OPINION 2 Musings RIK FARROW OPERATING SYSTEMS 4 FreeBSD 5 SMPng MICHAEL W. LUCAS 8 Better Tools for Kernel Evolution, Please! MARC E. FIUCZYNSKI 11 Solaris 10 Containers contents PETER BAER GALVIN SYSADMIN 15 DNS-based Spam Rejection HOBBIT 19 Finding Trojans for Fun and Profit BORIS LOZA 23 ISPadmin: Embedded Hardware ROBERT HASKINS SECURITY 27 Security Through Obscurity: A Review of a Few of FreeBSD’s Lesser-Known Security Capabilities DAVID MALONE 35 Surviving DDoS Attacks SRIKANTH KANDULA NETWORKING 40 Distributed, Adaptive Resource Allocation for Sensor Networks VOL. 30, NO. 5, OCTOBER 2005 GEOFFREY MAINLAND AND MATT WELSH EDITOR ;login: is the official BOOK REVIEWS Rik Farrow magazine of the [email protected] USENIX Association. 45 Book Reviews ELIZABETH ZWICKY AND ADAM TUROFF MANAGING EDITOR ;login: (ISSN 1044-6397) is Jane-Ellen Long published bi-monthly by the USENIX NOTES [email protected] USENIX Association, 2560 COPY EDITOR Ninth Street, Suite 215, 48 25 Years Ago Steve Gilmartin Berkeley, CA 94710. PETER H. SALUS [email protected] $85 of each member’s annual 49 SAGE Update dues is for an annual sub- PRODUCTION CHRIS PALMER Rob Carroll scription to ;login:. Subscrip- Casey Henderson tions for nonmembers are 49 USACO, the USA Computing Olympiad $115 per year. TYPESETTER ROB KOLSTAD Star Type Periodicals postage paid at 50 The USENIX Association Financial Report for [email protected] Berkeley, CA, and additional offices. 2004 USENIX ASSOCIATION 2560 Ninth Street, POSTMASTER: Send address CONFERENCE REPORTS Suite 215, Berkeley, changes to ;login:, California 94710 USENIX Association, 55 Linux Kernel Developers Summit Phone: (510) 528-8649 2560 Ninth Street, JONATHAN CORBET FAX: (510) 548-5738 Suite 215, Berkeley, CA 94710. 57 International Workshop on Wireless Traffic http://www.usenix.org http://www.sage.org ©2005 USENIX Association. Measurements and Modeling (WitMeMo ’05) USENIX is a registered trade- 60 Workshop on End-to-End, Sense and Respond mark of the USENIX Associa- Systems, Applications, and Services (EESR ’05) tion. Many of the designa- tions used by manufacturers 64 MobiSys 2005:The Third International and sellers to distinguish their Conference on Mobile Systems, Applications, products are claimed as trade- and Services marks. USENIX acknowl- edges all trademarks herein. 75 HotOS X:Tenth Workshop on Hot Topics in Where those designations ap- Operating Systems pear in this publication and USENIX is aware of a trade- 86 VEE ’05: First International Conference on mark claim, the designations Virtual Execution Environments have been printed in caps or initial caps. 92 Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI ’05) FOR THE PAST COUPLE OF MONTHS, I have become absorbed in operating sys- RIK FARROW tems. My quest began with some consult- ing regarding security features of the cur- rent Linux kernel, including SELinux, then plunged even deeper during the HotOS workshop. I do not pretend to be a kernel hacker, but I am very interested in what musings goes on with the design and implementa- Rik Farrow provides UNIX and Internet security con- tion of operating system software. sulting and training. He is the author of UNIX System Security and System Administrator’s Guide to System V and editor of the SAGE Short Topics in System Like some others, I had wondered what had hap- Administration series. pened to FreeBSD 4’s stellar performance when Free- [email protected] BSD 5 appeared. Instead of getting faster, FreeBSD was slower. If I had bothered digging deeper, I would have learned that this was the result of far-reaching changes in the FreeBSD kernel. Michael W. Lucas ex- plains these changes in his article, which in turn is based on a talk given by Robert Watson about modify- ing the kernel to support SMP (symmetric multipro- cessing). And perhaps by the time you read this col- umn, FreeBSD 6 will have appeared, ready to utilize the new multiprocessor cores that are popping up. Lucas explains just why the transition from single- threaded to multi-threaded kernel takes so long and is so hard to do right. I first understood the importance of the Big Giant Lock when I was reviewing an early multiprocessing server that used SPARC processors. I ran a simple benchmark that spawned additional processes, each of which ran an integer-intensive pro- gram. I tried my benchmark with one processor, then two, three, and, finally, four processors enabled, and the results astounded me (at the time). Adding pro- cessors does not in itself linearly improve perfor- mance. Enabling the fourth processor barely added a 15% improvement to the results. The Big Giant Lock ensures that only one process (or interrupt handler) can run in kernel space at a time, which devastates performance. The HotOS workshop (see the summaries in this issue) brought different surprises. I enjoyed the work- shop immensely, as much for the free time spent with attendees as for the talks. The lunchtime discussions have sparked one article already, in which Marc Fiuc- zynski makes a fervent plea for better methods for patching Linux kernels. You will also find a discussion of the Linux Kernel Developers Summit by Jonathan Corbet. Corbet, who has been summarizing the summits for years, has pro- vided a short overview for ;login: readers. And Peter Galvin explains Solaris 10 containers. Note that Sun bit the SMP revision bullet years ago, making it a 2 ;LO GIN: V OL. 30, NO. 5 leader in SMP OSes today. The concept of containers adds a powerful twist to Solaris, a useful VM architecture unlike others you may know about. On the security front, David Malone discusses security features of FreeBSD. As I read this, I found myself wishing that some of these appeared in Linux as well. But BSD-envy is nothing new. Srikanth Kandula explains Kill-Bots, based on a paper he presented at NSDI (see the summaries in the August issue of ;login:). You might note that instead of my usual musings, I have acted much more like an editor this time around. I apologize, but this issue is so packed with sum- maries and articles, I really didn’t have the space for me. You can expect that my column will appear much as it has in the past in the December issue of ;login:, with its focus on security.
Recommended publications
  • The Operational Aesthetic in the Performance of Professional Wrestling William P
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2005 The operational aesthetic in the performance of professional wrestling William P. Lipscomb III Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Communication Commons Recommended Citation Lipscomb III, William P., "The operational aesthetic in the performance of professional wrestling" (2005). LSU Doctoral Dissertations. 3825. https://digitalcommons.lsu.edu/gradschool_dissertations/3825 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. THE OPERATIONAL AESTHETIC IN THE PERFORMANCE OF PROFESSIONAL WRESTLING A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of Communication Studies by William P. Lipscomb III B.S., University of Southern Mississippi, 1990 B.S., University of Southern Mississippi, 1991 M.S., University of Southern Mississippi, 1993 May 2005 ©Copyright 2005 William P. Lipscomb III All rights reserved ii ACKNOWLEDGMENTS I am so thankful for the love and support of my entire family, especially my mom and dad. Both my parents were gifted educators, and without their wisdom, guidance, and encouragement none of this would have been possible. Special thanks to my brother John for all the positive vibes, and to Joy who was there for me during some very dark days.
    [Show full text]
  • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
    University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies.
    [Show full text]
  • New Concept of the Android Keystore Service with Regard to Security and Portability
    University of Bremen Department of Mathematics and Computer Science New concept of the Android keystore service with regard to security and portability. Master’s Thesis by Fritjof Bornebusch reviewed by Dr. Karsten Sohr Prof. Dr. Jan Peleska supervised by Dipl. Inf. Florian Junge 2016 Confirmation I hereby confirm that I wrote this master thesis on my own and that I have used only the indicated references, resources, and aids. In German: Hiermit bestätige ich, dass ich die vorliegende Masterthesis selbstständig verfasst, und keine anderen als die angegebenen Quellen und Hilfsmittel verwendet habe. Bremen, 1/13/2016 Fritjof Bornebusch “Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” – Martin Fowler – Bornebusch, Fritjof New concept of the Android keystore service with regard to security and portability. Master’s thesis, Department 3 - Mathematics / Computer Science University of Bremen, 2015 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0). To view a copy of this license, send an email to [email protected], visit http://creativecommons.org/licenses/by-nc-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, California, 94042, USA. Table of Contents Acknowledgements 7 List of Figures 9 List of Listings 10 Acronyms 13 Glossary 15 1 Introduction 19 2 Background 24 2.1 Android System Architecture . 24 2.1.1 Security-Enhanced Linux . 28 2.1.2 Capabilities . 31 2.2 Memory Vulnerabilities . 32 2.2.1 Buffer Overflow Protection . 33 2.2.2 Dead Store Elimination .
    [Show full text]
  • Z/OS Openssh User's Guide
    z/OS Version 2 Release 4 z/OS OpenSSH User's Guide IBM SC27-6806-40 Note Before using this information and the product it supports, read the information in “Notices” on page 503. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2020-11-16 © Copyright International Business Machines Corporation 2015, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this document...........................................................................................xiii Who should use this document?............................................................................................................... xiii z/OS information........................................................................................................................................xiii Discussion list...................................................................................................................................... xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv
    [Show full text]
  • Speeding up Correlation Search for Binary Data
    Speeding up Correlation Search for Binary Data Lian Duan and W. Nick Street [email protected] Management Sciences Department The University of Iowa Abstract Finding the most interesting correlations in a collection of items is essential for problems in many commercial, medical, and scientific domains. Much previous re- search focuses on finding correlated pairs instead of correlated itemsets in which all items are correlated with each other. Though some existing methods find correlated itemsets of any size, they suffer from both efficiency and effectiveness problems in large datasets. In our previous paper [10], we propose a fully-correlated itemset (FCI) framework to decouple the correlation measure from the need for efficient search. By wrapping the desired measure in our FCI framework, we take advantage of the desired measure’s superiority in evaluating itemsets, eliminate itemsets with irrelevant items, and achieve good computational performance. However, FCIs must start pruning from 2-itemsets unlike frequent itemsets which can start the pruning from 1-itemsets. When the number of items in a given dataset is large and the support of all the pairs cannot be loaded into the memory, the IO cost O(n2) for calculating correlation of all the pairs is very high. In addition, users usually need to try different correlation thresholds and the cost of processing the Apriori procedure each time for a different threshold is very high. Consequently, we propose two techniques to solve the efficiency problem in this paper. With respect to correlated pair search, we identify a 1-dimensional monotone prop- erty of the upper bound of any good correlation measure, and different 2-dimensional monotone properties for different types of correlation measures.
    [Show full text]
  • LIBRARIES Building a Global Information Assurance Program.Pdf
    Building a Global Information Assurance Program OTHER AUERBACH PUBLICATIONS The ABCs of IP Addressing Information Security Management Gilbert Held Handbook, 4th Edition, Volume 4 ISBN: 0-8493-1144-6 Harold F. Tipton and Micki Krause, Editors The ABCs of TCP/IP ISBN: 0-8493-1518-2 Gilbert Held Information Security Policies, ISBN: 0-8493-1463-1 Procedures, and Standards: Building an Information Security Guidelines for Effective Information Awareness Program Security Management Mark B. Desman Thomas R. Peltier ISBN: 0-8493-0116-5 ISBN: 0-8493-1137-3 Building a Wireless Office Information Security Risk Analysis Gilbert Held Thomas R. Peltier ISBN: 0-8493-1271-X ISBN: 0-8493-0880-1 The Complete Book of Middleware A Practical Guide to Security Engineering Judith Myerson and Information Assurance ISBN: 0-8493-1272-8 Debra Herrmann ISBN: 0-8493-1163-2 Computer Telephony Integration, 2nd Edition The Privacy Papers: William A. Yarberry, Jr. Managing Technology and Consumers, ISBN: 0-8493-1438-0 Employee, and Legislative Action Rebecca Herold Cyber Crime Investigator’s Field Guide ISBN: 0-8493-1248-5 Bruce Middleton ISBN: 0-8493-1192-6 Secure Internet Practices: Best Practices for Securing Systems in Cyber Forensics: A Field Manual for the Internet and e-Business Age Collecting, Examining, and Preserving Patrick McBride, Jody Patilla, Evidence of Computer Crimes Craig Robinson, Peter Thermos, Albert J. Marcella and Robert S. Greenfield, and Edward P. Moser Editors ISBN: 0-8493-1239-6 ISBN: 0-8493-0955-7 Securing and Controlling Cisco Routers Global Information Warfare: Peter T. Davis How Businesses, Governments, and ISBN: 0-8493-1290-6 Others Achieve Objectives and Attain Competitive Advantages Securing E-Business Applications and Andy Jones, Gerald L.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Scalar I3 and I6 Open Source Software Licenses
    Tape Automation Scalar i3 & Scalar i6, Firmware Release 1.1 (110G) Open Source Software Licenses Open Source Software (OSS) Licenses for: • Scalar i3 & Scalar i6 Firmware Release 1.1 (110G). The firmware/software contained in the Scalar i3 & Scalar i6 is an aggregate of vendor proprie- tary programs as well as third party programs, including Open Source Software (OSS). Use of OSS is subject to designated license terms and the following OSS license disclosure lists all open source components and applicable licenses that are part of the tape library firmware. All software that is designated as OSS may be copied, distributed, and/or modified in accordance with the terms and conditions of its respective license(s). Additionally, for some OSS you are entitled to obtain the corresponding OSS source files as required by the respective and applicable license terms. While GNU General Public License ("GPL") and GNU Lesser General Public Li- cense ("LGPL") licensed OSS requires that the sources be made available, Quantum makes all tape library firmware integrated OSS source files, whether licensed as GPL, LGPL or otherwise, available upon request. Please refer to the Scalar i3 & Scalar i6 Open Source License CD (part number 3-07787-01) when making such request. For contact information, see Getting More In- formation. LTO tape drives installed in the library may also include OSS components. For a complete list- ing of respective OSS packages and applicable OSS license information included in LTO tape drives, as well as instructions to obtain source files pursuant to applicable license requirements, please reference the Tape Automation disclosure listings under the Open Source Information link at www.quantum.com/support.
    [Show full text]
  • Here Is a Printable
    James Rosario is a film critic, punk rocker, librarian, and life-long wrestling mark. He grew up in Moorhead, Minnesota/Fargo, North Dakota going to as many punk shows as possible and trying to convince everyone he met to watch his Japanese Death Match and ECW tapes with him. He lives in Asheville, North Carolina with his wife and two kids where he writes his blog, The Daily Orca. His favorite wrestlers are “Nature Boy” Buddy Rogers, The Sheik, and Nick Bockwinkel. Art Fuentes lives in Orange County, Califonia and spends his days splashing ink behind the drawing board. One Punk’s Guide is a series of articles where Razorcake contributors share their love for a topic that is not traditionally considered punk. Previous Guides have explored everything from pinball, to African politics, to outlaw country music. Razorcake is a bi-monthly, Los Angeles-based fanzine that provides consistent coverage of do-it-yourself punk culture. We believe in positive, progressive, community-friendly DIY punk, and are the only bona fide 501(c)(3) non-profit music magazine in America. We do our part. One Punk’s Guide to Professional Wrestling originally appeared in Razorcake #101, released in December 2017/January 2018. Illustrations by Art Fuentes. Original layout by Todd Taylor. Zine design by Marcos Siref. Printing courtesy of Razorcake Press, Razorcake.org ONE PUNK’S GUIDE TO PROFESSIONAL WRESTLING ’ve been watching and following professional wrestling for as long as I can remember. I grew up watching WWF (World Wrestling IFederation) Saturday mornings in my hometown of Moorhead, Minn.
    [Show full text]
  • Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans
    Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication 1-6-2017 Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans Christian Norman Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Norman, Christian, "Narrative Change in Professional Wrestling: Audience Address and Creative Authority in the Era of Smart Fans." Dissertation, Georgia State University, 2017. https://scholarworks.gsu.edu/communication_diss/77 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. NARRATIVE CHANGE IN PROFESSIONAL WRESTLING: AUDIENCE ADDRESS AND CREATIVE AUTHORITY IN THE ERA OF SMART FANS by CHRISTIAN NORMAN Under the Direction of Nathan Atkinson, PhD ABSTRACT This dissertation project provides a methodological contribution to the field of critical rhetoric by positioning narrative theory as a powerful yet underutilized tool for examining the power dynamic between producer and consumer in a participatory media context. Drawing on theories of author and audience from rhetorical narratology, this study shows how producers of media texts provide rhetorical cues to audiences that allow them to reassert their power in the form of creative authority vis-à-vis consumers. The genre of professional wrestling serves as an ideal text for examining such power dynamics, as WWE has adapted to changing fan participatory behaviors throughout its sixty-year history. Focusing on pivotal moments in which WWE altered its narrative address to its audience in order to reassert its control over the production process, this study demonstrates the utility of narrative theory for understanding how creative authority shows power at work in media texts.
    [Show full text]
  • An Overview of Security in the Freebsd Kernel 131 Dr
    AsiaBSDCon 2014 Proceedings March 13-16, 2014 Tokyo, Japan Copyright c 2014 BSD Research. All rights reserved. Unauthorized republication is prohibited. Published in Japan, March 2014 INDEX P1A: Bold, fast optimizing linker for BSD — Luba Tang P1B: Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite 007 Michael Dexter P2A: LLVM in the FreeBSD Toolchain 013 David Chisnall P2B: NPF - progress and perspective 021 Mindaugas Rasiukevicius K1: OpenZFS: a Community of Open Source ZFS Developers 027 Matthew Ahrens K2: Bambi Meets Godzilla: They Elope 033 Eric Allman P3A: Snapshots, Replication, and Boot-Environments—How new ZFS utilities are changing FreeBSD & PC-BSD 045 Kris Moore P3B: Netmap as a core networking technology 055 Luigi Rizzo, Giuseppe Lettieri, and Michio Honda P4A: ZFS for the Masses: Management Tools Provided by the PC-BSD and FreeNAS Projects 065 Dru Lavigne P4B: OpenBGPD turns 10 years - Design, Implementation, Lessons learned 077 Henning Brauer P5A: Introduction to FreeNAS development 083 John Hixson P5B: VXLAN and Cloud-based networking with OpenBSD 091 Reyk Floeter INDEX P6A: Nested Paging in bhyve 097 Neel Natu and Peter Grehan P6B: Developing CPE Routers based on NetBSD: Fifteen Years of SEIL 107 Masanobu SAITOH and Hiroki SUENAGA P7A: Deploying FreeBSD systems with Foreman and mfsBSD 115 Martin Matuška P7B: Implementation and Modification for CPE Routers: Filter Rule Optimization, IPsec Interface and Ethernet Switch 119 Masanobu SAITOH and Hiroki SUENAGA K3: Modifying the FreeBSD kernel Netflix streaming servers — Scott Long K4: An Overview of Security in the FreeBSD Kernel 131 Dr. Marshall Kirk McKusick P8A: Transparent Superpages for FreeBSD on ARM 151 Zbigniew Bodek P8B: Carve your NetBSD 165 Pierre Pronchery and Guillaume Lasmayous P9A: How FreeBSD Boots: a soft-core MIPS perspective 179 Brooks Davis, Robert Norton, Jonathan Woodruff, and Robert N.
    [Show full text]
  • Mining Web User Behaviors to Detect Application Layer Ddos Attacks
    JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 985 Mining Web User Behaviors to Detect Application Layer DDoS Attacks Chuibi Huang1 1Department of Automation, USTC Key laboratory of network communication system and control Hefei, China Email: [email protected] Jinlin Wang1, 2, Gang Wu1, Jun Chen2 2Institute of Acoustics, Chinese Academy of Sciences National Network New Media Engineering Research Center Beijing, China Email: {wangjl, chenj}@dsp.ac.cn Abstract— Distributed Denial of Service (DDoS) attacks than TCP or UDP-based attacks, requiring fewer network have caused continuous critical threats to the Internet connections to achieve their malicious purposes. The services. DDoS attacks are generally conducted at the MyDoom worm and the CyberSlam are all instances of network layer. Many DDoS attack detection methods are this type attack [2, 3]. focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In The challenges of detecting the app-DDoS attacks can this paper, we propose a scheme based on web user be summarized as the following aspects: browsing behaviors to detect the application layer DDoS • The app-DDoS attacks make use of higher layer attacks (app-DDoS). A clustering method is applied to protocols such as HTTP to pass through most of extract the access features of the web objects. Based on the the current anomaly detection systems designed access features, an extended hidden semi-Markov model is for low layers. proposed to describe the browsing behaviors of web user. • Along with flooding, App-DDoS traces the The deviation from the entropy of the training data set average request rate of the legitimate user and uses fitting to the hidden semi-Markov model can be considered as the abnormality of the observed data set.
    [Show full text]