A Technical Summary

Total Page:16

File Type:pdf, Size:1020Kb

A Technical Summary A Technical Summary Table A.1. Kerberos administrative ACL (MIT) Allow Deny Operation a A Add principals or policies d D Delete principals or policies m M Modify principals or policies c C Change passwords i I Inquiry the database l L List principals or policies s S Set key for principals * or x Allow all privileges Table A.2. Kerberos kadmin password policies (MIT) Option Meaning -history Minimum count of unusable old passwords -maxlife Maximum allowed lifetime -minclasses Minimum character classes -minlength Minimum password length -minlife Minimum lifetime 380 A Technical Summary Table A.3. LDAP access control list levels Level Privilege Coding Explanation none =0 No access at all auth =x Permits authentication attempt compare =cx Permits comparison search =scx Permits search filter application read =rscx Permits search result inspection write =wrscx Permits modification or deletion Table A.4. The OpenAFS access control list attributes Permission Meaning l List contents (lookup) i Create new files or directories (insert) d Delete files or directories a Change ACL attributes of directories (administer) r Read contents of files w Modify contents of files (write) k Lock files for reading read Equivalent to rl write Equivalent to rlidwk (no administrative rights) all Equivalent to rlidwka none Remove all ACL permissions Table A.5. The OpenAFS @sys names (excerpt) @sys Architecture alpha dux40 Digital UNIX 4 on an Alpha alpha dux50 Digital UNIX 5 on an Alpha i386 linux24 Linux Kernel 2.4 on Intel and compatible i386 linux26 Linux Kernel 2.6 on Intel and compatible i386 nt40 Microsoft Windows NT and later on Intel and compatible ppc darwin70 Apple MacOS X 10.3 on a PowerPC Macintosh ppc darwin80 Apple MacOS X 10.4 on a PowerPC Macintosh ppc darwin90 Apple MacOS X 10.5 on a PowerPC Macintosh rs aix52 IBM AIX 5.2 on a pSeries rs aix53 IBM AIX 5.3 on a pSeries sgi 65 SGI Irix 6.5 on a MPIS x86 darwin80 Apple MacOS X 10.4 on an Intel Macintosh x86 darwin90 Apple MacOS X 10.5 on an Intel Macintosh A Technical Summary 381 Table A.6. New OpenAFS extensions (excerpt) Command Option or Subcommand Comment afsd -afsdb DB lookup in DNS -backuptree Prefer backup volumes -dynroot Construct root dynamically -fakestat Avoid blocking ls for cross-cell mounts -fakestat-all Avoid blocking ls for all mounts -nomount Do not mount /afs fs getcalleraccess Show context permissions getcrypt Show encryption flag getfid Show file location listaliases Show cell aliases newalias Set new cell alias rxstatpeer Rx peer statistics rxstatproc Rx process statistics setcbaddr Set call back address setcrypt Set encryption flag vos changeloc Set new RW location clone Make a volume clone convertROtoRW Convert RO volume to RW copy Make a volume copy offline Set volume offline (hidden from help) online Set volume online (hidden from help) setfields Set information fields shadow Make a shadow volume size Show size information Table A.7. OpenAFS 1.4.2 characteristics (excerpt) Feature Value Limitation Access Control List Maximum 20 entries per directory BOS Server Optionally restricted mode Cache Size Gigabyte order of magnitude possible Data Encryption Optionally with fcrypt() Directory Entries For short file names maximal about 64000 Clone DB Servers Together with database servers, up to 20 Database Servers Minimum 1, recommended 3 or 5, maximum 8 File Server Type namei, iname, optional accelerated start File Size More than 2GB possible (for Windows in 1.5 series) Group Membership Optionally other groups allowed Kerberos Support Moving from Kerberos IV to V Partitions Up to 255 /vicepX per file server Size Unit Kilobyte Time Skew Allowed Up to 10 minutes Volume Name Maximum 22 characters Volume Sites Up to 13, hence at most 11 RO sites Volume Size Theoretically up to Terabytes (OS-dependent) Volume Types RW, RO, backup, clone 382 A Technical Summary Table A.8. Brief OpenAFS terminology Name Meaning # Normal mount point % Force RW volume .backup Backup volume extension .readonly RO volume extension apropos In most commands available help In most commands available BosConfig Server configuration for bos CellAlias Aliases for cells CellServDB List of DB servers for cells KeyFile Server keytab file NetInfo IP addresses to use NetRestrict IP addresses not to use ThisCell Name of the local cell UserList AFS administrative user (for a server) Table A.9. AFS and Kerberos/OpenAFS AFS OpenAFS bos addkey asetkey add bos listkeys asetkey list bos removekey asetkey delete kas kadmin kaserver fakeka, ka-forwarder klog aklog uss Table A.10. Variable substitution in the Samba configuration file (excerpt) Variable Substitution %D Domain or workgroup name for the current user %h Internet host name of the Samba server %L NetBIOS Samba server name %m NetBIOS client name %M Internet host name of the client %S Current requested service name %U Session username as indicated by the client A Technical Summary 383 Table A.11. Samba account flags Flag Description D Disabled account H Account requires a home directory I Inter-domain account trust L The account has been locked M A Microsoft Network Service (MSN) account N No password is required S Server trust account T A temporarily duplicated account U Normal user account W Workstation trust account X Password does not expire Table A.12. Apache SSL options (excerpt) Option Meaning SSLCACertificateFile The CA public certificate file SSLCARevocationFile The optional revoked certificates list SSLCertificateFile The web server public certificate file SSLCertificateKeyFile The web server private key file SSLCipherSuite Enforces encryption methods for SSL negotiations SSLEngine Enable or disable SSL/TLS SSLProtocol Configures allowed SSL protocols SSLVerifyClient Require the verification of the client’s certificate References [Ait05] Ronald G. F. Aitchison. Pro DNS and BIND. Apress, 2005. [AL06] Paul Albitz and Cricket Liu. DNS and BIND. O’Reilly, 2006. 5th Edition. [Bau05] Michael D. Bauer. Linux Server Security. O’Reilly, 2005. 2nd Edition. [BC02] Daniel P. Bovet and Marco Cesati. Understanding the Linux Kernel. O’Reilly, 2002. 2nd Edition. [BM06] Heiko Bauke and Stephan Mertens. Cluster Computing. Springer, 2006. German. [BSB05] Daniel J. Barret, Richard E. Silverman, and Robert G. Byrnes. SSH, The Secure Shell: The Definitive Guide. O’Reilly, 2005. 2nd Edition. [Buc03] W. J. Buchanan. The Complete Handbook of the Internet. Springer, 2003. [Cam98] Richard Campbell. Managing AFS: The Andrew File System. Prentice Hall, 1998. [Car03] Gerald Carter. LDAP System Administration. O’Reilly, 2003. [Den03] Kyle D. Dent. Postfix: The Definitive Guide. O’Reilly, 2003. [DHS06] Rolf Dietze, Tatjana Heuser, and J¨org Schilling. OpenSolaris f¨ur Anwen- der, Administratoren und Rechenzentren. Springer, 2006. German. [Don06] Taylor Dondich. Network Monitoring with Nagios. O’Reilly, 2006. [Fou95] Open Software Foundation. OSF DCE DFS Administration Guide and Reference. Prentice Hall, 1995. Release 1.1. [GA05] Peter H. Ganten and Wulf Alex. Debian GNU/Linux - PowerPack. Springer, 2005. 2nd Edition, German. [Gar03] Jason Garman. Kerberos: The Definitive Guide. O’Reilly, 2003. [Has02] Jonathan Hassell. RADIUS: Securing Public Access to Private Resources. O’Reilly, 2002. [Jac05] Tom Jackiewicz. Deploying OpenLDAP. Apress, 2005. [KHP05] Yanek Korff, Paco Hope, and Bruce Potter. Mastering FreeBSD and OpenBSD Security. O’Reilly, 2005. [KP05] Michael Kruckenberg and Jay Pipes. Pro MySQL. Apress, 2005. [LL02] Ben Laurie and Peter Laurie. Apache: The Definitive Guide.O’Reilly, 2002. 3rd Edition. [Luc06] Michael W. Lucas. PGP & GPG. No Starch Press, 2006. [McC04] Bill McCarty. SELinux: NSA’s Open Source Security Enhanced Linux. O’Reilly, 2004. [MM00] Dianna Mullet and Kevin Mullet. Managing IMAP. O’Reilly, 2000. 386 References [Mob04] Tony Mobily. Hardening Apache. Apress, 2004. [MS05] Neil Matthews and Rick Stones. Beginning Databases with PostgreSQL: From Novice to Professional. Apress, 2005. 2nd Edition. [PHS03] Josef Pieprzyk, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. Springer, 2003. [Pre07] W. Curtis Preston. Backup & Recovery. O’Reilly, 2007. [Ran04] Kyle Rankin. Knoppix Hacks. O’Reilly, 2004. [ROC06] Kyle Rankin, Jonathan Oxer, and Bill Childers. Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux. O’Reilly, 2006. [Roo05] Garrett Rooney. Practical Subversion. Apress, 2005. [Ryb05] Peter Rybaczyk. Expert Network Time Protocol: An Experience in Time with NTP. Apress, 2005. [RYK02] George Reese, Randy J. Yarger, and Tim King. Managing & Using MySQL. O’Reilly, 2002. 2nd Edition with Hugh E. Williams. [SEL01] Hal Stern, Mike Eisler, and Ricardo Labiaga. Managing NFS and NIS. O’Reilly, 2001. 2nd Edition. [Shi05] Chris Shiflett. Essential PHP Security. O’Reilly, 2005. [Slo04] Joseph D. Sloan. High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI. O’Reilly, 2004. [SMM05] Jared Smith, Jim Van Meggelen, and Leif Madsen. Asterisk: The Future of Telephony. O’Reilly, 2005. [ST05] Michael Stahnke and John Traenkenschuh. Pro OpenSSH. Apress, 2005. [TECB03] Jay Ts, Robert Eckstein, and David Collier-Brown. Using Samba. O’Reilly, 2003. 2nd Edition. [Ves03] Jennifer Vesperman. Essential CVS. O’Reilly, 2003. [VMC02] John Viega, Matt Messier, and Pravir Chandra. Network Security with OpenSSL: Cryptography for Secure Communications. O’Reilly, 2002. [vT05] Henk C. A. van Tilborg, editor. Encyclopedia of Cryptography and Secu- rity. Springer, 2005. [Wai04] Peter Wainwright. Pro Apache. Apress, 2004. 3rd Edition. [WD02] John C. Worsley and Joshua D. Drake. Practical PostgreSQL. O’Reilly, 2002. [WH05] Chris Wolf and Erik M. Halter. Virtualization. Apress, 2005. Web Resources 1. Adaptive Technology Resource Centre. Learning Content Management System. http://www.atutor.ca/. 2. Alexander Enzmann. Persistence of Vision Raytracer. http://www.povray.org/. 3. Amnon Barak. MOSIX Grid and Cluster Management. http://www.mosix.org/. 4. Apache Software Foundation. Apache HTTP Server. http://httpd.apache.org/. 5. Apache Software Foundation. SpamAssassin Spam Filter. http://spamassassin.apache.org/. 6. Apple Computer, Inc. Mac OS X Operating System. http://www.apple.com/macosx/. 7. Argonne National Laboratory. Message Passing Interface. http://www-unix.mcs.anl.gov/mpi/.
Recommended publications
  • Technical and Legal Approaches to Unsolicited Electronic Mail, 35 USFL Rev
    UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 1-1-2001 Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001) David E. Sorkin John Marshall Law School, [email protected] Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Computer Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001). https://repository.law.uic.edu/facpubs/160 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. Technical and Legal Approaches to Unsolicited Electronic Mailt By DAVID E. SORKIN* "Spamming" is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called "spain," 2 causes or contributes to a wide variety of problems for network administrators, t Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999-2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Katalog Elektronskih Knjiga
    KATALOG ELEKTRONSKIH KNJIGA Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 1 Peter Kent Pay Per Click Search 2006 0-471-74594-3 130 Kupovina Engine Marketing for Dummies 2 Terry Large Access 1 2007 Internet Freeware 3 Kevin Smith Excel Lassons & Tutorials 2004 Internet Freeware 4 Terry Michael Photografy Tutorials 2006 Internet Freeware Janine Peterson Phil Pivnick 5 Jake Ludington Converting Vinyl LPs 2003 Internet Freeware to CD 6 Allen Wyatt Cleaning Windows XP 2004 0-7645-7311-X Poklon for Dummies 7 Peter Kent Sarch Engine Optimization 2006 0-4717-5441-2 Kupovina for Dummies 8 Terry Large Access 2 2007 Internet Freeware 9 Dirk Dupon How to write, create, 2005 Internet Freeware promote and sell E-books on the Internet 10 Chayden Bates eBook Marketing 2000 Internet Freeware Explained 11 Kevin Sinclair How To Choose A 1999 Internet Freeware Homebased Bussines 12 Bob McElwain 101 Newbie-Frendly Tips 2001 Internet Freeware 13 Windows Basics 2004 Poklon 14 Michael Abrash Zen of Graphic 2005 Poklon Programming, 2. izdanje 15 13 Hot Internet 2000 Internet Freeware Moneymaking Methods 16 K. Williams The Complete HTML 1998 Poklon Teacher 17 C. Darwin On the Origin of Species Internet Freeware 2/175 Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 18 C. Darwin The Variation of Animals Internet Freeware 19 Bruce Eckel Thinking in C++, Vol 1 2000 Internet Freeware 20 Bruce Eckel Thinking in C++, Vol 2 2000 Internet Freeware 21 James Parton Captains of Industry 1890 399 Internet Freeware 22 Bruno R. Preiss Data Structures and 1998 Internet
    [Show full text]
  • Love Hörnquist-Åstrand Assar Westerlund Harald Barth
    Arla A Free AFS implementation from KTH Edition 0.1, for version 0.34 1999 - 2000 Love H¨ornquist-Astrand˚ Assar Westerlund Harald Barth last updated $Date: 2000/10/01 19:18:41 $ Copyright (c) 1998 - 1999 Kungliga Tekniska H¨ogskolan (Royal Institute of Technology, Stock- holm, Sweden). All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of condi- tions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by Kungliga Tekniska H¨ogskolan and its contributors. 4. Neither the name of the Institute nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS \AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR- TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THE- ORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN- CLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Leveraging Open Source Software
    1 Leveraging Open Source Software (Text of talk delivered by Justice Yatindra Singh Judge Allahabad High Court at the 9th e- Governance conference on 3rd February 2006 at Kochi, Kerala) FUD is an abbreviation of fear, uncertainty and doubt; it is often a salesman's strategy: spreading false rumours regarding others' products. Open source software (OSS) is its victim. In our country FUD for OSS arises out of ignorance. I am glad that, we are discussing OSS as it has crucial role to play in the IT world. WHAT IS OSS? A computer programme consists of two parts: Source Code and Object Code. Nowadays, computer programmes are written in high level computer languages using compact English words. This part is known as source code. These languages also have a programme called compiler and with their help, source code is compiled into machine language so that computers may understand it. When it is so done, it is called object code or machine code. Description―if it complies with certain conditions―is protected as a Copyright. Source code is a kind of description and can be protected as copyright provided it is published or disclosed. In the proprietery software, source code is generally not disclosed and in such a situation it is protected as a trade secret or undisclosed information. There was a debate whether object code is protected as a copyright or not but after TRIPS, it has to be protected as a copyright and now object code is so protected. Everyone is not using copyrights to have rights in computer programme.
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Linux Network Administrators Guide
    Chapter 21. C News One of the most popular software packages for Netnews is C News. It was designed for sites that carry news over UUCP links. This chapter will discuss the central concepts of C News, basic installation, and maintenance tasks. C News stores its configuration files in /etc/news, and most of its binaries are kept below the /usr/lib/news/ directory. Articles are kept below /var/spool/news. You should make sure that virtually all files in these directories are owned by user news or group news. Most problems arise from files being inaccessible to C News. Use su to become the user news before you touch anything in the directory. The only exception is the setnewsids command, which is used to set the real user ID of some news programs. It must be owned by root and have the setuid bit set. In this chapter, we describe all C News configuration files in detail and show you what you have to do to keep your site running. Chapter 21. C News 402 21.1. Delivering News Articles can be fed to C News in several ways. When a local user posts an article, the newsreader usually hands it to the inews command, which completes the header information. News from remote sites, be it a single article or a whole batch, is given to the rnews command, which stores it in the /var/spool/news/in.coming directory, from where it will be picked up at a later time by newsrun. With any of these two techniques, however, the article will eventually be handed to the relaynews command.
    [Show full text]
  • Inventors, Technologists and Entrepreneurs
    19 November 2013 We, the undersigned, are a group of inventors, technologists and entrepreneurs. Many of us have founded technology businesses; we have invented many of the protocols, systems and devices that make the Internet work, and we are collectively listed as the inventors on over 150 patents. We write to you today about the U.S. patent system. That system is broken. Based on our experiences building and deploying new digital technologies, we believe that software patents are doing more harm than good. Perhaps it is time to reexamine the idea, dating from the 1980s, that government-issued monopolies on algorithms, protocols and data structures are the best way to promote the advancement of computer science. But that will be a complex task, and one we don't expect to happen quickly. Unfortunately, aspects of the problem have become so acute they must be addressed immediately. Broad, vague patents covering software-type inventions—some of which we ourselves are listed as inventors on—are a malfunctioning component of America's inventive machinery. This is particularly the case when those patents end up in the hands of non-practicing patent trolls. These non-practicing entities do not make or sell anything. Their exploitation of patents as a tool for extortion is undermining America’s technological progress; patent trolls are collecting taxes on innovation by extracting billions of dollars in dubious licensing fees, and wasting the time and management resources of creative businesses. Many of us would have achieved much less in our careers if the trolling problem had been as dire in past decades as it is now.
    [Show full text]
  • Capsicum: Practical Capabilities for UNIX
    Capsicum: practical capabilities for UNIX Robert N. M. Watson Jonathan Anderson Ben Laurie University of Cambridge University of Cambridge Google UK Ltd. Kris Kennaway Google UK Ltd. Abstract significant technical limitations: current OS facilities are simply not designed for this purpose. Capsicum is a lightweight operating system capabil- The access control systems in conventional (non- ity and sandbox framework planned for inclusion in capability-oriented) operating systems are Discretionary FreeBSD 9. Capsicum extends, rather than replaces, Access Control (DAC) and Mandatory Access Control UNIX APIs, providing new kernel primitives (sandboxed (MAC). DAC was designed to protect users from each capability mode and capabilities) and a userspace sand- other: the owner of an object (such as a file) can specify box API. These tools support compartmentalisation of permissions for it, which are checked by the OS when monolithic UNIX applications into logical applications, the object is accessed. MAC was designed to enforce an increasingly common goal supported poorly by dis- system policies: system administrators specify policies cretionary and mandatory access control. We demon- (e.g. “users cleared to Secret may not read Top Secret strate our approach by adapting core FreeBSD utilities documents”), which are checked via run-time hooks in- and Google’s Chromium web browser to use Capsicum serted into many places in the operating system’s kernel. primitives, and compare the complexity and robustness Neither of these systems was designed to address the of Capsicum with other sandboxing techniques. case of a single application processing many types of in- formation on behalf of one user. For instance, a mod- 1 Introduction ern web browser must parse HTML, scripting languages, images and video from many untrusted sources, but be- Capsicum is an API that brings capabilities to UNIX.
    [Show full text]
  • Education and Research Solutions Brief
    Education and Research Solutions Brief Data Integrity, Performance, Flexibility, and Lower Total Cost of Storage Whether a university department or a large research lab, higher education and research institutions need to provide an IT infrastructure that will allow users to store, retrieve, and analyze data generated by their user groups whether on campus, around the world, or from outer space. Enter: Nexenta Nexenta software-only products solve accessibility, storage performance, and data management In summary: bottlenecks and do so cost effectively. Nexenta provides a cost optimized, hardware independent Why Choose Nexenta? storage platform to safely keep data and make it accessible from anywhere. It delivers superior performance running on industry standard x86 reference architectures from leading hardware • Total Flexibility on hardware choice vendors such as Dell, HP, SuperMicro, Cisco, Quanta, and others. • Lowest total cost for storage • Highest levels of data integrity • Improved data performance With Nexenta, Research Institutes can meet higher levels of: Data Integrity: the large, complex, and sometimes sensitive data sets at higher education and research institutions require the utmost in data reliability. Using the proven ZFS file system, NexentaStor provides unparalleled levels of reliability against data corruption and bit rot Revolutionize your data storage. which has become a growing issue as the amount of data has exploded; and ZFS copy-on- write delivers 100% data integrity. Choose Nexenta Performance: User groups at these institutions put high demands on their data. High levels of Software-Defined Storage memory caching in its ZFS technology allow NexentaStor to deliver superior I/O for the fastest Request a proof-of-concept at access to content.
    [Show full text]