When C2 Is on the PO

Total Page:16

File Type:pdf, Size:1020Kb

When C2 Is on the PO In the Public Interest Doing Business with Governments When C2 is on the PO If you sell to the federal government, Orange Book was issued first in August 1983 and in December 1985 was reissued there is a good chance that your as a Department of Defense standard product will have to run on a (DOD 5200.28-STD). The Orange Book then became refer- trusted system. enced as a mandatory requirement for operating systems delivered to DOD. Once that happened, anyone who sold an operating system to DOD had to implement a trusted system. This forced firms, such as DEC, Hewlett-Packard, IBM onsider this scenario: Your firm’s Taken together, there are seven levels (in and others, to develop trusted versions of marketing efforts have finally suc- decreasing order of security): A1, B3, B2, their respective operating systems. This Cceeded in penetrating a large fed- B1, C2, C1 and D. The technical attribut- concept has moved beyond DOD, and eral agency. The potential for significant es of each are detailed in the Orange currently many civilian agencies, such as sales from this organization is large. Just Book, which is described below. the IRS, the Department of Agriculture, as you begin to count your revenue (or U.S. Customs and others, require a trust- your commission check if you’re the sales By the Book ed operating system on many if not all of person for this account), your prospect The National Computer Security Center their operating system purchases. While asks, “Your software does run on a C2 sys- (NCSC) evaluates the security features of this often does not include desktop oper- tem, doesn’t it?” trusted products against established tech- ating systems such as DOS and Windows, You answer, “Huh?” This might not be nical standards and criteria. It maintains it does apply to servers. the best time to begin learning about trust- the Evaluated Products List, a compilation ed systems. of all computer products that have under- The ISV’s Involvement Do independent software vendors gone formal security evaluations, and indi- Does an independent software vendor (ISVs) really have to worry about trust- cates the relative security merit of each really have to worry about these issues? ed systems? Since your software product computer product. The criteria against Worry is probably not the best word here. runs at the “user level,” are you affect- which computer systems are evaluated is What is needed is an understanding of ed by running on a somewhat different the Orange Book. what your software requires in terms of operating system than you currently sup- In January 1981, the National Security privileges and its interaction with the port? Let’s take a look at each of these Agency (NSA) became responsible for the operating system. Keep in mind that the questions. security of computer systems for the U.S. definition of a trusted system includes A trusted computer system is one that Department of Defense (DOD). As a both hardware and software. For a vendor provides a computing environment con- result, NCSC was formed as part of the to take a server with its operating system sisting of both hardware and software, NSA. NCSC’s role was to develop and to NCSC for testing and evaluation is an and incorporates software integrity mea- maintain a set of standards and confor- involved, time-consuming process. At the sures that allow its use to concurrently mance tests of those standards in the area end of this process, the vendor has process classified or unclassified infor- of computer security. Then DOD could achieved a trusted certification for that mation without violating access privileges specify a certain conformance level of specific combination of hardware and by any user, regardless of their level of those standards when purchasing systems software. If that combination changes in classification. There are different levels of and be assured of having a known degree any way, such as a different hardware trust that are based on the ability of the of security features. configuration or additional hardware, the computer system to enforce access privi- These standards were published as the certification will no longer be valid. Nei- leges to authorized users and to system- Department of Defense Trusted Computer ther the vendor nor the federal end user protected files. There are four primary lev- System Evaluation Criteria. Because this will be eager to undo a process that has els of trust: A, B, C and D, with A being publication had an orange cover, it was taken considerable effort to complete. the most trusted and D the least. Some of often referred to as the Orange Book (a Since your software product runs at these levels have sublevels (1, 2 and 3). cozier name than DOD TCSEC). The the “user level,” you are probably not affected by running on a somewhat dif- By Gary Donnelly ferent operating system than you current- ly support. For an operating system to 44 UniForum’s ITSolutions JULY 1996 achieve a certified trust level, changes in have something more to say than “Huh?” but it’s better to be aware of problems the operating system—in the form of Find out what trusted platform your soft- before having to deliver the software. And access controls, reuse of objects, identifi- ware is going to be required for, and then wouldn’t that be a novel approach? IT cation and authentication, and audit—are work with the vendor of that operating required. Most of these changes may system. As with TIS, you may be able to Gary Donnelly teaches and consults in require the granting of different levels of obtain developer information to assist you the client/server and open systems arena, privileges to your application, but the basic in knowing more about that platform. focusing on federal marketing issues. He application should still run properly. You’ll likely not have a major problem, can be reached at [email protected]. One commercially available operating system that has achieved an NCSC certifi- ADVERTISING INDEX cation is Trusted Xenix from Trusted Infor- ADVERTISING SALES mation Systems (TIS) of Glenwood, MD. ADVERTISER PAGE # INQUIRY # OFFICES Trusted Xenix has been evaluated at B2 Elan Computer Group..........................................17 107 Northwestern U.S. and Western Canada by the NCSC on a variety of 286 and 386 http://www.elan.com Pat Macsata (510) 888-1104 R.W. Walker Co. (510) 888-0472 fax platforms produced by AST, Grid, Fujitsu Microelectronics..............................Cover 2 101 Hewlett-Packard, IBM, NCR, NEC, Trend, 22971 Sutro St., Ste. B http://www.fmi.fujitsu.com Hayward, CA 94541 Unisys, Wang and Zenith. From this list Hyde Co., The......................................................47 110 you should notice that being certified for Southwestern U.S. http://www.spatch.com one platform doesn’t grant certification to Michael Walker (310) 450-9001 others, even if both use the Intel platform. IBM Corp...............................................................1 102 R.W. Walker Co. (310) 450-8176 fax 2716 Ocean Park Blvd. Additionally, TIS has developed Trusted http://www.ibm.com Mach (Tmach), a version of Carnegie-Mel- #1010 Santa Monica, CA 90405 lon University’s Mach operating system, Interex.................................................................15 106 http://www.interex.org which is currently undergoing testing and Midwestern U.S. and Central Canada evaluation at NCSC for a B3 rating. Linux Journal ......................................................29 108 Thomas Fitzpatrick (708) 653-1611 Noelle McAuliffe, a systems analyst http://www.ssc.com/lj TF Marketing Associates (708) 653-1612 fax for TIS, says that her firm provides to 1496 County Farm Ct. Wheaton, IL 60187 third-party developers an application Network Computing Devices.......................Cover 3 111 http://www.ncd.com development guide to assist them in New England and Eastern Canada writing applications for Trusted Xenix. Santa Cruz Operation, The .................................2-3 103 Paul Moschella (617) 769-8950 McAuliffe explains that as the certifica- http://www.sco.com Hajar Associates (617) 769-8982 fax tion level moves toward higher security 49 Walpole St. (from C2 to B2, for example), special SCO Forum .................................................Cover 4 112 Norwood, MA 02062 http://www.sco.com privileges may be required for applica- Mid-Atlantic U.S. tions to operate properly. These include Sterling Software ................................................13 105 Barbara Best (908) 741-7744 areas such as audit, Set User ID (SUID) http://www.sterling.com Hajar Associates (908) 741-6823 fax root, and both discretionary and manda- 569 River Rd. tory access controls. As a software devel- UniDirect ...............................................................9 104 Fair Haven, NJ 07704 http://www.unidirect.com oper, you will have to work with the Southeastern U.S. provider of the trusted operating system UniForum Association..................................6-7, 41 Scott Rickles (770) 664-4567 and do advanced testing to determine http://www.uniforum.org Ray Rickles & Co. (770) 740-1399 fax the effect of these security issues on your 560 Jacaranda Ct. application. UniSolutions Associates......................................47 113 Alpharetta, GA 30202 http://www.unisol.com In terms of porting your software to a Publisher’s Sales Office trusted system, the general consensus is WEBsmith ...........................................................43 109 Richard Shippee (408) 986-8840, that your application should move over http://www.ssc.com/websmith x17 without much problem. If you are con- UniForum’s IT Solutions (408) 986-1645 fax fronted with the earlier question about World Wide Web addresses of UniForum’s IT Solutions advertisers are 2901 Tasman Dr., #205 e-mail: your software running on a trusted sys- listed complimentarily each month. The ad index is published as a Santa Clara, CA 95054 [email protected] tem, you should now at least be able to service. The publisher assumes no liability for errors or omissions. JULY 1996 UniForum’s ITSolutions 45.
Recommended publications
  • Technical White Paper
    Uniform Driver Interface Introduction to UDI Version 1.0 Technical White Paper http://www.project-UDI.org Introduction to UDI Abstract The Uniform Driver Interface (UDI) allows device drivers to be portable across both hardware platforms and operating systems without any changes to the driver source. With the participation of multiple operating system (OS), platform and device hardware vendors, UDI is the first interface that is likely to achieve such portability on a wide scale. UDI provides an encapsulating environment for drivers with well-defined interfaces which isolate drivers from OS policies and from platform and I/O bus dependencies. This allows driver development to be totally independent of OS development. In addition, the UDI architecture insulates drivers from platform specifics such as byte-ordering, DMA implications, multi-processing, interrupt implementations and I/O bus topologies. The formal UDI specifications are currently available from the Project UDI web page (http://www.project-UDI.org). Introduction to UDI - Version 1.0 - 8/31/99 i Preface Copyright Notice Copyright © 1999 Adaptec, Inc; Compaq Computer Corporation; Hewlett-Packard Company; International Business Machines Corporation; Interphase Corporation; Lockheed Martin Corporation; The Santa Cruz Operation, Inc; SBS Technologies, Inc; Sun Microsystems (“copyright holders”). All Rights Reserved. This document and other documents on the Project UDI web site (www.project-UDI.org) are provided by the copyright holders under the following license. By obtaining, using and/or copying this document, or the Project UDI document from which this statement is linked, you agree that you have read, understood, and will comply with the following terms and conditions: Permission to use, copy, and distribute the contents of this document, or the Project UDI document from which this statement is linked, in any medium for any purpose and without fee or royalty is hereby granted, provided that you include all of the following on ALL copies of the document, or portions thereof, that you use: 1.
    [Show full text]
  • Free Webinar Training
    SCO_webinar.qxd 6/5/06 3:03 pm Page 1 FREE WEBINAR TRAINING Learn from the Experts. FREE TRAINING Considering upgrading your customer base to OpenServer 6 or UnixWare 7.1.4 but uneasy that you may introduce risk and create problems, including downtime for your loyal customer base? SCO would like to help by offering free, technical training. Learn from the EXPERTS. Two of the top SCO engineers have created a series of technical webinars to show you how easy it is to upgrade your customers to OpenServer 6 or UnixWare 7.1.4. And you are invited to attend. The Web seminar topics include: > Running Third-Party Applications on OpenServer 6 SCO® OpenServer™ is the applications > Best Practices in Upgrading to OpenServer 6 for Developers platform chosen by computer professionals > Best Practices in Upgrading to OpenServer 6 for System Administrators for reliable, stable, and secure deployment on Intel and compatible computer systems. > Upgrading to UnixWare 7.1.4 Now, with the release of SCO OpenServer 6 these attributes have been refined to meet COME TO SCO FORUM 2006 the challenges of a global economy. The Forum 2006 is coming! You are invited to SCO Forum 2006, greatest improvements in OpenServer 6 at the Mirage Hotel in Las Vegas, August 6-9, 2006. include multi-threaded application support, Keynotes, industry experts, strategies, directions, and birds- large file support (up to 1 terabyte), and an of-a-feather get-togethers will punctuate this hard-hitting updated look and feel. With the introduction conference filled with eye-opening technical breakout ses- of the SVR5 kernel technology, SCO sions on SCO UNIX, SCAMP, HA Clusters, On-Line Data OpenServer 6 customers have reported Manager and Mirroring, SOA, and Digital Mobile Services.
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • SCO Unixware Release 7.1.4
    Product Announcement US Dollar Suggested List Prices For SCO Authorized Distributors World-wide SCO UnixWare Release 7.1.4 3 May 2004: SCO announces product and availability details for SCO UnixWare® 7.1.4, the latest version of the UnixWare family of operating system products. In addition to new features and support for the latest hardware, this release introduces significant enhancements to the default configurations for most current editions of the product and introduces the new Small Business Edition designed for small business and edge of network applications. The SCO Update Service is available as a cost effective option to upgrade to the next release of UnixWare. Customers who license the SCO Update Service receive electronic delivery of incremental feature updates to UnixWare 7.1.4 up to and including the next UnixWare release. New Media Kits and printed documentation will be available for English, French, German and Spanish languages. Availability details are contained below. A full set of new license keys, and upgrade and trade-in keys are also being provided for this new release. This announcement includes: 1 Description 2 Availability 3 Small Business Edition and Revised Edition Defaults 4 New and Changed in UnixWare Release 7.1.4 5 Optional Services Changes 6 SCO Update Service 7 OpenServer Kernel Personality (OKP) 8 UnixWare and OpenServer Development Kit (UDK) 9 New SCOx Components for UnixWare 7.1.4 10 Model Numbers and Pricing 11 New Optional Bundled Support 12 Upgrades and Trade-Ins 13 Media Kit Contents 14 SCO Global Services 15 System Requirements For more information visit: • UnixWare www.sco.com/products • SCO Support www.sco.com/support 1 Description UnixWare 7.1.4 is the latest release of SCO’s award winning, state of the art UNIX operating system.
    [Show full text]
  • 1.4. Introducción a Unix Y Linux
    APUNTES USC www.apuntesusc.es Administración de Sistemas e Redes Grao en Enxeñaría Informática Grao Escola Técnica Superior de Enxeñaría Universidade de Santiago de Compostela Tomás Fernández Pena [email protected] 5 de septiembre de 2018 APUNTES USC www.apuntesusc.es APUNTES USC www.apuntesusc.es APUNTES USC www.apuntesusc.es APUNTES USC www.apuntesusc.es Índice general 1. Introducción a la administración de sistemas1 1.1. Introducción a la asignatura...................1 1.1.1. La figura del administrador de sistemas.........1 1.1.2. Objetivos de la asignatura................1 1.1.3. ¿Por qué UNIX/GNU Linux?..............2 1.1.4. Información oficial....................2 1.1.5. Relación con otras asignaturas..............3 1.2. Tareas de un administrador de sistemas.............3 1.2.1. Principales tareas.....................5 1.3. Políticas y estándares.......................6 1.3.1. Políticas y procedimientos................7 1.3.2. Estándares y recomendaciones..............9 1.4. Introducción a Unix y Linux................... 12 1.4.1. Historia de Unix..................... 12 1.4.2. Sistemas GNU/Linux................... 15 1.4.3. Distribuciones de GNU/Linux.............. 18 1.5. Virtualización........................... 22 2. Introducción a los sistemas Linux/Unix 26 2.1. Instalación de Linux Debian................... 26 2.1.1. Tipos de instalación................... 26 2.1.2. Instalación del sistema.................. 27 2.1.3. Arranque del sistema................... 44 2.1.4. Verificación de la instalación............... 47 2.2. Instalación de software...................... 51 2.2.1. Formas de instalación................... 51 2.2.2. dpkg............................ 52 2.2.3. APT - Advanced Packaging Tools............ 56 2.2.3.1. Corrección de problemas...........
    [Show full text]
  • UNIX – LINUX: Kernels, Distributions & Security Μάντζιος Παναγιώτης
    ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ ΣΧΟΛΗ ΘΕΤΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΔΙΑΤΜΗΜΑΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΜΕΤΑΠΤΥΧΙΑΚΩΝ ΣΠΟΥΔΩΝ «ΠΛΗΡΟΦΟΡΙΚΗ ΚΑΙ ΥΠΟΛΟΓΙΣΤΙΚΗ ΒΙΟΙΑΤΡΙΚΗ» UNIX – LINUX: Kernels, distributions & security Μάντζιος Παναγιώτης ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Υπεύθυνος Λάμψας Πέτρος Λαμία, 2016 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ 3 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ ΣΧΟΛΗ ΘΕΤΙΚΩΝ ΕΠΙΣΤΗΜΩΝ ΔΙΑΤΜΗΜΑΤΙΚΟ ΜΕΤΑΠΤΥΧΙΑΚΟ ΠΡΟΓΡΑΜΜΑ ΠΛΗΡΟΦΟΡΙΚΗ ΚΑΙ ΥΠΟΛΟΓΙΣΤΙΚΗ ΒΙΟΙΑΤΡΙΚΗ ΚΑΤΕΥΘΥΝΣΗ: «ΠΛΗΡΟΦΟΡΙΚΗ ΜΕ ΕΦΑΡΜΟΓΕΣ ΣΤΗΝ ΑΣΦΑΛΕΙΑ, ΔΙΑΧΕΙΡΙΣΗ ΜΕΓΑΛΟΥ ΟΓΚΟΥ ΔΕΔΟΜΕΝΩΝ ΚΑΙ ΠΡΟΣΟΜΟΙΩΣΗ» UNIX – LINUX: Kernels, distributions & security Μάντζιος Παναγιώτης ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ Επιβλέπων Λάμψας Πέτρος Λαμία, 2016 4 Institutional Repository - Library & Information Centre - University of Thessaly 07/10/2021 00:35:02 EEST - 170.106.39.241 Μάντζιος Παναγιώτης ‘‘Unix – Linux: Kernels, Distributions & Security’’ «Υπεύθυνη ∆ήλωση µη λογοκλοπής και ανάληψης προσωπικής ευθύνης» Με πλήρη επίγνωση των συνεπειών του νόµου περί πνευµατικών δικαιωµάτων, και γνωρίζοντας τις συνέπειες της λογοκλοπής, δηλώνω υπεύθυνα και ενυπογράφως ότι η παρούσα εργασία µε τίτλο «UNIX – LINUX: Kernels, distributions & security» αποτελεί προϊόν αυστηρά προσωπικής εργασίας και όλες οι πηγές από
    [Show full text]
  • SCO's Big Legal Gun Takes Aim Attorney Mark Heise Is Leading the Company's Battle Against IBM--A Legal Case He Says May Redefine the Direction of the Software Industry
    New In Dresses Ad by URBAN OUTFITTERS See More Johnson & Johnson vaccine Mortal Kombat review Quiplash is free AirTags Falcon and Winter Soldier finale COVID-19 BEST REVIEWS NEWS HOW TO HOME CARS DEALS 5G J O I N / S I G N I N SCO's big legal gun takes aim Attorney Mark Heise is leading the company's battle against IBM--a legal case he says may redefine the direction of the software industry. Aug. 21, 2003 12:32 p.m. PT 0 Instead of talking up new products, SCO Group executives devoted the bulk of their presentations at this week's SCO Forum to the fight against Linux. And for good reason. The company sued IBM in March, saying it illegally contributed some of SCO's licensed Unix code to Linux. Since then, SCO has been making a major business out of intellectual property enforcement, which happens to be the company's fastest-growing revenue generator. SCO's lawsuit has excited no small degree of controversy. Critics say the company is trying to shake down Linux users and that it does not have any legal basis for its claims. So in a bid to clarify its case both to customers and detractors, the company showed the disputed code to some attendees at the SCO Forum, its annual user conference that took place this week in Las Vegas. But that step did anything but lower the temperature. Shortly after making the offer to let outsiders examine the code, members of the Linux community blasted SCO, saying the code was originally covered under a public license that allows it to be shared.
    [Show full text]
  • Sco Contro Linux 26-3-04
    BECCARIA, MARCHETTI-STASI PARRELLA, SOMMA (NMI CLUB) NOSCOPYRIGHT A cura del NMI Club: Antonella Beccaria (giornalista) Francesco Marchetti-Stasi (programmatore) Bernardo Parrella (giornalista) Emmanuele Somma (programmatore) Nella programmazione, NMI (Non Maskable Interrupt) indica un evento che inter- rompe l’attività di un microprocessore di fronte a condizioni che hanno priorità su ogni altra attività e che non possono essere ignorate. NMI Club si propone di approfondire alcuni temi caldi dell’attuale panorama tecno- logico, rileggendoli attraverso le inevitabili ricadute socio-culturali ad ampio raggio, con un linguaggio chiaro e diretto per un’informazione alla portata di tutti. Possiamo forse permetterci di ignorare l’attività di NMI Club? Contatti, collaborazioni, proposte: [email protected] Versione elettronica del libro: http://www.nmi-club.org/libri/nosco La versione elettronica del volume viene rilasciata sotto la licenza Creative Commons: Attribution- Commercial-ShareAlike (http://creativecommons.org/licenses/by-sa/1.0/). Prefazione Questo è un libro sull’informatica, ma non un libro di informati- ca. È un libro rivolto agli appassionati di informatica, che usino Linux, FreeBSD, MacOS, Windows o qualunque altro sistema ope- rativo; è un libro per gli amanti della tecnologia, ma anche per chi è semplicemente affascinato dalle nuove frontiere della comunica- zione. È un libro sulla nascita, la crescita, il destino di un sistema operativo che può fare la differenza, almeno nel settore informati- co, tra il capitalismo selvaggio e lo sviluppo sostenibile. Nello specifico, questo lavoro ripercorre le vicende che hanno por- tato e fanno da sottofondo al caso “SCO contro Linux,” un caso che va scuotendo non solo l’ambito del software libero/open sour- ce ma, appunto, anche l’intero mondo informatico.
    [Show full text]
  • Serverové Operačné Systémy UNIX – Učebný Text Pre Stredné a Vysoké Školy
    Serverové operačné systémy UNIX – učebný text pre stredné a vysoké školy Martin Šechný SERVEROVÉ OPERAČNÉ SYSTÉMY UNIX Martin Šechný 2016 verzia 3.18 Serverové operačné systémy UNIX – učebný text pre stredné a vysoké školy Martin Šechný poďakovanie V tomto učebnom texte som zosumarizoval množstvo poznatkov z rôznych zdrojov, z odborných kurzov Oracle University / GOPAS SR – IT školiace stredisko, Bratislava a hlavne od komunity ľudí pracujúcich so slobodným a otvoreným softvérom. Pri písaní som sa inšpiroval perfektnými prednáškami z architektúry počítačov od prof. Norberta Frištackého († 2006), za čo mu patrí vďaka. názov Serverové operačné systémy UNIX URL http://www.shenk.sk/skola/informatika/serverove-operacne-systemy-unix.pdf autor © 2012 – 2016, Mgr. Martin Šechný, martin.sechny @ shenk.sk poznámka Prvá verzia tohto učebného textu z roku 2012, zložená z teórie a cvičení, patrí k projektu Tvorba a implementácia inovatívneho programu Informačné a sieťové technológie, spolufinancovanom zo zdrojov EÚ v operačnom programe Vzdelávanie. licencia CC-BY-SA 4.0 certifikáty autora http://sk.creativecommons.org http://creativecommons.org/licenses/by-sa/4.0/ 2 Serverové operačné systémy UNIX – učebný text pre stredné a vysoké školy Martin Šechný Obsah 1 Úvod 5 2 Základné pojmy 6 2.1 Bloková štruktúra operačného systému 8 2.2 Plánovanie procesov a vlákien 9 2.3 Virtuálna pamäť 10 2.4 Disk, diskové pole, dátové úložisko 11 2.5 Delenie a formátovanie disku, súborový systém 13 2.6 História operačných systémov 16 2.7 Licencia 18 3 Riadenie IT, správa
    [Show full text]
  • Dmitry MEDVEDEV Dmitry MEDVEDEV
    SHANGHAI COOPERATION ORGANIZATION MAGAZINE 2009 May №1 Event of the Year SCO Summit Investment as an Anti-Crisis Instrument /16/ In the Forefront of Fight with the “Three Malign Forces” /23/ Youth Wing Has Joined the Shanghai Cooperation Organization /32/ Children Paint Fairy Tales /60/ Dmitry MEDVEDEV “Russia Suggests That Priority Should Be To Consolidate Peace And Security...” Dear friends! You are keeping in hand a unique publication able not only arouse a keen interest, but also become a document of its time. The InfoSCO journal is an offering to the Shanghai Cooperation Organization summit. It was initiated and prepared by the Russian 3 journalists in the partnership with their colleagues from other SCO countries. The main advantage of this publication is a bright thematic palette providing nutriment to the mind and joy to the heart, and, certainly, obvious inspiration of the writing team that worked at this issue. The journal is entirely dedicated to SCO, its success and problems, values and ideals, as well as concrete projects. You will find here answers to many SCO-related questions, get an idea about the Organization, whose activity is noble in essence and so necessary by its sense, because there is nothing more valuable in the vast expanses of the human civilization, than peoples’ and states’ respect of each other, honest and open dialogue, even in difficult questions, mutual aid in dramatic situations, equal cooperation. As a matter of fact, this is just the “formula of peace” on the Earth, the Shanghai Cooperation Organization does its best to realize in its activity.
    [Show full text]
  • Plaintiff, V. I
    Case 2:03-cv-00294-DN Document 1160 Filed 02/08/16 Page 1 of 65 UNITED STATES DISTRICT COURT DISTRICT OF UTAH, CENTRAL DIVISION THE SCO GROUP, INC., A DELAWARE ORDER GRANTING IBM’S [783] CORPORATION; MOTION FOR PARTIAL SUMMARY JUDGMENT Plaintiff, 2:03-CV-00294-DN v. District Judge David Nuffer INTERNATIONAL BUSINESS MACHINES CORPORATION, Defendant. This case arises out of the relationship between The SCO Group, Inc. (“SCO”) and International Business Machines Corporation (“IBM”) regarding IBM’s production of its LINUX operating system. SCO held a majority of the UNIX-on-Intel market with its UNIX operating system in 1998 when IBM and SCO agreed to collaborate to produce a new operating system, Project Monterey. SCO claimed that IBM used this project to gain access SCO’s UNIX source code and then copied thousands or millions of lines of that code into LINUX. Because LINUX was offered at no cost in the open-source community, it rapidly displaced UNIX, and SCO’s UNIX sales rapidly diminished. SCO publicized the alleged copyright infringement and the alleged wrongs committed by IBM, and IBM argued that SCO’s tactics were improper and in bad faith, and that it had the right to use any lines of code it added to LINUX. Previously in this litigation, many claims have been resolved. This order addresses SCO’s tortious interference claims, granting summary judgment on those claims in favor of IBM. 1 Case 2:03-cv-00294-DN Document 1160 Filed 02/08/16 Page 2 of 65 TABLE OF CONTENTS Table of Contents ...........................................................................................................................
    [Show full text]
  • ESPLORANDO LA GEOMETRIA Per Le Scuole Medie Superiori
    SCO, l'azienda californiana a tecnologia UNIX, ha festeggiato il decimo anniversario del Forum L'azienda californiana festeggia il decennale del Forum con una strategia che circonda Microsoft. Se a Redmond sanno fare desktop e piccoli server, SCO porta verso l'alto la potenza dei suoi server, sfrutta Internet per proporre dei nuovi terminali di tipo network computer e mantiene un vantaggio competitivo nell'integrazione con la stessa Microsoft di Leo Sorge Tra le sue altre carat- re la conversione a Java e teristiche, il 1996 ha poi il rilascio d'un sistema visto il decennale del- operativo per Network l'assemblea plenaria computer da Intranet. In della SCO, l'azienda a pratica se lo Unix di tecnologia Unix origina- XlOpen ha fallito l'aggan- ria di Santa Cruz, nella cio al desktop Microsoft California del nord. I (eccettuata proprio la fedeli lettori di famiglia SCO Vision) lo MCmicrocomputer lo Unix di SCO prova ad sapranno senz'altro, andare sul desktop azien- visto che è il terzo anno dale. C'è poi da seguire che ci occupiamo di l'evoluzione del server: questo incontro a carat- SCO aveva una sua ver- tere tecnico e di marke- sione di System V versio- tingo L'evento è stato ne 3.2, emendata a sottolineato da una Specl170 e con una serie annotazione di carattere Il simpatico palcoscenico che ha ospitato il dibattito sul network computing. Tra le figure di utility aggiuntive, che di sfondo è riconoscibile Bill Gates con il cilindro, mentre non è visibile un Larry Ellison economico: il trimestre vestito da cowboy.
    [Show full text]