Anonymity, Integrity and Reliability Issues with Open Proxies

Total Page:16

File Type:pdf, Size:1020Kb

Anonymity, Integrity and Reliability Issues with Open Proxies Die approbierte Originalversion dieser Diplom-/Masterarbeit ist an der Hauptbibliothek der Technischen Universität Wien aufgestellt (http://www.ub.tuwien.ac.at). The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology (http://www.ub.tuwien.ac.at/englweb/). Anonymity, Integrity And Reliability Issues With Open Proxies DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Wirtschaftsinformatik eingereicht von Christian Schmidt Matrikelnummer 0325576 an der Fakultät für Informatik der Technischen Universität Wien Betreuung Betreuer: PD Dr. Edgar Weippl Wien, 22.04.2010 (Unterschrift Verfasser) (Unterschrift Betreuer) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Schmidt Christian Loitzbach 10 3240 Mank Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die ver- wendeten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit – einschließlich Tabellen, Karten und Abbildungen –, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht habe. Wien, 20. 04. 2010 (Unterschrift Verfasser/in) i Abstract An open proxy acts as a communication gateway in a network, which can be used without authentication. Client requests are transferred over the proxy as intermediary. Thus, open proxies are a significant danger for security as they cannot only intercept, but also modify data. After a theoretical introduction, this thesis focuses mainly on three research ques- tions. The first deals with proxylists which are available on Internet. What are possible attacks on the integrity of proxylists? In this regard we intend to smuggle in fake prox- ies into proxylists so that the list is useless for its users. Moreover, it will point out, how freely accessible proxies will be checked and classified according to availability, per- formance and anonymity. The second research question performs an analysis of logged Internet traffic trans- ferred over an open proxy. By implementing and providing an open proxy service, the question of what are open proxies used for will be answered. Especially, it will be an- alyzed which web attacks will be launched or which trusted personal information will be sent via an open proxy. Ultimately, the third research question provides answers to whether open proxies are an efficient channel for spreading malware. Do users trust the integrity of executable downloaded over not trustworthy proxies? We deployed an experiment offering an open proxy, which redirects all executable downloads to a pseudo-malicious applica- tion. ii Zusammenfassung Offene Proxies stellen für das Internet eine große Gefahr dar. Praktisch jeder Internet User kann sich die Identität eines offenen Proxies aneignen, um so anonym zu sur- fen oder im schlechtesten Fall gegen andere Internet Nutzer auftreten. In dieser Ar- beit wird zuerst versucht, die Grundfunktionalitäten eines Proxies zu erläutern und wie Proxies konfiguriert werden, sodass sie ohne Authentifizierung genutzt werden kön- nen. Neben einer Aufstellung von Erklärungsversuchen, warum es dieses Phänomen von offenen Proxies überhaupt gibt, wird anhand diverser Konfigurationen gezeigt, wie sie arbeiten und wie man sie generell auf Verfügbarkeit, Performance und Klassifika- tion abfragen kann. Nach diesen eher theoretischen Erläuterungen konzentriert sich die Arbeit auf drei Forschungsfragen. Die erste Frage geht auf die im Internet zu findenden Proxylisten ein. Wie lassen sich diese Proxylisten stören bzw. täuschen, um so die Qualität dieser Listen ernsthaft in Frage zu stellen? Wir starten den Versuch nicht-funktionierende Proxies in eine Proxyliste einzuschleusen, um sie die Integrität der Liste zu verletzen. Die zweite Forschungsfrage behandelt die Analyse eines mitgeloggten Internetver- kehrs, der über einen offenen Proxy geführt wird. Welche Beweggründe haben Inter- net Nutzer, dass sie mit offene Proxies im Internet surfen? Durch ein Experiment wird versucht herauszufinden, welche Aktivitäten durchgeführt werden, ob Web-Attacken gestartet werden, und welche vertrauenswürdigen, personenbezogenen Daten über einen offenen Proxy übertragen werden. Die dritte Forschungsfrage untersucht, wie gut man mit offene Proxies Malware ver- breiten kann. Wenn ein Nutzer eines offenen Proxies eine ausführbare Datei anfordert, dann obliegt es dem Proxybetreiber, welche Datei wirklich weiterleitet wird. In diesen Punkt wird evaluiert, welches Vertrauen diese Anwender einer eigentlich nicht ver- trauenswürdigen Quelle schenken. iii Acknowledgements First of all, I am deeply grateful to my advisor and mentor PD Dr. Edgar Weippl for giving me the opportunity to work on this thesis. I really appreciate his continuous sup- port and quality feedback during the writing process. I would like to acknowledge my brother Daniel for his careful proofreading as well as his comments and suggestions. Ultimately, I am much obliged to my parents for their encouragement. Thank you for supporting me in my life and for always believing in me! iv Contents Abstract ii Zusammenfassung iii Acknowledgements iv 1. Introduction2 1.1. Motivation...................................2 1.2. Related Works.................................3 1.3. Outline.....................................9 2. Basics and fundamentals 11 2.1. Fundamental Terms.............................. 11 2.1.1. Proxy Server.............................. 11 2.1.2. Open proxies............................. 13 2.1.3. Information Privacy - Offline versus Digital world......... 14 2.1.4. Meaning of anonymity........................ 16 2.2. Conceptual and functional categorization of proxy servers........ 16 2.2.1. Proxying concepts.......................... 16 2.2.2. Proxy functions and features..................... 20 2.3. Appearance of open proxies......................... 22 2.4. Risk and consequences of providing open proxies............. 23 3. Availability and classification issues of open proxies 24 3.1. Finding open proxies............................. 24 3.1.1. Proxylists................................ 25 3.1.2. Proxy Hunter.............................. 26 3.2. Proxy Checker................................. 27 3.2.1. Web-based possibilities....................... 28 v Contents 3.2.2. Host-based tools and scripts..................... 30 3.3. Identification of proxy usage - Does a user use a proxy?......... 34 3.4. Proxy’s anonymity classification....................... 38 3.4.1. Anonymity levels........................... 38 3.4.2. Proxy Judges.............................. 42 4. Technical introduction to implemente open proxies 44 4.1. Configuration of a Squid proxy as an open intermediary......... 44 4.1.1. Configuration and log files...................... 45 4.1.2. Monitoring of web traffic and web attack detection........ 47 4.1.3. Configuring a highly anonymous proxy............... 48 4.2. Implementing an open proxy via an Apache server............ 49 4.2.1. Bandwidth limitation......................... 50 4.2.2. Anonymization of Apache proxy server............... 51 4.2.3. Securing the Apache proxy server................. 52 4.2.4. Logfiles of Apache proxy server................... 55 5. How to annoy proxylists? 56 5.1. Description and goals............................. 56 5.2. How do proxylists receive their open proxies?............... 57 5.2.1. Static proxylist driven by user entries................ 57 5.2.2. Gaining open proxies by proxy leecher.............. 59 5.3. How fake proxies remain within proxylists?................. 63 5.4. Final results in this research......................... 70 6. What are open proxies used for? 72 6.1. Description and goals............................. 72 6.2. Different periods of open proxy runs.................... 73 6.3. Some high level statistics........................... 75 6.3.1. Top Users............................... 76 6.3.2. Users Stay Length Report....................... 78 6.3.3. Top Countries............................. 79 6.3.4. Top Pages............................... 80 6.3.5. Top Downloads............................ 81 6.3.6. Top Search Engines.......................... 84 6.3.7. Top Search Phrases.......................... 85 vi Contents 6.3.8. Top Operating Systems........................ 87 6.3.9. Top Browsers............................. 88 6.3.10. Top Unrecognized Browsers..................... 88 6.4. Analysis of web attacks............................ 90 6.4.1. What different types of attacks can you identify?.......... 91 6.4.2. Do attackers target Secure Socket Layer (SSL)-enabled web servers as their destinations? Why would they want to use SSL?..... 98 6.4.3. Are there any indications of proxy chaining?........... 99 6.4.4. Identify the different Brute Force Authentication attack methods. Are there any clear-text username/password credentials?.... 102 6.5. Summary.................................... 111 7. Open proxies for spreading malware? 112 7.1. Description and goals............................. 112 7.2. Introducing a disclaimer........................... 113 7.3. Redirector configuration........................... 115 7.4. Creating Malware............................... 117 7.5. Deployment and results of the experiment................. 120 7.6. Summary about RS 3............................. 126 8. Conclusion and Further works 127 A. Source code fragments 130 vii List of Figures 2.1. Illustration
Recommended publications
  • In Computer Networks, A
    Practical No.1 Date:- Title:- Installation of Proxy-Server Windows Server 2003 What is proxy server? In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request wit hout contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly . Most proxies are a web proxy, allowing access to content on the World Wide Web. A proxy server has a large variety of potential purposes, including: To keep machines behind it anonymous (mainly for security).[1] To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2] To apply access policy to network services or content, e.g. to block undesired sites. To log / audit usage, i.e. to provide company employee Internet usage reporting. To bypass security/ parental controls. To scan transmitted content for malware before delivery.
    [Show full text]
  • Chemplugin™ User's Guide
    The Geochemist’s Workbench® Release 15 ChemPlugin™ User’s Guide The Geochemist’s Workbench® Release 15 ChemPlugin™ User’s Guide Craig M. Bethke Aqueous Solutions, LLC Champaign, Illinois Printed August 31, 2021 This document © Copyright 2021 by Aqueous Solutions LLC. All rights reserved. Earlier editions copyright 2000–2020. This document may be reproduced freely to support any licensed use of the GWB software package. Software copyright notice: Programs GSS, Rxn, Act2, Tact, SpecE8, Gtplot, TEdit, React, Phase2, P2plot, X1t, X2t, Xtplot, and ChemPlugin © Copyright 1983–2021 by Aqueous Solutions LLC. An unpublished work distributed via trade secrecy license. All rights reserved under the copyright laws. The Geochemist’s Workbench®, ChemPlugin, We put bugs in our software, and The Geochemist’s Spreadsheet are a registered trademark and trademarks of Aqueous Solutions LLC; Microsoft®, MS®, Windows XP®, Windows Vista®, Windows 7®, Windows 8®, and Windows 10® are registered trademarks of Microsoft Corporation; PostScript® is a registered trademark of Adobe Systems, Inc. Other products mentioned in this document are identified by the trademarks of their respective companies; the authors disclaim responsibility for specifying which marks are owned by which companies. The software uses zlib © 1995-2005 Jean-Loup Gailly and Mark Adler, and Expat © 1998-2006 Thai Open Source Center Ltd. and Clark Cooper. The GWB software was originally developed by the students, staff, and faculty of the Hydrogeology Program in the Department of Geology at the University of Illinois Urbana-Champaign. The package is currently developed and maintained by Aqueous Solutions LLC at the University of Illinois Research Park. Address inquiries to Aqueous Solutions LLC 301 North Neil Street, Suite 400 Champaign, IL 61820 USA Warranty: The Aqueous Solutions LLC warrants only that it has the right to convey license to the GWB software.
    [Show full text]
  • 3.0 Installation Guide
    Oratio® 3.0 installation Guide Summary • Requirements • Installation o Installation of files o Configurating Apache o Permission on files • Installing and configurating PostgreSQL database • Installing Perl modules • Configurating the environment for JasperReports • Configurating Oratio® o First installation o Launch the Software Requirements Oratio® is an ERP distributed with GPL licence. Oratio® uses PostgresSQL database and works in CGI modality, therefore it is accessible through an internet browser. Therefore, before the use of Oratio® it is necessary to make sure yourself that the instruments used by Oratio® are present on the server where Oratio® will be installed. List of programs 1. Perl, version 5 or above (Perl) 2. An http server Apache 3. A database system PostgreSQL, version 7.4 or above 4. The following Perl Libraries: DBD-Pg and DBI, downloadable from CPAN website 5. The following Perl Libraries downloadable from CPAN website XML::Parser XML::Writer XML::Writer::String XML::Encoding HTML::Template Text::Template CGI::session Unicode::String 6. For ready to print documents: - Java JDK version 1.5 and above - "Inline" and "Inline-Java" modules - JasperReports and related libraries (included in Oratio® download) - Optional: iReport for creating and editing reports in graphic modality Installation File installation: • Decompress .tar.gz file in /usr/local folder of your Linux server: tar xzvf oratio-x.x.x.tar.gz • you can find all files in /usr/local/oratio/ folder or /var/www/oratio/ Windows only • Download oratio3-windows.zip
    [Show full text]
  • Bull System Manager Server Add-Ons Installation and Administrator's Guide
    BSM 2.1 Server Add-ons Installation and Administrator's Guide REFERENCE 86 A2 59FA 07 BSM 2.1 Server Add-ons Installation and Administrator's Guide Software June 2012 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 86 A2 59FA 07 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright © Bull SAS 2008-2012 Printed in France Trademarks and Acknowledgements We acknowledge the rights of the proprietors of the trademarks mentioned in this manual. All brand names and software and hardware product names are subject to trademark and/or patent protection. Quoting of brand and product names is for information purposes only and does not represent trademark misuse. The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Table of Contents Preface.........................................................................................................................................................ix Intended Readers.........................................................................................................................ix Highlighting Conventions .............................................................................................................ix Related Publications......................................................................................................................x
    [Show full text]
  • Decide DRN Report 2
    The DEcIDE (Developing Evidence to Inform Decisions about Effectiveness) network is part of AHRQ’s Effective Health Care program. It is a collaborative network of research centers that support the rapid development of new scientific information and analytic tools. The DEcIDE network assists health care providers, patients, and policymakers seeking unbiased information about the outcomes, clinical effectiveness, safety, and appropriateness of health care items and services, particularly prescription medications and medical devices. This report is based on research conducted by the DEcIDE (Developing Evidence to Inform Decisions about Effectiveness) Centers at the HMO Research Network and the University of Pennsylvania under contract to the Agency for Healthcare Research and Quality (AHRQ), Rockville, MD (Contract No. HHSA29020050033I TO5). The AHRQ Task Order Officer for this project was Scott R. Smith, Ph.D. The findings and conclusions in this document are those of the authors, who are responsible for its contents; the findings and conclusions do not necessarily represent the views of AHRQ. Therefore, no statement in this report should be construed as an official position of AHRQ or the U.S. Department of Health and Human Services. None of the authors has a financial interest in any of the products discussed in this report. Suggested citation: Brown J, Holmes J, Syat B, et al. Proof-of-principle evaluation of a distributed research network. Effective Health Care Research Report No. 26. (Prepared by the DEcIDE Centers at the HMO Research Network and the University of Pennsylvania Under Contract No. HHSA29020050033I T05.) Rockville, MD: Agency for Healthcare Research and Quality. June 2010. Available at: http://effectivehealthcare.ahrq.gov/reports/final.cfm.
    [Show full text]
  • End-To-End Perl Solutions
    END-TO-END PERL SOLUTIONS: ACTIVEPERL AND KOMODO IDE FOR PERL MILLIONS OF DEVELOPERS TRUST PERL FOR COMPUTATIONAL AND INTEGRATION TASKS— SYSTEM ADMINISTRATION, SCRIPTING, RUNNING DATABASE APPLICATIONS, AND MORE As an open source programming language, Perl immedi- FAIL-SAFE ACTIVEPERL FOR BUSINESS AND ately reduces up-front project costs. However, Perl alone MISSION-CRITICAL APPLICATIONS may not help you meet your business goals. With ActiveState commercial-grade technical support and consulting you don’t need to depend on overworked Like most open source projects, Perl isn’t quality assured internal resources or public Perl communities to solve or commercially supported. So, it may not be safe for development issue. business or mission-critical applications that must run effectively daily, weekly, even hourly. Don’t let Perl be a ActivePerl Enterprise Edition is designed for busi- point of failure for your internal systems and cost your nesses with large Perl deployments in essential, mission- business in lost revenue. Or worse, don’t let it compro- critical applications that, when down, could cost your mise relationships with your customers. CA, Siemens and business in lost revenue and a damaged reputation. Boeing are just a few Fortune 1000 companies that trust Deploy Perl with confidence knowing you’re using the ActiveState for end-to-end development, management most secure, enterprise-grade builds for platforms like and distribution solutions for fail-safe Perl. WORLD’S BEST PERL DISTRIBUTION “ActiveState’s trusted version of Perl has allowed us ActivePerl is the industry-standard, commercial-grade to continuously raise the bar on quality as well as Perl distribution used by millions of developers around cut the cost of expanding our product matrix.” the world for easy Perl installation and quality-assured Lawrence Backman, VP at CA code.
    [Show full text]
  • Perl Autosplit Ix Download
    Perl autosplit ix download Download: The autosplit interface splits the specified file into a hierarchy rooted at the as needed to reflect class hierarchy, and creates the file Typical use of AutoSplit in the perl MakeMaker utility is via the command-line with ​DESCRIPTION · ​Multiple packages. So basically, downloading modules is the extent of my knowledge. I had to install a bunch of perl modules to get a certain program : can't locate auto/*/ in @INC. Can't locate auto/Config/Simple/ in @INC (@INC contains. Download and extract the [1]; Run perl from the. Hi, I am trying to use the TrueControlAPI in order to export device configurations from a NA install. However, I appear to have some issues. AutoSplit. Perl 5 version documentation. Go to top • Download PDF directories as needed to reflect class hierarchy, and creates the file ​DESCRIPTION · ​DIAGNOSTICS. I downloaded the MIME and Mail modules, and when I tried to execute a simple test script, I got the message: Can't locate auto/Mail/Internet/ blahb. in reply to Re: can't locate auto/*/ in @INC in thread can't locate Configure -des -Dprefix=$HOME/localperl make test make install. I've searched but couldn't find this file for downloading. This is the error message I get: "Can't locate auto/Mail/Internet/". In CPAN it is written that if you use Perl from Activestate, you just have to place the PM in. I am trying to use MIME::Tools which use Mail::Internet Mail::Internet uses Autoloader needs a fil call , but as I am.
    [Show full text]
  • Who Wrote Sobig? Copyright 2003-2004 Authors Page 1 of 48
    Who Wrote Sobig? Copyright 2003-2004 Authors Page 1 of 48 Who Wrote Sobig? Version 1.0: 19-August-2003. Version 1.1: 25-August-2003. Version 1.2: 19-November-2003. Version 1.3: 17-July-2004. This sanitized variation for public release. Scheduled for release: 1-November-2004. This document is Copyright 2003-2004 by the authors. The PGP key included within this document identifies the authors. Who Wrote Sobig? Copyright 2003-2004 Authors Page 2 of 48 Table of Contents Table of Contents................................................................................................................................................... 2 1 About This Document..................................................................................................................................... 3 2 Overview........................................................................................................................................................ 5 3 Spam and Virus Release History..................................................................................................................... 6 3.1 Identifying Tools .................................................................................................................................... 6 3.2 Identifying Individuals and Specific Groups ............................................................................................ 6 3.3 Identifying Open Proxies and Usage........................................................................................................ 8 3.4
    [Show full text]
  • Spam Solutions White Paper
    Spam Solutions White Paper Presented by: Net Sense Net Sense – IT Consulting 1 Phone: 919.870.8889 www.netsense.info Toll Free: 800.642.8360 Spam Solutions White Paper ...........................................................................................1 Spam Problem Overview.............................................................................................3 What Is Spam?.........................................................................................................3 Who Sends Spam?...................................................................................................3 How Is Spam Sent?..................................................................................................4 How Is Spam Identified? .........................................................................................4 What Problems Does Spam Cause?..........................................................................5 Legal Considerations For Business ..........................................................................5 Illegal or offensive content:..................................................................................6 Anti-Spam Laws......................................................................................................7 CAN-SPAM Act......................................................................................................7 How To Avoid Becoming A Spam Magnet..............................................................7 Tips for users:......................................................................................................7
    [Show full text]
  • Awstats Logfile Analyzer Documentation
    AWStats logfile analyzer 7.4 Documentation Table of contents Release Notes Reference manual What is AWStats / Features Install, Setup and Use AWStats New Features / Changelog Configuration Directives/Options Upgrade Configuration for Extra Sections feature Contribs, plugins and resources Other provided utilities Glossary of terms Other Topics Comparison with other log analyzers FAQ and Troubleshooting Benchmarks AWStats License Plugin Developement AWStats modules for third tools AWStats module for Webmin AWStats module for Dolibarr ERP & CRM Table of contents 1/103 14/07/2015 AWStats logfile analyzer 7.4 Documentation What is AWStats / Features Overview AWStats is short for Advanced Web Statistics. AWStats is powerful log analyzer which creates advanced web, ftp, mail and streaming server statistics reports based on the rich data contained in server logs. Data is graphically presented in easy to read web pages. AWStats development started in 1997 and is still developed today by same author (Laurent Destailleur). However, development is now done on "maintenance fixes" or small new features. Reason is that author spend, since July 2008, most of his time as project leader on another major OpenSource projet called Dolibarr ERP & CRM and works also at full time for TecLib, a french Open Source company. A lot of other developers maintains the software, providing patches, or packages, above all for Linux distributions (fedora, debian, ubuntu...). Designed with flexibility in mind, AWStats can be run through a web browser CGI (common gateway interface) or directly from the operating system command line. Through the use of intermediary data base files, AWStats is able to quickly process large log files, as often desired.
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Pragmaticperl-Interviews-A4.Pdf
    Pragmatic Perl Interviews pragmaticperl.com 2013—2015 Editor and interviewer: Viacheslav Tykhanovskyi Covers: Marko Ivanyk Revision: 2018-03-02 11:22 © Pragmatic Perl Contents 1 Preface .......................................... 1 2 Alexis Sukrieh (April 2013) ............................... 2 3 Sawyer X (May 2013) .................................. 10 4 Stevan Little (September 2013) ............................. 17 5 chromatic (October 2013) ................................ 22 6 Marc Lehmann (November 2013) ............................ 29 7 Tokuhiro Matsuno (January 2014) ........................... 46 8 Randal Schwartz (February 2014) ........................... 53 9 Christian Walde (May 2014) .............................. 56 10 Florian Ragwitz (rafl) (June 2014) ........................... 62 11 Curtis “Ovid” Poe (September 2014) .......................... 70 12 Leon Timmermans (October 2014) ........................... 77 13 Olaf Alders (December 2014) .............................. 81 14 Ricardo Signes (January 2015) ............................. 87 15 Neil Bowers (February 2015) .............................. 94 16 Renée Bäcker (June 2015) ................................ 102 17 David Golden (July 2015) ................................ 109 18 Philippe Bruhat (Book) (August 2015) . 115 19 Author .......................................... 123 i Preface 1 Preface Hello there! You have downloaded a compilation of interviews done with Perl pro- grammers in Pragmatic Perl journal from 2013 to 2015. Since the journal itself is in Russian
    [Show full text]