Open Source Document for Cisco RV130/RV130W Firmware Version 1.0.3.44

Total Page:16

File Type:pdf, Size:1020Kb

Open Source Document for Cisco RV130/RV130W Firmware Version 1.0.3.44 Open Source Used In Cisco RV130/RV130W 1.0.3.44 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-180615281 Open Source Used In Cisco RV130/RV130W 1.0.3.44 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-180615281 En ce qui a trait au logiciel gratuit ou à exploitation libre figurant dans ce document, si vous avez des questions ou souhaitez recevoir une copie du code source, auquel vous avez droit en vertu des licences gratuites ou d'exploitation libre applicables (telles que licences GNU Lesser/General Public), veuillez communiquer avec nous à l'adresse external- [email protected]. Dans vos demandes, veuillez inclure le numéro de référence 78EE117C99-180615281 Contents 1.1 bridge-utils 1.0.6 1.1.1 Available under license 1.2 BusyBox 1.7.2 1.2.1 Available under license 1.3 conntrack-tools 1.0.0 1.3.1 Available under license 1.4 cron 3.0 1.4.1 Available under license 1.5 curl 7.19.4 1.5.1 Available under license 1.6 dhcp 4.1.0 1.6.1 Available under license 1.7 dnsmasq 2.78 1.7.1 Available under license 1.8 email 3.1.2 1.8.1 Available under license 1.9 Ez-ipupdate 3.0.11b7 1.9.1 Available under license Open Source Used In Cisco RV130/RV130W 1.0.3.44 2 1.10 flex 2.5.4a 1.10.1 Available under license 1.11 gmp 4.2.1 1.11.1 Available under license 1.12 hotplug2 0.9 1.12.1 Available under license 1.13 iproute2 2.6.29 1.13.1 Available under license 1.14 ipsec-tools 0.8.0 1.14.1 Available under license 1.15 iptables 1.4.2 1.15.1 Available under license 1.16 iputils ss021109 1.16.1 Available under license 1.17 json-c 0.9 1.17.1 Available under license 1.18 libnetfilter-conntrack 0.9.1 1.18.1 Available under license 1.19 libnfnetlink 1.0.0 1.19.1 Available under license 1.20 libnl 1.1 1.20.1 Available under license 1.21 libusb 0.1.12 1.21.1 Available under license 1.22 Linux Kernel 2.6.31 1.22.1 Available under license 1.23 mDNSResponder 107.6 1.23.1 Available under license 1.24 nbtscan 1.0.2 1.24.1 Available under license 1.25 net-snmp 5.4.3 1.25.1 Available under license 1.26 ntpclient 2000_345 :DUPLICATE 1.26.1 Available under license 1.27 OpenSSL 1.0.2d :1 1.27.1 Notifications 1.27.2 Available under license 1.28 openswan 2.6.37 1.28.1 Available under license Open Source Used In Cisco RV130/RV130W 1.0.3.44 3 1.29 ppp 2.4.1 1.29.1 Available under license 1.30 ppp (DUPLICATE) 2.4.5 1.30.1 Notifications 1.30.2 Available under license 1.31 pptp-client 1.1.0 1.31.1 Available under license 1.32 pptpd 1.3.4 1.32.1 Available under license 1.33 radvd 0.9.1 1.33.1 Available under license 1.34 rp-l2tp 0.4 1.34.1 Available under license 1.35 rp-pppoe 3.11 1.35.1 Available under license 1.36 rstp 0.21 1.36.1 Available under license 1.37 syslog-ng 1.6.12 1.37.1 Available under license 1.38 traceroute_1.4a12 1.4a12 1.38.1 Available under license 1.39 tzoupdate 1.11 1.39.1 Available under license 1.40 u-boot 2008_10 1.40.1 Available under license 1.41 uclibc 0.9.31.1 1.41.1 Available under license 1.42 udev 113 1.42.1 Available under license 1.43 udhcp 0.9.8 1.43.1 Available under license 1.44 usb_modeswitch 0.9.7 1.44.1 Available under license 1.45 vlan 1.6 1.45.1 Available under license 1.46 xl2tpd 1.2.4 1.46.1 Available under license 1.47 zebra 0.92a 1.47.1 Available under license Open Source Used In Cisco RV130/RV130W 1.0.3.44 4 1.48 zlib 1.2.3 1.48.1 Available under license 1.1 bridge-utils 1.0.6 1.1.1 Available under license : GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, Open Source Used In Cisco RV130/RV130W 1.0.3.44 5 distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
Recommended publications
  • With Sleep Comes a Fusion of Worlds: the Seven Sleepers of Ephesus Through Formation and Transformation
    Vassar College Digital Window @ Vassar Senior Capstone Projects 2011 With Sleep Comes a Fusion of Worlds: The eveS n Sleepers of Ephesus Through Formation and Transformation Gwendolyn Collaco [email protected] Follow this and additional works at: http://digitalwindow.vassar.edu/senior_capstone Recommended Citation Collaco, Gwendolyn, "With Sleep Comes a Fusion of Worlds: The eS ven Sleepers of Ephesus Through Formation and Transformation" (2011). Senior Capstone Projects. Paper 3. This Open Access is brought to you for free and open access by Digital Window @ Vassar. It has been accepted for inclusion in Senior Capstone Projects by an authorized administrator of Digital Window @ Vassar. For more information, please contact [email protected]. 1 With Sleep Comes a Fusion of Worlds: The Seven Sleepers of Ephesus Through Formation and Transformation By: Gwendolyn Collaço A thesis submitted in partial fulfillment of the requirements for the Degree of Bachelor of Arts in Medieval and Renaissance Studies and Classics: Latin Vassar College Poughkeepsie, New York May 2011 2 Table of Contents Two Tellings of a Tale Gregory of Tours Jacobus de Voragine An Introduction Chapter One: Settings of Doubt and Obscurity in the Seven Sleepers of Ephesus: Christianity under Decius and Theodosius II Chapter Two: A Medley of Slumbering Heroes: Blending Indo-European and Semitic Traditions to Create the Seven Sleepers of Ephesus Vita Ædwardi Excerpt: King Edward's Vision of the Seven Sleepers Chapter Three: A Prelude to Part Two—The Itinerant Tale and Its Transformation Chapter Four: The Metamorphosis of Anglo-Saxon Charm Craft through the Seven Sleepers of Ephesus Qur’anic Excerpt: Sura al-Kahf Chapter Five: The Transmission and Literary Conversion of the Sleepers through Art A Conclusion: Miraculously Natural: Synthesis and Transformation Image Appendix for Chapter Five Bibliography 3 The Seven Sleepers of Ephesus: Two Tellings of the Tale 4 Gregorius Turonensis “Passio Sanctorum Martyrum Septem Dormientium apud Ephesum” Liber in Gloria Martyrum (6th cent.), ch.
    [Show full text]
  • The Divinity of Hellenistic Rulers
    OriginalverCORE öffentlichung in: A. Erskine (ed.), A Companion to the Hellenistic World,Metadata, Oxford: Blackwell citation 2003, and similar papers at core.ac.uk ProvidedS. 431-445 by Propylaeum-DOK CHAPTKR TWENTY-FIVE The Divinity of Hellenistic Rulers Anßdos Chaniotis 1 Introduction: the Paradox of Mortal Divinity When King Demetrios Poliorketes returned to Athens from Kerkyra in 291, the Athenians welcomed him with a processional song, the text of which has long been recognized as one of the most interesting sources for Hellenistic ruler cult: How the greatest and dearest of the gods have come to the city! For the hour has brought together Demeter and Demetrios; she comes to celebrate the solemn mysteries of the Kore, while he is here füll of joy, as befits the god, fair and laughing. His appearance is majestic, his friends all around him and he in their midst, as though they were stars and he the sun. Hail son of the most powerful god Poseidon and Aphrodite. (Douris FGrH76 Fl3, cf. Demochares FGrH75 F2, both at Athen. 6.253b-f; trans. as Austin 35) Had only the first lines of this ritual song survived, the modern reader would notice the assimilaüon of the adventus of a mortal king with that of a divinity, the etymo- logical association of his name with that of Demeter, the parentage of mighty gods, and the external features of a divine ruler (joy, beauty, majesty). Very often scholars reach their conclusions about aspects of ancient mentality on the basis of a fragment; and very often - unavoidably - they conceive only a fragment of reality.
    [Show full text]
  • Executioner by Joshua Lacey the Chapel Was Silent, the Constant Low Hum of the Ships’ Engine Being Heard Far Off in the Sacred Space
    Executioner By Joshua Lacey The chapel was silent, the constant low hum of the ships’ engine being heard far off in the sacred space. The Retribution voyaged through the turbulent warp, the ships Gellar field sparking above the domed skylight. How the ship had survived so long was a miracle. It had survived the Tyranids, horrors of the Eye of Terror, traitors from within and without, warp spawn to traitor boarding parties. Yet it remained with a skeleton crew, along with the remains of the outcast 4th company. Kneeling before the relief of the Emperor, before the long flowing standards of the chapter and company, the ruins of pews used as barricades, before the statue of Azariah Vidya himself, knelt a Space Marine. A sergeant who should have died many times, who bore the livery of the Blood Ravens. He knelt where he shouldn’t have, a warrior who should’ve been killed a hundred times over. He should not be here. Not because he should be dead, but because someone else shouldn’t be. From the shadows, Sigmund was watching bare headed. The death had been hard on them all, but the sergeant had felt it the most. He was still young for a space marine, even after the Penance Crusade. And now, when given the opportunity to lead, the sergeant declared himself unworthy. Sigmund knew otherwise. “Do you truly believe yourself lesser brother?” the chaplain spoke, emerging from the shadows to kneel with his brother. “You are as much of a hero of the chapter as he was.” As he got closer, Sigmund saw the dents, the scraps and blackened marks on the red armour of his battle brother.
    [Show full text]
  • The Ears of Hermes
    The Ears of Hermes The Ears of Hermes Communication, Images, and Identity in the Classical World Maurizio Bettini Translated by William Michael Short THE OHIO STATE UNIVERSITY PRess • COLUMBUS Copyright © 2000 Giulio Einaudi editore S.p.A. All rights reserved. English translation published 2011 by The Ohio State University Press. Library of Congress Cataloging-in-Publication Data Bettini, Maurizio. [Le orecchie di Hermes. English.] The ears of Hermes : communication, images, and identity in the classical world / Maurizio Bettini ; translated by William Michael Short. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8142-1170-0 (cloth : alk. paper) ISBN-10: 0-8142-1170-4 (cloth : alk. paper) ISBN-13: 978-0-8142-9271-6 (cd-rom) 1. Classical literature—History and criticism. 2. Literature and anthropology—Greece. 3. Literature and anthropology—Rome. 4. Hermes (Greek deity) in literature. I. Short, William Michael, 1977– II. Title. PA3009.B4813 2011 937—dc23 2011015908 This book is available in the following editions: Cloth (ISBN 978-0-8142-1170-0) CD-ROM (ISBN 978-0-8142-9271-6) Cover design by AuthorSupport.com Text design by Juliet Williams Type set in Adobe Garamond Pro Printed by Thomson-Shore, Inc. The paper used in this publication meets the minimum requirements of the American Na- tional Standard for Information Sciences—Permanence of Paper for Printed Library Materials. ANSI Z39.48–1992. 9 8 7 6 5 4 3 2 1 CONTENTS Translator’s Preface vii Author’s Preface and Acknowledgments xi Part 1. Mythology Chapter 1 Hermes’ Ears: Places and Symbols of Communication in Ancient Culture 3 Chapter 2 Brutus the Fool 40 Part 2.
    [Show full text]
  • Herakleia Trachinia in the Archidamian War
    Loyola University Chicago Loyola eCommons Dissertations Theses and Dissertations 1993 Herakleia Trachinia in the Archidamian War Mychal P. Angelos Loyola University Chicago Follow this and additional works at: https://ecommons.luc.edu/luc_diss Part of the Ancient History, Greek and Roman through Late Antiquity Commons Recommended Citation Angelos, Mychal P., "Herakleia Trachinia in the Archidamian War" (1993). Dissertations. 3292. https://ecommons.luc.edu/luc_diss/3292 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 1993 Mychal P. Angelos HERAKLEIA TRACHINIA IN THE ARCHIDAMIAN WAR By Mychal P. Angelos A Dissertation Submitted to the Faculty of the Graduate School of Loyola University of Chicago in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May, 1993 For Dorothy ·' ,/ ;~ '\ Copyright, 1993, Mychal P. Angelos, All rights reserved. VITA The author was born in Chicago, Illinois in 1929. He first entered Loyola University of Chicago in 1946 where he followed a liberal arts program. He was admitted to the University of Chicago Law School in 1948 and was awarded the Juris Doctor degree in 1951. He was admitted to the Illinois Bar in the same year and has been in private practice as an attorney in Chicago for 41 years. In September, 1982 he enrolled in the Department of History at Loyola University of Chicago, and in January, 1985 he received the Master of Arts degree in Ancient History.
    [Show full text]
  • Capturing Malware Propagations with Code Injections and Code-Reuse Attacks
    Session H2: Code Reuse Attacks CCS’17, October 30-November 3, 2017, Dallas, TX, USA Capturing Malware Propagations with Code Injections and Code-Reuse Aacks David Korczynski Heng Yin University of Oxford University of California, Riverside University of California, Riverside [email protected] [email protected] ABSTRACT ght against malware is challenged by two core, albeit opposite, Defending against malware involves analysing large amounts of problems. On the one hand, anti-malware companies receive thou- suspicious samples. To deal with such quantities we rely heavily on sands of samples every day and each of these les must be processed automatic approaches to determine whether a sample is malicious and analysed in order to determine their maliciousness. On the or not. Unfortunately, complete and precise automatic analysis other hand, malicious applications are oen well-designed so- of malware is far from an easy task. is is because malware is ware with dedicated anti-analysis features. is makes accurate oen designed to contain several techniques and countermeasures and automatic analysis of malware a true challenge. In addition to specically to hinder analysis. One of these techniques is for the this, many of the current tools available are constructed for specic malware to propagate through the operating system so as to execute reverse engineering purposes, which makes them less applicable to in the context of benign processes. e malware does this by writing fully automated procedures and more useful for manually-assisted memory to a given process and then proceeds to have this memory analysis tasks. execute. In some cases these propagations are trivial to capture One problem that has particularly challenged the malware re- because they rely on well-known techniques.
    [Show full text]
  • The Great Inscription, Its Political and Social Institutions and the Common Institutions of the Cretans
    Originalveroffentlichung in: E. Greco - M. Lombardo (eds.), La Grande Iscrizione di Gortyna. Centoventi anni dopo la scoperta. Atti del I Convegno Internazionale di Studi sulla Messara, Athen 2005, S. 175-194 THE GREAT INSCRIPTION, ITS POLITICAL AND SOCIAL INSTITUTIONS AND THE COMMON INSTITUTIONS OF THE CRETANS IS THERE SUCH AS THING AS CRETAN NOMIMA? METHODOLOGICAL CON­ SIDERATIONS In the eighth and seventh centuries Crete had been one of the most advanced regions in Greece. The Cretans adopted the alphabet very early; Cretan artists played a leading part in the development of Greek art, espe­ cially in the fields of metallurgy and stone sculpture; in the early seventh century they participated in colonisation, founding Gela together with the Rhodians; the Homeric hymn to Apollo associates the Cretans with the foundation of the sanctuary at Delphi. It is in this period of cosmopoli­ tanism and close contacts to the Orient, a period of a visible advance of trade, arts, and culture, that Crete seems to petrify. From the late seventh century onwards trade and arts do not disappear, but they certainly lost the innovative power they had had; the Cretan institutions do not keep pace with the developments in the rest of Greece; and although Crete was never isolated from the rest of Greece, its contacts with other Greek areas in the sixth and fifth centuries were not impressive. The decline of Crete as a cul­ tural pioneer in the Greek world goes hand in hand with the rise of its fame as a model of law and order. The Cretans did not any longer produce impressive works of art, but they produced more legal inscriptions than the 1 rest of Greece taken together.
    [Show full text]
  • Type Category Description F Food and Beverage
    The original source for data in this spreadsheet is a 2002 study for MassDEP by Draper/Lennon, Inc. titled Identification, Characterization, and Mapping of Food Waste and Food Waste Generators in Massachusetts . The final report from this study is available online at: http://www.mass.gov/dep/about/priorities/foodwast.doc. The data was updated in summer 2011 by the U.S. Environmental Protection Agency Region 1 office. This study identified large generators of food waste in Massachusetts, such as food processors, wholesalers, grocery stores, institutions, and large restaurants. It calculated estimated food waste generation, shown in tons per year (TPY) in column G, and mapped generator locations to facilitate planning of programs and facilities for capturing source separated organic materials for composting or other diversion. Note that waste generation estimates are not available for food and beverage manufacturers/processors and distributors due to the variability in these sectors. In some other cases, generation estimates are not available for other facilities when data needed to estimate generation is missing for that location. Facility Category Codes in column F marked TYPE show generator groupings in the report as follows: Type Category Description Food and Beverage F Manufacturers/Processors W Wholesale Distributors IH Institutions -Healthcare Facilities IS Institutions -Independent Schools IC Institutions -Colleges/Universities IP Institutions -Correctional Facilities C Resorts and Conference Facilities G Supermarkets and Grocery Stores R Restaurants Most of the columns in the spreadsheet are self‐explanatory. Columns H, I J, and K provide GIS mapping coordinates to assist in locating food waste generators. The Massachusetts State Plane coordinates found in the X_Coord and Y_Coord fields (Columns J and K) were derived by address‐ matching via Navteq Postal Villages.
    [Show full text]
  • Nothing Routine!
    Nothing Routine (About the Scope of Advent’s Mission) Consequently, when Christ came into the world, he said . (Hebrews 10:5) A sermon by Siegfried S. Johnson on the First Sunday of Advent, December 3, 2017 (Volume 1 Number 20) Christ of the Hills UMC, 700 Balearic Drive, Hot Springs Village, Arkansas 71909 Forty-five Advent’s ago, December 14, 1972, the crew of the Apollo 17 Lunar Landing Module, Commander Eugene Cernan and geologist Harrison Schmitt, lifted off the lunar surface to initiate their return to earth. These were the last astronauts to add footprints to the dusty lunar surface. We haven’t been back. It had only been three years earlier, that memorable summer of 1969, that Neil Armstrong spoke the words, “The Eagle has landed,” as Apollo 11’s landing module touched down on the moon’s surface. We frequented the moon between 1969 and 1972, but no American under forty-five years old has been alive for the ADVENT-ure of a manned flight to the moon. Space adventures don’t garner the saturated news coverage they once did. I suspect, for example, most here are unaware of this coming Friday’s launch from Cape Canaveral on a cargo mission to rendezvous with the International Space Station. I doubt, also, that any here are anxiously waiting our next manned space adventure launching two weeks from today, December 17. Called Expedition 54, this mission will carry a new crew to the ISS -- an American, a Russian, and a Japanese astronaut. Did you know about these imminent launches? No? I didn’t know, either.
    [Show full text]
  • Hephaestus Quiz: Questions and Answers
    kupidonia.com Hephaestus Quiz: questions and answers Hephaestus Quiz: questions and answers - 1 / 4 kupidonia.com 1. Who was Hephaestus? An ancient philosopher A greek god An actor 2. Hephaestus was a god of: Young people, girls, boys and children Blacksmiths, metalworking, carpenters, and others Doctors, lawyers, politicians and others 3. Who is the Roman equivalent of Hephaestus? Sea Tornado Vulcan 4. Where was Hephaestus' abode? Beverly Hills Upper East Side Mount Olympus 5. What are the symbols of Hephaestus? Screw, anvil, and tornado Hammer, anvil, tongs, volcano Hephaestus Quiz: questions and answers - 2 / 4 kupidonia.com Nuts, sea and waves 6. Who are the consorts of Hephaestus? Thalia, Aglaea Artemis, Athena Aphrodite, Aglaea 7. Who is the father of Hephaestus? Apollo Poseidon Zeus 8. Which one of these is a sibling of Hephaestus? Lanvin Hermes Chloe 9. Which one of these is one of Hephaestus's children? Aeacus Thalia Angelos 10. Who is the mother of Hephaestus? Eris Enyo Hera Hephaestus Quiz: questions and answers - 3 / 4 kupidonia.com Hephaestus Quiz: questions and answers Right answers 1. Who was Hephaestus? A greek god 2. Hephaestus was a god of: Blacksmiths, metalworking, carpenters, and others 3. Who is the Roman equivalent of Hephaestus? Vulcan 4. Where was Hephaestus' abode? Mount Olympus 5. What are the symbols of Hephaestus? Hammer, anvil, tongs, volcano 6. Who are the consorts of Hephaestus? Aphrodite, Aglaea 7. Who is the father of Hephaestus? Zeus 8. Which one of these is a sibling of Hephaestus? Hermes 9. Which one of these is one of Hephaestus's children? Thalia 10.
    [Show full text]
  • Hippocratic Diagnosis, Solomonic Therapy, Roman Amulets: Epilepsy, Exorcism, and the Diffusion of a Jewish Tradition in the Roman World
    Journal for the Study of Judaism 52 (2021) 1–25 Journal for the Study of Judaism brill.com/jsj Hippocratic Diagnosis, Solomonic Therapy, Roman Amulets: Epilepsy, Exorcism, and the Diffusion of a Jewish Tradition in the Roman World Michael Zellmann-Rohrer | orcid: 0000-0002-5200-8480 University of Oxford, Oxford, United Kingdom; Freie Universität, Berlin, Germany [email protected] Abstract Two contrasting portraits of exorcism in the Roman period for patients with symptoms consistent with epilepsy, drawn by Josephus (A.J. 8.45–47) and Lucian (Philops. §16), illustrate a substantial albeit contested diffusion of that ancient technique from the Jewish tradition to a wider Mediterranean public. The process is reflected in a simi- larly complex traditional background and textual composition of a group of inscribed Greek amulets for epilepsy. A sidelight on attitudes towards the practice of exorcism, on its way to wider popularity, and the conception of epilepsy is cast by these amu- lets, which have not yet been studied as a group. Their texts witness the application of precise Greek medical terminology, yet to an end, and in a compositional company, that authors in the Hippocratic tradition would have rejected. More generally, the arti- facts offer a cross-section of amuletic practice and its diversity in the Roman and late ancient periods. Keywords epilepsy – exorcism – amulets – medicine The healing exorcism,1 the adjuration of a demon or personified illness to stop its maleficent activities, more particularly via an oath in the name of a 1 A fundamental survey is Thraede, “Exorzismus”; of the vast literature some recent works may be mentioned: Sorensen, Possession and Exorcism; Twelftree, Jesus the Exorcist; Leicht, © Michael Zellmann-Rohrer, 2021 | doi:10.1163/15700631-BJA10033 This is an open access article distributed under the terms of the CC BY 4.0Downloaded license.
    [Show full text]
  • Table of Contents
    The Sundered Eagle Contents The Middle Classes ........................ 37 I. Introduction 6 III. The Order of Hermes 20 The Lower Classes .......................... 37 BYZANTINE LANDSCAPE ....................... 6 HERMETIC HISTORY .......................... 20 Slavery ............................................ 37 BYZANTINE REALMS ............................ 6 Before the Order of Hermes ........... 20 Eunuchs .......................................... 37 BYZANTINE PEOPLES ........................... 6 Shaping the Theban Tribunal ......... 20 Women ........................................... 38 BYZANTINE LEGENDS .......................... 6 The Collapse of an Empire .................22 THE EASTERN CHURCH ..................... 38 HOW TO USE THIS BOOK ................... 7 THE LEAGUES OF THEBES .................. 22 The Two Patriarchs The League of Constantine ............ 22 of Constantinople ........................... 38 The Children of Olympos .............. 23 Buildings ......................................... 39 II. History of the Empire 8 The League of the Vigilant ............. 24 Clergy ............................................. 39 League Against Idolatry .................. 24 The Origin of Mankind .................... 8 Monastics ....................................... 40 The Age of Heroes ........................... 8 THEBAN TRIBUNAL POLITICS .............. 24 Icons ............................................... 40 The Trojan War .................................8 THE HERMETIC POLITY ..................... 24 INHABITANTS...................................
    [Show full text]