AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;Login: Is the Official WORKPLACE Rik Farrow Magazine of the [email protected] USENIX Association

Total Page:16

File Type:pdf, Size:1020Kb

AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;Login: Is the Official WORKPLACE Rik Farrow Magazine of the Rik@Usenix.Org USENIX Association A UGUST 2005 VOLUME 30 NUMBER 4 THE USENIX MAGAZINE OPINION Musings RIK FARROWS Conference Password Sniffing ABE SINGER SYSADMIN The Inevitability of Xen JON CROWCROFT, KEIR FRASER, STEVEN HAND, IAN PRATT, AND ANDREW WARFIELD Secure Automated File Transfer MARK MCCULLOUGH SAN vs. NAS for Oracle: A Tale of Two Protocols ADAM LEVIN Practical Perl ADAM TUROFF ISPadmin ROBERT HASKINS L AW Primer on Cybercrime Laws DANI EL L. APPELMAN SECURITY Forensics for System Administrators SEAN PEISERT Your Defense Is Offensive STEVE MANZUIK WORKPLACE Marketing after the Bubble EMILY W. SALUS AND PETER H. SALUS BOOK REVIEWS Book Reviews RIK FAROWS USENIX NOTES SAGE Update DAVID PARTER ...and much more CONFERENCES 2005 USENIX Annual Technical Conference 2nd Symposium on Networked Systems Design and Implementation (NSDI ’05) 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004) The Advanced Computing Systems Association Upcoming Events INTERNET MEASUREMENT CONFERENCE 2005 4TH USENIX CONFERENCE ON FILE AND (IMC ’05) STORAGE TECHNOLOGIES (FAST ’05) Sponsored by ACM SIGCOMM in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), OCTOBER 19–21, 2005, NEW ORLEANS, LA, USA and IEEE TCOS http://www.usenix.org/imc05 DECEMBER 14–16, 2005, SAN FRANCISCO, CA, USA http://www.usenix.org/fast05 ACM/IFIP/USENIX 6TH INTERNATIONAL MIDDLEWARE CONFERENCE 3RD SYMPOSIUM ON NETWORKED SYSTEMS NOVEMBER 28–DECEMBER 2, 2005, GRENOBLE, FRANCE DESIGN AND IMPLEMENTATION (NSDI ’06) http://middleware05.objectweb.org Sponsored by USENIX, in cooperation with ACM SIGCOMM and ACM SIGOPS MAY 8–10, 2006, SAN JOSE, CA, USA 19TH LARGE INSTALLATION SYSTEM http://www.usenix.org/nsdi06 ADMINISTRATION CONFERENCE (LISA ’05) Paper titles and abstracts due: October 10, 2005 Sponsored by USENIX and SAGE Final paper submissions due: October 17, 2005 DECEMBER 4–9, 2005, SAN DIEGO, CA, USA http://www.usenix.org/lisa05 5TH SYSTEM ADMINISTRATION AND NETWORK ENGINEERING CONFERENCE (SANE 2006) 2ND WORKSHOP ON REAL, LARGE Organized by Stichting SANE and co-sponsored by Stichting DISTRIBUTED SYSTEMS (WORLDS ’05) NLnet, USENIX, and SURFnet MAY 15–19, 2006, DELFT, THE NETHERLANDS DECEMBER 13, 2005, SAN FRANCISCO, CA, USA http://www.usenix.org/worlds05 http://www.sane.nl/sane2006 Paper submissions due: October 24, 2005 Paper submissions due: August 8, 2005 3RD INTERNATIONAL IEEE SECURITY IN STORAGE 2006 USENIX ANNUAL TECHNICAL WORKSHOP CONFERENCE (USENIX ’06) Sponsored by IEEE Computer Society Task Force on Information MAY 30–JUNE 3, 2006, BOSTON, MA, USA Assurance (TFIA) in cooperation with IEEE Mass Storage Systems Technical Committee (MSSTC) and USENIX DECEMBER 13, 2005, SAN FRANCISCO, CA, USA http://www.ieeeia.org/sisw/2005 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events OPINION 2 Musings RIK FARROW 5 Conference Password Sniffing: Legal and Ethical Issues ABE SINGER SYSADMIN 10 The Inevitability of Xen JON CROWCROFT, KEIR FRASER, STEVEN HAND, contents IAN PRATT, AND ANDREW WARFIELD 14 Secure Automated File Transfer MARK MCCULLOUGH 18 SAN vs. NAS for Oracle: A Tale of Two Protocols ADAM LEVIN 22 Practical Perl: Defensive CGI Programming with Taint Mode and CGI::Untaint ADAM TUROFF 28 ISPadmin: Understanding and Mitigating DDoS Attacks ROBERT HASKINS LAW 31 Primer on Cybercrime Laws DANI EL L. APPELMAN SECURITY 34 Forensics for System Administrators SEAN PEISERT VOL. 30, #4, AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;login: is the official WORKPLACE Rik Farrow magazine of the [email protected] USENIX Association. 47 Marketing After the Bubble MANAGING EDITOR ;login: (ISSN 1044-6397) is EMILY W. SALUS AND PETER H. SALUS Jane-Ellen Long published bi-monthly by the [email protected] USENIX Association, 2560 BOOK REVIEWS COPY EDITOR Ninth Street, Suite 215, Steve Gilmartin Berkeley, CA 94710. 50 Book Reviews [email protected] $85 of each member’s annual RI K FARROW PRODUCTION dues is for an annual sub- Rob Carroll scription to ;login:. Subscrip- USENIX NOTES Casey Henderson tions for nonmembers are $115 per year. 51 20 Years Ago in ;login: TYPESETTER PETER H. SALUS Star Type Periodicals postage paid at [email protected] Berkeley, CA, and additional 52 SAGE Update offices. USENIX ASSOCIATION DAVID PARTER POSTMASTER: Send address 2560 Ninth Street, 53 New Membership Benefits Suite 215, Berkeley, changes to ;login:, California 94710 USENIX Association, TARA MULLIGAN AND ANNE DICKISON Phone: (510) 528-8649 2560 Ninth Street, FAX: (510) 548-5738 Suite 215, Berkeley, CONFERENCE REPORTS CA 94710. http://www.usenix.org 54 2005 USENIX Annual Technical Conference http://www.sage.org ©2005 USENIX Association. 79 2nd Symposium on Networked Systems Design USENIX is a registered trade- mark of the USENIX Associa- and Implementation (NSDI ’05) tion. Many of the designa- 88 6th IEEE Workshop on Mobile Computing tions used by manufacturers and sellers to distinguish their Systems and Applications (WMCSA 2004) products are claimed as trade- marks. USENIX acknowl- edges all trademarks herein. Where those designations appear in this publication and USENIX is aware of a trade- mark claim, the designations have been printed in caps or initial caps. AT MY HOUSE, AS AT MOST OF THE buildings in the world, the best views are RIK FARROW from the roof. When I sit up there, I can see thunderstorms 30 miles away, up on the Colorado Plateau to the north. Even though I can see great bolts of lightning striking the ground, around me it is quiet and calm. musings The comparative silence is an illusion. As I wrote in Rik Farrow provides UNIX and Internet security con- my last column, enormous botnets wait to carry out sulting and training. He is the author of UNIX System their owners’ bidding, whether it be DDoS, relaying Security and System Administrator’s Guide to System spam, or assimilating more systems. There is more V and editor of the SAGE Short Topics in System Administration series. bloated software than ever before, just waiting to be exploited. Steve Manzuik has an article in this issue [email protected] about security software that has been (and still is being) exploited. One of the things I have always found fascinating is NOTE operating system design. I will have attended the [1] There actually were two papers presented about security HotOS workshop, as an observer, by the time you at HotOS, so security was a topic that was seriously read this. And one aspect of operating systems that I addressed. don’t expect will be discussed is security [1]. We have generally chosen not to include security in our oper- ating systems, outside of jails, firewalls, and some coarse-grained protection like the BSD secure levels. And these are add-ons. Operating systems are not designed for security; they are designed for perform- ance and to support features. Computers are already ubiquitous. From the simple controllers in toasters, microwaves, and cars to the more powerful ones in cell phones, computers have become embedded throughout the developed world. What is changing about these computers is just how powerful they can be. AMD has announced a new, low-power, i386-compat- ible CPU, the Geode LX 800 (http://www.linuxdevices .com/news/NS2872282951.html). This link points to a Linux site, but if you read the AMD PR, it points out that the Geode supports a familiar programming envi- ronment—Windows CE. The Geode can amply sup- port Windows or Linux or BSD. The 500Mhz process- ing core includes native support for DDR RAM at 400Mhz, L1 and L2 caches, 2-D graphics, and hard- ware support for cryptography. The companion chip supports ATA, PCI, and USB busses, and the two chips together draw only two watts of power. Com- pare that power consumption to almost anything on the desktop today, along with the performance, and you can see where this is going. Cell phones with the same capabilities as PCs of five years ago—except without decent keyboards. And security? I would not want to carry any device, especially one designed for network communications like a cell phone, that runs Windows CE. But even 2 ;LO GIN: V OL. 30, NO. 4 getting FreeBSD, OpenBSD, or Linux to run mobile Another Hat applications securely takes some serious work. None of these operating systems was designed from the In my collection of work apparel, I have added a new ground up to support security. Security was included, hat to wear, that of editor of ;login:. I can’t rely on dis- in the case of UNIX, to support multiple users on the tant visions from my rooftop to learn what the same system, not for protecting a single user who USENIX community wants or needs, or what people might run hostile apps. within that community are doing. I need you to tell Perhaps you don’t believe me. Let’s look at some me what interests you, what you want to know, what solutions. you are doing, or, better yet, what you can share with the community. The SAGE update, written by David Parter, is one example of learning what part of the Sandbox community is doing. The BSD jail is a nice solution: Chroot on steroids, Although united around computing, the USENIX something I’ve written a lot about before. Its failings community is a broad one. A quick look at the events are limited control over networking and none over calendar shows that there are many small confer- processor scheduling. ences/workshops sponsored by USENIX, often co- Fedora includes a complete SELinux configuration. sponsored with other organizations. These work- SELinux was designed to provide Mandatory Access shops cost more than can be collected as registration Control, a mechanism where users are not able to fees, and the USENIX Association—that is, you— control even access to their own files.
Recommended publications
  • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
    University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies.
    [Show full text]
  • Speeding up Correlation Search for Binary Data
    Speeding up Correlation Search for Binary Data Lian Duan and W. Nick Street [email protected] Management Sciences Department The University of Iowa Abstract Finding the most interesting correlations in a collection of items is essential for problems in many commercial, medical, and scientific domains. Much previous re- search focuses on finding correlated pairs instead of correlated itemsets in which all items are correlated with each other. Though some existing methods find correlated itemsets of any size, they suffer from both efficiency and effectiveness problems in large datasets. In our previous paper [10], we propose a fully-correlated itemset (FCI) framework to decouple the correlation measure from the need for efficient search. By wrapping the desired measure in our FCI framework, we take advantage of the desired measure’s superiority in evaluating itemsets, eliminate itemsets with irrelevant items, and achieve good computational performance. However, FCIs must start pruning from 2-itemsets unlike frequent itemsets which can start the pruning from 1-itemsets. When the number of items in a given dataset is large and the support of all the pairs cannot be loaded into the memory, the IO cost O(n2) for calculating correlation of all the pairs is very high. In addition, users usually need to try different correlation thresholds and the cost of processing the Apriori procedure each time for a different threshold is very high. Consequently, we propose two techniques to solve the efficiency problem in this paper. With respect to correlated pair search, we identify a 1-dimensional monotone prop- erty of the upper bound of any good correlation measure, and different 2-dimensional monotone properties for different types of correlation measures.
    [Show full text]
  • OPINION Sysadmin NETWORKING Security Columns
    October 2010 VOLUME 35 NUMBER 5 OPINION Musings 2 RikR FaR ow SYSADMin Teaching System Administration in the Cloud 6 Jan Schaumann THE USENIX MAGAZINE A System Administration Parable: The Waitress and the Water Glass 12 ThomaS a. LimonceLLi Migrating from Hosted Exchange ­Service to In-House Exchange Solution 18 T Roy mckee NETWORKING IPv6 Transit: What You Need to Know 23 mT aT Ryanczak SU EC RITY Secure Email for Mobile Devices 29 B Rian kiRouac Co LUMNS Practical Perl Tools: Perhaps Size Really Does Matter 36 Davi D n. BLank-eDeLman Pete’s All Things Sun: The “Problem” with NAS 42 Pe TeR BaeR GaLvin iVoyeur: Pockets-o-Packets, Part 3 48 Dave JoSePhSen /dev/random: Airport Security and Other Myths 53 RoT BeR G. FeRReLL B OOK reVIEWS Book Reviews 56 El izaBeTh zwicky, wiTh BRanDon chinG anD Sam SToveR US eniX NOTES USA Wins World High School Programming Championships—Snaps Extended China Winning Streak 60 RoB koLSTaD Con FERENCES 2010 USENIX Federated Conferences Week: 2010 USENIX Annual Technical Conference Reports 62 USENIX Conference on Web Application Development (WebApps ’10) Reports 77 3rd Workshop on Online Social Networks (WOSN 2010) Reports 84 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud ’10) Reports 91 2nd Workshop on Hot Topics in Storage and File Systems (HotStorage ’10) Reports 100 Configuration Management Summit Reports 104 2nd USENIX Workshop on Hot Topics in Parallelism (HotPar ’10) Reports 106 The Advanced Computing Systems Association oct10covers.indd 1 9.7.10 1:54 PM Upcoming Events 24th Large InstallatIon system admInIstratIon ConferenCe (LISA ’10) Sponsored by USENIX in cooperation with LOPSA and SNIA november 7–12, 2010, San joSe, Ca, USa http://www.usenix.org/lisa10 aCm/IfIP/USENIX 11th InternatIonaL mIddLeware ConferenCe (mIddLeware 2010) nov.
    [Show full text]
  • Mining Web User Behaviors to Detect Application Layer Ddos Attacks
    JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 985 Mining Web User Behaviors to Detect Application Layer DDoS Attacks Chuibi Huang1 1Department of Automation, USTC Key laboratory of network communication system and control Hefei, China Email: [email protected] Jinlin Wang1, 2, Gang Wu1, Jun Chen2 2Institute of Acoustics, Chinese Academy of Sciences National Network New Media Engineering Research Center Beijing, China Email: {wangjl, chenj}@dsp.ac.cn Abstract— Distributed Denial of Service (DDoS) attacks than TCP or UDP-based attacks, requiring fewer network have caused continuous critical threats to the Internet connections to achieve their malicious purposes. The services. DDoS attacks are generally conducted at the MyDoom worm and the CyberSlam are all instances of network layer. Many DDoS attack detection methods are this type attack [2, 3]. focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In The challenges of detecting the app-DDoS attacks can this paper, we propose a scheme based on web user be summarized as the following aspects: browsing behaviors to detect the application layer DDoS • The app-DDoS attacks make use of higher layer attacks (app-DDoS). A clustering method is applied to protocols such as HTTP to pass through most of extract the access features of the web objects. Based on the the current anomaly detection systems designed access features, an extended hidden semi-Markov model is for low layers. proposed to describe the browsing behaviors of web user. • Along with flooding, App-DDoS traces the The deviation from the entropy of the training data set average request rate of the legitimate user and uses fitting to the hidden semi-Markov model can be considered as the abnormality of the observed data set.
    [Show full text]
  • Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
    THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine.
    [Show full text]
  • Building Ambitious Us Subnational Climate Initiatives: Embracing Dignity and the Tradition of Civic Engagement
    BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT A Thesis submitted to the Faculty of The School of Continuing Studies and of The Graduate School of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Liberal Studies By Cyd Slayton, M.F.A Georgetown University Washington, D.C. April 2018 Copyright 2018 by Cyd Slayton All Rights Reserved ii BUILDING AMBITIOUS US SUBNATIONAL CLIMATE INITIATIVES: EMBRACING DIGNITY AND THE TRADITION OF CIVIC ENGAGEMENT Cyd Slayton, M.F.A. DLS Chair: Thomas Kerch, Ph.D. ABSTRACT The human activity of emitting greenhouse gasses (GHGs) is contributing to the intensification of extreme weather, according to nearly all climate scientists. Already, atmospheric concentrations of the three most heat-trapping greenhouse gasses (GHGs)— carbon dioxide, methane, and nitrous oxide—are “unprecedented for at least 800,000 years.”1 As a result, heat waves, droughts, floods, cyclones, wildfires, and rising seas are more frequent and powerful. While the planet will survive the climate catastrophes, a destabilized atmosphere threatens all species, including our own. Over the past 25 years, total GHG emissions have continued to rise, despite international and bilateral climate treaties. Generally, the US has refused to ratify treaties that appear to impinge on national sovereignty, including the Kyoto Protocol with its “top 1 IPCC Working Groups I, II and III, Climate Change 2014: Synthesis Report , Contribution to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, eds. R.K. Pachauri and L.A. Meyer (Geneva: IPCC, 2014), 4, accessed March 2, 2018, https://www.ipcc.ch/pdf/assessment- report/ar5/syr/AR5_SYR_FINAL_SPM.pdf.
    [Show full text]
  • Nips 2015 Conference Book Montreal 2015
    NIPS 2015 CONFERENCE BOOK MONTREAL 2015 N I P S 2 0 15 LOCATION Palais des Congrès de Montréal Convention and Exhibition Center, Montreal, Quebec, Canada TUTORIALS December 7, 2015 CONFERENCE SESSIONS December 8 - 10, 2015 SYMPOSIA Sponsored by the Neural Information Processing December 10, 2015 System Foundation, Inc The technical program includes 6 invited talks and WORKSHOPS 403 accepted papers, selected from a total of 1838 December 11-12, 2015 submissions considered by the program committee. Because the conference stresses interdisciplinary interactions, there are no parallel sessions. Papers presented at the conference will appear in “Advances in Neural Information Processing 28,” edited by edited by Daniel D. Lee, Masashi Sugiyama, Corinna Cortes, Neil Lawrence and Roman Garnett. 1 TABLE OF CONTENTS Core Logistics Team 2 Wednesday Organizing Committee 3 Oral Sessions Program Committee 3 Sessions 5 - 8, Abstracts 73 NIPS Foundation Offices and Board Members 3 Spotlights Sessions Sponsors 4 - 7 Sessions 5 - 8, Abstracts 73 Poster Sessions PROGRAM HIGHLIGHTS 8 Sessions 1 - 101 76 Exhibitors 9 Location of Presentations 80 Letter From The President 10 Abstracts 81 Future Conferences 11 Demonstrations 102 MONDAY Thursday Tutorials Oral Sessions Abstracts 13 Session 9 105 Poster Sessions Spotlights Sessions Location of Presentations 15 Session 9 105 Sessions 1 - 101 16 Poster Sessions Monday Abstracts 17 Sessions 1 - 100 105 Location of Presentations 109 Tuesday Abstracts 110 Oral Sessions Sessions 1 - 4, Abstracts 41 Symposia 131 Spotlights Sessions Workshops 132 Sessions 1 - 4, Abstracts 41 Reviewers 133 Poster Sessions Author Index 135 Sessions 1 - 101 44 Location of Presentations 48 CORE LOGISTICS TEAM Abstracts 49 The organization and management of NIPS would not be possible without the help of many volunteers, students, Demonstrations 70 researchers and administrators who donate their valuable time and energy to assist the conference in various ways.
    [Show full text]
  • Funkhouser, C, Baldwin.S, Prehistoric Digital Poetry. Anarchaeologyof
    Prehistoric Digital Poetry MODERN AND CONTEMPORARY POETICS Series Editors Charles Bernstein Hank Lazer Series Advisory Board Maria Damon Rachel Blau DuPlessis Alan Golding Susan Howe Nathaniel Mackey Jerome McGann Harryette Mullen Aldon Nielsen Marjorie Perloff Joan Retallack Ron Silliman Lorenzo Thomas Jerry Ward Prehistoric Digital Poetry An Archaeology of Forms, 1959–1995 C. T. FUNKHOUSER THE UNIVERSITY OF ALABAMA PRESS Tuscaloosa Copyright © 2007 The University of Alabama Press Tuscaloosa, Alabama 35487-0380 All rights reserved Manufactured in the United States of America Typeface: Minion ∞ The paper on which this book is printed meets the minimum requirements of American National Standard for Information Sciences-Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. Library of Congress Cataloging-in-Publication Data Funkhouser, Chris. Prehistoric digital poetry : an archaeology of forms, 1959–1995 / C. T. Funkhouser. p. cm. — (Modern and contemporary poetics) Includes bibliographical references and index. ISBN-13: 978-0-8173-1562-7 (cloth : alk. paper) ISBN-10: 0-8173-1562-4 (cloth : alk. paper) ISBN-13: 978-0-8173-5422-0 (pbk. : alk. paper) ISBN-10: 0-8173-5422-0 (pbk. : alk. paper) 1. Computer poetry—History and criticism. 2. Computer poetry—Technique. 3. Interactive multimedia. 4. Hypertext systems. I. Title. PN1059.C6F86 2007 808.10285—dc22 2006037512 Portions of I-VI by John Cage have been reprinted by permission of Harvard University Press, Cambridge, Mass, pp. 1, 2, 5, 103, 435. Copyright © 1990 by the President and Fellows of Harvard College. To my comrades in the present and to cybernetic literary paleontologists of the mythic future “The poem is a machine,” said that famous man, and so I’m building one.
    [Show full text]
  • Sorted by Artist Music Listing 2005 112 Hot & Wet (Radio)
    Sorted by Artist Music Listing 2005 112 Hot & Wet (Radio) WARNING 112 Na Na Na (Super Clean w. Rap) 112 Right Here For You (Radio) (63 BPM) 311 First Straw (80 bpm) 311 Love Song 311 Love Song (Cirrus Club Mix) 702 Blah Blah Blah Blah (Radio Edit) 702 Star (Main) .38 Special Fade To Blue .38 Special Hold On Loosely 1 Giant Leap My Culture (Radio Edit) 10cc I'm Not In Love 1910 Fruitgum Company Simon Says 2 Bad Mice Bombscare ('94 US Remix) 2 Skinnee J's Grow Up [Radio Edit] 2 Unlimited Do What's Good For Me 2 Unlimited Faces 2 Unlimited Get Ready For This 2 Unlimited Here I Go 2 Unlimited Jump For Joy 2 Unlimited Let The Beat Control Your Body 2 Unlimited Magic Friend 2 Unlimited Maximum Overdrive 2 Unlimited No Limit 2 Unlimited No One 2 Unlimited Nothing Like The Rain 2 Unlimited Real Thing 2 Unlimited Spread Your Love 2 Unlimited Tribal Dance 2 Unlimited Twilight Zone 2 Unlimited Unlimited Megajam 2 Unlimited Workaholic 2% of Red Tide Body Bagger 20 Fingers Lick It 2funk Apsyrtides (original mix) 2Pac Thugz Mansion (Radio Edit Clean) 2Pac ft Trick Daddy Still Ballin' (Clean) 1 of 197 Sorted by Artist Music Listing 2005 3 Doors Down Away From The Sun (67 BPM) 3 Doors Down Be Like That 3 Doors Down Here Without You (Radio Edit) 3 Doors Down Kryptonite 3 Doors Down Road I'm On 3 Doors Down When I'm Gone 3k Static Shattered 3LW & P Diddy I Do (Wanna Get Close To You) 3LW ft Diddy & Loan I Do (Wanna Get Close To You) 3LW ft Lil Wayne Neva Get Enuf 4 Clubbers Children (Club Radio Edit) 4 Hero Mr.
    [Show full text]
  • I Can't to I Kant: the Sexual Harassment of Working Adolescents, Competing
    DROBAC.FINAL.READYFORFINALREAD (WITH TOC).JERRY-1-24-06.DOC 1/27/2007 5:48:39 PM I CAN’T TO I KANT: THE SEXUAL HARASSMENT OF WORKING ADOLESCENTS, COMPETING THEORIES, AND ETHICAL DILEMMAS Jennifer Ann Drobac* I. Introduction ................................................................................. 676 II. Socio-Legal Theory and the Regulation of Sex......................... 682 A. The Traditional View ....................................................... 682 B. The Liberal View .............................................................. 686 C. The Egalitarian and Mutuality Perspectives.................. 691 D. A Pansexual Perspective.................................................. 694 E. Socio-Legal Theory for the Twenty-First Century Adolescent ........................................................................ 695 1. Physical Force............................................................. 696 2. Duress and Teen Responses....................................... 697 3. Deception and Teen Perception ................................. 698 4. Socio-Legal Theory and Sexual Harassment Law .... 699 III. Sexual Harassment Legal Theory ........................................... 700 A. Beyond the Subordination of Women .............................. 700 B. Gender Policing ................................................................ 701 C. Subordination in Context................................................. 703 D. Beyond Subordination Theory ......................................... 706 IV. Philosophy and Psychology
    [Show full text]
  • A Defense Framework Against Denial-Of-Service in Computer Networks
    A DEFENSE FRAMEWORK AGAINST DENIAL-OF-SERVICE IN COMPUTER NETWORKS by Sherif Khattab M.Sc. Computer Science, University of Pittsburgh, USA, 2004 B.Sc. Computer Engineering, Cairo University, Egypt, 1998 Submitted to the Graduate Faculty of the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2008 UNIVERSITY OF PITTSBURGH DEPARTMENT OF COMPUTER SCIENCE This dissertation was presented by Sherif Khattab It was defended on June 25th, 2008 and approved by Prof. Rami Melhem, Department of Computer Science Prof. Daniel Moss´e,Department of Computer Science Prof. Taieb Znati, Department of Computer Science Prof. Prashant Krishnamurthy, School of Information Sciences Dissertation Advisors: Prof. Rami Melhem, Department of Computer Science, Prof. Daniel Moss´e,Department of Computer Science ii A DEFENSE FRAMEWORK AGAINST DENIAL-OF-SERVICE IN COMPUTER NETWORKS Sherif Khattab, PhD University of Pittsburgh, 2008 Denial-of-Service (DoS) is a computer security problem that poses a serious challenge to trustworthiness of services deployed over computer networks. The aim of DoS attacks is to make services unavailable to legitimate users, and current network architectures allow easy-to-launch, hard-to-stop DoS attacks. Particularly challenging are the service-level DoS attacks, whereby the victim service is flooded with legitimate-like requests, and the jamming attack, in which wireless communication is blocked by malicious radio interference. These attacks are overwhelming even for massively-resourced services, and effective and efficient defenses are highly needed. This work contributes a novel defense framework, which I call dodging, against service- level DoS and wireless jamming.
    [Show full text]
  • Overall Risk Level
    Riskline / Country Report / 29 August 2021 EGYPT Overall risk level High Reconsider travel Can be dangerous and may present unexpected security risks Travel is possible, but there is a potential for disruptions Overview Emergency Numbers Medical 123 Upcoming Events 30 August 2021 - 14 September 2021 Medium risk: Chinese officials suspend flights from Paris and Cairo on 30 August-13 September - Update Air China flight CA934 from Paris Charles de Gaulle Airport (CDG/LFPG) in France to Tianjin Binhai Airport (TSN/ZBTJ) in China and Egyptair flight MS953 from Cairo Airport (CAI/HECA) in Egypt to Hangzhou Xiaoshan Airport (HGH/ZSHC) in China will be suspended from 30 August for two weeks, due to COVID-19. Riskline / Country Report / 29 August 2021 / Egypt 2 Travel Advisories Medium risk: Militant attacks in mainland Egypt Exercise caution for travel to Egypt until further notice because of potential attacks by militant groups. Domestic and international terror groups, including the Islamic State (IS), have proved that they have both the capability and intent to strike security and tourist sites within mainland Egypt, including Cairo, Giza, and 6th of October City since 2013. At least five militant attacks occurred in Cairo in 2019, killing at least 25 people and injuring 54 others. These attacks mostly targeted security forces, unlike some of the attacks from previous years, which struck places popular with tourists – including a roadside bomb attack targeting Vietnamese nationals on a tour bus near the Giza pyramids (28 December 2018), knife attacks targeting hotels and beachgoers in the resort city of Hurghada (14 July 2017 and 8 January 2016) and a suicide bombing outside Karnak Temple in Luxor (10 June 2015).
    [Show full text]