The Journal of AUUG Inc. Volume 23 ¯ Number 4 December 2002

Total Page:16

File Type:pdf, Size:1020Kb

The Journal of AUUG Inc. Volume 23 ¯ Number 4 December 2002 The Journal of AUUG Inc. Volume 23 ¯ Number 4 December 2002 Features: This Issues CD: Knoppix Bootable CD 4 Using ODS to move a file system on the fly 7 Handling Power Status using snmptrapd 9 Process Tracing us ptrace - Part 2 11 Viruses: a concern for all of us 13 Viruses and System Security 21 Why Success for Open Source is great for Windows Users 22 Root-kits and Integrity 24 Installing and LAMP System 32 Exploring Perl Modules - Part 2: Creating Charts with GD:: Graph 38 DVD Authoring 41 Review: Compaq Presario 1510US 43 Athlon XP 2400 vs Intel Pentium 4 2.4Ghz and 2.8Ghz 46 Creating Makefiles 52 The Story of Andy’s Computer 54 News: Public Notices 5 AUUG: Corporate Members 9 AUUG: Chapter Meetings and Contact Details 61 Regulars: President’s Column 3 /var/spool/mail/auugn 3 My Home Network 5 AUUGN Book Reviews 7 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUG Membership and General Correspondence The AUUG Secretary AUUG Inc Editorial PO Box 7071 Con Zymaris [email protected] Baulkham Hills BC NSW 2153 Telephone: 02 8824 95tl or 1800 625 655 (Toll-Free) I remember how exhilarating my first few brushes Facsimile: 02 8824 9522 with computerswere. It was the late ’70s. We had just Email: [email protected] experienced two massive waves of pop-technology AUUG Management Committee which swept through the public consciousness like a Email: au ugexec@au u.q.org.au flaring Tesla-coil: Star Wars had become the most successful film of all time, playing in cinemas (and President drive-ins.., remember those?) for over two years. This Greg Lehey film ushered in an era where all tech was ’big’ and PO Box 460 Echunga, SA, 5153 exciting. Almost as big is what happened next: a little Bus. Tel (08) 8388 8286, Mobile 0418 838 708, Fax (08) 8388 8725 game built on an 8-bit micro-controller, 4K of EPROM <[email protected]> and a black & white screen which had coloured band- strips pasted across the top to mimic a colour Immediate Past President David Purdue monitor. That phenomenon, Space Invaders, seemed Sun Microsystems to lock-grips with Star Wars, and both helped segue Level 6, 476 St Kiida Road the Personal Computer into the general public Melbourne, Victoria, 3004 Phone: +61 3 9869 6412, Fax: +61 3 9869 6288 mindscape. Computers were suddenly a tool that <[email protected]> geeky teenagers could pour undue attention into. Space Invaders, Star Wars and the PC: the stuff Vice-president wrought by geeks who loved to hack and build. Malcolm Caldwell Bus. Tel (08) 8946 6631, Fax (08) 8946 6630 <[email protected]> It was into this environment that I dove, when I started with computers. These were truly new and Secretary amazing devices. You could let your imagination run David Bullock 0402 901 228 apace, conceiving of alternate worlds and then fully, <[email protected]. .. or.q., au> richly conjuring your imaginings into software-reality. Here were the makings of a compelling, universal tool, Treasurer one that could be morphed (like digital clay) into Gordon Hubbard Custom Technology Australia Pty Ltd almost any task at hand. And here it was in my Level 22, 259 George Street, Sydney NSW 2000 hands. I lost track of the number of 40-hour-straight Bus Tel: 02 9659 9590, Bus Fax: 02 9659 9510 coding stints I immersed myself into. I too, had <[email protected]> become a geek who hacked and built. Committee Members Sarah Bolderoff The marathon that is life runs its course, and what FourSticks had once been one of the most engrossing of activities Suite 2, 259 Glen Osmond Rd, and hobbies, had somehow become rather pedestrian Frewville, South Australia, 5065 and humdrum. The time was the early-90’s. The <[email protected]> world seemed to settle upon a rather technologically- Adrian Close wanting and dull platform, and things had become Mobile: +61 412 385 201, <[email protected]> un-innovative, predictable and gray. The commen- Stephen Rothwell realm of our industry emanated more from mega- IBM Australia, Linux Technology Center corps, and not from the lone-coders and dreamers. 8 Brisbane Ave, Barton ACT 2600 But those who hacked and built had not gone away Business phone: 02 62121169 however; far from it. <[email protected]_q.au> Andrew Rutherford The wandering troupes of geeks had, of course been lagu Networks, 244 Pirie St there all along, beavering away behind the scenes. Adelaide, SA, 5000 And what they had produced then, and continue to Bus. Tel (08) 8425 2201, Bus. Fax (08) 8425 2299 perfect now, is the technology which allowed them to <[email protected]> become frighteningly effective at collaborative Mark White development, distribution and evangelism; that which apviva technology partners changed the world as we knew it: the Internet. P. O. Box 1870, Toowong QLD 4066 Bus Tel 07 3876 8779, Mobile 04 3890 0880 <[email protected]> More importantly and personally precious than any particular technology, ideology or product; they had rekindled my keenness in computers. No longer do we AUUG Business Manager deal with a merely ’business’ functional tool; we have, Elizabeth Carroll AUUG Inc re-acquired that most wonderous of things and the PO Box 7071 ultimate conduit for our imaginations. Baulkham Hills BC NSW 2153 <[email protected]> To all those who tinkered, hacked and coded their idle hours, engrossed as I had once been, and kept the flame burning during the time of gray, I salute you. Cheers, Con AUUGN Vol.23 = No.4 - 1 - December 2002 AUUGN Editorial Committee Contribution The AUUGN Editorial Committee can be reached by sending email to: auugn@auu~.orK.au Deadlines for AUUGN Or to the following address: AUUG Inc in 2002 PO Box 7071 Baulkham Hills BC NSW 2153 Volume 24 ¯ Number 1 - March 2003: February 15t~, Editor: 2003 Con Zymaris Sub-Editors: Frank Crawford, Mark White Volume 24 ° Number 2 - June 2003: May 15th, 2003 Contributors: This issue would not have happened without the transcription and editorial efforts of Gary R. Schmidt" <[email protected]>, Rik Harris <[email protected]>, Raymond Smith <[email protected]>, David AUUG Incorporated gratefully acknowledges Lloyd <[email protected]>, Peter Sandilands <[email protected]>, Grahame Bowland <[email protected]>, the support of its corporate sponsor: Cameron Strom <[email protected]> Public Relations and Marketing: Elizabeth Carroll AUUGN Submission Guidelines Submission guidelines for AUUGN contributions can be obtained from the AUUG World Wide Web site at: www.auug.org.au Alternately, send email to the above correspondence address, requesting a copy. AUUGN Back Issues A variety of back issues of AUUGN are still available. For price and availability please contact the AUUG Secretariat, or write to: AUUG Inc PO Box 7071 microsys tlems Baulkham Hills BC NSW 2153 Conference Proceedings A limited number of copies of the Conference Proceedings from previous AUUG Conferences are still available. Contact the AUUG Secretariat for details. Mailing Lists Enquiries regarding the purchase of the AUUGN mailing list should be directed to the AUUG Secretariat. Disclaimer Opinions expressed by the authors and reviewers are not necessarily those of AUUG Inc., its Journal, or its editorial committee. Copyright Information Copyright © 2002 AUUG Inc. All rights reserved. Portions © by their respective authors, and released under specified licences. AUUGN is the journal of AUUG Inc., an organisation with the aim of promoting knowledge and understanding of Open Systems, including, but not restricted to, the UNIX® operating system, user interfaces, graphics, networking, programming and development environments and related standards. Copyright without fee is permitted, provided that copies are made without modification, and are not made or distributed for commercial advantage. AUUGN Vol.23 o No.4 -2- December 2002 that’s also important. The issue is that open source President’s Column is not seen as a method to improve security or Greg Lehey <Greg.Lehev(~.auug.or.q.au> reliability: it’s seen as a way of saving money. Where does AUUG stand in this matter? We’re not In early 1997 I read an article on the web which really an open source organization, we’re a UNIX ventured the opinion that Microsoft’s empire had organization. Sure, the areas overlap, but there’s reached its peak, and that things would go downhill plenty of open source software that isn’t UNIX, and from then on. I didn’t have enough knowledge of the plenty of UNIX that isn’t open source. Nevertheless, industry at large to be able to have an opinion on this there’s more at stake than it might seem. statement, but from time to time I’ve revisited it. I still don’t have enough knowledge to form a good The UNIX operating system is one of the most mature opinion, but certainly Microsoft’s standing in the operating systems available, and the cost of industry is changing. maintenance is significantly higher than the cost of development. It’s clear from the broad support for Linux from big UNIX companies that they see the There are a number reasons: computers are becoming advantages of a commodity operating system as more pervasive, users are becoming more demanding, outweighing the loss of competitive edge. Earlier this requirements are changing. It’s worth remembering that Microsoft got into the operating system business year, Caldera (now SCO again) released the sources of by accident, and the system they chose was chosen "ancient UNIX" under a Berkeley license.
Recommended publications
  • A Review Paper on Effective Behavioral Based Malware Detection and Prevention Techniques for Android Platform
    International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 10, Number 1 (2017) © International Research Publication House http://www.irphouse.com A Review Paper on Effective Behavioral Based Malware Detection and Prevention Techniques for Android Platform Mr. Sagar Vitthal Shinde1 M.Tech Comp. Department of Technology, Shivaji University, Kolhapur, Maharashtra, India. Email id: [email protected] Ms. Amrita A. Manjrekar2 Assistant Professor, Department of Technology, Shivaji University, Kolhapur, Maharashtra, India. Email Id: [email protected] Abstract late). It has been recently reported that almost 60% of Android is most popular platform for mobile devices. existing malware send stealthy premium rate SMS messages. Smartphone’s and mobile tablets are rapidly indispensable in Most of these behaviors are exhibited by a category of apps daily life. Android has been the most popular open sources called Trojanized that can be found in online marketplaces mobile operating system. On the one side android users are not controlled by Google. However, also Google Play, the increasing, but other side malicious activity also official market for Android apps, has hosted apps which have simultaneously increasing. The risk of malware (Malicious been found to be malicious [1] [21]. apps) is sharply increasing in Android platform, Android Existing system consist of some limited features of android mobile malware detection and prevention has become an app, malware detection is based on behavioral base. The important research topic. Some malware attacks can make the malware detection and prevention process is also static which phone partially or fully unusable, cause unwanted SMS/MMS create some problems such as it increase false positive rate.
    [Show full text]
  • The Journal of AUUG Inc. Volume 25 ¯ Number 3 September 2004
    The Journal of AUUG Inc. Volume 25 ¯ Number 3 September 2004 Features: mychart Charting System for Recreational Boats 8 Lions Commentary, part 1 17 Managing Debian 24 SEQUENT: Asynchronous Distributed Data Exchange 51 Framework News: Minutes to AUUG board meeting of 5 May 2004 13 Liberal license for ancient UNIX sources 16 First Australian UNIX Developer’s Symposium: CFP 60 First Digital Pest Symposium 61 Regulars: Editorial 1 President’s Column 3 About AUUGN 4 My Home Network 5 AUUG Corporate Members 23 A Hacker’s Diary 29 Letters to AUUG 58 Chapter Meetings and Contact Details 62 AUUG Membership AppLication Form 63 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUGN The journal of AUUG Inc. Volume 25, Number 3 September 2004 Editor ial Gr eg Lehey <[email protected]> After last quarter's spectacularly late delivery of For those newcomers who don't recall the “Lions AUUGN, things aregradually getting back to nor- Book”, this is the “Commentary on the Sixth Edi- mal. I had hoped to have this on your desk by tion UNIX Operating System” that John Lions the end of September,but it wasn't to be. Given wr ote for classes at UNSW back in 1977. Suppos- that that was only a couple of weeks after the “Ju- edly they werethe most-photocopied of all UNIX- ly” edition, this doesn’t seem to be such a prob- related documents. Ihad mislaid my photocopy, lem. I'm fully expecting to get the December is- poor as it was (weren't they all?) some time earli- sue out in time to keep you from boredom over er,soIwas delighted to have an easy to read ver- the Christmas break.
    [Show full text]
  • Methods for Improving the Quality of Software Obfuscation for Android Applications
    Methods for Improving the Quality of Software Obfuscation for Android Applications Methoden zur Verbesserung der Qualit¨atvon Softwareverschleierung f¨urAndroid-Applikationen Der Technischen Fakult¨atder Friedrich-Alexander-Universit¨at Erlangen-N¨urnberg zur Erlangung des Grades DOKTOR-INGENIEUR vorgelegt von Yan Zhuang aus Henan, VR China Als Dissertation genehmigt von der Technischen Fakult¨atder Friedrich-Alexander-Universit¨at Erlangen-N¨urnberg Tag der m¨undlichen Pr¨ufung: 26. September 2017 Vorsitzende des Promotionsorgans: Prof. Dr.-Ing. Reinhard Lerch Gutachter: Prof. Dr.-Ing. Felix C. Freiling Prof. Dr. Jingqiang Lin Dedicated to my dear parents. Abstract Obfuscation technique provides the semantically identical but syntactically distinguished transformation, so that to obscure the source code to hide the critical information while preserving the functionality. In that way software authors are able to prevail the re- sources e.g. computing power, time, toolset, detection algorithms, or experience etc., the revere engineer could afford. Because the Android bytecode is practically easier to decompile, and therefore to reverse engineer, than native machine code, obfuscation is a prominent criteria for Android software copyright protection. However, due to the lim- ited computing resources of the mobile platform, different degree of obfuscation will lead to different level of performance penalty, which might not be tolerable for the end-user. In this thesis, we optimize the Android obfuscation transformation process that brings in as much “difficulty" as possible meanwhile constrains the performance loss to a tolerable level. We implement software complexity metrics to automatically and quantitatively evaluate the “difficulty" of the obfuscation results. We firstly investigate the properties of the 7 obfuscation methods from the obfuscation engine Pandora.
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]
  • Mechanism: Limited Direct Execution
    6 Mechanism: Limited Direct Execution In order to virtualize the CPU, the operating system needs to some- how share the physical CPU among many jobs running seemingly at the same time. The basic idea is simple: run one process for a little while, then run another one, and so forth. By time sharing the CPU in this manner, virtualization is achieved. There are a few challenges, however, in building such virtualiza- tion machinery. The first is performance: how can we implement vir- tualization without adding excessive overhead to the system? The second is control: how can we run processes efficiently while retain- ing control over the CPU? Control is particularly important to the OS, as it is in charge of resources; without it, a process could simply run forever and take over the machine, or access information that it shouldn’t be allowed to access. Attaining performance while main- taining control is thus one of the central challenges in building an operating system. THE CRUX: HOW TO EFFICIENTLY VIRTUALIZE THE CPU WITH CONTROL The OS must virtualize the CPU in an efficient manner, but while retaining control over the system. To do so, both hardware and op- erating systems support will be required. The OS will often use a judicious bit of hardware support in order to accomplish its work effectively. 1 2 MECHANISM:LIMITED DIRECT EXECUTION 6.1 Basic Technique: Limited Direct Execution To make a program run as fast as one might expect, not surpris- ingly OS developers came up with a simple technique, which we call limited direct execution.
    [Show full text]
  • Detection and Classification of Malicious Processes Using System
    Detection and Classification of Malicious Processes Using System Call Analysis A Thesis Submitted to the Faculty of Drexel University by Raymond J. Canzanese, Jr. in partial fulfillment of the requirements for the degree of Doctor of Philosophy May 2015 c Copyright 2015 Raymond J. Canzanese, Jr. ii Dedications To Madison, without whose support and companionship this would have been a far less rewarding and enjoyable experience. iii Acknowledgments Throughout the course of writing this thesis, I was surrounded by an outstanding community who provided the support, inspiration, encouragement, and distraction necessary for its completion. To my advisers, Moshe Kam and Spiros Mancoridis, and committee, Naga Kandasamy, Ko Nishino, Harish Sethu, and Steven Weber, I am most thankful. It was their insights, guidance, feedback, and support that made this thesis possible. I cannot overstate the depth and breadth of the lessons I have learned from them, which have shaped not only this thesis, but my general approach to problem solving, my outlook on life, and my ambitions. That my advisers managed to find the time, energy, and patience to meet with me regularly to discuss my successes and failures confounds me. Watching them advance in their careers while remaining so humble and grounded has been truly inspiring. I also had the great fortune to learn from a number of other faculty members here at Drexel who have helped shape and inspire this work, including Kapil Dandekar, John Walsh, Tom Chmielewski, Ali Shokoufandeh, and Marcello Balduccini. My friends and colleagues here at Drexel, especially those members of the Data Fusion Lab and Software Engineering Research Group, have also served to educate, motivate, and inspire me.
    [Show full text]
  • BSD Based Systems
    Pregled BSD sistema I projekata Glavne BSD grane FreeBSD Homepage: http://www.freebsd.org/ FreeBSD je Unix-like slobodni operativni sistem koji vodi poreklo iz AT&T UNIX-a preko Berkeley Software Distribution (BSD) grane kroz 386BSD i 4.4BSD. Radi na procesorima kompatibilnim sa Intel x86 familijom procesora, kao I na DEC Alpha, UltraSPARC procesorima od Sun Microsystems, Itanium (IA-64), AMD64 i PowerPC procesorima. Radi I na PC-98 arhitekturi. Podrska za ARM i MIPS arhitekture je trenutno u razvoju. Početkom 1993. godine Jordan K. Hubbard, Rod Grimes i Nate Williams su pokrenuli projekat čiji je cilj bio rešavanje problema koji su postojali u principima razvoja Jolitzovog 386BSD-a. Posle konsultovanja sa tadašnjim korisnicima sistema, uspostavljeni su principi i smišljeno je ime - FreeBSD. Pre nego što je konkretan razvoj i počeo, Jordan Hubbard je predložio je firmi Walnut Creek CDROM (danas BSDi) da pripreme distribuiranje FreeBSD-a na CD-ROM-ovima. Walnut Creek CDROM su prihvatili ideju, ali i obezbedili (tada potpuno nepoznatom) projektu mašinu na kojoj će biti razvijan i brzu Internet konekciju. Bez ove pomoći teško da bi FreeBSD bio razvijen u ovolikoj meri i ovolikom brzinom kao što jeste. Prva distribucija FreeBSD-a na CD-ROM-ovima (i naravno na netu) bila je FreeBSD 1.0, objavljena u decembru 1993. godine. Bila je zasnovana na Berkeley-evoj 4.3BSD-Lite ("Net/2") traci, a naravno sadržala je i komponente 386BSD-a i mnoge programe Free Software Foundation (fondacija besplatnog- slobodnog softvera). Nakon što je Novell otkupio UNIX od AT&T-a, Berkeley je morao da prizna da Net/2 traka sadrži velike delove UNIX koda.
    [Show full text]
  • Download Briefing Schedule
    WED. JULY 31 07:00-17:00 REGISTRATION 08:00-08:50 BREAKFAST Sponsored by / Forum Ballroom ROOM Roman II Roman IV Roman I / III Palace II Palace III Augustus V / VI Palace I Augustus I / II Augustus III / IV 08:50-09:00 Welcome & Introduction to Black Hat USA 2013 / Augustus Ballroom 09:00-10:00 Keynote Speaker: General Keith B. Alexander / Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Mainframes: The Past Will BlackberryOS 10 From a Security With BIGDATA comes BIG New Trends in FastFlux Networks Lessons from Surviving a Combating the Insider Threat Beyond the Application: Cellular Java Every-Days: Exploiting How to Build a SpyPhone Come to Haunt You Perspective responsibility: Practical (Wei Xu + Xinran Wang) 300Gbps Denial of at the FBI: Real-world Lessons Privacy Regulatory Space Software Running on Three (Kevin McNamee) (Philip Young) (Ralf-Philipp Weinmann) exploiting of MDX injections Service Attack Learned (Christie Dudley) Billion Devices (Dmitry Chastuhin) (Matthew Prince) (Patrick Reidy) (Brian Gorenc + CrowdSource: An Open Source, Jasiel Spelman) Crowd Trained Machine Learning Legal Considerations for Model for Malware Detection Cellular Research (Joshua Saxe) (Marcia Hofmann) TM 11:15-11:45 Coffee Service Sponsored by / Octavius Ballroom 11:45-12:45 Black-box Assessment of Shattering Illusions in Lock-Free Power Analysis Attacks for Denying Service to DDoS What Security Researchers Just-In-Time Code Reuse: The A Tale of One Software Bypass TLS 'Secrets' Million Browser Botnet Pseudorandom Algorithms Worlds: Compiler/Hardware
    [Show full text]
  • Malware Detection and Classification Based on Extraction of API Sequences
    Downloaded from http://iranpaper.ir http://translate68.ir Malware Detection and Classification Based on Extraction of API Sequences Dolly Uppal, Rakhi Sinha, Vishakha Mehra and Vinesh Jain Department of Computer Engineering and Information Technology Government Engineering College Ajmer, India [email protected], [email protected], [email protected], [email protected] Abstract— With the substantial growth of IT sector in the the concept of pattern (byte code-signature) recognition. Anti- 21st century, the need for system security has also become Virus Scanners (AVS) follow traditional signature based inevitable. While the developments in the IT sector have detection method to identify malware. Signatures are the innumerable advantages but attacks on websites and computer sequences of bytes existent in the database. Although systems are also increasing relatively. One such attack is zero day signature based examination can discern malware by yielding malware attack which poses a great challenge for the security low false positive rates but this technique turns out to be testers. The malware pen testers can use bypass techniques like inefficient for malware whose signature are not listed in the Compression, Code obfuscation and Encryption techniques to database. Also, once should be well versed with the minutiae easily deceive present day Antivirus Scanners. This paper of software for static analysis, which is not usually possible. elucidates a novel malware identification approach based on Malware detection using static analysis can be easily extracting unique aspects of API sequences. The proposed feature selection method based on N grams and odds ratio circumvented by malware writers by making use of the selection, capture unique and distinct API sequences from the obfuscation techniques.
    [Show full text]
  • The Journal of Computing Sciences in Colleges CCSC CONSORTIUM for COMPUTING SCIENCES in COLLEGES
    The Journal of Computing Sciences in Colleges CCSC CONSORTIUM FOR COMPUTING SCIENCES IN COLLEGES ccsc.org Papers of the 36th Annual CCSC Eastern Conference October 23rd-24th, 2020 Hood College Frederick, MD Volume 36, Number 3 October 2020 The Journal of Computing Sciences in Colleges Papers of the 36th Annual CCSC Eastern Conference October 23rd-24th, 2020 Hood College Frederick, MD Baochuan Lu, Editor John Wright, Regional Editor Southwest Baptist University Juniata College Volume36,Number3 October2020 The Journal of Computing Sciences in Colleges (ISSN 1937-4771 print, 1937- 4763 digital) is published at least six times per year and constitutes the refereed papers of regional conferences sponsored by the Consortium for Computing Sciences in Colleges. Copyright ©2020 by the Consortium for Computing Sciences in Colleges. Per- mission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CCSC copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Consortium for Computing Sciences in Colleges. To copy otherwise, or to republish, requires a fee and/or specific permission. 2 Table of Contents The Consortium for Computing Sciences in Colleges Board of Directors 9 CCSC National Partners 11 Welcome to the 2020 CCSC Eastern Conference 12 Regional Committees — 2020 CCSC Eastern Region 14 Reviewers — 2020 CCSC Eastern Conference 15 The "What’s Next Economy" — Keynote Address 16 Jonathan Aberman, Marymount University Programming With the Cloud — National Partner Session 18 Laurie White, Google for Education Techniques to Effectively Teach a Course Online — National Partner Session 19 Yamuna Rajasekhar, zyBooks Virtual Cluster for HPC Education 20 Linh B.
    [Show full text]
  • Postgresql Freebsd 12 12 PROC PDEATHSIG CTL
    Walking Through Walls PostgreSQL ♥ FreeBSD [email protected] [email protected] [email protected] About me • New to FreeBSD hacking Mentors: mjg, allanjude • ~20 years work on proprietary C, C++, … applications on lots of different kinds of Unix • Past ~4 years working on PostgreSQL at EnterpriseDB • Past ~3 years dabbling in FreeBSD, beginning with the gateway drug of ZFS home storage boxes, now my main development and server environment • Personal goal: make FreeBSD and PostgreSQL the best relational database stack Berkeley • INGRES: Developed at UC Berkeley, 197x-1985 • Relational database ideas inspired by IBM’s System/R (though using QUEL instead of SQL), developed on PDPs just as Unix arrived at Berkeley • First software released entirely under BSD licence (CSRG distribution still needed AT&T licence for parts) Michael Stonebraker • POSTGRES: Developed at UC Berkeley, 1986-1994 • Entirely new system (but still using INGRES’s QUEL query language) • Developed on SunOS (derived from 4.3BSD) and Dynix (derived from 4.2BSD, added SMP support for Sequent computers) and (probably) various other flavours of BSD • PostgreSQL: Modern open source project, 1996- • We current claim to support Linux, {Open,Net,Free}BSD, macOS, AIX, HP/ UX, Solaris, Windows; in the past we supported IRIX, Tru64, UnixWare, Latter day PostgreSQL BSD/OS, BeOS, QNX, SunOS, SCO OpenServer hackers on a pilgrimage to Berkeley How operating systems look to database hackers • APIs, man pages, standards chiselled in stone • Administration tools, tunables,
    [Show full text]
  • The Penguin'sguidetodaemonland
    !!! EARLYDRAFT !!! The Penguin’s Guide to Daemonland An Introduction to FreeBSD for Linux Users 2nd January 2021 Contents Legal 7 Contents 9 Chapter Overview .......................... 9 Types of Readers / How to Read .................... 10 Preface 13 About This Book ........................... 13 Audience .............................. 14 Why Even Bother? .......................... 15 FreeBSD for Linux Users ........................ 17 I FreeBSD Quickstart 1 Popular Penguin Pitfalls! 23 2 (Some) Important Differences to be Aware of 25 3 Your FreeBSD Toy VM 27 4 Administration Basics for the Impatient 29 5 Identifying “Linuxisms” and Living Without them 31 II Managing FreeBSD 6 Installation 35 7 Disk Partitioning and Filesystems 37 Penguin’s Guide to Daemonland page 3 / 157 8 System Boot & Service Management 39 9 Users and Permissions 41 10 Networking 43 11 Updating the OS 45 12 Timekeeping 47 13 Package Management 49 14 Logging 51 15 Firewalling 53 16 System Mail 55 17 Foreign Filesystems & FUSE 57 III (Slightly) Advanced Topics 18 Breaking and Repairing the System 61 19 Using ZFS 63 20 Tuning FreeBSD 65 21 Secure Levels 67 22 Updating from Source 69 23 Using Ports 71 24 Jails 73 25 Bhyve 75 26 mfsBSD 77 27 Linux Emulation 79 2nd January 2021 page 4 / 157 Penguin’s Guide to Daemonland IV FreeBSD by Example 28 Rolling Customized Packages 83 29 NFS Server 85 30 ZFS Replication 87 31 Simple Web Stack 89 32 DNS Server with BIND 91 33 VPN with OpenVPN 93 34 Jailing Web, DB, BIND and OpenVPN 95 35 Managing TLS Certificates with LE 97 36 Mailserver
    [Show full text]