April 2007 Volume 32 Number 2

Total Page:16

File Type:pdf, Size:1020Kb

April 2007 Volume 32 Number 2 APRIL 2007 VOLUME 32 NUMBER 2 THE USENIX MAGAZINE OPINION Musings RIK FARROW SYSADMIN Autonomic Computing: Freedom or Threat? GLENN FINK AND DEB FRINCKE The Secret Lives of Computers Exposed CHAD VERBOWSKI Lessions Learned from Living with LDAP BRENDAN QUINN Introducing System Engineering to the System Admin JOHN LLOYD Promises, Promises: An Interview with Mark Burgess RIK FARROW Spam and Blogs. Part 1: Spam: A Balancing Act DANIEL L. APPELMAN All Quiet on the Western Front: A Discussion on the Necessity of Good Reporting THOMAS SLUYTER COLUMNS Practical Perl Tools: These Inodes Were Made for Walkin’ DAVID BLANK-EDELMAN VoIP in an Internet Service Provider Network ROBERT HASKINS Asterisk Appliance HEISON CHAK /dev/random ROBERT G. FERRELL BOOK REVIEWS Book Reviews ELIZABETH ZWICKY ET AL. STANDARDS Why Standardize? NICHOLAS M. STOUGHTON USENIX NOTES SAGE Update JANE-ELLEN LONG AND ALVA COUCH CONFERENCES LISA '06: 20th Large Installation System Administration Conference The Advanced Computing Systems Association Upcoming Events 11 TH WORKSHOP ON HOT TOPICS IN OPERATING 3RD WORKSHOP ON STEPS TO REDUCING SYSTEMS (H OT OS XI) UNWANTED TRAFFIC ON THE INTERNET Sponsored by USENIX in cooperation with the IEEE Technical Co-located with the 2007 USENIX Annual Technical Conference Committee on Operating Systems (TCOS) JUNE 18, 2007, SANTA CLARA , CA , USA MAY 7–9, 2007, SAN DIEGO , CA, USA http://www.usenix.org/sruti07 http://www.usenix.org/hotos07 Paper submissions due: April 17, 2007 5TH ACM/USENIX I NTERNATIONAL CONFERENCE INAUGURAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING SYSTEMS , A PPLICATIONS , ON DISTRIBUTED EVENT -B ASED SYSTEMS AND SERVICES (M OBI SYS 2007) (DEBS 2007 ) Jointly sponsored by USENIX and ACM SIGMOBILE, in Organized in cooperation with USENIX, the IEEE and IEEE Com - cooperation with ACM SIGOPS puter Society, and ACM (SIGSOFT) JUNE 11–15, 2007, PUERTO RICO JUNE 20–22 , 2007, TORONTO , C ANADA http://www.sigmobile.org/mobisys/2007/ http://www.debs.msrg.utoronto.ca WORKSHOP ON EXPERIMENTAL COMPUTER SCI - THIRD WORKSHOP ON HOT TOPICS IN SYSTEM ENCE (ECS ’07) DEPENDABILITY (HOT DEP ’07 ) Sponsored by ACM SIGARCH and ACM SIGOPS in cooperation Co-sponsored by USENIX with USENIX, ACM SIGCOMM, and ACM SIGMETRICS JUNE 26, 2007, EDINBURGH , UK JUNE 13–14, 2007, SAN DIEGO , CA, USA http://hotdep.org/2007 http://www.expcs.org/ 2007 USENIX/ACCURATE E LECTRONIC VOT - THIRD INTERNATIONAL ACM SIGPLAN/SIGOPS ING TECHNOLOGY WORKSHOP (EVT ’07 ) CONFERENCE ON VIRTUAL EXECUTION ENVIRON - Co-located with Security '07 MENTS (VEE ’07) AUGUST 6, 2007, BOSTON , MA , USA Sponsored by ACM SIGPLAN and ACM SIGOPS in cooperation http://www.usenix.org/evt07 with USENIX Paper submissions due: April 22, 2007 JUNE 13–15, 2007, SAN DIEGO , CA, USA http://vee07.cs.ucsb.edu 16 TH USENIX S ECURITY SYMPOSIUM AUGUST 6–10, 2007, BOSTON , MA , USA SECOND WORKSHOP ON HOT TOPICS IN AUTO - http://www.usenix.org/sec07 NOMIC COMPUTING (HOT AC II ) Sponsored by IEEE in cooperation with USENIX and ACM 2007 L INUX KERNEL DEVELOPERS SUMMIT JUNE 15, 2007, JACKSONVILLE , FL , USA SEPTEMBER 4–6 , 2007, CAMBRIDGE , U.K. http://www.aqualab.cs.northwestern.edu/HotACII/ 21 ST LARGE INSTALLATION SYSTEM 2007 USENIX A NNUAL TECHNICAL ADMINISTRATION CONFERENCE (LISA ’07 ) CONFERENCE Sponsored by USENIX and SAGE JUNE 17–22, 2007, SANTA CLARA , CA , USA NOVEMBER 11–16 , 2007, DALLAS , TX http://www.usenix.org/usenix07 http://www.usenix.org/lisa07 Extended abstract and paper submissions due: May 14, 2007 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events. OPINION 2 Musings RI K FARROW SYSADMIN 6 Autonomic Computing: Freedom or Threat? GLEN N FI NK AND DEB FRI NCKE 15 The Secret Lives of Computers Exposed: Flight Data Recorder for Windows contents CHAD VERBOWSKI 21 Lessons Learned from Living with LDAP BRENDAN QU INN 28 Introducing System Engineering to the System Admin JOH N LLOYD 38 Promises, Promises: An Interview with Mark Burgess RI K FARROW 41 Spam and Blogs. Part 1: Spam: A Balancing Act DAN I EL L. APPELMAN 45 All Quiet on the Western Front: A Discussion on the Necessity of Good Reporting THOMAS SLUYTER COLUMNS 52 Practical Perl Tools:These Inodes Were Made for Walkin’ DAVI D BLAN K-EDELMAN 57 VoIP in an Internet Service Provider Network VOL. 3 2 , # 2 , APRIL 2 0 0 7 ROBERT HASKI NS EDITOR ;login: is the official Rik Farrow magazine of the 61 Asterisk Appliance [email protected] USENIX Association. HEISON CHAK MANAGING EDITOR ;login: (ISSN 1044-6397) is 64 /dev/random Jane-Ellen Long published bi-monthly by the ROBERT G. FERRELL [email protected] USENIX Association, 2560 COPY EDITOR Ninth Street, Suite 215, BOOK REVIEWS David Couzens Berkeley, CA 94710. [email protected] $85 of each member’s annual 66 Book Reviews PRODUCTION dues is for an annual sub- ELIZABETH ZWICKY ET AL. Lisa Camp de Avalos scription to ;login:. Subscrip- Casey Henderson tions for nonmembers are STANDARDS $115 per year. TYPESETTER 69 Why Standardize? Star Type Periodicals postage paid at NICHOLAS M. STOUGHTON [email protected] Berkeley, CA, and additional offices. USENIX ASSOCIATION USENIX NOTES 2560 Ninth Street, POSTMASTER: Send address Suite 215, Berkeley, changes to ;login:, 72 SAGE Update California 94710 USENIX Association, JANE-ELLEN LONG AN D ALVA COUCH Phone: (510) 528-8649 2560 Ninth Street, FAX: (510) 548-5738 Suite 215, Berkeley, CONFERENCES http://www.usenix.org CA 94710. http://www.sage.org ©2007 USENIX Association. 74 LISA ’06: 20th Large Installation System USENIX is a registered trade- Administration Conference mark of the USENIX Associa- tion. Many of the designa- tions used by manufacturers and sellers to distinguish their products are claimed as trade- marks. USENIX acknowl- edges all trademarks herein. Where those designations ap- pear in this publication and USENIX is aware of a trade- mark claim, the designations have been printed in caps or initial caps. I N MY LA ST C O LUMN, I A RG U E D T HAT we need to be willing to change. Change is RIK FARROW inevitable. Just as the seasons change and the climate warms, our computing environ- ment also changes, slowly enough that we sometimes miss noticing the changes until we run smack up against them. musings Let’s consider one change in the world of comput- ing, and see how it relates to a topic that is only [email protected] tangentially related—system administration. One of the hot computing news stories eight years ago (1999) was the race to produce a desktop PC for less than $1000. These computers came with 366MHz Celeron CPUs and no monitor [1]. Fast- forward less than ten years, and you can buy a system with a dual-core, 64 bit, 2-GHz CPU with a 19-inch LCD monitor and one hundred times the storage capacity for under $700. I’d like to ignore discussions of Moore’s Law and cut to the chase. Today’s base system has capabilities gener- ally undreamed of just ten years ago. Running multiple VMs on desktop systems is not only fea- sible but not uncommon. Fertility System administrators have more than high-per- formance desktops in their basket full of changes. I mentioned VMs, which seem to multiply like rabbits in the springtime. VMs encapsulate whole operating systems as well as at least one applica- tion, yet they still must be managed and config- ured, and the data—often just the data—must be properly backed up. So one system today may rep- resent not just a faster system but many multiples of past systems. What is true of desktops is true of servers as well. Servers have become just as fecund, if not more so, than desktops, expanding to fill ever-shrinking machine rooms, even as they release ever greater amounts of “waste” heat. It is not the energy by- product of servers that concerns me here, but their ever-increasing capacity for fruitful labor. Servers too become targets for VMs, so that every last erg of energy will be useful, and not simply add to the entropy of the universe and deplete our fast-declining store of fossil fuels for no good pur- pose. Once upon a time, system administration meant editing configuration files, using your text editor of choice. Today, the hand-editing of files has gone 2 ;LOGIN: VOL. 32, NO. 2 the way of the oxcart, with the rare exception of systems that are just too different to be managed en masse. As system administrators, we are faced with a choice: to become equally obsolete, or to change with the times and become meta-administrators instead. Going Meta One of the joys of being an editor is the ability to spout silly ideas, even attempt to coin words that may help us understand the world we live in. Meta-administration means system administration that has moved beyond the editing of configuration files. The knobs in those files remain there, just as adjustable as ever. What has to change is how we manage to tweak those knobs. It has always been difficult to know how to manage multiple versions of UNIX, where the configuration files may not be the same (think AIX or Mac OS X) and small changes may have large unintended consequences. Now we have multiplied the number of systems we must manage, even as the speed of those servers and desktops has grown expo- nentially. To expect that we can hand-edit configurations, or even launch a script that will zoom across the network making the same changes every- where, is no longer plausible. Meta-administration means that we will be providing guidelines for how the system of systems should behave.
Recommended publications
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
    ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo.
    [Show full text]
  • Software Assurance
    Information Assurance State-of-the-Art Report Technology Analysis Center (IATAC) SOAR (SOAR) July 31, 2007 Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance Distribution Statement A E X C E E C L I L V E R N E Approved for public release; C S E I N N I IO DoD Data & Analysis Center for Software NF OR MAT distribution is unlimited. Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance State-of-the-Art Report (SOAR) July 31, 2007 IATAC Authors: Karen Mercedes Goertzel Theodore Winograd Holly Lynne McKinley Lyndon Oh Michael Colon DACS Authors: Thomas McGibbon Elaine Fedchak Robert Vienneau Coordinating Editor: Karen Mercedes Goertzel Copy Editors: Margo Goldman Linda Billard Carolyn Quinn Creative Directors: Christina P. McNemar K. Ahnie Jenkins Art Director, Cover, and Book Design: Don Rowe Production: Brad Whitford Illustrations: Dustin Hurt Brad Whitford About the Authors Karen Mercedes Goertzel Information Assurance Technology Analysis Center (IATAC) Karen Mercedes Goertzel is a subject matter expert in software security assurance and information assurance, particularly multilevel secure systems and cross-domain information sharing. She supports the Department of Homeland Security Software Assurance Program and the National Security Agency’s Center for Assured Software, and was lead technologist for 3 years on the Defense Information Systems Agency (DISA) Application Security Program. Ms. Goertzel is currently lead author of a report on the state-of-the-art in software security assurance, and has also led in the creation of state-of-the-art reports for the Department of Defense (DoD) on information assurance and computer network defense technologies and research.
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • Referência Debian I
    Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração
    [Show full text]
  • Ubuntu® 1.4Inux Bible
    Ubuntu® 1.4inux Bible William von Hagen 111c10,ITENNIAL. 18072 @WILEY 2007 •ICIOATENNIAl. Wiley Publishing, Inc. Acknowledgments xxi Introduction xxiii Part 1: Getting Started with Ubuntu Linux Chapter 1: The Ubuntu Linux Project 3 Background 4 Why Use Linux 4 What Is a Linux Distribution? 5 Introducing Ubuntu Linux 6 The Ubuntu Manifesto 7 Ubuntu Linux Release Schedule 8 Ubuntu Update and Maintenance Commitments 9 Ubuntu and the Debian Project 9 Why Choose Ubuntu? 10 Installation Requirements 11 Supported System Types 12 Hardware Requirements 12 Time Requirements 12 Ubuntu CDs 13 Support for Ubuntu Linux 14 Community Support and Information 14 Documentation 17 Commercial Support for Ubuntu Linux 18 Getting More Information About Ubuntu 19 Summary 20 Chapter 2: Installing Ubuntu 21 Getting a 64-bit or PPC Desktop CD 22 Booting the Desktop CD 22 Installing Ubuntu Linux from the Desktop CD 24 Booting Ubuntu Linux 33 Booting Ubuntu Linux an Dual-Boot Systems 33 The First Time You Boot Ubuntu Linux 34 Test-Driving Ubuntu Linux 34 Expioring the Desktop CD's Examples Folder 34 Accessing Your Hard Drive from the Desktop CD 36 Using Desktop CD Persistence 41 Copying Files to Other Machines Over a Network 43 Installing Windows Programs from the Desktop CD 43 Summary 45 ix Contents Chapter 3: Installing Ubuntu on Special-Purpose Systems 47 Overview of Dual-Boot Systems 48 Your Computer's Boot Process 48 Configuring a System for Dual-Booting 49 Repartitioning an Existing Disk 49 Getting a Different Install CD 58 Booting from a Server or Altemate
    [Show full text]
  • Unidade Curricular – Administração De Redes Prof. Eduardo Maroñas
    SERVIÇO NACIONAL DE APRENDIZAGEM COMERCIAL FACULDADE DE TECNOLOGIA SENAC PELOTAS Unidade Curricular – Administração de Redes Prof. Eduardo Maroñas Monks Roteiro de Laboratório Backup – Parte II (Gerenciadores de Backup) Objetivo: Utilizar e descrever as características de funcionamento de backups em rede. Ferramentas: Wireshark, Vmware Player, Putty, OpenSSH, WinSCP, Apache Web Server, CentOS, Windows XP, FreeNAS, BackupPC, Clonezilla, MySQL, PostgreSQL Introdução: Neste roteiro de laboratório, serão utilizadas diversas ferramentas e sistemas operacionais para analisar o funcionamento dos sistemas de backup. O backup é essencial na administração de rede e deve ser aplicado onde dados importantes sejam utilizados. Atualmente, com o grande volume de dados realizar o backup de forma correta é cada vez mais complexo. Para isto, existem ferramentas que auxiliam nesta tarefa, tornando a vida do administrador de redes mais fácil. Tarefas: 1) Na máquina virtual CentOS, instalar o gerenciador de backups BackupPC. Para isto, devem ser seguidos os seguintes procedimentos: 1. Criar o diretório /backups onde será o repositório dos dados copiados. 2. Instalar os pacotes 1. Perl-setuid: yum install perl-suidperl 2. Archive-Zip: yum install perl-Archive-Zip.noarch 3. File-RsyncP: yum install perl-File-RsyncP Obs.: utilizar o proxy do Mussum (export http_proxy=”http://192.168.200.3:3128” 3. Fazer o download do código-fonte do BackupPC, disponível em http://192.168.200.3/emmonks/admredes4/BACKUP/BackupPC-3.3.0.tar.gz, para o diretório /usr/src 4. Criar o usuário backuppc e dar permissões para este usuário no diretório /backups. 5. Criar o diretório /var/www/html/imagens para ser o repositório de figuras do BackupPC.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Security Versus Security: Balancing Encryption, Privacy, and National Secuirty
    SECURITY VERSUS SECURITY: BALANCING ENCRYPTION, PRIVACY, AND NATIONAL SECUIRTY Jackson Stein (TC 660H or TC 359T) Plan II Honors Program The University of Texas at Austin 05/04/2017 __________________________________________ Robert Chesney Director of Robert Strauss Center Supervising Professor __________________________________________ Mark Sainsbury Department of Philosophy Second Reader ABSTRACT Author: Jackson Stein Title: Security vs. Security: Balancing Encryption, Data Privacy, and Security Supervising Professors: Robert Chesney, Mark Sainsbury This paper analyzes the current debate over encryption policy. Through careful evaluation of possible solutions to ‘going dark’ as well has weighting the costs and benefits of each solution, we found exceptional access to information more harmful than helpful. Today, there seems to be no singular leading answer to the going dark problem. Exceptional access to data and communications is a simple solution for a simple problem, however going dark is very complex, and requires a multifaceted and refined solutions. Widespread encryption forces those listening—whether it is the NSA, FBI, foreign governments, criminals or terrorist—to be much more targeted. As for the going dark metaphor, it seems as though we are not entirely “going dark”, and yet we are not completely bright either. There are dark and bright spots coming and going across the technological landscape battling in a perpetual technological arms race. The findings of this paper, ultimately determine there to be no policy that doesn’t come without some cost. That said, there are a number of ways in which law enforcement can track criminals and terrorist without weakening encryption, which we determine to be the best direction in any win lose situation.
    [Show full text]
  • 6.4.0-0 Release of SIMP, Which Is Compatible with Centos and Red Hat Enterprise Linux (RHEL)
    SIMP Documentation THE SIMP TEAM Sep 16, 2020 Contents 1 Level of Knowledge 3 1.1 Quick Start................................................4 1.2 Changelogs................................................4 1.3 SIMP Getting Started Guide....................................... 64 1.4 SIMP User Guide............................................ 81 1.5 Contributing to SIMP.......................................... 228 1.6 SIMP Security Concepts......................................... 263 1.7 SIMP Security Control Mapping..................................... 282 1.8 Vulnerability Supplement........................................ 642 1.9 Help................................................... 644 1.10 License.................................................. 652 1.11 Contact.................................................. 652 1.12 Glossary of Terms............................................ 652 Index 669 i ii SIMP Documentation This is the documentation for the 6.4.0-0 release of SIMP, which is compatible with CentOS and Red Hat Enterprise Linux (RHEL). This guide will walk a user through the process of installing and managing a SIMP system. It also provides a mapping of security features to security requirements, which can be used to document a system’s security conformance. Warning: Be EXTREMELY CAREFUL when performing copy/paste operations from this document! Different web browsers and operating systems may substitute incompatible quotes and/or line endings in your files. The System Integrity Management Platform (SIMP) is an Open Source
    [Show full text]
  • Seleccione Un Host... Aceptar Backuppc
    BackupPC BackupPC Introduction Hosts Overview Backup basics Seleccione un host... Resources Road map You can help Installing BackupPC Requirements What type of storage space do I need? Aceptar How much disk space do I need? Step 1: Getting BackupPC Servidor Step 2: Installing the distribution Step 3: Setting up config.pl Estado Step 4: Setting up the hosts file Resumen PC Step 5: Client Setup Edit Config Step 6: Running BackupPC Edit Hosts Step 7: Talking to BackupPC Opciones de Step 8: Checking email delivery administración Step 9: CGI interface Archivo Registro How BackupPC Finds Hosts Registros antiguos Other installation topics Resumen correo Fixing installation problems Colas actuales Restore functions Documentación CGI restore options Wiki Command-line restore options SourceForge Archive functions Configuring an Archive Host Starting an Archive Starting an Archive from the command line Other CGI Functions Configuration and Host Editor RSS BackupPC Design Some design issues BackupPC operation Storage layout Compressed file format Rsync checksum caching File name mangling Special files Attribute file format Optimizations Limitations Security issues Configuration File Modifying the main configuration file Configuration Parameters General server configuration What to backup and when to do it How to backup a client 1 de 75 Email reminders, status and messages CGI user interface configuration settings Version Numbers Author Copyright Credits License BackupPC Introduction This documentation describes BackupPC version 3.1.0, released on 25 Nov 2007. Overview BackupPC is a high-performance, enterprise-grade system for backing up Unix, Linux, WinXX, and MacOSX PCs, desktops and laptops to a server's disk. BackupPC is highly configurable and easy to install and maintain.
    [Show full text]