Tlx9 Open Source Acknowledgment

Total Page:16

File Type:pdf, Size:1020Kb

Tlx9 Open Source Acknowledgment R&S®TLx9 Series xx9 Transmitter Open Source Acknowledgment 2507.3060.00 – 01 7TA /RL/1/EN 01.00 / 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S TLx9 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 9 3.1 APACHE-LICENSE-2.0.txt ........................................................................................... 9 3.2 BSD-2-clause.txt ........................................................................................................12 3.3 BSD-3-clause.txt ........................................................................................................13 3.4 BSD-4-clause.txt ........................................................................................................14 3.5 GPLv2.txt ....................................................................................................................14 3.6 GPLv3.txt ....................................................................................................................21 3.7 LGPLv2.1.txt ...............................................................................................................33 3.8 LGPLv2.txt ..................................................................................................................43 3.9 LGPLv3.txt ..................................................................................................................52 3.10 MIT.txt .........................................................................................................................55 3.11 Boost Software License v1.0 ....................................................................................55 3.12 bzip2/libbzip2 .............................................................................................................56 3.13 Bitstream Vera Font Copyright and Arev Fonts Copyrights .................................57 3.14 GCC Runtime Library Exception v3.1 ......................................................................59 3.15 W3C and IJG and MPL ...............................................................................................60 3.16 libpng license ...........................................................................................................128 3.17 zlib .............................................................................................................................130 3.18 Jetty License v3.7 ....................................................................................................131 3.19 The Academic Free License Version 2.1 (AFLv2.1) ..............................................132 4 Copyrights ....................................................................................... 146 5 Contact information ........................................................................ 165 Open Source Acknowledgment 2507.3060.00 - 01 2 R&S TLx9 Introduction 1 Introduction This product uses a number of open source software packages which are listed below. The open source software is provided free of charge. You are entitled to use the open source software in accordance with the respective license conditions as provided in the following chapters. Rohde & Schwarz would like to thank the open source community for their valuable contribution to embedded computing. 1.1 Disclaimer The open source software is distributed WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. The respective licenses may contain more details. 1.2 How to obtain the source code The software included in this product may contain copyrighted software that is licensed under a license requiring us to provide the source code of that software, such as the GPL or LGPL. You may obtain the complete corresponding source code for such copyrighted software from us for an unlimited period of time and at no charge. In this case, please contact: Rohde & Schwarz GmbH & Co. KG Mühldorfstr. 15, 81671 München, Germany Phone: +49 89 41 29 – 12345 Email: [email protected] Internet: www.customersupport.rohde-schwarz.com This offer is valid to anyone in receipt of this information. Open Source Acknowledgment 2507.3060.00 - 01 3 R&S TLx9 Software packages 2 Software packages The software contained in this product makes use of the following open source software packages. Package Version License acl 2.2.51 GPLv2, LGPLv2.1 ApacheCommons-collections 3.2.2 Apache License Version 2.0 ApacheCommons-fileupload 1.2 Apache License Version 2.0 ApacheCommons-io 1.4 Apache License Version 2.0 ApacheCommons-jexl 2.1.1 Apache License Version 2.0 ApacheCommons-lang3 3.4 Apache License Version 2.0 ApacheCommons-logging 1.2 Apache License Version 2.0 attr 2.4.46 GPLv2, LGPLv2.1 avahi 0.6.31 LGPLv2.1 boost 1.55.0 Boost Software License v1.0 busybox 1.22.1 GPLv2 bzip2 1.0.6 bzip2/libbzip2 cairo 1.12.14 LGPLv2.1 ccid 1.4.8 LGPLv2.1 concurrentlinkedhashmap 1.4.2 Apache License Version 2.0 dbus 1.6.30 GPLv2 dbus-java 2.7 AFLv2.1 Bitstream Vera Font Copyright, Arev dejavu-fonts-ttf 2.33 Fonts Copyright dropbear 2013.60 MIT dwm 5.7.2 MIT e2fsprogs 1.42.7 GPLv2, LGPLv2, 3-clause-BSD e2fsprogs-libs 1.42.7 GPLv2, LGPLv2, 3-clause-BSD eglibc 2.17 GPLv2, LGPLv2.1 elfutils 0.149 GPLv2 es-shim 4.3.1 MIT ethtool 3.12.1 GPLv2 expat 2.1.0 MIT fbshot 0.3 GPLv2 flashrom 0.9.7 GPLv2 fontconfig 2.10.92 MIT freetype 2.4.11 GPLv2 GPLv2, LGPLv2.1, GCC Runtime gcc 4.8.4 Library Exception v3.1, GPLv3, LGPLv3 gdb 7.9 GPLv2, LGPLv2.1, GPLv3, LGPLv3 gdbm 1.8.3 GPLv2 Open Source Acknowledgment 2507.3060.00 - 01 4 R&S TLx9 Software packages glib 2.36.4 GPLv2 gluegen 20080421 2-clause-BSD gpsd 2.96 4-clause-BSD graphite2 1.2.1 LGPLv2.1 harfbuzz 0.9.23 MIT hiredis 0.10.1-30 3-clause-BSD hwids 20130915.1 GPLv2 i2c-tools 3.0.2 GPLv2 GPLv2, LGPLv2.1, 2-clause-BSD, 3- clause-BSD, 4-clause-BSD, MIT, icedtea 6.1.12.7 W3C, IJG, MPL, Apache License Version 2.0 iptables 1.4.20 GPLv2 jade4j 1.1.4 MIT jemalloc 3.3.1 2-clause-BSD jetty 4.2.24 Jetty License v3.7 jogl 1.1.1 2-clause-BSD jsoncpp 0.6.0_rc2 MIT js-untar 0.0.3 MIT kexec-tools 2.0.12 GPLv2 klibc 2.0.3 GPLv2, 4-clause-BSD kmod 15 GPLv2 libcap 2.22 3-clause-BSD libdaemon 0.14 LGPLv2.1 libdbus-c++ 0.9.0 LGPLv2.1 libdrm 2.4.46 MIT libelf 0.8.13 LGPLv2 libffi 3.0.11 MIT libfontenc 1.1.2 MIT libftdi 0.20 GPLv2, LGPLv2.1 libgcrypt 1.5.3 GPLv2, LGPLv2.1 libgpg-error 1.12 GPLv2, LGPLv2.1 libICE 1.0.8 MIT libmatthew-java 0.8 MIT libpcap 1.3.0 3-clause-BSD libpciaccess 0.13.2 MIT libpng 1.6.8 libpng license libSM 1.2.2 MIT libusb-compat 0.1.5 LGPLv2.1 libusbx 1.0.17 LGPLv2.1 libutempter 1.1.6 LGPLv2.1 libX11 1.6.2 MIT libXau 1.0.8 MIT libXaw 1.0.12 MIT Open Source Acknowledgment 2507.3060.00 - 01 5 R&S TLx9 Software packages libxcb 1.9.1 MIT libXcursor 1.1.14 MIT libXdamage 1.1.4 MIT libXdmcp 1.1.1 MIT libXext 1.3.2 MIT libXfixes 5.0.1 MIT libXfont 1.4.7 MIT libXi 1.7.2 MIT libXinerama 1.1.3 MIT libxkbfile 1.0.8 MIT libxml2 2.9.1 MIT libXmu 1.1.2 MIT libXpm 3.5.11 MIT libXrandr 1.4.2 MIT libXrender 0.9.8 MIT libXt 1.1.4 MIT libXtst 1.2.2 MIT libXxf86vm 1.1.3 MIT linux-kernel 3.12.59 GPLv2 lm_sensors 3.3.3 GPLv2, LGPLv2.1 log4j 1.2.13 Apache License Version 2.0 ltrace 0.5.3 GPLv2 lzo 2.09 GPLv2 makedumpfile 1.5.9 GPLv2 mesa 9.1.6 LGPLv2 mtdev 1.1.4 MIT ncurses 5.9 MIT net-snmp 5.7.2 3-clause-BSD ntp 4.2.8p3 GPLv3 openssh 6.4p1 2-clause-BSD, 3-clause-BSD opkg r633 GPLv2 pango 1.34.1 LGPLv2 pciutils 3.2.0 GPLv2 pcsc-lite 1.8.13 2-clause-BSD, 3-clause-BSD, MIT pixman 0.32.4 MIT promisejs 6.1.0 MIT qt 4.8.5 GPLv3, LGPLv2.1 redis 2.6.15 3-clause-BSD rrdtool 1.4.8 GPLv2 showconsole 1.08 GPLv2 snappy 1.1.3 3-clause-BSD strace 4.8 3-clause-BSD systemd 208 GPLv2, LGPLv2.1 tcpdump 4.3.0 3-clause-BSD Open Source Acknowledgment 2507.3060.00 - 01 6 R&S TLx9 Software packages tcp-wrappers 7.6 3-clause-BSD udev-init-scripts 26 GPLv2 upnpscan 0.4 GPLv2 usbutils 006 GPLv2 util-linux 2.22.2 GPLv2 xauth 1.0.7 MIT xdotool 2.20110530.1 3-clause-BSD xev 1.2.1 MIT xf86-input-dmc 1.1.2 MIT xf86-input-evdev 2.8.1 MIT xf86-input-keyboard 1.7.0 MIT xf86-input-mouse 1.9.0 MIT xf86-video-ati 7.2.0 MIT xf86-video-fbdev 0.4.4 MIT xf86-video-intel 2.21.15 MIT xf86-video-vmware 13.0.1 MIT xinit 1.3.3 MIT xkbcomp 1.2.4 MIT xkeyboard-config 2.9 MIT xorg-server 1.14.3 MIT xrandr 1.4.1 MIT xset 1.2.3 MIT xsg 0.3.2 GPLv2 xterm 297 MIT xwininfo 1.1.3 MIT zlib 1.2.8 zlib This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ ). This product includes cryptographic software written by Eric Young ([email protected]) and software written by Tim Hudson ( [email protected] ). Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. This product includes software developed by the University of California, Berkeley and its contributors. This product includes software developed by the NetBSD Foundation, Inc. and its contributors This product includes software developed by the Apache Software Foundation (http:// www.apache.org ). This software is based in part on the work of the Independent
Recommended publications
  • R&S®BBA100 Broadband Amplifier Open
    R&S®BBA100 Broadband Amplifier Open Source Acknowledgment 5353.8300.00 – 01 /RL/1/EN 01.00 / Broadcasting 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S BBA100 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 7 3.1 Apache License 2.0 ..................................................................................................... 7 3.2 GNU Library General Public License, Version 2.0 (LGPL 2.0) ..............................10 3.3 Boost Software License ............................................................................................18 3.4 GNU General Public License, Version 2.0 (GPL 2.0) ..............................................18 3.5 GNU Lesser General Public License, Version 2.1 (LGPL 2.1) ...............................24 3.6 Mozilla Public License, Version 1.1 (MPL 1.1) ........................................................32 3.7 MIT ...............................................................................................................................40 3.8 JDOM License
    [Show full text]
  • A Political History of X Or How I Stopped Worrying and Learned to Love the GPL
    A Political History of X or How I Stopped Worrying and Learned to Love the GPL Keith Packard SiFive [email protected] Unix in !"# ● $SD Everywhere – $'t not actually BS% ● )*+* want, to make Sy,tem V real – S'rely they still matter ● .o Free So/tware Anywhere The 0rigins of 1 ● $rian Reid and Pa'l Asente at Stan/ord – - kernel → VGTS → W window system – Ported to VS100 at Stan/ord ● $o4 Scheifler started hacking W→ X – Working on Argus with Barbara Liskov at LCS – 7ade it more Unix friendly (async9, renamed X -AXstation 00 (aka v, 339 Unix Workstation Market ● Unix wa, closed source ● Most vendors ,hipped a proprietary 0S 4ased on $SD #.x ● S'n: HP: Digita(: )po((o: *ektronix: I$7 ● ;congratu(ation,: yo'<re not running &'nice=. – Stil(: so many gratuito', di/ference, -AXstation II S'n >?@3 Early Unix Window Systems ● S'n-iew dominated (act'al commercial app,A De,ktop widget,A9 ● %igital had -WS/UIS (V7S on(y9 ● )pollo had %omain ● *ektronix demon,trating Sma((*alk 1 B1@ ● .onB/ree so/tware ● U,ed internally at MIT ● Shared with friend, in/ormally 1 3 ● )(mo,t u,able ● %elivered by Digital on V)1,tation, ● %i,trib'tion was not all free ,o/tware – Sun port relied on Sun-iew kernel API – %igital provided binary rendering code – IB7 PC?2T support act'ally complete (C9 Why 1 C ● 1 0 had wart, – rendering model was pretty terrible ● ,adly, X1 wa,n't m'ch better... – External window management witho't borders ● Get everyone involved – Well, at lea,t every workstation vendor willing to write big checks X as Corporate *ool ● Dim Gettys and Smokey
    [Show full text]
  • Terra Incognita: Liberdade, Espoliação
    INSTITUTO DE FILOSOFIA E CIÊNCIAS HUMANAS PROGRAMA DE PÓS-GRADUAÇÃO DOUTORADO EM SOCIOLOGIA Terra incognita: liberdade, espoliação. O software livre entre técnicas de apropriação e estratégias de liberdade FRANCISCO ANTUNES CAMINATI CAMPINAS 2013 ii iii iv v vi Dedico esse trabalho aos sonhos de liberdade do Cacique Apow'ẽ e de Richard M. Stallman. vii viii AGRADECIMENTOS: TODO MEU RESPEITO E GRATIDÃO: À FAPESP E AO POVO DO ESTADO DE SP, por apoiarem este trabalho de pesquisa durante 5 anos. AO IFCH E À UNICAMP, A TODOS OS PROFESSORES, FUNCIONÁRIOS E COLEGAS; E A TODA COMUNIDADE UNIVERSITÁRIA E DE BARÃO GERALDO, por proporcionarem um verdadeiro encontro com o mundo. AO PROFESSOR PEDRO PEIXOTO FERREIRA pelo apoio decisivo na reta final e na defesa. AO PROFESSOR LAYMERT GARCIA DOS SANTOS por incentivar meu trabalho desde o início e pelas experiências de pensamento e pelos experimentos de criação que realizamos juntos. AOS PROFESSORES: IMRE SIMON (in memoria) e MAURO W. B. ALMEIDA pela participação no exame de qualificação que marcou a passagem da pesquisa de Mestrado para Doutorado (2007); RICARDO ANTUNES e SÉRGIO AMADEU DA SILVEIRA por participarem do segundo exame (2011) que, anos depois, habilitou a realização da defesa. AOS PROFESSORES: SÉRGIO SILVA, NÁDIA FARAGE, VANESA LEA, RENATO ORTIZ, MARIA FILOMENA GREGORI, MARCELO RIDENTI, OSWALDO SEVÁ, OMAR RIBEIRO e JORGE TÁPIA. AOS COLEGAS E PARCEIROS DO GRUPO DE PESQUISA CTeMe; DA REDE LATA – LABORATÓRIO DE ANTROPOLOGIA, TERRITÓRIO E AMBIENTE; E DO LABORATÓRIO DE CARTOGRAFIA DO CERES. À RÁDIO MUDA E AO COLETIVO SARAVÁ.ORG – por proporcionarem, a partir da superação da especialização técnica e da propriedade sobre o saber, experiências de cruzamento de conhecimentos e de práticas voltados para a transformação social e invenção de novos mundos, que foram a escola política de mais de uma geração.
    [Show full text]
  • GIMP Toolkit: GTK+ V1.2
    'Construction d’IHM $ GIMP Toolkit: GTK+ v1.2 Alexis N´ed´elec Ecole Nationale d’Ing´enieursde Brest TechnopˆoleBrest-Iroise, Site de la Pointe du Diable CP 15 29608 BREST Cedex (FRANCE) e-mail : [email protected] & enib=li2 °c A.N. 1 % 'GTK+ v1.2 : GIMP Toolkit $ Table des Mati`eres Introduction 3 Premier Programme: Hello World 10 Signaux et R´eflexes 14 Description de Widget 22 Container de Widgets 32 Entr´eesde Texte 43 Les Listes multi-colonnes 76 Repr´esentation d’arborescence 89 Bibliographie 107 & enib=li2 °c A.N. 2 % 'GTK : GIMP Toolkit $ Introduction On peut d´efinirGTK comme: . une API “Orient´eObjet” . pour le d´eveloppement d’IHM graphiques (GUI) . sous Licence GNU (LGPL) Glossaire de Sigles: . GNU : GNU’s Not Unix ou “Vive le Logiciel Libre !”. GNOME : GNU Network Object Model Environment . GIMP : General Image Manipulation Program . GDK : GIMP Drawing Kit . GTK : GIMP ToolKit & enib=li2 °c A.N. 3 % 'GTK : GIMP Toolkit $ Introduction Le Projet GNOME: . 1997: Miguel de Icaza du “Mexican Autonomous National University” . objectifs : d´eveloppement de logiciels libres (open source) . inspir´edes d´eveloppements de KDE (Qt) GNOME est bas´esur un ensemble de librairies existantes . glib: utilitaire pour la cr´eationet manipulation de structures . GTK+: Boˆıte`aoutils pour le d´eveloppement d’IHM graphiques . ORBit: Le Broker GNOME (CORBA 2.2) pour la distribution d’objets . Imlib: pour la manipulation d’images sous X Window et GDK & enib=li2 °c A.N. 4 % 'GTK : GIMP Toolkit $ Introduction Librairies sp´ecifiquesdu projet GNOME . libgnome: utilitaires (non-GUI) de bases pour toute application GNOME .
    [Show full text]
  • CSS Font Stacks by Classification
    CSS font stacks by classification Written by Frode Helland When Johann Gutenberg printed his famous Bible more than 600 years ago, the only typeface available was his own. Since the invention of moveable lead type, throughout most of the 20th century graphic designers and printers have been limited to one – or perhaps only a handful of typefaces – due to costs and availability. Since the birth of desktop publishing and the introduction of the worlds firstWYSIWYG layout program, MacPublisher (1985), the number of typefaces available – literary at our fingertips – has grown exponen- tially. Still, well into the 21st century, web designers find them selves limited to only a handful. Web browsers depend on the users own font files to display text, and since most people don’t have any reason to purchase a typeface, we’re stuck with a selected few. This issue force web designers to rethink their approach: letting go of control, letting the end user resize, restyle, and as the dynamic web evolves, rewrite and perhaps also one day rearrange text and data. As a graphic designer usually working with static printed items, CSS font stacks is very unfamiliar: A list of typefaces were one take over were the previous failed, in- stead of that single specified Stempel Garamond 9/12 pt. that reads so well on matte stock. Am I fighting the evolution? I don’t think so. Some design principles are universal, independent of me- dium. I believe good typography is one of them. The technology that will let us use typefaces online the same way we use them in print is on it’s way, although moving at slow speed.
    [Show full text]
  • Creating a Mesh Sensor Network Using Raspberry Pi and Xbee Radio Modules
    Creating a mesh sensor network using Raspberry Pi and XBee radio modules By Michael Forcella In Partial Fulfillment of the Requirement for the Degree of MASTER OF SCIENCE In The Department of Computer Science State University of New York New Paltz, NY 12561 May 2017 Creating a mesh sensor network using Raspberry Pi and XBee radio modules Michael Forcella State University of New York at New Paltz _________________________________ We the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. ______________________________________ David Richardson, Thesis Advisor Department of Biology, SUNY New Paltz ______________________________________ Chirakkal Easwaran, Thesis Committee Member Department of Computer Science, SUNY New Paltz ______________________________________ Hanh Pham, Thesis Committee Member Department of Computer Science, SUNY New Paltz Approved on __________________ Submitted in partial fulfillment for the requirements for the Master of Science degree in Computer Science at the State University of New York at New Paltz ABSTRACT A mesh network is a type of network topology in which one or more nodes are capable of relaying data within the network. The data is relayed by the router nodes, which send the messages via one or more 'hops' until it reaches its intended destination. Mesh networks can be applied in situations where the structure or shape of the network does not permit every node to be within range of its final destination. One such application is that of environmental sensing. When creating a large network of sensors, however, we are often limited by the cost of such sensors. This thesis presents a low-cost mesh network framework, to which any number of different sensors can be attached.
    [Show full text]
  • On Trends in Low-Level Exploitation
    On trends in low-level exploitation Christian W. Otterstad Department of Informatics, University of Bergen Abstract Low-level computer exploitation and its mitigation counterpart has accumulated some noteworthy history. Presently, especially in academia, it features a plethora of mitigation techniques and also various possible modes of attack. It has seen numerous developments building upon basic methods for both sides and certain trends have emerged. This paper is primarily an overview paper, focusing especially on x86 GNU/Linux. The basic reasons inherent for allowing low-level exploitability are identified and explained to provide background knowledge. The paper furthermore describes the history, present state of the art and future developments that are topical and appear to be important in the field. Several attack and defense techniques have overlapping notions with not always obvious differences. Herein the notion of the bar being raised for both exploits and mitigation methods is examined and extrapolated upon based on the known relevant present state and history. The difference between academia and the industry is discussed especially where it relates to application of new mitigation techniques. Based on this examination some patterns and trends are identified and a conjecture for the likely future development of both is presented and justified. This paper was presented at the NIK-2016 conference; see http://www.nik.no/. 1 Introduction and earlier related work In 1972 the paper “Computer Security Technology Planning Study” was published [1]. Since then, research surrounding the main ideas in this paper has grown to become a ma- ture and complex field in its own right. There are many different exploitation techniques and mitigation techniques.
    [Show full text]
  • The Glib/GTK+ Development Platform
    The GLib/GTK+ Development Platform A Getting Started Guide Version 0.8 Sébastien Wilmet March 29, 2019 Contents 1 Introduction 3 1.1 License . 3 1.2 Financial Support . 3 1.3 Todo List for this Book and a Quick 2019 Update . 4 1.4 What is GLib and GTK+? . 4 1.5 The GNOME Desktop . 5 1.6 Prerequisites . 6 1.7 Why and When Using the C Language? . 7 1.7.1 Separate the Backend from the Frontend . 7 1.7.2 Other Aspects to Keep in Mind . 8 1.8 Learning Path . 9 1.9 The Development Environment . 10 1.10 Acknowledgments . 10 I GLib, the Core Library 11 2 GLib, the Core Library 12 2.1 Basics . 13 2.1.1 Type Definitions . 13 2.1.2 Frequently Used Macros . 13 2.1.3 Debugging Macros . 14 2.1.4 Memory . 16 2.1.5 String Handling . 18 2.2 Data Structures . 20 2.2.1 Lists . 20 2.2.2 Trees . 24 2.2.3 Hash Tables . 29 2.3 The Main Event Loop . 31 2.4 Other Features . 33 II Object-Oriented Programming in C 35 3 Semi-Object-Oriented Programming in C 37 3.1 Header Example . 37 3.1.1 Project Namespace . 37 3.1.2 Class Namespace . 39 3.1.3 Lowercase, Uppercase or CamelCase? . 39 3.1.4 Include Guard . 39 3.1.5 C++ Support . 39 1 3.1.6 #include . 39 3.1.7 Type Definition . 40 3.1.8 Object Constructor . 40 3.1.9 Object Destructor .
    [Show full text]
  • Open Source Software Notice
    Open Source Software Notice This document describes open source software contained in LG Smart TV SDK. Introduction This chapter describes open source software contained in LG Smart TV SDK. Terms and Conditions of the Applicable Open Source Licenses Please be informed that the open source software is subject to the terms and conditions of the applicable open source licenses, which are described in this chapter. | 1 Contents Introduction............................................................................................................................................................................................. 4 Open Source Software Contained in LG Smart TV SDK ........................................................... 4 Revision History ........................................................................................................................ 5 Terms and Conditions of the Applicable Open Source Licenses..................................................................................... 6 GNU Lesser General Public License ......................................................................................... 6 GNU Lesser General Public License ....................................................................................... 11 Mozilla Public License 1.1 (MPL 1.1) ....................................................................................... 13 Common Public License Version v 1.0 .................................................................................... 18 Eclipse Public License Version
    [Show full text]
  • Major Project Final
    2015 PiFi Analyser MASON MCCALLUM, NATHAN VAZ AND TIMOTHY LY NORTHERN SYDNEY INSTITUTE | Meadowbank Executive summary Wireless networks have become more prevalent in contemporary society, as such it is important to accurately study the impact that wireless networking can have on personal security and privacy. The PiFi Analyser project outlines the methods behind passively recording wireless networks and mapping the recorded data with associated GPS location data. The ensuing report confirms the methodologies and technologies proposed can operate to scopes that could be used to significant effect. 1 | P a g e Contents Executive summary ................................................................................................................................. 1 Introduction ............................................................................................................................................ 4 Literature Review .................................................................................................................................... 5 Objectives ............................................................................................................................................... 7 Method ................................................................................................................................................... 9 Building the Device ............................................................................................................................. 9 Testing device
    [Show full text]
  • Glossaire Infographique
    Glossaire Infographique André PASCUAL [email protected] Glossaire Infographique Table des Matières GLOSSAIRE ILLUSTRÉ...............................................................................................................................................................1 des Termes techniques & autres,.....................................................................................................................................1 Prologue.......................................................................................................................................................................................2 Notice Légale...............................................................................................................................................................................3 Définitions des termes & Illustrations.......................................................................................................................................4 −AaA−...........................................................................................................................................................................................5 Aberration chromatique :..................................................................................................................................................5 Accrochage − Snap :........................................................................................................................................................5 Aérosol,
    [Show full text]
  • Detecting Exploit Code Execution in Loadable Kernel Modules
    Detecting Exploit Code Execution in Loadable Kernel Modules HaizhiXu WenliangDu SteveJ.Chapin Systems Assurance Institute Syracuse University 3-114 CST, 111 College Place, Syracuse, NY 13210, USA g fhxu02, wedu, chapin @syr.edu Abstract and pointer checks can lead to kernel-level exploits, which can jeopardize the integrity of the running kernel. Inside the In current extensible monolithic operating systems, load- kernel, exploitcode has the privilegeto interceptsystem ser- able kernel modules (LKM) have unrestricted access to vice routines, to modify interrupt handlers, and to overwrite all portions of kernel memory and I/O space. As a result, kernel data. In such cases, the behavior of the entire sys- kernel-module exploitation can jeopardize the integrity of tem may become suspect. the entire system. In this paper, we analyze the threat that Kernel-level protection is different from user space pro- comes from the implicit trust relationship between the oper- tection. Not every application-level protection mechanism ating system kernel and loadable kernel modules. We then can be applied directly to kernel code, because privileges present a specification-directed access monitoring tool— of the kernel environment is different from that of the user HECK, that detects kernel modules for malicious code ex- space. For example, non-executableuser page [21] and non- ecution. Inside the module, HECK prevents code execution executable user stack [29] use virtual memory mapping sup- on the kernel stack and the data sections; on the bound- port for pages and segments, but inside the kernel, a page ary, HECK restricts the module’s access to only those kernel or segment fault can lead to kernel panic.
    [Show full text]