Ciberactivismo
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Building a Reliable Storage Stack
Building a Reliable Storage Stack Ph.D. Thesis David Cornelis van Moolenbroek Vrije Universiteit Amsterdam, 2016 This work was supported by the European Research Council Advanced Grant 227874. This work was carried out in the ASCI graduate school. ASCI dissertation series number 355. Copyright © 2016 by David Cornelis van Moolenbroek. ISBN 978-94-028-0240-5 Cover design by Eva Dienske. Printed by Ipskamp Printing. VRIJE UNIVERSITEIT Building a Reliable Storage Stack ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op maandag 12 september 2016 om 11.45 uur in de aula van de universiteit, De Boelelaan 1105 door David Cornelis van Moolenbroek geboren te Amsterdam promotor: prof.dr. A.S. Tanenbaum To my parents Acknowledgments This book marks the end of both a professional and a personal journey–one that has been long but rewarding. There are several people whom I would like to thank for accompanying and helping me along the way. First and foremost, I would like to thank my promotor, Andy Tanenbaum. While I was finishing up my master project under his supervision, he casually asked me “Would you like to be my Ph.D student?” during one of our meetings. I did not have to think long about the answer. Right from the start, he warned me that I would now have to conduct original research myself; only much later did I understand the full weight of this statement. -
Free Software Philosophy, History and Practice
Introduction (and some quick reminders) History and philosophy Legal aspects Free Software Philosophy, history and practice Luca Saiu [email protected] http://ageinghacker.net GNU Project Screencast version Paris, October 2014 Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Introducing myself I’m a computer scientist living and working somewhere around Paris... ...and a GNU maintainer. I’m also an associate member of the Free Software Foundation, a fellow of the Free Software Foundation Europe and an April adherent. So I’m not an impartial observer. Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Contents 1 Introduction (and some quick reminders) 2 History and philosophy The hacker community The GNU Project and the Free Software movement Linux and the Open Source movement 3 Legal aspects Copyright Free Software licenses Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — source code vs. machine code Source code vs. machine code Quick demo Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Programs are linked to libraries static libraries shared libraries Libraries (or programs) request services to the kernel Programs invoke with other programs Programs communicate with other programs... ...on the same machine ...over the network We’re gonna see that this has legal implications. Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — linking In practice, programs don’t exist in isolation. -
The Flask Security Architecture: System Support for Diverse Security Policies
The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen- erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli- this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga- mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac- Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi- of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu- the security policy is consulted for every security deci- rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor- the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy. -
Bushnell Family Genealogy, 1945
BUSHNELL FAMILY GENEALOGY Ancestry and Posterity of FRANCIS BUSHNELL (1580 - 1646) of Horsham, England And Guilford, Connecticut Including Genealogical Notes of other Bushnell Families, whose connections with this branch of the family tree have not been determined. Compiled and written by George Eleazer Bushnell Nashville, Tennessee 1945 Bushnell Genealogy 1 The sudden and untimely death of the family historian, George Eleazer Bushnell, of Nashville, Tennessee, who devoted so many years to the completion of this work, necessitated a complete change in its publication plans and we were required to start anew without familiarity with his painstaking work and vast acquaintance amongst the members of the family. His manuscript, while well arranged, was not yet ready for printing. It has therefore been copied, recopied and edited, However, despite every effort, prepublication funds have not been secured to produce the kind of a book we desire and which Mr. Bushnell's painstaking work deserves. His material is too valuable to be lost in some library's manuscript collection. It is a faithful record of the Bushnell family, more complete than anyone could have anticipated. Time is running out and we have reluctantly decided to make the best use of available funds by producing the "book" by a process of photographic reproduction of the typewritten pages of the revised and edited manuscript. The only deviation from the original consists in slight rearrangement, minor corrections, additional indexing and numbering. We are proud to thus assist in the compiler's labor of love. We are most grateful to those prepublication subscribers listed below, whose faith and patience helped make George Eleazer Bushnell's book thus available to the Bushnell Family. -
AHS 02 02 Content 20140102
Advances in Historical Studies, 2013, 2, 19-104 Published Online June 2013 in SciRes (http://www.scirp.org/journal/ahs/) TABLE OF CONTENTS Volume 2 Number 2 June 2013 Letter from Chief-Managing Editorial Staff ARTICLES The Roots of the Theoretical Models of the Nanotechnoscience in the Electric Circuit Theory V. Gorokhov……………………………………………………………..…………………………………………………………………………19 Reflections on the Scientific Conceptual Streams in Leonardo da Vinci and His Relationship with Luca Pacioli R. Pisano……………………………………………………………………………………………………………………………………………32 Reclaiming Realism for the Left: Gar Alperovitz and the Decision to Use the Atomic Bomb P. N. Kirstein……………………………………………………………………………………………………………………….………………46 MISCELLANEA Megalithism and Tribal Ritualism: A Passage through the Kurumbas of Attappadi M. Poyil…………………………………………………………………………………………………………………………………….………54 Temple as the Site of Struggle: Social Reform, Religious Symbols and the Politics of Nationalism in Kerala M. R. Manmathan……………………………………………………………………………………………………………..……………………57 Communities Inferred from the Books of Samuel in the Old Testament of the Bible W. Hu………………………………………………………………………………………………………………………………………………70 Les Châteaux de Landiras et de Montferrand and Their Seigneurial Families D. A. Bailey………………………………………………………………………………………………………...………………………………81 ESSAY REVIEW Borderland Theory as a Conceptual Framework for Comparative Local US and Canadian History C. Parham…………………………………………………………………………………………………………………………..………………94 Jacket: L’histoire comme images d’autres mondes [The history as images -
The Flask Security Architecture: System Support for Diverse Security Policies
The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu the security policy is consulted for every security deci rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy. -
Mach-O Internals
Mach-O Internals William Woodru February 10, 2016 1 / 31 General Agenda 1. Who are you? 2. What is Mach-O? 3. An Extremely Brief History of Mach and Mach-O 4. Structure of a Mach-O File 5. Quirks Encountered 6. Concluding Notes 2 / 31 Who are you? My name is William Woodru. I'm a Computer Science major and Philosophy minor at the University of Maryland, College Park. Outside of school, I'm a member of the Homebrew project and a regular contributor to several open source groups. My work for Homebrew is largely concerned with the underlying system interface and reconciling OS X's intricacies/irregularities with the package manager. 3 / 31 What is Mach-O? Mach-O is the Mach Object binary format. Mach-O is used primarily by Apple in OS X and iOS. Apps on both platforms are really just directory trees containing Mach-O binaries and resources (fonts, icons, congurations). Metadata is stored in a number of places, but mainly within bundled plists (XML) and the binaries themselves. Like its cousins on Linux (ELF) and Windows (PE), Mach-O supports multiple object types: I Executable I Core dump I Shared library/object I Prelinked object le I etc. 4 / 31 . and multiple architectures: I m68k/m88k (yes, it's still supported!*) I x86 I AMD64 I POWER I ARMv6/7/8 Unlike ELF or PE, Mach-O has been extended to allow multi-architecture fat binaries. This has resulted in some interesting properties not shared by the other two. More on that later. -
Skripsi Perbandingan General Public License Pada Linux Menurut Ketentuan Undang
SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 i SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 ii MOTTO SCIENTIA EST LUX LUCIS ILMU PENGETAHUAN ADALAH PENCERAHAN (LEONARDO DA VINCI) iii PERSEMBAHAN Skripsi ini Penulis persembahkan kepada : 1. Ayahanda Budi Suwardi dan Ibunda Septiani tercinta, yang telah membesarkan penulis dengan penuh rasa kasih sayang, serta tiada hentinya selalu memberikan semangat dan mendo’akan penulis untuk bisa menyelesaikan Skripsi ini. 2. Alma Mater tercinta Fakultas Hukum Universitas Jember yang selalu saya banggakan. 3. Bapak dan Ibu Guru sejak penulis duduk dibangku TK sampai dengan SMA, serta Bapak dan Ibu Dosen yang telah memberikan ilmu dan bimbingan dengan penuh kesabaran. 4. Kedua adik penulis, Banu Tito Raharjo, dan Adik Tri Egy Yudho Yunantoro yang saya sayangi, yang telah menyertai, memberi saya semangat, dukungan, dan hari-hari yang penuh warna saat-saat kita berkumpul bersama dirumah. iv PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT SKRIPSI Diajukan sebagai salah satu syarat memperoleh gelar Sarjana Hukum pada Fakultas Hukum Universitas Jember DIKA BIMANSTARA NIM. -
The GNU Hurd
The GNU Hurd [Extended Abstract] Gael¨ Le Mignot ABSTRACT speak of, say, storage devices, there are IDE disks, This is an abstract of the talk given at LSM 2005, about the SCSI disks, floppy disks, tapes, USB devices, FireWire GNU Hurd, its goals, its design, its features and its relation- devices, parallel port devices, ... should every program ship with the GNU project. This is a general presentation know how to put into motion the floppy disk engine ? of the GNU Hurd, mostly on technical aspects. Providing an hardware abstraction layer is one of the major goals of operating systems. 1. INTRODUCTION Resource sharing. Resources on a computer are limited. 1.1 What is an operating system ? Be it main memory, CPU power, hard disk storage, 1.1.1 Historical point of view screen area, networking connection, or sound output, The first computers were so expensive that only one existed those resources must be controlled by a supervisor pro- for a whole university or research department; and so slow gram, allowing each of the programs to access to a part that it was unthinkable to interact with it in real time. This of it as needed. was the era of batch processing, when programmers cre- ated self-running programs called “batch”. Those programs Security infrastructure. All modern operating systems usually took several hours to run, printing huge listing as can enforce several kinds of security. Security can be output. Programs were run one after the other. used to prevent a user from accessing confidential or private data of another user, to prevent accidental re- Then, computers became more efficient. -
A Contemporary Exploration of Canadian Political Poetry in English
POETS ON THE HILL POETS ON THE HILL: A CONTEMPORARY EXPLORATION OF CANADIAN POLITICAL POETRY IN ENGLISH By NICOLAS DESROCHES, HONOURS B.A. A Thesis Submitted to the School of Graduate Studies in Partial Fulfilment of the Requirements for the Degree Master of Arts McMaster University © Copyright by Nicolas DesRoches, September 2013 McMaster University MASTER OF ARTS (2013) Hamilton, Ontario (English) TITLE: Poets on the Hill: A Contemporary Exploration of Canadian Political Poetry in English AUTHOR: Nicolas DesRoches, Honours B.A. (York University) SUPERVISOR: Professor Jeffery Donaldson NUMBER OF PAGES: vii, 124 ii Abstract In this thesis, I investigate Canadian poetry that is explicitly about the political (politicians, political parties, or political policies) written in English. As no research of this type has occurred previously, I begin by defining political poetry and its aims in Canada and then progress through an examination of three collections of poetry and one poem: The Blasted Pine ; Howl Too, Eh?; and Rogue Stimulus . This allows for a comprehensive look at how political poetry has evolved in Canada from a pointed and critical genre that aims to mock and argue to a more subtle, playful genre that utilizes parody and wit. It also demonstrates the evolution and complication of voice in political poetry, given that each poem contains not only the voice of the poet and the speaker, but also the public and the political. I argue that political poetry in Canada is not poetry as dissent, protest, or witness, but rather poetry as inquiry/commission (in the political sense). This definition relies on the fact that Canadian political poetry seeks to ascribe accountability for political actions and decisions and utilizes the poet as spokesperson, speaking for the public to the political (and the public in turn). -
A Brief History of Debian I
A Brief History of Debian i A Brief History of Debian A Brief History of Debian ii 1999-2020Debian Documentation Team [email protected] Debian Documentation Team This document may be freely redistributed or modified in any form provided your changes are clearly documented. This document may be redistributed for fee or free, and may be modified (including translation from one type of media or file format to another or from one spoken language to another) provided that all changes from the original are clearly marked as such. Significant contributions were made to this document by • Javier Fernández-Sanguino [email protected] • Bdale Garbee [email protected] • Hartmut Koptein [email protected] • Nils Lohner [email protected] • Will Lowe [email protected] • Bill Mitchell [email protected] • Ian Murdock • Martin Schulze [email protected] • Craig Small [email protected] This document is primarily maintained by Bdale Garbee [email protected]. A Brief History of Debian iii COLLABORATORS TITLE : A Brief History of Debian ACTION NAME DATE SIGNATURE WRITTEN BY September 14, 2020 REVISION HISTORY NUMBER DATE DESCRIPTION NAME A Brief History of Debian iv Contents 1 Introduction -- What is the Debian Project? 1 1.1 In the Beginning ................................................... 1 1.2 Pronouncing Debian ................................................. 1 2 Leadership 2 3 Debian Releases 3 4 A Detailed History 6 4.1 The 0.x Releases ................................................... 6 4.1.1 The Early Debian Packaging System ..................................... 7 4.2 The 1.x Releases ................................................... 7 4.3 The 2.x Releases ................................................... 8 4.4 The 3.x Releases ................................................... 8 4.5 The 4.x Releases .................................................. -
Multiboot Specification Version 0.6.96
The Multiboot Specification version 0.6.96 Yoshinori K. Okuji, Bryan Ford, Erich Stefan Boleyn, Kunihiro Ishiguro Copyright c 1995,96 Bryan Ford <[email protected]> Copyright c 1995,96 Erich Stefan Boleyn <[email protected]> Copyright c 1999,2000,2001,2002,2005,2006,2009,2010 Free Software Foundation, Inc. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire result- ing derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. Chapter 1: Introduction to Multiboot Specification 1 1 Introduction to Multiboot Specification This chapter describes some rough information on the Multiboot Specification. Note that this is not a part of the specification itself. 1.1 The background of Multiboot Specification Every operating system ever created tends to have its own boot loader. Installing a new operating system on a machine generally involves installing a whole new set of boot mech- anisms, each with completely different install-time and boot-time user interfaces. Getting multiple operating systems to coexist reliably on one machine through typical chaining mechanisms can be a nightmare. There is little or no choice of boot loaders for a particular operating system | if the one that comes with the operating system doesn't do exactly what you want, or doesn't work on your machine, you're screwed.