Ciberactivismo

Total Page:16

File Type:pdf, Size:1020Kb

Ciberactivismo La majoria de llibres de Virus editorial es troben sota llicències lliures i per la seva lliure descàrrega. Però els projectes autoges- tionaris i alternatius, com Virus editorial, necessiten un impor- tant suport econòmic. En la mesura que oferim bona part del nostre treball pel comú, creiem important crear també formes de col·laboració en la sostenibilitat del projecte. Subscriu-t’hi!! La mayoría de libros de Virus editorial se encuentran bajo li- cencias libres y para su libre descarga. Pero los proyectos au- togestionarios y alternativos, como Virus editorial, necesitan de un importante apoyo económico. En la medida en que ofrecemos buena parte de nuestro trabajo para lo común, creemos impor- tante crear también formas de colaboración en la sostenibilidad del proyecto. ¡Subscríbete! https://www.viruseditorial.net/es/editorial/socios Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 1 Reunión de Ovejas Electrónicas (ROE) CIBERACTIVISMO Sobre usos políticos y sociales de la Red Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 2 El copyright de los artículos es de sus respectivas autoras. Todos los textos aquí conte- nidos son copyleft, es decir, que garantizan (como mínimo) el derecho de libre copia y dis- tribución sin necesidad de permiso expreso del autor (siempre que se haga sin ánimo de lucro). Los términos de las respectivas licencias están especificados en cada texto. En el caso de que no haya una licencia explicita, eres libre de copiar y distribuir el texto íntegro en todo lugar, sin permiso del autor y por cualquier medio, siempre y cuando se manten- ga esta nota. Copyright © 2006 de la compilación de artículos Reunión de Ovejas Electrónicas. Eres libre de usar, copiar, modificar y distribuir libremente esta compilación de textos siempre que respetes los términos de sus licencias respectivas e incluyas en la compilación o su modificación esta misma nota. El uso estratégico de la legislación de copyright para darle la vuelta y permitir la libre cir- culación del conocimiento, técnicas y cultura en ningún modo refleja nuestra aceptación o acuerdo con esta legislación abusiva, mercantilista y privativa. Reunión de Ovejas Electrónicas (ROE) CIBERACTIVISMO Sobre usos políticos y sociales de la Red Maquetación: Virus editorial Cubierta: PCC Primera edición: junio de 2006 Lallevir S.L. VIRUS editorial C/Aurora, 23 baixos 08001 Barcelona T./fax: 934413814 C/e: [email protected] http://www.viruseditorial.net Impreso en: Imprenta LUNA Muelle de la Merced, 3, 2º izq. 48003 Bilbao T.: 944167518 Fax: 944153298 I.S.B.N.: 84-96044-72-6 Depósito Legal: Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 3 índice Estrategias de futuro en clave de presente (y algún pescozón del pasado), Víctor Sampedro Blanco - - - - - - - - - 5 Del tam-tam al doble click: Una historia conceptual de la contrainformación, Sara López Martín y Gustavo Roig Domínguez - - - - - - 15 ECN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 16 DEL NARROWCASTING AL NETCASTING - - - - - - - - - - - - - - - - - - - - - - - 21 SINDOMINIO.NET: POR UN DOMINIO ANTAGONISTA EN LA RED - - - - - - - - - - - - 27 ¿QUÉ ES NODO50? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 34 Una introducción al software libre, Enrique Matías Sánchez - - - - - - - - - - 45 EL SOFTWARE LIBRE EXPLICADO A LAS MARUJAS - - - - - - - - - - - - - - - - - 47 BELL Y LOS PHREAKS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 62 2600 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 78 Penélope: tejiendo y destejiendo la red, Raquel Mezquita y Margarita Padilla - - - - - - - - - - - - - - - - - - - - - - - - 81 LA CHICA DE LA PELÍCULA - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 83 ENVIAR UNA HISTORIA - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 94 CHAOS COMPUTER CLUB (CCC), Fernando Blanco Dopazo - - - - - - - - - - - - - - 114 Hackers: activismo político en la frontera tecnológica, Gustavo Roig Domínguez - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 119 LA ACTITUD DEL HACKER, E. Raymond - - - - - - - - - - - - - - - - - - - - - - - - 121 Hacklabs, hackmeetings, Xabier Barandiaran - - - - - - - - - - - - - - - - - - 139 MANUAL DE INSTRUCCIONES PARA EJECUTIVOS - - - - - - - - - - - - - - - - - - - 140 TALADRANDO CAJAS NEGRAS - - - - - - - - - - - - - - - - - - - - - - - - - - - - 150 Los discursos del hacking, Gustavo Roig Domínguez - - - - - - - - - - - - - - 157 HACKERS Y CRACKERS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 159 ESCUELA DE «HACKERS» PARA LUCHAR CONTRA LOS «CRAKERS» - - - - - - - - - 172 LAS ZAPATILLAS PERSONALIZADAS DEL SR. PERETTI - - - - - - - - - - - - - - - 178 P2P, Manuel Campos - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 181 EL PROYECTO SETI@HOME - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 182 RE-CODE.COM, LIBERALIZANDO EL CAPITAL - - - - - - - - - - - - - - - - - - - - - 186 Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 4 Wireless, la multitud interconectada, Adolfo Antón Bravo - - - - - - - - - - 197 MANIFIESTO DE MADRIDWIRELESS - - - - - - - - - - - - - - - - - - - - - - - - - - 198 WARDRIVING - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 201 VIDEOJUEGOS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 208 Seguridad informática, txipi - - - - - - - - - - - - - - - - - - - - - - - - - - - - 215 UNA DE TROYANOS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 230 INFOMIXER - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 240 AGENTES - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 244 GOOGLE BOMB - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 248 Humildad y ambición del virus: una introducción al activismo vírico, Lluís Guiu - - - - - - - - - - - - - - 255 VIRUS INFORMÁTICOS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 256 TomaTAZo - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 258 «¿DÓNDE ESTÁ LA AUTORIDAD COMPETENTE?» - - - - - - - - - - - - - - - - - - - 265 MÓVILES: ¿UN NUEVO CAMPO DE INFECCIONES? - - - - - - - - - - - - - - - - - - - 267 La desobediencia civil electrónica, la simulación y la esfera pública, Critical Art Ensemble - - - - - - - - - - 271 CIBERFIASCOS FAMOSOS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 272 LUFTHANSA: EL ACTIVISMO ON-LINE BAJO PRESIÓN - - - - - - - - - - - - - - - - 283 El Electronic Disturbance Theater y la desobediencia civil electrónica, Stefan Wray - - - - - - - - - - - - - 287 «Es mejor que tumben a un servidor a que te den un balazo», entrevista a Ricardo Domínguez, Mercè Molist - - - - - - - - - - - - - - - 291 THE YES MEN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 292 VOTOS AL MEJOR POSTOR - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 302 Agujeros negros en la red, Margarita Padilla - - - - - - - - - - - - - - - - - - - 309 Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 5 Estrategias «El Occidente, drogado de devenir, inclina su presente hacia el futuro y nos fuerza a todos a entender que, de futuro para responder a su desafío, debemos combatirlo en el terreno que ha elegido: el presente.» en clave de Fátima Mernissi, El harén político presente (y algún pescozón del pasado) Víctor Sampedro Blanco No pretendo pontificar sobre la valía de las intervenciones y las tácticas ciberguerrille- ras. Tampoco herir más sensibilidades de las necesarias. No vaya a ser que abortemos «las embrionarias subjetividades revolucionarias, reticulares, rizomáticas...» que puedan leernos. Que vaya usted a saber qué ocurriría si, tras leer este libro, actuasen ustedes como guevaristas de Internet. Imaginémonos practicando foquismo telemático, duran- te al menos media hora al día, desde el ordenador de la gran (o ridícula) corporación para la que trabajamos, haciéndole la Pascua. Por soñar que no falte y, por otra parte, nada más reaccionario que un agorero de lo que todavía no se ha intentado. Sin embargo, para disfrutar de cualquier recetario (aunque este libro no pretenda serlo) hay que reconocer qué es lo que se cocina y —sobre todo— para quién. No vaya a ser que al final montemos el tres estrellas Michelín del activismo más guay y no un comedor autogestionado para analfabetos funcionales de la Red, como yo... o casi. Pues reconozco mi escasa competencia informática. Apenas me da para procesar textos, intercambiar correos y «navegar» (con pulso bastante tem- blón y timón inseguro) por Internet. Los tres argumentos que aquí esgrimo parten de unas cuantas lec- turas sobre la materia y reflejan esa indigencia tecnológica, nimia si se compara con la de tantos para los que un ratón es sólo un bicho, una amenaza para la cosecha, un compañero de miseria. Desde mi ignorancia (por otra parte, opulencia), agra- dezco haber leído este libro: ahora creo saber más, para hacer y decir más con el ordenador. Necesito, sin embargo, que no se me vaya la olla ante tanto menú des- plegado en mi pantalla. Y, por eso, me doy unos cuantos toques, para aplacar la bulimia ciberguerrillera que me ha entrado. Por tanto, que ninguno de los autores se dé por aludido en exclusiva y todos (yo el primero) en general. Toda estrategia de futuro, desconectada del presente e ignorante del pasado, resulta tan triste como la «nuvel cusin» esa: llena los ojos y apenas enga- Ciberlibro 0001.qxp 31/05/2006 12:38 PÆgina 6 ña el estómago.
Recommended publications
  • Building a Reliable Storage Stack
    Building a Reliable Storage Stack Ph.D. Thesis David Cornelis van Moolenbroek Vrije Universiteit Amsterdam, 2016 This work was supported by the European Research Council Advanced Grant 227874. This work was carried out in the ASCI graduate school. ASCI dissertation series number 355. Copyright © 2016 by David Cornelis van Moolenbroek. ISBN 978-94-028-0240-5 Cover design by Eva Dienske. Printed by Ipskamp Printing. VRIJE UNIVERSITEIT Building a Reliable Storage Stack ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op maandag 12 september 2016 om 11.45 uur in de aula van de universiteit, De Boelelaan 1105 door David Cornelis van Moolenbroek geboren te Amsterdam promotor: prof.dr. A.S. Tanenbaum To my parents Acknowledgments This book marks the end of both a professional and a personal journey–one that has been long but rewarding. There are several people whom I would like to thank for accompanying and helping me along the way. First and foremost, I would like to thank my promotor, Andy Tanenbaum. While I was finishing up my master project under his supervision, he casually asked me “Would you like to be my Ph.D student?” during one of our meetings. I did not have to think long about the answer. Right from the start, he warned me that I would now have to conduct original research myself; only much later did I understand the full weight of this statement.
    [Show full text]
  • Free Software Philosophy, History and Practice
    Introduction (and some quick reminders) History and philosophy Legal aspects Free Software Philosophy, history and practice Luca Saiu [email protected] http://ageinghacker.net GNU Project Screencast version Paris, October 2014 Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Introducing myself I’m a computer scientist living and working somewhere around Paris... ...and a GNU maintainer. I’m also an associate member of the Free Software Foundation, a fellow of the Free Software Foundation Europe and an April adherent. So I’m not an impartial observer. Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Contents 1 Introduction (and some quick reminders) 2 History and philosophy The hacker community The GNU Project and the Free Software movement Linux and the Open Source movement 3 Legal aspects Copyright Free Software licenses Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — source code vs. machine code Source code vs. machine code Quick demo Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Programs are linked to libraries static libraries shared libraries Libraries (or programs) request services to the kernel Programs invoke with other programs Programs communicate with other programs... ...on the same machine ...over the network We’re gonna see that this has legal implications. Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — linking In practice, programs don’t exist in isolation.
    [Show full text]
  • The Flask Security Architecture: System Support for Diverse Security Policies
    The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen- erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli- this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga- mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac- Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi- of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu- the security policy is consulted for every security deci- rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor- the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy.
    [Show full text]
  • Bushnell Family Genealogy, 1945
    BUSHNELL FAMILY GENEALOGY Ancestry and Posterity of FRANCIS BUSHNELL (1580 - 1646) of Horsham, England And Guilford, Connecticut Including Genealogical Notes of other Bushnell Families, whose connections with this branch of the family tree have not been determined. Compiled and written by George Eleazer Bushnell Nashville, Tennessee 1945 Bushnell Genealogy 1 The sudden and untimely death of the family historian, George Eleazer Bushnell, of Nashville, Tennessee, who devoted so many years to the completion of this work, necessitated a complete change in its publication plans and we were required to start anew without familiarity with his painstaking work and vast acquaintance amongst the members of the family. His manuscript, while well arranged, was not yet ready for printing. It has therefore been copied, recopied and edited, However, despite every effort, prepublication funds have not been secured to produce the kind of a book we desire and which Mr. Bushnell's painstaking work deserves. His material is too valuable to be lost in some library's manuscript collection. It is a faithful record of the Bushnell family, more complete than anyone could have anticipated. Time is running out and we have reluctantly decided to make the best use of available funds by producing the "book" by a process of photographic reproduction of the typewritten pages of the revised and edited manuscript. The only deviation from the original consists in slight rearrangement, minor corrections, additional indexing and numbering. We are proud to thus assist in the compiler's labor of love. We are most grateful to those prepublication subscribers listed below, whose faith and patience helped make George Eleazer Bushnell's book thus available to the Bushnell Family.
    [Show full text]
  • AHS 02 02 Content 20140102
    Advances in Historical Studies, 2013, 2, 19-104 Published Online June 2013 in SciRes (http://www.scirp.org/journal/ahs/) TABLE OF CONTENTS Volume 2 Number 2 June 2013 Letter from Chief-Managing Editorial Staff ARTICLES The Roots of the Theoretical Models of the Nanotechnoscience in the Electric Circuit Theory V. Gorokhov……………………………………………………………..…………………………………………………………………………19 Reflections on the Scientific Conceptual Streams in Leonardo da Vinci and His Relationship with Luca Pacioli R. Pisano……………………………………………………………………………………………………………………………………………32 Reclaiming Realism for the Left: Gar Alperovitz and the Decision to Use the Atomic Bomb P. N. Kirstein……………………………………………………………………………………………………………………….………………46 MISCELLANEA Megalithism and Tribal Ritualism: A Passage through the Kurumbas of Attappadi M. Poyil…………………………………………………………………………………………………………………………………….………54 Temple as the Site of Struggle: Social Reform, Religious Symbols and the Politics of Nationalism in Kerala M. R. Manmathan……………………………………………………………………………………………………………..……………………57 Communities Inferred from the Books of Samuel in the Old Testament of the Bible W. Hu………………………………………………………………………………………………………………………………………………70 Les Châteaux de Landiras et de Montferrand and Their Seigneurial Families D. A. Bailey………………………………………………………………………………………………………...………………………………81 ESSAY REVIEW Borderland Theory as a Conceptual Framework for Comparative Local US and Canadian History C. Parham…………………………………………………………………………………………………………………………..………………94 Jacket: L’histoire comme images d’autres mondes [The history as images
    [Show full text]
  • The Flask Security Architecture: System Support for Diverse Security Policies
    The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen­ erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli­ this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga­ mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac­ Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi­ of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu­ the security policy is consulted for every security deci­ rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor­ the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy.
    [Show full text]
  • Mach-O Internals
    Mach-O Internals William Woodru February 10, 2016 1 / 31 General Agenda 1. Who are you? 2. What is Mach-O? 3. An Extremely Brief History of Mach and Mach-O 4. Structure of a Mach-O File 5. Quirks Encountered 6. Concluding Notes 2 / 31 Who are you? My name is William Woodru. I'm a Computer Science major and Philosophy minor at the University of Maryland, College Park. Outside of school, I'm a member of the Homebrew project and a regular contributor to several open source groups. My work for Homebrew is largely concerned with the underlying system interface and reconciling OS X's intricacies/irregularities with the package manager. 3 / 31 What is Mach-O? Mach-O is the Mach Object binary format. Mach-O is used primarily by Apple in OS X and iOS. Apps on both platforms are really just directory trees containing Mach-O binaries and resources (fonts, icons, congurations). Metadata is stored in a number of places, but mainly within bundled plists (XML) and the binaries themselves. Like its cousins on Linux (ELF) and Windows (PE), Mach-O supports multiple object types: I Executable I Core dump I Shared library/object I Prelinked object le I etc. 4 / 31 . and multiple architectures: I m68k/m88k (yes, it's still supported!*) I x86 I AMD64 I POWER I ARMv6/7/8 Unlike ELF or PE, Mach-O has been extended to allow multi-architecture fat binaries. This has resulted in some interesting properties not shared by the other two. More on that later.
    [Show full text]
  • Skripsi Perbandingan General Public License Pada Linux Menurut Ketentuan Undang
    SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 i SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 ii MOTTO SCIENTIA EST LUX LUCIS ILMU PENGETAHUAN ADALAH PENCERAHAN (LEONARDO DA VINCI) iii PERSEMBAHAN Skripsi ini Penulis persembahkan kepada : 1. Ayahanda Budi Suwardi dan Ibunda Septiani tercinta, yang telah membesarkan penulis dengan penuh rasa kasih sayang, serta tiada hentinya selalu memberikan semangat dan mendo’akan penulis untuk bisa menyelesaikan Skripsi ini. 2. Alma Mater tercinta Fakultas Hukum Universitas Jember yang selalu saya banggakan. 3. Bapak dan Ibu Guru sejak penulis duduk dibangku TK sampai dengan SMA, serta Bapak dan Ibu Dosen yang telah memberikan ilmu dan bimbingan dengan penuh kesabaran. 4. Kedua adik penulis, Banu Tito Raharjo, dan Adik Tri Egy Yudho Yunantoro yang saya sayangi, yang telah menyertai, memberi saya semangat, dukungan, dan hari-hari yang penuh warna saat-saat kita berkumpul bersama dirumah. iv PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT SKRIPSI Diajukan sebagai salah satu syarat memperoleh gelar Sarjana Hukum pada Fakultas Hukum Universitas Jember DIKA BIMANSTARA NIM.
    [Show full text]
  • The GNU Hurd
    The GNU Hurd [Extended Abstract] Gael¨ Le Mignot ABSTRACT speak of, say, storage devices, there are IDE disks, This is an abstract of the talk given at LSM 2005, about the SCSI disks, floppy disks, tapes, USB devices, FireWire GNU Hurd, its goals, its design, its features and its relation- devices, parallel port devices, ... should every program ship with the GNU project. This is a general presentation know how to put into motion the floppy disk engine ? of the GNU Hurd, mostly on technical aspects. Providing an hardware abstraction layer is one of the major goals of operating systems. 1. INTRODUCTION Resource sharing. Resources on a computer are limited. 1.1 What is an operating system ? Be it main memory, CPU power, hard disk storage, 1.1.1 Historical point of view screen area, networking connection, or sound output, The first computers were so expensive that only one existed those resources must be controlled by a supervisor pro- for a whole university or research department; and so slow gram, allowing each of the programs to access to a part that it was unthinkable to interact with it in real time. This of it as needed. was the era of batch processing, when programmers cre- ated self-running programs called “batch”. Those programs Security infrastructure. All modern operating systems usually took several hours to run, printing huge listing as can enforce several kinds of security. Security can be output. Programs were run one after the other. used to prevent a user from accessing confidential or private data of another user, to prevent accidental re- Then, computers became more efficient.
    [Show full text]
  • A Contemporary Exploration of Canadian Political Poetry in English
    POETS ON THE HILL POETS ON THE HILL: A CONTEMPORARY EXPLORATION OF CANADIAN POLITICAL POETRY IN ENGLISH By NICOLAS DESROCHES, HONOURS B.A. A Thesis Submitted to the School of Graduate Studies in Partial Fulfilment of the Requirements for the Degree Master of Arts McMaster University © Copyright by Nicolas DesRoches, September 2013 McMaster University MASTER OF ARTS (2013) Hamilton, Ontario (English) TITLE: Poets on the Hill: A Contemporary Exploration of Canadian Political Poetry in English AUTHOR: Nicolas DesRoches, Honours B.A. (York University) SUPERVISOR: Professor Jeffery Donaldson NUMBER OF PAGES: vii, 124 ii Abstract In this thesis, I investigate Canadian poetry that is explicitly about the political (politicians, political parties, or political policies) written in English. As no research of this type has occurred previously, I begin by defining political poetry and its aims in Canada and then progress through an examination of three collections of poetry and one poem: The Blasted Pine ; Howl Too, Eh?; and Rogue Stimulus . This allows for a comprehensive look at how political poetry has evolved in Canada from a pointed and critical genre that aims to mock and argue to a more subtle, playful genre that utilizes parody and wit. It also demonstrates the evolution and complication of voice in political poetry, given that each poem contains not only the voice of the poet and the speaker, but also the public and the political. I argue that political poetry in Canada is not poetry as dissent, protest, or witness, but rather poetry as inquiry/commission (in the political sense). This definition relies on the fact that Canadian political poetry seeks to ascribe accountability for political actions and decisions and utilizes the poet as spokesperson, speaking for the public to the political (and the public in turn).
    [Show full text]
  • A Brief History of Debian I
    A Brief History of Debian i A Brief History of Debian A Brief History of Debian ii 1999-2020Debian Documentation Team [email protected] Debian Documentation Team This document may be freely redistributed or modified in any form provided your changes are clearly documented. This document may be redistributed for fee or free, and may be modified (including translation from one type of media or file format to another or from one spoken language to another) provided that all changes from the original are clearly marked as such. Significant contributions were made to this document by • Javier Fernández-Sanguino [email protected] • Bdale Garbee [email protected] • Hartmut Koptein [email protected] • Nils Lohner [email protected] • Will Lowe [email protected] • Bill Mitchell [email protected] • Ian Murdock • Martin Schulze [email protected] • Craig Small [email protected] This document is primarily maintained by Bdale Garbee [email protected]. A Brief History of Debian iii COLLABORATORS TITLE : A Brief History of Debian ACTION NAME DATE SIGNATURE WRITTEN BY September 14, 2020 REVISION HISTORY NUMBER DATE DESCRIPTION NAME A Brief History of Debian iv Contents 1 Introduction -- What is the Debian Project? 1 1.1 In the Beginning ................................................... 1 1.2 Pronouncing Debian ................................................. 1 2 Leadership 2 3 Debian Releases 3 4 A Detailed History 6 4.1 The 0.x Releases ................................................... 6 4.1.1 The Early Debian Packaging System ..................................... 7 4.2 The 1.x Releases ................................................... 7 4.3 The 2.x Releases ................................................... 8 4.4 The 3.x Releases ................................................... 8 4.5 The 4.x Releases ..................................................
    [Show full text]
  • Multiboot Specification Version 0.6.96
    The Multiboot Specification version 0.6.96 Yoshinori K. Okuji, Bryan Ford, Erich Stefan Boleyn, Kunihiro Ishiguro Copyright c 1995,96 Bryan Ford <[email protected]> Copyright c 1995,96 Erich Stefan Boleyn <[email protected]> Copyright c 1999,2000,2001,2002,2005,2006,2009,2010 Free Software Foundation, Inc. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire result- ing derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions. Chapter 1: Introduction to Multiboot Specification 1 1 Introduction to Multiboot Specification This chapter describes some rough information on the Multiboot Specification. Note that this is not a part of the specification itself. 1.1 The background of Multiboot Specification Every operating system ever created tends to have its own boot loader. Installing a new operating system on a machine generally involves installing a whole new set of boot mech- anisms, each with completely different install-time and boot-time user interfaces. Getting multiple operating systems to coexist reliably on one machine through typical chaining mechanisms can be a nightmare. There is little or no choice of boot loaders for a particular operating system | if the one that comes with the operating system doesn't do exactly what you want, or doesn't work on your machine, you're screwed.
    [Show full text]