This week, we learned about of "open-sources ".
what are these things to "open-sources "?
what is “resistance” in digital media?
what is “resistance”?
tactics and means to oppose the strategies of “The Prince”
–e.g., while the prince tries to “divide and conquer,” the resistance tries to overcome the imposed isolation
countering the techniques and “technologies of power” (cf., Foucault) that impose isolation, distraction and domination through surveillance, entertainment, and force
what is a software virus?
virus: [from the obvious analogy with biological viruses, via SF] n. A cracker program that searches out other programs and `infects' them by embedding a copy of itself in them, so that they become {Trojan Horse}s. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. This normally happens invisibly to the user. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with your display (some viruses include nice {display hack}s). Many nasty viruses, written by particularly perversely minded {cracker}s, do irreversible damage, like nuking all the user's files. - Hackers’ Dictionary
what is a software “trojan horse”?
Trojan horse: [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See {back door}, {virus}, {worm}. -Hackers Dictionary
what is “worm”?
worm: [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. Perhaps the best-known example was Robert T. Morris's `Internet Worm' of 1988, a `benign' one that got out of control and hogged hundreds of Suns and VAXen across the U.S. See also {cracker}, {RTM}, {Trojan horse}, {ice}. -Hackers Dictionary
what is a software “bomb”?
logic bomb: n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. -Hackers’ Dictionary
what is a “back door”?
back door: n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} UNIX `sendmail(8)' utility. -Hackers Dictionary
examples of open source software
Internet
–Apache, which runs over 50% of the world's web servers.
–BIND, the software that provides the DNS (domain name service) for the entire Internet.
–sendmail, the most important and widely used email transport software on the Internet.
–Mozilla, the open source redesign of the Netscape Browser
–OpenSSL is the standard for secure communication (strong encryption) over the Internet.categories.
Thursday, June 12, 2008
Subscribe to:
Posts (Atom)