Author: JT Smith
Category:
- Linux
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
Author: JT Smith
Author: JT Smith
Author: JT Smith
This part of DotGNU contains a C# compiler, runtime engine, and related tools. There is as always good, steady progress.
DotGNU SEE
This Secure Execution Environment allows bytecode to be executed securely on the end user’s machine, allowing in particular the end user to execute webservice software locally, so that no-one can be locked into using the software as a webservice instead of running it locally. There has not been any progress with the code this week (the code is written in C++), but the Steering Committee has been able to resolve some internal misunderstandings related to the need for an official Windows port of DotGNU SEE. They’re (reluctantly!) going to ask Windows programmers to help with this. (The goals are to further the development and use of Free Software in general, and to enhance the GNU operating system in particular, not just make a popular collection of software. We want to provide users with a way to get more jobs done in full freedom, not just with some useful software packages. However, in order for DotGNU to do its job, it needs to be popular. For that reason, we are giving Windows support a somewhat higher priority level than it would normally have in a GNU project.)
Authentication, Authorization and Virtual Identities
The FrePort project of John le’Brecage is going forward, and it is now listed at http://dotgnu.org/proposals/active.html – This is will not be DotGNU’s only auth project, I expect that at least one or two others will follow soon.
DotGNU – Jabber meetings
Adam Theo is organizing weekly meetings for discussing possibilities of using the Jabber protocol suite in DotGNU. These meetings are well-attended, and things are starting to happen. I expect that an auth project will come out of this, and also a system (consisting of sysadmin tools and middleware) for managing the distributed flow of information through a network of webservice servers.
““This week in DotGNU” is Copyright (C) 2001 by Norbert Bollow. Verbatim copying and distribution of this entire issue is permitted in any medium or format, provided this notice is preserved.“
Category:
Author: JT Smith
Category:
Author: JT Smith
Open-source developers are not frightened of what Culp calls
“information anarchy”. That’s because we have confidence (a
confidence justified by the track record of Linux, the BSD operating
systems, and Apache) that our security holes will be infrequent, the
compromises they cause will be relatively minor, and fixes will be
rapidly developed and deployed.
And we’re not getting passed over by crackers because we have fewer
sites, either. Apache runs two thirds of the Web servers in the
world. When was the last time you heard about an Apache remote
compromise? There are many fewer IIS websites — and yet they are
constantly getting cracked. Because they’re soft targets.
Ultimately, this is because the `security’ in IIS and Windows is
incompetently designed, and its source code has never been subjected
to independent peer review.
Cryptographers and security experts have known for years that peer
review of open source code is the only reliable way to verify the
effectiveness of encryption systems and other security software. So
Microsoft’s closed-source mode of development guarantees that
customers will continue getting cracked and Microsoft will continue
pointing the finger of blame everywhere except where it actually
belongs. (In Microsoft-speak, this sort of thing is called
`innovation’.)
What Culp is really saying is that he doesn’t believe Microsoft will ever get
its act sufficiently together for Windows or IIS to survive in a high-threat
environment, so Microsoft wants to blame someone else for the problem.
Here’s what I have to say to Mr. Culp: “If you can’t stand the heat,
get out of the kitchen. And if your OS can’t stand an environment
where attack tools are instantly disseminated, you don’t belong in the
operating-system business.”
Think of it as evolution in action…
Category:
Author: JT Smith
Author: JT Smith
Category: