Author: JT Smith
Security,” and “DNS and BIND, 4th Edition Online: Chapter 11: Security.” Also this week, take a look at our feature story,
“Open Source Security Testing Methods.”
Category:
- Linux
Author: JT Smith
Category:
Author: JT Smith
In case you were living under a rock this week, we’ll review the big news. Craig Mundie, a Microsoft senior vice president, announced what he called a “shared source” initiative, while at the same time ripping into Open Source business plans and the GNU General Public License.
After Mundie called the GPL a “threat” to intellectual property, the Open Source and Free Software communities’ retaliations were quick, massive and dead on target.
Among the responses:
The general tone of the technology press coverage of the Mundie speech seemed to be, “more of the same from Microsoft.” Salon.com made fun of the speech by saying Microsoft was calling Free Software “the devil’s work.” TheStandard noted the irony in Mundie’s speech: “Redmond lets its customers look at source code but doesn’t let them tinker with it. In fact, the company says free code is potentially criminal.” A ZDNet columnist asked, “What’s so scary about Open Source?” He added: “I’m surprised that Mundie wasn’t leerier about raising the issue of competitiveness. By
taking this kind of pot-shot at open source in general, Microsoft leaves itself open to criticisms that it’s afraid of competition. “
Reuters played the speech more straightforward, but noted that source sharing has roots in scientific and academic traditions and that companies such as IBM and Oracle have experimented with Open Source.
Whew! If you’re still interested in more coverage, search on “Microsoft” at NewsForge.
Microsoft and security (or lack thereof)
Just before the speech, Raymond added to his earlier comments with a challenge of Microsoft’s security record by noting a new flaw in Windows 2000 running the IIS Web server. “What this means is that unless a knowledgeable sysadmin has taken explicit action to prevent it, any 15-year-old who can copy code off the Internet can use Microsoft’s IIS to bypass your firewall, bypass your password system, and gain administrator-level access to the machine that hosts your webserver. They
can inspect, alter or delete files at will no matter how you have them secured. They can also use root-level access to that machine as a springboard for attacks on other systems inside your firewall.”
Ironically, on the day of the speech, Microsoft wasn’t able to keep crackers from defacing three of its own corporate Web sites.
Argentina: No more proprietary software?
Really, there was other news in the Open Source world this week. The Argentina legislature is considering a bill that would require all government offices to use Open Source software. That legislation should be interesting to watch — it could be the start of widespread adoption of Open Source software in Latin America.
No more mergers
A proposed merger of supercomputer-maker Linux NetworX and Ebiz fell through this week, with Linux NetworX saying only that it had “other opportunities” on the horizon. That announcement came in the same week that Linuxcare and Turbolinux called off their merger. Apparently, the two companies had trouble marrying their finances and operations.
In other news, 2600.com and the motion picture industry were back in court this week, on an appeal of the ruling against 2600 for linking to the DeCSS Linux DVD-playing code. Several reports noted that the panel of judges seemed to side with the motion picture giants.
Also, Jason Haas, leader of the popular Linux-for-Macs project, LinuxPPC, announced he was leaving the project. Haas said he was burned out and looking for something new.
New in NewsForge
Original reporting from NewsForge this week:
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
In 1990, David Waitzman wrote RFC 1149, a tongue-in-cheek standard for using pigeons to
transfer information using the Internet Protocol (IP). On Saturday, a group of Linux enthusiasts in
Bergen, Norway, succeeded in exchanging some data using the Carrier Pigeon Internet Protocol
(CPIP).”
Author: JT Smith
Category: