What is it that runs the servers that hold our online world, be it the web or the cloud? What enables the mobile apps that are at the center of increasingly on-demand lives in the developed world and of mobile banking and messaging in the developing world? The answer is the operating system Unix and its many descendants: Linux, Android, BSD Unix, MacOS, iOS—the list goes on and on. Want to glimpse the Unix in your Mac? Open a Terminal window and enter “man roff” to view the Unix manual entry for an early text formatting program that lives within your operating system.MORE: https://computerhistory.org/blog/the-earliest-unix-code-an-anniversary-source-code-release/
The Dennis M. Ritchie papers range in date from 1959 to 2011 and hold materials related to Ritchie’s college and graduate education, his career at Bell Laboratories, and his work on Unix and the C programming language. Types of materials include course materials, program listings, manuals, technical reports, memos, presentation materials, conference proceedings, books, photographs, and software.
The earliest portion of the papers consists of materials related to Ritchie’s education, ranging in date from 1959 to 1967. This part of the collection includes class notes, course materials, reference materials, and subject files on topics like programming and set theory. There is also a copy of Ritchie’s dissertation, as well as some reports and manuals related to the MIT Computing Center and Project MAC.
The papers hold a significant amount of materials collected over the course of Ritchie’s career at Bell Laboratories and later, Lucent Technologies, beginning in 1967 and continuing through 2011. There are internal documents, such as memos, organizational charts, pictorial directories of Bell Labs staff research and patents, and presentation materials. Additionally, there are binders of Unix program listings as well as documentation related to BCPL, Fortran, Algol, Plan 9, Bon (a computer language by Ken Thompson), and other projects that Ritchie and his colleagues worked on at Bell Labs. This portion of the collection also holds manuals and journals published by Bell Laboratories. For example, there are editions 1 through 7 of Unix Programmer’s Guide, various other manuals for Unix, and manuals for Plan 9 and Inferno. There are also some issues of Bell Labs Technical Journal from the 1980s and 1990s. Throughout this portion of the collection, there are also materials related to Ritchie’s career in general, such as presentations on the history of the C programming language, documentation related to awards won by Ritchie, and clippings related to his work.
The other half of the papers consists of various published materials, mainly conference proceedings, books, and reference manuals. These include about thirty different copies of The C Programming Language, which Ritchie wrote with Brian Kernighan, translated into a number of languages. There are also reference books on languages such as SNOBOL4 and AWK as well as reference manuals for topics like the Unix research system and ANSA (Advanced Networked Systems Architecture). Also included are an incomplete run of conference proceedings from USENIX ranging in date from 1985 to 2000 as well as proceedings from a 1988 EUUG (European Unix systems User Group) conference and a 1989 AUUGN (Australian Unix systems User Group Newsletter) conference. This portion of the collection also holds copies of journals like “The Journal of C Language Translation” and “The NSA Technical Journal,” as well as technical reports from universities such as the University of New South Wales and Carnegie-Mellon University. There are also a small amount of periodicals.
Finally, there is a small amount of software on CD and 3.5 inch floppy disks ranging in date from 1988 to 2000, most of which is related to Inferno, Plan 9, and Unix, as well as a small number of audiocassettes. There are also about 60 35mm slides, most of which are presentation slides, and a CD of digital photographs from the Japan Prize ceremony in 2011. Additionally, there are two photo albums as well as several envelopes of prints from Ritchie’s personal life and travels.
Ritchie, Dennis M.
11.96 linear feet in 9 record cartons, 1 half manuscript, and 1 flat box
AT & T Bell Laboratories; Bell Telephone Laboratories; C (Computer program language); Lucent Technologies; Ritchie, Dennis M., 1941-2011; UNIX (Computer file)
(...) This code of conduct applies to all spaces managed by the FreeBSD project. This includes online chat, mailing lists, bug trackers, FreeBSD events such as the developer meetings and socials, and any other forums created by the project that the community uses for communication. It applies to all of your communication and conduct in these spaces, including emails, chats, things you say, slides, videos, posters, signs, or even t-shirts you display in these spaces. In addition, violations of this code outside these spaces may, in rare cases, affect a person's ability to participate within them, when the conduct amounts to an egregious violation of this code.MORE: https://www.freebsd.org/internal/code-of-conduct.html
We also heard your queries on the topic of snapd. This is a topic which is important to us and we already explained our position last year:MORE: https://blog.linuxmint.com/?p=3906
[…] as you install APT updates, Snap becomes a requirement for you to continue to use Chromium and installs itself behind your back. This breaks one of the major worries many people had when Snap was announced and a promise from its developers that it would never replace APT.
A self-installing Snap Store which overwrites part of our APT package base is a complete NO NO. It’s something we have to stop and it could mean the end of Chromium updates and access to the snap store in Linux Mint.
A year later, in the Ubuntu 20.04 package base, the Chromium package is indeed empty and acting, without your consent, as a backdoor by connecting your computer to the Ubuntu Store. Applications in this store cannot be patched, or pinned. You can’t audit them, hold them, modify them or even point snap to a different store. You’ve as much empowerment with this as if you were using proprietary software, i.e. none. This is in effect similar to a commercial proprietary solution, but with two major differences: It runs as root, and it installs itself without asking you.
First, I’m happy to confirm that Linux Mint 20, like previous Mint releases will not ship with any snaps or snapd installed. Second, to address this situation we’ll do exactly what we said we would:
- In Linux Mint 20, Chromium won’t be an empty package which installs snapd behind your back. It will be an empty package which tells you why it’s empty and tells you where to look to get Chromium yourself.
- In Linux Mint 20, APT will forbid snapd from getting installed.
You’ll still be able to install it yourself and we’ll document this in the release notes, but by default APT won’t allow repository packages from doing this on your behalf.
<br />Initialize password store
$ pass init Jason@zx2c4.com\*
mkdir: created directory ‘/home/zx2c4/.password-store’
Password store initialized for Jason@zx2c4.com.
* or (for example): B7C077CF - GNUPG ID.
List existing passwords in store
│ ├── some-silly-business-site.com
│ └── another-business-site.net
│ ├── donenfeld.com
│ └── zx2c4.com
Alternatively, "pass ls".
Find existing passwords in store that match .com
$ pass find .com
Search Terms: .com
│ ├── some-silly-business-site.com
Alternatively, "pass search .com".
Show existing password
$ pass Email/zx2c4.com
Copy existing password to clipboard
$ pass -c Email/zx2c4.com
Copied Emailemail@example.com to clipboard. Will clear in 45 seconds.
Add password to store
$ pass insert Business/cheese-whiz-factory
Enter password for Business/cheese-whiz-factory: omg so much cheese what am i gonna do
Add multiline password to store
$ pass insert -m Business/cheese-whiz-factory
Enter contents of Business/cheese-whiz-factory and press Ctrl+D when finished:
Hey this is my
Generate new password
$ pass generate Email/jasondonenfeld.com 15
The generated password to Email/jasondonenfeld.com is:
Generate new alphanumeric password
$ pass generate -n Email/jasondonenfeld.com 12
The generated password to Email/jasondonenfeld.com is:
Generate new password and copy it to the clipboard
$ pass generate -c Email/jasondonenfeld.com 19
Copied Email/jasondonenfeld.com to clipboard. Will clear in 45 seconds.
Remove password from store
$ pass remove Business/cheese-whiz-factory
rm: remove regular file ‘/home/zx2c4/.password-store/Business/cheese-whiz-factory.gpg’? y
pwgen -1 -B -c -n -s -y 24 -N 10
#Photos, #vidéos, #messageries (même #chiffrées), #géoloc… Que vous le vouliez ou non, bientôt les #policiers et #gendarmes pourront fouiller votre #téléphone pendant les gardes à vue #GAV. Enquête sur un #système de surveillance à la frontière de la #légalité.Des extraits :
Les #Ufed de #CellebriteInclus dans cet article de #StreetPress, un article de #Reporterre :
Ces « kiosques » font partie de la gamme des Ufed (Universal Forensic Extraction Device) : des dispositifs d’extraction universels d’investigation #numérique. Ces outils sont des boîtiers portatifs ou des #ordinateurs qui abritent des #programmes d’extraction de #données téléphoniques, développés par la compagnie israélienne qui les commercialise : Cellebrite (prononcez braïte, comme le sourire).
Tout y passe : les photos, les vidéos, les emails, l’historique des navigations internet ou de la géolocalisation, les historiques de mots de passe, le carnet d’adresse, les données, les notes et les message des applis comme #Snapchat, #Facebook – même ceux des #apps réputées « #chiffrées » comme #Signal ou #Telegram…
Même les modèles les plus récents d’ #Androïd ou d’ #Apple sont à sa merci. En juin 2019, Cellebrite s’est publiquement félicité de pouvoir débloquer n’importe quel #Iphone.
En #France, le kiosque de #Cellebrite a d’abord été testé du côté de Coquelles (62), dans le Pas-de-Calais. Objectif : éplucher les téléphones des passeurs à l’entrée du tunnel sous la Manche, dit-on du côté des #autorités. Mais impossible d’en savoir plus sur ces expérimentations. Le service central de la #police #technique et #scientifique ne souhaite pas s’exprimer sur les Ufed car il estime n’avoir « pas assez de recul ».
Le salon « de la #sécurité intérieure » #Milipol a ouvert ses portes mardi au nord de #Paris. #ReconnaissanceFaciale, lanceurs de balle de défense #LBD, aspirateurs à données téléphoniques... Reporterre s’est renseigné sur les nouveautés du secteur, qui raffine sans cesse les outils de #surveillance et de #répression.Zut... c'est pas du Gorafi... (j'y ai cru les premières secondes que j'ai lu le titre)