Open main menu

CDOT Wiki β

Changes

ULI101 Week 1

28 bytes removed, 06:11, 3 September 2017
Insecure Communication (Legacy)
* Enforcing basic system security
== Evolution ==  === - Unix OS ===
Unix is an operating system originally developed at Bell Labs starting in 1969. Unix is:
* Unix and the Internet grew up hand-in-hand (the DARPANET project, precursor to the Internet, was approved in April 1969 — the same month that Bell pulled out of the Multics project and began the development of Unix; throughout the history of the Internet, the Unix OS has provided its platform.
=== Linux and GNU ===
Although Unix source code was widely distributed at low cost to educational institutions, it was still controlled by AT&T and was therefore never completely free (cost) nor free (unrestricted freedom to modify and use it).
'''Richard Stallman''' published the GNU Manifesto in 1984, which described the need for Free Software (“Free in the sense of free speech, not free beer”). The resultant GNU project developed free, open source replacements for most of the Unix programs, but not for the Unix kernel (the core program that interacted with and controlled the hardware).
These programs were released under the GNU General Public License (GPL), which permits anyone to copy, use, and modify the software, as long as these rights are preserved for anyone receiving a subsequent copy of the software.
In 1991, '''Linus Torvalds''', a Finnish computer programmer, released the Linux kernel, eventually placing it under the GPL. The Linux kernel, GNU software, and some other components can be combined into a powerful, Unix-like operating system (it can’t technically be called Unix, because it has never been certified to be Unix, but virtually everyone in the industry regards it as such).
The combined GNU and Linux system is called GNU/Linux by some but just Linux by others (much to the dismay of Richard Stallman, who feels that the simple name Linux downplays the tremendous contribution made by the GNU Project).
== Secure Communication ==
'''SSH''' or “secure shell” application allows data (i.e. keystrokes) to be encrypted to prevent other people intercepting this information. Other than that, the functionality overlaps with telnet. In the Seneca Labs in MS Windows, there is an application on the desktop called SSH Client. You are advised to use this application. You can download or buy SSH applications for your PC at home. On a Unix/Linux host ssh is available on the command line:
<source lang="bash"># ssh username@host for example:
$ ssh user@matrix.senecac.on.ca
</source>
221
edits