... 20001
Revised October, 2001
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... GNU/Linux2
See Section 1.2 for a short discussion of naming.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... individuals.3
The latter is an increasingly pertinent issue as the movie and recording industries seek to strengthen their control of digital content, but falls outside the scope of this note.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... card4
Like index cards, these boards come in a range of sizes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... needed.5
In Windows, drivers are part of ``dynamically linked libraries'', and can be modified by installation of unrelated software. This is the primary reason Windows becomes less stable as more software and more drivers are installed.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... keyboard,6
Even if you are a fast typist, the CPU cycles millions of times between keystrokes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... kernel7
Or kernels, if there is more than one OS on the machine; this information is determined by the specific installation and therefore cannot be hard-coded, which is why the BIOS does not load the kernel directly.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... CD-ROM).8
The default BIOS behavior is to check the floppy drive for a disk when the power is turned on, and attempt to boot from the floppy if one is present. If the floppy is not bootable, the BIOS prints an error message such as ``Non-system disk; remove disk and hit any key.''
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... drive.9
The final chicken-and-egg question is, ``Where did the boot floppy come from?'' The first operating systems were loaded by hand, either with actual switches, or with punch cards. In typical bootstrapping fashion, once you have a running operating system, you can use it to write more complicated operating systems, and to save them in bootable form. Computer science is permeated with recursive solutions like this. Compilers, the programs that ``translate'' human-readable computer programs into machine-readable binary executables, are another example. After all, a compiler is itself a program, so it must have been compiled...
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... handle,10
Almost always because the programmer did not account for some contingency.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... crashes.11
The symptom of a Windows crash is BSOD--the Blue Screen of Death.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... code.12
Melissa, the ``I Love You'' worm, Sircam, and Nimda have demonstrated the cost of integrating user applications (such as email clients that automatically run executable files they receive) with system functions in a low-security environment.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... rare.13
The most common causes are hardware defects and malicious attacks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... GNU/Linux.14
In Windows 9x, these features were added after the OS was written. The result barely prevents users from reading each others' files, and is completely insecure in a business environment, or if the computer is connected to a network. Home users are only now becoming aware that their DSL connections potentially allow anyone in the world free access to their hard drives.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... files).15
No responsible administrator would remove outdated files this way.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... capability.16
Not only is the hood welded shut, but the doors have no locks, and the ignition is a ``start'' button!
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... certainty.17
Whether or not anyone actually reads or deletes your files is another matter, but if you're permanently offering the world the opportunity, sooner or later it will happen.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... everything18
Be it an ordinary file, a directory, a hardware device (like the hard drive, sound card, or mouse), or any of various esoteric gadgets used for normal operation.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... drivers.19
The hardware manufacturer must release detailed technical specs--which are trade secrets--in order for a programmer to write a driver. Not all hardware manufacturers are willing to release proprietary data to a loose association of volunteers.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... server.20
Your web browser handles the details; all you see is http://mathcs.holycross.edu in your Netscape location bar.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... query,21
This data routinely includes the user names of anyone logged on to your computer, the name and version of your operating system, and the network services your computer is offering.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... beginner.22
Use judgment; an unhelpful question like, ``My CD-player doesn't work. What's wrong?'' is likely to garner some annoyance. People are always more helpful if it's clear you've tried obvious channels like reading the manual page before posting.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... obtained.23
Searching for more evil than Satan himself returns, as its number-one choice, the Microsoft web site.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... wrong.24
You can safely run make several times, but should not need to. For some software, the Makefile must be edited by hand, and you may not discover this until the first run of make fails to compile an executable binary.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.