- ... 20001
- Revised October, 2001
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
GNU/Linux2
- See Section 1.2 for a
short discussion of naming.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... individuals.3
- The latter
is an increasingly pertinent issue as the movie and recording
industries seek to strengthen their control of digital content, but
falls outside the scope of this note.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... card4
- Like index cards, these boards come in a range
of sizes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... needed.5
- In Windows, drivers are part of ``dynamically
linked libraries'', and can be modified by installation of unrelated
software. This is the primary reason Windows becomes less stable as
more software and more drivers are installed.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
keyboard,6
- Even if you are a fast typist, the CPU cycles
millions of times between keystrokes.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... kernel7
- Or kernels, if there is more
than one OS on the machine; this information is determined by the
specific installation and therefore cannot be hard-coded, which is why
the BIOS does not load the kernel directly.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... CD-ROM).8
- The default BIOS behavior is to check the
floppy drive for a disk when the power is turned on, and attempt to
boot from the floppy if one is present. If the floppy is not bootable,
the BIOS prints an error message such as ``Non-system disk; remove
disk and hit any key.''
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... drive.9
- The final
chicken-and-egg question is, ``Where did the boot floppy come from?''
The first operating systems were loaded by hand, either with actual
switches, or with punch cards. In typical bootstrapping fashion, once
you have a running operating system, you can use it to write more
complicated operating systems, and to save them in bootable
form. Computer science is permeated with recursive solutions like
this. Compilers, the programs that ``translate'' human-readable
computer programs into machine-readable binary executables, are
another example. After all, a compiler is itself a program, so it must
have been compiled...
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... handle,10
- Almost always
because the programmer did not account for some contingency.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... crashes.11
- The symptom of a Windows
crash is BSOD--the Blue Screen of Death.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... code.12
- Melissa, the ``I Love
You'' worm, Sircam, and Nimda have demonstrated the cost of
integrating user applications (such as email clients that
automatically run executable files they receive) with system functions
in a low-security environment.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
rare.13
- The most common causes are hardware defects and
malicious attacks.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
GNU/Linux.14
- In Windows 9x, these features were added after the
OS was written. The result barely prevents users from reading each
others' files, and is completely insecure in a business environment,
or if the computer is connected to a network. Home users are only now
becoming aware that their DSL connections potentially allow anyone in
the world free access to their hard drives.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
files).15
- No responsible administrator would remove outdated
files this way.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... capability.16
- Not only is the hood welded shut,
but the doors have no locks, and the ignition is a ``start'' button!
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
certainty.17
- Whether or not anyone actually reads or deletes
your files is another matter, but if you're permanently offering the
world the opportunity, sooner or later it will happen.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
everything18
- Be it an ordinary file, a directory, a hardware
device (like the hard drive, sound card, or mouse), or any of various
esoteric gadgets used for normal operation.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...
drivers.19
- The hardware manufacturer must release detailed
technical specs--which are trade secrets--in order for a programmer
to write a driver. Not all hardware manufacturers are willing to
release proprietary data to a loose association of volunteers.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... server.20
- Your web browser handles the details; all
you see is http://mathcs.holycross.edu in your Netscape location
bar.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... query,21
- This data routinely includes the
user names of anyone logged on to your computer, the name and version
of your operating system, and the network services your computer is
offering.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... beginner.22
- Use judgment; an unhelpful question like, ``My
CD-player doesn't work. What's wrong?'' is likely to garner some
annoyance. People are always more helpful if it's clear you've tried
obvious channels like reading the manual page before posting.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... obtained.23
- Searching for
more evil than Satan himself returns, as its number-one choice, the
Microsoft web site.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ... wrong.24
- You can safely
run make several times, but should not need to. For some
software, the Makefile must be edited by hand, and you may not
discover this until the first run of make fails to compile an
executable binary.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.