The Appeals Court Ruling: What's in it for Linux?
The appeals court's decision proves very handy indeed when it comes to figuring out which of Microsoft's actions are legal and which might represent yet another violation of the Sherman Act.
<il>Probably legal: The monopoly introduces new software that's genuinely innovative or more efficient or faster, even if it's incompatible or bundles previous products in a way that puts a competitor out of business.
<il>Probably illegal: The monopoly uses technical "dirty tricks", exclusionary licensing provisions, industry alliances or threats of retaliation that are clearly anticompetitive and have no conceivable or defensible rationale other than squashing a competitor.
The Mobile Internet Kit's EULA appears to fall into the latter category. If so, it's yet another instance of a more general pattern of anticompetitive, deceptive actions that has been undertaken by Microsoft--a pattern that led a strongly pro-business appeals court to rule unanimously that the company has systematically violated the Sherman Act.
Bryan Pfaffenberger is Associate Professor of Technology, Culture and Communication at the University of Virginia, in Charlottesville, VA. You can visit his web page, and you can browse previous Currents articles under the Currents heading here. Bryan cautions that his schedule rarely permits him to reply to all the e-mail he receives concerning his Linux Journal articles, but they're appreciated nonetheless.
 Properly speaking, the term "Linux" refers to the kernel originally developed by Linus Torvalds beginning in 1991; the operating system that is popularly known as "Linux" should be called GNU/Linux (for more information, see the Linux and GNU Project web site).
 According to the EULA, such software "includes, without limitation, software licensed or distributed under any of the following licenses or distribution models, or licenses or distribution models similar to any of the following: (A) GNU's General Public License (GPL) or Lesser/Library GPL (LGPL), (B) The Artistic License (e.g., PERL), (C) the Mozilla Public License, (D) the Netscape Public License, (E) the Sun Community Source License (SCSL), and (F) the Sun Industry Standards License (SISL)" (seen at http://msdn.microsoft.com/downloads/default.asp?url=/downloads/eula_mit.htm, June 29, 2001).
 "Recipient's license rights to the Software are conditioned upon Recipient (i) not distributing such Software, in whole or in part, in conjunction with Potentially Viral Software [including GPL-licensed software]; and (ii) not using Potentially Viral Software (e.g. tools) to develop Recipient software which includes the Software, in whole or in part" (seen at http://msdn.microsoft.com/downloads/default.asp?url=/downloads/eula_mit.htm, June 29, 2001).
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide