Free Software, Free Society: Selected Essays of Richard...
Richard M. Stallman
Free Software Foundation, 2002
This collection of 21 essays written by Richard M. Stallman between 1984 and 2002 ranges from historical milestones, including the GNU Manifesto, to transcripts of some recent speeches. The introduction is by Lawrence Lessig, Professor at Stanford Law School.
Most of this material is available on-line, but there are a couple of reasons to buy the book: First, the profits go to the Free Software Foundation. Second, having all the essays in one place, with cross-references, updates and notes from Stallman himself, helps readers see the big picture.
Lessig's introduction provides the right start by pointing out that if the Free Software movement is new, radical or revolutionary, it is because it brings to software the freedoms already present in the pre-software world. For example, laws and legal briefs are Free as in Freedom.
The grouping of the essays shows how Stallman himself and the movement in general have been forced to evolve over time. In the beginning it was “only” about the freedom to program, which a minority of people needed when computers were not widely available.
Today, almost everybody's entertainment, work, education and free speech rights depend on computers. The essays in the second and third parts of the book cover why the DMCA and similar efforts are harmful to citizens' rights and a market economy.
In less than 200 pages, we go from “GNU will remove operating system software from the realm of competition” to the problems of copy-restricted media.
A lot of details on how this evolution happened are provided, with several repetitions. Sometimes, these are even funny: the history of the Xerox printer, whose proprietary driver made Stallman mad enough to start the whole thing, is told so often that one can picture proprietary software executives cursing Xerox for not just giving him the darn code.
Coverage of one fundamental issue, free file formats, is missing. Stallman wrote a 2002 essay called “We Can Put an End to Word Attachments” that addresses this need, but it's not in the book.
In general, the book is necessary reading and not only for programmers. I personally disagree with Stallman on certain conclusions and am still trying to decide whether I accept some others or not. But it is crucial that everyone thinks about these problems today, builds his or her own conclusions and follows them. Even if you reject all Stallman's ideas, you must know why, and this book will help.
Articles about Digital Rights and more at http://stop.zona-m.net CV, talks and bio at http://mfioretti.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide