On the Web - FUD vs. Freedom
If you typed “Linux” into Google News or any other news aggregator site recently, you probably got a bunch of links to the SCO vs. IBM lawsuit, the information technology industry's most bizarre legal battle. Because the case is moving way too fast to keep up with in a monthly publication, we're running our articles about the facts of the case on our Web site.
We're not writing down merely the latest “Fear Uncertainty and Doubt” (FUD) that SCO execs Darl McBride and Chris Sontag are giving the mainstream media. You know us better than that. We've got articles that bring a little more insight to the case.
In August 2002, our correspondent Jeff Gerhardt published the first hint of SCO's search for money in the dusty file cabinets of UNIX licenses, and he quoted McBride as saying, “obviously Linux owes its heritage to UNIX, but not its code. We would not, nor will not, make such a claim” (www.linuxjournal.com/article/6293).
A lot has changed since then, and Doc Searls covered the initial complaint in March 2003, when Sontag said, “I have to say that this is not an issue regarding the Linux community. This is an issue between SCO and IBM.”
Later, SCO pulled its own Linux distribution, and Sontag claimed that there is “significant copyrighted and trade secret code within Linux”.
Our May 15 story was the first public mention of SCO's offer to let independent experts review the allegedly copied code under a nondisclosure agreement (NDA), available at www.linuxjournal.com/article/6877.
Later, we published the full text of the NDA and decided it was too legally risky to accept it ourselves (www.linuxjournal.com/article/6923).
But, Ian Lance Taylor, the mastermind behind Taylor UUCP, came to the rescue, signed it and walked into SCO's office. His essay on the journey revealed tantalizing facts about an 80-line function that is in fact the same in SCO UnixWare and Linux—but also found elsewhere (www.linuxjournal.com/article/6956). He wrote:
The similar portions of the code were some 80 lines or so. Looking around the Net, I found close variants of the code, with the same comments and variable names, in sources other than Linux distributions. The code is not in a central part of the Linux kernel. The code does not appear to have been contributed to Linux by SCO or Caldera. The code exists in current versions of the Linux kernel.
What's next? By the time this issue goes to press, anything could happen, so watch our Web site for the facts. After all, you can get FUD anywhere.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
- Canonical and BQ's Aquaris M10 Ubuntu Edition Tablet
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide