Thursday, October 22, 2015

Study Journal 3

Oct 6, 2015
  • You must be able to redistribute and/ or modify software without paying any fees in order to call software free.
  • Linux has followed the bazaar-style development pattern, which has been surprisingly effective due to the dedication of the programmers involved.

  • The cathedral view of program development views bugs as intense problems that a few people need to work really hard on, while the bazaar view characterizes bugs as problems that will be really simple to someone, so it's important to have as many people as possible testing and examining the source code.
Oct 8, 2015
  • Copyrights are automatically granted once you complete a creative work.
  • Employers like to set agreements where anything you create outside of work belongs to them, unless you get their permission to work on it first. This is intended to protect their intellectual property,
  • Non-compete clauses and non-disclosure agreements in contracts serve a similar purpose - the company doesn't want you sharing insider knowledge with another company.
Oct 13, 2015
  • Cliff Stoll gradually became more aware of the seriousness of the hacker's intentions and attacks throughout the time he was tracking the hacker.
  • Cliff realized that the need for security in information systems was something that liberal and conservative people have in common, and he became more moderate.
  • Cliff tried to make others more aware of the danger of hackers, since it was a new issue, and he warned them when he noticed the hacker infiltrating their networks.
Oct 15, 2015
  • Hackers believe that all information should be shared.
  • Hackers don't tend to follow the normal political divisions of left and right.
  • The NSA has collected a lot of data about emails people send, and their actions were made public due to WikiLeaks, a site made by hackers.
Oct 20, 2015
  • The Espionage Act of 1996 made it illegal for people to steal information, not just material objects.
  • Betrayal from an insider, like John Walker, who sold government secrets to the USSR, is one of the most dangerous security breaches for an organization.
  • Spies may use pre-arranged drop sites when exchanging secret information in order to minimize the risk of multiple people being compromised if one person is caught.
Oct 22, 2015
  • The professor broadly dismissed anything "socialist" as bad, based on a talk by Ezra Taft Benson, when America has plenty of socialist practices that are good. There was a lively discussion.
  • Consecration is basically like socialism, except that you choose to do it, so it's good. But what if people want to choose to practice socialism by democratic reform? Well, that doesn't count, because socialism is bad.
  • Ezra Taft Benson was way involved in the Red Scare and suppressing dissidence. His attitudes contributed to the culture of the LDS church, which fears dissident opinions.

No comments:

Post a Comment