[LINK] Hacker Access to Mobile-Device Location

TKoltai tomk at unwired.com.au
Fri Feb 17 16:30:17 AEDT 2012

> -----Original Message-----
> From: link-bounces at mailman.anu.edu.au 
> [mailto:link-bounces at mailman.anu.edu.au] On Behalf Of Roger Clarke
> Sent: Friday, 17 February 2012 2:57 PM
> To: link at anu.edu.au
> Subject: Re: [LINK] Hacker Access to Mobile-Device Location
> At 14:39 +1100 17/2/12, TKoltai wrote:
> >  ... I will not assist in the promulgation of this 
> dastardly meme. ...
> John Lions did the world a disservice by bringing back a copy of the 
> Unix kernel, annotating it, and giving it to 1,000 Australian Compsci 
> students.
> Discuss.
> (:-)}

Ahhh, but he didn't, and; System III Man pages were so woefully absent
that no-one actually knew how to do anything with the damn thing.
The guy we should shoot is the dude that gave him the BSDI man pages.

......And of course anyone that then wrote a Unix Howto manual.

Oh. I see, you're being funny. 
OK, Take Two..... Unix is an opsys. An Opsys is a tuned collection of
mostly co-dependent tools. Sockets(IOCTL) is a tool. SATAN used IOCTL to
break the intended functionality of the Transport Layer.

I don't think we can compare File Sharing (SYS III) with Phreaking,
which is essentially the argument you are offering.

Before you answer, when the Uni of Wgong distributed Sys III you
doubtless remember that there  was no such thing as pre-packaged
software release versions.

In fact the whole history of the Unix wars comes down to the fact that
the only way to distribute software in the early days of computers with
all the "NEW" disparate CPU's was in sourceware format. Otherwise the
customers couldn't compile the damn thing.


More information about the Link mailing list