36
The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrap up ~Is the Internet anti- , ~rcial? of Java ISSN 1035-7521 U iX & more Print post approved by Australia Post- PP2391500002

U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

The Journal of AUUG inc. Volume 17, Number 4August 1996

SAGE-AU96 wrapup

~Is the Internet anti-,

~rcial?

of Java

ISSN 1035-7521

U iX &

more

Print post approved by Australia Post- PP2391500002

Page 2: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java
Page 3: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

AUUGNVolume 17, Number 4August 1996

AUUG Membership & GeneralCorrespondenceThe AUUG SecretaryPO Box 366Kensington NSW 2033Tel: (02) 361 5994Fax: (02) 332 4066Freephone: 1-800-625-655E-mail: auug @auug.org.auAUUG ExecutivePresident: Michael Paddonmwp @aba.net.auKodak173 Elizabeth St.Coburg VIC 3058Vice President: Glenn Huxtableg/enn @ fs.com.auFunctional SoftwarePO Box 192Leederville WA 6903Secretary: Peter [email protected]/GEC MarconiSystemsPO Box 4806Unit 7, 10 Kennedy St.Kingston ACT 2604Treasurer: Stephen Boucherstephen @mtiame.mtia.oz.auMTIA509 St. Kilda RoadMelbourne VIC 3004Committee M~mbers:Phil McCrea (Past President:)pm¢ @ syd.dit.csiro.auDivision of InformationTechnologyCSIROBuilding E6BMacquarie University NSW2113Frank Crawfordfrank @ a tom.ansto, gov.auANSTOPrivate Mail Bag 1Menai NSW 2234Lucy Chubblucyc @sw.oz.auSoftway Pty. Ltd.PO Box 305Strawberry Hills NSW 2021Chris Maltbychris @ sw.oz.auSoftway Pty. Ltd.PO Box 305Strawberry Hills NSW 2021David PurdueDavid. Purdue @ aus.sun.comSunSoft119 Willoughby Rd.Crows Nest NSW 2065

AUUGN Business ManagerElizabeth Eganauug @auug.org.au

Table of Contents

President’s column .....................................................................3

Java Enters new Evolutionary Phase .......................................5

The End of AUSCERT? ..............................................................5

Internet Industry ........................................................................6

The Physics of Java .....................................................................7

A Wrapup of SAGE-AU96 ........................................................8

The Network Computer ............................................................9

Is the Internet Anti-Commercial? ............................................10

Do Non-Technical Managers Work? .......................................11

¯ AUUG96 Conference & Exhibition ..........................................12

UNIX Tricks & Traps .................................................................15

Book Reviews ..............................................................................19

From the Western Front ............................................................27

Canberra Chapter: September 96 newsletter ..........................28

News from the NSW Chapter ...................................................29

AUUG Inc. acknowledges thegenerous support of its

corporate sponsors...

@Sun

TELLURIAN

Volume 17, Number 4 1

Page 4: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Contribution deadlines forAUUGN in 1996

Vol 17,#5 (October ’96): September 20

Vol 17, #6 (December ’96): November 22

PO Box 366Kensington NSW 2033AUUGN CorrespondencePlease send all correspondenceregarding AUUGN to:AUUGN EditorPO Box 366Kensington NSW 2033E-mail: auugn @auug.orgoauSubmission GuidelinesSubmission guidelines forAUUGN contributions areregularly posted on theaus.org.auug news group.They are also available from theAUUG World Wide Web site athttp://www.auug.org.auAlternately, e-mail to the abovecorrespondence address,requesting a copy.AUUGN Back-issuesA vadety of back-issues ofAUUGN are still available; forpdce and availability details,please contact the AUUGSecretariat, or write to:AUUG Inc.Back Issues DepartmentPO Box 366Kensington NSW 2033AustraliaConference ProceedingsA limited number of copies ofthe Conference Proceedingsfrom previous AUUGConferences are still available,at $50 each for members, and$60 for non-members. Contactthe AUUG Secretariat fordetails.Mailing ListsInquiries regarding thepurchase of the AUUGN mailinglist should be directed to theAUUG Secretariat. Telephone(02) 361 5994 during businesshours, or Fax (02) 332 4066.DisclaimerOpinions expressed by theauthors and reviewers are notnecessarily those of AUUGIncorporated, its Journal, or itseditorial committee.Copyright InformationCopyright ©1995 AUUGIncorporated. All rightsreserved. AUUGN is the journalof AUUG Incorporated, anorganlsation with the aim of ’promoting knowledge andunderstanding of Open

but notSystems, including, ~.restricted to, the UNIX~ system,networking, graphics, userInter/aces and programmingand development environments,and related standards.Copying without fee ispermitted, provided that copiesare made without modification,and are not made or distributedfor commercial advantage.

2 AUUGN: The Journal of AUUG Inc.

Page 5: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

President’s column

President’Michael Paddon

s column

AUUG 96 has been and gone, and I suspect that all myfellow conference organisers are feeling both the samesense of relief (wow! I get my life back) and regret (but wewere having sooooo much fun) that I am.

Those of you who could get to the conference this yearwill have noticed that it was a bit smaller and morefocussed that the last few have been, although with anattendance of almost 500 it certainly wasn’t a tiny event.This trend seems to have been quite healthy: the sessionswere great, there was a renewed sense of community thatwent missing some time ago, and everyone looked to behaving a lot of fun.

The conference network tied everything together, and wasa testament to the capabilities of Stephen Boucher and thepeople from Access One. Just about every vendor in thetrade show with a computer elected to connect, thespeakers relied on it for their presentations, and the wholeproceedings was broadcast on the MBONE. A networklike this really sets our conference apart from all thewannabees, and I’d like to extend a big thank you to allthe volunteers who put it together and made it work.

The unexpected highlight of the conference was theMPEG movie of the exploding whale. Yes, someonetracked down this famous piece of urban folklore and wemanaged to screen it at the AGM (who said they wereboring?). Certain vendors in the trade show then got itgoing on their video displays, and the rest, as they say,was history.

If you haven’t seen the exploding whale, don’t despair.The MPEG will soon be downloadable from the AUUGweb server for all to enjoy.

¯

The conference dinner, as traditional, was rowdy andaltogether too much fun. Balloon networking seemed tothe order of the day, with just about every table connectedby string held aloft by "repeater" balloons and bearingsigns such as "BGP - Balloon Gateway Protocol" and"Sauce Routed Packet". Okay, I thought it was funny atthe time...

Charles Sturt University provided their excellent wine forthe evening, and Rob Kolstad entertained us with a quizshow. Yes, we had contestants vying for prizes incategories such as "RS-232", "Editors starting with theletter ’e’" and the like. Only at an AUUG conference...

There are a few people and groups whom I’d like to takethis opportunity to single out for thanks. Without oursponsors it just wouldn’t happen: thank you Access One,connect.corn, NCR and Opentec Solutions.

Phil McCrea worked tirelessly to make the InternetCommerce Day a reality, with the help of sponsorshipfrom the Australian Financial Review, CSIRO and IBM.The success of his vision was remarkable. Thanks, Phil.

Enno Davids and Lucy Chubb took a loose bunch ofvolunteers and managed to forge them into a team (this isakin to herding cats). How they did this, I’ll never know,but we are grateful for their hard work.

Liz Egan, as AUUG’s full timer, acted as the focus for ourentire effort. She also brought her camera to the dinner,but we’ll forgive her. Wael Foda was the dynamo behindthe conference and exhibition management, and I’m sureyou’ll agree that his professionalism showed in theresults.

Many volunteers donated their time and energy to ourcause, on committees and on the conference floor. We alsohad enormous help from our friends at CSU. I guess it’spretty obvious where we’d be without your enthusiasm.

Finally, a big thank you to our presenters and to thepeople who came to hear them. We hope you got as muchout of it as we did, and we hope to see you next year.

This is the last AUUG conference which will be co-organised with Charles Sturt University. We believe wehave gained an enormous benefit by renewing AUUG’straditional ties with academia, and we hope that CSU hasenjoyed the partnership as much as we have. Next year,however, CSU will be deeply involved in the InternationalWWW Conference that is visiting our shores, and AUUGwill be pursuing our trend of focussing back on opensystems.

There has been no doubt that the Internet and the WWWhave dominated AUUG’s conferences these past fewyears. This was appropriate given UNIX’s role in thegrowth of the global network and the amount of interesteveryone had in these technologies. However, there is alot of other interesting activity going on in the opensystems world, and we want to make sure that thesedevelopments get fair airtime within AUUG. This is whatwe mean by improving our focus.., not so much reducingInternet related activities but encouraging others.

The winter conference also brings us our AGM. Werestructured our agenda and increased our scheduledtime this year in order to encourage more of a questionand answer format as opposed to the somewhat dryreports. This was quite successful, with a very activemembership asking questions both easy and hard.

I think everyone was satisfied with the results, though Iam interested in any comments you may have. Theminutes, of course, will be published in due course.

This is my chance, as always, to point out that you don’thave to wait for the AGM (or the elections for that matter!)to give your management committee feedback orsuggestions.

What now? We are currently putting together a roadshowfor November which should get to the majority of states.In particular, if your chapter missed to one earlier thisyear, we guarantee we’ll be in your neighbourhood thistime around. We’re looking forward to seeing you there. ~

Volume 17, Number 4 3

Page 6: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIXeAND OPEN SYSTEMS USERS

The AUUG Technical Conference Series will be held Australia wide in every state and territory, between Februaryand April 1997, with the exact dates for each location to be available shortly.

AUUG invites proposals for papers and tutorials relating to the tectmicai aspects of Unix and Open systems.

Presentations may be fonTmtted as tutorials or technical papem, and should be geared at an audience requiring in-depth knowledge.

Technical presentations should be approximately 45 minutes, including a 5-10 minute question time.

Tutorials, providing a more thorough presentation, should be either a hall-day or a full-day in duration.

Submission Guideline$

Those propoSing to present papers should submit an extended abstra~ (1-3 pages) and a brief biography.

Those submitting tutorial proposals should submit a plan for the tutorial and a brief biography.

Please indicate on your pmpos~ whether it is a paper or tutorial, and for tutorials whether they are half day or fullday.

Location

The conference sedes will be held Australia wide, so please indic~e in which city you wish to present - however,you can do so in more than one!!

Speaker Incentive~

Presenters of papers are afforded complimentary conference registration.

Tutorial Incentives

Tutorial presenters will receive either a flat fee or a negotiated percenlege of their tutorial profit.

Page 7: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Java Enters new Evolutionary Phase

Java Enters newEvolutionary PhaseDavid Flanagan

The 6,000 recent attendees at JavaSoft’s inauguralU.S. Java conference, JavaOne, confirm what wasalready becoming abundantly clear: Java has beenaccepted by programmers and industry alike as thenetwork programming language of choice. Despitesome bugs, platform inconsistencies, and lack offeatures in the 1.0 releases, it is plain: Java is here tostay.

With this acceptance, Java enters a new phase of itsevolution. In recent months, there has been anexplosion of new products and packages for Java,along with new acronyms, marketing slogans, andhype, of course. With all this activity, it has becomedifficult to even answer the question ’!What is Java?".A few months ago, we would have said that Javawas a programming language, and a class library,and a virtual machine definition. This is still true,but now, to keep the class libraries all straight, wemust resort to terms like the "Java Platform", and the"Java Base API".

With release 1.0.2 of the Java Developer’s Kit, theJava language itself is stable. An internal debate isongoing at JavaSoft as to whether a future version ofthe language should support method pointers andperhaps templates, but in any case, these are notchahges that we will see in the short term.

It is on the API front that we will see the most rapidchange. Four of the most important new APIs, andfour that we’ll see relatively soon are JDBC, RMI,IDL, and Java 2D. They are described in more detailbelow.

JDBC is the "Java Database Connectivity" API. It is acall-level (not embedded) SQL interface that allowsJava applications to communicate with databases byexecuting SQL queries and statements and retrievingtheir results. The JDBC API was finalized and frozenon June 8th. In the near term, JavaSoft will provide aJDBC-ODBC "bridge"--code that allows Java JDBCcode to communicate with existing ODBC driverswhich communicate with the database. It won’t belong before database providers and other vendorsmarket JDBC drivers that communicate directly withdatabases. Seehttp : //splash. javasoft, com/j dbc for detailsabout JDBC.

RM! stands for "Remote Method Invocation"--theobject-oriented equivalent of RPC (Remote

Procedure Call). The RMI API, and its associatedobject serialization API allow Java applications tocommunicate with each other by passing data valuesback and forth, and by invoking methods in remoteobjects. RMI and object serialization allow objectreferences to be shared between applications, andalso allow complete objects to be passed over thenetwork. Related to RMI is the IDL API, animplementation of the CORBA-standard InterfaceDefinition Language, which will allow Javaapplications to share objects with applicationswritten in other languages. Alpha versions of bothRMI and IDL are available fromhttp : / / java. sun. com/devcorner.html.

Java 2D is a new graphics API that will greatlyextend the current graphics capabilities of Java. It isa Java interface to the Bravo graphics engine fromAdobe systems,, the makers of the PostScript pagedescription language. Bravo is the graphics enginethat drives Adobe products such as Acrobat,PageMaker, and Illustrator. The Java 2D API isessentially a Java interface to an enhanced version ofPostScript and will include very powerful drawing,imaging, and transformation features. The releasedate is not firm for the Java 2D API, but pre-releaseversions should be available relatively soon.,

David Flanagan is author of the bestselling book"lava in a Nutshell", from O’Reilly dr Associates.

The End ofAUSCERT?Frank Crawford

On the thirteenth June the Australian Internetcommunity was shocked by the announcement thatAUSCERT, the Australian Computer EmergencyResponse Team, would close down effective almostimmediately, due to a funding crisis. For the averageInternet user this may have not meant much, but forthose involved in the operation of ISPs and Internetsecurity, it was a major, and in many cases,unexpected blow.

The reason for the shock is that a major element inthe infrastructure of the Australian Internet wassuddenly being removed. AUSCERT has often beendescribed as the "network police", but this is notreally correct, rather they act as an informationclearing house on network security matters. Further,as they are Australia’s member of FIRST (the Forumof Incident Response and Security Teams) they keepin close contact with Internet security groups

Volume 17, Number 4 5

Page 8: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Internet Industry

overseas, and keep a finger on the pulse of incidentsworld wide.

The major contact most groups have with AUSCERTis through their advisories, i.e., information bulletinson security issues. These advisories range fornotification of known security problems and theirfixes, to an analysis of the current incident andactivities. They also publish such items as securitychecklists and lists of security related patches.

Another service that AUSCERT offers is an FTP sitewith a comprehensive collection of securitypackages and tools, documentation and othersecurity related items. This has been collected andmanaged in conjunction with the other FIRSTmembers.

Of more importance and yet less widely used(hopefully) service is to provide a single trustedpoint of contact for security incidents withinAustralia. This service operates 24 hours a day, 365days a year, and allows a quick response toemergencies so as to minimise damage. In fact this isAUSCERT’s most valuable service and the realreason that it must be maintained.

AUSCERT was originally formed after a number ofsuch security incidents in the early days of AARNet.At this time there were a number of attempts toaccess computers in various tertiary institutes andresearch organisations (the predominant sites at thetime). At" the peak of these attacks, as there was nolocal coordinated response, a number of them weresuccessful, causing the destruction of informationand endangering expensive research equipment.

Since that time, the number of threats has growndramatically, as has the cost of incidents. Yet at thetime when there is the greatest need for AUSCERT,it is in danger of folding, due to lack of funding.AUSCERT was originally funded by the AVCC tocover AARNet, however, when Telstra took overAARNet that funding was only continued for afurther year. That year is now up, and no furthersource of funding has been forthcoming, hence theshutdown.

In effect, this is like Telstra discontinuing the 000service due to lack of funding. Any emergencies canstill be handled, but not easily or quickly, and infact, most people will not know what to do. Foranyone involved in computer security this is a majorproblem, while for anyone involved in computercrime it is a major opportunity.

The crucial issue here is the future of funding forAUSCERT, the initial threat of shutdown had theeffect of obtaining interim funding, but only untilthe 31st October. If further funding is not found by

then, AUSCERT will shutdown permanently. Thebusiness case put forward by AUSCERT favouredgovernment funding through some agency, as is thecase for most other CERTs around the world.Unfortunately, this will not be the case in Australia,and AUSCERT must operate on a user pays model.

Over the next few months, AUSCERT will beworking on obtaining sufficient commitment fromthe Australian Internet community for continuedviable operation. If this funding isn’t found,Australia will, at least for some time become a"happy hunting ground" for crackers. Such acondition couldn’t continue forever, rather,eventually, an organisation with similar aims toAUSCERT would again be formed.

Given this, it would be much better to supportAUSCERT at this stage and avoid the interveningtrauma, which would have a major and disastrouseffect on the growth of the Internet in Australia. ¯

I nternet IndustryPhil McCrea

On occasions people often use simple comparisonsto make a point: you state something, and thencompare it with its logical - or perhaps illogical -opposite. For instance, around the 17th of March,you often hear the expression: "There are two kindsof people in the world: those who are Irish, andthose who would like to be Irish" - implying that no-one likes to be left out on St. Patrick’s day. BeingIrish born and bred, I feel a certain affinity to thisstatement!

In the programming world, I have often heard itsaid: "There are two kinds of programmers in theworld: those who understand pointers in C, andthose who don’t". Experience C programmers willunderstand the subtlety of this.

Recently I’ve found myself uttering: "There are twokinds of people in the world: those who understandthe potential of the Internet, and those who have yetto understand the potential of the Internet". Icertainly belong to the former group: indeed I hold apassionate belief that the Internet will change theface of Australian industry like nothing we haveever experienced before. Its effect will be just asprofound as the industrial revolution, or as theinvention of the internal combustion engine.

So convinced am I of the changes that the Internetwill bring, that I have difficulty understanding howanyone in the information industry particularly the

6 AUUGN: The Journal of AUUG Inc.

Page 9: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

The Physics of Java

IT industry - can fail to grasp what the Internetoffers. And yet I meet them all the time! When theInternet is mentioned - it’s even dinner partyconversation these days -often people’s faces start totake on a quizzical look, and they utter things like"Yes, but how can anyone make money out of theInternet?".

My standard reply is along the lines of: "Well, who’smaking money out of the telephone?" There are 2answers to the telephone question, of course firstlytelecommunications carriers, and secondly peoplewho use the telephone. The first group is easy toquantify - Telstra’s $15B odd turnover is testimonyto this. The second group contains just abouteveryone else in the country, including 12 millionfixed line subscribers, and the 4 million mobiletelephone users. The 12 million of us may not makemoney directly from having a telephone - but it surehelps! Imagine running a business without atelephone - or a fax for that matter.

It’s important to understand that the Internet isbasically a transport mechan.ism - remarkably fast,remarkably cheap, and oblivious of nationalboundaries. It is ’enabling technology’ which makeslots of other things in business happen much moreefficiently.

There are 4 main industry ’groups’ in what canloosely be called the ’Internet industry’. Firstly, thetelecommunications carriers who supply the ’pipes’.There are" two of these at present - Telstra and Optus(although in reality Optus is a VAR for Telstra), butnext year there will be several more after de-regulation takes effect. Clearly the Carriers aremaking money out of the Internet.

The next level in the hierarchy are the InternetService Providers (ISPs) of which there are around200 in Australia - and increasing. Not too many ofthese organisations have gone under. In fact it isperhaps perceived as a glamour sector - look at therecent success of Ozemail’s float on Wall Street.

The next level in the Internet hierarchy is the groupof companies how provide the infrastructure forsecure transactions over the Internet. This is a smallnumber of organisations, but also growing. Thereare not many companies at this level who aremaking money yet, but it will not be long perhapsthe end of the year - before the required encryptioncode is embedded in the popular Web browsers. Atthis stage, business from Internet transactions willbecome lucrative indeed.

The final group are the so-called ’content’ providers.The business model here is generally subscription toa service, or sale of a service of product. Mostorganisations who operate in this space are still

discovering the rules. But this will change,particularly with the advent of electronic cash,which will enable small purchases to be made overthe Net - for instance buying a newspaper.

So who’s making money out of the Net? At present,mainly the carriers and ISPs. In a year’s timetransactional revenues will become significant. Withall this in place, the content providers will make amint... ~

The Physics of JavaMichael Paddon

In the physics of the open systems universe, the Cprogramming language has served as a fundamentalforce ever since that continuum’s equivalent of thebig bang. Just like our own universe, it is hard topinpoint the exact birth moment of "open systems",however it is common practice to date the epochfrom the creation of UNIX (circa 1969-1970).

This is a little inaccurate to say the least, given thatUNIX was written in assembler (and hence notparticularly portable) and that it sported a verylimited functionality. It was, however, a timesharingsystem from the first, which compares quiteamusingly against the recent history of mainstreamPC operating systems.

In fact it wasn’t until First Edition (1971) that UNIXwas written in a portable, albeit limited, systemslanguage called "B". By Fourth Edition (1973), UNIXwas written in C, and it was beginning to exhibit theportability that we consider its natural domain. FifthEdition (1974) was made freely available toeducational institutions and the era of open systemshad clearly begun. Here ends the history lesson!

The point of all this was not to bore you to deathwith a dry history, but rather to illustrate that thisthing we call "openness" (is that a real word?) is tiedfar more closely to the C language than it is to anyoperating system. This was true at the genesis, andremains true today with standards such as POSIXloosening our shackles to any one operating system.Even within the UNIX world there is wild variation,yet this diversity does not inhibit the porting of codethat was written to be portable.

This extends to the non-UNIX system as well,assuming that the vendor approaches portabilitywith an honest effort, and not just a "tick the box"mentality. Regular readers of AUUGN will recall lastyear’s fuss over the Windows/NT POSIX subsystemas a case in point.

Volume 17, Number 4 7

Page 10: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

A Wrapup ofSAGE-AU96

Which brings us full circle to my original metaphor.The C programming language is the gravity of theopen systems universe, a constant force that bindsall things open together. Just about every importantpiece of open software is written in C, or aderivative (like C++), or in a language whosecompiler/interpreter is written in C.

Not bad for a flawed language. Remember what atruly dangerous tool C was before ANSI got to it?Even today, there are still warts left over from whenit used to be a high level assembler, as well as morefundamental problems: for example consider issuesas diverse as scoping, exception mechanisms andmultilingual support. Even when compared with itscontemporaries, Algol and Pascal, C looks somewhatanaemic.

But the strength of C does not lie in theory, it lies inpracticality. What you can effectively achieve with alanguage is far more important than any othermeasure. Make note of this fact, for we will return toit.

Today there is a new game in town: Java. Cuttingthrough all the marketing hype and propaganda(both positive and negative), java is a relativelysimple new object oriented programming languagethat assists in the construction of networkdownloadable applications. That’s just about allthere is to it, despite all those millions of wordswritten about it by people who think that theInternet was invented in 1992, that HTML is aprogramming language, and that the phrase"paradigm shift" is a cool and edgy thing to say.

Let’s explode a few myths and make a fewobservations.

There is nothing special about Java as a language.Sure, it does garbage collection, it’s got referencesinstead of pointers and it has a security modelenforced by its virtual machine. None of these areground breaking (though some of the security stuffis pretty interesting).

Similarly, C is not special as a language. If DennisRitchie had decided that an extended Algol was agreat systems language we’d all be compiling with aGNU Algol compiler today (gal?).

Java, like C, is highly versatile and portable. In factJava probably has an edge here, given the virtualmachine technology it is layered over. Java also hasa highly functional and stable set of libraries, whichallows it to be an immediately useful tool forbuilding applications and interfaces without everyprogrammer needing to reinvent the wheel.

There’s nothing special about Java’s libraries,though, and countless examples of similar bodies of

software are available for just about every modernlanguage.

Java does create the opportunity for a completelynovel class of application: the ubiquitous,downloadable applet. This is more of a function ofthe virtual machine however, and many other highlevel languages could be targeted at the sameexecution environment.

We could have been really unlucky and have hadGosling decide that Lisp was a spiffy high levellanguage to base an applet language on. Hardlybears thinking about, does it?

Where does this leave us? Java is obviously a good,but far from perfect, language that is internetportable and allows us to construct new kinds ofprogrammes. Not unlike C, Java is a pragmatictechnology, in the right place at the right time.

As we have already seen, it is languages that drive anew technology, and it is likely that Java (orsomething like it) will be the powerhouse of the nextwave of open systems; one based on downloadableapplets and distributed computing services. Javamay yet falter as the vehicle of this change, but it isclearly the prime contender. Somehow, Sun haveconvinced just about everyone to run the Java virtualmachine, which just goes to show the benefit ofbeing first in a marketplace.

In any case, I am dead sure that it is a *language*and not a browser or a web server or an operatingsystem or even a database that will be the keystoneof future global computing. I’m backing Java. What "do you think?,

A Wrapup ofSAGE-AU96Frank Grawford

Another annual conference for The SystemsAdministrators Guild of Australia (SAGE-AU) hasgone, and again it proved to be both popular withand important to system and networkadministrators throughout the country. SystemsAdministrators are the people responsible for themanagement and operation of computer systems inmost organisations.

While SAGE-AU is not specific to any operatingsystem, the dominance of UNIX systems in theserver market means that most SAGE-AU memberseither administer or have previously administeredUNIX systems. On the other hand, most members

8 AUUGN: The Journal of AUUG Inc.

Page 11: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

The Network Computer

have an interest in Microsoft NT systems, assomething they will be involved with at some stage.

The 4th Annual Conference, SAGE-AU’96, was heldin Brisbane, at the University of Queensland, from16th - 19th July. The conference started with twodays of tutorials, covering such topics as AdvancedAdministration topics, Java Programming and AnIntroduction to PGP (Pretty Good Privacy). Thesewere very well attended and gave administrators achance to catch up on some of the latest techniquesor systems.

The conference proper was held over the two daysof the 18th and 19th, and consisted of a number ofpapers and work-in-program sessions, presented byadministrators from throughout Australia. Again,the topics covered ranged from AutomatingAdministration Tasks, through to case studies ofvarious commercial and academic sites, and on tonetwork and system security issues. These casestudies included the management of a large FTP site,implementation of a site monitoring system,planning a major site move and the introduction ofNT at a major commercial site.

The presenters included Craig Bishop, the TechnicalManager of connect.com.au, Eric Halil fromAUSCERT, and Peter Elford from CISCO.

As well, Dinah McNutt was the invited internationalspeaker. Dinah has strong connections withUSENIX/SAGE, having been the chair of the 1995USENIX LISA conference. She has also written forByte, SunExpert, iX Magazine and has a regularcolumn in Unix Review Magazine.

Aside from general administration issues, the majorissues coming from the conference were eithersecurity related or management issues of servers in alarge network. In terms of security, there werenumerous mentions of PGP for both encryption andauthentication. One of the big issues with PGP andsimilar public key encryption schemes, is theverification that the public key actually belongs towho it is claimed to. This is slowly being addressedby the establishment of Certification Authorities,and this was described in a presentation byCatherine Allen.

The use of encryption and authentication within alocal network was also a major issue, with numerousreferences to "ssh", a remote shell replacement,which implements both public key encryption andan encrypted channel between systems. When this isteamed with "rdist", a program to automate software(and other) distribution, to become "sdist", itprovides a secure means of administering a largenumber of systems. A plan for using these tools toform a secure environment was presented by Geoff

Halprin, and should form the basis for manyorganisations.

Arguably, the most important presentation of theconference was by Jim Hogan and Peter Jamesentitled "On-line regulations and SystemAdministration", which covered many of theregulations proposed throughout Australia. Anoutline of the issues which may affect all ISP and theadministrators that manage their systems was given,including a summary of the difference across thecountry, convinced most people present that there isa long way to go to get sensible laws, but that we arenow moving in the right direction.

Ultimately, the conference proved useful to all those.who attended. It gave them information that wasimmediately useful, an understanding of some of theprinciples underlying their activities, and anindication of some of the forces that will affect theirfuture.

Further information about SAGE-AU can beobtained by contacting Frank Crawford, thesecretary, on (02) 717 3015 or emailsecretary@sage-au, org. au.~

The NetworkComputerPhil McCrea

The Network Computer (NC) has had a fair amountof airing recently, fuelled by speculation from Oraclesupremo, Larry Ellison. But while several hardwaremanufacturers have announced that they willproduce NCs for around $500, the NC is still largelyspeculation at present.

It’s easy to see why Larry Ellison is so gung-ho onNCs: Oracle’s strengths lie in the server end of themarket, while Microsoft’s strengths are in the client,or PC, end. Larry wants the ’business side’ of thingsto live on the server; Bill wants everything to happenon the PC where he is in control. Egos are at stakehere...

On the face of it, you would have to give Larry goododds that the NC will become a reality. If you look atthe trends over the past few years, just abouteverything in the computing arena is becomingnetwork-centric. The fatter the communicationspipes become, the more useful networks will be, andthe more we will be able to access information thatresides elsewhere.

Volume 17, Number 4 9

Page 12: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Is the InternetAnti-Commercial?

So, ,rill the NC take over from the PC.) The answerin a qualified No, because the PC and the NCaddress two different markets. Yes, the NC willbecome popular in the near future. It will be diskless, and will be used as an ’information terminal’. NCswill be aimed at the mass market: they will be soldby companies that sell car radios and burglar alarms.They will become commodity items, with householdbrand names. They may look a little different to aPC. They may be sold without a screen, with theintention of being used with a TV monitor - there arealready a couple of these on the market, completewith a remote control adorned with ’TV’ and ’Web’buttons. In the near future, they will probably besold with flat panel displays that will be wallmounted.

So what would you use an NC for? Basically forinformation retrieval of all sorts: telephone numbers,weather, sports results, shopping, entertainmentinformation, etc., and of course for electroniccommerce. Mainly the kind of things you wouldcurrently look up in a newspaper, or in a catalogue.It will soon be second nature to ’check the NC’ -much like our fingers currently go walking!

The NC will not be a cumbersome beast like a PC:there will be nothing mechanical to go wrong - infact it will probably be constructed from a chip ortwo. It will not take a couple of minutes to boot likecurrent PCs do; nor will it spew out silly errormessages. Because it will draw next to no power, itcan be left on all of the time. Even when firstpowered up, it will boot itself over the network in amatter of seconds, and be at your service. In short itwill be like a telephone: in fact it may very well beintegrated with a telephone handset.

Some NCs will operate without a keyboard, withpeople making choices my moving arrows around ascreen. I believe most people will want to use akeyboard, however: moving through a series ofscreens with lots of cursor movement to finallyconvey a message such as ’I want to book a hotel inPort Macquarie’ could be fairly frustrating!

What about applications where you may want tostore things- like word processors and spreadsheets? Will users trust some third party to look aftertheir confidential information? Microsoft came togrief with this approach when it tried to set up aglobal network ;last year, where everything was toreside on servers at Redmond[ NCs may bedifferent, however, as second generation NCs willprobably have a smart card slot which will containyour personal encryption key(s), so you will be ableto encrypt your information and store it safely aremote server.

And what of the PC? Well, there will always be amarket for people who want to do all their work ontheir own machine, and store it locally. There will be’power users’, desktop publishers and softwaredevelopers who will need local facilities such as CDplayers, specialised plug-ins, and the like..

But by far the majority of users will want Web accessmost of the time purely for information, and in thiscase an NC is all that is required.

For those who want to carry out word processing oruse spreadsheets, then an NC with a decent screen,keyboard, printer, and smartcard security may be allthat is necessary.

Perhaps Mr. Ellison may get his way after all...

Is the InternetAnti-Commercial?Frank Crawford

With the rise of more commercial companiesconnecting to the "net", there is a growing backlashagainst the "commercialisation of the net". Inparticular there are some groups that are vigorouslyprotesting about this commercialism, and the loss ofthe nets "innocence".

As a long-time user of the Internet, it is worthstepping back and looking at what thiscommercialism means, is it good or bad, or justdifferent. Most users are not really anti-business,however, most are against the inappropriate use ofthe net.

Many businesses have grasped that the net is a newmarketing medium, but have not understood thatthe old techniques are not appropriate. For example,mass mailout may work through the postal system,but in an electronic system, similar activities (akaspamming) don’t. While there are a number ofreasons for this, probably the biggest is also thereason organisations try them, they are quick andsimple. However, when compared to normal mail,how many bits of junk mail can fit in a physicalletterbox, and how many in an electronic one? Also,unlike normal junk mail, the receiver can easily fightback, as it is simple to send back the junk, causingthe original senders system to "meltdown".

In fact the basic problem here is that there iscurrently no real way to prioritise email, or tohandle different classes. For example, how do youput up a "No Junk Mail Here" sign?

10 AUUGN: The Journal of AUUG Inc.

Page 13: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Do Non-Technical Managers Work?

What this illustrates is not that the net can’t be usedfor business, but rather that new methods have to bedeveloped. This is a far wider area than just how todo payments securely over the net.

Most people using the net originally were after freeinformation. Today, most are after relevantinformation, and are willing to pay for it. The onlycatch here is that they want a simple and safe (inthat order) mechanism for handling the payment.

The other major criterion for this information is thatis must be both rapid and accurate, be it bug fixesfor their code, or information on their favourite rockgroup. Companies that can do this are generallyseen as good net citizens, whereas those that don’t orwon’t are not. Of course, very few businesses havereally come to terms with the net and the expectedresponse time, so there are currently far more "badcitizens" than "good citizens".

Given that the web is barely two years old, and mostcompanies set up 5 year plans, it is not surprisingthat many are just not capable of moving fastenough. Over time, when the pace of both growthand change slow down (as it must eventually) manyof them will catch up. As an example, take a look atMicrosoft’s recent change in attitude concerning thenet.

The other side of this is that the information must beaccurate. Traditional PR blurbs that "colour thetruth" quickly come under fire as (to quote a popularTV program) "the truth is out there" and is soondiscovered. Once this happens both the reputation ofthe company and the integrity of any previous (orfuture) statements is compromised.

Many of the complaints about business activities arecounter productive. If many of these people hadtheir way, we would still have a 2400 baud UUCPconnect to the USA, as opposed to a 32Mb IP link.

Unfortunately many of the complaints fall into thecategory of "things aren’t as good as they were in thepast", but then that is true in most of life.

Objecting to business on the net is like complainingabout advertising on TV, it may feel good, but it isfruitless. Businesses have sufficient money andpower to move things in the direction they want,even if in many cases they don’t know what thatdirection is. It is far better to guide them into a paththat is acceptable to both the business and the netuser (their customers) as it will be advantageous toboth.

In fact, just about everyone will have someinteraction with a business over the net. This canrange from email to a business associate, to lookingup book or CD catalogues, to direct purchases over

the net, and so will benefit by the increasedcommerce.

In the end what will be found is that suchcommercialism is neither good nor bad, but justdifferent. It will mean that the net is no longer thesimple free place it once was, but it wil! also open upfar more opportunities than before. Both theproblems and the possibilities increase as the netgrows.

Do Non-TechnicalManagers Work?Frank Crawford

In just about every computer related organisation(and many others as well) there are two disparategroups, the managers and the technical staff. Thereis very little migration between the two groups, andalmost all of that being from the technical to themanagement staff, primarily because it is one of thefew means of advancement within an organisation.Generally, those in the management group havelittle understanding of technical issues, being willingto leave such details to others.

At the same time more and more large projects aresaid to be running into trouble, being canceled orotherwise failing. We are also seeing more major"non-commercial" projects being managed from startto finish by technical groups working on a part-timebasis.

The Internet is a prime example of this, beginning itslife as a research project, almost totally designed andused by technical types. It achieved its currentposition through people with technical knowledgeand skills identifying and correcting problems asthey were found, rather than directing their effortsinto the "management" of the problem.

Even further, the biggest impetus to the growth ofthe Internet, and it’s conversion to a "network foreveryone", was the development of the "World-Wide-Web" and in particular the Web browser,Mosaic. Again this was a strictly technical project,developed more because the facilities were available,than because of a perceived need.

From these examples you may conclude thattechnical staff are only good at initiating newprojects, but once it goes into "production" it needsto be "managed". Again, there are numerous cases ofprojects being taken through various cycles bytechnical people.

Volume 17, Number 4 11

Page 14: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

AUUG96 Conference & Exhibition

Again, the [nternet is another fine example of this.As it continues to evolve and grow, each technicalchallenge is being met and addressed by those withknowledge and understanding of the technicalissues.

Arguably one of the best example of this is Linux,which, through a world-wide effort, has beendeveloped from scratch, and is continuing todevelop and improve. Prior to the release of Linux2.0, there had been a development effort thatculminated in this release.

Since then the pace of development has increased,with 12 minor releases occurring in its first twomonths, each of which has increased the stability ofthe original version. The organisation (ormanagement) of these releases is itself a majorproject, and has progressed without any noticeableproblems.

The management of these projects have a number ofthings in common, which is generally not taken intoaccount, or even understood, by those without atechnical background. Firstly, and obviously, there isa requirement for understanding of the issuesinvolved, much of which can only come aboutthrough a technical knowledge.

Secondly, and probably more important, all thoseinvolved in the projects have a commitment and feela responsibility to ensure that the project succeeds.Unfortun.ately, many commercial projects removethese incentives from the technical staff, and yetexpect them to perform.

Working in a technical role has a number of otherbenefits, one of which is the ability to see progress inthe work. In most cases managers have to rely onarbitrary milestones and goals rather than a concreteresult. Given this often arbitrary nature of thesegoals, it is difficult for them to see or feel where aproject is up to.

Like anything else, these statements aregeneralisations. There are managers who can controlbig projects, without understanding the technicaldetails, but they have a good feel for their people.However, there are far more non-technicalmanagers, who do not have any such feel for theirpeople, and add considerable extra pressure to theirtechnical staff, often overwhelming any of theirefforts to succeed. ~

AU UG96 Conference& Exh ibitionFrank Cra wford

Well, another year rolls around, and the PremierOpen Systems conference, AUUG96, draw uponThis year AUUG is holding the conference jointlywith Charles Sturt University’s Asia Pacific WorldWide Web Conference, making it the biggest UNIX,Open Systems and Web event of the year.

Following last year’s format, the conference, whichis being held in Melbourne between 18th and 20thSeptember, will be preceded by two days of tutorialsand workshops (16th & 17th). These tutorials, whichare either a full day or half day, allow an indepthcoverage of such topics as Cryptography, SGML,PERL, Java, NIS+ administration, PGP, security ofWWW and network management issues. As well, forthose not into such technical aspects, there are alsotutorials on "An Introduction to the Web", "ArtHistory Resources on the Internet" and "NetworkPublishing".

If the topics are not a sufficient drawcard, many ofthe presenters are internationally recognised in theirfields. These include people like Rob Kolstad fromBerkeley Software Design, Greg Rose, the co-moderator of sci.crypt.research, Peter Elford fromCISCO, David Purdue from SunSoft and MikeGreenhalgh, Professor of Art History at ANU.

While the tutorials are aimed at giving attendees anindepth understanding of some topics, theconference will give the participants an overview ofthe latest in information security, publishing on thenet and Internet commerce.

As in previous years the conference will begin eachday with a keynote presentation from acknowledgedexperts, then breakup into multiple streams coveringselected areas, and finally rejoin for a finalpresentation.

Some of the speakers include Bill Cheswick fromBell Laboratories who will be talking about InternetSecurity and the World Wide Web, RogerFraumann, from NCR and a familiar face to AUUG,whose presentation is entitled "Digital Dial Tone -Electronic Commerce on Demand" and Rob Kolstadwith "The Future of the Internet".

However, these keynote speakers are not the onlyattraction, as this conference is also a chance to hearfrom those working in the trenches, and to get firsthand what is really happening in the UNIX andInteract world. Some of the topics being covered

12 AUUGN: The Journal of AUUG Inc.

Page 15: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

AUUG96 Conference & Exhibition

include security, from both a development andmanagement perspective, support tools, Linux,FreeBSD and other Public Domain OperatingSystems, Java, Networking and Data Archives. Aswell, the Management stream will include casestudies of various organisations.

For those who find they cannot afford the time toattend the entire conference, this year we arerunning (as a part of the conference) a specialInternet Commerce Day on the 19th. This programhas been put together in a manner which can beattended individually, but still fits with the rest ofthe conference, and includes such people as BruceWilson of CyberCash Inc, Randy Whitting fromCommerceNet and Rob Morel of Oracle.

Finally, what would the annual AUUG conferencebe without one of the biggest exhibitions of OpenSystems technology in Australia. As in previousyears, there will be an exhibition running from the18th to the 20th, showcasing products from suchcompanies as Access One, OpenTec Solutions, NCR,Sun Microsystems, Silicon Graphics, SAS Institute,Megatec, Digital Equipment Corporation, TecktronixAustralia, and many other major open Systems andInternet vendors throughout Australia.

This provides one of the few places to see all thelatest computing systems in the one place. ¯

/TCP/IP Network Services.Unix Systems Administration Services.Unix-MS Windows Integration.Intemet Security & Firewalls.Client/Server Software Development.

Cybersource is a TCP/IP Network and UnixSystems spedalist. We have been designing,installing and administering heterogeneousWANs and LANs since 1991. Our staff areexperienced in all aspects of internetworking,including administrating hosts, configuringrouters and terminal servers, security andfirewalls, DDS and ISDN links. For furtherinformation, please contact:

Cybersource~"~ ACN: 053 904 082

Cybersource Pty Ltd ACN: 053 ~34 082

Level 8, 140 Queen St, Melbourne 3000Phone: +61 3 9642 5997 Fax: +61 3 9642 5998

Email: [email protected] http://www.cyber.com.au/

Volume 17, Number 4 13

Page 16: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

clients ...... . . . ...... m.~utomar~ Common.tasks.

Page 17: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIX Tricks & Traps

UNIX Tricks & TrapsSubeditor." Gunther Feuereisen <gunther@agsm. unsw. edu.au>Tel." 02 9931 9314 Fax: 02 313 7279

Hi everyone! Here we are in sunny Sydney, having just survived the monsoon-like rains (which incidently,are great for washing a car).

Alas, no contributions from anyone out there (if you’re reading this drop me a note and say "Hi!").

As always, contributions are welcome!

Aloha!

TR(1 ) - MORE THAN JUST a TWO LETTER ACRONYM.Ever copied a whole bunch of DOS files to your disk, and then become annoyed

with all those CAPS? Let’s face it, lowercase is a lot less loud ; - ) Give tr ( 1 ) a gander - it won’timmediately solve the problem, but with a little thought (and a few clickety-clicks) you’ll have bashed out anice little script to take care of those nasty DOS filenames.

For those of you who don’t feel like clickety-clicking, this is the sort of thing I mean:

#!/bin/ksh# swc - switch case# A Shell script to toggle file name caseusage="Usage: swc ( -u I -i } file [ file ... ]

-u toggle to upper case-i toggle to lower casefile filename or wildcards"

case $# inecho "$usage"; exit i;;o)

*)ffype=$1shiftcase $# inO) echo "$usage"; exit i; ;esac;;

esacfor file in "is -d $*"do

case $type in-i) mv Sfile "echo $file I tr ’ [A-Z] ’ ’ [a-z] ’’;; -u)Sfile [ tr ’ [a-z] ’ ’ [A-Z] ’’;; esacdone

mv $file "echo

HOW TO MOVE or COPY LARGE VOLUMES OF DATA - THE TAR(1 ) COMMAND.

One thing that often crops up is moving large amounts of data. Often across filesystems, or even within yourown home directory. Now cp ( 1 ) will do the job quite nicely, but in many cases, you have set uniquefile/directory permissions on certain files, and you’d like those to be maintained. This is where tar ( 1 )comes into its own.

Now if you take a look at the tar ( 1 ) man page, the first thing you’ll see is something like this:

"The tar command saves and restores multiple’files on a single file (usually a magnetic tape, but it canbe any file)."

The lovely thing about a system where everythingis a file: you write something to work on files, andsuddenly it works on devices too, and vice versa.

Volume 17, Number 4 15

Page 18: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIX Tricks & Traps

You will also fh~d a multitude of options - I’ve never used more than three flags at any one time [1], and Iremember a total of five flags. The syntax for tar ( 1 ) (not the complete syntax, look at your man page forthat, this just includes the flags I use) is as follows:tar ( -c ! -x I -t } [ -v ] [ -f Archive ] [ File I Directory ]In "English" the flags mean:

-c Create archive

-x eXtract archive

-t index archive

-v Verbose

-f tar archive File to use

ExampleIn my home directory I have a directory called "fig" which contains some layouts I’ve created withxfig ( 1 ). Say I wanted to copy all of the files, with their permissions, owner/group, and directory hierarchyintact. This is where I would use tar:

coral:[/home/gunther] $ tar -cvf fig.tar figa figa fig/machineroom, fig ii blocksa fig/machineroom, fig.bak ii blocksa fig/workstations.f<g 13 blocksa fig/workstations.fig.bak 13 blocksa fig/xterms.fig 6 blocksa fig/xterms.fig.bak 6 blocksa fig/network.gif 2 blocksa fig/networkold.fig 14 blocksa fig/networkold, fig.bak 14 blocks

Here I have used tar ( 1 ) with its verbose flag set, denoted by the ’-v’, so I can see what happens. In thiscase we’r,e adding (prefix ’a’ at each line) to the archive. The archive file is ’fig. tar’, denoted by the ’-f’flag.

If I wanted to list the contents, I could use the ’-t’ flag:

coral: I/home/gunther]drwx ...... 20250 20250-rw ....... 20250 20250

rw 20250 20250-rw ....... 20250 20250

rw 20250 20250rw 20250 20250

-rw 20250 20250-rw 20250 20250-rw 20250 20250-rw 20250 20250

$ tar -tvf

5197 Sep5197 Sep6543 Sep6543 Sep2931 Sep

fig.tar0 Sep i0 16:32:34 1996 fig/

04 13:17:06 1996 fig/machineroom.fig04 13:17:02 1996 fig/machineroom, fig.bak04 15:15:56 1996 fig/workstations.fig04 15:10:17 1996 fig/workstations.fig.bak04 15:41:17 1996 fig/xterms.fig

2931 Sep 04 15:39:50 1996 fig/xterms.fig.bak989 Sep i0 12:49:55 1996 fig/network.gif

6915 Sep i0 16:32:34 1996 fig/networkold.fig6915 Sep i0 16:32:18 1996 fig/networkold.fig.bak

This gives you a nice contents listing of all the files in the archive, along with permissions, owner/group ids,file size, modification date, and pathname [2].

16 AUUGN: The Journal of AUUG Inc.

Page 19: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIX Tricks & Traps

Toextractthearchive, switchthe’-c’flagforthe’-x’flag:

coral: [/home/gunther] $ tar -xvf fig.tarx figx fig/machineroom.fig, 5197 bytes, Ii tape blocksx fig/machineroom.fig.bak, 5197 bytes, ii tape blocksx fig/workstations.fig, 6543 bytes, 13 tape blocksx fig/workstations.fig.bak, 6543 bytes, 13 tape blocksx fig/xterms.fig, 2931 bytes, 6 tape blocksx fig/xterms.fig.bak, 2931 bytes, 6 tape b!ocksx fig/network.gif, 989 bytes, 2 tape blocksx fig/networkold.fig, 6915 bytes, 14 tape blocksx fig/networkold.fig.bak, 6915 bytes, 14 tape blocks

Much like the create archive option, under the verbose flag you get an ’x’ at the start of each line telling youthe command is eXtracting data.

That’s about as difficult as the tar command gets. If you wish to archive a group of files, then the commandwould be:

tar -cvf archive.tar filel file2 *.c

Where you can use explicit filenames (filel file2) or wildcards (*. c) or a combination of the both. Ofcourse, the files can themselves be directories.

The archive file doesn’t have to be a regular file, it can be (amongst others) a:

¯ floppy drive, such as tar - -cvf /dev/fd0 *. c

tar -xvf /dev/fdO

¯ tape drive, such as tar -cvf /dev/rmtO *.c

tar -xvf /dev/rmtO

and so on.

You now have a very easy way to move files around filesystems and around workstations. Just tar the files tofile or de{’ice, and then extract them where you want them.

Now, as with all things, we want to make our life as easy as possible. If you want to try moving files acrossfilesystems, and you have permissions to write at the destination, try something like the following:

Example:

Moving my fig directoryfrom/home/guntherto/tmp:

coral: [/home/gunther] $ cd /tmpcoral: [/tmp] $ ( cd /home/gunther; tar -cvf - fig )a figa fig/machineroom.fig ii blocksa fig/machineroom.fig.bak ii blocksa fig/workstations.fig 13 blocksa fig/workstations.fig.bak 13 blocksx figa fig/xterms.fig 6 blocksa fig/xterms.fig.bak 6 blocksa fig/network.gif 2 blocksa fig/networkold.fig 14 blocksx fig/machineroom, fig, 5197 bytes, ii tape blocksa fig/networkold.fig.bak 14 blocksx fig/machineroom, fig.bak, 5197 bytes, il tape blocksx fig/workstations.fig, 6543 bytes, 13 tape blocksx fig/workstations.fig.bak, 6543 bytes, 13 tape blocksx fig/xterms.fig, 2931 bytes, 6 tape blocksx fig/xterms.fig.bak, 2931 bytes, 6 tape blocksx fig/network.gif, 989 bytes, 2 tape blocksx fig/networkold.fig, 6915 bytes, 14 tape blocksx fig/networkold.fig.bak, 6915 bytes, 14 tape blocks

tar -xvf -

Volume 17, Number 4 17

Page 20: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIX Tricks & Traps

So what have I done? Firstly, I changed directory to / imp. Now, I didn’t want to use absolute pathnames, soI made a complex con-u-nand (within the parentheses) which first changed directory back to my home, andthen issued the tar command. Now, stdout is a file itself, so I have used as my archive destination stdout,represented by ’-’ in the tar command:(cd /home/gunther; tar -cvf - fig)

Now the output of this command will be the tar file. However, all I want to do is reconstruct it in my currentworking directory (/tmp), so I just need to extract it. I could redirect the above to a file, and then extract thefile - why not just redirect it back to stdin and extract that:(cd /home/gunther; tar -cvf - fig) I tar -xvf -

In the tar command, using the -x flag, ’-’ represents stdin.

The following lines of output are just tar ( 1 ) showing that it creates (prefix ’a’) and extracts (prefix ’x’) files.Of course, you can take this one step further. Say you want to transfer files across two machines you haveaccess to, why not use the facilities of the rsh ( 1 ) command?

Say, I want to copy files from a machine called emerald, to my machine. I can rsh into emerald, and then tarthe files with the output going to stdout and then pick up and extract that archive on my machine.

i.e. rsh emerald "cd /directory; tar -cvf - files"I tar -xvf -

Where ’/directory’ is the location and ’files’ the directory or list of files I want to copy.

As you can see, tar ( 1 ) makes life a lot easier when it comes to moving large numbers and/or directories.For more information check out the tar ( 1 ) man page.

Footnotes:

[1] Under System V you need to use the ’-o’ flag to ensure the owner of the archive is you, and not thecreator. This is important when you un-tar a file you’ve grabbed off the net.

[2] When creating tar archives, use relative pathnames always. Try to avoid He use of absolute pathnames.The reason, is that when you come to extract an archive which was created using and relative pathname, youcan drop .it anywhere in a directory tree. With absolute pathnames, it has to go where it was created.

Compare my tar command from above with the following:

coral: L/home/gunther] $ tar -cvf fig-new.tar /home/gunther/figa /home/gunther/figa /home/gunther/fig/machineroom.fig Ii blocksa /home/gunther/fig/machineroom.fig.bak ii blocks .a /home/gunther/fig/workstations.fig 13 blocksa /home/gunther/fig/workstations.fig.bak 13 blocksa /home/gunther/fig/xterms.fig 6 blocksa /home/gunther/fig/xterms.fig.bak 6 blocksa /home/gunther/fig/network.gif 2 blocksa /home/gunther/fig/networkold.fig 14 blocksa /home/gunther/fig/networkold.fig.bak 14 blocks

In this case, you have to restore the files to the exact pathname. Relative pathnames always give you theability to move things around.

CORRECTION FROM LAST ISSUEIn the last edition of "Traps & Tricks" we looked at daemons and ports and in doing so mentioned variousport numbers. I also managed to pop in a great typo:.

NNTP - port 113

I{ you get really adventurous, write your own newsreader. Otherwise read ardcles straight off yournewsserver. A silly way to do it- but it does amaze onlookers ;-)

It is of course, port 119. By the time I realised, the issue was already at the printers. Sorry about that onefolks.,

18 AUUGN: The Journal of AUUG Inc.

Page 21: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

Book ReviewsSub-editor: Frank Cra wford

Another AUUGN comes around, and we have astack of reviews of exciting, and not so excitingbooks for you. It is easy to tell that the latest andgreatest in computing is Java, with three books beingreviewed here and more to following in futureAUUGNs. However, AUUG is not just Java, butOpen Systems and networking of all types, and thatis seen in the other reviews, including reviews ofbooks on UNIX internals, network managementprotocols and other low level details, Perl 5 and evensome thoughts on how to protect yourself on theInternet.

You may have noticed, we currently have lots ofbooks coming for review. The current practice is topost a note to the mailing list <auug-books@ans to. gov. au> and the newsgroupaus. org. auug when we have new books available.Unfortunately, this disadvantages members withoutnetwork connections, or on the end of a low speedlink. For people in such a position, either mail, viathe AUUG PO Box, or fax me on (02) 9717 9273, withyour contact details and preferences. ¯

UNIX INTERNALS: THE NEWFRONTIERSby Uresh Vahalia

Prentice-Hall1996, 601 pagesISBN 0-13-101908-2

Re vie wed byMichael UsherInformation Technology ServicesUniversity of Sydney<M. Usher @ isu. usyd. edu.au>

Warren Toomey has provided an excellent review ofthis book in AUUGN Vol. 17, Nr 3, so I won’t repeathis praise directly, but rather make a few additionalcomments. My first impression of the book when Iopened the package was dauntin&: The six hundred

pages cover a surprising range of topics, often inquite technical detail. I was pleasantly surprisedwhen I discovered the book was actually readable!Vahalia has surmounted what is often presented as avery dry topic and produced an exciting survey ofrecent operating system design.

There is one minor correction I would make toToomey’s review. He mentions that the book coversa variety of UNIX variants and describes each ofthese systems. This is not quite true. Vahalia takes arange of topics within operating systems design, andthen uses a selection of current UNIX variants toillustrate the various approaches to the problems. Ingeneral, he uses SVR4 and Mach as the majorexemplars, but other systems get a mention whenthey have an unusual approach to a problem,notably Digital UNIX, Solaris 2.x and 4BSD. It istrue that Linux and the BSD derivatives are missing.Given the 1996 publication date, and that there areonly a few references dated 1995, the book musthave been substantially complete by early 1995. Idon’t think the omission devalues the book and I amsure we will see books on the Linux kernel in thenear future.

The different approach to the topic means the bookhas a different audience to the traditional UNIXkernel books. This book is also directly useful as acontinuation of Richard Stevens books on UNIXprogramming. The topics he covers are all areas thatprogrammers and designers need to understand tomake best use of the new systems on which theybase their products. The sections on multithreadingand new filesystems are of special interest here.Description of the different resource allocationstrategies is useful to the systems administrator whomust manage a variety of UNIX systems or whomust choose which system is most suited to aparticular application.

As Toomey comments, BSD sockets get only onepage at the end of the chapter on STREAMS andeven then only as a comparison of the sockets APIagainst TLI under SVR4. This is definitely a majoromission, and since the chapter is the last of thebook, I can only assume it was not covered due totime constraints.

Overall this is a fine book. There are many detaileddiagrams illustrating the various discussions, nonoticeable typographic errors, clear and readabledescriptions, and the book is simply a joy to read.

I unreservedly recommend this book to those with atechnical involvement with modern UNIX systems.

Volume 17, Number 4 19

Page 22: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

TEACH YourSELF JAVA IN 21 DAYSby Laura Lemay & Charles L. PerkinsSams.net Publishing1996, 527 pagesISBN 1-57521-030-4

Reviewed byPeter GrayInformation Technology ServicesUniversity of Wollongong<[email protected]>

If you have not heard of Java by now, you must beliving on Mars. You have probably been told thatJava is either God’s gift to the software industry andthe bullet with Microsoft’s name on it or aninteresting diversion of no real commercial interest.You may have decided to learn Java to see what thefuss is about. If you have, then "teach yourself Javain 21 days" is a good place to start.

The book comes in a rather trendy and attractivepurple cover and includes the Java Development Kitfrom SUN Microsystems for Windows 95/NT andSparc/Solaris on a CDROM. The book is quite large,527 pages.

The book claims to be aimed at people who havesome programming experience and goes on to saythat some BASIC or Pascal at school would beenough. I doubt this very much. I think a few yearsof C or C++ would be needed to get full benefit fromthe book. People with little programming experiencewould find it quite heavy going and may becomelost in the object orientated terminology usedthroughout. Experience with object orientatedprogramming (OOP) would be a distinct advantage.

However, if you do have some programmingexperience, and have at least a working knowledgeof OOP principles, then this book does give anexcellent introduction to Java. The material ispresented in a well thought out order and thetypographic conventions are excellent in helping thereader categorise the information being presented.Each chapter ends with a Q&A section which doesaddress some of the obvious questions a reader may ,have when reading the text.

The book is divided into three sections, eachdesigned to cover 7 days. The first section (week)introduces the reader to writing Java applications, asopposed to applets. A Java application is much likea program written in any other language. A Javaapplet is a Java program designed to be loaded intoand run by some form of WWW browser. Thereader learns about OOP terminology and principlesand then how to create Java classes and write smallJava applications.

The pace increases in the second section, which isdevoted to writing applets. The reader learns aboutthe graphics class, and how to draw onto the screen.Color and fonts are then covered, followed byanimation, simple threads, images and sound, thenevents and user interaction. The section ends byintroducing the basic widgets defined in the Javatoolkit and briefly mentions networking from withinthe Java applet. Quite a busy week!

The first two sections were written by Laura Lemay.The last section is written by the other authorCharles Perkins and is much more advanced. Idoubt any beginning programmer could get throughit. Charles Perkins has a quite different style toLaura Lemay and the transition does jar a little.

The section starts by describing modifiers used forcontrolling class and variable protection, thenintroduces packages and interfaces. Then three daysare spent on exceptions, multithreading and streamsrespectively. The next day covers native methodsand libraries and the last day looks under the hoodat the Java virtual machine and bytecodes.

All in all I found the book quite good and wouldrecommend it to experienced programmers wantingto learn Java. I doubt it would be as useful to theinexperienced programmer. I cannot resist making afew comments on Java itself. I like the language alot. It seems to be a real step forward from C,without introducing the hideous complexity of C++.It can be used just as easily for general purposeapplications as for applets. It deserves to succeedand from the amount of interest it is generating, itwill.,

PROGRAMMING WITH JAVA!

by Tim RitcheyNew Riders1995, 389 pages + CD-ROMISBN 1-56205-533-X

Reviewed byLawrie Brown<Lawrie.Brown @ adfa.oz.au>

Java is one of the super-hyped areas vying forattention at present, so not surprisingly we see a raftof material appearing which attempt to fulfill theperceived demand. This book, is one such. In brief, Ihave to see that my reaction to it is one ofdisappointment and frustration. This book seemedto promise a lot, but frankly, it doesn’t deliver. Atfirst glance it suggested that it would teach you howto program in Java, however on closer inspection thetitle "Programming with Java" is actually apt. Itspends a lot of time telling you what Java is, how to

20 AUUGN: The Journal of AUUG Inc.

Page 23: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java
Page 24: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Notification ofChange

You can help us! If you have changed your mailing address,phone, title, or any other contact information, please keep usupdated. Complete the following information and either fax it tothe AUUG Membership Secretary on (02) 9332-4066 or post it to:

AUUG Membership SecretaryP.O. Box 366Kensington, NSW 2033Australia

(Please allow at least 4 weeks for the change of address to take effect..)

~ The following changes are for my personal details, member #:

UNIX~AND OPEN SYSTEMS USERS

The following changes are for our Institutional Member, primary contact.

The following changes are for our Institutional Member, representative 1.

The folJowing changes are for our Institutional Member, representative 2.

PLEASE PR=NT YOUR OLD CONTACT INFORMATION (OR ATTACH A MAILING LABEL):

Name/Contact:Position/Title:Company:Address:

Tel: BHFax: BH

email address:

Postcode

AH

AH

!Date:i lnitial:Date processed:!Membership #

PLEASE PRINT YOUR NEW CONTACT INFORMATION:

Name/Contact:

Position/Title:Company:

Address:

Tel: BH

Fax: BH

emaii address:

Postcode

AH

AH

Page 25: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIXeAIqO OPEN SYSTEMS

To apply for AUUG membership, complete this form and return it with payment in Australian dollars to:REPLY PAID 66, AUUG MEMBERSHIP SECRETARY,P.O. BOX 366, KENSINGTON, NSW 2033, AUSTRALIA

w~thheld from minting lists madeTel: +61 2 9361-5994 or 1 800 625 655 ¯ Fax: +61 2 9332-4066

NOTE: Pt~e do n~ ~ I:~un:t~a~e <xde~ - pe~ha~ y~ur purcha=in~ ~t will ~ thi= fown to I~ =~

Date:Initial:Date processed:Membership #

AUUG Inc. as a user group, exists to provide UNIX@ and open systemsusers with relevant and practical information, services, and educationthrough cooperation among users.

Page 26: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

UNIXeAND OPEN SYSTEM~ U~R8

To apply for AUUG membership, complete this form and return it with payment in Australian dollars to:REPLY PAID 66, AUUG MEMBERSHIP SECRETARY,P.O. BOX 366, KENSINGTON, NSW 2033, AUSTRALIA

withheld from m~iling lists m~:leTel: +61 2 9361-5994 or 1 800 625 655 ¯ Fax: +61 2 9332-4066 ava~la~e

Renewal/New membership of AUUGRenewal/New Student membershipInternational air mail

rules and by-laws of AUUG as in force from timeto time, and that this membership will run fremtime of joining/renewal until the end of thecalendar o~ financial year.

TOTAL REMITTED: AUD$Oa~l

You can participate in the activities of a local AUUG Chapter. Part of your fee will be given to the chapter to support those activities. Bydefault a regional chapter will be selected for you. If you would rather nominate a chapter-, please specify here

(indicate NONE for no chapter).

To BEttER SERVE You, PLEASE PR=N’r YOUR Com’Ac’r INFORMATION: S’rUOEKr MF.~BER

Name/Contact: I, certify that(~mir,~-~

iPositiorVTitle: is a full time student at

Company:(n=~)

and is expected toAddress: graduate a~oximately

Tel: BH AH

Fax: BH AH ,-~,~"~ ::

email address:Ov~ tot Institutional Membership r~ 0~

~!~¯~¯¯~¯~°~°~¯¯~°°~¯~¯~°~¯~°~°¯~‘~*~‘~°~¯~°~°~°~¯¯~°~°¯¯~¯~¯~‘~¯°~°~‘~°¯‘~‘~¯*~¯~°~‘~*~°~¯~¯¯~‘‘‘~¯*~¯*~*~e~’~’~’~’‘~*~w¯‘~‘~S~‘~‘‘~*~’‘~’~‘~‘~*¯~¯*~‘¯¯~‘~‘~*~’~‘~z~**~*¯¯~¯~¯~¯

Please charge $~ Bankcard,Account number:Expiry date:Name on card:Signature:

to myVisa, ~ Mastercard

’"~’~;"[~ ................................................ bsb ....................................................................a/c #

Date: $Initial:Date processed:

........................................................................................

AUUG Inc. as a user group, exists to provide UNIX@ and open systemsusers with relevant and practical information, services, and educationthrough cooperation among users.

Page 27: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

TAME THE WILD WEBHYPERWAVETHE NEXT GENERATION WEB

SOLUTION

HERMANN MAURER 0 201 40346 3

SPECIAL AUUG PRICE" $59.45

(RRP $69.95)

Written by the team that created Hyper-G and itscommercial version HyperWave, this book is thedefinitive reference for the next generationhypermedia system for the Internet. If you have alarge, complex and highly dynamic information space,and/or if you have, or are seeking to create, a highquality multi-author environment - read this book!

The CD-Rom includes an evaluation copy of theHyperWave server, the native UNIX and MS-Windowsclients as wall as the HyperWave administration tools.

Hyper-G was conceived and developed at the IICM of Graz University of Technology inAustralia by a team headed by Hermann Maurer and Frank Kappe, both prolific and widelypublished authors.

"FINALLY, SOME SORELY NEEDED STRUCTURE FOR THE WILD WEB."

-JAKOB NIELSEN, SUN MICROSYSTEM$ DISTINGUISHED ENGINEER, USA.

1 5% DISCOUNT FOR ALL AUUG MEMBERS

I would like to order __ copy/copies of HYPERWAVE at the special AUUG price of $59,45 ($69.95 Jess 15%) = $

AUUG Membership no"

__ I enclose a cheque for $

__ Please charge my credit card

Card No

Name

OR

_ Bankcard _ Visa _ Mastercard

Exp date

RETURN TO:Trade Marketing CoordinatorAddison Wesley Longman

95 Coventry StreetSouth Melbourne 3205

Ph: 03 9697 0664Fax: 03 9699 2041

Title & Organisation

Address

State

Phone

Postcode

Fax

AddisonWesley

Longman

Page 28: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

News from the NSW Chapter

If you have any questions, please email the AUUGChapter committee(cauug. committeeOauug, org. au),or the Interne[ Project Management Committee(ipmc@pcug. org. au), or contact myself or anothercommittee n-tember.

Bishop

FAREWELL BERNIE!

Bernie Goodheart has recently resigned as presidentof the NSW Chapter of AUUG. Bernie is returning tothe UK after 8 years in Australia. Thank you Berniefor your efforts over the last 18 months as President;it’s been fun. We look forward to seeing you outhere for future Sun-~mer Conferences.

News from the NSWChapterNSW Chapter has monthly meetings on the thirdThursday of each month upstairs at the OccidentalHotel, York St Wynyard.

AUGUST MEETING

The August meeting was held on the fourthThursday and had three features. The first featurewas Frank Craw ford who spoke about SAGE-AUConference which was held in Brisbane in July. Notmany NSW members had made the trek toQueensland for the Conference and were keen tofind out what had taken place.

Frank spoke in some detail about the paperspresented by Dinah McNutt from the US. Dinah’smethods of managing large numbers of systemscontained something useful for everyone. Frank thencovered the other talks at the conference, includingsuch topics as the migration from windows 3.11 toNT, Certification and Authentication methods,UNIX Security, on-line regulation, Auscert andevent management, amongst other topics. Frank’stalk was well received, talking about a conferencesounds dry but he brought it to life, and there wasdiscussion on a range of issues raised during theconference.

The second feature was a stump theexperts/question and answer session. Membersasked questions of the gathering, and I think we didquite well, we could answer questions on theintricacies of Windows 95, ufsdump on Solaris 2.5failing in certain hardware, the merits of differentrevision control software, and cheap effective helpdesk systems. The stumper was "I boot my DECalpha from the install cdrom to restore root but theboot cd kernel does not include tape devices, whatcan I do? .... Install linux", someone suggested.

The third feature was the after meeting drinks anddinner, catching up with old friends and meetingnew members.

UPCOMING MEETINGS

SeptemberNSW will not hold a meeting in September as thiswould be the same week as the AUUG winterconference.

OctoberOur October meeting will have John Terpstra talkingabout the latest developments in SAMBA.

NovemberOur November meeting will be by Bruce Howarthfrom the University of Technology in Sydney whowill talk about advances in performancemanagement and capacity planning.

We look forward to seeing you come along andsupport the local chapter meetings.

CONTACTS

Wayne BellPresidentwbell@sydney, dialix, oz. au

David PurdueSecretarydavid, purdue@aus, sun. com

auug-nsw-committeeauug-nsw-exec@auug, org. au

Volume 17, Number 4 29

Page 29: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Canberra Chapter: September 96 newsletter

Canberra Chapter:September 96newsletterDATES OF FUTURE MEETINGS:

8 Oct and 12 Nov at Open Solutions Centre

AUUG Inc. - Canberra Chapter - September 1996newsletter

SEPTEMBER MONTHLY MEETING

When:7:30 pm for 8:00 pm, Tuesday, 10 September 1996

Where:Open Solutions Centre, 15 Barry Drive

Speaker:Tony Shepherd

Topic:Identifying and Responding to Information SecurityRisks

ABSTRACT

Computer intruders are individuals that range fromthe curious to the those who maliciously damageyour system. These people are not innocents that are"just having fun". They are criminals whose actionsare costly in terms of computer down time, extrawork for system administrators, and the stress itoften causes those involved. Computer intruders canbe members of staff that attack the system fromwithin, or external perpetrators that try and gainunauthorized access from the external network.Anyone who has a computer network connected tothe world, whether via the Internet, modem banks orX.25, is at risk.

This presentation will discuss how to assess yourrisk and to determine where the real risk lies. Thetalk will discuss a number of different kinds ofattacks that are commonly reported to AUSCERT,ranging from the curious probe to a fully blowncompromised network involving sites world wide.It will also cover procedures that should be followedin the event of an unauthorized intrusion, and howsites can recover and use the experience to decreasethe chance of further attacks. Techniques andprocedures that are useful in detecting an intrusionwill be highlighted, as will some tools that can beused to lessen the chance of a successful attack.

BIO

Tony Shepherd is a member of the AustralianComputer Emergency Response Team (AUSCERT)based in the capital of Queensland, Brisbane. Hegained First Class Honours at the University ofQueensland with a double major in ComputerScience and Mathematics. Tony has four yearsexperience in the information technology industry,specialising in computer systems security andsystem administration. His experiences range fromassisting sites with computer security issues andanalysis of computer security vulnerabilities, to theimplementation of computer security systemsdesigned to prevent unauthorised intrusions. Tony’sexperience within AUSCERT places him in a uniqueposition to analyse and present trends in computersecurity incidents on the Internet.

REMINDER!

A reminder to all AUUG members who are alsomembers of the PCUG/AUUG Internet Project(commonly known as TIP) that the revisedAcceptable Use Policy (AUP) comes into effect from1st October 1996, and that you MUST sign adeclaration that you accept the Internet Project’sAcceptable Use Policy by that date, or your access toTIP will be suspended.

The AUP details what is and isn’t allowed withregard to use of TIP, and sets out the rights of usersand the actions that can be taken upon breach ofthese terms and conditions. The AUP has beenrevised on the basis of legal advice, and is designedto protect your rights as a user of the system, and ofother users.

Declarations need to be signed by a person over 18years of age, and in the presence of an AUUGcommittee member, a PCUG committee member, ora PCUG Staffer (at the PCUG Centre - see below).

Note that if you do not sign the Declaration by 30thSept 1996, your TIP account will be suspended untilwe hear from you. If you do not wish to accept therevised AUP, please let us know. TIP will refund thepurchase price of any unused Advanced Access timeallocation you may have (less the minimum usagefor the period since 1st Feb 1996), and will close yourTIP account.

Copies of the Acceptable Use Policy and theDeclaration form will be available at the ChapterMonthly Meetings (second Tuesday of each month),and are also available at the PCUG Centre, 3/17Dalby Street, Fyshwick, open 9am-5pm eachSaturday and Sunday.

28 AUUGN: The Journal of AUUG Inc.

Page 30: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

From the Western Front

From the WesternFrontEdited by Tom Hallam <thallam @geol. uwa. edu. au>

MEETING INFORMATION

WAUG meets at the Freeway Hotel, 55 Mill PointRoad, South Perth. We meet at 6:15pm on the thirdWednesday of each month.

Our meetings are advertised in the Diary column ofthe Computers section of Tuesday’s /,’VestA ustralian.

If you need further information about the nextmeeting, please contact Mark or one of thecommittee.

SPEAKERS ARE NEEDED, especially ones who canactually commit to giving a talk on a certain date! Soif you can give a talk, or know someone who can,please let us know. Mark (our meeting organiser)cannot produce them out of thin air. SAGE alsoneeds speakers (See Local SAGE-AU below)

WAUG EMAIL ALIASES, NEWSGROUPSAND WEB PAGEWAUG l~as the following mail aliases onuniwa.uwa.edu.au:

waug-membershipfor membership enquireswaug-chairour Chairperson

waug-meetingsour meeting organiserwaug-secretaryour Secretary

waug- news i e t t e rfor newsletter contributions or enquires

waugfor general correspondence (will be read by theSecretary, as a paper letter would be).

So, for example, you may send generalcorrespondence to waug@uniwa, uwa. edu. au.

Check us out on the World Wide Web at:http : //www. auug. org. au/auug/waug/waug, html

(thanks Canberra AUUG).

Also see the newszroups wa. waug andaus. org. auug for announcements and discussion.

COMMITTEE CONTACT DETAILS

Chair:

Vice-chair:

Secretary:

Treasurer:

MeetingOrganiser:

OrdinaryCommittee:

Don Griffith 351 7691grif fith@cs, curtin, edu. au

Luigi Cantoni 474 3700lui@DIALix, oz. au

Tom Hallam 380 2665thallam@geol, uwa. edu. au(AUUGN Sub-editor)

Patrick Ko 483 8111pko@DIALix, oz. au

Mark Baker 491 6081baker@telecomwa, oz. au

Daniel Baldoniflint@cs, curtin, edu. au(Meeting Reporter)

David Buckdbuck@ncc, telecomwa, oz. au

Glenn Huxtable 328 8288glenn@ fs. com. au

Peter Wemm

FOR SYSTEMS ADMINISTRATORS:LOCAL SAGE-AU MEETINGS

The WA Regional Group of the SystemsAdministrators Guild of Australia (SAGE-AU)

meets on the First Tuesday of each month at 6pm,in room G3 at the AlexanderLibrary If youmanage computer systems for a living, we’d like tohave you along.

SAGE-AU is NOT another UNIX group. All systemsand network administrators are welcome. Wewould particularly like to see more PC networkadministrators attending, so if you know any, sendthem along. I’d like to see lots of Novell, NT, OS2and MAC people attending.

For more information, please contact Don Griffiths<grif fith@cs, curtin, edu. au>, (09) 351 7691or myself, Tom Hallam<thallam@geol. uwa. edu. au>, (09) 380 2665. Forinformation about SAGE-AU in general, you mayalso look atftp: //ftp. sage-au, org. au/pub/SAGE-AUand http : //www. sage-au, org. au : 8080/.

Volume 17, Number 4 27

Page 31: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

20% DISCOUNT TO AUUG MEMBERSPlease send me a copy/copies of the following book ~

Red Hat Linux UnleashedISBN 0672309629 Binder $89.95

Apache Server UnleashedISBN 1575211475 Paper $89.95

Running a Perfect Web Site with ApacheISBN 0789707454 Binder $84.95

Web Server HandbookISBN 013239930X Paper $79.95

Netware to [nternet GatewaysISBN 0135217741 Binder $89.95

Building Linux Internet ServerISBN 1562055259 Paper $64.95

Building a Unix Internet ServerISBN 1562054945 Binder $54.95

$71.95

$71.95

$67.95

$63.95

$71.95

$51.95

$43.95

AUUG members receive 20% discount below recommended retail pricePlease send me the selected book/s on 30-Day approval

Name:Position:

Address:

Expiry Date:

Signature:

Position:

Telephone:

[--] Enclosed cheque for $ (Payable to’Prentice Hall Australia’)

[--] Charge to me OR ~ Company purchase Order No.

[~ Please charge my: [--] Bankcard I--] Visa I-1MasterCard

Credit Card No: l I I ! II I I I II I I I II ! I II

Mail or fax completed order form to Prentice Hall. Australia,PO Box 151, Brookvale NSW 2100

OR (’~ Use our PHONE SERVICE by callingJan Blenkinsop SYDNEY (02) 9907 5693

PRENTICE HALL AUSTRALIA7 Grosvenor Place, Brookvale NSW 2100Tel: (02) 9939 1333 ¯ Fax: (02) 9905 7934 A .C.N 000 383 406

Please add my name to your mailing list in thefollowing areas: (please list subject areas)

i

Page 32: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

have heard of the Internet, but I would think thattheir experience with Internet would be very new.

Australian Internet consumers need to take care ofbuying internationally. Australian laws wouldapply to Australian sellers, but not necessarily tointernational sellers. Unless you have lost a fairfraction of a million dollars, I would not even beginto consider litigating a company located in anothercountry. But, you can cancel credit card transactionsfor goods not received or wrongly charged throughthe local credit card organisation.

The book is readable and has useful information forpeople who participate in the Internet, but its utilitydepends on the reader and how Internet "streetsmart" they are.,

is your journal!

Without you, there is noAUUGN: if you’veknowledge to share,share it through AUUG’sbimonthly journal.

You’ll be reaching over700 individuals, and morethan 300 organisationsinvolved in the UNIX/Open Systems world.

We’re looking for:

Talk to your localChapter contact forideas, and seeelsewhere in thisissue for submissionguidelines.

-Papers-Reviews-Articles-News-Comment

uest Consulting Pty Ltd17 Ruth StreetWilstonBrisbane QId 4051Phone 0411 405 256 Fax 07 3304 5130

Capacity Planning ToolsSystem Modelling Tools

Performance Management SoftwareAutomated OperationsWorkload Management

Project Management ToolsMIS Reporting Software

productivity tools, helping you take care of the future.

A.C.N. 123 456 789

Volume 17, Number 4 25

Page 33: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

PERL 5 DESKTOP REFERENCE

by Johan VormansO’Reilly and Associates1996, 39 pp., $9.95ISBN 1-56592-187-9

Reviewed byFrank CrawfordANSTO<frank @ansto.gov.au>

This is a mini-review for a mini-book. The _Perl5Desktop Re[erence is basically an update of thereference card that is distributed with the PerlReference Manual. Unfortunately, the changes thatoccurred from Perl 4 to Perl 5 meant that theprevious reference card was missing manyimportant features.

This has now been corrected, and the new card liststhe syntax and all the functions now found in Perl 5,including both arguments and return values. Whileit is no longer possible to include all the details on a"card", the booklet itself, is not very large, beingslightly smaller in dimensions than the card.

The value of such a booklet cannot be overestimated, as, for simple queries, it is much moreconvenient than either a manual or online help.From discussions with WoodsLane, apparentlymany others agree, as this is one of their biggestselling items at the moment.

If you are using Perl 5 for anything (or even stillusing Perl 4), this booklet will be of invaluableassistance, and you should race out and get a copy.

BANDITS ON THE INFORMATION

SUPERHIGHWAY

by Daniel J. BarrettO’Reilly & Associates Inc.1996, 246 ppISBN 1-56592-156-9

Reviewed byAlex Kowalenko<alex @ mpx. com. a u>

Crime and computers have always gone together.Since the earliest James Bond book to the Internet,the perception is there, that computers can aid therouge gangster to achieve his goals. I might begeneralising here, but the target has been alwaysbeen other banks, other corporations, othercountries. In a word, someone else.

Many books are available about protecting ourcomputers and their precious contents from rouge

hackers. Stories about famous hackers circulate inthe popular press. Methods of constructingfirewalls, corporate security standards, andencryption are available, but what about protectingourselves?

In our modern cities people have codes of conductthat protect us from people with undesirablemotives. We lock our cars and homes, we arecareful where we walk alone, and we are carefulwhat we say and display to other people aboutourselves. We have a sense of "street smarts" thatguide our behaviour.

"But the Internet is differen!!" cries the newbiesurfer. "It’s one big happy global village!" Is it?Who are the members of the of this new village?Aren’t they the same members of this oldunfashionable planet. Then why do we think thateveryone would have adopted the ethics of this newglobal village?

Daniel Barrett has written a book on this subject. Hegoe.s through various situations people have foundthemselves in. These vary from meeting people onthe Internet, buying and selling on the Internet,business scams and issues involving privacy.

For instance, many of us would not think of placinga list of our home’s contents outside our home foreveryone to read. We don’t even leave our curtainswide open so that everyone can see what we have.It’s an advertisement to burglars. But people arewilling to list a catalogue their collection of recordsin their home page, boast about their new computerin newsgroups, list their expensive hobbies next totheir home address on their online resume.

For people who have been using the Internet forsome time, they would have heard about some thestories that Daniel lists in his book, or heard, or evenexperienced similar stories. But for new starters, it’sjust one big new cyber world, without any ofproblems in the current world we live in.

I would recommend the book to new starters on theInternet, it lists some of the problems that people canget themselves into if they are not careful. But forpeople who have been using the Internet for a while,they would have developed their own Internet"street smarts". Reading the book would confirmsome of their ideas, but also there are things that youcan learn. But, I don’t know whether I would pullout the pull-out card "15 ways to spot a InternetBandit" and stick it to my monitor.

One feature that devalues the book in Australianeyes is that it discusses American law, and listAmerican consumer protection agencies. No doubtAustralian constimer protection agencies would

24 AUUGN: The Journal of AUUG Inc.

Page 34: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

the network management in general. But as a firstreading on either SNMP or network management,the book is hardly suitable. The novice readerwould better start from something like Chapter 25 ofTCP/IP Illustrated, Vol. 1 by W R Stevens or asimilar material and use the Simple Book as a secondreading.

At the end, another word of caution. Throughoutthe book, the author ridicules the OSI approach tonetwork management. Though I largely agree withhis arguments, the way of total rejection is a bit’religious’ and should be treated with caution.

Overall, the Simple Book is a good quality reading.For those who are well prepared to tackle it, thebook provides a wealth of details and theinformation that is very hard to find anywhereelse.,

ENTERPRISE NETWORKING: DATA LINKSUBNETWORKSby James Martin, Kathleen Kavanagh Chapman& Joe LebenPrentice Hall New Jersey1996, 431 ppISBN 0-13-507575-0

Reviewed byPeter Lane<peterl @ acslink.net.au>

My first mistake was to take this book to work, to"read during lunch". It was immediately secondedby a colleague who is studying a TAFE level IT/IMcertificate, and just happened to be doing DataCommunications this term. The book promptlydisappeared for two weeks, and was returned to mydesk with a small note. Apparently, my colleaguewould like to have kept the book for longer and theyhad found it reasonably useful, especially thesections describing different network topology’s.Finally, they recommended the book for "newstudents".

So I started reading. Frankly, I found it pretty ,tedious. This surprised me, as my first impressionson first pulling it out of the package and having aquick scan through were that it promised to be afirst-class presentation. In fairness, however, thebook appears to be designed as a reference volume ’rather than a cover-to-cover read, and serves thatpurpose quite well. By this stage, I’d managed towork out why the sub-title; Data Link Networks.This is a companion volume to another volumeentitled Enterprise Networking." Strategies andTransport Protocols. When I first received Data Link

Subnetworks, I was very keen on obtaining theTransport volume as well; by the time I’d finished itI wasn’t so keen any more.

The organisation of the volume is quite logical.There are 25 chapters organised as four parts, andfour Appendices.

Part I is titled Fundamentals,and covers theexpected material - definitions, the OSI Referencemodel (surprise! surprise!), interactions between theTransport and Data Link layers, architectures,applications and the Transport Layer in brief.

Part II deals with the underlying technologies thatform the foundation of the Data Link layer, coveringNetwork Driver software, Physical transmissionmechanisms, repeaters and hubs, and basic protocolsand protocol linkages.

Part III covers WAN technologies, specificallyLeased Line type circuits, X.25, ISDN, Frame Relay,ATM and Wireless WAN links. Each technology isdescribed precisely and concisely, showing howeach differs. The analysis is particularly focused onthe packet structure and the Data Link protocols.

Part IV does the same thing for Local Areatechnologies - Ethernet, Token Ring, Token Bus andARCnet, FDDI, Apple LocalTalk and Wireless LAN(wireless uplinks - not pervasive networks). Anadditional chapter covers the details of theMetropolitan Area network standards.

The Appendices comprise an annotated listing ofStandards Organisations (which I probably wouldhave found useful as a studen.t), a description of theOSI Reference Model, a description of theIEEE/ISO/ANSI LAN Architecture, and a glossary.

Which brings us back to the recommendation of mycolleague, in my first paragraph. Despite the backcover marketing blurb, this book is primarily suitedfor student reference use. Secondarily, it could wellserve as a reference for a communicationsprofessional who specialised in a particular area ofthe field, but occasionally needed a reasonablydetailed reference for other sub-specialities.Cynically, I believe that Prentice Hall may well berelying on the previous reputation of one author toattract buyers for this volume. Certainly, in myopinion the volume could have been easily compiledby any reasonable competent researcher. However,the finished result certainly merits a place on yourbookshelves if either of the above conditions applies;and if you can cost-justify it!,

Volume 17, Number 4 23

Page 35: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

as a reference book for a computer professional, it isless than ideal. With the plethora of books on Javanow available in the bookstores, there must be othertexts which are superior reference works for Java. ~

THE SIMPLE BOOK: AN

INTRODUCTION TO NETWORK

MANAGEMENT

by Marshall T. RosePrentice Hall PTR1996, 294 pp, CD-ROM included, hardcoverISBN 0-13-451659-1

Reviewed byMichael Haldey<mhaldey @ ozemail, com. a u>

The Simple Book is a book about the InternetNetwork Management Framework (written by oneof its designers), specified by the Simple NetworkManagement Protocol (SNMP). The second revisededition of the Simple Book reflects the currentcondition of the framework specified in the SNMPversion 2 documentation.

The author concentrates on the conceptual anddescriptive sides of the specification. Theimplementation issues which were present in thefirst edition were removed from this edition. Areference.to another book of the same author isgiven for those who are interested.

The Simple Book consists of six chapters and threeappendices.

The first Chapter is a brief introduction into thebook.

The second Chapter is an introduction into theframework outlining the main concepts and themodel behind SNMP. The sections present theoverviews of the network management protocol(traversal, traps, transport mappings), themanagement information (managed objects, proxyrelationships), and the data representation (thissection is basically an introduction to ANS.1).

Chapter 3 deals with the management information.It is divided into four sections, describing thestructure of the management information (formaldescriptions using ASN.1), MIB modules,conformance statements, and coexistence.

Chapter 4 describes the Administration model whichis supposed to define authentication, privacy andauthorisation policies. As the current SNMPframework still doesn’t do it properly, the author

just concentrates on the terms, tasks and definitions.The Chapter is fairly short.

Chapter 5 examines the protocol operations in themanagement framework. Overall, it is the mostdetailed and useful chapter, as it explains how allthe pieces are working together. The author startsfrom discussing the styles of the interaction betweenSNMP entities, then move to the descriptions of thevarious requests and operators. Special attention ispaid to the conceptional rows (’tables’). The chapteralso presents the Transport Mapping with variousprotocols, and obviously, BER and serialisation(transforming ASN.1 defined information into theoctet strings).

The last Chapter, which is more rather conceptionalthan technical discusses some existing problems aswell as possible future extensions of the framework.

The Appendices provide a lot of additionalinformation on the Intemet standards anddocuments, related RFCs and the other resources for ¯further studies of the theory and implementations ofthe framework. A few implementations are providedon the attached CD-ROM.

Overall, the book is the most complete description ofthe Internet Network Management Frameworkavailable today. It is very detailed with many formaldescriptions. The author’s writing style is quitegood; he is even trying to make some fun out of theoften boring material. Numerous ’soapboxes’informally present some ’behind the scenes’information, background material, historic issues,etc. Throughout the book, a lot of attention is paidto further development trends and SNMPvlcompatibility issues.

This quality presentation still doesn’t mean that thebook is ’simple’ or even easy to read. It looks likethe author tries to achieve two not very compatiblegoals - make the book ’simple’ and provide a lot ofdetails and formal descriptions. In the Simple Book,the second goal was achieved, but the formality andan amount of formal ASN.1 descriptions hasoverloaded the text with details and made theoverall picture very hard to see. Unfortunately, theintroductory Chapter 2 is not well-structured, withfew examples. You wouldn’t find a lot of schemaseither. (Another ’wish-list’ item - why not to putrelated RFCs to the CD-ROM?)

So, despite the title, the Simple Book is not really’simple’. It is the best for advanced readers whohave some understanding of the subject and needmore details about the framework. These readerscan consider the book an introduction to the networkmanagement as well. A lot of background materialwould allow a reader to get some understanding of

22 AUUGN: The Journal of AUUG Inc.

Page 36: U iXminnie.tuhs.org/Archive/Documentation/AUUGN/AUUGN-V17.4.pdf · The Journal of AUUG inc. Volume 17, Number 4 August 1996 SAGE-AU96 wrapup ~Is the Internet anti-, ~rcial? of Java

Book Reviews

create an environment to create and use it, evenproviding quite a comprehensive overview ofthelanguage features. But when it comes to the crunch,when you actually want to write something andthink, well how do I do this, the answer’s just notthere! Very annoying!

In a little more detail, the book contains 14 chaptersand 2 small appendices. The first 4 chaptersintroduce the concepts of interactive content andJava, using Java applets and applications, and a briefoverview on installing the Java Developers Kit(JDC). It is not until chapter 5 that any Java code isintroduced, and then it is the usual "Hello World!"application and applet.

Chapters 6 through 13 then provide an overview ofthe various language features. These cover the basiclanguage constructs (data types, expressions, andcontrol structures), the concept of classes (andinterfaces and packages), threads and exceptions,the various standard Java and HotJava classlibraries, and finally interfacing with native code.Each of these chapters include a number of codefragments and example programs illustrating theconcepts being discussed. These are good as far asthey go. The author also tries to sketch the range ofentities available and how to use them, but withinsufficient detail for this to be a suitable reference. Ifelt it gave me some idea of the language and librarycapabilities, but not sufficient knowledge to branchout and write code of any depth.

The final chapter 14 introduces the Java VirtualMachine, the virtual architecture that Java programsare compiled down to and run on. Again, whilstintroducing the various ideas, there is a frustratinglack of detail, just when things look like gettinginteresting.

The appendices briefly provide a guide to othersources of information, and briefly sketches thecomponents in the AWT window library used byJava applets.

The book also includes a CD-ROM. This contains an(inevitably superseded) copy of the Java DevelopersKit for Win 3.1, 95, NT, and for Solaris 2.x. It alsocontains a number of sample applets, and copies ofthe code examples from the book. Virtually all of thecontents can be trolled relatively easily off the net, sothere’s nothing critical here, useful though it may beto some to have it collected together.

In summary, this book disappointed me by notliving up to its promise. For someone with abackground as a competent C/UNIX programmerlike mine, this is not the book you want. Perhaps forsomeone interested more in the managementperspective, wanting to know what the Java

phenomena is about, and to get some idea of itscapabilities without getting lost in the details, thismay well be appropriate - it does have some goodconceptual introductions. To be fair to the author,the book deals with a very large field, and clearlyseems focused as an introductory book.Unfortunately that means the depth of detail wassacrificed. So consequently, in my opinion, itscoverage is just too superficial to make this asuitable a book for technical experts.,

PRESENTING JAVA: AN INTRODUCTIONTO JAVA AND HOTJAVA

by John DecemberSams.net Publishing1995, 207 ppISBN 1-57521-039-8

Reviewed byPeter Williams<Peter. Williams @ dsto.defence.gov.au>

This book is aimed at the casual reader rather thanthe accomplished computer user. Consequently,approximately half of the book consists of hypeabout the potential of Java with respect to the WorldWide Web which would have been interesting had itnot been so repetitive. The difference in contentbetween Section One (Understanding the Potentialof Java and the Web) and Section Two (ExploringJava’s Potential) was insufficient to hold thisreviewers interest. In addition, the repetition ofinformation from chapter to chapter within each ofthese sections was high enough make them a veryboring read.

Section Three of this book gives a brief butinformative account of how to obtain and use theHotJava browser. As the author states, theinformation in this section will quickly becomedated due to the rapid development of HotJava.Nevertheless, this section.would prove useful ingetting HotJava up and running.

Section Four of this book gives a fairly shallow butthorough description of the Java language. As forthe previous section, the information in this sectionwill become dated as Java evolves but still providesa good starting point. The book has threeappendices (A: Further Information Sources, B: JavaLanguage Reference and C: HTML Tag References)which nicely encapsulate most of the usefulinformation contained in the book.

In summary, this book may appeal to the casualreader who wishes to gain a better understanding ofJava’s potential contribution to the Web, However,

Volume 17, Number 4 21