Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

The UNIX way

Name: Anonymous 2013-02-09 19:27

What's so cool about the UNIX philosophy? What would a heavy UNIX philosophy operating system look like? What is the most heavy UNIX philosophy operating system out there at the moment, besides UNIX itself?

Name: Anonymous 2013-02-09 19:29

Define your terms, unless you like being confused by the answers.
The answer is always Plan 9, but the reasons vary depending on what you think constitutes the Unix philosophy.

Name: Anonymous 2013-02-09 19:31

Name: Anonymous 2013-02-09 19:32

How does the GUI work in Plan 9? I can't imagine a GUI system that works in a way UNIX puritans would approve of, though maybe that's because X has warped my mind.

Name: Anonymous 2013-02-09 20:25


IMAGINE AN OS WHERE YOU CAN DO ANYTHING YOU WANT
AS LONG AS YOU COMPILE THE SOFTWARE YOURSELF
AND RUN IT ON A VT220
THAT'S THE UNIX WAY

Name: Anonymous 2013-02-09 20:35

There should be a documentary on Unix.

Name: Anonymous 2013-02-09 20:40

>>4
Three button mouse, all the apps happen to be ACME. Every mouse button does one thing in ACME: select text, execute command and load file. I think Oberon had a similar GUI workflow.

Name: Anonymous 2013-02-09 21:04

>>1
The big thing about UNIX and Unix-like systems is the insistence on decomposing the entire system into small components with a lightweight interface. You can contrast this with IBM (or to a lesser extent, Windows) systems where programmability requires interfacing with a large, inflexible framework of some kind. On UNIX, you just reach into the guts and pull out what you need. Some people will emphasize text orientation as a major component of this, but it's really just the way interaction is typically enabled.

>>4,5
Yup. The big evolution is that you can easily yank text around both the shell and the editor to mung and re-execute. There's no more struggling with screen or the X clipboard to move text somewhere for a one-off job. All your interaction with the system is still defined by the text, but you now have less friction involved in designating what text to use.

Name: Anonymous 2013-02-09 21:27

>>7
I understand how it works from the user's point of view (and I think it's pretty neat, actually) but how is it organized? Graphical objects aren't text or files. You can't pipe them or manipulate them in the same way you can with everything else in UNIX (or am I wrong?)

>>8
struggling with screen or the X clipboard
I also wish they'd implemented that better. The X clipboard feels too ``meta''.

Name: Anonymous 2013-02-09 22:14

>>9
Interactive data like GUIS or network devices that postdate Unix are really where it falls down, hard. Every system in common use gave up on providing a unified model for these; you have to use an API of some sort (Xlib, Berkeley sockets) to talk to them.

Plan 9 ``solves'' the problem by allowing any component (not just the kernel!) to expose itself as a file system. So, for example instead of doing an API call to change the contents of a window you can just open the file that represents its contents and write to it.

Name: Anonymous 2013-02-09 22:23

>>6
>There should be a documentary on Unix.
Here is an one: http://www.youtube.com/watch?v=tc4ROCJYbm0

Name: Anonymous 2013-02-09 23:36

GNU > UNIX

Name: Anonymous 2013-02-10 0:58

>>12
LLLLLEEEEEEEEEEEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLL
>EGIN LE SAGE!
>LE FAGGOT
>EGINGOINGWINZIMSIN GRO!!!!! XDDDDD

Name: Anonymous 2013-02-10 4:17

>>11
Thanks a mega.

Name: Anonymous 2013-02-10 4:18

>>14
LLLLLEEEEEEEEEEEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLL
>EGIN LE SAGE!
>LE FAGGOT
>EGINGOINGWINZIMSIN GRO!!!!! XDDDDD

Name: Anonymous 2013-02-10 12:37

>>10
Plan 9 ``solves'' the problem by allowing any component (not just the kernel!) to expose itself as a file system. So, for example instead of doing an API call to change the contents of a window you can just open the file that represents its contents and write to it.
That sounds like a good idea since the tools and ``interfaces'' are already there, but it seems kind of superfluous. On the back end of things, wouldn't it just be running some system call or library function I could have ran directly instead of accessing through a file?

Name: Anonymous 2013-02-10 13:26

>>16
nigga the only api u need is

open()
read()
write()
flush()
close()
ioctl()

Name: Anonymous 2013-02-10 13:29

Powershell.

Name: Anonymous 2013-02-10 13:31

>>16
Perhaps, but that way it's guaranteed standardisation across the whole system. Consider how different image libraries each have different interfaces - with plan9, this would not be the case. You'd just choose an image format and the resulting library/file operations would be identical.

Name: Anonymous 2013-02-10 13:34

>>18

d8888b.  .d88b.  db   d8b   db d88888b d8888b. .d8888. db   db d88888b db      db           d888888b .d8888.                       
88  `8D .8P  Y8. 88   I8I   88 88'     88  `8D 88'  YP 88   88 88'     88      88             `88'   88'  YP                       
88oodD' 88    88 88   I8I   88 88ooooo 88oobY' `8bo.   88ooo88 88ooooo 88      88              88    `8bo.                         
88~~~   88    88 Y8   I8I   88 88~~~~~ 88`8b     `Y8b. 88~~~88 88~~~~~ 88      88              88      `Y8b.                       
88      `8b  d8' `8b d8'8b d8' 88.     88 `88. db   8D 88   88 88.     88booo. 88booo.        .88.   db   8D                       
88       `Y88P'   `8b8' `8d8'  Y88888P 88   YD `8888Y' YP   YP Y88888P Y88888P Y88888P      Y888888P `8888Y'                       
                                                                                                                                   
                                                                                                                                   
 .d8b.  d8888b.  .d88b.  db    db d888888b       .d8b.  .d8888.      db    db d88888b d8888b. d8888b.  .d88b.  .d8888. d88888b     
d8' `8b 88  `8D .8P  Y8. 88    88 `~~88~~'      d8' `8b 88'  YP      88    88 88'     88  `8D 88  `8D .8P  Y8. 88'  YP 88'         
88ooo88 88oooY' 88    88 88    88    88         88ooo88 `8bo.        Y8    8P 88ooooo 88oobY' 88oooY' 88    88 `8bo.   88ooooo     
88~~~88 88~~~b. 88    88 88    88    88         88~~~88   `Y8b.      `8b  d8' 88~~~~~ 88`8b   88~~~b. 88    88   `Y8b. 88~~~~~     
88   88 88   8D `8b  d8' 88b  d88    88         88   88 db   8D       `8bd8'  88.     88 `88. 88   8D `8b  d8' db   8D 88.         
YP   YP Y8888P'  `Y88P'  ~Y8888P'    YP         YP   YP `8888Y'         YP    Y88888P 88   YD Y8888P'  `Y88P'  `8888Y' Y88888P     
                                                                                                                                   
                                                                                                                                   
 .d8b.  .d8888.         d88b  .d8b.  db    db  .d8b.        .d8b.  d8b   db d8888b.      d8888b. db    db       .d8b.  .d8888.     
d8' `8b 88'  YP         `8P' d8' `8b 88    88 d8' `8b      d8' `8b 888o  88 88  `8D      VP  `8D `8b  d8'      d8' `8b 88'  YP     
88ooo88 `8bo.            88  88ooo88 Y8    8P 88ooo88      88ooo88 88V8o 88 88   88        oooY'  `8bd8'       88ooo88 `8bo.       
88~~~88   `Y8b.          88  88~~~88 `8b  d8' 88~~~88      88~~~88 88 V8o88 88   88        ~~~b.  .dPYb.       88~~~88   `Y8b.     
88   88 db   8D      db. 88  88   88  `8bd8'  88   88      88   88 88  V888 88  .8D      db   8D .8P  Y8.      88   88 db   8D     
YP   YP `8888Y'      Y8888P  YP   YP    YP    YP   YP      YP   YP VP   V8P Y8888D'      Y8888P' YP    YP      YP   YP `8888Y'     
                                                                                                                                   
                                                                                                                                   
.d8888. db       .d88b.  db   d8b   db                                                                                             
88'  YP 88      .8P  Y8. 88   I8I   88                                                                                             
`8bo.   88      88    88 88   I8I   88                                                                                             
  `Y8b. 88      88    88 Y8   I8I   88                                                                                             
db   8D 88booo. `8b  d8' `8b d8'8b d8' db                                                                                          
`8888Y' Y88888P  `Y88P'   `8b8' `8d8'  VP                                                                                          
                                                                                                                                   
                                                                                                                                   

Name: Anonymous 2013-02-10 14:58

>>19
It would also be slow and fat as shit.

Name: Anonymous 2013-02-10 15:01

>>21
Not really. Compilers optimise stuff, you know. And file operations don't touch the filesystem once they're established.
If speed is your concern though, what are you doing using an academic's operating system?

Name: Anonymous 2013-02-10 15:15

>>22
Hey fagshit, we have highly specialized and zomgoptimized image formats and functions for a reason. If you want a hard drive full of BMPs or some other format that is easy to edit ``as is'', be my fucking guest.

Name: Anonymous 2013-02-10 15:19

egin

Name: Anonymous 2013-02-10 15:20

egin

Name: Anonymous 2013-02-10 15:28

>>23
Do you understand what you're talking about?
Plan 9 proposes that libraries expose themselves through virtual filesystems, not unlike /proc, /sys, /dev...
The actual implementation will be identical to the same library exposing itself through dynamic linking and #included headers.

I don't know what the fuck your argument is, but it certainly isn't relevant and it certainly doesn't follow from the one you previously put forward.

Name: Anonymous 2013-02-10 15:35

>>16,17
Bloated APIs are the problem, not the solution. Look into the situation we now have with networking system calls and ioctls in the Linux kernel - it's not pretty, and if people keep adding things it will become a nightmare.

>>22
Having a uniform interface to differing implementations is sort of the whole point of software design, you know. The inner loop of of an image processing tool is not going to be the 9fs it exports to the system.

>>18,20
People need to stop talking about Powershell as if it's competing with Unix shells. The name of the thing is just [Ww]indows? dressing, and misleading. You aren't supposed to use Powershell interactively (really, has anyone tried? It's horrible). Its real game is competing with admin scripts written in Perl or Python.

Name: >>22 2013-02-10 15:38

>>27
I was trying to address what I perceived to be >>21's concern about the speed of opening a "file" vs. calling a function from a dll. I didn't know he was going to turn out batshit in >>23

Name: Anonymous 2013-02-10 16:39

>>28
If a lot of data is exchanged through the file server, it's going to be significantly slower because you must context switch and wait for the server to parse the data every time. X clients must already do this when they deal with the X server, though, so if you're using a Unix system already there's no reason you should object to this. Windows style (GDI) is another matter...

Name: Anonymous 2013-02-10 16:50

>>19
So the filesystem would make available to me all the functions in libpng?

I don't get it.

Name: Anonymous 2013-02-10 16:56

>>29
I can imagine using mmap to somehow put the interface in memory and reduce overheads like that, but I don't know too much in this area.

Name: Anonymous 2013-02-10 17:10

>>31
You might mmap for direct rendering if you're running the window client and the server on the same machine. Plan 9 was designed in the early 90s, so I believe it would predate the addition of direct rendering to X. Plan 9 stresses network transparency so heavily, I doubt the developers would have had much motivation to use it.

Name: >>32 2013-02-10 17:18

Checking the man pages - it appears Plan 9 doesn't have mmap anyway, so the discussion is moot. Evidently the developers don't want you doing anything fancy with the page tables on Plan 9 - you get shared memory IPC based on segments and that's it.

Name: UUCP 2013-02-12 15:14

UUCP

Name: Anonymous 2013-02-12 16:37

http://cm.bell-labs.com/cm/cs/who/dmr/cacm.html

In the absence of the ability to redirect output and input, a still clumsier method would have been to require the ls command to accept user requests to paginate its output, to print in multi-column format, and to arrange that its output be delivered off-line. Actually it would be surprising, and in fact unwise for efficiency reasons, to expect authors of commands such as ls to provide such a wide variety of output options.

lol gnu

Name: Anonymous 2013-02-13 2:08

>>35
The question then becomes, why hasn't someone replaced GNU ls with some combination of ancient Unix ls and a shell script. If you can answer that, you understand why `The UNIX Philosophy'' isn't the solution to every problem.

Name: Anonymous 2013-02-15 13:42

>>36
Because then GNU wouldn't have the market share from its HIP, MODERN FEATURES that try to make you depend on them like crack.

Basically, the same reason teenagers install Instant Messenger Plus: Extra Spyware Edition instead of Instant Messenger.

Name: Anonymous 2013-02-15 14:56

>>36
What? There are a lot of Linux distros that don't use any GNU software at all.

Name: Anonymous 2013-02-15 16:20

>>36
The BSD systems have minimal features compared to GNU.

>>37
Is it really GNU's fault for sharing software that people actually use? Remember, GNU's goal is about making a full featured system, not about following the Unix philosophy.

Name: Anonymous 2013-02-15 16:30

>>39
Is it really GNU's fault for sharing software that people actually use? Remember, GNU's goal is about making a full featured system, not about following the Unix philosophy.
Of course. It's a noble goal and I wish them luck, but I disagree with their methods.

At times it can be harmful, e.g. when people, systems and software expect some nonstandard GNU extension even though the POSIX equivalent would do. People who have to de-autotools software or maintain BSD ports have my condolences.

Name: Anonymous 2013-02-15 20:43

>>37,39
You're missing the point. It's not just the GNU project that has done this. The symptom of bloating shell utilities with options instead of layering scripts over them dates back to BSD.

The underlying disease is the (Bourne) shell - it just sucks so badly that it was easier for the feature implementers to extend the C code of the tools themselves. Think about that - what is the point of even having a shell language if it is harder to use than a systems language?

Name: Anonymous 2013-02-16 13:06

CAT -V CONSIDERED HARMFUL

Name: Anonymous 2013-02-16 13:29

>>39
The thing about not following the Unix philosophy is that you never realise how good of an idea it is until you do, and then it's too late and the best you can hope for is to shoehorn it back in one shitty piece at a time. Just look at how Windows has evolved since the early '90s.
This is also why I wish Lennart Poettering would get hit by a car.

Name: Anonymous 2013-02-16 13:33

>>43
Who is Lennart Poettering and why is he considered a harmful individual?

Name: Anonymous 2013-02-16 14:04

>>43
Windows has multiuser support, a POSIX subsystem, and PowerShell now.

UNIX has no advantages over Windows any more.

Name: Anonymous 2013-02-16 14:11

>>45
The POSIX subsystem only supports POSIX.1 and has been deprecated since Windows XP. Interix is only available on the most expensive Windows distros, and is badly broken to boot.
Powershell is a bad joke.

Name: Anonymous 2013-02-16 14:29

Windows has _NSAKEY.

Enjoy allowing pigs to browse your hard drive, Windows-using scum.

Name: Anonymous 2013-02-16 14:47

>>47
wat do u fear if u have nuthing 2 hide?? ^^

Name: Anonymous 2013-02-16 14:48

>>46
POSIX.1
aka the only user-relevant part of the POSIX standard that matters.

Are you the same sort of fag that complains because Visual C++ doesn't support C99?

Name: Anonymous 2013-02-16 14:51

>>47
implying linux and bsd dont have backdoors..

Name: Anonymous 2013-02-16 14:52

>>50
le implyin/g/ XDDDD

Name: Anonymous 2013-02-16 15:28

>>51
lel

Name: Anonymous 2013-02-16 15:47

>>50
implying one can exploit backdoors in any current Linux or BSD system.

Name: Anonymous 2013-02-16 16:06

$ ls /usr/bin/ -1 | wc -l
1688

Name: Anonymous 2013-02-16 16:18

>>53
lel, /g/roski, truly e/g/in post, i loved your use of le /g/ memes

Name: Anonymous 2013-02-16 16:44

>>49
Someone doesn't actually know what POSIX.1 is.
Of the pre-1997 standards, most users would only really care about POSIX.2. Developers would care about POSIX.1b and especially POSIX.1c at least as much as about POSIX.1.

Name: Anonymous 2013-02-16 17:46

>>44
This is so hard: http://en.wikipedia.org/wiki/Lennart_Poettering

>>48
Because Windows and the NSA have abused their power on several times, even today. Did you read about that recent DNS rootworm? Yeah, Windows made for NSA testing.

>>49
¬_¬, still stuck in 2003?

>>50
I read FreeBSD source code. No backdoors, only security holes programs have:
http://www.vuxml.org/freebsd/
If you find one, you are welcome to report it:
http://www.freebsd.org/security/

Name: Anonymous 2013-02-16 18:43

>>57
even openbsd has backdoors, what makes you think freebsd doesnt? and what can you do with your supersecure bsd systems anyway?

Name: Anonymous 2013-02-16 19:35

>>58
Pretty lazy troll. At least try to make it look like you know more about the situation than just the names of two operating systems.

Name: Anonymous 2013-02-16 20:59

>>57 no i haven't heard of that one..

would be nice to get the sauce, and spice it up though ^^ send it back at nasa xD...

Name: Anonymous 2013-02-16 21:13

>>57 is this it?

 > “They didn’t hack Microsoft, no-one has broken into Microsoft, but by repurposing the certificate and modifying it with unknown hash collision technologies, and with the power of a supercomputer, they were able to start signing any program they wanted as if it was from Microsoft. If you combine that with the mechanism they were using to spoof MS Update server they had the crown jewels,” Hypponen said.

http://exaltedtruth.com/category/science-technology/page/8/
'Creating Bogus Enemies to Justify Internet Control: CIA, NSA “most probably” Infiltrated Microsoft to Write Malware'

Name: Anonymous 2013-02-16 21:38

Well shit, if the NSA can't even trust me, who can they trust? And if they can't trust anyone, doesn't that just mean that they simply aren't trustworthy themselves..? Why else trust no-one..?
It would be easy to prove, in a sense, all they'd have to do is de-classify everything... But that is asking the impossible, in another sense, Because What ?! They Are Not Trustworthy... And the Truth would only prove that a thousand times over..

You wish for me to trust you, but how can I, knowing you aren't worthy to begin with..?

Name: Anonymous 2013-02-16 21:49

What were you expecting to find..? I am not you? Suprise! ^^

Name: Anonymous 2013-02-16 21:53

>>57
A backdoor isn't going to be as obvious as if (is_fbi == TRUE) { ... They are usually intentional ``bugs'', e.g. an intentional overflow exploit that allows the user to run malicious code.
You can't just ``read the source code'' and infer these things. The only effective method is auditing. Hence all the drama with OpenBSD:
http://marc.info/?l=openbsd-tech&m=129236621626462

Name: Anonymous 2013-02-16 23:19

>>64
That's why they push languages like C and C++. If we all used a type-safe language like Haskell or Algol 68, there would be full memory protection with no need for separate address spaces. Buffer overflows would be impossible.

Name: Anonymous 2013-02-16 23:33

>>65
Haskell is fucking shit.

Name: Anonymous 2013-02-17 1:15

>>66
Cool story bro

Name: Anonymous 2013-02-17 2:24

As of 2012, 80% of the Tor Project's $2M annual budget comes from the United States government

broken endpoint security

problem?

Name: 2013-02-17 5:27

>>60
You are welcome to take a look:
svn+ssh://svn.freebsd.org/base/head
ftp://ftp.freebsd.org/pub/FreeBSD/

>>61
http://pittsburgh.cbslocal.com/2012/07/06/fbi-issues-dns-changer-malware-warning/
http://www.pcmag.com/article2/0,2817,2403364,00.asp
http://techland.time.com/2012/04/23/dnschanger-fbi-warns-infected-computers-will-lose-web-email-access-in-july/
http://www.searchenginejournal.com/dnschanger-malware-fbi-warning/45780/
https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

>>64
Sir, I have not only read the source code, I tested on multiple standards I am required to do as my job, and still have not found one on a vanilla installation of FreeBSD. And I am not talking about the obvious holes that are on inetd and BIND (programs) on every OS, including the ones ported on Freebsd.

The drama on OpenBSD was from non-auditors, and the closest I can find, again are the obvious BIND security hole, esp. inetd.. You are welcome to make your own versions although, or use others than the default.  We make our renditions of the defaults.

>>65
You are correct sir. We use chicken-scheme to type check our C code, and the binaries as well. We must compile back to C to maintain the source portable enough for multiple servers with different architectures. We also have a legacy standard we have to follow.

>>68
Small donations from and interested party does not mean the project/product has vulnerabilities. You have the freedom to review the code and audit it.

Name: Anonymous 2013-02-17 7:52

>>69

Sir, I have not only read the source code, I tested on multiple standards I am required to do as my job, and still have not found one on a vanilla installation of FreeBSD.

Are we just supposed to take your word for it? The word of an Anonymous poster on a shiitchan BBS? Your words don't have any more weight than the ones who say that there are backdoors. The only way to check is to read the source yourself.

I'm not the person you were talking to, as this is my first post in this thread, but please refrain from assuming that we're all going to believe you, as opposed to just thinking that you're full of shit. I sincerely doubt you've read through the entire FreeBSD source tree.

Name: 2013-02-19 19:25

>>70
No, I am telling you to read and audit any code yourself. I do for a living. I do not care if believe me. Just be proactive with what do, that is all.

Don't change these.
Name: Email:
Entire Thread Thread List