Misplaced Pages

PmWiki

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

PmWiki is a wiki-based content management system designed for a collaborative creation and maintenance of websites.

#764235

94-514: It is free software written in PHP , licensed under the terms of the GNU General Public License . The PmWiki philosophy prioritizes writers over readers, aiming to facilitate easy document authoring despite limitations in document types. It supports collaborative website maintenance with built-in tools for access control, delegation, monitoring, review, and edit reversion. Ease of maintenance

188-428: A negative or positive liberty . Due to their restrictions on distribution, not everyone considers copyleft licenses to be free. Conversely, a permissive license may provide an incentive to create non-free software by reducing the cost of developing restricted software. Since this is incompatible with the spirit of software freedom, many people consider permissive licenses to be less free than copyleft licenses. There

282-514: A copy of the free application itself. Fees are usually charged for distribution on compact discs and bootable USB drives, or for services of installing or maintaining the operation of free software. Development of large, commercially used free software is often funded by a combination of user donations, crowdfunding , corporate contributions, and tax money. The SELinux project at the United States National Security Agency

376-455: A drop in revenue to the proprietary software industry by about $ 60 billion per year. Eric S. Raymond argued that the term free software is too ambiguous and intimidating for the business community. Raymond promoted the term open-source software as a friendlier alternative for the business and corporate world. Lightweight Directory Access Protocol The Lightweight Directory Access Protocol ( LDAP / ˈ ɛ l d æ p / )

470-547: A fee. The Free Software Foundation encourages selling free software. As the Foundation has written, "distributing free software is an opportunity to raise funds for development. Don't waste it!". For example, the FSF's own recommended license (the GNU GPL ) states that "[you] may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for

564-447: A fee." Microsoft CEO Steve Ballmer stated in 2001 that "open source is not available to commercial companies. The way the license is written, if you use any open-source software, you have to make the rest of your software open source." This misunderstanding is based on a requirement of copyleft licenses (like the GPL) that if one distributes modified versions of software, they must release

658-484: A for-profit, commercial activity or not. Some free software is developed by volunteer computer programmers while other is developed by corporations; or even by both. Although both definitions refer to almost equivalent corpora of programs, the Free Software Foundation recommends using the term "free software" rather than " open-source software " (an alternative, yet similar, concept coined in 1998), because

752-422: A hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number. LDAP is specified in a series of Internet Engineering Task Force (IETF) Standard Track publications called Request for Comments (RFCs), using the description language ASN.1 . The latest specification is Version 3, published as RFC 4511 (a road map to

846-410: A new entry into the directory-server database. If the distinguished name in the add request already exists in the directory, then the server will not add a duplicate entry but will set the result code in the add result to decimal 68, "entryAlreadyExists". In the above example, uid=user,ou=people,dc=example,dc=com must not exist, and ou=people,dc=example,dc=com must exist. When an LDAP session

940-416: A response before sending the next request, and the server may send the responses in any order. All information is transmitted using Basic Encoding Rules (BER). The client may request the following operations: In addition the server may send "Unsolicited Notifications" that are not responses to any request, e.g. before the connection is timed out. A common alternative method of securing LDAP communication

1034-481: A separate port, by default 636. LDAPS differs from LDAP in two ways: 1) upon connect, the client and server establish TLS before any LDAP messages are transferred (without a StartTLS operation) and 2) the LDAPS connection must be closed upon TLS closure. Some "LDAPS" client libraries only encrypt communication; they do not check the host name against the name in the supplied certificate. The Abandon operation requests that

SECTION 10

#1733084974765

1128-559: A significant part in the development of the Internet, the World Wide Web and the infrastructure of dot-com companies . Free software allows users to cooperate in enhancing and refining the programs they use; free software is a pure public good rather than a private good . Companies that contribute to free software increase commercial innovation . "We migrated key functions from Windows to Linux because we needed an operating system that

1222-430: A skin template scheme that makes it possible to change the look and feel of the wiki or website with a high degree of flexibility in both functionality and appearance. Since version 2.3.30, the core responsive skin can have a dark theme enabled. The dark mode functions are available for reuse by custom skins. PmWiki permits users and administrators to establish password protection for individual pages, groups of pages, or

1316-488: A small set of licenses. The most popular of these licenses are: The Free Software Foundation and the Open Source Initiative both publish lists of licenses that they find to comply with their own definitions of free software and open-source software respectively: The FSF list is not prescriptive: free-software licenses can exist that the FSF has not heard about, or considered important enough to write about. So it

1410-407: A subtree starting from a specific entry, e.g. " dc=example,dc=com " and its children. Servers may also hold references to other servers, so an attempt to access " ou=department,dc=example,dc=com " could return a referral or continuation reference to a server that holds that part of the directory tree. The client can then contact the other server. Some servers also support chaining , which means

1504-584: A successor to DIXIE and DAS . Mark Wahl of Critical Angle Inc., Tim Howes, and Steve Kille started work in 1996 on a new version of LDAP, LDAPv3, under the aegis of the Internet Engineering Task Force (IETF). LDAPv3, first published in 1997, superseded LDAPv2 and added support for extensibility, integrated the Simple Authentication and Security Layer , and better aligned the protocol to the 1993 edition of X.500. Further development of

1598-529: A website can use SQLite or MySQL databases, or XML files for storage. PmWiki supports "attachments" (uploads: images or other files) to its wiki pages. The attachments can be versioned. There are PmWiki add-ons allowing easier management of the uploaded files, e.g. deletion or thumbnail/gallery creation. Wiki pages are contained within namespaces, called "wiki groups". Multiple namespaces can be used, and each namespace can have its own configuration options, add-ons, access control, skin, styles, sidebar (menu),

1692-694: Is not the opposite of the Bind operation. Clients can abort a session by simply closing the connection, but they should use Unbind. Unbind allows the server to gracefully close the connection and free resources that it would otherwise keep for some time until discovering the client had abandoned the connection. It also instructs the server to cancel operations that can be canceled, and to not send responses for operations that cannot be canceled. An LDAP uniform resource identifier (URI) scheme exists, which clients support in varying degrees, and servers return in referrals and continuation references (see RFC 4516): Most of

1786-612: Is a "recipe" to allow running PmWiki "Standalone", with the PHP built-in webserver , for example from a USB flash drive . The following books analyse PmWiki, have dedicated chapters or sections, compare it with other wiki and CMS software: PmWiki has been featured in a number of printed and online magazines including Inc Magazine , Linux Gazette , PCMag , LXer , Framasoft , Linuxfr . The page PmWiki References lists publications about PmWiki in various languages. Free software Free software , libre software , libreware sometimes known as freedom-respecting software

1880-399: Is a key design goal, and PmWiki is configurable and extensible, allowing independent updates to the core while maintaining compatibility with local customizations. In addition to standard collaborative features like content management and knowledge bases, PmWiki is utilized by companies and groups as an internal communication platform offering tools for task management and meeting archives. It

1974-703: Is a sample of commonly used markup rules. Links are usually wrapped in double brackets, optionally with link text: It is possible to enable internal links for CamelCase words without brackets, and add-ons can enable other link markups like @Page . Headings are preceded with exclamation marks: It is possible to enable an automated table of contents coming with the PmWiki core, or install one among several Table of contents add-ons. Lists are prefixed by "*" (bulleted) and "#" (numbered) and can be nested: Directives for listing pages and attachments, and including pages and templates: Other page directives allow setting

SECTION 20

#1733084974765

2068-549: Is also employed by university and research teams. The PmWiki wiki markup includes unique features not found in other wiki engines. The PmWiki markup engine is customizable, and markup rules can be added, replaced or removed, and it can support other markup languages. As an example, the Creole specifications can be enabled. The edit form, since version 2.3.0, can have syntax highlighting enabled for its own wiki markup dialect. PmWiki uses regular text files to store content. Each page of

2162-430: Is also used as the basis for Microsoft 's Active Directory . A client starts an LDAP session by connecting to an LDAP server, called a Directory System Agent (DSA), by default on TCP and UDP port 389, or on port 636 for LDAPS (LDAP over TLS/SSL, see below). The client then sends an operation request to the server, and a server sends responses in return. With some exceptions, the client does not need to wait for

2256-617: Is an example of a federally funded free-software project. Proprietary software, on the other hand, tends to use a different business model, where a customer of the proprietary application pays a fee for a license to legally access and use it. This license may grant the customer the ability to configure some or no parts of the software themselves. Often some level of support is included in the purchase of proprietary software, but additional support services (especially for enterprise applications) are usually available for an additional fee. Some proprietary software vendors will also customize software for

2350-490: Is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. As examples, directory services may provide any organized set of records, often with

2444-466: Is biased by counting more vulnerabilities for the free software systems, since their source code is accessible and their community is more forthcoming about what problems exist as a part of full disclosure , and proprietary software systems can have undisclosed societal drawbacks, such as disenfranchising less fortunate would-be users of free programs. As users can analyse and trace the source code, many more people with no commercial constraints can inspect

2538-471: Is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions. Free software is a matter of liberty , not price; all users are legally free to do what they want with their copies of a free software (including profiting from them) regardless of how much is paid to obtain the program. Computer programs are deemed "free" if they give end-users (not just

2632-535: Is consistent with the intended meaning unlike the term "Open Source". The loan adjective " libre " is often used to avoid the ambiguity of the word "free" in the English language , and the ambiguity with the older usage of "free software" as public-domain software. ( See Gratis versus libre . ) The first formal definition of free software was published by FSF in February 1986. That definition, written by Richard Stallman ,

2726-424: Is created, that is, when an LDAP client connects to the server, the authentication state of the session is set to anonymous. The BIND operation establishes the authentication state for a session. Simple BIND and SASL PLAIN can send the user's DN and password in plaintext , so the connections utilizing either Simple or SASL PLAIN should be encrypted using Transport Layer Security (TLS). The server typically checks

2820-451: Is debate over the security of free software in comparison to proprietary software, with a major issue being security through obscurity . A popular quantitative test in computer security is to use relative counting of known unpatched security flaws. Generally, users of this method advise avoiding products that lack fixes for known security flaws, at least until a fix is available. Free software advocates strongly believe that this methodology

2914-463: Is like considering the practical advantages of not being handcuffed, in that it is not necessary for an individual to consider practical reasons in order to realize that being handcuffed is undesirable in itself. The FSF also notes that "Open Source" has exactly one specific meaning in common English, namely that "you can look at the source code." It states that while the term "Free Software" can lead to two different interpretations, at least one of them

PmWiki - Misplaced Pages Continue

3008-419: Is not covered by copyright law, such as software in the public domain , is free as long as the source code is also in the public domain, or otherwise available without restrictions. Proprietary software uses restrictive software licences or EULAs and usually does not provide users with the source code. Users are thus legally or technically prevented from changing the software, and this results in reliance on

3102-491: Is not endorsed by the FSF and does not use Linux-libre, it is also a popular distribution available without kernel blobs by default since 2011. The Linux community uses the term "blob" to refer to all nonfree firmware in a kernel whereas OpenBSD uses the term to refer to device drivers. The FSF does not consider OpenBSD to be blob free under the Linux community's definition of blob. Selling software under any free-software licence

3196-415: Is permissible, as is commercial use. This is true for licenses with or without copyleft . Since free software may be freely redistributed, it is generally available at little or no fee. Free software business models are usually based on adding value such as customization, accompanying hardware, support, training, integration, or certification. Exceptions exist however, where the user is charged to obtain

3290-511: Is possible for a license to be free and not in the FSF list. The OSI list only lists licenses that have been submitted, considered and approved. All open-source licenses must meet the Open Source Definition in order to be officially recognized as open source software. Free software, on the other hand, is a more informal classification that does not rely on official recognition. Nevertheless, software licensed under licenses that do not meet

3384-644: Is still maintained today and states that software is free software if people who receive a copy of the software have the following four freedoms. The numbering begins with zero, not only as a spoof on the common usage of zero-based numbering in programming languages, but also because "Freedom 0" was not initially included in the list, but later added first in the list as it was considered very important. Freedoms 1 and 3 require source code to be available because studying and modifying software without its source code can range from highly impractical to nearly impossible. Thus, free software means that computer users have

3478-598: Is summarized at the Debian web site. It is rare that a license announced as being in-compliance with the FSF guidelines does not also meet the Open Source Definition , although the reverse is not necessarily true (for example, the NASA Open Source Agreement is an OSI-approved license, but non-free according to FSF). There are different categories of free software. Proponents of permissive and copyleft licenses disagree on whether software freedom should be viewed as

3572-464: Is using an SSL tunnel . The default port for LDAP over SSL is 636. The use of LDAP over SSL was common in LDAP Version 2 (LDAPv2) but it was never standardized in any formal specification. This usage has been deprecated along with LDAPv2, which was officially retired in 2003. The protocol provides an interface with directories that follow the 1993 edition of the X.500 model: A DN may change over

3666-730: The Apache web server; and the Sendmail mail transport agent. Other influential examples include the Emacs text editor; the GIMP raster drawing and image editor; the X Window System graphical-display system; the LibreOffice office suite; and the TeX and LaTeX typesetting systems. From the 1950s up until the early 1970s, it was normal for computer users to have the software freedoms associated with free software, which

3760-452: The GNU Project : a collaborative effort to create a freedom-respecting operating system , and to revive the spirit of cooperation once prevalent among hackers during the early days of computing. Free software differs from: For software under the purview of copyright to be free, it must carry a software license whereby the author grants users the aforementioned rights. Software that

3854-807: The GNU operating system began in January 1984, and the Free Software Foundation (FSF) was founded in October 1985. He developed a free software definition and the concept of " copyleft ", designed to ensure software freedom for all. Some non-software industries are beginning to use techniques similar to those used in free software development for their research and development process; scientists, for example, are looking towards more open development processes, and hardware such as microchips are beginning to be developed with specifications released under copyleft licenses ( see

PmWiki - Misplaced Pages Continue

3948-714: The Linux kernel and other device drivers motivated some developers in Ireland to launch gNewSense , a Linux-based distribution with all the binary blobs removed. The project received support from the Free Software Foundation and stimulated the creation, headed by the Free Software Foundation Latin America , of the Linux-libre kernel. As of October 2012 , Trisquel is the most popular FSF endorsed Linux distribution ranked by Distrowatch (over 12 months). While Debian

4042-635: The OpenCores project, for instance ). Creative Commons and the free-culture movement have also been largely influenced by the free software movement. In 1983, Richard Stallman , longtime member of the hacker community at the MIT Artificial Intelligence Laboratory , announced the GNU Project, saying that he had become frustrated with the effects of the change in culture of the computer industry and its users. Software development for

4136-410: The source code was distributed to use these programs. Software was also shared and distributed as printed source code ( Type-in program ) in computer magazines (like Creative Computing , SoftSide , Compute! , Byte , etc.) and books, like the bestseller BASIC Computer Games . By the early 1970s, the picture changed: software costs were dramatically increasing, a growing software industry

4230-543: The Free Software Definition cannot rightly be considered free software. Apart from these two organizations, the Debian project is seen by some to provide useful advice on whether particular licenses comply with their Debian Free Software Guidelines . Debian does not publish a list of approved licenses, so its judgments have to be tracked by checking what software they have allowed into their software archives. That

4324-617: The GNU operating system began in January 1984, and the Free Software Foundation (FSF) was founded in October 1985. An article outlining the project and its goals was published in March 1985 titled the GNU Manifesto . The manifesto included significant explanation of the GNU philosophy, Free Software Definition and " copyleft " ideas. The Linux kernel , started by Linus Torvalds , was released as freely modifiable source code in 1991. The first licence

4418-511: The Internet. Users can easily download and install those applications via a package manager that comes included with most Linux distributions . The Free Software Directory maintains a large database of free-software packages. Some of the best-known examples include Linux-libre , Linux-based operating systems, the GNU Compiler Collection and C library ; the MySQL relational database;

4512-517: The LDAPv3 specifications themselves and of numerous extensions adding features to LDAPv3 has come through the IETF . In the early engineering stages of LDAP, it was known as Lightweight Directory Browsing Protocol , or LDBP . It was renamed with the expansion of the scope of the protocol beyond directory browsing and searching, to include directory update functions. It was given its Lightweight name because it

4606-471: The SASL/EXTERNAL, the client requests the server derive its identity from credentials provided at a lower level (such as TLS). Though technically the server may use any identity information established at any lower level, typically the server will use the identity information established by TLS. Servers also often support the non-standard "LDAPS" ("Secure LDAP", commonly known as "LDAP over SSL") protocol on

4700-457: The authentication state of the session and each unsuccessful BIND request resets the authentication state of the session. To delete an entry, an LDAP client transmits a properly formed delete request to the server. The Search operation is used to both search for and read entries. Its parameters are: The server returns the matching entries and potentially continuation references. These may be returned in any order. The final result will include

4794-588: The code and find bugs and loopholes than a corporation would find practicable. According to Richard Stallman, user access to the source code makes deploying free software with undesirable hidden spyware functionality far more difficult than for proprietary software. Some quantitative studies have been done on the subject. In 2006, OpenBSD started the first campaign against the use of binary blobs in kernels . Blobs are usually freely distributable device drivers for hardware from vendors that do not reveal driver source code to users or developers. This restricts

SECTION 50

#1733084974765

4888-524: The components described below are optional. For example, " ldap://ldap.example.com/cn=John%20Doe,dc=example,dc=com " refers to all user attributes in John Doe's entry in ldap.example.com , while " ldap:///dc=example,dc=com??sub?(givenName=John) " searches for the entry in the default server (note the triple slash, omitting the host, and the double question mark, omitting the attributes). As in other URLs, special characters must be percent-encoded . There

4982-586: The concept of directory services to information technology and computer networking , their input culminating in the comprehensive X.500 specification, a suite of protocols produced by the International Telecommunication Union (ITU) in the 1980s. X.500 directory services were traditionally accessed via the X.500 Directory Access Protocol (DAP), which required the Open Systems Interconnection (OSI) protocol stack . LDAP

5076-401: The connection. It can provide data confidentiality (to protect data from being observed by third parties) and/or data integrity protection (which protects the data from tampering). During TLS negotiation the server sends its X.509 certificate to prove its identity. The client may also send a certificate to prove its identity. After doing so, the client may then use SASL /EXTERNAL. By using

5170-435: The developer) ultimate control over the software and, subsequently, over their devices. The right to study and modify a computer program entails that the source code —the preferred format for making changes—be made available to users of that program. While this is often called "access to source code" or "public availability", the Free Software Foundation (FSF) recommends against thinking in those terms, because it might give

5264-460: The entire site. For example, defined zones may be established to enable collaborative work by certain groups, such as in a company intranet. Password protection can be applied to reading, editing, uploading to, and changing passwords for the restricted zone. The out-of-the-box installation uses "shared passwords" rather than login names, but a built-in option can enable a sophisticated user/group-based access control system on pages, groups of pages or

5358-429: The entry in the meantime. Servers may implement extensions that support this, though. The Extended Operation is a generic LDAP operation that can define new operations that were not part of the original protocol specification. StartTLS is one of the most significant extensions. Other examples include Cancel and Password Modify. The StartTLS operation establishes Transport Layer Security (the descendant of SSL ) on

5452-565: The entry; it is neither an attribute nor a part of the entry. " cn=John Doe " is the entry's RDN (Relative Distinguished Name), and " dc=example,dc=com " is the DN of the parent entry, where " dc " denotes ' Domain Component '. The other lines show the attributes in the entry. Attribute names are typically mnemonic strings, like " cn " for common name, " dc " for domain component, " mail " for email address, and " sn " for surname. A server holds

5546-574: The form of an integer. If the client requests a version that the server does not support, the server must set the result code in the BIND response to the code for a protocol error. Normally clients should use LDAPv3, which is the default in the protocol but not always in LDAP libraries. BIND had to be the first operation in a session in LDAPv2, but is not required as of LDAPv3. In LDAPv3, each successful BIND request changes

5640-423: The freedom to cooperate with whom they choose, and to control the software they use. To summarize this into a remark distinguishing libre (freedom) software from gratis (zero price) software, the Free Software Foundation says: "Free software is a matter of liberty, not price. To understand the concept, you should think of 'free' as in ' free speech ', not as in 'free beer ' ". ( See Gratis versus libre . ) In

5734-412: The goals and messaging are quite dissimilar. According to the Free Software Foundation, "Open source" and its associated campaign mostly focus on the technicalities of the public development model and marketing free software to businesses, while taking the ethical issue of user rights very lightly or even antagonistically. Stallman has also stated that considering the practical advantages of free software

SECTION 60

#1733084974765

5828-409: The government charged that bundled software was anti-competitive . While some software might always be free, there would henceforth be a growing amount of software produced primarily for sale. In the 1970s and early 1980s, the software industry began using technical measures (such as only distributing binary copies of computer programs ) to prevent computer users from being able to study or adapt

5922-501: The impression that users have an obligation (as opposed to a right) to give non-users a copy of the program. Although the term "free software" had already been used loosely in the past and other permissive software like the Berkeley Software Distribution released in 1978 existed, Richard Stallman is credited with tying it to the sense under discussion and starting the free software movement in 1983, when he launched

6016-451: The keyword delete and the changetype designator modify . If the attribute is multi-valued, the client must specify the value of the attribute to delete. There is also a Modify-Increment extension which allows an incrementable attribute value to be incremented by a specified amount. The following example using LDIF increments employeeNumber by 5 : When LDAP servers are in a replicated topology, LDAP clients should consider using

6110-507: The language of the content, and interface. Hierarchically, every page is contained in a namespace. It is possible to display and navigate through pages in a tree-like structure with a "wiki trail". Through recipes, it is possible to have a flat structure (no wiki groups), multiple nested groups, or sub-pages. Special namespaces are "PmWiki", Site, SiteAdmin, and Category which contain the documentation and some configuration templates. The PmWiki markup shares similarities with MediaWiki . Here

6204-421: The late 1990s, other groups published their own definitions that describe an almost identical set of software. The most notable are Debian Free Software Guidelines published in 1997, and The Open Source Definition , published in 1998. The BSD -based operating systems, such as FreeBSD , OpenBSD , and NetBSD , do not have their own formal definitions of free software. Users of these systems generally find

6298-478: The lifetime of the entry, for instance, when entries are moved within a tree. To reliably and unambiguously identify entries, a UUID might be provided in the set of the entry's operational attributes . An entry can look like this when represented in LDAP Data Interchange Format (LDIF), a plain text format (as opposed a binary protocol such as LDAP itself): " dn " is the distinguished name of

6392-453: The lower initial capital investment and ability to freely customize the application packages. Most companies in the software business include free software in their commercial products if the licenses allow that. Free software is generally available at no cost and can result in permanently lower TCO ( total cost of ownership ) compared to proprietary software . With free software, businesses can fit software to their specific needs by changing

6486-478: The new RDN (Relative Distinguished Name), optionally the new parent's DN, and a flag that indicates whether to delete the value(s) in the entry that match the old RDN. The server may support renaming of entire directory subtrees. An update operation is atomic: Other operations will see either the new entry or the old one. On the other hand, LDAP does not define transactions of multiple operations: If you read an entry and then modify it, another client may have updated

6580-399: The page title, description, and keywords, disabling layout sections like sidebars or footers, creating tables, or defining page text variables. Add-ons allow for extra functionality. Inline markup : Other markup rules can be enabled through recipes (add-ons). HTML is not available for the edit form out of the box, but it is possible to enable selected tags through add-ons. PmWiki offers

6674-418: The password against the userPassword attribute in the named entry. Anonymous BIND (with empty DN and password) resets the connection to anonymous state. SASL (Simple Authentication and Security Layer) BIND provides authentication services through a wide range of mechanisms, e.g. Kerberos or the client certificate sent with TLS. BIND also sets the LDAP protocol version by sending a version number in

6768-572: The post-read control to verify updates instead of a search after an update. The post-read control is designed so that applications need not issue a search request after an update – it is bad form to retrieve an entry for the sole purpose of checking that an update worked because of the replication eventual consistency model. An LDAP client should not assume that it connects to the same directory server for each request because architects may have placed load-balancers or LDAP proxies or both between LDAP clients and servers. Modify DN (move/rename entry) takes

6862-468: The publisher to provide updates, help, and support. ( See also vendor lock-in and abandonware ). Users often may not reverse engineer , modify, or redistribute proprietary software. Beyond copyright law, contracts and a lack of source code, there can exist additional obstacles keeping users from exercising freedom over a piece of software, such as software patents and digital rights management (more specifically, tivoization ). Free software can be

6956-401: The result code. The Compare operation takes a DN, an attribute name and an attribute value, and checks if the named entry contains that attribute with that value. The MODIFY operation is used by LDAP clients to request that the LDAP server make changes to existing entries. Attempts to modify entries that do not exist will fail. MODIFY requests are subject to access controls as implemented by

7050-511: The same set of software to be acceptable, but sometimes see copyleft as restrictive. They generally advocate permissive free software licenses , which allow others to use the software as they wish, without being legally forced to provide the source code. Their view is that this permissive approach is more free. The Kerberos , X11 , and Apache software licenses are substantially similar in intent and implementation. There are thousands of free applications and many operating systems available on

7144-411: The server abort an operation named by a message ID. The server need not honor the request. Neither Abandon nor a successfully abandoned operation send a response. A similar Cancel extended operation does send responses, but not all implementations support this. The Unbind operation abandons any outstanding operations and closes the connection. It has no response. The name is of historical origin, and

7238-431: The server contacts the other server and returns the results to the client. LDAP rarely defines any ordering: The server may return the values of an attribute, the attributes in an entry, and the entries found by a search operation in any order. This follows from the formal definitions - an entry is defined as a set of attributes, and an attribute is a set of values, and sets need not be ordered. The ADD operation inserts

7332-444: The server. The MODIFY operation requires that the distinguished name (DN) of the entry be specified, and a sequence of changes. Each change in the sequence must be one of: LDIF example of adding a value to an attribute: To replace the value of an existing attribute, use the replace keyword. If the attribute is multi-valued, the client must specify the value of the attribute to update. To delete an attribute from an entry, use

7426-435: The shift in climate surrounding the computer world and its users. In his initial declaration of the project and its purpose, he specifically cited as a motivation his opposition to being asked to agree to non-disclosure agreements and restrictive licenses which prohibited the free sharing of potentially profitable in-development software, a prohibition directly contrary to the traditional hacker ethic . Software development for

7520-461: The software applications as they saw fit. In 1980, copyright law was extended to computer programs. In 1983, Richard Stallman , one of the original authors of the popular Emacs program and a longtime member of the hacker community at the MIT Artificial Intelligence Laboratory , announced the GNU Project , the purpose of which was to produce a completely non-proprietary Unix-compatible operating system, saying that he had become frustrated with

7614-443: The software themselves or by hiring programmers to modify it for them. Free software often has no warranty, and more importantly, generally does not assign legal liability to anyone. However, warranties are permitted between any two parties upon the condition of the software and its usage. Such an agreement is made separately from the free software license. A report by Standish Group estimates that adoption of free software has caused

7708-507: The software. This design encourages customization with a wide selection of custom extensions, known as "recipes" available from the PmWiki Cookbook. Creating and maintaining extensions and custom installations is easy thanks to a number of well documented hooks in the wiki engine. Recent PmWiki releases require a web server that can run PHP version 5.4 or more recent. PmWiki can be deployed to standard hosting providers, or locally. There

7802-411: The source and use the same license. This requirement does not extend to other software from the same developer. The claim of incompatibility between commercial companies and free software is also a misunderstanding. There are several large companies, e.g. Red Hat and IBM (IBM acquired RedHat in 2019), which do substantial commercial business in the development of free software. Free software played

7896-593: The technical specifications is provided by RFC4510 ). A common use of LDAP is to provide a central place to store usernames and passwords. This allows many different applications and services to connect to the LDAP server to validate users. LDAP is based on a simpler subset of the standards contained within the X.500 standard. Because of this relationship, LDAP is sometimes called X.500-lite. Telecommunication companies' understanding of directory requirements were well developed after some 70 years of producing and managing telephone directories. These companies introduced

7990-495: The users' freedom effectively to modify the software and distribute modified versions. Also, since the blobs are undocumented and may have bugs , they pose a security risk to any operating system whose kernel includes them. The proclaimed aim of the campaign against blobs is to collect hardware documentation that allows developers to write free software drivers for that hardware, ultimately enabling all free operating systems to become or remain blob-free. The issue of binary blobs in

8084-423: The whole wiki. PmWiki can use passwords from config files, special wiki pages, and .htpasswd /.htgroup files. There are also user-based authorization possibilities and authentication via various external sources (e.g. LDAP , forum databases, etc.). PmWiki follows a design philosophy with the main objectives of ease of installation, maintainability, and keeping non-required features out of the core distribution of

8178-482: The wiki is stored in its own file on the web server. By default pages are stored in 8-bit or UTF-8 encoding, with page text, metadata, and revision history in the same file. According to the author, " For the standard operations (view, edit, page revisions), holding the information in flat files is clearly faster than accessing them in a database... " The storage class is extensible, allowing add-ons to enable other storage systems and formats. For example, with add-ons,

8272-538: Was a proprietary software licence. However, with version 0.12 in February 1992, he relicensed the project under the GNU General Public License . Much like Unix, Torvalds' kernel attracted the attention of volunteer programmers. FreeBSD and NetBSD (both derived from 386BSD ) were released as free software when the USL v. BSDi lawsuit was settled out of court in 1993. OpenBSD forked from NetBSD in 1995. Also in 1995, The Apache HTTP Server , commonly referred to as Apache,

8366-402: Was competing with the hardware manufacturer's bundled software products (free in that the cost was included in the hardware cost), leased machines required software support while providing no revenue for software, and some customers able to better meet their own needs did not want the costs of "free" software bundled with hardware product costs. In United States vs. IBM , filed January 17, 1969,

8460-475: Was not as network intensive as its DAP predecessor and thus was more easily implemented over the Internet due to its relatively modest bandwidth usage. LDAP has influenced subsequent Internet protocols, including later versions of X.500, XML Enabled Directory (XED), Directory Service Markup Language (DSML), Service Provisioning Markup Language (SPML), and the Service Location Protocol (SLP). It

8554-647: Was originally intended to be a lightweight alternative protocol for accessing X.500 directory services through the simpler (and now widespread) TCP/IP protocol stack. This model of directory access was borrowed from the DIXIE and Directory Assistance Service protocols. The protocol was originally created by Tim Howes of the University of Michigan , Steve Kille of Isode Limited, Colin Robbins of Nexor and Wengyik Yeong of Performance Systems International , circa 1993, as

8648-469: Was released under the Apache License 1.0 . All free-software licenses must grant users all the freedoms discussed above. However, unless the applications' licenses are compatible, combining programs by mixing source code or directly linking binaries is problematic, because of license technicalities . Programs indirectly connected together may avoid this problem. The majority of free software falls under

8742-445: Was stable and reliable – one that would give us in-house control. So if we needed to patch, adjust, or adapt, we could." The economic viability of free software has been recognized by large corporations such as IBM , Red Hat , and Sun Microsystems . Many companies whose core business is not in the IT sector choose free software for their Internet information and sales sites, due to

8836-407: Was typically public-domain software . Software was commonly shared by individuals who used computers and by hardware manufacturers who welcomed the fact that people were making software that made their hardware useful. Organizations of users and suppliers, for example, SHARE , were formed to facilitate exchange of software. As software was often written in an interpreted language such as BASIC ,

#764235