Free software , libre software , libreware sometimes known as freedom-respecting software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions. Free software is a matter of liberty , not price; all users are legally free to do what they want with their copies of a free software (including profiting from them) regardless of how much is paid to obtain the program. Computer programs are deemed "free" if they give end-users (not just the developer) ultimate control over the software and, subsequently, over their devices.
75-603: Samba is a free software re-implementation of the SMB networking protocol , and was originally developed by Andrew Tridgell . Samba provides file and print services for various Microsoft Windows clients and can integrate with a Microsoft Windows Server domain , either as a Domain Controller (DC) or as a domain member. As of version 4, it supports Active Directory and Microsoft Windows NT domains. Samba runs on most Unix-like systems, such as Linux , Solaris , AIX and
150-428: A negative or positive liberty . Due to their restrictions on distribution, not everyone considers copyleft licenses to be free. Conversely, a permissive license may provide an incentive to create non-free software by reducing the cost of developing restricted software. Since this is incompatible with the spirit of software freedom, many people consider permissive licenses to be less free than copyleft licenses. There
225-476: A client application. A common form of exploits against client applications are browser exploits . Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Exploitations are commonly categorized and named by
300-496: A computer system. Attackers may use multiple exploits in succession to first gain low-level access and then escalate privileges repeatedly until they reach the highest administrative level, often referred to as "root." This technique of chaining several exploits together to perform a single attack is known as an exploit chain. Exploits that remain unknown to everyone except the individuals who discovered and developed them are referred to as zero-day or "0day" exploits. After an exploit
375-514: A copy of the free application itself. Fees are usually charged for distribution on compact discs and bootable USB drives, or for services of installing or maintaining the operation of free software. Development of large, commercially used free software is often funded by a combination of user donations, crowdfunding , corporate contributions, and tax money. The SELinux project at the United States National Security Agency
450-511: A crucial security bug in Windows and Samba, was disclosed. Badlock for Samba is referenced by CVE|2016-2118 (SAMR and LSA man in the middle attacks possible). On 24 May 2017, it was announced that a remote code execution vulnerability had been found in Samba named EternalRed or SambaCry , affecting all versions since 3.5.0. This vulnerability was assigned identifier CVE|2017-7494. On 14 September 2020,
525-594: A drop in revenue to the proprietary software industry by about $ 60 billion per year. Eric S. Raymond argued that the term free software is too ambiguous and intimidating for the business community. Raymond promoted the term open-source software as a friendlier alternative for the business and corporate world. Exploit (computer security) An exploit is a method or piece of code that takes advantage of vulnerabilities in software , applications , networks , operating systems , or hardware , typically for malicious purposes. The term "exploit" derives from
600-547: A fee. The Free Software Foundation encourages selling free software. As the Foundation has written, "distributing free software is an opportunity to raise funds for development. Don't waste it!". For example, the FSF's own recommended license (the GNU GPL ) states that "[you] may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for
675-447: A fee." Microsoft CEO Steve Ballmer stated in 2001 that "open source is not available to commercial companies. The way the license is written, if you use any open-source software, you have to make the rest of your software open source." This misunderstanding is based on a requirement of copyleft licenses (like the GPL) that if one distributes modified versions of software, they must release
750-484: A for-profit, commercial activity or not. Some free software is developed by volunteer computer programmers while other is developed by corporations; or even by both. Although both definitions refer to almost equivalent corpora of programs, the Free Software Foundation recommends using the term "free software" rather than " open-source software " (an alternative, yet similar, concept coined in 1998), because
825-535: A lack of developers. The Samba TNG team frequently directed potential users towards Samba because of its better support and development. A key goal of the Samba TNG project was to rewrite all of the NT Domains services as FreeDCE projects. This was made difficult as the services were developed manually through network reverse-engineering, with limited or no reference to DCE/RPC documentation. A key difference from Samba
SECTION 10
#1732876582068900-667: A proof-of-concept exploit for the netlogon vulnerability called Zerologon (CVE|2020-1472) for which a patch exists since August was published. Some federal agencies using the software have been ordered to install the patch. Samba allows file and print sharing between computers running Microsoft Windows and computers running Unix. It is an implementation of dozens of services and a dozen protocols, including: All these services and protocols are frequently incorrectly referred to as just NetBIOS or SMB. The NBT (NetBIOS over TCP/IP) and WINS protocols, and their underlying SMB version 1 protocol, are deprecated on Windows. Since Windows Vista
975-559: A significant part in the development of the Internet, the World Wide Web and the infrastructure of dot-com companies . Free software allows users to cooperate in enhancing and refining the programs they use; free software is a pure public good rather than a private good . Companies that contribute to free software increase commercial innovation . "We migrated key functions from Windows to Linux because we needed an operating system that
1050-488: A small set of licenses. The most popular of these licenses are: The Free Software Foundation and the Open Source Initiative both publish lists of licenses that they find to comply with their own definitions of free software and open-source software respectively: The FSF list is not prescriptive: free-software licenses can exist that the FSF has not heard about, or considered important enough to write about. So it
1125-406: A system's defenses. Common targets for exploits include operating systems , web browsers , and various applications , where hidden vulnerabilities can compromise the integrity and security of computer systems . Exploits can cause unintended or unanticipated behavior in systems, potentially leading to severe security breaches . Many exploits are designed to provide superuser -level access to
1200-422: A target network. By compromising a system, attackers can leverage it as a platform to target other systems that are typically shielded from direct external access by firewalls . Internal networks often contain a broader range of accessible machines compared to those exposed to the internet. For example, an attacker might compromise a web server on a corporate network and then utilize it to target other systems within
1275-617: Is an example of a federally funded free-software project. Proprietary software, on the other hand, tends to use a different business model, where a customer of the proprietary application pays a fee for a license to legally access and use it. This license may grant the customer the ability to configure some or no parts of the software themselves. Often some level of support is included in the purchase of proprietary software, but additional support services (especially for enterprise applications) are usually available for an additional fee. Some proprietary software vendors will also customize software for
1350-466: Is biased by counting more vulnerabilities for the free software systems, since their source code is accessible and their community is more forthcoming about what problems exist as a part of full disclosure , and proprietary software systems can have undisclosed societal drawbacks, such as disenfranchising less fortunate would-be users of free programs. As users can analyse and trace the source code, many more people with no commercial constraints can inspect
1425-535: Is consistent with the intended meaning unlike the term "Open Source". The loan adjective " libre " is often used to avoid the ambiguity of the word "free" in the English language , and the ambiguity with the older usage of "free software" as public-domain software. ( See Gratis versus libre . ) The first formal definition of free software was published by FSF in February 1986. That definition, written by Richard Stallman ,
1500-451: Is debate over the security of free software in comparison to proprietary software, with a major issue being security through obscurity . A popular quantitative test in computer security is to use relative counting of known unpatched security flaws. Generally, users of this method advise avoiding products that lack fixes for known security flaws, at least until a fix is available. Free software advocates strongly believe that this methodology
1575-421: Is disclosed to the authors of the affected software, the associated vulnerability is often fixed through a patch , rendering the exploit unusable. This is why some black hat hackers , as well as military or intelligence agency hackers, do not publish their exploits but keep them private. One scheme that offers zero-day exploits is known as exploit as a service . Researchers estimate that malicious exploits cost
SECTION 20
#17328765820681650-525: Is included in most Linux distributions and is started during the boot process. On Red Hat, for instance, the /etc/rc.d/init.d/smb script runs at boot time, and starts both daemons. Samba is not included in Solaris 8, but a Solaris 8-compatible version is available from the Samba website. The OS/2 -based ArcaOS includes Samba to replace the old IBM LAN Server software. Samba includes a web administration tool called Samba Web Administration Tool (SWAT). SWAT
1725-463: Is like considering the practical advantages of not being handcuffed, in that it is not necessary for an individual to consider practical reasons in order to realize that being handcuffed is undesirable in itself. The FSF also notes that "Open Source" has exactly one specific meaning in common English, namely that "you can look at the source code." It states that while the term "Free Software" can lead to two different interpretations, at least one of them
1800-419: Is not covered by copyright law, such as software in the public domain , is free as long as the source code is also in the public domain, or otherwise available without restrictions. Proprietary software uses restrictive software licences or EULAs and usually does not provide users with the source code. Users are thus legally or technically prevented from changing the software, and this results in reliance on
1875-491: Is not endorsed by the FSF and does not use Linux-libre, it is also a popular distribution available without kernel blobs by default since 2011. The Linux community uses the term "blob" to refer to all nonfree firmware in a kernel whereas OpenBSD uses the term to refer to device drivers. The FSF does not consider OpenBSD to be blob free under the Linux community's definition of blob. Selling software under any free-software licence
1950-598: Is not in the IT sector choose free software for their Internet information and sales sites, due to the lower initial capital investment and ability to freely customize the application packages. Most companies in the software business include free software in their commercial products if the licenses allow that. Free software is generally available at no cost and can result in permanently lower TCO ( total cost of ownership ) compared to proprietary software . With free software, businesses can fit software to their specific needs by changing
2025-415: Is permissible, as is commercial use. This is true for licenses with or without copyleft . Since free software may be freely redistributed, it is generally available at little or no fee. Free software business models are usually based on adding value such as customization, accompanying hardware, support, training, integration, or certification. Exceptions exist however, where the user is charged to obtain
2100-511: Is possible for a license to be free and not in the FSF list. The OSI list only lists licenses that have been submitted, considered and approved. All open-source licenses must meet the Open Source Definition in order to be officially recognized as open source software. Free software, on the other hand, is a more informal classification that does not rely on official recognition. Nevertheless, software licensed under licenses that do not meet
2175-644: Is still maintained today and states that software is free software if people who receive a copy of the software have the following four freedoms. The numbering begins with zero, not only as a spoof on the common usage of zero-based numbering in programming languages, but also because "Freedom 0" was not initially included in the list, but later added first in the list as it was considered very important. Freedoms 1 and 3 require source code to be available because studying and modifying software without its source code can range from highly impractical to nearly impossible. Thus, free software means that computer users have
2250-598: Is summarized at the Debian web site. It is rare that a license announced as being in-compliance with the FSF guidelines does not also meet the Open Source Definition , although the reverse is not necessarily true (for example, the NASA Open Source Agreement is an OSI-approved license, but non-free according to FSF). There are different categories of free software. Proponents of permissive and copyleft licenses disagree on whether software freedom should be viewed as
2325-730: The Apache web server; and the Sendmail mail transport agent. Other influential examples include the Emacs text editor; the GIMP raster drawing and image editor; the X Window System graphical-display system; the LibreOffice office suite; and the TeX and LaTeX typesetting systems. From the 1950s up until the early 1970s, it was normal for computer users to have the software freedoms associated with free software, which
Samba (software) - Misplaced Pages Continue
2400-578: The BSD variants, including Apple macOS ( Mac OS X 10.2 and greater) and macOS Server . Samba also runs on a number of other operating systems such as OpenVMS and IBM i . Samba is standard on nearly all distributions of Linux and is commonly included as a basic system service on other Unix-based operating systems as well. Samba is released under the terms of the GNU General Public License . The name Samba comes from SMB ( Server Message Block ),
2475-452: The GNU Project : a collaborative effort to create a freedom-respecting operating system , and to revive the spirit of cooperation once prevalent among hackers during the early days of computing. Free software differs from: For software under the purview of copyright to be free, it must carry a software license whereby the author grants users the aforementioned rights. Software that
2550-807: The GNU operating system began in January 1984, and the Free Software Foundation (FSF) was founded in October 1985. He developed a free software definition and the concept of " copyleft ", designed to ensure software freedom for all. Some non-software industries are beginning to use techniques similar to those used in free software development for their research and development process; scientists, for example, are looking towards more open development processes, and hardware such as microchips are beginning to be developed with specifications released under copyleft licenses ( see
2625-714: The Linux kernel and other device drivers motivated some developers in Ireland to launch gNewSense , a Linux-based distribution with all the binary blobs removed. The project received support from the Free Software Foundation and stimulated the creation, headed by the Free Software Foundation Latin America , of the Linux-libre kernel. As of October 2012 , Trisquel is the most popular FSF endorsed Linux distribution ranked by Distrowatch (over 12 months). While Debian
2700-635: The OpenCores project, for instance ). Creative Commons and the free-culture movement have also been largely influenced by the free software movement. In 1983, Richard Stallman , longtime member of the hacker community at the MIT Artificial Intelligence Laboratory , announced the GNU Project, saying that he had become frustrated with the effects of the change in culture of the computer industry and its users. Software development for
2775-510: The WS-Discovery protocol has been included along with SMB2 and its successors, which supersede these. (WS-Discovery is implemented on Unix-like platforms by third party daemons which allow Samba shares to be discovered when the deprecated protocols are disabled). Samba sets up network shares for chosen Unix directories (including all contained subdirectories). These appear to Microsoft Windows users as normal Windows folders accessible via
2850-400: The global economy over US$ 450 billion annually. In response to this threat, organizations are increasingly utilizing cyber threat intelligence to identify vulnerabilities and prevent hacks before they occur. There are several methods of classifying exploits. The most common is by how the exploit communicates to the vulnerable software. A remote exploit works over a network and exploits
2925-410: The source code was distributed to use these programs. Software was also shared and distributed as printed source code ( Type-in program ) in computer magazines (like Creative Computing , SoftSide , Compute! , Byte , etc.) and books, like the bestseller BASIC Computer Games . By the early 1970s, the picture changed: software costs were dramatically increasing, a growing software industry
3000-596: The system dictionary looking for words that contained the letters S, M, and B, in that order (i.e. grep -i '^s.*m.*b' /usr/share/dict/words ). Versions 1.6, 1.7, 1.8, and 1.9 followed relatively quickly, with the latter being released in January 1995. Tridgell considers the adoption of CVS in May 1996 to mark the birth of the Samba Team, though there had been contributions from other people, especially Jeremy Allison , previously. Version 2.0.0, released in January 1999,
3075-532: The English verb "to exploit," meaning "to use something to one’s own advantage." Exploits are designed to identify flaws, bypass security measures, gain unauthorized access to systems, take control of systems, install malware , or steal sensitive data . While an exploit by itself may not be a malware , it serves as a vehicle for delivering malicious software by breaching security controls . Exploits target vulnerabilities, which are essentially flaws or weaknesses in
Samba (software) - Misplaced Pages Continue
3150-543: The Free Software Definition cannot rightly be considered free software. Apart from these two organizations, the Debian project is seen by some to provide useful advice on whether particular licenses comply with their Debian Free Software Guidelines . Debian does not publish a list of approved licenses, so its judgments have to be tracked by checking what software they have allowed into their software archives. That
3225-617: The GNU operating system began in January 1984, and the Free Software Foundation (FSF) was founded in October 1985. An article outlining the project and its goals was published in March 1985 titled the GNU Manifesto . The manifesto included significant explanation of the GNU philosophy, Free Software Definition and " copyleft " ideas. The Linux kernel , started by Linus Torvalds , was released as freely modifiable source code in 1991. The first licence
3300-511: The Internet. Users can easily download and install those applications via a package manager that comes included with most Linux distributions . The Free Software Directory maintains a large database of free-software packages. Some of the best-known examples include Linux-libre , Linux-based operating systems, the GNU Compiler Collection and C library ; the MySQL relational database;
3375-588: The code and find bugs and loopholes than a corporation would find practicable. According to Richard Stallman, user access to the source code makes deploying free software with undesirable hidden spyware functionality far more difficult than for proprietary software. Some quantitative studies have been done on the subject. In 2006, OpenBSD started the first campaign against the use of binary blobs in kernels . Blobs are usually freely distributable device drivers for hardware from vendors that do not reveal driver source code to users or developers. This restricts
3450-502: The files of others unless that permission would normally exist. Note that the netlogon share, typically distributed as a read only share from /etc/samba/netlogon , is the logon directory for user logon scripts. Samba services are implemented as two daemons : Samba configuration is achieved by editing a single file (typically installed as /etc/smb.conf or /etc/samba/smb.conf ). Samba can also provide user logon scripts and group policy implementation through poledit . Samba
3525-474: The first half of January 1992; Tridgell simply referred to it as "a Unix file server for Dos Pathworks." He understood that he had "in fact implemented the netbios protocol" at the time of version 1.0 and that "this software could be used with other PC clients." With a focus on interoperability with Microsoft's LAN Manager , Tridgell released "netbios for unix", observer, version 1.5 in December 1993. This release
3600-423: The freedom to cooperate with whom they choose, and to control the software they use. To summarize this into a remark distinguishing libre (freedom) software from gratis (zero price) software, the Free Software Foundation says: "Free software is a matter of liberty, not price. To understand the concept, you should think of 'free' as in ' free speech ', not as in 'free beer ' ". ( See Gratis versus libre . ) In
3675-412: The goals and messaging are quite dissimilar. According to the Free Software Foundation, "Open source" and its associated campaign mostly focus on the technicalities of the public development model and marketing free software to businesses, while taking the ethical issue of user rights very lightly or even antagonistically. Stallman has also stated that considering the practical advantages of free software
3750-409: The government charged that bundled software was anti-competitive . While some software might always be free, there would henceforth be a growing amount of software produced primarily for sale. In the 1970s and early 1980s, the software industry began using technical measures (such as only distributing binary copies of computer programs ) to prevent computer users from being able to study or adapt
3825-501: The impression that users have an obligation (as opposed to a right) to give non-users a copy of the program. Although the term "free software" had already been used loosely in the past and other permissive software like the Berkeley Software Distribution released in 1978 existed, Richard Stallman is credited with tying it to the sense under discussion and starting the free software movement in 1983, when he launched
SECTION 50
#17328765820683900-421: The late 1990s, other groups published their own definitions that describe an almost identical set of software. The most notable are Debian Free Software Guidelines published in 1997, and The Open Source Definition , published in 1998. The BSD -based operating systems, such as FreeBSD , OpenBSD , and NetBSD , do not have their own formal definitions of free software. Users of these systems generally find
3975-414: The most sought after exploits (specifically on the underground exploit market) because the target typically has no way of knowing they have been compromised at the time of exploitation. In 2022, NSO Group was reportedly selling zero-click exploits to governments for breaking into individuals' phones. Pivoting is a technique employed by both hackers and penetration testers to expand their access within
4050-585: The name of the proprietary protocol used by the Microsoft Windows network file system. Andrew Tridgell developed the first version of Samba Unix in December 1991 and January 1992, as a PhD student at the Australian National University , using a packet sniffer to do network analysis of the protocol used by DEC Pathworks server software. It did not have a formal name at the time of the first releases, versions 0.1, 0.5, and 1.0, all from
4125-488: The network code and build system. The multi-layered and modular approach made it easy to port each service to ReactOS. Free software The right to study and modify a computer program entails that the source code —the preferred format for making changes—be made available to users of that program. While this is often called "access to source code" or "public availability", the Free Software Foundation (FSF) recommends against thinking in those terms, because it might give
4200-557: The network. Unix users can either mount the shares directly as part of their file structure using the mount.cifs command or, alternatively, can use a utility, smbclient (libsmb) installed with Samba to read the shares with a similar interface to a standard command line FTP program. Each directory can have different access privileges overlaid on top of the normal Unix file protections. For example: home directories would have read/write access for all known users, allowing each to access their own files. However they would still not have access to
4275-468: The publisher to provide updates, help, and support. ( See also vendor lock-in and abandonware ). Users often may not reverse engineer , modify, or redistribute proprietary software. Beyond copyright law, contracts and a lack of source code, there can exist additional obstacles keeping users from exercising freedom over a piece of software, such as software patents and digital rights management (more specifically, tivoization ). Free software can be
4350-428: The same network. This approach is often referred to as a multi-layered attack. Pivoting is also known as island hopping . Pivoting can further be distinguished into proxy pivoting and VPN pivoting: Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the payload of an exploit. Pivoting is usually done by infiltrating a part of a network infrastructure (as an example,
4425-511: The same set of software to be acceptable, but sometimes see copyleft as restrictive. They generally advocate permissive free software licenses , which allow others to use the software as they wish, without being legally forced to provide the source code. Their view is that this permissive approach is more free. The Kerberos , X11 , and Apache software licenses are substantially similar in intent and implementation. There are thousands of free applications and many operating systems available on
4500-409: The security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access or physical access to the vulnerable system, and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with
4575-435: The shift in climate surrounding the computer world and its users. In his initial declaration of the project and its purpose, he specifically cited as a motivation his opposition to being asked to agree to non-disclosure agreements and restrictive licenses which prohibited the free sharing of potentially profitable in-development software, a prohibition directly contrary to the traditional hacker ethic . Software development for
SECTION 60
#17328765820684650-461: The software applications as they saw fit. In 1980, copyright law was extended to computer programs. In 1983, Richard Stallman , one of the original authors of the popular Emacs program and a longtime member of the hacker community at the MIT Artificial Intelligence Laboratory , announced the GNU Project , the purpose of which was to produce a completely non-proprietary Unix-compatible operating system, saying that he had become frustrated with
4725-443: The software themselves or by hiring programmers to modify it for them. Free software often has no warranty, and more importantly, generally does not assign legal liability to anyone. However, warranties are permitted between any two parties upon the condition of the software and its usage. Such an agreement is made separately from the free software license. A report by Standish Group estimates that adoption of free software has caused
4800-411: The source and use the same license. This requirement does not extend to other software from the same developer. The claim of incompatibility between commercial companies and free software is also a misunderstanding. There are several large companies, e.g. Red Hat and IBM (IBM acquired RedHat in 2019), which do substantial commercial business in the development of free software. Free software played
4875-418: The type of vulnerability they exploit (see vulnerabilities for a list) , whether they are local/remote and the result of running the exploit (e.g. EoP , DoS , spoofing ). A zero-click attack is an exploit that requires no user interaction to operate – that is to say, no key-presses or mouse clicks. FORCEDENTRY , discovered in 2021, is an example of a zero-click attack. These exploits are commonly
4950-495: The users' freedom effectively to modify the software and distribute modified versions. Also, since the blobs are undocumented and may have bugs , they pose a security risk to any operating system whose kernel includes them. The proclaimed aim of the campaign against blobs is to collect hardware documentation that allows developers to write free software drivers for that hardware, ultimately enabling all free operating systems to become or remain blob-free. The issue of binary blobs in
5025-535: Was a major release, support for authentication from Windows NT Primary Domain Controller, 64 bit filesystem support for very large files, and exposure of OPLOCKS to unix systems. Version 2.2.0 released in April 2001. Some versions of Samba 3.6.3 and lower suffer serious security issues which can allow anonymous users to gain root access to a system from an anonymous connection, through the exploitation of an error in Samba's remote procedure call . On 12 April 2016, Badlock,
5100-538: Was a proprietary software licence. However, with version 0.12 in February 1992, he relicensed the project under the GNU General Public License . Much like Unix, Torvalds' kernel attracted the attention of volunteer programmers. FreeBSD and NetBSD (both derived from 386BSD ) were released as free software when the USL v. BSDi lawsuit was settled out of court in 1993. OpenBSD forked from NetBSD in 1995. Also in 1995, The Apache HTTP Server , commonly referred to as Apache,
5175-402: Was competing with the hardware manufacturer's bundled software products (free in that the cost was included in the hardware cost), leased machines required software support while providing no revenue for software, and some customers able to better meet their own needs did not want the costs of "free" software bundled with hardware product costs. In United States vs. IBM , filed January 17, 1969,
5250-454: Was in the implementation of the NT Domains suite of protocols and MSRPC services. Samba makes all the NT Domains services available from a single place, whereas Samba TNG separated each service into its own program. ReactOS started using Samba TNG services for its SMB implementation. The developers of both projects were interested in seeing the Samba TNG design used to help get ReactOS talking to Windows networks. They worked together to adapt
5325-469: Was released under the Apache License 1.0 . All free-software licenses must grant users all the freedoms discussed above. However, unless the applications' licenses are compatible, combining programs by mixing source code or directly linking binaries is problematic, because of license technicalities . Programs indirectly connected together may avoid this problem. The majority of free software falls under
5400-450: Was removed starting with version 4.1. Samba TNG (The Next Generation) was forked in late 1999, after disagreements between the Samba Team leaders and Luke Leighton about the directions of the Samba project. They failed to come to an agreement on a development transition path which allowed the research version of Samba he was developing (known at the time as Samba-NTDOM) to slowly be integrated into Samba. Development has been minimal, due to
5475-659: Was stable and reliable – one that would give us in-house control. So if we needed to patch, adjust, or adapt, we could." Official statement of the United Space Alliance , which manages the computer systems for the International Space Station (ISS), regarding their May 2013 decision to migrate ISS computer systems from Windows to Linux The economic viability of free software has been recognized by large corporations such as IBM , Red Hat , and Sun Microsystems . Many companies whose core business
5550-460: Was the first to include client-software as well as a server. Also, at this time GPL2 was chosen as license. Midway through the 1.5-series, the name was changed to smbserver . However, Tridgell got a trademark notice from the company "Syntax", who sold a product named TotalNet Advanced Server and owned the trademark for "SMBserver". The name "Samba" was derived by running the Unix command grep through
5625-407: Was typically public-domain software . Software was commonly shared by individuals who used computers and by hardware manufacturers who welcomed the fact that people were making software that made their hardware useful. Organizations of users and suppliers, for example, SHARE , were formed to facilitate exchange of software. As software was often written in an interpreted language such as BASIC ,
#67932