Footnotes
Preface
[1] In 2006, this same author renewed his amateur radio license and carried out the entire process via the FCC Web site. It's amazing to think how far e-government has come in these 12 years.
Chapter 1
[1] Not long ago, Windows guru Mark Russinovich discovered that certain Sony music CDs silently install a rootkit on users' machines to allow Sony to enforce copy protection [Rus05]. Such tactics, along with threatening lawsuits, make the anti-RIAA standpoint easy to understand.
[2] In case you're curious, this memory boundary is the boundary between two pages in the virtual memory system. Yes, Tenex allowed the user to lay out the guessed password so that the tail end was in a memory page that was not currently resident.
Get The Craft of System Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.