From 853a0fb0c43567bac299ae67419c8767eb1884a6 Mon Sep 17 00:00:00 2001 From: Alain Reguera Delgado Date: Oct 02 2011 02:22:51 +0000 Subject: Update `Configurations/Ppp/intro.docbook'. --- diff --git a/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook b/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook index 1489348..6c3a7b8 100644 --- a/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook +++ b/Manuals/Tcpi-ug/Configurations/Ppp/intro.docbook @@ -3,36 +3,18 @@ Introduction - This chapter describes how to configure a small Internet - Service Provider (ISP) accesable through the telephone line. - In this chapter, the computer holding the ISP is named the - server and the computer that want to make use - of such services is named the client. We assume - that both server and client computers have been installed with - &TCD; (release 5.5). - - - - In this configuration, both client and server computers use - modems to transmit data in form of sound through the telephone - lines system. The dial-up connection described in this chapter - could be a choise when the only communication medium you have - access to is the telephone lines system. - - - - This configuration emerged from the need of sharing - information with my friends in a country where Internet access - is limitted to statal organizations and controlled therein - with an increasing crazy-obsession. However, in this - environment, the telephone lines system provides an - alternative platform to interchange information in a - point-to-point fashion. It can be used to create small social - groups that can share ideas safetly (e.g., by using encrypted - point-to-point connections). To be more specific, the goal of - this work would be to provide public access to an ISP where - people can express themselves freely and develop their - personal projects (e.g., through mailing list). + This chapter describes two computers configuration, one acting + as server and other as client. The server computer will be + configured to provide internet services and the client to make + use of internet services provided by the server computer. The + connection medium both client and server computer use is the + telelphone line (i.e., the same medium you use to realize + phone calls). In this configuration, both client and server + computers use special devices named Modems to + transmit data in form of sound across the telephone line. The + configuration described in this chapter could be a good choise + when the only communication medium you have access to is the + telephone system. @@ -141,13 +123,26 @@ I'm very sorry about these limitations, but this is the best I can offer with one PC, one modem, and one single telephone line. If you think this configuration can be improved somehow, - please send me an e-mail to al@example.com. - Notice that, for any mail to reach my mailbox, you should be - registered inside the ISP first and used the ISP mail server - to send the mail. I don't answer phone calls personally, the - phone is very busy answering point-to-point connections ;). + please send me an e-mail to + al@projects.centos.org. Notice that, in order + for you to be able to send e-mails to this address you need to + do it using the Mail Transfer Agent provided in the server + computer. I don't answer phone calls personally, the phone is + very busy answering point-to-point connections ;). + + + The projects.centos.org mentioned in + this chapter must not be confused with the real infrastructure + provided by &TCP; on Internet. The domain name mentioned in + this chapter is not available on Internet and was created to + illustrate the real infrastructure inside an isolated + environment. + + + In order for you to share information with others, it is required that both you and the person you want to share @@ -213,57 +208,4 @@ - - In case some kind of force intend to confiscate me the - computer where the ISP is installed in, it should be noticed - that the whole ISP filesystem is encrypted in a way that it - would be very difficult to get any valid data from it, once it - be physically compromised. The encryption feature is applied - before the operating system starts. In this configuration a - password is required to decrypt the operating system - filesystem in order to be able of booting it up as expected. - If the password is not provided (or is incorrectly provided), - the only thing you get is a prompt to enter a password :-). - With this action I pretend to protect my work from the Cuban - political system. Presently (Oct 1, 2011), legal resolutions - related to Information Technologies (ITs) have been only - specified to Cuban State's organizations in a very - contradictory and restrictive way (see resolution 149 from - MIT). There is no public resolution covering management of - ITs at a level of natural citizens. The legal conception, as - far as I can see, is that no one can be independent from the - Cuban State (i.e., you need to work for it somehow and be - limitted to its working conditions). If you decide to work - for your own (i.e., based on a philosophy of life different - from that followed by the Cuban State) you will be considered - a dissident and will be rejected by a highly oppressed and - armless society. Because Cuban natural citizens don't count - with a legal definition about how to use ITs individually from - the Cuban State's point of view, it is very difficult to be - sure about the ground we are putting our feet on (e.g., the - State could use its force to affect our creation based on its - idea of appropriate usage, national - security, etc.). This way, dramatic measures like - encryption need to be considered in order to protect our - natural freedom of sharing our creation in whatever way we - decide to do it. - - - - Another important matter to be aware of is about the ISP's - policy. In order to keep freedom, it is required to define - the boundaries of that freedom so you can determine and judge - it. Absolute freedom would end up in total destruction and - absolute restriction would suppress the natural freedom of - human beings to express themselves individually. So a middle - point will be used. For example, if you think you have the - freedom to abuse the ISP I provide (e.g., by spamming it, or - by provoking denying of service attacks) you probably do, but - consider that I will make use of my freedom to immediatly - banish you for trying to destroy my work. On the other hand, - if you show yourself as an educated and good-will person with - solid ideas and reasons to share, you'll be totally welcome to - stay. - -