[Squeak-e] What is E and squeak-e?

shane at shaneroberts.com shane at shaneroberts.com
Sat Feb 1 14:52:03 CET 2003

I'm probably familiar with some of the background.

I have been a programmer since 1980 and have followed trends in 
the industry over the years, to a certain extent.

I am familiar with the background of Smalltalk and Squeak.

What I am not familiar with is capabilities, which I only stumbled on 
recently.  My interest in the E-list is that I want to understand how to 
implement Internet security in relation to distributed objects, secure 
communications, and resisting hacker attacks (not sure there is a 
way to defend against denial of service under the present Internet 
implementation, except for certain router configuration techniques).

Anyway, in skimming through the capabilities literature, it seems 
access lists are considered cumbersome and ineffectual, and that 
"capabilities or better."  Thus I am curious to learn more.


On 1 Feb 2003 at 14:32, Robert Withers wrote:

> Welcome to squeak, Shane.
> On Friday, January 31, 2003, at 11:56 PM, shane at shaneroberts.com
> wrote:
> > Can someone give me a little background on how this list appeared
> > and what the topic is?
> How much background are you looking for?  I believe it starts in the
> late '60s  :)  There is a lot of history here.  See
> http://minnow.cc.gatech.edu/squeak/389
> The list was just formed to take a look at what a secure squeak would
> look and smell like.
> see http://www.squeak.org and http://www.erights.org
> cheers,
> rob
> _______________________________________________
> Squeak-e mailing list
> Squeak-e at lists.squeakfoundation.org
> http://lists.squeakfoundation.org/listinfo/squeak-e

More information about the Squeak-e mailing list