Wietse Venema

Last updated
Wietse Venema
Wietse Venema (cropped).jpg
Wietse Venema speaking at a conference in 2004
Born1951 (age 7273)
Nationality Dutch
Alma mater University of Groningen
Known for Postfix MTA, TCP Wrappers
Scientific career
Fields Computer science
Institutions Google, Inc.
Thomas J. Watson Research Center
Eindhoven University of Technology

Wietse Zweitze Venema (born 1951) is a Dutch programmer and physicist best known for writing the Postfix email system. He also wrote TCP Wrapper and collaborated with Dan Farmer to produce the computer security tools SATAN and The Coroner's Toolkit. [1] [2] [3]

Contents

Biography

He studied physics at the University of Groningen, continuing there to get a PhD in 1984 with the dissertation Left-right symmetry in nuclear beta decay. [4] He spent 12 years at Eindhoven University as a systems architect in the Mathematics and Computer Science department, and spent part of this time writing tools for Electronic Data Interchange. Since emigrating to the U.S. in 1996 and until 2015, he has been working for the IBM Thomas J. Watson Research Center in New York State. [5] On March 24, 2015, he announced he was leaving IBM for Google. [6]

Awards

Awards Venema has received for his work: [7]

Related Research Articles

<span class="mw-page-title-main">IBM AIX</span> Series of Unix operating systems from IBM

AIX is a series of proprietary Unix operating systems developed and sold by IBM for several of its computer platforms.

<span class="mw-page-title-main">Information Sciences Institute</span> University of Southern California research institute

The USC Information Sciences Institute (ISI) is a component of the University of Southern California (USC) Viterbi School of Engineering, and specializes in research and development in information processing, computing, and communications technologies. It is located in Marina del Rey, California.

<span class="mw-page-title-main">NLUUG</span> Dutch association of UNIX and Linux users

The NLUUG is an association of professional UNIX and Linux users in the Netherlands. The group aims to increase and extend the awareness and use of Open Standards and similar open systems and Open Source software.

<span class="mw-page-title-main">Software release life cycle</span> Sum of the phases of development and maturity for computer software

The software release life cycle is the process of developing, testing, and distributing a software product. It typically consists of several stages, such as pre-alpha, alpha, beta, and release candidate, before the final version, or "gold", is released to the public.

Peter Norton is an American programmer, software publisher, author, and philanthropist. He is best known for the computer programs and books that bear his name and portrait. Norton sold his software business to Symantec Corporation in 1990.

<span class="mw-page-title-main">FSF Free Software Awards</span>

The Free Software Foundation (FSF) grants two annual awards. Since 1998, FSF has granted the award for Advancement of Free Software and since 2005, also the Free Software Award for Projects of Social Benefit.

TCP Wrappers is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens on which to filter for access control purposes.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

<span class="mw-page-title-main">Van Jacobson</span> American computer scientist

Van Jacobson is an American computer scientist, renowned for his work on TCP/IP network performance and scaling. He is one of the primary contributors to the TCP/IP protocol stack—the technological foundation of today’s Internet. Since 2013, Jacobson is an adjunct professor at the University of California, Los Angeles (UCLA) working on Named Data Networking.

<span class="mw-page-title-main">Thomas J. Watson Research Center</span> Research institute in New York, US

The Thomas J. Watson Research Center is the headquarters for IBM Research. The center comprises three sites, with its main laboratory in Yorktown Heights, New York, U.S., 38 miles (61 km) north of New York City, New York and with facilities in Cambridge, Massachusetts and Albany, New York.

<span class="mw-page-title-main">Dan Farmer</span> American computer security researcher and programmer

Dan Farmer is an American computer security researcher and programmer who was a pioneer in the development of vulnerability scanners for Unix operating systems and computer networks.

Security Administrator Tool for Analyzing Networks (SATAN) was a free software vulnerability scanner for analyzing networked computers. SATAN captured the attention of a broad technical audience, appearing in PC Magazine and drawing threats from the United States Department of Justice. It featured a web interface, complete with forms to enter targets, tables to display results, and context-sensitive tutorials that appeared when a vulnerability had been found.

<span class="mw-page-title-main">Douglas Comer</span> American computer scientist

Douglas Earl Comer is a professor of computer science at Purdue University, where he teaches courses on operating systems and computer networks. He has written numerous research papers and textbooks, and currently heads several networking research projects. He has been involved in TCP/IP and internetworking since the late 1970s, and is an internationally recognized authority. He designed and implemented X25NET and Cypress networks, and the Xinu operating system. He is director of the Internetworking Research Group at Purdue, editor of Software - Practice and Experience, and a former member of the Internet Architecture Board. Comer completed the original version of Xinu in 1979. Since then, Xinu has been expanded and ported to a wide variety of platforms, including: IBM PC, Macintosh, Digital Equipment Corporation VAX and DECstation 3100, Sun Microsystems Sun-2, Sun-3 and SPARCstations, and Intel Pentium. It has been used as the basis for many research projects. Furthermore, Xinu has been used as an embedded system in products by companies such as Motorola, Mitsubishi, Hewlett-Packard, and Lexmark.

SAINT is computer software used for scanning computer networks for security vulnerabilities, and exploiting found vulnerabilities.

<span class="mw-page-title-main">Glenn Ricart</span> Computer scientist and Internet pioneer

Glenn Ricart is a computer scientist. He was influential in the development of the Internet (ARPANET) going back to 1969 and early implementation of the TCP/IP protocol. Since then he has been active in technology and business as well as donating his time to philanthropic and educational movements.

<span class="mw-page-title-main">Fail2ban</span> Intrusion prevention software framework

Fail2Ban is an intrusion prevention software framework. Written in the Python programming language, it is designed to prevent brute-force attacks. It is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, such as iptables or TCP Wrapper.

<span class="mw-page-title-main">Android Debug Bridge</span> Tool for debugging Android-based devices

The Android Debug Bridge is a programming tool used for the debugging of Android-based devices. The daemon on the Android device connects with the server on the host PC over USB or TCP, which connects to the client that is used by the end-user over TCP. Made available as open-source software under the Apache License by Google since 2007, its features include a shell and the possibility to make backups. The adb software is available for Windows, Linux and macOS. It has been misused by botnets and other malware, for which mitigations were developed such as RSA authentication and device whitelisting.

Amavis is an open-source content filter for electronic mail, implementing mail message transfer, decoding, some processing and checking, and interfacing with external content filters to provide protection against spam and viruses and other malware. It can be considered an interface between a mailer and one or more content filters.

References

  1. "Wietse Venema". Faces of Open Source. 2018-10-01.
  2. Dunston, Duane; Day, Brittany (2004-07-08). "Catching up with Wietse Venema, creator of Postfix and TCP Wrapper". LinuxSecurity.com.
  3. "The Wietse Venema Interview". safemode.org. 2002. Retrieved 2020-07-14.
  4. Venema, Wietse Zweitze (1984). Left-right symmetry in nuclear beta decay (Thesis fully internal (DIV)). University of Groningen. hdl:11370/b087d2cd-512c-4338-b870-275d221147c4.
  5. "Wietse Z. Venema: UNIX/Internet Security". IBM. Archived from the original on 2014-08-08.
  6. Venema, Wietse Zweitze (2015-03-24). "Goodbye IBM, Hello Google". postfix-users mailing list.
  7. "Wietse's Awards". porcupine.org.