A Selectric printer...
I have an I/O Selectric device which is badged as, and was originally, an IBM 2970 Reservation Terminal. For better or worse, it was one of those bought up in the late 1970s by a company called 'Western I/O", based out of Scottsdale Arizona. They converted them for home use. One version used a Motorola 6800 to make a nifty-sounding terminal with selectable baud rates etc. I appear to have the 'other' version; a cheap and nasty printer-only conversion with some form of parallel port. Anybody else got one? Docs about them? Parts? Schematics? I'd like to get hold of one of the 'proper' terminal conversion versions... Must be some squirreled away in garages! Alternatively, any doc on the original 2970? There's an incredible dearth of information about what we're once very common devices...
Re: A Selectric printer...
On 2015-11-22 9:20 AM, Mike Ross wrote: I have an I/O Selectric device which is badged as, and was originally, an IBM 2970 Reservation Terminal. For better or worse, it was one of those bought up in the late 1970s by a company called 'Western I/O", based out of Scottsdale Arizona. They converted them for home use. One version used a Motorola 6800 to make a nifty-sounding terminal with selectable baud rates etc. I appear to have the 'other' version; a cheap and nasty printer-only conversion with some form of parallel port. Anybody else got one? Docs about them? Parts? Schematics? I'd like to get hold of one of the 'proper' terminal conversion versions... Must be some squirreled away in garages! Alternatively, any doc on the original 2970? There's an incredible dearth of information about what we're once very common devices... Did you get the whole machine typewriter and control unit or just the typewriter? If you got the control unit the manuals may be inside. The typewriter part of it is just a modified office selectric with solenoids to do the selection and operate the functions and then a whole bunch of open strap contacts for feedback and also to sense what is typed on the keyboard. One of the first problems you may encounter is the motor belt is likely rotten and would be a challenge to change if you have never been inside a selectric, especially with all the extra stuff hung off it on an I/O. The reservation terminals I worked on nearly 40 years ago where connected to a telegraph line. 75 baud with about a 150V DC swing. Pictures? Paul.
Re: Fw: new message
On Sun, 22 Nov 2015, Eric Christopherson wrote: My ISP injects into web pages a helpful heads-up message if your account If you can, run screaming to another ISP. I don't care how "helpful" they're trying to be, content injection like that should be punished with a public skinning. Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents their shenannigans. g. -- Proud owner of F-15C 80-0007 http://www.f15sim.com - The only one of its kind. http://www.diy-cockpits.org/coll - Go Collimated or Go Home. Some people collect things for a hobby. Geeks collect hobbies. ScarletDME - The red hot Data Management Environment A Multi-Value database for the masses, not the classes. http://scarlet.deltasoft.com - Get it _today_!
Re: Fw: new message
On 2015-11-22 10:05 AM, geneb wrote: On Sun, 22 Nov 2015, Eric Christopherson wrote: My ISP injects into web pages a helpful heads-up message if your account If you can, run screaming to another ISP. I don't care how "helpful" they're trying to be, content injection like that should be punished with a public skinning. +1. It's actually a helpful reminder to change ISP's. --Toby Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents their shenannigans. g.
Re: Fw: new message
A question for the OP. I know that since all the Snowden stuff that took place back a bit, many sites have moved from http to https. Is your ISP able to inject content into "secure" https connections? Or only http transactions, going across the wire in plain text? Jerry On 11/22/15 09:05 AM, geneb wrote: On Sun, 22 Nov 2015, Eric Christopherson wrote: My ISP injects into web pages a helpful heads-up message if your account If you can, run screaming to another ISP. I don't care how "helpful" they're trying to be, content injection like that should be punished with a public skinning. Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents their shenannigans. g.
Re: Looking for an IBM manual PDF
"Concentrated evil" was the best expression of the month. Congratulations, Al! :o) 2015-11-21 14:47 GMT-02:00 Al Kossow : > On 11/21/15 1:38 AM, Christian Gauger-Cosgrove wrote: > > Unfortunately, downloading the DjVu file does nothing >> > > and Firefox reports it as a web forgery. > > If someone can find real djvu files for those manuals, I will > convert them to pdf and put them on bitsavers. > > Any site that requires you to start java and use their djvu > web applet is concentrated evil. > > > >
Re: Fw: new message
On Sun, Nov 22, 2015, Jerry Kemp wrote: > A question for the OP. > > I know that since all the Snowden stuff that took place back a bit, many > sites have moved from http to https. > > Is your ISP able to inject content into "secure" https connections? Or only > http transactions, going across the wire in plain text? > > Jerry I'm not sure, but I'm betting https sites just refuse to connect -- which is how my employer's network handles https. > On 11/22/15 09:05 AM, geneb wrote: > >On Sun, 22 Nov 2015, Eric Christopherson wrote: > > > >>My ISP injects into web pages a helpful heads-up message if your account > >If you can, run screaming to another ISP. I don't care how "helpful" they're > >trying to be, content injection like that should be punished with a public > >skinning. > > > >Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that > >prevents > >their shenannigans. > > > >g. > > -- Eric Christopherson
Re: new message
> On Nov 22, 2015, at 3:30 PM, Jerry Kemp wrote: > > A question for the OP. > > I know that since all the Snowden stuff that took place back a bit, many > sites have moved from http to https. > > Is your ISP able to inject content into "secure" https connections? Or only > http transactions, going across the wire in plain text? https is supposed to prevent "man in the middle" attacks, provided you enforce certificate validity. Another option if you have people messing with your web access is Tor. paul
Re: new message
> https is supposed to prevent "man in the middle" attacks, provided you enfor$ That was the original theory, as I understand it. But there are way too many "in most browsers by default" CAs that are willing to sell wildcard certs such as can be used for MitM attacks without disturbing cert validity checks. I even recall hearing of some caching proxy (squid maybe?) that, out of the box, could use such a cert to provide caching for HTTPS connections - they're that common. Not surprising, really. The CA hierarchy is both the most central point and quite possibly the most commercialized and thus most venal point, so it's natural that it would be the major point that's come under attack by actors wishing to compromise the security HTTPS could have offered. (Some of them, probably, even have the best of intentions) > Another option if you have people messing with your web access is > Tor. Or, of course, file bug reports with the provider in question and, if they're honest enough to admit what they're doing, switch. I know _I_ certainly wouldn't tolerate that sort of messing with my data stream. For those unfortunate enough to have nobody affordable to switch to, all I can suggest is ssh (or operational equivalent, such as a VPN) to a hosted, possibly virtual, machine somewhere not behind such crippling restrictions. (Depending on such factors as the jurisdiction and your dedication to the cause, a lawsuit might also be an option.) /~\ The ASCII Mouse \ / Ribbon Campaign X Against HTMLmo...@rodents-montreal.org / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Re: Fw: new message
At 10:05 AM 11/22/2015, geneb wrote: >Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents >their shenannigans. IMHO, Google has enough shenanigans of their own. I use the Level3 DNS (4.2.2.1 / 4.2.2.2 / 4.2.2.3). Dale H. Cook, Roanoke/Lynchburg, VA Osborne 1 / Kaypro 4-84 / Kaypro 1 / Amstrad PPC-640 http://plymouthcolony.net/starcity/radios/index.html
HTTPS and man-in-the-middle - was Re: new message
On 2015-11-22 5:25 PM, Mouse wrote: https is supposed to prevent "man in the middle" attacks, provided you enfor$ That was the original theory, as I understand it. But there are way too many "in most browsers by default" CAs that are willing to sell wildcard certs such as can be used for MitM attacks without disturbing cert validity checks. I even recall hearing of some caching proxy (squid maybe?) that, out of the box, could use such a Microsoft Forefront TMG maybe? http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/ --Toby cert to provide caching for HTTPS connections - they're that common. ... /~\ The ASCII Mouse \ / Ribbon Campaign X Against HTML mo...@rodents-montreal.org / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Re: new message
> On Nov 22, 2015, at 7:01 PM, Dale H. Cook wrote: > > At 10:05 AM 11/22/2015, geneb wrote: > >> Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that >> prevents their shenannigans. > > IMHO, Google has enough shenanigans of their own. I use the Level3 DNS > (4.2.2.1 / 4.2.2.2 / 4.2.2.3). If you have a Unix box as your firewall, as I do, it's not hard to set up your own DNS server to serve the machines behind it. Then you can just load the current root files and take it from there. paul
Re: 1980s/1990s 68k C cross (and not so cross) compilers
On 11/21/2015 4:54 AM, Philip Pemberton wrote: Hi there, I'm working on reverse engineering a radio navigation receiver (surprisingly not GPS, something else... Datatrak if anyone's heard of it) for the purpose of either repurposing the hardware or building up some kind of demo rig. A lot of my effort at the moment seems to be identifying C Library functions and naming them. Ideally, I'd like to identify the compiler and CLib and feed that into the disassembler to eliminate that work. Does anyone know which 68000 compilers were available in 1993, and which could produce ROM code? Or a few? I've looked at Aztec C68K but ruled it out on the basis that the _strlen library function doesn't match up -- this is the one from the ROM: _strlen: movea.l 4(sp), a0 move.l a0, d0 _strlen_l001: tst.b(a0+) bne.s_strlen_l001 sub.la0, d0 not.ld0 rts Aztec is identical up to the bne, then: sub.ld0, a0 move.l a0, d0 sub,l#1, d0 rts Which is one instruction longer... so it's not Aztec. Other parts of the system apparently used VME-bus modules... so this wasn't a small operation. Anyway, whatever compiler this is, it pulls in Motorola's Fast Floating Point library. Thanks, There was also one by an outfit called Microtec or maybe Microtech or Microtek that ran on an IBM PC. There was an accompanying linker package. Mostly I loaded the code into RAM for execution, but I'm reasonably sure there was a way to create files to be used to burn EPROMs as well. I can't quite read the title on the currently non-reachable bookshelf unless I go round up a pair of binoculars. :-)
flash (or ide) storage for unibus 11?
I'm looking for a modern storage (ie. anywhere from 100mb to "huge") device for an 11/44. I think I have seen a few hobbyist projects that were flash based, I thought I saw one that was an IDE interface Long story short I've satisfied the purist in me by putting an RL02 on the machine, but that's just not enough storage for that particular system. Anyone know of a good project to add some modern storage to get me over the available storage on the RL02? J
Re: flash (or ide) storage for unibus 11?
> On Nov 22, 2015, at 7:29 PM, Jay West wrote: > > I'm looking for a modern storage (ie. anywhere from 100mb to "huge") device > for an 11/44. I think I have seen a few hobbyist projects that were flash > based, I thought I saw one that was an IDE interface > > Long story short I've satisfied the purist in me by putting an RL02 on the > machine, but that's just not enough storage for that particular system. > Anyone know of a good project to add some modern storage to get me over the > available storage on the RL02? What about some sort of SCSI-to-IDE adapter? Though I simply have a couple DEC SCSI drives for my /44, in addition to its pair of RL02’s. Zane
RE: flash (or ide) storage for unibus 11?
Alas... I have no scsi cards for any of my dec gear. I was hoping for a CF based device that plugs straight into the unibus... or similar solution... J
Re: A Selectric printer...
There are a couple of Yahoo groups for Selectric Typewriters and some have the docs for the IO selectrics. On Nov 22, 2015 6:51 PM, "Mike Ross" wrote: > I have an I/O Selectric device which is badged as, and was originally, an > IBM 2970 Reservation Terminal. > > For better or worse, it was one of those bought up in the late 1970s by a > company called 'Western I/O", based out of Scottsdale Arizona. They > converted them for home use. One version used a Motorola 6800 to make a > nifty-sounding terminal with selectable baud rates etc. I appear to have > the 'other' version; a cheap and nasty printer-only conversion with some > form of parallel port. > > Anybody else got one? Docs about them? Parts? Schematics? I'd like to get > hold of one of the 'proper' terminal conversion versions... Must be some > squirreled away in garages! > > Alternatively, any doc on the original 2970? There's an incredible dearth > of information about what we're once very common devices... >
Re: A Selectric printer...
list of groups please!?! neat! Ed# In a message dated 11/22/2015 9:05:14 P.M. US Mountain Standard Time, dave.g4...@gmail.com writes: There are a couple of Yahoo groups for Selectric Typewriters and some have the docs for the IO selectrics. On Nov 22, 2015 6:51 PM, "Mike Ross" wrote: > I have an I/O Selectric device which is badged as, and was originally, an > IBM 2970 Reservation Terminal. > > For better or worse, it was one of those bought up in the late 1970s by a > company called 'Western I/O", based out of Scottsdale Arizona. They > converted them for home use. One version used a Motorola 6800 to make a > nifty-sounding terminal with selectable baud rates etc. I appear to have > the 'other' version; a cheap and nasty printer-only conversion with some > form of parallel port. > > Anybody else got one? Docs about them? Parts? Schematics? I'd like to get > hold of one of the 'proper' terminal conversion versions... Must be some > squirreled away in garages! > > Alternatively, any doc on the original 2970? There's an incredible dearth > of information about what we're once very common devices... >
Re: HTTPS and man-in-the-middle - was Re: new message
For outbound TMG needs a browser plugin. For inbound its usual to terminate the SSL on the TMG firewall and then TMG opens a new SSL session to the backend web server. For this to work TMG needs to have a copy of the certificate including the private key. Wildcard certs are commonly used with TMG but having a FQDN only guarantees the server is under control of the certificate owner. You can have multiple sites on the same server, or have a single site load balanced across multiple servers. SQUID will do the same trick, but I have always run squid on the same box as the web farm, but this isn't required... On Nov 23, 2015 5:48 AM, "Toby Thain" wrote: > On 2015-11-22 5:25 PM, Mouse wrote: > >> https is supposed to prevent "man in the middle" attacks, provided you >>> enfor$ >>> >> >> That was the original theory, as I understand it. >> >> But there are way too many "in most browsers by default" CAs that are >> willing to sell wildcard certs such as can be used for MitM attacks >> without disturbing cert validity checks. I even recall hearing of some >> caching proxy (squid maybe?) that, out of the box, could use such a >> > > Microsoft Forefront TMG maybe? > > http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/ > > --Toby > > > cert to provide caching for HTTPS connections - they're that common. >> ... >> >> /~\ The ASCII Mouse >> \ / Ribbon Campaign >> X Against HTML mo...@rodents-montreal.org >> / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B >> >> >
Re: flash (or ide) storage for unibus 11?
It's on my (long) list of projects. I first have to finish the MEM11. That will have RF11/RS11s as part of the emulated devices. I'm planning on using the J1 and associated infrastructure for my other projects (which is why I've spent so much time getting them "right"). TTFN - Guy On 11/22/15 7:45 PM, Jay West wrote: Alas... I have no scsi cards for any of my dec gear. I was hoping for a CF based device that plugs straight into the unibus... or similar solution... J
Re: A Selectric printer...
Sorry I am in India and just have the mobile at present. Try http://groups.yahoo.com/group/golfballtypewritershop/ But not sure if URL is OK. list of groups please!?! neat! Ed# In a message dated 11/22/2015 9:05:14 P.M. US Mountain Standard Time, dave.g4...@gmail.com writes: There are a couple of Yahoo groups for Selectric Typewriters and some have the docs for the IO selectrics. On Nov 22, 2015 6:51 PM, "Mike Ross" wrote: > I have an I/O Selectric device which is badged as, and was originally, an > IBM 2970 Reservation Terminal. > > For better or worse, it was one of those bought up in the late 1970s by a > company called 'Western I/O", based out of Scottsdale Arizona. They > converted them for home use. One version used a Motorola 6800 to make a > nifty-sounding terminal with selectable baud rates etc. I appear to have > the 'other' version; a cheap and nasty printer-only conversion with some > form of parallel port. > > Anybody else got one? Docs about them? Parts? Schematics? I'd like to get > hold of one of the 'proper' terminal conversion versions... Must be some > squirreled away in garages! > > Alternatively, any doc on the original 2970? There's an incredible dearth > of information about what we're once very common devices... >
Re: flash (or ide) storage for unibus 11?
Plus one here. With all the SMD controllers languishing out there due to dead drives, you'd think there should be a way to make a cheap little glue board that could interface to a modern HDA, with the IDE bits ripped out, right? On Sun, Nov 22, 2015 at 11:18 PM, Guy Sotomayor wrote: > It's on my (long) list of projects. I first have to finish the MEM11. > That will have RF11/RS11s as part of the emulated devices. > > I'm planning on using the J1 and associated infrastructure for my other > projects (which is why I've spent so much time getting them "right"). > > TTFN - Guy > > > On 11/22/15 7:45 PM, Jay West wrote: > >> Alas... I have no scsi cards for any of my dec gear. I was hoping for a >> CF based device that plugs straight into the unibus... or similar >> solution... >> >> J >> >> >> >
Re: flash (or ide) storage for unibus 11?
Uh, no. Interfacing to an HDA (especially a modern one) is not for the faint of heart. The drive controller is usually a custom (to the drive family) ASIC. In many cases the firmware and drive parameters are stored on the drive media itself. The read/write amplifiers are usually tuned to the specific heads and drive data rate (again those are contained in the custom ASIC). Creating an SMD (or ESDI) drive emulator doesn't look to be all that difficult since the data is all after the clock recovery and is all digital. That is when writing, the controller provides the clock (can't remember if the drive provides a reference clock). On reading, the drive provides the clock. In those cases, the bits are bits and you don't have to worry about over sampling and jitter. Plus the interface to the drive is reasonably high level in that the controller sends commands and gets responses. TTFN - Guy > On Nov 22, 2015, at 9:08 PM, Jacob Ritorto wrote: > > Plus one here. With all the SMD controllers languishing out there due to > dead drives, you'd think there should be a way to make a cheap little glue > board that could interface to a modern HDA, with the IDE bits ripped out, > right? > >> On Sun, Nov 22, 2015 at 11:18 PM, Guy Sotomayor wrote: >> >> It's on my (long) list of projects. I first have to finish the MEM11. >> That will have RF11/RS11s as part of the emulated devices. >> >> I'm planning on using the J1 and associated infrastructure for my other >> projects (which is why I've spent so much time getting them "right"). >> >> TTFN - Guy >> >> >>> On 11/22/15 7:45 PM, Jay West wrote: >>> >>> Alas... I have no scsi cards for any of my dec gear. I was hoping for a >>> CF based device that plugs straight into the unibus... or similar >>> solution... >>> >>> J >>> >>> >>> >>
Re: HTTPS and man-in-the-middle - was Re: new message
Man this has turned in a hackerspace discussion on security On Nov 22, 2015 10:18 PM, "Dave Wade" wrote: > For outbound TMG needs a browser plugin. For inbound its usual to terminate > the SSL on the TMG firewall and then TMG opens a new SSL session to the > backend web server. For this to work TMG needs to have a copy of the > certificate including the private key. Wildcard certs are commonly used > with TMG but having a FQDN only guarantees the server is under control of > the certificate owner. You can have multiple sites on the same server, or > have a single site load balanced across multiple servers. SQUID will do the > same trick, but I have always run squid on the same box as the web farm, > but this isn't required... > On Nov 23, 2015 5:48 AM, "Toby Thain" wrote: > > > On 2015-11-22 5:25 PM, Mouse wrote: > > > >> https is supposed to prevent "man in the middle" attacks, provided you > >>> enfor$ > >>> > >> > >> That was the original theory, as I understand it. > >> > >> But there are way too many "in most browsers by default" CAs that are > >> willing to sell wildcard certs such as can be used for MitM attacks > >> without disturbing cert validity checks. I even recall hearing of some > >> caching proxy (squid maybe?) that, out of the box, could use such a > >> > > > > Microsoft Forefront TMG maybe? > > > > > http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/ > > > > --Toby > > > > > > cert to provide caching for HTTPS connections - they're that common. > >> ... > >> > >> /~\ The ASCII Mouse > >> \ / Ribbon Campaign > >> X Against HTML mo...@rodents-montreal.org > >> / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B > >> > >> > > >