A Selectric printer...

2015-11-22 Thread Mike Ross
I have an I/O Selectric device which is badged as, and was originally, an
IBM 2970 Reservation Terminal.

For better or worse, it was one of those bought up in the late 1970s by a
company called 'Western I/O", based out of Scottsdale Arizona. They
converted them for home use. One version used a Motorola 6800 to make a
nifty-sounding terminal with selectable baud rates etc. I appear to have
the 'other' version; a cheap and nasty printer-only conversion with some
form of parallel port.

Anybody else got one? Docs about them? Parts? Schematics? I'd like to get
hold of one of the 'proper' terminal conversion versions... Must be some
squirreled away in garages!

Alternatively, any doc on the original 2970? There's an incredible dearth
of information about what we're once very common devices...


Re: A Selectric printer...

2015-11-22 Thread Paul Berger

On 2015-11-22 9:20 AM, Mike Ross wrote:

I have an I/O Selectric device which is badged as, and was originally, an
IBM 2970 Reservation Terminal.

For better or worse, it was one of those bought up in the late 1970s by a
company called 'Western I/O", based out of Scottsdale Arizona. They
converted them for home use. One version used a Motorola 6800 to make a
nifty-sounding terminal with selectable baud rates etc. I appear to have
the 'other' version; a cheap and nasty printer-only conversion with some
form of parallel port.

Anybody else got one? Docs about them? Parts? Schematics? I'd like to get
hold of one of the 'proper' terminal conversion versions... Must be some
squirreled away in garages!

Alternatively, any doc on the original 2970? There's an incredible dearth
of information about what we're once very common devices...
Did you get the whole machine typewriter and control unit or just the 
typewriter?  If you got the control unit the manuals may be inside.  The 
typewriter part of it is just a modified office selectric with solenoids 
to do the selection and operate the functions and then a whole bunch of 
open strap contacts for feedback and also to sense what is typed on the 
keyboard.  One of the first problems you may encounter is the motor belt 
is likely rotten and would be a challenge to change if you have never 
been inside a selectric, especially with all the extra stuff hung off it 
on an I/O.  The reservation terminals I worked on nearly 40 years ago 
where connected to a telegraph line. 75 baud with about a 150V DC 
swing.  Pictures?


Paul.


Re: Fw: new message

2015-11-22 Thread geneb

On Sun, 22 Nov 2015, Eric Christopherson wrote:


My ISP injects into web pages a helpful heads-up message if your account
If you can, run screaming to another ISP.  I don't care how "helpful" 
they're trying to be, content injection like that should be punished with 
a public skinning.


Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that 
prevents their shenannigans.


g.

--
Proud owner of F-15C 80-0007
http://www.f15sim.com - The only one of its kind.
http://www.diy-cockpits.org/coll - Go Collimated or Go Home.
Some people collect things for a hobby.  Geeks collect hobbies.

ScarletDME - The red hot Data Management Environment
A Multi-Value database for the masses, not the classes.
http://scarlet.deltasoft.com - Get it _today_!


Re: Fw: new message

2015-11-22 Thread Toby Thain

On 2015-11-22 10:05 AM, geneb wrote:

On Sun, 22 Nov 2015, Eric Christopherson wrote:


My ISP injects into web pages a helpful heads-up message if your account

If you can, run screaming to another ISP.  I don't care how "helpful"
they're trying to be, content injection like that should be punished
with a public skinning.


+1. It's actually a helpful reminder to change ISP's.

--Toby



Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that
prevents their shenannigans.

g.





Re: Fw: new message

2015-11-22 Thread Jerry Kemp

A question for the OP.

I know that since all the Snowden stuff that took place back a bit, many sites 
have moved from http to https.


Is your ISP able to inject content into "secure" https connections?  Or only 
http transactions, going across the wire in plain text?


Jerry



On 11/22/15 09:05 AM, geneb wrote:

On Sun, 22 Nov 2015, Eric Christopherson wrote:


My ISP injects into web pages a helpful heads-up message if your account

If you can, run screaming to another ISP.  I don't care how "helpful" they're
trying to be, content injection like that should be punished with a public
skinning.

Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents
their shenannigans.

g.



Re: Looking for an IBM manual PDF

2015-11-22 Thread Alexandre Souza
"Concentrated evil" was the best expression of the month. Congratulations,
Al! :o)

2015-11-21 14:47 GMT-02:00 Al Kossow :

> On 11/21/15 1:38 AM, Christian Gauger-Cosgrove wrote:
>
> Unfortunately, downloading the DjVu file does nothing
>>
>
> and Firefox reports it as a web forgery.
>
> If someone can find real djvu files for those manuals, I will
> convert them to pdf and put them on bitsavers.
>
> Any site that requires you to start java and use their djvu
> web applet is concentrated evil.
>
>
>
>


Re: Fw: new message

2015-11-22 Thread Eric Christopherson
On Sun, Nov 22, 2015, Jerry Kemp wrote:
> A question for the OP.
> 
> I know that since all the Snowden stuff that took place back a bit, many
> sites have moved from http to https.
> 
> Is your ISP able to inject content into "secure" https connections?  Or only
> http transactions, going across the wire in plain text?
> 
> Jerry

I'm not sure, but I'm betting https sites just refuse to connect --
which is how my employer's network handles https.

> On 11/22/15 09:05 AM, geneb wrote:
> >On Sun, 22 Nov 2015, Eric Christopherson wrote:
> >
> >>My ISP injects into web pages a helpful heads-up message if your account
> >If you can, run screaming to another ISP.  I don't care how "helpful" they're
> >trying to be, content injection like that should be punished with a public
> >skinning.
> >
> >Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that 
> >prevents
> >their shenannigans.
> >
> >g.
> >

-- 
Eric Christopherson


Re: new message

2015-11-22 Thread Paul Koning

> On Nov 22, 2015, at 3:30 PM, Jerry Kemp  wrote:
> 
> A question for the OP.
> 
> I know that since all the Snowden stuff that took place back a bit, many 
> sites have moved from http to https.
> 
> Is your ISP able to inject content into "secure" https connections?  Or only 
> http transactions, going across the wire in plain text?

https is supposed to prevent "man in the middle" attacks, provided you enforce 
certificate validity.

Another option if you have people messing with your web access is Tor.

paul




Re: new message

2015-11-22 Thread Mouse
> https is supposed to prevent "man in the middle" attacks, provided you enfor$

That was the original theory, as I understand it.

But there are way too many "in most browsers by default" CAs that are
willing to sell wildcard certs such as can be used for MitM attacks
without disturbing cert validity checks.  I even recall hearing of some
caching proxy (squid maybe?) that, out of the box, could use such a
cert to provide caching for HTTPS connections - they're that common.

Not surprising, really.  The CA hierarchy is both the most central
point and quite possibly the most commercialized and thus most venal
point, so it's natural that it would be the major point that's come
under attack by actors wishing to compromise the security HTTPS could
have offered.  (Some of them, probably, even have the best of
intentions)

> Another option if you have people messing with your web access is
> Tor.

Or, of course, file bug reports with the provider in question and, if
they're honest enough to admit what they're doing, switch.  I know _I_
certainly wouldn't tolerate that sort of messing with my data stream.

For those unfortunate enough to have nobody affordable to switch to,
all I can suggest is ssh (or operational equivalent, such as a VPN) to
a hosted, possibly virtual, machine somewhere not behind such crippling
restrictions.  (Depending on such factors as the jurisdiction and your
dedication to the cause, a lawsuit might also be an option.)

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Re: Fw: new message

2015-11-22 Thread Dale H. Cook
At 10:05 AM 11/22/2015, geneb wrote:

>Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that prevents 
>their shenannigans.

IMHO, Google has enough shenanigans of their own. I use the Level3 DNS (4.2.2.1 
/ 4.2.2.2 / 4.2.2.3).

Dale H. Cook, Roanoke/Lynchburg, VA
Osborne 1 / Kaypro 4-84 / Kaypro 1 / Amstrad PPC-640
http://plymouthcolony.net/starcity/radios/index.html 



HTTPS and man-in-the-middle - was Re: new message

2015-11-22 Thread Toby Thain

On 2015-11-22 5:25 PM, Mouse wrote:

https is supposed to prevent "man in the middle" attacks, provided you enfor$


That was the original theory, as I understand it.

But there are way too many "in most browsers by default" CAs that are
willing to sell wildcard certs such as can be used for MitM attacks
without disturbing cert validity checks.  I even recall hearing of some
caching proxy (squid maybe?) that, out of the box, could use such a


Microsoft Forefront TMG maybe?
http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/

--Toby



cert to provide caching for HTTPS connections - they're that common.
...

/~\ The ASCII Mouse
\ / Ribbon Campaign
  X  Against HTML   mo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B





Re: new message

2015-11-22 Thread Paul Koning

> On Nov 22, 2015, at 7:01 PM, Dale H. Cook  wrote:
> 
> At 10:05 AM 11/22/2015, geneb wrote:
> 
>> Until then, try pointing your DNS to 8.8.8.8 (Google) and see if that 
>> prevents their shenannigans.
> 
> IMHO, Google has enough shenanigans of their own. I use the Level3 DNS 
> (4.2.2.1 / 4.2.2.2 / 4.2.2.3).

If you have a Unix box as your firewall, as I do, it's not hard to set up your 
own DNS server to serve the machines behind it.  Then you can just load the 
current root files and take it from there.

paul




Re: 1980s/1990s 68k C cross (and not so cross) compilers

2015-11-22 Thread Charlie Carothers

On 11/21/2015 4:54 AM, Philip Pemberton wrote:

Hi there,

I'm working on reverse engineering a radio navigation receiver
(surprisingly not GPS, something else... Datatrak if anyone's heard of
it) for the purpose of either repurposing the hardware or building up
some kind of demo rig.

A lot of my effort at the moment seems to be identifying C Library
functions and naming them. Ideally, I'd like to identify the compiler
and CLib and feed that into the disassembler to eliminate that work.

Does anyone know which 68000 compilers were available in 1993, and which
could produce ROM code? Or a few?



I've looked at Aztec C68K but ruled it out on the basis that the _strlen
library function doesn't match up -- this is the one from the ROM:

_strlen:
   movea.l  4(sp), a0
   move.l   a0, d0
_strlen_l001:
   tst.b(a0+)
   bne.s_strlen_l001
   sub.la0, d0
   not.ld0
   rts


Aztec is identical up to the bne, then:

   sub.ld0, a0
   move.l   a0, d0
   sub,l#1, d0
   rts

Which is one instruction longer... so it's not Aztec.


Other parts of the system apparently used VME-bus modules... so this
wasn't a small operation.

Anyway, whatever compiler this is, it pulls in Motorola's Fast Floating
Point library.


Thanks,
There was also one by an outfit called Microtec or maybe Microtech or 
Microtek that ran on an IBM PC.  There was an accompanying linker 
package.  Mostly I loaded the code into RAM for execution, but I'm 
reasonably sure there was a way to create files to be used to burn 
EPROMs as well.


I can't quite read the title on the currently non-reachable bookshelf 
unless I go round up a pair of binoculars. :-)




flash (or ide) storage for unibus 11?

2015-11-22 Thread Jay West
I'm looking for a modern storage (ie. anywhere from 100mb to "huge") device
for an 11/44. I think I have seen a few hobbyist projects that were flash
based, I thought I saw one that was an IDE interface

Long story short I've satisfied the purist in me by putting an RL02 on the
machine, but that's just not enough storage for that particular system.
Anyone know of a good project to add some modern storage to get me over the
available storage on the RL02?

J




Re: flash (or ide) storage for unibus 11?

2015-11-22 Thread Zane Healy

> On Nov 22, 2015, at 7:29 PM, Jay West  wrote:
> 
> I'm looking for a modern storage (ie. anywhere from 100mb to "huge") device
> for an 11/44. I think I have seen a few hobbyist projects that were flash
> based, I thought I saw one that was an IDE interface
> 
> Long story short I've satisfied the purist in me by putting an RL02 on the
> machine, but that's just not enough storage for that particular system.
> Anyone know of a good project to add some modern storage to get me over the
> available storage on the RL02?

What about some sort of SCSI-to-IDE adapter?  Though I simply have a couple DEC 
SCSI drives for my /44, in addition to its pair of RL02’s.

Zane




RE: flash (or ide) storage for unibus 11?

2015-11-22 Thread Jay West
Alas... I have no scsi cards for any of my dec gear. I was hoping for a CF 
based device that plugs straight into the unibus... or similar solution...

J




Re: A Selectric printer...

2015-11-22 Thread Dave Wade
There are a couple of Yahoo groups for Selectric Typewriters and some have
the docs for the IO selectrics.
On Nov 22, 2015 6:51 PM, "Mike Ross"  wrote:

> I have an I/O Selectric device which is badged as, and was originally, an
> IBM 2970 Reservation Terminal.
>
> For better or worse, it was one of those bought up in the late 1970s by a
> company called 'Western I/O", based out of Scottsdale Arizona. They
> converted them for home use. One version used a Motorola 6800 to make a
> nifty-sounding terminal with selectable baud rates etc. I appear to have
> the 'other' version; a cheap and nasty printer-only conversion with some
> form of parallel port.
>
> Anybody else got one? Docs about them? Parts? Schematics? I'd like to get
> hold of one of the 'proper' terminal conversion versions... Must be some
> squirreled away in garages!
>
> Alternatively, any doc on the original 2970? There's an incredible dearth
> of information about what we're once very common devices...
>


Re: A Selectric printer...

2015-11-22 Thread COURYHOUSE
list of  groups please!?!   neat!  Ed#
 
 
 
 
In a message dated 11/22/2015 9:05:14 P.M. US Mountain Standard Time,  
dave.g4...@gmail.com writes:

There  are a couple of Yahoo groups for Selectric Typewriters and some have
the  docs for the IO selectrics.
On Nov 22, 2015 6:51 PM, "Mike Ross"   wrote:

> I have an I/O Selectric device  which is badged as, and was originally, an
> IBM 2970 Reservation  Terminal.
>
> For better or worse, it was one of those bought up  in the late 1970s by a
> company called 'Western I/O", based out of  Scottsdale Arizona. They
> converted them for home use. One version used  a Motorola 6800 to make a
> nifty-sounding terminal with selectable baud  rates etc. I appear to have
> the 'other' version; a cheap and nasty  printer-only conversion with some
> form of parallel  port.
>
> Anybody else got one? Docs about them? Parts?  Schematics? I'd like to get
> hold of one of the 'proper' terminal  conversion versions... Must be some
> squirreled away in  garages!
>
> Alternatively, any doc on the original 2970? There's  an incredible dearth
> of information about what we're once very common  devices...
>



Re: HTTPS and man-in-the-middle - was Re: new message

2015-11-22 Thread Dave Wade
For outbound TMG needs a browser plugin. For inbound its usual to terminate
the SSL on the TMG firewall and then TMG opens a new SSL session to the
backend web server. For this to work TMG needs to have a copy of the
certificate including the private key. Wildcard certs are commonly used
with TMG but having a FQDN only guarantees the server is under control of
the certificate owner. You can have multiple sites on the same server, or
have a single site load balanced across multiple servers. SQUID will do the
same trick, but I have always run squid on the same box as the web farm,
but this isn't required...
On Nov 23, 2015 5:48 AM, "Toby Thain"  wrote:

> On 2015-11-22 5:25 PM, Mouse wrote:
>
>> https is supposed to prevent "man in the middle" attacks, provided you
>>> enfor$
>>>
>>
>> That was the original theory, as I understand it.
>>
>> But there are way too many "in most browsers by default" CAs that are
>> willing to sell wildcard certs such as can be used for MitM attacks
>> without disturbing cert validity checks.  I even recall hearing of some
>> caching proxy (squid maybe?) that, out of the box, could use such a
>>
>
> Microsoft Forefront TMG maybe?
>
> http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/
>
> --Toby
>
>
> cert to provide caching for HTTPS connections - they're that common.
>> ...
>>
>> /~\ The ASCII Mouse
>> \ / Ribbon Campaign
>>   X  Against HTML   mo...@rodents-montreal.org
>> / \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
>>
>>
>


Re: flash (or ide) storage for unibus 11?

2015-11-22 Thread Guy Sotomayor
It's on my (long) list of projects.  I first have to finish the MEM11.  
That will have RF11/RS11s as part of the emulated devices.


I'm planning on using the J1 and associated infrastructure for my other 
projects (which is why I've spent so much time getting them "right").


TTFN - Guy

On 11/22/15 7:45 PM, Jay West wrote:

Alas... I have no scsi cards for any of my dec gear. I was hoping for a CF 
based device that plugs straight into the unibus... or similar solution...

J






Re: A Selectric printer...

2015-11-22 Thread Dave Wade
Sorry I am in India and just have the mobile at present. Try

http://groups.yahoo.com/group/golfballtypewritershop/

But not sure if URL is OK.
list of  groups please!?!   neat!  Ed#




In a message dated 11/22/2015 9:05:14 P.M. US Mountain Standard Time,
dave.g4...@gmail.com writes:

There  are a couple of Yahoo groups for Selectric Typewriters and some have
the  docs for the IO selectrics.
On Nov 22, 2015 6:51 PM, "Mike Ross"   wrote:

> I have an I/O Selectric device  which is badged as, and was originally, an
> IBM 2970 Reservation  Terminal.
>
> For better or worse, it was one of those bought up  in the late 1970s by a
> company called 'Western I/O", based out of  Scottsdale Arizona. They
> converted them for home use. One version used  a Motorola 6800 to make a
> nifty-sounding terminal with selectable baud  rates etc. I appear to have
> the 'other' version; a cheap and nasty  printer-only conversion with some
> form of parallel  port.
>
> Anybody else got one? Docs about them? Parts?  Schematics? I'd like to get
> hold of one of the 'proper' terminal  conversion versions... Must be some
> squirreled away in  garages!
>
> Alternatively, any doc on the original 2970? There's  an incredible dearth
> of information about what we're once very common  devices...
>


Re: flash (or ide) storage for unibus 11?

2015-11-22 Thread Jacob Ritorto
Plus one here.  With all the SMD controllers languishing out there due to
dead drives, you'd think there should be a way to make a cheap little glue
board that could interface to a modern HDA, with the IDE bits ripped out,
right?

On Sun, Nov 22, 2015 at 11:18 PM, Guy Sotomayor  wrote:

> It's on my (long) list of projects.  I first have to finish the MEM11.
> That will have RF11/RS11s as part of the emulated devices.
>
> I'm planning on using the J1 and associated infrastructure for my other
> projects (which is why I've spent so much time getting them "right").
>
> TTFN - Guy
>
>
> On 11/22/15 7:45 PM, Jay West wrote:
>
>> Alas... I have no scsi cards for any of my dec gear. I was hoping for a
>> CF based device that plugs straight into the unibus... or similar
>> solution...
>>
>> J
>>
>>
>>
>


Re: flash (or ide) storage for unibus 11?

2015-11-22 Thread Shiresoft
Uh, no.  Interfacing to an HDA (especially a modern one) is not for the faint 
of heart.  The drive controller is usually a custom (to the drive family) ASIC. 
 In many cases the firmware and drive parameters are stored on the drive media 
itself.  The read/write amplifiers are usually tuned to the specific heads and 
drive data rate (again those are contained in the custom ASIC).

Creating an SMD (or ESDI) drive emulator doesn't look to be all that difficult 
since the data is all after the clock recovery and is all digital.  That is 
when writing, the controller provides the clock (can't remember if the drive 
provides a reference clock).  On reading, the drive provides the clock.  In 
those cases, the bits are bits and you don't have to worry about over sampling 
and jitter.  Plus the interface to the drive is reasonably high level in that 
the controller sends commands and gets responses.

TTFN - Guy

> On Nov 22, 2015, at 9:08 PM, Jacob Ritorto  wrote:
> 
> Plus one here.  With all the SMD controllers languishing out there due to
> dead drives, you'd think there should be a way to make a cheap little glue
> board that could interface to a modern HDA, with the IDE bits ripped out,
> right?
> 
>> On Sun, Nov 22, 2015 at 11:18 PM, Guy Sotomayor  wrote:
>> 
>> It's on my (long) list of projects.  I first have to finish the MEM11.
>> That will have RF11/RS11s as part of the emulated devices.
>> 
>> I'm planning on using the J1 and associated infrastructure for my other
>> projects (which is why I've spent so much time getting them "right").
>> 
>> TTFN - Guy
>> 
>> 
>>> On 11/22/15 7:45 PM, Jay West wrote:
>>> 
>>> Alas... I have no scsi cards for any of my dec gear. I was hoping for a
>>> CF based device that plugs straight into the unibus... or similar
>>> solution...
>>> 
>>> J
>>> 
>>> 
>>> 
>> 


Re: HTTPS and man-in-the-middle - was Re: new message

2015-11-22 Thread Adrian Stoness
Man this has turned in a hackerspace discussion on security
On Nov 22, 2015 10:18 PM, "Dave Wade"  wrote:

> For outbound TMG needs a browser plugin. For inbound its usual to terminate
> the SSL on the TMG firewall and then TMG opens a new SSL session to the
> backend web server. For this to work TMG needs to have a copy of the
> certificate including the private key. Wildcard certs are commonly used
> with TMG but having a FQDN only guarantees the server is under control of
> the certificate owner. You can have multiple sites on the same server, or
> have a single site load balanced across multiple servers. SQUID will do the
> same trick, but I have always run squid on the same box as the web farm,
> but this isn't required...
> On Nov 23, 2015 5:48 AM, "Toby Thain"  wrote:
>
> > On 2015-11-22 5:25 PM, Mouse wrote:
> >
> >> https is supposed to prevent "man in the middle" attacks, provided you
> >>> enfor$
> >>>
> >>
> >> That was the original theory, as I understand it.
> >>
> >> But there are way too many "in most browsers by default" CAs that are
> >> willing to sell wildcard certs such as can be used for MitM attacks
> >> without disturbing cert validity checks.  I even recall hearing of some
> >> caching proxy (squid maybe?) that, out of the box, could use such a
> >>
> >
> > Microsoft Forefront TMG maybe?
> >
> >
> http://itknowledgeexchange.techtarget.com/itanswers/https-inspection-within-forefront-threat-management-gateway-2010/
> >
> > --Toby
> >
> >
> > cert to provide caching for HTTPS connections - they're that common.
> >> ...
> >>
> >> /~\ The ASCII Mouse
> >> \ / Ribbon Campaign
> >>   X  Against HTML   mo...@rodents-montreal.org
> >> / \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
> >>
> >>
> >
>