By the way I have now found out how to retrieve this through the University
of Salford Library, where I am a member...
Dave
> -Original Message-
> From: cctalk [mailto:cctalk-boun...@classiccmp.org] On Behalf Of Al Kossow
> Sent: Tuesday, 15 September, 2015 2:58 PM
> To: cctalk@classiccmp
I took on a brand new client a while back, and before doing any real work for
them they were hit by cryptolocker. I hadn't yet even done a "IT Review" for
them, so didn't yet know what systems they had in place.
Thus, under the gun, I started looking at their backup setup, and found it
"severel
Documentation for the Clearpoint Q-RAM 11 board seems to be rather scarce;
all I could find was a user manual, with no technical info (manual or prints
or other documentation) online. (I'd be glad to be proved wrong! :-)
So as part of a project I needed to figure out which memory chips were which;
So, I'm trying to fix a broken Power Monitor Boards (the thing that drives
ACLO/DCLO) in an H786 (BA11-N power supply), and although I have the prints,
I can't make head or tail out of them.
(The circuit is a maze of op-amps and 555's. OK, OK, so maybe an analog guy
can take one quick look, and un
> So, I'm trying to fix a broken Power Monitor Boards (the thing that drives
> ACLO/DCLO) in an H786 (BA11-N power supply), and although I have the prints,
> I can't make head or tail out of them.
>
> (The circuit is a maze of op-amps and 555's. OK, OK, so maybe an analog guy
> can take one quic
>Noel Chiappa wrote:
OK, so I finally got set up to scan manuals, with a scanner with a document
feeder, so I don't have to sit there and feed the beast! So now I can scan in
a number of 'missing' (online, at least) PDP-11 manuals which I happen to
have.
The first thing through the machine was
On 9/16/15 6:36 AM, Noel Chiappa wrote:
Also, this page:
http://ed-thelen.org/comp-hist/Book-Catalog.html
which claims to be the "Book Catalog (incomplete) of the Computer History
Museum, as of July 27 2002" says they have one. Would it still be there,
and is there any chance that, if so, i
Windows?
On 16-09-15 14:41, Jay West wrote:
I took on a brand new client a while back, and before doing any real work for them they
were hit by cryptolocker. I hadn't yet even done a "IT Review" for them, so
didn't yet know what systems they had in place.
Thus, under the gun, I started lookin
On 8/11/15 7:36 AM, Jerry Kemp wrote:
Hello Seth,
We were having a 3B2 discussion on the Sun Rescue list, and that got me to
thinking about your emulator project.
Can you share a status update?
Is there anything us non-developers can do to assist?
Thank you,
Jerry
On 01/19/15 01:45 PM, Se
On 9/16/2015 5:41 AM, Jay West wrote:
ZFS is a good solution:)
Is it a versioning file system? I know it handles large data sets. Does
versioning or such as time machine setups (Mac OS type of backup) defeat
the problem. I know you don't have time machine with PC's that get hit,
are othe
* On Wed, Sep 16, 2015 at 08:24:15AM -0700, Al Kossow
wrote:
> On 8/11/15 7:36 AM, Jerry Kemp wrote:
> >Hello Seth,
> >
> >We were having a 3B2 discussion on the Sun Rescue list, and that got me to
> >thinking about your emulator project.
> >
> >Can you share a status update?
> >
> >Is there any
On 16/09/15 14:36, Noel Chiappa wrote:
Alas, neither seems to be available online. (The BA11-N is EK-BA11N-TM-001;
the BA11-S is in the "PDP-11/23B Mounting Box Technical Manual",
EK-23BMB-TM-001.)
I guess they're not much use to you, but both the user guides
(EK-BA11N-UG and EK-23BMB-UG-001) a
> From: Noel Chiappa
> I have also gone through my set of manuals and prepared a list of all
> the ones which aren't online.
> ...
> EK-1184A-TM-PR4 11/84 Technical Reference (Preliminary)
> EK-1184E-TM-001 PDP-11/84 System Technical and Reference Manual
> E
>From: Mouse
>
>> I think a more important issue in backing up is "How many GENERATIONS
> >to you keep around?"
>
>For many purposes, that's an important consideration, yes. There's
>something (small) I back up weekly for which I keep the most recent
>seven backups, the oldest backup in each of t
On Wed, 16 Sep 2015, jwsmobile wrote:
One system, or did it propagate thru the organization?
Did you eradicate it, then get a tool for the decrypt?
Not very hard to stop it, but the damage that it does to the files (RSA
encryption) is irreparable, unless you pay the ransom. A significant
per
On Wed, 16 Sep 2015, Robert Feldman wrote:
There is a ramsomware variant that encrypts the files but silently
decrypts them when they are accessed. It does this for six months before
deactivating the on-demand decryption and displaying the ransom message,
the theory being that by that time all
To the best of my recollection there never was any production FD greater
than 8-inches, but u don't have to rely upon my fallible recollection since
neither Porter's 1977 nor his 1982 Disk/Trends for FDDs mentions anything
about larger media diameter.The 1977 version was the first one Jim
publi
This brings up something that's always baffled me.
Why does a user's (or worse, the entire system's) files have to be
immediately accessible to any application wanting to take a look.
Take a legacy example, SCOPE or NOS on a CDC mainframe. At start of
job, you start out with a null file set
We have 10 years of backups.ed#
Sent from my Verizon Wireless 4G LTE smartphone
Original message
From: Robert Feldman
Date: 09/16/2015 10:40 AM (GMT-07:00)
To: cctalk@classiccmp.org
Subject: re: Backups [was Re: Is tape dead?]
>From: Mouse
>
>> I think a more imp
-Oorspronkelijk bericht-
From: Noel Chiappa
Sent: Wednesday, September 16, 2015 7:29 PM
To: cctalk@classiccmp.org
Cc: j...@mercury.lcs.mit.edu
Subject: Re: PDP-11 manuals scanned/scanning
> From: Henk Gooijen
> I have EK-KK11A-TM-001 "KK11-A cache memory technical manual"
Lyle B
On 9/16/15 11:15 AM, couryhouse wrote:
We have 10 years of backups.ed#
ever verified them?
> From: tony duell
> Do you have a URL for the prints (to save me going through all possible
> candidates on bitsavers)?
Yeah, as per my 'where are subsystem prints' page, they are in the 11/23
print set MP00740, pg. 81-87 (schematic on pg. 87):
https://archive.org/details/bitsaver
> On Sep 16, 2015, at 2:01 PM, Fred Cisin wrote:
> ...
> Neither AVG (resident), nor McAfee (manually run weekly) detected my
> infection of Cryptowall. What WILL detect it?
Linux? :-)
paul
> On Sep 16, 2015, at 2:10 PM, Chuck Guzis wrote:
>
> This brings up something that's always baffled me.
>
> Why does a user's (or worse, the entire system's) files have to be
> immediately accessible to any application wanting to take a look.
>
> Take a legacy example, SCOPE or NOS on a CDC
> There is a ramsomware variant that encrypts the files but silently decrypts $
This depends on the backup-taking accessing the files in a way that
doesn't trip the decryption.
It also depends on nobody test-restoring from the backups, or at least
not sanity-checking the results if they do.
It a
On 9/16/15 11:23 AM, Noel Chiappa wrote:
https://archive.org/details/bitsavers_decqbusMP0_10391074
(Doesn't seem to be on BitSavers?)
http://bitsavers.org/pdf/dec/qbus/MP00740_1123_schem_Oct81.pdf
On 09/16/2015 11:20 AM, Al Kossow wrote:
On 9/16/15 11:15 AM, couryhouse wrote:
We have 10 years of backups.ed#
ever verified them?
Mine go back to sometime around 1980. I have customer records that go
back to 1987. Curiously, we got a note from a fellow needing an update
to CopyQM. He
Enough repeated material over time just in case but yes,at one point random did
.
BACK UPS on backups on backups in my cases. Of course if one orig source file
is bad from 10 years ago the backups of said file are eckky too. I await the
dvds made of stone stuff
I like to stash backups o
Well then we have hp 3000 stuff from 23 years ago... Was then.. But soon we
will see if these tape sets live.. it will be good if so as there is hp
software of unique nature that only existed being saved on our tape
sets. then there is the older hp 2000 stuff 5 fascinating un
On 09/16/2015 11:29 AM, Paul Koning wrote:
I never had any incentive to look for holes in CDC operating systems,
but I still remember a simple hole I found in OS/360, about a month
after I first wrote a program for that OS. It allowed anyone to run
supervisor mode code with a couple dozen lines
>
> Yeah, as per my 'where are subsystem prints' page, they are in the 11/23
> print set MP00740, pg. 81-87 (schematic on pg. 87):
OK, got it... A one page schematic, a board witht 4 ICs. Shouldn't be too
hard...
(famous last words!)
OK, first thing, the things that look like op-amps are in fa
On 9/16/2015 1:23 PM, Noel Chiappa wrote:
> > From: tony duell
>
> > Do you have a URL for the prints (to save me going through all possible
> > candidates on bitsavers)?
>
> Yeah, as per my 'where are subsystem prints' page, they are in the 11/23
> print set MP00740, pg. 81-87 (schem
Cyber systems didn't get much love from the H/P kids back in the day :O
http://phrack.org/issues/18/5.html
That said; NOS is one of the few mainframe systems ever really discussed in
Phrack... MVS/TSO and VM/CMS you also see occasionally, but beyond that, it
seems like most of the G-files were fo
And I actually got to play with NOS ... many years after the fact ... never
thought I'd see that! What the cray-cyber.org guys are doing is remarkable.
Best,
Sean
On Wed, Sep 16, 2015 at 3:22 PM, Sean Caron wrote:
> Cyber systems didn't get much love from the H/P kids back in the day :O
>
> h
> From: Al Kossow
>> the machine had to be configured (via connecting up computing units
>> with cables)
> In 1947 ENIAC was modifed at BRL to be a stored program computer.
Well, I did say "in the original ENIAC usage" it had to be configured by
plugging! I was aware of the later
> -Original Message-
> From: cctalk [mailto:cctalk-boun...@classiccmp.org] On Behalf Of Noel
> Chiappa
> Sent: 16 September 2015 22:06
> To: cctalk@classiccmp.org
> Cc: j...@mercury.lcs.mit.edu
> Subject: Re: ENIAC programming Was: release dates of early microcomputer
> operating systems,
On 09/16/2015 12:23 PM, Sean Caron wrote:
And I actually got to play with NOS ... many years after the fact ...
never thought I'd see that! What the cray-cyber.org guys are doing is
remarkable.
Sad that they don't have any early software. In the beginning there was
COS (Chippewa Operating Sys
>Mouse wrote:
There is a ramsomware variant that encrypts the files but silently decrypts $
This depends on the backup-taking accessing the files in a way that
doesn't trip the decryption.
It also depends on nobody test-restoring from the backups, or at least
not sanity-checking the resu
On 09/16/2015 01:10 PM, Chuck Guzis wrote:
Has cryptolocker ever invaded the world of Unix/Linux/BSD?
It would be much harder. In general, browsers do not
activate just any file you would download. There are
weaknesses in various graphical/video add-ons to browsers
that may cause vulnerab
On 09/16/2015 01:29 PM, Paul Koning wrote:
I never had any incentive to look for holes in CDC
operating systems, but I still remember a simple hole I
found in OS/360, about a month after I first wrote a
program for that OS. It allowed anyone to run supervisor
mode code with a couple dozen line
>> Thus, defense in depth:
>> [...]
>> (3) Test-restore from your backups periodically.
> As for (3), I don't understand how a test-restore would help.
The theory is, if the restore restores good contents then the backup
contains good contents.
> Even if the files have been encrypted, I don't un
On 2015-09-16 6:18 PM, Dave G4UGM wrote:
...
It is notable that in order to solve all problems, a computer must permit
self modifying code.
Is that true? AFAIK Lambda calculus can describe any computable function
(as can a Turing machine), and it has no concept of "self modifying code".
--
On 9/16/2015 9:25 PM, Toby Thain wrote:
On 2015-09-16 6:18 PM, Dave G4UGM wrote:
...
It is notable that in order to solve all problems, a computer must permit
self modifying code.
Is that true? AFAIK Lambda calculus can describe any computable function
(as can a Turing machine), and it has n
There were / are bugs in the mpg and jpg libraries that allow for remote
execution that may or may not have been fixed.
If it can screw over cell phones running on Linux, it can screw you over
if you are running on garden variety Linux.
Since we are all users on an ongoing basis of fossilized
On 9/16/2015 6:36 PM, Jon Elson wrote:
On 09/16/2015 01:29 PM, Paul Koning wrote:
I never had any incentive to look for holes in CDC operating systems,
but I still remember a simple hole I found in OS/360, about a month
after I first wrote a program for that OS. It allowed anyone to run
supe
45 matches
Mail list logo