> On Sep 17, 2015, at 1:33 PM, Al Kossow wrote:
>
> On 9/17/15 9:58 AM, Paul Koning wrote:
>>
>> DtCyber is open source
>
> but their OS collection is not.
> they're called "controlfreaks" for a reason.
Yes, because they like Control Data products.
From what I understand, COS is in fact ge
Chuck,
It sounds like you might enjoy the Controlfreaks group. It's controlled
access but basically you just need to ask. http://www.controlfreaks.org has a
pointer.
paul
On 9/17/15 9:58 AM, Paul Koning wrote:
DtCyber is open source
but their OS collection is not.
they're called "controlfreaks" for a reason.
On 09/17/2015 09:58 AM, Paul Koning wrote:
It turns out my memory was faulty. I remember discussions about
SCOPE, but I don't actually see a copy. There's COS, SMM 4.0, Kronos
1.0 and 2.1.2, lots of NOS from 1.2 through 2.8.7 and about 8 in
between, NOS/BE 1.2 and 1.5.
No 64 bit, no 7600 -- D
> On Sep 17, 2015, at 12:30 PM, Chuck Guzis wrote:
>
> On 09/17/2015 09:04 AM, Paul Koning wrote:
>
>> They may not run those, but those certainly have been preserved as
>> part of the "controlfreaks" effort. COS, Scope, MACE, Kronos, NOS,
>> NOS/BE -- all those have been run on the DtCyber em
On 09/17/2015 12:49 AM, Dave G4UGM wrote:
in my
humble opinion many Linux users are rather more blasé
about the
security of the OS that they should be
Absolutely true, and I will admit that I have fallen into
the trap, too. But, it has worked well so far!
Jon
On 09/17/2015 09:04 AM, Paul Koning wrote:
They may not run those, but those certainly have been preserved as
part of the "controlfreaks" effort. COS, Scope, MACE, Kronos, NOS,
NOS/BE -- all those have been run on the DtCyber emulator. In fact,
a copy of a production PLATO system, on NOS 2.8.7
On 09/17/2015 12:49 AM, Dave G4UGM wrote:
"Security" isn't just about secure software, it’s a total mind set.
One slip and you are doomed. I am pretty careful but even I managed
to install the d@mmed Ask tool bar whilst updating Java... .. in my
humble opinion many Linux users are rather more bl
> On Sep 16, 2015, at 6:19 PM, Chuck Guzis wrote:
>
> On 09/16/2015 12:23 PM, Sean Caron wrote:
>> And I actually got to play with NOS ... many years after the fact ...
>> never thought I'd see that! What the cray-cyber.org guys are doing is
>> remarkable.
>
> Sad that they don't have any early
many Linux users are rather more blasé about the
security of the OS that they should be
Dave Wade
G4UGM
> -Original Message-
> From: cctalk [mailto:cctalk-boun...@classiccmp.org] On Behalf Of jwsmobile
> Sent: 17 September 2015 04:49
> To: cctalk@classiccmp.org
> Subject
On 9/16/2015 6:36 PM, Jon Elson wrote:
On 09/16/2015 01:29 PM, Paul Koning wrote:
I never had any incentive to look for holes in CDC operating systems,
but I still remember a simple hole I found in OS/360, about a month
after I first wrote a program for that OS. It allowed anyone to run
supe
There were / are bugs in the mpg and jpg libraries that allow for remote
execution that may or may not have been fixed.
If it can screw over cell phones running on Linux, it can screw you over
if you are running on garden variety Linux.
Since we are all users on an ongoing basis of fossilized
On 09/16/2015 01:29 PM, Paul Koning wrote:
I never had any incentive to look for holes in CDC
operating systems, but I still remember a simple hole I
found in OS/360, about a month after I first wrote a
program for that OS. It allowed anyone to run supervisor
mode code with a couple dozen line
On 09/16/2015 01:10 PM, Chuck Guzis wrote:
Has cryptolocker ever invaded the world of Unix/Linux/BSD?
It would be much harder. In general, browsers do not
activate just any file you would download. There are
weaknesses in various graphical/video add-ons to browsers
that may cause vulnerab
On 09/16/2015 12:23 PM, Sean Caron wrote:
And I actually got to play with NOS ... many years after the fact ...
never thought I'd see that! What the cray-cyber.org guys are doing is
remarkable.
Sad that they don't have any early software. In the beginning there was
COS (Chippewa Operating Sys
And I actually got to play with NOS ... many years after the fact ... never
thought I'd see that! What the cray-cyber.org guys are doing is remarkable.
Best,
Sean
On Wed, Sep 16, 2015 at 3:22 PM, Sean Caron wrote:
> Cyber systems didn't get much love from the H/P kids back in the day :O
>
> h
Cyber systems didn't get much love from the H/P kids back in the day :O
http://phrack.org/issues/18/5.html
That said; NOS is one of the few mainframe systems ever really discussed in
Phrack... MVS/TSO and VM/CMS you also see occasionally, but beyond that, it
seems like most of the G-files were fo
On 09/16/2015 11:29 AM, Paul Koning wrote:
I never had any incentive to look for holes in CDC operating systems,
but I still remember a simple hole I found in OS/360, about a month
after I first wrote a program for that OS. It allowed anyone to run
supervisor mode code with a couple dozen lines
> On Sep 16, 2015, at 2:10 PM, Chuck Guzis wrote:
>
> This brings up something that's always baffled me.
>
> Why does a user's (or worse, the entire system's) files have to be
> immediately accessible to any application wanting to take a look.
>
> Take a legacy example, SCOPE or NOS on a CDC
This brings up something that's always baffled me.
Why does a user's (or worse, the entire system's) files have to be
immediately accessible to any application wanting to take a look.
Take a legacy example, SCOPE or NOS on a CDC mainframe. At start of
job, you start out with a null file set
On Wed, 16 Sep 2015, jwsmobile wrote:
One system, or did it propagate thru the organization?
Did you eradicate it, then get a tool for the decrypt?
Not very hard to stop it, but the damage that it does to the files (RSA
encryption) is irreparable, unless you pay the ransom. A significant
per
On 9/16/2015 5:41 AM, Jay West wrote:
ZFS is a good solution:)
Is it a versioning file system? I know it handles large data sets. Does
versioning or such as time machine setups (Mac OS type of backup) defeat
the problem. I know you don't have time machine with PC's that get hit,
are othe
Windows?
On 16-09-15 14:41, Jay West wrote:
I took on a brand new client a while back, and before doing any real work for them they
were hit by cryptolocker. I hadn't yet even done a "IT Review" for them, so
didn't yet know what systems they had in place.
Thus, under the gun, I started lookin
23 matches
Mail list logo