On Tue, 4 Aug 2015, Stephan Beal wrote:
> On Tue, Aug 4, 2015 at 1:47 PM, Sergei Gavrikov <sergei.gavri...@gmail.com>
> wrote:
> I know one, that's 'The Infinitely Profitable Program'
>
> http://peetm.com/blog/?p=55 :-)
>
>
> To summarize:
>
> "GO.COM contained no program bytes at all – it was entirely empty. However,
> because GO.COM was empty, but still a valid program file as far as CP/M was
> concerned (it had a directory entry and file-name ending with .com), the CP/M
> loader, the part of the OS whose job it is to pull programs off disk and slap
> them into the TPA, would still load it!"
>
> Wow. i like to think that wouldn't be possible today. But, who
> knows... it's potentially possible to encode a whole virus in a long
> filename of an empty file, sharing the same hash as all other empty
> files.
[OFF-TOPIC]
I used "GO.COM" recently on one modern LEON3 target in self cooked
boot-loader. I used XMODEM to upload binary files and I looked for a way
to run application and return to the loader and return back (quickly) to
loaded application again. From my local web-log (jemdoc mark-down):
== 2015\/01\/12
Implement +Th_Eval2()+. In first, +Th_Eval2()+ does try to find a dot-com file
on CFS.
=== GO.COM
- [http://peetm.com/blog/?p=55]
It works!
~~~
{}{}
0 qm> ls
hello.tcl init GO.COM HELLO.COM
0 qm> HELLO
HELLO, WORLD!
0 qm> GO
HELLO, WORLD!
~~~
BTW, +GO.COM+ was created as
~~~
{}{}
0 qm> write GO.COM ""
~~~
Well, my "COMMAND.COM" on the target was TH1 interpreter :-)
Sergei
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users