On Tue, 4 Aug 2015, Stephan Beal wrote:

> On Tue, Aug 4, 2015 at 1:47 PM, Sergei Gavrikov <sergei.gavri...@gmail.com>
> wrote:
>       I know one, that's 'The Infinitely Profitable Program'
>
>         http://peetm.com/blog/?p=55 :-)
>
>
> To summarize:
>
> "GO.COM contained no program bytes at all – it was entirely empty. However,
> because GO.COM was empty, but still a valid program file as far as CP/M was
> concerned (it had a directory entry and file-name ending with .com), the CP/M
> loader, the part of the OS whose job it is to pull programs off disk and slap
> them into the TPA, would still load it!"
>
> Wow. i like to think that wouldn't be possible today. But, who
> knows... it's potentially possible to encode a whole virus in a long
> filename of an empty file, sharing the same hash as all other empty
> files.

[OFF-TOPIC]

I used "GO.COM" recently on one modern LEON3 target in self cooked
boot-loader. I used XMODEM to upload binary files and I looked for a way
to run application and return to the loader and return back (quickly) to
loaded application again. From my local web-log (jemdoc mark-down):

  == 2015\/01\/12

  Implement +Th_Eval2()+. In first, +Th_Eval2()+ does try to find a dot-com file
  on CFS.

  === GO.COM

  - [http://peetm.com/blog/?p=55]

  It works!

  ~~~
  {}{}
  0 qm> ls
  hello.tcl init GO.COM HELLO.COM
  0 qm> HELLO
  HELLO, WORLD!

  0 qm> GO
  HELLO, WORLD!
  ~~~

  BTW, +GO.COM+ was created as

  ~~~
  {}{}
  0 qm> write GO.COM ""
  ~~~

Well, my "COMMAND.COM" on the target was TH1 interpreter :-)

Sergei
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to