The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.

[EMAIL PROTECTED] (Ivan Warren) writes:
> Assembler is for sissies !
> Using a keyboard to input hexadecimal numbers if for script kiddies..
>
> Real programmers flip switches to select the address, flip some more
> switches to input the data, rotate the mode switch to 'store'  and
> press the execute button.

i've been known to (026) multi-punch patches in duplicated 12-2-9 "TXT"
cards for program patches ... as well as entering storage modifications
from the front panel of 360/67. Knowing format of 12-2-9 "TXT" cards
... needed to be able to "read" punch holes ... so "fanning" deck would
quickly locate the card with the data for the specific program address
with the instruction(s) to be patched.

old posting of "real programmers" (also "real engineers")
http://www.garlic.com/~lynn/2001e.html#31 High Level Language Systems was Re: 
computer books/authors (Re: FA:

when the future system project was in full swing 
http://www.garlic.com/~lynn/subtopic.html#futuresys

... the (highly classified) future system architecture documents had
been "secured" on vm370 systems. I had some dedicated weekend time in a
machine room with one such vm370 systems. My time was on 370/145 ...
and the "secured" vm370 system with future system documents was some
other machine in the room. one of the people may some rash claim that
they had so secured the documents on the system that even I wouldn't be
able to gain access ... even if i was left alone in the room.

well, how could i resist???

I first asked them to disable all external acess to the machine (all
terminals connecting to the machine from outside the machine room).

>From the 370/145 front console, I patched one bit in real storage and
had access to everything on the machine. I mentioned that countermeasure
to this attack was to require authentication before being able to use
the front panel functions.

>From the front panel, I had flipped a bit in conditional branch
instruction in the password verification routine ... resulting in
anything entered, always being treated as valid password.

for a little drift ... recent, (mainframe) security related thread
http://www.garlic.com/~lynn/2008h.html#74
http://www.garlic.com/~lynn/2008h.html#81

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to