About two hours ago, I received an email to the address I only use for
cctech/cctalk.
It claimed my email account had been hacked and threatened all sorts of
dire consequences if I didn't deposit $1000 in bitcoins in some place within
48 hours.
I am 100% certain that the claims in the message
On 1/8/19 12:20 PM, Kevin Lee via cctalk wrote:
> Delete it don’t respond and ignore it.. been getting them too.. change your
> password
> If your that concerned.. it’s a fishing trip..
Yeah, I get the one occasionally that claims to have compromising video
taken with my PC's webcam. Except,
> From: Fritz Mueller
>>
http://www.tuhs.org/Archive/PDP-11/Distributions/research/Ken_Wellsch_v6/
> Hmm, this link didn't work for me
Arggh, sorry. I simply copied the link from my page:
http://www.chiappa.net/~jnc/tech/V6Unix.html
and didn't check it. :-( I'm a bit
Delete it don’t respond and ignore it.. been getting them too.. change your
password
If your that concerned.. it’s a fishing trip..
Cheers
On 08.01.19, 21:19, "cctalk on behalf of Guy Sotomayor Jr via cctalk"
wrote:
I’ve been getting those messages for a few months now and nothing bad
I’ve been getting those messages for a few months now and nothing bad has
happened yet. ;-)
TTFN - Guy
> On Jan 8, 2019, at 12:03 PM, Peter Coghlan via cctalk
> wrote:
>
>
> About two hours ago, I received an email to the address I only use for
> cctech/cctalk.
>
> It claimed my email
> On Jan 6, 2019, at 1:31 PM, dwight via cctalk wrote:
>
> Surprisingly, this is actually good for older languages like Forth that are
> fugal with RAM.
Why so (why surprising, I mean)? Understood an unrolled loop executes faster,
RISC instruction sets have lower information density than CISC
There is a special place in hell for spammers. There is an even more
special place lower in hell for web site builders that store plain-text
passwords rather than a one-way salted hash of a password. You know,
the least a site can do for my password is use mid 1970s state of the
art
On 1/8/19 1:53 PM, Noel Chiappa via cctalk wrote:
Can PDP11GUI save output from the -11's console? If so, just say 'od core',
and send me the output.
Assuming that doesn't create another core file... :-) I'll give it a go
when I get home tonight.
--FritzM.
Some architectures (I’m thinking of the latest Intel CPUs) have a small loop
cache
whose aim is to keep a loop entirely within that cache. That cache operates at
the
full speed of the instruction fetch/execute (actually I think it keeps the
decoded uOps)
cycles (e.g. you can’t go faster). L1
> From: Fritz Mueller
> I should go read up on QSIC.
There's not much on the Web, alas. We have two working prototypes (a wirewrap
QBUS mother-board with bus transceivers, level converters, etc, connected to
an FPGA prototyp ung card by flat cables), and working FPGA code to emulate an
>-Original Message-
>From: cctalk [mailto:cctalk-boun...@classiccmp.org] On Behalf Of Fritz Mueller
>via cctalk
>Sent: Tuesday, January 08, 2019 1:43 PM
>To: General Discussion: On-Topic and Off-Topic Posts
>Subject: Re: KD11-E/EA microcode flow diagrams
>
>... I could really use a
On 1/8/19 12:41 PM, Grant Taylor via cctalk wrote:
> I've wondered if some unscrupulous person has subscribed to the list so that
> they can receive a steady stream of email
> addresses
why would they bother?
every cctalk message at
http://www.classiccmp.org/pipermail/cctalk/
has the
On 1/8/19 1:23 PM, Tapley, Mark via cctalk wrote:
> Why so (why surprising, I mean)? Understood an unrolled loop executes
> faster...
That can't always be true, can it?
I'm thinking of an architecture where the instruction cache is slow to
fill and multiple overlapping operations are involved
On 01/08/2019 01:25 PM, John Rollins via cctalk wrote:
That they found an address used only for a certain mailing list makes
it more interesting. Doing a quick Google search it looks like the list
archives can be searched through, and while the addresses appear to be
slightly obfuscated using
Few people (but most are right here) can recite PI to enough digits to
reach the level of inaccuracy. And those who believe that PI is
exactly 22/7 are unaffected by FDIV. (YES, some schools do still teach
that!)
On Tue, 8 Jan 2019, Eric Korpela wrote:
Really? I find it hard to believe any
On Tue, Jan 08, 2019 at 02:29:47PM -0700, Grant Taylor via cctalk wrote:
> On 01/08/2019 02:09 PM, allison via cctalk wrote:
> > Its actually funny. The password given is three yahoo (groups) hacks
> > ago (about 10 years) but the email address used was a public one way
> > reflector
On 01/08/2019 03:02 PM, Al Kossow via cctalk wrote:
why would they bother?
Laziness.
every cctalk message ...
has the poster's email adr
What's easier to do:
1) Go find and repeatedly scrape mailing list archives for sending
email addresses.
2) Subscribe one email address to the same
On 08/01/2019 21:37, alan--- via cctalk wrote:
There is a special place in hell for spammers. There is an even more
special place lower in hell for web site builders that store plain-text
passwords rather than a one-way salted hash of a password.
Oh, there's a worse hell -- I hope -- for
On 1/8/2019 3:51 PM, Guy Sotomayor Jr via cctalk wrote:
Some architectures (I’m thinking of the latest Intel CPUs) have a small loop
cache
whose aim is to keep a loop entirely within that cache. That cache operates at
the
full speed of the instruction fetch/execute (actually I think it keeps
> From: Fritz Mueller
PS:
> I could work to extract the core file
Can PDP11GUI save output from the -11's console? If so, just say 'od core',
and send me the output.
Noel
On 01/08/2019 02:11 PM, Peter Coghlan via cctalk wrote:
My concern is for anyone on the mailing list who finds the the outrageous
claims in these spams to be vaguely plausable and might be quitely
sweating and considering paying these slimeballs while embarrassed to
ask for advice first,
Update from last night:
I did manage to build a bootable single-RK05 V6 unix image under SIMH, starting
from the Ken Wellsch tape image. Yeah, it needs to be converted to SIMH tape
format, as documented in various places on the web, including actually a
gunkies page that I didn’t notice until
> From: Fritz Mueller
> Kernel boots on my actual hardware, but an "ls" in single-user mode
> generates a "Memory error -- core dumped".
Oh, yeah, your hardware definitely has issues, then.
> So evidence is mounting that I really do have some sort of issue with
> my MS11-L.
So all and all its a crude phishing attempt. I write down old passwords to
keep from reuse and I use long mixed ones. So I know it was from that and
meaningless.
Hopefully you keep that list in a way that's not cleartext on your computer.
Posted on the wall, in clear line of sight of the
I have received numerous such emails. They are all junk and not worth reading
or being concerned about. They compile lists of email addresses, usually from
old hacks, and then claim they have your password. Sometimes the password is
included in the email - sometimes it is an out of date
On 1/8/19 1:31 PM, Fred Cisin via cctalk wrote:
>
> I first encountered it about 60 years ago, in fifth grade. Our textbook
> said, "PI is about 3.1416 or 22/7." Our teacher insisted that that
> sentence meant "PI is about 3.1416, or exactly 22/7." I argued it. I
> pointed out that 22/7 was
> On Jan 8, 2019, at 9:23 AM, Noel Chiappa via cctalk
> wrote:
>
> ... Dave B and I need a PDP-11 in the FPGA on the QSIC, to run the USB
> protocol on; rather than using a microcontroller, we decided the hack value
> of putting an -11 in there was too much to resist.
Fun! I should go
On 01/08/2019 03:41 PM, Grant Taylor via cctalk wrote:
> On 01/08/2019 01:25 PM, John Rollins via cctalk wrote:
>> That they found an address used only for a certain mailing list makes
>> it more interesting. Doing a quick Google search it looks like the
>> list archives can be searched through,
On 01/08/2019 02:09 PM, allison via cctalk wrote:
Its actually funny. The password given is three yahoo (groups) hacks
ago (about 10 years) but the email address used was a public one way
reflector (arrl.net).
So you are (or were) a licensed ham. 73 to you. :-)
So all and all its a crude
On Tue, Jan 8, 2019 at 2:31 PM Chuck Guzis via cctalk
wrote:
> Yeah, I get the one occasionally that claims to have compromising video
> taken with my PC's webcam. Except, of course, my computer doesn't have
> and never has had a webcam.
If you want a video of the back side of a band-aid, go
Chuck Guzis via cctalk wrote:
> On 1/8/19 12:20 PM, Kevin Lee via cctalk wrote:
> > Delete it don’t respond and ignore it.. been getting them too.. change your
> > password
> > If your that concerned.. it’s a fishing trip..
>
My concern is for anyone on the mailing list who finds the the
On 01/08/2019 02:40 PM, Diane Bruce wrote:
Correct. What happens is people start rotating passwords 12345 23451 etc.
that sort of thing. Bad.
Yep.
I think people are also more willing, if not actually inclined, to
memorize a better password if they can use it for more than 90 days.
But not
On 01/08/2019 04:29 PM, Grant Taylor via cctalk wrote:
> On 01/08/2019 02:09 PM, allison via cctalk wrote:
>> Its actually funny. The password given is three yahoo (groups) hacks
>> ago (about 10 years) but the email address used was a public one way
>> reflector (arrl.net).
>
> So you are (or
On Tue, 8 Jan 2019, Grant Taylor via cctalk wrote:
What's easier to do:
1) Go find and repeatedly scrape mailing list archives for sending email
addresses.
2) Subscribe one email address to the same mailing lists and have the
messages delivered to you where you can have an automated
On Tue, 8 Jan 2019, allison via cctalk wrote:
SStandard lockout after three fails i 15 minutes.�
Howzbout:
a quarter second lockout after a fail;
double that for each subsequent fail.
Three tries to get it right will not be inconvenienced.
But, by 32 tries, it's up to a biillion seconds.
On 01/08/2019 03:09 PM, allison via cctalk wrote:
I would actually be interested in seeing full messages source,
including headers, for some of the messages. (If anyone is willing
and interested in sharing.)
Sure, I could send you a bunch.
Jon
On 01/08/2019 02:03 PM, Peter Coghlan via cctalk wrote:
About two hours ago, I received an email to the address I only use for
cctech/cctalk.
It claimed my email account had been hacked and threatened all sorts of
dire consequences if I didn't deposit $1000 in bitcoins in some place within
48
I've heard quit a bit about that scam, but I haven't gotten that one.
The really sad part is that I'm not doing anything that I could be
blackmailed about.
THAT is depressing.
(Crypto-locker, etc. is EXTORTION, not blackmail)
On 01/08/2019 04:33 PM, Fred Cisin via cctalk wrote:
On Tue, 8 Jan 2019, allison via cctalk wrote:
SStandard lockout after three fails i 15 minutes.�
Howzbout:
a quarter second lockout after a fail;
double that for each subsequent fail.
Three tries to get it right will not be inconvenienced.
At 08:56 PM 8/01/2019 -0600, you wrote:
>On 01/08/2019 04:33 PM, Fred Cisin via cctalk wrote:
>> On Tue, 8 Jan 2019, allison via cctalk wrote:
>>> SStandard lockout after three fails i 15 minutes.�
>>
>> Howzbout:
>> a quarter second lockout after a fail;
>> double that for each subsequent fail.
On Tue, Jan 8, 2019 at 9:31 PM Fred Cisin via cctalk
wrote:
> I first encountered it about 60 years ago, in fifth grade. Our textbook
> said, "PI is about 3.1416 or 22/7." Our teacher insisted that that
> sentence meant "PI is about 3.1416, or exactly 22/7." I argued it. I
> pointed out that
On Tue, 8 Jan 2019, Chuck Guzis via cctalk wrote:
3.142 was good enough for Edward Elgar.
Approximations are what is needed for real world use.
How much accuracy do I need for making a patio table base for a RAMAC
[CRASHED!] platter, using a handheld circular saw, and a guess of the kerf
On 1/8/19 3:04 PM, Fred Cisin via cctalk wrote:
> But, using a crude code of 'A' = 1, 'B' = 2, 'C' = 3, etc.
> "ELGAR" appears in PI at decimal digits 7608455
I suspect that Pi, to a sufficient number of places could decode
anyone's surname.
No, I'm thinking of "Nimrod"...
--Chuck
On 1/8/19 8:18 PM, ED SHARPE via cctalk wrote:
>
> Chuck we would like a couple.. ed at smecc
For the keyboards, my source is Electronics Goldmine
(https://www.goldmine-elec-products.com/) for the keyboards. Usually
$10 each, but go on sale every now and then for $5.
"Blue Pills" can be
On Wed, 9 Jan 2019, Guy Dunphy via cctalk wrote:
The phone rings, I pick up, there's a variable duration interval of silence,
then a pooiip! popping
sound (their system connecting this call to one of their operators, now that I
answered), then a
usually very Indian sounding voice (M or F) says
They need to tune the pitch to the audience:
"We see that you ran 'EDITH' with three sense switches activated..."
> From: Fritz Mueller
PPS:
> I could work to extract the core file
I just checked, and the binary for the 'ls' command is what's called 'pure
code'; i.e. the instructions are in a separate (potentially shared) block of
memory from the process' data (un-shared).
I don't recall off the
While tidying up I've found a few Irman infrared to serial dongles
https://web.archive.org/web/20060314052558/http://www.evation.com/irman/index.html
they connect via a 9 pin serial plug and then convert any consumer
remote IR signals they receive into serial.
No additional power required, good
On 1/8/2019 6:24 PM, dwight via cctalk wrote:
There is an algorithm to calculate any digit of PI as long as it is in HEX ( or
base 16 ). So far no one has been able to do this in a decimal system. It would
seem that out binary computers were close to right in the first place.
Dwight
What is
On 2019-01-08 8:50 PM, ben via cctalk wrote:
> On 1/8/2019 6:24 PM, dwight via cctalk wrote:
>> There is an algorithm to calculate any digit of PI as long as it is in
>> HEX ( or base 16 ). So far no one has been able to do this in a
>> decimal system. It would seem that out binary computers were
On 1/8/19 7:56 PM, Jon Elson via cctalk wrote:
Interesting observation I made a few years ago. I run a web store, and
was being inundated with ssh login attempts. About 1000/day! I decided
this was serious, they'd eventually get lucky.
It's really hard for them to get lucky if you don't
On 1/8/19 9:15 PM, Fred Cisin via cctalk wrote:
>
> "Windows Technical Department"
> "Windows Company" !!?!
>
I used to get one of those calls every few days, but I'm using a
screening service, so I haven't gotten one in months.
Too bad! I used to have a lot of fun playing dumb. "Vindows"
On 1/8/19 3:07 PM, Noel Chiappa via cctalk wrote:
:-) Don't worry, we'll nail it!
Oh yes, it would be much less fun if it were all working. The finding
and fixing is the best part :-)
Rest up and feel better soon, Noel!
--FritzM.
On 1/8/19 8:39 PM, Fred Cisin via cctalk wrote:
3 failures is not enough for some legitimate human failings.
There's a high chance for false positives there.
I occasionally will forget a password, and make 4 or 5 tries; and then,
a few days later, remember it.
I wonder if it's three
Chuck we would like a couple.. ed at smecc
Sent from AOL Mobile Mail
On Tuesday, January 8, 2019 Chuck Guzis via cctalk wrote:
On 1/8/19 3:05 PM, David Brownlee via cctalk wrote:
> While tidying up I've found a few Irman infrared to serial dongles
>
>
On 1/8/19 3:05 PM, David Brownlee via cctalk wrote:
> While tidying up I've found a few Irman infrared to serial dongles
>
> https://web.archive.org/web/20060314052558/http://www.evation.com/irman/index.html
>
> they connect via a 9 pin serial plug and then convert any consumer
> remote IR
There is an algorithm to calculate any digit of PI as long as it is in HEX ( or
base 16 ). So far no one has been able to do this in a decimal system. It would
seem that out binary computers were close to right in the first place.
Dwight
From: cctalk on behalf
SStandard lockout after three fails i 15 minutes.�
Howzbout:
a quarter second lockout after a fail;
double that for each subsequent fail.
Three tries to get it right will not be inconvenienced.
But, by 32 tries, it's up to a billion seconds.
On Tue, 8 Jan 2019, Jon Elson wrote:
IP's view. I
At 11:05 PM 8/01/2019 +, you wrote:
>While tidying up I've found a few Irman infrared to serial dongles
>
>https://web.archive.org/web/20060314052558/http://www.evation.com/irman/index.html
>
>they connect via a 9 pin serial plug and then convert any consumer
>remote IR signals they receive
Hi again
Olafs also found this:
http://www.nedopc.org/forum/viewtopic.php?t=9778
Unless you know russian, maybe you can use google translate.
Regards,
Pontus.
On Tue, Jan 08, 2019 at 11:06:12AM +0100, Pontus Pihlgren via cctalk
wrote:
> Hi Iain
>
> I asked a guy from Latvia that I know,
On Mon, 7 Jan 2019, Fritz Mueller wrote:
It wasn?t clear to me last time I looked that I could build V6 to run
off a single pack without having a second RK05 drive and pack available
for swap?
I have 2.9BSD on a single RK05 pack *with* a small swap space, it works
very nicely. I have a 11/45
On Tue, Jan 8, 2019 at 8:47 AM Ethan Dicks via cctalk
wrote:
> One of the challenges I had then was my largest PDP-11 at home was an
>
11/24 with 2MB of RAM.
>
I'm wondering how 2.9BSD was with ~1MB of RAM, but say ~40MB of disk. I
have a machine I play with from time to time that's x86 + 892MB
> From: Fritz Mueller
>> the last microinstruction for RTI/RTT has been moved from 002 -> 744.
> So what's at 002 now? Maybe something new was required there by micro
> branch/fork logic, so the original contents had to be moved?
Well, it turns out I've been transcribing the
On Sun, Jan 6, 2019 at 1:00 PM Fred Cisin via cctalk
wrote:
> Few people (but most are right here) can recite PI to enough digits to
> reach the level of inaccuracy. And those who believe that PI is exactly
> 22/7 are unaffected by FDIV. (YES, some schools do still teach that!)
>
Really? I
On Tue, Jan 8, 2019 at 9:53 AM Warner Losh wrote:
> On Tue, Jan 8, 2019 at 8:47 AM Ethan Dicks via cctalk
> wrote:
>> One of the challenges I had then was my largest PDP-11 at home was a
>> 11/24 with 2MB of RAM.
>
> I'm wondering how 2.9BSD was with ~1MB of RAM, but say ~40MB of disk. I have
On Tue, Jan 8, 2019 at 2:25 AM Christian Corti via cctalk
wrote:
> I have 2.9BSD on a single RK05 pack *with* a small swap space, it works
> very nicely. I have a 11/45 with RK05, RL02 and RX02 in a single cabinet.
My experience with 2.9BSD on an 11/24 in the late 80s was that an
install from
Hi Iain
I asked a guy from Latvia that I know, Olafs. He recognized the
transistors as KT315 A and B. Collector is middle pin.
https://en.wikipedia.org/wiki/KT315
He might also be able to help with spare lights, contact me off-list.
Unfortunately he has no documentation.
/P
On Sat, Jan 05,
67 matches
Mail list logo