On Sun, Aug 12, 2018, 1:44 PM James Knott via talk <[email protected]> wrote:

> On 08/12/2018 01:26 PM, Russell Reiter via talk wrote:
> > Some wag deemed it a "ring 4" exploit.
> >
>
> Many years ago, I was a computer tech, working on a variety of systems,
> including the VAX 11/780 and Data General Eclipse.  Both of those had a
> writable control store and the VAX even loaded it's microcode from a
> floppy at boot.  One ot the things I had to do, when repairing Eclipse
> computers was work my way through the microcode, using a very large
> listing and a logic probe, along with the microstep switch on the front
> panel.  The Eclipse used 4 AMD 4 bit slice processors and, IIRC, over
> 100 bits wide ROM to contain the instruction set.  With the WCS, I
> expect it would be fairly easy to insert malware.
>

Thats an interesting paradigm shift.

Searching through the physical setup using logic tools old school, vs new
school; searching through patent records just to be able to find the
hardware.

>
> ---
> Talk Mailing List
> [email protected]
> https://gtalug.org/mailman/listinfo/talk
>
---
Talk Mailing List
[email protected]
https://gtalug.org/mailman/listinfo/talk

Reply via email to