On Sun, Aug 12, 2018, 1:44 PM James Knott via talk <[email protected]> wrote:
> On 08/12/2018 01:26 PM, Russell Reiter via talk wrote: > > Some wag deemed it a "ring 4" exploit. > > > > Many years ago, I was a computer tech, working on a variety of systems, > including the VAX 11/780 and Data General Eclipse. Both of those had a > writable control store and the VAX even loaded it's microcode from a > floppy at boot. One ot the things I had to do, when repairing Eclipse > computers was work my way through the microcode, using a very large > listing and a logic probe, along with the microstep switch on the front > panel. The Eclipse used 4 AMD 4 bit slice processors and, IIRC, over > 100 bits wide ROM to contain the instruction set. With the WCS, I > expect it would be fairly easy to insert malware. > Thats an interesting paradigm shift. Searching through the physical setup using logic tools old school, vs new school; searching through patent records just to be able to find the hardware. > > --- > Talk Mailing List > [email protected] > https://gtalug.org/mailman/listinfo/talk >
--- Talk Mailing List [email protected] https://gtalug.org/mailman/listinfo/talk
