1 INFO-VAX	Tue, 27 Apr 2004	Volume 2004 : Issue 233       Contents:C (OT) RSENT -- Random Sentence Generator and more from DECUS RSX SIG C (OT) RSENT -- Random Sentence Generator and more from DECUS RSX SIG , Re: Billions wasted due to IT skills deficit Binary file issues Re: Binary file issues Re: Binary file issues Re: Binary file issues Re: BNU ACCVIO> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...& Is it possible to choose a better way?E Re: Not available on OpenVMS, but it may just be the 'next big thing' & Re: OpenVMS newbie  - AlphaStation 233& Re: OpenVMS newbie  - AlphaStation 233& Re: OpenVMS newbie  - AlphaStation 233 Re: OT: Scalability  PLUG: txt2pdf 7.3  SSH in a DCL script ) TCPIP Services: SMTP receiver suggestions + Re: The JF MEZEI FAQ - Revised and Updated! + Re: The JF MEZEI FAQ - Revised and Updated! + Re: The JF MEZEI FAQ - Revised and Updated! 6 Re: Undeniable proof that Itanium is highly profitable> Re: upgrading (or installing) VMS on a system with no CD drive4 Re: VMS 7.3-2, TCPIP 5.4: which to upgrade to first?  F ----------------------------------------------------------------------    Date: 27 Apr 2004 09:11:37 -0700$ From: gspamtackett@yahoo.com (Galen)L Subject: (OT) RSENT -- Random Sentence Generator and more from DECUS RSX SIG= Message-ID: <bdc65a53.0404270811.525176e2@posting.google.com>   @ I have found that which I soughtThe program is actually a randomD sentence generator called RSEN. Contrary to my original speculation,C it was not related to the lexical scanner generator LEX that's also  available at this site.   $ Interested parties should check out:  \ http://www.ibiblio.org/pub/academic/computer-science/history/pdp-11/rsx/decus/rsx89a/005014/  * A few other "goodies" you will find there:  = BOGGLE -- Bob Denny's implementation of the Boggle word game.   A COOKIE -- Prints a randomly selected "fortune cookie" message (by  Martin Minow).  @ MOZART -- Random minuet generator, written to drive the author'sD homebrew synthesizer board under RT11 but (his words) "converting to4 other synthesizers should not be too great a chore."    C (And now back to your regularly scheduled, on-topic programming...)           i gspamtackett@yahoo.com (Galen) wrote in message news:<bdc65a53.0404160912.52f4dac5@posting.google.com>... F > Way, way back in a previous life I did a lot of coding in DECUS C onD > an RSX-11M system. There were some fun bits of code that came withH > DECUS C and/or some of the enhancements or tool packages available for > it.  > F > One of these was a text generator that accepted a simple grammar andE > then produced random sentences based upon that grammar. There was a H > sample program for it that generated insulting comments in the context% > of playing a chess-like board game.  > A > It could generate some convoluted and often very funny insults!  > G > I did some Google searches hoping to turn it up but couldn't think of D > a specific enough search string. Does anyone remember this programA > (and the other DECUS C tools that came in the same package) and . > perhaps know where a copy could be obtained? > C > (It may have been associated with the DECUS C LEX lexical scanner 
 > generator?)  > 	 > Thanks,  >  > Galen    ------------------------------    Date: 27 Apr 2004 09:12:43 -0700$ From: gspamtackett@yahoo.com (Galen)L Subject: (OT) RSENT -- Random Sentence Generator and more from DECUS RSX SIG= Message-ID: <bdc65a53.0404270812.715f5021@posting.google.com>   5 Oops. Here's a corrected version of that last post...   B I have found that which I sought. The program is actually a randomE sentence generator called RSENT. Contrary to my original speculation, C it was not related to the lexical scanner generator LEX that's also  available at this site.   $ Interested parties should check out:  \ http://www.ibiblio.org/pub/academic/computer-science/history/pdp-11/rsx/decus/rsx89a/005014/  * A few other "goodies" you will find there:  = BOGGLE -- Bob Denny's implementation of the Boggle word game.   A COOKIE -- Prints a randomly selected "fortune cookie" message (by  Martin Minow).  @ MOZART -- Random minuet generator, written to drive the author'sD homebrew synthesizer board under RT11 but (his words) "converting to4 other synthesizers should not be too great a chore."    C (And now back to your regularly scheduled, on-topic programming...)           i gspamtackett@yahoo.com (Galen) wrote in message news:<bdc65a53.0404160912.52f4dac5@posting.google.com>... F > Way, way back in a previous life I did a lot of coding in DECUS C onD > an RSX-11M system. There were some fun bits of code that came withH > DECUS C and/or some of the enhancements or tool packages available for > it.  > F > One of these was a text generator that accepted a simple grammar andE > then produced random sentences based upon that grammar. There was a H > sample program for it that generated insulting comments in the context% > of playing a chess-like board game.  > A > It could generate some convoluted and often very funny insults!  > G > I did some Google searches hoping to turn it up but couldn't think of D > a specific enough search string. Does anyone remember this programA > (and the other DECUS C tools that came in the same package) and . > perhaps know where a copy could be obtained? > C > (It may have been associated with the DECUS C LEX lexical scanner 
 > generator?)  > 	 > Thanks,  >  > Galen    ------------------------------    Date: 27 Apr 2004 07:43:07 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) 5 Subject: Re: Billions wasted due to IT skills deficit 3 Message-ID: <AIl4q$L7Ta8M@eisner.encompasserve.org>   R In article <Pdydnab_xLf9zhDdRVn-hQ@igs.net>, "John Smith" <a@nonymous.com> writes:  M > Every legal system has its own set of horror stories and inefficiences, but I > on the whole it appears that the US legal system has more than its fair J > share of ridiculously high cost judgements against defendants who should- > never have been in court in the first place   H    I think you need to give more consideration to the messenger.  NobodyC    makes ratings in thenews business by telling you about all those 7    reasonable court cases that has reasonable outcomes.    ------------------------------  % Date: Tue, 27 Apr 2004 00:04:50 -0600 ( From: Lorin Ricker <lorin@locktrack.com> Subject: Binary file issues 8 Message-ID: <hmtr80145b0u620db05qjgudtujf6itp7l@4ax.com>  ? (I'm posting this on behalf of Dean Woodward.  -- Lorin Ricker)   D A few weeks ago, the following issue came up and we're stumped as to what's going on:  F A UUENCODED file is received by a VMS host; UUDECODE is called and the3 output (a JPEG image) is stored in the file system.   E This file is retrieved one of three ways: by a custom application, in C which the VMS machine UUENCODES it and transmits it again; via WASD 2 web services, or directly from a PC via PATHWORKS.  > We noticed that UUDECODE stores the file (binary, remember) asE STREAM_LF. That didn't seem right, so we "fixed" it by converting all C existing images to FIX:512, and adding code to convert new files to : FIX:512 as they're recieved. Nothing's been right since...  C The application, which relies on UUENCODE/UUDECODE, doesn't seem to A care. WASD doesn't seem to care. Pathworks cares, a *lot*; images E viewed with Pathworks were corrupt. So we took out the bit converting D to FIX:512. Now, approximately 1/3 of the images are unviewable withA PATHWORKS. If I use the application to grab those photos, they're @ fine; I can then copy them back up to the server with PATHWORKS,F whereupon the application will hate them; the web server at that pointD is hit-and-miss. Again, I'll note before we made changes a few weeks ago, things ran perfectly...  @ Any suggestions gratefully appreciated; fixing broken images now consumes 1/3 of my workday...   E The machine is a DS20, running OpenVMS 7.2-1, TCPIP 5.1, and Advanced 
 Server 7.2  " Thanks in advance -- Dean Woodward   ------------------------------  % Date: Tue, 27 Apr 2004 08:41:46 +0200  From: Dirk Munk <munk@home.nl> Subject: Re: Binary file issues 2 Message-ID: <c6kvbb$l4f$1@news4.tilbu1.nb.home.nl>  L If you used Convert to convert these files, then I'm not surprised that you O can't view them anymore. If your really want them in binary format, you should   use Set File /Attributes.   N A small explanation: many of these programs that were converted from Unix are O written in C and use Unix style I/O. That means these programs do *not* RMS to  P read and write files. VMS engineering has tried to solve this problem by simply M   adding the Stream-LF (with record lenght 32676) attributes to these files,  N which is quite ok for many data files. However the real structure of the file P may be different, so that even a executable may have these attributes ! Actualy # you can even run such a executable.   Q Now when you use Convert to change the file to binary, you change the *contents*  K of the file. Since the Stream_LF attribute had nothing to do with the real  P contents of the file in the foirst place, such a convert will result in 'junk'. C With Set File /Attributes you keep the contents of the file intact.        Lorin Ricker wrote: A > (I'm posting this on behalf of Dean Woodward.  -- Lorin Ricker)  > F > A few weeks ago, the following issue came up and we're stumped as to > what's going on: > H > A UUENCODED file is received by a VMS host; UUDECODE is called and the5 > output (a JPEG image) is stored in the file system.  > G > This file is retrieved one of three ways: by a custom application, in E > which the VMS machine UUENCODES it and transmits it again; via WASD 4 > web services, or directly from a PC via PATHWORKS. > @ > We noticed that UUDECODE stores the file (binary, remember) asG > STREAM_LF. That didn't seem right, so we "fixed" it by converting all E > existing images to FIX:512, and adding code to convert new files to < > FIX:512 as they're recieved. Nothing's been right since... > E > The application, which relies on UUENCODE/UUDECODE, doesn't seem to C > care. WASD doesn't seem to care. Pathworks cares, a *lot*; images G > viewed with Pathworks were corrupt. So we took out the bit converting F > to FIX:512. Now, approximately 1/3 of the images are unviewable withC > PATHWORKS. If I use the application to grab those photos, they're B > fine; I can then copy them back up to the server with PATHWORKS,H > whereupon the application will hate them; the web server at that pointF > is hit-and-miss. Again, I'll note before we made changes a few weeks > ago, things ran perfectly... > B > Any suggestions gratefully appreciated; fixing broken images now > consumes 1/3 of my workday...  > G > The machine is a DS20, running OpenVMS 7.2-1, TCPIP 5.1, and Advanced  > Server 7.2 > $ > Thanks in advance -- Dean Woodward >    ------------------------------  % Date: Tue, 27 Apr 2004 04:38:03 -0400 - From: JF Mezei <jfmezei.spamnot@teksavvy.com>  Subject: Re: Binary file issues , Message-ID: <408E1BB2.6252B1C4@teksavvy.com>   Lorin Ricker wrote: @ > We noticed that UUDECODE stores the file (binary, remember) asG > STREAM_LF. That didn't seem right, so we "fixed" it by converting all E > existing images to FIX:512, and adding code to convert new files to < > FIX:512 as they're recieved. Nothing's been right since...  L As far as Pathworks or any other software, you need to do the reverse first.L For instance, take a valid .jpeg file on your PC and copy it to the VMS hostI with Pathworks. You will then see on VMS how pathworks expects to see its 7 .jpeg files. (and then know how to format those files).   L as Mr Munk said, "convert" will actually change the data contents of a file. You need to use > SET FILE/ATTRIB=(rfm:fix,lrl:512,mrs:512,rat=none) picture.jpg  L This changes no data inside the file, but changes how VMS acessed that data.\ The above will tell RMS to just provide the raw data without any interpretation/translation.  N The "correct" way would be to use the "undefined" record format. However, mostL applications will fail with some error about a buffer not being large enoughJ to contain the whole file. (RMS will treat the file as a single record, at+ least when used by the C run time library).    ------------------------------  % Date: Tue, 27 Apr 2004 10:14:50 -0700 ) From: Dean Woodward <dean@looseonthe.net>  Subject: Re: Binary file issues - Message-ID: <408E950A.1000606@looseonthe.net>   ) On 4/26/2004 11:41 PM, Dirk Munk wibbled:   - > If you used Convert to convert these files,    Nope; we used SET FILE/ATTR...   JF: G > As far as Pathworks or any other software, you need to do the reverse E > first. For instance, take a valid .jpeg file on your PC and copy it > > to the VMS host with Pathworks. You will then see on VMS howA > pathworks expects to see its .jpeg files. (and then know how to  > format those files).  . Which we've done, but that makes things worse:   I wrote:8 > If I use the application to grab those photos, they'reB > fine; I can then copy them back up to the server with PATHWORKS,+ > whereupon the application will hate them;   I Primarily they need to be available to the application first, then WASD,  G then PATHWORKS _only_ for ~24 hours after they're captured. If I tweak  A them the way PATHWORKS wants (and only _some_ of them need to be  E tweaked, on some basis we don't understand), they're useless for the  E other two. I can add as a footnote that using FTP to copy a "broken"  G image to a PC doesn't help- but that's a sidenote, as we never use FTP   to access them.   	 JF again: @ > SET FILE/ATTRIB=(rfm:fix,lrl:512,mrs:512,rat=none) picture.jpg  A Using that exact line fixes some images so they're available via   PATHWORKS- but breaks others.   G Let's forget about all the historical photos, except for the fact that  E before we did the SET FILE /ATTR operation, they all were accessible  1 three ways- our application, WASD, and PATHWORKS.   G Our problem is this: we've undone the change made (i.e., commented out  D the SET FILE /ATTR command after the file is created), but some NEW B images are still not working, on some quasi-random basis we can't H understand. If I could grasp that, and what I might do to a copy of the I file to make PATHWORKS happy for the timeframe needed, I could deal with  E it, though I still want to know why, with the changes undone, things  . haven't gone completely back to how they were.   ------------------------------    Date: 27 Apr 2004 07:45:54 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler)  Subject: Re: BNU ACCVIO 3 Message-ID: <jvDPUPx6TqFJ@eisner.encompasserve.org>   j In article <mesnews.d51b7d44.781dc1ad.398.584@brutele.be>, Marc Van Dyck <marc.vandyck@brutele.be> writes:  8 > 2) any way to retire the old nescape and replace it by; >    cswb, a.k.a. mozilla in bnu ? I know about the bnu.dat 5 >    resource file, but it seems to expect a .exe for 2 >    the html viewer, and mozilla is launched by a
 >    .com ...   @    If mozilla is running before BNU requests the .html file, BNU    will use mozilla.  A    I did reverse-engineer BNU enough to make mozilla it's default B    browser, but its not supported and I don't know what version of,    VMS I had it working on.  Probably 7.2-1.   ------------------------------  % Date: Tue, 27 Apr 2004 12:03:06 +0100 O From: Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 0 Message-ID: <c6lelt$rg1$1@new-usenet.uk.sun.com>   Bob Ceculski wrote:  > Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> wrote in message news:<c6asop$e9l$3@new-usenet.uk.sun.com>...  >  >>Bob Ceculski wrote:  >>y >>>Andrew Harrison <andrew.d.harrison_remove_the_d@sun.com> wrote in message news:<c68o69$n3k$1@new-usenet.uk.sun.com>...  >>>  >>> 7 >>>>And while you are at it Bob why not reflect on that > >>>>fact that you have never managed to justify the comparison< >>>>of OpenVMS vs any other OS using CERT counts because youA >>>>have never managed to explain why OpenVMS security advisories ? >>>>do not get posted to CERT reliably or even to explain where ? >>>>you ought to look for them as CERT is the last place to go.  >>>>? >>>>I have asked you to justify your claims or quit making them < >>>>on more occasions than is worth recalling you have never= >>>>managed and all you are doing now is the standard openVMS  >>>>CERT troll.  >>>>? >>>>so I will ask you again, justify your claims or quit making 	 >>>>them.  >>>> >>>>Regards  >>>>ANdrew Harrison  >>>  >>> > >>>I just did ... if you would click on the above link for the; >>>TCPware and multinet cert advisories, they clearly state ? >>>that there was no security risk or at worse access violation ? >>>error for these certs, which means they are no security risk = >>>for VMS, which means you don't post something on cert that , >>>is irrelevant to VMS security ... capice? >> >> >>> >>Since when did TCPware and Multinet become the only possible= >>sources of Security violations in OpenVMS and therefore the $ >>only place that you need to look ? >>	 >>Regards  >>Andrew Harrison  >  > : > CERT is where you look ... you can go their now and look: > at over 1000 CERTS for slowaris ... tell us how many you > find for VMS ...  7 But then thats BS isn't it Bob because you know as well 8 as anyone that OpenVMS vunerabilites do not get reliably reported to CERT.   7 Its a BS measure which you have never managed to defend 9 so please do yourself a favour and stop the CERT trolling 7 the only person or thing it damages is you and OpenVMS.    regards  Andrew Harrison    ------------------------------  % Date: Tue, 27 Apr 2004 13:07:53 +0100 * From: Nic Clews <sendspamhere@[127.0.0.1]>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... ' Message-ID: <c6lihd$fr6$1@lore.csc.com>    Karsten Nyblad wrote:  > 7 > "Bob Ceculski" <bob@instantwhip.com> wrote in message 9 > news:d7791aa1.0404261431.78826e76@posting.google.com... J > > koehler@eisner.nospam.encompasserve.org (Bob Koehler) wrote in message1 > news:<qnojCc7SHcLR@eisner.encompasserve.org>... B > > > In article <d7791aa1.0404221456.bac7f8b@posting.google.com>,, > bob@instantwhip.com (Bob Ceculski) writes: > > >  > > > > VMS CAN'T GET A VIRUS! > > > M > > >    Sorry, but that's just not true.  You probably won't find a nice big I > > >    security hole to pass your virus through, but you can write one.  > > > G > > >    And  I'm sure somewhere, someone, has placed a VMS system on a 	 > network K > > >    with a major configuration error that would provide that big hole.  > > > ( > > >    VMS just doesn't ship that way. > > @ > > that is what I am saying ... HELLO ... A PROPERLY CONFIGUREDA > > VMS SYSTEM IS IMMUNE TO ALL VIRUSES, WORMS AND WHAT EVER ELSE ? > > YOU CAN THINK OF ... when you find one, please report it to @ > > CERT so the count of 13 from the last 10 years can increment > > by one ... > M > Bob, You have a wrong conception of what a virus is.  A virus is a piece of K > code that attaches itself to command language files or program files (DCL L > files or image files on VMS.)  The code of the virus will be executed whenN > the command language file or the image file is executed.  The virus containsM > code to copy itself to other command languages or program files.  The virus N > infects new systems by fooling somebody into copying an infected file to theN > system and the execute the file.  VMS has no mechanism for protecting itselfL > from a user copying an infected file on to the system and then execute it.J > All you can hope for is that the normal file protection system will save > you.  A "All you can hope for..." is a bit melodramatic for VMS. Ignoring H protection modes, you're talking to do any real damage that someone withF full blown privileges also has default proxy and unchecked access into2 other systems which could be potentially infected.  D I'm definitely not saying it is impossible, but your regular systemsG manager knows the risks and has to act, or be pretty dumb to allow this D situation. The majority of users are (or should be!) non privileged.B Even if they do run a virus or worm code, the damage limitation is already in place.    --  ? Regards, Nic Clews a.k.a. Mr. CP Charges, CSC Computer Sciences  nclews at csc dot com    ------------------------------    Date: 27 Apr 2004 07:36:03 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 3 Message-ID: <d5+NW63pBkRe@eisner.encompasserve.org>   Z In article <c6k8ep$2qmt$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes: > A > In my view a virus always use social engineering to get through   G    Nope.  Far too many security holes in Windows and UNIX have required &    no actions on the part of any user.   ------------------------------    Date: 27 Apr 2004 05:37:44 -0700( From: bob@instantwhip.com (Bob Ceculski)G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... = Message-ID: <d7791aa1.0404270437.5bff64fd@posting.google.com>   _ "Karsten Nyblad" <nospam@nospam.com> wrote in message news:<c6k7cn$2n7e$1@news.cybercity.dk>... 7 > "Bob Ceculski" <bob@instantwhip.com> wrote in message 9 > news:d7791aa1.0404261121.6a26e149@posting.google.com... E > > well, if there were viruses, Sophos anti-virus for VMS could find C > > them, but from the sounds of the following from their web site, A > > none seem to exist at present ... only windoze/unix/linux ...  > N > That sssumes that they know how to scan for viruses that attach VMS, or thatL > they can use primitive bit map pattern maching to catch the virus.  If youN > use the technics used on IA-32 computers to disguise you virus, then I thinkJ > it could take some time before Sophus could develop an efficient filter. > N > Please note that DCL substitutes symbols before scanning and parsing commandN > lines.  You can use it to write really unreadable DCL code, or with a bit of5 > imagenation to disguise a virus to a virus scanner.  > @ > > http://www.sophos.com/support/knowledgebase/article/163.html > L > I think you have copied a wrong link.  I get an other article than the one0 > you are refering.  I think the link should be:> > http://www.sophos.com/support/knowledgebase/article/156.html >  > Karsten Nyblad! > ibpit1202 at sneakemail dot com   A you can't even get the virus on the system because you can't send < viruses thru vms mail ... the only way to get on is with the? assistance of an inside person with priviledges to either do it ! for you or give you his login ...    ------------------------------    Date: 27 Apr 2004 07:32:22 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 3 Message-ID: <FQYlyvwOI1a+@eisner.encompasserve.org>   b In article <Osbjc.41981$_L6.2559430@attbi_s53>, glen herrmannsfeldt <gah@ugcs.caltech.edu> writes:I >>    I don't see how you can make that claim since VMS has been attacked  >>    by worms.  >  > G > There is a very good reason that VMS is not attacked by worms, and it . > doesn't have at all to do with VMS security.  G    Why are you going in this direction?  I'm telling you VMS _HAS_ been      attacked by at leat one worm.  G > I believe that Windows and Solaris are still the popular web servers, E > and so are favorites for worm attacks.   The statistics are against E > almost every other OS.  Unless VMS becomes popular as a web server, 2 > there isn't much reason for worm writers to try.  H    This BS is kicked around often enough.  Sure popularity has somethingG    to do with what gets attacked.  But it is not the whole story.  When E    VMS was what Everybody did, it was secure.  And popularity doesn't -    change design or implementation decisions.    ------------------------------    Date: 27 Apr 2004 07:34:14 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 3 Message-ID: <URN21rpe9kYk@eisner.encompasserve.org>   h In article <d7791aa1.0404261431.78826e76@posting.google.com>, bob@instantwhip.com (Bob Ceculski) writes: > > > that is what I am saying ... HELLO ... A PROPERLY CONFIGURED? > VMS SYSTEM IS IMMUNE TO ALL VIRUSES, WORMS AND WHAT EVER ELSE > > YOU CAN THINK OF ... when you find one, please report it to > > CERT so the count of 13 from the last 10 years can increment > by one ...  D    A propery configure Windows or UNIX system has the same property.?    The only problem is it isn't getting any work done since the     power is unplugged.   ------------------------------  % Date: Tue, 27 Apr 2004 14:01:00 +0100 O From: Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... / Message-ID: <c6lliv$n5$1@new-usenet.uk.sun.com>    Bob Koehler wrote:d > In article <Osbjc.41981$_L6.2559430@attbi_s53>, glen herrmannsfeldt <gah@ugcs.caltech.edu> writes: >  > G >>I believe that Windows and Solaris are still the popular web servers, E >>and so are favorites for worm attacks.   The statistics are against E >>almost every other OS.  Unless VMS becomes popular as a web server, 2 >>there isn't much reason for worm writers to try. >  > J >    This BS is kicked around often enough.  Sure popularity has somethingI >    to do with what gets attacked.  But it is not the whole story.  When G >    VMS was what Everybody did, it was secure.  And popularity doesn't / >    change design or implementation decisions.  >     A But it isn't BS. Lets examine one often used example of OpenVMS's > apparent security invunerability the Defcon 9 capture the flag competition.  ? The headline touted by OpenVMS advocates is that an OpenVMS box C secured with additional 3rd party software resisted all attempts to ' hack it during the Defcon 9 conference.   = The reality is that a separate survey conducted by the Defcon : organisers found that none of the Defcon 9 hackers had any: significant experience of using OpenVMS and not one single; hacker had access to OpenVMS systems as a hacking platform.   8 Without interest in the platform it is never going to be9 seriously exploited and that is virtually all you can say  from the Defcon 9 example.   regards  Andrew Harrison    ------------------------------  % Date: Tue, 27 Apr 2004 14:03:24 +0100 O From: Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... / Message-ID: <c6llnf$n5$2@new-usenet.uk.sun.com>    Bob Koehler wrote:s > In article <c68pm6$nke$1@new-usenet.uk.sun.com>, Andrew Harrison <andrew.d.harrison_remove_the_d@sun.com> writes:  >  >>Bob Koehler wrote: >>o >>>In article <c66ar5$rnt$1@new-usenet.uk.sun.com>, Andrew Harrison <andrew_._remove_harrison@su_n.com> writes:  >>>  >>> : >>>>What was it about my previous posts that you disagreed
 >>>>with ? >>>  >>> L >>>   You claim I was technically in error, but everything technical I wroteK >>>   was true.  You then invented a "new systems" aspect to the discussion  >>>   which I never claimed. >>>  >>	 >>Rubbish  >  >  >    See previous post.  >   : I did and you still havn't provided me with the version of9 Solaris you used so that I can tell you if ftpd and login  used PAM on it.    Regards  Andrew Harrison    ------------------------------  % Date: Tue, 27 Apr 2004 14:31:12 +0100 O From: Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 0 Message-ID: <c6lnbj$18s$1@new-usenet.uk.sun.com>   Bob Koehler wrote:j > In article <d7791aa1.0404261431.78826e76@posting.google.com>, bob@instantwhip.com (Bob Ceculski) writes: > > >>that is what I am saying ... HELLO ... A PROPERLY CONFIGURED? >>VMS SYSTEM IS IMMUNE TO ALL VIRUSES, WORMS AND WHAT EVER ELSE > >>YOU CAN THINK OF ... when you find one, please report it to > >>CERT so the count of 13 from the last 10 years can increment >>by one ... >  > F >    A propery configure Windows or UNIX system has the same property.A >    The only problem is it isn't getting any work done since the  >    power is unplugged. >   . And which UNIX would you be refering to Bob ??  ! You still don't seem keen to say.   / Perhaps if you did I could tell you whether the 1 Solaris release you used had the features in that 0 you think are missing or for that matter if they have been added since.   regards  Andrew Harrison    ------------------------------  % Date: Tue, 27 Apr 2004 18:01:44 +0200 * From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... - Message-ID: <c6m05f$1hbd$1@news.cybercity.dk>   H "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message- news:FQYlyvwOI1a+@eisner.encompasserve.org... E > In article <Osbjc.41981$_L6.2559430@attbi_s53>, glen herrmannsfeldt  <gah@ugcs.caltech.edu> writes:K > >>    I don't see how you can make that claim since VMS has been attacked  > >>    by worms.  > >  > > I > > There is a very good reason that VMS is not attacked by worms, and it 0 > > doesn't have at all to do with VMS security. > I >    Why are you going in this direction?  I'm telling you VMS _HAS_ been " >    attacked by at leat one worm.  H I know.  It was 14-15 years ago.  It was on DECNET, a networking packageK that is rarely used on open networks today.  Security on the Internet was a L completely different ballgame in those days.  WANK is not relevant to todays	 problems.   I > > I believe that Windows and Solaris are still the popular web servers, G > > and so are favorites for worm attacks.   The statistics are against G > > almost every other OS.  Unless VMS becomes popular as a web server, 4 > > there isn't much reason for worm writers to try. > J >    This BS is kicked around often enough.  Sure popularity has somethingI >    to do with what gets attacked.  But it is not the whole story.  When G >    VMS was what Everybody did, it was secure.  And popularity doesn't / >    change design or implementation decisions.  > E Your answer is in some way contradicting because VMS was successfully J attacked by the WANK worm back in the days where it was popular.  However,K the environment was not nearly as hostile in the days when VMS was popular. L People did not have there own home-PCs.  The number of people with access to0 the Internet was a fraction of what it is today.   Karsten Nyblad ibpit1202 at sneakemail dot com    ------------------------------  % Date: Tue, 27 Apr 2004 17:47:12 +0200 * From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... - Message-ID: <c6lva6$1f93$1@news.cybercity.dk>   5 "Bob Ceculski" <bob@instantwhip.com> wrote in message 7 news:d7791aa1.0404270437.5bff64fd@posting.google.com... C > you can't even get the virus on the system because you can't send > > viruses thru vms mail ... the only way to get on is with theA > assistance of an inside person with priviledges to either do it # > for you or give you his login ...   L You do not need privileges for infecting your own programs.  You do not needK privileges for infecting you own DCL files.  It is downright wrong that you J need privileges to get infected.  It is common to use each others programsJ and DCL command language procedures.  Thus if a person gets his/hers filesK infected, then it is likely that other users will get infected too.  And it F is so on other general purpose operating systems too, perhaps with the exception of Windows...c   Karsten Nyblad ibpit1202 at sneakemail dot com    ------------------------------  % Date: Tue, 27 Apr 2004 18:06:52 +0200 * From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...o- Message-ID: <c6m0f1$1hti$1@news.cybercity.dk>   H "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message- news:eY3yfl+SGUCY@eisner.encompasserve.org... ? > In article <c6keum$85s$1@news.cybercity.dk>, "Karsten Nyblad"o <nospam@nospam.com> writes:i > K > > The reason why VMS is not attacked by EXE files being finessed onto it,m isK > > that there is no place where VMS users trade illegally copied programs.  >eB >    Illegal is not required for a security attach.  Whithout that; >    modifier the above statement would be blatently false.. > J Of course not, but I do think it is common knowledge that illegally copiedI Windows programs are much more likely to be infected than legal copies ofnH free and unfree Windows software.  E.g., one article I read claimed that? half the software being available on P2P networks was infected.m   Karsten Nyblad ibpit1202 at sneakemail dot comn   ------------------------------  % Date: Tue, 27 Apr 2004 18:11:42 +0200a* From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...e- Message-ID: <c6m0o6$1imq$1@news.cybercity.dk>M  H "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message- news:d5+NW63pBkRe@eisner.encompasserve.org... @ > In article <c6k8ep$2qmt$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes:U > >dC > > In my view a virus always use social engineering to get throughf >aI >    Nope.  Far too many security holes in Windows and UNIX have requirede( >    no actions on the part of any user. > L I do not call that virus attack.  A virus is in my view a piece of code thatI attaches itself to useful programs and get into the system being attackedeJ together with the useful program.  I would call what you are talking about worms.   Karsten Nyblad ibpit1202 at sneakemail dot com5   ------------------------------  + Date: Tue, 27 Apr 2004 16:39:07 +0000 (UTC)a From: david20@alpha2.mdx.ac.ukG Subject: Re: How to turn linux into VMS - memory refresher for Dave ... ) Message-ID: <c6m2bb$nip$1@news.mdx.ac.uk>s  Z In article <c6k8ep$2qmt$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes: >bI >"Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message . >news:VBWe7VI7LyZs@eisner.encompasserve.org...@ >> In article <c6j6nk$8sc$1@news.cybercity.dk>, "Karsten Nyblad" ><nospam@nospam.com> writes: >>: >> > Thus VMS is as easy to attack with viruses and Trojan1 >> > horses as any other general purpose systems.o >>B >>    I have to disagree with you on that.  Since no virus for VMSF >>    has ever been released to the wild, you'ld first have to find or? >>    create one, then find a security hole to poke it through.a >cK >In my view a virus always use social engineering to get through, i.e., getsK >some poor bastard to execute the code.  On Windows that would typically begM >the victim receiving a word document with a macro, and when the victim opens J >the documents, the macro copies itself to other documents.  Or the victim2 >downloads an illegal, infected copy of a program. >tF >>    On Windows security experts claim there are 120000 or more knownI >>    virus, of which most virus scanners protect against 50000 to 75000.l >>G >>    It should be much easier to just go out and find one of the 45000tI >>    or more unblocked viruses for Windows than to write one of your own  >>    for VMS. >sK >Do you realize how easy it is to write a virus in DCL?  Any DCL programmernJ >should be capable of doing that in an afternoon.  Hint: write a loop thatJ >searches for .com files.  Check if the files found are infected.  If not, >copy the virus. >bO Firstly you would need to find someway to get the DCL script into a VMS user's sB account and secondly you must then arrange for the DCL to be run. N Thirdly unless the account this is running from has privileges or the DCL has K found someway of illicitly obtaining privileges through a bug it will only .A infect other files owned by that user. It will not spread betweendH different users on the same computer system let alone between different $ computer systems across the network.N In biological terms this would be equivalent to something which obtained entryM to a cell and infected all parts of that cell but was not then able to spread " to other cells or to anybody else. Not much of a virus.  O With a bit of social engineering thrown in this might qualify as a trojan since K you would need to convince someone to run a script which then did somethingo4 which (presumably) the user did not expect it to do.       From the PDF at sophos  : http://www.sophos.com/sophos/docs/eng/comviru/viru_ben.pdf   "i What is a virus?  K A computer virus is a computer program that can spread across computers and J networks by making copies of itself, usually without the user's knowledge. "    "a
 Trojan horseso  I trojan horses are programs that do things that are not described in theire specifications.a "0   "0 Worms4  L Worms are similar to viruses but do not need a carrier (like a Macro or bootN sector). Worms simply create exact copies of themselves and use communicationsK between computers to spread. Many viruses, such as Kakworm (VBS/Kakworm) orbN LoveBug (VBS/Lovelet-A), behave like worms and use email to forward themselves to other users."  o
 David Webb VMS and Unix team leader CCSS Middlesex University       >Karsten Nybladt  >ibpit1202 at sneakemail dot com >c >e   ------------------------------  % Date: Tue, 27 Apr 2004 19:22:05 +0200n* From: Paul Sture <nospam@sture.homeip.net>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 9 Message-ID: <c6m4rv$dbu8q$1@ID-132135.news.uni-berlin.de>s   Karsten Nyblad wrote:r7 > "Bob Ceculski" <bob@instantwhip.com> wrote in messageh9 > news:d7791aa1.0404270437.5bff64fd@posting.google.com...e > C >>you can't even get the virus on the system because you can't send > >>viruses thru vms mail ... the only way to get on is with theA >>assistance of an inside person with priviledges to either do itp# >>for you or give you his login ...R >  > N > You do not need privileges for infecting your own programs.  You do not needM > privileges for infecting you own DCL files.  It is downright wrong that youmL > need privileges to get infected.  It is common to use each others programsL > and DCL command language procedures.  Thus if a person gets his/hers filesM > infected, then it is likely that other users will get infected too.  And itaH > is so on other general purpose operating systems too, perhaps with the > exception of Windows...n >   I You are forgetting one important thing here. VMS provides the ability to lC set copious security alarms. When used properly, you get immediate lI notification that your system is under attack, and you have a good audit :+ trail to see what happened after the event.r   ------------------------------  + Date: Tue, 27 Apr 2004 16:55:25 +0000 (UTC)6 From: david20@alpha2.mdx.ac.ukG Subject: Re: How to turn linux into VMS - memory refresher for Dave ...e) Message-ID: <c6m39t$nip$3@news.mdx.ac.uk>a  Y In article <c6kcfb$39b$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes:t > 6 >"Bob Ceculski" <bob@instantwhip.com> wrote in message8 >news:d7791aa1.0404261431.78826e76@posting.google.com...I >> koehler@eisner.nospam.encompasserve.org (Bob Koehler) wrote in messagea0 >news:<qnojCc7SHcLR@eisner.encompasserve.org>...A >> > In article <d7791aa1.0404221456.bac7f8b@posting.google.com>,b+ >bob@instantwhip.com (Bob Ceculski) writes:  >> > >> > > VMS CAN'T GET A VIRUS!s >> >L >> >    Sorry, but that's just not true.  You probably won't find a nice bigH >> >    security hole to pass your virus through, but you can write one. >> >F >> >    And  I'm sure somewhere, someone, has placed a VMS system on a >networkJ >> >    with a major configuration error that would provide that big hole. >> >' >> >    VMS just doesn't ship that way.1 >>? >> that is what I am saying ... HELLO ... A PROPERLY CONFIGUREDt@ >> VMS SYSTEM IS IMMUNE TO ALL VIRUSES, WORMS AND WHAT EVER ELSE> >> YOU CAN THINK OF ... when you find one, please report it to? >> CERT so the count of 13 from the last 10 years can incrementn
 >> by one ...o >wL >Bob, You have a wrong conception of what a virus is.  A virus is a piece ofJ >code that attaches itself to command language files or program files (DCLK >files or image files on VMS.)  The code of the virus will be executed when M >the command language file or the image file is executed.  The virus contains-L >code to copy itself to other command languages or program files.  The virusM >infects new systems by fooling somebody into copying an infected file to theeM >system and the execute the file.  VMS has no mechanism for protecting itself K >from a user copying an infected file on to the system and then execute it. I >All you can hope for is that the normal file protection system will savep >you.  >t@ You are the one who has the wrong conception of what a virus is.M If a user has to explicitly execute a program or command script then they areeM running a Trojan. If the code executes automatically in order to spread when rL the file is opened then it is a virus. If the code executes automatically in< order to spread without user intervention then it is a worm.  
 David Webb VMS and Unix team leader CCSS Middlesex University       >Karsten Nybladc  >ibpit1202 at sneakemail dot com >C >e   ------------------------------  + Date: Tue, 27 Apr 2004 16:45:15 +0000 (UTC)t From: david20@alpha2.mdx.ac.ukG Subject: Re: How to turn linux into VMS - memory refresher for Dave ...a) Message-ID: <c6m2mr$nip$2@news.mdx.ac.uk>F  Y In article <c6kbe9$1cr$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes:m >s6 >"Bob Ceculski" <bob@instantwhip.com> wrote in message8 >news:d7791aa1.0404261424.24cc3466@posting.google.com...8 >> "Karsten Nyblad" <nospam@nospam.com> wrote in message) >news:<c6a5sa$g9m$1@news.cybercity.dk>... : >> > "Bob Ceculski" <bob@instantwhip.com> wrote in message; >> > news:d7791aa1.0404221456.bac7f8b@posting.google.com...y. >> > > because VMS CAN'T GET A VIRUS!  Capice? >> >M >>> [Description by me (Karsten Nyblad) on how easi it is to write code filesa# >on VMS removed to shoten posting.]t? >> and I can do the same ... only one little thing ... you needT@ >> the privlidges to run it ... good luck on your virus writing,0 >> and let us know when you come up with one ... >wE >????  I do not understand.  A virus attacks by getting the victim to.G >unknowingly execute it, e.g., you receive a Word document with a macrotI >virus, and because you do not realize that the document is infected, you I >open it, which makes Word execute the virus.  On VMS (or other OSes) theoJ >virus writer does not need any privileges for a virus attack.  He needs aL >way of fooling victims into executing an already infected DCL file or imageI >file.  If the victim has privileges, e.g., BYPASS, then the virus can betL >made more contagious because then the virus can infect not only the victimsB >files but also the operating system's files and other user files. >.   NO. H A Macro virus works by someone opening an otherwise innocuous data file.2 A DCL script needs to be executed not just opened.J Tricking someone into running a DCL script without their realising what it< would do might qualify as planting a Trojan but not a Virus.  
 David Webb VMS and Unix team leader CCSS Middlesex University       >Karsten Nyblady  >ibpit1202 at sneakemail dot com >e >    ------------------------------  # Date: Tue, 27 Apr 2004 13:11:39 GMTe From: "Alpha" <nospam_@shaw.ca> / Subject: Is it possible to choose a better way?n- Message-ID: <f_sjc.266344$Pk3.24702@pd7tw1no>l  L    With spring in full swing, summer approaching, and the end of school justH round the corner, many people will be looking forward to a summer of low, wage work in the primary service industries.B Although there might not be anything wrong with simple honest workE Ask yourself if you would prefer smarter work, that produces more, orw= simpler work, that produces less? Although the answer to this 2 question may seem clear what is not so apparent is/ a way you could actually produce more, and withl: greater success, than the way you are currently following.J Although all paths lead somewhere they do not all lead to the right place.= If youre tired of where yours is taking you, give ours a tryr> We give you ten alternatives over the path of marginal utility2 Ten individual ways we believe to be more sociallyO responsible, productive, and efficient, than what you might choose this summer.oK If youre on the path offering little reward, give ours a try, we guaranteea/ youll be the better for it, or your money backt   All were offering is a choice. Make the right choice, and free yourself today  2 To receive fast confidential delivery send 10* to:   DELTAR BOX 8176 Victoria  BC  V8W 3R8D CANADA  - To assure a prompt and safe delivery, please:1I 1. Fold payment* inside a piece of scrap paper before placing in envelope J 2. Clearly write your name and mailing address on the back of the envelope9 3. Clearly write our address on the front of the envelopecP 4. Affix sufficient postage** (return shipping is included for all destinations)  K *We accept payment in Euros, British, Canadian, and American paper currencyaP   -other regions may send international money orders payable in any of the above
    currencies   A **For the USA, including Hawaii and Alaska, the UK, most parts of Q Western Europe, and Australia, three standard stamps ,or one international stamp,p will supply ample postage A -orders originating from other regions may need additional stampsnB -if in doubt add an extra stamp, or check with your postal service      8 Please allow 1-2 weeks for delivery within North America" Other destinations may take longer              R Delta, its employees, representatives, and agents, will not be held liable for any) improper, or illegal use of our products. P By ordering our products you agree that you will use them in a spirit they where designed to be used in.IT This may include legal responsibilities your country imposes, or other restrictions.J It is up to you to inform yourself of, and ensure compliance to, any legalR restrictions your country imposes. These rules, and other rules, are included withV all of our products. You must agree to these rules before you use any of our products.9 Any purpose for our products, other than for information,h- is the sole responsibility of the individual./   ------------------------------    Date: 27 Apr 2004 07:41:06 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler)aN Subject: Re: Not available on OpenVMS, but it may just be the 'next big thing'3 Message-ID: <2y83Gfcxgtyk@eisner.encompasserve.org>   R In article <yMednYhM7aRk0hDdRVn-ug@igs.net>, "John Smith" <a@nonymous.com> writes: > http://www.eclipse.org/o > # > My gut tells me this will be big.-  F    My gut tells me this is just another IDE.  Why would it be big whenB    we already have Netbeans as a portable IDE and a lot of vendors0    only ship their compilers with thier own IDE?   ------------------------------  + Date: Tue, 27 Apr 2004 07:13:12 +0000 (UTC)bP From: helbig@astro.multiCLOTHESvax.de (Phillip Helbig---remove CLOTHES to reply)/ Subject: Re: OpenVMS newbie  - AlphaStation 233 $ Message-ID: <c6l168$f3s$1@online.de>  C In article <408d5aaa$0$562$e4fe514c@news.xs4all.nl>, "Berdt van dere) Lingen" <berdt@n0spam-xs4all.nl> writes: r  C > I think I'll buy a Fujitsu 36,7GB 15.000rpm (MAM3367) to increase  > performance even more.  E Are you sure it will work with VMS?  I have tried various third-partyeF SCSI disks with VMS and found that some work and some don't, though toF be fair most did (but then again I wouldn't have the disk at all if itH were likely that it wouldn't work).  By the way, just because a DEC diskD is "just a rebadged version of a third-party" disk doesn't mean thatH another instance of this third-party disk will work, since sometimes the firmware is changed etc.     ------------------------------    Date: 27 Apr 2004 04:48:57 -0700% From: Bart.Zorn@xs4all.nl (Bart Zorn)@/ Subject: Re: OpenVMS newbie  - AlphaStation 233o= Message-ID: <a98cd882.0404270348.75d4698d@posting.google.com>n  B I sincerely doubt that your Alphastation has anything but a SCSI-2< interface and I also doubt that a 36 GB 15K disk has such anF interface. It will at least have a Fast Wide interface and possibly anF UltraSCSI interface. In both cases you might get it to work, but firstF you will need some cable adapters and next you will find that the diskD seems not that fast, because the SCSI-2 controller limits the speed.   Regards,  	 Bart Zornh  q "Berdt van der Lingen" <berdt@n0spam-xs4all.nl> wrote in message news:<408d5aaa$0$562$e4fe514c@news.xs4all.nl>...hN > > > I'm a OpenVMS beginner and I want to learn the OpenVMS operating system.N > > > Is a AlphaStation 233 with 64 mb ram and a 2 gb SCSI disk suitable for a
 > > > newbie?o > > > Should I buy more ram? > >>H > >    I would buy more RAM, but what you have will work if you can deal# > >    with the performance impact.> > F > Thanks for your answers and suggestions. I'll upgrade the ram of the/ > machines (I have two identical Alphastations) C > I think I'll buy a Fujitsu 36,7GB 15.000rpm (MAM3367) to increasef > performance even more.I > This disk is available for about 200 Euro's in the Netherlands, so thisc  > seems to be a good investment. > 
 > regards, >  > BvdL   ------------------------------    Date: 27 Apr 2004 07:55:22 -0700% From: Bart.Zorn@xs4all.nl (Bart Zorn)t/ Subject: Re: OpenVMS newbie  - AlphaStation 233 = Message-ID: <a98cd882.0404270655.29975902@posting.google.com>   F Apart from firmware issues as Phillip notes, you will most likely haveC cabling problems as the Fujitsu will most likely have a 68 pin higha> density connector and the controller in the Alpha a 50 pin lowC density. And, IF you get the disk working this way, the performance ? might be disappointing, because the controller just does not gon faster.   	 Bart Zorna  | helbig@astro.multiCLOTHESvax.de (Phillip Helbig---remove CLOTHES to reply) wrote in message news:<c6l168$f3s$1@online.de>...E > In article <408d5aaa$0$562$e4fe514c@news.xs4all.nl>, "Berdt van deru+ > Lingen" <berdt@n0spam-xs4all.nl> writes:   > E > > I think I'll buy a Fujitsu 36,7GB 15.000rpm (MAM3367) to increase  > > performance even more. > G > Are you sure it will work with VMS?  I have tried various third-partyoH > SCSI disks with VMS and found that some work and some don't, though toH > be fair most did (but then again I wouldn't have the disk at all if itJ > were likely that it wouldn't work).  By the way, just because a DEC diskF > is "just a rebadged version of a third-party" disk doesn't mean thatJ > another instance of this third-party disk will work, since sometimes the > firmware is changed etc.   ------------------------------    Date: 27 Apr 2004 09:23:15 -0700 From: 2@r67.net (Ravi V Prasad)o Subject: Re: OT: Scalability= Message-ID: <db7299d4.0404270823.6aa0addf@posting.google.com>h  a JF Mezei <jfmezei.spamnot@teksavvy.com> wrote in message news:<408568AB.E75D7CE7@teksavvy.com>...  > Fabio Cardoso wrote:H > > This electronic voting systems is working for a long time in Brazil.= > > I think the Indian system is a "clone" of teh brazilian !o- > > Look at the machine ... simple hardware !  > > > > > http://www.tre-mg.gov.br/urna_eletronica/imagens/foto4.jpg > O > The Indian one seems even simpler. It is like a notepad format, with a row of O > buttons on the right and text on the left, You press the button correspondingeM > to the person you want to vote for. And it goes a big "beep" when you pressg6 > the button. (That is all I saw from the BBC report). > H > It would be interesting to find out more about the logistics needed to3 > tabulate the votes from these 1 million machines.o      D My article in Hindustan Times on flaws in Electronic Voting Machines  > Published in Hindustan Times, edit page, Monday, 26 April 2004  ? &#8220;Ghosts in the Machine&#8221; by Ravi Visvesvaraya Prasade  : http://www.hindustantimes.com/news/181_710775,00120001.htm  ) Copyright: 2004, Ravi Visvesvaraya Prasadd  A International Publishing rights in all media with Hindustan Timesy  F Reproduction strictly prohibited without prior written consent of both the author and Hindustan Times    > Published in Hindustan Times, edit page, Monday, 26 April 2004  ? &#8220;Ghosts in the Machine&#8221; by Ravi Visvesvaraya Prasad   : http://www.hindustantimes.com/news/181_710775,00120001.htm    = In his article, &#8220;Press to Play&#8221; (Hindustan Times,  Saturday, 17 AprilB 2004), Kanishka Singh described the various ploys used by polling D officials to have votes cast in favour of their preferred candidates by? an electorate unfamiliar with electronic voting machines. Singh  stated:0C &#8220;The problems experienced with EVMs in the December electionsK
 were many.F  None of them, however, are problems that can't be solved.&#8221; But, in fact,F  there are serious problems with EVMs which cannot be easily resolved,C more fundamental than the psychological stratagems used by polling  < officials to influence a technically illiterate electorate.   F The reliability of the electronic voting machines manufactured by the D public sector Bharat Electronics Limited and Electronics Corporation ofE India Limited is doubtful. The software and circuits embedded in the BC EVMs could very well contain numerous flaws or deliberate backdoorsh forr tampering. e  A A maxim of software and microelectronics engineering is that all t? software and electronic and electromechanical systems are to be$ regardedD  as error-prone unless rigorous testing proves them to be reliable. B Significantly, neither BEL nor ECIL have disclosed details of the D electronic hardware and software used in their EVMs for scrutiny by  neutral experts. e  F After the US election fiasco in 2000, USA passed the Help America VoteE Act, which encouraged the use of electronic voting machines. Several k> companies, mainly Diebold Election Systems, Election Systems &	 Software,iD  Hart InterCivic, Sequoia Voting Systems, Advanced Voting Solutions, andu>  Unilect, manufactured EVMs which were used in local and state	 elections 	  in USA. e  C Prominent technologists, mainly Peter Neumann of Stanford Research D@ Institute, David Dill of Stanford University, Avi Rubin of Johns HopkinsaF  University, Rebecca Mercuri of Harvard University's Kennedy School ofF Government, and Erik Nilsson of the Computer Professionals for Social E Responsibility, launched public campaigns questioning the reliabilityp ofF  EVMs manufactured by these companies. They proved that all these EVMsC had serious flaws and could be used to rig elections without being g
 detected.   C In an election in Dallas, EVMs made by Election Systems & Software  D failed to count 44,000 votes. In a local election in Iowa, EVMs made byE Election Systems & Software produced a count of 4 million votes in a nB polling booth of 300 people. In Indiana, an EVM recorded more than 144,000i$  votes for an electorate of 19,000.   F Diebold&#8217;s EVMs turned out to be a major scandal with allegations ofC bribery. Diebold sold its EVMs to state and local governments even oD though it knew that there was no security on its tabulation software toA prevent someone from changing votes and erasing any trace of the m? activity in the audit log. Anyone with access to the tabulationo programeB during an election -- Diebold&#8217;s employees, election staff or evenF hackers -- could change votes and alter the log to erase all evidence.  D Requests to the Election Commission, BEL and ECIL to provide details of@ the reliability of their EVMs brought forth the following bland 
 assertion:   &#8220;Tamper proof design  > The EVM is designed to be totally tamper proof. Each EVM comes@ with a sophisticated programme in assembly language : a software9 fully sealed against outside influence. And the programme > is itself fused on to a customised micro processor chip at the= manufacturer's end. This ensures that the program is rendered & tamper proof and inaccessible.&#8221;   ( (end of quote from Election Commission)   @ The Election Commission, BEL and ECIL did not provide any of the circuito5  schematics, source code, or test vectors asked for. -  B The EVMs manufactured by BEL and ECIL could very well contain the A following flaws, which would be practically undetectable without i extensive testing by experts:D  3 * Faulty logic, incorrect algorithms and data flowse   * Errors in circuit design  D * Errors in the software code, especially in the embedded software. E Programming in Assembly language is notoriously error prone, even by O	 experts.    . * Errors, or malicious backdoors, in databases  3 * Malicious trapdoors in the code to enable rigging     D Reliance should not be placed on the demonstrations provided by ECIL ande>  BEL. Even without deliberate tampering, embedded software and	 real-time =  control software can behave very weirdly when they encounterk
 situationsF  that their programmers had not envisaged might occur. Any experiencedE engineer would tell you that electronic equipment containing firmwarec orC  embedded software frequently behaves one way during a short trial,x and 0 totally differently in actual field conditions.   @ For instance, I can write a software module which would pass all trialsF but manipulate the results of actual voting. I could programme the EVMB to accurately record votes for three hours. I could instruct it to thenD assign 70 % of all subsequent votes cast to whichever candidate was F leading at the end of the first three hours, irrespective of whichever8 buttons the later voters actually push. Since trials and demonstrationsB would reasonably be expected to last less than three hours, my EVM wouldsA  successfully pass all such tests. I could then have my favoured oC candidate get all his supporters to cast their votes first thing ind thelF morning, so that he would be the leader after three hours of polling. A This was alleged to have been done in a local election in USA but  coulde; not be proved since the audit trails had also been erased. p  > Or I could program the EVM so that at the end of five hours of polling,F it would transfer 60% of the votes of the ten lowest candidates to my A favoured candidate. Or I could program it so that it would, say, e8 transfer every fourth vote for the Congress to the BJP.   @ Or I could manipulate the back-end databases during the counting process,>  as was done in the Diebold cases where it was proved that any electionA could be rigged, totally without detection, by tampering with the  back-end&  databases after the votes were cast.   C Moreover, the EVMs could be broken into remotely after the election  but-< before the counting. All electronic circuits are subject to E electromagnetic interference. Even when the EVMs are kept physically nE sealed in a strong room, an expert who knows the resonant frequenciese ofC  the circuits could remotely send signals to the EVMs from several oD kilometres away. It is highly unlikely that polling officials would 7 continuously transport and store each and every EVM in r, electromagnetically shielded Faraday cages.   E It is also not know what vibrations and physical shocks the EVMs can oF withstand. After the voting, when the EVMs are being transported over @ bumpy rural roads, the electromechanical components (especially A registers and switches), relays, and physical connectors could be  reseta due to the jerks.   F The Election Commission should pay heed to the warnings issued by the E dozens of distinguished technologists who formed the Verified Voting i3 Foundation in USA (http://www.verifiedvoting.org): f  = &#8220;Computerized voting equipment is inherently subject tod programming D error, equipment malfunction, and malicious tampering. All computer D systems are subject to subtle errors. Moreover, computer systems can beF deliberately corrupted at any stage of their design, manufacture, and F use. The methods used to do this can be extremely difficult to foresee and detect.. ...oB Unfortunately, there is insufficient awareness that these machines poseD an unacceptable risk that errors or deliberate election-rigging will goE undetected, since they do not provide a way for the voters to verify MF independently that the machine correctly records and counts the votes F they have cast. Moreover, if problems are detected after an election, F there is no way to determine the correct outcome of the election short of a revote. ...N7 It is therefore crucial that voting equipment provide as voter-verifiableC  audit trail, by which we mean a permanent record of each vote thatN canuF be checked for accuracy by the voter before the vote is submitted, and> is difficult or impossible to alter after it has been checked. ...sF Without a voter-verifiable audit trail, it is not practical to provideE reasonable assurance of the integrity of these voting systems by any -D combination of design review, inspection, testing, logical analysis, orE control of the system development process. For example, a programmer  C working for the machine vendor could modify the machine software to.
 mis-recordD  a few votes for party A as votes for party B, and this change could be> triggered only during the actual election, not during testing. ...s> Most importantly, there is no reliable way to detect errors in	 recordingdF  votes or deliberate election rigging with these machines. Hence, the C results of any election conducted using these machines are open to  
 question.  ...V@ At this time, the only tried-and-true technology for providing a voter-verifiedF  audit trail is a paper ballot, where the votes recorded can be easily read and checked.&#8221;  & (end of quote from VerifiedVoting.org)  $ (Resume Ravi V Prasad&#8217;s views)   Based on the three criteria of:e  4 (a) Lack of a verifiable paper / manual audit trail   C (b) BEL and ECIL not having provided the algorithms, source codes, tD embedded firmware, integrated circuit schematics, board designs and ; electronic component specifications, to neutral experts forr independentT assessments   D (c) Meagre evidence in actual field conditions, as opposed to short ' demonstrations in laboratory conditionso  F it cannot be unequivocally asserted that the EVMs made by BEL and ECIL are accurate and reliable. i  C Thousands of hours of testing needs to be done, under actual field  E conditions, before their reliability can be proven beyond reasonable   doubt.    C The Institute of Electrical and Electronics Engineers is currently  @ formulating standards that EVMs should satisfy. The Open Voting F Consortium, an international group of researchers, has spent over fourF years developing open-source voting systems. They intend to give away  their technology for free. o  F The switch from manual voting to EVMs might turn out to be exchanging F the known flaws of booth capturing, ballot stuffing, multiple voting, ) etc. for as yet unknown vulnerabilities.     by Ravi Visvesvaraya Prasad   C The author is a technologist in electronics, information technologyl andi	 telecom. e  ? &#8220;Ghosts in the Machine&#8221; by Ravi Visvesvaraya Prasadc  : http://www.hindustantimes.com/news/181_710775,00120001.htm   ===============.   Ravi Visvesvaraya Prasad$ 19 Maitri Apts, CIS Off Society # 19 A - 3, Paschim Vihar New Delhi 110 063s  . CellPhone: 98 117 56789	Fax: (011) 25 26 68 68 2@r67.net		2@50g.com		rp@k.ste     Ravi Visvesvaraya Prasad  CellPhone: {91} (0) 98 117 56789  > Industrial & Management Consultants in Information Technology, Telecom,6 Software, Electronics, Power & Electricity, Metallurgy      rvp@r67.net	rvp@50g.com 	rp@k.st  3 Faxes: {91} [11] 25 26 68 68, {91} [11] 25 27 63 86i    D My article in Hindustan Times on flaws in Electronic Voting Machines  > Published in Hindustan Times, edit page, Monday, 26 April 2004  ? &#8220;Ghosts in the Machine&#8221; by Ravi Visvesvaraya Prasadg  ) Copyright: 2004, Ravi Visvesvaraya Prasad   A International Publishing rights in all media with Hindustan Timese  F Reproduction strictly prohibited without prior written consent of both the author and Hindustan Times  : http://www.hindustantimes.com/news/181_710775,00120001.htm   ------------------------------    Date: 27 Apr 2004 06:35:30 -0700) From: info@sanface.com (SANFACE Software)l Subject: PLUG: txt2pdf 7.3= Message-ID: <bc34cdbe.0404270535.31dad9db@posting.google.com>e  / We would like to announce txt2pdf 7.3 version. .# http://www.sanface.com/txt2pdf.htmlmE txt2pdf is shareware; it is a very flexible and powerful Perl5 script B that converts text files to PDF format files, so you can use it in> every operating systems supported by Perl5, including OpenVMS.( Remember to read "txt2pdf on OpenVMS" at# http://www.sanface.com/openvms.htmln; It's simple to design background like invoices, orders etc.n) Here nice examples made using txt2pdf PROi- http://www.sanface.com/pdf/Purchase_Order.pdf ) http://www.sanface.com/pdf/oldinvoice.pdff$ http://www.sanface.com/pdf/hfmus.pdf) http://www.sanface.com/pdf/heraldbill.pdfe@ If you prefer we also distribute executables for Windows, Linux,@ Solaris, AIX, HP-UX, and Mac OS X. Inside the Windows version is Visual txt2pdf, a VB GUI.:   What's new in this version  E If inside a line of your textual report txt2pdf will find the specialoF underline mark (the mark you have specified with underline option) the= rest of the line will be write at the begin of the same line.r   Test txt2pdf 7.3!d6 You can find it at http://www.sanface.com/txt2pdf.html   ------------------------------    Date: 27 Apr 2004 02:09:32 -0700* From: b.seghers@europe.com (Seghers Bruno) Subject: SSH in a DCL script= Message-ID: <1fe424ce.0404270109.67434135@posting.google.com>n   Hi,d  ' I trying to do something very simple : e  C I have a Client SSH and a Server (2 VMS 7.3-2 with TCPIP 5.4 boxes)   ? Public-key authentication with SSH Agent started on the client.d  @ Interactively on the Client : $  SSH  'servernode' SH SYS/NOPROC
 It works finel  G When I try to do the same command but in a DCL script, it doesn't work.m  4 Here the output with -d10 option for the SSH command   CLIENT/SEGH> @tmp:tmp % debug: connecting to srv1, port 22...a debug: entering event loop@ debug: SshEventLoop/SSHUNIXELOOP.C:699: Starting the event loop.3 debug: ssh_client_wrap: creating transport protocolmE debug: Ssh2Transport/TRCOMMON.C:1671: Setting new keys and algorithmsbE debug: Ssh2Transport/TRCOMMON.C:1671: Setting new keys and algorithmss< debug: Ssh2Transport/TRCOMMON.C:3126: ssh_tr_up_set_callbackL debug: SshAuthMethodClient/SSHAUTHMETHODC.C:125: Added method "publickey" to ca.eK debug: SshAuthMethodClient/SSHAUTHMETHODC.C:125: Added method "password" toe can.L debug: SshAuthMethodClient/SSHAUTHMETHODC.C:145: Added "publickey" to usable me. K debug: SshAuthMethodClient/SSHAUTHMETHODC.C:145: Added "password" to usablet met.> debug: Ssh2Client/SSHCLIENT.C:1356: creating userauth protocol; debug: Ssh2AuthClient/SSHAUTHC.C:1397: 2 supported methods:e 'publickey,password'< debug: Ssh2Transport/TRCOMMON.C:3126: ssh_tr_up_set_callback< debug: Ssh2Transport/TRCOMMON.C:3126: ssh_tr_up_set_callback< debug: Ssh2Common/SSHCOMMON.C:466: creating SshCommon objectC debug: Ssh2Common/SSHCOMMON.C:517: local ip = 1.1.1.1, local port =s 49679eE debug: Ssh2Common/SSHCOMMON.C:519: remote ip = 1.1.1.2, remote port =  22J debug: Ssh2Common/SSHCOMMON.C:522: initializing channel types and requests@ debug: Ssh2Common/SSHCOMMON.C:400: remote hostname is "1.1.1.2".? debug: Ssh2Common/SSHCOMMON.C:416: creating connection protocolc0 debug: SshConnection/SSHCONN.C:2092: Wrapping...> debug: Ssh2Common/SSHCOMMON.C:425: connection protocol created3 FATAL: ssh_io_register_fd: fd 3 already registered!p  6 %TCPIP-F-SSH_FATAL, non-specific fatal error condition      Thanks for help  
 Seghers Bruno  Belgium    ------------------------------  % Date: Tue, 27 Apr 2004 04:11:07 -0400t- From: JF Mezei <jfmezei.spamnot@teksavvy.com> 2 Subject: TCPIP Services: SMTP receiver suggestions, Message-ID: <408E1564.8C6CD082@teksavvy.com>  J Have been going through the paces to solidify my smtp receiver since it isM about to get more exposure to the net and bring the following comments: (Thiso# is based on VAX TCPIP Services 5.3)      1-Handling of RBLs  L Right now, it seems that VMS will immediatly issue a 550 message when the IP5 address of the remote SMTP server is on a black list.i  J Suggestion: capture the HELO, MAIL FROM and all RCPT TO: (with fake 200 OKN messages) and only at start the DATA phase, do you issue the nasty message and close connection..  H Rationale: allows investigation if a user complains he hasn't received aN message. We can then look at logs to see that a message from X to the user wasK rejected due to reason Y. Can also scan thorugh the logs to see how well anP RBL is working.t  L Right now, nothing meaningful is logged. The ccounting log contains only the& ip address of the sending SMTP server.   2- Response textsr  M For many of the possible message rejection, having a variable inserted the in'J response text would be very useful. For instance, if you have 3 RBLs beingL consulted to filter messages, and a message is blocked on the second filter,C it would be nice if the message could contain a pointer to that RBLo  D (eg: 550 Message rejected: 38.45.28.21 is listed on www.spamhaus.org  8 so, in the smtp.config file , perhaps something such as:  F Client-In-RBL-text-sbl-spamhaus.org  %IP is listed on www.spamhaus.org  M Similarly, when an IP address is unbacktranslatable, being able to insert then IP address would also help.d  L Rationale: there are legitimate users whose ISP may have an SMTP server on aJ blacklist and the user is prevented form sending legitimate emails to yourN system. The messages currently issued give that user no information/ammunitionK to bring to their ISP to resolve the problem. But improving the messages as3M above, it gives legitimate senders the ability to work on their end of thingsw to resolve the issue.g    3- Postmaster for inbound emails  L The reveiver should be configurable to allow *ALL* emails to be delivered toG postmaster (no spam filtering). Again, the rationale is that if one hasiN legitimate issues with their mail being blocked, having one email address thatE still works would greatly help things. (of course, that may mean thatg% "postmaster" would get tons of spam).u      
 4- Logging  G The receiver definitely needs improved logging. Sending very incomplete L messages to the acocunting file is rather useless (how does one get a proper list of those messages ?)pM ACCOUNT/TYPE=USER doesn't show the actuall messages, and if you use /FULL, it " is disoplayed in a dump fashion.).  N Ideally, there should be a single log file that one could run a script againstH to produce a daily spam blocking report. (and as a result, would be mostM useful to have the relevant SMTP commands for each message to identify sourced and destination).i  F Because SPAM is not a static technology, one needs the right tools andE information to constantly adapt to new techniques used by spammers to-G penetrate anti-spam filters. Right now, there aren't sufficient bist ofmE information received to see what works and what doesn't work for spame protection.    5- Content filtering  K My old ISP had done a good deed with SWEN: their SMTP server allows for thekI scanning of a string inside the contents. So they added the first line ofiM base64 encoded .exe file for the SWEN virus, and when found, the server wouldo) reject the message after the DATA phase. a  K This allows a very quick implementation on a platform of protection for newsG viri, without needing some vendor to update some VMS specific software..   ------------------------------  # Date: Tue, 27 Apr 2004 14:06:43 GMTN From: Xomicron <xomicron@wp.pl>o4 Subject: Re: The JF MEZEI FAQ - Revised and Updated!+ Message-ID: <TNtjc.2937$5a.1118@okepread03>o  ( Nomen Nescio <nobody@dizum.com> wrote in1 news:6bccd5e273f7dae44471ff4a0087b1ec@dizum.com: l   > FREQUENTLY ASKED QUESTIONS
 >    About
 > JF MEZEI >  > (Rev. Apr. 24, 2004) >  > 1.  Who is JF Mezei? > I > Jean-Francois Mezei is the worst netkook and megatroll to have ever hit.H > rec.travel.air and various other usenet newsgroups.  He is also one of/ > the longest running trolls in usenet history.. > E > ***WARNING:  JF MEZEI IS A ROGUE CANCELLER.  HE FORGES THE NAME ANDhE > E-MAIL ADDRESS OF USENET POSTERS HE DOES NOT AGREE WITH AND CANCELSo > THEIR MESSAGES.***   > G > If you participate in the same newsgroups he does, you should monitoraG > the control.cancel newsgroup.  If you find that he has cancelled youro> > messages, forward a copies of them to abuse@teksavvy.com and > usenet@news.wplus.net .  > $ > 2.  How long has he been trolling? >  > For well over a decade.r >  > 3.  Where does he live?f >  > Montreal, Quebec, Canada >  > Jean-Francois Mezeie > 86 Harwood Gates > Beaconsfield, QC H9W3A3e > (514) 695-8259 > 4 > His current e-mail address is jfmezei@teksavvy.com > , > 4.  What makes him such a malicious troll? > J > His trolling is constant, repetitious, relentless.  Once he invades yourH > newsgroup he will stay for decades, troll around the clock, day in andJ > day out, every day of the year, for years and years on end.  He does notF > listen to pleas to stop, he does not listen to anything anyone tellsJ > him, he does not pay attention when the misinformation/disinformation heF > posts is corrected, he just goes right on trolling year in, year outI > like a little child holding his ears closed while yelling "I can't hear ' > you, I can't hear anything you say!" a >  > 5.  What does he troll about?- > H > His favorite subjects are USA-bashing and anything to do with sex.  HeI > hates the USA and Americans and will hijack any thread and turn it intorG > a USA-bashing fest.  If he can't do that then he'll just start making< > lewd posts.  > & > 6.  What does he hate about the USA? > I > Everything!  He is part of a larger group of Canadian trolls who have a E > visceral hatred of the USA, motivated by envy mostly.  The USA is ayJ > happier, better, more successful version of their country and they can'tH > stand it.  Some of JF's favorite troll bait is "the Bush regime", "theE > Bush-Rumsfeld-Wolfowitz axis of evil", "Americans are brainwashed",uC > "Cars are evil", "SUVs are evil", "all Americans are stupid" etc.s > % > 7.  What about his sexual trolling?  > H > Ah, that is JF at his trolling best.  No sexual topic is too bizarre. @ > Among his favorites are child sexuality, masturbation, women'sC > genitalia, sex toys, circumcision, the sex lives of Americans (of # > course) ... the list is endless. e >  > 8.  Circumcision???  > H > Yes, JF trolled the circumcision newsgroups for years.  He still likes? > to insert circumcision into his trolling every now and then. hE > Apparently, JF was traumatized as a child because his parents, poorrJ > Hungarian immigrants to Canada, left him uncircumcised when he was born,H > as is the custom in most of the world. Growing up in Canada where maleG > infant circumcision was prevalent at the time, he was psychologicallysI > scarred (so he claims).  As soon as he could he arranged to get himselftH > snipped, and then joined the brigades of circumcision proselytizers inH > the newsgroups advocating the joys of a free willy.  His main argumentI > is how much better he was able to masturbate after getting circumcised eH > without that "pesky foreskin" getting in the way of his enjoyment, andG > he has made it his mission in life to spread the circumcision gospel.  > J > 9.  What's his interest in child sexuality?  That sounds kind of freaky. > B > Well, everything having to do with Mezei *is* freaky.  Among theG > subjects dear to his heart are the genitals of little boys and girls,mG > especially little boy's foreskins (and how tight they are) and littlewB > girls' hymens.  He is also a tireless activist and advocate thatJ > children should be taught to masturbate early on so that they don't grow* > up "sexually repressed like Americans".  > G > He also counsels all parents of boys that they constantly check theireE > little boys' penises and foreskins frequently to ensure a good fit, I > proper movement, and that they be able to masturbate with no problems. pJ > Utopia for JF would be a world full of parents manipulating their little > boys' penises.   > J > 10.  Ewww!  This guy is sounding more and more disgusting by the minute!% >  Are you sure about all this stuff?a > F > Yes, you can check the google archives for yourself.  There's over a) > decade full of Mezei trolling in there.r > J > 11.  How can I find all that out, doesn't he change aliases all the time > like all trolls do?e > D > Of course!  See the appendix below for a list of many of his known > trolling aliases.u > I > 12.  So where does this guy get so much time to troll, doesn't he work?n > G > Ha ha ha!  JF hasn't worked a day in his life!  He's an adult baby, aiE > grown man who still lives at home with mommy and sleeps all day andeB > trolls the newsgroups all night.  In his free time when he isn'tH > trolling he likes to ride his bike down to Dorval Airport and race the& > planes down the runway in his bike.  > ; > 13.  That seems strange, is he mentally ill or something?a > J > Bingo!  JF is a boy in a grown man's body.  Psychologically he never gotE > past the age of 13 and got stuck in a world of bathroom humor (i.e.iJ > "pull my finger!") and locker room antics that he has never been able to > outgrow. n > E > 14.  Speaking of locker rooms, I heard he has a sexual fetish aboutr > them, is that true?t > I > Yes!  JF goes to the gym not to work out but to watch men in the locker D > room. He loves to post about the male sexual organs he has seen inF > locker rooms over the years, especially his unnatural obsession withJ > foreskins.  He stalks the men in locker rooms trying to measure how muchJ > foreskin they have, or how little is left if they have been circumcised.> >  He gets extremely excited when he spots a case of phimosis. > I > 15.  Oh my Gawd, this guy is nuts!  He should be locked up in an insane 
 > asylum!  > F > Yep, JF is certifiably insane.  He lives in a black helicopter / tin= > foil hat world where others are out to get him.  The key toeH > understanding JF is that he sees himself as a VICTIM.  To JF the worldF > is out to get him, especially the USA.  Victimhood is what JF is all	 > about. r > F > What seems to have sent him over the edge was when the Canadian railF > system was "killed", in his words.  He used to be a major train nut,J > spotting trains, writing down their numbers and chasing them down at theJ > train yard like a good freak.  Then he turned his attention to aviation.J >  Major events that made him fall head first deep into the abyss were theF > bankruptcy of Canadian Airlines and their subsequent takeover by AirD > Canada (whom he sees as evil).  So paranoid is he that when an AirH > Canada plane crashed he claimed that Air Canada employees went lurkingE > about in the night with buckets of white paint to cover up the Air tG > Canada markings.  He saw that as symbolic of a cover up of the crash  4 > investigation.  He has never recovered from this.  > 8 > 16.  Where else does he hang out, I want to avoid him! > H > His main haunt on usenet is comp.os.vms, a newsgroup dedicated to someG > ancient, arcane, obsolete piece of vax crapware that nobody has takenrJ > seriously for decades.  JF hangs out there with other misfits and socialG > dropouts who share his psychological traumas, crying for the good old$* > vax days of yore.  It's really pathetic! > # > 17.  Where else does he hang out?e > B > can.internet.highspeed, alt.cellular.fido, and a few other geekyF > computer groups.  For a while after the Shuttle Columbia disaster heD > invaded the sci.space groups, sci.space.shuttle in particular, andH > trolled it relentlessly with the anti-American, conspiracy theory crapG > he's so famous for.  But they ran him off that group and he had to gotJ > crawling back to comp.os.vms with his tail between his legs, licking his
 > wounds.  > C > 18.  It sounds like comp.os.vms is the only group he respects ande > doesn't troll. y > H > Pretty much.  For a megatroll like JF it's impossible not to troll, soI > he slips in troll bait every now and then, but by and large he respectssC > comp.os.vms, and, more importantly, he tries to hide his trollingoI > activities from them so they won't find out what a major netkook he is.r > H > 19.  Wow, sounds like he should be exposed so they will know what kind > of psycho he is! > G > Exactly.  Feel free to post all his trolls to comp.os.vms.  And whileeH > you're at it post them to can.internet.highspeed and alt.cellular.fidoA > too.  And to alt.usenet.kooks, a group for the likes of JF, and  > news.admin.net-abuse.usenet. t > 6 > 20.  What else can I do?  Is there an abuse address? > J > Yes, you should send complaints along with copies of his troll posts to: > , > abuse@teksavvy.com , dnsadmin@teksavvy.com > usenet@news.wplus.netn > 9 > You can also call directly, troll free, 1-877-779-1575.  >  > TekSavvy Solutions Inc.h > 330 Richmond St., Suite 205  > Chatham, ON, Canadae	 > N7M 1P7  > F > And feel free to distribute this FAQ freely.  Post it to newsgroups,E > email it to people, you may host it at your own website, send it to F > newspapers and magazines that do Internet articles or anything to do  > with Montreal or Canada, etc.    Sounds like a cool dude.   ------------------------------  # Date: Tue, 27 Apr 2004 14:45:48 GMTv% From: Bjorn Nitmo <bjorn@deepsky.com>a4 Subject: Re: The JF MEZEI FAQ - Revised and Updated!7 Message-ID: <slrnc8ssgs.ckm.bjorn@outrider.deepsky.com>-  ? 	You know, I've seen you posting this a few times so I decided rH to read it. Rather than reading like a standard troll warning/FAQ, it's F more of a platform for you to slag this J. F. Mezei person. I decided G to search Google's Usenet archive to read of these trolls. Rather than  E finding his trolls, I found countless posts by you about J. F. Mezei.g  > 	I don't know and no longer care if J. F. Mezei is or isn't a H troll but you repetitive posting of your so called FAQ is getting on my  nerves. Funny that.    --   Bjorn Nitmo <bjorn@deepsky.com> 3 Yes, my name is Bjorn and no, I don't work at Ikea.x   ------------------------------  # Date: Tue, 27 Apr 2004 16:14:51 GMT1  From: "~ Darrell ~" <me@here.eh>4 Subject: Re: The JF MEZEI FAQ - Revised and Updated!N Message-ID: <%Fvjc.296736$2oI1.100946@twister01.bloor.is.net.cable.rogers.com>  I Why is it Mr. Anon, that you are the only one who cares. Most find you an H annoying whining baby. I note on nane that many are calling for a UDP on	 Dizum.comd  , > Nomen Nescio <nobody@dizum.com> spammed in >'   ------------------------------  % Date: Tue, 27 Apr 2004 12:20:45 +0100tO From: Andrew Harrison SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> ? Subject: Re: Undeniable proof that Itanium is highly profitablet0 Message-ID: <c6lfn0$s0r$1@new-usenet.uk.sun.com>   GreyCloud wrote: > Andrew Harrison wrote:  H Just to underline how far from reality your perception is Linux User andC Developer Magazine has just published their awards for 2004 as parta of the UK Linux Expo.7  A Guess what Sun got the award for the best OpenSource program withp= OpenOffice.org. And Sun came 2and or 3rd in other categories.k  > HP was only nominated in one category Linux system builder and@ they didn't win that because there are specialist Linux platform vendors who do a better job.  ? Incedentally NetBeans the perfered Java development environment ' for OpenVMS was donated by Sun as well.o  2 Do more research, it will pay off in the long run.   RegardsI Andrew Harrisona >  >>GreyCloud wrote: >>+ >>>Andrew Harrison SUNUK Consultancy wrote:u >>>s >>>b >>>>Bob Koehler wrote: >>>> >>>>E >>>>>In article <c4hdit$l11$1@new-usenet.uk.sun.com>, Andrew Harrison F >>>>>SUNUK Consultancy <Andrew_No.Harrison_No@nospamn.sun.com> writes: >>>>>  >>>>>  >>>>>eD >>>>>>Whatever argument SCO and Novell have over who owns the rightsD >>>>>>to the UNIX IP don't apply to Sun nor would it be possible forD >>>>>>example for SCO to revoke Sun's right to ship UNIX licenses asE >>>>>>it has with IBM and then threaten their customers because therea( >>>>>>is no license between SCO and Sun. >>>>>s >>>>>0B >>>>>  Hasn't stopped SCO from suing other customers over it, evenH >>>>>  though earlier UNIX ownership contracts specifically prohibit it. >>>>>s >>>>> >>>>I think SCO's argument is that the earlier contracts don't: >>>>specifically prohibit them from suing their customers. >>>>E >>>>But again none of this applies to Sun because there is no licensev >>>>deal between Sun and SCO.h >>>t >>>eF >>>Then what did Sun buy from SCO then?  From the accounts I've heard,G >>>Sun was acting like they too wanted Linux dead.  But it won't happen 
 >>>of course.a >>>  >>>  >>C >>Well how about some facts to balance the accounts you have heard.e >> >  > K > The stock market news for one area.  I could do your footwork for you anddM > provide the links if necessary.  But I've already read the links suggestingmL > that not only M$ but also Sun has contributed funds to SCO.  Again... what > did Sun pay for??sF > I can imagine what M$ paid SCO for.  You do realize that M$ does notK > contribute anything back to UCSD on their use of their code.  And why SunnK > went in with M$ is going to be a historical repeat of M$ ruining Sun with G > bad deals.  I hope for Suns' sake that they had a troupe of Attorneysm3 > looking everything over with a fine toothed comb.s >  > C >>Sun is by far in away the largest donator of IP to the OpenSourcec >>community. >> >  > K > That may be, but I haven't seen any evidence of contributions back to thetK > Linux community in regards to downloadable free source code.  That's whata- > the whole thing is about in regards to OOS.  >  > G >>Donations range from whole office suites OpenOffice, calendaring, webnG >>browser components, bits of Apache, NFS, parts of Gnome and EvolutionuH >>Cryptography, libraries, API's NetBeans etc etc. Plus the availabilityA >>of Java through Sun's Community Source License which OpenSourceeD >>purists may not like but sure has resulted in a lot of Linux boxes >>beingiH >>able to run apps that they would have no chance of doing so otherwise. >> >  > L > So far, Java has been the only real free source from Sun.  I've heard fromM > some people, just your usual hobbyist, that Sun provides no instructions ontD > how to install Java properly on a Linux system.  I haven't had theN > opportunity to use Linux in quite a while, since I do use the x86 version ofN > Solaris 8.  As soon as I get my broadband connection acquired here in grislyL > bear country I'll start connecting to the net with Solaris instead of this+ > danged wormy and virus prone windows o/s.u >  > E >>The combined donations of HP and IBM don't even get close and given A >>that much of what they have donated is eminently replacable forn	 >>examplenE >>IBM JFS for which there are numerous alternatives the value of some A >>of the donations is dubious particularly if you have just had aS, >>missive from SCO arive on your CEO's desk. >> >  > M > Only if somebody was foolish enough to pay SCO anything in the first place.iM > The challenge to SCO is still in place with no answers yet from SCO.  Don't M > forget that SCO was Caldera Linux originally, and it was Caldera Linux thatnH > BOUGHT SCO.  Then the name change to SCO took place later.  The watersJ > become murky about how SCOs' so called UNIX got mixed up with Linux, butI > that's how corporations work.  If anything, SCO tainted Linux code withbK > their own and then screamed bloody murder that Linux has stolen their IP. L > It is now time for SCO to provide proof in a court of law.  Another strikeJ > against SCO is that many UNIX vendors have been selling UNIX for quite aM > while now without SCO raising a lawsuit or even mentioning it.  Even NovelleM > has made the claims that SCOs claims are false and that they never did sellr > the IP rights to SCO.i >  > : >>And Java is a great example of vendors double standards,C >>people like IBM call for Sun turn Java into an OpenSource programeA >>but show no inclination to allow their own IP out into the wildd@ >>in the same way nor to allow free access to that IP, where areB >>the free DB2 downloads for Linux etc etc or Lotus Notes for that	 >>matter.C >> >>A >>Sun also has one of the highest volume OpenSource systems baseds) >>shock horror probe on SuSE Linux (JDS).  >  > N > Then Sun, by principle, should provide all of the source code if they really  > want to call this open source. >  > > >>Its hardly suprising that Sun sometimes gets tetchy with the; >>OpenSource community when some elements of the OpenSource @ >>community ignore what Sun has done for them and start accusing? >>Sun of conspiring with any one of a number of foes to destroye >>them.  >  > H > I suppose they would, but if there were no rebuttal of the claims made$ > against Sun then the claims stand. >  > > >>What would you prefer, a vendor who donates usefull IP which: >>enables OpenSource platforms to compete with Windows etc: >>or a Vendor who one of many vendors providing a platform7 >>on which that OpenSource platform can run. Sun is them4 >>former HP is the latter IBM thinks that Linux is a >>great opportunity for GS.e >> >  > I > First I have to have a web site that shows where to get these so calledaM > donated or contributed corrections or donations (for free) to the Linux OOS E > arena... basically the source code for compilation back into Linux.r >  > 9 >>There are lots of x86 vendors but rather fewer completee >>office suppliers for example.t >>	 >>Regardsu >>Andrew Harrisont >  >  >    ------------------------------  + Date: Tue, 27 Apr 2004 07:15:15 +0000 (UTC)tP From: helbig@astro.multiCLOTHESvax.de (Phillip Helbig---remove CLOTHES to reply)G Subject: Re: upgrading (or installing) VMS on a system with no CD drive $ Message-ID: <c6l1a3$f3s$2@online.de>  / In article <Pi8jc.342$bS.220@news.cpqcorp.net>,.6 hammond@not@peek.ssr.hp.com (Charlie Hammond) writes:   " > >Has anyone solved this problem? > ' > What problem are you trying to solve?t@ > If you want to be able to upgrade multiple nodes in less time,A > then copying the kit from CD and booting the CD to upgrade youriH > target system disk(s) will save significant time.  Once the "kit disk"B > is booted, you could siple "change target disks" and upgrade one? > system after another -- no need to re-boot the kit each time.i > G > Of course this is not "automated".  Some one has to change the targetoB > system disks and respond the the upgrade/installation dialog for > each disk.  C With just the OS, this would be OK.  If one keeps layered products t. updated regularly, it's quite a bit more work.   ------------------------------    Date: 27 Apr 2004 00:14:09 -0700% From: Bart.Zorn@xs4all.nl (Bart Zorn)v= Subject: Re: VMS 7.3-2, TCPIP 5.4: which to upgrade to first? = Message-ID: <a98cd882.0404262314.7c4cd7f6@posting.google.com>t  C Well, for us the big difference for the Performance Kernel (aka theyF Scalable Kernel) is that is just crashes the system as soon as you try? to use an INET device. V5.4 without the Scalable Kernel is onlymB slightly more stable. Hp told us that ECO2 for V5.4 is underway...D This is on GS140 and GS160 systems. We have a 'preview' for this ECO  and we will start testing today.  A It is still very disappointing to see that new releases of TCP/IPk Services need ECO after ECO.  
 Bart Zorn.  s alexdaniels@themail.co.uk (Alex Daniels) wrote in message news:<9f7f13a8.0404260710.40be11cb@posting.google.com>...ri > moroney@world.std.spaamtrap.com (Michael Moroney) wrote in message news:<c6hc0p$ee2$2@pcls4.std.com>...iV > > helbig@astro.multiCLOTHESvax.de (Phillip Helbig---remove CLOTHES to reply) writes: > > J > > >I am at VMS 7.3-1 and TCPIP 5.3.  I plan to upgrade to VMS 7.3-2 and K > > >TCPIP 5.4.  Normally, I upgrade the OS first, then layered products.  rM > > >Does it really make any difference?  Any advantages to doing one first,   > > >or the other first? > > L > > TCPIP V5.4 is on the VMS 7.3-2 CD, so if you upgrade by booting from theN > > CD or a copy, it'll ask you if you want to upgrade TCPIP at the same time.M > > Same for a couple of other products, such as Motif and DECnet (IV and V).f > E > Also if you want to use 5.4 with the Performance Kernel (which willsH > become default in 5.5 anyway) you will need 7.3-2. 5.4 without it runs> > on 7.3-1 though. Makes a big difference on loaded SMP boxes.   ------------------------------   End of INFO-VAX 2004.233 ************************detected after an election, F there is no way to determine the correct outcome of the election short of a revote. ...N7 It is therefore crucial that voting equipment provide as voter-verifiableC  audit trail, by which we mean a permanent record of each vote thatN canuF be checked for accuracy by the voter before the vote is submitted, a65 accepted. <<< RETR bison.exek >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bison-a2_3/alpha/bison.exe (209920 bytes) started.i< >>> 226 Transfer completed.  208896 (8) bytes transferred.1 <<< CWD /disk$misc/decus/freewarev40/bison-a2_3T? >>> 250 Connected to /disk$misc/decus/freewarev40/bison-a2_3.a	 <<< PWDI >>> 257 "/disk$misc/decus/freewarev40/bison-a2_3" is current directory.Y
 <<< CWD vax C >>> 250 Connected to /disk$misc/decus/freewarev40/bison-a2_3/vax.o	 <<< PWD5M >>> 257 "/disk$misc/decus/freewarev40/bison-a2_3/vax" is current directory.c <<< TYPE A >>> 200 Type A ok. <<< PORT 138,145,50,65,5,1244 >>> 200 Port 5.124 at Host 138.145.50.65 accepted.
 <<< LIST >>> 150 List started.e >>> 226 Transfer completed.  <<< TYPE I >>> 200 Type I ok. <<< PORT 138,145,50,65,5,1264 >>> 200 Port 5.126 at Host 138.145.50.65 accepted. <<< RETR bison.exei >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bison-a2_3/vax/bison.exe (126976 bytes) started. < >>> 226 Transfer completed.  125952 (8) bytes transferred. <<< PORT 138,145,50,65,5,1284 >>> 200 Port 5.128 at Host 138.145.50.65 accepted. <<< RETR vmshlp.obj1g >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bison-a2_3/vax/vmshlp.obj (702 bytes) started.9 >>> 226 Transfer completed.  292 (8) bytes transferred.01 <<< CWD /disk$misc/decus/freewarev40/bison-a2_3 ? >>> 250 Connected to /disk$misc/decus/freewarev40/bison-a2_3.w& <<< CWD /disk$misc/decus/freewarev404 >>> 250 Connected to /disk$misc/decus/freewarev40.	 <<< PWD > >>> 257 "/disk$misc/decus/freewarev40" is current directory. <<< CWD bliss5: >>> 250 Connected to /disk$misc/decus/freewarev40/bliss.	 <<< PWDdD >>> 257 "/disk$misc/decus/freewarev40/bliss" is current directory. <<< TYPE A >>> 200 Type A ok. <<< PORT 138,145,50,65,5,1304 >>> 200 Port 5.130 at Host 138.145.50.65 accepted.
 <<< LIST >>> 150 List started.r >>> 226 Transfer completed.W <<< TYPE I >>> 200 Type I ok. <<< PORT 138,145,50,65,5,1324 >>> 200 Port 5.132 at Host 138.145.50.65 accepted. <<< RETR 4358pro.decwBOOKih >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bliss/4358pro.decwBOOK (1832052 bytes) started.= >>> 226 Transfer completed.  1831310 (8) bytes transferred.  <<< PORT 138,145,50,65,5,1394 >>> 200 Port 5.139 at Host 138.145.50.65 accepted. <<< RETR 4359pro.decwBOOKpg >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bliss/4359pro.decwBOOK (957972 bytes) started.I< >>> 226 Transfer completed.  957382 (8) bytes transferred. <<< PORT 138,145,50,65,5,1544 >>> 200 Port 5.154 at Host 138.145.50.65 accepted. <<< RETR alpha_bliss.txtd >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/bliss/alpha_bliss.txt (1560 bytes) started.: >>> 226 Transfer completed.  1458 (8) bytes transferred. <<< PORT 138,145,50,65,5,1564 >>> 200 Port 5.156 at Host 138.145.50.65 accepted. <<< RETR bliss.decwBOOKSHELFg >>> 150 IMAGE retrieve of /disk$misc/decus/freewarev40/b