1 INFO-VAX	Wed, 28 Apr 2004	Volume 2004 : Issue 234       Contents:, Re: Billions wasted due to IT skills deficit, Re: Billions wasted due to IT skills deficit, Re: Billions wasted due to IT skills deficit Re: Binary file issues Re: Binary file issues Re: Binary file issues Re: Binary file issues/ Can't get JDBC to work on an Oracle 9i database ) RE: Demonstration system for BridgeWorks? P Re: Games from ubvms.cc.buffalo.edu (was re: Tetris assembleur VAX + SMG) + SMG)E How can I determine which version of DecNet is installed on my server P Re: How can I determine which version of DecNet is installed on my server serverP Re: How can I determine which version of DecNet is installed on my server server> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ...> Re: How to turn linux into VMS - memory refresher for Dave ... IP TOS support! Re: Java RMI as detached Process? ! Re: Java RMI as detached Process?  JNI examples link is broken?4 Re: Linux on its way out - unless you are a geek ...< Re: OT: Advertisers are watching your every moves on the web" OT: Failure of Windows good for HP Re: OT: Scalability B Re: SYS$SCRATCH, logicals pointing to disks, cluster-wide logicals+ Re: The JF MEZEI FAQ - Revised and Updated! + Re: The JF MEZEI FAQ - Revised and Updated! + Re: The JF MEZEI FAQ - Revised and Updated! 4 Re: VMS 7.3-2, TCPIP 5.4: which to upgrade to first?  F ----------------------------------------------------------------------  % Date: Tue, 27 Apr 2004 15:48:03 -0400 # From: "John Smith" <a@nonymous.com> 5 Subject: Re: Billions wasted due to IT skills deficit , Message-ID: <ErudnSHM87dvJRPdRVn-hw@igs.net>  H "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message- news:AIl4q$L7Ta8M@eisner.encompasserve.org... L > In article <Pdydnab_xLf9zhDdRVn-hQ@igs.net>, "John Smith" <a@nonymous.com> writes:  > K > > Every legal system has its own set of horror stories and inefficiences,  but K > > on the whole it appears that the US legal system has more than its fair L > > share of ridiculously high cost judgements against defendants who should/ > > never have been in court in the first place  > J >    I think you need to give more consideration to the messenger.  NobodyE >    makes ratings in thenews business by telling you about all those 9 >    reasonable court cases that has reasonable outcomes.     J We aren't really talking about the specifics of individual cases, though IJ have cited some. Rather it is the 'climate' which is created as companies,3 and individuals within,  look to cover their butts.   L At some places I've been, it's the legal team which vets products or serviceK offerings before permission is given to go ahead with the project. It's not K that the product/service isn't needed but more a case of how much liability : the company thinks it can bear or insurance it can afford.  L A simply, unrelated example - a guy buys a vacant lot in the country wantingJ to build a vacation house/cottage. There's nothing on the land, there's noH services (electricity, sewers, natural gas, etc...) - nothing to damage,0 nearest neighbor is a couple hundred yards away.  J What's the first thing you do when construction actually begins? You dig aJ hole for the foundation. What's the worst that could happen to the land orH 'structure' at this point? Nothing as long as the angle of repose of theI excavation is done according to the engineer's specs - it's a hole in the  ground, that's all.   G Guess what? The insurance company of the landowner wants the excavation J contractor to have $2 million liability coverage in order to be allowed onI the property - not liability insurance for personal injury, but liability > insurance for what they could do wrong with the hole they dig.  G It's hard to see what you can do wrong with a hole in the ground in the L middle of nowhere, especially when nothing further would be done in the holeG unless the excavation was done correctly and inspected by the engineers $ before the first concrete is poured.  E But the insurance requirement now dictates, to some extent, what size L company you have to hire. Some perfectly good contractors are now out of the running. Your costs go up.   True story. Every word.    ------------------------------  % Date: Tue, 27 Apr 2004 19:52:04 -0400   From: John Santos <JOHN@egh.com>5 Subject: Re: Billions wasted due to IT skills deficit 6 Message-ID: <1040427193454.32308D-100000@Ives.egh.com>  & On Tue, 27 Apr 2004, John Smith wrote:   > J > "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message/ > news:AIl4q$L7Ta8M@eisner.encompasserve.org... N > > In article <Pdydnab_xLf9zhDdRVn-hQ@igs.net>, "John Smith" <a@nonymous.com>	 > writes:  > > M > > > Every legal system has its own set of horror stories and inefficiences,  > but M > > > on the whole it appears that the US legal system has more than its fair N > > > share of ridiculously high cost judgements against defendants who should1 > > > never have been in court in the first place  > > L > >    I think you need to give more consideration to the messenger.  NobodyG > >    makes ratings in thenews business by telling you about all those ; > >    reasonable court cases that has reasonable outcomes.  >  > L > We aren't really talking about the specifics of individual cases, though IL > have cited some. Rather it is the 'climate' which is created as companies,5 > and individuals within,  look to cover their butts.  > N > At some places I've been, it's the legal team which vets products or serviceM > offerings before permission is given to go ahead with the project. It's not M > that the product/service isn't needed but more a case of how much liability < > the company thinks it can bear or insurance it can afford. > N > A simply, unrelated example - a guy buys a vacant lot in the country wantingL > to build a vacation house/cottage. There's nothing on the land, there's noJ > services (electricity, sewers, natural gas, etc...) - nothing to damage,2 > nearest neighbor is a couple hundred yards away. > L > What's the first thing you do when construction actually begins? You dig aL > hole for the foundation. What's the worst that could happen to the land orJ > 'structure' at this point? Nothing as long as the angle of repose of theK > excavation is done according to the engineer's specs - it's a hole in the  > ground, that's all.  > I > Guess what? The insurance company of the landowner wants the excavation L > contractor to have $2 million liability coverage in order to be allowed onK > the property - not liability insurance for personal injury, but liability @ > insurance for what they could do wrong with the hole they dig. > I > It's hard to see what you can do wrong with a hole in the ground in the N > middle of nowhere, especially when nothing further would be done in the holeI > unless the excavation was done correctly and inspected by the engineers & > before the first concrete is poured. > G > But the insurance requirement now dictates, to some extent, what size N > company you have to hire. Some perfectly good contractors are now out of the > running. Your costs go up. >  > True story. Every word.   4 And probably very sensible of the insurance company!  A They have 2 choices.  They could inspect each and every job site, D and if it is in the middle of a city with many underground utilitiesC or is on a steep, unstable slope, or in an area with sink holes, or B over an underground coal mine, they could insist on an appropriateE level of insurance coverage.  Or if in the judgement of the insurance A inspector, the risk is minimal, they could issue a waiver.  So to B do the 2-day excavation job (possibly including trucking or movingC the excavated material to another site, or bulldozing it across the > site to a less-safe location, such as the edge of a cliff or a@ wetland or other less obvious and less safe activities than just@ digging the hole), would require an extra 1/2 man-day (minimum) D for an (expensive, skilled) inspector to visit the site, conduct any? necessary surveys, maybe discuss the job with the landowner and > the contractor to make sure of exactly what was being planned,- and then produce a report and recommendation.   < Or they could just require the contractor to have insurance.9 In the long run, this option is probably much cheaper for : everyone.  And the contractor should have insurance, since@ they probably do many jobs that are in much less save locations.  A ($2 million doesn't go very far these days...  my softball league = has a $2 million liability policy, required by the town which @ owns the fields, that costs about $100/year/team.  And we're notA using any motorized construction equipment, just bats and balls.)    --   John Santos  Evans Griffiths & Hart, Inc. 781-861-0670 ext 539   ------------------------------  % Date: Tue, 27 Apr 2004 21:18:52 -0400 # From: "John Smith" <a@nonymous.com> 5 Subject: Re: Billions wasted due to IT skills deficit , Message-ID: <1IOdnSYaJMbnmxLdRVn-jA@igs.net>  - "John Santos" <JOHN@egh.com> wrote in message 0 news:1040427193454.32308D-100000@Ives.egh.com...( > On Tue, 27 Apr 2004, John Smith wrote: >  > > L > > "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message1 > > news:AIl4q$L7Ta8M@eisner.encompasserve.org... ? > > > In article <Pdydnab_xLf9zhDdRVn-hQ@igs.net>, "John Smith"  <a@nonymous.com> > > writes:  > > > @ > > > > Every legal system has its own set of horror stories and inefficiences, > > but J > > > > on the whole it appears that the US legal system has more than its fairI > > > > share of ridiculously high cost judgements against defendants who  should3 > > > > never have been in court in the first place  > > > F > > >    I think you need to give more consideration to the messenger. NobodyI > > >    makes ratings in thenews business by telling you about all those = > > >    reasonable court cases that has reasonable outcomes.  > >  > > L > > We aren't really talking about the specifics of individual cases, though I C > > have cited some. Rather it is the 'climate' which is created as 
 companies,7 > > and individuals within,  look to cover their butts.  > > H > > At some places I've been, it's the legal team which vets products or service K > > offerings before permission is given to go ahead with the project. It's  not E > > that the product/service isn't needed but more a case of how much 	 liability > > > the company thinks it can bear or insurance it can afford. > > H > > A simply, unrelated example - a guy buys a vacant lot in the country wanting K > > to build a vacation house/cottage. There's nothing on the land, there's  noL > > services (electricity, sewers, natural gas, etc...) - nothing to damage,4 > > nearest neighbor is a couple hundred yards away. > > L > > What's the first thing you do when construction actually begins? You dig a K > > hole for the foundation. What's the worst that could happen to the land  orL > > 'structure' at this point? Nothing as long as the angle of repose of theI > > excavation is done according to the engineer's specs - it's a hole in  the  > > ground, that's all.  > > K > > Guess what? The insurance company of the landowner wants the excavation K > > contractor to have $2 million liability coverage in order to be allowed  onC > > the property - not liability insurance for personal injury, but 	 liability B > > insurance for what they could do wrong with the hole they dig. > > K > > It's hard to see what you can do wrong with a hole in the ground in the K > > middle of nowhere, especially when nothing further would be done in the  holeK > > unless the excavation was done correctly and inspected by the engineers ( > > before the first concrete is poured. > > I > > But the insurance requirement now dictates, to some extent, what size L > > company you have to hire. Some perfectly good contractors are now out of the  > > running. Your costs go up. > >  > > True story. Every word.  > 6 > And probably very sensible of the insurance company! > C > They have 2 choices.  They could inspect each and every job site, F > and if it is in the middle of a city with many underground utilitiesE > or is on a steep, unstable slope, or in an area with sink holes, or D > over an underground coal mine, they could insist on an appropriateG > level of insurance coverage.  Or if in the judgement of the insurance C > inspector, the risk is minimal, they could issue a waiver.  So to D > do the 2-day excavation job (possibly including trucking or movingE > the excavated material to another site, or bulldozing it across the @ > site to a less-safe location, such as the edge of a cliff or aB > wetland or other less obvious and less safe activities than justA > digging the hole), would require an extra 1/2 man-day (minimum) F > for an (expensive, skilled) inspector to visit the site, conduct anyA > necessary surveys, maybe discuss the job with the landowner and @ > the contractor to make sure of exactly what was being planned,/ > and then produce a report and recommendation.  > > > Or they could just require the contractor to have insurance.; > In the long run, this option is probably much cheaper for < > everyone.  And the contractor should have insurance, sinceB > they probably do many jobs that are in much less save locations. > C > ($2 million doesn't go very far these days...  my softball league ? > has a $2 million liability policy, required by the town which B > owns the fields, that costs about $100/year/team.  And we're notC > using any motorized construction equipment, just bats and balls.)     L The guy is just digging a hole - no underground aquifer to hit, no abandonedK coal mine, or toxic fill/landfill site, no underground infrastructure. Just 5 land that had trees on it that were cut down legally.   H The demands of the insurance company are not commensurate with the risk.  H The insurance company's words (paraphrased), "The contractor has to haveK $2MM insurance in case they damage your building even though it doesn't yet F exist, and even though there is nothing the excavator can do that willJ damage the structure - his existing $1MM liability insurance isn't enough.G And notwithstanding that your geotechnical engineer and your structural J engineer will be inspecting the hole before they give you clearance to putJ anything in the hole, and notwithstanding the fact that the engineers have> higher insurance coverage than the excavator and that they areL professionally liable, and notwithstanding that both those engineers will be$ on-site supervising the excavation."  J Oh and by the way, the insurance company wants the landowner to have theirD own insurance, valued at $2MM replacement cost for the structure (inI addition to liability insurance), for a structure that will not cost more G than $1.25MM to build over the course of about 1 year elapsed time, for J which courtesy the insurance company will charge the modest sum of $35,000H up-front even though the value (invested cost of construction) will onlyK occur gradually over a period of many months. This is to cover the possible L cost of vandalism during construction, because any contractor working on the, site will have their own insurance coverage.  F This particular insurance company is simply spreading the cost of 9/11K around to anyone they can hit who can't fight back. And in this market (ie. L houses valued at over $1MM while under construction), there are precious fewJ companies that will even insure a one-off custom home, so one pays throughH the nose -- even more than one pays for VMS talent in a shrinking market8 (there...we're back to OpenVMS marketing & advertising).   ------------------------------  % Date: Tue, 27 Apr 2004 12:10:56 -0700 ) From: Dean Woodward <dean@looseonthe.net>  Subject: Re: Binary file issues - Message-ID: <408EB040.9000706@looseonthe.net>   % On 4/27/2004 1:38 AM, JF Mezei wrote:   @ > SET FILE/ATTRIB=(rfm:fix,lrl:512,mrs:512,rat=none) picture.jpg  H Actually, it turns out that (so far) this works- it's just Windows XP's H brain-dead picture viewer that can't handle the results- but that's not F news, and (other than generalized griping) not a topic for this group.  C I haven't had a chance to determine if the results are also WASD /  G application friendly, but it gets me out of having to manually process  @ ~600 images and move deeper into whatever's causing the problem.   ------------------------------  % Date: Tue, 27 Apr 2004 12:29:41 -0700 0 From: Mark Berryman <Mark.Berryman@Mvb.Saic.Com> Subject: Re: Binary file issues ' Message-ID: <408e5236$1@cpns1.saic.com>    Lorin Ricker wrote: A > (I'm posting this on behalf of Dean Woodward.  -- Lorin Ricker)  > F > A few weeks ago, the following issue came up and we're stumped as to > what's going on: > H > A UUENCODED file is received by a VMS host; UUDECODE is called and the5 > output (a JPEG image) is stored in the file system.  > G > This file is retrieved one of three ways: by a custom application, in E > which the VMS machine UUENCODES it and transmits it again; via WASD 4 > web services, or directly from a PC via PATHWORKS. > @ > We noticed that UUDECODE stores the file (binary, remember) asG > STREAM_LF. That didn't seem right, so we "fixed" it by converting all E > existing images to FIX:512, and adding code to convert new files to < > FIX:512 as they're recieved. Nothing's been right since...  G That was your first error.  A file in STREAM_LF format can and will be  E treated as binary by any application (written in C) designed to work  G with that file.  Unless you plan to use utilities that normally expect  I records (e.g. SEARCH, SORT, EDIT, etc.) or are not written in C on these  . files there is no need to change their format.  E > The application, which relies on UUENCODE/UUDECODE, doesn't seem to = > care. WASD doesn't seem to care. Pathworks cares, a *lot*;    I If the applications that are going to use these files are happy with the  ! STREAM_LF setting, why change it?   8 That being said, there is a straight-forward enough fix.  E When you define a share in Advanced Server, you can specify what RMS  F attributes are to be used by the files in that share.  The default is E Stream since that is the native format of Windows.  However, you can  F specify a format of SEQUENTIAL_FIXED and then all files in that share H will be treated as if in FIX:512 format.  Thus, as long as you are only B changing the attributes from STREAM_LF to FIX:512 (i.e. using SET H FILE/ATTRIBUTE not CONVERT) you can safely take the output of UUDECODE, F change the attributes to FIX:512, store them in the directory that is E defined as shared to the PCs in SEQUENTIAL_FIXED format, and the PCs  ! will the read the file correctly.   H My recommendation, however, is that you not do this.  I have found that G if I define my shares to use STREAM_LF (instead of the default STREAM)  G then it doesn't matter if the file is a movie, a music file, a graphic  F image, etc.  It is read correctly by the utilities both on VMS and on H the PC.  Some of the open source C-based utilities on VMS will not work I correctly on files that are not in STREAM_LF format (MPG123 and JAVA are   two notable examples).  
 Mark Berryman    ------------------------------  % Date: Tue, 27 Apr 2004 15:42:02 -0400 - From: JF Mezei <jfmezei.spamnot@teksavvy.com>  Subject: Re: Binary file issues , Message-ID: <408EB786.C727D2E0@teksavvy.com>   Dean Woodward wrote:H > then PATHWORKS _only_ for ~24 hours after they're captured. If I tweakB > them the way PATHWORKS wants (and only _some_ of them need to beF > tweaked, on some basis we don't understand), they're useless for theF > other two. I can add as a footnote that using FTP to copy a "broken"H > image to a PC doesn't help- but that's a sidenote, as we never use FTP > to access them.   M If the image is in the "VMS friendly" format that application and WASD likes, E how does it turn out on the windows machine ? Is it bigger/smaller ?    M I would look at pathworks documentation for any configuration option to allow J "binary" transfers for files with the record attributes you need on VMS so8 that the files remain intact when they travel to the PC.  N Another option would be to use the VMS equivalent of curl or fetch_http to getN the images to your PC via the WASD server on VMS instead of using Pathworks to transfer the file.   ------------------------------  + Date: Tue, 27 Apr 2004 23:00:35 +0000 (UTC) ? From: Graham Burley <burley.not-this@encompasserve-or-this.org>  Subject: Re: Binary file issues 9 Message-ID: <408EE5F9.15A9AD70@encompasserve-or-this.org>    Dean Woodward wrote:  F > it, though I still want to know why, with the changes undone, things0 > haven't gone completely back to how they were.  @ Could be completely off the mark, but this makes me think cache.> WASD, Pathworks, and/or VMS could be cacheing files, and might+ not have noticed the file attribute change.      Graham   ------------------------------  + Date: Tue, 27 Apr 2004 15:06:47 -0500 (CDT) & From: Drew Shelton <DREW@SEMATECH.Org>8 Subject: Can't get JDBC to work on an Oracle 9i database- Message-ID: <01L9FGFK2E4M00ZFGK@SEMATECH.Org>   J I'm trying to use JDBC to access an Oracle 9.2 database residing on a UnixD system.  I'm running Java 1.4.1.2 on OpenVMS 7.3-1.  I've downloadedJ ojdbc14.jar, set the RFM to Stream_LF, and have pointed the JAVA$CLASSPATHP logical to it.  I'm attempting to register the driver in my code with this line:  P             DriverManager.registerDriver(new oracle.jdbc.driver.OracleDriver());   but it fails to compile:   $ javac workforce.java< Workforce.java:10: package oracle.jdbc.driver does not exist@                                                                ^ 1 error    What am I missing?   Thanks,  Drew  L ============================================================================6 Drew Shelton                         drew@sematech.org9 VMS Systems Manager                  office: 512-356-7575 9 Sematech                             fax:    512-356-7600  2706 Montopolis Drive K Austin, TX 78741-6499                I speak for myself only, not Sematech. B     "OpenVMS is today what Microsoft wants Windows NT v8.0 to be!"I                                                         - Compaq, 9/22/98 L ============================================================================   ------------------------------  % Date: Wed, 28 Apr 2004 00:06:23 -0400 ' From: "Main, Kerry" <kerry.main@hp.com> 2 Subject: RE: Demonstration system for BridgeWorks?R Message-ID: <FD827B33AB0D9C4E92EACEEFEE2BA2FB313DA4@tayexc19.americas.cpqcorp.net>   > -----Original Message-----6 > From: Chuck Chopp [mailto:ChuckChopp@rtfmcsi.com]=20 > Sent: April 26, 2004 2:06 PM > To: Info-VAX@Mvb.Saic.Com 0 > Subject: Demonstration system for BridgeWorks? >=20; > Doe HP have an OpenVMS system that is connected to the=20  > Internet for purposes=20: > of demonstrating how BridgeWorks can be used to put a=20 > web-based front-end on=20 ? > a traditional green-screen application?  I'm looking for a=20  > side-by-side=20 > > comparison of the original green-screen and the web-based=20 > front-end that can=20 H > be created using BridgeWorks and, say, a Tomcat-based web application. >=20 >=20 > TIA, >=20 > Chuck  > --=20 
 > Chuck Chopp  >=20   Chuck,  + BridgeWorks site: (Bridgeworks is free btw) H http://www.openvms.compaq.com/commercial/bridgeworks/bridgeworks_index.h tml   G Also, if interested in commercial screen to web application migrations,  here are a few pointers:   Ericom: ( http://ebusiness.ericom.com/iOpenVms.asp( http://ebusiness.ericom.com/indexWap.asp   WRQ:' http://www.wrq.com/products/verastream/ = http://www.wrq.com/products/reflection/host_type/openvms.html      Regards   
 Kerry Main Senior Consultant  HP Services Canada Voice: 613-592-4660  Fax: 613-591-4477  Email: kerryDOTmainAThpDOTcom . (remove the DOT's and AT for email address)=20   ------------------------------  % Date: Tue, 27 Apr 2004 12:31:30 -0700 0 From: Mark Berryman <Mark.Berryman@Mvb.Saic.Com>Y Subject: Re: Games from ubvms.cc.buffalo.edu (was re: Tetris assembleur VAX + SMG) + SMG) % Message-ID: <408e52a3@cpns1.saic.com>    Malcolm wrote:M > Did no one archive all of the games off of ubvms.cc.buffalo.edu , which now  > seems to have vanished?  > I > I got as far as M (moria_443) :( But they had a Tetris game on there...  > L > Was somewhat hampered by the fact that the ftp server they had there had aK > bug and would crash after I'd retrieved 70 or so files... Or I would have  > had them all :(   9 I have a copy made 2 or 3 years ago.  Is that sufficient?   
 Mark Berryman    ------------------------------    Date: 27 Apr 2004 12:16:51 -0700+ From: c00per11242001@yahoo.ca (Vic Mendham) N Subject: How can I determine which version of DecNet is installed on my server= Message-ID: <f7a73cb1.0404271116.3f798bf9@posting.google.com>   ) We are auditing our servers for software. A I have over 200 VAX & Alpha servers, and I need to find out which + version of Decnet is running on my servers.   E Some servers I can do a license list and don't see decnet, but do see ! dvnetend, so don't have dvnetend.   B I am told if I do a mc ncl show address and it works, I am running+ Decnet Phase V, what about Phase IV or OSI?    c00per11242001@yahoo.ca    ------------------------------  % Date: Tue, 27 Apr 2004 12:55:38 -0700 0 From: Mark Berryman <Mark.Berryman@Mvb.Saic.Com>Y Subject: Re: How can I determine which version of DecNet is installed on my server server ' Message-ID: <408e584a$1@cpns1.saic.com>    Vic Mendham wrote:+ > We are auditing our servers for software. C > I have over 200 VAX & Alpha servers, and I need to find out which - > version of Decnet is running on my servers.  > G > Some servers I can do a license list and don't see decnet, but do see # > dvnetend, so don't have dvnetend.  > D > I am told if I do a mc ncl show address and it works, I am running- > Decnet Phase V, what about Phase IV or OSI?  >  > c00per11242001@yahoo.ca   I On all versions of DECnet the command MCR NCP SHOW EXEC will tell you if  I you are running DECnet-OSI or DECnet IV.  I know longer remember exactly  I how a phase-IV node will identify itself but you will be able to see the   difference.   
 Mark Berryman    ------------------------------  % Date: Tue, 27 Apr 2004 12:24:18 -0700  From: Z <z@no.spam> Y Subject: Re: How can I determine which version of DecNet is installed on my server server 0 Message-ID: <108tcqifna4f2d3@corp.supernews.com>   Vic Mendham wrote:+ > We are auditing our servers for software. C > I have over 200 VAX & Alpha servers, and I need to find out which - > version of Decnet is running on my servers.   A $ pipe show network decnet/full | search sys$input "network type"    ------------------------------  + Date: Tue, 27 Apr 2004 17:42:04 +0000 (UTC)  From: david20@alpha2.mdx.ac.ukG Subject: Re: How to turn linux into VMS - memory refresher for Dave ... ) Message-ID: <c6m61c$ook$1@news.mdx.ac.uk>   b In article <3Mjjc.44885$_L6.3266546@attbi_s53>, glen herrmannsfeldt <gah@ugcs.caltech.edu> writes: >Main, Kerry wrote:  > 
 >(I wrote) > H >>>There is a very good reason that VMS is not attacked by worms, and it/ >>>doesn't have at all to do with VMS security.  >  >(snip) H >>>I believe that Windows and Solaris are still the popular web servers,F >>>and so are favorites for worm attacks.   The statistics are againstF >>>almost every other OS.  Unless VMS becomes popular as a web server,3 >>>there isn't much reason for worm writers to try.  > = >>>This reminds me of the story about being chased by a bear. < >>>You don't have to run faster than the bear, you only need- >>>to run faster than the person next to you.  > + >> I have to disagree to a certain degree.   > G >> While there is certainly an element of truth to this, the reality is I >> that the virus and hackers will typically migrate to the path of least H >> resistance. Why spend huge amounts of time to find out that you stillH >> need to find a way to get elevated priv's on an OpenVMS server before >> you can do any damage?  > > >Why spend all that time when there are so few OpenVMS servers$ >compared to Solaris or W2K servers? > K >> On other platforms, getting elevated priv's has proven to be a whole lot 3 >> easier, hence the number of events in the press.  > A >A trojan could probably get through.  If OpenVMS were as popular A >as windows, and enough freeware were passed around.  It might be C >that OpenVMS users are better at not running with excess privilege B >levels.   People are getting better at running unix systems whereC >server programs don't run root unless absolutely necessary, unlike  >they used to be.  > 2 By definition any system is vulnerable to Trojans.O User's running trojans on VMS aren't too bad since generally they will not have E privileges and there will not be any way for them to gain privileges. 6 Hence the worst they can do is affect their own files.J (Unfortunately on Unix systems local exploits which elevate users to root  are still far too common).  L Privileged users on VMS or Unix running Trojans will compromise security on L those systems. Hopefully anyone in those positions will try to guard against that eventuality.     K >> This "it depends on volume" argument does not hold water as Apache is by J >> far more widely used Web Server on the Internet, but I would be willingI >> to bet that there are far more security patches for IIS than there are  >> for Apache.   > > >The ones I know of attack other services that are usually run? >on those systems.   OS/2 is probably not so hard to break, and % >I have never heard of an OS/2 virus.  > ? >I am not saying that the protection isn't there, only that the ? >gain is not enough to make it worthwhile to attack compared to < >other systems.   Many of them work on randomly selecting IP> >addresses, and so would spread very slowly attacking OpenVMS. >   
 David Webb VMS and Unix team leader CCSS Middlesex University     >-- glen >    ------------------------------    Date: 27 Apr 2004 14:49:02 -0600; From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 3 Message-ID: <+H$gtFesMBLm@eisner.encompasserve.org>    In article <c6m05f$1hbd$1@news.cybercity.dk>, "Karsten Nyblad" <nospam@nospam.com> writes:> "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message > J > I know.  It was 14-15 years ago.  It was on DECNET, a networking packageM > that is rarely used on open networks today.  Security on the Internet was a N > completely different ballgame in those days.  WANK is not relevant to todays > problems.       Guess some more.    ------------------------------  # Date: Tue, 27 Apr 2004 19:31:14 GMT $ From: "GreyCloud" <mist@Cumulus.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 8 Message-ID: <6yyjc.1959$Wc4.7258@bcandid.telisphere.com>  ( Andrew Harrison SUNUK Consultancy wrote: > GreyCloud wrote:+ >> Andrew Harrison SUNUK Consultancy wrote:  >> >>> GreyCloud wrote: >>>  >>>> Andrew Harrison wrote:  >>> A >>>>> so I will ask you again, justify your claims or quit making  >>>>> them.  >>>>>  >>>>>  >>>>0 >>>> That's rich coming from a Sun troll in cov. >>>> >>>> >>> < >>> Well if you can find examples of claims that I have made= >>> that I have failed to support when pressed then feel free  >>> to publish them. >>> 6 >>> Otherwise I would suggest that you follow the same >>> course as Bob. >>>  >>> >> Guffaw!!  Your are definitely trolling.  It is too obvious. >> >> >  > ; > No trolling is making claims that cannot be supported, if < > you can find examples of me doing that then please publish; > them otherwise as I said earlier my advice to Bob applies  > to you as well.  >   K You are sadly mistaken.  You are not part of the OpenVMS group perse... you  a Sun Consultant (?). L You are trolling to persuade others opinions about Solaris vs. OpenVMS.  OneH could call it propaganda, which is more likely the correct term.  Either way, it is trolling.   ------------------------------  # Date: Tue, 27 Apr 2004 19:35:35 GMTo$ From: "GreyCloud" <mist@Cumulus.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...s8 Message-ID: <bCyjc.1960$Wc4.7538@bcandid.telisphere.com>   Karsten Nyblad wrote:l; > "Paul Repacholi" <prep@prep.synonet.com> wrote in messagee) > news:87r7ua348l.fsf@prep.synonet.com...T/ >> "Karsten Nyblad" <nospam@nospam.com> writes:e >>: >>>  Thus VMS is as easy to attack with viruses and Trojan0 >>> horses as any other general purpose systems. >>D >> Why? I can screw M$ systems with e-mail, http, or by finessing anG >> exe onto the machine for a user to run for me. How do you get a mail F >> message to execute on VMS? And how, if you do get this done, do youF >> break out of the process your code is in to get elevated privelege? >.H > The reason why it is so easy to attack Windows by E-mail is the stupidD > E-mail clients that automatically executes attached files.  Put anE > equally stupid E-mail client on a VMS systems, and VMS will get theuC > same problems as Windows with viruses and worms spreading throughoH > E-mail.  I do not blame Windows for Microsoft's stupid E-mail clients. > C > In order to attach with HTTP, you need a browser or a web server.eF > Neither are part of VMS.  But disregarding that, you need a securityG > bug to get through.  Viruses do not use security bugs to get through. / > They use the naivety of users to get through.l >   G Or poorly designed O/Ses like M$ produces.  M$ has everything in kerneln space. No wonder there.d VMS doesnt' do this.  E > The reason why VMS is not attacked by EXE files being finessed ontodF > it, is that there is no place where VMS users trade illegally copiedF > programs. Windows users install programs they get from P2P networks,F > binary groups on Usenet or by cheap from dubious sources.  The usersB > getting infected cannot warn others, because that would discloseD > their low moral and they might get into legal troubles.  VMS is as@ > vulnerable to viruses in EXE files finessed into the system as
 > Windows is.a >   L Guffaw!!!  Go away clueless.  If you really want to know, go to a VMS school$ and find out why this can't be done.   ------------------------------  # Date: Tue, 27 Apr 2004 20:22:46 GMTo& From: jlsue <jefflsxxxz@sbcglobal.net>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... 8 Message-ID: <1sft801170sv963h8sggatct06i3lq4v59@4ax.com>  5 On Tue, 27 Apr 2004 02:42:07 GMT, glen herrmannsfeldt  <gah@ugcs.caltech.edu> wrote:e   >Main, Kerry wrote:a   >tK >> On other platforms, getting elevated priv's has proven to be a whole loto3 >> easier, hence the number of events in the press.h >rA >A trojan could probably get through.  If OpenVMS were as populariA >as windows, and enough freeware were passed around.  It might be C >that OpenVMS users are better at not running with excess privilegeoB >levels.   People are getting better at running unix systems whereC >server programs don't run root unless absolutely necessary, unlikeg >they used to be.t  H Don't forget that another reason that OpenVMS can be more secure is thatI normal end users do not need privileges to run many programs.  Therefore,cH if I, as a normal-priv'd user, copy & execute some code of the internet,A there is little chance that it will mess up the system in any wayg whatsoever.   J I'm just not going to get my system manager to provide elevated privileges) to run random code in most OpenVMS shops.d  J Windows, historically, runs for all users in fully privileged accounts.  IH run my Win XP systems at home from non-privileged accounts, but you'd beI surprised how difficult that is.  The lack of real error reporting & evenrJ logging makes troubleshooting this stuff a real hassle.  But I'm committedF to preventing my kids from screwing things up and causing me to reload every month or so.  K And some idiot code which should be user mode (e.g., TurboTax - nothing butoH a glorified spreadsheet program), must be run from a admin account.  I'mJ just really careful what code I run from that account, and the directories< that contain those programs are not writable by other users.     --- jls 0 The preceding message was personal opinion only.6 I do not speak in any authorized capacity for anyone,  and certainly not my employer.- (get rid of the xxxz in my address to e-mail)s   ------------------------------  % Date: Wed, 28 Apr 2004 01:20:25 +0800t, From: Paul Repacholi <prep@prep.synonet.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...e- Message-ID: <877jw1s5gm.fsf@prep.synonet.com>-  , "Karsten Nyblad" <nospam@nospam.com> writes:  A > The reason why it is so easy to attack Windows by E-mail is thetC > stupid E-mail clients that automatically executes attached files.gD > Put an equally stupid E-mail client on a VMS systems, and VMS willC > get the same problems as Windows with viruses and worms spreadingA@ > through E-mail.  I do not blame Windows for Microsoft's stupid > E-mail clients.n  ? But the billygoats keep bleating "It is part of Windows." pft..e  ? Getting the code to execute only enables you to compromise that D user. It gets you *nothing* toward getting a grip on the machine. OnA windows, if you can get a suitable exe to execute, the machine isaE totally yours. This is an unaviodable `feature' of the windows system D call design and implementation. This is TOTALLY different to VMS, or( almost any other system for that matter.  C > In order to attach with HTTP, you need a browser or a web server. F > Neither are part of VMS.  But disregarding that, you need a security> > bug to get through.  Viruses do not use security bugs to get9 > through.  They use the naivety of users to get through.   C If someone is running IIS, they are yours, or dead. Your pick. They C don't even have to know anything, nor do anything. Dito outhouse atr the other end.  E > The reason why VMS is not attacked by EXE files being finessed onto F > it, is that there is no place where VMS users trade illegally copied= > programs.  Windows users install programs they get from P2PfE > networks, binary groups on Usenet or by cheap from dubious sources.eC > The users getting infected cannot warn others, because that wouldgB > disclose their low moral and they might get into legal troubles.@ > VMS is as vulnerable to viruses in EXE files finessed into the > system as Windows is.   E Please, DEC/VMS users and IBM user where trading code etc for decadesaF before the PC was thought of! Go look through a DECUS libray catalogue of the SIG tape collection.   C The first e-mal was in 1974, on a Lispm at MIT. By the next day, itoC was fixed, and only one vendor has repeated that mistake. See emacs  for more details perhaps.h   Details matter *LOTS*!   -- l< Paul Repacholi                               1 Crescent Rd.,7 +61 (08) 9257-1001                           Kalamunda.p@                                              West Australia 6076* comp.os.vms,- The Older, Grumpier Slashdot. Raw, Cooked or Well-done, it's all half baked.F EPIC, The Architecture of the future, always has been, always will be.   ------------------------------  % Date: Wed, 28 Apr 2004 06:02:36 +0200e* From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ... - Message-ID: <c6nad8$158u$1@news.cybercity.dk>e  H "Bob Koehler" <koehler@eisner.nospam.encompasserve.org> wrote in message- news:+H$gtFesMBLm@eisner.encompasserve.org....@ > In article <c6m05f$1hbd$1@news.cybercity.dk>, "Karsten Nyblad"* <nospam@nospam.com> writes:> "Bob Koehler": <koehler@eisner.nospam.encompasserve.org> wrote in message > > L > > I know.  It was 14-15 years ago.  It was on DECNET, a networking packageI > > that is rarely used on open networks today.  Security on the Internet, was aoI > > completely different ballgame in those days.  WANK is not relevant tod todays
 > > problems.  >n >    Guess some more.n >lI Stop playing games.  If it is not WANK you are thinking of, why don't you G write what you are thinking?  In stead you are wasting the bandwidth ofbC comp.os.vms by your posting and me having to ask you what you mean.d   Karsten Nyblad ibpit1202 at sneakemail dot comn   ------------------------------  % Date: Wed, 28 Apr 2004 06:27:24 +0200 * From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...e- Message-ID: <c6nbrg$19pr$1@news.cybercity.dk>o  + <david20@alpha2.mdx.ac.uk> wrote in message # news:c6m3n6$nip$4@news.mdx.ac.uk...n? > In article <c6keum$85s$1@news.cybercity.dk>, "Karsten Nyblad"o <nospam@nospam.com> writes:   J > >The reason why VMS is not attacked by EXE files being finessed onto it, isJ > >that there is no place where VMS users trade illegally copied programs.K > >Windows users install programs they get from P2P networks, binary groupsl onG > >Usenet or by cheap from dubious sources.  The users getting infectedt cannotJ > >warn others, because that would disclose their low moral and they might getiE > >into legal troubles.  VMS is as vulnerable to viruses in EXE filesi finessed! > >into the system as Windows is.- > >-J > >Somebody might try to cheat an administrator of an FTP site to carry anK > >infected file, but there chances of getting the administrator to do thati areeJ > >not that big if the administrator does not know that somebody.  In mostJ > >cases the administrator would ask for source file, so that the code can beE > >checked.  Downloaders will warn the administrator if they find anye infected > >file. > >g >r; > Again these executables are Trojans they are not viruses.g  J How do you think, viruses are getting into the free?  The person who wantsJ to spread a virus has to find some victims to be the first to be infected.I And the term virus is used on code that get spread by attaching itself topG something else.  The virus might be a macro for Excel or Word, a storedrF procedure for a database, etc., but it can also be a patch for commandF procedures or executables, e.g., image files on VMS systems.  They areG called viruses because they do not live an independend life.  They livemK through what they are attached to just like biological viruses live througha the cells they invade.  L A Trojan horse is a piece of code that lives independably of other programs.I It does not copy itself.  The publisher will claim that it does something : good, and usually it does, but it also does something bad.   Karsten Nyblad ibpit1202 at sneakemail dot com    ------------------------------  % Date: Wed, 28 Apr 2004 06:51:11 +0200e* From: "Karsten Nyblad" <nospam@nospam.com>G Subject: Re: How to turn linux into VMS - memory refresher for Dave ...i- Message-ID: <c6nd82$1dqk$1@news.cybercity.dk>i  + <david20@alpha2.mdx.ac.uk> wrote in message # news:c6m2bb$nip$1@news.mdx.ac.uk... K > Thirdly unless the account this is running from has privileges or the DCL  hasoL > found someway of illicitly obtaining privileges through a bug it will onlyC > infect other files owned by that user. It will not spread betweenmI > different users on the same computer system let alone between differents& > computer systems across the network.J > In biological terms this would be equivalent to something which obtained entrycH > to a cell and infected all parts of that cell but was not then able to spread$ > to other cells or to anybody else. > Not much of a virus.  K What exactly are your users using your VMS systems for?  I have studied and F emploied at research sites that using were using VMS. The users, be itJ students or researchers, used each others programs and command procedures.L A virus could easily spread from a user account to the accounts of those theK user was working together with.  Just think of a professor making some cooli1 program available to his students and colleagues.g   > From the PDF at sophos >h< > http://www.sophos.com/sophos/docs/eng/comviru/viru_ben.pdf >b > "e > What is a virus? >eI > A computer virus is a computer program that can spread across computerse andtL > networks by making copies of itself, usually without the user's knowledge. > " D They have forgotten to write the important point that viruses attachK themselves to something else.  However, Sophos seems to use this definition G too, otherwise their explanation for worms does not makes sense.  Read:n   >" >Worms > H >Worms are similar to viruses but do not need a carrier (like a Macro or boot@ >sector). Worms simply create exact copies of themselves and useJ >communications between computers to spread. Many viruses, such as KakwormE > (VBS/Kakworm) or LoveBug (VBS/Lovelet-A), behave like worms and usee- >email to forward themselves to other users."t     Karsten Nyblad ibpit1202 at sneakemail dot com    ------------------------------    Date: 27 Apr 2004 12:53:43 -0700- From: elementyl@hotmail.com (James Wilkinson)a Subject: IP TOS supporti= Message-ID: <e2ac4c66.0404271153.5f99968c@posting.google.com>n  Q Is there a way to set the TOS (type of service) field under TCP/IP Services v5.4?i   Jamesa   ------------------------------  + Date: Tue, 27 Apr 2004 19:23:23 +0000 (UTC) - From: lewis@spyder.mitre.org (Keith A. Lewis)s* Subject: Re: Java RMI as detached Process?. Message-ID: <c6mbvb$ktb$2@newslocal.mitre.org>   "Andoni" <andoni@REMOVE.indigo.ie> writes in article <idgjc.5730$qP2.13812@news.indigo.ie> dated Mon, 26 Apr 2004 23:41:57 +0100:tL >I am trying to run a Java RMI program as a detached process and it does not >seem to be possible.o > K >My RMI server works fine and if I register the Java Server with it from my M >telnet window there is no problem and I can access it from my client programo >over the web. >sK >When I try to run my Java Server program as a detached Process it will noteL >work.  I have all the permissions set open and the program runs fine but it2 >will not register itself with the rmiserver part. >bH >Does anyone know of any reason why this may not be working?  Has anyone >found this problem before?l  H Detached processes have a couple of differences which might be affecting you.  I * They do not inherit symbols, logicals or CLI from the creating process,eJ and they do not run LOGIN.COM unless you specify the image as LOGINOUT.EXE* and the input as a script you want to run.  F * By default, quotas for detached processes come from the PQL_D systemG parameters.  "mc sysgen show pql_d" to see them.  Contrast that to youri "show process/quota" numbers.  i  L If you can tell us the exact command you're using to create the process, andJ the error messages from the process (if any), we might be able to tell you more.   0 --Keith Lewis              klewis {at} mitre.org> The above may not (yet) represent the opinions of my employer.   ------------------------------  # Date: Tue, 27 Apr 2004 22:08:01 GMTa& From: jlsue <jefflsxxxz@sbcglobal.net>* Subject: Re: Java RMI as detached Process?8 Message-ID: <fhmt801nr1adnhof9fkv9bksrsvesnp1gm@4ax.com>  F On Mon, 26 Apr 2004 23:41:57 +0100, "Andoni" <andoni@REMOVE.indigo.ie> wrote:   >Hello,c >eL >I am trying to run a Java RMI program as a detached process and it does not >seem to be possible.l >vK >My RMI server works fine and if I register the Java Server with it from myeM >telnet window there is no problem and I can access it from my client program( >over the web. >nK >When I try to run my Java Server program as a detached Process it will notoL >work.  I have all the permissions set open and the program runs fine but it2 >will not register itself with the rmiserver part. >eH >Does anyone know of any reason why this may not be working?  Has anyone >found this problem before?t >   = What command are you using to run this as a detached process?l  K Most likely you really want to RUN LOGINOUT.EXE and use /INPUT= to point toh+ a DCL command file that executes your code.    --- jlsr0 The preceding message was personal opinion only.6 I do not speak in any authorized capacity for anyone,  and certainly not my employer.- (get rid of the xxxz in my address to e-mail)2   ------------------------------  % Date: Tue, 27 Apr 2004 21:18:36 -0400j* From: Chuck Chopp <ChuckChopp@rtfmcsi.com>% Subject: JNI examples link is broken?4: Message-ID: <0xDjc.94618$Lh2.27762@bignews1.bellsouth.net>  L I'm not getting any response from fpt.digital.com when I click on a link in ! the HP / Java / Alpha / FAQ page.'   Here's the link:  F ftp://ftp.digital.com/pub/Digital/info/java/JNI_EXAMPLE.BCK_DCX_AXPEXE  K If I try to get to it via command line FTP, I get a "220-Last Revised: May e" 2001" message and nothing further.  K Probing of HP's FTP servers doesn't seem to be turning up anything useful, eL even under ftp.hp.com/pub/openvms as there's nothing there but freeware zip   files and some BridgeWorks kits.  L The page that I'm viewing when I encounter this link [and others related to  it] is as follows:  1 http://h18012.www1.hp.com/java/faq/ovms.html#4.1ac  G I'm simply trying to download all of the example code & demo apps that a$ involve Java & JNI on OpenVMS Alpha.    M Does anybody on the HP side of things have any idea what happened to the FTP  / server or where these files may now be located?U     TIA,   Chuckd --   Chuck ChoppP  8 ChuckChopp (at) rtfmcsi (dot) com http://www.rtfmcsi.com  @ RTFM Consulting Services Inc.     864 801 2795 voice & voicemail2 103 Autumn Hill Road              864 801 2774 fax Greer, SC  29651  , Do not send me unsolicited commercial email.   ------------------------------  # Date: Tue, 27 Apr 2004 19:27:45 GMTT$ From: "GreyCloud" <mist@Cumulus.com>= Subject: Re: Linux on its way out - unless you are a geek ...n8 Message-ID: <Ruyjc.1958$Wc4.7538@bcandid.telisphere.com>  ( Andrew Harrison SUNUK Consultancy wrote: > Bob Ceculski wrote:r$ >> Andrew Harrison SUNUK Consultancy; >> <Andrew_No.Harrison_No@nospamn.sun.com> wrote in messagen/ >> news:<c6asdg$e9l$1@new-usenet.uk.sun.com>...o >> >>> Bob Ceculski wrote:n >>>lA >>>> Andrew Harrison <andrew_._remove_harrison@su_n.com> wrote int9 >>>> message news:<c6660p$q7g$1@new-usenet.uk.sun.com>...f >>>> >>>>C >>>>> Nor does OpenVMS have the basic plumbing that people require, < >>>>> support Palms etc vi USB, support for USB flash cards,> >>>>> wireless, smart card authentication the list goes on and	 >>>>> on.e >>>>>E
 >>>>> Regardsw >>>>> Andrew Harrisonb >>>> >>>>= >>>> doesn't support palms?  you better tell all of our sitesr= >>>> that are using pdas that ... we upload and download frome5 >>>> and to our vms based accounting system daily ...  >>>e9 >>> Can you connect something like a Tungsten T which hasu9 >>> a USB cradle with an OpenVMS system and sync to it ??i >>>n >>> Regards  >>> Andrew Harrison  >> >>A >> no, but I can connect with good old ethernet and ftp to it ...  >m< > Now that just about tops it Bob, thanks for the insight on, > how you sync your PDA to your OpenVMS box. >   L How many people really use PDAs?  Last I heard that this market really isn'tJ moving as well as some people thought it would.  I've seen a few instancesL where PDAs came in handy like inventory, but usually the mobile requirementsK are turned to custom apps like water meter readers and such.  How much calle does Sun see for PDAs?   ------------------------------   Date: 28 Apr 2004 03:02:27 GMT From: healyzh@aracnet.comoE Subject: Re: OT: Advertisers are watching your every moves on the web , Message-ID: <c6n6s3016mj@enews3.newsguy.com>  . JF Mezei <jfmezei.spamnot@teksavvy.com> wrote:P > I think that all browsers should disable the "onunload" action when a web pageO > is closed.  This article confirms to me that keeping javascript turned off isf > a good thing.s  K My guess is that getting thier IP addresses out so that people can firewallkH them might help as well.  On Windows there is an excellent registry hack1 called IE-SPYAD to help stop this sort of thing. P. http://www.staff.uiuc.edu/~ehowes/resource.htmE I've found it to be great for keeping Spyware off of Windows systems.t  M > What I don't quite understand is how these ad companies end up knowing yourg > name and telephone number.  O > It seems that the US government isn't the only one to whome the "Big brother""A > monicker can be applied. Ad companies are going bezerk on this.   9 It boils down to what should be illegal use of databases.    	Zaneo   ------------------------------  % Date: Tue, 27 Apr 2004 17:14:08 -0400r- From: JF Mezei <jfmezei.spamnot@teksavvy.com>e+ Subject: OT: Failure of Windows good for HPn, Message-ID: <408ECD16.218AA440@teksavvy.com>  1 http://news.com.com/2100-7355-5201041.html?tag=nlt  I It is about ANZ bank's effort to limit on-line fraud. When will these CIOsN idiots learn that Windows just doesn't cut it for serious stuff ?  $30 millionW dollars (AUD) wasted because some CIO decided to move to Windows.  Relevant paragraphs:e   ##J One high-profile ANZ tech initiative, the Next Generation Switching/TandemM replacement project, has already fallen foul of the merger. The banking group H said it had written off $14.7 million (20 million Australian dollars) inI capitalized software in the six-month period on the project "as it became N apparent that expected benefits would not materialize." That amount was on top4 of $7.4 million provided in the previous half year.   I The ambitious Next Generation Switching project was reportedly one of theCI first to use Microsoft Windows on a large scale for ATM and point-of-saler transactions.   M However, according to a report in the Australian Financial Review, the bank'sDL new chief information officer, Mike Grimes, ditched the project earlier thisJ month, citing integration issues associated with the NBNZ acquisition. ANZJ will reportedly now stay with Hewlett-Packard's Tandem mainframe product.  ##  I This Mike Grimes deserves a good round of applause. Now, if we could only.8 convince him to ditch Tandem and go with VMS instead :-)   ------------------------------  % Date: Tue, 27 Apr 2004 15:51:29 -0400a- From: JF Mezei <jfmezei.spamnot@teksavvy.com>  Subject: Re: OT: Scalability, Message-ID: <408EB9BD.F22C6BD7@teksavvy.com>   Ravi V Prasad wrote:F > My article in Hindustan Times on flaws in Electronic Voting Machines< > http://www.hindustantimes.com/news/181_710775,00120001.htm   Thanks for the article.   M I guess that the software should be made public domain in all voting systems, M just like voting procedures for manual votes are also fully documented.  TheyIL would be opened to scrutiny and any flaw that is found could then be sent toR the election comission who would then require trhe contractor to fix the software.  N This way, there could be no conspiracy theories. So the contractor might get aN few eggs on its face if some flaws are found, but in the end, if they react toJ those and fix it, they could come out OK and the election would be better.  K Cisco recently had flaws in its IOS software uncovered, and they are fixing32 them. Cisco's stock hasn't tanked because of this.  M But in the case of India, if you manufacture 1 million machines, is it reallypN feasable to put election officials from major parties who follow machines fromF manufacturing all the way to voting booths to ensure there has been no tampering ?2  F Perhaps what is really needed is a hybrid system that records the voteH electronically, but also prints out a ballot that is then dropped into aN conventional box.  This way, they could revert to manual counting should there be some need to.   ------------------------------  # Date: Tue, 27 Apr 2004 22:00:17 GMTi& From: jlsue <jefflsxxxz@sbcglobal.net>K Subject: Re: SYS$SCRATCH, logicals pointing to disks, cluster-wide logicals08 Message-ID: <n2mt80dkaeq5rvrj0fq69cq3brio73abif@4ax.com>  I On Sun, 25 Apr 2004 13:32:01 +0000 (UTC), helbig@astro.multiCLOTHESvax.dem1 (Phillip Helbig---remove CLOTHES to reply) wrote:e  H >I used to have a disk with label SCRATCH.  When mounted, the /SYS/EXEC I >logical DISK$SCRATCH is created.  For most accounts, SYS$SCRATCH points  J >to a directory on DISK$SCRATCH.  Now, for various reasons, I have a disk J >with another label as the scratch disk, and DEF/SYS/EXEC DISK$SCRATCH to H >point to this other disk, which is mounted normally and has the normal * >logical associated with its volume label. >nF >For various reasons, I don't want to add a logical name to the MOUNT 	 >command.0 >1? >What I'm thinking of is defining the DISK$SCRATCH logical as a D >cluster-wide logical, rather than in the system table on each node. >AE >Could this create any problems?  Many applications use SYS$SCRATCH; tC >suppose it points to a directory on a disk whose name is itself a  H >logical---could there be an implicit assumption to honour this only if  >it is in the SYSTEM directory?   : The DISK$SCRATCH logical doesn't have any special meaning.  G Where do you define SYS$SCRATCH to point to DISK$SCRATCH?  Why not just ) modify it there to point to the new disk?h   --- jls 0 The preceding message was personal opinion only.6 I do not speak in any authorized capacity for anyone,  and certainly not my employer.- (get rid of the xxxz in my address to e-mail)M   ------------------------------  % Date: Tue, 27 Apr 2004 14:59:48 -0400 ) From: "bArtMAnBarTManbaRtMaN" <bman@bman>14 Subject: Re: The JF MEZEI FAQ - Revised and Updated!' Message-ID: <c6maj9$lh7$0@pita.alt.net>   B bartmanbartmanbartman!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!      , "Xomicron" <xomicron@wp.pl> wrote in message% news:TNtjc.2937$5a.1118@okepread03...t* > Nomen Nescio <nobody@dizum.com> wrote in2 > news:6bccd5e273f7dae44471ff4a0087b1ec@dizum.com: >s > > FREQUENTLY ASKED QUESTIONS > >    About > > JF MEZEI > >0 > > (Rev. Apr. 24, 2004) > >- > > 1.  Who is JF Mezei? > >eK > > Jean-Francois Mezei is the worst netkook and megatroll to have ever hitiJ > > rec.travel.air and various other usenet newsgroups.  He is also one of1 > > the longest running trolls in usenet history.s > >cG > > ***WARNING:  JF MEZEI IS A ROGUE CANCELLER.  HE FORGES THE NAME AND G > > E-MAIL ADDRESS OF USENET POSTERS HE DOES NOT AGREE WITH AND CANCELS  > > THEIR MESSAGES.*** > >oI > > If you participate in the same newsgroups he does, you should monitorcI > > the control.cancel newsgroup.  If you find that he has cancelled yourI@ > > messages, forward a copies of them to abuse@teksavvy.com and > > usenet@news.wplus.net .O > > & > > 2.  How long has he been trolling? > >i > > For well over a decade.  > >H > > 3.  Where does he live?o > >  > > Montreal, Quebec, Canada > >  > > Jean-Francois Mezeit > > 86 Harwood Gaten > > Beaconsfield, QC H9W3A3y > > (514) 695-8259 > >e6 > > His current e-mail address is jfmezei@teksavvy.com > >-. > > 4.  What makes him such a malicious troll? > >mL > > His trolling is constant, repetitious, relentless.  Once he invades yourJ > > newsgroup he will stay for decades, troll around the clock, day in andL > > day out, every day of the year, for years and years on end.  He does notH > > listen to pleas to stop, he does not listen to anything anyone tellsL > > him, he does not pay attention when the misinformation/disinformation heH > > posts is corrected, he just goes right on trolling year in, year outK > > like a little child holding his ears closed while yelling "I can't hearc( > > you, I can't hear anything you say!" > >e! > > 5.  What does he troll about?m > >oJ > > His favorite subjects are USA-bashing and anything to do with sex.  HeK > > hates the USA and Americans and will hijack any thread and turn it into I > > a USA-bashing fest.  If he can't do that then he'll just start makings > > lewd posts.n > >v( > > 6.  What does he hate about the USA? > > K > > Everything!  He is part of a larger group of Canadian trolls who have a>G > > visceral hatred of the USA, motivated by envy mostly.  The USA is aaL > > happier, better, more successful version of their country and they can'tJ > > stand it.  Some of JF's favorite troll bait is "the Bush regime", "theG > > Bush-Rumsfeld-Wolfowitz axis of evil", "Americans are brainwashed",tE > > "Cars are evil", "SUVs are evil", "all Americans are stupid" etc.  > >>' > > 7.  What about his sexual trolling?  > > I > > Ah, that is JF at his trolling best.  No sexual topic is too bizarre.>B > > Among his favorites are child sexuality, masturbation, women'sE > > genitalia, sex toys, circumcision, the sex lives of Americans (ofu$ > > course) ... the list is endless. > >e > > 8.  Circumcision???r > >eJ > > Yes, JF trolled the circumcision newsgroups for years.  He still likes@ > > to insert circumcision into his trolling every now and then.G > > Apparently, JF was traumatized as a child because his parents, poor L > > Hungarian immigrants to Canada, left him uncircumcised when he was born,J > > as is the custom in most of the world. Growing up in Canada where maleI > > infant circumcision was prevalent at the time, he was psychologicallyrK > > scarred (so he claims).  As soon as he could he arranged to get himselfaJ > > snipped, and then joined the brigades of circumcision proselytizers inJ > > the newsgroups advocating the joys of a free willy.  His main argumentJ > > is how much better he was able to masturbate after getting circumcisedJ > > without that "pesky foreskin" getting in the way of his enjoyment, andI > > he has made it his mission in life to spread the circumcision gospel.i > > L > > 9.  What's his interest in child sexuality?  That sounds kind of freaky. > >lD > > Well, everything having to do with Mezei *is* freaky.  Among theI > > subjects dear to his heart are the genitals of little boys and girls,tI > > especially little boy's foreskins (and how tight they are) and little D > > girls' hymens.  He is also a tireless activist and advocate thatL > > children should be taught to masturbate early on so that they don't grow+ > > up "sexually repressed like Americans".t > >hI > > He also counsels all parents of boys that they constantly check theirhG > > little boys' penises and foreskins frequently to ensure a good fit,bJ > > proper movement, and that they be able to masturbate with no problems.L > > Utopia for JF would be a world full of parents manipulating their little > > boys' penises. > >rL > > 10.  Ewww!  This guy is sounding more and more disgusting by the minute!' > >  Are you sure about all this stuff?k > >pH > > Yes, you can check the google archives for yourself.  There's over a+ > > decade full of Mezei trolling in there.- > >-L > > 11.  How can I find all that out, doesn't he change aliases all the time > > like all trolls do?  > >cF > > Of course!  See the appendix below for a list of many of his known > > trolling aliases.i > >eK > > 12.  So where does this guy get so much time to troll, doesn't he work?N > >"I > > Ha ha ha!  JF hasn't worked a day in his life!  He's an adult baby, asG > > grown man who still lives at home with mommy and sleeps all day andsD > > trolls the newsgroups all night.  In his free time when he isn'tJ > > trolling he likes to ride his bike down to Dorval Airport and race the' > > planes down the runway in his bike.o > > = > > 13.  That seems strange, is he mentally ill or something?- > >-L > > Bingo!  JF is a boy in a grown man's body.  Psychologically he never gotG > > past the age of 13 and got stuck in a world of bathroom humor (i.e. L > > "pull my finger!") and locker room antics that he has never been able to > > outgrow. > >rG > > 14.  Speaking of locker rooms, I heard he has a sexual fetish about> > > them, is that true?> > >>K > > Yes!  JF goes to the gym not to work out but to watch men in the locker F > > room. He loves to post about the male sexual organs he has seen inH > > locker rooms over the years, especially his unnatural obsession withL > > foreskins.  He stalks the men in locker rooms trying to measure how muchL > > foreskin they have, or how little is left if they have been circumcised.@ > >  He gets extremely excited when he spots a case of phimosis. > >fK > > 15.  Oh my Gawd, this guy is nuts!  He should be locked up in an insaneo > > asylum!m > > H > > Yep, JF is certifiably insane.  He lives in a black helicopter / tin? > > foil hat world where others are out to get him.  The key todJ > > understanding JF is that he sees himself as a VICTIM.  To JF the worldH > > is out to get him, especially the USA.  Victimhood is what JF is all
 > > about. > >tH > > What seems to have sent him over the edge was when the Canadian railH > > system was "killed", in his words.  He used to be a major train nut,L > > spotting trains, writing down their numbers and chasing them down at theL > > train yard like a good freak.  Then he turned his attention to aviation.L > >  Major events that made him fall head first deep into the abyss were theH > > bankruptcy of Canadian Airlines and their subsequent takeover by AirF > > Canada (whom he sees as evil).  So paranoid is he that when an AirJ > > Canada plane crashed he claimed that Air Canada employees went lurkingF > > about in the night with buckets of white paint to cover up the AirH > > Canada markings.  He saw that as symbolic of a cover up of the crash5 > > investigation.  He has never recovered from this.t > > : > > 16.  Where else does he hang out, I want to avoid him! > > J > > His main haunt on usenet is comp.os.vms, a newsgroup dedicated to someI > > ancient, arcane, obsolete piece of vax crapware that nobody has takenaL > > seriously for decades.  JF hangs out there with other misfits and socialI > > dropouts who share his psychological traumas, crying for the good old,, > > vax days of yore.  It's really pathetic! > >w% > > 17.  Where else does he hang out?o > >-D > > can.internet.highspeed, alt.cellular.fido, and a few other geekyH > > computer groups.  For a while after the Shuttle Columbia disaster heF > > invaded the sci.space groups, sci.space.shuttle in particular, andJ > > trolled it relentlessly with the anti-American, conspiracy theory crapI > > he's so famous for.  But they ran him off that group and he had to goSL > > crawling back to comp.os.vms with his tail between his legs, licking his > > wounds.o > >.E > > 18.  It sounds like comp.os.vms is the only group he respects andt > > doesn't troll. > >sJ > > Pretty much.  For a megatroll like JF it's impossible not to troll, soK > > he slips in troll bait every now and then, but by and large he respects E > > comp.os.vms, and, more importantly, he tries to hide his trollingoK > > activities from them so they won't find out what a major netkook he is.  > > J > > 19.  Wow, sounds like he should be exposed so they will know what kind > > of psycho he is! > > I > > Exactly.  Feel free to post all his trolls to comp.os.vms.  And while J > > you're at it post them to can.internet.highspeed and alt.cellular.fidoC > > too.  And to alt.usenet.kooks, a group for the likes of JF, andb  > > news.admin.net-abuse.usenet. > >l8 > > 20.  What else can I do?  Is there an abuse address? > >fL > > Yes, you should send complaints along with copies of his troll posts to: > >h. > > abuse@teksavvy.com , dnsadmin@teksavvy.com > > usenet@news.wplus.nett > >O; > > You can also call directly, troll free, 1-877-779-1575.  > >  > > TekSavvy Solutions Inc.m > > 330 Richmond St., Suite 205  > > Chatham, ON, Canadag > > N7M 1P7I > >nH > > And feel free to distribute this FAQ freely.  Post it to newsgroups,G > > email it to people, you may host it at your own website, send it to H > > newspapers and magazines that do Internet articles or anything to do! > > with Montreal or Canada, etc.o >n > Sounds like a cool dude.   ------------------------------    Date: 27 Apr 2004 18:11:38 -0700& From: omegawell@yahoo.com (Omega Well)4 Subject: Re: The JF MEZEI FAQ - Revised and Updated!= Message-ID: <6b389982.0404271711.146de48e@posting.google.com>o  X "bArtMAnBarTManbaRtMaN" <bman@bman> wrote in message news:<c6maj9$lh7$0@pita.alt.net>...D > bartmanbartmanbartman!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! >  >  > . > "Xomicron" <xomicron@wp.pl> wrote in message' > news:TNtjc.2937$5a.1118@okepread03... , > > Nomen Nescio <nobody@dizum.com> wrote in4 > > news:6bccd5e273f7dae44471ff4a0087b1ec@dizum.com: > >u  > > > FREQUENTLY ASKED QUESTIONS > > >    About > > > JF MEZEI .r .r .g   Nomen Nescio loves JF!   .s .t .  > >s > > Sounds like a cool dude.   Nomen Nescio loves JF!   ------------------------------  # Date: Wed, 28 Apr 2004 04:06:32 GMT.  From: "~ Darrell ~" <me@here.eh>4 Subject: Re: The JF MEZEI FAQ - Revised and Updated!M Message-ID: <c5Gjc.303562$2oI1.42856@twister01.bloor.is.net.cable.rogers.com>   3 "Omega Well" <omegawell@yahoo.com> wrote in messagec7 news:6b389982.0404271711.146de48e@posting.google.com...t6 > "bArtMAnBarTManbaRtMaN" <bman@bman> wrote in message# news:<c6maj9$lh7$0@pita.alt.net>... F > > bartmanbartmanbartman!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! > >d > >h > >z0 > > "Xomicron" <xomicron@wp.pl> wrote in message) > > news:TNtjc.2937$5a.1118@okepread03...2. > > > Nomen Nescio <nobody@dizum.com> wrote in6 > > > news:6bccd5e273f7dae44471ff4a0087b1ec@dizum.com: > > >h" > > > > FREQUENTLY ASKED QUESTIONS > > > >    About > > > > JF MEZEI > .N > ." > .p >n > Nomen Nescio loves JF! >e? but was rebuffed ... sounds like a cyber-stalker, jilted lover.p   ------------------------------  + Date: Wed, 28 Apr 2004 05:14:35 +0000 (UTC)s6 From: peter@langstoeger.at (Peter 'EPLAN' LANGSTOEGER)= Subject: Re: VMS 7.3-2, TCPIP 5.4: which to upgrade to first?A0 Message-ID: <newscache$kt7vwh$mui$1@news.sil.at>  n In article <9f7f13a8.0404260710.40be11cb@posting.google.com>, alexdaniels@themail.co.uk (Alex Daniels) writes:D >Also if you want to use 5.4 with the Performance Kernel (which willG >become default in 5.5 anyway) you will need 7.3-2. 5.4 without it runso= >on 7.3-1 though. Makes a big difference on loaded SMP boxes.o  K Not only on loaded SMP boxes. I so far heard/read of three or four productsm3 which still do not work with the Scalable Kernel...l  F On my single processor systems at home, I run the PERF=ALL and have no/ problems (but also no performance win), though.r   -- o Peter "EPLAN" LANGSTOEGERa% Network and OpenVMS system specialistr E-mail  peter@langstoeger.atF A-1030 VIENNA  AUSTRIA              I'm not a pessimist, I'm a realist   ------------------------------   End of INFO-VAX 2004.234 ************************