1 INFO-VAX	Tue, 14 Jun 2005	Volume 2005 : Issue 329       Contents: AlphaVMS 8.2 Change docs RE: AlphaVMS 8.2 Change docs Re: AlphaVMS 8.2 Change docs4 ARE YOU READY TO BE RICH TODAY ?????!!!! COOOOOOL !! backup Encryption PAK/Product ! Re: backup Encryption PAK/Product ! Re: backup Encryption PAK/Product ! Re: backup Encryption PAK/Product $ backup Hardware Encryption SCSI TAPE  Re: Batch utility to crop images  Re: Batch utility to crop images Re: cluster over DSL" Re: DEC retail stores in the 1980s" Re: DEC retail stores in the 1980s( Determine who created a detached process, Re: Determine who created a detached process, Re: Determine who created a detached process4 Re: Determine who created a detached process (AUDIT)4 Re: Determine who created a detached process (AUDIT)) Re: Hurd undoes Carly's last major change  OpenVMS Boot Camp report Re: OpenVMS Boot Camp report Re: OpenVMS Boot Camp report- Re: Question about MOUNT in multiple clusters  Re: Some DCL wish items  Re: Some DCL wish items 9 Re: Sueposium: Five days of peace and VMS. Thank you Sue! ' TCPIP : Let RIP set the default route ?  Re: vms and linux  Re: vms and linux  Re: vms and linux ( Re: What Terminal Servers are you using?. [RT] HP offers POLA for "virus-free computing"  F ----------------------------------------------------------------------  % Date: Mon, 13 Jun 2005 14:19:20 -0600 6 From: "Michael D. Ober" <obermd.@.alum.mit.edu.nospam>! Subject: AlphaVMS 8.2 Change docs / Message-ID: <cTlre.40$bf1.1729@news.uswest.net>   E Does anyone have a pointer to the "changed and upgraded" document for 2 AlphaVMS 8.2?  We currently having AlphaVMS 7.3-2.   Thanks, 
 Mike Ober.   ------------------------------  % Date: Mon, 13 Jun 2005 17:16:39 -0400 ' From: "Main, Kerry" <kerry.main@hp.com> % Subject: RE: AlphaVMS 8.2 Change docs R Message-ID: <FD827B33AB0D9C4E92EACEEFEE2BA2FB6509E9@tayexc19.americas.cpqcorp.net>  
 Kerry Main Solutions Architect  Hewlett-Packard (Canada) Co.! Consulting & Integration Services  Voice: 613-592-4660  Fax   : 613-591-4477 Email: Kerry.Main@hp.com =20    > -----Original Message-----B > From: Michael D. Ober [mailto:"obermd."@.alum.mit.edu.nospam]=20 > Sent: June 13, 2005 4:19 PM  > To: Info-VAX@Mvb.Saic.Com # > Subject: AlphaVMS 8.2 Change docs  >=20G > Does anyone have a pointer to the "changed and upgraded" document for 4 > AlphaVMS 8.2?  We currently having AlphaVMS 7.3-2. >=20	 > Thanks,  > Mike Ober. >=20 >=20 >=20   Mike -   Check out V8.2 doc site:- http://h71000.www7.hp.com/doc/os82_index.html   ! Scroll down to New Features Guide   
 Kerry Main Senior Consultant  HP Services Canada Voice: 613-592-4660  Fax: 613-591-4477  kerryDOTmainAThpDOTcom (remove the DOT's and AT)=20  4 OpenVMS - the secure, multi-site OS that just works.   ------------------------------  % Date: Mon, 13 Jun 2005 15:30:42 -0600 6 From: "Michael D. Ober" <obermd.@.alum.mit.edu.nospam>% Subject: Re: AlphaVMS 8.2 Change docs / Message-ID: <8Wmre.58$j85.3519@news.uswest.net>   % Thanks - just what I was looking for.   
 Mike Ober.  2 "Main, Kerry" <kerry.main@hp.com> wrote in messageL news:FD827B33AB0D9C4E92EACEEFEE2BA2FB6509E9@tayexc19.americas.cpqcorp.net...    
 Kerry Main Solutions Architect  Hewlett-Packard (Canada) Co.! Consulting & Integration Services  Voice: 613-592-4660  Fax   : 613-591-4477 Email: Kerry.Main@hp.com     > -----Original Message-----? > From: Michael D. Ober [mailto:"obermd."@.alum.mit.edu.nospam]  > Sent: June 13, 2005 4:19 PM  > To: Info-VAX@Mvb.Saic.Com # > Subject: AlphaVMS 8.2 Change docs  > G > Does anyone have a pointer to the "changed and upgraded" document for 4 > AlphaVMS 8.2?  We currently having AlphaVMS 7.3-2. > 	 > Thanks,  > Mike Ober. >  >  >    Mike -   Check out V8.2 doc site:- http://h71000.www7.hp.com/doc/os82_index.html   ! Scroll down to New Features Guide   
 Kerry Main Senior Consultant  HP Services Canada Voice: 613-592-4660  Fax: 613-591-4477  kerryDOTmainAThpDOTcom (remove the DOT's and AT)   4 OpenVMS - the secure, multi-site OS that just works.   ------------------------------    Date: 13 Jun 2005 14:57:25 -0700! From: amolaahh@hotmail.com (loza) = Subject: ARE YOU READY TO BE RICH TODAY ?????!!!! COOOOOOL !! = Message-ID: <48037a00.0506131357.11f593fa@posting.google.com>   = START MAKING MONEY TODAY !!!!!!!!!!! COOOOOOOOOOOL !!!!!!!!!! & 1. Make 800,000$ in 3months!! EASY!!! H Dear Friends: Greetings: I am a retired attorney. A few years ago a man G came to me with a letter. He asked me to verify the fact that this was  F legal to do. I told him I would review it and get back to him. When I B first read the letter my client brought me, I thought it was some B "off-the-wall" idea to make money. A week and a half later we met G in my office to discuss the issue. I told him the letter he originally  F brought me was not 100% legal. My client then asked me to alter it to E make it perfectly legal. I asked him to make one small change in the  H letter. I was still curious about the letter, so he explained to me how E it works. I thought it seemed like a long shot, so I decided against  A participating. But before my client left, I asked him to keep me  H updated on his results. About two months later, he called me to tell me C he had received over $800,000 in cash. I didn't believe him, so he  F asked me to try this idea and find out for myself. I thought about it B for a couple of days and decided I really didn't have anything to ? lose, so I asked him for a copy of the letters. I followed the  D instructions exactly, mailed 200 copies, and sure enough, the money D started coming in! It arrived slowly at first, but coming. I kept a G precise record of the earnings, and in the end, it totaled $978,493! I  D could hardly believe it. I met with my friend for lunch to find out H exactly how it worked. He told me there are quite a few similar letters E around, but this one is different because there are six names at the  F end of the letter, not five like some others. This fact alone results F in your name being in far more returns. The other fact was the help I G gave him, making sure the whole thing was legal, since no one wants to  * take the risk of doing something illegal. G : By now you are surely curious to know what small changes to make. If  F you sent a letter like this one out, in order to be completely legal, A you must actually sell something in order to receive a dollar in  H return. So when you send a dollar to each of the names on the list, you C must include these words, "PLEASE PUT ME ON YOUR MAILING LIST" and  H include your name and address. This is the key to the program. The item H you will receive for the dollar you sent to the six people below is the  letter. H : At the time I first tried this idea, I was earning a good living as a F lawyer. But everyone in the legal profession will tell you there is a F lot of stress that comes with the job. I told myself if things worked F out, I would retired from my practice and play golf. I decided to try H the letter again, but this time I sent 500 copies. Three months later ,  I had totaled $2,341,178! A : Here are a few reasons a person might give for not trying this  E program:  Some people think they can never make a lot of money with  C anything this simple.  Some are afraid they will be ridiculed for  G trying  Some dream of large sums of money, but do nothing to actually  D achieve it.  Some are just plain lazy.  Some are afraid of losing G their investment. They think this program is designed to beat them out   of a few dollars. D : The system works if you will just try it. But you must follow the E simple instructions exactly, and in less than three months, you will  E receive $800,000 GUARANTEED! Keep what you are doing to yourself for  F awhile. Many will tell you it won`t work and will try to talk you out > of your dreams. Let them know of your success after it works. - : LETTERS FROM PARTICIPANTS IN THIS PROGRAM:  C : My name is David Rhodes. In 1992 my car was repossessed and bill  H collectors were housing my. I was laid off and my unemployment ran out. H In October of 1992, I received a letter telling me how to earn $800,000 C anytime I wanted. Of course, I was skeptical. But because I was so  A desperate and virtually had nothing to lose, I gave it a try. In  H January 1993, my family and I went on a 10-day cruise. The next month I F bought a brand new Mercedes with cash! I am currently building a home D in Virginia and I will never have to work again. This money program G really works perfectly every time. I have never failed to receive less  G than $500,000. This is a legitimate, money-making opportunity. It does  H not require you to sell anything or to come in contact with people. And D , best of all, you only leave the house to mail the letters. If you F have always believed that someday you would get the lucky break, then : simply follow the instructions and make dreams come true. H : Larry McMahon, Norfolk, VA Six months ago, I received this letter and F ignored it. Five more came within a period of time and I ignored them E also. I was tempted, but I was convinced that they were just a Hoax.  D After three weeks of deliberating, I decided to give it a try ( not E expecting much ). Two weeks went by and nothing happened. The fourth  E week was unbelievable! I cant say I received $800,000 but I received  G $400,000. For the first time in years, I am debt free. I am doing this  H again, only this time starting with 500 post. I strongly recommend that @ you follow the instructions exactly as outlined in this letter.  : INSTRUCTIONS  G 1. Immediately send $1.00 to each of the six people on the list at the  C end of this letter. Wrap the dollar bill in a note saying " Please  @ add me to your mailing list" and include your name and address. D : 2. Copy this letter. You do not have to type it 200 times. Simply F place your cursor at the top of the page, hold it and drag it all the C way down to the end of the letter. Then click on "edit" and select  G "copy". Now open up a notepad file on your computer and put the cursor  G at the top of the page in the notepad, click on 'edit' and then select  < 'paste' it will copy the letter for you onto your computer. E : 3. Remove the name next to the #1 on the list and move the rest of  H the names up one position (#2 becomes #1, #3 becomes #2, etc.....) Then H place your name in the #6 position. Then save it, make sure it is saved  as a txt. file. D : 4. When you have completed the instructions, take this letter and @ then go to (Google,Yahoo,...) and type in (Making Money Massege E board,or post massege,...)and start posting your copy to 200 message  E boards,or more this is only the minimum, you can post as much as you  G like...The more copies you send the better the results. Keep a copy of  F this letter so you can use it a second time. Post it out again in six H months, but Post it with the addresses you receive with each dollar. It E will work better the second time. NOTE: This service is 100% legal -  C (Refer to title 18 section 1302 of the U.S. Postal & lottery laws)  F : How does it work? When you send out 200 Posts, it is estimated that H at least 15 people will respond and send you a $1.00. ($15.00) Those 15 G will Post 200 Posts each and 225 people send you $1.00 ($225.00) Those  ? 225 people Post 200 Posts each and 3,375 people send you $1.00  H ($3,375.00) Those 3,375 post 200 posts each and 759,375 people send you G $1.00 ($759,375.00) At this point your name drops off the list, but so  G far you have received $813,615.00. P.S. When your money begins to come  H in, give the first 10% to charity with spirit and share a good fortune! F : important tip - Cover money by paper fully by which it can not been H seen in light , because postal employees do some cheat some times....ok K 1. Manal Qutob 1100CAVEN ST unit 612, MISSISSAUGA, ONTARIO L5G 4N3, CANADA    > 2. Munira Ali  SAUDI ARABIA P.O.Box : 65085  Riyadh : 11556   9 3. Abdullah H.  Saudi Arabia P.O.BOX 58097 - RIYADH 11594 / 4. Omar Ali Mohammed  P.O.BOX 17566 -KALBA.UAE  = 5. Hamdan Moh. SAUDI ARABIA P.O.Box : 65084  Riyadh : 11556  8 6. wajdi a.aziz- SAUDI ARABIA P.O.Box 18456 Jeddah 21415   ------------------------------  % Date: Mon, 13 Jun 2005 18:15:35 -0400 # From: "Hal Kuff" <kuff@comcast.net> & Subject: backup Encryption PAK/Product0 Message-ID: <11as1cah9vk23c8@corp.supernews.com>  L Does anyone know if OpenVMS Backup Encryption requires a PAK or just a kit? K I'm trying to contact the HP license loan program and can not seem to find  K those folks other than a confusing series of circular references on the HP   web site....  / the master product code seems to be QL-081A-??     ------------------------------  % Date: Mon, 13 Jun 2005 18:23:00 -0400 6 From: Brad Hamilton <brMadAhaPmiSlton@coMmcAasPt.Snet>* Subject: Re: backup Encryption PAK/Product0 Message-ID: <5qWdnaTuZMHZmjPfRVn-1Q@comcast.com>   Hal Kuff wrote: N > Does anyone know if OpenVMS Backup Encryption requires a PAK or just a kit? M > I'm trying to contact the HP license loan program and can not seem to find  M > those folks other than a confusing series of circular references on the HP   > web site.... > 1 > the master product code seems to be QL-081A-??   >  >   > The last time I checked ( a year or so ago ) a PAK was needed.  I I did not find the information from HP, but from one of their resellers.  G   I got the same circular treatment, in person as well as online...	:-)    ------------------------------  % Date: Mon, 13 Jun 2005 16:56:41 -0700 ( From: Jeff Cameron <roktsci@comcast.net>* Subject: Re: backup Encryption PAK/Product/ Message-ID: <BED36B49.F8DD%roktsci@comcast.net>   G On 6/13/05 3:15 PM, in article 11as1cah9vk23c8@corp.supernews.com, "Hal  Kuff" <kuff@comcast.net> wrote:   M > Does anyone know if OpenVMS Backup Encryption requires a PAK or just a kit? L > I'm trying to contact the HP license loan program and can not seem to findL > those folks other than a confusing series of circular references on the HP > web site.... > 0 > the master product code seems to be QL-081A-?? >  > H Yes, it does require a PAK. I just got mine, and we found a bug with theH /ENCRYPT/SAVE_SET in Backup. Backup aborts with an access violation when. /ENCRYPT is used in conjunction with /JOURNAL.   HP is looking into it.   Jeff Cameron   ------------------------------  % Date: Mon, 13 Jun 2005 20:27:30 -0400 # From: "Hal Kuff" <kuff@comcast.net> * Subject: Re: backup Encryption PAK/Product0 Message-ID: <11as93ud55f7ud3@corp.supernews.com>  H Thanxs, I'll keep a lookout for that one... you know with all the tapes J getting lost in transit to Iron Mountain and so forth, and with having to L report lost tapes to the SEC and state authorities, encryption is mandatory  going forward....     6 "Jeff Cameron" <roktsci@comcast.net> wrote in message ) news:BED36B49.F8DD%roktsci@comcast.net... I > On 6/13/05 3:15 PM, in article 11as1cah9vk23c8@corp.supernews.com, "Hal ! > Kuff" <kuff@comcast.net> wrote:  > J >> Does anyone know if OpenVMS Backup Encryption requires a PAK or just a  >> kit? I >> I'm trying to contact the HP license loan program and can not seem to   >> find K >> those folks other than a confusing series of circular references on the   >> HP  >> web site....  >>1 >> the master product code seems to be QL-081A-??  >> >>J > Yes, it does require a PAK. I just got mine, and we found a bug with theJ > /ENCRYPT/SAVE_SET in Backup. Backup aborts with an access violation when0 > /ENCRYPT is used in conjunction with /JOURNAL. >  > HP is looking into it. >  > Jeff Cameron >    ------------------------------  % Date: Mon, 13 Jun 2005 20:12:14 -0700 ( From: Jeff Cameron <roktsci@comcast.net>- Subject: backup Hardware Encryption SCSI TAPE / Message-ID: <BED3991E.F8EE%roktsci@comcast.net>   I I'm also finding SCSI Tape Hardware encryption, that encrypts every block K written to tape. This is not as flexible as the VMS software where keys can  be changed easily.  C One other thing we are finding out, it that encryption (Hardware or J Software) most often causes tape compaction to be much less efficient. ButK in most cases this is not important because security is much more important  than capacity.   Jeff    G On 6/13/05 5:27 PM, in article 11as93ud55f7ud3@corp.supernews.com, "Hal  Kuff" <kuff@comcast.net> wrote:   I > Thanxs, I'll keep a lookout for that one... you know with all the tapes K > getting lost in transit to Iron Mountain and so forth, and with having to M > report lost tapes to the SEC and state authorities, encryption is mandatory  > going forward....  >  > 7 > "Jeff Cameron" <roktsci@comcast.net> wrote in message + > news:BED36B49.F8DD%roktsci@comcast.net... J >> On 6/13/05 3:15 PM, in article 11as1cah9vk23c8@corp.supernews.com, "Hal" >> Kuff" <kuff@comcast.net> wrote: >>  J >>> Does anyone know if OpenVMS Backup Encryption requires a PAK or just a >>> kit?I >>> I'm trying to contact the HP license loan program and can not seem to  >>> findK >>> those folks other than a confusing series of circular references on the  >>> HP >>> web site.... >>> 2 >>> the master product code seems to be QL-081A-?? >>>  >>> K >> Yes, it does require a PAK. I just got mine, and we found a bug with the K >> /ENCRYPT/SAVE_SET in Backup. Backup aborts with an access violation when 1 >> /ENCRYPT is used in conjunction with /JOURNAL.  >>   >> HP is looking into it.  >>   >> Jeff Cameron  >>   >  >    ------------------------------  % Date: Mon, 13 Jun 2005 14:45:49 -0400 0 From: "Jeff Morgan" <vmswiz@geonospamcities.com>) Subject: Re: Batch utility to crop images - Message-ID: <d8kk8v$ago8$1@news3.infoave.net>   E Here's a short piece of DCL to create a "thumbnails" directory for a  : directory full of JPEGs. Works great submitted to batch...  L If the thumbnail is missing it creates it. If the original picture is newer E than the current thumbnail, it replaces the thumbnail with a new one.   J Thumbnails are 150x150 pixels and the picture aspect ration is maintained.  I ImageMagick is an awesome tool! Check the documentation for the mconvert  % command and all the things it can do.      $ ! make_thumbs  $       set noonD $       if f$search("thumbs.dir") .eqs. "" then create/dir [.thumbs] $  $ find_pic:  $       x = f$search("*.jpg")  $       if x .eqs. "" then exit  $ # $       fname = f$parse(x,,,"name") # $       ftype = f$parse(x,,,"type")  $  $       ffile = fname + ftype  $ 3 $       thumbfile = f$search("[.thumbs]''ffile'",2) 4 $       if thumbfile .eqs. "" then goto create_thumbC $       if f$file_attrib(thumbfile,"eof") .eq. 0 then goto find_pic  $ > $       credt  = f$cvtime(f$file_attrib(x,"cdt"),"comparison") $       tcredt =  ? f$cvtime(f$file_attrib("[.thumbs]''ffile'","cdt"),"comparison")  $       if tcredt .lts. credt  $       then$ $               disp "updating ''x'"! $               goto create_thumb 
 $       endif  $       goto find_pic  $  $ create_thumb:  $ , $       disp "Making thumbnail for ''ffile'"= $       mconvert -geometry "150x150" 'ffile' [.thumbs]'ffile'  $  $       goto find_pic      Jeff    # "reed@ .net" <fe> wrote in message  4 news:9R6re.676$G55.188@newssvr33.news.prodigy.com...8 > In article <42ACE889.90DCDD64@teksavvy.com>, JF Mezei ( > <jfmezei.spamnot@teksavvy.com> writes:/ >>From: JF Mezei <jfmezei.spamnot@teksavvy.com>  >>Organization: Indexed ' >>Subject: Batch utility to crop images  >>G >>I'd like to have my vax pickup radar images from the canadian weather G >>web site and crop the relevant portion and scale it down to fit on my C >>mobile handset display. (so that on long bike rides, I can use my 9 >>handset to have an idea of any serious weather coming).  >>J >>What is the best tool on VMS to do that ?  (obviouslty, this has to be aI >>background process which would generate a new small file every 20 or so H >>minutyes when a new image becomes available from thw eather web site). >  > I would say ImageMagick.     ------------------------------  % Date: Tue, 14 Jun 2005 04:02:25 +0800  From: prep@prep.synonet.com ) Subject: Re: Batch utility to crop images - Message-ID: <87r7f6m3e6.fsf@prep.synonet.com>    reed@<fe>.net writes:    > I would say ImageMagick.  , Yep, CONVERT is just the thing for this job.  > I use it for converting photos to PS and proofing them through the hp8000.     --  < Paul Repacholi                               1 Crescent Rd.,7 +61 (08) 9257-1001                           Kalamunda. @                                              West Australia 6076* comp.os.vms,- The Older, Grumpier Slashdot. Raw, Cooked or Well-done, it's all half baked.F EPIC, The Architecture of the future, always has been, always will be.   ------------------------------  # Date: Mon, 13 Jun 2005 21:44:08 GMT 1 From: Keith Parris <keithparris_NOSPAM@yahoo.com>  Subject: Re: cluster over DSL 1 Message-ID: <I6nre.7020$t26.469@news.cpqcorp.net>    Keith Parris wrote: / > our network folks set up a tunnel using L2TP  K > (Layer 2 Tunneling Protocol) between a couple of Cisco routers, and sent  ! > SCS traffic through that tunnel   E Dennis Majikas of Digital Network Products Group tells us that boxes  E from LightSand can bridge both Fibre Channel and SCS traffic over IP.    ------------------------------  % Date: Mon, 13 Jun 2005 14:32:09 -0400 % From: David Long <nospam@hotmail.com> + Subject: Re: DEC retail stores in the 1980s 8 Message-ID: <o6hra11qrkddjibqh70cs1femced5ni5oh@4ax.com>  D On 23 Nov 2004 19:10:34 -0800, leeroth@my-deja.com (Lee Roth) wrote:  B Going through old archives and just subbed to this group and found this message from last year...  6 >Anyone remember the DEC retail stores? A few of these8 >stores appeared about the time that the "Super Trio" of4 >systems all appeared in the same form-factor boxes:  ? Way back when, my first job at DEC was writing software for the  machines sold in those stores.  = I doubt anyone out there remembers the Retail Products Group.   C I worked on several projects including the Dental Office Management C System, the Construction system, one of the accounting systems that F was purchased from MCBA and a demo program and editor that allowed youF to write scripts that, among other things, 'faked' animation on a WT78. or DECmate for use in the 'storefront window'.  ' I still have a button from a tradeshow:   ' "DECmate:  The Ultimate Office Partner"    ------------------------------  % Date: Mon, 13 Jun 2005 17:06:10 -0400 , From: "Richard Tomkins" <tomkinsr@istop.com>+ Subject: Re: DEC retail stores in the 1980s 4 Message-ID: <42adf62e$1_2@spool9-west.superfeed.net>   Funny stores from Yesteryear.   L I was told this story by a chap who worked in a group next door to a support2 group that had a contract with Corrections Canada.  L As the story goes, a programmer was working on a tracking module and puttingK the finishing touches on his code. The modules purpose was to keep track of J criminals that had been released into the community and their staus within the Correctional system.  K Apparently the programmer was supposed to using a Test System to verify his L code before release, but apparently he was also responsible for managing the Production System.  I So, in testing his code, he made an entry for a dangerous criminal having L just escaped from jail during a prisoner transfer, and proceeded to describeB a rather nefarious character. He then used his name and automobileI description and license plate, punched thet data in and was rewarded with J success, his code properly sent out the appropriate cross Canada notice to various police departments. I Having finshed his test, he jumped in his car and headed home. Of course, H you can imagine what happened and on his way home, he was stopped by theJ police and taken to jail. Apparently his boss was not able to come and getJ him until the next day, and even then there were issues as the police wereJ finding it hard to belive htat these people were really who they said they= were, involved in creating and manaing the software for them.   J The programmer of course had used the production system to run his test by mistake.   rtt   H Even if not true, it made for one hell of a funny story when I heard it.      O ----== Posted via Newsfeeds.Com - Unlimited-Uncensored-Secure Usenet News==---- S http://www.newsfeeds.com The #1 Newsgroup Service in the World! 120,000+ Newsgroups K ----= East and West-Coast Server Farms - Total Privacy via Encryption =----    ------------------------------    Date: 13 Jun 2005 18:04:03 -0700 From: sinobato@gmail.com1 Subject: Determine who created a detached process C Message-ID: <1118711043.137081.124330@g49g2000cwa.googlegroups.com>    Hi all,   E I am currently tasked to investigate an issue with one of our systems G wherein we are seeing a number of "ghost" processes, meaning, processes @ that should no longer be on the system as its parent process has supposedly terminated already.  B I need to understand the problem here and I was hoping to know whoF creates these detached processes. Is there a way, without me having toD do some low level programming, ie. DCL utilities, or freeware tools,F that can help me determine who created a process? I was thinking of anD audit kind of process wherein whenever a process is created, it logsD the data on who created it, so that I can analyze the data later on.   Regards, Sinobato   ------------------------------  % Date: Mon, 13 Jun 2005 23:08:36 -0400 - From: JF Mezei <jfmezei.spamnot@teksavvy.com> 5 Subject: Re: Determine who created a detached process , Message-ID: <42AE4A26.39EE4683@teksavvy.com>   sinobato@gmail.com wrote: H > creates these detached processes. Is there a way, without me having toF > do some low level programming, ie. DCL utilities, or freeware tools,4 > that can help me determine who created a process?    ANA/SYS  SDA> SET PROC/ID=xxxxxxx SDA> SHOW PROC/CHANNELS   H This will show you which files are being opened by that process, as well$ as varous devices such as mailboxes.  A Look for a .COM file that is likely to be the master file that is I executed to get the image going. Also look for mailbox devices (MBAxxx).    F Once you're out of SDA, you can look up the mailbox devices to see whoG owns them, it may give a clue on who created that process (just a clue, 
 not a proof).   G Another step you can take is to then serach all files in your disks for H the name of the .com procedure that runs that process. This may give youG an indication or what other file or executable created the process with " that .com as input to the process.   ------------------------------    Date: 13 Jun 2005 20:13:01 -0700) From: "Ken Robinson" <kenrbnsn@rbnsn.com> 5 Subject: Re: Determine who created a detached process C Message-ID: <1118718781.167692.148230@g47g2000cwa.googlegroups.com>    sinobato@gmail.com wrote: 	 > Hi all,  > G > I am currently tasked to investigate an issue with one of our systems I > wherein we are seeing a number of "ghost" processes, meaning, processes B > that should no longer be on the system as its parent process has  > supposedly terminated already. > D > I need to understand the problem here and I was hoping to know whoH > creates these detached processes. Is there a way, without me having toF > do some low level programming, ie. DCL utilities, or freeware tools,H > that can help me determine who created a process? I was thinking of anF > audit kind of process wherein whenever a process is created, it logsF > the data on who created it, so that I can analyze the data later on.  # See if you have auditing turned on:    $ show audit  ) If not turn it on. If you don't know how,   . $ help set audit (or go to the online doc set)  ) Once auditing is turned on, you can do an    $ ana/aud/full/out=file.name   to see what's happening.   You can also do a    $ show proc/id=<pid>/acc   To see who owns the process   6 What state (LEF, RWAST, COM, CUR) are these processes?  C If they are in a RWxxx state, go into analyze/system and check what  they are waiting on.  	 $ ana/sys  SDA> set proc/id=<pid>C SDA> show proc/chan  ! shows which devices the process is accessing   D More questions? Ask away, someone should be able to answer them.  If you have HP support, ask them.   Ken RobinsonA OpenVMS System Manager (currently looking for work, either F/T or  consulting in the NYC area)  kenrbnsn (at) rbnsn (dot) com    ------------------------------  % Date: Mon, 13 Jun 2005 20:34:47 -0700 ( From: Jeff Cameron <roktsci@comcast.net>= Subject: Re: Determine who created a detached process (AUDIT) / Message-ID: <BED39E67.F8F2%roktsci@comcast.net>    On 6/13/05 6:04 PM, in articleK 1118711043.137081.124330@g49g2000cwa.googlegroups.com, "sinobato@gmail.com"  <sinobato@gmail.com> wrote:   	 > Hi all,  > G > I am currently tasked to investigate an issue with one of our systems I > wherein we are seeing a number of "ghost" processes, meaning, processes B > that should no longer be on the system as its parent process has  > supposedly terminated already. > D > I need to understand the problem here and I was hoping to know whoH > creates these detached processes. Is there a way, without me having toF > do some low level programming, ie. DCL utilities, or freeware tools,H > that can help me determine who created a process? I was thinking of anF > audit kind of process wherein whenever a process is created, it logsF > the data on who created it, so that I can analyze the data later on. > 
 > Regards,
 > Sinobato > L $SET AUDIT/ALARM/ENABLE=LOGIN=DETACHED  For Opcom messages to SECURITY class -and/or-H $SET AUDIT/AUDIT/ENABLE=LOGIN=DETACHED  To make an entry in the Security
 Audit Journal   
 Then later   $ANALYZE/AUDIT/EVENT=LOGIN  $ Use additional qualifiers as needed.   Jeff Cameron   ------------------------------  % Date: Mon, 13 Jun 2005 23:57:57 -0400 - From: JF Mezei <jfmezei.spamnot@teksavvy.com> = Subject: Re: Determine who created a detached process (AUDIT) , Message-ID: <42AE55B5.DAEA12CC@teksavvy.com>   Jeff Cameron wrote:  > $ANALYZE/AUDIT/EVENT=LOGIN > & > Use additional qualifiers as needed.      B But this wouldn't give any information on who actually created the process, wouldn't it ?  F Isn't a detached process intrinsically untraceable to the process thatD caused it to be created ? (from accounting/security) point of view ?     Consider the following:    <under username CHOCOLATE>) $SUBMIT/USER=VANILLA  process_startup.com      then process_startup.com:  $!T $RUN/DETACHED/USER=VANILLA/PROC=XXX/input=process_run.com/output=process_run.log/etc $!    H In such a case, use VANILLA will create the detached process, but it was: really a back job submitted by user CHOCOLATE that did it.  H Once you know which files are involved, you could put security alarms onB the files, and then use audit or opperator.log to find out who hasH accessed the files and that would give you a good hint or who is causing them to be created.    ------------------------------  % Date: Mon, 13 Jun 2005 20:51:26 -0700 # From: "Tom Linden" <tom@kednos.com> 2 Subject: Re: Hurd undoes Carly's last major change( Message-ID: <opssccz0dbzgicya@hyrrokkin>  . On Mon, 13 Jun 2005 23:47:46 -0400, JF Mezei  % <jfmezei.spamnot@teksavvy.com> wrote:   J > One of Carly's last major changes before being ousted was to give the PCJ > division to Mr Joshi who was head of imaging/printing. (combining both  
 > divisions).  > 1 > It was announced now that Hurd will undoe this.  > H > Mr Yoshi gets back just imaging/printing, and the PC division is givenE > to an outsider, R. Todd Bradley, former chief executive of PalmOne.  >  > H > While the press seem to concentrate on whether Hurd will split off theE > PC division or not, what I see significant here is that he hired an J > outsider instead of promoting from within. This may be good omen for VMSE > if Hurd doesn't really trust the established HP insiders with their 8 > preconceived ideas and agendas/reputations to protect.  G The amalgamation was likely done to hide the losses of the PC group.     Putting J it back as it was, opens the possibility to sell off the printer business.A Afterall, who would want HPs PC business, with its 0.5 % margins.    ------------------------------  % Date: Mon, 13 Jun 2005 21:17:26 +0200 - From: Didier Morandi <prenom.nom@freesurf.fr> ! Subject: OpenVMS Boot Camp report 4 Message-ID: <42addbc6$0$31917$636a15ce@news.free.fr>    HP OpenVMS 2005 Boot Camp Report; (Sheraton Tara, Nashua, New Hampshire, USA, 5-10 june 2005)J  A HP, in continuing with the tradition started by Digital Equipment ? Corporation (DEC) many years ago, has just completed the fourth G OpenVMS Advanced Technical Boot Camp which was held from the 5th to theAF 10th of June 2005 at the Sheraton Tara hotel of Nashua, New Hampshire,F United States, on the VMS operating system created by Digital in 1977.  @ This OS still has today millions users worldwide recorded by HP D Services, among them more than 1,800 in France (number taken from a C private study that we realized in 2003 on the future of the French d VAX/VMS platform).  H These training seminars are opened to everyone, have a cost, and require> for the attendees the signature of a non disclosure agreement.  E The training is mainly provided by software engineers from the HP VMS D Engineering Group in Nashua and by managers in charge of departmentsB (Marketing, Services, Training, etc.). It allows the ones who wereD enough lucky to be the 200 first and only registered attendees to beG aware of the technical and marketing perspectives planned by HP for the ? next release of the VMS operating system and not yet officially 
 announced.  E The Sheraton Tara hotel is located only a few meters away from the HP H VMS Engineering Group, which certainly helps those engineers who wish toD proudly say hello to the "trainees" and to stop by a few hours for a beer and conversation.  D This year, the 200 attendees came from 21 different countries, amongE them many Europeans. Customers, Consultants but also a few (less thantA 10) HP people who came over, some of them from very far away, fornF training purposes but also for some other activites which would occur  there in the next days.,  D The Longest Travel Contest (which actually did not occur) was won byH Jeremy Begg, a very pleasant person from the HP Sydney CSC in Australia,G who had a 28 hours trip! followed by a equally pleasant young lady from H HP in Tokyo: 21 hours. Congratulations for their courage, but we are all( sure that the show was worth the effort.  F Effectively, there were 127 sessions and keynotes during the five daysE of the seminar, which name slowly became Sueposium in honor of Ms Sue E Skonetski from HP, courageous producer and efficient organizer of theMA OpenVMS Boot Camp show. Sue is the Editor in Chief of the OpenVMSgB Technical Journal, responsible for the VMS Ambassadors Program and? certainly the Key Person to gather the worldwide VMS Community.0  H As we said, all sessions were protected by a NDA, so we will not commentG the information we received, as these data have to be kept secret untiln
 May 31, 2006.r  ? However, what we can say is that the most important feedback wen? bring from Nashua is the extraordinary ambiance of kindness and H interactivity noted during the event. That show really reminded the goodD old days of DECville, DECworld and other DECUS Symposiums before the DEC-Compaq "merge".u  F We beleive that the pictures taken during the show, available from our? WEB site www.didiermorandi.com, really confirm this impression.e  A This stay has also been an opportunity for some of us to pass (or3B repass) a few Technical Certifications on the VMS Operating SystemD (Certified System Administrator or CSA, Certified System Engineer or CSE, Network Specialist, etc.).o  ? To conclude, apart 946 Mo of confidential documentation, what I F personally brought back from the 2005 OpenVMS BootCamp are these three public information:p  H HP has invested in and for VMS, since the Compaq acquisition, more time,2 money and energy in two years than Compaq in four.  H The official announcement of the simultaneous availability of VMS 8.2 onG the VAX, Alpha and Intel Itanium 2 platforms (HP Affinity Product Line) E is a kind of security on the future of this amazing industry standards" mission critical operating system.  F These technical sessions encounter each year more and more success. WeH can consequently hope that they could occur one day in Europe, organized by HP EMEA or Users Societies.  @ The worldwide VMS Community wishes a long life to these training0 periods, so useful and so pleasant for everyone.   Didier Morandi VMS Consultant since 1982.   ------------------------------  % Date: Mon, 13 Jun 2005 16:08:46 -04003 From: norm.raphael@metso.com% Subject: Re: OpenVMS Boot Camp report!Q Message-ID: <OF832D9AB5.125D8B1B-ON8525701F.006E9235-8525701F.006E98C8@metso.com>s  ? > The official announcement of the simultaneous availability oft > VMS 8.2 on the VAX....   Did I (er) miss something?   ------------------------------  % Date: Mon, 13 Jun 2005 20:01:18 -0400W- From: JF Mezei <jfmezei.spamnot@teksavvy.com> % Subject: Re: OpenVMS Boot Camp reportl, Message-ID: <42AE1E4C.F7626964@teksavvy.com>   Didier Morandi wrote: J > As we said, all sessions were protected by a NDA, so we will not commentI > the information we received, as these data have to be kept secret untila > May 31, 2006.   D So 31-MAY-2006 is when they announce that VMS has been ported to the 8086 ? :-) :-) :-) :-)  H Seriously, what percentage of the contents were truly of NDA nature ? OrE the NDA signed mostly beause a few tidbits here and there were NDA in G nature or in case an engineer slipped and revealed that VMS had already  booted on the 8086 ? :-)   ------------------------------  % Date: Mon, 13 Jun 2005 16:53:49 -0700 ( From: Jeff Cameron <roktsci@comcast.net>6 Subject: Re: Question about MOUNT in multiple clusters/ Message-ID: <BED36A9D.F8DA%roktsci@comcast.net>e  J On 6/13/05 10:26 AM, in article 42ADC1A9.F3F0E61A@teksavvy.com, "JF Mezei"% <jfmezei.spamnot@teksavvy.com> wrote:I  < > One of the patches for VAX VMS 7.3 has the following text: > @ > o  A MOUNT/NOWRITE command on a disk on one cluster  will  nowJ >              work  correctly  even  if the disk is mounted with a /WRITEJ >              qualifier on another  cluster  in  the  SAN  (Storage  AreaJ >              Network).   Previously, depending on the order in which theJ >              mounts were executed, the mount would fail with  the  error >              message:a >  >  > H > I would have understood if the 3rd line had been "qualifier on another > node in the cluster".d > E > But this implies that that seperate clusters despite not having DLMlE > between each other, will still know about how the other cluster hasoA > mounted disks ? (or that it would have mounted it). How is thato > accomplished ? n > C > Does the SAN software in the SAN and on VMS provide extra-clusteroI > resource database that allow any independant system attached to the SANnD > (a cluster being an independant system) to know about all the disk? > resources being accessed by the others connected to the SAN ?wF In a SAN environment you can have many cluster mount LUNs with NOWRITED access, and only one with WRITE access. However in a NAS environmentF multiple nodes (clusters) can mount a resource with simultaneous writeL access. This is because NAS is akin to NFS mounting where you are mounting a6 file server rather than SAN which is a a block server.  K The message above does not imply multiple cluster write access to a LUN butw8 only says that the order of the mounts is not important.  L Unless of course there is some sort of Hook in VMS SAN technology that would@ allow multiple Distributed lock managers in separate clusters to# communicate, of which I am unaware.    Jeff Cameron   ------------------------------  % Date: Mon, 13 Jun 2005 12:44:26 -0600n0 From: Mark Berryman <mark.berryman@mvb.saic.com>  Subject: Re: Some DCL wish items' Message-ID: <42ad719d$1@cpns1.saic.com>i   david20@alpha2.mdx.ac.uk wrote: e > In article <stUdBN$2bIoK@eisner.encompasserve.org>, Kilgallen@SpamCop.net (Larry Kilgallen) writes:E >K\ >>In article <42a4469d$1@cpns1.saic.com>, Mark Berryman <mark.berryman@mvb.saic.com> writes: >> >>1 >>>Here are some features I'd like to see in DCL.u >> >>>4. I >>>Define an application ACE for DCL.  When placed on a file, such an ACEvJ >>>would specify the privilege mask to use while executing that particularJ >>>command procedure.  It would remain in effect for any inner invokationsK >>>but be removed once the file was exited.  Such an ACE would have Hidden,,I >>>Protected, and NoPropagate attributes and could only be manipulated innJ >>>Kernel mode (it would be useful if a new attribute could be defined for	 >>>this).. >>>nH >>>In addition, if this particular ACE had a subsystem attribute then itJ >>>would contain a rights identifier, rather than privilege mask, to grant4 >>>to the process while the file was being executed. >>>dH >>>If extended to wish item #1 above, the specified privileges or rightsG >>>would be granted while executing any module from within the library.t >> >>>Whadda y'all think? >>K >>My instinctive reaction is to say complex systems should be in a compiledd >>language rather than DCL.h >>J >>My cautious reaction is to say that changing the VMS security model that >>much is a scary prospect.A >>M >>My pragmatic reaction is that making those change would require involvementeM >>of many other developers besides Guy Peleg (because of the security angle).  >y >r@ > Indeed. This sounds much too much like setuid on Unix systems.L > It is generally recognised that you should not set the setuid bit on shellO > scripts because of the gigantic security hole this opens and many modern Unixv( > systems will not allow you to do this. >I > Seet >e: > http://www.samag.com/documents/s=1149/sam0106a/0106a.htm  E Indeed, setuid can be a massive security hole on Unix.  However, thissE actually can be done securely on VMS (at least from my reading of the 
 listings).  C The purpose here is not to implement complex systems in a scripting E language.  There are many functions for which a script is appropriateuD but which require either rights or privileges one would not normallyH want to give to the user.  I'd like to find a supported way to implement  these rather than using PRIVDCL.  & There is even an alternative proposal:  F Modify the Install utility to be able to install non-executable files.G It could create one list (of executable images) to be used by the image'E activator and a separate list (of non-executables) to be used by DCL.oE The main reason I did not propose this direction is that this utilityr7 currently can associate privileges but not identifiers.c  
 Mark Berryman)   ------------------------------  % Date: Mon, 13 Jun 2005 12:59:56 -0600a0 From: Mark Berryman <mark.berryman@mvb.saic.com>  Subject: Re: Some DCL wish items% Message-ID: <42ad7540@cpns1.saic.com>    John Malmberg wrote:   > Mark Berryman wrote: >s1 >> Here are some features I'd like to see in DCL.  >> >> 4. I >> Define an application ACE for DCL.  When placed on a file, such an ACErJ >> would specify the privilege mask to use while executing that particularJ >> command procedure.  It would remain in effect for any inner invokationsK >> but be removed once the file was exited.  Such an ACE would have Hidden,cI >> Protected, and NoPropagate attributes and could only be manipulated in1J >> Kernel mode (it would be useful if a new attribute could be defined for	 >> this).t >i >sJ > If you have DECNET installed, you can set up an program or DCL file as aI > DECNET object with a designated account to run it on.  Since the object5C > can look at the username and node name that invoked it, it can douA > additional management to tailor it's running to specific users.e >eI > I use this in places where I need to run a prewritten test program with @ > elevated privileges that I do not want the main build and testI > environment to have elevated privileges or the ability to turn them on.  >d  F I have used this functionality as well but its application is limited.   Case in point:  H A hidden ACE can only be viewed with the Security privilege.  If I triedE to do this with with a DECnet object with elevated privileges I would.D have to re-invent the wheel to make sure the argument to the commandE resolved to files that the user was supposed to have access to.  If ImH simply had a command procedure that invoked DIRECTORY (or SHOW SECURITY)D but could run with elevated privileges (SECURITY, in this case) such checks would be done by VMS.  
 Mark Berrymana   ------------------------------  % Date: Mon, 13 Jun 2005 15:09:44 -0400 4 From: "Peter Weaver" <newsgroup@weaverconsulting.ca>B Subject: Re: Sueposium: Five days of peace and VMS. Thank you Sue!+ Message-ID: <3h640sFfecqhU1@individual.net>    Didier Morandi wrote:h >...' > Again, merci beaucoup Sue, on t'aime.i >...   $ SET POSTING/MODE=AOL   Me Too!r   $ SET POSTING/MODE=NORMAL   H And thank you Didier for the box of chocolates, my wife loved them. (AndF she deserved them since our house was broken into the morning before IF left and every sound she heard during the week were the robbers trying? to get in again, she did not sleep the entire week I was gone!)1  E The boot camp was great and I learnt about many things I did not knowEA about and I was reminded about many things I had forgotten about.h  D For people looking for a closer picture of the famous Survivor shirt there is one at the bottom ofr3 http://www.encompasscanada.com/events-bootcamp.htm.h   -- r Peter Weaver Weaver Consulting Services Inc.  Canadian VAR for CHARON-VAX  www.weaverconsulting.cas   ------------------------------  % Date: Mon, 13 Jun 2005 20:10:42 -0400e- From: JF Mezei <jfmezei.spamnot@teksavvy.com>,0 Subject: TCPIP : Let RIP set the default route ?, Message-ID: <42AE207F.F46917AA@teksavvy.com>  C Phillip Helbig's recent question lead me to think while battling 18: wheel trucks on my bike.    G Would it be possible to have VMS configured without a default route and F then listen for RIP information from routers to determine which routerA provides a route to the rest of the world ? (I believe that TCPIPe5 Services provides the GateD service which does RIP). h  G With the internet backbone now all BGP, is RIP still "state of the art"n? for intranets, or is there an equivalent of BGP for intranets ?.   ------------------------------  # Date: Mon, 13 Jun 2005 20:09:51 GMT $ From: Disinfo <d151nf0rm4@libero.it> Subject: Re: vms and linux6 Message-ID: <pan.2005.06.13.20.17.29.562738@libero.it>  I wow so many answeres, sorry if i'm bit late to answer but by now i'm fullk
 of exames; anyway i explain better my problem:E i've an old microcvax 3100 and i can work on it by a direct terminal,"J classic vt220, but it's not really healthy, and i wolud like to be able toH use just one monitor for all my machines, so by now my problem it's just. to use an i386 architeture with linux on it,asE terminal for the microvax, i mean i would like to be able to acces toeA openvms login while i'm using linux,i can't use the stack tcp-ip,dJ i'm just looking for something like parallel interface first of all, after, i'll take care about the intranet and server   thx    Disinfo/   ------------------------------  # Date: Mon, 13 Jun 2005 21:09:16 GMT % From: Rob Brown <mylastname@gmcl.com>  Subject: Re: vms and linuxD Message-ID: <Pine.LNX.4.61.0506131456220.1988@localhost.localdomain>  # On Mon, 13 Jun 2005, Disinfo wrote:n  6 > On Mon, 13 Jun 2005 20:26:09 +0000, Rob Brown wrote: >n >eD >> You would like to use a serial line and Kermit (or something) on G >> Linux for booting up the VAX.  You can also use this for a terminal r% >> session once the system is booted.o > E > mhh, i'll try to use kermit i 've tryed with minicom until now but cG > i' in need of any on-line resurces to have a support while i'do this   > operations  D If minicom sends and receives bytes over a serial line and displays E ASCII on your screen, then it will do.  Set your comm to 9600,8,n,1. c6 <http://www.hp.com/go/openvms/faq> is a good resource.  E If you are going to be running VMS applications, especially editors, SF using this setup, then you want something on your Linux box that will E emulate a VT100 or higher.  Kermit does very good emulation.  I have d not a clue about minicom.   A > i'mean i've no idea if openvms by default it's on a wait login o? > status on a parallel port, or how to install any stack on it;s  E Parallel port?  I don't think any MicroVAX has one.  By default, all hA serial ports will present a login prompt when you press <return>.f  G >> If you install TCP-ip on the VAX (and put it on the same network as s9 >> your Linux box) you will be able to telnet from Linux.  >eA > that would be really nice but i thin it'll take looong time to t	 > doit...  > E >> If you install decwindows on the VAX, you will be able to display tD >> DECterm (xterms) and other x-apps on your Linux display from the  >> VAX.e >>F > not sure that i've enaught free hd space and ram to install and use / > such program on the vax but it would be greatc  G One thing at a time, I think.  I understand you want to use your Linux  F box as your VAX system console to replace your aging VT220.  Correct? D You should be able to move the cable from the back of the VT220 and D (you might need an adapter for this) plug it into a COM port on the  back of your Linux box.      -- .  B Rob Brown                        b r o w n a t g m c l d o t c o mA G. Michaels Consulting Ltd.      (866)438-2101 (voice) toll free!b6 Edmonton                         (780)438-9343 (voice)5                                   (780)437-3367 (FAX) 2                                   http://gmcl.com/   ------------------------------  # Date: Mon, 13 Jun 2005 21:29:21 GMT-  From: John Santos <john@egh.com> Subject: Re: vms and linux+ Message-ID: <RUmre.10673$lb5.4828@trnddc04>j   Disinfo wrote:K > wow so many answeres, sorry if i'm bit late to answer but by now i'm fulls > of exames; > anyway > i explain better my problem:G > i've an old microcvax 3100 and i can work on it by a direct terminal,fL > classic vt220, but it's not really healthy, and i wolud like to be able toJ > use just one monitor for all my machines, so by now my problem it's just0 > to use an i386 architeture with linux on it,asG > terminal for the microvax, i mean i would like to be able to acces totC > openvms login while i'm using linux,i can't use the stack tcp-ip, L > i'm just looking for something like parallel interface first of all, after. > i'll take care about the intranet and server >  > thx$ > 	 > Disinfo   5 Kermit and a serial port, running in an xterm window.$  A If you install a TCP/IP stack (TCP/IP services, TCPware, Multinet B or CMU) on the microvax, then Kermit running as a telnet client inE an xterm window, or run DECTerm on the microvax directing the display A to the Linux box.  I do the latter with a VAX 4000-200 displaying C on a DEC Unix AlphaStation 200 4/100 (slowest alpha ever made?) and A it works fine.  The VAX 4000-200 is probably about the same speedcB as your MV 3100, or your MV3100 might be much faster, depending on
 the model.   -- i John Santos  Evans Griffiths & Hart, Inc. 781-861-0670 ext 539   ------------------------------    Date: 13 Jun 2005 21:00:17 -04003 From: Rich Alderson <news@alderson.users.panix.com>x1 Subject: Re: What Terminal Servers are you using?n. Message-ID: <mddr7f5oiqm.fsf@panix5.panix.com>   prep@prep.synonet.com writes:8  7 > Rich Alderson <news@alderson.users.panix.com> writes:D  2 >> Kilgallen@SpamCop.net (Larry Kilgallen) writes:  ? >>> I use DECserver 200s because I do not want to depend on IP.   F >> Since I have never been a regular user, much less administrator, of; >> a DECnet system, I find this statement puzzling.  I have B >> administered TCP/IP terminal servers since 1984, and have neverF >> found them to be undependable; on the other hand, the LAT device we? >> had to set up for some reason (I didn't have to deal with itm2 >> directly) was constantly having to be rebooted.  % > Then something was wrong somewhere.k   Undoubtedly.  ? > The nicest feature of LAT nowdays is that it is `auto secure'e< > No one from the big ugly world can get in via it, unlike a( > zillion open and active telnet ports.   " There is only one telnet port, 23.  N Or are you referring to the fact that telnet *programs* do not restrict you to a single port number?s  M Or are you referring to the fact that there are a number of services that are 3 made available via TCP or UPD ports on IP networks?r  - >> So why would you not want to depend on IP?S  ) > Those who depend on IP, will die by it.   D Nice aphorism.  It's been 22 years, for me.  Why haven't I died yet?   -- 5L Rich Alderson                                       | /"\ ASCII ribbon     |L news@alderson.users.panix.com                       | \ / campaign against |L "You get what anybody gets. You get a lifetime."    |  x  HTML mail and    |L                          --Death, of the Endless    | / \ postings         |   ------------------------------    Date: 13 Jun 2005 15:40:18 -0700$ From: "AEF" <spamsink2001@yahoo.com>7 Subject: [RT] HP offers POLA for "virus-free computing"pC Message-ID: <1118702418.114549.143960@g47g2000cwa.googlegroups.com>s   Check out POLA:r  n http://www.hp.com/hpinfo/newsroom/feature_stories/2005/05special_virussafe.html?mtxs=home-corp&mtxb=B2&mtxl=L2  E This link was on the hp home page. (It was one of the rotating links,g8 so you won't see it unless you check at the right time.)  - POLA stands for Principle of Least Authority.o  & I wonder where they got this idea? :-)   ------------------------------   End of INFO-VAX 2005.329 ************************