INFO-VAX Sat, 06 Oct 2007 Volume 2007 : Issue 545 Contents: Re: getting MAC in 7.3 Re: getting MAC in 7.3 Re: Java on Mac OS X (Was Re: Web-based VMS Que Monitor for Deathrow) Re: Java on Mac OS X (Was Re: Web-based VMS Que Monitor for Deathrow) OT: one of the most informative Powerpoint presentations ever Re: OT: one of the most informative Powerpoint presentations ever Re: OT: Powerpoint and Microsoft security ! Re: OT: Powerpoint and Microsoft security ! Re: still not convinced global warming a hoax? Re: still not convinced global warming a hoax? Re: still not convinced global warming a hoax? Re: still not convinced global warming a hoax? RE: We're VMS - Please do not discuss the outside world Re: We're VMS - Please do not discuss the outside world ---------------------------------------------------------------------- Date: Fri, 5 Oct 2007 13:37:55 -0500 (CDT) From: sms@antinode.org (Steven M. Schweda) Subject: Re: getting MAC in 7.3 Message-ID: <07100513375542_20200296@antinode.org> From: "Tom Linden" > BTW, What exactly is ZCD$ETH_LNM? > > I do not see anything like that name on any of my systems "ZCD" was short for "Zycad", where I was working when I wrote the stuff the first time. It was part of an Ethernet-address-related license enforcement scheme which was never used. (That was about the time when all our customers left VMS for the better price/performance offered by various UNIX workstation vendors, so the company lost interest in license enforcement on VMS. Along with everything else.) The idea was that the program would find an adapter on its own, but, if you wished, you could direct it to a particular one by defining that logical name. ------------------------------------------------------------------------ Steven M. Schweda sms@antinode-org 382 South Warwick Street (+1) 651-699-9818 Saint Paul MN 55105-2547 ------------------------------ Date: Fri, 05 Oct 2007 22:26:38 +0200 From: "P. Sture" Subject: Re: getting MAC in 7.3 Message-ID: In article , "P. Sture" wrote: > Here we go: > > GET_ETHER.C;1 24/36 10-JUN-1998 14:14:01.00 > > I've just compiled it on Alpha V8.3, and in spite a couple of compiler > informationals, it produces the same end result as in the following: > > $ pipe mc lancp show device ew /characteristics | search sys$pipe hard > 00-00-F8-75-3B-99 Default MAC address (Hardware LAN address) > 08-00-2B-C5-40-4D Default MAC address (Hardware LAN address) > > $ r get_ether > Ethernet hardware address = (00-00-F8-75-3B-99) > Ethernet hardware address = (08-00-2B-C5-40-4D) > > Code follows, but _does_ wrap. I'll put it somewhere better in > unwrappable format tomorrow Now up at: http://sture.ch/vms/get_ether_c.txt Save as get_ether.c, then compile using the instructions found at the beginning of the program. -- Paul Sture Sue's OpenVMS bookmarks: http://eisner.encompasserve.org/~sture/ovms-bookmarks.html ------------------------------ Date: 5 Oct 2007 18:03:45 GMT From: bill@cs.uofs.edu (Bill Gunshannon) Subject: Re: Java on Mac OS X (Was Re: Web-based VMS Que Monitor for Deathrow) Message-ID: <5mnck1Fe9cpfU1@mid.individual.net> In article , JF Mezei writes: > The morale of the whole story is that not all JAVA applications and > engines were created equal, and the write-once run-anywhere mantra is no > longer applicable. Like I have repeatedly said, the JAVA concept is just The UCSD P-Machine re-implemented, very badly!! bill -- Bill Gunshannon | de-moc-ra-cy (di mok' ra see) n. Three wolves bill@cs.scranton.edu | and a sheep voting on what's for dinner. University of Scranton | Scranton, Pennsylvania | #include ------------------------------ Date: 05 Oct 2007 19:13:44 -0400 From: Rich Alderson Subject: Re: Java on Mac OS X (Was Re: Web-based VMS Que Monitor for Deathrow) Message-ID: VAXman- @SendSpamHere.ORG writes: > In article <1191551484.740738.308740@n39g2000hsh.googlegroups.com>, > maher_rj@hotmail.com writes: >> If you are using Tiger (Mac OS X 10.4.6?) or Leopard (U Bewt next one) > OS X 10.4.10 is Tiger. OS X.4 (that "X" is a Roman numeral) is Tiger. X.3 is Panther, X.2 is Jaguar, and I forget what X.1 was (Cougar, perhaps?). The minor edit number doesn't affect the nickname. -- Rich Alderson "You get what anybody gets. You get a lifetime." news@alderson.users.panix.com --Death, of the Endless ------------------------------ Date: Fri, 05 Oct 2007 19:54:59 GMT From: VAXman- @SendSpamHere.ORG Subject: OT: one of the most informative Powerpoint presentations ever Message-ID: http://tmesis.com/powerpuke.html -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM "Well my son, life is like a beanstalk, isn't it?" http://tmesis.com/drat.html ------------------------------ Date: Fri, 05 Oct 2007 21:45:12 -0400 From: JF Mezei Subject: Re: OT: one of the most informative Powerpoint presentations ever Message-ID: <4e71e$4706e8a9$cef8887a$6961@TEKSAVVY.COM> VAXman- @SendSpamHere.ORG wrote: > http://tmesis.com/powerpuke.html > Redirects to a site for which VMS has no support :-( :-( But it begs the question: which came first, the chicken or that powerpoint presentation ? :-) ------------------------------ Date: Fri, 05 Oct 2007 21:35:24 -0500 From: David J Dachtera Subject: Re: OT: Powerpoint and Microsoft security ! Message-ID: <4706F46C.2EF74632@spam.comcast.net> JF Mezei wrote: > > From : http://news.bbc.co.uk/2/hi/americas/7028389.stm > > School children in the US state of Ohio were left bemused after images > of nude women were shown in a politician's lecture on the legislative > process. > > State representative Matthew Barrett was giving a computerised > presentation at Norwalk High School when the images flashed up on the > screen. > > <...> > > He inserted a memory chip into his computer which he thought contained > graphics showing how legislative bills became law. > > Instead, a series of pictures of topless women appeared on the screen, > although Mr Barrett said he shut down the computer within seconds. > > --------- > > So to all those who use powerpoint to make any presentation, beware: it > is easy to hack your presentation and add some "interesting" contents to > it ;-) > > One more reason to not use Windows on laptops. Actually, JF, the likely lesson here is don't put PPTs for a school presentation on the same chip as pix of your favorite topless models. Especially in XP and later, WhineBloze Exploder (Windows Explorer) has the ability to bring up the most recent screen viewed when it senses that a piece of media it has "seen" before has been re-inserted to a drive or, in this case a USB "drive" (chip) has been reconnected. It is entirely feasible to assume that the speaker was amusing himself with a thumbnail gallery of the topless pictures when last he used that chip, which screen re-appeared when the chip was re-inserted in front of a youthful audience. I suppose there's room for a comment about discretion at this point. Can PPTs be hacked? Probably, but that was likely not the case in this instance. Likely as not, the speaker forgot about WhineBloze's eagerness to "help" the user... Pure speculation... -- David J Dachtera dba DJE Systems http://www.djesys.com/ Unofficial OpenVMS Marketing Home Page http://www.djesys.com/vms/market/ Unofficial Affordable OpenVMS Home Page: http://www.djesys.com/vms/soho/ Unofficial OpenVMS-IA32 Home Page: http://www.djesys.com/vms/ia32/ Unofficial OpenVMS Hobbyist Support Page: http://www.djesys.com/vms/support/ ------------------------------ Date: Fri, 05 Oct 2007 21:53:34 -0500 From: Ron Johnson Subject: Re: OT: Powerpoint and Microsoft security ! Message-ID: On 10/05/07 21:35, David J Dachtera wrote: > JF Mezei wrote: >> From : http://news.bbc.co.uk/2/hi/americas/7028389.stm >> >> School children in the US state of Ohio were left bemused after images >> of nude women were shown in a politician's lecture on the legislative >> process. >> >> State representative Matthew Barrett was giving a computerised >> presentation at Norwalk High School when the images flashed up on the >> screen. >> >> <...> >> >> He inserted a memory chip into his computer which he thought contained >> graphics showing how legislative bills became law. >> >> Instead, a series of pictures of topless women appeared on the screen, >> although Mr Barrett said he shut down the computer within seconds. >> >> --------- >> >> So to all those who use powerpoint to make any presentation, beware: it >> is easy to hack your presentation and add some "interesting" contents to >> it ;-) >> >> One more reason to not use Windows on laptops. > > Actually, JF, the likely lesson here is don't put PPTs for a school > presentation on the same chip as pix of your favorite topless models. > > Especially in XP and later, WhineBloze Exploder (Windows Explorer) has > the ability to bring up the most recent screen viewed when it senses > that a piece of media it has "seen" before has been re-inserted to a > drive or, in this case a USB "drive" (chip) has been reconnected. It > is entirely feasible to assume that the speaker was amusing himself > with a thumbnail gallery of the topless pictures when last he used > that chip, which screen re-appeared when the chip was re-inserted in > front of a youthful audience. > > I suppose there's room for a comment about discretion at this point. Sure. Like: Encrypt what you don't want your political opponents to see and the media to spread across the globe. > Can PPTs be hacked? Probably, but that was likely not the case in this > instance. Likely as not, the speaker forgot about WhineBloze's > eagerness to "help" the user... I'm sure that GNOME & KDE can be configured for similar "generosity". > Pure speculation... -- Ron Johnson, Jr. Jefferson LA USA Give a man a fish, and he eats for a day. Hit him with a fish, and he goes away for good! ------------------------------ Date: Fri, 05 Oct 2007 14:36:24 -0500 From: Ron Johnson Subject: Re: still not convinced global warming a hoax? Message-ID: <_mwNi.334858$dA7.200940@newsfe16.lga> On 10/05/07 08:30, david20@alpha2.mdx.ac.uk wrote: > In article , ultradwc@gmail.com writes: >> On Oct 4, 12:40 pm, JF Mezei wrote: >>> Question: >>> >>> In my mind, a religious person has always been a compassionate person >>> willing to share wealth, help others, live a good honest life and make >>> sure to protect god's creations (wether humans or animals or the planet). >>> >>> How come in the USA, religious persons are most often associated with >>> the exact opposite ? right wing conservatives who want wars that kill >>> hundreds of thousands of humans, help large business instead of helping >>> the poor, don't care about polluting the planet etc ? >>> >>> Or is it a case of religious persons in the USA supporting one party >>> that is 99% against what they believe in just because the agree with the >>> remaining 1% (abortion) ? >> no Christian WANTS war, but sometimes it is necessary to stamp >> out evil ... just read your old testament > > That begs the question of when the enemy is truly evil and just who decides > they are evil. Black propoganda painting the enemy as evil incarnate has an > extremely long history. > Historically Christians have considered other Christians to be heretics and > fought wars against them because of it. Historically Christians have fought > against Infidels eg Crusades in the holy land organised by various Popes. ACK. > ... what would have happened >> if Hitler would have been allowed to carry on w/o world war II ... >> use your head! >> > One regime which most people would regard as evil but the Vatican's > relationship with the Nazis during world war II is hardly a story of > resistence or even outright condemnation. I *really* think that the whole story has not been told regarding the Vatican and Nazi Germany. If it is ever told, dime-to-a-dollar there will be pro-Nazi Cardinals and anti-Nazi Cardinals and all sorts of opinions in between, plus the Pius XI's and Pius XII's realizations that the Germans could squash the Vatican like a bug if they wanted to. -- Ron Johnson, Jr. Jefferson LA USA Give a man a fish, and he eats for a day. Hit him with a fish, and he goes away for good! ------------------------------ Date: Fri, 05 Oct 2007 14:58:17 -0700 From: Doug Phillips Subject: Re: still not convinced global warming a hoax? Message-ID: <1191621497.568478.75760@o3g2000hsb.googlegroups.com> On Oct 5, 6:51 am, ultra...@gmail.com wrote: > On Oct 4, 12:40 pm, JF Mezei wrote: > > > Question: > > > In my mind, a religious person has always been a compassionate person > > willing to share wealth, help others, live a good honest life and make > > sure to protect god's creations (wether humans or animals or the planet). > > > How come in the USA, religious persons are most often associated with > > the exact opposite ? right wing conservatives who want wars that kill > > hundreds of thousands of humans, help large business instead of helping > > the poor, don't care about polluting the planet etc ? > > > Or is it a case of religious persons in the USA supporting one party > > that is 99% against what they believe in just because the agree with the > > remaining 1% (abortion) ? > > no Christian WANTS war, but sometimes it is necessary to stamp > out evil ... just read your old testament ... what would have happened > if Hitler would have been allowed to carry on w/o world war II ... > use your head! Godwin's Law: As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one. Corollary: Once such a comparison is made, the thread is finished and whoever mentioned the Nazis has automatically "lost" whatever debate was in progress. BTW, there is more measurable proof to support the existence of Global Warming than there is for the existence of God. The extent of mankind's contribution to either is the point of contention amongst those who care. ------------------------------ Date: Fri, 05 Oct 2007 22:26:02 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: still not convinced global warming a hoax? Message-ID: <_RyNi.36$wu6.17@newsfe12.lga> In article , JF Mezei writes: > > >Question: > >In my mind, a religious person has always been a compassionate person >willing to share wealth, help others, live a good honest life and make >sure to protect god's creations (wether humans or animals or the planet). I do not believe in religion! In fact, I think it is one of the biggest flimflams foisted on the human race. However, I'm a compassionate person. I'm altruistic to a fault. I'll help someone else to my detriment. I'm hopelessly honest and I loathe liars more than murders and or rapist. I believe in the sanctity of life. If this be religion, then I would call myself a pious man. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM "Well my son, life is like a beanstalk, isn't it?" http://tmesis.com/drat.html ------------------------------ Date: Fri, 05 Oct 2007 21:02:39 -0500 From: Ron Johnson Subject: Re: still not convinced global warming a hoax? Message-ID: <51CNi.9945$pX5.6371@newsfe14.lga> On 10/05/07 17:26, VAXman- @SendSpamHere.ORG wrote: > In article , JF Mezei writes: >> >> Question: >> >> In my mind, a religious person has always been a compassionate person >> willing to share wealth, help others, live a good honest life and make >> sure to protect god's creations (wether humans or animals or the planet). > > I do not believe in religion! In fact, I think it is one of the biggest > flimflams foisted on the human race. It's postulated that the cerebral complexity which gives humans self-awareness interacts with the "patter-searching" segments of our brain to make us invent explanations/patterns when we have no concrete facts to support those explanations. Thus, on the one hand, sun gods, moon gods, bear spirits, and on the other hand, anthropomorphic gods. Lastly, like our hominid relatives, most people are followers, not leaders. So, leader-types use man's religiousness as a leadership tool. > However, I'm a compassionate person. > I'm altruistic to a fault. I'll help someone else to my detriment. I'm > hopelessly honest and I loathe liars more than murders and or rapist. I > believe in the sanctity of life. If this be religion, then I would call > myself a pious man. -- Ron Johnson, Jr. Jefferson LA USA Give a man a fish, and he eats for a day. Hit him with a fish, and he goes away for good! ------------------------------ Date: Fri, 5 Oct 2007 22:21:18 +0000 From: "Main, Kerry" Subject: RE: We're VMS - Please do not discuss the outside world Message-ID: > -----Original Message----- > From: Simon Clubley [mailto:clubley@remove_me.eisner.decus.org- > Earth.UFP] > Sent: October 4, 2007 7:14 AM > To: Info-VAX@Mvb.Saic.Com > Subject: Re: We're VMS - Please do not discuss the outside world > > In article , "Richard Maher" > writes: > > > > PS. Why is VMS's customer base disappearing again? > > > > Lack of marketing and applications. > > Linux with both a CLI and GUI environment doesn't seem to have a > problem > in this area - people can choose whatever mode of operation (GUI/CLI) > they > prefer and still get the job done. > > Simon. > > -- > Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP > Microsoft: Bringing you 1980's technology to a 21st century world Re: Linux - Yeah, as long as you do not mind having to deal with 5-20 security patches released each and every month. Reference Red Hat security site: https://www.redhat.com/archives/enterprise-watch-list/ (click thread for ea= ch month and add them up yourself. Yes, not all apply, but you need to spend t= he time researching to see if they do or not. Course, you can do what most do = and simply ignore these monthly security patches.) :-) Regards Kerry Main Senior Consultant HP Services Canada Voice: 613-592-4660 Fax: 613-591-4477 kerryDOTmainAThpDOTcom (remove the DOT's and AT) OpenVMS - the secure, multi-site OS that just works. ------------------------------ Date: Fri, 05 Oct 2007 20:27:54 -0500 From: Ron Johnson Subject: Re: We're VMS - Please do not discuss the outside world Message-ID: On 10/05/07 17:21, Main, Kerry wrote: >> -----Original Message----- >> From: Simon Clubley [mailto:clubley@remove_me.eisner.decus.org- >> Earth.UFP] >> Sent: October 4, 2007 7:14 AM >> To: Info-VAX@Mvb.Saic.Com >> Subject: Re: We're VMS - Please do not discuss the outside world >> >> In article , "Richard Maher" >> writes: >>> PS. Why is VMS's customer base disappearing again? >>> >> Lack of marketing and applications. >> >> Linux with both a CLI and GUI environment doesn't seem to have a >> problem >> in this area - people can choose whatever mode of operation (GUI/CLI) >> they >> prefer and still get the job done. >> >> Simon. >> >> -- >> Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP >> Microsoft: Bringing you 1980's technology to a 21st century world > > Re: Linux - > > Yeah, as long as you do not mind having to deal with 5-20 security patches > released each and every month. > > Reference Red Hat security site: > https://www.redhat.com/archives/enterprise-watch-list/ (click thread for each > month and add them up yourself. Yes, not all apply, but you need to spend the > time researching to see if they do or not. Course, you can do what most do and > simply ignore these monthly security patches.) Or run up2date which only picks up the packages you need. > > :-) No smiley. Accurate or not, your "5-20 security patches" mantra is getting tres' repetitious. Can't you think of any other reason to bash Linux. (Pun intended.) To get you headed in the right direction, let me help: http://computerworld.co.nz/news.nsf/scrt/CD0B9D97EE6FE411CC25736A000E4723 Although Linux has long been considered more secure than Windows, many of the programs that run on top of Linux have known security vulnerabilities, and if an attacker were to exploit an unpatched bug on a miscon- figured system, he could seize control of the machine. Because Linux is highly reliable and a great platform for running server software, Linux machines are desired by phishers, who set up fake websites, hoping to lure victims into disclosing their passwords. "We see a lot of Linux machines used in phishing," said Alfred Huger, vice president for Symantec Security Response. "We see them as part of the command and control networks for botnets, but we rarely see them be the actual bots. Botnets are almost uniformly Windows-based." Since Linux machines can be used to more easily create specially crafted networking packets, they can be used in highly sophisticated online attacks, said Iftach Amit, director of security research with Finjan's malicious code research centre. Capabilities like this make Linux machines highly coveted by online attackers, and they fetch a premium in the under- ground marketplace for compromised machines, Amit said. -- Ron Johnson, Jr. Jefferson LA USA Give a man a fish, and he eats for a day. Hit him with a fish, and he goes away for good! ------------------------------ End of INFO-VAX 2007.545 ************************