G. <gerry77 at mail.com> writes:
>On Sat, 26 Nov 2016 21:26:31 +0200, Sampsa Laine wrote:
>
>> Guys, what=E2=80=99s the DCL lexical for extracting the remote host and=
> username of=20
>> someone logged into my system over DECNET? I=E2=80=99m writing a script=
> that needs=20
>> the host + username of the person connecting to a captive account..
>
>REMPORT =3D F$GETDVI("TT:","TT_ACCPORNAM")
>REMNODE =3D F$ELEMENT(0,":",REMPORT)
>REMUSER =3D F$ELEMENT(2,":",REMPORT)
Why not just translate the logicals: SYS$REM_NODE and SYS$REM_ID?
$ WRITE SYS$OUTPUT "''F$trnlnm("SYS$REM_NODE")'"
$ WRITE SYS$OUTPUT "''F$trnlnm("SYS$REM_ID")'"
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
Guys, what?s the DCL lexical for extracting the remote host and username of someone logged into my system over DECNET?
I?m writing a script that needs the host + username of the person connecting to a captive account..
Sampsa
I have sign saying:
Life is what happens to you while you are making other plans.
In my case this means that I have not had as much time to do things
regarding Tops-10 and such as I want to, but this is slowly changing.
As part of that I have updated the anfdump utility to handle DDCMP
frames encapsulated in TCP/UDP.
In case anyone wants this:
https://www.pdc.kth.se/~bygg/tops/anfdump.tar
--Johnny
The tournament runs from 23:59 GMT 15-NOV-2016 to 23:59 GMT 31-DEC-2016.
Top prize: 0.1 BTC / $70.10 USD at today's market price.
Test your terminals out by logging in as TETRIS at:
tetris-fi.sampsa.com:2328 (Finland)
tetris-uk.sampsa.com:4488 (UK)
tetris-us.sampsa.com:1337 (US)
More info (including suggested terminal programs to use) at:
https://wiki.sampsa.com/index.php?title=Retro_VT100_VAX_TETRIS_Challenge
When you do score a high score please remember to send a screenshot of your score to admin at uuhec.net - otherwise we won't be able to take it into account!
Daily high scores will be posted in:
https://www.facebook.com/groups/retrotetris/
(Or if people want, send me an email to admin at uuhec.net and I will add you to a high scores mailing list.)
Guys,
I basically had HILANT:: totally lose the plot because of these telnet botnets that are hitting port 23/tcp all over the place.
Have any of you guys been affected? I have a feeling as I?ve got a Finnish IP address I might be one of the Lucky Winners of Putin?s latest ragefest.
FYI, these scripts are smarter than the usual root/Administrator scripts - I logged in and there had been over 49,000 attempts to log in to the SYSTEM account?
Anyway, I?ve changed the NAT forwarding to another port (if you happen to use HILANT:: via Telnet it?s now at telnet://hilant.sampsa.com:2389.
Also, is renaming the SYSTEM account likely to break stuff? They seem to be targeting that specific username so I figured I?d change it to STALIN or something?
Sampsa
So I basically got another 8 IPs from my colo provider and I decided to set up a socat forwarding box.
Basically, socat will literally forward anything to anything.
So I?m going to try to set up my bridge (which currently has to deal with the fact that the HILANT WAN IP isn?t static) through it, if it works, anyone else who wants to connect through it is welcome to do so, I?ll allocate a port for you.
Sampsa
Guys,
I?m planning on running the Telnet Tetris Challenge again and I think one of you guys is hosting a TETRIS account in the US, if I recall correctly.
If not, any volunteers? I?ve got both the AXP and VAX binaries + login scripts etc, I just need someone in the US (because of ping times) to have a Telnet-accessible VMS box with a captive account for the tournament (15-NOV-2016 to 1-JAN-2017).
Thanks,
sampsa