Hey guys,
I'm seeking some hardware technical expertise.
I have a DEC 3000-300L and have a CRT monitor (with RGB & SOG).
The monitor is over 13 years old and I'm not sure how much longer it will last.
A friend stumbled upon a Sun LSA 800 flat panel monitors at a resale shop.
Online search show the LSA 800 does Sync on Green, but not find details on resolution and freq.
Anyone know if the Sun LSA 800 support the resolution and freq of the Dec?
I'd like to swap out the CRT with the Sun LSA 800, but don't want to pay the shipping and then find out the Sun isn't compatible.
Thanks
Mike
Hi,
Can I get my IP updated to 50.131.150.11 please? This should be static-enough. ;)
GRE is being forwarded right through to a cisco 2620 I picked up at weirdstuff along with some weird stuff. ;)
Some people might have noticed that Mim.Update.UU.SE have not been
reachable the last week. This is because the University have decided to
put all systems behind firewalls, which hurt the Update computer club
pretty bad.
For people who would still like to get access to Mim, I have now setup
telnet to listen to a second port in addition to port 23. Mim is now
accessible by telnet on port 10023 as well, which is not blocked by an
firewall.
In addition, I also added ftp on port 10021 in addition to port 21, so
people who would like to get to files on Mim by ftp can do so again.
This also prompted me to make a couple of improvements to BQTCP/IP for
RSX. The changes are that the telnet daemon can now be set to listen to
an alternative port, and can also listen to several ports.
I also added the capability to the ftp client to specify which port to
connect to.
The TCP/IP package can be found at ftp://mim.update.uu.se:10021/
However, if you have the previous version of TCP/IP for RSX, you cannot
access this address, as the previous version ftp client did not accept a
port argument. So it's a bit of a chicken and egg thing. But using some
intermediate system, you can get the disk image to the machine, and
install the new version, after which things will be possible to use more
or less as before.
One more thing: NEMA, my very tiny EMACS clone for RSX, have gotten a
lot of work done lately, and if anyone is interested in this tool, I
really recommend that you fetch the latest version. A port to VMS is
also included with the files now, courtesy of Erik Olufsen.
NEMA is available at ftp://nema at mim.update.uu.se:10021/
Johnny
--
Johnny Billquist || "I'm on a bus
|| on a psychedelic trip
email: bqt at softjar.se || Reading murder books
pdp is alive! || tryin' to stay hip" - B. Idol
All,
I am trying to bring my PDP-11/83 "Frodo" address 30.1 on to HECnet. I've been running Johnny's BQTCP and used FTP and TELNET to work from RSX11M+ to the rest of the internet. Now I want to connect to HECnet.
I've reNETGENed and added the IP multinet device, rebooted and run INS.CMD and it
all looks good. I do need to open the port in my router and direct it to the PDP-11 when I know the correct port #.
I'm in the HECnet node database but I need to connect the IP-0-0 network line in BQTCP to another HECnet node.
The PDP-11/83 DECnet name is Frodo and it is at DECnet 30.1
my static (as far as I know) IP address is 24.100.118.162 and it's DNS name is Matlock.DYNDNS-IP.COM
I would need to know:
the port # for the connection (700?)
the host name at the end of the connection and it's DECnet address?
also what cost you would like me to use for the circuit
Again I am VERY new to HECnet but have been around DECnet since 1981.
Thanks!
Mark Matlock
CHIMPY:: can be reached at telnet to hilant.sampsa.com port 2710.
This is for EU players.
I still need someone to host a US server as lag really is an issue.
Any volunteers? (I?ve got binaries for the AXP version but having some issues getting the VAX one to work)
This year's prize is THREE QATARI RIYALS plus of course a printed certificate of your amazing Tetris skills. The competition will run until October 1st, 2016.
As before, please if you get the current high score, please take a screenshot of it and email it to sampsa [at] mac.com.
sampsa
I've been working on rewriting parts of the VAX simulator(s) to avoid some of the undefined behaviors that the C language has relating to overflow and shifts of signed integer values.
Changing the details of how instructions are implemented comes with the non trivial potential to break more things than are being fixed. To manage this, I've been trying to use the basic CPU diagnostics that DEC for the systems being simulated. I have found the VAX Diagnostic Supervisor for the 11/730, 11/750 and 11/.780. I'm missing the VAX 8600's diagnostic supervisor.
If someone knows where I can find a version of this file it would be helpful.
Thanks.
- Mark
supratim at riseup.net writes:
>What monitoring tools are folks using here?
>
>I have so far found Ergosol's Watchdog - it provides a neat solution to
>high-level server security, status and connectivity monitoring with
>email alerts. I tweaked it a little for adjusting it to OpenVMS 7.3 -
>you can grab it from http://sanyal.duckdns.org:81/pub/rampage.sav
>
>I am getting (NUMEROUS!) emails from all intrusion attempts and whenever
>someone logs in to the monitored accounts, as well as when any of the
>monitored HECnet nodes or internet IPs are unreachable.
>...
As maintainer/author of Clyde-Digital's-(then)-> Raxco's-(then)-> ProvN's
Intruder Alert product, emails -- such as provided by your Watchdog -- will
soon overwhelm you and you'll soon either ignore them, or supress them, or
sequester them for review well after the fact.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
Johnny Billquist <bqt at softjar.se> writes:
>On 2016-06-20 19:30, Brian Schenkenberger, VAXman- wrote:
>> Johnny Billquist <bqt at softjar.se> writes:
>>
>>> On 2016-06-20 18:19, Brian Schenkenberger, VAXman- wrote:
>>>> ___ _ _ _ __ __ _ _ _ _ ___ _____
>>>> / __| /_\ | \| | \ \ / / /_\ | | | \| | | __| |_ _|
>>>> \__ \ / _ \ | .` | \ V / / _ \ | |__ | .` | | _| | |
>>>> |___/ /_/_\_\_|_|\_| |_| /_/ \_\ |____| |_|\_| |___|_ |_|
>>>>
>>>> You've allowed this node on HECnet, so I assume somebody on this list knows
>>>> who runs it.
>>>
>>> Who runs it can always easily be found by http://mim.update.uu.se/nodedb
>>>
>>>> Please have it secured! It has been used in the past several
>>>> days to try and break into my system(s). It is highly irresponsible to put
>>>> access credentials into its SYS$ANNOUNCE allowing ANYBODY access to DCL and
>>>> other utilities that can affect systems on the internet. A reasonable way
>>>> to allow access would be to have a guest account (restricted/captive) that
>>>> can be used to create other login accounts. Validate such accounts with a
>>>> valid email address and other schemes that will insure that whomever is on
>>>> this system can be vetted in some fashion.
>>>>
>>>> THANK YOU!
>>>
>>> I'm curious about what kind of intrusions we're talking about, and over
>>> which network.
>>>
>>> In general, I want to keep HECnet more open than what you are suggesting
>>> above, but this also requires that people act responsibly. If there is
>>> abuse, I'd like to know.
>>
>> Well, since I have not yet put any of my systems on HECnet, it should have
>> been obvious that it's via the internet.
>
>Ah. Sorry for being dense. Thanks.
>
>So what kind of intrusion attempts are we talking about? Essentially
>your issue is that someone have a machine on the internet. Getting
>access on the machine is easy, and something/someone on that machine is
>trying to do something to your machine?
Well, for one, trying brute force attacks agains services. Here are some of
the FTP attempts from 108.31.82.9.
admin
support
guest
vizxv
123
1234
12345
123456
cisco
admin
service
1234
root
support
vizxv
123
12345
123456
xc3511
7ujMko0admin
root
root
support
123
12345
123456
xc3511
smcadmin
1234
xc3511
meinsm
vizxv
admin
admin
service
service
root
root
xc3511
12345
meinsm
dreambox
user
changeme
12345
pass
vizxv
user
changeme
root
I'm guessing that, due to the repeated nature of the usernames attempted, the
system has been logged into by a great many different twits.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
Jordi Guillaumes i Pons <jg at jordi.guillaumes.name> writes:
>
>> El 20 juny 2016, a les 20:14, Brian Schenkenberger, VAXman- =
><system at TMESIS.COM> va escriure:
>>=20
>> 108.31.82.9.
>
>Uh, I=E2=80=99d bet the simulated 3900 is not the real origin of the =
>attack you are getting. It is probably behind a home DSL/cable router, =
>whith port 23 redirected to the 3900=E2=80=99, which has probably a =
>private IP address masqueraded using NAT=E2=80=A6 So probably the node =
>owner has been hacked and zombified, regadrless of he having a pet 3900 =
>open to the net.
That may very well be true too. I have found many attack vectors over the years that
have originated from home routers. Several home routers have known/identified/easily
exploitable weaknesses. Regardless, I will check to see if this IP address continues
to aggrieve me now that it's been reported that FTP is no longer possible from the VMS
instance.
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
I speak to machines with the voice of humanity.
Hello,
Does anyone have that thing? The ALPHA one is in vaxhaven (where there is also a HALF of a TK50 kit), but I?ve not been able to find the VAX one.
Thanks in advance.