IBM are scumbags. I was a Sequent employee when IBM acquired us. As part of the acquisition, our length of service with Sequent was grandfathered into IBM. A while later out of the blue, our terms were changed so that length of Sequent service no longer counted. Two weeks later most of the ex-Sequent folk were downsized, with their severance pay based on (you guessed it) length of service. So instead of some long term Sequent people getting 15-20 years severance, it was reduced to around the two years we had worked for IBM. Like I said, scumbags.
31 posts • joined 14 Oct 2010
Re: Dialog boxes as "Security" (theatre?)
Except that the box that pops up is generated by the system, not the app that's trying to be installed, so there's no capability for the app to tinker with the dialog box contents to spoof the user. As previously stated here, in order for this malware to be installed the user needs to open System Preferences and disable "Gatekeeper" and then enter their admin password when prompted by the system dialog box. It's hard to see what else OS X can do without completely banning users from installing any apps that are unsigned or unrecognized, which would certainly cause a shitstorm of protest.
Re: Sorry, has to be said.....
Two minutes checking the source reveals that this software installs into the /Library/LaunchDeamons folder. This is a system-protected folder that cannot be written to without the user entering an admin password when prompted. OS X is no different than any other platform in this respect. If a user authenticates a piece of software to go ahead and install itself, then all bets are off. There are idiot users on all platforms.
I also ponder a company withdrawing their products for sale in a region. It would be fun to witness but it's unlikely to happen. Taking Google for example - their business model requires them to continuously find ways to expand the population of users they collect data about, and also increase the amount of data they collect per user, in order to increase the value of the data they provide their customers. Deliberately reducing the user population by pulling the plug on the French, for example, would not be in the best interests of Google and their shareholders.
Leo III Reminiscences Part 2
The programs for a particular customer were arranged in a 'suite'. This usually consisted of an input program, a sort, the main processing program, another sort, and then a print.
For a payroll suite, this would contain data like hours worked that week per employee, etc. The input data was punched onto paper tape by a Data-Prep group. This was a team of about 40 (all female, never saw a male DP). Each set of data was actually punched twice. The first time it was punched onto yellow tape, then the yellow tape was fed into a verifying machine while it was punched a second time onto white tape. The verifier would compare what was being punched with what was on the yellow tape, and stop if there was a discrepancy so the DP could fix the discrepancy. These DP girls were amazing - they could carry on full conversations while punching and not miss a beat. As a fresh faced 18 year old, it was quite intimidating walking into the room to collect the paper tapes, and have all the conversations stop so they could check you out.
The tapes from the DP group were read and the data written to a mag tape, using the first program in the suite. This mag tape was then used as the input tape to a sort program, that sorted the data into the right order for processing (duh). The standard sort program (07004 if I remember rightly) had an input tape, an output tape, and two work tapes. The data was read from the input tapes onto the work tapes, and then the work tapes were successively read/written and rewound while the data on them was progressively sorted into order. Usually it would take several read/write/rewind passes before the sorted data could be written to the output tape. More intensive sort jobs could be done using program 07006, which used 3 work tapes. Sort programs were what were running when you see the old computers in movies. They were quite impressive to watch, as all the tape decks would be in action, sorting the data between them.
This program read the tape produced by the sort program, and did all the calculations and number crunching on the data. On a typical payroll suite, this would do all the pay and tax calculations for each employee. The calculated data was written to an output tape that was then sorted again by another trip through the 07004 sort program.
The output tape from the sort was then read by the print program (06060) and printed onto either continuous plain paper, or continuous special stationary (like paychecks). The printers were 120 0r 160 column drum printers. To start with there used to be carbon inserts for 2 or 3 part printing, but later they introduced new-fangled carbonless paper. As operators, we would have to take the boxes of printed paper and 'decollate and burst' them. This involved a complicated an temperamental machine that would feed the continuous paper through, and simultaneously remove the carbon and split the paper where it was perforated into individual pages. I never managed to get away without getting covered in carbon ink from sorting out paper wrecks.
That's probably enough information for anyone to take in one sitting. For anyone still reading - thanks for indulging me :-)
Leo III Reminiscences Part 1
The console had a typewriter that the system used to communicate to the operators. It was used for output only, the operators used a bank of switches to issue commands to the system. There were 3 groups of 4 toggle switches, each group representing a hexadecimal (or more precisely an EBCDIC) number, and a spring-loaded 'Stack' switch that you pressed to execute the command entered on the 12 toggle switches. So a command would be something like entering 4-0-2 on the 12 keys, and then press the Stack key to execute it.
The 4-0-2 command was used to run a program (they were called programs rather than 'apps'). You would load a tape containing the program code on a mag tape deck, load a paper tape with the program name, serial number, and run number into a tape reader, and then execute the command. This would load the program from mag tape and run it.
Strictly speaking, the middle zero in the 4-0-2 command was a 'route' number. Each set of peripherals were on a separate channel, with each device having a rotary switch that you could set to an address 'route' within that channel. The nearest tape reader to the console was usually set to zero, hence the default 4-0-2.
A 1-0-3 command (I think) was used to load a 'Release Tape Index' (RTI). The RTI was a list of mag tape numbers that were OK to write on. Each tape had a serial number, and a corresponding card in a card index. The card was manually updated with details of what data was written on the tape. When the data was no longer needed, the tape was 'released', the tape number punched onto a paper tape in batches of 12 at a time, and then read into the system using the 1-0-3 command. When you loaded a mag tape, the system would read the serial number on the first few blocks, and would check it against the list of tape numbers from the RTI you had loaded. It would not write on a tape without its number being on the RTI.
A 3-0-1 command would do a core-dump to a mag tape. This was later printed (remember there were no monitors back then) and used by programmers to debug errors.
There was also a command for changing the priority of a program compared to other programs that were running, so you could get the best timesharing performance. I can't remember the command number for that though.
When I left school in 1968, my first job was as a computer operator on the Leo III at Hartree House. 22 microseconds to read a memory location (this was 3/1 - the first Leo III built, later models had a 13 microsecond read time). Four banks of core memory, 8 tape decks, 2 paper tape readers, 2 card readers, 3 printers, too early for disk storage. Programs were written in Intercode (basically assembler code) or CLEO (Clear Language for Expressing Orders). The system ran 24x7 doing bureau work, payroll runs, etc, for customers. Able to timeshare up to 4 apps at once, memory permitting.
I still remember some of the commands we used to toggle on the console keys, but can't remember what I open the fridge for. Go figure...
Microsoft Dynamics didn't make the cut when we were choosing a CRM system, because it will ONLY work with Internet Explorer. We tried it with Firefox, Safari and Chrome, Opera, etc. It refused to work. This is just plain stupid, trying to force people to use your free web browser and possibly loosing the sale of a CRM system because of it.
Some places you need a gun
As a non-gun-owning ex-Pat Brit who now lives in the US, and not a fan of widespread gun ownership, I have to concede that there are parts of the US where having a gun makes sense. Montana is one of those places. The wildlife in those parts will eat you if they get the chance. You can't fight a bear/cougar/pack of wolves without some kind of firearm and expect to survive. Even in the suburbs it's not unknown for hungry bears and cougars to raid the garbage bins in your back garden, or break into your car to get groceries. As much as I don't like general gun ownership, if I moved to Montana I'd be down the local RS or gun store buying weapons for myself and my family and booking us into a firearms training class.
Don't forget the oceans
Apparently as the oceans warm up, the water can't hold on to as much CO2 (much the same way as cold fizzy drinks hold on to more gas than warm fizzy drinks). So as the oceans warm they will release more CO2 into the atmosphere, which leads to temperature increase, which leads to the ocean getting warmer and giving up more CO2, etc.....
Trojans are not viruses
There isn't an OS on the planet that is secure from Trojans. As long as you can trick a user into authorizing a piece of malware, then you're off to the races. UNIX and Linux systems will want a root password to run anything that infects system files, if you enter the password then you're gullible or stupid. Viruses will infect without user authorization. Unix and Linux systems have never really been troubled by viruses because of the need for root passwords to do any damage, and later versions of Windows are also trouble free providing they're kept patched. Trojans are a problem for everyone.
Not so big boys
People who think they're big boys use Windows. People who are actually big boys use Unix systems to get their big work done, say like a 12 core Mac Pro system for Final Cut. And what a pathetic comment about Windows machines not coming with the "ability" to boot OSX. There's no such thing as a "Windows" machine. PC's are agnostic about what they run, it just happens that Macs support all the major OS's whereas regular PC's don't run OS X unless you do some fairly easy EFI hacking.
Taking it lower I see
Sigh, this wasn't personal until you made it so, which is symptomatic of fanboism so maybe you should look in the mirror. Actually I use all of the OSs I mentioned so I'm not particularly a fanboi. I'm just aware that a Unix/Linux system is inherently more secure and stable than a WIndows system, and it's architectural design rather than obscurity that helps makes it so. So I use Windows for things that Windows does better than Unix/Linux, and Unix/Linux for everything else, including my online activities. It's not like it's really hard to set up a Linux system for doing online stuff, takes about 15 minutes with just a few mouse clicks. Hell, even boot a live Linux CD if nothing else.
If you'd step back from your own clear windows fanboism and look at the big picture, you'd maybe see that what I said is true, although I'm not optimistic on that front. When 100% of the zombies in a botnet are based on a single OS architecture, then what other conclusion is there than it's better to avoid it if you care about your online security? This is common sense, not fanboism.
More useful than you think
Actually my post is more use than you might think, but it's akin to admitting that "the Emperor has no clothes". I would hazard a guess that the answer to my question is: Windows = 100%, Linux = 0%, and OS X = 0%. So if you look at the bottom left corner of your screen and you don't see a button called "Start", then you can relax for the time being. If not, then you may well have been recruited by a botnet, and because of the insidiousness of the infections there is no easy way out of it. But all is not lost - use something other than Windows if you have a choice.