Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

OK, a war story (sort of)

60 views
Skip to first unread message

Bob Eager

unread,
Feb 22, 2024, 5:38:30 AMFeb 22
to
In my first year as an undergraduate, we were taught BASIC - it was the
only language available online, as opposed to in 'batch' mode via punched
cards and printer (I ended up teaching that course myself some years
later).

After a few weeks of BASIC, I decided to learn assembly language for the
mainframe - an ICL 4130, which was a 24 bit word oriented machine with
96kW of memory. In practice, the best type of target program was a
'subsystem' for KOS, the online facility. Users had only 1536 words of
working memory (excluding the code itself), and about 600 of those were
used for the I/O system and other services. Nevertheless, I wrote a simple
linear regression program (mirroring the one we had done in BASIC for an
assessment).

Running a subsystem was something for which one had to get permission, as
a fault could stop the online system (although a simple operator command
would continue it from the stop point). Once I had proved myself, I was
allowed to write more programs.

However, I (and others) became increasingly ambitious, and did some
naughty things. Fairly early on, I 'acquired' a copy of the (assembler)
source code for the online system, KOS. My first venture into the
'naughty' area was to write a program that would simulate the effect of
Ctrl-C (well, its equivalent in those days) on a specified terminal. I was
able to do this by modifying a status bit in the terminal multiplexer
device driver (I had previously found a way to write anywhere in the
entire machine's memory, subverting the memory management). Later, I
discovered that I could remotely log someone out as well.

Various other programs followed, and a few of us decided it would be a
good idea to be able to submit batch work to the batch queue via a
terminal, instead of on punched cards. One could then use other languages
such as Algol and FORTRAN, which were not available in the on-line system.

This wasn't too difficult:

- Load a program that inserted itself between the executive card reader
driver and the batch system.
- Fulfil requests for 'next card' by getting one from the card reader
driver and passing it on - until an end of job card was detected.
- Pass on the end of job card, but follow it with card images taken from a
previously prepared file.
- At the end of that file, reconnect the batch system to the card reader
driver and exit the program.

It worked perfectly. Except ... when the computer operators came to
collect up all the punched cards for the completed jobs, and reconcile
them with their associated printouts ... there were no cards for one lot
of printout! They spent some time looking for them, and to avoid further
suspicion, action was taken. Cards were quickly typed for the 'phantom'
job, and dropped down the back of the table that held the trays of
returned cards. Then: "Oh look, what's that down there?".

We got away with that one. Over time we encountered restrictions on
running subsystems, and had to write a loader. That is another story.

--
Using UNIX since v6 (1975)...

Use the BIG mirror service in the UK:
http://www.mirrorservice.org

D

unread,
Feb 22, 2024, 8:45:55 AMFeb 22
to
Thank you for sharing! =)

I'll add a story about a brilliant joke. It's not mine, but still a good
story!

An acquaintance of mine was working for a low-level/hardware consultancy
firm, and one summer someone at the company decided to have a bit of fun
with the CEO.

So what to do?

Since this was a company good with low-level stuff and hardware, he
decided to create a little mod for the CEOs keyboard. So when the CEO was
on vacation they opened his keyboard and installed the little chip.

So what did it do?

It contained a randomizer and a list of naughty words, so each n:th
keypress (n randomly determined), the chip would insert a naughty word. So
once the CEO was back in office, everything started out great, but all of
a sudden a meeting invitation had this weird naughty word in it, a
presentation had one and so on.

The CEO ran antivirus, didn't find anything, rebooted, didn't work,
re-installed his PC, didn't work, and before his frustration reached
dangerous levels, the keyboard was switched back.

That's the amount of fun and power you can have with low-level hardware
knowledge! ;)

Best regards,
Daniel

Bob Eager

unread,
Feb 22, 2024, 9:56:45 AMFeb 22
to
Brilliant!

I'll post another soon.

Ahem A Rivet's Shot

unread,
Feb 22, 2024, 10:00:05 AMFeb 22
to
On Thu, 22 Feb 2024 14:45:49 +0100
D <nos...@example.net> wrote:

> It contained a randomizer and a list of naughty words, so each n:th
> keypress (n randomly determined), the chip would insert a naughty word.
> So once the CEO was back in office, everything started out great, but all
> of a sudden a meeting invitation had this weird naughty word in it, a
> presentation had one and so on.

Sweet - at a PPOE a colleague introduced a small piece of code into
the keyboard handler on a number of machines. It randomly substituted
characters for one adjacent on the keyboard - with a probability that
depended on the time intervals between the last few characters. Type slowly
and everything is fine, type fast and you mistupe thongs quite
realistixally getting worse the faster you tyoe/

--
Steve O'Hara-Smith
Odds and Ends at http://www.sohara.org/
For forms of government let fools contest
Whate're is best administered is best - Alexander Pope
0 new messages