Just read your article on EDGAR on RSX-11. It reminded me of a hack I had to pull when I was working at DEC Marlboro on the TOPS-10 OS (which we called the “monitor” for the PDP-10.
One day, our KI-10 started to become the victim of a hacker somewhere in the building. This was the days before computers were routinely networked, so we knew it was one of the users, but didn’t know who.
The hack was benign, but annoying: When you looked at a username printout, people’s names were mangled. For example, Tony Wachs, our file system guru, became “Tony Wax;” Joe Fries became “French Fries;” Jim Flemming became “Jim Phlegm”. And so on.
Since we considered ourselves OS gurus extreme, we couldn’t let this stand.
I happened to have a monitor patch that could spy on the various teletype lines (called TTYs), and also connect your terminal in parallel with the other user.
Using the patch, I started looking around one day when we saw the usernames start to change, and sure enough, I caught one of the diagnostic engineers (let’s call him Dick M.) inside a renamed copy of the runtime executive debugger (renamed to TECO as I recall, the system text editor) opening up the locations of the username table and hacking the names.
I decided to have a bit of fun with him. After watching him for a while, I connected to his terminal in parallel and typed a Control-C, which dumped him back to the command prompt. Activity ceased for a second, and he then ran his stealth copy of the debugger again and began once again to hack.
I typed another Control-C on his terminal again. Another pause. Once again, he ran his debugger.
Finally, I typed Control-C and “del *.*” without the return . . . and you never saw so many control-Cs being typed in your life!!! Finally, I typed “you’re busted!” on his terminal, got up and went over to his terminal in the diagnostic group area. You never saw such a red face!
That is way too funny!!! Years ago we were working on an extended network of microVAX machines at a small startup company. Someone "discovered" the feature that allowed remote logins on other peoples machines. This was a neat simple way to allow the visitor to your machine to run the audio program and generate a number of "special" sounds emanating from your office/cube. The favored sounds were of course bathroom in nature, a toilet flush could be heard at any point during the day for over a week. It came to a head (pun intended) when sales was escorting a potential customer through the engineering areas and flushing (as well as other) sounds were heard. A short and to the point office memo was generated that day prohibiting such "playful" activity.
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.