* [COFF] Re: [TUHS] Warning: April Fools [not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com> @ 2023-04-02 0:08 ` steve jenkin [not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com> 1 sibling, 0 replies; 2+ messages in thread From: steve jenkin @ 2023-04-02 0:08 UTC (permalink / raw) To: TUHS, coff; +Cc: Ron Natalie [ Please post follow-ups to COFF ] Ron, Thanks for the history, enjoyed very much. Quite relevant to Early Unix, intertwined with VAxen, IP stack from UCB, NSF-net & fakery. The earliest documented Trojan, Unix or not, would be Ken’s login/cc hack in his “Reflections on Trust” paper. It was 1986 when Clifford Stoll tracked a KGB recruit who broke into MILNET, then the first “honeynet” by Stoll. <https://en.wikipedia.org/wiki/Clifford_Stoll#Career> <https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)> 1986 was also the first known PC virus according to Kaspersky. <https://www.kaspersky.com.au/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds? “Brain (boot) , the first PC virus, began infecting 5.2" floppy disks in 1986.” 2nd November 1988, the Morris worm escaped from a lab, & overloaded the Internet for a week. Causing CERT to be formed in November 1988 in response. <https://en.wikipedia.org/wiki/CERT_Coordination_Center> The SANS Institute was formed the next year, 1989, creating structured training & security materials. <https://en.wikipedia.org/wiki/SANS_Institute> This structured, co-ordinated response, led by technical folk, not NatSec/ Intelligence/ Criminal investigation bodies, created CVE’s, Common Vulnerabilities and Exposures, as a way to identify & name unique attacks & vectors, track them and make vendors aware, forcing publicity & responses. <https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures> <https://cve.mitre.org> The Internet eventually became a significant theatre of Crime & Espionage, Commercial & National Security. Mandiant was formed in 2004 to identify, track and find sources of APT’s, Advanced Persistent Threats. In 2010, they described APT’s tracked in their “M-trends” newsletter. in Feb 2013, Mandiant publicly described “APT1” and the military unit & location they believed ran it. <https://en.wikipedia.org/wiki/Mandiant> <https://en.wikipedia.org/wiki/Advanced_persistent_threat> <https://www.lawfareblog.com/mandiant-report-apt1> <https://www.mandiant.com/resources/blog/mandiant-exposes-apt1-chinas-cyber-espionage-units> ============= > On 2 Apr 2023, at 02:34, Ron Natalie <ron@ronnatalie.com> wrote: > > Once again, I must dredge up this post from 1991…. ============= For future reference, Kremvax lives! [ datestamp in email header ] iMac1:steve$ host kremvax.demos.su kremvax.demos.su has address 194.87.0.20 kremvax.demos.su mail is handled by 100 relay2.demos.su. kremvax.demos.su mail is handled by 50 relay1.demos.su. iMac1:steve$ ping -c2 kremvax.demos.su PING kremvax.demos.su (194.87.0.20): 56 data bytes 64 bytes from 194.87.0.20: icmp_seq=0 ttl=46 time=336.127 ms 64 bytes from 194.87.0.20: icmp_seq=1 ttl=46 time=335.823 ms --- kremvax.demos.su ping statistics --- 2 packets transmitted, 2 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 335.823/335.975/336.127/0.152 ms ============= -- Steve Jenkin, IT Systems and Design 0412 786 915 (+61 412 786 915) PO Box 38, Kippax ACT 2615, AUSTRALIA mailto:sjenkin@canb.auug.org.au http://members.tip.net.au/~sjenkin ^ permalink raw reply [flat|nested] 2+ messages in thread
[parent not found: <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com>]
[parent not found: <CAGfO01y15ECtvirSnTgKba9C201KkXuPYjCF6mf=ypFy67hSvA@mail.gmail.com>]
[parent not found: <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com>]
* [COFF] Fwd: [TUHS] Re: Warning: April Fools [not found] ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com> @ 2023-04-02 15:53 ` John Cowan 0 siblings, 0 replies; 2+ messages in thread From: John Cowan @ 2023-04-02 15:53 UTC (permalink / raw) To: coff [-- Attachment #1: Type: text/plain, Size: 1346 bytes --] I sent this to coff, but it bounced. Trying again. [-tuhs] [+coff] On Sun, Apr 2, 2023 at 3:39 AM Noel Hunt <noel.hunt@gmail.com> wrote: Charles li reis, nostre emperesdre magnes, Set anz totz pleinz ad ested in > Espagnes. > > A translation would be most helpful. It looks like a mixture > of Spanish and Mediaevel French...ah, it is the La Chanson de > Roland. > Yes, it's Old French, and means "Charles the king, our great emperor[*] / Seven full years has been in Spain." You pronounce it pretty much like Spanish, except for the "z" which is pronounced "ts". [*] Old French had two noun cases, nominative and oblique (a combination of the Latin genitive, dative, accusative, and ablative). In 99% of modern French nouns, only the oblique survives. In particular, "emperesdre" is the old nominative of "empereor"; it survives today in the name "L[']empriere". A dozen nouns picked up different semantics in the nominative and both survived: sire/seigneur, prêtre/Provoire (proper name), copain/compagnon, pâtre/pasteur, chantre/chanteur , maire/majeur, gars/garçon, and (most surprising) on/homme. In a few nouns, only the nominative survives: soeur, peintre, traître (English traitor is from the oblique), and the names Charles, Georges, James (now in English only), Hugues, Marie, and Eve. > [-- Attachment #2: Type: text/html, Size: 3629 bytes --] ^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-04-02 15:53 UTC | newest] Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com> 2023-04-02 0:08 ` [COFF] Re: [TUHS] Warning: April Fools steve jenkin [not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com> [not found] ` <CAGfO01y15ECtvirSnTgKba9C201KkXuPYjCF6mf=ypFy67hSvA@mail.gmail.com> [not found] ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com> 2023-04-02 15:53 ` [COFF] Fwd: [TUHS] " John Cowan
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).