* [COFF] Re: [TUHS] Warning: April Fools
[not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com>
@ 2023-04-02 0:08 ` steve jenkin
[not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com>
1 sibling, 0 replies; 2+ messages in thread
From: steve jenkin @ 2023-04-02 0:08 UTC (permalink / raw)
To: TUHS, coff; +Cc: Ron Natalie
[ Please post follow-ups to COFF ]
Ron,
Thanks for the history, enjoyed very much.
Quite relevant to Early Unix, intertwined with VAxen, IP stack from UCB, NSF-net & fakery.
The earliest documented Trojan, Unix or not, would be Ken’s login/cc hack in his “Reflections on Trust” paper.
It was 1986 when Clifford Stoll tracked a KGB recruit who broke into MILNET, then the first “honeynet” by Stoll.
<https://en.wikipedia.org/wiki/Clifford_Stoll#Career>
<https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)>
1986 was also the first known PC virus according to Kaspersky.
<https://www.kaspersky.com.au/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds?
“Brain (boot) , the first PC virus, began infecting 5.2" floppy disks in 1986.”
2nd November 1988, the Morris worm escaped from a lab,
& overloaded the Internet for a week.
Causing CERT to be formed in November 1988 in response.
<https://en.wikipedia.org/wiki/CERT_Coordination_Center>
The SANS Institute was formed the next year, 1989, creating structured training & security materials.
<https://en.wikipedia.org/wiki/SANS_Institute>
This structured, co-ordinated response, led by technical folk, not NatSec/ Intelligence/ Criminal investigation bodies,
created CVE’s, Common Vulnerabilities and Exposures, as a way to identify & name
unique attacks & vectors, track them and make vendors aware, forcing publicity & responses.
<https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>
<https://cve.mitre.org>
The Internet eventually became a significant theatre of Crime & Espionage, Commercial & National Security.
Mandiant was formed in 2004 to identify, track and find sources of APT’s, Advanced Persistent Threats.
In 2010, they described APT’s tracked in their “M-trends” newsletter.
in Feb 2013, Mandiant publicly described “APT1” and the military unit & location they believed ran it.
<https://en.wikipedia.org/wiki/Mandiant>
<https://en.wikipedia.org/wiki/Advanced_persistent_threat>
<https://www.lawfareblog.com/mandiant-report-apt1>
<https://www.mandiant.com/resources/blog/mandiant-exposes-apt1-chinas-cyber-espionage-units>
=============
> On 2 Apr 2023, at 02:34, Ron Natalie <ron@ronnatalie.com> wrote:
>
> Once again, I must dredge up this post from 1991….
=============
For future reference, Kremvax lives! [ datestamp in email header ]
iMac1:steve$ host kremvax.demos.su
kremvax.demos.su has address 194.87.0.20
kremvax.demos.su mail is handled by 100 relay2.demos.su.
kremvax.demos.su mail is handled by 50 relay1.demos.su.
iMac1:steve$ ping -c2 kremvax.demos.su
PING kremvax.demos.su (194.87.0.20): 56 data bytes
64 bytes from 194.87.0.20: icmp_seq=0 ttl=46 time=336.127 ms
64 bytes from 194.87.0.20: icmp_seq=1 ttl=46 time=335.823 ms
--- kremvax.demos.su ping statistics ---
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 335.823/335.975/336.127/0.152 ms
=============
--
Steve Jenkin, IT Systems and Design
0412 786 915 (+61 412 786 915)
PO Box 38, Kippax ACT 2615, AUSTRALIA
mailto:sjenkin@canb.auug.org.au http://members.tip.net.au/~sjenkin
^ permalink raw reply [flat|nested] 2+ messages in thread
* [COFF] Fwd: [TUHS] Re: Warning: April Fools
[not found] ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com>
@ 2023-04-02 15:53 ` John Cowan
0 siblings, 0 replies; 2+ messages in thread
From: John Cowan @ 2023-04-02 15:53 UTC (permalink / raw)
To: coff
[-- Attachment #1: Type: text/plain, Size: 1346 bytes --]
I sent this to coff, but it bounced. Trying again.
[-tuhs] [+coff]
On Sun, Apr 2, 2023 at 3:39 AM Noel Hunt <noel.hunt@gmail.com> wrote:
Charles li reis, nostre emperesdre magnes, Set anz totz pleinz ad ested in
> Espagnes.
>
> A translation would be most helpful. It looks like a mixture
> of Spanish and Mediaevel French...ah, it is the La Chanson de
> Roland.
>
Yes, it's Old French, and means "Charles the king, our great emperor[*] /
Seven full years has been in Spain." You pronounce it pretty much like
Spanish, except for the "z" which is pronounced "ts".
[*] Old French had two noun cases, nominative and oblique (a combination of
the Latin genitive, dative, accusative, and ablative). In 99% of modern
French nouns, only the oblique survives. In particular, "emperesdre" is
the old nominative of "empereor"; it survives today in the name
"L[']empriere". A dozen nouns picked up different semantics in the
nominative and both survived: sire/seigneur, prêtre/Provoire (proper name),
copain/compagnon, pâtre/pasteur, chantre/chanteur , maire/majeur,
gars/garçon, and (most surprising) on/homme. In a few nouns, only the
nominative survives: soeur, peintre, traître (English traitor is from the
oblique), and the names Charles, Georges, James (now in English only),
Hugues, Marie, and Eve.
>
[-- Attachment #2: Type: text/html, Size: 3629 bytes --]
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-04-02 15:53 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com>
2023-04-02 0:08 ` [COFF] Re: [TUHS] Warning: April Fools steve jenkin
[not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com>
[not found] ` <CAGfO01y15ECtvirSnTgKba9C201KkXuPYjCF6mf=ypFy67hSvA@mail.gmail.com>
[not found] ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com>
2023-04-02 15:53 ` [COFF] Fwd: [TUHS] " John Cowan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).