Computer Old Farts Forum
 help / color / mirror / Atom feed
* [COFF] Re: [TUHS] Warning: April Fools
       [not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com>
@ 2023-04-02  0:08 ` steve jenkin
       [not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com>
  1 sibling, 0 replies; 2+ messages in thread
From: steve jenkin @ 2023-04-02  0:08 UTC (permalink / raw)
  To: TUHS, coff; +Cc: Ron Natalie

[ Please post follow-ups to COFF ]

Ron,

Thanks for the history, enjoyed very much.
Quite relevant to Early Unix, intertwined with VAxen, IP stack from UCB, NSF-net & fakery.

The earliest documented Trojan, Unix or not, would be Ken’s login/cc hack in his “Reflections on Trust” paper.

It was 1986 when Clifford Stoll tracked a KGB recruit who broke into MILNET, then the first “honeynet” by Stoll.

	<https://en.wikipedia.org/wiki/Clifford_Stoll#Career>
	<https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)>

1986 was also the first known PC virus according to Kaspersky.

	<https://www.kaspersky.com.au/resource-center/threats/a-brief-history-of-computer-viruses-and-what-the-future-holds?
	“Brain (boot) , the first PC virus, began infecting 5.2" floppy disks in 1986.”

2nd November 1988, the Morris worm escaped from a lab,
& overloaded the Internet for a week.

Causing CERT to be formed in November 1988 in response.
	<https://en.wikipedia.org/wiki/CERT_Coordination_Center>

The SANS Institute was formed the next year, 1989, creating structured training & security materials.
	<https://en.wikipedia.org/wiki/SANS_Institute>

This structured, co-ordinated response, led by technical folk, not NatSec/ Intelligence/ Criminal investigation bodies,
created CVE’s, Common Vulnerabilities and Exposures, as a way to identify & name
unique attacks & vectors, track them and make vendors aware, forcing publicity & responses.

	<https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures>
	<https://cve.mitre.org>

The Internet eventually became a significant theatre of Crime & Espionage, Commercial & National Security.

Mandiant was formed in 2004 to identify, track and find sources of APT’s, Advanced Persistent Threats.
In 2010, they described APT’s  tracked in their “M-trends” newsletter.
in Feb 2013, Mandiant publicly described “APT1” and the military unit & location they believed ran it.

	<https://en.wikipedia.org/wiki/Mandiant>
	<https://en.wikipedia.org/wiki/Advanced_persistent_threat>
	<https://www.lawfareblog.com/mandiant-report-apt1>
	<https://www.mandiant.com/resources/blog/mandiant-exposes-apt1-chinas-cyber-espionage-units>

=============

> On 2 Apr 2023, at 02:34, Ron Natalie <ron@ronnatalie.com> wrote:
> 
> Once again, I must dredge up this post from 1991….

=============

For future reference, Kremvax lives! [ datestamp in email header ]

iMac1:steve$ host kremvax.demos.su
	kremvax.demos.su has address 194.87.0.20
	kremvax.demos.su mail is handled by 100 relay2.demos.su.
	kremvax.demos.su mail is handled by 50 relay1.demos.su.

iMac1:steve$ ping -c2 kremvax.demos.su
	PING kremvax.demos.su (194.87.0.20): 56 data bytes
	64 bytes from 194.87.0.20: icmp_seq=0 ttl=46 time=336.127 ms
	64 bytes from 194.87.0.20: icmp_seq=1 ttl=46 time=335.823 ms

--- kremvax.demos.su ping statistics ---
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 335.823/335.975/336.127/0.152 ms

=============

--
Steve Jenkin, IT Systems and Design 
0412 786 915 (+61 412 786 915)
PO Box 38, Kippax ACT 2615, AUSTRALIA

mailto:sjenkin@canb.auug.org.au http://members.tip.net.au/~sjenkin


^ permalink raw reply	[flat|nested] 2+ messages in thread

* [COFF] Fwd: [TUHS] Re: Warning: April Fools
       [not found]     ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com>
@ 2023-04-02 15:53       ` John Cowan
  0 siblings, 0 replies; 2+ messages in thread
From: John Cowan @ 2023-04-02 15:53 UTC (permalink / raw)
  To: coff

[-- Attachment #1: Type: text/plain, Size: 1346 bytes --]

I sent this to coff, but it bounced.  Trying again.

[-tuhs] [+coff]

On Sun, Apr 2, 2023 at 3:39 AM Noel Hunt <noel.hunt@gmail.com> wrote:

Charles li reis, nostre emperesdre magnes, Set anz totz pleinz ad ested in
> Espagnes.
>
> A translation would be most helpful. It looks like a mixture
> of Spanish and Mediaevel French...ah, it is the La Chanson de
> Roland.
>

Yes, it's Old French, and means "Charles the king, our great emperor[*] /
Seven full years has been in Spain."  You pronounce it pretty much like
Spanish, except for the "z" which is pronounced "ts".

[*] Old French had two noun cases, nominative and oblique (a combination of
the Latin genitive, dative, accusative, and ablative).  In 99% of modern
French nouns, only the oblique survives.  In particular, "emperesdre" is
the old nominative of "empereor"; it survives today in the name
"L[']empriere".  A dozen nouns picked up different semantics in the
nominative and both survived: sire/seigneur, prêtre/Provoire (proper name),
copain/compagnon, pâtre/pasteur, chantre/chanteur , maire/majeur,
gars/garçon, and (most surprising) on/homme. In a few nouns, only the
nominative survives: soeur, peintre, traître (English traitor is from the
oblique), and the names Charles, Georges, James (now in English only),
Hugues, Marie, and Eve.

>

[-- Attachment #2: Type: text/html, Size: 3629 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-04-02 15:53 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <em1be8dba3-c3b7-4aaa-be88-f6ab071b6e45@ad99ed46.com>
2023-04-02  0:08 ` [COFF] Re: [TUHS] Warning: April Fools steve jenkin
     [not found] ` <CAD2gp_TjDavZwXPuzOnaBodd5jYiUQe608AQ2Ho56mzhQPLrew@mail.gmail.com>
     [not found]   ` <CAGfO01y15ECtvirSnTgKba9C201KkXuPYjCF6mf=ypFy67hSvA@mail.gmail.com>
     [not found]     ` <CAD2gp_QyrLGNtiORkDEkm9Ntf4XRenzO4Ci8PuMpd1sKkKpaBw@mail.gmail.com>
2023-04-02 15:53       ` [COFF] Fwd: [TUHS] " John Cowan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).