From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, MAILING_LIST_MULTI autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 13350 invoked from network); 24 Dec 2021 18:14:17 -0000 Received: from minnie.tuhs.org (45.79.103.53) by inbox.vuxu.org with ESMTPUTF8; 24 Dec 2021 18:14:17 -0000 Received: by minnie.tuhs.org (Postfix, from userid 112) id 7AE919CF20; Sat, 25 Dec 2021 04:14:14 +1000 (AEST) Received: from minnie.tuhs.org (localhost [127.0.0.1]) by minnie.tuhs.org (Postfix) with ESMTP id 449A49CC01; Sat, 25 Dec 2021 04:13:57 +1000 (AEST) Authentication-Results: minnie.tuhs.org; dkim=fail reason="signature verification failed" (1024-bit key; secure) header.d=kpnmail.nl header.i=@kpnmail.nl header.b="MZJQPZEd"; dkim-atps=neutral Received: by minnie.tuhs.org (Postfix, from userid 112) id 89A369CC01; Sat, 25 Dec 2021 04:13:54 +1000 (AEST) X-Greylist: delayed 673 seconds by postgrey-1.36 at minnie.tuhs.org; Sat, 25 Dec 2021 04:13:43 AEST Received: from ewsoutbound.kpnmail.nl (ewsoutbound.kpnmail.nl [195.121.94.185]) by minnie.tuhs.org (Postfix) with ESMTPS id B6BED9465C for ; Sat, 25 Dec 2021 04:13:43 +1000 (AEST) X-KPN-MessageId: f9bbdc8b-64e2-11ec-a0ab-005056999439 Received: from smtp.kpnmail.nl (unknown [10.31.155.8]) by ewsoutbound.so.kpn.org (Halon) with ESMTPS id f9bbdc8b-64e2-11ec-a0ab-005056999439; Fri, 24 Dec 2021 18:57:35 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpnmail.nl; s=kpnmail01; h=content-type:mime-version:message-id:subject:to:from:date; bh=RC/mmlz9+3KI5BMcB7Ro3RzMbX5ybB+JUFzRjtGOCBc=; b=MZJQPZEd3xWJubWqXpyVPj+fgsOnpctZKSwOmXrdzpit/0DYQEinC55CpT5OlmeLR6GwpDAlyNR5e GXZuC9W39i+0Cb4rj+T//jyIYAdsPNu5ZLwHIv/9D0j891F0BNHfFbJOayCLyCDudzR3uEuF+4ViQu KEd86GKoNu7w9FpY= X-KPN-VerifiedSender: No X-CMASSUN: 33|AqQQyICfMyj5sSr/HXs2EU9VteX6RLdE7NogQu91q0lbkzcxhxt1IaHCxNgOGhN SlK8BfNdZHiI0bPPWKfwX/w== X-Originating-IP: 82.161.94.42 Received: from mail.ancienthardware.org (82-161-94-42.ip.xs4all.nl [82.161.94.42]) by smtp.xs4all.nl (Halon) with ESMTPSA id b2ec2261-64e3-11ec-a83c-00505699d6e5; Fri, 24 Dec 2021 19:02:46 +0100 (CET) Received: from arno by mail.ancienthardware.org with local (Exim 4.95) (envelope-from ) id 1n0otV-000fnw-SJ for tuhs@minnie.tuhs.org; Fri, 24 Dec 2021 19:02:17 +0100 Date: Fri, 24 Dec 2021 19:02:17 +0100 To: TUHS main list Message-ID: References: <936cfcbc-b3b1-99f8-6f68-ebab7e180770@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <936cfcbc-b3b1-99f8-6f68-ebab7e180770@gmail.com> Subject: Re: [TUHS] Are there images of any SVR2's available online? X-BeenThere: tuhs@minnie.tuhs.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: The Unix Heritage Society mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , From: Arno Griffioen via TUHS Reply-To: Arno Griffioen Errors-To: tuhs-bounces@minnie.tuhs.org Sender: "TUHS" On Thu, Dec 23, 2021 at 10:38:38PM -0600, Will Senn wrote: > Are there any bootable media available for any SVR 2 systems available online? > Or are they all under IP lock and key? If so, what's the closest system that is > available to get a feel for that variety of OS? A/UX for one.. It's available in images and it may be bootable on an m68k Mac emulator. Finding a more 'vanilla' AT&T SVR2 image may indeed be tricky though.. I have run into quite a lot of SVR2 UNIX installs in the past (on all sorts of CPU's), but in many cases these were fairly dedicated or almost 'embedded' systems and not so much generic-use UNIX boxes apart from a few like A/UX. I suspect the relatively small footprint of SVR2 kept it alive for quite some time, although not in the mainstream. Kept bumping into these well into the SVR4 days. Many such dedicated or small footprint SVR2 installs are totally random as to how much and which userland there is though... Some were stripped to the bone with very simple userland commands and others would have backported SVR3 or even SVR4 userland tools. Of course this was also in the days when IP was just 'one of the protocols' so many of these had all sorts of weird and wonderful network stacks hacked onto them. Bye, Arno.