Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Westbrook

This goes way, way back. In the 70s mainframes did this all the time. I worked on sherry and univac mainframes, and I often patched the Dispatcher algorithms on the fly.
But, since most of today’s kids have never worked on mainframes, this seemed a novelty to them.
Same for the concept of virtual machines. These are not new concepts, but implemented decades previous.
Nothing new under the sun (except to those who were not alive back then).


7 posted on 03/07/2014 5:37:26 AM PST by ImaGraftedBranch (...By reading this, you've collapsed my wave function. Thanks.)
[ Post Reply | Private Reply | To 6 | View Replies ]


To: ImaGraftedBranch

Should read sperry. Thanks, iPad.


8 posted on 03/07/2014 5:37:55 AM PST by ImaGraftedBranch (...By reading this, you've collapsed my wave function. Thanks.)
[ Post Reply | Private Reply | To 7 | View Replies ]

To: ImaGraftedBranch

Thanks IGB.

You can find the histories out there on the net.

This is all way way old stuff.

The biggest difference between today’s OS’s and those of 50 years ago is that today - since every rube out there is carrying around a computer with them - they are all working with the gubmint to provide them with the opportunity to spy and hack into people’s ‘puters.

I absolutely hate the idea of auto updates for which I do not have to specifically approve each one in order to apply them. I want to understand exactly what is changing.

Not to mention, in a business or organizational setting, where one has “dev” “test” “prod”, all changes must be system tested. Well, they don’t have to be, but then there will the occassional catastrophe with one’s computers.

To get around people’s objections, they love to simply bury one in tons of updates. Now you can’t possibly review them all. They love to say it’s “to keep security updated”. In fact, blasting in thousands of unknown, untested updates, where you trust some “governing committee” of open source, or some Fortune 500 company, both of which are knowingly or unknowingly allowing the gubmint’s operatives to influence their operations, is a surefire way to have nice backdoors for gubmint into your computers and have no idea that you do.

The backdoor is rarely a direct backdoor. It’s mostly hidden in plain sight, simple architectural weakness.

If one is then lax with system administration, the doors are left open. And the way OSs are designed today, one has to be a paranoid security guru in order to not be “lax”.

The ‘puter business now, like so many others, is a minefield of scams aimed at the sheeple.


9 posted on 03/07/2014 6:26:57 AM PST by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 7 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson