Chapter 235 Official Dedicated Operating System

readx;

Chapter 235 Official Dedicated Operating System

It's the middle of the month, ask for a monthly pass!

Lin Hong never thought that the distance between hackers and politics could be so close. The pen "Fun" Pavilion www.biquge.info the latest chapter of the Holy Church

This incident almost turned into a serious political incident.

The data of the "bit messenger" BBS was lost, but the Free Software Foundation quickly rebuilt it.

This incident has made the BBS even more famous, and the supporters of free software have almost made it a home base, and it has also attracted many human rights activists who are concerned about freedom of expression.

Although Richard suffered a little in this incident, he also gained a lot of influence because of it, and everyone realized some problems through this incident, and some of the original neutral people became supporters of free software.

The only regret is that there is no open source code for this software, and Richard called on the forum to hope that the authors of Bit Messenger will open source as soon as possible and join the camp of free software.

However, the mysterious author never appeared.

After this incident, everyone speculated whether the confidential information this time was released by the author of Bit Messenger?

Perhaps, the reason why he wrote the bit messenger was to publish this information more secretly?

When Lin Hong saw these rumors, he suddenly couldn't laugh or cry.

In fact, he was also interested in the authors who published these materials.

The information in the other party's hands has obviously been in hand for a long time, and may be about to announce it to the public, just in time for the birth of Bit Messenger, so he used the proxy function of Bit Messenger to publish these materials on the forum.

Apparently, the FBI's anti-hacking team didn't find any leads.

The anonymity function of Bit Messenger is not blown, it has been verified by many senior hackers, even if you are the FBI, computers and software don't know how awesome you are.

In the evening, after Lin Hong went online, Kevin sent him a message. (ใ€Šใ€‹7*

Martin: It's been a lot of noise lately, so you have to pay attention.

Stone: Because of the previous incident?

Martin: Yes. The advent of Bit Messenger has led the FBI to pay more attention to computer cybercrime. They began to build a dossier of all the hackers in the country, hoping to find the suspect from the database at any time if anything happens......

Kevin explained to Lin Hong that it is best not to act rashly in the near future and avoid the limelight. He was worried that after Lin Hong mastered the invasion technology, he couldn't help but itch his hands and accidentally found clues.

Of course, Kevin didn't expect that he highly recommended the bit messenger software used by Lin Hong, which was written by Lin Hong himself.

After this software came out, Kevin praised the author of the software, thinking that he had done a good thing for the entire hacking world, and that ordinary people could benefit from it in the future.

Martin: The advent of Bit Messenger was a heavy blow to the Aurora monitoring system, and I don't think the people who designed this system could have imagined that there would be such a software that could completely bypass their monitoring. This is the pace of scientific and technological progress, the trend of the times, they want to go against the trend, it depends on whether they have the ability.

Kevin doesn't have any liking for government and authority.

In fact, he very much agrees with Richard's remarks, believing that the other party is one of the few sober people.

Although Kevin also wanted to expose the government's pickled things, he still didn't have the guts in the end.

Now he is still the FBI's most wanted criminal, although the FBI has not given up on his wanted, but the intensity over the years is much smaller, if he exposes such as SAS systems, it will definitely stimulate their nerves, and if they increase their search, his life will not be easy.

Stone: One thing I wanted to ask you a long time ago is, do you know what system those hosts in the bank use? I once saw it in the bank's computer room, and it didn't seem to be the usual DOS, Unix or Apple system.

This question has been buried in Lin Hong's mind for a long time. (ใ€Šใ€‹7*

When he peeked at the Manhattan Trust Bank to see the robbers operating the bank's host, the system he saw was indeed very unfamiliar.

At that time, he was not familiar with the operating system, but he only roughly remembered some of the other party's operations and interfaces.

But now, he has basically learned all the common operating systems, and still doesn't know what type of system it is. Moreover, those hosts of the bank are not PCs, and they are much larger.

Martin: The operating system used in the bank is the VAX/VMS operating system, which generally runs on the VAX-11 series of minicomputers, such as the VAX-11/780.

stone๏ผšvax-11๏ผŸ

Martin: Yes. This is a kind of small machine, which is rarely seen in ordinary times, developed by DEC company, basically, many computers in government agencies in the United States are this kind of machine. For example, the Department of Defense, NASA, and some important government research institutions......

Kevin clearly knows a lot about this kind of machine and system.

He explained to Lin Hong in detail the characteristics of this kind of computer.

The full name of VAX is "Virtual Address Extension", which is a computer system established by DEC company in the 70s, based on this system VAX-11 system computer, with a unique complex instruction computing (CISC) architecture.

The VAX-11 was a big guy and was a 32-bit computer at the time, with up to 1mips of computing power. At a time when all other computers were still 16-bit, this computer was unmatched in speed and performance, and it also boasted many other very powerful networking and storage features.

The system running on this computer is VMS (VirtualMemorySystem), that is, virtual memory system, which is a special computer network operating system, although it is based on a completely different hardware architecture, but this operating system is still a little similar to other operating systems, for example, its login interface is more like the UNIX system.

Martin: So, for a hacker who is familiar with the operating system, you can quickly feel that the VMS system is basically the same as the Unix operating system, and a good hacker will use it very well in the short term, and the only difference between these systems for them is that the command prompt is not the same.

At that time, VAX/VMS was very advanced, not only as a multi-user system, but also as a communication terminal protocol (CTERM), distributed naming service (DNS), distributed file system (DFS), distributed queuing service (DQS), ...... and other powerful web applications, which are much better than other operating systems.

As a result, DEC won the government's purchase order and became a dedicated computer type for government agencies.

Even the operating system used on the Apollo lunar spacecraft is this, and there are also various satellites.

Because this computer system is very different from the popular computer architecture and operating system on the market, it is this uniqueness and incompatibility that ensures its security.

Of course, this is nothing for a hacker of Kevin's level, who can also use an emulated terminal program on his PC to connect to a vax computer.

Martin: If you're interested in this system, you can first look up some of the information on this system, although it's not common, but I think the MIT library should have it. However, I personally recommend that you should be careful when hacking, do not destroy any data, and do not leave any traces, otherwise you may get into trouble like me.

For a good hacker to be interested in all systems, they generally spend a lot of time researching and learning different operating systems. Not to mention official systems like vax/vms.

Therefore, Kevin was not very surprised that Lin Hong asked this question.

Before ending the chat, Kevin gave Lin Hong the addresses of several vax/vms servers, which are not from banks, governments or the military, but servers used by a few commercial organizations in the private sector.

Lin Hong had heard of this system for the first time. It was only then that he realized that the government had long since used more powerful computers and operating systems.

And it's even being used for spacecraft and satellite control, which is exciting to think about.

Like most other hackers, after hearing about this VAX/VMS, Lin Hong could no longer suppress his curiosity and impulse. On weekends, he went to the MIT library.

Now he has become a regular visitor to the MIT library, and whenever he has free time, he runs over there, he is like a dry sponge, hungry and thirsty to absorb the nutrients in the library, and the library of the Latin school is no longer attractive to him.

As Kevin said, the MIT library has books on VAX/VMS, not only that, but quite a few of them.

Lin Hong sighed that MIT really deserves to be called the "Holy Land of Hackers".

He quickly found two tomes, one was "The Use and Development of VAX/VMS Systems" and the other was "Principles of VAX-11 Series Computer Composition".

These two books are hard and soft, which is enough for Lin Hong to thoroughly understand this system.

When it comes to learning, time always flies.

Lin Hong was immersed in the ocean of vax/vms knowledge, and before he knew it, it was soon noon.

"Stone, what a coincidence, you're here again!"

A familiar voice sounded behind Lin Hong, followed by a person sitting next to Lin Hong.

This person is the left hand, and he happened to come here today to check some computer information, and happened to see Lin Hong sitting in his old position reading a book.

It wasn't the first time he had met Lin Hong here.

"Left hand? Why are you here. Lin Hong closed the book in his hand and asked with a smile.

"I'm going to look it up. By the way, you haven't eaten yet, right? The left hand asked enthusiastically.

Lin Hong shook his head and said, "No." I was going to buy a burger to make do. โ€

"How can this be done, you should still be in the stage of growing your body now, so you should pay attention to your diet." Seeing that he was going to eat a hamburger again, his left hand couldn't help but shake his head again and again, "There is just a Chinese student dinner today, let's go together, the location is set in the Hunan restaurant, which is just in line with your taste." โ€

"This ......" Lin Hong was a little moved, "I joined halfway, isn't it?" โ€

"It's okay, don't worry, this time it's AA, no one will have an opinion, haha!"