March, 1984
~ouu ,,'''"'',,' m"",",
''-
,.".,,~
,m
"".~,,,.
'"'"." .............. ~.• ,,,.;,.,,~. ,.",,"~;,,"
" "...
105 downloads
691 Views
396KB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
March, 1984
~ouu ,,'''"'',,' m"",",
''-
,.".,,~
,m
"".~,,,.
'"'"." .............. ~.• ,,,.;,.,,~. ,.",,"~;,,"
" ", .., ",. """k ,...... "
.! "'" ",."
~
~~
I,m
FSLN J
VOLUM£ONE, NUM8£RTHREE
THE CONSTITUTION OF A HACKER With every generation of human.<, there arc cerlain types' of individual< that emerge. There an: (alway. ll.a"" been Bnd always will be) leade.., followe", general nui,ance,. etc.
And Ihc" there are folk. who like to play with lhings and figure oul how lhey wu'k. Before technology carne along, there really wa,n'l all that
much for the'e people 10 play around with. And certainly there waJ no way for t1",m to (Xlol their resources except through face-to-face communications.
With tetel'hones, of cou"e, all aspects of human life changed. Here was a toy thatQ"yo"e~ouldplay wilh and gel virtually unlimited results. But afcours", mOSl peopled;dn'l
(and don't).ee II thai way-,phon.. are pho...s and nOlhing more. Vou't<: no.t supp.osejuljo'oty of ca·..., computer hackers don't gain anytmng .. Jliaterial or l'loa.neial from. Iheir exploration. A'dd to lli:'l the high ri.k of gening caught and it becom.. very hrd for Jha averase cilizen to understand what motivllto; theS¢ pe.,p~. Many computerhobbyist~,io fact, are re.entful of hackers, consi~rlQllctbell} immature and trouble.ome, Quae a fcw cO!ilput~bullctlQ l)oard' prohfbil celtain topics from belUJ:! discuned, lind wli,en they do, haoking is almnst alway. one of the'ri':T'tie',.. ;"Ioilleji/Stiracationbehind thi•• since the image at: ail "".n"plder u...... can he advenely affected by wh.at, tnt ,J;aj;i;en ~o. There areal~ "th~.l ,people who in.iS! on telling eve')'one that ~~inS:jnlo"e,""puter by phone i.jn.t like phy,ically breaking,iritoa Itom. orolrl«. FOltUnalely, that logic ,eem.< toJ"?JIt~fed by ""!YJew people. In .pite of all"f.(t/¢ lhrct. aod. crilici.m, though, the hackc .. are not"clcll0l!lli'up th",r act," Andpnblic opinion. particularly amoNi.tbc·yo.ung. ........ to be.in their favor. mo'tly a' a resulLo(i'Ilcdia,,:oVerage. There'" eveifICwt:e1dyTV program aboul hckers called TI,e W!ri= Krdt.::,SlleJrwk,llli.group of amazing kid. ha. a new advenlnre. The ..:npu are a bit moronic bminleresting nOllethal.... In
le"on, they break into another computer and enter his name a' heing deceased. In each program, th... kids brck into at leaot one new compuler. BUI do they ever ll"t ;nlo trouble? Of course not. Fi"l ofalUhey're only children. And «cond, they're emering the.e computers for gond reasons, even if they are unauihorized. Now what kind of meosall" is thi, prngram conveying? Apparently, if. OK to inwde other people'. princy if your intention. are ultimately ~g<>od.~ It .ound. like snmething Reagan would gel a kick out of. A genuine hacker breaks inlo compute.. for the challenge. He', not out 10 save the world, nor to de.troy it. He is not out to make a profit out of what he's doing. Therefore, it's not fait to calegori", hima. a criminal and ;t'. ju.t a. wrong to say he'••ome sort of a 'avior. Technological enlhu.iasts operate Wilh the .ame motivalion that a good mountain climber h.... Regardl... of what may happen 10 him, a computer hacker will a/wars he imerested in playing with computers. It'. in hi. nalure. And any laws thai are created to "eliminate~ hacking .imply won't work becaU-'e of these facts. The'" will alway. he people who wanl 10 experiment wilh Ihing. and this urge cannot be stifled. Did hacking come 10 a grinding hah heeau.e of Ihe "414" scandal? Or because of the Telemail raid.? No. Judging from the proliferation of computer bulle.tin board. where hacking is discu.sed, if. gening bigger than ever. The reali'lic way for the owners of large cnmputer .ystem. to look al Ihi. i. to regard hacker. a. net;CSSOT,I" SffUri/.l' check.<, That'. righl. Necessa')' hecau$/: if the hackers weren't the one. tn break in, who would he? Lefs assume lhat hacke" had never even tried tn break into the Memorial Sloan,Kellering Cancer Center compulet, Someone else would have, because the system WaS practically wid. open. And maybe they would have had a ,cason to gel into Ihe .yotem-to do various nasty lhing,. But now, because of what the hackers did, Ihe Sloan_ Keltering .ystem is more secure, One could almosl!kiY that a person with hackingabilitie, has an ohUgolion to lry' and get into a. many differenl 'yllems a. he can. Let's get nationali.tic for a moment. If you have the number for a top_.ecret governmenl cnmputer in Fl. George G. Meade, Mo, odd. are that the Albanian, have it al..,. Now, would il be helter for them to br.ak into Ihe .ystem and find oul all kind. of nice thing. orfor you 10 break in alKl he discovered, fordng lhe .ystem 10 become more protected? And, if you do hreak in, don't you de.erve a ' note of Ihanks for waking them up·! Keep in mind, though, lhat a Compuler hacker is under "" obligation to turn himself in or warn operators lhat their 'y'tem i. ea.ily penetrable. Il'Slhe joh of lhe .ysop. 10 notice when their compnters are being tampered wilh and if lney don'l delecl you. lhen thaI'. a .ecnnd security lap,e for Ihem. This i. n pragmatic vicw, however .hocking il may ,eem. In c1o.ing, we .hould poinl oul [(l the hackers themselve' lhal lhere is no need to worry or frOl if Iheir mClhod, or .ecret, are evenlUallv'd i'covcrcd. Thi, i, only lhe beginning. Our world i.' lurning illlo a technological playground,
ALTEKNATE LUNG UllSTANLE First of a persistent series - how the companies work and a guide to Mel SWAGIMA. That"lhe word that Nat;"na[ Public Radio ""., to de.enbe long distallCC services. It .land. for SBS (or Skyline). Western Union (Qr Metrorone), Allne! (or Combined Network Services), GTE Sprint, lIT, Mel, and of course AT&T. And there arc many mor., each of which will eventually be covered in our pages. Right now though, we'd lik. to give you an ide. of whal these 'Jot.DIS arc and how they work. E"""IM for AT&T, aU oflbe above.yalenu work ina fairly similar manner. (Thi. will be changing very soon and very dramatically under the tenna of tile Bell di""stiture.) Each system has its own .. ric. of network.. Le. land-lines, lines leucd from AT.t.T, microwave relays. satellite links, etc. They each have 10Cll1 city access numbers, although.nme lik. Allnel and Mel have .peeial ways of""iog a ~tra""l~ service by dialing a special number, ·while Sprint uses a "travelcode" to access lIod.. outside the lubseriber's city. On others, like Metrofone. you can use the lame authorizatinn ende from any of their acces, point•. A loog diotallCe telepbone company co",iots .offour.major P¥''' you bave your'input-that i.. a local"""".. number or a toll_free "800" oumber to alXesa theill'item. When you do thi" a device called a "switch" SlIIwen, giving you the familiar "computer dial tone." Whell you enter your authorizalioo code aod destination number. you are routed over their network. The beart of the .ystem i. the controlling 'l'item, whieh includes tbe ".,.,itch." Thi, ill the computer that cbecb lhe aUlborization code, b", provi.ions for timeof-day re,trictions, traveleod.., aconunling codes, and the like. They have a few provioion. whieb the long-dislan« le!"Vices don't· appear to uoe, lOch as the infamous ~,peed number" re<:ordins wbich was a favorite of many pbone pbreab (for reasonl·ynu'll ,oon know if you don'l already). The 'yotem "beck.IO see ifthe location belngdialed i, on Ibe network, and act, aconrdingly. It makes a log of numbe", called, the aUlborization code, and time usage which i. stnred on a word prOCCSliing tape and tben read byanolher 'ystem for billing. Some companie. charge in oro: minole incremenlS, although the .ystem ha, the capability 10 record time U3age in 6 ....ond illCrements. There are Quite a few different systems in use today. A couple of the mo,t commoo 00.. are made by Northern Telecommunication" which is ba:led in Dallas, Tex,,". Anoth" company that ..ll, ,imilar equipment io Rockwell We,com. MCI allegedly io in the pr0CCS3 of buyiog new ,witches from them. and they will be installed hy Dynacomp Teitoommunicationa. also based in Dallas. Mierowut Links Most of the low costsem.... al Olle point oranother, use microwave antennu to tran,mil calls. Each microwave station is loested aboUl.30 mil.. fromesch other to make up for the curvature of the earth sin... microwav.. travel in a straight line. Eacb of Ihe,e nations has 4 disb .. (at Ieslit). One dioh is used 10 receive from a p......ioUll Slj;tion and nne io Uled to transmino lhal 5Iation. The other two dioh.. do the ,arne Ihiog 10 lhe destinalion stati":o_one. receives and one tran.mits. So iryou lll.lke a eall3000 mil.. away, you may wind up.Soing through lOll differenl microwave slation" many of whieh you can see nesllo major highways. Thio io how the alternate lons·di.tancecompani.. manage to charge less than AT.t.T; they Use their own systems. But thi, is al,o why, in many in.tance.. the sound quality i.
poorer on lhe alt"nate oemces. Remember, a chain of microwave towers io only a, ,trong ... its weakeot conoection. A LooI\ at MCI MCI (Mierowa"" Communication. Inc.) wao thefi",t new kid on the blnek, way back in 1967 wben lhe idea of an alleroate phooe oervice wu almoot uoheard of and practically illegal. MCI wao rll'St used solely by businesses who wauted 10 eommonicate belween the
)
=== -- - ----- - --= =-= -=--=-=== 718 is coming!
"It wa' funny aL firsl when 1he kid' changed the password,
so the leache'" couldn'l gnt into their programs in Ihe The New York Stale ,Public Service Commission ha, ,ystem,~ SIIid Alex Rascon, a school official. "Bulthen Ihey vOled to begin dividing New York City inlO lwoare. oode, 'Iarted d<:leling grad.."ailering tbe other kid" homework, on September I 10 "prevenl .0 impending oxhau"ion of and tampering Wilh Ihe teachers' file,. "These kids are whilles-they're very brighl," he wen1 on. lelephone numbe,,:' At lhal time, the old 212 orea code will· begin to rnaoh only ManhaUan and lhe Bronx, wherea' a "Fortunately we caughl it before 10" much damage wa, brand new areaeode, 718, will ,tarlto work for Brooklyn, done. AI Ihis point il can be easily correcled.~ Aihert Cook, the assist.nt San Diego 'uperinlcndenl, Queen" and Slaten Island. The whole syslem becomes look lhe sor.head approach. ~We still haven'l decided m.ndatory on January I, 1985. , Charle' Herndon, a New York Telepbo,," ,pokesman. whelher charge, will be filed Wilh the San Diego Police said that lhe 718 codo wa, ."igned to the oily ye.rs ago by Departmenl," hc said. lhe Norlh Am«ican Dialing Pl.n, a group that admini'lers area code' in lhe U.S" Mexioo, .nd Canad •. "Of lhe numbers available .1 the lime, 718 was lhe besl," he 'aid. "There Weren'l that many available." The Person Numbers The P,S.c. rejected reoommendat;on, by a con,ullant (Economics and TechnologY, Inc.) hired by lhe City Board r" A~<"" 'en Sweden's Person Number i' a IO-digil figure lh.l tells who of Estimat... Those recommendation, called for lhe you are, where and when you were born, and your ,eX. Every implementalion of the 718 area code, however, in'lead ~f using il for people, lhe consultanl ,uggesled usmg It compuler file in the country is based on the Penon Number, exclusively for compulers, paging sy,loms, and other whelher iI" al a bank, a ho,pilai, an employer, the 'ocial welfare ollice, or Ihe tax authoriti... device" since they were the main rca,on for t~e new .re. Peraon Numbers went into effect on January I, 1')47 and oode in the fi"t pia... {1600 would like 10 go on record ., enthu'ia'tically' wcre compUleri.ed 20 years ialer. Recently, a government ,Iudy suggested the orealion of a super_dalabank (ba,ed on supporling lhe idea of an entire .... code of machine,.] lhe Person Number) Ihal tbe Cenlral Bureau of Statistic' couid use freely. By calling up a Person Number on a Supercomputer dialups lerminal, the bureau would be able 10 find oul delails on everylhing from a pe"on', illnesse, and criminal record to A'tronomy and aslrophy,ics are galhering '0 much data by 'elescope lhese days. tbal il cannot be handled by hi' income .nd debts. Critics of the plan ,ee lhi' a, an erosion of oivillibertie', conventional compule .., according to Dr. Vincent !eke of One s.id, "The file, wiil coll..,1 more information on a lhe Universily of Minnesola. pe",on than he can remember him,eIL" To remedy lhe problem, Dr. Icke cal,led for lhccrealion of a centr.1 supercomputer f.cility lhal would be .1 the di'posal of all astronomers and astrophysicists nalionwide via telephone iine,. I", ",,' \'0"
,,~,
Furthermore... '""'•",~All"""'" compule", sei~ed by the FBlla"
Wiretap City
10,"," '0" ,_
After an investigation, Ihe New Havcn (Conneclicul) Board of Police Commi..ioners, • civilian body lhat ove",«s lhe Police Department, revealed in 1978 that the deparlm<:n1 bad routinely lapped the pbones of re'idents from 1964 to 1971, apparently 10 monitor radi""l polili""l activily. Thi" 'Ibe board' said, was illegal. In De.:cmber 1982, after il had, been disclo'ed Ihat Ihe p~one, "r ,ome 3000 residcnl. tiad been lapped, tbe Federal DlSlricl Courl in Bridgeport made lhe Case a etas' aelion, inviling anyone ... h" fell wronged to become a plainliff. So far, 12.10 people have bcc<>me plainliffs, They include .evnr.1 judges, lawyers. and olher prominent polilical flgur., and, of'cou""", a' greal m.ny membera of the Yale faculty.
Students Cause Havoc
In
Computer
A group of 'Iud<:nl' at Gompers Secondary School in San Dicgo lapped inlo lhe ,ohool's Compuler.y.tem l.st m"/llh, cnu.ing.1I kind' of problem"
Telemail raids have either been relurned already or are in the process of beingsenl back. Newdevelopments in Ihe""... re expected shortly. • Telenet now hang, up arter 3 connection anempts, whelher they're ,uc..",ful or nol. Thi, mean, lh.l iasl month's article (HtlCking "n Td.....') i, alre.dy ,Iighlly ouldaled, but only unlil ,omebody flgu.-.. out. wayaround lhis lal..l hurdle. o Some more sign, of lhe divestiture-thi' lime it', Ih. 950 exch.nge. This i, a oniversal exchange Ibal i' {or will ,oon bel working ,""ywMr... 950-1022 and 950-1088 give alLernalC 'long dislance diahones. (The laller belong' 10 Skyline.) Tbe connection i' cry'tal clear and loll_free, Evenlually. lhe 950 will bedropped .nd you will di.1 IOXX 10 make long di.laoce calls, where XX i' the carrier ofy"", choice. You can't access 950', in olber area code,. o Ea.lcrn Airline, ha' changed its mi~d about allnwing porlable com pUlers on nigh", leaving only American A"hnes muinlaining lhe h.n. o 202 and 214 nOw have .Ul;'m.led directory ... i"allce t"o, Havc v"u Cheeked v"u' ,or.," ende tnJ",,'!
THE FIRST ATOMIC BOMB: A TRUE TALE This Slo'y was originally relal~d by ''--''uro Fermi. widow <>/ Ih. "oelro' physici.., EM/CO Fum;, who. %nX wilb a.'_
fl','"e,',
would follow lhe wires. so we wal~ed down lhe streel looking overhead at the wires on lhe pole as we wenl along. Finally, we turned down one slreel and ,aw a hou,e. The telephone pole, and wires from all dir=lion' ,eemoo (0 come down to (hi< house. Th<:re must have been hundred. of wir•• from telephone pole. all coming down onlolhe,ideof this house and going in through an opening. W. notioed that th.r. Wa, a front porch light which wa, on. The front door was open. but there was a 'creen door which Wa!l dO'Sed, We went up on the front porch and looked into Ihe hou.e. A ,witchl>oard was lhere. and there were a dozen or more lights 00 theswilchboard lit, blinking offand on as peOplewcr. n.. hing the,witch hook. on Iheirphon.. trying to rai'e lhe operator. The room was just dimly lit. and near the switchboard was a .ofa. and a woman waalaying on the .ofa sound asleepl Enrico ponnded very lOUdly on the .creeo door, and 'houte
Do you have a story about computers or phonesrSend it to us! If we print it, you'D get a year's subscription to 2600! Tire address: 2600, Box 752, Middle Island, NY 11953.
Mel
(conti"u.N from page 2)
their office.. Which lakes away the task of haviog to dial the MCI access number. In addition, you don't,have to enter an authorization code and you don't oven ha"" I" have touch_ tones"'. y"u ,imply piok up the phone and there's your MCI diallone! According 10 MCl, y"u have to make at leaS! $75 worth of out-of..tale calls p<:r mOllth for this system to pay off. Of course, Y<'u can't acoes, operator~, directory assi'taoce, 800 numbers. and that s"rt of thing l>/:eau", I) MCI doesn't support any of thOlie services and 2) they're certainly not going to let you conne<:t to something they can't charge you for. Of course, if you know whal you're
doing. you can roule calls in .ucb a way lhal oumbers that aren'l ,upposed to go through for you will w"rk, and Ood knows where it finally shows upl This doesn't inVOlve exira code" blasliog the lioe with tones. or anything overly suspiciou,. All you need is the rigbl combination of area codes. Now Ibis ha' been proven to work with MCI dcr:licated line.: it'. rumoured to work on dial-up. as well... Finally, MCI is .tarting to offer its own phone booth,at airports, which we'll report on as ,o"n as we find one. And of cour.e, tber.'. MCI Mail, an electronic overnight mail service .U1rted up lasl fall which hackers arc currently prnbing. When, we get conclusive re.nlts on that. we'll pass them along, MCl can he reached at 8006246240.
page
2600 The following is ARPANet.
ARPANet
II.
list
eenneer.e
many
of
hosts
that
are
accessible
throu
systems together. allowing them to ae
r-_ electronic mail. transfer files. and be able to work on each other computers. The network 119 very intricate. containing many subnet including the one below, called "MILNET". short for "Military Network That is. our military. This is a small list. encompllssinq approx1111ate one .twentieth the entire number of systems accessible through ARPANe Notice the PENTAGON-TAC below. Thisfs an access point for people in t government. Operating system: Host address: Host name: Host type: ""''''''',,,,==== ~~"''''''=='''=''''''''',. "'''''''''=:====''''''''''''''''''===="'''' ..'''..''' NOSC-CC VAX-1l1750 26.0.0.3 UNIX PDP-UnO 26.2.0.3 LOGICON UNIX 26.3.0.3 26.0.0.8 26.1.0.8 26.2.0.8 26.3.0.8 26.6.0.8 26.7.0.8 26.1.0.13 26.3.0.13 26.0.0.14 26.6.0.16 26.0.0.17 26.0.0.18 26.3.0.18 26.5.0.18 26.6.0.18 26.0.0.19 26.1.0.19 26.2.0.19 26.3.0.19 26.6.0.19 26.7.0.19 26.4.0.20 26.0.0.23 26.3.0.23 26.0.0.24 26.1.0.25 26.0.0.26 26.3.0.26 26.0.0.29 26.1.0.29 26.3.0.30 26.0.0.33 26.3.0.33 26.0.0.35 26.1.0.35 26.3.0.35 26.4.0.35 26.0.0.36 26.1.0.36 26.0.0.39 26.1.0.39 26.1.0.45 26.3.0.46 26.1.0.48 26.0.0.49
NPRDC
VAX~ll1780
NRL
VAX-ll1750 VAX-ll1780
NRL-AIC NSNe-WO NRL-TOPSI0 NRL-ARCTAN NRL-CSS GUNTER-ADAM " ATC-KEESI CMU-CS~B
RIACS- ICARUS
MITRE RADC-MULTICS RADC-TOPS20 RADC-UNIX GE-CRD NBS-VMS NBS-SOC NBS-UNIX NBS-PL NBS-AHRF NBS-SSl OCA-EMS
UNIX UNIX UNIX
VAX~ll1750
UNIX
DEC-I0 PDP-1l/40 VAX-1l1780 DEC-2060 BURROUGHS-B/29 DEC:I050 VAX-1l1730 C170 HONEYWELL-DPS-8/70H DEC-2040T PDP-ll/45 VAX-1l1780 VAX-ll/780 VAX-1l1780 VAX-ll1750 PDP-llI70 VAX-1l1780 VAX-ll1750
TOPSI0 RSXll UNIX TOPS20 BTOX/UNIX TOPSI0 UNIX UNIX MULTICS TOPS20 UNIX VMS VMS
cno
IIMS
UNIX UNIX
VMS
UNIX UNIX TOPS20 TOPS20 UNIX UNIX
USC-ECL!! USC-EeL
DEC-I090B
NADC
VAX-1l1780
DDR'
C170
PENTAGON-TAC TCACCIS-CSC
BRL
C/30 VAX-1l1750 PDP-llI70
APG-l
C170
ATC-RANDl
NOSC-SECURE3 NOSC-F4 COINS-TAS
BURROUGHS-B/29 PLURIBUS PLURIBUS PLURIBUS VAX-ll1780 PLURIBUS FOONLY-F4 PLURIBUS
HAWAII~EMH
el70
UNIX
EDWARDS-VAX EDWARDS-2060
VAX~1lI7B2
VMS
DEC-2060T VAX-ll1780 PDP-llI70 PDP-II/50 DEC-IO
TOPS20 UNIX UNIX RSXllM
NPS
FNOC-SECURE NOSC-SECURE2 NOSC~TECR
ARDC
OKC-UNIX
AFWL BBNB
DEC~1090B
TAC
VMS UNIX UNIX BTOS/UNIX
PLI PLI PLI
VMS/EUNICE
PLI FOONEX
PLI
TF.NF:X
26.0.0.50 26.3.0.50 26.7.0.50 26.0.0.53 26.2.0.53 26.4.0.53 26.5.0.53 26.6.0.53 26.2.0.54 26.1.0.55 26.2.0.55 26.0.0.57 26.2.0.57 26.0.0.58 26.1.0.58 26.3.0.60 26.0.0.61 26.1.0.61 26.1.0.64 26.3.0.64 26.0.0.65 26,.2.0.65 26.3.0.65 26.1.0.66 26.3.0.66 26.0.0.67 26.1.0.73 26.4.0.73 26.0.0.74 26.1.0.74 26.].0.74 26.3.0.78 26.0.0.81 26.1.0.81 26.].0.81 26.0.0.82 26.3.0.82 26.4.0.82 26.9.0.82 26.0.0.87 26.0.0.88 26.0.0.90 26.4.0.92 26.1.0.95 26.2.0.95 26.3.0.95 26.2.0.97 26.1.0.103 26.2.0.103 26.3.0.103 26.1.0.104 26.4.0.104 26.3.0.106 26.,0.0.112 26.0.0.117
. DARCOM-TEST LSSA-DBI ETL-Al Af'SC-AD Af'SC~DEV
NCSC MARTIN EGLIN-VAX
VAX-1l1750 NAS3-5 VAX-llI7BO PDP-1l/45 PDP-1l/44 VAX~1l1750
TYCHO
PDP-1l/45 VAX-l11780 PDP-1l170 VAX-Ill 780 VAX-1l1750 PDP-11/70
MARYLAND
VAX~1l1780
ACC ANL-MCS COMPION-VMS
VAX-1l1780 PDP-l1/44 CECOM-l FOONLY-P4 DEC-2040 BTL-HOSTI VAX-1l1750 ALMSA-l VAX-1l1750 HARTIN-B PDP-1l/45 ROBINS-UNIX DEC-2020T Af'SC-SD VAX-llI7BO AEROSPACE PDP-1l/45 MARTIN-ED PDP-1l/50 AFGL MITRE-BEDFORD VAX-1l1780 DEC-2040T Af'SC-HQ SRI-HARF PLURIBUS FOONLY-F4 SRI-F4 DEC-2040T SIMTEL20 C170 HSMR70A C/70 HSMR70B PDP-1l170 MCCLELLAN VAX-1l1750 NEMS VAX-1l1750 NALCON VAX-1l1780 DTRC C/70 BBNCCT C170 DUN2 BBN-RSM PLURIBUS C/30 TEPl DEC-2060T SANDIA VAX-1l1780 NLH-MCS VAX-1l1750 LA!IL NAVDAF-NEHPORT UNIVAC-llOO FOONLY-F2 SI-A SI-B VAX-HI750 VAX~1l1750 SI-C VAX-1l1730 PAXRV-NES DEC~1090T USC-ISlE VAX-1l1780 ADA-VAX DEC-I090T USC~ISI DCEC-LSUS2 IBM-lS8 IBM-158 OCEC-LSUS ARPA-PNGll PDP-1l/34 STL-HOST2 BBN-C/60 KOREA-EMH el70
NYU BNL
UNIX
MVS VMS RSXllM RSXllM UNIX
RSX VMS UNIX UNIX
VMS UNIX UNIX UNIX UNIX TENEX
TOPS20 UNIX
VMS UNIX TOPS20 UNIX RSXllH RSXllH UNIX TOPS20
PLI TENEX
TOPS20 UNIX UNIX UNIX UNIX UNIX UNIX
UNIX UNIX
PLI TOPS20 UNIX UNIX
CMS HAlTS UNIX UNIX
VMS TOPS20
VMS TOPS20 MVS/SP MVS/SP
EPOS UNIX UNIX