informationagenation.wordpress.com

A reference journal on interesting IT topics

Archive for the ‘esoteric’ Category

Almost there

sys

Well, all the useless going, concentrating in virtualization, and fewer architectures, only SPARC, less headaches, intel, banned, no moo, this one, not mine. Soon architectural updates, once the roof in the computer room is fixed, given away so much stuff that the whole tool chain has changed, in the simpler and sustainable. Many more changes in software choices to come.

At this point don’t feel to have too much left to live, so may as well downsize and clean up, simple is often result of a long process, maybe is time to work concentrating on the last system for the next situation, guess if I live long enough, next is pocket-size micro-boards clusters, all the rack below 75W.

OTOH, the last two decades pedo-christian usury-ponzi-predator direction taken by the american intellighentsia, based on historical “facts,” and more facts, may make advisable avoiding completely most of american originated IT appropriation, as per hardware, software and even services and networks including all social “and” telephone-communication equipment.

There is something in common between second war IBM holocaust forced labor punch cards “optimization,” and today Intel espionage and remote control remote sabotage / Apple forced children slave labor of our days, AI, not that one, the other one. Sorry, not going to be accomplice, keep your phones, tablets and all other crap virtual leashing flashy idiocy, going back to critical analog and non critical digital, and to possibly non us sources of the later. All the spying agenda discovered, as per the proscription lists of second war punch cards, confirm this picture.

And the all new polemic (sounds like joke) about (government proposed to) apple “solution” back door, looks like entertaining disinformation, so all those geniuses are telling us that is “impossible” to image an i-phone and give the image to whatever (what about Lockheed ? to brute force break it with their quantum computer ?,) come out with a better excuse for your spying, please. Practically what they want is introducing systems to violate jurisdiction limitations “on the whole planet,” new world order anybody ? like nobody knows by now treaties with the us are not worth the paper they are written on, thanks to the “coup” of this pedo-christian inbred nazi mafia, hallelujah.

Written by dibi58

December 10, 2015 at 7:40 am

Here, last one (the other one become spare parts:)

Say it now or withhold it forever, micro-channel, running only big endian, sorry, no ARC, if you don’t know what it is, obviously is not something for you, here good to go, ask and you will be given, at a reasonable price, unless you know who you are:

6k1

6k1

6k2

6k2

6k3

6k3

cde-smit

cde-smit

Written by dibi58

October 8, 2015 at 9:12 am

Windows 10

leave a comment »

Just for information, as for windows 8 and 8.1, for which we replaced the whole disk with one with SuSe 13.2 x64, we are not going to upgrade to windows 10, even realizing that within one year all the windows licenses from 7 back (of systems born on computers, not the ones installed by “full” licenses from CDs,) will be expired and de-supported, both,) after an assessment where we found that we can still run pretty much all 32 bit Oracle on 2k VMs up to version 11. Within a year we may find out if or not our current vista64 and 7 (supporting Oracle 12 and 64 bit versions,) may still be usable for production, if not, they’ll go as well with no replacement, since anyhow modern distribution of application software is going to appliances, and some changes may be on the way also on our software choices (such as changes of architecture for purpose of elimination of WIFI/BT/IR support, java and all adobe products.)

The reasons for the choice, “many,” but a few here, mainly very worrisome such as the copy of all your system at M$ accessible by whoever “they” want, making illegal under any national security laws using windows 10, for which the new policies take effect on 1 August, you can read more here, for new purchases pre-loaded, (now generally 8, 8.1, and probably also soon 10,) we suggest flashing the system and the hard disks BIOS, formatting the drives “without” a UEFI partition, and installing from scratch something else, (SuSe seems a good option, inter-operable among laptops and PCs, or RH/Solaris, inter-operable also among servers.)

Now, everybody is free to make their own choices, but industries bankrupt and governments failed because of espionage are very heavy costs for nations, and at this point the espionage agenda “in hardware” does not permit any longer the solution of use of systems not attached to networks, because they are reachable anyhow via the G3 networks, in so the only hardware solutions are: 1) eliminate BYOD 2) deposit phones at the door 3) only PCs built in 2011 and before (excluding all intel for ring zero escalation bug, all sandy bridge and newer, all vpro and non not v-pro, but OK AMD and servers where LOM/ILO is on a different not connected port) 4) Elimination of windows outside of virtual machines or sealed systems with no network ports 5) Only non PC and non windows compatible (windows is now attached to PRISM) newer purchases (various different architectures to be evaluated.)

Apparently the US industry is realizing to have fucked up big times in sabotaging and spying on it’s allies (and getting caught,) now they predict that is going to cost them money, oh, “that was unexpected,” fine, we may end up buying diskless SPARC in japan, or maybe MIPS64, or what else ? big endian PPC64 ?, countries could build their own national ARM64, bye bye spie spie ;-).

Update 1: While is known that El Gamal is broken, notice that RSA has been back-doored by NSA at least since early 2k, the details, a trick in the usual random generators, in so, off-line generation of (very long, at least 4096 or 8192) keys on good RSA only on systems in the late nineties.

Update 2: Recently mainframes are becoming targets, is advisable to urgently migrate all the legacy systems (no hardware changes required, only software,) s390 to SuSe or RH, possibly going SuSe (as z-linux) now supported by IBM and Oracle, from my testing on Fedora s390 of a few years ago some interesting considerations: easier management as far as training, can run development and testing on virtual machines, (see hercules,) and vulnerabilities are patched much faster. Same (obviously) for other legacy mainframe not maintained, (“and” would be advisable migrating AIX, and all HP as well.)

Update 3: Would be advisable to migrate all critical and all old unsupported versions for general use, to Solaris 11.2, most can be taken care by virtualization, the few things not available, can be run on current SuSe and RH. Been running Solaris 11.x since exit, no known problems. Sufficient numbers of old systems (early 90s generation, “not” intel, all vulnerable,) to be preserved strictly off-line for keys generation.

Update 4: Ciphers and hashes on all older databases “and” operating systems, too weak for current breakers, (also considering parallel clusters power,) “everything” should be upgraded to latest version except mainframe legacy and windows, that should be ported to *ux, vms can be temporarily preserved with sha256, et cetera, upgrades,) “minimum” transitional supported on previous version, safer “current” version, porting of all databases to oracle legacy and mysql, sybase, all and only latest version. Passwords should be a minimum of 18 mixes of characters, upper and lower, symbols and number, with no dictionary words (in any languages,) to be minimally safe, not reusing on different accounts, minimizing online presence.

Update 5: IBM just announced an agreement with Canonical to take Ubuntu on mainframes, for now, stick with SuSe, but in the future, with Canonical, there will be very free mainframe uses for education, CNC, 3d printing, et cetera. Also, the battle with code breakers can not be won, only suppliers that upgrade ‘ahead’ of the vulnerabilities can be trusted, so, basically for the PC and WS market, you are down to “latest” BSD, Solaris, AIX, HP-UX and (verify what they use) many linux. Windoze, nope, even on AMD not vulnerable, passwords can be broken instantly, MAC neither because they only use Intel, ring zero or sandy bridge escalations, no difference, you are out of luck, time to retire “all” Intel CPU machines (except pre 2011 Itanium, unless you want to run DOS, not on network, on pre-2011, there is nothing to escalate there, is already open to all.)

Update 6: As expected, in the next move of microsoft boiling the frog, probably the windows 10 model is directed towards charging the users per month, just as comcast, or others, and now this al capone style forcing up the troth of citizens an offer that can not be refused (not by microsoft, but by the corrupt public system and education system, which force people to use microsoft for their agendas,) is going to result in the the bill gates tax to use public services, sponsored by the political clientele at taxpayers expenses, and is as usual explainable at the levels three and four of the scale of civilizations collapse of orlov, how low the western civilization has fallen, thanks to the over-procreating bigotry of the self referent pedo-clergy and banco-mafia driven “population bomb,” hallelujah.

Update 10: Now both vista 64 and win7 de-supported, with the help of a crappy electric system that has often no decent ground, another alpha and a quad core AMD fried, and with the win 7 on a dual core AMD so bloated to make it too slow to be usable, our oracle (32 bit only support for windows) stops on 11 on server and workstation 2k, no more win or VMS or tru64 alpha either, from now on we support only solaris 64 on both architectures (AMD and SPARC,) linux 64 on red hat and SuSe AMD, and will see eventually if we can do VAX/Alpha and s390 emulation, the rest, “all gone,” no moo … and don’t count on windows 32 either for too long …

Written by dibi58

July 30, 2015 at 4:53 pm

OS1 Privacy live CD, not bad …

leave a comment »

Here the pictures of the OS1 Privacy live CD distribution on the I2P network, at work:

faq

faq

tunnel-mgr

tunnel-mgr

anon-server

anon-server

tunnel-summary

tunnel-summary

router-console

router-console

press-agency-ru

Written by dibi58

July 20, 2015 at 12:39 pm

Posted in esoteric, linux, SEC, unix

Temporary working storage

leave a comment »

I have not stated this clearly, but it does emerge in multiple places in my blogs, due to the number of new ‘tricks’ on media to store on hidden places possibly important information, the use of removable media is not enough (has not been enough for a few years now,) in the sense of the known one national directive(s.) My personal take is that whatever the logistic structure of communications supporting control points is at our days, it should have one of those.

The final result when used with a common stone casting negative mold, and an optional eventual punching of protocol number, should be pleasant to the look (and the protocol) very artistic and functional for the purpose of the (same) one directive above, paper weights. That should make your beans counters happy, and become a valuable source of a ‘numbered limited series’ of storage compliant (and all accounted for,) free paper holders for your agency. 😉

Update 1: Software (crappy) issues, while we are at it, obviously some kinds of known software and operating systems for simpletons, should be ‘banned,’ AKA ‘prohibited,’ from the public administration, not to be ending up like those folks here. So far it looks like, after removing ‘all’ dos/windows, adobe and java compatibility extensions ‘and’ using not intel compatible architectures, some flavors of unix appear immune, and so looks as well the situation for the usual VMS and os390, (besides probably some ‘really old’ legacy dinosaurs.) In absence of reasonable incompatible hardware, possibly some more esoteric systems, can ‘maybe’ provide a limited amount of defense (it is however unknown for how long.)

Update 2: Site issue, wireless technology lousiest implementations, associated with BYOD, has made anything unsafe, would suggest banning personal devices (check with scanners, no devices to be admitted) and installing very high power jammers, eventually to burn them out, besides re-analyzing carefully covert channels (all this garbage with cameras and audio, and who knows what else, can record, even with no network connection, all the emissions sources now ‘also’ built in bridges and processors.) Maybe 5-10 years of prison for introducing an emitting/wireless device (including RFID) in special areas, including fines in the order of millions for manufacturers, should be a deterrent.

Update 3: Collaborators issue, is not an update, just a memento on things we know for a while, anonymous and secure are two different things, apparently putin put a bounty on whoever breaks the TOR Onion network, that is quite re-assuring in a sense (but don’t use it to check your bank statements,) for secure communications, the usual PGP/GPG work just fine with extremely large RSA keys, fits just fine on any *ux in thunderbird with enigmail extension, finally for direct communication (IPv4 to IPv4) you can use the old nnim, which has support for many strange forms of encryption, and you can compile from source, to make sure has no bugs in it. Build yourself a live CD possibly on a big endian, compile all from source after having verified the spying bugs are out, and you should be OK, any web extensions at this time should not be safe, there are a number of “unfixable” vulnerabilities in a number of products, which would suggest limiting web exposure to html only text mode, which is always good to access also on low speed lines. P2P networks could also be your friends to distribute publications, clear or encoded text, without exposing yourself to the darknet, not really necessary for now, you are mostly dealing with stupid.

Update 4: Site issues again, any external ports, IR, Bluetooth, LEDs, USB, should be surgically removed/disconnected from the motherboards, serials can be added if needed on cards, encryption card with autonomous TCB should be installed between motherboard and any media, frequency jammers should be installed to interfere with any radio emission (besides usual site preparation FC and filters rules)

Update 5: TISA espionage favouring agenda issue, sabotage with all methods, overt or covert, it is in nobody national interest to permit such liabilities, corrupted politicians and wall street trying to make a buck with fraud, can seriously affect budgets in litigations, and create an innumerable pile of liabilities, nope, no go.

Written by dibi58

March 22, 2015 at 12:59 am

Posted in esoteric, OS, SEC

Here one more for the nostalgic, SysVr4 running in virtualbox

leave a comment »

Feel good and old, LOL.

sysv

sysv

sysv2

sysv2

sysv3

sysv3

sysv4

sysv4

sysadm

sysadm

sysv5

sysv5

Written by dibi58

February 10, 2015 at 2:14 pm

Posted in esoteric, historical, unix, VM

Here for the nostalgic, Banyan vines running in virtualbox

with 2 comments

vines

vines

vines2

vines2

vines3

vines3

vines4

vines4

Written by dibi58

February 10, 2015 at 11:55 am

Posted in esoteric, historical, NET, unix, VM