[ih] What is the origin of the root account?
Larry Sheldon
LarrySheldon at cox.net
Mon Apr 15 14:07:52 PDT 2013
On 4/15/2013 3:44 PM, Larry Sheldon wrote:
> *The missing details will probably surface at ohdarkthirty some time
> soon, by which time I will have forgotten why I cared.)
I did remember something that also got us some notoriety, but this did
not have anything to do to the problem.
Among the attributes you could set on an EXEC 8 file was a bit, which
when set, made the file "Read Only" and the operating system would not
write to file, for anybody. Another bit could be set that made the file
"write only", which seems odd until you think about it a bit.
But odder yet, you could set them both at the same time. And we did.
There were traps set so that it was not possible to release the
exclusive-use locks without setting both bits, and we had a tightly
secured program that could unlock the files (for the data base) and
assign them to a run.
--
Requiescas in pace o email Two identifying characteristics
of System Administrators:
Ex turpi causa non oritur actio Infallibility, and the ability to
learn from their mistakes.
(Adapted from Stephen Pinker)
More information about the Internet-history
mailing list