[ih] Why is there (still) spam...?

Nigel Roberts nigel at channelisles.net
Tue Jul 29 04:36:28 PDT 2025


That may indeed be what I was thinking of.

Then again, was it perhaps possible to use that to kill some important 
process?.

It's a very long time ago!


I may also be confusing this with a proposal we had for MUD which would 
allow any adventurer to bring down the system.

THERE IS A BUTTON HERE, UPON WHICH IS A LABEL "DON'T PRESS ME"

 >PRESS BUTTON


A HOLLOW VOICE SAYS "DON'T PRESS ME AGAIN"


 >PRESS BUTTON

THE ENTIRE WORLD HAS BEEN COLLAPSES INTO A POINT SINGULARITY

(crash).


Again, maybe that never got implemented and was merely talk over 
coffee/pinball after the teletype room closed for the evening.




On 29/07/2025 10:35, Steve Crocker wrote:
> Nigel,
>
> If I recall correctly, ITS had a command, Gun, that killed a specific 
> process, not the entire system.  Any user could kill another user's 
> process.  This explicit lack of security was included to make it 
> uninteresting to find ways to find hacks -- a word that meant 
> "interesting and clever tricks," not the later and current negative 
> meaning -- of breaking into the system.  It was, in my opinion, an 
> amusing and quirky way to counter the tendency of smart youngsters to 
> find ways to misbehave, but it seemed obvious to me this strategy 
> would only work within relatively small communities.
>
> Perhaps someone on this list can comment further.
>
> Thanks,
>
> Steve
>
>
> I was in the MIT-AI lab in 1967-68, before the machine was connected 
> to the Arpanet.  I don't know if security was added later.
>
> On Tue, Jul 29, 2025 at 3:32 AM Nigel Roberts via Internet-history 
> <internet-history at elists.isoc.org> wrote:
>
>     >> Computers were attended by armies of administrators and operators,
>     >> who protected their expensive resources with the technology of the
>     >> day, such as passwords and quotas.
>     >
>     > That does not sound like what I remember hearing about, for the
>     > operations and use of some of the MIT research computers...
>     >
>     Not exactly my recollection, either.
>
>     If we are talking about MIT computers I remember the following
>     interchange, the first time I connected to ITS in early 1978.
>     (It's been
>     a long time so please forgive the many inaccuracies in remembered
>     syntax)
>
>     @O70
>
>     :LOGIN NIGEL
>
>     YOU DO NOT APPEAR TO HAVE ACCOUNT. WOULD YOU LIKE ONE?
>
>     :Y
>
>     WHAT WOULD YOU LIKE TO BE CALLED?
>
>     NIGEL
>
>     WELCOME, TOURIST.
>
>
>
>     Such casual use by this stranger from overseas who just happened
>     to have
>     worked out how to connect to the only ARPAnet node in the UK and
>     thence
>     to the systems, particularly MIT-AI (134) and MIT-DM (70) was
>     actively
>     encouraged.
>
>     Following which we found DUNGEON aka ZORK.
>
>     And it was this passwordless openness that inspired the creation
>     of MUD,
>     the ancestor of most all multiplayer games.
>
>     (I know the folks at DM were really doing some statistical stuff, and
>     the DM stood for Dynamic Modelling or something close to that, but I
>     always remember it as "dungeon masters".)
>
>     The ITS command :OS allowed you to watch what was going on any other
>     terminal, and I even have a vague recollection that there was a
>     command
>     that allowed anyone to crash the system.
>
>     So, not exactly that guarded.
>
>
>     -- 
>     Internet-history mailing list
>     Internet-history at elists.isoc.org
>     https://elists.isoc.org/mailman/listinfo/internet-history
>     -
>     Unsubscribe:
>     https://app.smartsheet.com/b/form/9b6ef0621638436ab0a9b23cb0668b0b?The%20list%20to%20be%20unsubscribed%20from=Internet-history
>
>
>
> -- 
> Sent by a Verified
>
> sender


More information about the Internet-history mailing list