[HN Gopher] Back in 1993, I was taking a number theory class
       ___________________________________________________________________
        
       Back in 1993, I was taking a number theory class
        
       Author : renameme
       Score  : 125 points
       Date   : 2021-05-03 21:53 UTC (1 hours ago)
        
 (HTM) web link (twitter.com)
 (TXT) w3m dump (twitter.com)
        
       | jmercouris wrote:
       | I remember in high school renaming programs to "calc.exe" so we
       | could run them. Back when these kinds of protections were so
       | primitive :-)
        
         | drummojg wrote:
         | When I was in college, we would set the process name of the MUD
         | client to whatever WordPerfect used on the VAX so we wouldn't
         | get busted for playing games during non-gaming hours. Of course
         | the sysadmins saw right through the charade, but it was fun to
         | feel like you were getting away with something for half a
         | minute.
        
         | Waterluvian wrote:
         | We had this StudeNT Vista thing and yeah it was so much fun
         | finding exploits.
        
         | QuinnWilton wrote:
         | My highschool physically removed the right mouse button from
         | the mice, because we were right clicking to make text files
         | that we'd rename as batch files to get a command prompt open.
         | 
         | Some people would just bring their own mouse in to get past the
         | defences.
        
           | chungy wrote:
           | Doesn't seem extremely effective unless you also remove the
           | F2, F10, Shift, and Alt keys from the keyboard.
        
             | QuinnWilton wrote:
             | Oh and it wasn't. That was the least of the school's
             | problems though.
             | 
             | They also used a surveillance system called LanSchool,
             | which sent out all of its commands entirely unencrypted and
             | unauthenticated, so people would spoof the remote takeover
             | command and steal exams from teachers' accounts. It ended
             | up being a whole thing my senior year.
        
       | thaumaturgy wrote:
       | Ah yes, good memories. I'm having a really hard time right now
       | remembering the name of that program that blocked access to the
       | Finder; I think it was "Easy"-something. Google fails me on the
       | name too. Breaking it was a hobby.
       | 
       | Some school labs had left access to Hypercard available through
       | that program, so you could just pull up Hypercard and make a new
       | stack that would tell the program to quit.
       | 
       | The other way to get around it -- or around many other
       | misbehaving programs in the cooperative multitasking system --
       | was to bring up the programmer's interrupt like the author
       | describes, and enter "SM 0 A9F4", followed by "G 0". This would
       | set memory location 0 to the _exitToShell function in the OS ROM
       | and then resume execution from there, which immediately
       | terminated whatever was in the foreground.
       | 
       | The rest of the system would often be a little unstable after
       | that though, so you only had a few moves left before a restart
       | would be needed.
       | 
       | To youths with curious mindsets, an anti-authoritarian streak,
       | and seemingly limitless amounts of free time, little restrictions
       | like these only improved our skills. Systems with challenging but
       | imperfect security are a great way to foster new young talent.
        
         | amenghra wrote:
         | AtEase?
        
           | munificent wrote:
           | Holy shit. Just seeing that written out turned a light on in
           | dark corner of my memory. I had _completely_ forgotten about
           | that until you mentioned it.
        
         | munificent wrote:
         | _> To youths with curious mindsets, an anti-authoritarian
         | streak, and seemingly limitless amounts of free time, little
         | restrictions like these only improved our skills. Systems with
         | challenging but imperfect security are a great way to foster
         | new young talent. _
         | 
         | I miss the days when the stakes for testing boundaries and
         | experimenting were lower.
        
         | guardiangod wrote:
         | >the name of that program that blocked access to the Finder
         | 
         | FoolProof? The bane of my elementary school existence. Just let
         | me play SimCity 2000.
        
       | SilasX wrote:
       | > On these computers, I could factor a general number with around
       | 70 decimal digits in a reasonable amount of time (like
       | overnight).
       | 
       | What's the comparable figure you could get on typical hardware in
       | today's university computing clusters or computer labs?
        
         | taldo wrote:
         | Or on a single modern smartphone?
        
           | andai wrote:
           | On that note, I'd like to share a clip about how fast modern
           | machines are relative to early 90s supercomputers (the
           | relevant part is in the first 5 minutes):
           | 
           | https://youtube.com/watch?v=oJ4GcZs7y6g
        
         | elengyel wrote:
         | I'd very much like to revive my old code (which I still have)
         | at some point and see how well it runs on modern computers. My
         | guess is that a typical 64-bit ~3 GHz quad-core machine could
         | accomplish the same task in a few minutes today.
        
         | throw5away wrote:
         | I generated two random 35 digit primes, multiplied them, and
         | then tossed the product into the first hit for "factor integer
         | online": https://www.alpertron.com.ar/ECM.HTM
         | 
         | 1731 322587 637083 705865 442033 654804 904216 446486 784497
         | 444181 466938 498269 (70 digits) = 25317 847509 490819 861309
         | 522806 413689 (35 digits) x 68383 482718 586893 688113 139227
         | 257221 (35 digits) Time elapsed: 0d 0h 0m 23.8s
         | 
         | This is in JavaScript on a single core on my laptop.
        
         | acchow wrote:
         | A quick lookup for CPU speeds of yesteryear shows the Motorola
         | 68040 in those macs did about 35 MFLOPS [1].
         | 
         | If you could parallelize this program to use all 2.6 TFLOPS in
         | a Macbook Air M1's 8-core GPU, you're seeing about 75,000x
         | speed improvement. So a 12 hour "overnight" job may take just
         | over half a second.
         | 
         | [1] https://tech-insider.org/mac/research/1991/1021-e.html
        
       | elengyel wrote:
       | I'd like to clarify that my code was running only on machines
       | that were otherwise idle. Not many people were in the lab late in
       | the evenings. MPQS processing nodes could be added and removed
       | dynamically, so if somebody needed a computer that was part of my
       | cluster, they could just quit my program and everything would go
       | back to normal.
       | 
       | Also, once the number theory professor learned of what I had
       | implemented, he worked out an agreement with the lab manager to
       | give me legitimate access to the machines. :)
        
       | lebuffon wrote:
       | "And if you tell the kids that today they won't believe it!"
       | Four Yorkshiremen sketch
       | Monty Python
        
       | Jtsummers wrote:
       | For anyone still at or associated with a university, how would
       | they react to behavior like this today?
       | 
       | When I was in school (circa 2000), the IT offices were starting
       | to crack down on students (with some threats of expulsion) for
       | activities like this, though it wasn't yet typical or uniform. I
       | know at GT there were a few computer labs that, if you paid a bit
       | of attention, you could easily get ssh access to every computer
       | in the cluster, and then using nohup or screen (this was pre-
       | tmux) you could have your program run as long as the system was
       | up. I had to ssh in a couple times because I'd forgotten to
       | logout and didn't want to get "baggy pantsed".
        
         | widforss wrote:
         | At my uni, it's pretty much solved by having the student's
         | computer society own the most capable machines on campus
         | (sponsored by Facebook if I've understood things correctly). If
         | any one want something done, they just ask the root of the
         | society, and move on with their newfound computer resources.
         | This access can range from a tiny VPS (automatic access for all
         | students) to shell access to the (small but capable) HPC
         | cluster.
        
         | prof-dr-ir wrote:
         | I think that it totally depends on the definition of 'behavior
         | like this today'.
         | 
         | If 'behavior like this' is creatively toying with lab equipment
         | that you have been given physical access to, bending the rules
         | a little bit in the process, to participate in an academic
         | challenge? If it would be up to me then a slap on the wrist
         | would suffice, now just as well as presumably in 1993.
         | 
         | But if 'behavior like this' means breaking into computers,
         | which nowadays are essential parts of a university's
         | infrastructure, in straight violation of rules and conventions
         | on hacking that have been in place since before you were born
         | (say 2000), just to get some computer time to, say, mine
         | whatevercoins? Then a little more than a slap of the wrist
         | would be completely fine by me.
        
         | 908B64B197 wrote:
         | > For anyone still at or associated with a university, how
         | would they react to behavior like this today?
         | 
         | They would wonder why the student went through all that trouble
         | instead of getting time on our HPC cluster.
        
           | dragontamer wrote:
           | Not even that. You can reach those kinds of levels with a GPU
           | these days (and GPU programming is sufficiently obscure that
           | most people won't even attempt to go that route).
           | 
           | Though... with the whole GPU shortage going on right now,
           | maybe it'd be easier to steal computer time from someone
           | else's lab right now!!
        
           | Jtsummers wrote:
           | Hah, fair enough, HPC clusters are certainly more common than
           | when I went to school. In that case, take the "like" to be a
           | generalization (how I meant it): A student (or students)
           | pushing the limits of the existing rules and infrastructure
           | to accomplish something productive or interesting. Yes, it
           | breaks some rules, but what's a typical reaction anymore? Do
           | they get hired by the university or pushed to work with
           | particular researchers like when I was starting school or do
           | they get pushed out or punished like when I was wrapping up
           | college?
        
         | tantalor wrote:
         | Some universities provide distributed computing resources.
         | 
         | Example: https://www.psc.edu/resources/allocations/
         | 
         |  _A primary mission of the Pittsburgh Supercomputing Center is
         | to train students, including undergraduates, in high
         | performance computing. To this end, PSC offers Coursework
         | allocations which are grants of free supercomputing time to
         | supplement other teaching tools._
         | 
         |  _Typically, Coursework allocations have been used in heavily
         | quantitative subjects, such as numerical methods, computational
         | fluid dynamics, and computational chemistry. But we encourage
         | all fields, including the social sciences and humanities, to
         | take advantage of Coursework allocations._
        
         | hervature wrote:
         | In a public lab that is used frequently, I believe this would
         | be viewed quite negatively. Not from a "you hacked our systems"
         | perspective but a "it could have been damaging to other
         | students' education if things had gone wrong". To make the
         | differentiation somewhat more clear, filling up a bucket of
         | water from the bathroom sink to clean something vs. removing
         | all the shower heads and making a super funnel of hoses to
         | spray wash your car outside. The former activity is clearly
         | much less likely to cause issues with other students. If the
         | computer lab was in some basement used by 3 students throughout
         | the year, I don't think anybody would care.
         | 
         | Building on that, many universities have computational
         | resources for any level of needs as long as they are justified.
         | Free network storage to last a lifetime and access to computer
         | clusters that comes with your university email. Upgraded
         | computer clusters for class projects, personal research (like
         | this), or really any legitimate need (as long as you don't say
         | something like "I want to mine bitcoin") is an email away from
         | the university IT. The next level would be the university's
         | super computer that generally needs a short proposal to justify
         | the academic purpose. When these systems are in place now, it
         | is kind of hard to justify these type of things.
         | 
         | Edit: The author of the post put a comment basically confirming
         | that things haven't really changed. He was being respectful
         | (low usage lab, allowed people to stop his programs if they
         | needed a computer, low impact to others, etc.). He was given
         | access to more legitimate resources afterwards at the request
         | of the professor. Not as easy as it is now, but that's Moore's
         | law.
        
         | detaro wrote:
         | When I was in uni a few years ago it wasn't exactly unusual for
         | students to use the PC pool for things like this, but you
         | didn't need to circumvent any security to do it. Nobody cared
         | unless you really got in the way of people wanting to work on
         | the machines.
        
         | saagarjha wrote:
         | Well, with protected memory you're not going to be getting full
         | access to the lab machines anymore ;)
        
           | znpy wrote:
           | Is gp mentions SSH, that means software is not running in
           | real mode.
           | 
           | And if you can get SSH, chances are sooner or later you can
           | exploit some misconfiguration or something else to escalate
           | to root.
           | 
           | Years ago having send mail installed basically meant having a
           | security hole... And sendmail was very common.
        
           | Jtsummers wrote:
           | True, you're not going to get this extreme level of access to
           | the machine. But even doing things like ssh'ing in to many
           | machines to use it as a personal distributed cluster, even if
           | you did everything to make your program run at the lowest
           | reasonable priority, got some people in trouble at one
           | university I was at.
        
         | vuciv1 wrote:
         | I graduated last year, and I worked for my colleges IT
         | department. We used to have to come knocking at the door if a
         | student even had their own printers set up.
         | 
         | It definitely would not go well.
         | 
         | That being said, I did know people who clogged the cs
         | department's machines with batch jobs to train really expensive
         | ML models that did God knows what. Its not the same as
         | bypassing a security system, but it is an instance of people
         | having the ability to run whatever code they'd like in certain
         | circles.
        
           | ohazi wrote:
           | > if a student even had their own printers set up.
           | 
           | Students aren't allowed to have a printer? O_o
        
           | 908B64B197 wrote:
           | > We used to have to come knocking at the door if a student
           | even had their own printers set up.
           | 
           | What's wrong with having a printer?
        
       | valyagolev wrote:
       | Apart from using hacking to overcome imposed limitations such as
       | these, I am amazed by the number of times I had to use my chops
       | to overcome what was simply a bug. Opening the web inspector is
       | such a normal moment of dealing with other people's websites, I
       | have no clue how people manage without it.
       | 
       | I was very... surprised when I managed to productively use
       | "javascript:(some code)" in the URL bar of the browser of my
       | phone once when I was stuck in the airport probably like 10 years
       | ago and needed to do something that just wasn't working normally.
       | Now that we're used to smart phones it probably sounds quite
       | basic but it was absolutely weird back then.
        
         | gambiting wrote:
         | >>Opening the web inspector is such a normal moment of dealing
         | with other people's websites, I have no clue how people manage
         | without it.
         | 
         | As a C++ programmer who has absolutely no idea how to even open
         | the dev console in browser - I just close the website. If I
         | can't scroll it, if it has stupid popups that I can't dismiss,
         | if it lets me get halfway through checkout and then
         | misteriously empties my basket? I'll maybe give it one more try
         | and then just close the website.
        
         | toomanyducks wrote:
         | The web is broken. Someone's website wouldn't scroll (I don't
         | remember the details, and I don't think I wanted to find out
         | --- maybe it was overflow: hidden, but it could've been
         | something else), and the only way I could figure out to deal
         | with it was to open up the devtools responsive design mode and
         | pretend the screen was bigger than it was so that the full page
         | could show, and then use the browser's scrollbar from within
         | that view.
        
       | Gelob wrote:
       | This stuff gets you suspended now
        
       | [deleted]
        
       | 2sk21 wrote:
       | I have a similar story but I was not quite so clever. Back in
       | 1990 and 1991, I used a cluster of IBM RS6000 workstations in my
       | university to train neural networks. I had previously tried to
       | get backpropagation to work on a Connection Machine but found it
       | too frustrating to work with. The cluster of RS6000s actually ran
       | my code (written in C) very fast and was able top get some good
       | results and graduate with PhD. I built a distributed queuing
       | system to ensure that each work station would pull the next job
       | from a central queue.
        
       | fireattack wrote:
       | Just curious, could you just put the address for Finder into that
       | hook instead of the auxiliary program? Or even better, just put
       | the main MPQS program?
        
       | lisper wrote:
       | Please, for the love of all that is holy, don't put long-form
       | content on Twitter. That's not what it's for. Reading long-form
       | content on Twitter is like reading a novel written on post-it
       | notes. Please, just don't.
        
       | a3n wrote:
       | In 19 and 82 or 3, I worked at Lockheed Shipyard in Seattle, in a
       | sort of tech writing capacity on a Navy ship building project,
       | based on my recent experience in the Navy. The business closed
       | with completion of the ships.
       | 
       | We had to fill out lots of forms that documented what we called
       | "analysis," and we'd often have to change them based on some
       | factor changing. One change could cascade through the whole form.
       | 
       | Paper forms. Green see-through plastic letter guides. Whiteout.
       | Lots of whiteout.
       | 
       | We had access to a department mini computer, don't remember what
       | it was. The language might have been Basic-like, but I didn't
       | know enough to recognize it as such.
       | 
       | I figured out how to write and run programs, someone showed me
       | how to print, and I wrote a program that would accept values for
       | all a form's fundamental values, and cascade those through
       | calculations for the dependent values, and print out the filled
       | in form. You could save it, update a new value, re-cascade, and
       | print it out again. No more whiteout.
       | 
       | Part of the calculation involved sorting. I didn't know anything
       | about sorting, so I implemented what I later learned was bubble
       | sort. Because that's obviously how you'd do that.
       | 
       | The system administer noticed more load when people ran my
       | program. He found me, and told me not to do that again.
       | 
       | I learned that there was a thing called a system administrator.
       | He might have given me a better canned sort, don't remember.
       | 
       | I eventually thought it would be a good idea to quit and go to
       | school, so I did.
       | 
       | (I took a number theory class, but had to drop it. I don't have
       | the math nature.)
        
       | linux2647 wrote:
       | Thread on a single page:
       | https://threadreaderapp.com/thread/1389106103179378689.html
        
       ___________________________________________________________________
       (page generated 2021-05-03 23:00 UTC)