It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.
▼ Sponsored Links ▼
▲ Sponsored Links ▲
Page 2 of 2

Outdated Computing · Article Entries

VAX Computer Systems 1-7 · What's Hacking? A series by David Lightman SPECIAL ISSUE VAX COMPUTER SYSTEMS This is a requested discussion from Jolly Bardsman's Pub Tavern at (XXX) XXX-XXXX. If you have any requests, send me mail at any address listed below: USENET: bdunn@attctc
VAX VMS Authorize Utility · Using the VAX/VMS Authorize Utility Written by Line Shadow on 09/10/88 A Telecom Computer Security Bulletin File Volume One, Number 1, File 9 of 12 -------------------------------------------------------------------------------- Time to play God with
VAX VMS hacking · The following text file is to be used when hacking the VAXVVMS systems. I recommend hacking these systems cause they always have good shit to mess up. Most VAXVVMS systems are easily found at colleges, like Hartnell College at 408-757-9494. Although
VAX-VMS Accounts · Accounts to try if you wanna enter into a VAX/VMS ::::::::::::::::::::::::::::::::::::::::::::::::: Of course you can recognize a VAX when after the connection is made u listen to a BEEP and u see somenthing like: Welcome to VAX/VMS V5.4 Username: or
VAXs · A profile on vax's, compiled by blind justice and dr. Insanity ------------------------------------[basicinfo]--------------------------------- Vax systems are almost always unix based. There are seven diffent versions of bell's unix and commands on
VMS Managers Manual · VMS System Managers Manual ORDER NUMBER AA-LA00A-TE Typed in by: Guardian Of Time This Manual provides the basic concepts and procedures for VMS system management; it is especially inteded for managers of small clusters and systems. Chapter 1 Introdu
Page 2 of 2
▼ Sponsored Links ▼
▲ Sponsored Links ▲
Donate Today