its | notes | |
---|---|---|
35 | 9 | |
815 | 22 | |
1.2% | - | |
8.7 | 0.0 | |
about 23 hours ago | over 6 years ago | |
Assembly | ||
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
its
-
Integral Calculator
Compile ITS and just run :macsyma at the DDT prompt (shell/debugger) from ITS:
https://github.com/pdp-10/its
The syntax it's the same, I even made a plot and 'printed' into the host from an ARDS output from the plot command, by converting the file into PPM->PNG or PPM->PDF.
- The Magic Switch – Modern Update
-
Research Unix Sixth Edition (WASM)
ITS didn't really have password control, one was technically added but IIRC it was a fig leaf on some requirement from outside MIT. The user accounts were there mostly to inform others who was logged on and who owned what process.
You could login either using terminal through ARPAnet dial-in support, or later over network, and over time there was added a more concrete "tourist" policy.
DonHopkins seems to have an interesting writeup https://donhopkins.medium.com/mit-ai-lab-tourist-policy-f73b...
and of course there's PDP-10 org and its gather docs on github: https://github.com/PDP-10/its
-
PDP-10 Incompatible Timesharing System emulator
Terry and SHRDLU at 8:23 here: https://archive.org/details/what-about-tomorrow-on-the-side-...
See this for some more information: https://github.com/PDP-10/its/issues/425#issuecomment-145588...
-
So that's where failed print jobs go!
The Magic Switch (in reference to the More Magic, above)
-
Original PDP-10 Zork now rebuilt with MDL compiler
Oops, URL should be https://github.com/PDP-10/its/pull/2150
-
Zork compiled from MDL source code
For more info, see https://github.com/PDP-10/its/pull/2150
- 1981 mainframe Zork built from MDL source code
notes
-
A Study of Malicious Code in PyPI Ecosystem
It's (partially) a fundamental problem with Python and most other programming languages. The majority of libraries don't need more authority than doing (some) computation, yet any Python script can access anything and everything by default.
https://en.wikipedia.org/wiki/Capability-based_security is the solution for this, yet Python will probably never be capable of this kind of internal encapsulation, it's too much of a fundamental change - and even if some sort of sandboxing ability is accomplished, creating separate/recursive sandboxes (needed when importing more, separate libraries) will probably require another interpreter instance (as with WebAssembly).
I hope current and future language designers will take this into account, and construct their compilers, virtual machines and interpreters accordingly. Python was created before the internet as we know it now existed, so perhaps its lack of security mechanisms shouldn't be surprising. But it and any new developments that fail to consider this aspect of computation will be fundamentally flawed from the beginning.
https://github.com/void4/notes/issues/41
-
The Insecurity Industry
Not if done correctly. Have a look at this link: https://github.com/void4/notes/issues/41
There is no issue with just limiting resources (unless there is unpredictable overhead). It doesn't have to be hardware resources either, it could be abstract/higher level resources like interpreter steps or managed memory slices.
I'm creating a series of VMs to show that this is possible, like rarVM, the recursively sandboxable virtual machine: https://esolangs.org/wiki/RarVM
Showcase: https://www.youtube.com/watch?v=MBymOp6bTII
When calling a function you can specify how many interpreter steps it can run until it aborts (and optionally gives you a continuation so you can "refill" and resume it later).
Stackless Python can do this too, but unfortunately due to the reasons discussed above will never be a safe language, this specific mechanism works only in trusted environments since the called function has the ambient authority to increase its own resource limits: https://stackless.readthedocs.io/en/2.7-slp/library/stackles...
-
SSL: Stupid Stack Language
Another approach would be to have a counter (or several) that limit the number of instruction steps, like the Stackless Python programming language (https://stackless.readthedocs.io/en/latest/library/stackless...) or the KeyKOS operating system (https://github.com/void4/notes/issues/41) did
- he hacked the database 😱
-
An engineer wiring an early IBM computer, 1958. Photo by Berenice Abbott
Ann Hardy programmed one of the first mainframe operating systems, and certainly the most secure one: KeyKOS
-
I am planning on creating a programming language for my Informatics Bachelor Thesis. What are your ideas for such a project?
There are syntactic and semantic aspects. Personally, I think algebraic effect systems and capability security seem to be very worthwhile areas of research because they provide abilities and guarantees that just aren't possible with currently popular languages due to their architecture.
-
Incompatible Timesharing System
This might be of interest to you: "Why KeyKOS is fascinating" - https://github.com/void4/notes/issues/41
- Resource limited chess engine competition
- Resource limited chess engine competition using WebAssembly
What are some alternatives?
vmtouch - Portable file system cache diagnostics and control
sdf - Simple SDF mesh generation in Python
sims - Burroughs B5500, ICL1900, SEL32, IBM 360/370, IBM 7000 and DEC PDP10 KA10/KI10/KL10/KS10, PDP6 simulators for SimH
ponyc - Pony is an open-source, actor-model, capabilities-secure, high performance programming language
MS-DOS - The original sources of MS-DOS 1.25 and 2.0, for reference purposes
cli - Command line interface for the Phylum API
a2d - Disassembly of the Apple II Desktop - ProDOS GUI
tenex - BBN's PDP-10 operating system
tashtalk - An interface for Apple's LocalTalk networking protocol.
PC-LISP - Franz Lisp dialect Lisp system
ISA_8bitNetwork_8019 - 8bit ISA NE2000-compatible network card based on the RTL8019AS chip
paip-lisp - Lisp code for the textbook "Paradigms of Artificial Intelligence Programming"