Post some hardware porn

The first HD I used was a 5MB Micropolis we installed in the CAD station in the design lab. Funnily enough, in our IT room we only had workstations with double floppy drives. That was pretty normal in the mid-eighties.
 
I still have my first hard drive I ever bought.

212.6 MB Western Digital HD
My first hard drive (115MB) looks like this:-
1768977412776.png
 
I posted pictures of my CyberNet CyberMed 19" All-in-One above and I decided to try and make it my main firewall. Intel 6200U and 16GB RAM.
It has dual SATA drives and Dual Ethernet. Many expansion slots.
The screen came cracked but I like the hardware. .So I put a Chelsio T620 in the x8 slot and rigged up a temporary fan until a 120mm one shows up.
Milled the cover plate so QSFP stick thru. Made a temporary strap to mainboard.
 

Attachments

  • mod1.JPG
    mod1.JPG
    1.1 MB · Views: 26
I posted pictures of my CyberNet CyberMed 19" All-in-One above and I decided to try and make it my main firewall. Intel 6200U and 16GB RAM.
It has dual SATA drives and Dual Ethernet. Many expansion slots.
The screen came cracked but I like the hardware. .So I put a Chelsio T620 in the x8 slot and rigged up a temporary fan until a 120mm one shows up.
Milled the cover plate so QSFP stick thru. Made a temporary strap to mainboard.
That should make a pretty nice firewall box, decent cpu and plenty of RAM, and dual ethernet, its ideal. Does it use a standard psu or a custom cybernet one? Looks like it's got USB so you should be able to boot ghostbsd live from a usb drive to test it out.
 
Slide rules? How about the "computer equivalent of a manual transmission"

:)
I always think of slide rules as the assembly language of math. There are all these special quirks, like if you want the sine, but it's a really small angle, you use the SRT scale instead of the S scale, and on some scales, if the angle is greater than 45 degrees, you use the red numbers that read backwards.

Plus there are all sorts of special moves for combination calculations. When I read the manual on my K+E Log Log Duplex Decitrig slide rule, I am really impressed with what you can do if you really understand it. Sadly, when I was in Engineering school 50 years ago, I mostly used it for multiplication, division, and looking up trig functions.

I have three K+E slide rules: a 12-inch Log Log Duplex Decitrig, a six-inch Log Log Duplex Decitrig, and a 12-inch Log Log Duplex Vector (with hyperbolic trig functions).

I thought the six-inch slide rule would be fun to carry around and play with then I was bored, but then I discovered that my 73-year-old eyes do not work as well as my 18-year-old eyes did, and the markings on the six-inch slide rule are way too small.
 
T16 Timeclock teardown.

walter5.JPG
walter5.JPG
Here is what you are looking at. The White adapter is POTS modem to USB and is connected to the board with a ublox cellular modem.
The hump with barcode sticker is back side of thermal printer and its paper spool.
Right above that is backside of ITX Motherboard. Avalue N3060.
 
The worst thing about Windows for Workgroups was running it on a token-ring network, like my company had at the time. It was set up for TCP/IP, and you had to get this program that was referred to as "the shim". It wasn't an official Microsoft distribution; you just found some random guy who had it on his website and downloaded it from there. Pretty scary, but at least the 'Net was a safer place back then.
 
And don't connect it to the Internet. I think the average time to get pwned on old versions is half an hour.
What can happen? I once intentionally left running my XP game PC with internet connection. Nothing happened in 2 days, but it had no working browser and mail program either. Maybe I should give it a hostname and run some services to attract portscanners. There was a time your computer caught blaster32 only of being online.
 
What can happen? I once intentionally left running my XP game PC with internet connection. Nothing happened in 2 days, but it had no working browser and mail program either. Maybe I should give it a hostname and run some services to attract portscanners. There was a time your computer caught blaster32 only of being online.

The Internet is full of these stories and I don't think it's an urban myth.

 
The Internet is full of these stories and I don't think it's an urban myth.

I think WinXP is so old that fishing for exploitable targets probably isn't worth the effort. You aren't going to make a botnet of them and nobody does banking with it. 😆
 
What can happen? I once intentionally left running my XP game PC with internet connection. Nothing happened in 2 days, but it had no working browser and mail program either. Maybe I should give it a hostname and run some services to attract portscanners. There was a time your computer caught blaster32 only of being online.
I was starting a dedicated server for a game, installed XP SP2 fresh, and within 5-10 minutes a Messenger exploit just-happened out of nowhere (I didn't touch it beyond getting to post-setup desktop but it was internet-connected)

I only saw that happen once with Windows and I think it was before XP SP3, but it was interesting :p I also had a VNC Ubuntu desktop HTPC randomly get logged into and having a cursor move; I don't think I would have forwarded ports on router, but don't quite know how it was set-up for that to happen (I was watching TV and saw the mouse move, and walked up and disconnected its Ethernet)
 
Back
Top