Advertisement
VLF

Corel WordPerfect v5.3 OpenVMS VAX AXP

VLF
May 30th, 2017
1,098
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 46.58 KB | None | 0 0
  1. $! 58 ADAWI . : FFS EA !$
  2. $! 19 BLSS : SETPRV BYPASS CMKRNL DiAGNOSE READALL . INCL D6 !$
  3. $! BC CHMK ^ VOLPRO iMPERSONATE SHARE WORLD UPGRADE v JSB 16 !$
  4. $! B7 DECW | | LDPCTX 06 !$
  5. $! -- - >--+----------------------------------------+--> -- - !$
  6. $! 7A EMUL | | MATCHC 39 !$
  7. $! EB FFC | .................................... | PROBER 0C !$
  8. $! 0A INDEX | :__ __: __ : ______ : | REMQUE 0F !$
  9. $! 17 JMP | :\$\ /$/: |@| : |&&&&&&| : | SVPCTX 07 !$
  10. $! 3A LOCC | : \$\ /$/ : |@| : |&|____ : | TSTG 53FD !$
  11. $! 2F MOVTUC | : \$\ /$/ : |@| : |&&&&&&| : | VGATHQ 37FD !$
  12. $! 0D PROBEW | : \$\/$/ : |@|____ : |&| : | XORW3 AD !$
  13. $! 02 REI | : \$$/ : |@@@@@@| : |&| : | ASHQ 79 !$
  14. $! 2A SCANC | :............:..........:..........: | BGTRU 1A !$
  15. $! 73FD TSTH | | CRC 0B !$
  16. $! E9FD VSXORL | --:: THE VMS LiBERATiON FRONT ::-- | VSYNC A8FD !$
  17. $! FC XFC | | CLRL D4 !$
  18. $! 35FD VGATHL | +=================+ | MTVP A9FD !$
  19. $! 60 ADDD2 | -- +| IN VMS WE TRUST |+ -- | SPANC 2B !$
  20. $! DF PUSHAL | +=================+ | PUSHR BB !$
  21. $! - -- <--+----------------------------------------+--< - -- !$
  22. $! 03 BPT | | POPR BA !$
  23. $! FA CALLG ^ THE VERNON PRESERVATiON UNDERGROUND v IOTA EDFD !$
  24. $! 97 DECB . DEDiCATED TO PROJECT EMERALD : NOP 01 !$
  25. $! 74FD EMODH : . HALT 00 !$
  26.  
  27. --:: PRESENTS ::--
  28.  
  29. $!-- VLF::SYS$TARGET:[RELEASE] ---------------------------------------!$
  30.  
  31. Corel.WordPerfect.v5.3.OpenVMS.VAX.AXP.Cracked-VLF
  32.  
  33. SOFTWARE NAME: Corel WordPerfect v5.3 OpenVMS
  34. SOFTWARE TYPE: Rich Text Word Processor
  35. DEVELOPER: The Corel Corporation
  36. URL: TBA
  37.  
  38. VLF RCE.....: Subcommandante BYPASS RELEASE TYPE....: WORD PROCESSOR
  39. SUPPLiER....: TEAM VLF RELEASE DATE....: 2016-12-25
  40. PACKER......: TEAM VLF RELEASE DiSKS...: 16 X 5M
  41. LANGUAGE....: English RELEASE FORMAT..: vlfaai*
  42. PROTECTiON..: CUSTOM RCE MEDiCiNE....: CUSTOM
  43. PLATFORM....: OpenVMS VAX | AXP DiSTRIBUTION....: PUBLiC
  44.  
  45. $!-- VLF::SYS$TARGET:[RELEASE.DESCRiPTiON] ---------------------------!$
  46.  
  47. Corel WordPerfect 5.3 For OpenVMS
  48.  
  49. Empower Your OpenVMS Users
  50.  
  51. The World's Best-Selling Word Processor for OpenVMS Systems
  52.  
  53. WordPerfect for OpenVMS Systems combines the world's bestselling word
  54. processor with the power and performance of the OpenVMS System; it's
  55. the most versatile and powerful communications solution for today's
  56. OpenVMS users. Selected as Compaq Corporation's "preferred document
  57. processing software," WordPerfect 5.3 on your OpenVMS Systems gives
  58. your organization the following benefits:
  59.  
  60. - Standardize your corporate word processing across platforms.
  61. WordPerfect 5.3 now provides full compatibility with WordPerfect
  62. running on other platforms so that other users or work groups using
  63. different operating systems can share information and projects quickly
  64. and easily.
  65.  
  66. - Integrate text and graphics in order to improve the impact of
  67. everything you produce - from memos and documents, to letters, reports,
  68. and more.
  69.  
  70. - Save on training costs! WordPerfect 5.3 is the logical choice for
  71. users already familiar with WordPerfect on another platform. And for
  72. users migrating to WordPerfect from another word processor, 5.3's
  73. enhanced keyboard mapping tools make the transition easy and painless.
  74.  
  75. - Print to any of the over 1,000 printers (and growing!) supported by
  76. WordPerfect 5.3 for OpenVMS Systems.
  77.  
  78. - Link spreadsheets and graphics to your document. If changes are made
  79. to the spreadsheet or graphic image, your document will be
  80. automatically updated when it is retrieved.
  81.  
  82. - Improve productivity with powerful WordPerfect features like Tables,
  83. Equation Editor, View Document, Macro Editor, Merge tools, Character
  84. Sets, Pull-Down Menus, and much more!
  85.  
  86. - Languages available include U.S. English, U.K. English, Danish,
  87. Dutch, Finnish, French, German, Italian, Norwegian, Spanish, Swedish,
  88. and Swiss!
  89.  
  90. $!-- VLF::SYS$RCE:[iNSTALL.REGiSTRATiON.NOTES] -----------------------!$
  91.  
  92. Read, carefully, the "AAAREADME.TXT" installation guide text file in
  93. the release archive save-set.
  94.  
  95. $!-- VLF::SYS$MERRY:[CHRISTMAS.2016] ---------------------------------!$
  96.  
  97. Seasonal, seasoned, greetings to the VMS collegiates of comp.os.vms!
  98.  
  99. * ,
  100. _/^\_
  101. < >
  102. * /.-.\ *
  103. * `/&\` *
  104. ,@.*;@,
  105. /_o.I %_\ *
  106. * (`'--:o(_@;
  107. /`;--.,__ `') *
  108. ;@`o % O,*`'`&\
  109. * (`'--)_@ ;o %'()\ *
  110. /`;--._`''--._O'@;
  111. /&*,()~o`;-.,_ `""`)
  112. * /`,@ ;+& () o*`;-';\
  113. (`""--.,_0 +% @' &()\
  114. /-.,_ ``''--....-'`) *
  115. * /@%;o`:;'--,.__ __.'\
  116. ;*,&(); @ % &^;~`"`o;@(); *
  117. /(); o^~; & ().o@*&`;&%O\
  118. jgs `"="==""==,,,.,="=="==="`
  119. __.----.(\-''#####---...___...-----._
  120. '` \)_`"""""`
  121. .--' ')
  122. o( )_-\
  123. `"""` `
  124.  
  125. $!-- VLF::SYS$GROUP:[iNFO] -------------------------------------------!$
  126.  
  127. "They can't abide the cold steel, sir! no, sir! They don't like it up
  128. 'em."
  129.  
  130. -- Lance-Corporal Jack Jones (The local butcher), "Dad's Army," BBC TV
  131.  
  132. Subcommandante BYPASS ...... Reverse Code Engineer, Programmer
  133. Subcommandante XDelta ...... Cheer Squad, Special Operations
  134.  
  135. http://www.jokeindex.com/joke.asp?Joke=2606
  136.  
  137. NB: We were aiming for a v1.0 Final release of this NFO and the VLF
  138. MANiFESTO and ACTiViSM road-map, by 25.10 (2012), but health issues and
  139. the vicissitudes of life decided otherwise; nil desperandum; per ardua
  140. ad astra; nil illegitimus carborundum; Persta atque obdura.
  141.  
  142. $!-- VLF::SYS$GROUP:[MANiFESTO] --------------------------------------!$
  143.  
  144. --:: THE VMS LiBERATiON FRONT MANiFESTO ::--
  145. <v1.0 FiNAL>
  146.  
  147. We hold these truths to be self-evident:
  148.  
  149. That in VMS we trust.
  150.  
  151. That the VMS Operating System is part of the intellectual heritage and
  152. conceptual literacy in the commonwealth of computer science, the most
  153. immaculate, logical, systematic, disciplined, and literate culture and
  154. 'vade mecum' about how to go about the business of computing at every
  155. level of operating system function, that has ever been designed,
  156. devised and documented, it is a glory and testament to human ingenuity.
  157.  
  158. That the VMS Operating System mind-share, installation, third-party
  159. developer and expertise ecologies should never be allowed to collapse
  160. and die off or be inhibited from flourishing by the commercial
  161. expediency of Hewlett Packard nor the ruthless self-interest of third
  162. parties; that VMS will always be a viable Operating System culture for
  163. current and future generations of humanity.
  164.  
  165. That the VMS Operating System should be simultaneously ported to all of
  166. the Intel CPU architectures, both 32 and 64 bit, where all of the
  167. Microsoft Windows New Technology series of Operating Systems are
  168. manifest from the main-frame to the micro-computer and also ported to
  169. the 32 and 64 bit ARM architectures.
  170.  
  171. That the VMS Operating System should become a hybrid commercial Open
  172. Source Software system where Hewlett Packard generates income from
  173. Service Level Agreements they can actually deliver on for Business
  174. Critical Systems on certified hardware for enterprises, institutions
  175. and governments and so that the research and development, the
  176. evolution, of VMS can never ever again be suppressed or extinguished.
  177.  
  178. That neither snow nor rain nor heat nor gloom of night, nor the
  179. machinations and the visionary mediocrity of the Hewlett Packard and
  180. Microsoft corporations will stay our crackers and couriers from the
  181. swift and sure completion of their self appointed tasks and duties.
  182.  
  183. $!-- VLF::SYS$GROUP:[NEWS] -------------------------------------------!$
  184.  
  185. The 35th Anniversary of the mighty VMS Operating System was on the
  186. 25th of October 2012.
  187.  
  188. The 35th Anniversary Count-down Timer:
  189.  
  190. http://is.gd/The_35th_Anniversary_Of_VMS
  191.  
  192. We recommended quaffing quality lagered products for the occasion;
  193. sinking severally in celebration of the unstoppable, unsinkable,
  194. unkillable, VMS!
  195.  
  196. We also recommend quaffing quality lagered products for the subsequent
  197. Anniversaries of the mighty VMS operating system as well!
  198.  
  199. $!-- VLF::SYS$GREETiNGS:[SALUTATiONS] --------------------------------!$
  200.  
  201. No one currently, we, the DELTA:: node of the VLF, the Vernon
  202. Preservation Underground, are out of left field and are sui generis.
  203.  
  204. You get that on the big jobs.
  205.  
  206. $!-- VLF::SYS$RESPECT:[DEDiCATiONS] ----------------------------------!$
  207.  
  208. /""-._
  209. . '-,
  210. : '',
  211. ; * '.
  212. ' * () '.
  213. \ \
  214. \ _.---.._ '.
  215. : .' _.--''-'' \ ,'
  216. .._ '/.' . ;
  217. ; `-. , \'
  218. ; `, ; ._\
  219. ; \ _,-' ''--._
  220. : \_,-' '-._
  221. \ ,-' . '-._
  222. .' __.-''; \...,__ '.
  223. .' _,-' \ \ ''--.,__ '\
  224. / _,--' ; \ ; "^.}
  225. ;_,-' ) \ )\ ) ;
  226. / \/ \_.,-' ;
  227. / ;
  228. ,-' _,-'''-. ,-., ; PFA
  229. ,-' _.-' \ / |/'-._...--'
  230. :--`` )/
  231.  
  232. The work of the VMS Liberation Front is dedicated to the memory and the
  233. completion and extension of "Project Emerald" and the preservation and
  234. evolution of Vernon, the VMS mascot and totemic animal and all that he
  235. represents.
  236.  
  237. http://www.vaxination.ca/vms/shark/history.html
  238.  
  239. Refresh your memories:
  240.  
  241. http://h71000.www7.hp.com/openvms/20th/
  242. http://h71000.www7.hp.com/openvms/20th/vmsbook.pdf
  243.  
  244. We also salute the memory of BiG KEN OLSEN, may he rest in Silicon
  245. Heaven, and all the digits who made it all possible within DEC, the
  246. Digital Equipment Corporation.
  247.  
  248. http://en.wikipedia.org/wiki/Digital_Equipment_Corporation
  249.  
  250. $!-- VLF::SYS$LEGALiTiES:[CAVEATS] -----------------------------------!$
  251.  
  252. The policy and philosophy of the VLF with its keygenning, cracking and
  253. reverse code engineering (RCE) projects, is not the 'piracy' of
  254. intellectual property for the sake of it, per se, but to preserve,
  255. cultivate, and extend VMS mind-share for the future generations, VMS is
  256. too great a creation to be lost to humanity due to the cupidity and
  257. stupidity of HP management.
  258.  
  259. The VLF releases will establish the basis for which the VMS expertise
  260. ecologies of system programmers, analysts, system administrators,
  261. operators and network, security, capacity planning, technical support
  262. specialists and application developers can start to be repopulated,
  263. from the current near catastrophic collapse and extinction, from the
  264. coming generations of computer science students, by demolishing the
  265. entry barriers to them being able to familiarise themselves with VMS
  266. and the Layered Products - the entry barriers for students being, of
  267. course, the cost of software and hardware.
  268.  
  269. Sure Information Technology people can learn GNU/Linux and the Open
  270. Source Free Software tools for some decent conceptual and procedural
  271. literacy, but, alas, the vast majority are going to be eking out a
  272. computing crust mentally mutilating themselves mastering microsoft
  273. methodology, wallowing in the La Brea tar-pit of their near monopoly on
  274. matters computing.
  275.  
  276. Which is a profound tragedy when they could, in a slightly better
  277. world, be learning the VMS way to achieve the same goals on the same
  278. CPU architectures and platforms but with a much more conceptually
  279. literate and functionally facilitative mental life.
  280.  
  281. So during the period when computer science students are as poor as
  282. church-mice, studying, with the resources the VLF provides, they can
  283. study VMS and bootstrap themselves into competence, confidence, and
  284. conceptual clarity, and if they start earning money from their VMS
  285. skills, then it's time to buy the tools that they use.
  286.  
  287. Businesses and professionals buying tools from other businesses to run
  288. their business makes the business world go round at the very least.
  289.  
  290. The VLF does not condone or approve of its releases being used for
  291. commercial gain at all, the purpose of the VLF releases is to stop and
  292. reverse the extinction of the VMS expertise ecology and mind-share for
  293. current and future generations.
  294.  
  295. The VLF does not apologise to the developers whose products we reverse
  296. code engineer (RCE), since any such gesture would be dismissed, thus,
  297. instead, we reinforce the observation that if the VLF considered their
  298. application worth cracking and integrating into the VMS Liberation
  299. Front tool-kit to assist in boot-strapping the VMS expertise ecology
  300. back from catastrophic collapse by making the learning of VMS
  301. accessible and practical to the current and future generations of
  302. computer science students, then the application is worth buying, and if
  303. the VMS business, government and institutional installation ecology
  304. boot-straps back into renascent vigor, then sales will naturally come
  305. their way.
  306.  
  307. Hewlett-Packard management of its VMS asset is the greatest impediment
  308. to your VMS applications' sales - direct your anger accurately,
  309. intelligently and effectively and publicly at them.
  310.  
  311. "It is practically impossible to teach good programming to students
  312. that have had a prior exposure to BASIC: as potential programmers they
  313. are mentally mutilated beyond hope of regeneration."
  314.  
  315. -- Professor Edsger Dijkstra, "How Do We Tell Truths That Might Hurt?",
  316. ACM SIGPLAN Notices Vol 17 No 5, May 1982
  317.  
  318. One wonders what the good professor thought of Microsoft...
  319.  
  320. $!-- VLF::SYS$SYSTEM:[ACTiViSM] --------------------------------------!$
  321.  
  322. "The Net interprets censorship as damage and routes around it."
  323.  
  324. -- John Gilmore, http://www.toad.com/gnu/
  325.  
  326. We the DELTA:: node of the VLF, the VMS Liberation Front, have
  327. regretfully concluded that HP management is damage to VMS and we are
  328. committed to routing around it.
  329.  
  330. The DELTA:: node of the VLF specialises in bypassing intellectual
  331. property protection so that no one else in the VMS activism world has
  332. to, although many, of course, have the requisite technical skills to
  333. parallel our work - we are the Vernon Preservation Underground.
  334.  
  335. Those VMS activists that are above ground and publicly active, we fully
  336. realise, will not be able to use the VLF releases, even if they were
  337. inclined to, and we do not assume that anyone would be so inclined,
  338. they will have to abide with existing DEC hardware, the open-source
  339. free-ware hardware emulators, and also the endure the vagaries,
  340. vexations, and vicissitudes, of the HP Hobbyist VMS and layered
  341. products program, and in saying that we mean absolutely no disrespect,
  342. at all, to the VMS true believers who have worked, patiently and
  343. persistently, within, and without of, the corporation to ensure that a
  344. Hobbyist program exists and persists.
  345.  
  346. The objective of the DELTA:: node of the VMS Liberation Front is to
  347. reboot and repair the catastrophic collapse of the VMS expertise
  348. ecology by systematically removing all impediments for the current
  349. generations of computer science students from being able to study,
  350. learn, and master the VMS way. We have achieved this with the LibreVMS
  351. LMFGEN license generator for VMS and LP and the LibreCHARON Stromasys
  352. VAX and AXP hardware emulators.
  353.  
  354. Vernon will be able thrive and survive at existing VMS revision levels
  355. and extant CPU architectures in full independence and autonomy, forever
  356. proofed against any extinction policies within or without of the
  357. Hewlett Packard corporation, the current owners of the VMS intellectual
  358. property.
  359.  
  360. This the VLF Liberation Front has unambiguously established.
  361.  
  362. However such underground, intellectual property transgressing activism
  363. is necessary but insufficient. What is also required is muscular and
  364. vigorous above-ground activism, in a logical, systematic and diligent
  365. manner with a lip curling snarl and no reservation with tooth and claw.
  366. With the VMS die-hards, if it isn't NDAs staying their hand, it's the
  367. HP VMS Hobbyist program, it has had natural effect of inhibiting full
  368. and frank commentary and fearless action, since there is the implicit
  369. fear that access to the VMS Hobbyist program would be withdrawn, either
  370. individually or generally, the LiBREVMS LMFGEN is an 'entente cordiale'
  371. nuclear deterrent to such inhibiting actions.
  372.  
  373. The first step in legal, above ground, VMS activism is to become a HP
  374. shareholder, as HP is a publicly listed company and to then sit on your
  375. tranche of shares and hence become a passionate, practical and
  376. principled part-owner of the Hewlett Packard corporation. As a
  377. part-owner of the HP corporation, you are then entitled to participate
  378. in the deliberative assemblies of the company, such as AGMs (Annual
  379. General Meetings) in accordance with Corporations Law and the HP
  380. Constitution and to engage in share-holder activism such as the calling
  381. of EGMs (Extraordinary General Meetings) with a sufficient quorum of
  382. your fellow share-holders and the concomitant notification to all
  383. share-holders of such an EGM and reason for it, as just one instance of
  384. activism.
  385.  
  386. As a share-holder, you are entitled to be angry, and you should be very
  387. angry at the compromise and degradation of both dividends and long term
  388. share holder value by the gross neglect and vandalism, over the last
  389. decade, of what should be one of the principal pillars and engines of
  390. income generation for the HP Corporation, the OpenVMS operating system,
  391. in all tiers of computing, from the macro to the micro, from the
  392. nano-scale to the giga-scale.
  393.  
  394. As a share-holder, you should be proud and grateful, if current or
  395. past, principled, brave, and loyal HP employees decides, NDAs be
  396. damned, to become whistle-blowers on HP senior management policy on the
  397. VMS asset, disgusted by the lack of any promotion or advertisement of
  398. VMS, let alone the butchering of VMS Engineering, technical support,
  399. software maintenance, and research and development.
  400.  
  401. As a share-holder, if the current database of VMS installations
  402. customers (sans any sensitive government clients, of course!) was
  403. leaked (and also any COTS, VAR, ISV, ETC, vendor databases), you would
  404. not see that as an act prejudiced against share-holder value at all,
  405. but rather a sunlight opportunity for the VMS installations customer
  406. base, and other VMS related vendors, to become totally reflexively
  407. aware, thence cooperatively constellating and engaging in share holder
  408. activism as well, the STAR:: Node of VMS above-ground activism.
  409.  
  410. Needless to say, in the year 2012, since the demise of DEC in 1998, and
  411. the five years of dithering during the Compaq era, until Compaq was
  412. merged with HP in the 2002, and then this last long, lean, decade of
  413. malign neglect, that the remaining VMS customer base is rusted on,
  414. either by need or by judicious and sagacious choice, either way they
  415. see VMS as being critical to their business operations, hence they are
  416. strongly motivated in matters VMS.
  417.  
  418. If the VMS installations customer base was to become totally
  419. reflexively aware, then even though sections of it may be, technically,
  420. competing against each other in particular markets, the one thing they
  421. would agree on unanimously and have sound cause to transcend their
  422. competitive differences upon, is the enduring merit of the VMS
  423. operating system as a foundation of their business, thence they can
  424. cooperatively constellate to prosecute, vigorously, and intelligently,
  425. the VMS cause, in rational self interest, collectively.
  426.  
  427. The extant rusted-on, reflexively aware, VMS customer and vendor base,
  428. could all then purchase their own share tranches in HP and then form a
  429. VMS Industry Association, with a "VMS Engineering Quality", carefully
  430. constructed, constitution, including a rule that the voting weight of
  431. any association member is the (logarithm base 10 of their share
  432. holdings + 1) rounded down to the nearest integer - this substantially
  433. levels the deliberative playing field within the association, whilst
  434. also acknowledging the size of the players to an appropriate extent. A
  435. technical aside on constitutional design - Professor Peter Suber, of
  436. the Department of Philosophy, at Earlham College, in the USA, invented
  437. a game called "Nomic", back in 1982, it can be very useful to study so
  438. as to be able to design robust "VMS Quality" constitutional
  439. instruments, that are proofed against the relentless clausal mutation
  440. by oligopolies of petty self-interests.
  441.  
  442. https://legacy.earlham.edu/~peters/nomic.htm
  443.  
  444. https://en.wikipedia.org/wiki/Nomic
  445.  
  446. It is also in the realm of possibility, albeit, perhaps, not
  447. probability, but that would have to be tested in practice, that such a
  448. VMS Industry Association might be able to force the installation of a
  449. Director on the HP Board, by dint of the co-ordinated share-holdings of
  450. its members. Such a VMS Advocacy directorship on the HP board may not
  451. result in cheaper support and maintenance contracts for the VMS
  452. Industry Association members (HA!), however they will be able to
  453. effectively audit and determine whether they are getting value for
  454. money, verifying whether HP has the actual expertise and resource
  455. infrastructure to properly deliver on their VMS maintenance and support
  456. SLAs (Service Level Agreements) for the members' business critical
  457. systems (BCS); indeed it would be incumbent prudential due diligence on
  458. the VMS Advocacy director to determine whether HP management have been
  459. practicing deep fraud in this regard for the last decade.
  460.  
  461. This is but the shallow shoals of what an activism enfranchised and
  462. emancipated VMS installations customer and vendor base could do, if it
  463. cooperatively constellates into the STAR:: (above ground) legal node of
  464. the VMS Liberation Movement.
  465.  
  466. "I cannot forecast to you the action of Russia. It is a riddle wrapped
  467. in a mystery inside an enigma: but perhaps there is a key. That key is
  468. Russian national interest."
  469.  
  470. -- Winston Churchill, BBC Radio Broadcast, 1st October 1939
  471.  
  472. The actions of HP management of the VMS asset over the last dread
  473. decade, is a riddle wrapped in a mystery inside an enigma, and there is
  474. a key, and that key is radical self-interest - radical self-interest
  475. that is not in the interests of long term HP share holder value and
  476. never has been.
  477.  
  478. The OpenVMS asset is in an deliberately induced coma in the HP hospice
  479. in an Itanium sarcophagus on a starvation drip feed with it's VMS
  480. Engineering heart ripped out and replaced with something risible that
  481. cannot patch, cannot port and cannot pursue research and development -
  482. and yet, OpenVMS still has a pulse and can regenerate from survival
  483. back to thriving with exigent, immediate, interdiction into HP
  484. management - they must be called to account.
  485.  
  486. The key of radical self-interest is blindingly obvious: cherchez le
  487. Microsoft.
  488.  
  489. Ken Olsen's original goal with the Digital Equipment Corporation was to
  490. give computing power to the people, quality was paramount and
  491. excellence was trusted to sell, maximum value and utility for market
  492. price. Microsoft is the antithesis of the DEC ethos, quality and
  493. excellence are sub-ordinate to profit, minimum value and utility for
  494. maximum price, and the full spectrum monopolistic domination in all
  495. market segments, by any means they can get away with, Microsoft
  496. benchmarks 'corporation as psychopath,' they are not interested in
  497. giving computer power to the people but the opposite, making people the
  498. disenfranchised computer peons of Microsoft in choiceless perpetuity.
  499.  
  500. Let us review salient historical events:
  501.  
  502. 1988: Microsoft hire O/S architects and engineers, led by Dave Cutler,
  503. from the Digital Equipment Corporation to build Windows NT.
  504.  
  505. 1993: Microsoft Windows/NT v3.1 first released.
  506.  
  507. 1995: Microsoft's Bill Gates and DEC's Robert Palmer announce the
  508. 'Affinity for OpenVMS' program, to assist customers implementing the
  509. (apparent) 'complementary' strengths of OpenVMS and Windows/NT in a
  510. three-tier client/server environment...
  511.  
  512. 1998: Compaq no longer supports Windows/NT (32 bit) on AXP.
  513.  
  514. The branch never falls far from the tree, and VMS was on the Microsoft
  515. assassination hit list, as of 1988, as a consequence of hiring DEC
  516. architects and engineers to design and implement Windows/NT, the child
  517. was always going to kill the parent. When Windows NT was initially
  518. ported to the Alpha AXP CPU architecture, the writing would have well
  519. and truly been on the wall that although W/NT and VMS are the two most
  520. comparable O/S architecturally, there is absolutely no comparison, in
  521. terms of performance, versatility, reliability, fault tolerance,
  522. security and utility, that was true in 1993 and remains true today in
  523. 2012, VMS utterly trumps Windows NT series operating systems, that is
  524. true on the AXP architecture and also true on the Itanium.
  525.  
  526. Thus Microsoft committed to ensuring that VMS would never be ported to
  527. those CPU architectures and computing tiers where Microsoft dominates
  528. commercially, namely the Intel x86 and AMD64 CPU architectures, never
  529. ever, regardless of the multiple tier, super-scalability of the VMS
  530. operating system, and that remains true today. Microsoft also committed
  531. to ensuring that it was difficult to benchmark and compare W/NT and VMS
  532. on any architectures.
  533.  
  534. The Microsoft covert strategies for ensuring this are, at least, two
  535. fold:
  536.  
  537. 1. Microsoft cultivating key human assets in the employment of DEC,
  538. Compaq and HP that could shape both VMS policy and Windows Licensing
  539. negotiations to Microsoft's convenience.
  540.  
  541. 2. Microsoft encouraging 'Beads for Manhattan' strategies in Compaq
  542. post 1998 and then the merged HP-Compaq, post 2002, where they get
  543. 'discounted' Windows licenses, so long as they commit to not porting
  544. VMS to the Intel x86 and AMD64 architectures.
  545.  
  546. It is a 'Beads for Manhattan' strategy in that Compaq and HP-Compaq, in
  547. getting 'discounted' licences, and forgoing challenging Microsoft
  548. directly head-on, in its eminent CPU domains and computing tiers with
  549. the infinitely superior VMS, were getting the worthless 'beads' of
  550. volume price discounts, good for trivial short term profit but not long
  551. term market strength, and surrendering the opportunity to generate VMS
  552. income in those tiers of computation that Microsoft have an artificed,
  553. near, monopoly, with that infinitely superior product - VMS.
  554.  
  555. The 'threat' of porting VMS, kept in an induced coma on life support,
  556. rings increasingly hollow with every passing year, Microsoft feigns
  557. response in negotiations; yet, if the port was actually done, the
  558. threat would become very real indeed.
  559.  
  560. The HP-Compaq oxymoronic benchmarking management of its VMS asset has
  561. always been at maximal cognitive dissonance, the antithesis of any
  562. conceivable business rationality, the challenge was to make sense of
  563. the senselessness.
  564.  
  565. The cupidity and the stupidity, the corruption and incompetence within
  566. HP-Compaq management, needs to come to an end, Microsoft human assets
  567. within HP management, particular VMS policy management need to be
  568. identified and removed; similarly those in HP management that think
  569. cheaper Windows licenses is preferable to the re-fitting and
  570. re-ignition of the VMS income generation engine, need to be identified
  571. and removed.
  572.  
  573. The OpenVMS asset remains chained to the Itanium 'Itanic' ship-wreck on
  574. the bottom of the Mariana trench of enterprise computing without any
  575. advertising or promotion and it is time at its 35th Anniversary that it
  576. was liberated and finally ported to all 'WinTel' and AMD64 and ARM CPU
  577. Architectures, wherever Microsoft Corporation Windows New Technology
  578. series and derivative Operating Systems are manifest.
  579.  
  580. To assert that VMS is outmoded, obsoleted, yesterday's legacy
  581. technology, is as absurd as asserting that the biochemistry of your DNA
  582. and of your immune system are similarly so. Vernon is the natural
  583. proprietary predator of Microsoft installations in all tiers of
  584. computation, from the enterprise to the personal, from the macro to the
  585. micro, from the nano-scale to the giga-scale, and the ecological
  586. balance needs to be restored.
  587.  
  588. When that is achieved then and only then can the DELTA:: Node of the
  589. VLF, the Vernon Preservation Underground, retire back to the realms of
  590. myth and legend.
  591.  
  592. The rising star and spectacular success of Microsoft and the Windows/NT
  593. Operating System and its thriving third-party applications, services
  594. and expertise ecologies has been directly at the expense of VMS and the
  595. precipitous collapse, and near extinction of the VMS installation base,
  596. and its third-party applications, services and expertise ecologies; it
  597. is the computing crime of the 21st Century par excellence.
  598.  
  599. This 0.9.5.0 BETA VLF version of a VMS activism plan is not intended to
  600. be comprehensive, but it is a modest, yet non-trivial and pertinent
  601. basis from which to start envisioning about unsentimental, muscular and
  602. fearless, VMS Activism, and the VLF do encourage all that are
  603. passionate about the heritage of VMS, to trade in their ten gallon
  604. Stetson hats for one hundred gallon Stetson hats instead and to then
  605. have a long hard, think or re-think about 'nail-gun:wall' pro-active
  606. strategies to establish the renaissance of VMS for the next 35 years
  607. and to then publish your thoughts on comp.os.vms.
  608.  
  609. 25th October 2012
  610.  
  611. The VMS Liberation Front
  612. In VMS We Trust
  613.  
  614. "It should be your care, therefore, and mine, to elevate the minds of
  615. our children and exalt their courage; to accelerate and animate their
  616. industry and activity; to excite in them an habitual contempt of
  617. meanness, abhorrence of injustice and inhumanity, and an ambition to
  618. excel in every capacity, faculty, and virtue. If we suffer their minds
  619. to grovel and creep in infancy, they will grovel all their lives."
  620.  
  621. -- John Adams (1735-1826) Founding Father, 2nd US President,
  622. Dissertation on the Canon and Feudal Law, 1756
  623.  
  624. $!-- VLF::SYS$SYSTEM:[ACTiViSM.ADDENDA] ------------------------------!$
  625.  
  626. The VLF activism plan cited in the previous section, was principally
  627. written (with some minor copy editing, subsequently), circa the
  628. circumstances, as of the 35th Anniversary of VMS, on the 25th of
  629. October, 2012. Rather than re-edit it to adapt to current developments,
  630. we have left it as a historical snapshot of the Team VLF analytical
  631. thinking.
  632.  
  633. The VMS Liberation Front are most certainly not in the business of
  634. hanging tickets off themselves, they are too preoccupied with thinking
  635. about the strategic reversing of the technical ecological collapse of
  636. VMS mind-share, with a weather eye on their modest achievements, to
  637. date; however, we do think we were the best new institutional
  638. innovation in VMS activism, in the year 2012, in establishing the
  639. foundation for an independent, autonomous, VMS Hobbyist program.
  640.  
  641. The best new institutional innovation in VMS activism, in 2014, the
  642. 31st of July, 2014, to be precise, without a shadow of a doubt, was
  643. "VMS Software, Incorporated" (VSI):
  644.  
  645. https://www.vmssoftware.com/
  646.  
  647. Mission Statement:
  648.  
  649. "Our mission is to develop, sell, and support innovative and advanced
  650. releases of OpenVMS, the most secure operating system on the planet. We
  651. are engaged in this mission with one core motivation: to support and
  652. enable our customers in running their mission critical applications at
  653. the legendary uptime levels OpenVMS is known for, at maximum
  654. performance levels, today and into the future."
  655.  
  656. The VLF greatly admire the work of the VSI, however do not hold that
  657. against them! We sincerely salute their bold enterprise, and long
  658. overdue initiative - live long and prosper.
  659.  
  660. In one of the VMS Anniversary VLF Communiques to comp.os.vms, some time
  661. in the future, no doubt, we will review and constructively critique
  662. their operations.
  663.  
  664. $!-- VLF::SYS$QIO:[REQUESTS] -----------------------------------------!$
  665.  
  666. We welcome the supply to the VLF of commercial OpenVMS software and
  667. also commercial VAX, AXP, and PDP-11 hardware virtualisation emulators;
  668. especially, in particular, those that operate on GNU/Linux O/S hosts,
  669. however emulators that operate on any other O/S platforms, including
  670. Microsoft Windows, are also most welcome.
  671.  
  672. We also warmly welcome the supply of the OpenVMS Operating System and
  673. the OpenVMS Layered Product source-code; ideally in "self regenerating"
  674. DECset form; but not limited to that - all source code is most welcome.
  675.  
  676. Please refer to the VLF MANiFESTO and the VLF ACtiViSM charter for our
  677. motivations in requesting such righteous sunshine supply.
  678.  
  679. Thank you.
  680.  
  681. $!-- VLF::SYS$CONTACT:[DETAiLS] --------------------------------------!$
  682.  
  683. These VLF contact vectors are current, as of 25th December 2016:
  684.  
  685. IRC: N/A
  686. Web: N/A
  687. IM/XMPP: N/A
  688. Email: mailto:[email protected] (please use OpenPGP/GPG Encryption)
  689. Public Key: https://www.hushtools.com/hushtools2/index.php
  690. http://keys.gnupg.net/
  691. http://pgp.mit.edu/
  692. Releases: Check the Usenet Binaries Newsgroup: alt.binaries.warez
  693. Announcements: Check the Usenet Discussion Newsgroup: comp.os.vms
  694. Manifesto: http://is.gd/VLF_MANiFESTO
  695.  
  696. The only reliable way to establish full duplex contact with the VLF is
  697. by email. We much prefer that all email communication to us be
  698. encrypted using the OpenPGP (Pretty Good Privacy / GPG (Gnu Privacy
  699. Guard) encryption standards. We recommend that you generate and use
  700. custom, bespoke, 4096 bit RSA public key and 4096 bit RSA sub-key
  701. OpenPGP/GPG public+private key-pairs.
  702.  
  703. Be rest assured that if you decide to contact the DELTA:: Node of the
  704. VMS Liberation Front, the act of contact will not be interpreted by the
  705. VLF that you approve of our manifesto nor of our methods, nor that you
  706. wish to join the VLF underground resistance movement. We also welcome
  707. corrections and refinements to the accuracy, and analytical rigour, of
  708. our historical understanding of the VMS Operating System.
  709.  
  710. In light of the noble Edward Snowden's NSA (National Security Agency) /
  711. Project PRISM revelations since mid-2013, privacy, anonymity,
  712. encryption, and plausible deniability, tools have been evolving and
  713. refining ever more rapidly. You will need to do your own independent
  714. prudential due diligence in investigating possible tool-sets, however
  715. the resources that the VLF recommend that you review are a useful place
  716. to start your explorations from.
  717.  
  718. These notes are primarily Microsoft Windows O/S centric; GNU/Linux
  719. users should be able to take care of themselves; MacOSX users are
  720. advised to ask for assistance from friends who use either Windows or
  721. GNU/Linux.
  722.  
  723. The OpenPGP website provides an excellent overview of email encryption
  724. tools for all desktop O/S platforms:
  725.  
  726. http://openpgp.org/software/
  727.  
  728. One of the simplest ways to establish encrypted OpenPGP/GPG compatible
  729. email communications is to set up a "web-mail" account that you access
  730. through your Internet browser and you then implement encrypted email by
  731. using the "Mailvelope" Internet browser add-on / extension:
  732.  
  733. https://www.mailvelope.com/
  734.  
  735. The Mailvelope add-on / extension is for Mozilla Firefox based Internet
  736. Browsers and also for Google Chrome based Internet browsers.
  737.  
  738. Refer to the Mailvelope website to find the most up to date list of
  739. which web-mail providers neatly integrate with Mailvelope, however here
  740. are four well established ones:
  741.  
  742. http://www.gmx.net/ https://mailbox.org/
  743.  
  744. https://posteo.de/ http://web.de/
  745.  
  746. NOTE: Sadly, the immaculate Lavabit encrypted email service is no
  747. longer available, due to the noble NSA/PRISM activism of the developer,
  748. Ladar Levison, in constitutionally challenging his National Security
  749. Letter, in 2013.
  750.  
  751. https://en.wikipedia.org/wiki/Lavabit https://darkmail.info/
  752.  
  753. Bear in mind that it is always wise to create such email accounts on
  754. other than your personal or work computers, and on other than your
  755. personal or work IP (Internet Protocol) address ranges. Note that it is
  756. very rare to find a web-mail provider that allows account creation via
  757. a "Tor-ified Browser", however, many such providers tolerate accessing
  758. web-mail via a Tor-ified Browser; we will discuss the Tor (The Onion
  759. Ring) system, later in these notes.
  760.  
  761. Always think during any of these processes, whether you are digitally
  762. finger printing (no pun intended) with your data or meta-data.
  763.  
  764. A recommended Internet Browser for the Mailvelope add-in / extension,
  765. is the SRWare "Iron Browser", which is a privacy oriented, stripped
  766. down, fork of the Google Chrome open-source code-base:
  767.  
  768. About: https://www.srware.net/en/software_srware_iron.php
  769.  
  770. Download: https://www.srware.net/forum/viewforum.php?f=21
  771.  
  772. For the Windows versions, install the "WebRTC Off" extension for extra
  773. privacy:
  774.  
  775. https://www.srware.net/forum/viewtopic.php?f=18&t=10863
  776.  
  777. https://www.srware.net/en/webrtc_off.php
  778.  
  779. It is important to disable "Web RTC", since it can leak your real IP on
  780. Windows O/S, even if you are using a VPN (Virtual Private Network)
  781. Service.
  782.  
  783. Some other prudent and judicious extensions for the Iron Browser, can
  784. be found at the Google Chrome Browser extensions directory:
  785.  
  786. https://chrome.google.com/webstore/category/extensions
  787.  
  788. Adblock Plus: Noscript:
  789.  
  790. http://adblockplus.org/ https://noscript.net/
  791.  
  792. EFF HTTPS Everywhere: EFF Privacy Badger:
  793.  
  794. https://www.eff.org/https-everywhere https://www.eff.org/privacybadger
  795.  
  796. This is the best way to download an off-line copy of a chrome
  797. extension, for archival purposes:
  798.  
  799. http://chrome-extension-downloader.com/
  800.  
  801. These extensions are also available for other Internet Browser
  802. rendering engine models, such as Mozilla Firefox.
  803.  
  804. It would also be prudent to routinely use a VPN (Virtual Private
  805. Network) Service, because, otherwise, with web-mail, or ordinary email
  806. using a desktop email client, your IP addresses can be fingered
  807. (identified), hence, your identity discovered; this is an excellent VPN
  808. survey:
  809.  
  810. https://torrentfreak.com/vpn-anonymous-review-160220/
  811.  
  812. Purchase your VPN service subscription using a disposable fixed value
  813. pre-paid (Mastercard or Visa) debit card, with a plausible synthetic
  814. identity.
  815.  
  816. By the use of a VPN Service, you can obfuscate what your actual IP
  817. address is, perhaps not from the NSA, however. The use of Mailvelope
  818. and the Iron Browser in the context of a VPN, is pretty much sufficient
  819. to establish anonymous email conversations with the VLF, the only other
  820. protection that you should examine is MAC randomisation, or "spoofing"
  821. of your network interfaces, for the Windows O/S, these are a couple of
  822. good MAC spoofing tools:
  823.  
  824. Lizard Systems Change MAC Address
  825. https://lizardsystems.com/change-mac-address/
  826.  
  827. Technitium MAC Address Changer
  828. https://technitium.com/tmac/
  829.  
  830. Logically, with prudential due diligence you should test such
  831. assertions as "pretty much sufficient", in the preceding paragraph!
  832. Matters of anonymity, privacy, encryption, and plausible deniability,
  833. are by way of grammatical analogue, the domain of dotting one's i's,
  834. crossing one's t's and knowing the proper use of apostrophes. ;-)
  835.  
  836. Obviously, you can also use desktop email clients, some web-mail hosts
  837. also allow direct POP, IMAP, and SMTP access (usually all SSL enabled)
  838. to web-mail accounts, for example: GMX Mail; one recommended pairing is
  839. the Mozilla Thunderbird email client with the Enigmail OpenPGP/GPG
  840. add-on:
  841.  
  842. Mozilla Thunderbird Email Client
  843. https://www.mozilla.org/en-US/thunderbird/
  844.  
  845. Enigmail OpenPGP/GPG Add-on
  846. https://www.enigmail.net
  847.  
  848. You would need to install "GnuPG" or "GPG4Win" (or "GPGTools" for Apple
  849. MacOSX) on your system:
  850.  
  851. http://www.gnupg.org/ http://www.gpg4win.org/
  852.  
  853. https://gpgtools.org/ http://www.jumaros.de/rsoft/index.html
  854.  
  855. For Windows users, "Jumaros GPGShell" is also highly recommended as an
  856. ancillary GPG tool.
  857.  
  858. Having established your VPN Service, email address, installed
  859. Mailvelope in your Internet Browser, created your OpenPGP/GPG
  860. public+private key-pair, then a further level of IP address obfuscation
  861. is to use the "Tor Browser Bundle" for accessing your encrypted
  862. web-mail, which uses the "Tor" system, "Tor" stands for "The Onion
  863. Router", rather than the recursive acronym "TOR Onion Router", however
  864. the latter provides insight into the function of the Tor system,
  865. familiarise yourself comprehensively:
  866.  
  867. The Tor Browser Bundle:
  868.  
  869. https://www.torproject.org/projects/torbrowser.html.en
  870.  
  871. The Tails Anonymity and Privacy Live Boot disk:
  872.  
  873. https://tails.boum.org/
  874.  
  875. Bearing all of the above in mind, ideally, pragmatically, what you
  876. should aim to do is establish a "Tails" anonymity, privacy, and
  877. encryption, "Live Boot" disk, with encrypted "Persistent Storage"
  878. enabled, on a high reliability, high speed, SDCard or USB memory stick.
  879. The Tails live boot disk is designed to execute, hermetically, all of
  880. it's Internet Traffic via the Tor system. Having created an email
  881. account, in the manner recommended above, you can then configure an
  882. email client within Tails and establish the OpenPGP/GPG encryption;
  883. this will allow you to send and receive encrypted email via the Tor
  884. system, and be able to persistently store, in encrypted form, all
  885. received and created information.
  886.  
  887. For Microsoft Windows O/S users, "Rufus", is a very useful adjunct for
  888. "burning" Tails to a SDCard or USB memory stick:
  889.  
  890. http://rufus.akeo.ie/
  891.  
  892. If you wish to send us large files, then upload them to a Tor-ified
  893. Browser friendly cyber-locker / file-host, these are some
  894. recommendations:
  895.  
  896. http://rghost.net/ http://datafilehost.com
  897.  
  898. http://zippyshare.com http://solidfiles.com
  899.  
  900. Of course, uploading via a Tor-ified browser client, on that point, the
  901. mass-mirroring resource "MirrorCreator", operates properly within a
  902. Tor-ified Browser:
  903.  
  904. https://www.mirrorcreator.com/
  905.  
  906. For very large data sets we recommend uploading to the Usenet binaries
  907. newsgroup:
  908.  
  909. alt.binaries.test
  910.  
  911. Always upload using SSL tunneling, using a SSL enabled Usenet access
  912. provider.
  913.  
  914. Recommended tools:
  915.  
  916. http://www.jbinup.com/ or http://powerpost.free.fr/
  917.  
  918. The latter needs be used with Stunnel:
  919.  
  920. https://www.stunnel.org/index.html
  921.  
  922. Use a nondescript file name and encrypt the archives with a password,
  923. locate a suitably tolerant public Wi-Fi access point to upload from and
  924. then securely contact us with the particulars, as detailed previously.
  925.  
  926. If you search about you will probably be able to find a fixed value,
  927. pre-paid, disposable, Visa or Mastercard debit card with which the
  928. on-line registration process only requires a working e-mail address for
  929. authentication and not a mobile phone number for SMS authentication;
  930. generate a plausible synthetic identity.
  931.  
  932. Once you have established a plausible synthetic identity and the
  933. pre-paid debit card, you can then purchase pre-paid SSL enabled Usenet
  934. Service Provider subscription, whence you can execute the uploads from
  935. a public-access Wi-Fi portal, using your VPN service and MAC spoofing.
  936.  
  937. Please note that credit card OLTP systems usually reject proxied and
  938. Tor-ified browsers for transactions and therefore for the actual
  939. purchase we recommend that you use a public Internet portal; Internet
  940. Cafes that boot fresh O/S images from their Intranet for each and every
  941. session are a recommended resource.
  942.  
  943. By such process disciplines your real identity will remain undisclosed
  944. and your plausible deniability will be maintained.
  945.  
  946. We do not warrant or assert that the methods explicated are totally
  947. safe and useful with no risk of compromising your anonymity. Please
  948. consult more knowledgeable resources on the Internet. For example, in
  949. the generality, consult the writings of Edward Snowden and Bruce
  950. Schneier, to see what anonymity, privacy, and encryption, tools that
  951. they recommend:
  952.  
  953. https://www.schneier.com/ https://www.schneierfacts.com/
  954.  
  955. https://edwardsnowden.com/
  956.  
  957. https://en.wikipedia.org/wiki/Edward_Snowden
  958.  
  959. Miscellaneous privacy, anonymity, and encryption, resources, all quite
  960. worthy of one's close attention:
  961.  
  962. The Android Guardian Project:
  963.  
  964. https://guardianproject.info/apps
  965.  
  966. Privacy Tools:
  967.  
  968. https://www.privacytools.io/
  969.  
  970. FSF (Free Software Foundation) email Self-defense:
  971.  
  972. https://emailselfdefense.fsf.org/en/
  973.  
  974. EFF (Electronic Frontiers Foundation) Surveilance Self-defence:
  975.  
  976. https://ssd.eff.org/en
  977.  
  978. FFTF (Fight For The Future) and CFR) Centre For Rights, Privacy Pack:
  979.  
  980. https://pack.resetthenet.org/
  981.  
  982. EPIC (Electronic Privacy Information Centre) Practical Privacy Tools:
  983.  
  984. https://www.epic.org/privacy/tools.html
  985.  
  986. Access Project: Encrypt All The Things:
  987.  
  988. http://encryptallthethings.net/
  989.  
  990. FPF (Freedom of the Press Foundation) Protect Yourself:
  991.  
  992. https://freedom.press/training/
  993.  
  994. PRISM Break: Privacy and Anonymity Index:
  995.  
  996. http://prism-break.org/
  997.  
  998. RISEUP online communication tools for activist groups:
  999.  
  1000. https://riseup.net/
  1001.  
  1002. BestVPN: The Ultimate Privacy Guide:
  1003.  
  1004. https://www.bestvpn.com/the-ultimate-privacy-guide/
  1005.  
  1006. This is a useful guide, generally speaking, although somewhat dated now:
  1007.  
  1008. Dr Who - Security and Encryption FAQ - Revision 22.6.2
  1009.  
  1010. http://pastebin.com/kNruUa3W
  1011.  
  1012. In conclusion:
  1013.  
  1014. Of course, if you think any of this advice given is technically naive
  1015. and could compromise your anonymity and plausible deniability, then
  1016. please do not hesitate to correct us, via encrypted email (of course),
  1017. to suggest better methods and processes, thank you.
  1018.  
  1019. However, the VLF consider the methods outlined and adumbrated to be a
  1020. useful basis from which to start thinking about secure anonymous
  1021. communication and we think they would be useful for HP whistle-blowers,
  1022. VMS activists, and those gagged by NDAs (Non-disclosure Agreements)
  1023. that see the need or the necessity to let some sunshine in on HP VMS
  1024. policy, and to let some sunshine out, such as the source code for the
  1025. VMS Operating System and the VMS Layered Products.
  1026.  
  1027. YMWV, please do your homework first, you are VMS men, it should not be
  1028. difficult.
  1029.  
  1030. $!-------------------------- damn straight ---------------------------!$
  1031. $ opprobrium/level=kittens/mode=conniptions/input=VLF:/output=NL: !$
  1032. $!--------------------------- enough said ----------------------------!$
  1033. ..: NFO and DIZ v0.9.5.0 BETA - 2016-12-25 - !xD :..
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement