Advertisement
VLF

Corel WordPerfect v5.3 OpenVMS VAX AXP REPACK

VLF
May 30th, 2017
1,132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 47.11 KB | None | 0 0
  1. $! 58 ADAWI . : FFS EA !$
  2. $! 19 BLSS : SETPRV BYPASS CMKRNL DiAGNOSE READALL . INCL D6 !$
  3. $! BC CHMK ^ VOLPRO iMPERSONATE SHARE WORLD UPGRADE v JSB 16 !$
  4. $! B7 DECW | | LDPCTX 06 !$
  5. $! -- - >--+----------------------------------------+--> -- - !$
  6. $! 7A EMUL | | MATCHC 39 !$
  7. $! EB FFC | .................................... | PROBER 0C !$
  8. $! 0A INDEX | :__ __: __ : ______ : | REMQUE 0F !$
  9. $! 17 JMP | :\$\ /$/: |@| : |&&&&&&| : | SVPCTX 07 !$
  10. $! 3A LOCC | : \$\ /$/ : |@| : |&|____ : | TSTG 53FD !$
  11. $! 2F MOVTUC | : \$\ /$/ : |@| : |&&&&&&| : | VGATHQ 37FD !$
  12. $! 0D PROBEW | : \$\/$/ : |@|____ : |&| : | XORW3 AD !$
  13. $! 02 REI | : \$$/ : |@@@@@@| : |&| : | ASHQ 79 !$
  14. $! 2A SCANC | :............:..........:..........: | BGTRU 1A !$
  15. $! 73FD TSTH | | CRC 0B !$
  16. $! E9FD VSXORL | --:: THE VMS LiBERATiON FRONT ::-- | VSYNC A8FD !$
  17. $! FC XFC | | CLRL D4 !$
  18. $! 35FD VGATHL | +=================+ | MTVP A9FD !$
  19. $! 60 ADDD2 | -- +| IN VMS WE TRUST |+ -- | SPANC 2B !$
  20. $! DF PUSHAL | +=================+ | PUSHR BB !$
  21. $! - -- <--+----------------------------------------+--< - -- !$
  22. $! 03 BPT | | POPR BA !$
  23. $! FA CALLG ^ THE VERNON PRESERVATiON UNDERGROUND v IOTA EDFD !$
  24. $! 97 DECB . DEDiCATED TO PROJECT EMERALD : NOP 01 !$
  25. $! 74FD EMODH : . HALT 00 !$
  26.  
  27. --:: PRESENTS ::--
  28.  
  29. $!-- VLF::SYS$TARGET:[RELEASE] ---------------------------------------!$
  30.  
  31. Corel.WordPerfect.v5.3.OpenVMS.VAX.AXP.Cracked.Repack-VLF
  32.  
  33. SOFTWARE NAME: Corel WordPerfect v5.3 OpenVMS
  34. SOFTWARE TYPE: Rich Text Word Processor
  35. DEVELOPER: The Corel Corporation
  36. URL: http://www.corel.com/
  37.  
  38. VLF RCE.....: Subcommandante BYPASS RELEASE TYPE....: WORD PROCESSOR
  39. SUPPLiER....: TEAM VLF RELEASE DATE....: 2016-12-27
  40. PACKER......: TEAM VLF RELEASE DiSKS...: 16 X 5M
  41. LANGUAGE....: English RELEASE FORMAT..: vlfaaj*
  42. PROTECTiON..: CUSTOM RCE MEDiCiNE....: CUSTOM
  43. PLATFORM....: OpenVMS VAX | AXP DiSTRIBUTION....: PUBLiC
  44.  
  45. $!-- VLF::SYS$TARGET:[RELEASE.DESCRiPTiON] ---------------------------!$
  46.  
  47. Corel WordPerfect 5.3 For OpenVMS
  48.  
  49. Empower Your OpenVMS Users
  50.  
  51. The World's Best-Selling Word Processor for OpenVMS Systems
  52.  
  53. WordPerfect for OpenVMS Systems combines the world's bestselling word
  54. processor with the power and performance of the OpenVMS System; it's
  55. the most versatile and powerful communications solution for today's
  56. OpenVMS users. Selected as Compaq Corporation's "preferred document
  57. processing software," WordPerfect 5.3 on your OpenVMS Systems gives
  58. your organization the following benefits:
  59.  
  60. - Standardize your corporate word processing across platforms.
  61. WordPerfect 5.3 now provides full compatibility with WordPerfect
  62. running on other platforms so that other users or work groups using
  63. different operating systems can share information and projects quickly
  64. and easily.
  65.  
  66. - Integrate text and graphics in order to improve the impact of
  67. everything you produce - from memos and documents, to letters, reports,
  68. and more.
  69.  
  70. - Save on training costs! WordPerfect 5.3 is the logical choice for
  71. users already familiar with WordPerfect on another platform. And for
  72. users migrating to WordPerfect from another word processor, 5.3's
  73. enhanced keyboard mapping tools make the transition easy and painless.
  74.  
  75. - Print to any of the over 1,000 printers (and growing!) supported by
  76. WordPerfect 5.3 for OpenVMS Systems.
  77.  
  78. - Link spreadsheets and graphics to your document. If changes are made
  79. to the spreadsheet or graphic image, your document will be
  80. automatically updated when it is retrieved.
  81.  
  82. - Improve productivity with powerful WordPerfect features like Tables,
  83. Equation Editor, View Document, Macro Editor, Merge tools, Character
  84. Sets, Pull-Down Menus, and much more!
  85.  
  86. - Languages available include U.S. English, U.K. English, Danish,
  87. Dutch, Finnish, French, German, Italian, Norwegian, Spanish, Swedish,
  88. and Swiss!
  89.  
  90. $!-- VLF::SYS$RCE:[iNSTALL.REGiSTRATiON.NOTES] -----------------------!$
  91.  
  92. Read, carefully, the "AAAREADME.TXT" installation guide text file in
  93. the release archive save-set.
  94.  
  95. NOTE: There was a packing error in this release:
  96.  
  97. 2016-12-25: Corel.WordPerfect.v5.3.OpenVMS.VAX.AXP.Cracked-VLF
  98.  
  99. The release was packed with obsolete license installation scripts which
  100. were unable to execute automatic license installation.
  101.  
  102. \Install\WPC053_LIC_25-SEP-2014.ZIP
  103.  
  104. However, the manual license installation steps, as described in
  105. installation guide (AAAREADME.TXT) would have worked correctly.
  106.  
  107. The repack re-release has the up to date, correctly functioning,
  108. license installation scripts.
  109.  
  110. $!-- VLF::SYS$MERRY:[CHRISTMAS.2016] ---------------------------------!$
  111.  
  112. Seasonal, seasoned, greetings to the VMS collegiates of comp.os.vms!
  113.  
  114. * ,
  115. _/^\_
  116. < >
  117. * /.-.\ *
  118. * `/&\` *
  119. ,@.*;@,
  120. /_o.I %_\ *
  121. * (`'--:o(_@;
  122. /`;--.,__ `') *
  123. ;@`o % O,*`'`&\
  124. * (`'--)_@ ;o %'()\ *
  125. /`;--._`''--._O'@;
  126. /&*,()~o`;-.,_ `""`)
  127. * /`,@ ;+& () o*`;-';\
  128. (`""--.,_0 +% @' &()\
  129. /-.,_ ``''--....-'`) *
  130. * /@%;o`:;'--,.__ __.'\
  131. ;*,&(); @ % &^;~`"`o;@(); *
  132. /(); o^~; & ().o@*&`;&%O\
  133. jgs `"="==""==,,,.,="=="==="`
  134. __.----.(\-''#####---...___...-----._
  135. '` \)_`"""""`
  136. .--' ')
  137. o( )_-\
  138. `"""` `
  139.  
  140. $!-- VLF::SYS$GROUP:[iNFO] -------------------------------------------!$
  141.  
  142. "They can't abide the cold steel, sir! no, sir! They don't like it up
  143. 'em."
  144.  
  145. -- Lance-Corporal Jack Jones (The local butcher), "Dad's Army," BBC TV
  146.  
  147. Subcommandante BYPASS ...... Reverse Code Engineer, Programmer
  148. Subcommandante XDelta ...... Cheer Squad, Special Operations
  149.  
  150. http://www.jokeindex.com/joke.asp?Joke=2606
  151.  
  152. NB: We were aiming for a v1.0 Final release of this NFO and the VLF
  153. MANiFESTO and ACTiViSM road-map, by 25.10 (2012), but health issues and
  154. the vicissitudes of life decided otherwise; nil desperandum; per ardua
  155. ad astra; nil illegitimus carborundum; Persta atque obdura.
  156.  
  157. $!-- VLF::SYS$GROUP:[MANiFESTO] --------------------------------------!$
  158.  
  159. --:: THE VMS LiBERATiON FRONT MANiFESTO ::--
  160. <v1.0 FiNAL>
  161.  
  162. We hold these truths to be self-evident:
  163.  
  164. That in VMS we trust.
  165.  
  166. That the VMS Operating System is part of the intellectual heritage and
  167. conceptual literacy in the commonwealth of computer science, the most
  168. immaculate, logical, systematic, disciplined, and literate culture and
  169. 'vade mecum' about how to go about the business of computing at every
  170. level of operating system function, that has ever been designed,
  171. devised and documented, it is a glory and testament to human ingenuity.
  172.  
  173. That the VMS Operating System mind-share, installation, third-party
  174. developer and expertise ecologies should never be allowed to collapse
  175. and die off or be inhibited from flourishing by the commercial
  176. expediency of Hewlett Packard nor the ruthless self-interest of third
  177. parties; that VMS will always be a viable Operating System culture for
  178. current and future generations of humanity.
  179.  
  180. That the VMS Operating System should be simultaneously ported to all of
  181. the Intel CPU architectures, both 32 and 64 bit, where all of the
  182. Microsoft Windows New Technology series of Operating Systems are
  183. manifest from the main-frame to the micro-computer and also ported to
  184. the 32 and 64 bit ARM architectures.
  185.  
  186. That the VMS Operating System should become a hybrid commercial Open
  187. Source Software system where Hewlett Packard generates income from
  188. Service Level Agreements they can actually deliver on for Business
  189. Critical Systems on certified hardware for enterprises, institutions
  190. and governments and so that the research and development, the
  191. evolution, of VMS can never ever again be suppressed or extinguished.
  192.  
  193. That neither snow nor rain nor heat nor gloom of night, nor the
  194. machinations and the visionary mediocrity of the Hewlett Packard and
  195. Microsoft corporations will stay our crackers and couriers from the
  196. swift and sure completion of their self appointed tasks and duties.
  197.  
  198. $!-- VLF::SYS$GROUP:[NEWS] -------------------------------------------!$
  199.  
  200. The 35th Anniversary of the mighty VMS Operating System was on the
  201. 25th of October 2012.
  202.  
  203. The 35th Anniversary Count-down Timer:
  204.  
  205. http://is.gd/The_35th_Anniversary_Of_VMS
  206.  
  207. We recommended quaffing quality lagered products for the occasion;
  208. sinking severally in celebration of the unstoppable, unsinkable,
  209. unkillable, VMS!
  210.  
  211. We also recommend quaffing quality lagered products for the subsequent
  212. Anniversaries of the mighty VMS operating system as well!
  213.  
  214. $!-- VLF::SYS$GREETiNGS:[SALUTATiONS] --------------------------------!$
  215.  
  216. No one currently, we, the DELTA:: node of the VLF, the Vernon
  217. Preservation Underground, are out of left field and are sui generis.
  218.  
  219. You get that on the big jobs.
  220.  
  221. $!-- VLF::SYS$RESPECT:[DEDiCATiONS] ----------------------------------!$
  222.  
  223. /""-._
  224. . '-,
  225. : '',
  226. ; * '.
  227. ' * () '.
  228. \ \
  229. \ _.---.._ '.
  230. : .' _.--''-'' \ ,'
  231. .._ '/.' . ;
  232. ; `-. , \'
  233. ; `, ; ._\
  234. ; \ _,-' ''--._
  235. : \_,-' '-._
  236. \ ,-' . '-._
  237. .' __.-''; \...,__ '.
  238. .' _,-' \ \ ''--.,__ '\
  239. / _,--' ; \ ; "^.}
  240. ;_,-' ) \ )\ ) ;
  241. / \/ \_.,-' ;
  242. / ;
  243. ,-' _,-'''-. ,-., ; PFA
  244. ,-' _.-' \ / |/'-._...--'
  245. :--`` )/
  246.  
  247. The work of the VMS Liberation Front is dedicated to the memory and the
  248. completion and extension of "Project Emerald" and the preservation and
  249. evolution of Vernon, the VMS mascot and totemic animal and all that he
  250. represents.
  251.  
  252. http://www.vaxination.ca/vms/shark/history.html
  253.  
  254. Refresh your memories:
  255.  
  256. http://h71000.www7.hp.com/openvms/20th/
  257. http://h71000.www7.hp.com/openvms/20th/vmsbook.pdf
  258.  
  259. We also salute the memory of BiG KEN OLSEN, may he rest in Silicon
  260. Heaven, and all the digits who made it all possible within DEC, the
  261. Digital Equipment Corporation.
  262.  
  263. http://en.wikipedia.org/wiki/Digital_Equipment_Corporation
  264.  
  265. $!-- VLF::SYS$LEGALiTiES:[CAVEATS] -----------------------------------!$
  266.  
  267. The policy and philosophy of the VLF with its keygenning, cracking and
  268. reverse code engineering (RCE) projects, is not the 'piracy' of
  269. intellectual property for the sake of it, per se, but to preserve,
  270. cultivate, and extend VMS mind-share for the future generations, VMS is
  271. too great a creation to be lost to humanity due to the cupidity and
  272. stupidity of HP management.
  273.  
  274. The VLF releases will establish the basis for which the VMS expertise
  275. ecologies of system programmers, analysts, system administrators,
  276. operators and network, security, capacity planning, technical support
  277. specialists and application developers can start to be repopulated,
  278. from the current near catastrophic collapse and extinction, from the
  279. coming generations of computer science students, by demolishing the
  280. entry barriers to them being able to familiarise themselves with VMS
  281. and the Layered Products - the entry barriers for students being, of
  282. course, the cost of software and hardware.
  283.  
  284. Sure Information Technology people can learn GNU/Linux and the Open
  285. Source Free Software tools for some decent conceptual and procedural
  286. literacy, but, alas, the vast majority are going to be eking out a
  287. computing crust mentally mutilating themselves mastering microsoft
  288. methodology, wallowing in the La Brea tar-pit of their near monopoly on
  289. matters computing.
  290.  
  291. Which is a profound tragedy when they could, in a slightly better
  292. world, be learning the VMS way to achieve the same goals on the same
  293. CPU architectures and platforms but with a much more conceptually
  294. literate and functionally facilitative mental life.
  295.  
  296. So during the period when computer science students are as poor as
  297. church-mice, studying, with the resources the VLF provides, they can
  298. study VMS and bootstrap themselves into competence, confidence, and
  299. conceptual clarity, and if they start earning money from their VMS
  300. skills, then it's time to buy the tools that they use.
  301.  
  302. Businesses and professionals buying tools from other businesses to run
  303. their business makes the business world go round at the very least.
  304.  
  305. The VLF does not condone or approve of its releases being used for
  306. commercial gain at all, the purpose of the VLF releases is to stop and
  307. reverse the extinction of the VMS expertise ecology and mind-share for
  308. current and future generations.
  309.  
  310. The VLF does not apologise to the developers whose products we reverse
  311. code engineer (RCE), since any such gesture would be dismissed, thus,
  312. instead, we reinforce the observation that if the VLF considered their
  313. application worth cracking and integrating into the VMS Liberation
  314. Front tool-kit to assist in boot-strapping the VMS expertise ecology
  315. back from catastrophic collapse by making the learning of VMS
  316. accessible and practical to the current and future generations of
  317. computer science students, then the application is worth buying, and if
  318. the VMS business, government and institutional installation ecology
  319. boot-straps back into renascent vigor, then sales will naturally come
  320. their way.
  321.  
  322. Hewlett-Packard management of its VMS asset is the greatest impediment
  323. to your VMS applications' sales - direct your anger accurately,
  324. intelligently and effectively and publicly at them.
  325.  
  326. "It is practically impossible to teach good programming to students
  327. that have had a prior exposure to BASIC: as potential programmers they
  328. are mentally mutilated beyond hope of regeneration."
  329.  
  330. -- Professor Edsger Dijkstra, "How Do We Tell Truths That Might Hurt?",
  331. ACM SIGPLAN Notices Vol 17 No 5, May 1982
  332.  
  333. One wonders what the good professor thought of Microsoft...
  334.  
  335. $!-- VLF::SYS$SYSTEM:[ACTiViSM] --------------------------------------!$
  336.  
  337. "The Net interprets censorship as damage and routes around it."
  338.  
  339. -- John Gilmore, http://www.toad.com/gnu/
  340.  
  341. We the DELTA:: node of the VLF, the VMS Liberation Front, have
  342. regretfully concluded that HP management is damage to VMS and we are
  343. committed to routing around it.
  344.  
  345. The DELTA:: node of the VLF specialises in bypassing intellectual
  346. property protection so that no one else in the VMS activism world has
  347. to, although many, of course, have the requisite technical skills to
  348. parallel our work - we are the Vernon Preservation Underground.
  349.  
  350. Those VMS activists that are above ground and publicly active, we fully
  351. realise, will not be able to use the VLF releases, even if they were
  352. inclined to, and we do not assume that anyone would be so inclined,
  353. they will have to abide with existing DEC hardware, the open-source
  354. free-ware hardware emulators, and also the endure the vagaries,
  355. vexations, and vicissitudes, of the HP Hobbyist VMS and layered
  356. products program, and in saying that we mean absolutely no disrespect,
  357. at all, to the VMS true believers who have worked, patiently and
  358. persistently, within, and without of, the corporation to ensure that a
  359. Hobbyist program exists and persists.
  360.  
  361. The objective of the DELTA:: node of the VMS Liberation Front is to
  362. reboot and repair the catastrophic collapse of the VMS expertise
  363. ecology by systematically removing all impediments for the current
  364. generations of computer science students from being able to study,
  365. learn, and master the VMS way. We have achieved this with the LibreVMS
  366. LMFGEN license generator for VMS and LP and the LibreCHARON Stromasys
  367. VAX and AXP hardware emulators.
  368.  
  369. Vernon will be able thrive and survive at existing VMS revision levels
  370. and extant CPU architectures in full independence and autonomy, forever
  371. proofed against any extinction policies within or without of the
  372. Hewlett Packard corporation, the current owners of the VMS intellectual
  373. property.
  374.  
  375. This the VLF Liberation Front has unambiguously established.
  376.  
  377. However such underground, intellectual property transgressing activism
  378. is necessary but insufficient. What is also required is muscular and
  379. vigorous above-ground activism, in a logical, systematic and diligent
  380. manner with a lip curling snarl and no reservation with tooth and claw.
  381. With the VMS die-hards, if it isn't NDAs staying their hand, it's the
  382. HP VMS Hobbyist program, it has had natural effect of inhibiting full
  383. and frank commentary and fearless action, since there is the implicit
  384. fear that access to the VMS Hobbyist program would be withdrawn, either
  385. individually or generally, the LiBREVMS LMFGEN is an 'entente cordiale'
  386. nuclear deterrent to such inhibiting actions.
  387.  
  388. The first step in legal, above ground, VMS activism is to become a HP
  389. shareholder, as HP is a publicly listed company and to then sit on your
  390. tranche of shares and hence become a passionate, practical and
  391. principled part-owner of the Hewlett Packard corporation. As a
  392. part-owner of the HP corporation, you are then entitled to participate
  393. in the deliberative assemblies of the company, such as AGMs (Annual
  394. General Meetings) in accordance with Corporations Law and the HP
  395. Constitution and to engage in share-holder activism such as the calling
  396. of EGMs (Extraordinary General Meetings) with a sufficient quorum of
  397. your fellow share-holders and the concomitant notification to all
  398. share-holders of such an EGM and reason for it, as just one instance of
  399. activism.
  400.  
  401. As a share-holder, you are entitled to be angry, and you should be very
  402. angry at the compromise and degradation of both dividends and long term
  403. share holder value by the gross neglect and vandalism, over the last
  404. decade, of what should be one of the principal pillars and engines of
  405. income generation for the HP Corporation, the OpenVMS operating system,
  406. in all tiers of computing, from the macro to the micro, from the
  407. nano-scale to the giga-scale.
  408.  
  409. As a share-holder, you should be proud and grateful, if current or
  410. past, principled, brave, and loyal HP employees decides, NDAs be
  411. damned, to become whistle-blowers on HP senior management policy on the
  412. VMS asset, disgusted by the lack of any promotion or advertisement of
  413. VMS, let alone the butchering of VMS Engineering, technical support,
  414. software maintenance, and research and development.
  415.  
  416. As a share-holder, if the current database of VMS installations
  417. customers (sans any sensitive government clients, of course!) was
  418. leaked (and also any COTS, VAR, ISV, ETC, vendor databases), you would
  419. not see that as an act prejudiced against share-holder value at all,
  420. but rather a sunlight opportunity for the VMS installations customer
  421. base, and other VMS related vendors, to become totally reflexively
  422. aware, thence cooperatively constellating and engaging in share holder
  423. activism as well, the STAR:: Node of VMS above-ground activism.
  424.  
  425. Needless to say, in the year 2012, since the demise of DEC in 1998, and
  426. the five years of dithering during the Compaq era, until Compaq was
  427. merged with HP in the 2002, and then this last long, lean, decade of
  428. malign neglect, that the remaining VMS customer base is rusted on,
  429. either by need or by judicious and sagacious choice, either way they
  430. see VMS as being critical to their business operations, hence they are
  431. strongly motivated in matters VMS.
  432.  
  433. If the VMS installations customer base was to become totally
  434. reflexively aware, then even though sections of it may be, technically,
  435. competing against each other in particular markets, the one thing they
  436. would agree on unanimously and have sound cause to transcend their
  437. competitive differences upon, is the enduring merit of the VMS
  438. operating system as a foundation of their business, thence they can
  439. cooperatively constellate to prosecute, vigorously, and intelligently,
  440. the VMS cause, in rational self interest, collectively.
  441.  
  442. The extant rusted-on, reflexively aware, VMS customer and vendor base,
  443. could all then purchase their own share tranches in HP and then form a
  444. VMS Industry Association, with a "VMS Engineering Quality", carefully
  445. constructed, constitution, including a rule that the voting weight of
  446. any association member is the (logarithm base 10 of their share
  447. holdings + 1) rounded down to the nearest integer - this substantially
  448. levels the deliberative playing field within the association, whilst
  449. also acknowledging the size of the players to an appropriate extent. A
  450. technical aside on constitutional design - Professor Peter Suber, of
  451. the Department of Philosophy, at Earlham College, in the USA, invented
  452. a game called "Nomic", back in 1982, it can be very useful to study so
  453. as to be able to design robust "VMS Quality" constitutional
  454. instruments, that are proofed against the relentless clausal mutation
  455. by oligopolies of petty self-interests.
  456.  
  457. https://legacy.earlham.edu/~peters/nomic.htm
  458.  
  459. https://en.wikipedia.org/wiki/Nomic
  460.  
  461. It is also in the realm of possibility, albeit, perhaps, not
  462. probability, but that would have to be tested in practice, that such a
  463. VMS Industry Association might be able to force the installation of a
  464. Director on the HP Board, by dint of the co-ordinated share-holdings of
  465. its members. Such a VMS Advocacy directorship on the HP board may not
  466. result in cheaper support and maintenance contracts for the VMS
  467. Industry Association members (HA!), however they will be able to
  468. effectively audit and determine whether they are getting value for
  469. money, verifying whether HP has the actual expertise and resource
  470. infrastructure to properly deliver on their VMS maintenance and support
  471. SLAs (Service Level Agreements) for the members' business critical
  472. systems (BCS); indeed it would be incumbent prudential due diligence on
  473. the VMS Advocacy director to determine whether HP management have been
  474. practicing deep fraud in this regard for the last decade.
  475.  
  476. This is but the shallow shoals of what an activism enfranchised and
  477. emancipated VMS installations customer and vendor base could do, if it
  478. cooperatively constellates into the STAR:: (above ground) legal node of
  479. the VMS Liberation Movement.
  480.  
  481. "I cannot forecast to you the action of Russia. It is a riddle wrapped
  482. in a mystery inside an enigma: but perhaps there is a key. That key is
  483. Russian national interest."
  484.  
  485. -- Winston Churchill, BBC Radio Broadcast, 1st October 1939
  486.  
  487. The actions of HP management of the VMS asset over the last dread
  488. decade, is a riddle wrapped in a mystery inside an enigma, and there is
  489. a key, and that key is radical self-interest - radical self-interest
  490. that is not in the interests of long term HP share holder value and
  491. never has been.
  492.  
  493. The OpenVMS asset is in an deliberately induced coma in the HP hospice
  494. in an Itanium sarcophagus on a starvation drip feed with it's VMS
  495. Engineering heart ripped out and replaced with something risible that
  496. cannot patch, cannot port and cannot pursue research and development -
  497. and yet, OpenVMS still has a pulse and can regenerate from survival
  498. back to thriving with exigent, immediate, interdiction into HP
  499. management - they must be called to account.
  500.  
  501. The key of radical self-interest is blindingly obvious: cherchez le
  502. Microsoft.
  503.  
  504. Ken Olsen's original goal with the Digital Equipment Corporation was to
  505. give computing power to the people, quality was paramount and
  506. excellence was trusted to sell, maximum value and utility for market
  507. price. Microsoft is the antithesis of the DEC ethos, quality and
  508. excellence are sub-ordinate to profit, minimum value and utility for
  509. maximum price, and the full spectrum monopolistic domination in all
  510. market segments, by any means they can get away with, Microsoft
  511. benchmarks 'corporation as psychopath,' they are not interested in
  512. giving computer power to the people but the opposite, making people the
  513. disenfranchised computer peons of Microsoft in choiceless perpetuity.
  514.  
  515. Let us review salient historical events:
  516.  
  517. 1988: Microsoft hire O/S architects and engineers, led by Dave Cutler,
  518. from the Digital Equipment Corporation to build Windows NT.
  519.  
  520. 1993: Microsoft Windows/NT v3.1 first released.
  521.  
  522. 1995: Microsoft's Bill Gates and DEC's Robert Palmer announce the
  523. 'Affinity for OpenVMS' program, to assist customers implementing the
  524. (apparent) 'complementary' strengths of OpenVMS and Windows/NT in a
  525. three-tier client/server environment...
  526.  
  527. 1998: Compaq no longer supports Windows/NT (32 bit) on AXP.
  528.  
  529. The branch never falls far from the tree, and VMS was on the Microsoft
  530. assassination hit list, as of 1988, as a consequence of hiring DEC
  531. architects and engineers to design and implement Windows/NT, the child
  532. was always going to kill the parent. When Windows NT was initially
  533. ported to the Alpha AXP CPU architecture, the writing would have well
  534. and truly been on the wall that although W/NT and VMS are the two most
  535. comparable O/S architecturally, there is absolutely no comparison, in
  536. terms of performance, versatility, reliability, fault tolerance,
  537. security and utility, that was true in 1993 and remains true today in
  538. 2012, VMS utterly trumps Windows NT series operating systems, that is
  539. true on the AXP architecture and also true on the Itanium.
  540.  
  541. Thus Microsoft committed to ensuring that VMS would never be ported to
  542. those CPU architectures and computing tiers where Microsoft dominates
  543. commercially, namely the Intel x86 and AMD64 CPU architectures, never
  544. ever, regardless of the multiple tier, super-scalability of the VMS
  545. operating system, and that remains true today. Microsoft also committed
  546. to ensuring that it was difficult to benchmark and compare W/NT and VMS
  547. on any architectures.
  548.  
  549. The Microsoft covert strategies for ensuring this are, at least, two
  550. fold:
  551.  
  552. 1. Microsoft cultivating key human assets in the employment of DEC,
  553. Compaq and HP that could shape both VMS policy and Windows Licensing
  554. negotiations to Microsoft's convenience.
  555.  
  556. 2. Microsoft encouraging 'Beads for Manhattan' strategies in Compaq
  557. post 1998 and then the merged HP-Compaq, post 2002, where they get
  558. 'discounted' Windows licenses, so long as they commit to not porting
  559. VMS to the Intel x86 and AMD64 architectures.
  560.  
  561. It is a 'Beads for Manhattan' strategy in that Compaq and HP-Compaq, in
  562. getting 'discounted' licences, and forgoing challenging Microsoft
  563. directly head-on, in its eminent CPU domains and computing tiers with
  564. the infinitely superior VMS, were getting the worthless 'beads' of
  565. volume price discounts, good for trivial short term profit but not long
  566. term market strength, and surrendering the opportunity to generate VMS
  567. income in those tiers of computation that Microsoft have an artificed,
  568. near, monopoly, with that infinitely superior product - VMS.
  569.  
  570. The 'threat' of porting VMS, kept in an induced coma on life support,
  571. rings increasingly hollow with every passing year, Microsoft feigns
  572. response in negotiations; yet, if the port was actually done, the
  573. threat would become very real indeed.
  574.  
  575. The HP-Compaq oxymoronic benchmarking management of its VMS asset has
  576. always been at maximal cognitive dissonance, the antithesis of any
  577. conceivable business rationality, the challenge was to make sense of
  578. the senselessness.
  579.  
  580. The cupidity and the stupidity, the corruption and incompetence within
  581. HP-Compaq management, needs to come to an end, Microsoft human assets
  582. within HP management, particular VMS policy management need to be
  583. identified and removed; similarly those in HP management that think
  584. cheaper Windows licenses is preferable to the re-fitting and
  585. re-ignition of the VMS income generation engine, need to be identified
  586. and removed.
  587.  
  588. The OpenVMS asset remains chained to the Itanium 'Itanic' ship-wreck on
  589. the bottom of the Mariana trench of enterprise computing without any
  590. advertising or promotion and it is time at its 35th Anniversary that it
  591. was liberated and finally ported to all 'WinTel' and AMD64 and ARM CPU
  592. Architectures, wherever Microsoft Corporation Windows New Technology
  593. series and derivative Operating Systems are manifest.
  594.  
  595. To assert that VMS is outmoded, obsoleted, yesterday's legacy
  596. technology, is as absurd as asserting that the biochemistry of your DNA
  597. and of your immune system are similarly so. Vernon is the natural
  598. proprietary predator of Microsoft installations in all tiers of
  599. computation, from the enterprise to the personal, from the macro to the
  600. micro, from the nano-scale to the giga-scale, and the ecological
  601. balance needs to be restored.
  602.  
  603. When that is achieved then and only then can the DELTA:: Node of the
  604. VLF, the Vernon Preservation Underground, retire back to the realms of
  605. myth and legend.
  606.  
  607. The rising star and spectacular success of Microsoft and the Windows/NT
  608. Operating System and its thriving third-party applications, services
  609. and expertise ecologies has been directly at the expense of VMS and the
  610. precipitous collapse, and near extinction of the VMS installation base,
  611. and its third-party applications, services and expertise ecologies; it
  612. is the computing crime of the 21st Century par excellence.
  613.  
  614. This 0.9.5.0 BETA VLF version of a VMS activism plan is not intended to
  615. be comprehensive, but it is a modest, yet non-trivial and pertinent
  616. basis from which to start envisioning about unsentimental, muscular and
  617. fearless, VMS Activism, and the VLF do encourage all that are
  618. passionate about the heritage of VMS, to trade in their ten gallon
  619. Stetson hats for one hundred gallon Stetson hats instead and to then
  620. have a long hard, think or re-think about 'nail-gun:wall' pro-active
  621. strategies to establish the renaissance of VMS for the next 35 years
  622. and to then publish your thoughts on comp.os.vms.
  623.  
  624. 25th October 2012
  625.  
  626. The VMS Liberation Front
  627. In VMS We Trust
  628.  
  629. "It should be your care, therefore, and mine, to elevate the minds of
  630. our children and exalt their courage; to accelerate and animate their
  631. industry and activity; to excite in them an habitual contempt of
  632. meanness, abhorrence of injustice and inhumanity, and an ambition to
  633. excel in every capacity, faculty, and virtue. If we suffer their minds
  634. to grovel and creep in infancy, they will grovel all their lives."
  635.  
  636. -- John Adams (1735-1826) Founding Father, 2nd US President,
  637. Dissertation on the Canon and Feudal Law, 1756
  638.  
  639. $!-- VLF::SYS$SYSTEM:[ACTiViSM.ADDENDA] ------------------------------!$
  640.  
  641. The VLF activism plan cited in the previous section, was principally
  642. written (with some minor copy editing, subsequently), circa the
  643. circumstances, as of the 35th Anniversary of VMS, on the 25th of
  644. October, 2012. Rather than re-edit it to adapt to current developments,
  645. we have left it as a historical snapshot of the Team VLF analytical
  646. thinking.
  647.  
  648. The VMS Liberation Front are most certainly not in the business of
  649. hanging tickets off themselves, they are too preoccupied with thinking
  650. about the strategic reversing of the technical ecological collapse of
  651. VMS mind-share, with a weather eye on their modest achievements, to
  652. date; however, we do think we were the best new institutional
  653. innovation in VMS activism, in the year 2012, in establishing the
  654. foundation for an independent, autonomous, VMS Hobbyist program.
  655.  
  656. The best new institutional innovation in VMS activism, in 2014, the
  657. 31st of July, 2014, to be precise, without a shadow of a doubt, was
  658. "VMS Software, Incorporated" (VSI):
  659.  
  660. https://www.vmssoftware.com/
  661.  
  662. Mission Statement:
  663.  
  664. "Our mission is to develop, sell, and support innovative and advanced
  665. releases of OpenVMS, the most secure operating system on the planet. We
  666. are engaged in this mission with one core motivation: to support and
  667. enable our customers in running their mission critical applications at
  668. the legendary uptime levels OpenVMS is known for, at maximum
  669. performance levels, today and into the future."
  670.  
  671. The VLF greatly admire the work of the VSI, however do not hold that
  672. against them! We sincerely salute their bold enterprise, and long
  673. overdue initiative - live long and prosper.
  674.  
  675. In one of the VMS Anniversary VLF Communiques to comp.os.vms, some time
  676. in the future, no doubt, we will review and constructively critique
  677. their operations.
  678.  
  679. $!-- VLF::SYS$QIO:[REQUESTS] -----------------------------------------!$
  680.  
  681. We welcome the supply to the VLF of commercial OpenVMS software and
  682. also commercial VAX, AXP, and PDP-11 hardware virtualisation emulators;
  683. especially, in particular, those that operate on GNU/Linux O/S hosts,
  684. however emulators that operate on any other O/S platforms, including
  685. Microsoft Windows, are also most welcome.
  686.  
  687. We also warmly welcome the supply of the OpenVMS Operating System and
  688. the OpenVMS Layered Product source-code; ideally in "self regenerating"
  689. DECset form; but not limited to that - all source code is most welcome.
  690.  
  691. Please refer to the VLF MANiFESTO and the VLF ACtiViSM charter for our
  692. motivations in requesting such righteous sunshine supply.
  693.  
  694. Thank you.
  695.  
  696. $!-- VLF::SYS$CONTACT:[DETAiLS] --------------------------------------!$
  697.  
  698. These VLF contact vectors are current, as of 25th December 2016:
  699.  
  700. IRC: N/A
  701. Web: N/A
  702. IM/XMPP: N/A
  703. Email: mailto:[email protected] (please use OpenPGP/GPG Encryption)
  704. Public Key: https://www.hushtools.com/hushtools2/index.php
  705. http://keys.gnupg.net/
  706. http://pgp.mit.edu/
  707. Releases: Check the Usenet Binaries Newsgroup: alt.binaries.warez
  708. Announcements: Check the Usenet Discussion Newsgroup: comp.os.vms
  709. Manifesto: http://is.gd/VLF_MANiFESTO
  710.  
  711. The only reliable way to establish full duplex contact with the VLF is
  712. by email. We much prefer that all email communication to us be
  713. encrypted using the OpenPGP (Pretty Good Privacy / GPG (Gnu Privacy
  714. Guard) encryption standards. We recommend that you generate and use
  715. custom, bespoke, 4096 bit RSA public key and 4096 bit RSA sub-key
  716. OpenPGP/GPG public+private key-pairs.
  717.  
  718. Be rest assured that if you decide to contact the DELTA:: Node of the
  719. VMS Liberation Front, the act of contact will not be interpreted by the
  720. VLF that you approve of our manifesto nor of our methods, nor that you
  721. wish to join the VLF underground resistance movement. We also welcome
  722. corrections and refinements to the accuracy, and analytical rigour, of
  723. our historical understanding of the VMS Operating System.
  724.  
  725. In light of the noble Edward Snowden's NSA (National Security Agency) /
  726. Project PRISM revelations since mid-2013, privacy, anonymity,
  727. encryption, and plausible deniability, tools have been evolving and
  728. refining ever more rapidly. You will need to do your own independent
  729. prudential due diligence in investigating possible tool-sets, however
  730. the resources that the VLF recommend that you review are a useful place
  731. to start your explorations from.
  732.  
  733. These notes are primarily Microsoft Windows O/S centric; GNU/Linux
  734. users should be able to take care of themselves; MacOSX users are
  735. advised to ask for assistance from friends who use either Windows or
  736. GNU/Linux.
  737.  
  738. The OpenPGP website provides an excellent overview of email encryption
  739. tools for all desktop O/S platforms:
  740.  
  741. http://openpgp.org/software/
  742.  
  743. One of the simplest ways to establish encrypted OpenPGP/GPG compatible
  744. email communications is to set up a "web-mail" account that you access
  745. through your Internet browser and you then implement encrypted email by
  746. using the "Mailvelope" Internet browser add-on / extension:
  747.  
  748. https://www.mailvelope.com/
  749.  
  750. The Mailvelope add-on / extension is for Mozilla Firefox based Internet
  751. Browsers and also for Google Chrome based Internet browsers.
  752.  
  753. Refer to the Mailvelope website to find the most up to date list of
  754. which web-mail providers neatly integrate with Mailvelope, however here
  755. are four well established ones:
  756.  
  757. http://www.gmx.net/ https://mailbox.org/
  758.  
  759. https://posteo.de/ http://web.de/
  760.  
  761. NOTE: Sadly, the immaculate Lavabit encrypted email service is no
  762. longer available, due to the noble NSA/PRISM activism of the developer,
  763. Ladar Levison, in constitutionally challenging his National Security
  764. Letter, in 2013.
  765.  
  766. https://en.wikipedia.org/wiki/Lavabit https://darkmail.info/
  767.  
  768. Bear in mind that it is always wise to create such email accounts on
  769. other than your personal or work computers, and on other than your
  770. personal or work IP (Internet Protocol) address ranges. Note that it is
  771. very rare to find a web-mail provider that allows account creation via
  772. a "Tor-ified Browser", however, many such providers tolerate accessing
  773. web-mail via a Tor-ified Browser; we will discuss the Tor (The Onion
  774. Ring) system, later in these notes.
  775.  
  776. Always think during any of these processes, whether you are digitally
  777. finger printing (no pun intended) with your data or meta-data.
  778.  
  779. A recommended Internet Browser for the Mailvelope add-in / extension,
  780. is the SRWare "Iron Browser", which is a privacy oriented, stripped
  781. down, fork of the Google Chrome open-source code-base:
  782.  
  783. About: https://www.srware.net/en/software_srware_iron.php
  784.  
  785. Download: https://www.srware.net/forum/viewforum.php?f=21
  786.  
  787. For the Windows versions, install the "WebRTC Off" extension for extra
  788. privacy:
  789.  
  790. https://www.srware.net/forum/viewtopic.php?f=18&t=10863
  791.  
  792. https://www.srware.net/en/webrtc_off.php
  793.  
  794. It is important to disable "Web RTC", since it can leak your real IP on
  795. Windows O/S, even if you are using a VPN (Virtual Private Network)
  796. Service.
  797.  
  798. Some other prudent and judicious extensions for the Iron Browser, can
  799. be found at the Google Chrome Browser extensions directory:
  800.  
  801. https://chrome.google.com/webstore/category/extensions
  802.  
  803. Adblock Plus: Noscript:
  804.  
  805. http://adblockplus.org/ https://noscript.net/
  806.  
  807. EFF HTTPS Everywhere: EFF Privacy Badger:
  808.  
  809. https://www.eff.org/https-everywhere https://www.eff.org/privacybadger
  810.  
  811. This is the best way to download an off-line copy of a chrome
  812. extension, for archival purposes:
  813.  
  814. http://chrome-extension-downloader.com/
  815.  
  816. These extensions are also available for other Internet Browser
  817. rendering engine models, such as Mozilla Firefox.
  818.  
  819. It would also be prudent to routinely use a VPN (Virtual Private
  820. Network) Service, because, otherwise, with web-mail, or ordinary email
  821. using a desktop email client, your IP addresses can be fingered
  822. (identified), hence, your identity discovered; this is an excellent VPN
  823. survey:
  824.  
  825. https://torrentfreak.com/vpn-anonymous-review-160220/
  826.  
  827. Purchase your VPN service subscription using a disposable fixed value
  828. pre-paid (Mastercard or Visa) debit card, with a plausible synthetic
  829. identity.
  830.  
  831. By the use of a VPN Service, you can obfuscate what your actual IP
  832. address is, perhaps not from the NSA, however. The use of Mailvelope
  833. and the Iron Browser in the context of a VPN, is pretty much sufficient
  834. to establish anonymous email conversations with the VLF, the only other
  835. protection that you should examine is MAC randomisation, or "spoofing"
  836. of your network interfaces, for the Windows O/S, these are a couple of
  837. good MAC spoofing tools:
  838.  
  839. Lizard Systems Change MAC Address
  840. https://lizardsystems.com/change-mac-address/
  841.  
  842. Technitium MAC Address Changer
  843. https://technitium.com/tmac/
  844.  
  845. Logically, with prudential due diligence you should test such
  846. assertions as "pretty much sufficient", in the preceding paragraph!
  847. Matters of anonymity, privacy, encryption, and plausible deniability,
  848. are by way of grammatical analogue, the domain of dotting one's i's,
  849. crossing one's t's and knowing the proper use of apostrophes. ;-)
  850.  
  851. Obviously, you can also use desktop email clients, some web-mail hosts
  852. also allow direct POP, IMAP, and SMTP access (usually all SSL enabled)
  853. to web-mail accounts, for example: GMX Mail; one recommended pairing is
  854. the Mozilla Thunderbird email client with the Enigmail OpenPGP/GPG
  855. add-on:
  856.  
  857. Mozilla Thunderbird Email Client
  858. https://www.mozilla.org/en-US/thunderbird/
  859.  
  860. Enigmail OpenPGP/GPG Add-on
  861. https://www.enigmail.net
  862.  
  863. You would need to install "GnuPG" or "GPG4Win" (or "GPGTools" for Apple
  864. MacOSX) on your system:
  865.  
  866. http://www.gnupg.org/ http://www.gpg4win.org/
  867.  
  868. https://gpgtools.org/ http://www.jumaros.de/rsoft/index.html
  869.  
  870. For Windows users, "Jumaros GPGShell" is also highly recommended as an
  871. ancillary GPG tool.
  872.  
  873. Having established your VPN Service, email address, installed
  874. Mailvelope in your Internet Browser, created your OpenPGP/GPG
  875. public+private key-pair, then a further level of IP address obfuscation
  876. is to use the "Tor Browser Bundle" for accessing your encrypted
  877. web-mail, which uses the "Tor" system, "Tor" stands for "The Onion
  878. Router", rather than the recursive acronym "TOR Onion Router", however
  879. the latter provides insight into the function of the Tor system,
  880. familiarise yourself comprehensively:
  881.  
  882. The Tor Browser Bundle:
  883.  
  884. https://www.torproject.org/projects/torbrowser.html.en
  885.  
  886. The Tails Anonymity and Privacy Live Boot disk:
  887.  
  888. https://tails.boum.org/
  889.  
  890. Bearing all of the above in mind, ideally, pragmatically, what you
  891. should aim to do is establish a "Tails" anonymity, privacy, and
  892. encryption, "Live Boot" disk, with encrypted "Persistent Storage"
  893. enabled, on a high reliability, high speed, SDCard or USB memory stick.
  894. The Tails live boot disk is designed to execute, hermetically, all of
  895. it's Internet Traffic via the Tor system. Having created an email
  896. account, in the manner recommended above, you can then configure an
  897. email client within Tails and establish the OpenPGP/GPG encryption;
  898. this will allow you to send and receive encrypted email via the Tor
  899. system, and be able to persistently store, in encrypted form, all
  900. received and created information.
  901.  
  902. For Microsoft Windows O/S users, "Rufus", is a very useful adjunct for
  903. "burning" Tails to a SDCard or USB memory stick:
  904.  
  905. http://rufus.akeo.ie/
  906.  
  907. If you wish to send us large files, then upload them to a Tor-ified
  908. Browser friendly cyber-locker / file-host, these are some
  909. recommendations:
  910.  
  911. http://rghost.net/ http://datafilehost.com
  912.  
  913. http://zippyshare.com http://solidfiles.com
  914.  
  915. Of course, uploading via a Tor-ified browser client, on that point, the
  916. mass-mirroring resource "MirrorCreator", operates properly within a
  917. Tor-ified Browser:
  918.  
  919. https://www.mirrorcreator.com/
  920.  
  921. For very large data sets we recommend uploading to the Usenet binaries
  922. newsgroup:
  923.  
  924. alt.binaries.test
  925.  
  926. Always upload using SSL tunneling, using a SSL enabled Usenet access
  927. provider.
  928.  
  929. Recommended tools:
  930.  
  931. http://www.jbinup.com/ or http://powerpost.free.fr/
  932.  
  933. The latter needs be used with Stunnel:
  934.  
  935. https://www.stunnel.org/index.html
  936.  
  937. Use a nondescript file name and encrypt the archives with a password,
  938. locate a suitably tolerant public Wi-Fi access point to upload from and
  939. then securely contact us with the particulars, as detailed previously.
  940.  
  941. If you search about you will probably be able to find a fixed value,
  942. pre-paid, disposable, Visa or Mastercard debit card with which the
  943. on-line registration process only requires a working e-mail address for
  944. authentication and not a mobile phone number for SMS authentication;
  945. generate a plausible synthetic identity.
  946.  
  947. Once you have established a plausible synthetic identity and the
  948. pre-paid debit card, you can then purchase pre-paid SSL enabled Usenet
  949. Service Provider subscription, whence you can execute the uploads from
  950. a public-access Wi-Fi portal, using your VPN service and MAC spoofing.
  951.  
  952. Please note that credit card OLTP systems usually reject proxied and
  953. Tor-ified browsers for transactions and therefore for the actual
  954. purchase we recommend that you use a public Internet portal; Internet
  955. Cafes that boot fresh O/S images from their Intranet for each and every
  956. session are a recommended resource.
  957.  
  958. By such process disciplines your real identity will remain undisclosed
  959. and your plausible deniability will be maintained.
  960.  
  961. We do not warrant or assert that the methods explicated are totally
  962. safe and useful with no risk of compromising your anonymity. Please
  963. consult more knowledgeable resources on the Internet. For example, in
  964. the generality, consult the writings of Edward Snowden and Bruce
  965. Schneier, to see what anonymity, privacy, and encryption, tools that
  966. they recommend:
  967.  
  968. https://www.schneier.com/ https://www.schneierfacts.com/
  969.  
  970. https://edwardsnowden.com/
  971.  
  972. https://en.wikipedia.org/wiki/Edward_Snowden
  973.  
  974. Miscellaneous privacy, anonymity, and encryption, resources, all quite
  975. worthy of one's close attention:
  976.  
  977. The Android Guardian Project:
  978.  
  979. https://guardianproject.info/apps
  980.  
  981. Privacy Tools:
  982.  
  983. https://www.privacytools.io/
  984.  
  985. FSF (Free Software Foundation) email Self-defense:
  986.  
  987. https://emailselfdefense.fsf.org/en/
  988.  
  989. EFF (Electronic Frontiers Foundation) Surveilance Self-defence:
  990.  
  991. https://ssd.eff.org/en
  992.  
  993. FFTF (Fight For The Future) and CFR) Centre For Rights, Privacy Pack:
  994.  
  995. https://pack.resetthenet.org/
  996.  
  997. EPIC (Electronic Privacy Information Centre) Practical Privacy Tools:
  998.  
  999. https://www.epic.org/privacy/tools.html
  1000.  
  1001. Access Project: Encrypt All The Things:
  1002.  
  1003. http://encryptallthethings.net/
  1004.  
  1005. FPF (Freedom of the Press Foundation) Protect Yourself:
  1006.  
  1007. https://freedom.press/training/
  1008.  
  1009. PRISM Break: Privacy and Anonymity Index:
  1010.  
  1011. http://prism-break.org/
  1012.  
  1013. RISEUP online communication tools for activist groups:
  1014.  
  1015. https://riseup.net/
  1016.  
  1017. BestVPN: The Ultimate Privacy Guide:
  1018.  
  1019. https://www.bestvpn.com/the-ultimate-privacy-guide/
  1020.  
  1021. This is a useful guide, generally speaking, although somewhat dated now:
  1022.  
  1023. Dr Who - Security and Encryption FAQ - Revision 22.6.2
  1024.  
  1025. http://pastebin.com/kNruUa3W
  1026.  
  1027. In conclusion:
  1028.  
  1029. Of course, if you think any of this advice given is technically naive
  1030. and could compromise your anonymity and plausible deniability, then
  1031. please do not hesitate to correct us, via encrypted email (of course),
  1032. to suggest better methods and processes, thank you.
  1033.  
  1034. However, the VLF consider the methods outlined and adumbrated to be a
  1035. useful basis from which to start thinking about secure anonymous
  1036. communication and we think they would be useful for HP whistle-blowers,
  1037. VMS activists, and those gagged by NDAs (Non-disclosure Agreements)
  1038. that see the need or the necessity to let some sunshine in on HP VMS
  1039. policy, and to let some sunshine out, such as the source code for the
  1040. VMS Operating System and the VMS Layered Products.
  1041.  
  1042. YMWV, please do your homework first, you are VMS men, it should not be
  1043. difficult.
  1044.  
  1045. $!-------------------------- damn straight ---------------------------!$
  1046. $ opprobrium/level=kittens/mode=conniptions/input=VLF:/output=NL: !$
  1047. $!--------------------------- enough said ----------------------------!$
  1048. ..: NFO and DIZ v0.9.5.0 BETA - 2016-12-25 - !xD :..
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement