• "Spreading the ideas of freedom loving people on matters regarding high finance, politics, constructionist Constitution, and mental masturbation of all types"

Older Computers, Operating Systems, Etc.


Midas Member
Midas Member
Midas Supporter
Apr 2, 2010
.......My old windows XP based machine started having to best of my tech skills problems that seemed based around the video card........so rather than mess with it .........i pulled another old computer out of storage which at the time was our top cutting edge machine with windows 7 pro....this old machine was used as a CAD and Graphics machine in the past and still has those programs on it.. so it has lotsa memory etc for the time........fired it up....transferred files ......wala back in business....with WOOO HOOO win7 ...LOL ....im coming slowly ...i bet i can use this one another 5 years at least :)

edit to add....found one of my old programable graphing calculators...:) speaking of retro
20180524_235622 (Large).jpg
Last edited:


Gold Member
Gold Chaser
Site Supporter ++
Mar 31, 2010
The Original IBM PC 5150 - the story of the world's most influential computer
Modern Classic

Published on Jul 18, 2018
This is the story of the first IBM PC - the computer that's the original ancestor of one you probably still own. Today, nearly 40 years after its introduction, modern PC's are used for everything from the kinds of business applications the system was originally designed for, to scientific work, to high-end gaming. But it all started back in 1981 with the IBM 5150.
I was heavily involved in the PC industry during the entire timeframe of this video. Usually, when I see a video like this where I know something about the subject, I choke over all the errors that it's riddled with. This one is a breadth of fresh air! It's a well organized overview, and it's accurate. Kudos to its makers.


#1 Global Warmer
Platinum Bling
Midas Supporter ++
Mar 30, 2010
Coal Country

Hacker Finds Hidden ‘God Mode’ on Old x86 CPUs; ‘These Backdoors Probably Exist Elsewhere’
August 12th, 2018

One more for your herniating Compromised Down to the Silicon file folder.

Via: Tom’s Hardware:

Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU, security researcher Christopher Domas told the Black Hat conference here Thursday (Aug. 9).

The command — “.byte 0x0f, 0x3f” in Linux — “isn’t supposed to exist, doesn’t have a name, and gives you root right away,” Domas said, adding that he calls it “God Mode.”

The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces (“userland”) run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas’ God Mode takes you from the outermost to the innermost ring in four bytes.

“We have direct ring 3 to ring 0 hardware privilege escalation,” Domas said. “This has never been done.”

That’s because of the hidden RISC chip, which lives so far down on the bare metal that Domas half-joked that it ought to be thought of as a new, deeper ring of privilege, following the theory that hypervisors and chip-management systems can be considered ring -1 or ring -2.

“This is really ring -4,” he said. “It’s a secret, co-located core buried alongside the x86 chip. It has unrestricted access to the x86.”

The good news is that, as far as Domas knows, this backdoor exists only on VIA C3 Nehemiah chips made in 2003 and used in embedded systems and thin clients. The bad news is that it’s entirely possible that such hidden backdoors exist on many other chipsets.

“These black boxes that we’re trusting are things that we have no way to look into,” he said. “These backdoors probably exist elsewhere.”