Position & proposal

ET emergent@eval-apply.com
Thu, 5 Jun 1997 12:37:56 -0400

> From: Paul Prescod <papresco@calum.csclub.uwaterloo.ca>
> To: lispos@math.gatech.edu
> Subject: Re: Position & proposal
> Date: Thursday, 05 June, 1997 05:46

> Seems like an artificial distinction to me. Didn't MIT run machines at
> one point that anyone from the Internet could log into and make changes
> to -- a remote hacking machine? Was that "production" or "development"?
> I maintain machines like that myself -- multiple users but it is well
> known that it can crash at any time.
>  Paul Prescod

ITS had that property.  You could map anyone's address space into
your own, or watch take over their tty remotely.  It worked nicely until
a young MIT hacker abused it enough to have them install a new just
for him.

This new hack gave the illusion that you were remotely modifying
the other address space while in fact you were doing nothing.  I
won't name the young hacker, but Greenblatt refers to the solution
as ``the Sussman hack''