Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 224251
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T19:17:57+00:00 2026-05-11T19:17:57+00:00

I realize this sounds like something a malware program would do, so I understand

  • 0

I realize this sounds like something a malware program would do, so I understand if some of you are skeptical of my intentions. I would never do this for a program intended for other people’s use, but I also realize other people might look at the answers and do it themselves.

My productivity goes way down when I am on the Internet, so I want to write a program to automatically turn off my connection every once in a while. But knowing me, I’ll probably just sudo kill -9 it once it gets annoying, and I want to make that slightly difficult so that I don’t do it all the time. Any suggestions for this (or other ways to acheive what I’m trying to do)? I’m thinking of things like naming it the same thing as another process so I have to spend some time figuring out what I need to kill, spawning a process frequently with a cron job, etc.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T19:17:57+00:00Added an answer on May 11, 2026 at 7:17 pm

    From the Jargon file, always a good read for IT industry history buffs and those who want to know what we’re talking about:

    =====

    Back in the mid-1970s, several of the system support staff at Motorola
    discovered a relatively simple way to crack system security on the
    Xerox CP-V timesharing system. Through a simple programming strategy,
    it was possible for a user program to trick the system into running a
    portion of the program in ‘master mode’ (supervisor state), in which
    memory protection does not apply. The program could then poke a large
    value into its ‘privilege level’ byte (normally write-protected) and
    could then proceed to bypass all levels of security within the
    file-management system, patch the system monitor, and do numerous
    other interesting things. In short, the barn door was wide open.

    Motorola quite properly reported this problem to XEROX via an official
    ‘level 1 SIDR’ (a bug report with a perceived urgency of ‘needs to be
    fixed yesterday’). Because the text of each SIDR was entered into a
    database that could be viewed by quite a number of people, Motorola
    followed the approved procedure: they simply reported the problem as
    ‘Security SIDR’, and attached all of the necessary documentation,
    ways-to-reproduce, etc. separately.

    Xerox sat on their thumbs…they either didn’t realize the severity of
    the problem, or didn’t assign the necessary operating-system-staff
    resources to develop and distribute an official patch.

    Months passed. The Motorola guys pestered their Xerox field-support
    rep, to no avail. Finally they decided to take Direct Action, to
    demonstrate to Xerox management just how easily the system could be
    cracked, and just how thoroughly the system security systems could be
    subverted.

    They dug around in the operating-system listings, and devised a
    thoroughly devilish set of patches. These patches were then
    incorporated into a pair of programs called Robin Hood and Friar Tuck.
    Robin Hood and Friar Tuck were designed to run as ‘ghost jobs’
    (daemons, in Unix terminology); they would use the existing loophole
    to subvert system security, install the necessary patches, and then
    keep an eye on one another’s statuses in order to keep the system
    operator (in effect, the superuser) from aborting them.

    So…one day, the system operator on the main CP-V software
    development system in El Segundo was surprised by a number of unusual
    phenomena. These included the following:

    • Tape drives would rewind and dismount their tapes in the middle of a
      job.
    • Disk drives would seek back and forth so rapidly that they’d attempt
      to walk across the floor.
    • The card-punch output device would occasionally start up of itself
      and punch a (every hole punched). These would usually
      jam in the punch.
    • The console would print snide and insulting messages from Robin Hood
      to Friar Tuck, or vice versa.
    • The Xerox card reader had two output stackers; it could be
      instructed to stack into A, stack into B, or stack into A unless a
      card was unreadable, in which case the bad card was placed into
      stacker B. One of the patches installed by the ghosts added some
      code to the card-reader driver… after reading a card, it would flip
      over to the opposite stacker. As a result, card decks would divide
      themselves in half when they were read, leaving the operator to
      recollate them manually.

    There were some other effects produced, as well.

    Naturally, the operator called in the operating-system developers. They
    found the bandit ghost jobs running, and X’ed them… and were once
    again surprised. When Robin Hood was X’ed, the following sequence of
    events took place:

    !X id1
    id1: Friar Tuck... I am under attack!  Pray save me!
    id1: Off (aborted)
    id2: Fear not, friend Robin!  I shall rout the Sheriff of
         Nottingham's men!
    id1: Thank you, my good fellow!
    

    Each ghost-job would detect the fact that the other had been killed,
    and would start a new copy of the recently-slain program within a few
    milliseconds. The only way to kill both ghosts was to kill them
    simultaneously (very difficult) or to deliberately crash the system.

    Finally, the system programmers did the latter… only to find that
    the bandits appeared once again when the system rebooted! It turned
    out that these two programs had patched the boot-time image (the
    /vmunix file, in Unix terms) and had added themselves to the list of
    programs that were to be started at boot time…

    The Robin Hood and Friar Tuck ghosts were finally eradicated when the
    system staff rebooted the system from a clean boot-tape and
    reinstalled the monitor. Not long thereafter, Xerox released a patch
    for this problem.

    It is alleged that Xerox filed a complaint with Motorola’s management about
    the merry-prankster actions of the two employees in question. It is
    not recorded that any serious disciplinary action was taken against
    either of them.

    =====

    So, the upshot is to have multiple jobs (as many as you like), monitoring each other and restarting where necessary. You also need to protect against variants of the kill statement that can kill a whole slew of processes in one hit.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 117k
  • Answers 118k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer class Program { static void Main(string[] args) { Timer timer… May 11, 2026 at 10:50 pm
  • Editorial Team
    Editorial Team added an answer Use GROUP_CONCAT SELECT GROUP_CONCAT(bar) FROM TABLE GROUP BY foo; May 11, 2026 at 10:50 pm
  • Editorial Team
    Editorial Team added an answer Your code doesn't work because the function is not returning… May 11, 2026 at 10:50 pm

Related Questions

Is there any built-in functionality for classical set operations on the java.util.Collection class? My
I'm writing a server that I expect to be run by many different people,
This is related to this question . It got me thinking that, for example,
I'd like to be able to keep our CruiseControl.Net's ccnet.config file in svn, then

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.