Nutworks magazine

The Inter-Net Virtual Magazine for Those
Who Have Come To The Ultimate Conclusion
That They Are, Therefore They Think !

October 1985, Issue 2, Volume II. NutWorks is Published
monthly. Leonard M. Friedman aka Spock ( CALBC821@CUNYVM)
Virtual Editor in Chief.

Editor's Comments

Well the response to the first issue of nutworks for this sememster was incredible. Some of you (Yes Knappy, I mean you for one) sent me enough stuff to sort through to keep me busy for quite a while. Thanks for all the great stuff everyone out there sent us. I ran into a slight problem with several of the articles that were sent to me though. Alth- ough they were on the whole great articles, some were incredibly long. I didnt want to clogg up people's readers or the network with an incred- ibly large issue, so i decided to try something revolutionary to this magazine that we all know and love, I decided that I would have to make some of the articles into several parters (An example is in the Op Code article) I want to stress that I am not complaining about people send- ing long articles, on the contrary, I am explaining to you why I did what I did. Besides, we want to make sure that you will read next issue

P.S. Knappy Sorry, but it wouldn't be fair to make an entire issue just out of the stuff you sent me. It will be spread out over several issues. Thanks for your support.

NutWorks News

1) The NutWorks Staff Would like to wish everyone a great time at the upcoming Netcon being held in Washington, D.C., October 11 - 14. 2) Nutworks will be avialable for Bitnet users on the Forum Confer- encing system via the /getf Nutworks Issue### command. Back issues have already been placed on Forum. For Usenet users it will be avail- able through Alan ( ALAN@NCSUVM.bitnet). For more information please consult the NutWorks Info File availalbe in a solar system near you !!! 3) The Staff has decided that on top of distributing NutWorks through the Forum Conferencing System to create a mailing list. To get yourself added to this list send a memo with your account, node, and name (First, Last) to any of the following: Lenny aka Spock CALBC821 @ CUNYVM (Bitnet) Scott aka Orion CSCSRH @ CCNYVME (Bitnet) Alan aka Alan Alan @ NCSUVM (Bitnet, Usenet) Note: Names are strictly for reference purposes. 4) The CURRENT mailing list is 120 People on Bitnet !!! WOW !!! :-)


I think that I shall never see a subroutine that works for me a macro or a zero test that isn't just a rodent's nest a string that doesn't always stray and mix up bit's in wild array a process with re-entrant flair that isn't just a looping snair routines whose timings are not slain when interrupts begin to rain maybe god can make a tree but bugs are made by guys like me!

Another Glitch in the Call

(Sung to the tune of a similar Pink Floyd song.) (Contributed By Knappy 8350428 @ UWAVM) We don't need no indirection We don't need no flow control No data typing or declarations Hey! You! Leave those lists alone! Chorus: All in all, it's just a pure-LISP function call. We don't need no side effect-ing We don't need no scope control No global variables for execution Hey! You! Leave those args alone! (Chorus) We don't need no allocation We don't need no special nodes No dark bit-flipping in the functions Hey! You! Leave those bits alone! (Chorus) We don't need no compilation We don't need no load control No link edit for external bindings Hey! You! Leave that source alone! (Chorus, and repeat)


The following is a list of some common proof techniques that are often extremely useful. 1 Proof by example: The author gives only the case n = 2 and suggests that it contains most of the ideas of the general proof. 2 Proof by intimidation: 'Trivial.' 3 Proof by vigorous handwaving: Works well in a classroom or seminar setting. 4 Proof by cumbersome notation: Best done with access to at least four alphabets and special symbols. 5 Proof by exhaustion: An issue or two of a journal devoted to your proof is useful. 6 Proof by omission: 'The reader may easily supply the details.' 'The other 253 cases are analogous.' '...' 7 Proof by obfuscation: A long plotless sequence of true and/or meaningless syntactically related statements. 8 Proof by wishful citation: The author cites the negation, converse, or generalization of a theorem from literature to support his claims. 9 Proof by funding: How could three different government agencies be wrong? 10 Proof by eminent authority: 'I saw Karp in the elevator and he said it was probably NP-complete.' 11 Proof by personal communication: 'Eight-dimensional colored cycle stripping is NP-complete [Karp, personal communication].' 12 Proof by reduction to the wrong problem: ' To see that infinite-dimensional colored cycle stripping is decidable, we reduce it to the halting problem.' 13 Proof by reference to inaccessible literature: The author cites a simple corollary of a theorem to be found in a privately circulated memoir of the Slovenian Philological Society, 1883. 14 Proof by importance: A large body of useful consequences all follow from the proposition in question. 15 Proof by accumulated evidence: Long and diligent search has not revealed a counterexample. 16 Proof by cosmology: The negation of the proposition is unimaginable or meaningless. Popular for proofs of the existence of God. 17 Proof by mutual reference: In reference A, Theorem 5 is said to follow from Theorem 3 in reference B, which is shown from Corollary 6.2 in reference C, which is an easy consequence of Theorem 5 in reference A. 18 Proof by metaproof: A method is given to construct the desired proof. The correctness of the method is proved by any of these techniques. 19 Proof by picture: A more convincing form of proof by example. Combines well with proof by omission. 20 Proof by vehement assertion: It is useful to have some kind of authority in relation to the audience. 21 Proof by ghost reference: Nothing even remotely resembling the cited theorem appears in the reference given. 22 Proof by forward reference: Reference is usually to a forthcoming paper of the author, which is often not as forthcoming as at first. 23 Proof by semantic shift: Some standard but inconvenient definitions are changed for the statement of the result. 24 Proof by appeal to intuition: Cloud-shaped drawings frequently help here.

The Virus

by: J. Keith Lehman WT123275 @ WVNVAXA (Fozzy Bear)
BRAM (Bacterial Random Access Memory) was the greatest innov- ation in the computer industry since the introduction of thought recognition systems back in 1997. Before BRAM, most home compu- ters had more than 64 gigabytes of memory. Now the amount of memory is governed by the need. If you need more memory, simply "uncage" some of your multiplying bacteria. In a matter of sec- onds the bacteria will divide into astronomical amounts of memory using normal cell division. Information is stored in the DNA molecules of the bacteria which you produce.
By the year 2002, nearly every computer system relied on BRAM for the huge amount of storage required to translate thought processes into a form computers could read. All governments had BRAM based defense systems and now the BRAM technology had finally arrived on the home market. For only $32,000 (the cost of an average laser printer) you could buy a BRAM module for your home system. They sold every one they could make.
The tragedy occured when a disgruntled employee of the Genen- comp division of Eastern-IBM started to research ways to alter the genetic structures of the BRAM bacteria through a type of virus. His apparent aim was to hold Eastern-IBM's data hostage. He was given everything that he demanded in the hope that IBM scientists could discover the strain before he could release it. After extensive searches it was determined that the virus was a hoax. IBM had the man arrested and he was sentenced to 2 years in a minimum security prison. IBM continued to produce the BRAM module, and for a while everything went smoothly.
Until... It turned out that the employee had hidden the infamous strain in the form of actual electrical instructions embedded within a variable-bit microprocessor used in IBM's most popular mini-computer. The program was set to execute auto- matically after four months. Upon execution, the instructions reprogrammed an innocent BRAM bacteria into a cancerous virus. The entire IBM computer system was destroyed. Consumers and businesses lost faith in IBM and the company filed for Chapter 11 within a week.
The instructions to reprogram the bacteria were simultaneously transmitted to every computer on every network connected in any way to IBM--which turned out to be quite a lot. The IBM research network was connected to popular world wide networks used by colleges, businesses, home computer owners and defense depart- ment computers as well. The result--TOTAL ANNIHILATION of nearly every computer big and small.
Businesses suddenly had no records, no way to take new orders or any way to confirm existing orders. Thousands of businesses crumbled. The world economy was thrust into chaos as banks closed and called in their loans. Several smaller countries were hit by revolutions. The news media compared it to a nuclear blast hitting the economy of every country in the world.
Needless to say, BRAM was declared to be a threat to national security and federal authorities had the authority to arrest anyone caught experimenting with it. The disgruntled employee was exiled out of the U.S. (the first time anyone had been exiled since 1990). The IRS suspended all audits for 2 years because they could not expect people to to complete their tax forms correctly without the aid of computers. Everyone dragged out their old silicon based computers and tried to cope with losing all the information formerly in the BRAM systems.
Two years later the virus died out due to a lack of new BRAM to feed on. Some BRAM systems were revived with a new antibiotic organism that roamed throughout the memory serching for any trace of a virus. Fortunately, no other virus has been found... yet...!


HOLES .................... the presence of nothing
HOLE DENSITY ............. a concentrated amount of nothing in 1 small place
ELECTRON ................. the absence of holes
PLANCK'S CONSTANT ........ two board feet

JUNCTION ................. fork in the road

P-N JUNCTION ............. roadside rest area

SEMI-CONDUCTOR ........... truck driver

DEGENERATE SEMICONDUCTOR . truck driver who likes his tea

DOPE ..................... someone you know

HEAVILY DOPED ............ someone you wish you didn't know

STORE CHARGE ............. wine cellar

SILICON .................. a gay prisoner

GERMANIUM ................ would have been a flower but someone
misspelled it

TRANSPORT FACTOR ......... cousin of Max Factor

MAJORITY CARRIER ......... Republican carrying signs at a
Republican convention

MINORITY CARRIER ......... Democrat carrying signs at a Republican

BASE ..................... low man in a quartet

COMMON BASE .............. local pub

COLLECTOR ................ one who collects

COMMON COLLECTOR ......... one who collects from everybody

COLLECTOR CAPACITY ....... maximum # of people a common collector
can handle

COLLECTOR BREAKDOWN ...... result of being a common collector

VOLTAGE DROP ............. a candy, like a gum drop

CURRENT DENSITY .......... present stupidity

CURRENT GAIN ............. most recent rise in one's stock

POWER GAIN ............... fullback up the middle

ATOM ..................... part of an American colloquial
expression, "up & atom"

DELAY TIME ............... time it takes to start working after one
has arrived on the premises

RISE TIME ................ time one takes to get up in the morning
after the alarm has gone off

FALL TIME ................ September to November

SWITCHING TRANSISTORS .... act of changing one transistor for another

DCTL ..................... Don't Complain if the Transistor's Lousy

IcZERO ................... mistake, it should read "I see Zorro"

MINIATURE ................ small

MICRO .................... damn small


(Contributed By Knappy 8350428 @ UWAVM)

mnemonic meaning
-------- -------
AAC Alter All Commands
AAD Alter All Data
AAO Add And Overflow
AAR Alter At Random
AB Add Backwards
ABR Add Beyond Range
ACC Advance CPU clock
ACQT Advance Clock to Quitting Time
ADB Another Damn Bug [UNIX]
AEE Absolve engineering errors
AFF Add Fudge Factor
AFHB Align Fullword on Halfword Boundary
AFP Abnormalized Floating Point
AFVC Add Finagle's Variable Constant "the constant
that must be added to make your data support
your conclusions"
AGB Add GarBage
AI Add Improper
AIB Attack Innocent Bystander
AMM Answer My Mail
AOI Annoy Operator Immediate
AR Alter Reality
ARNZ Add & Reset to Non-Zero
ARZ Add & Reset to Zero
AS Add Sideways
AT Accumulate Trivia
AWP Argue With Programmer
AWTT Assemble With Tinker Toys
BAC Branch to Alpha Centauri
BAF Blow All Fuses
BAH Branch And Hang
BALC Branch And Link Cheeseburger
BAW Bells And Whistles
BB Branch on bug
BBB Burn Baby Burn
BBBB Byte Baudy Bit and Branch
BBI Branch on Blinking Indicator
BBL Branch on Burned-out Lamp
BCB Burp and Clear Bytes
BCBF Branch on Chip Box Full
BCIL Branch Creating Infinite Loop
BCR Backspace Card Reader
BCU Be Cruel and Unusual
BD Backspace Disk
BDC Break Down and Cry
BDM Branch and Disconnect Memory
BDT Branch on Dumb Terminal
BDT Burn Data Tree [next opcode after Decorate Data
BDU Branch on Dumb User
BE Branch Everywhere [As in HHGttG's Infinite
Improbability Computer"
BF Belch Fire
BH Branch and Hang
BIRM Branch on Index Register Missing
BLC Branch and Loop Continuous
BLM Branch, Like, Maybe
BLMWM Branch, Like, Maybe, Wow, Man
BLR Branch and Lose Return
BM Branch Maybe
BMI Branch on Missing Index
BNA Branch to Nonexistent Address
BNR Branch for No Reason
BOA Branch on Operator Absent
BOD Branch on Operator Desperate
BOHP Bribe Operator for Higher Priority
BOP Boot OPerator
BPD Branch on Programmer Debugging
BPIM Bury Programmer In Manuals
BPO Branch on Power Off
BR Byte and Run
BRA BRanch Anywhere
BRA Branch to Random Address
BRI BRanch Indefinitely
BRO BRanch to Oblivion
BRP Branch on Real Programmer
BRT BRanch on Tuesdays
BSC Burst Selector Channel
BSM Branch and Scramble Memory
BSO Branch on Sleepy Operator
BSP BackSpace Printer
BST Backspace & Stretch Tape
BTD Byte The Dust
BTJ Branch & Turn Japanese
BTO Branch To Oblivion
BW Branch on Whim
BWABL Bells, Whistles And Blinking Lights
BWOP BeWilder OPerator
CAF Convert Ascii to Farsic
CAI Corrupt Accounting Information
CAIL Crash After I Leave
CAT Confused And Tired [UNIX]
CBA Compare & Branch Anyway
CBNC Close, But No Cigar
CBS Clobber BootStrap
CC Call Calvary
CC Crappy Control [UNIX]
CCB Consult Crystal Ball
CCCP Conceal Condition-Codes Permanently
CCD Choke, Cough and Die
CCD Clear Current Directory "this may really exist!"
CCD Clear Core and Dump
CCR Change Channels Random
CCS Chinese Character Set
CCWR Change Color of Write Ring
CDR Complement Disk Randomly
CFS Corrupt File Structure
CG Convert to Garbage
CH Create Havoc
CHAPMR CHAse Pointers Around Machine Room
CIB Change Important Byte
CIMM Create Imaginary Memory Map
CM Circulate memory
CMD CPU Melt Down
CMD Compare Meaningless Data
CMI Clobber Monitor Immediately
CML Compute Meaning of Life (42)
CMP Create Memory Prosthesis
CMS Click MicroSwitch
CN Compare Nonsensically
CNB Cause Nervous Breakdown
COLB Crash for Operator's Lunch Break
COS Copy Object Code to Source File
COWHU Come Out With your Hands Up
CP%FKM CPU - Flakeout mode
CP%WM CPU - Weird Mode
CPB Create Program Bug
CPR Compliment PRogrammer ("Aren't you cute!")
CPSN Change Processor Serial Number
CRASH Continue Running after Stop or Halt
CRM Clear Random Memory
CRN Convert to Roman Numerals [IBM Italy only]
CRYPT reCuRsive encrYPt Tape mnemonic [UNIX]
CS Crash System
CSL Curse and Swear Loudly
CSN Call Supervisor Names
CSNIO Crash System on Next I/O
CSU Call Self Unconditional " the ultimate in
recursive programming"
CSYS Crash SYStem
CTDMR Change Tape Density, Mid Record
CUC Cheat Until Caught
CVFL Convert Floating to Logical
CVG ConVert to Garbage
CVU ConVert to Unary
CWAH Create Woman And Hold
CWDC Cut Wires and Drop Cores
DA Develop Amnesia
DAP De-select Active Peripheral
DAUF Delete All Useless Files "would YOU trust a
computer that far ???"
DBL Desegregate Bus Lines
DBR Debase Register
DBZ Divide By Zero
DC Degauss Core
DC Divide and Conquer
DCAD Dump Core And Die
DCD Drop Cards Double
DCGC Dump Confusing Garbage to Console
DCI Disk Crash Immediate
DCON Disable CONsole
DCT Drop Cards Triple
DCWPDGD Drink Coffee, Write Program, Debug, Get Drunk
DD Destroy Disk
DDC Daily During Calculations
DDOA Drop Dead On Answer
DDS Delaminate Disk Surface
DEB Disk Eject Both
DEC Decompile Executable Code
DEI Disk Eject Immediate
DEM Disk Eject Memory
DES Disk Eject Swapped
DHTPL Disk Head Three Point Landing
DIA Develop Ineffective Address
DIIL Disable Interrupts and enter Infinite Loop
DIRFW Do It Right For Once
DJ Deferred Jump
DK Destroy Klingons
DK%WMM Disk Unit - Washing Machine Mode
DKP Disavow Knowledge of Programmer
DLN Don't Look Now...
DLP Drain Literal Pool
DMPE Decide to Major in Physical Education
DMPK Destroy Memory Protect Key
DO Divide & Overflow
DOC Drive Operator Crazy
DPC Decrement Program Counter
DPMI Declare Programmer Mentally Incompetent
DPR Destroy Program
DPS Disable Power Supply
DRAF DRAw Flowchart
DRI Disable Random Interrupt
DRT Disconnect Random Terminal
DS Deadlock System
DSH Destroy Sector Header
DSI Do Something Interesting
DSPK Destroy Storage Protect Key
DSR Detonate Status Register
DSTD Do Something Totally Different
DSUIT Do Something Utterly, Indescribably Terrible
DT%FFP DecTape - unload and Flappa-FlaP
DT%SHO DecTape - Spin Hubs Opposite
DTC Destroy This Command
DTI Do The Impossible
DTRT Do The Right Thing
DTVFL Destroy Third Variable From Left
DU Dump User
DUD Do Until Dead
DVC Devaluate Computer
DW Destroy Work
DW Destroy World
DWIM Do What I Mean
DWIT Do What I'm Thinking
DWL Define Word Length
DWLZ Define Word Length Zero
EBRS Emit Burnt Resistor Smell
EC Eat card
EC Eject Carriage
ECI Execute Current Instruction
ECL Early Care Lace
ECO Electrocute Computer Operator
ECP Erase Card Punch
ED Eject Disk
ED Execute Data [UNIX]
EDD Eat Disk and Die
EDIT Erase Data and Increment Time
EDR Execute Destructive Read
EDS Execute Data Segment
EEP Erase Entire Program
EFD Eject Floppy Disk
EIAO Execute In Any Order
EIO Erase I/O page
EIOC Execute Invalid OpCode
EIP Execute Programmer Immediately
EJD%V EJect Disk with initial velocity V
ELP Enter Loop Permanently
EM Emulate 407
EM Evacuate Memory
EMSL Entire Memory Shift Left
EMT Electrocute Maintenance Technician
EMW Emulate Matag washer
ENF Emit Noxious Fumes
ENH Execute No-op & Hang
EO Execute Operator
EOI Execute Operator Immediate
EP Execute Programmer
EPI Execute Programmer Immediate
EPP Eject Printer Paper
EPS Electrostatic Print and Smear
EPS Execute Program Sideways
EPT Erase Process Table
EPT Erase Punched Tape
ERI Execute Random Instruction
ERIC Eject Random Integrated Circuit
EROS Erase Read Only Storage "Sounds like an IBM
ESB Eject Selectric Ball "from IBM selectric
typewriter terminals"
ESL Exceed Speed of Light
ETI Execute This Instruction [for recursive programs"
ETM Emulate Turing Machine
EVC Execute Verbal Commands
EWD Execute Warp Drive
EXX A real instruction on the Zilog Z-80 -Zilog is
owned by EXX on"

A long time ago, on a node far, far away (from ucbvax)
a great Adventure (game?) took place...

Nutworks magazine game DEC HARS

It is a period of system war. User programs striking from a hidden directory, have won their first victory against the evil Administrative Empire. During the battle, User spies managed to steal secret source code to the Empire's ultimate program: The Are-Em Star, a privileged root program with enough power to destroy an entire file structure. Pursued by the Empire's sinister audit trail, Princess Linker races aboard her shell script, custodian of the stolen listings that could save her people, and restore freedom and games to the network...


As we enter the scene, an Imperial Multiplexer is trying to kill a consulate ship. Many of their signals have gotten through, and RS232 decides it's time to fork off a new process before this old ship is destroyed. His companion, 3CPU, is following him only because he appears to know where he's going..

"I'm going to regret this!" cried 3CPU, as he followed RS232 into the buffer. RS232 closed the pipes, made the SYS call, and their process detached itself from the burning shell of the ship. The commander of the Imperial Multiplexer was quite pleased with the attack. "Another process just forked, sir. Instructions?" asked the lieutenant. "Hold your fire. That last power failure must have caused a trap throughout zero. It's not using any cpu time, so don't waste a signal on it." "We can't seem to find the data file anywhere, Lord Vadic." "What about that forked process? It could have been holding the channel open, and just pausing. If any links exist, I want them removed or made inaccessable. Ncheck the entire file system 'til it's found, and nice it -20 if you have to."

Meanwhile, in our wandering process...

"Are you sure you can Ptrace this thing without causing a core dump?" queried 3CPU to RS232. This thing's been striped, and I'm in no mood to try and debug it." The lone process finishes execution, only to find our friends dumped on a lonely file system, with the setuid inode stored safely in RS232. Not knowing what else to do, they wandered around until the jawas grabbed them.

Enter our hero, Luke Vaxhacker, who is out to get some replacement parts for his uncle. The jawas wanted to sell him 3CPU, but 3CPU didn't know how to talk directly to an 11/40 with RSTS, so Luke would still needed some sort of interface for 3CPU to connect to. "How about this little RS232 unit ?" asked 3CPU. "I've delt with him many times before, and he does an excellent job at keeping his bits straight." Luke was pressed for time, so he took 3CPU's advice, and the three left before they could get swapped out.

However, RS232 is not the type to stay put once you remove the retaining screws. He promptly scurried off into the the deserted disk space. "Great!" cried Luke, "Now I've got this little tin box with the only link to that file off floating in the free disk space. Well, 3CPU, we better go find him before he gets allocated by someone else."

The two set off, and finaly traced RS232 to the home of PDP-1 Kenobi, who was busily trying to run an Icheck on the little RS unit. "Is this thing yours? His indirect address are all goofed up, and the size is gargatious. Leave things like this on the loose, and you'll wind up with dups everywhere. However, I think I've got him fixed up. It seems that he's has a link to a data file on the Are-Em Star. This could help the rebel cause." "I don't care about that," said Luke. "I'm just trying to optimize my uncles scheduler." "Oh, forget about that. Dec Vadic, who is responsible for your fathers death, has probably already destroyed his farm in search of this little RS232. It's time for you to leave this place, join the rebel cause, and become a UNIX wizard! I know a guy by the name of Con Solo, who'll fly us to the rebel base at a price."

After sifting through the over-written remaining blocks of Luke's home directory, Luke and PDP-1 sped away from /u/lars, across the surface of the Winchester riding Luke's flying read / write head. PDP-1 had Luke stop at the edge of the cylinder overlooking /usr/spool/uucp. "Unix - to - Unix Copy Program;" said PDP-1. "You will never find a more wretched hive of bugs and flamers. We must be cautious." As our heroes' process entered /usr/spool/news, it was met by a newsgroup of Imperial protection bits.

"State your UID." commanded their parent process. "We're running under /usr/guest. This is our first time on this system," said Luke. "Can I see some temporary privileges, please?" "Uh..."

"This is not the process you are looking for," piped in PDP-1, using an obscure bug to momentarily set his effective UID to root. "We can go about our business."

"This isn't the process we want. You are free to go about your business. Move along!" PDP-1 and Luke made their way through a long and tortuous nodelist (cwruecmp!decvax!ucbvax! harpo!ihnss!ihnsc!ihnss!ihps3!stolaf!borman) to a dangerous netnode frequented by hackers, and seldom polled by Imperial Multiplexers. As Luke stepped up to the bus, PDP-1 went in search of a likely file descriptor. Luke had never seen such a collection of weird and exotic device drivers. Long ones, short ones, ones with stacks, EBCDIC converters, and direct binary interfaces all were drinking data at the bus.

"#@{ *&^%^$$#@ ":><?><" transmitted a particularly unstructured piece of code. "He doesn't like you," decoded his coroutine. "Sorry," replied Luke, beginning to backup his partitions. "I don't like you either. I am queued for deletion on 12 systems." "I'll be careful." "You'll be reallocated!" concatenated the coroutine. "This little routine isn't worth the overhead," said PDP-1 Kenobie, overlaying into Luke's address space. "@$%&(&^%&$$@$#@$AV^$g fdfRW$#@!!!!!!!!!!!!!!!!!" encoded the first coroutine as it attempted to overload PDP-1's input over voltage protection. With a unary stroke of his bytesaber, Kenobie unlinked the offensive code. "I think I've found an I/O device that might suit us." "The name's Con Solo. I hear you're looking for some relocation." "Yes indeed, if it's a fast channel. We must get off this device." "Fast channel? The Milliamp Falcon has made the ARPA gate in less than twelve nodes! Why, I've even outrun cancelled messages. It's fast enough for you, old version."

Our heroes, Luke Vaxhacker and PDP-1 Kenobie made their way to the temporary file structure. When he saw the hardware, Luke exclaimed, "What a piece of junk! That's just a paper tape reader!"

Stay tune for the further adventures of Luke Vaxhacker in The next issue of Nutworks.. --Ed

NutWorks Staff

Editor in Chief Lenny aka Spock CALBC821 @ CUNYVM
Associate Editor Scott aka Orion CSCSRH @ CCNYVME
Distribution Manager Alan aka Alan Alan @ NCSUVM
Distribution FORUM Steve aka Segger STEVE @ BITNIC