DECEMBER 1984 Editorial
Total Page:16
File Type:pdf, Size:1020Kb
SECRET UJUJUVC!JUJUJlb f5l5CBl!JWVU~ !D~~WCB~ Cf l!l U1 v ffil! f] Ill~(! ffi g 00 (!{il C!J l! '7 00 {iJ U1 ~ [1{iJ w~ NOV-DEC 1984 EO 1. 4. (c) P .L. 86- 36 . TRENDS IN HF COMMUNICATIONS (U) •••••••••••• • ••• J.._ ___---..._.1. \\:>............ 1 • SWITCHBOARD: • PAST, PRESENT AND FUTURE (U) •• ~ ............. I • • \ I .......... 5 \ OUT OF MY DEPTH (U) .......................•............•...; .. i .. \ ... ·........ 7 . • • • • • • • • • • • • • • • • • • • • • • ! I ...\ .......... s 1 EXPLORING A DOS DISKETTE (U)................... I ...... :; , ........ 12 HUMAN FACTORS (U) •••••••••••••••••••••••••••••• I l ........ 22 CAN YOU TOP THIS? (U) ........................... E. Leigh Sawyer ... , \~ ••••••• 24 PERSONAL COMPUTING IN A GROUP (U).............. • •••••• 25 FACTION LINE (U) ••• , •••••••••••••••••••••••• • ••• Cal Q. Lator •••••••••••••• • 35 NSA-CROSTIC NO. 59 (U) •••.•••••••••••••••••••••• D.H.W.;.,, ••••••••••••••••• 36 'flllS BOC\'.JMBNT <JONTl.INS <JOBl'JWORB MATl'JRIAh Ghi'tSSIFIEB BY tfSA/SSSM lH 2 SECRET BEGI:a\-SSIFY 0N. 0r igiriet iug Agency's Betezminatior:t Reqaized Declassified and Approved for Release by NSA on 'I 0- '16-2012 pursuant to E 0 . 13526, MOR Case # 54 77B OCID: 4009933 Published by Pl, Techniques and Standards EO 1. 4. ( c) P~L. 86-36 VOL. XI, No. 11-12 NOVEMBER-DECEMBER 1984 Editorial PUBLISHER BOARD OF EDITORS Edi.tor ...•••......_I _______ ... 1(963-3045s .) Product ion .•....•. I .(963-3369s) . : : : :· Collection .••••••..•••• i------.jc963-396ls) Computer Security •: ' •••••• 1 ,(859-6044) Cryptolinguist ics. l 963-1 f03s) Data Systems .•...•.•• ·l ., 963-4,953s) Information Science " • ..... I lc963-.5111s> Puzzles .......... David H. Williams'f(9637'Il03s) Special Research • ..•. Vera R. Filby;! C968'-7119s) Traffic Analysis •. Robert J. Hanyo!<f! (968-3888s) For subscript ions .. , send name and organizat~on to: I w14I i P.L. 86-36 To submit articles or letters by mail, to: Pl, Cryptolog via PLATFORM mail, send to: cryptolg at barlc~S (bar-one-c-zero-five) (note: no 'O' in 'log') Contents of Cryptolog should not be repro . duced, or further disseminated outside th~ ' National Security Agency without the permis sion of the Publisher. Inquiries regarding :I reproduction and dissemination should be directed to the Editor. F9R 9FFI8 !Al': tl'SE ellfl': t OCID: 4009933 SH8Rt3'f SP9ff:H TRENDS IN HF COMMUNICATIONS [U] l\ :_L. 86- 36 Nov 84 * CRYPTOLOG * Page 1 EO 1. 4. ( c) P.L. 86-36 EO 1. 4 . (c) Bl38RB'f BPS!Qi OCID: 4009933 P. L. 86- 36 Nov 84 * CRYPTOLOG * Page 2 Sl38Rfl'f BP81!fi EO 1. 4. ( c) OCID: 4009933 SF.i8~'1' SP81U! P.L. 86- 36 Nov 84 * CRYPTOLOG * Page 3 SESill!iT SP9KE .Eo 1.4. (c) OCID: 4009933 9B8RB'P 9P61ffi P;L. 86-36 \'-·.... ·. " •• • EO 1. 4. ( c) P.L. 86 - 36 Nov 84 * CRYPTOLOG * Page 4 lll!Sml'F Sf6K! 4009933 P.L . 86-36 Nov 84 * CRYPTOLOG * Page 5 P .L. 86- 36 EO 1. 4 . ( c) llzldiB'hB 'flt't S811I!f'f S!Wll!EIOS QNIO¥ 4009933 SESRE'f We. forgot 'fo hoYe. 04.- t!R.tPnL.06- Stt \)sc:rip~ lo h '!. tnove<f/ vii l~h~ tell tor IAS ~ P.L. 86-36 . 86-36 1. 4. (c) Nov 84 * CRYPTOLOG * Page 6 IIMIBbE YIA S911Hl'F SIWRIEJ::S 91il::Y 4009933 69PIFIB6~1'HM. 1. 4. (c) 0 P .. 86-36 Q 0 0 OUT OF MY DEPTH [U] Nov 84 * CRYPTOLOG * Page 7 88NPIBHlflf'IltL CID: 4009933 EO 1. 4. ( c) P.L. 86-36 P.L. 86.36 bv.___I_-----1ls14 /// // Nov 84 * CRYPTOLOG * Page 8 EO 1 · 4 . ( c) P.L. 86-36 EO 1.4. (c) 4009933 P.L .. 86-36 BE8nB'f Nov 84 * CRYPTOLOG * Page 9 SEBR:rl!' EO 1. 4. ( c) 4009933 SEElR:E'E' P..L. 86-36 - Nov 84 * CRYPTOLOG * Page 10 SE8Ml'f EO 1. 4 . (c) 4009933 P~ L. 86- 36 Nov 84 * CRYPTOLOG * Page 11 SESRE'f 4009933 P6ft: 6PPfeflrL HSE 6Ht'f EXPLORING P.L. 86-3 br_I__ lr1a INTRODUCTION LOOKING AT THE DISKETTE Many data systems professionals will go Formatting through an entire career using a personal com puter and handling small diskettes without really having an idea of how data is organized When a user removes a blank diskette from on them. There is nothing magic about it and, the box for the first time he has two choices. in fact, it isn't really difficult to under He can use it as a frizbee or he can turn it stand where and how information is being into a reliable storage medium for use in his stored and what it looks like on the disk. personal computer. We will address the second possibility with the full knowledge that we do not exclude the first possibility at any step This paper will attempt to explain how a of the process. 5 l /4 inch floppy disk is organized under PC DOS 1.1, written by Microsoft for the IBM-PC. We will be using an IBM-PC and two double When you run the FORMAT program, as you al sided double-density disk drives. ready know, the diskette under DOS 1.1 is di vided into 40 tracks per side, 8 sectors per track, with a boot record, directory, ·file al Most information was obtained from the location table, and, optionally, an entire Peter Norton book, Inside the IBM-PC, one of operating system. Ok, let's format it. the most useful books on ;1TC:omputers I have found, and the IBM DOS 1.1 manual--very useful both as to information and as a cure Exploration for insomnia. We' 11 now take our formatted diskette and The diskette data "displays were obtained place it in drive "B"--the one on the right. through the use of the Peter Norton utility In the left drive we'll place the Norton Util DISKLOOK. ities and type in DL for DISKLOOK. This as sembly language program will allow the user to look at the floppy diskette in the right drive Microsoft went to great lengths to have the sector by sector. software overhead take up as little room on the diskette as possible. This, obviously, makes good sense. A small computer isn't much After DL is typed a self explanatory list good to you if the operating system takes up of options comes up on the screen. We choose the entire disk. As a consequence, the direc one that allows us to select a particular sec tory and allocation table look rather cryptic, tor, side, and track. We'll start by looking but once explained they are easily understood. at the 'Boot Record', which is on the first sector of the disk. Nov 84 * CRYPTOLOG * Page 12 FQR QFFHJIAh SSE S!IJ:iY OCID: 4009933 P9R 9PPl91Afl esf 6Nt:l Side O, Track O, Sector 1 lat aector of Boot record EB279003 01140000 00000000 00000000 00000000 00000000 ~•'••••••••••••••••••••••• 00000000 00000000 00000000 OOOOOOCD 19FA8CC8 8ED833D2 •••••••••••••••••••••••3 •• 8ED2BCOO 7CF88860 008ED88E C033D28B C2CD1372 69E8a500 ••••• 1•• • ••••• 3 ••••• ri •••• 72002E83 3E037C08 74062EC6 06647002 8B00002E 8BOE037C .r ••• >.I .t •.••• dl. ••••••• 1. 51B0092A C1B4008B F05633D2 33C08ACS 2EF63664 708AE88A .a •• • •••.. V3.3 ••••• 6dl •••• F48BC6B4 02CD1372 2D5E592E 2936057C 741F8BC6 2EF72665 •••••••• r-~Y.>6.lt ••••• &e. 7D0308FE C5810151 BE08002E 3B36057C 7C052E8B 36057CEB .l •••••• 0 •••• :6.11 •••6.1 .• COEAOOOO 6000BE67 7DE80200 EBFE32FF 2EAC247F 74085684 ••••• • •• 91 ••••• 2 ••• Slt.V •• OE880700 C0105EEB EFC3E933 FFBBOOOO 89040088 0102CD13 ••••••• ~ •••• 3 ••••••••••••• 1E72338C C88ED8BF 00008908 00268000 20268040 202047E2 •• r3 •••••••••• &., &.n G•• F4BFOOOO BE887DB9 OBOOFCF3 A6750FBF 2000BE97 70890800 ••••••• l •••••• u ••••• 1 •••• F3A67502 1FC3BE1B 7DE8A2FF B400CD16 1FF9C30D 0A4E6F6E ••• u ••••• J •••••••••••• Non. 20537973 74656020 64697368 206F7220 64697368 20657272 .-Syate• disk or disk err. 6F720DOA 5265706C 61636520 616E6420 73747269 68652061 .or •• Replace and strike e. 6E79206B 65792077 68656E20 72656164 790DOAOO 01000200 .ny key.when ready •••••••• OA446973 6820426F 6F742066 61696C75 72650DOA 00406963 •• Disk Boot failure ••• Kic. 726F736F 66742C49 6£632069 62606269 6F202063 6F6D3069 .roso£t,Inc ibabio coaOi. 6260646F 73202063 6F6D3005 C606772F FF837EFC 00750880 .b•dos coaO ••• w1 •• ~ •• u ••• 7EF73B75 05C60676 2FFF89EC SOCA0400 00000000 00000000 .·.:u •• ,vt ••• J •••••••••••• 00000000 00000000 00000000 00000000 00000000 00000000 •••••••••••••••••••••••••• 00000000 00000000 00000000 00000000 00000000 00000000 •••••••••••••••••••••••••• 00000000 00000000 . • ...... ~ ...... Figure 1 - The Boot .Record Th is record serves one purpose. It in many ASCII .characters and, in fact, we don't. structs the operating system in read only Look down, now, at the 13th row and below. memory (RCM, as it is known to its friends) to There we do see a translation and we probably go to the location on the diskette containing recognize it. We are, of course, looking at the rest of the operating system and read it the error messages that we get when we have into memory. If the system is there, it is put a non-system diskette in drive A and at read in; if not, control returns to the boot tempted to boot up. To keep the boot record record and an error message is printed out. as small as possible, Microsoft wrote the pro gram in machine language but the messages to the user had to be in ASCII characters. So as the prompt comes up, we type in 0 for the side, 0 for the track, and 1 for the sec tpr. Zero for the side? Real people start The Directory counting at 1, computer people start at zero. OK, why didn't we start at track zero? There is no track zero! Tracks on the PC were num The next two sectors contain what is known bered by a computer person who skipped class as the File Allocation Table (FAT). We will the day they learned how to count. Tracks skip the FAT for a moment and proceed to sec start at 1, everything else at 0. tor 4, still on side O. As soon as this information is entered, the Sectors 4 through 11 have the directory.