DataMuseum.dk

Presents historical artifacts from the history of:

CR80 Wang WCS documentation floppies

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about CR80 Wang WCS documentation floppies

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - download
Index: ┃ 3 4 8 S W ~

⟦2c1d27607⟧ Bits:30006216 8" Wang WCS floppy, CR 0284A, 8" Floppy Disk

    Length: 315392 (0x4d000)
    Description: Bits:30006216 8" Wang WCS floppy, CR 0284A
    Types: 8" Floppy Disk

Namespace

name artifact - - - - - - - - - - - - - - - - - - - - - - -
3489A SFS/TN/004 pan/mp PEH/KFL Security Filter Stud 06-04-83 09:40 12 37 44554 07-06-83 12:36 00 2 01-06-83 13:37 17-10-83 11:09 0284A 58 22 25 1216 62442 3489A ⟦39ee19ece⟧ Wang Wps File, SFS/TN/004
3668A SFS/FS/001 pan KFL FILTER SPECIFICATION 04-05-83 09:40 9 33 36546 07-06-83 12:35 00 37 03-05-83 08:35 17-10-83 11:09 0284A 75 20 12 1712 67584 3668A ⟦eb21a0f2e⟧ Wang Wps File, SFS/FS/001
3783A SFS/TN/005ilter Study pan PEH Interf. Flexibility 01-06-83 09:44 1 34 4089 01-06-83 13:13 02 86 01-06-83 13:31 07-06-83 14:04 0284A 5 2 08 72 4216 3783A ⟦115303bad⟧ Wang Wps File, SFS/TN/005ilter Study
3792A SFS/TN/007 vhn KFL 06-06-83 10:06 2 35 18467 07-06-83 10:03 01 8 07-06-83 10:04 07-06-83 14:25 0284A 16 2 47 404 18637 3792A ⟦02438cd82⟧ Wang Wps File, SFS/TN/007
4130A SECURITY FILTER STUDY am] PEH/RH EXECUTIVE SUMMARY 10-10-83 14:17 1 39 7588 26-10-83 10:57 11 46 19-10-83 13:29 03-11-83 13:05 0284A 20 4 19 332 12929 4130A ⟦3cf340c99⟧ Wang Wps File, SECURITY FILTER STUDY
~ORPHAN22.13 ⟦ab7524fd1⟧ Wang Wps File, Spelunked
~ORPHAN51.01 ⟦60eb74923⟧ Wang Wps File, Spelunked

Disk picture

  Unclaimed
  Document Body
  Document Head
  Marked Free
  Content List

OctetView

0x00000…00100 (0, 0, 0)   Sector 02844130323834 ┆  A0284A                                                                                                                                                                                                                                                        ┆
0x00100…00200 (0, 0, 1)   Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
0x00200…00300 (0, 0, 2)   Sector ff00c0feffffff ┆  @~                                         x                                                                                                                                                                                                                  ┆
0x00300…00306 (0, 0, 3)   WangDocument {d00=0x34, d01=0x89, d02=0x41, ptr=(22,0, 0), d05=0x00}
0x00306…0030c             WangDocument {d00=0x36, d01=0x68, d02=0x41, ptr=(49,0, 8), d05=0x00}
0x0030c…00312             WangDocument {d00=0x37, d01=0x83, d02=0x41, ptr=( 2,0, 8), d05=0x00}
0x00312…00318             WangDocument {d00=0x37, d01=0x92, d02=0x41, ptr=(57,0, 0), d05=0x00}
0x00318…0031e             WangDocument {d00=0x41, d01=0x30, d02=0x41, ptr=(62,0, 8), d05=0x00}
0x0031e…00320             00 00   ┆  ┆
0x00320…00340             00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ┆                                ┆
         […0x5…]
0x003e0…00400             00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e   ┆                                ┆
0x00400…00500 (0, 0, 4)   Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
0x00500…00600 (0, 0, 5)   Sector 86312020202020 ┆ 1                                                                                                                                                            8  8   7  Q? > 7                                                | W d N ~< v   <)&4'>( 1c5 & &    ┆
0x00600…00700 (0, 0, 6)   Sector 421c402600415b ┆B @& A['          X%   %  PO P    ;    A0A ?   C g x g V WD  O 8 :W   W   ) 4130A  g     r         < {C < { ; 0  X  w!           p   pv   *      9 8 :     t   xZy#                                   ^0  ^4                                                    ┆
0x00700…00800 (0, 0, 7)   Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
         […0x8…]
0x01000…01100 (1, 0, 0)   WangDocumentBody
         […0x1…]
0x01200…01300 (1, 0, 2)   Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
         […0x5…]
0x01800…01900 (1, 0, 8)   WangDocumentBody
         […0x6…]
0x01f00…02000 (1, 0, 15)  Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
0x02000…02100 (2, 0, 0)   WangDocumentBody
         […0x7…]
0x02800…02900 (2, 0, 8)   WangDocumentHead {hdr=WangSectHead {next=( 2,0, 9), len=0xff, h3=41378341}, f00=»3783A «, f01=»SFS/TN/005ilter Study     «, f02=»pan                  «, f03=»PEH                  «, f04=»Interf. Flexibility  «, f05=01-06-83 09:44, f06=»   1 «, f07=»34 «, f08=»  4089 «, f09=01-06-83 13:13, f10=»     «, f11=»02 «, f12=»    86 «, f13=01-06-83 13:31, f14=07-06-83 14:04, f15=»0284A «, f16=»  5 «, f17=»   2 «, f18=»08 «, f19=»   72 «, f20=»  4216 «, f21=»  «, f22=»   «, f99=020010000120056610110180aaca15050000000000000137031700df}
0x02900…02a00 (2, 0, 9)   WangDocumentBody
         […0x136…]
0x16000…16100 (22, 0, 0)  WangDocumentHead {hdr=WangSectHead {next=(22,0, 1), len=0xff, h3=41348941}, f00=»3489A «, f01=»SFS/TN/004                «, f02=»pan/mp               «, f03=»PEH/KFL              «, f04=»Security Filter Stud «, f05=06-04-83 09:40, f06=»  12 «, f07=»37 «, f08=» 44554 «, f09=07-06-83 12:36, f10=»     «, f11=»00 «, f12=»     2 «, f13=01-06-83 13:37, f14=17-10-83 11:09, f15=»0284A «, f16=» 58 «, f17=»  22 «, f18=»25 «, f19=» 1216 «, f20=» 62442 «, f21=»  «, f22=»   «, f99=200010000110362710110250aaca15050000000000000142033a01df}
0x16100…16200 (22, 0, 1)  WangDocumentBody
         […0xb…]
0x16d00…16e00 (22, 0, 13) Sector 160eff00348941 ┆    4 A......   52   7.4 SELECTED SWITCH TYPES ......................   53    7.4.1 Reed Relay .............................   53    7.4.2 Semiconductor Logic Switch .............   54    7.4.3 Electro-optical Switch .................   55    7.5 DESIGN EX┆
0x16e00…16f00 (22, 0, 14) Sector 160fd400348941 ┆  T 4 AAMPLES  ...........................   55    7.5.1 Reed Relay .............................   55    7.5.2 Semiconductor Logic Switch .............   56    7.5.3 Electro-optical Switch  ................   56    2.1.1 The need .........................┆
0x16f00…17000 (22, 0, 15) Sector 1600ff00348941 ┆    4 A 1                                                                   1  GENERAL    1.1 INTRODUCTION   This technical note represents the output of work package no. 320, Configuration Study, within the framework of the Security Filter Study, performe┆
0x17000…17100 (23, 0, 0)  WangDocumentBody
         […0x1a7…]
0x31800…31900 (49, 0, 8)  WangDocumentHead {hdr=WangSectHead {next=(49,0, 9), len=0xff, h3=41366841}, f00=»3668A «, f01=»SFS/FS/001                «, f02=»pan                  «, f03=»KFL                  «, f04=»FILTER SPECIFICATION «, f05=04-05-83 09:40, f06=»   9 «, f07=»33 «, f08=» 36546 «, f09=07-06-83 12:35, f10=»     «, f11=»00 «, f12=»    37 «, f13=03-05-83 08:35, f14=17-10-83 11:09, f15=»0284A «, f16=» 75 «, f17=»  20 «, f18=»12 «, f19=» 1712 «, f20=» 67584 «, f21=»  «, f22=»   «, f99=200010000110362710110250aaca1505000000000000013703b501df}
0x31900…31a00 (49, 0, 9)  WangDocumentBody
         […0x6…]
0x32000…32100 (50, 0, 0)  Sector 3201ff00366841 ┆2   6hAstics are implemented by means of a definition of all legal messages and their contents. The security filter software (computer programs) shall be so constructed that any foreseeable change in message structure and contents can be handled without mo┆
0x32100…32200 (50, 0, 1)  Sector 3202ff00366841 ┆2   6hAdification of the software.   As a consequence of the definition of all legal traffic, any message traffic deviating from the definition shall be considered illegal and handled in accordance with that condition.   Illegal messages shall be logged by┆
0x32200…32300 (50, 0, 2)  Sector 3203ff00366841 ┆2   6hA the security filter and may not be transmitted from the filter. In case of frequent traffic of illegal messages (frequency exceeding a prespecified maximum) an audible alert shall be sounded in order to inform the security officer of this fact.    ┆
0x32300…32400 (50, 0, 3)  Sector 3204ff00366841 ┆2   6hA 1                                                                   To expand the useful scope of the security filter to encompass lines where the traffic will contain messages too complex for automatic validation operator communication facilities ┆
0x32400…32500 (50, 0, 4)  Sector 3205ff00366841 ┆2   6hAcan be added. This will allow for human validation of for instance free text messages. However, message types or message contents demanding human validation shall be defined to the filter. The display of a message for an operator must never be trigg┆
0x32500…32600 (50, 0, 5)  Sector 3206ff00366841 ┆2   6hAered by the fact that the message is considered illegal by the automatic validation.    2.2.2 Auxiliary Functions   The security filter shall be operative without any human intervention, and it shall be possible to modify neither software nor messag┆
0x32600…32700 (50, 0, 6)  Sector 3207ff00366841 ┆2   6hAes on site while the filter operates.   Hence, any authorized modification must be performed off-line and installed afterwards on the filter site following a prespecified procedure.   The following auxiliary functions to be performed off-line have b┆
0x32700…32800 (50, 0, 7)  Sector 3108ff00366841 ┆1   6hAeen identified:    2.2.2.1 Software Production and Maintenance   The computer programs necessary to perform the security filter functions must be analyzed, planned, documented, coded, compiled, tested and verified.   Since the security filter by its┆
0x32800…32900 (50, 0, 8)  Sector 3209ff00366841 ┆2   6hAays but with different filter characteristics.   The messages which shall be withheld are not only those which are classified higher than the receiving ADP-  system but also messages containing information outside the receiving system's scope of "ne┆
0x32900…32a00 (50, 0, 9)  Sector 320aff00366841 ┆2   6hAed to know".   To achieve this goal it is necessary to provide full and positive description of this "need to know", so that the security filter will only allow messages to pass if they are positively identified as containing only such information. ┆
0x32a00…32b00 (50, 0, 10) Sector 320b0800366841 ┆2   6hA                                                                    1.3 TERMS AND ABBREVIATIONS  1                                                                     Firmware Software stored in a type of memory which is readable but not alterable b┆
0x32b00…32c00 (50, 0, 11) Sector 320cea00366841 ┆2 j 6hA 1                                                                              Alert       ADP         Security         ADP   System      Filter           System                                                       Log        clear distinction is ┆
0x32c00…32d00 (50, 0, 12) Sector 320dff00366841 ┆2   6hA 1                                                                   Fundamentally, the security filter is aimed at automated operation without any human intervention. This requires, however, that the traffic consists solely of well structured messa┆
0x32d00…32e00 (50, 0, 13) Sector 320eff00366841 ┆2   6hAges with a predictable set of contents. If the traffic on a line is expected to also contain unstructured messages or free text, which cannot be automatically analyzed, human support may be introduced as an option.   Even though the concept of a sec┆
0x32e00…32f00 (50, 0, 14) Sector 320fff00366841 ┆2   6hAurity filter originally is aiming at a separate filter for each point-to-point line it may be considered to develop a multiline security filter, or to share hardware, software, or peripherals among a number of security filters, to achieve cost effec┆
0x32f00…33000 (50, 0, 15) Sector 3200ff00366841 ┆2   6hAtive operation. The design of such a multiline system would need to provide for the additional security required to keep messages separate and to ensure their proper delivery.    2.2 SYSTEM FUNCTIONS    2.2.1 Filter Functions   The filter characteri┆
0x33000…33100 (51, 0, 0)  WangDocumentBody
0x33100…33200 (51, 0, 1)  Sector 33024600366841 ┆3 F 6hAte than normal transmission speed.   TDG   Test Data Generator  .....   19    4.2.2 Analysis of an MSGID ...................   28    4.2.3 Main Text Analysis .....................   29    4.3 PRINCIPLES OF MESSAGE SPECIFICATION ........   40    4.3.┆
0x33200…33300 (51, 0, 2)  Sector 3303ff00366841 ┆3   6hA 1                                                                   Validation  The act of checking a message for validity.   Message, Legal A message which is allowed to pass the security filter.   Message, Illegal A message which is not allowed t┆
0x33300…33400 (51, 0, 3)  Sector 3304ff00366841 ┆3   6hAo pass the security filter.   Message, Validated A message which has been subject to      validation.   Message, Accepted A message which by the validation has been found to be legal.   Message, Rejected A message which by the validation has been fo┆
0x33400…33500 (51, 0, 4)  Sector 3305ff00366841 ┆3   6hAund to be illegal.   Message, Logged A rejected message which has been written onto the logging medium.   Message, Suspended A message which by its type or contents      or otherwise demands operator assisted validation and hence has been stored for┆
0x33500…33600 (51, 0, 5)  Sector 33065a00366841 ┆3 Z 6hA this purpose.   1                                                                  DWARE     AND SOFTWARE ...............................   72   5.5 MEASURES TO PREVENT INTENTIONAL     DISRUPTION .................................   73    5.5.1 Temp┆
0x33600…33700 (51, 0, 6)  Sector 3307ff00366841 ┆3   6hA 1                                                                   2  SUMMARY OF REQUIREMENTS    2.1 SYSTEM DESCRIPTION   The Security Filter is an electronic device (computer) placed on a point-to-point communication line connecting  two ADP-syst┆
0x33700…33800 (51, 0, 7)  Sector 3208ff00366841 ┆2   6hAems of unequal security classification, with  the purpose of filtering the message traffic, i.e. to withhold messages which for security reasons are not allowed to pass the subject communication line.   The security filter operates on traffic both w┆
0x33800…33900 (51, 0, 8)  WangDocumentBody
         […0x57…]
0x39000…39100 (57, 0, 0)  WangDocumentHead {hdr=WangSectHead {next=(57,0, 1), len=0xff, h3=41379241}, f00=»3792A «, f01=»SFS/TN/007                «, f02=»vhn                  «, f03=»KFL                  «, f04=»                     «, f05=06-06-83 10:06, f06=»   2 «, f07=»35 «, f08=» 18467 «, f09=07-06-83 10:03, f10=»     «, f11=»01 «, f12=»     8 «, f13=07-06-83 10:04, f14=07-06-83 14:25, f15=»0284A «, f16=» 16 «, f17=»   2 «, f18=»47 «, f19=»  404 «, f20=» 18637 «, f21=»  «, f22=»   «, f99=020010000110462710110260aaca15050000000000000137036000df}
0x39100…39200 (57, 0, 1)  WangDocumentBody
         […0x56…]
0x3e800…3e900 (62, 0, 8)  WangDocumentHead {hdr=WangSectHead {next=(62,0, 9), len=0xff, h3=41413041}, f00=»4130A «, f01=»SECURITY FILTER STUDY     «, f02=»am]                  «, f03=»PEH/RH               «, f04=»EXECUTIVE SUMMARY    «, f05=10-10-83 14:17, f06=»   1 «, f07=»39 «, f08=»  7588 «, f09=26-10-83 10:57, f10=»     «, f11=»11 «, f12=»    46 «, f13=19-10-83 13:29, f14=03-11-83 13:05, f15=»0284A «, f16=» 20 «, f17=»   4 «, f18=»19 «, f19=»  332 «, f20=» 12929 «, f21=»  «, f22=»   «, f99=020020000210462710110060aaca15050000000000000138035900df}
0x3e900…3ea00 (62, 0, 9)  WangDocumentBody
         […0x6…]
0x3f000…3f100 (63, 0, 0)  Sector 00000000000000 ┆                                                                                                                                                                                                                                                                ┆
         […0xdf…]

Less…

Reduced view