Peter's site blog

Please read ! 
If NO IMAGES will be shown, use instead of


I have prepared a new blog with wordpress at !!!

Thank you.
*VERY* old skool char only game - ZZT from Epic Megagames 
Friday, February 27, 2015, 11:00 PM
Posted by Administrator
For those IT oldtimers, "Nethack" is well known for several platforms, even for CP/M-80 Nethacks predecessor "Rogue" is available.
"Nethack" has still its own living community, especially for LINUX.

But there was also a more colorful variant available, "ZZT" from Epic Megagames.
It uses the special characters from IBM PCs screen font of the text mode, which is still present even today in modern 8-core i7 Personal Computers.

But take a look for yourself (Startscreen Ezanya World):

After a few steps in front of a pub (Hic!):

Talking with the barkeeper:

Using a torch (in a dungeon, only for 20 seconds!):

You can be dead very fast, so you will have hours to practice (to survive longer) ...

I tried it also on my old PC with monochrome screen, it has a mode for it:

There is also another blog entry about it:

And there is also a modern version named "DreamZZT" available (Mac OS X, Windows ....).

See related link for a download possibility.
add comment ( 369 views )   |  permalink   |  related link   |   ( 3 / 1796 )
Fun with Hercules Graphics Adapter - my Amstrad PC1640 still make it... 
Saturday, February 14, 2015, 12:00 AM
Posted by Administrator
Resurrecting a defunct Kalok hard disk drive in my Amstrad (Schneider) PC1640HD30, I was a bit unhappy about the fact I own for this computer only a monochrome monitor (PC-MD).
So I was looking for games which could be run with a hercules graphics adapter.
There are some (even Prince of Persia), but most of the game copies I found were configured only for VGA (or EGA). And so also the beautiful CHESSMASTER 3000 ...
But thanks to Ebay, you will be still able to find an original game box with the disks:

These disks were not in a suitable floppy disk format, but the game itself is not copy protected, so I was able to install it on an other computer with a 3.5" floppy disk drive.
Then I packed all files with ARJ and -v360 option and copied it on several 5.25" disks.
Finally I unpacked it on my Amstrad and yeaaahhh it immediately runs:

The picture isn't sharp enough to show that it is similar to an Atari ST screen with a SM124 monitor, it's really crisp sharp and makes lot of fun - even if the computer plays against itself ;-)
add comment ( 255 views )   |  permalink   |  related link   |   ( 3 / 3554 )
8086tiny - a very small CPU and PC emulator... but difficult to use 
Wednesday, January 28, 2015, 01:00 PM
Posted by Administrator
When I saw the first time "8086tiny" at , I was really surprised about the extremly small size of the source and executable.
I tried it on my Windows 7 x64 PC, and I was able to start it with the floppy disk image (don't forget to have sdl.dll also in your 8086tiny directory).
Later, I found also a hard disk image (about 38MB size, downloaded from dropbox), which is very useful too.
The fun stops after I recognized all text console/screen output was translated into ESC sequences. This is very annoying if you don't have a "terminal" which interprets these ESC sequences. I thought I found a solution at , which let you use ESC sequences even in a Windows 7 console prompt (just load ansicon as a command, no need for ANSI.SYS or similar things).
ANSICON worked with console output using Windows 7 (text output) programs, but not with 8086tiny. Still a lot of ESC sequences will fill your console window.

Ok, I tried Alleycat, which is also included in the floppy disk image.

It showed up the Alleycat start screen, but then screen remains black, nothing happened further.
If you are using Ctrl-C, even a Windows App Crash message appears.

It seems to be totally unusable with Windows 7 x64, I didn't tested it with Windows 7 32bit version. You can download the >SDL compatible binaries from my site<.

NO RECOMMENDATION for the original version, compiled with SDL support.

There is another version named "8086 Tiny Plus" which works well, MUCH BETTER than the original one. Take a look at
It uses NO ANSI sequences, instead, it includes a BIOS with CGA support.
But this version is bigger than the original one. Still small compared to DOSBOX or whatever else can be compared.

The modified version "8086 Tiny Plus" IS RECOMMENDED. Because it works.
add comment ( 302 views )   |  permalink   |  related link   |   ( 3 / 4750 )
Some tests with PGP 6.5.8 from NAI and ckt builds of PGP and Windows 7 [offtopic] 
Saturday, January 24, 2015, 05:00 PM
Posted by Administrator
While looking for Symantec PGP 10.x alternatives, I started to think about using old versions of PGP, too. At least the ADK problem should be fixed (see ... ments.html ), so I had to start with 6.5.8ckt or newer.
Unfortunately PGP 7, PGP 8 (which I think personally was the best of all) are not really working in Windows 7, and PGP 9 and newer can be used, but should not be used due to considerations about trusting Symantec (they will cooperate with the NSA for sure and they offered the source only 'til version 10.0.1 from 2011, but they offer and deliver newer versions meanwhile only without source code review possibility).

Also, I read some dumb comments additional keys in the NAI versions.
So I started with the original 6.5.8 PGP version from NAI.

The PGP Memory Page Locking Driver does NOT work with Windows 7, but the programs are still running, if you're giving them administrative rights (that problem is unfortunately not solved yes, but it depends from the installation directory and because this version wants to write his keyring by default into the program directory).

You can fix this by setting a registry value to 1 (the name of it: ClearPageFileAtShutdown), so you can be sure after shutting down the PC, the pagefile is at least cleared.

I created a PGP keypair and encrypted a file (with "PGP tools").
After that, I uninstalled the original PGP 6.5.8 and installed Imad R. Faiad's "ckt build" version 8 (and later 9b3, which shows 9b2, a bit weird), using the already created key. It gaves exactly the same result.

Then, I created a new key (with similar parameters) and encrypted again the above used file. Again the resulting file had at least exactly the same size.
Just for testing purposes, I added an additional key - again with the same file.
I got a different file size for the encrypted file - as expected.
So I can't see any difference between using the NAI version and the "ckt builds".
But you have to use the "ckt builds" for two reasons at least:
There is no ADK weakness in the "ckt builds" (see above) and you can use much longer keys, although most of the cryptographers say, more than 3072 bit key length is wasted effort.

Meanwhile it's a bit difficult to get these ckt builds as a binary.
Try it with the "related link" below, at least you can search the web for "" and/or "", and for the source try to search for "".
add comment ( 304 views )   |  permalink   |  related link   |   ( 3 / 1811 )
The perfect virus ? NSA's "barnfire" program and implications [offtopic] 
Monday, January 19, 2015, 08:00 PM
Posted by Administrator
The german magazine Spiegel published new infos about some (meanwhile old but still valid) NSA programs in their latest >article<. They also mentioned "barnfire", which is a codename for a BIOS modification to bypass all virus scanners and other (local) detection mechanisms.
Bruce Schneider offers also infos about at, although it does not contain much more infos, see >here<.
His blog points to , inside the 7z archive is also a file named media-35661.pdf which mentions "BARNFIRE"
A year ago news were published about a >BadBIOS super trojaner<, but not found yet in a real example.
Also, in January 2014, infos were published about >a similar NSA project named DEITYBOUNCE<, which describes that DELL server were hacked and manipulated by NSA also.

A modified BIOS (it must be a modified one, not a new one, because otherwise it can be easily discovered) does not help if hard disks are encrypted. May be you can "chain/hook" into Windows API after Windows is already booted (and encryption is active), but this seems to be a much more sophisticated approach. It has to be possible to extend functions while they are loaded in memory, because even Windows API will use in its driver BIOS calls (at least in drivers, but may be in some basic parts of the OS too).
You can't modify directly files on disk unless you "know" the encryption keys/encryption algorithm, but you don't need to have the knowledge about it, if your "base" is the BIOS itself.
It's like placing a virus on your harddisk, but the virus is located in the BIOS itself and can't be detected by scanning files or even memory.
But your PC's BIOS flash memory does not have to be write protected. Fortunately new computers only protects the firmware flashing "entry" of the BIOS, but this is SOFTWARE, so unless your PC is not protected by "jumper", it can be bypassed. The function "Flash BIOS" is also just a piece of software.

So the possible attack sequence might be:
1 - try to use a zero day exploit
2 - if successful, identify the used firmware
3 - load the appropriate but modified BIOS
4 - flash the BIOS
5 - delete all traces
6 - reboot (or just wait)

Remember, you will be still protected by external IT security components like http-Proxy servers, unless you analyze also the network traffic with your backdoor code. But this will make the BIOS modifications almost impossible, because you need much more code.

I guess the simpler variation of the BIOS mod is already existing, made by smart programmers @NSA ...
add comment ( 258 views )   |  permalink   |  related link   |   ( 3 / 1751 )

<<First <Back | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | Next> Last>>