T.R | Title | User | Personal Name | Date | Lines |
---|
245.1 | | ULTRA::PRIBORSKY | Tony Priborsky | Tue May 20 1986 16:45 | 9 |
| First, make sure that you search all .COM files that they use
(including the ones in their own directories.) Search for "@"
to make sure you get them all. Even that may not do it. With
clever DCL, I can hide almost any DCL command from obvious searches...
If a user with CMKRNL is hacking them, turn on image accounting,
and then search for suspicious image activations around the time
they are hacked. For example, a [USER]DUNGEON.EXE might be the
image that is doing it. [USER]HACKPROCESSNAME.EXE is a dead giveaway.
|
245.2 | The heat is on ... | GAOV08::MAGIC | Conor Moran | Wed May 21 1986 05:17 | 17 |
|
Find out if the two process names are changed simultaneously (or
nearly) or if there is a significant gap between the changes.
If they are changed at different times, then the hack could be
in something they are running themselves. If at the same time,
then chances are that the hacker is probably somebody with privs,
and checking a list of image activations as suggested in [-1] should
catch them. What about creating a process which checks for "Batman"
or "Robin" as processnames, and broadcasts you with the time when one
is found ? This would cut down on the amount of searching to be done.
A third possibility, albeit a less likely one, is that the hack
might be a patch to an image in sys$system which is used moderately
often. Mind you, I don't think anyone would go that far, but you
never know. Keep us posted.
<CFM>
|
245.3 | Search The Binaries! | VAXUUM::DYER | Iceberg or volcano? | Wed May 21 1986 06:33 | 11 |
| The "C3" program (written by Peter Gilbert) searches binary
files for ASCII strings. You might want to look through user
.EXE files for "Batman" and "Robin" with it. If so, you can
get a copy from my system:
{CLOSET|VAXUUM}::TOOLS$LIBRARY:C3.EXE
Then again, maybe you could just use SEARCH?
<_Jym_>
Of course, this won't work if "Batman" and "Robin" are in an
encrypted format within the .EXE file.
|
245.4 | Watchpoint driver? | SWIFT::PITT | Tony Pitt, UK CS, Basingstoke, England | Wed May 21 1986 07:48 | 7 |
| I believe there is a watchpoint driver on some future version of
VMS (v4.4?). If you'd got it, you could use it to find out who
changes the relevant fields and from where and when. I know this
goes against the whole spirit of hacking, but it seems this is a
fairly serious request for assistance in nailing a hacker ...
T
|
245.5 | tool to see who's running what | ROXIE::OSMAN | and silos to fill before I feep, and silos to fill before I feep | Wed May 21 1986 11:35 | 23 |
| First of all, I'd assume the current culprits have just deleted the
evidence, since they probably are following this discussion !
However, for future policing, I've got a program that may help.
The program spits out a line announcing timestamp, username, process
name, terminal, image name, every time someone goes in or out of
anything.
So, for instance, every time someone EXITS the editor, or starts
a command that runs an image, my program spits out a line.
The program does not drain the system much, as it mostly sleeps
and just snapshots the system once every two seconds.
So, one thing you could do is run the program in batch, which will
cause its saliva to accumulate in the log file. Then, after the
crime has been committed, see who entered or exited what image
in the vicinity of the time the funny process name appeared in the log.
If anyone wants this tool, please send me mail.
/Eric
|
245.6 | | IOSG::WARWICK | Trevor Warwick | Wed May 21 1986 13:07 | 7 |
|
If the culprit is reading this (unlikely - my group isn't very
notes oriented) then perhaps they would like to come and tell me
how they're doing it. I promise I won't be annoyed !
Trev
|
245.7 | SMOP | CLT::COWAN | Ken Cowan, 381-2198 | Thu May 22 1986 13:26 | 24 |
| If you really want to catch the culprit, do some hacking of your
own.
1. change the page protection on the page containing the PCB
for the process in question to disallow kernel write access. You
might want to make the PCB be on its own page to cut down on hassles.
2. Change the accvio handler to special case access violations
for the page who protection you changed. When you get an accvio,
change the page protection, simulate the instruction, and change
it back again. Since you know which virtual address is being written,
you can watchpoint the process name.
One of the gotchas is to watch out for PROBEs. I'd doubt
VMS is probeing to make sure the PCB is writable from kernel mode,
but you never know. Of course, you have to do all this at the
correct (elevated) IPL.
SMOP, right?
Another solution might be to cry 'uncle' and hope the hacker
will tell you what is going on.
KC
|
245.8 | Programming with cmkrnl | EXODUS::MARK | | Sat May 24 1986 16:50 | 7 |
| Hi. I have always wondered how to use cmkrnl to fiddle with process
headers etc. Just to satisfy my OWN CURIOSITY, could somebody kindly
send some progs they might have around to me?
Thanks!
.m.
|
245.9 | en example for .8 | PASTIS::MONAHAN | | Mon May 26 1986 04:26 | 84 |
| The following programme could provide an example for .8. It
was intended to be run from a login command procedure, and changes
the account name to what is provided as an argument in the DCL foreign
command that runs it. It also changes the default directory to
[username.accountname]. The programme must be installed with CMKRNL
privilege if not run from a privileged account.
(I think the above is correct. I wrote the programme about 6
years ago as a sort of exercise. As you can see it was before I
learned how to use comments. But then real programmers never need
comments, right? :-) )
.TITLE SETACNT
.IDENT /X01/
;
;SET ACCOUNT NAME AND SUBDIRECTORY
;FROM COMMAND LINE
;
.LIBRARY \SYS$LIBRARY:LIB\
$JPIDEF
$SSDEF
;
;START OF DATA AREA
;
.PSECT DATA,RD,WRT,LONG,NOEXE,NOSHR
DATBAS: ;BASE ADDRESS FOR OUR DATA
GETCMD=.-DATBAS
$CLIREQDESC-
RQTYPE=CLI$K_GETCMD ;TO GET COMMAND LINE
;
DIRARG=.-DATBAS
.LONG 3
.ADDRESS DIRDSC
.LONG 0,0 ;ARGUMENT LIST FOR DIRECTORY SET
DIRL=.-DATBAS
DIRDSC: .LONG 0,DIRN ;DIRECTORY NAME DESCRIPTOR
;
GETUSR=.-DATBAS
.LONG 7,0,0,0
.ADDRESS ITMLST
.LONG 0,0,0 ;ARGUMENT LIST FOR USERNAME
ITMLST: .WORD 12
.WORD JPI$_USERNAME
.ADDRESS USERN
.LONG 0,0 ;NO LENGTH NEEDED,END OF LIST
;
DIRNAM=.-DATBAS
DIRN: .ASCII /[/ ;START OF DIRECTORY SPEC
USERN: .BLKB 20 ;REST OF SPEC STARTS WITH USERNAME
;
;START OF CODE
;
.PSECT CODE,RD,NOWRT,EXE,SHR,LONG
;
.ENTRY SETACC,^M<R2,R3,R4,R5,R9,R10,R11>
MOVAL DATBAS,R11 ;SET ADDRESS BASE FOR DATA
PUSHAB GETCMD(R11) ;GET COMMAND LINE ARGUMENT
CALLS #1,@CLI$A_UTILSERV(AP) ;CALL BACK THE CLI
MOVQ GETCMD+CLI$Q_RQDESC(R11),R9 ;GET THE RETURN DESCRIPTOR
PUSHL #0 ;ARGS IN R9,R10 FOR OUR ROUTINE
PUSHAB B^KERMOV ;OUR KERNEL MODE ROUTINE
CALLS #2,@#SYS$CMKRNL ;CALL OUR ROUTINE IN KERNEL MODE
BLBC R0,ERROR ;RETURN STATUS
CALLG GETUSR(R11),@#SYS$GETJPI ;GET USER NAME
BLBC R0,ERROR ;RETURN STATUS ON ERROR
LOCC #^A/ /,#9,DIRNAM(R11) ;FIND END OF NAME
MOVB #^A/./,(R1)+ ;MOVE IN SUBDIRECTORY SEPARATOR
MOVC3 R9,(R10),(R1) ;MOVE IN ACCOUNT NAME
MOVB #^A/]/,(R3)+ ;MOVE IN TERMINATOR
MOVAB DIRNAM(R11),R0 ;GET START OF NAME
SUBL3 R0,R3,DIRL(R11) ;SUBTRACT TO GET LENGTH
CALLG DIRARG(R11),SYS$SETDDIR ;SET THE NEW DEFAULT DIRECTORY
ERROR: RET ;RETURN EITHER GOOD OR BAD STATUS
;
KERMOV: .WORD 0 ;KERNEL MODE ROUTINE TO DO SET
MOVZWL #SS$_ACCVIO,R0 ;SET ACCESS VIOLATION IN CASE
PROBER #0,#8,(R10) ;PROTECT OURSELF
BEQL RETRN ;IF BAD ARG
MOVC5 R9,(R10),#^A/ /,#8,@#CTL$T_ACCOUNT
MOVZWL #SS$_NORMAL,R0 ;RETURN SUCCESS
RETRN: RET ;BACK TO SAFETY
;
.END SETACC
|
245.10 | Don't INSTALL it! | SKYLAB::FISHER | Burns Fisher 381-1466, ZKO1-1/D42 | Tue May 27 1986 12:56 | 6 |
| You think process names are being hacked now! For heaven's sake,
don't INSTALL .9 with CMKRNL. Only allow it to be used by people
with CMKRNL already.
Burns
|
245.11 | Hacker discovered | IOSG::WARWICK | Trevor Warwick | Wed May 28 1986 07:13 | 14 |
|
I found out who was doing it. As suggested in a previous reply,
I turned on Image accounting, and waited. This morning, one the
the guys noticed that his name had been changed between 9:30 and
10:30, so I looked through the log, found a suspicious entry, had
a look in that user's account ,and found the program that was doing
it. Thanks for the suggestion...
In retaliation, I've made a new version of the program that
sets *his* process name, and put that back in his directory - that
should confuse him !
Trev
|
245.12 | curious hacker | RANGLY::MACKAY_RANDY | | Wed May 28 1986 07:45 | 6 |
|
How about posting a copy of that program ??
|
245.13 | | CADLAC::WONG | The Mad Chinaman | Wed May 28 1986 09:13 | 3 |
| YEAH!!!!
|
245.14 | Hacker discoverd? Troyan horse? | BISTRO::HEIN | Hein van den Heuvel, Valbonne. | Thu May 29 1986 10:39 | 5 |
| Re .11,
Trevor,
Ofcourse you realize that if there is a real _good_ hacker
involved then the user you indentified is in fact a victim!
Hein.
|
245.15 | Sorry ! | IOSG::WARWICK | Trevor Warwick | Thu May 29 1986 10:55 | 14 |
|
Yes, the thought had crossed my mind, but other completely
unconnected circumstantial evidence also fingers this particular
gentleman.
I'm not going to post the program, because I don't really want
to cause any other system manager grief ! It's trivial really -
anyone who's been on the VMS internals course could write one -
you could find out just by reading the VMS internals book.
Trev
|
245.16 | | GALLO::RASPUZZI | Michael Raspuzzi | Fri May 30 1986 14:42 | 4 |
| But what about those of us who haven't taken VMS internals or don't
have a copy of the book? :-)
Mike
|
245.17 | There's no easy way to learn! | ERIS::CALLAS | Jon Callas | Fri May 30 1986 15:06 | 4 |
| Then you have incentive to take the course and have your cost center
order you the book, the way the rest of us learned...
Jon
|
245.18 | two processes with SAME name! | SIERRA::OSMAN | and silos to fill before I feep, and silos to fill before I feep | Fri May 30 1986 17:12 | 12 |
| Hah! Uh uh. That's not the way the rest of us learned. The
rest of us learned the fun way, type, crash, ask, scratch, drink,
ask, type, crash, . . .
Hacker's riddle, while we're on the subject of
hacking process names on VMS (I have the answer):
Find a way for an unprivileged user to create
two processes having the exact same process
name. Yes, same uic's etc.
/Eric
|
245.19 | This'll do it... | 3784::GRIER | Hacking Central | Sat May 31 1986 08:52 | 18 |
| Well, this isn't easily done by choice, but I know that if you
were to do something like this, you can get a duplicate process
name...
#1: Log into your account on any old terminal, keeping your process
name at its original value.
#2: Log in again at terminal X. Set your process name to _OPA0:.
#3: Log into OPA0. Now, when you log in, the system sees a process
with your username for the process name, so it (without checking,
the last time I looked) just sets it to your terminal device name.
How's that sound? It works, but might be more contrived than
you like.
-mjg
|
245.20 | ...this'll do it too! | VAXUUM::DYER | Iceberg or volcano? | Sat May 31 1986 21:51 | 3 |
| [RE .19]: I believe you can pull a similar trick with
_RTAx: terminals/process names too.
<_Jym_>
|
245.21 | looking for a book | BIGALO::MACKAY_RANDY | | Mon Jun 02 1986 09:48 | 9 |
|
ever tried setting your process name to null or opcom , it
will let you do it .
also anybody got an order number for that internals book that
is referenced in this note ???
randy
|
245.22 | Set it to swapper... | SUBSYS::LAWLER | | Mon Jun 02 1986 12:58 | 4 |
| How about setting it to 'swapper' right before launching
some big cpu killer job.
|
245.23 | No problem! | NOVA::KLEIN | | Mon Jun 02 1986 13:33 | 9 |
| No problem. It turns out that there's a window in the VMS code
that checks for duplicate process names, such that if you $CREPRC
two processes with the same name within some relatively large
time window (fraction of a second), neither of them gets the
duplicate-process-name error. The $CREPRCs must be done from two
different processes in order to get them to overlap sufficiently.
Andy G. has assured me that this is a bug in VMS, but it hasn't
been fixed yet (as of 4.4).
|
245.24 | Can you stop them both? | LATOUR::RASPUZZI | Michael Raspuzzi | Mon Jun 02 1986 15:00 | 8 |
| OK, so now we have 2 processes with the same name. What happens
if one tries a
$ stop proc_nam
???
Mike
|
245.25 | Order Number is EY-00014-DP | THEBAY::WAKEMANLA | Larry "Super SWS" Wakeman | Mon Jun 02 1986 18:23 | 1 |
|
|
245.26 | RTA solution is easiest | ROXIE::OSMAN | and silos to fill before I feep, and silos to fill before I feep | Wed Jun 04 1986 16:20 | 37 |
| The RTA solution is the easiest way I know of generating two processes
with the same name.
The OPA solution is not as good, since not every hacker is allowed
into the machine room !
The $CREPRC solution requires intelligence, so forget it.
Here's detail of how to do the RTA solution. Feel free to try it,
it does no harm (but see end of article).
$! First, make sure your process name is the default, namely
$! your username.
$ set host 0 ! create process RTAx:
$ set host 0 ! create process RTAy:
$ show process ! find out what y is
$ logout ! get back to RTAx:
$ set process/name="RTAy:"
! we are now the FIRST rendition of RTAy:
$ set host 0 ! create SECOND rendition of RTAy:
Let me know if this works for you. Oh, by the way, it might take several
tries, since if someone else sets host in the interim, x and y can
change.
Here's the interesting question, from the hackers point of view:
Given that VMS attempts to prohibit multiple process names,
is VMS only being formal, or is there some security or
integrity hole opened up by the bug ??
/Eric
|
245.28 | Easier | CLOSET::DYER | Iceberg or volcano? | Thu Jun 05 1986 21:06 | 4 |
| $ set process/name=swapper
. . . works fine for me.
<_Jym_>
|
245.29 | | JON::MORONEY | Pravda ne izvestia, Izvestia ne pravda | Fri Jun 06 1986 01:31 | 9 |
| The reason why you can set your process names to NULL or OPCOM is because
process names are group logical names, and few users have accounts in
group [0,*] or [1,*]. You don't need access to _OPA0: to pull this
trick, it will work with any hardwire line. That is, if you know this
terminal is always _TTB1: to VMS, set your process name to _TTB1: before
logging onto the terminal attached to TTB1: (of course you still need the
third process logged in with process name=username.)
-Mike
|
245.30 | | PASTIS::MONAHAN | | Sat Jun 07 1986 05:54 | 12 |
| Process names are not logical names. There is no security problem
associated with any of the ways of duplicating logical names described
here, the only thing you can do is confuse yourself.
There is someone here who in his login command file sets the
name of his first process to a single space, the name of his second
process to two spaces, ...
They all appear the same on a display, and it causes no-one
any problems (except possibly him).
Dave
|
245.31 | I really can happen! | CLT::COWAN | Ken Cowan, 381-2198 | Sun Jun 08 1986 19:12 | 11 |
| One way I accidently got two processes with the same name was to
run a command procedure that changed my UIC to [1,4] and then
changed it back. While this command procedure was running, I happened
to log into another terminal to read my mail. Once I the command
proceure on the first terminal set my UIC back, I had two processes
in the same group with the same name.
STOP gives you real strange behavior.
Cheers
KC
|
245.32 | minor correction | JON::MORONEY | Pravda ne izvestia, Izvestia ne pravda | Sun Jun 08 1986 19:45 | 5 |
| re .30: You are right, process names are not logical names. However, only
processes in your group are checked for duplicates when changing your
process name. This is why you can set your process name to NULL, etc.
-Mike
|
245.33 | | MENTOR::Alien | | Fri Aug 08 1986 16:50 | 9 |
| I couldn't help but laugh when I just read this!
I hadn't been into this notes file lately because nothing
interesting was happening...now I come back and read this!
I'm laughing because I've been changing not just process
names, but also *usernames* (note the user name above. ever
see lower case in a user name?!?)
Now if I could just figure out where the node name was hiding...
|
245.34 | Ho Hum | VAXUUM::Big Deal | Define `Quality' | Mon Aug 11 1986 17:20 | 2 |
| Yes, I've seen them before.
<_Moi_>
|
245.35 | I'm not a hacker!! | ODIXIE::FERNANDEZ | Ray Fernandez | Mon Nov 17 1986 19:39 | 9 |
| Is there a way to disallow users from changing their Process name?
This is in a college environment, so you can imaging what kind
of names the users come up with!! :)
We would like to limited the changing of process name to only a
few users, if not possible, then disable it altogether.
Regards, Ray
|
245.36 | What about a return form the system service? | VINO::RASPUZZI | Michael Raspuzzi | Mon Nov 17 1986 20:05 | 7 |
| Re .35:
Since the process name is changed via a system service call, is
there a way to "patch" the operating system to return from this
call?
Mike
|
245.37 | | ULTRA::CRANE | Olorin I was in the West that is forgotten... | Tue Nov 18 1986 08:46 | 9 |
| > Since the process name is changed via a system service call, is
> there a way to "patch" the operating system to return from this
> call?
Yes, you could patch SYS$SETPRN+2 with a RET instruction...or, you could
patch EXE$SETPRN to check the caller's access-mode, and return if the caller
was in user-mode.
Ron
|
245.38 | Elegant, but... | FROST::HARRIMAN | The *ing *er's *ing *ed. | Tue Nov 18 1986 12:14 | 27 |
| > Yes, you could patch SYS$SETPRN+2 with a RET instruction...or, you could
> patch EXE$SETPRN to check the caller's access-mode, and return if the caller
> was in user-mode.
That's dangerous, since the system really wants to do things like
set the process name for things like JOB_CONTROL, and other detached
processes.
How about removing the syntax of the SET PROCESS command from SET.CLD?
You said you were in a college environment, I don't know if it's
legal for you to get SHOWCOMMA from the toolshed, but we have done
that here for a particular application where the users have access
to DCL, and we have removed the ability to EASILY change process
names... This does not prevent a hacker from writing a program to
use $SETPRN to set a process name, but if you are a college sysmangler
then you can usually find ways to actively discourage those sort
of programs (they did it when I was in college...)
Of course, -1 is an elegant solution, but I think it's a bit dangerous
since you have no guarantee that ALL system software you are running
or will ever run will execute the $SETPRN outside of user-mode.
Also, you need to support your patch forever.
Regards.
/pjh
|
245.39 | A BETTER WAY TO DO IT! | KIM::BARKER | TERMINALS ARE THE WINDOW TO THE WORLD | Tue Nov 18 1986 12:48 | 9 |
| A good hacker would've setup the program to copy itself into a
large buffer attached to a timerqueue entry to go off at a specified
time. It would've NEVER been caught...because the process doesn't
exist!
:-)
John
|
245.40 | | COOKIE::GARDNER | | Tue Nov 18 1986 13:12 | 18 |
| Another approach, particularly suited to problems in schools, is
to not prevent process name changing but to instead frustrate it's
purpose.
For example, let's suppose you have a well-defined notion of the
"proper" process name for each process. Something based on the
username and/or terminal name such as is used by VMS. Create a
detached process (or even a batch job) that periodically scans through
all processes and resets the process name for interactive and batch
processes to the "proper" value. (This has to be somewhat selective,
as there are some processes that require known, fixed process names.
But you can recognize these by doing a SHOW SYS).
Let the students change their process names all they want -- just
change them back. Your background process can even check the current
process name before restoring it, so you can keep track of who the
offender's are. Anyone who can systematically beat a scheme like
this while still getting work done is probably worth hiring.
|
245.41 | | VINO::RASPUZZI | Michael Raspuzzi | Tue Nov 18 1986 23:36 | 10 |
| re .40:
Isn't that a little inefficient? I mean a process that continually
runs and changes process names back to the username seems to me
that it would use system resources unnecessarily.
I guess it is just a suggestion that works so it's not a bad idea.
Depends on what the college really wants.
Mike
|
245.42 | Don't need to code | BARNA::SOLEPONT | Jaume, �Barcelona 1992� more than ever | Wed Nov 19 1986 04:51 | 9 |
| Re: .35
1) Just teach the operators to kill processes with offending
processnames (they *love* this kind of dirty job). 8^)
2) If the users ask tell them that a detached process kills
everything with non-standard processname.
Users, suddenly, will discover is not so funny play with processnames.
|
245.43 | More "hackery" | ULTRA::CRANE | Olorin I was in the West that is forgotten... | Wed Nov 19 1986 09:30 | 16 |
| BTW, it's rather difficult for a process to change the name of processes
other than itself...SYS$SETPRN does not provide this service. For the purpose
of enriching the redoubtable occupation of hackery, I will suggest this:
To change the process-name of another process, go into
kernel mode. Then acquire the scheduler-database interlock
(however this is done...raising IPL to SYNCH works on
uniprocessors only). Then locate the software PCB for the
target process. Change the field PCB$T_LNAME to whatever
is appropriate. Unlock the scheduler database and exit.
Of course, you could queue an AST to the target process, and make the AST
service routine be SYS$SETPRN, and the AST parameter be a pointer to the
new process-name, which you've put into a block of nonpaged pool.
Ron
|
245.44 | why not automate it | KIM::BARKER | TERMINALS ARE THE WINDOW TO THE WORLD | Wed Nov 19 1986 11:35 | 11 |
| Re: .42
A simple batch job (modifiable to contain the offending usernames)
can be used to automatically kill those jobs! The operator is
therefore not restricted to checking for them....
:-)
-John
|
245.45 | | CLT::GILBERT | eager like a child | Wed Nov 19 1986 14:39 | 4 |
| What's the problem with offensive process names, anyway?
Oh, I see.... Someone may display them. Well, yank or cripple
the system utilities that display the process names.
|
245.46 | Anecdote | ANYWAY::GORDON | Apocalyptic Be-Bop | Sun Nov 23 1986 12:13 | 12 |
| FWIW -
The first time I ever changed my process name at my last job,
my system manager thought I had performed some vast security breach
(we were all pretty new to VMS) and he was calmly assured by one
of are more experienced VMS people that a simple DCL command did
what I had done...
Boy did I feel silly - I had written a program to go out and
call $SETPRN... I didn't know the DCL command existed!
--D
|
245.47 | Brrrrrr... | KAOM01::BOWEN | nix the cruise | Fri Feb 27 1987 10:04 | 17 |
| Greetings from the Great White...
Quick question guys...(I hope replys are read)
Is there any way of embedding escape sequences in the SET PROCESS/NAME
Maybe a flash or two would liven up the SHOW USERS command. I've
tried defining NAME :=="<ESC>[5mtext" and then SET PROC/NAME =
"'NAME'", but it just shows up as .[5mtext when you show users.
When you show symbol NAME it works, but not when you show users...
hummmmm.
Any ideas ???
Ian
|
245.48 | Some people were MEAN... | JON::MORONEY | Light the fuse and RUN! | Fri Feb 27 1987 10:57 | 6 |
| It used to work on VMS V3.x, but people often put meaner escape sequences
than just flash-on, so SHOW USER/SHOW SYSTEM now filter out escapes (they
show as dots). Escapes in MAIL messages are also filtered for the same
reason...
-Mike
|
245.49 | yabut... | KAOM01::BOWEN | Molsons, eh ! | Fri Feb 27 1987 12:00 | 6 |
| Ya, I see what'cha mean, gosh, no one I know would do anything
like that... :^)
Thanks anyways Mike,
Ian_who_can_almost_feel_Saturday
|
245.50 | I would like to know, too | CURIE::DECARTERET | | Sun Aug 16 1987 01:22 | 7 |
| I was just wondering after reading this note, how do you add the
quotes and a little saying at the end of your user name?
ex. CURIE::DECARTERET "Right Here"
Also, how did those two people earlier in the note change their
usernames?
-=*>Jason<*=-
|
245.51 | MODIFY PROFILE/PERSONAL="Cute phrase" | GATORS::VICKERS | Always put the customer FIRST | Sun Aug 16 1987 02:37 | 11 |
| VAX Notes and several other interpersonal communications tools support
personal names such as the "Cute phrases" at the end of the user
name. These "Cute phrases" are not part of the user name. User
names must be pretty boring.
It's amazing what one can learn by reading the online help or the
product documentation.
Have a ball,
Don
|