It turned out to be a pentium with ISA ports. I cleaned it, upon booting, i noticed the CMOS battery needed replacement. The CMOS was part of the dreaded Dallas 1287 RTC. Cutting it open and attaching another story, but i did it. Reading the required disk geometry from the label, i was able to configure the CMOS correctly for the disk to boot.
The yield: It boots into a windows 95 desktop, with a naked women with spread legs as a desktop background. I guess i recovered someones porn collection.
It's not porn if it's text. It was interesting explaining the English vocabulary in a Chinese class that covered how to refer to porn.
黄色的电影 ["yellow movie"]: "dirty movie"
黄色的图片 ["yellow picture"]: "dirty picture"
黄色的杂志 ["yellow magazine"]: "dirty magazine"
黄色的书 ["yellow book"]: "romance novel"
There's a double standard in English, where pornographic books can't actually be porn because women don't consume porn.
The other interesting aspects of that lesson were that I wouldn't really have expected a module in a class formally offered through a Chinese university to focus on this topic, and that -- in the textbook's opinion -- the correct English vocabulary should have been "blue movie", "blue picture", "blue magazine", and "blue book".
(The module also covered phone sex! But for whatever reason, that isn't "yellow" in Chinese; it's "pink".)
Actual English usage rather emphatically disagrees with you. [0]
> There's a double standard in English, where pornographic books can't actually be porn because women don't consume porn.
No, there’s not. But “romance novels” aren't that, though arguably an adjacent category (whereas “erotic fiction” is an overlapping, but not identical, category to “pornographic fiction”.)
But English does not hold that what woman consume is not porn (and, in fact, you’ll find extensive English language studies of how women consume what is uncontroversially porn.)
> The other interesting aspects of that lesson were that I wouldn't really have expected a module in a class formally offered through a Chinese university to focus on this topic, and that -- in the textbook's opinion -- the correct English vocabulary should have been "blue movie", "blue picture", "blue magazine", and "blue book".
“blue movie” is correct, if somewhat dated; the rest are, at best, never as widely used.
[0] e.g., https://en.m.wikipedia.org/wiki/Category:Pornographic_novels
Well the Greek roots are literally "writing about prostitutes". I'd argue explicit depiction of sex for the sake of getting off is porn. In literature, drawing, photo, or video. There's even the audio form.
English also has "erotica". Which is... porn which has some non-porn value? Semi-clothed porn? Most romance fiction is more to the clothed than unclothed end of the erotica spectrum, anyway. I wouldn't class most as porn. Though there sure are some pornographic books. I was surprised to learn how many synonyms for the genitalia there are.
One of the first erotic text adventures is literally named "Softporn Adventure". [0][1]
[0] https://en.wikipedia.org/wiki/Softporn_Adventure
[1] https://www.theatlantic.com/technology/archive/2014/12/the-o...
That instantly brought to mind Soft Cell's song "Seedy Films". It has the line "Blue films flicker / Hands of a stranger / Getting to know you / And I'm getting to like you". It would be amusing if that is a reference that got immortalized in your textbook.
Good song btw ;)
... Lo and behold, I see it autobooting into heavily customized VMS 6.1 (first patch level that could boot on it), that turns out to be special Blockbuster Video version with appliance-style licenses loaded (NET-APP-150), probably designed to run with a DECserver connecting multiple terminals over LAT.
Turned out the second of two SCSI drives still held not just the custom BBV software, but also the database, including PII and history data, with flags like "18+" on various movies.
https://en.wikipedia.org/wiki/Microform#Readers_and_printers
I have no use for them, so I just have one framed on the wall for nostalgia's sake.
I quickly decided on a rule to immediately wipe any hard drive, and destroy any drive that couldn't be wiped.
One reason is that I'd been involved in some early online privacy discussions, so I had an awareness that snooping might be invasive.
But if curiosity might tempt me to rationalize away the nagging sense of possible invasiveness, there was a second reason...
I never wanted to technically be in possession of, say, a private photo that a 17.9 year-old took. Nor ever see anything worse than that. Thus, immediately pull and DBAN/destroy any hard drive.
Given that I eventually salvaged around 100 PCs, the private photos scenario didn't seem too unlikely.
I erased everything, pointed the browser to https://www.worldsdumbestgame.com/ , wrapped an elastic band around it to hold the button down and put it in a cupboard for two years.
Given that it was clear the company thought they had destroyed all of the data on the system I went ahead and deleted all of the non-system related files, leaving just the OS and layered products that they had originally installed.
(a website that plays youtube videos with default filenames or 0 views. unexpectedly great capsulation of humananity. or at least where humans can get cameras)
There was no real dilemma regarding what to do with the data, it was wiped without peeking. I figured out that looking for interesting software was unethical early on, since launching some software will expose you to the prior owner's data automatically (e.g. databases) while browsing the directory structure for such software can open the perilous doors of curiosity. Not only that, but it is very rare for the data to require preservation. Most machines are intentionally disposed of. The cited case of a stolen computer is likely rare (though I suppose that depends upon one's sources and the market value of the machine).
I was recently given an old machine by someone I was barely acquainted with, data intact. He said he didn't mind if I looked, just destroy the data if I pass it on to someone else. I took the liberty to create bootable diskettes from the existing software since I haven't had a vintage computer in well over a decade. There was no question about how to handle the data though: even with permission, it had to be destroyed.
[0] It may have been HyperCard with some extensions for color. I distinctly remember color.
(I wiped it and installed NetBSD.)
I bought an old Dell PowerVault (rackmountable backup tape library) a few years ago. Upon taking out the drive that was already in there, I found that it still had a tape inside of it. I was able to dump the tape contents; it's files were all gzipped TAR streams. Inside those archives were assets and project files for... a ProtectMyID.com commercial.
I'm so glad everything is password protected & encrypted on my machines now. Wouldn't want some rando to buy my funeral estate and find personal stuff on my hardware. My next of kin are my parents so I don't think they'd be very savvy about destroying drives.
beware
Not surprised. I know of a commercial beverage machine that runs Android, of all things.
Sadly something got shot on the board and I don't have the EE skills to fix or diagnose.
Not at all if you have an OPAL SSD which are quite common these days. These have a key which encrypts the data at rest and a user facing passphrase which decrypts this key. If you override the encrypting key, the rest of the data is gone unless you can break AES.
[1] https://wiki.archlinux.org/title/Solid_state_drive/Memory_ce... [2] https://partedmagic.com/secure-erase/ [3] https://partedmagic.com/nvme-secure-erase/
It's computer archaeology in a way, but the article would've been better if it covered the source code/discovery of e-waste lately for video game consoles.
Is that really true? The idea you need a million passes always struck me as dubious.