The Old Computer BLOG
 

Bloggers

Hot Trout avatar
Hot Trout

Crusty avatar
Crustyasp46

 

 

Welcome to Hot Trouts Retro Computer Ramblings, the BLOG for the old computer website. From Roms to Emulators, playing NES and SNES games, tha latest Amiga rip or collecting systems and roms then this is the place to visit. Please feel free to post comments and visit the forums for more great content.


Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Tue Oct 18, 2011 3:22 pm | By : Bumcake | Comments : 8 | Discuss this Topic
Hey guys, It's Autumn time, getting dark early, we need something to fiddle with,So we had this plan to pick up a old IBM AT/XT, remove it's innards and rivet in a ATX chassis etc for a new retro cool looking pc.

Managed to find a IBM 5170, little bit rough and dirty but complete.
Image

So before we start butchering the poor thing I thought we would give it a clean up and see what we have here.
And what we have is 26 years of filth :sick:
Image

Image

Image

Image

Nice leaky battery

Image

Mother of all power supplys

Image

(Note to self, cleaning around rather large capacitors with an artists brush isnt very bright.....owwww!)

Much less painful

Image

All apart and clean

Image

Back together again

Image

Other than being dirty and the legs discoloured (removed for retrobrite) & half a dozen paperclips inside the keyboard, it's spot on

Image

After a really good scrub up it looks really good, Hard drives are out for the son to find the spec sheet for, as the battery is dead the system wont find the hardisks until the drive type, mem size etc are typed back in with a new battery fitted.....

Image

Now it's alive....I cant bare to gut the poor thing :D

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Mon Oct 10, 2011 6:09 pm | By : te_lanus | Comments : 0 | Discuss this Topic
A new paper to be published in the upcoming issue of Marketing Science shows that removing DRM from music leads to a decrease in piracy. Or phrased differently, DRM appears to be an incentive for people to pirate music instead of buying it. The researchers from Rice and Duke University used analytical modelling to come to this seemingly common sense conclusion.

DRM only hurts legitimate customers.

The phrase above has been written a few dozen times here on TorrentFreak, and it’s now supported by an academic report.

Researchers from Rice and Duke University looked into the effect of digital restrictions on music piracy. In their paper “Music Downloads and the Flip Side of Digital Rights Management Protection” they conclude that DRM doesn’t prevent piracy at all. Quite the opposite.

“Only the legal users pay the price and suffer from the restrictions. Illegal users are not affected because the pirated product does not have DRM restrictions,” the researchers write in their report.

Ditching DRM and other restrictions would actually reduce piracy according to the analytical model developed by the researchers.

“In many cases, DRM restrictions prevent legal users from doing something as normal as making backup copies of their music. Because of these inconveniences, some consumers choose to pirate,” DinahVernik, assistant professor of marketing at Rice’s Jones Graduate School of Business says.

So without DRM, more people would be buying music. And aside from this direct effect, the researchers predict that DRM-free music will increase competition between retailers, which then results in lower prices.

“Removal of these restrictions makes the product more convenient to use and intensifies competition with the traditional format (CDs), which has no DRM restrictions,” says Vernik. “This increased competition results in decreased prices for both downloadable and CD music and makes it more likely that consumers will move from stealing music to buying legal downloads.”

Since the paper has yet to be published we can’t review all aspects of the analytical model. But unlike the researchers suggest, their findings are hardly surprising as the effect they describe has already unfolded in real life..

Even the most dedicated copyright protectionists concluded a long time ago that music DRM is a thing of the past. Most notably, IFPI said two years ago that stripping DRM would “significantly boost download sales.”

And indeed, those who look around will find that there’s hardly any music being sold with classic DRM in place. Even the RIAA admitted that DRM is an endangered species, probably because what the researchers report today is rather accurate.

The late Steve Jobs already knew this a long time ago. “DRMs haven’t worked, and may never work, to halt music piracy,” he said back in 2007.

Source: http://torrentfreak.com/eureka-ditching-drm-decreases-piracy-111008/

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Thu Sep 29, 2011 2:32 pm | By : crustyasp46 | Comments : 0 | Discuss this Topic
TV in a PC

Old Gateway PC transformed into a Linux server with embedded display, which is a hacked portable B&W TV driven directly by the VGA card.

IMG_1147.JPG
IMG_1109.JPG
IMG_1252.JPG
IMG_1048.JPG


I never liked having a server without some kind of console display built in. Up to now, when the machine went down, I had to lug out a VGA monitor, which was at least 14", often larger. Most PC cases have an abundance of unused bays (too many really), and are so deep that there is mostly empty space in the front (and the gateway PC I had was no exception). I was able to mount a 5in CRT and TV board inside while still leaving room for the floppy, cdrom and other things.

IMG_1212.JPG
IMG_1088.JPG
IMG_1337.JPG
IMG_1379.JPG


The old TV didn't have any composite input, so the video and sync lines had to be tapped out (Korean made, it had a manufacture date of 1989, the tuner was not working and the case was cracked, but the picture was still good). The video BIOS was customized for driving at the correct NTSC sync and scan rate.

Best thing about this project was almost everything came from the trash. The only things that were purchased were the zip ties, can of black krylon (for painting the tv bezel), and the game zapper for the optional second tv/display (see below).

After adding a second VGA card, it also makes a good media center PC. Getting the NTSC mode on the second card required the appropriate modeline for X as well as a VGA->Composite modulator (not scan converter), which is an old ADS Game Zapper I purchased in the early 90s. These are rare, and based on the older (and also hard to find) cxa1145 RGB encoder. However a similar, better circuit can be made with minimal parts using an AD724/AD725.

Source : http://www.ccs.neu.edu
Attachments:
Number of Attachments: 8
IMG_1379.JPG
Number of Downloads: 2643 Filesize: 51.20 KB
IMG_1337.JPG
Number of Downloads: 2643 Filesize: 24.33 KB
IMG_1252.JPG
Number of Downloads: 2643 Filesize: 142.36 KB
IMG_1212.JPG
Number of Downloads: 2643 Filesize: 87.41 KB
IMG_1147.JPG
Number of Downloads: 2643 Filesize: 56.62 KB
IMG_1088.JPG
Number of Downloads: 2643 Filesize: 55.64 KB
IMG_1109.JPG
Number of Downloads: 2643 Filesize: 54.98 KB
IMG_1048.JPG
Number of Downloads: 2643 Filesize: 31.59 KB

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Sun Sep 25, 2011 3:47 am | By : crustyasp46 | Comments : 1 | Discuss this Topic
c64glabel.gif



Originally Posted by Eurogamer
A collectable gold-coloured Commodore 64 sold on eBay yesterday for an incredible GBP 2650 (around EUR 3340).

Apparently it's one of only a few hundred ever made. They were produced back in 1986 to celebrate the production of the one millionth C64 home computer to be manufactured at the German production plant. Back then, that was a big number.

The lucky seller's parents 'won' the super-rare item at CeBit in Hanover 1987, and promptly locked it in a cabinet and never used it.

But while the item was acknowledged by C64 aficionados to be rare, the amount it fetched has surprised many in the retro community - eclipsing recent auctions for the unreleased and supremely rare C65 machine.




In the U.S. in 1984, and later in Germany in 1986, Commodore celebrated the one millionth Commodore 64 sold in those countries by presenting the C64 with its traditional breadbox case "dipped" in a sparkling golden color.

c64gold2.gif



c64goldInside.gif
c64goldCorner.gif


Aside from the cosmetic beauty, the computer is otherwise a completely ordinary later model breadbox C64. The Commodore 64 sports 64K of memory, a leading edge video chip capable of producing images at 320 X 200 from a pallette of 16 colors, a text mode that displays 40 characters and 25 rows in upper/lowercase as well as Commodore's PETSCII graphics set, a fully programmable parallel IO port, and a high quality 3-voice, 8-octive additive synthesizer sound chip also capable of 8-bit PCM audio samples.

c64gold.gif
c64goldplaque.gif




One of the only true curiosities in the design is the lack of the normal black protective plate on the side of the machine, as shown here. Reports are that none of the Golden C64s have the missing plate. The reason is a mystery.

c64goldSide.gif
c64goldBack.gif
c64screen.gif


Source: http://www.zimmers.net
Attachments:
Number of Attachments: 9
c64gold2.gif
Number of Downloads: 3529 Filesize: 31.39 KB
c64screen.gif
Number of Downloads: 3529 Filesize: 1.55 KB
c64goldSide.gif
Number of Downloads: 3529 Filesize: 17.51 KB
c64goldInside.gif
Attachment Comments: As you can see, even the inside of the casing is golden colored.
Number of Downloads: 3529 Filesize: 57.96 KB
c64goldCorner.gif
Number of Downloads: 3529 Filesize: 39.02 KB
c64goldplaque.gif
Number of Downloads: 3529 Filesize: 20.76 KB
c64goldBack.gif
Number of Downloads: 3529 Filesize: 30.34 KB
c64gold.gif
Attachment Comments: As you can see here, the computer came mounted on a decorative plaque.
Number of Downloads: 3529 Filesize: 89.92 KB
c64glabel.gif
Number of Downloads: 3529 Filesize: 7.70 KB

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Fri Sep 09, 2011 1:00 am | By : crustyasp46 | Comments : 2 | Discuss this Topic
The case of the 500-mile email


The following is the 500-mile email story in the form it originally appeared, in a post to sage-members on Sun, 24 Nov 2002.:

From trey@ Fri Nov 29 18:00:49 2002
Date: Sun, 24 Nov 2002 21:03:02 -0500 (EST)
From: Trey Harris
To:
Subject: The case of the 500-mile email (was RE: [SAGE] Favorite impossible
task?)

Here's a problem that *sounded* impossible... I almost regret posting the story to a wide audience, because it makes a great tale over drinks at a conference. :-) The story is slightly altered in order to protect the
guilty, elide over irrelevant and boring details, and generally make the whole thing more entertaining.

I was working in a job running the campus email system some years ago when I got a call from the chairman of the statistics department.

"We're having a problem sending email out of the department."

"What's the problem?" I asked.

"We can't send mail more than 500 miles," the chairman explained.

I choked on my latte. "Come again?"

"We can't send mail farther than 500 miles from here," he repeated. "A little bit more, actually. Call it 520 miles. But no farther."

"Um... Email really doesn't work that way, generally," I said, trying to keep panic out of my voice. One doesn't display panic when speaking to a department chairman, even of a relatively impoverished department like statistics. "What makes you think you can't send mail more than 500 miles?"

"It's not what I *think*," the chairman replied testily. "You see, when we first noticed this happening, a few days ago--"

"You waited a few DAYS?" I interrupted, a tremor tinging my voice. "And you couldn't send email this whole time?"

"We could send email. Just not more than--"

"--500 miles, yes," I finished for him, "I got that. But why didn't you call earlier?"

"Well, we hadn't collected enough data to be sure of what was going on until just now." Right. This is the chairman of *statistics*. "Anyway, I asked one of the geostatisticians to look into it--"

"Geostatisticians..."

"--yes, and she's produced a map showing the radius within which we can send email to be slightly more than 500 miles. There are a number of destinations within that radius that we can't reach, either, or reach
sporadically, but we can never email farther than this radius."

"I see," I said, and put my head in my hands. "When did this start? A few days ago, you said, but did anything change in your systems at that time?"

"Well, the consultant came in and patched our server and rebooted it. But I called him, and he said he didn't touch the mail system."

"Okay, let me take a look, and I'll call you back," I said, scarcely believing that I was playing along. It wasn't April Fool's Day. I tried to remember if someone owed me a practical joke.

I logged into their department's server, and sent a few test mails. This was in the Research Triangle of North Carolina, and a test mail to my own account was delivered without a hitch. Ditto for one sent to Richmond,
and Atlanta, and Washington. Another to Princeton (400 miles) worked.

But then I tried to send an email to Memphis (600 miles). It failed. Boston, failed. Detroit, failed. I got out my address book and started trying to narrow this down. New York (420 miles) worked, but Providence
(580 miles) failed.

I was beginning to wonder if I had lost my sanity. I tried emailing a friend who lived in North Carolina, but whose ISP was in Seattle. Thankfully, it failed. If the problem had had to do with the geography of the human recipient and not his mail server, I think I would have broken down in tears.

Having established that--unbelievably--the problem as reported was true, and repeatable, I took a look at the sendmail.cf file. It looked fairly normal. In fact, it looked familiar.

I diffed it against the sendmail.cf in my home directory. It hadn't been altered--it was a sendmail.cf I had written. And I was fairly certain I hadn't enabled the "FAIL_MAIL_OVER_500_MILES" option. At a loss, I
telnetted into the SMTP port. The server happily responded with a SunOS sendmail banner.

Wait a minute... a SunOS sendmail banner? At the time, Sun was still shipping Sendmail 5 with its operating system, even though Sendmail 8 was fairly mature. Being a good system administrator, I had standardized on
Sendmail 8. And also being a good system administrator, I had written a sendmail.cf that used the nice long self-documenting option and variable names available in Sendmail 8 rather than the cryptic punctuation-mark
codes that had been used in Sendmail 5.

The pieces fell into place, all at once, and I again choked on the dregs of my now-cold latte. When the consultant had "patched the server," he had apparently upgraded the version of SunOS, and in so doing
*downgraded* Sendmail. The upgrade helpfully left the sendmail.cf alone, even though it was now the wrong version.

It so happens that Sendmail 5--at least, the version that Sun shipped, which had some tweaks--could deal with the Sendmail 8 sendmail.cf, as most of the rules had at that point remained unaltered. But the new long configuration options--those it saw as junk, and skipped. And the sendmail binary had no defaults compiled in for most of these, so, finding no suitable settings in the sendmail.cf file, they were set to zero.

One of the settings that was set to zero was the timeout to connect to the remote SMTP server. Some experimentation established that on this particular machine with its typical load, a zero timeout would abort a connect call in slightly over three milliseconds.

An odd feature of our campus network at the time was that it was 100% switched. An outgoing packet wouldn't incur a router delay until hitting the POP and reaching a router on the far side. So time to connect to a lightly-loaded remote host on a nearby network would actually largely be governed by the speed of light distance to the destination rather than by
incidental router delays.

Feeling slightly giddy, I typed into my shell:

$ units
1311 units, 63 prefixes

You have: 3 millilightseconds
You want: miles
* 558.84719
/ 0.0017893979

"500 miles, or a little bit more."

By: Trey Harris

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Mon Sep 05, 2011 8:46 pm | By : crustyasp46 | Comments : 1 | Discuss this Topic
MIT researchers uncover mountains of private data on discarded computers

January 15, 2003 *** NOTE DATE***

CAMBRIDGE, Mass.--Discarded computers, even those with "erased" disk drives, may harbor confidential information such as credit card numbers and medical records, two MIT graduate students found.

Scavenging through the data inadvertently left on 158 used disk drives, the students at MIT's Laboratory for Computer Science found more than 5,000 credit card numbers, detailed personal and corporate financial records, numerous medical records, gigabytes of personal email and pornography.

The disk drives were purchased for less than $1,000 from eBay and other sources of used computer hardware. Only 12 were properly sanitized.

"There are many stories in which somebody has bought a used computer and found confidential information on it, but nobody has ever quantified the scale of the problem," said Simson Garfinkel, one of the students. "So we decided to find out."

Results from the study, which Garfinkel performed with Abhi Shelat, are being published in the January/February 2003 issue of IEEE Security and Privacy. The research suggests that the secondary market is awash with confidential information, although work needs to be done to get more accurate statistics. More than 150 million disk drives were retired from primary service in 2002.

Of the disk drives acquired, 129 were functional. Of these, Garfinkel and Shelat found 28 disk drives in which little or no attempt had been made to erase any information. One of these drives, Shelat says, had apparently come from an automatic teller machine in Illinois and contained a year's worth of financial transactions.

Attempts to erase information from the drives were usually ineffectual. On many disks, files that would typically be found in the "My Documents" folder had been deleted, but they could be recovered using a simple "undelete" utility. Undelete programs work because deleting a file does not actually overwrite the blocks on the computer's disk that are used to hold the file's information.

Roughly 60 percent of the disks were formatted before they were sold, but even formatting did not properly sanitize a disk because the Windows "format" command doesn't actually overwrite every block--"the format command just reads every block to make sure that they still work," Garfinkel said. "To properly sanitize the hard drive, you need to overwrite every block."

On one of the "formatted" disks, Shelat found more than 5,000 credit card numbers.

Roughly 45 percent of the disks contained no files at all and the disks could not be mounted on the computer. Yet the data could still be retrieved by reading each block of the disk using special tools.

********************************

This article made me think of the relevancy of this article in respect to those wiping programs that seem so prevalent today assuring you that any personal data will be destroyed if you use their program. Well it seems that all these assurances by respective software makers is some what lacking in credibility.

From what I have been able to gather , it seems that recovery methods of wiped data is still ahead in the game.But never fear, for those paranoid and extremely cautious. I was able to dig up a program that will completely destroy your data so it will never fall into the hands of those criminal minded thugs or those government agencies that want to pry into your every orifice.

This program was created because of the above article in 2003, and ladies and gentlemen, I assure you it is as effective today as back then.

Because of monthly bandwidth restrictions, I am unable to bring screenshots, so I will point you in the direction of this wonderful and reliable program.

Without further ado, I present>>>>>>> DriveSlag>>>>>>>

http://eecue.com/c/driveslag

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Fri Sep 02, 2011 2:36 pm | By : crustyasp46 | Comments : 2 | Discuss this Topic
Hack.jpg


In December of 2008, a group of hackers was sitting on the floor with faces aglow with laptop light cruising the internet and skyping friends in and listening to death metal.

It was 12 days before 25c3. Astera and I had a conversation that went something like this:

B: There should be a book.
A: Yes, there should.
B: We have 12 days.
A: We can do it.

The twelve days we had was until CCC started. We figured we would have it done by then. We contacted all the hackers we knew around the world and put the word out. We expected to get about a half a page of writing from each space. We reckoned that it would be a 25 page pamphlet. We also reckoned that it be easy for folks to write up a little summary within a few days of what it was like to get their hackerspace started and get back to us.

Within a week we had been scorched by a flame war, gotten a lot of both written and photographic material submitted and it seemed likely that the book would happen. Then the submissions kept coming… and coming. The hackerspaces around the world told each other about the project and many groups sent some writing in describing the beginning of their hackerspace. Word had even gotten round to groups that didn’t have a space yet and they were sending us descriptions of their pre-beginnings too!

The 12 days came and went and still the submissions kept coming. After a few months submissions had trailed off and Astera came to NYC and began designing the book. She’s a pro and it shows. This book looks beautiful because she took the material and somehow made it fit together aesthetically, not a trivial task. Jens Ohlig jumped into the process last year to help push the editing process forward. Remember, in our minds it was going to be a project that would take less than two weeks and it turned into something epic. It’s been a long wait and I hope you’ll think that it’s worth it.

Download HackerSpaces: The Beginning!

This book documents where the hackerspace movement was in December of 2008. In that way it’s a bit of a time capsule. It’s not an exhaustive book, but we hope there are enough stories in here to show that all your excuses for not starting up a hackerspace are invalid. Each group faced down their own dragons to bring their hackerspace into existence including floods, rats, and drama. If they can do it, so can you.

We did this because we wanted it to exist and so it is a reward in itself. If you feel moved and want to support hackerspaces, we suggest contributing to the Wau Holland fund which helps make awesome things happen for hackerspaces. We would also like to thank everyone who submitted photographs and writing, this is your book.

After these years, the book is finally free in the world as a pdf. Download it, read it, and share it. We’re open to the idea of making it into a real physical book and if you’re interested in making that happen, let us know.

Build, Unite, Multiply!

Source:
Code: Select all
http://blog.hackerspaces.org/
Attachments:
Number of Attachments: 1
Hack.jpg
Number of Downloads: 3855 Filesize: 412.86 KB

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Tue Aug 30, 2011 1:35 pm | By : crustyasp46 | Comments : 2 | Discuss this Topic
mr_lu2.png


About LNG

LNG is an operationg system primarly for the good old Commodore64 home-computer. There also is a native version for the successor Commodore128. Ports to other 6502/6510 driven 8Bit Computers are possible but not yet started. LUnix started in 1993 and reached the internet in 1994. In 1997 LUnix0.1 was rewritten from scratch, the result is LNG.

LNG on a C=64
c64_start.png

c64_lun.png


LNG on a C=128 with REU
c128_start.png

c64_lun.png


Information on LNG can be found here: http://lunix.c64.org/

and here: http://sourceforge.net/project/showfile ... p_id=10888

Anybody feel adventurous? :mrgreen:
Attachments:
Number of Attachments: 5
mr_lu2.png
Attachment Comments: Mr. Lu the unoffical LUnix-Logo, as suggested by Stefan Haubenthal. :-)
Number of Downloads: 4646 Filesize: 3.48 KB
c64_lun.png
Number of Downloads: 4646 Filesize: 2.14 KB
c128_start.png
Number of Downloads: 4646 Filesize: 1.25 KB
c64_lun.png
Number of Downloads: 4646 Filesize: 2.14 KB
c64_start.png
Number of Downloads: 4646 Filesize: 1.16 KB

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Thu Aug 25, 2011 3:25 pm | By : te_lanus | Comments : 1 | Discuss this Topic
On this day 20 years ago, a young Finnish computer science student started to tell the outside world about a little tech project he was working on.

Linus Torvalds took to newsgroup Usenet to tell people about his quest to create a new operating system and ask others to give him feedback and help out.

Granted, the first version of Linux (0.01) wasn't released into the wild until September of that year, but nonetheless 25 August marked a significant milestone in its history. Torvalds actually started working on the OS in April 1991.

Interestingly, Torvalds' OS was just a hobby. He didn't plan on becoming famous or for his creation to be used the world over. But these things have happened nonetheless and now the Linux community is one of the strongest, innovation driven communities you'll find.

This is largely thanks to its open nature and the use of the GNU General Public Licence so the software can be used by anyone, shared by anyone, and modified by anyone (so long as you know what you're doing that is).

In 2003, Linux had a taste of the limelight again in the form of an IBM ad screened during the Superbowl. The first version of Linux sported just over 10,000 lines of code. Today, that figure has soared to 10s of millions.

Today, Linux is all around us. And its popularity doesn't show signs of stopping anytime soon. Take a look at the Linux Foundation's celebratory video.



http://www.itpro.co.uk/635767/today-in-history-linux-turns-20

Breadcrumbs : Board IndexSocial ConnectionsRetro Computer Ramblings BLOG
Posted on : Wed Jul 27, 2011 7:38 pm | By : te_lanus | Comments : 2 | Discuss this Topic
Thirty years ago, on July 27 1981, Microsoft bought the rights for QDOS (Quick and Dirty Operating System) from Seattle Computer Products (SCP) for $25,000. QDOS, otherwise known as 86-DOS, was designed by SCP to run on the Intel 8086 processor, and was originally thrown together in just two months for a 0.1 release in 1980. Meanwhile, IBM had planned on powering its upcoming Personal Computer with CP/M-86, which had been the standard OS for Intel 8086 and 8080 architectures at the time, but a deal could not be struck with CP/M’s developer, Digital Research. IBM then approached Microsoft, which already had a few years of experience under its belt with M-DOS, BASIC, and other important tools — and as you can probably tell from the landscape of the computer world today, the IBM/Microsoft partnership worked out rather well indeed.

IBM released its Personal Computer in August 1981 running version 1.14 of SCP’s QDOS — but a few months later Microsoft produced MS-DOS 1.24, which then became the standard IBM PC operating system. In March 1983, both MS-DOS 2.0 and the IBM PC/XT were released. The rest, as they say, is history. MS-DOS 3.0 followed in 1984 (alongside the IBM PC/AT), and MS-DOS 4.0 with a mouse-powered, menu-driven interface arrived in 1989. It’s around this point that IBM’s PC operating system, PC-DOS, began to diverge from MS-DOS — and of course, come 1990, Microsoft released Windows 3.0, which would change Microsoft’s focus forever. It’s also around this time that developers start to feel the pinch of the 640KB conventional memory limit imposed by IBM’s original hardware specifications.

Still, come 1991, MS-DOS 5.0 was released (along with the much-loved QBASIC), and MS-DOS 6.0 with much-maligned DoubleSpace disk compression tool appeared in 1993. By this stage, IBM, Digital Research (DR-DOS), and Microsoft were all leapfrogging each other with different version numbers and features. IBM released PC-DOS 6.1, and MS followed quickly with MS-DOS 6.2. IBM released PC-DOS 6.3 — and Novell trumped them all by releasing Novell DOS 7.0. In 1995, however, Windows 95 with an underpinning of MS-DOS 7.0 and its new FAT32 file system was released, and the history of DOS draws to a close. Every other version of DOS was quickly squished out of existence by Windows 95, and it wouldn’t be until the late 90s and the emergence of the Dot Com Bubble that another command-line OS would yet again rise to prominence in the shape of Linux.

Wikipedia has an excellent account of the history of x86 DOS operating systems, and also a table that compares and contrasts each of the different versions from IBM, MS, Digital Research, and others. If you’re interested in the original development of QDOS, check out its creator’s blog.

Source: http://www.extremetech.com/computing/91202-ms-dos-is-30-years-old-today
 

Copyright © 1999-2023 The Old Computer Dot Com. All rights reserved.