the TOLLA page _ old computer & retrocomputing

VAX station

 about digital VAX station 4000 60 & 3100


If you wanna learn the VMS, !The VMS User's Guide', Jones F. Peters III, Patrick J. Holmay

 short technical data


 digital VAX Station 4000 60


system name: PMariah
OS: OpenVMS - VMS, [Ultrix, NetBSD (no scsi support)]
memory: 8Mb fixed + max 104MB on 8 slots (80-pin simm)
cpu: alpha KA46-A @ 55 MHz 256K cache
fpu: 50MHz
bus: scsi, turbochannel (TCA)
i/o: scsi, serial, parallel, tzk10 tape (320MB QIC TAPE)
network: AUI and BNC
hardisk: one RZ200 100MB and one RZ300 200MB disks
video: 1280x1024 8-plane @ 72Hz RGB
number & condition: one without hds, frame buffer, cover and memories; later founded 2 hd, frame buffer (sma endless ways :), cover.
date: 1993


 digital VAX Station 3100 m42


system name: PVAX rev#7
OS: OpenVMS - VMS, [Ultrix, NetBSD (no scsi support)]
memory: 4Mb fixed + max 16Mb on 1 slot
cpu: alpha KA42-A CVAX chip @ 90ns, 64KB external cache
fpu:
bus: scsi
i/o: scsi, parallel, 2 serial, 3.5' floppy
network:
hardisk:
date: 1987 ?

 links

ftp://ftp.europe.digital.com/public/vms/vax/v6.2/
ftp://ftp.uab.es/pub/vms/
ftp://freevms.nvg.org/pub/vms/freevms/
http://www.compaq.com/products/quickspecs/SOC_Archives
http://www.vax.org
http://www.decvax.org
http://www.vaxarchive.org

 pictures


 nmap


Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
Host vaxdam (192.168.0.215) appears to be up ... good.
Initiating SYN Stealth Scan against vaxdam (192.168.0.215)
Adding open port 109/tcp
Adding open port 13/tcp
Adding open port 11/tcp
Adding open port 53/tcp
Adding open port 25/tcp
Adding open port 9/tcp
Adding open port 37/tcp
Adding open port 599/tcp
Adding open port 23/tcp
Adding open port 515/tcp
Adding open port 79/tcp
Adding open port 15/tcp
Adding open port 2049/tcp
Adding open port 111/tcp
Adding open port 514/tcp
Adding open port 6000/tcp
Adding open port 21/tcp
Adding open port 1024/tcp
Adding open port 110/tcp
Adding open port 19/tcp
Adding open port 513/tcp
Adding open port 512/tcp
Adding open port 7/tcp
The SYN Stealth Scan took 20 seconds to scan 1601 ports.
Initiating UDP Scan against vaxdam (192.168.0.215)
The UDP Scan took 16 seconds to scan 1468 ports.
Adding open port 1025/udp
Adding open port 161/udp
Adding open port 518/udp
Adding open port 2049/udp
Adding open port 9/udp
Adding open port 7/udp
Adding open port 19/udp
Adding open port 13/udp
Adding open port 517/udp
Adding open port 111/udp
Adding open port 37/udp
Adding open port 53/udp
For OSScan assuming that port 7 is open and port 1 is closed and neither are firewalled
Interesting ports on vaxdam (192.168.0.215):
(The 3034 ports scanned but not shown below are in state: closed)
Port State Service
7/tcp open echo
7/udp open echo
9/tcp open discard
9/udp open discard
11/tcp open systat
13/tcp open daytime
13/udp open daytime
15/tcp open netstat
19/tcp open chargen
19/udp open chargen
21/tcp open ftp
23/tcp open telnet
25/tcp open smtp
37/tcp open time
37/udp open time
53/tcp open domain
53/udp open domain
79/tcp open finger
109/tcp open pop-2
110/tcp open pop-3
111/tcp open sunrpc
111/udp open sunrpc
161/udp open snmp
512/tcp open exec
513/tcp open login
514/tcp open shell
515/tcp open printer
517/udp open talk
518/udp open ntalk
599/tcp open acp
1024/tcp open kdm
1025/udp open blackjack
2049/tcp open nfs
2049/udp open nfs
6000/tcp open X11
Remote operating system guess: VMS MultiNet V4.2(16)/ OpenVMS V7.1-2
Uptime 0.040 days (since Wed Mar 5 12:29:25 2003)
TCP Sequence Prediction: Class=truly random
Difficulty=9999999 (Good luck!)
IPID Sequence Generation: Incremental

Nmap run completed -- 1 IP address (1 host up) scanned in 40 seconds

 list of files hosted

directory binary, exec web html file image file
ps, pdf archive file text file other
>> go on top <<
http://tollari.org/
send mails to: e[AT]richiardone.eu
disclaimer: the names, trademarks and logos are copyrights belonging to respectives companies. we are not liable and entitled with these properties.

site created & maintained by \tl3i\, new design is a m4rt idea
file repository offered by fosk
hardware and infos harvested by: \tl3i\, fos[k], anonymous_rabbit, mcGark, m4rt, M4daf4ka
one billion thanx to SLIVER and anonymous_rabbit for the old hosting




Valid HTML 4.01!      Valid CSS!     

qotd: cat /dev/urandom > /dev/fb, cat /dev/urandom > /dev/dsp

good morning guy! page loaded at 07:43:59 am Sun Aug 2017
your system info: CCBot/2.0 (http://commoncrawl.org/faq/)
remote system info: Linux 5.6.30
v4.5 january.05