62 lines
4.2 KiB
Plaintext
62 lines
4.2 KiB
Plaintext
****************************************************************************** ** The basics of hacking iii: data **
|
||
******************************************************************************
|
||
|
||
|
||
Welcome to the basics of hacking iii: data general computers. Data general is
|
||
favored by large corporations who need to have a lot of data on-line. The data
|
||
general aos, which stands for advanced operating system, is a version of
|
||
bastardized unix. All the commands which were in the unix article, will work
|
||
on a data general. Once again, we have the problem of not knowing the format
|
||
for the login name on the data general you want to hack. As seems to be
|
||
standard, try names from one to 8 digits long. Data general designed the
|
||
computer to be for busi- nessmen, and is thus very simplistic, and basically
|
||
fool proof (but not damn fool proof). It follows the same login format as the
|
||
unix system: dg=> login: you=> username dg=> password: you=> password passwords
|
||
can be a maximum of 8 characters, and they are almost always set to a default
|
||
of 'aos' or 'dg'. (Any you know about businessmen...) A word about control
|
||
characters: cntrl-o stops massive print-outs to the screen, but leaves you in
|
||
whatever mode you were. (A technical word on what this actually does: it
|
||
tells the cpu to ignore the terminal, and prints everything out to the cpu!
|
||
This is about 19200 baud, and so it seems like it just cancels.) Cntrl-u
|
||
kills the line you are typing at the time. Now for the weird one: cntrl-c
|
||
tells the cpu to stop, and wait for another cntrl character. To stop a
|
||
program, you actually need to type cntrl-c and then a cntrl-b. Once you get on,
|
||
type 'help'. Many dg (data general) computers are sold in a package deal,
|
||
which also gets the company free customizing. So you never know what commands
|
||
there might be. So we will follow what is known as the 'eclipse standard', or
|
||
what it comes out of the factory like. To find out the files on the directory
|
||
you are using, type => dir to run a program, just like on a dec, just type its
|
||
name. Other than this, and running other people's programs, there really isn't
|
||
a standard... *** Hark, yon other system users *** to see who is on, type =>
|
||
who (and a lot of the other unix commands, remember?). This shows the other
|
||
users, what they are doing, and what paths they are connected across. This is
|
||
handy, so try a few of those paths yourself. To send a message, say => send
|
||
username this is a one time message, just like send on the dec 10. From here
|
||
on, try commands from the other previous files and from the 'help' listing.
|
||
Superuser: if you can get privs, just say: => superuser on and you turn those
|
||
privs on! By the way, you remember that computers keep a log of what people do?
|
||
Type: => syslog /stop and it no longer records anything you do on the system,
|
||
or any of the other users. It screams to high heaven that it was you who turned it off, but it keeps no track of any accounts created or whatever else
|
||
you may do. You can say=> syslog /start to turn it back on (now why would
|
||
you want to do something like that?????) To exit from the system, type=> bye
|
||
and the system will hang up on you.
|
||
Most of the systems around, including decs, vax's, and dg's, have games. These
|
||
are usually located in a path or directory of the name games or <games> or
|
||
games: try looking in them, and you may find some trek games, adventure, zork,
|
||
wumpus (with bent arrows in hand) or a multitude of others. There may also be
|
||
games called 'cb' or 'forum'. These are a sort of computer conference call.
|
||
Use them on weekends, and you can meet all sorts of interesting people.
|
||
*************************************** ***************************************
|
||
If you would like to see more articles on hacking (this time far more than jus
|
||
t
|
||
the basics), or maybe articles on networks and such, then leave us mail if we
|
||
are on the system, or have the sysop search us down. We call a lot of places,
|
||
and you may just find us.
|
||
This completes the series of articles
|
||
on hacking... These articles were: the basics of hacking: introduction the
|
||
basics of hacking i: dec's the basics of hacking ii: vax's (unix) the basics of
|
||
hacking iii: dg's
|
||
This and the previous articles by: the
|
||
Knights of Shadow
|
||
[end] 1984
|
||
|