[<<Previous Entry]
[^^Up^^]
[Next Entry>>]
[Menu]
[About The Guide]
Description: Hackign Data General (Knights of Shadow IV)
File Date: 6-21-87
File Time: 6:36 am
***************************************
***************************************
** **
** Hacking III: Data **
** General **
** **
***************************************
***************************************
Welcome to the basics of hacking III: Data General computers.
Data General is favored by large corporations who need to have a lot of
data on-line. The Data General AOS, which stands for Advance on of
bastardized UNIX. All the commands which were in the UNIX article, will
work on a Data General. Once again, we have the problem of not knowing
the format for the login name on the Data General you want to hack. As
seems to be standard, try names from one to 8 digits long. Data General
designed the computer to be for businessmen, and is thus very simplistic,
and basically fool proof (but not damn fool proof). It follows the same
login format as the unix system:
DG=> login:
DG=> password:
YOU=> password
Passwords can be a maximum of 8 characters, and they are almost always
set to a default of 'AOS' or 'DG'. (any you know about businessmen...)
A word about control characters:
Ctrl-O stops massive print-outs to the screen, but leaves you in whatever
mode you were. (A technical word on what this actually does: It tells the
CPU to ignore the terminal, and prints everything out to the CPU! This is
about 19200 baud, and so it seems like it just cancels.) Ctrl-U kills the
line you are typing at the time. Now for the weird one: Ctrl-C tells the
CPU to stop, and wait for another ctrl character. To stop a program,
you actually need to type Ctrl-C and then a Ctrl-B.
Once you get on, type 'HELP'. Many DG (Data General) computers are sold
in a package deal, which also gets the company free customizing. So you never
know what commands there might be. So we will follow what is known as the
you are using, type
=> DIR
To run a program, just like on a DEC, just type its name. Other than this,
and running other people's programs, there really isn't a standard...
*** HARK, yon other system users ***
To see who is on, type => WHO remember?). This shows the other users,
what they are doing, and what paths they are connected across. This
is handy, so try a few of those paths yourself. To send a message, say
=> send username
This is a one time message, just like send on the DEC 10. From here on, try
commands from the other previous files and from the 'HELP' listing.
superuser:
If you can get privs, just say:
=> superuser on
and you turn those privs on!
By the way, you remember that computers keep a log of what people do? type:
=> syslog /stop
and it no longer records anything you do on the system, or any of the other
users. It screams to high heaven that it was you who turned it off, but it
keeps no track of any accounts created or whatever else you may do. You can
say=> syslog /start
to turn it back on (now why would you want to do something like that?????)
To exit from the system, type=> BYE and the system will hang up on you.
Most of the systems around, including DECs, VAX's, and DG's, have games.
These are usually located in a path or directory of the name games or <games>
or games: Try looking in them, and you might find adventure, zork, wumpus
(with bent arrows in hand) or a multitude of others. There may also be
games called 'CB' or 'FORUM'. These are a sort of computer conference call.
Use them on weekends, and you can meet all sorts of interesting people.
If you would like to see more articles on hacking (this time far more than
just the basics), or maybe articles on networks and such, then leave us mail
if we are on the system, or have the sysop search us down. We call a lot
of places, and you may just find us.
***************************************
***************************************
This completes the series of articles on hacking...
The Basics of Hacking: Introduction
The Basics of Hacking I: DEC's
The Basics of Hacking II: VAX's (UNIX)
The Basics of Hacking III: DG's
***************************************
***************************************
This and the previous articles by:
The Knights of Shadow
***************************************
***************************************
.
This page created by ng2html v1.05, the Norton guide to HTML conversion utility.
Written by Dave Pearson