home *** CD-ROM | disk | FTP | other *** search
-
- Title: Introduction To Hacking - Part #4
- Date: 4/29/88
- Time: 11:19 am
-
-
-
- ***************************************
- ** The basics of hacking iii: data **
- ***************************************
-
- Welcome to the basics of hacking iii: data general computers.
-
- Data general is favored by large corporations who need to have a lot of
- data on-line. The data general aos, which stands for advanced operating
- system, is a version of bastardized unix. All the commands which were in the
- unix article, will work on a data general. Once again, we have the problem
- of not knowing the format for the login name on the data general you want to
- hack. As seems to be standard, try names from one to 8 digits long. Data
- general designed the computer to be for busi- nessmen, and is thus very
- simplistic, and basically fool proof (but not damn fool proof). It follows
- the same login format as the unix system: dg=> login: you=> username dg=>
- password: you=> password passwords can be a maximum of 8 characters, and they
- are almost always set to a default of 'aos' or 'dg'. (Any you know about
- businessmen...) A word about control characters: cntrl-o stops massive print-
- outs to the screen, but leaves you in whatever mode you were. (A technical
- word on what this actually does: it tells the cpu to ignore the terminal,
- and prints everything out to the cpu! This is about 19200 baud, and so it
- seems like it just cancels.) Cntrl-u kills the line you are typing at the
- time. Now for the weird one: cntrl-c tells the cpu to stop, and wait for
- another cntrl character. To stop a program, you actually need to type
- cntrl-c and then a cntrl-b. Once you get on, type 'help'. Many dg (data
- general) computers are sold in a package deal, which also gets the company
- free customizing. So you never know what commands there might be. So we
- will follow what is known as the 'eclipse standard', or what it comes out
- of the factory like. To find out the files on the directory you are using,
- type => dir to run a program, just like on a dec, just type its name. Other
- than this, and running other people's programs, there really isn't a standard.
- *** Hark, yon other system users *** to see who is on, type => who (and a
- lot of the other unix commands, remember?). This shows the other users, what
- they are doing, and what paths they are connected across. This is handy, so
- try a few of those paths yourself. To send a message, say => send username
- this is a one time message, just like send on the dec 10. From here on, try
- commands from the other previous files and from the 'help' listing. Superuser:
- if you can get privs, just say: => superuser on and you turn those privs on!
- By the way, you remember that computers keep a log of what people do? Type:=>
- syslog /stop and it no longer records anything you do on the system, or any of
- the other users. It screams to high heaven that it was you who turned it off,
- but it keeps no track of any accounts created or whatever else you may do.
- You can say=> syslog /start to turn it back on (now why would you want to
- do something like that?????) To exit from the system, type=> bye and the
- system will hang up on you. Most of the systems around, including decs,
- vax's, and dg's, have games. These are usually located in a path or directory
- of the name games or <games> or games: try looking in them, and you may find
- some trek games, adventure, zork, wumpus (with bent arrows in hand) or a
- multitude of others. There may also be games called 'cb' or 'forum'. These
- are a sort of computer conference call. Use them on weekends, and you can
- meet all sorts of interesting people.
-
- *************************************** *************************************
-
- If you would like to see more articles on hacking (this time far more than
- just the basics), or maybe articles on networks and such, then leave us mail
- if we are on the system, or have the sysop search us down. We call a lot of
- places, and you may just find us.
-
- This completes the series of articles on hacking... These articles were: the
- basics of hacking: introduction the basics of hacking i: dec's the basics of
- hacking ii: vax's (unix) the basics of hacking iii: dg's
-
-
- This and the previous articles by: The Knights Of Shadow
-
- [end] 1984
-
- Note for more information on these articles leave email to :
-
- The Knights of Shadow on the PPS SuperSystem (206) 783-9798
- [25] count 'em [25] Megs!
-
-
-
- The Alternate Universe BBS - [718] 326-0720
-
-