home *** CD-ROM | disk | FTP | other *** search
- ***************************************
- ***************************************
- ** **
- ** Hacking III: Data **
- ** General **
- ** **
- ***************************************
- ***************************************
- Welcome to the basics of hacking III:
- Data General computers. Data General
- is favored by large corporations who
- need to have a lot of data on-line.
- The Data General AOS, which stands for
- Advanced Operating System, is a version
- of bastardized UNIX. All the commands
- which were in the UNIX article, will
- work on a Data General.
- Once again, we have the problem of not
- knowing the format for the login name
- on the Data General you want to hack.
- As seems to be standard, try names from
- one to 8 digits long. Data General
- designed the computer to be for busi-
- nessmen, and is thus very simplistic,
- and basically fool proof (but not damn
- fool proof). It follows the same login
- format as the unix system:
- DG=> login:
- DG=> password:
- YOU=> password
- Passwords can be a maximum of 8
- characters, and they are almost always
- set to a default of 'AOS' or 'DG'.
- (any you know about businessmen...)
- A word about control characters:
- Cntrl-O stops massive print-outs to
- the screen, but leaves you in whatever
- mode you were. (A technical word on
- what this actually does: It tells the
- CPU to ignore the terminal, and prints
- everything out to the CPU! This is
- about 19200 baud, and so it seems like
- it just cancels.) Cntrl-U kills the
- line you are typing at the time. Now
- for the weird one: Cntrl-C tells the
- CPU to stop, and wait for another
- cntrl character. To stop a program,
- you actually need to type Cntrl-C and
- then a Cntrl-B.
- Once you get on, type 'HELP'. Many
- DG (Data General) computers are sold
- in a package deal, which also gets the
- company free customizing. So you never
- know what commands there might be. So
- we will follow what is known as the
- 'ECLIPSE STANDARD', or what it comes
- out of the factory like.
- To find out the files on the directory
- you are using, type => DIR
- To run a program, just like on a DEC,
- just type its name. Other than this,
- and running other people's programs,
- there really isn't a standard...
- *** HARK, yon other system users ***
- To see who is on, type => WHO
- remember?). This shows the other
- users, what they are doing, and what
- paths they are connected across. This
- is handy, so try a few of those paths
- yourself. To send a message, say
- => send username
- This is a one time message, just like
- send on the DEC 10. From here on, try
- commands from the other previous files
- and from the 'HELP' listing.
- superuser:
- If you can get privs, just say:
- => superuser on
- and you turn those privs on!
- By the way, you remember that computers
- keep a log of what people do? type:
- => syslog /stop
- and it no longer records anything you
- do on the system, or any of the other
- users. It screams to high heaven that
- it was you who turned it off, but it
- keeps no track of any accounts created
- or whatever else you may do. You can
- say=> syslog /start
- to turn it back on (now why would you
- want to do something like that?????)
- To exit from the system, type=> BYE
- and the system will hang up on you.
- ***************************************
- Most of the systems around, including
- DECs, VAX's, and DG's, have games.
- These are usually located in a path or
- directory of the name games or <games>
- or games: Try looking in them, and you
- may find some trek games, adventure,
- zork, wumpus (with bent arrows in hand)
- or a multitude of others. There may
- also be games called 'CB' or 'FORUM'.
- These are a sort of computer conference
- call. Use them on weekends, and you
- can meet all sorts of interesting
- people.
- ***************************************
- ***************************************
- If you would like to see more articles
- on hacking (this time far more than
- just the basics), or maybe articles on
- networks and such, then leave us mail
- if we are on the system, or have the
- sysop search us down. We call a lot
- of places, and you may just find us.
- ***************************************
- ***************************************
- This completes the series of articles
- on hacking... These articles were:
- The Basics of Hacking: Introduction
- The Basics of Hacking I: DEC's
- The Basics of Hacking II: VAX's (UNIX)
- The Basics of Hacking III: DG's
- ***************************************
- ***************************************
- This and the previous articles by:
- The Knights of Shadow
- ***************************************
- ***************************************
-
-