home *** CD-ROM | disk | FTP | other *** search
- ftp> get uxu-004.txt -
-
- <><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>
- #% ..uXu.. 1991 #%
- %# Underground eXperts United %#
- #% presents... #%
- %# -=*=- %#
- #% The European Digest Series Vol.1 Issue #4 #%
- %# 1991 By THE CHIEF ..uXu.. %#
- <><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>
-
- SPECIAL MANUAL ISSUE - SCO XENIX System V TUTORIAL CHAPTER #1
-
- Contents...
-
- 01.............Introduction
- 02.............Contents In Chapter One
- 03.............Xenix Tutorial Chapter One
- 04.............Recommended
- 05.............End Comments
-
-
-
-
-
- 1. INTRODUCTION
- ---------------
- Welcome to TED Vol.1, Issue #4! - The uXu File #4.
- The SCO Xenix System V Tutorial Manual seems to be a nice start to knowing
- The Xenix operating System. As you might know, Xenix is very similar to
- Unix (it is a bi-product of unix), and by knowing a bit about Xenix helps
- you in your knowledge for unix as well. This is The Xenix Tutorial Manual
- and is not altered, changed or revised in any way, except for personal comments
- throughout the text shown like this: (* comment *). This Xenix Manual Series
- will cover all SCO Xenix System V manuals. After the Tutorial Manual, comes
- the Xenix User's Guide. Then it's time for the Xenix System Administrator's
- Guide followed by The Xenix User's Reference. Enjoy!
-
-
-
- 2. CONTENTS IN CHAPTER ONE
- --------------------------
-
- 1.0 INTRODUCTION
- 1.1.1...Introduction
- 1.1.2...About This Tutorial
- 1.1.3...Notational Conventions
-
-
-
- 3. XENIX TUTORIAL CHAPTER ONE
- -----------------------------
-
- 1.0 INTRODUCTION 1.0
- ===============================================================================
- 1.1.1 Introduction 1.1.1 Introduction
- ===============================================================================
-
- This tutorial is an introduction to the XENIX(tm) Operating System. It is
- intended for users who have little or no familiarity with Xenix or UNIX(tm).
-
- The XENIX Operating System is distributed with over two hundred commands
- and programs. This tutorial does not explain how to use all of these. Instead,
- the commands and programs described in this tutorial are those that you will
- use most often, and those you will find most useful.
-
- The aim of this tutorial is to teach you how to do useful work on a XENIX
- system as quickly as possible. To this end, it is not necessary to provide you
- with complete information about each command described in this tutorial. For
- complete information, refer to the appropriate sections of the "XENIX User's
- Reference" and the "XENIX User's Guide", soon to be released in The European
- Digest Series.
-
- ===============================================================================
- 1.1.2 About This Tutorial 1.1.2 About This Tutorial
- ===============================================================================
-
- This tutorial is organized as follows:
-
- * Chapter 1, "Introduction," presents an overview of the contents of
- the entire tutorial, and explains how to use it.
-
- * Chapter 2, "Basic Concepts," explains the concepts that you need
- to understand to work effectively in the XENIX environment. The
- chapters that follow presuppose an understanding of the material
- presented in this chapter.
-
- * Chapter 3, "Logging In," explains how to log in to the system,
- how to keep your account secure, how to edit the login prompt and
- how to enter XENIX commands.
-
- * Chapter 4, "Working With Files And Directories," explains how to
- perform some of the basic tasks involving files and directories.
- This chapter explains how to create files and directories, how to
- move, copy, delete, and rename files and directories. The chapter
- also explains how to use various XENIX text processing utilities,
- and how to use access permissions with files and directories.
-
- * Chapter 5, "Housekeeping," explains how to use the XENIX
- "housekeeping" utilities. This chapter explains how to create
- backups, how to copy diskettes, how to get information about the
- status of the system, and how to place commands in the back-
- ground. The chapter also contains a brief discussion of XENIX
- shell programming.
-
- * Chapter 6, "XENIX Desktop Utilities," explains how to use the
- XENIX desktop utilities. This chapter explains how to use the
- automatic reminder service, how to communicate with other users
- on the system and how to use the system calculator.
-
- The best way to use this tutorial is to begin by reading chapter 2. This
- will provide you with the background information that you need in order to
- understand the material presented in subsequent chapters. You should then
- read chapters 3 through 6. If you have the XENIX operating system running on
- a "you-are-welcome-to-use-it" computer, have it ready for entering commands
- as instructed in the examples of these chapters.
-
- Each section of each chapter is a self-contained unit. You do not have to
- read previous sections in order to understand the material presented in any
- particular section. If you only need to know how to perform a specific task,
- for example, if you already know how to create text files but you do not know
- how to print them, you can turn to the section of the chapter that explains
- how to perform that task. In this case, you can turn to section 4.4 of chapter
- 4. You do not have to read sections 4.1 through 4.3 in order to understand
- the material presented in section 4.4.
-
- ===============================================================================
- 1.1.3 Notational Conventions 1.1.3 Notational Conventions
- ===============================================================================
-
- This tutorial uses the following notational conventions:
-
- * Examples in the text are marked by single line lines. (-------)
-
- * Commands that you enter are written within < >.
-
- * Directories and Filenames are written within [ ].
-
- * Keys to be pressed are written with BIG LETTERS. For example, the
- Return key is represented by:
-
- RETURN
-
- * Key combinations are written with a First Big Letter.
- An example is:
-
- Ctrl-d
-
- When you see a key combination, you are supposed to hold down
- the first key and press the second key. In this example, you should
- hold down the Control key and press the d key.
-
- * An uppercase letter in parentheses is often appended to command
- names, as in:
-
- touch(C)
-
- The letter in parentheses refers to the section of the XENIX User's
- Reference that contains complete information on the command.
-
-
-
- 4. RECOMMENDED
- --------------
- This section is included in every issue of The European Digest and will
- contain recommended stuff/boards/reading and so on. For this file,
- A couple of Hacker Books & 'Zines.
-
- ------------------------------------------------------------------------------
- BOOKS BOOKS
- ------------------------------------------------------------------------------
- The Cuckoo's Egg by Cliff Stoll.
- ----------------
- Cliff Stoll's Story about the German Hacker that almost made it
- and an interesting viewpoint on Security. Nice Story with a terrible end.
-
- The Computer Underground by M. Harry.
- ------------------------
- Contains a few funnies, though the book is old nowadays. Viewpoints on
- Hackers, how to hack, various networks & dialin-listings, hack-program
- listings and the general stuff. Also has a few items on pirates. Many
- Gfile-reprints.
-
- The Inner Circle by Bill Landreth
- ----------------
- Bill Landreth on Computer Security. Ex-hacker Landreth shows the weak
- spots of your system and tells about his up and downfall. Kinda neat.
-
- ------------------------------------------------------------------------------
- 'ZINES 'ZINES
- ------------------------------------------------------------------------------
- Phrack Inc. - All Issues. The Best 'zine ever produced, now as 'Classic'.
- Issues Available: 00 - 33 (Classic issues available)
-
- Computer Underground Digest - Covers the most in the Underground scene.
- Issues Available: 1.00 - 3.31 (very active)
-
- The Syndicate Report - If you're looking for news, you'll find it here!
- Issues Available: 01 - 28 (not active anymore)
-
- cDc Communications - Funniest! All Subjects covered! Nice Stories! Great!
- Issues Available: 01 - 193 (very active)
- ------------------------------------------------------------------------------
-
- 5. END COMMENTS
- ---------------
-
- Well, chapter one isn't that long, but it's a start anyways. I hope this will
- encourage you to get the rest of the series, because in the next chapter,
- chapter two, the tutorial begins. I also want to state that the series is meant
- for the complete Xenix beginner. Those of you who have unix/xenix experience
- and knowledge already, could perhaps keep the series as a reference guide.
-
- The European Digest will not feature Hacking techniques, Phreaking, Carding,
- information about government systems or the basic underground rap. It will
- be different. It IS different. Manuals, The Underground Scene, Deep Deep
- whatever, and so on. Less 'general rag stuff' and More Miscellaneous stuff.
- Swedish Hacker News will be presented through the 'uXu - Swedish News' series,
- but ONLY in Swedish. English translations will however be published in other
- well-known underground rags, as contributions.
-
- Check out the Next TED for Chapter Two in the SCO Xenix System V Tutorial.
-
- You can reach me on the following boards for comments, contributions,
- questions or whatever:
-
- Condemned Reality [618-397-7702]
- Land Of Karrus [215-948-2132]
- Demon Roach Underground [806-794-4362]
- Balanced pH [818-783-5320]
- Info Addict [+46-###-####]
-
-
- The Chief 1991
-
- %&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&
- % %
- & "Congress shall make no law respecting an establishment of religion, or &
- % prohibiting the free exercise thereof; or abridging the freedom of %
- & speech or of the press; or of the right of the people peaceably to &
- % assemble, and to petition the Government for a redress of grievances." %
- & &
- % This work is released according to the above Constitutional rights %
- & for INFORMATIONAL PURPOSES ONLY. &
- % %
- &%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
-