Essay On Hacking Essay Research Paper In

Free Articles

Essay On Hacking Essay, Research Paper

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In the undermentioned file, all mentions made to the name Unix, may besides be

substituted to the Xenix operating system.

Brief history: Back in the early 1960ss, during the development of 3rd

coevals computing machines at MIT, a group of coders analyzing the potency of

computing machines, discovered their ability of executing two or more undertakings

at the same time. Bell Labs, taking notice of this find, provided financess for

their developmental scientists to look into into this new frontier. After

about 2 old ages of developmental research, they produced an operating system they

called & # 8220 ; Unix & # 8221 ; .

Sixtiess to Current: During this clip Bell Systems installed the Unix system

to supply their computing machine operators with the ability to multitask so that they

could go more productive, and efficient. One of the systems they put on the

Unix system was called & # 8220 ; Elmos & # 8221 ; . Through Elmos many undertakings ( i.e. charge, and

installing records ) could be done by many people utilizing the same mainframe.

Note: Cosmos is accessed through the Elmos system.

Current: Today, with the development of micro computing machines, such multitasking

can be achieved by a scaled down version of Unix ( but merely as powerful ) .

Microsoft, seeing this development, opted to develop their ain Unix like system

for the IBM line of PC/XT & # 8217 ; s. Their consequence they called Xenix ( pronounced

zee-nicks ) . Both Unix and Xenix can be easy installed on IBM PC & # 8217 ; s and offer

the same maps ( merely 2 different sellers ) .

Note: Due to the many different versions of Unix ( Berkley Unix, Bell System

III, and System V the most popular ) many bids following may/may non work. I

have written them in System V modus operandis. Unix/Xenix runing systems will be

considered indistinguishable systems below.

How to state if/if non you are on a Unix system: Unix systems are quite common

systems across the state. Their security appears as such:

Login ; ( or login ; )

watchword:

When choping on a Unix system it is best to utilize small letter because the Unix

system bids are all done in lower- instance.

Login ; is a 1-8 character field. It is normally the name ( i.e. joe or fred )

of the user, or initials ( i.e. j.jones or f.wilson ) . Hints for login names can

be found junking the location of the dial-up ( utilize your CN/A to happen where the

computing machine is ) .

Password: is a 1-8 character watchword assigned by the sysop or chosen by the

user.

Common default logins

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;

login ; Password:

root root, system, etc..

sys sys, system

devil devil

uucp uucp

tty tty

trial trial

unix UNIX

bin bin

adm adm

who who

learn learn

uuhost uuhost

nuucp nuucp

If you guess a login name and you are non asked for a pas

blade, and have

accessed to the system, so you have what is known as a non-gifted history. If

you guess a right login and pass- word, so you have a user history. And,

if you guess the root watchword, so you have a & # 8220 ; super-user & # 8221 ; history. All Unix

systems have the following installed to their system: root, sys, bin, devil,

uucp, adm

Once you are in the system, you will acquire a prompt. Common prompts are:

$

%

#

But can be merely about anything the sysop or user wants it to be.

Thingss to make when you are in: Some of the bids that you may desire to seek

follow below:

who is on ( shows who is presently logged on the system. )

write name ( name is the individual you wish to chew the fat with )

To go out chat mode attempt ctrl-D.

EOT=End of Transfer.

cubic decimeter -a ( list all files in current directory. )

du -a ( checks sum of memory your files use ; disk use )

cdname ( name is the name of the sub-directory you choose )

cadmium ( brings your place directory to current usage )

cat name ( name is a file name either a plan or documentation your username

has written )

Most Unix plans are written in the C linguistic communication or Pascal since Unix is a

coders & # 8217 ; environment.

One of the first things done on the system is print up or gaining control ( in a

buffer ) the file incorporating all user names and histories. This can be done by

making the undermentioned bid:

cat /etc/passwd

If you are successful you will a list of all histories on the system. It

should look like this:

root: hvnsdcf:0:0: root dir: / :

joe: majdnfd:1:1: Joe Cool: /bin: /bin/joe

hal: :1:2: Hal Smith: /bin: /bin/hal

The & # 8220 ; root & # 8221 ; line tells the undermentioned info:

login name=root

hvnsdcf = encrypted watchword

0 = user group figure

0 = user figure

root dir = name of user

/ = root directory

In the Joe login, the last portion & # 8220 ; /bin/joe & # 8221 ; Tells us which directory is his

place directory ( joe ) is.

In the & # 8220 ; hal & # 8221 ; illustration the login name is followed by 2 colons, that means that

there is no watchword needed to acquire in utilizing his name.

Decision: I hope that this file will assist other novice Unix hackers obtain

entree to the Unix/Xenix systems that they may happen. There is still broad growing

in the hereafter of Unix, so I hope users will non mistreat any systems ( Unix or any

others ) that they may go on across on their journey across the electronic

main roads of America. There is much more to be learned about the Unix system

that I have non covered. They may be found by purchasing a book on the Unix System

( how I learned ) or in the hereafter I may compose a portion II to this & # 8230 ; & # 8230 ; ..

Bibliography

* Essay On *

* H A C K I N G *

* *

* U N I X *

* *

* By Jester Sluggo *

* Written 10/08/85

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out