Полнотекстовый поиск:
Где искать:
только в названии
только в тексте
слова в тексте
только заголовок

Рекомендуем ознакомиться

Остальные работы->Реферат
============================================================ Medicine: “Microsurgery: Sew Small” Uploaded: March 1, 1987 ———————————————————— A man ca...полностью>>
Остальные работы->Реферат
John Wilkes Booth, born May 10, 1838, was an actor who performed throughout the country in many plays. He was the lead in some of William Shakespeare’...полностью>>
Остальные работы->Реферат
John JayEnglishGoldman5/6/99Animal Farm Animal Farm is a fable–a story usually having a moral, in which beasts talk and act like men and women. Orwell...полностью>>
Остальные работы->Реферат
?Miss Emily?s house was left, lifting its stubborn and coquettish decay above the cotton wagons and the gasoline bumps-an eyesore among eyesores?(3 )....полностью>>

Главная > Реферат >Остальные работы

Сохрани ссылку в одной из сетей:

Essay On Hacking Essay, Research Paper

In the following file, all references made to the name Unix, may also be

substituted to the Xenix operating system.

Brief history: Back in the early sixties, during the development of third

generation computers at MIT, a group of programmers studying the potential of

computers, discovered their ability of performing two or more tasks

simultaneously. Bell Labs, taking notice of this discovery, provided funds for

their developmental scientists to investigate into this new frontier. After

about 2 years of developmental research, they produced an operating system they

called “Unix”.

Sixties to Current: During this time Bell Systems installed the Unix system

to provide their computer operators with the ability to multitask so that they

could become more productive, and efficient. One of the systems they put on the

Unix system was called “Elmos”. Through Elmos many tasks (i.e. billing,and

installation records) could be done by many people using the same mainframe.

Note: Cosmos is accessed through the Elmos system.

Current: Today, with the development of micro computers, such multitasking

can be achieved by a scaled down version of Unix (but just as powerful).

Microsoft,seeing this development, opted to develop their own Unix like system

for the IBM line of PC/XT’s. Their result they called Xenix (pronounced

zee-nicks). Both Unix and Xenix can be easily installed on IBM PC’s and offer

the same functions (just 2 different vendors).

Note: Due to the many different versions of Unix (Berkley Unix, Bell System

III, and System V the most popular) many commands following may/may not work. I

have written them in System V routines. Unix/Xenix operating systems will be

considered identical systems below.

How to tell if/if not you are on a Unix system: Unix systems are quite common

systems across the country. Their security appears as such:

Login; (or login;)


When hacking on a Unix system it is best to use lowercase because the Unix

system commands are all done in lower- case.

Login; is a 1-8 character field. It is usually the name (i.e. joe or fred)

of the user, or initials (i.e. j.jones or f.wilson). Hints for login names can

be found trashing the location of the dial-up (use your CN/A to find where the

computer is).

Password: is a 1-8 character password assigned by the sysop or chosen by the


Common default logins


login; Password:

root root,system,etc..

sys sys,system

daemon daemon

uucp uucp

tty tty

test test

unix unix

bin bin

adm adm

who who

learn learn

uuhost uuhost

nuucp nuucp

If you guess a login name and you are not asked for a password, and have

accessed to the system, then you have what is known as a non-gifted account. If

you guess a correct login and pass- word, then you have a user account. And,

if you guess the root password, then you have a “super-user” account. All Unix

systems have the following installed to their system: root, sys, bin, daemon,

uucp, adm

Once you are in the system, you will get a prompt. Common prompts are:




But can be just about anything the sysop or user wants it to be.

Things to do when you are in: Some of the commands that you may want to try

follow below:

who is on (shows who is currently logged on the system.)

write name (name is the person you wish to chat with)

To exit chat mode try ctrl-D.

EOT=End of Transfer.

ls -a (list all files in current directory.)

du -a (checks amount of memory your files use;disk usage)

cd\name (name is the name of the sub-directory you choose)

cd\ (brings your home directory to current use)

cat name (name is a filename either a program or documentation your username

has written)

Most Unix programs are written in the C language or Pascal since Unix is a

programmers’ environment.

One of the first things done on the system is print up or capture (in a

buffer) the file containing all user names and accounts. This can be done by

doing the following command:

cat /etc/passwd

If you are successful you will a list of all accounts on the system. It

should look like this:

root:hvnsdcf:0:0:root dir:/:

joe:majdnfd:1:1:Joe Cool:/bin:/bin/joe

hal::1:2:Hal Smith:/bin:/bin/hal

The “root” line tells the following info :

login name=root

hvnsdcf = encrypted password

0 = user group number

0 = user number

root dir = name of user

/ = root directory

In the Joe login, the last part “/bin/joe ” tells us which directory is his

home directory (joe) is.

In the “hal” example the login name is followed by 2 colons, that means that

there is no password needed to get in using his name.

Conclusion: I hope that this file will help other novice Unix hackers obtain

access to the Unix/Xenix systems that they may find. There is still wide growth

in the future of Unix, so I hope users will not abuse any systems (Unix or any

others) that they may happen across on their journey across the electronic

highways of America. There is much more to be learned about the Unix system

that I have not covered. They may be found by buying a book on the Unix System

(how I learned) or in the future I may write a part II to this……..


* Essay On *

* H A C K I N G *

* *

* U N I X *

* *

* By Jester Sluggo *

* Written 10/08/85

Загрузить файл

Похожие страницы:

  1. Essay On Hacking Essay Research Paper Essay

    Реферат >> Остальные работы
    Essay On Hacking by Philip Smith A topic that ... simply put a constant beep in you computer speakers or it ... to take over because in chat rooms there is ... one person in control. This person has ... side overload with commands which in end, makes their computer ...
  2. Hacking Essay Research Paper Hacking By Annonymous

    Реферат >> Остальные работы
    Hacking Essay, Research Paper Hacking By: Annonymous Computer hackers in today’s world are becoming ... this and is working on making harsher laws to, ... . Hackers will read up on the different programs. They ... and hacks into them, they can reek havoc on the ...
  3. Hacking Essay Research Paper HackingContents

    Реферат >> Остальные работы
    Hacking Essay, Research Paper Hacking Contents ~~~~~~~~ This file will ... currently working except in the broadest sense (I’m working on a UNIX, or a ... taking the data you enter in on the PAD you dialed ... of everyone on the system before logging in with the ...
  4. Hacking Essay Research Paper Hacking has been

    Реферат >> Остальные работы
    Hacking Essay, Research Paper Hacking has been developed ... of hacking, very little research has been done on the hacking world ... -criminal. Although hacking is a growing trend in our society, ... of Cyber Terrorists. Also in many government organizations, they ...
  5. Hacking Essay Research Paper There are two

    Реферат >> Остальные работы
    Hacking Essay, Research Paper There are two different worlds of computer enthusiasts, that of hacking ... hackers who are merely on a quest for knowledge, ... and helping those employed in the computer security field ... who simply attack software on their own systems ...

Хочу больше похожих работ...

Generated in 0.0017421245574951