Copy Link
Add to Bookmark
Report

Underground eXperts United File 021

  


<><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>
#% ..uXu.. 1991 %#
%# Underground eXperts United #%
#% presents... %#
%# -=*=- #%
#% The European Digest Series Vol.1 Issue #6 %#
%# 1991 By THE CHIEF ..uXu.. #%
<><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>

SPECIAL MANUAL ISSUE - SCO XENIX System V TUTORIAL CHAPTER #3

Contents...

01.............Introduction
02.............Contents In Chapter Three
03.............Xenix Tutorial Chapter Three
04.............Recommended
05.............End Comments




1. INTRODUCTION
---------------
Welcome to TED Vol.1 Issue #6 - The uXu File #21!
Yes, it IS the third chapter in the Xenix Tutorial series. This time,
security is the main content, and as stated in previous issues, this
is for the beginner. You can easily understand what's been written
in here, and I think that's good, information must be shared!
The End Comments this time, deals with views of the new Phrack Inc.
issues. Recommended have some nice Drinks for you to try out while
getting through this file <grin>. The next Xenix Tutorial will be
a huge file, really Big! What it is about? Check out the next issue
of The European Digest!


2. CONTENTS IN CHAPTER THREE
----------------------------

CHAPTER 3

Logging In
_________________________________________________________________________


3.1 Introduction

3.2 Gaining Access To The System

3.2.1 Logging In
3.2.2 Logging Out
3.2.3 Changing Your Password

3.3 Keeping Your Account Secure

3.3.1 Password Security
3.3.2 Good Security Habits
3.3.3 Using Another User's Account

3.4 Changing Your Terminal Type

3.5 Entering Commands

3.5.1 Entering A Command Line
3.5.2 Erasing A Command Line
3.5.3 Halting Screen Output




3. XENIX TUTORIAL CHAPTER THREE
-------------------------------

_______________________________________________________________________________

3.1 INTRODUCTION 3.1
_______________________________________________________________________________

This chapter explains how to perform the following basic tasks on a
XENIX system:


* Log in to the system,

* Log out of the system,

* Change your password,

* Use another user's account,

* Reset your terminal type,

* Enter a XENIX command,

* Erase an incorrect command line,

* Stop and start screen output.


This chapter is designed as a tutorial. The best way to use this chapter
is to read it at your terminal, entering commands as instructed in the exam-
ples.

None of the commands described in this chapter is described in great
detail. For a complete explanation of each command, refer to the XENIX
USER'S REFERENCE (soon to be published also by uXu).

_______________________________________________________________________________

3.2 GAINING ACCESS TO THE SYSTEM 3.2
_______________________________________________________________________________

To use the XENIX system, you must first gain access to it by logging in.
When you log in, you are placed in your home directory. Logging in, changing
your password, and logging out are described below.

_______________________________________________________________________________

3.2.1 LOGGING IN 3.2.1
_______________________________________________________________________________

Before you can log into the system, you must be given a system "account."
In most cases, your account is created for you by your system administrator.
However, if you need to create the account yourself, refer to the XENIX
SYSTEM ADMINISTRATOR's GUIDE (soon to be published also by uXu) for
information on creating user accounts. This section assumes that your account
has already been created.

Normally, the system sits idle and the prompt "login:" appears on the
terminal screen. If your screen is blank or displays nonsense characters,
press the [INTERRUPT] key a few times. On most keyboards, the [INTERRUPT]
key is the [DEL] key.

When the "login:" prompt appears, follow these steps:


1. Enter your login name and press [RETURN]. If you make a mistake
as you type, press [CTRL-u] to start the line again (hold down
the [CTRL] key and press the [u] key). After you press [RETURN],
"Password:" appears on your screen.

2. Enter your password and press [RETURN]. The letters of your
password do not appear on the screen as you enter them, and
the cursor does not move. This is to prevent other users from
learning your password. If you enter your login name or password
incorrectly, the system displays the following message:


Login incorrect
login:


If you get this message, enter your login name and password again.

3. Depending on how your system is configured, you may or may not
be prompted to enter your terminal type. If you are prompted for
your terminal type, you see a line like the following:


TERM=(unknown)


Enter your terminal type if you see this line. (If you are not
sure how to specify your terminal type, contact your system
administrator.)

Once you have entered all the correct information, the "prompt character"
appears on the screen. This is a dollar sign ($) for Bourne Shell users and
a percent sign (%) for C-shell users. The prompt tells you that the XENIX
system is ready to accept commands from the keyboard.

Depending on how your system is configured, you may also see a "message
of the day" after you log in.

_______________________________________________________________________________

3.2.2 LOGGING OUT 3.2.2
_______________________________________________________________________________

The simplest way to log out is to enter <logout> at the % prompt for C-shell
users, or <exit> at the $ prompt for Bourne Shell users. You might also be
able to logout by pressing [CTRL-d] at the prompt. However, some systems are
configured to prevent logout with [CTRL-d]. The reason for this is that
[CTRL-d] signifies the end-of-file in XENIX, and it is often used within
programs to signal the end of input from the keyboard. Since people sometimes
make the mistake of pressing [CTRL-d] several times, they often find
themselves unintentionally logged out of the system. To prevent this, system
administrators may disable logout with [CTRL-d].

Familiarize yourself with the logout procedure by pressing [CTRL-d], if you
are currently logged in. If this does not work, log out by entering <logout>
(C-shell) or <exit> (Bourne Shell). If you are not logged in, log in and then
log out, experimenting with [CTRL-d] and with <logout> or <exit>.

_______________________________________________________________________________

3.2.3 CHANGING YOUR PASSWORD 3.2.3
_______________________________________________________________________________

To prevent unauthorized users from gaining access to the system, each
authorized user can be given a password. When you are first given an account
on a XENIX system, you are assigned a password by the system administrator.
Some XENIX systems require you to change your password at regular intervals.
Whether yours does or not, it is a good idea to change your password
regularly (at least once every two months) to maintain system security.

Use the <passwd> command to change your password. Follow these steps:

1. Enter the following command and press [RETURN]

<passwd>

You see:

Changing password for [user]
Old password:

Your login name appears in place of [user].

2. Carefully enter your old password. It is not displayed on
the screen. If you make a mistake, press [RETURN]. The
message "Sorry" appears, then the system prompt. Begin
again with step 1.

3. The following message appears after you enter your old password
and press [RETURN]:

New password:

Enter your new password and press [RETURN]. It is generally
a good idea to use a combination of numbers and lower-case and
upper-case letters in your password.

4. You see the following message:

Re-enter new password:

Enter your new password again. If you make a mistake, you see
the following message:

They don't match; try again

Begin again with step 1 if you see this message.

When you complete the procedure, the XENIX prompt reappears. The next time
you log in, you must enter your new password.

_______________________________________________________________________________

3.3 KEEPING YOUR ACCOUNT SECURE 3.3
_______________________________________________________________________________

Security is ultimately the responsibility of the user. The careless use and
maintenance of passwords represents the greatest threat to the security of a
computer system.

_______________________________________________________________________________

3.3.1 PASSWORD SECURITY 3.3.1
_______________________________________________________________________________

Here are some specific guidelines for passwords:


1. Don't use passwords that are easy to guess. Passwords should
be at least six characters long and include letters, digits,
and punctuation marks. (Example: frAiJ6*)

2. Passwords should not be names (even nicknames), proper nouns
or any word found in [/usr/dict/words]. (Don't use a password
like: terry9)

3. Always keep your password secret. Passwords should never be
written down, sent over electronic mail, or verbally
communicated. (Treat it like the PIN number for your instant
teller card.)

_______________________________________________________________________________

3.3.2 GOOD SECURITY HABITS 3.3.2
_______________________________________________________________________________

There are simple, good security habits. Here are some general guidelines:

1. Remember to log out before leaving a terminal.

2. Use the <lock>(C) utility when you leave your terminal,
even for a short time.

3. Make certain that sensitive files are not publicly readable.
(See the discussion of file and directory permissions in
Chapter 4 of this tutorial for information on how to do this.)

4. Keep any floppies or tapes containing confidential data
(program source, database backups) under lock and key.

5. If you notice strange files in your directories, or find other
evidence that your account has been tampered with, tell your
system administrator.

_______________________________________________________________________________

3.3.3 USING ANOTHER USER'S ACCOUNT 3.3.3
_______________________________________________________________________________

You might find it necessary to work with another user's files. However,
the permission settings on those files may prevent all but the files' owner
from editing them. To overcome this problem, you can use the <su> command to
change your current account to that of the other user. To use <su>, you must
know the other user's password.

For example, to become user joe, enter the following command at the XENIX
prompt, not at the login prompt:

<su joe>

When the password prompt appears, enter joe's password. To cancel the
effect of the <su> command and return to your own account, press [CTRL-d].

_______________________________________________________________________________

3.4 CHANGING YOUR TERMINAL TYPE 3.4
_______________________________________________________________________________

On most systems, the system console is already configured for use with
XENIX. However, serial terminals of various types can be connected to a
XENIX system. If you are working from a serial terminal, it can be important
to know how to specify your terminal type.

The terminal type is displayed each time you log in. You can change the
value of the terminal type displayed by editing the [.profile] file in your
home directory. If you are using the C-shell, you do not have a [.profile]
file. Instead, you must edit the [.login] file in your home directory.

There are at least two reasons why you might want to change the value of
the terminal type displayed:

* You might have a new terminal that is not the same model as your
old terminal. If so, the terminal type displayed by your old
[.profile] ([.login]) file will be incorrect.

* The terminal type displayed might be "unknown" or "ansi" or
another setting which is not correct for your terminal. This would
require you to type in your terminal type every time you log in. By
changing the terminal type to the setting that is correct for your
terminal, all you have to do is press [RETURN] when prompted for
your terminal type. There is no need for you to enter the terminal
type.

To change the terminal type displayed, use <vi> to edit [.profile]
([.login]). Chapter 4 of this tutorial explains how to use <vi>.

Once in <vi>, move the cursor to the line that looks like the following:


eval 'tset -m :\?unknown -s -r -Q'

Change [unknown] (or whatever the value is) in this line to the terminal
type of your terminal. For example, if you normally log in on a vt100 terminal,
you would change the line to:


eval 'tset -m :\?vt100 -s -r -Q'

Each time you log in, you would then see the message:


TERM = (vt100)

Press [RETURN] and the terminal type is set to vt100. There is no need to
enter vt100.

_______________________________________________________________________________

3.5 ENTERING COMMANDS 3.5
_______________________________________________________________________________

Before you being working with the commands described in the rest of this
tutorial, you should be familiar with three very useful XENIX features. These
are character type-ahead and the special key-combinations used to erase the
command line, and stop and start screen output. These features are discussed
below.

_______________________________________________________________________________

3.5.1 ENTERING A COMMAND LINE 3.5.1
_______________________________________________________________________________

Entering a command line consists of typing characters and then pressing
[RETURN]. Once you press [RETURN], the computer reads the command line and
executes the specified commands. No command entered on the command line is
executed until [RETURN] is pressed.

You can enter as many lines as you want without waiting for the commands to
complete their execution and for the prompt to reappear. This is because
XENIX supports character type-ahead. XENIX can hold up to 256 characters in
the kernel buffers that read keyboard input. Experiment with this type-ahead
feature by entering the following commands to finish executing.
(Always press [RETURN] after entering a command. In the following example,
press [RETURN] after entering each command.)


<lc -la>
<du -a>
<lc -Fa>

These commands generate a long listing of all the files in the current
directory, then display disk usage statistics for these files, and finally
list the files again, but in a different format.

_______________________________________________________________________________

3.5.2 ERASING A COMMAND LINE 3.5.2
_______________________________________________________________________________

Typing errors are bound to occur when you enter commands. To erase the
current command line, press [CTRL-u]. When you press [CTRL-u], a new prompt
is displayed and no command is executed.

_______________________________________________________________________________

3.5.3 HALTING SCREEN OUTPUT 3.5.3
_______________________________________________________________________________

Data often scrolls across your screen faster than you can read it. To halt
scrolling temporarily, press [CTRL-s]. To restart scrolling, press [CTRL-q].
Experiment with [CTRL-s] and [CTRL-q] by entering the following command, then
pressing [CTRL-s] to stop the output and [CTRL-q] to restart it:


<ls /bin>

_______________________________________________________________________________


4. RECOMMENDED
--------------
This section is included in every issue of The European Digest and will
contain recommended stuff/boards/reading and so on. For this file,
Drinks!

HEAVY WATER - 1/2 Rye Whiskey, 1/4 Sweet Vermouth, 1/4 Grenadine,
One drop of Orange Bitter. Shake with ice. Strain.
Chinese Receipt.

HUNTER - 2/3 Canadian Whiskey, 1/3 Peter Heering.
Shake with ice & Strain.

SMOOTHIE - 1/3 Bourbon Whiskey, 1/3 Dry Vermouth, 1/3 Grand Mariner.
Shake with ice. Strain into cocktail glass with a twist
of lemon.

LITTLE DEVIL- 1/3 Gin, 1/3 Bacardi Rum, 1/6 Cointreau, 1/6 Lemon Juice.
Shake & Strain.



5. END COMMENTS
---------------
Awesome! We have seen the light of the good old Phrack Inc. again.
Back with Two new issues since last time, with Dispater & Crimson Death
as editors. Some people say it isn't what it should have been, others
seem to like it. My personal view is that we can't compare the new
ones with the old. It would be like buying a 1969 Chevy and compare
it with a 1991 model. It can't be done. Though this isn't just because
of that there are new people writing, no, it's because there is a lot
of heavier laws, more eyes on the Underground scene, and information
aren't as easily spread today as it was only a couple of years ago.
You can get a jail-sentence for spreading information! Let's just see
what happens in future issues. Don't judge beforehand.

The European Digest will not feature Hacking techniques, Phreaking, Carding,
information about government systems or the basic underground rap. It will
be different. It IS different. Manuals, The Underground Scene, Deep Deep
whatever, and so on. Less 'general rag stuff' and More Miscellaneous stuff.
Swedish Hacker News will be presented through the 'uXu - Swedish News' series,
but ONLY in Swedish. English translations will however be published in future
issues of the well-known underground rag, Phrack Inc.

Check out the Next TED for whatever I can think of at the moment!
(probably the next chapter in the Xenix Tutorial)

You can reach me on the following boards for comments, contributions,
questions or whatever:

Condemned Reality [618-397-7702]
Lunatic Labs [213-655-0691]
Demon Roach Underground [806-794-4362]
Balanced pH [818-783-5320]
Info Addict [+46-###-####]

You can't reach me on the following boards anymore. Reason(s) stated below.

Land Of Karrus [215-D O W N ]

The Chief 1991

%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&
% %
& "Congress shall make no law respecting an establishment of religion, or &
% prohibiting the free exercise thereof; or abridging the freedom of %
& speech or of the press; or of the right of the people peaceably to &
% assemble, and to petition the Government for a redress of grievances." %
& &
% This work is released according to the above Constitutional rights %
& for INFORMATIONAL PURPOSES ONLY. &
% %
&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%

____________________________________________________________________________
____________________________________________________________________________

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT