Username: Save?
Password:
Home Forum Links Search Login Register
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
  Show Posts
Pages: 1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 27
239  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Certification Zone / Re: MCSE and Microsoft Certifications on: October 15, 2006, 07:50:24 PM
good post!! Smiley
240  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Downloads Zone / How To Download from MegaUpload? on: October 15, 2006, 01:07:37 PM
The Megaupload site will start with a 45 second timer counting down in the upper right hand corner.

Just before the 45 seconds is up a "Flash" ad will drop down and block the view.  Close the ad by clicking the X in its upper right hand corner.

The box where the counter was will then display "Click here to download".

Click in that box which then will change to say "Loading download" and wait for a Windows (or other operating system) dialog box to pop up on your screen that prompts you to download the file with a selection to "Open", "Save" or "Cancel" button.  Click the "Save" button and then the download will begin.

Earlier, while I was checking to see if the Megaupload site was working it took about 10 minutes (perhaps longer) before the "Open", "Save" or "Cancel" button popped up for me for some reason.  Usually it works almost instantly; often it requires patience. 

The Megaupload site only allows 1 (maybe 2) downloads at a time from a IP address. The site blocks more attempts than that.
241  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Downloads Zone / How To Download? Read Here on: October 15, 2006, 01:06:46 PM
HOW TO DOWNLOAD FROM RAPIDSHARE

If You see the link Download/ navigating you to any site like http://rapidshare.de/*****/*****.html, then open it with your BROWSER (not with Download Manager).


In the end of that page click button ''FREE''.
In 20-40 seconds You will see the picture with 3 symbols. Write them into the empty field and press Start Download.

Then download it with your browser. No Download Managers support. If your Download Manager always tackle the link, right mouse click on the link and ''Save as....''


ATTENTION: Downloading goes in 1 stream! No support for resuming broken aborted downloads! Download limit: 20-30 MB per hour. So if you won't see the link in 20-40 seconds - try again later. If you need to delete Cookies, go to Cookie menu in your Browser Options and click "Delete Cookies" the real words and place of this menu depends on the browser you use.
242  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / TOEFL / Re: More About TOEFL on: October 15, 2006, 12:49:36 PM
 Smiley Wink
243  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Free Proxy List October 15 2006 on: October 15, 2006, 12:46:34 PM
Proxy Servers Listed: 46    Last Update: 2006-10-15    Anonymous: 5    Transparent: 37    Other: 4
IP Port Type Country Last Test
 

203.94.93.0 80 transparent Sri Lanka 2006-10-14 Whois
24.97.174.130 80 high anonymity United States 2006-10-14 Whois
201.25.123.99 3128 transparent Brazil 2006-10-14 Whois
75.35.161.94 8080 anonymous United States 2006-10-14 Whois
200.45.54.138 3128 transparent Argentina 2006-10-14 Whois
196.1.211.2 8080 transparent Sudan 2006-10-14 Whois
165.228.132.11 80 transparent Australia 2006-10-14 Whois
200.76.36.195 3128 transparent Mexico 2006-10-14 Whois
203.106.52.102 3128 transparent Malaysia 2006-10-14 Whois
200.171.124.197 3128 transparent Brazil 2006-10-14 Whois
213.136.43.234 3128 transparent Sweden 2006-10-14 Whois
202.168.249.106 8080 transparent Banglades 2006-10-14 Whois
201.64.20.243 3128 transparent Brazil 2006-10-14 Whois
201.67.42.195 3128 transparent Brazil 2006-10-14 Whois
201.37.76.66 6588 high anonymity Brazil 2006-10-14 Whois
59.41.253.35 80 transparent China 2006-10-14 Whois
209.163.147.247 3128 anonymous United States 2006-10-14 Whois
212.49.85.94 80 anonymous Kenya 2006-10-14 Whois
66.98.238.8 3128 transparent United States 2006-10-14 Whois
200.183.137.66 3128 transparent Brazil 2006-10-14 Whois
213.177.255.60 80 transparent Great Britain (UK) 2006-10-14 Whois
200.88.223.98 80 anonymous Dominican Republic 2006-10-14 Whois
203.94.90.76 80 transparent Sri Lanka 2006-10-14 Whois
195.175.37.70 8080 transparent Turkey 2006-10-14 Whois
61.30.92.250 80 transparent Taiwan 2006-10-14 Whois
201.28.44.58 3128 transparent Brazil 2006-10-14 Whois
80.80.12.125 80 transparent Denmark 2006-10-14 Whois
165.228.128.10 3128 transparent Australia 2006-10-14 Whois
195.175.37.71 8080 transparent Turkey 2006-10-14 Whois
132.248.103.151 80 transparent Mexico 2006-10-14 Whois
212.105.82.200 8000 transparent Sweden 2006-10-14 Whois
200.223.97.154 3128 transparent Brazil 2006-10-14 Whois
203.146.192.173 3128 transparent Thailand 2006-10-14 Whois
213.194.110.199 8080 anonymous Turkey 2006-10-14 Whois
213.239.215.72 3128 transparent Germany 2006-10-14 Whois
193.15.99.73 3128 transparent Sweden 2006-10-14 Whois
219.218.128.218 3128 transparent China 2006-10-14 Whois
222.165.189.47 80 transparent Sri Lanka 2006-10-14 Whois
201.41.214.229 80 transparent Brazil 2006-10-14 Whois
132.248.66.16 3128 transparent Mexico 2006-10-14 Whois
210.51.11.31 3128 transparent China 2006-10-14 Whois
203.113.130.59 80 high anonymity Vietnam 2006-10-14 Whois
63.211.140.184 80 transparent United States 2006-10-14 Whois
85.10.203.228 8080 transparent Germany 2006-10-14 Whois
222.165.189.46 80 transparent Sri Lanka 2006-10-14 Whois
244  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Espionage in Information Warfare on: October 15, 2006, 12:43:04 PM
Espionage in Information Warfare
by Christopher D. Noble

Espionage in Information Warfare

By Commander Christopher D. Noble USN, USAWC Class 1998 Spy

In the future not all spies will be human. Some will be Artificial Intelligence Software Agents.

According to the Wordsmyth English Dictionary, there are two common meanings for the word spy.

Noun:

1. A person employed by a nation's government to secretly observe and gather information about another nation's activities, plans, defenses, and the like.

2. A person who secretly observes and gathers information about others, usu. for pay or profit.

Verb:

1. To observe secretly and carefully, usu. for hostile reasons (usu. fol. by on or upon).

2. To be employed and active as a spy.

3. To look for or investigate something.

All these definitions appear to call for some form of human action, but this is not an absolute. Spying is done by entities most capable with respect to the information being collected. In cyberspace, digital agents are far more effective as spies than humans. Abstract

As we become increasingly cyber-connected, we will need assistants that can operate in cyberspace. Just as human staffs and assistants enable productivity in the real world, Intelligent Software Assistants will enable productivity in cyberspace. The current Artificial Intelligence based Intelligent Agents are just now showing the promise anticipated. But just as human assistants can be spies, so can these cyber-assistants. This paper explores this duality of software agents. Introduction

Cyber-Spy: Future fact or pure fiction?

The Special Forces team carefully makes their way toward the objective. The target they are closing is not an ammunition depot or a critical Coalition Command Center. It is a forgotten computer switching station used primarily for maintenance. Arriving undetected, they prepare their combat package, a specially developed sequence of digital code called a mobile software agent. The connection is made, digital communication is established, and the software agent is inserted on the switching station server. The Special Forces team stealthily extracts, leaving no trace of their attack.

Meanwhile, the injected computer code waits until the human teams are well clear, then extracts, decompresses, and reconstitutes itself for action. Its mission.... Espionage! ..... This digital 007 is designed to get combat critical information on the coalition cyberspace, and leave time delayed software viruses. Moving undetected through the host information infrastructure, it gathers information, and deploys delayed acting digital bombs, set not to destroy but to confuse and deceive the host combat commanders.

With its critical missions completed, the mobile software agent prepares for extraction. Moving to a predetermined remote location for pickup, it decomposes, compresses, and waits. The Special Forces team arrives, establishes the digital connection and extracts the cyber-spy.

The Coalition information infrastructure has been attacked, capabilities compromised, and prepared for failure at a critical moment .....

Background:

The information age is adding a new dimension to warfare - Information Warfare. Dispersed, digitally webbed and linked combat units promise to mass combat effects better, faster, with more precision, and with less risk. When fused with digital all-source intelligence, Information Warfare promises the future combat commander nearly one hundred percent situation awareness of friendly and opposition forces. This total situation awareness would have the effect of digitally lifting Clausewitz's proverbial "Fog of War". To set the context for discussing the use of software agents as evolving intelligence resources, this paper is divided into five parts.

National Intelligence: an Executive Overview: A brief discussion of the current National Intelligence Community and the Intelligence Cycle. The frame work of all intelligence.

Information Warfare: The Revolution in Military Affairs Presents the Joint Services commitment and vision for future warfare with its accompanying Revolution in Military Affairs.

Espionage: Military Doctrine The stage for discussion of mobile Software Agents is completed with a brief discussion of military doctrine on espionage and intelligence.

Software Agents: Intelligent Cyberspace Assistant and cyberspies Describes the current capabilities and projects the future for Software agents as trusted cyber assistants.

Mobile Intelligent Agent Patrols: Protecting the Information Infrastructure Discuses protection of cyberspace, and makes recommendations for future development National Intelligence: an Executive Overview

The goal of espionage is still intelligence

The Intelligence Cycle:

Raw information is seldom intelligence. In order for information to be true intelligence it must be part of the Intelligence Cycle. This cycle has the following steps:

The Commander (user/customer) generates a need or request to the collection authority

The collection authority combines and coordinates all requests and tasks collection assets

Raw information is collected from reliable resources

Raw source information is processed to a form useable by an Intelligence Analysts

Processed information is analyzed and combined to form Intelligence

The analyzed Intelligence is distributed properly to the Commander (user/customer)

The United States Intelligence Community:

The US Intelligence Community, Headed by the Director of Central Intelligence (DCI) is composed of thirteen agencies. Together they are responsible for National Intelligence and the Intelligence Cycle. Some of the more recognized of these are: the National Security Agency, Central Intelligence Agency, National Imaging and Mapping Agency, and the National Reconnaissance Office. The Federal Bureau of Investigation also has some specific responsibilities for counter intelligence.

National Security Agency (NSA)

In the mission statement of the National Security Agency is the following:

"The National Security Agency/Central Security Service is responsible for the centralized coordination, direction, and performance of highly specialized technical functions in support of U.S. Government activities to protect U.S. communications and produce foreign intelligence information"

The NSA, by their mission statement, tends to be a technology based Intelligence resource. They are also responsible for the security of our communications systems.

Central Intelligence Agency (CIA)

The mission statement of the Central Intelligence Agency is:

"We support the President, the National Security Council, and all who make and execute US national security policy by:

Providing accurate, evidence-based, comprehensive, and timely foreign intelligence related to national security; and

Conducting counterintelligence activities, special activities, and other functions related to foreign intelligence and national security as directed by the President."

The CIA, in addition to a technical intelligence collection and analysis, maintains the capability to do intelligence operations.

National Imaging and Mapping Agency (NIMA)

The mission of the National Imaging and Mapping Agency is: "NIMA guarantees the information edge: ready access to the worlds imagery, imagery intelligence, and geospatial information"

National Reconnaissance Office (NRO)

The purpose of National Reconnaissance Office is:

"The NRO designs, builds and operates the nation's reconnaissance satellites. NRO products, provided to an expanding list of customers like the Central Intelligence Agency (CIA) and the Department of Defense (DoD), can warn of potential trouble spots around the world, help plan military operations, and monitor the environment."

Federal Bureau of Investigation (FBI)

The mission of the Federal Bureau of Investigation with respect to intelligence is primarily counter-intelligence. They catch spies in this country before they can damage national security.

Military Intelligence

The Department of Defense Intelligence Elements are eight of the thirteen members of the US Intelligence Community. Their focus is upon national defense intelligence support to military commanders.

Military intelligence is analyzed collected information that will give a Combat Commander leverage over an adversary. It invokes the Intelligence Cycle of the national intelligence community. The collection of information can be from many sources. Some of these are: human informants, photo surveillance, and electrical signal interception. In the past this collection was tasked to human collectors and remote sensors.

There is a hierarchical National Intelligence Community with National Security responsibility for espionage and intelligence from all sources and in all forms. As our national interest evolves and the American way of war changes, so will the methods for espionage. What are the joint services visions of future warfare? Is there now a Revolution in Military Affairs?

Information Warfare: The Revolution in Military Affairs

The American way of war is again changing. As the industrial age matures into the information age, we are experiencing a Revolution in Military Affairs (RMA). This is well summerized by the then Secretary of Defense:

"We live in an age that is driven by information. Technological breakthroughs . . . are changing the face of war and how we prepare for war." --William Perry, Secretary of Defense

The significance of Information Warfare and the current revolution in military affairs we now face is well stated in a 1996 RAND corporation study Strategic Information Warfare: A New Perspective. I quote from the Summary:

"Information warfare (IW) represents a rapidly evolving and, as yet, imprecisely defined field of growing interest for defense planners and policymakers. The source of both the interest and the imprecision in this field is the so-called information revolution--led by the ongoing rapid evolution of cyberspace, microcomputers, and associated information technologies. The U.S. defense establishment, like U.S. society as a whole, is moving rapidly to take advantage of the new opportunities presented by these changes. At the same time, current and potential U.S. adversaries (and allies) are also looking to exploit the evolving global information infrastructure and associated technologies for military purposes."

Science and Technology: Investment in the future

The Department of Defense, (Science & Technology and Planning) is investing $2.445 billion across the future years defense plans (FYDP) in twenty six Information Systems Technology Defense Technology Objectives (DTO's). Of this, $558 million is in the budget for FY98. This represents a serious investment in the future of information systems warfare.

Service Battle-Labs: Future Combat Vision and Experimentation In addition to the investment in research and science & technology, individual Service Components of DOD have invested in future warfare via their battle-labs. A brief summary of each follows.

Joint Battle Labs

The Joint Battle Labs investigate and focus on Joint Service future warfare and implementing the JCS vision document Joint Vision 2010.

Army

The Army has two major future warfare development programs. Force XXI in the near term and the Army After Next in the far term. The Army maintains Army Battle Labs to support the development of its future combat power The Army's Commitment to the digital battlespace is the Force XXI Battle Command Brigade and Below, FBCB2 program, the successor to its Applique' developmental digital battlefield program.

Navy

The Navy's investment in battle experimentation Started in FY 97 with the Fleet Battle Experiments (FBE's). Coordinated with the Marine Corps' Sea Dragon process, they are proving the Navy's-Marine Corps team articulation of Joint Vision 2010 in Forward...From the Sea: Any Time, Any Where The centerpiece of information warfare for naval forces is the Network-Centric Warfare concept of massing combat effects from distributed platforms in the worlds littorals. Copernicus ... Forward C4I for the 21st Century defines the Navy Vision for the future naval realization of the digital information battlespace described in Joint Vision 2010

Marine Corps

The Marines Corps Warfighting Lab (MCWL) Sea Dragon is a five year plan for concept based battle experimentation. Focussing on Ship to Objective Maneuver in an extended littoral battlespace, it enhances core marine capabilities with technology and new warfighting concepts. Of great concern is the minimization or elimination of the "strategic pause" accompanying amphibious operations during the traditional build-up to combat power.

Hunter Warrior, the first of three major phases, experimented with a small force of digitally enabled light teams against a far larger heavy mechanized force (the Seventh Marines). Their unparalleled success was due in part to the vastly superior Command, Control, Communications Computers Intelligence Surveillance and Reconnaissance (C4ISR). Significant aspects of the implementation the experimental command environment will require the use of Software Agents.

Air Force

The Airforce supports the development of Aero-Space technologies for future warfare. Their articulation of Joint Vision 2010 is Global Engagement. The concept relies very heavily on technology and continental power projection of combat effects. The Airforce defines their future vision as follows:

"Global Engagement: A Vision for the 21st Century Air Force flows from the National Security Strategy and is our continuing commitment to provide America the air and space capabilities required to deter, fight and win. This vision is grounded in the Chairman of the Joint Chiefs of Staff concept of how we will fight in the early 21st Century - Joint Vision 2010. Moreover, it embodies our belief that in the 21st Century, the strategic instrument of choice will be air and space power."

As can be seen from the Joint Services' vision and future warfare development programs, all are committed to Information Warfare and the Cyber-battlespace it entails. Will this new battlespace be targeted for espionage? Does military doctrine consistently call for Intelligence and spies? Espionage: Military Doctrine

Early military doctrine on intelligence and secret agents (spies)

Sun Tzu

The use of espionage by military commanders is certainly not new. In 400 BC, The famous Chinese military strategist Sun Tzu wrote an entire chapter on the use of spies in his still studied Art of War. He concludes Chapter Thirteen, his final chapter, as follows:

"Hence it is only the enlightened ruler and the wise general who will use the highest intelligence of the army for purposes of spying and thereby they achieve great results. Spies are a most important element in war, because on them depends an army's ability to maneuver."

In fact, Sun Tzu was such a proponent of deception, movement, and surprise that he believed the best commanders could win wars without ever engaging the enemy in actual combat.

Clausewitz

The renowned nineteenth century military theorist Karl Von Clausewitz had a different perspective on intelligence. In book one chapter six (Intelligence in War) of his On War, he appears to admonish strongly against the use of intelligence. He warns the commander to trust in his own judgement and that:

"... most intelligence is false, and the effect of war is to multiply lies and inaccuracies".

At first this appears to be encouragement to ignore leveraging information about the enemy. It is only later that we see he is really referring here to raw reports not analyzed information. Confirming this, he later calls for careful analysis of collected information, stating:

"This difficulty of accurate recognition constitutes one of the most serious sources of friction in war, making things appear entirely different from what one had expected."

Much of his methods describe massing decisive force at the enemy's "center of gravity". This is only possible if the commander has accurate, timely, and detailed analyses of information on the enemy. Current Military Doctrine on Intelligence

Joint Chiefs of Staff

In introducing Joint Pub 2-0 , Joint Doctrine for Intelligence Support to Operations (Adobe Acrobat reader required) the Chairman of the Joint Chiefs of Staff says quote:

"Intelligence plays a vital role in the conduct of successful joint operations. Proper deployment of collection and analysis assets is essential if joint force commanders are to gain and maintain intelligence dominance of the battlefield. Without this capability, our joint forces will lose the essential advantages of surprise, operational security, and flexibility."

Spying to gain military advantage is here to stay. It has been done in the past and will be done in the future. The methods of choice for collection will change as information warfare digitizes the battlespace. The same Software Assistants that help relieve the Commanders information overload could also be Cyber-spies ... Software Agents corrupted by enemy influence. Software Agents: Intelligent Cyberspace Assistants

Combat Information Overload

The information age and its accompanying revolution in military affairs has dramatically increased the technical capability to collect and present strategic and tactical battle information. All source intelligence fusion combined with tactical decision aids can greatly increase the situation awareness and decrease decision cycles of combat commanders.

But is more information always better? Is it possible for a commander to be overwhelmed with digital awareness, perhaps missing key combat cues?

Recent experiences of the services' battle labs have shown that increasingly, combatant commanders will be placed in combat-information-overload, having to sort through large masses of digital information to find that which is truly combat critical. This information overload must now be pre-processed by a human command staff prior to presentation to the commander. To overcome the digital interactive limitations of humans, a cyber-staff is needed. This new digital staff will need many of the same qualities as human counterparts, but exist in the digital soup of the future battlespace.

Battle Experiments: Different Focus - One Lesson

At one point during the Navy - Marine Corps Hunter Warrior battle experiment, there were over 1000 messages backed up in the combat commanders cue of the JMCIS based Common Operational Picture. All these messages were important, but some were more critical than others. Routing combat information and reports to sorting mailboxes is only a partial solution.

Similarly, during the Army's recent Force XXI digital battlefield experiments, General Hertzog was asked if the information "glass" was half full or half empty. He remarked that he had " two and a half glasses" of information.

The Cyber-Staff:

The need for a personal cyber-staff to help commanders process and analyze the digital battlefield can be filled through the use of digital Intelligent Agents and Trusted Agents. These Artificial Intelligence technologies, developed by the browser based internet community, are not subject to the physical or computational limitations of a human staff. An intelligent software agent, with knowledge of the commander and phase of the operation, could screen the incoming data stream, alerting the commander when something worth interrupting happens.

The Cyber-Spy:

As software agents are given more agency, intelligence,and mobility, steps must be taken to safeguard them from the influences of the adversaries. Just as human staffs are subject to corruption so will software agents.

Intelligent Agents could also play a covert offensive role if introduced into an adversary's cyber battle-space. As the opening fictional story theorizes; the use of the latest generation of mobile software agents to attack an unprepared information infrastructure has potentially damaging results. How well we prepare for this form of intelligence collection and computer attack will determine the validity of the end of the story.

Realizing the great potential and vulnerability of the National Information Infrastructure, the Department of Defense has a significant investment in research on Information Systems Technologies. Additionally the National Intelligence Community agencies responsible for military intelligence and counter intelligence have programs to maximize effectiveness in the information age.

Software Agents: Description

Intelligent Software Agents are the current capstone achievement of Artificial Intelligence community. A comprehensive survey for understanding the development, current capability, and future potential is regretfully not yet available online. One good resource is Software Agents edited by Jeffery M. Bradshaw and published by the AAAI and MIT press. It is available for purchase online from Barnes and Noble. A review by UMBC of this and other publications introducing Software Agents is available on the internet.

Software Agents: A definition by Bradshaw in Software Agents

"A software entity which functions continuously and autonomously in a particular environment , often inhabited by other agents and processes".

He includes the following attributes of an agent:

The agent needs continuity and autonomy to:

"Carryout activities in a flexible and intelligent manner that is responsive to changes in the environment without requiring constant human guidance or intervention."

The agent should learn from its experience.

The agent should communicate and cooperate with other agents in the environment.

The agent should be able to move from place to place to carry out its tasking.

Software Agents: A Spatial Representation

A good visualization of the software agent concept is in an IBM white paper (Gilbert et. al. 1995) which defines intelligent agents in terms of three dimensions: intelligence, agency, and mobility. Just as the x, y, and z axis of the Cartesian coordinate system define physical space; intelligence, agency, and mobility define the "space" of intelligent agents. The basic concept of this white paper is summerized by Bradshaw:

Intelligence includes reasoning, learning, and adaptive behavior. The agent should function with respects to the users goals, not simply execute coded commands.

Agency is defined in terms of autonomy and authority. Asynchronous activity is a minimum and representative interaction with data, applications, services and other agents is desired.

Mobility is "the degree to which agents themselves travel through the network." Two categories of mobile agent are presented; mobile scripts and mobile objects.

1. Mobile scripts "may be composed on one machine and shipped to another for execution." 2. Mobile objects are "transported from one machine to another in the middle of execution, and carrying state and data with them."

Of all the software agent technologies, mobile objects have the greatest potential as cyber-spies.

Software Agency Performance Predictions: A Note of Caution

Bradshaw humorously points out the danger in producing a "once and for all" definition of agent-hood with the following warning:

"One persons intelligent agent is another persons smart object; and today's smart object is tomorrows dumb program."

He acknowledges the general disappointment with past over-zealous predictions of the artificial intelligence community, and attributes this to tendency of over enthusiastic developers to anthromorphize their software and then claim this makes them intelligent.

Software Agents: The Pull from the Future Bradshaw cites three trends in information technology, which will accelerate the draw to software agent technology.

1. The need to simplify distributed computing.

2. Incorporating agents as resource managers.

3. Overcoming user interface problems.

All three trends apply equally well to the national information infrastructure and the information warfare infrastructure.

Bradshaw concludes his section on Why Software Agents, buy describing a trend toward agent enabled system architectures with the prediction:

"Ultimately all data will reside in the knowledge soup with assistant agents interacting with resource management agents in the background. This will give the user unprecedented levels of functionality. In such an environment, individuals and groups would no longer be forced to manage a passive collection of disparate documents to get something done."

This is precisely a solution to the combat information overload problem in future information warfare. This also represents a future threat. Hostile Software agents could compromise the cyber-environment Software Agents: examples of current technologies

Some representative examples of the current state of software agent development are now presented. I have arbitrarily divided them into five categories: productivity, self improvement, connectivity, intelligent search agents, and entertainment. Their inclusion does not constitute a product endorsement. All have Internet links to allow further online research.

Productivity

"Clippit" the Microsoft Office 97 office assistant (the animated paper-clip) The main focus of this application is to overcome user interface problems. This assistant (when activated) sits at the side of the digital desktop monitoring the actions of the user. When an action is called the assistant will appear to perform the action. One feature of this intelligent agent uses Natural Language Processing to access the online help feature. The user is asked "what do you want to do?" After typing the desired action into the dialog box, the assistant returns a list of functions that it will help you do. Upon selecting a function the software assistant walks the user through the action. The software assistant also informs the user when an illegal action has been attempted, avoiding the terse unintelligible error messages of most system applications. Finally, if the office assistant senses the user is doing something the hard way, it will pop up and offer a short cut.

Clippit meets some of the requirements of an intelligent agent: it senses the environment, acts for goals of the user, and exhibits some learning behavior. IBM ViaVoice Gold Continuous Speech Recognition. This software agent is also focussed on interface simplification; the challenging goal of directly converting speech into type.

I found this application well suited to the task. In fact, much of this paper was prepared with its help. After training the application it was better than 95% accurate. And since it learns from its mistakes it continues to improve. My raw ability to input text went from twenty words per minute to about seventy five. I found the application able to convert my words directly to text faster than I could craft them. (No excuses now)

The main draw back is the system resources required. Its minimum requirements are a Pentium 150 MMX and 32 MB of RAM.

This application certainly meets the tests of software agency. One thing it does not do is use context sensitive processing, which could enhance its utility.

Self Improvement

Mavis Beacon Teaches Typing. The purpose of this program is to improve the users keyboard skills.

The program first tests the users keyboard skills. It then presents a course of instruction to improve the weaknesses noted. The application periodically offers feedback and tailors practice to match the rate of improvement. It includes standard classroom style instruction and entertainment orientated accuracy and speed drills disguises as games.The program enrolls multi users and keeps track of each users progress and ability profile. The approach seems to work; with casual use, this 43 year old transformed hunt-and-peck skills to about 25 words per minute of touch-typing.

Mavis Beacon Teaches Typing is an artificial intelligence intelligent tutorial. This application appears to lack agency, a requirement for classification as a software agent. additionally it does not interact with other applications, and is mobile only in the sense that online internet help is available.

Connectivity

This area has been the most fertile for the development of software agents. In particular the browser community has the goal of making remote procedure calling on diverse paltforms and operating systems possible. Netscape Navigator and Microsoft Internet Explorer are well known examples. These applications are the original software agents. They set the stage for the distributed cyber environment. "Browser Based" has become a synanym for connectivity

Another connectivity example for the Macintosh is NetBots. The use of these virtual agents requires more computer knowledge, but they are much more powerful. The NetBots self described capabilities are:

"These are the droids you've been looking for! NetBots is a Macintosh Internet utility that lets you send virtual "agents" out on the Internet. These agents can do things like monitor a web page for updates, let you know when a user is online, and much more. The bots can signal you with an alert or can execute any AppleScript."

Are NetBots the Cyber-Private Investigator or Commercial Cyber Spies? They certainly allow some users to collect information on other users without their knowledge.

Intelligent Search Agents

The internet is miles wide and, in places, only inches deep. A comprehensive search for information resources is a serious challenge for the human user. To help, some super-search engines are available online.

Ask Jeeves is an example. This application prompts the users for a question and then offers some solutions based on some basic natural language processing. It then simultaneously hits many of the commercial engines and evaluates their responses.

Ask Jeeves is a free service. Examples of other super-searchers available for purchase online are; WebMate, DVINA, and Browser Buddy. Most of these offer automatic fetching, news group maintenance, and and URL organization. A more focussed example of information resource monitoring and organization is WARREN, an Intelligent Agent for Financial Portfolio Management

For more reviews and information on these resources visit the Carnegie Mellon University Intelligent Agents Homegpage.

These applications continue to pioneer the capabilities of software agents. This catagory of software agents is particularly well suited to the collection of open source intelligence. Sometimes, portions of a project or capability are unclassified. These super-searchers can be tasked with assembling the unclassified piesces, which may in the whole, reveal more than intended.

Entertainment

There are many examples in this category. For the common user the games they use demand the most of their system resources. It should be no surprise that some gaming engines employ artificial intelligence technologies online, in distributed cross-platform connectivity. Additionally, some producers offer virtual environments where the user can join a battle in progress on the net.

Janes Combat simulations is an example. Want to fly the Apache Longbow at Fort Irwin or Azerbaijan against the latest Russian Weapons? This system imports US geological survey maps and the weapons systems parameters found in Janes Information Group. Their Advertisement reads"

"Jane's Combat Simulations proudly presents Longbow 2, the cutting-edge sequel to 1996's universally acclaimed Flight Sim of the Year. An all-new graphics engine, combined with a host of innovative new multi-player features, multiple aircraft types and dynamic campaigns, delivers the ultimate helicopter combat experience. "

Janes further quotes the television production "60 Minutes" as saying:

"Janes is the closest thing to a civilian intelligence agency"

How much, if any, of our new platform capability does this compromise? Are some of our new systems so good that we want adversaries to see the capability? Will virtual combat gaming environments with the accuracy, connectivity, realism, and user tailorable scenarios of this application reduce the need to spy?

Mobile Software Agents: applications for the future One dimension of software agents not yet well developed is mobility. The internet agent applications now fielded all have a telemetry leash, tying them to the user's computer. This process is termed Remote Procedure Calling or RPC. The agent really resides in the host computer and calls authorized procedures in others.

In the final chapter of Bradshaw's Software Agents, James White describes a new concept, Remote Programming or RP. General Magic is doing research and application development in this area using their Telescript technology. In remote programming, code is shipped for execution from the user to the host. Mobile scripts such as Java and ActiveX now offer a rudimentary version of this capability.

A further increase in mobility and agency intelligence is fielded in mobile objects. Mobile objects no longer require the telemetry leash to intelligently function. They are the first true agents that actually transport themselves in tact free from the user's computer. General Magic is developing mobile object applications.

The fictional cyberspy described at the beginning of this paper is just such an agent. A mobile object disguised in a "Wrapper" can fool unprepared host computer security systems and operate at will. Cyber-Spy: Future Fact Mobile Intelligent Agent Patrols: Protecting the Information Infrastructure Computer Attack: Real Problem or Hype?

In an article by a Richard Lardner and Pamela Hess in Defense Information and Electronics Report, recent hacker activity against the Department of Defense Information System is summarized. Additionally, Deputy Defense Secretary John Hamre is quoted as acknowledging

"DOD has undertaken several exercises that have confirmed our vulnerability to computer attack in the future".

Protection of the Information Infrastructure: Recommendations for the Future How do we protect the information infrastructure? Two approaches are possible. One uses a biological template and the other a law enforcement model. In the biological model, the information infrastructure is analogous to a complex organism. In this concept, mobile software agents act as a cyber-immune system, circulating through the "knowledge soup". When hostile agents or attacks are recognized, they report the attacks and destroy the invading digital code.

The law enforcement concept is very similar. Here, cyberspace is treated like a diverse neighborhood with different zones of activity. Mobile software agents patrol the Cyber-City, watching for dangerous or illegal digital activity. When nonstandard activity is detected they have a tiered response depending on the severity of the act.

1. Allow the activity to continue but warn of danger.

2. Stop the code execution and arrest its mobility.

3. Terminate the hostile agent and try to limit the damage. Both of these Information Infrastructure protection models require three things.

1. Standards for digital interactive behavior.

2. General monitoring of the whole with concentrated monitoring of critical areas.

3. Enforcement actions for compromising digital behavior.

In Chapter two, of Bradshaw's survey on Software Agents, Norman in his "How might people interact with agents?" articulates some strong concerns for computer safety and privacy. He asks:

"How does one guard against error, maliciousness (as in the spread of computer viruses), and deliberate attempt to pry and probe in one's personal records?" Norman further calls for serious consideration for the privacy of the user. He says;

"Privacy and confidentiality of actions will be among the major issues confronting the use of intelligent agents in our future of a fully interconnected, fully communicating society. We must address those issues now, not just in the technical sense, but in the local, national, and global legal systems."

We are at the beginning of agent-enabled distributed computing. The use of mobile agents and remote programming offers some real performance benefits over the current remote procedure calling protocol. However, there are some real concerns for future security and computer safety. If we prepare now for this technology we can ensure standards of software-agent behavior and interaction are set, and consequences for non-compliance deter compromising behavior.

Cyber-Spy Future fact: The sequel

The Special Forces team crosses out of the Coalition territory back into their own area. The cyber-spy they so stealthily inserted and later extracted was amazingly successful by all indications ... But was it? I n fact the Coalition information infrastructure of the attacked cyberspace was prepared. intelligent agent sentries, had been posted at the computer switching terminal server ports. Other mobile intelligent agents patrolled Coalition cyber-space, communicating with each other and the software-sentries on the ports. Having learned the normal activity of the system, they detected the abnormal movement and procedure calls of the cyber-spy. Alerting the Coalition Commander of the attack, they arrested the mobility of the cyber-spy and brought it to a digital-safe-area where its true purpose and missions were extracted.

The Coalition Commander, realizing the advantage of a miss-informed adversary, ordered the cyber-spy reconstituted with false information and escorted by the mobile intelligent agent patrols to the extraction point.

This cyber-spy, now extracted by Special Forces teams in fact carries no compromising information, and did not weaken the coalition information infrastructure.

The only information the cyber-spy now carries is dis-information, which will aid the coalition in bringing about an early successful conclusion of hostilities. Espionage in Information Warfare: Shape, Respond, and Prepare Now
245  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Draft Glossary of Communications Security Terms on: October 15, 2006, 12:41:46 PM
Draft Glossary of Communications Security Terms
by COMSEC

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

DRAFT GLOSSARY OF COMMUNICATIONS SECURITY TERMS

PREPARED BY THE COMSEC ASSOCIATION and ROSS ENGINEERING

February 24, 1990

ANI. Automatic Number Identification

CNA. Customer Name and Address. This is a telephone company facility in this country by which telephone companies help one another by providing the name and address of a customer whose number is known. It is used widely by investigators in the practice of their profession.

LLLTV. Low Light Level Television

SCIF. Secure Compartmentalized Information Facility. It is a facility that is built to government specifications that assures that what is said in the room is heard only by the people in the room.

STU III. Secure Telephone Unit number three (pronounced "stew three"). AT&T, Motorola and RCA are building these after a government sponsored development. They are secure telephones to be used by government contractors when talking about sensitive information over the telephone.

TELCO. Telephone Company.

TELEPHONE INSTRUMENT. The complete telephone set, including handset, ringer, dialing mechanism, etc.

TELEPHONESE. This is a special language spoken by telephone company people. Some of the words in this language are necessary to properly communicate in this specialized area. Some, however, seem to have been chosen for the purpose of obfuscation.

An example of a necessary telephonese expression is "SMDR" which stands for "station message detail recorder", an accurate description of the purpose and function of the device.

An example of a word which seems to be intended to confuse or obfuscate is "transmitter". We all know that a transmitter is something which transmits, but the phone company people use this word when referring to a carbon microphone, a device which is totally passive and has no ability to transmit anything.

Another word which can cause serious misunderstanding is "bridge". Those of us who have studied electronics know that a bridge is a four-terminal device which has many useful applications. Unfortunately, the phone company people use this word when they are describing a simple two-wire parallel connection. The reason for their choice of this word is not apparent, but they might have been trying to hide from the world how easy it is to hook up an extension telephone.

There are, of course, many telephonese words which do not fall into either of these categories. Many terms are still in use which derived from characteristics which have all but disappeared from modern equipment -- words like "hookswitch" referring to the switch which was activated when the receiver was replaced in its hook on the side of the early telephones.

TEMPEST. Refers to classified government effort to protect against compromising emanations from electronic equipment. (It may be a coined word, and it may be a semi-acronym from transient electro-magnetic pulse emanation standard.)

THIRD WIRE TAP. The activating of a telephone microphone by using a third wire to bypass the hook switch.

TITLE III. (pronounced title three). Refers to equipment for surreptitious interception of communications. For most people, possession, advertising, sale, and use of Title III equipment is a felony.

TOUCH TONE. DTMF (dual tone, multi-frequency). Signalling system. Replaces pulse dialing.

TRACKING. In any tracking system, some target is traced by some electronic means -- radar or whatever. The target's location is displayed on screens which are viewed by the operators. The vehicle tracking systems available today receive position information from LORAN-C receivers or dead reckoning systems on board the target vehicle. The tracking site is normally fixed, and there is no necessity (nor ability) to physically follow the target vehicle.

TRANSDUCER. A device which converts on form of energy to another, e.g., sound to electrical.

TRAP & TRACE. Telephone company equipment/procedures for determining the source of an incoming call.

TRIANGULATION. Process used to locate a transmitter by use of multiple direction-finding systems.

TSCM. Technical Surveillance Countermeasures. Commonly called debugging, sweeps, or electronic sweeping. However, these terms do not adequately describe the full range of TSCM.

TWIST. Telephone company term which refers to the fact that signals at different frequencies are transmitted with differing response by the transmission system. Usually refers to distortion of DTMF (touchtone) signals.

ULTRASOUND. Sound too high in frequency to be heard by the human ear; generally above about 20 KHz.

ULTRAVIOLET (UV). Light too high in frequency to be seen by the human eye.

VOICE ACTUATED SWITCH (VOX). Switch that closes when sound is present at its input.

VOX. This term originated with hams and came from 'Voice On Xmtr" or "Voice Operated Xmtr" where xmtr is the ham abbreviation for transmitter. It has come to mean any circuit which activates or turns on when it "hears" a voice (or sometimes any sound).

WEARING A WIRE, WIRED. Agent is wearing a concealed tape recorder or transmitter.

WHITE NOISE. Noise in which power distribution is linear through the spectrum. Each 1 KHz or 10 KHz has as much power as every other 1 KHz or 10 KHz.

WIRELESS MICROPHONE. Very low power short range transmitter legitimately used by entertainers and sportscasters as microphones. Used by eavesdroppers as inexpensive radio bugs.
246  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Cyber Protests: The Threat to the U.S. Information Infrastructure on: October 15, 2006, 12:39:53 PM
Cyber Protests: The Threat to the U.S. Information Infrastructure
by NIPC

xecutive Summary

Political events and emerging international situations will increasingly lead to cyber protests. The cyber protests that have occurred thus far have had little impact on U.S. infrastructure. As computing technology becomes faster and better, and hacking tools become more advanced and easier to use, cyber protesting and hacktivism will become more significant to U.S. national interests. Cyber protesters are becoming increasingly more organized and their techniques more sophisticated but, most likely, will continue to deface web sites and perform DoS attacks. There will also be an increase in the number of apparently unrelated hacking groups participating in the cyber protests. National boundaries will not always be clearly delineated in attacks on opposing organizations. International activity will also tend to spill over into the United States. Because the United States is a multicultural, world-leading nation it will suffer from attacks on culturally related sites and structures in the future.

Generally, the most popularly targeted sites are those belonging to government, educational, commercial, and cultural institutions. However, any site with an exploitable vulnerability will be susceptible to a cyber attack. The infrastructure has been targeted in other countries in cyber protests and it is expected that it will eventually be targeted in the United States as well. Cyber protesters certainly will target infrastructure more often and exploit opportunities to disrupt or damage it.

Web sites that remain open to known hacking tools will have a higher probability of suffering defacement. Network administrators must remain educated and defenses must evolve along with the threats and offensive capabilities. Although the cyber protests seen today have already caused limited damage, the potential for future attacks could bring about large economic losses as well as potentially severe damage to the national infrastructure, affecting global markets as well as public safety.

Introduction

In the last decade, with the explosion of the size of the Internet, protests and political activism have entered a new realm. (1) Political activism on the Internet has already generated a wide range of activity, from using e-mail and web sites to organize, to web page defacements and denial-of-service (DoS) attacks. (2) These politically motivated computer-based attacks are usually described as hacktivism, a marriage of hacking and political activism.

In addition to the consistent activity of groups devoted to a specific long-term cause, the Internet has also seen short-term periods of intense political activity, which can be referred to as cyber protests. Cyber protests have become a worldwide phenomenon available to anyone with access to computers. Unrestrained by geographic boundaries, protesters have an enormous forum in which to be heard.

Cyber protesters have a wide range of goals or objectives. Some hackers want to expose government corruption or fundamental violation of human rights; others just want to hack and cause mischief for fun. It has only been since 1998 that cyber protests have skyrocketed in popularity and become commonplace in today's computerized world.

The most common type of cyber protest comes in the form of web page defacements. In such scenarios, a web site is compromised through some security deficiency and the hacker is able to alter it, many times placing propaganda, profanity, or pornographic images on it. This can range from being a nuisance and embarrassment for an organization to a major economic loss for an e-commerce business.

Protests and civil disturbances are nothing new. People unhappy with their situations have always found outlets to spread their message, be it a peaceful sit-in, letter-writing campaign, picket march, or violent gang fight. Now, with the advent of the Internet and the growing number of people online, it has become easier to organize protests. That is not to say that every web defacement is an organized event on the part of some political organization. Many defacements are perpetrated by lone hackers that have no political motivation other than to create chaos. Nation-states and their respective citizens have also been involved in cyber protests. Several countries have waged ongoing cyber battles against each other through web defacements and DoS attacks. Mail bombing is a popular form of a DoS attack. Massive amounts of e-mail or web traffic are directed against a specific site, overloading it and causing it to crash. It should be noted, however, that some parties involved in these cyber protests are not citizens of the respective countries. They might hold similar views or they might be involved just to participate in hacking different sites. Alliances can be tenuous at best for some of these groups.

Chinese Hackers

One high profile incident occurred in May 1999 after the United States accidentally bombed the Chinese embassy in Belgrade, Yugoslavia during the NATO air campaign. U.S. web sites were defaced in the name of China and massive e-mail campaigns were executed to gain sympathy and support for the Chinese cause. Government web sites were primarily targeted. The U.S. Departments of Energy and the Interior, and the National Park Service all suffered web page defacements. In addition, the White House web site was taken down for three days after it was continually mail bombed. This action was relatively unorganized in fashion, short in length, and affected a small number of U.S. sites.

Pro-Chinese hackers also acted against Taiwan during the Taiwanese presidential elections in August and September 1999. Cyber protesters and hacktivists compromised 165 Taiwanese web sites, mainly defacing them, over the two-month period. Their ultimate goal, as it was stated, was to negatively affect and bring down Taiwan's infrastructure. Among the targeted sites were electricity, economic institutions, telecommunications, and air traffic control. Although teams began to develop and organize near the end of the operations, the damage was relatively light, similar to the attacks on U.S. sites earlier in the year. Importantly, strategic targeting and some organization of forces became accepted strategies for future protests and hacks. These hackers are likely to become more organized and more successful in future incidents. (3)

In late April and early May 2001 pro-Chinese hacktivists and cyber protesters began a cyber assault on U.S. web sites. This resulted from an incident in early April where a Chinese fighter jet was lost at sea after colliding with a U.S. naval reconnaissance airplane. It also coincided with the two-year anniversary of the Chinese embassy bombing by the United States in Belgrade and the traditionally celebrated May Day and Youth Day in China. Led by the Honkers Union of China (HUC), pro-Chinese hackers defaced or crashed over 100 seemingly random web sites, mainly .gov and .com, through DoS attacks and similar exploits. (4) Although some of the tools used were sophisticated, they were readily available to both sides on the Internet.

Many defacements of U.S. sites included posting pictures of the dead Chinese pilot Wang Wei and profane messages calling for the downfall of the United States. ProUnited States hackers responded with similar defacements, messages, and damage on 300 Chinese web sites. Of interest is that some pro-Chinese hackers violated hacker etiquette by wiping some compromised servers. (5) The rule of thumb is to deface or crash a web site but to leave the information intact, otherwise it is considered bad form. (6)

Israeli and Palestinian Hackers

In October 2000, Israeli and Palestinian hackers engaged in adversarial hacking when the prolonged peace talks between the two groups broke down. During this difficult time, hackers seized the opportunity to attack web sites belonging to the opposition. Starting October 6, 2000, 40 Israeli web sites and at least 15 Palestinian web sites suffered defacements at the hands of opposing hackers. (7) This coincided, of course, with physical violence in the region. It was also a problem for U.S. based web sites. U.S. web sites will often fall victim, regardless of their lack of proximity or involvement in the events. For example, several U.S. sites were hacked by pro-Palestinian hacktivists, including the take down of a lobbyist group web site. The hackers then posted group membership information and credit card numbers. (Cool This activity did little to affect the United States as a whole although it illustrates how a seemingly unrelated event can potentially affect U.S. sites.

The level of sophistication ranged from low-level activity using simple defacements to coordinated, relatively sophisticated attacks such as potential root access penetrations. Several hacking tools were developed specifically for this engagement. Any type of attack was considered during this time, including the perpetration of viruses, DoS attacks with e-mail bombing, and sustained, amplified pinging attacks. Web sites containing these various hacking tools were readily available for download to anyone who wanted to join the action.

Pro-Palestinian hackers hit any type of Israeli sites that they were able to compromise, many times defacing them with messages such as, "Free Palestine" or "Free Kashmir." (9) FloodNet software was a major tool used by the Israelis. The cyber protesters simply visited a site and FloodNet would repeatedly send requests to the targeted server. This type of virtual sit-in is a popular form of a DoS attack. Many of these attacks were successful as servers were bombarded and went down repeatedly. Targets included ethnic specific organizational web sites and those of financial institutions to disrupt the infrastructure. E-commerce sites crashed and there was an economic impact reflected in the Israeli markets. It was, however, the root access attempts that were most dangerous for the defenders. Hackers who can gain root access to sites give them unlimited freedom to do whatever they wish. This is the highest level of penetration possible although no successful root access penetrations were reported.

These events attracted a wide variety of hackers eager to join the fight. Both sides were well-organized and used reconnaissance and intelligence gathering techniques to maximize their effectiveness. Even outside hacking groups, such as G-Force Pakistan, joined forces with the Palestinians to lend a helping hand. This is increasingly common. Some outside groups join an effort because they have similar political or ethnic motivations, however, this is not always the case. Some groups participate in hacks simply for the desire to hack or the publicity, not out of a sense of loyalty.

Overall it can be expected that Israeli and Palestinian hackers will be active whenever a stumbling block appears in the road to possible peace between the groups. On the other hand, increased hacking might also occur when the Israelis and Palestinians are close to a peace agreement. System administrators must remain vigilant and focused on providing effective network security.

Indian and Pakistani Hackers

Another example is India and Pakistan engaging in a cyber protest caused by national and ethnic differences. After a cease-fire in the Kashmir Valley hackers took it upon themselves to continue the hostilities. In 2000, pro-Pakistani hackers defaced more than 500 Indian web sites. Conversely, only one known Pakistani site was hacked by the Indians. This illustrates a large difference in technical, hacking abilities or the willingness to use the skills to strike at an adversary. In this event the apparent level of sophistication on both sides is relatively low. Web site defacements are the leading form of this protest. The group G-Force Pakistan was the most active group claiming involvement in the events. 10

Japanese Incidents

Recently, Japan has been targeted twice in online protests. During the first week of April 2001, pro-Korean hackers attacked Japanese organizations responsible for the approval of a new history textbook. The textbook glossed over atrocities committed by Japan during World War II and the occupation of China and South Korea. The perceived reluctance of Japan to accept responsibility for its actions triggered these events. The main participants in this incident were Korean university students, who used e-mail bombs in a DoS attack. The students crashed several web sites, including Japan's Education Ministry, Liberal Democratic Party and the publishing company responsible for the textbook." These attacks were neither long lasting nor were they largely organized.

In early August 2001, pro-Chinese hackers targeted Japanese web sites after Japan's Prime Minister visited a controversial war memorial, the Yasukuni Shrine. In a brief period of time, hackers defaced several web sites belonging mainly to Japanese companies and research institutes. 12 This indicates the continuing willingness of pro-Chinese hackers to use cyberspace and hacking tools as a platform for protests and cyber civil disobedience, as well as for displaying a strong sense of patriotic nationalism.

Conclusions

While the cyber damage thus far has been minimal, the infrastructure will certainly be a target of cyber protestors and hacktivists in the future, with the potential goal being intentional destruction rather than public embarrassment or purely political statements. Pro-active network defense and security management are imperative to the prevention of more serious damage to infrastructure assets. International cooperation and private-public cooperation within the United States is necessary to ensure the ongoing function of the critical infrastructure.

FOOTNOTES:

1. Historically, groups have never had the global platform that the Internet provides today. Bulletin boards and group subscriber lists were the only computerized links protestors had from the 1970s through the early 1990s. The introduction of web browsers supporting graphics and multimedia content and the expansive growth of the Internet, coupled with the growing number of home computers, gave organizations a new outlet for distributing information or disrupting events for a political cause. The fact that many organizations have a web site has enabled them to spread their beliefs to a wider audience. It has also enabled other groups to target them for attack.

2. Freedom of speech is a fundamental right protected by the Constitution of the United States of America that should not be taken lightly. Individuals and groups generally have the right to actively and legally support those causes in which they believe. Many protesters and political activist groups have used cyberspace to organize and advance their memberships and activities. Using computers and the Internet has greatly increased protesters' effectiveness in spreading their message and achieving their goals. This paper deals with past incidents in which cyber protests have led to the destruction of property and other illegal activities, citing, specifically, foreign protests.

3. "China-Taiwan Hacker Wars," Jane's Information Group Limited 1999. Volume 000/2565, 21 October 1999 [online]; available from http://www.infowar.com/hacker/99/hack_102199a-j.shtml; Internet.

4. Rose Tang, "China-U.S. Cyber War Escalates," 01 May 2001 [online]; available from http://www.cnn.com/2001/WORLD/asiapcf/east/04/27/china.hackers; Internet.

5. "Chinese Hackers Concede Defeat in U.S. Hacker War, Call Cease-fire," Agence France Presse, 10 May 2001.

6. This highlights the fact that although web defacements usually cause minimal damage, they indicate a very serious breach in security. A web defacement is, by definition, the manipulation of a web server's data by gaining unauthorized access to that server. It must be determined if the hacker installed a back door, introduced malicious code, or affected the server in any other way. A seemingly low-level hack could result in future problems if systems administrators do not take positive actions to stop future intrusions and restore the server to its previous condition.

7. Larisa Paul, "When Cyber Hacktivism Meets Cyberterrorism," Sans Institute, 19 February 2001 [online]; available from http://www.sans.org/infosecFAQ/hackers/terrorism.htm; Internet.

8. "Hacktivists Take Conflict to Internet," Associated Press, 4 November 2000.

9. "Hacktivists Take Conflict to Internet," Associated Press, 4 November 2000.

10. Kaajal Wallia, "Indians, Pakistanis Play Patriotic Games on Net," The Times of India, 06 January 2001.

11. Stuart McMillan, "Cyber Attackers Remind Japan of its Infamous Past," The National Business Review, 2001. 04 April 2001 [online]; available from http://www.infowar.com/hacker/01/hack_040501a_j.shtml; Internet

12. "Chinese Hackers Attack Japanese Web sites over Shrine Visit," Agence France Presse, 14 August 2001.
247  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Concerning Hackers Who Break into Computer Systems on: October 15, 2006, 12:35:32 PM
Concerning Hackers Who Break into Computer Systems
by Dorothy E. Denning

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

Concerning Hackers Who Break into Computer Systems

Abstract

A diffuse group of people often called ``hackers'' has been characterized as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. This paper attempts to construct a picture of hackers, their concerns, and the discourse in which hacking takes place. My initial findings suggest that hackers are learners and explorers who want to help rather than cause damage, and who often have very high standards of behavior. My findings also suggest that the discourse surrounding hacking belongs at the very least to the gray areas between larger conflicts that we are experiencing at every level of society and business in an information age where many are not computer literate. These conflicts are between the idea that information cannot be owned and the idea that it can, and between law enforcement and the First and Fourth Amendments. Hackers have raised serious issues about values and practices in an information society. Based on my findings, I recommend that we work closely with hackers, and suggest several actions that might be taken.

1. Introduction

The world is crisscrossed with many different networks that are used to deliver essential services and basic necessities -- electric power, water, fuel, food, goods, to name a few. These networks are all publicly accessible and hence vulnerable to attacks, and yet virtually no attacks or disruptions actually occur.

The world of computer networking seems to be an anomaly in the firmament of networks. Stories about attacks, breakins, disruptions, theft of information, modification of files, and the like appear frequently in the newspapers. A diffuse group called ``hackers'' is often the target of scorn and blame for these actions. Why are computer networks any different from other vulnerable public networks? Is the difference the result of growing pains in a young field? Or is it the reflection of deeper tensions in our emerging information society?

There are no easy or immediate answers to these questions. Yet it is important to our future in a networked, information-dependent world that we come to grips with them. I am deeply interested in them. This paper is my report of what I have discovered in the early stages of what promises to be a longer investigation. I have concentrated my attention in these early stages on the hackers themselves. Who are they? What do they say? What motivates them? What are their values? What do that have to say about public policies regarding information and computers? What do they have to say about computer security?

From such a profile I expect to be able to construct a picture of the discourses in which hacking takes place. By a discourse I mean the invisible background of assumptions that transcends individuals and governs our ways of thinking, speaking, and acting. My initial findings lead me to conclude that this discourse belongs at the very least to the gray areas between larger conflicts that we are experiencing at every level of society and business, the conflict between the idea that information cannot be owned and the idea that it can, and the conflict between law enforcement and the First and Fourth Amendments.

But, enough of the philosophy. On with the story!

2. Opening Moves

In late fall of 1989, Frank Drake (not his real name), Editor of the now defunct cyberpunk magazine W.O.R.M., invited me to be interviewed for the magazine. In accepting the invitation, I hoped that something I might say would discourage hackers from breaking into systems. I was also curious about the hacker culture. This seemed like a good opportunity to learn about it.

The interview was conducted electronically. I quickly discovered that I had much more to learn from Drake's questions than to teach. For example, he asked: ``Is providing computer security for large databases that collect information on us a real service? How do you balance the individual's privacy vs. the corporations?'' This question surprised me. Nothing that I had read about hackers ever suggested that they might care about privacy. He also asked: ``What has [the DES] taught us about what the government's (especially NSA's) role in cryptography should be?'' Again, I was surprised to discover a concern for the role of the government in computer security. I did not know at the time that I would later discover considerable overlap in the issues discussed by hackers and those of other computer professionals.

I met with Drake to discuss his questions and views. After our meeting, we continued our dialog electronically with me interviewing him. This gave me the opportunity to explore his views in greater depth. Both interviews appear in ``Computers Under Attack,'' edited by Peter Denning [DenningP90].

My dialog with Drake increased my curiosity about hackers. I read articles and books by or about hackers. In addition, I had discussions with nine hackers whom I will not mention by name. Their ages ranged from 17 to 28.

The word ``hacker'' has taken on many different meanings ranging from 1) ``a person who enjoys learning the details of computer systems and how to stretch their capabilities'' to 2) ``a malicious or inquisitive meddler who tries to discover information by poking around .. possibly by deceptive or illegal means ...'' [Steele83] The hackers described in this paper satisfy both of these definitions, although all of the hackers I spoke with said they did not engage in or approve of malicious acts that damage systems or files. Thus, this paper is not about malicious hackers. Indeed, my research so far suggests that there are very few malicious hackers. Neither is this paper about career criminals who, for example, defraud businesses, or about people who use stolen credit cards to purchase goods. The characteristics of many of the hackers I am writing about are summed up in the words of one of the hackers: ``A hacker is someone that experiments with systems... [Hacking] is playing with systems and making them do what they were never intended to do. Breaking in and making free calls is just a small part of that. Hacking is also about freedom of speech and free access to information -- being able to find out anything. There is also the David and Goliath side of it, the underdog vs. the system, and the ethic of being a folk hero, albeit a minor one.''

Richard Stallman, founder of the Free Software Foundation who calls himself a hacker according to the first sense of the word above, recommends calling security-breaking hackers ``crackers'' [Stallman84]. While this description may be more accurate, I shall use the term ``hacker'' since the people I am writing about call themselves hackers and all are interested in learning about computer and communication systems. However, there are many people like Stallman who call themselves hackers and do not engage in illegal or deceptive practices; this paper is also not about those hackers.

In what follows I will report on what I have learned about hackers from hackers. I will organize the discussion around the principal domains of concerns I observed. I recommend Meyer's thesis [Meyer89] for a more detailed treatment of the hackers' social culture and networks, and Meyer and Thomas [MeyerThomas90] for an interesting interpretation of the computer underground as a postmodernist rejection of conventional culture that substitutes ``rational technological control of the present for an anarchic and playful future.''

I do not pretend to know all the concerns that hackers have, nor do I claim to have conducted a scientific study. Rather, I hope that my own informal study motivates others to explore the area further. It is essential that we as computer security professionals take into account hackers' concerns in the design of our policies, procedures, laws regulating computer and information access, and educational programs. Although I speak about security-breaking hackers as a group, their competencies, actions, and views are not all the same. Thus, it is equally important that our policies and programs take into account individual differences.

In focusing on what hackers say and do, I do not mean for a moment to set aside the concerns of the owners and users of systems that hackers break into, the concerns of law enforcement personnel, or our own concerns as computer security professionals. But I do recommend that we work closely with hackers as well as these other groups to design new approaches and programs for addressing the concerns of all. Like ham radio operators, hackers exist, and it is in our best interest that we learn to communicate and work with them rather than against them.

I will suggest some actions that we might consider taking, and I invite others to reflect on these and suggest their own. Many of these suggestions are from the hackers themselves; others came from the recommendations of the ACM Panel on Hacking [Lee86] and from colleagues.

I grouped the hackers' concerns into five categories: access to computers and information for learning; thrill, excitement and challenge; ethics and avoiding damage; public image and treatment; and privacy and first amendment rights. These are discussed in the next five subsections. I have made an effort to present my findings as uncritical observations. The reader should not infer that I either approve or disapprove of actions hackers take.

3. Access to Computers and Information for Learning

Although Levy's book ``Hackers'' [Levy84] is not about today's security-breaking hackers, it articulates and interprets a ``hacker ethic'' that is shared by many of these hackers. The ethic includes two key principles that were formulated in the early days of the AI Lab at MIT: ``Access to computers -- and anything which might teach you something about the way the world works -- should be unlimited and total,'' and ``All information should be free.'' In the context in which these principles were formulated, the computers of interest were research machines and the information was software and systems information.

Since Stallman is a leading advocate of open systems and freedom of information, especially software, I asked him what he means by this. He said: ``I believe that all generally useful information should be free. By `free' I am not referring to price, but rather to the freedom to copy the information and to adapt it to one's own uses.'' By ``generally useful'' he does not include confidential information about individuals or credit card information, for example. He further writes: ``When information is generally useful, redistributing it makes humanity wealthier no matter who is distributing and no matter who is receiving.'' Stallman has argued strongly against user interface copyright, claiming that it does not serve the users or promote the evolutionary process [Stallman90].

I asked hackers whether all systems should be accessible and all information should be free. They said that it is OK if some systems are closed and some information, mainly confidential information about individuals, is not accessible. They make a distinction between information about security technology, e.g., the DES, and confidential information protected by that technology, arguing that it is the former that should be accessible. They said that information hoarding is inefficient and slows down evolution of technology. They also said that more systems should be open so that idle resources are not wasted. One hacker said that the high costs of communication hurts the growth of the information economy.

These views of information sharing seem to go back at least as far as the 17th and 18th Centuries. Samuelson [Samuelson89] notes that ``The drafters of the Constitution, educated in the Enlightenment tradition, shared that era's legacy of faith in the enabling powers of knowledge for society as well as the individual.'' She writes that our current copyright laws, which protect the expression of information, but not the information itself, are based on the belief that unfettered and widespread dissemination of information promotes technological progress. (Similarly for patent laws which protect devices and processes, not the information about them.) She cites two recent court cases where courts reversed the historical trend and treated information as ownable property. She raises questions about whether in entering the Information Age where information is the source of greatest wealth, we have outgrown the Enlightenment tradition and are coming to treat information as property.

In a society where knowledge is said to be power, Drake expressed particular concern about what he sees as a growing information gap between the rich and poor. He would like to see information that is not about individuals be made public, although it could still be owned. He likes to think that companies would actually find it to their advantage to share information. He noted how IBM's disclosure of the PC allowed developers to make more products for the computers, and how Adobe's disclosure of their fonts helped them compete against the Apple-Microsoft deal. He recognizes that in our current political framework, it is difficult to make all information public, because complicated structures have been built on top of an assumption that certain information will be kept secret. He cites our defense policy, which is founded on secrecy for military information, as an example.

Hackers say they want access to information and computing and network resources in order to learn. Both Levy [Levy84] and Landreth [Landreth89] note that hackers have an intense, compelling interest in computers and learning, and many go into computers as a profession. Some hackers break into systems in order to learn more about how the systems work. Landreth says these hackers want to remain undiscovered so that they can stay on the system as long as possible. Some of them devote most of their time to learning how to break the locks and other security mechanisms on systems; their background in systems and programming varies considerably. One hacker wrote ``A hacker sees a security hole and takes advantage of it because it is there, not to destroy information or steal. I think our activities would be analogous to someone discovering methods of acquiring information in a library and becoming excited and perhaps engrossed.''

We should not underestimate the effectiveness of the networks in which hackers learn their craft. They do research, learn about systems, work in groups, write, and teach others. One hacker said that he belongs to a study group with the mission of churning out files of information and learning as much as possible. Within the group, people specialize, collaborate on research project, share information and news, write articles, and teach other about their areas of specialization. Hackers have set up a private system of education that engages them, teaches them to think, and allows them to apply their knowledge in purposeful, if not always legal, activity. Ironically, many of our nation's classrooms have been criticized for providing a poor learning environment that seems to emphasize memorization rather than thinking and reasoning. One hacker reported that through volunteer work with a local high school, he was trying to get students turned on to learning.

Many hackers say that the legitimate computer access they have through their home and school computers do not meet their needs. One student told me that his high school did not offer anything beyond elementary courses in BASIC and PASCAL, and that he was bored by these. Hans Huebner, a hacker in Germany who goes by the name Pengo, wrote in a note to the RISKS Forum [Huebner89] : ``I was just interested in computers, not in the data which has been kept on their disks. As I was going to school at that time, I didn't even have the money to buy [my] own computer. Since CP/M (which was the most sophisticated OS I could use on machines which I had legal access to) didn't turn me on anymore, I enjoyed the lax security of the systems I had access to by using X.25 networks. You might point out that I should have been patient and wait[ed] until I could go to the university and use their machines. Some of you might understand that waiting was just not the thing I was keen on in those days.''

Brian Harvey, in his position paper [Harvey86] for the ACM Panel on Hacking, claims that the computer medium available to students, e.g., BASIC and floppy disks, is inadequate for challenging intellectual work. His recommendation is that students be given access to real computing power, and that they be taught how to use that power responsibly. He describes a program he created at a public high school in Massachusetts during the period 1979-1982. They installed a PDP-11/70 and let students and teachers carry out the administration of the system. Harvey assessed that putting the burden of dealing with the problems of malicious users on the students themselves was a powerful educational force. He also noted that the students who had the skill and interest to be password hackers were discouraged from this activity because they also wanted to keep the trust of their colleagues in order that they could acquire ``superuser'' status on the system.

Harvey also makes an interesting analogy between teaching computing and teaching karate. In karate instruction, students are introduced to the real, adult community. They are given access to a powerful, deadly weapon, and at the same time are taught discipline and to not abuse the art. Harvey speculates that the reason that students do not misuse their power is that they know they are being trusted with something important, and they want to live up to that trust. Harvey applied this principle when he set up the school system.

The ACM panel endorsed Harvey's recommendation, proposing a three-tiered computing environment with local, district-wide, and nation-wide networks. They recommended that computer professionals participate in this effort as mentors and role models. They also recommended that outside of schools, government and industry be encouraged to establish regional computing centers using donated or re-cycled equipment; that students be apprenticed to local companies either part-time on a continuing basis or on a periodic basis; and, following a suggestion from Felsenstein [Felsenstein86] for a ``Hacker's League,'' that a league analogous to the Amateur Radio Relay League be established to make contributed resources available for educational purposes.

Drake said he liked these recommendations. He said that if hackers were given access to powerful systems through a public account system, they would supervise themselves. He also suggested that Computer Resource Centers be established in low-income areas in order to help the poor get access to information. Perhaps hackers could help run the centers and teach the members of the community how to use the facilities. One of my colleagues suggested cynically that the hackers would only use this to teach the poor how to hack rich people's systems. A hacker responded by saying this was ridiculous; hackers would not teach people how to break into systems, but rather how to use computers effectively and not be afraid of them. In addition, the hackers I spoke with who had given up illegal activities said they stopped doing so when they got engaged in other work.

Geoff Goodfellow and Richard Stallman have reported that they have given hackers accounts on systems that they manage, and that the hackers have not misused the trust granted to them. Perhaps universities could consider providing accounts to pre-college students on the basis of recommendations from their teachers or parents. The students might be challenged to work on the same homework problems assigned in courses or to explore their own interests. Students who strongly dislike the inflexibility of classroom learning might excel in an environment that allows them to learn on their own, in much the way that hackers have done.

4. Thrill, Excitement, and Challenge

One hacker wrote that ``Hackers understand something basic about computers, and that is that they can be enjoyed. I know none who hack for money, or hack to frighten the company, or hack for anything but fun.''

In the words of another hacker, ``Hacking was the ultimate cerebral buzz for me. I would come home from another dull day at school, turn my computer on, and become a member of the hacker elite. It was a whole different world where there were no condescending adults and you were judged only by your talent. I would first check in to the private Bulletin Boards where other people who were like me would hang out, see what the news was in the community, and trade some info with people across the country. Then I would start actually hacking. My brain would be going a million miles an hour and I'd basically completely forget about my body as I would jump from one computer to another trying to find a path into my target. It was the rush of working on a puzzle coupled with the high of discovery many magnitudes intensified. To go along with the adrenaline rush was the illicit thrill of doing something illegal. Every step I made could be the one that would bring the authorities crashing down on me. I was on the edge of technology and exploring past it, spelunking into electronic caves where I wasn't supposed to be.''

The other hackers I spoke with made similar statements about the fun and challenge of hacking. In SPIN magazine [Dibbel90], reporter Julian Dibbell speculated that much of the thrill comes from the dangers associated with the activity, writing that ``the technology just lends itself to cloak-and-dagger drama,'' and that ``hackers were already living in a world in which covert action was nothing more than a game children played.''

Eric Corley [Corley89] characterizes hacking as an evolved form of mountain climbing. In describing an effort to construct a list of active mailboxes on a Voice Messaging System, he writes ``I suppose the main reason I'm wasting my time pushing all these buttons is simply so that I can make a list of something that I'm not supposed to have and be the first person to accomplish this.'' He said that he was not interested in obtaining an account of his own on the system. Gordon Meyer says he found this to be a recurring theme: ``We aren't supposed to be able to do this, but we can'' -- so they do.

One hacker said he was now working on anti-viral programming. He said it was almost as much fun as breaking into systems, and that it was an intellectual battle against the virus author.

5. Ethics and Avoiding Damage

All of the hackers I spoke with said that malicious hacking was morally wrong. They said that most hackers are not intentionally malicious, and that they themselves are concerned about causing accidental damage. When I asked Drake about the responsibility of a person with a PC and modem, his reply included not erasing or modifying anyone else's data, and not causing a legitimate user on a system any problems. Hackers say they are outraged when other hackers cause damage or use resources that would be missed, even if the results are unintentional and due to incompetence. One hacker wrote ``I have ALWAYS strived to do NO damage, and inconvenience as few people as possible. I NEVER, EVER, EVER DELETE A FILE. One of the first commands I do on a new system is disable the delete file command.'' Some hackers say that it is unethical to give passwords and similar security-related information to persons who might do damage. In the recent incident where a hacker broke into Bell South and downloaded a text file on the emergency 911 service, hackers say that there was no intention to use this knowledge to break into or sabotage the 911 system. According to Emmanuel Goldstein [Goldstein90], the file did not even contain information about how to break into the 911 system.

The hackers also said that some break-ins were unethical, e.g., breaking into hospital systems, and that it is wrong to read confidential information about individuals or steal classified information. All said it was wrong to commit fraud for personal profit.

Although we as computer security professionals often disagree with hackers about what constitutes damage, the ethical standards listed sound much like our own. Where the hackers' ethics differs from the standards adopted by most in the computer security community is that hackers say it is not unethical to break into many systems, use idle computer and communications resources, and download system files in order to learn. Goldstein says that hacking is not wrong: it is not the same as stealing, and uncovers design flaws and security deficiencies [Goldstein89].

Brian Reid speculates that a hacker's ethics may come from not being raised properly as a civilized member of society, and not appreciating the rules of living in society. One hacker responded to this with ``What does `being brought up properly' mean? Some would say that it is `good' to keep to yourself, mind your own business. Others might argue that it is healthy to explore, take risks, be curious and discover.'' Brian Harvey [Harvey86] notes that many hackers are adolescents, and that adolescents are at a less developed stage of moral development than adults, where they might not see how the effects of their actions hurt others. Larry Martin [Martin89] claims that parents, teachers, the press, and others in society are not aware of their responsibility to contribute to instilling ethical values associated with computer use. This could be the consequence of the youth of the computing field; many people are still computer illiterate and cultural norms may be lagging behind advances in technology and the growing dependency on that technology by businesses and society. Hollinger and Lanza-Kaduce speculate that the cultural normative messages about the use and abuse of computer technology have been driven by the adaption of criminal laws [HollingerLanza-Kaduce88], which have been mainly in the last decade. They also speculate that hacking may be encouraged during the process of becoming computer literate. Some of my colleagues say that hackers are irresponsible. One hacker responded ``I think it's a strong indication of the amount of responsibility shown that so FEW actually DAMAGING incidents are known.''

But we must not overlook that the differences in ethics also reflect a difference in philosophy about information and information handling resources; whereas hackers advocate sharing, we seem to be advocating ownership as property. The differences also represent an opportunity to examine our own ethical behavior and our practices for information sharing and protection. For example, one hacker wrote ``I will accept that it is morally wrong to copy some proprietary software, however, I think that it is morally wrong to charge $6000 for a program that is only around 25K long.'' Hence, I shall go into a few of the ethical points raised by hackers more closely. It is not a simple case of good or mature (us) against bad or immature (hackers), or of teaching hackers a list of rules.

Many computer professionals argue the moral questions by analogy, e.g., see Martin [Martin89]. The analogies are then used to justify their judgement of a hacker's actions as unethical. Breaking into a system is compared with breaking into a house, and downloading information and using computer and telecommunications services is compared with stealing tangible goods. But, say hackers, the situations are not the same. When someone breaks into a house, the objective is to steal goods, which are often irreplaceable, and property is often damaged in the process. By contrast, when a hacker breaks into a system, the objective is to learn and avoid causing damage. Downloaded information is copied, not stolen, and still exists on the original system. Moreover, as noted earlier, information has not been traditionally regarded as property. Dibbel [Dibbel90] says that when the software industries and phone companies claim losses of billions of dollars to piracy, they are not talking about goods that disappear from the shelves and could have been sold.

We often say that breaking into a system implies a lack of caring for the system's owner and authorized users. But, one hacker says that the ease of breaking into a system reveals a lack of caring on the part of the system manager to protect user and company assets, or failure on the part of vendors to warn managers about the vulnerabilities of their systems. He estimated his success rate of getting in at 10-15%, and that is without spending more than an hour on any one target system. Another hacker says that he sees messages from vendors notifying the managers, but that the managers fail to take action.

Richard Pethia of CERT (Computer Emergency Response Team) reports that they seldom see cases of malicious damage caused by hackers, but that the break-ins are nevertheless disruptive because system users and administrators want to be sure that nothing was damaged. (CERT suggests that sites reload system software from secure backups and change all user passwords in order to protect against possible back doors and Trojan Horses that might have been planted by the hacker. Pethia also noted that prosecutors are generally called for government sites, and are being called for non-government sites with increasing frequency.) Pethia says that break-ins also generate a loss of trust in the computing environment, and may lead to adoption of new policies that are formulated in a panic or management edicts that severely restrict connectivity to outside systems. Brian Harvey says that hackers cause damage by increasing the amount of paranoia, which in turn leads to tighter security controls that diminish the quality of life for the users. Hackers respond to these points by saying they are the scapegoats for systems that are not adequately protected. They say that the paranoia is generated by ill-founded fears and media distortions (I will return to this point later), and that security need not be oppressive to keep hackers out; it is mainly making sure that passwords and system defaults are well-chosen.

Pethia says that some intruders seem to be disruptive to prove a point, such as that the systems are vulnerable, the security personnel are incompetent, or ``it's not nice to say bad things about hackers.'' In the N.Y. Times, John Markoff [Markoff90] wrote that the hacker who claimed to have broken into Cliff Stoll's system said he was upset by Stoll's portrayal of hackers in ``The Cuckoo's Egg'' [Stoll90]. Markoff reported that the caller said: ``He [Stoll] was going on about how he hates all hackers, and he gave pretty much of a one-sided view of who hackers are.''

``The Cuckoo's Egg'' captures much of the popular stereotypes of hackers. Criminologist Jim Thomas criticizes it for presenting a simplified view of the world, one where everything springs from the forces of light (us) or of darkness (hackers) [Thomas90]. He claims that Stoll fails to see the similarities between his own activities (e.g., monitoring communications, ``borrowing'' monitors without authorization, shutting off network access without warning, and lying to get information he wants) and those of hackers. He points out Stoll's use of pejorative words such as ``varmint'' to describe hackers, and Stoll's quote of a colleague: ``They're technically skilled but ethically bankrupt programmers without any respect for others' work -- or privacy. They're not destroying one or two programs. They're trying to wreck the cooperation that builds our networks.'' [Stoll90, p. 159] Thomas writes ``at an intellectual level, [Stoll] provides a persuasive, but simplistic, moral imagery of the nature of right and wrong, and provides what -- to a lay reader -- would seem a compelling justification for more statutes and severe penalties against the computer underground. This is troublesome for two reasons. First, it leads to a mentality of social control by law enforcement during a social phase when some would argue we are already over-controlled. Second, it invokes a punishment model that assumes we can stamp out behaviors to which we object if only we apprehend and convict a sufficient number of violators. ... There is little evidence that punishment will in the long run reduce any given offense, and the research of Gordon Meyer and I suggests that criminalization may, in fact, contribute to the growth of the computer underground.''

6. Public Image and Treatment

Hackers express concern about their negative public image and identity. As noted earlier, hackers are often portrayed as being irresponsible and immoral. One hacker said that ``government propaganda is spreading an image of our being at best, sub-human, depraved, criminally inclined, morally corrupt, low life. We need to prove that the activities that we are accused of (crashing systems, interfering with life support equipment, robbing banks, and jamming 911 lines) are as morally abhorent to us as they are to the general public.''

The public identity of an individual or group is generated in part by the actions of the group interacting with the standards of the community observing those actions. What then accounts for the difference between the hacker's public image and what they say about themselves? One explanation may be the different standards. Outside the hacking community, the simple act of breaking into systems is regarded as unethical by many. The use of pejorative words like ``vandal'' and ``varmint'' reflect this discrepency in ethics. Even the word ``criminal'' carries with it connotations of someone evil; hackers say they are not criminal in this sense. Katie Hafner notes that Robert Morris, who was convicted of launching the Internet worm, was likened to a terrorist even though the worm did not destroy data [Hafner90].

Distortions of events and references to potential threats also create an image of persons who are dangerous. Regarding the 911 incident where a hacker downloaded a file from Bell South, Goldstein reported ``Quickly, headlines screamed that hackers had broken into the 911 system and were interfering with emergency telephone calls to the police. One newspaper report said there were no indications that anyone had died or been injured as a result of the intrusions. What a relief. Too bad it wasn't true.'' [Goldstein90] In fact, the hackers involved with the 911 text file had not broken into the 911 system. The dollar losses attributed to hacking incidents also are often highly inflated.

Thomas and Meyer [ThomasMeyer90] say that the rhetoric depicting hackers as a dangerous evil contributes to a ``witch hunt'' mentality, wherein a group is first labeled as dangerous, and then enforcement agents are mobilized to exorcise the alleged social evil. They see the current sweeps against hackers as part of a reaction to a broader fear of change, rather than to the actual crimes committed.

Hackers say they are particularly concerned that computer security professionals and system managers do not appear to understand hackers or be interested in their concerns. Hackers say that system managers treat them like enemies and criminals, rather than as potential helpers in their task of making their systems secure. This may reflect managers' fears about hackers, as well as their responsibilities to protect the information on their systems. Stallman says that the strangers he encounters using his account are more likely to have a chip on their shoulder than in the past; he attributes this to a harsh enforcer mentality adopted by the establishment. He says that network system managers start out with too little trust and a hostile attitude toward strangers that few of the strangers deserve. One hacker said that system managers show a lack of openness to those who want to learn.

Stallman also says that the laws make the hacker scared to communicate with anyone even slightly ``official,'' because that person might try to track the hacker down and have him or her arrested. Drake raised the issue of whether the laws could differentiate between malicious and nonmalicious hacking, in support of a ``kinder, gentler'' relationship between hackers and computer security people. In fact, many states such as California initially passed computer crime laws that excluded malicious hacking; it was only later that these laws were amended to include nonmalicious actions [HollingerLanza-Kaduce88]. Hollinger and Lanza-Kaduce speculate that these amendments and other new laws were catalyzed mainly by media events, especially the reports on the ``414 hackers'' and the movie ``War Games,'' which created a perception of hacking as extremely dangerous, even if that perception was not based on facts.

Hackers say they want to help system managers make their systems more secure. They would like managers to recognize and use their knowledge about design flaws and the outsider threat problem. Landreth [Landreth89] suggests ways in which system managers can approach hackers in order to turn them into colleagues, and Goodfellow also suggests befriending hackers [Goodfellow83]. John Draper (Cap'n Crunch) says it would help if system managers and the operators of phone companies and switches could coopererate in tracing a hacker without bringing in law enforcement authorities.

Drake suggests giving hackers free access in exchange for helping with security, a suggestion that I also heard from several hackers. Drake says that the current attitude of treating hackers as enemies is not very conducive to a solution, and by belittling them, we only cause ourselves problems.

I asked some of the hackers whether they'd be interested in breaking into systems if the rules of the ``game'' were changed so that instead of being threatened by prosecution, they were invited to leave a ``calling card'' giving their name, phone number, and method of breaking in. In exchange, they would get recognition and points for each vulnerability they discovered. Most were interested in playing; one hacker said he would prefer monetary reward since he was supporting himself. Any system manager interested in trying this out could post a welcome message inviting hackers to leave their cards. This approach could have the advantage of not only letting the hackers contribute to the security of the system, but of allowing the managers to quickly recognize the potentially malicious hackers, since they are unlikely to leave their cards. Perhaps if hackers are given the opportunity to make contributions outside the underground, this will dampen their desire to pursue illegal activities.

Several hackers said that they would like to be able to pursue their activities legally and for income. They like breaking into systems, doing research on computer security, and figuring out how to protect against vulnerabilities. They say they would like to be in a position where they have permission to hack systems. Goodfellow suggests hiring hackers to work on tiger teams that are commissioned to locate vulnerabilities in systems through penetration testing. Baird Info-Systems Safeguards, Inc., a security consulting firm, reports that they have employed hackers on several assignments [Baird87]. They say the hackers did not violate their trust or the trust of their clients, and performed in an outstanding manner. Baird believes that system vulnerabilities can be better identified by employing people who have exploited systems.

One hacker suggested setting up a clearinghouse that would match hackers with companies that could use their expertise, while maintaining anonymity of the hackers and ensuring confidentiality of all records. Another hacker, in describing an incident where he discovered a privileged account without a password, said ``What I (and others) wish for is a way that hackers can give information like this to a responsible source, AND HAVE HACKERS GIVEN CREDIT FOR HELPING! As it is, if someone told them that `I'm a hacker, and I REALLY think you should know...' they would freak out, and run screaming to the SS [Secret Service] or the FBI. Eventually, the person who found it would be caught, and hauled away on some crazy charge. If they could only just ACCEPT that the hacker was trying to help!'' The clearinghouse could also provide this type of service.

Hackers are also interested in security policy issues. Drake expressed concern over how we handle information about computer security vulnerabilities. He argues that it is better to make this information public than cover it up and pretend that it does not exist, and cites the CERT to illustrate how this approach can be workable. Other hackers, however, argue for restricting initial dissemination of flaws to customers and users. Drake also expressed concern about the role of the government, particularly the military, in cryptography. He argues that NSA's opinion on a cryptographic standard should be taken with a large grain of salt because of their code breaking role.

Some security specialists are opposed to hiring hackers for security work, and Eugene Spafford has urged people not to do business with any company that hires a convicted hacker to work in the security area [ACM90]. He says that ``This is like having a known arsonist install a fire alarm.'' But, the laws are such that a person can be convicted for having done nothing other than break into a system; no serious damage (i.e., no ``computer arson'') is necessary. Many of our colleagues admit to having broken into systems in the past, e.g., Geoff Goodfellow [Goodfellow83] and Brian Reid [Frenkel87]; Reid is quoted as saying that because of the knowledge he gained breaking into systems as a kid, he was frequently called in to help catch people who break in. Spafford says that times have changed, and that this method of entering the field is no longer socially acceptable, and fails to provide adequate training in computer science and computer engineering [Spafford89]. However, from what I have observed, many hackers do have considerable knowledge about telecommunications, data security, operating systems, programming languages, networks, and cryptography. But, I am not challenging a policy to hire competent people of sound character. Rather, I am challenging a strict policy that uses economic pressure to close a field of activity to all persons convicted of breaking into systems. It is enough that a company is responsible for the behavior of its employees. Each hacker can be considered for employment based on his or her own competency and character.

Some people have called for stricter penalties for hackers, including prison terms, in order to send a strong deterrent message to hackers. John Draper, who was incarcerated for his activities in the 1970's, argues that in practice this will only make the problem worse. He told me that he was forced under threat to teach other inmates his knowledge of communications systems. He believes that prison sentences will serve only to spread hacker's knowledge to career criminals. He said he was never approached by criminals outside the prison, but that inside the prison they had control over him.

One hacker said that by clamping down on the hobbyist underground, we will only be left with the criminal underground. He said that without hackers to uncover system vulnerabilities, the holes will be left undiscovered, to be utilized by those likely to cause real damage.

Goldstein argues that the existing penalties are already way out of proportion to the acts committed, and that the reason is because of computers [Goldstein89]. He says that if Kevin Mitnick had committed crimes similar to those he committed but without a computer, he would have been classified as a mischief maker and maybe fined $100 for trespassing; instead, he was put in jail without bail [Goldstein89]. Craig Neidorf, a publisher and editor of the electronic newsletter ``Phrack,'' faces up to 31 years and a fine of $122,000 for receiving, editing, and transmitting the downloaded text file on the 911 system [Goldstein90].

7. Privacy and the First and Fourth Amendments

The hackers I spoke with advocated privacy protection for sensitive information about individuals. They said they are not interested in invading people's privacy, and that they limited their hacking activities to acquiring information about computer systems or how to break into them. There are, of course, hackers who break into systems such as the TRW credit database. Emanuel Goldstein argues that such invasions of privacy took place before the hacker arrived [Harpers90]. Referring to credit reports, government files, motor vehicle records, and the ``megabytes of data piling up about each of us,'' he says that thousands of people legally can see and use this data, much of it erroneous. He claims that the public has been misinformed about the databases, and that hackers have become scapegoats for the holes in the systems. One hacker questioned the practice of storing sensitive personal information on open systems with dial-up access, the accrual of the information, the methods used to acquire it, and the purposes to which it is put. Another hacker questioned the inclusion of religion and race in credit records.

Drake told me that he was concerned about the increasing amount of information about individuals that is stored in large data banks, and the inability of the individual to have much control over the use of that information. He suggests that the individual might be co-owner of information collected about him or her, with control over the use of that information. He also says that an individual should be free to withhold personal information, of course paying the consequences of doing so (e.g., not getting a drivers license or credit card). (In fact, all Federal Government forms are required to contain a Privacy Act Statement that states how the information being collected will be used and, in some cases, giving the option of withholding the information.)

Goldstein has also challenged the practices of law enforcement agencies in their attempt to crack down on hackers [Goldstein90]. He said that all incoming and outgoing electronic mail used by ``Phrack'' was monitored before the newsletter was shutdown by authorities. ``Had a printed magazine been shut down in this fashion after having all of their mail opened and read, even the most thick-headed sensationalist media types would have caught on: hey, isn't that a violation of the First Amendment?'' He also cites the shutdown of several bulletin boards as part of Operation Sun Devil, and quotes the administrator of the bulletin board Zygot as saying ``Should I start reading my users' mail to make sure they aren't saying anything naughty? Should I snoop through all the files to make sure everyone is being good? This whole affair is rather chilling.'' The administrator for the public system The Point wrote ``Today, there is no law or precedent which affords me ... the same legal rights that other common carriers have against prosecution should some other party (you) use my property (The Point) for illegal activities. That worries me ...''

About 40 personal computer systems and 23,000 data disks were seized under Operation Sun Devil, a two-year investigation involving the FBI, Secret Service, and other federal and local law enforcement officials. In addition, the Secret Service acknowledges that its agents, acting as legitimate users, had secretly monitored computer bulletin boards [Markoff90a]. Markoff reports that California Representative Don Edwards, industry leader Mitchell Kapor, and civil liberties advocates are alarmed by these government actions, saying that they challenge freedom of speech under the First Amendment and protection against searches and seizures under the Fourth Amendment. Markoff asks: ``Will fear of hackers bring oppression?''

John Barlow writes ``The Secret Service may actually have done a service for those of us who love liberty. They have provided us with a devil. And devils, among their other galvanizing virtues, are just great for clarifying the issues and putting iron in your spine.'' [Barlow90] Some of the questions that Barlow says need to be addressed include ``What are data and what is free speech? How does one treat property which has no physical form and can be infinitely reproduced? Is a computer the same as a printing press?'' Barlow urges those of us who understand the technology to address these questions, lest the answers be given to us by law makers and law enforcers who do not. Barlow and Kapor are constituting the Computer Liberty Foundation to ``raise and disburse funds for education, lobbying, and litigation in the areas relating to digital speech and the extension of the Constitution into Cyberspace.''

8. Conclusions

Hackers say that it is our social responsibility to share information, and that it is information hoarding and disinformation that are the crimes. This ethic of resource and information sharing contrasts sharply with computer security policies that are based on authorization and ``need to know.'' This discrepancy raises an interesting question: Does the hacker ethic reflects a growing force in society that stands for greater sharing of resources and information -- a reaffirmation of basic values in our constitution and laws? It is important that we examine the differences between the standards of hackers, systems managers, users, and the public. These differences may represent breakdowns in current practices, and may present new opportunities to design better policies and mechanisms for making computer resources and information more widely available.

The sentiment for greater information sharing is not restricted to hackers. In the best seller ``Thriving on Chaos,'' Tom Peters [Peters87] writes about sharing within organizations: ``Information hoarding, especially by politically motivated, power-seeking staffs, has been commonplace throughout American industry, service and manufacturing alike. It will be an impossible millstone around the neck of tomorrow's organizations. Sharing is a must.'' Peters argues that information flow and sharing is fundamental to innovation and competetiveness. On a broader scale, Peter Drucker [Drucker89] says that the ``control of information by government is no longer possible. Indeed, information is now transnational. Like money, it has no `fatherland.' ''

Nor is the sentiment restricted to people outside the computer security field. Harry DeMaio [DeMaio89] says that our natural urge is to share information, and that we are suspicious of organizations and individuals who are secretive. He says that information is exchanged out of ``want to know'' and mutual accommodation rather than ``need to know.'' If this is so, then some of our security policies are out of step with the way people work. Peter Denning [DenningP89] says that information sharing will be widespread in the emerging worldwide networks of computers and that we need to focus on ``immune systems'' that protect against mistakes in our designs and recover from damage.

I began my investigation of hackers with the question: who are they and what is their culture and discourse? My investigation uncovered some of their concerns, which provided the organizational structure to this paper, and several suggestions for new actions that might be taken. My investigation also opened up a broader question: What are the clashing discourses that the hackers stand at the battle lines of? Is it owning or restricting information vs. sharing information -- a tension between an age-old tradition of controlling information as property and the Englightenment tradition of sharing and disseminating information? Is it controlling access based on ``need to know,'' as determined by the information provider, vs. ``want to know,'' as determined by the person desiring access? Is it law enforcement vs. freedoms granted under the First and Fourth Amendments? The answers to these questions, as well as those raised by Barlow on the nature of information and free speech, are important because they tell us whether our policies and practices serve us as well as they might. The issue is not simply hackers vs. system managers or law enforcers; it is a much larger question about values and practices in an information society.

Acknowledgments

I am deeply grateful to Peter Denning, Frank Drake, Nathan Estey, Katie Hafner, Brian Harvey, Steve Lipner, Teresa Lunt, Larry Martin, Gordon Meyer, Donn Parker, Morgan Schweers, Richard Stallman, and Alex for their comments on earlier versions of this paper and helpful discussions; to Richard Stallman for putting me in contact with hackers; John Draper, Geoff Goodfellow, Brian Reid, Eugene Spafford, and the hackers for helpful discussions; and Richard Pethia for a summary of some of his experiences at CERT. The opinions expressed here, however, are my own and do not necessarily represent those of the people mentioned above or of Digital Equipment Corporation.

References

ACM90 ``Just say no,'' Comm. ACM, Vol. 33, No. 5, May 1990, p. 477.

Baird87 Bruce J. Baird, Lindsay L. Baird, Jr., and Ronald P. Ranauro, ``The Moral Cracker?,'' Computers and Security, Vol. 6, No. 6, Dec. 1987, p. 471-478.

Barlow90 John Barlow, ``Crime and Puzzlement,'' June 1990, to appear in Whole Earth Review.

Corley89 Eric Corley, ``The Hacking Fever,'' in Pamela Kane, V.I.R.U.S. Protection, Bantam Books, New York, 1989, p. 67-72.

DeMaio89 Harry B. DeMaio, ``Information Ethics, a Practical Approach,'' Proc. of the 12th National Computer Security Conference, 1989, p. 630-633.

DenningP89 Peter J. Denning, ``Worldnet,'' American Scientist, Vol. 77, No. 5, Sept.-Oct., 1989.

DenningP90 Peter J. Denning, Computers Under Attack, ACM Press, 1990.

Dibbel90 Julian Dibbel, ``Cyber Thrash,'' SPIN, Vol. 5, No. 12, March 1990.

Drucker89 Peter F. Drucker, The New Realities, Harper and Row, New York, 1989.

Felsenstein86 Lee Felsenstein, ``Real Hackers Don't Rob Banks,'' in full report on ACM Panel on Hacking [Lee86].

Frenkel87 Karen A. Frenkel, ``Brian Reid, A Graphics Tale of a Hacker Tracker,'' Comm. ACM, Vol. 30, No. 10, Oct. 1987, p. 820-823.

Goldstein89 Emmanuel Goldstein, ``Hackers in Jail,'' 2600 Magazine, Vol. 6, No. 1, Spring 1989.

Goldstein90 Emmanuel Goldstein, ``For Your Protection,'' 2600 Magazine, Vol. 7, No. 1, Spring 1990.

Goodfellow83 Geoffrey S. Goodfellow, ``Testimony Before the Subcommittee on Transportation, Aviation, and Materials on the Subject of Telecommunications Security and Privacy,'' Sept. 26, 1983.

Hafner90 Katie Hafner, ``Morris Code,'' The New Republic, Feb. 16, 1990, p. 15-16.

Harpers90 ``Is Computer Hacking a Crime?" Harper's, March 1990, p. 45-57.

Harvey86 Brian Harvey, ``Computer Hacking and Ethics,'' in full report on ACM Panel on Hacking [Lee86].

HollingerLanza-Kaduce88 Richard C. Hollinger and Lonn Lanza-Kaduce, ``The Process of Criminalization: The Case of Computer Crime Laws,'' Criminology, Vol. 26, No. 1, 1988, p. 101-126.

Huebner89 Hans Huebner, ``Re: News from the KGB/Wiley Hackers,'' RISKS Digest, Vol. 8, Issue 37, 1989.

Landreth89 Bill Landreth, Out of the Inner Circle, Tempus, Redmond, WA, 1989.

Lee86 John A. N. Lee, Gerald Segal, and Rosalie Stier, ``Positive Alternatives: A Report on an ACM Panel on Hacking,'' Comm. ACM, Vol. 29, No. 4, April 1986, p. 297-299; full report available from ACM Headquarters, New York.

Levy84 Steven Levy, Hackers, Dell, New York, 1984.

Markoff90 John Markoff, ``Self-Proclaimed `Hacker' Sends Message to Critics,'' The New York Times, March 19, 1990.

Markoff90a John Markoff, ``Drive to Counter Computer Crime Aims at Invaders,'' The New York Times, June 3, 1990.

Martin89 Larry Martin, ``Unethical `Computer' Behavior: Who is Responsible?,'' Proc. of the 12th National Computer Security Conference, 1989.

Meyer89 Gordon R. Meyer, The Social Organization of the Computer Underground, Master's thesis, Dept. of Sociology, Northern Illinois Univ., Aug. 1989.

MeyerThomas90 Gordon Meyer and Jim Thomas, ``The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground,'' Dept. of Sociology, Northern Illinois Univ., DeKalb, IL, March 1990.

Peters87 Tom Peters, Thriving on Chaos, Harper & Row, New York, Chapter VI, S-3, p. 610, 1987.

Samuelson89 Pamela Samuelson, ``Information as Property: Do Ruckelshaus and Carpenter Signal a Changing Direction in Intellectual Property Law?" Catholic University Law Review, Vol. 38, No. 2, Winter 1989, p. 365-400.

Spafford89 Eugene H. Spafford, ``The Internet Worm, Crisis and Aftermath,'' Comm. ACM, Vol. 32, No. 6, June 1989, p. 678-687.

Stallman84 Richard M. Stallman, Letter to ACM Forum, Comm. ACM, Vol. 27, No. 1, Jan. 1984, p. 8-9.

Stallman90 Richard M. Stallman, ``Against User Interface Copyright'' to appear in Comm. ACM.

Steele83 Guy L. Steele, Jr., Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow, The Hacker's Dictionary, Harper & Row, New York, 1983.

Stoll90 Clifford Stoll, The Cuckoo's Egg, Doubleday, 1990.

Thomas90 Jim Thomas, ``Review of The Cuckoo's Egg,'' Computer Underground Digest, Issue #1.06, April 27, 1990.

ThomasMeyer90 Jim Thomas and Gordon Meyer, ``Joe McCarthy in a Leisure Suit: (Witch)Hunting for the Computer Underground,'' Unpublished manuscript, Department of Sociology, Northern Illinois University, DeKalb, IL, 1990; see also the Computer Underground Digest, Vol. 1, Issue 11, June 16, 1990.

Dorothy E. Denning
Digital Equipment Corp., Systems Research Center
130 Lytton Ave., Palo Alto, CA 94301
415-853-2252, [email protected]
248  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Bugs, Keyloggers, and Honey Pots: Who's Watching Your Ass on the Internet? on: October 15, 2006, 12:30:40 PM
Bugs, Keyloggers, and Honey Pots: Who's Watching Your Ass on the Internet?
by RW

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

Bugs, Keyloggers, and Honey Pots, Or...Who's Watching Your Ass on the Internet?

Revolutionary Worker #1117
September 2, 2001
rwor.org

"Security is a matter of degree. The best that you can do is make it harder to get access to your information. But there is simply no way to keep everyone out all of the time. I do not transmit private information wirelessly, ever. I keep my private records on a computer that is not connected to the Internet. I assume all email and instant messages that I send are about as private as a postcard. Everyone really needs to develop a whole lot of healthy paranoia."

Tepes, self-described cracker, wired.com Feb. 6, 2001

"You have zero privacy anyway-get over it."

Scott McNealy, CEO, Sun Microsystems

Whenever you get information on the internet, you may also be giving it away.

People now use the internet for many important means of communication. People visit websites for news and information (and increasingly to buy things.) They exchange email. And increasingly various forms of discussion on the internet (including email lists, web-based threads, and newsgroups) are an important way of sharing views and debating issues.

It is important to understand how you may be giving away your privacy when you do this-revealing your identity, location, and interests to potentially hostile forces and even exposing private data stored on your hard drive to them.

The world of internet spying is changing rapidly. Not only are technical capabilities for surveillance developing, but many of them are being kept secret from the public so that people cannot take effective countermeasures.

At the same time, the legal right of commercial interests and government agents to gather information is not yet clear-many legal issues about internet spying are still being decided within the government and contested in the courts.

In this article we focus on recent events connected to internet spying that give a sense of what is publicly reported about spying activities and capabilities.

Federal Honey Pot

"More than merely another successfully prosecuted case, Operation Avalanche stands as a model of federal, state, and local cooperation in the investigation....There are no free rides on the Information Highway."

U.S. Attorney General John Ashcroft, August 8, 2001

On August 8, the federal authorities revealed a two-year internet sting operation called Operation Avalanche-involving a joint team of the FBI, Dallas police and U.S. Postal Inspection Service. In September 1999, the authorities arrested key figures of an alleged illegal pornography ring. The joint task force then continued operating the website of this ring (as if nothing had happened)-by their own account gathering information on 250,000 people around the world who subscribed to the service. This web-based investigation was used to target 144 homes in 37 different states for raids and searches. Over 100 people have been arrested so far.

Providing an illegal service to attract people for investigation is a police technique called "a honey pot." The website attracted people interested in its goods, and once they were there, the police convinced them to provide personal information that could be used for search warrants and arrests. It is a technique that has been widely used by police against radical and revolutionary forces around the world-long before there was an internet.

Historically, political police have circulated petitions at political gatherings to gather names and addresses of participants. Now such practices are being transported to the internet.

In "Operation Avalanche," the authorities asked for personal information (like a credit card number, a personal email address, mailing address) when visitors bought "membership" access to private pages of the website and when they paid for materials to be delivered through the mail.

This highly publicized "Operation Avalanche" case targeted alleged merchants of child pornography and the FBI posed as the defender of children. This continues the federal attempt to use child pornography and online solicitation by child molesters as their justification for widespread police spying on the internet. Under the Internet Crimes Against Children Task Force Program, federal authorities are training and funding nearly 60 city, county and state law enforcement agencies to spy on the internet.

Visits Leaving Traces

Anyone visiting a website is making some information available in the website's records. Webmasters can tell what "domains" or Internet Service Provider (ISP) visitors have come from (was it from AOL, or Earthlink, or MCI or AT&T, etc.). They can tell when a session started, and what pages a specific visitor saw. That information does not, necessarily, provide the specific identify of a visitor, or even the specific computer or internet account they used to surf to the website.

But over the last few years, more and more sophisticated techniques have been developed to help businesses and government agents identify exactly who was traveling to websites and what they were doing there.

It is possible for hostile forces to embed little programs on websites (and in email) that get deposited on a visitor's computers. These programs (called Java, or Active X or "web bugs") can potentially do a wide range of things-from erase data, to report back information about your hard drive and activities.

When people connect to the internet, they are connecting their computer to an Internet Service Provider (ISP) computer, and from there to a distant computer containing the website they want.

Though situations vary, it is generally possible for every site you visit to record the unique internet protocol number (IP address) from which you are currently connecting to the internet.

If you are dialing up with a DSL or cable modem this can lead directly back to your personal machine.

If you are dialing up with a modem connection, your ISP may record information on this IP address that leads back to your personal account.

Once authorities identify that an ISP is providing internet access to someone they are interested in, the police can demand that the ISP turn over information about that account. The information an ISP has about internet users varies, but they often include the credit card number that is used to pay for the account.

In at least one case, it was revealed that an ISP kept caller ID logs of people dialing up with their modems, and they were able to provide the police with the specific phone numbers used to connect to that internet account.

One Dutch ISP recently announced they would not cooperate with such requests, But unfortunately, it appears that such non-cooperation is quite rare. Recently, the New York Law Journal reported that federal authorities succeeded in getting the first court order to have a cable ISP turn over log records and account information without informing the people being spied on. Other kinds of ISPs have been routinely complying with such court orders for some time.

Workplace Spying

"On an individual user, we can see what you're emailing, where you are surfing, if you send anything to be printed, collaborate with anyone on a Word document, access or change the database-basically everything you're doing on the network."

Kris Haworth, manager at the consulting firm of Deloitte & Touche

"I tell employees that if they want to have truly private communications, don't have them from work."

Shanti Atkins, consultant with Employment Law Learning Technologies

It is not widely known yet what information ISPs record, and what information authorities are able to get from them. But one place where there has been documentation of the technical possibilities of ISP spying is the workplace. For millions of people, their employer is their ISP while they are at work. In several cases, courts have ruled that if employers own the computers and the computer networks and provide internet connections for work, they have the legal right to spy on whatever their employees are doing.

There are widely different estimates of how many workers are being routinely spied on. One estimate is that 15 percent of U.S. workers with internet access have their email monitored systematically and 19 percent have their web surfing continuously tracked. A 2001 study by the American Management Association found that 78 percent of U.S. firms monitor employee communications in some way, and 47 percent of them peek at their workers' email-up nearly 10 percent over the year before. International Data Corporation (IDC) estimates that in 1999 corporations worldwide spent $62 million on internet filtering and monitoring software like Websense and Surfcontrol. IDC predicts that figure will rise to $561 million by 2005.

One example of a new level of corporate capabilities is SilentRunner, developed by military giant Raytheon Corporation. SilentRunner secretly gathers and organizes comprehensive information on all activities on a computer network-including detailed profiles of what each individual worker is doing on the Internet. It tracks the transfer of web pages, email, digital video and sound files, spreadsheets, Word documents, FTP, instant messages, passwords, you name it-all at high speed. It uses programs that go far beyond traditional "keyword sniffers," and its developers claim that SilentRunner can identify the writing style of any individual in any language and then track unsigned email and documents written by that person across the network. "An email could be fed to the system as a template, and then it would cluster others like it," said Christopher Scott, a chief architect of the software. "It's like a DNA sample of someone's writing."

SilentRunner has been reportedly purchased by government agencies. The security consultant firm TruSecure used the $65,000 software widely for its 400 clients. But no employer has publicly admitted to using SilentRunner to monitor its own employees. Only Connecticut currently requires employers to notify their workers of monitoring.

The Case of the Spied-Upon Judges

Early this summer, several dozen employees of the federal courts were disciplined for "inappropriate web surfing" from their office computers. As a result, it became common knowledge that everyone in the system was being spied upon by the Administrative Office of the Courts, a small agency in Washington, D.C. that runs the operations side of the federal court system-about 10,000 court employees, including 700 judges.

The judges of the federal Ninth Circuit, which covers nine western states were furious to find out they were monitored. And the judges had the Circuit's tech crew pull the plug, dismantling the spy system for about a week in May. The incident brought amused headlines, like the New York Times banner that read (August 8, 2001): "Rebels in Black Robes Recoil at Surveillance of Computers."

The rebellion didn't last long. On August 13, the Administrative Office distributed recommendations by a panel of 14 federal judges headed by Edwin L. Nelson, a district judge in Birmingham, Alabama-it essentially upheld the right of court administrators in Washington to monitor all court computers. It pointed out that this was the same policy that is already in effect throughout much of the executive branch. It requires that all employees be given notice before they use an office computer that they forfeit a right to privacy while doing so.

The issue may be finally resolved after the Judicial Conference of the United States meets on September 11.

The Case of the Outted Anonymous Service

In order to protect themselves from snooping, millions of people have used anonymous surfing services, like Anonymizer.com. Basically these services put a protective computer between your ISP and your destination website, and your personal information is stripped out. Your ISP (including employers) cannot easily see your end destination, they just see that you visited the anonymous site. And the destination website cannot easily record your personal information, it just sees that you came from the anonymous server.

These services are believed to be effective in hiding some information. But they are only as reliable as the anonymous service. Which leads us to the story of "Safeweb."

One of the well-known anonymity dot-coms, Safeweb, was recently "outted" for its ties to the CIA. The Oakland firm, Safeweb, received about $1 million (out of a capital investment of $8 million) from In-Q-Tel, a Northern Virginia company created by the CIA in 1999 to "encourage development of internet technologies."

The CIA expects to use Safeweb's anonymity software "Triangle Boy" to allow its agents to email and visit sites to submit reports without alerting the governments of targeted countries.

Officials of Safeweb admitted the relationship with the CIA to the Washington Post, but claimed that this association does not affect the credibility of Safeweb and does not compromise the privacy of people using its services. Widespread outrage in internet discussions revealed that many web users do not feel safe trusting the CIA with their "anonymity."

The Case of the Sloppy CIA Chief

"Microsoft released an urgent security warning on Friday, detailing a hole in Internet Explorer that allows attackers to remotely access and control any computer running any version of the Windows operating system and Internet Explorer Versions 5 and 5.5."

wired.com, April 2, 2001

Warnings like this appear constantly in the press. And they reveal that the software most people use is riddled with "holes" that allow attackers to enter your computer system.

There are many ways a hostile force can take over your computer and use it to launch attacks on other computers-and to read whatever is on your hard drive. In addition to holes in existing software (including internet browsers, Frontpage, operating systems like Windows and MacOS, etc.), there are many ways hostile forces can download small programs onto your computer. These include Java files and Active X that are routinely downloaded from web files without your knowledge, and small programs called "viruses" that can arrive in emails as "exe" files or attachments (like macros in Word documents).

While it is hard to comprehensively report on all the capabilities and developments of such "Trojan horse" programs-the short story is that when you are connected to the internet, a skillful opponent can read sensitive documents on your hard drive, and plant programs there for later mischief and identification.

To understand what this means, it is worth examining the public humiliation of Clinton's CIA chief John M. Deutch. Deutch was censored and stripped of security clearance by his agency for taking top secret memos home in 1995 and 1996, working on them using a computer that had an internet connection.

The assumption of the CIA is that internet connections allow hostile forces to view the contents of hard drives-and there are no absolutely reliable countermeasures except simply never exposing secret documents to the network.

There is danger even if the document is viewed from a floppy and then removed before connecting to the internet. Documents viewed (or edited or printed, etc.) using programs like Word or WordPerfect, leave traces in temporary files and other automatic backups, even if the file has been removed. Hostile forces who steal the hard drive, or even copy it secretly over the internet, can potentially reconstruct the secret document from these files.

Holes in Encryption Dreams

"Law enforcement is...concerned about the significant and growing threat to public safety and effective law enforce-ment that would be caused by the proliferation and use within the United States of a communications infrastructure that supports strong encryption products but cannot support timely law enforce-ment decryption."

FBI Director Louis Freeh to Senate Judiciary Committee, July 1997

"Today, P.G.P. is used by every human rights organization in the world."

Phil Zimmermann, father of free PGP encryption software

Phil Zimmermann had a dream. He wanted to develop a world class "strong" encryption program for encoding email and documents-and he would make it available free. He was himself an anti-nuke activist, and saw this as his contribution to resisters and government opponents around the world.

Ten years ago, in 1991, he released the first MS-DOS version of his invention called PGP (Pretty Good Privacy) on the "Peacenet." The U.S. government freaked out, and started a criminal investigation. They have long tried to prevent widespread use of encryption software by declaring that military grade encryption was a form of "munition" and making it a felony to send overseas (even though the principles of such encryption are, in fact, widely known around the world).

After the Justice Department announced on January 11, 1996 that they were abandoning the prosecution of Zimmermann and his collaborator Kelly Goen, Zimmermann created an aboveground company to produce new versions of PGP.

PGP has been a world-class hit-used by thousands people to encode their correspondence. Government efforts have been unable to contain it. And, because it was released in "open source" format, many people could study how it was made, and versions were quickly developed for Macintosh and Unix computers.

How good is PGP? High quality encryptions are extremely difficult to break by "brute force"-only major governments have the resource to tackle it, and it is believed that even they have great difficulty breaking more than a few high priority coded messages.

However, the code is still only as good as its private key-a long string of characters that the user applies to decode the messages. If the private key (which is never stored on a hard drive-for reasons explained above) falls into hostile hands the code is broken.

One worrisome note: The Clinton administration proposed allowing encryption if programming companies agreed to allow the government to hold onto master keys. The new commercial PGP company (which is no longer associated with Zimmermann) publicly flirted with this concept-and now refuses to publish the source code to the latest versions of PGP so outside experts can verify that no backdoors are present.

Even if government agents don't secretly have master keys, they have now developed ways to get the private keys directly. Which brings us to the story of Nicodemo S. Scarfo Jr.

The Case of Keylogging the Geeky Mobster

"When criminals like drug dealers and terrorists use encryption to conceal their communications, law enforcement must be able to respond in a manner that will not thwart an investigation or tip off a suspect."

Attorney General Janet Reno and Deputy Defense Secretary John Hamre, January 00

"If we're now talking about expanding black bag jobs to every case in which the government has an interest where the subject is using a computer and encryption, the number of break-ins is going to skyrocket. Break-ins are going to become commonplace.... What the government is arguing is that it should have the right to surreptitiously install monitoring devices on computers without any obligation to explain what that device does."

David Sobel, general counsel, Electronic Privacy Information Center (EPIC)

Police raided the office of Nicodemo S. Scarfo Jr. in January 1999 and came away pissed. Scarfo, son of the jailed mobster "Little Nicky" Scarfo, is known as "computer geek" in his circles. He had used PGP to encrypt his computer files. When the agents copied the contents of his hard drive-there was one key file they simply could not read. And they did not have the evidence they wanted about an alleged loan-sharking operation.

So they decided to break his codes.

On May 10, 1999, FBI agents obtained a general search warrant from a local magistrate.

The seven-page court order authorized the FBI and cooperating local police to break into Scarfo's first-floor "Merchant Services of Essex County" office as many times as necessary to deploy, maintain, and then remove "recovery methods which will capture the necessary key-related information and encrypted files."

Armed with this court order, police agents secretly returned to Scarfo's office in Belleville, New Jersey. Their black bag operation installed what authorities call "a keylogger system"-that would record his keystrokes and send them his password when he typed it in.

Ultimately, the logger captured a password. But Scarfo had changed his password, and it didn't decrypt the original file they had seized in the first raid. But investigators captured a new version of the file from floppy disks in Scarfo's home, and the password worked on that new version-supposedly revealing financial records of illegal operations.

James Atkinson of Granite Island Group, a private electronic surveillance firm, told the press that there are at least three types of keystroke-logging devices currently available:

There is software that can be loaded onto a computer.

There is an attachment that can be linked to the port where the keyboard line enters the computer.

Finally, there is a sugarcube-sized bug that can be put inside the keyboard. It draws power from the computer and can store up to 32 million keystrokes.

Typically, information from the bugged computers can be downloaded from a remote location.

The Scarfo case is being decided this summer and involves the issue of whether computer spying needs to conform to federal wiretapping laws.

In applying for their warrant, the agents claimed that "there will be no wire, oral or electronic communications captured," and were therefore arguing that federal restrictions on wiretapping did not apply to their keylogger. However, as Attorney Donald Manno pointed out to the press, "Anything he typed on that keyboard-a letter to his lawyer, personal or medical records, legitimate business records-they got it all."

The F.B.I. and prosecutors have firmly refused to say anything about their keylogger-including whether it is hardware or purely software. Justice Department attorneys told a federal judge that public disclosure of the details of this keylogger would undermine other cases where it is being used. Complete secrecy about this keylogger was needed, they say, to prevent targeted people from using "counter-surveillance tactics to thwart law enforcement."

Their secrecy is also an attempt to save their flimsy legal claim that keylogging is not wiretapping-and so can be done casually and secretly as part of any general search warrant.

The Case of the Tell-Tale Email

In the last year, there has been widespread publicity to the FBI's Carnivore program: This is a box that federal agents install on the internet to sniff out email associated with targeted users. Because of the nature of the Internet, the Carnivore must go over all email passing through-and the federal authorities insist that the public should trust them only to read those emails that are "spit out" with a particular email address on them.

Most email passes through the internet as unscrambled, easy-to-read, easy to intercept packets of text. Paul Syverson, researcher at U.S. Naval Research Laboratory's Center for High Assurance Computer Systems, told the press: "Public networks are vulnerable to traffic analysis. Packet headers identify recipients, and packet routes can be tracked. Even encrypted data exposes the identity of the communicating parties."

Faced with news about Carnivore and the knowledge that their employers might be reading workplace related email accounts, millions of people are seeking privacy through free email accounts at sites like yahoo.com, hotmail.com, and excite.com.

Because these web-based services are free, there are no credit card payments associated with them. And, as a result, there is no reason for the service providers to insist on accurate personal information from people using their services. So, these free email accounts are far more anonymous than the email accounts associated with paying ISP internet access.

However, one recent case reveals some little known dangers that await the unaware.

In the 2000 Minnesota Senate race, a series of malicious emails started appearing that targeted the liberal candidate Mike Ciresi. They claimed to be from a former supporter who called herself "Katie Stevens," and who said she was now disgusted to learn that Ciresi represented corporate polluters and anti-union companies.

The Ciresi campaign suspected this was campaign dirty tricks by their opponent, Republican Senator Gram. They obtained copies of the hostile email, and the true story started to unravel. (The following details are from a June 16 article by Declan McCullagh in wired.com.)

The email had been sent from a free email account at Microsoft's Hotmail service. This much was obvious, since the email address, [email protected], came at the top of each email.

What "Katie Stevens" didn't know is that Hotmail also includes an X-Originating-IP header that shows the IP address of the sender. This IP address reveals where you are connected to the internet as you send and receive information-during that internet session.

The IP addresses revealed that "Katie Stevens" had started by sending the email from a rented computer in a Kinkos store.

But, over time, "Katie Stevens" got sloppy. Prosecutors, investigating election violations, traced some of the later emails to an IP address associated with a commercial ISP, AT&T WorldNet.

It turns out that AT&T WorldNet kept Caller ID logs of people phoning in by modem-and their records could connect the IP address to a specific phone call, and from there to specific phones.

The trail led back to the phone number of Christine Gunhus, who was about to marry Senator Gram.

In addition, the emails had Microsoft Word attachments. MS Word has a feature that embeds any "user information" given at installation into documents. And the author of the attached documents led to- you guessed it-Christine Gunhus.

Finally, investigators also found Globally Unique Identifiers (GUIDs) in the Word documents. The GUID includes the Ethernet MAC address. Prosecutors obtained a search warrant to seize Gunhus' computer, from which they could extract the MAC address from the machine's Ethernet card.

Christine Gunhus pleaded no contest in June 2001 to charges of using a pseudonym to unlawfully send email messages that disparaged her husband's Democratic rival.

The Privacy Conflict Continues

Press reports at the end of July said that the budget bill emerging from the Appropriations Committee includes $7 million more to the FBI for technology to thwart encryption. The appropriations committee intends for it to be spent on: "(1) analysis/exploitation of systems to allow access to data pre-encryption, (2) recognition/decryption of data hidden in plain sight, and (3) decryption of encrypted data." In addition, another $7 million goes to a plan to improve "intercept capabilities," including for "developing broadband capabilities and procuring prototypes capable of intercepting transmissions outside of the FBI's technical reach." Translation: Create better ways to eavesdrop on cable modems and DSL connections.

These government moves are being met by many different kinds of actions, including by programmers and privacy activists. There are court suits, energetic campaigns of exposure and a wide range of creative software intended to improve privacy. The web is full of "how to" sites-offering advice on firewalls, cleaning out hard drives, preventing Trojan horses and improving anonymity. For the reasons described in this article, it is extremely hard to evaluate which of these technical methods actually work.

Only one method guaranteed rather solid protection, and that was surfing and emailing from a machine that is not associated with the user in any way. If "Katie Stevens" had stayed at Kinkos, her identity might not have been uncovered.

And, perhaps ironically, the message of the CIA during the Deutch affair is that once a person and an account is known to hostile forces, even the CIA doesn't believe they have a reliable set of technical countermeasures. The CIA's publicly explained policy is quite clear and simple: A machine used to view or edit sensitive documents must be a separate "dedicated machine" for its lifetime-and never allowed to connect to the internet.
249  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: Beginners Guide to understanding Unix on: October 15, 2006, 12:19:23 PM
rwho display information on network
users

sed -e "action" file use stream editor on file

sh Bourne shell

shl the Shell Layer Manager

sort file perform an alphabetic sort based on
the first field of file

sort -n file perform a numeric sort based on the
first field of file

sort +x file sort on field x+1

sort -ta file use a as a field separator

spell file check file for correct spelling

stty display current stty settings

stty intr set interrupt character to

stty kill set kill character to

talk talk with user on your terminal

talk file display the last 10 lines of file

telenet host connect to a remote host

telenet annex connect to an Annex for use of an
outbound port

tr a b file in file, change every a to b

vi file edit file with a full screen editor

wc file list the number of lines, words and
characters in file

write user send a message to user's terminal

uucp file hostpath remote copy
APPENDIX I: vi COMMANDS QUICK REFERENCE

Special Commands

Esc return to command mode
u undo last command
. repeat last insert, delete or put command

Saving Text and Quitting

:w write (save) text
:w newfile save text to file newfile
:x,yw newfile save lines x to y into newfile
:q! quit without saving changes
:wq save text and quit

Cursor Positioning

N move to line N
N+ down N lines
N- up N lines
^D down one screen
^U up one screen
k up one line
j down one line
^ beginning of line
$ end of line
Nw N words ahead
Nb back N words
w word ahead
b back one word
e end of word
h backspace
l forward one space
arrow keys space left or right, go up or down one line

Searches

/pattern search forward for pattern
?pattern search backward for pattern
? or / repeat the last search

Deleting Text

Ndd delete N lines
dd delete current line
D delete remainder of line
Ndw delete N words
dw delete current word
Nx delete N characters
x delete one character

Copying Text

NY yank N lines
Y yank one line
Nyw yank N words
yw yank one word

P put yanked lines above current cursor position, or
put yanked words before current cursor position

p put yanked lines below current cursor position, or
put yanked words after current cursor position

Entering Text Mode

I enter text mode, additional text appears at the
beginning of the current line

i enter text mode, additional text appears before
the current cursor position

A enter text mode, additional text appears at the
end of the current line

a enter text mode, additional text appears after the
current cursor position.

O enter text mode, open a line above the current
line

o enter text mode, open a line below the current
line

Replacing and Substituting Text

r replace one character at current cursor position,
then return to command mode

R replace characters until Esc

s substitute characters for the current character
until Esc

Ns substitute characters for the current N characters
until Esc
Reading in Text

:r filename append the contents of filename below the current
cursor position

:r !shell-cmd append the output of shell-cmd below the current
cursor position

Global Operations

:x,ys/old/new/g
on lines x through y, change old to new

:x,yg/pattern/d
delete any line from x toy that has the string
pattern
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
APPENDIX J: vi COMMANDS REFERENCE

NAME
vi - screen-oriented (visual) display editor based on ex

SYNOPSIS
vi [ -t tag ] [ -r file ] [ -L ] [ -wn ] [ -R ] [ -x ] [ -C
] [ -ccommand ] file ...
view [ -t tag ] [ -r file ] [ -L ] [ -wn ] [ -R ] [ -x ] [
-C ] [ -ccommand ] file ...
vedit [ -t tag ] [ -r file ] [ -L ] [ -wn ] [ -R ] [ -x ] [
-C ] [ -ccommand ] file ...

DESCRIPTION
vi (visual) is a display-oriented text editor based on an
underlying line editor ex(1). It is possible to use the
command mode of ex from within vi and vice-versa. The visual
commands are described on this manual page; how to set
options (like automatically numbering lines and
automatically starting a new output line after a carriage
return) and all ex(1) line editor commands are described on
the ex(1) manual page.

When using vi, changes made to the file are reflected in
what is displayed on the terminal screen. The position of
the cursor on the screen indicates the position within the
file.

INVOCATION
The following invocation options are interpreted by vi:

-t tag Edit the file containing the tag and position the
cursor at its definition. The file (tags)
containing the tag is found in the current directory
or in /usr/lib/tags. Below is an example of a tags
file:

line /tmp/vi.file /line/
this /tmp/vi.file /this/

Using "vi -t line", the edited file will be
"/tmp/vi.file". The file will be searched for the
first occurrence of "line", and the cursor will be
placed at "line".

-r file Edit file after an editor or system crash.
(Recovers the version of file that was in the buffer
when the crash occurred.)

-L List the name of all files saved as the result of an
editor or system crash.

-wn Set the default window size to n. This is useful
when using the editor over a slow speed line.

-R Readonly mode; the readonly flag is set, preventing
accidental overwriting of the file.

-x Encryption option; when used, vi simulates the X
command of ex(1) and prompts the user for a key.
This key is used to encrypt and decrypt text using
the algorithm of crypt(1). The X command makes an
educated guess to determine whether or not text read
in is encrypted. The temporary buffer file is
encrypted also, using a transformed version of the
key typed in for the -x option. See crypt(1).
Also, see the WARNING section at the end of this
manual page.

-C Encryption option, same as the -x option, except
that vi simulates the C command of ex(1). The C
command is like the X command of ex(1), except that
all text read in is assumed to have been encrypted.

-c command Begin editing by executing the specified
editor command (usually a search or positioning
command).

The file argument indicates one or more files to be edited.

The view invocation is the same as vi except that the
readonly flag is set.

The vedit invocation is intended for beginners. It is the
same as vi except that the report flag is set to 1, the
showmode and novice flags are set, and magic is turned off.
These defaults make it easier to learn vi.

VI MODES
Command Normal and initial mode. Other modes return to
command mode upon completion. ESC (escape) is used
to cancel a partial command.

Input Entered by setting the following options: a i A I o
O c s R. Arbitrary text may then be entered.
Input mode is normally terminated with ESC
character, or abnormally with interrupt.

Last line
Reading input for : / ? or !; terminate with CR to
execute, interrupt to cancel.
COMMAND SUMMARY
In the descriptions, CR stands for carriage return and ESC
stands for the escape key.

Sample Commands

<- | | -> arrow keys move the cursor
h j k l same as arrow keys
itextESC insert text
cwnewESC change word to new
easESC pluralize word (end of word; append s;
escape from input state)
x delete a character
dw delete a word
dd delete a line
3dd delete 3 lines
u undo previous change
ZZ exit vi, saving changes
:q!CR quit, discarding changes
/textCR search for text
U D scroll up or down
:ex cmdCR any ex or ed command

Counts Before vi Commands
Numbers may be typed as a prefix to some commands. They are
interpreted in one of these ways:

line/column number z G |
scroll amount D U
repeat effect most of the rest

Interrupting, Canceling
ESC end insert or incomplete cmd
DEL (delete or rubout) interrupts
L reprint screen if DEL scrambles it
R reprint screen if L is -> key

File Manipulation
ZZ if file is modified, write and exit;
otherwise, exit
:wCR write back changes
:w!CR forced write, if permission originally
not valid
:qCR quit
:q!CR quit, discard changes
:e nameCR edit file name
:e!CR reedit, discard changes
:e + nameCR edit, starting at end
:e +n filename CR edit starting at line n
:e #CR edit alternate file
:e! #CR edit alternate file, discard changes
:w nameCR write file name

:w! nameCR overwrite file name
:shCR run shell, then return
:!cmdCR run cmd, then return
:nCR edit next file in arglist
:n argsCR specify new arglist
G show current file and line
:ta tagCR to tag file entry tag

In general, any ex or ed command (such as substitute or
global) may be typed, preceded by a colon and followed by a
CR.

Positioning Within File
F forward screen
B backward screen
D scroll down half screen
U scroll up half screen
Ng go to the beginning of the specified
line (end default), where n is a line
number
/pat next line matching pat
?pat prev line matching pat
n repeat last / or ? command
N reverse last / or ? command
/pat/+n nth line after pat
?pat?-n nth line before pat
]] next section/function
[[ previous section/function
( beginning of sentence
) end of sentence
{ beginning of paragraph
} end of paragraph
% find matching ( ) { or }

Adjusting The Screen
L clear and redraw
zCR clear and redraw window if ^L is -> key
ZCR redraw screen with current line at top
of window
z-CR redraw screen with current line at
bottom of window
z.CR redraw screen with current line at
center of window
/pat/z-CR move pat line to bottom of window
zn.CR use n line window
E scroll window down 1 line
Y scroll window up 1 line
Marking and Returning
`` move cursor to previous context
'' move cursor to first non-white space in
line
mx mark current position with the ACSII
lower-case letter x
`x move cursor to mark x
'x move cursor to first non-white space in
line marked by x

Line Positioning
H top line on screen
L last line on screen
M middle line on screen
+ next line, at first non-white
- previous line, at first non-white
CR return, same as +
| or j next line, same column
| or k previous line, same column

Character Positioning
first non-white-space character
0 beginning of line
$ end of line
l or -> forward
h or <- backwards
H same as <- (backspace)
space same as -> (space bar)
fx find next x
Fx find previous x
tx move to character prior to next x
Tx move to character following previous x
; repeat last f F
, repeat last t T
n| to specified column
% find matching () { or }

Words, Sentences, Paragraphs
w forward a word
b back a word
e end of word
) to next sentence
} to next paragraph
( back a sentence
{ back a paragraph
W forward a blank-delimited word
B back a blank-delimited word
E to end of a blank-delimited word
Corrections During Insert
H erase last character (backspace)
W erase last word
erase erase, same as H
kill kill, erase this line of input
\ quotes H, erase and kill characters
ESC ends insertion, back to command mode
DEL interrupt, terminates insert mode
D backtab one character; reset left margin
of autoindent
|D caret () followed by control-d (D);
backtab to beginning of line; do not
reset left margin of autoindent
0D backtab to beginning of line; reset left
margin of autoindent
V quote non-printable character

Insert and Replace
a append after cursor
A append at end of line
i insert before cursor
I insert before first non-blank
o open line below
O open above
rx replace single char with x
RtextESC replace characters

Operators
Operators are followed by a cursor motion, and affect all
text that would have been moved over. For example, since w
moves over a word, dw deletes the word. Double the
operator, e.g., dd to affect whole lines.

d delete
c change
y yank lines to buffer
< left shift
> right shift
! filter through command

Miscellaneous Operations
C change rest of line (c$)
D delete rest of line (d$)
s substitute chars (cl)
S substitute lines (cc)
J join lines
x delete characters (dl)
X ... before cursor (dh)
Y yank lines (yy)
Yank and Put
Put inserts the text most recently deleted or yanked;
however, if a buffer is named (using the ASCII lower-case
letters a - z), the text in that buffer is put instead.

3yy yank 3 lines
3yl yank 3 characters
p put back text after cursor
P put back text before cursor
"xp put from buffer x
"xY ("xyy) yank to buffer x
"xD ("xdd) delete into buffer x

Undo, Redo, Retrieve
u undo last change
U restore current line
. repeat last change
"dp retrieve d'th last delete

AUTHOR
vi and ex were developed by The University of California,
Berkeley California, Computer Science Division, Department
of Electrical Engineering and Computer Science.

FILES
/tmp default directory where temporary
work files are placed; it can be
changed using the directory option
(see the ex(1) set command)
/usr/lib/terminfo/?/* compiled terminal description
database
/usr/lib/.COREterm/?/* subset of compiled terminal
description database, supplied on
hard disk

NOTES
Two options, although they continue to be supported, have
been replaced in the documentation by options that follow
the Command Syntax Standard (see intro(1)). A -r option
that is not followed with an option-argument has been
replaced by -L and +command has been replaced by -c command.

SEE ALSO
ed(1), ex(1).
"Screen Editor Tutorial (vi)" in the UMAX V User's Guide.

WARNING
The encryption options are provided with the Security
Administration Utilities package, which is available only in
the United States.
Tampering with entries in /usr/lib/.COREterm/?/* or
/usr/lib/terminfo/?/* (for example, changing or removing an
entry) can affect programs such as vi(1) that expect the
entry to be present and correct. In particular, removing
the "dumb" terminal may cause unexpected problems.

BUGS
Software tabs using T work only immediately after the
autoindent.

Left and right shifts on intelligent terminals do not make
use of insert and delete character operations in the
terminal.
APPENDIX K: ftp COMMANDS REFERENCE

NAME
ftp - Internet file transfer program

SYNOPSIS
ftp [ -v ] [ -d ] [ -i ] [ -n ] [ -g ] [ host ]

DESCRIPTION
ftp is the user interface to the DARPA File Transfer
Protocol. The program transfers files to and from a remote
network site.

The client host with which ftp is to communicate can be
specified on the command line. In this case, ftp immediately
attempts to establish a connection to an FTP server on that
host; otherwise, ftp enters its command interpreter and
waits for instruction, displaying the prompt ftp>.

ftp recognizes the following commands:

! [ command [ args ] ]
Invoke an interactive shell on the local machine.
If there are arguments, the first is taken to be a
command to execute directly, with the rest of the
arguments as its arguments.

$ macro-name [ args ]
Execute the macro-name that was defined with
the macdef command. Arguments are passed to the
macro unglobbed.

account [ passwd ]
Supply a supplemental password required by a
remote system for access to resources once a login
has been successfully completed. If no argument
is included, the user will be prompted for an
account password in a non-echoing input mode.

append local-file [ remote-file ]
Append a local file to a file on the remote
machine. If remote-file is left unspecified, the
local file name is used to name the remote file
after being altered by any ntrans or nmap setting.
File transfer uses the current settings for type,
format, mode, and structure.

ascii Set the file transfer type to network ASCII. This
is the default type.
bell Sound a bell after each file transfer command is
completed.

binary Set the file transfer type to support binary image
transfer.

bye Terminate the FTP session with the remote server
and exit ftp.

case Toggle remote computer file name case mapping
during mget commands. When case is on (default is
off), remote computer file names with all letters
in upper case are written in the local directory
with the letters mapped to lower case.

cd remote-directory
Change the working directory on the remote machine
to remote-directory.

cdup Change the remote machine working directory to the
parent of the current remote machine working
directory.

close Terminate the FTP session with the remote server,
and return to the command interpreter. Any
defined macros are erased.

cr Toggle carriage return stripping during ASCII type
file retrieval. Records are denoted by a carriage
return/linefeed sequence during ASCII type file
transfer. When cr is on (the default), carriage
returns are stripped from this sequence to conform
with the UNIX single linefeed record delimiter.
Records on non-UNIX remote systems may contain
single linefeeds; when an ASCII type transfer is
made, these linefeeds may be distinguished from a
record delimiter only when cr is off.

delete remote-file
Delete the file remote-file on the remote machine.

debug [ debug-value ]
Toggle debugging mode. If an optional debug-value
is specified, it is used to set the debugging
level. When debugging is on, ftp prints each
command sent to the remote machine, preceded by
the string --> .
dir [ remote-directory ] [ local-file ]
Print the contents of directory, remote-directory,
and, optionally, place the output in local-file.
If no directory is specified, the current working
directory on the remote machine is used. If no
local file is specified, or local-file is -,
output comes to the terminal.

disconnect
A synonym for close.

form format
Set the file transfer form to format. The default
format is file.

get remote-file [ local-file ]
Retrieve the remote-file and store it on the local
machine. If the local file name is not specified,
it is given the same name it has on the remote
machine, subject to alteration by the current
case, ntrans, and nmap settings. The current
settings for type, form, mode, and structure are
used while transferring the file.

glob Toggle filename expansion for mdelete, mget and
mput. If globbing is turned off with glob, the
file name arguments are taken literally and not
expanded. Globbing for mput is done as in csh(1).
For mdelete and mget, each remote file name is
expanded separately on the remote machine and the
lists are not merged. Expansion of a directory
name is likely to be different from expansion of
the name of an ordinary file: the exact result
depends on the foreign operating system and FTP
server, and can be previewed by doing
"mls remote-files -". Note: mget and mput are
not meant to transfer entire directory subtrees of
files. That can be done by transferring a tar(1)
archive of the subtree (in binary mode).

hash Toggle number-sign (#) printing for each data
block transferred. The size of a data block is
1024 bytes.

help [ command ]
Print a description of command. With no argument,
ftp prints a list of the known commands.

lcd [ directory ]
Change the working directory on the local machine.
If no directory is specified, changes to the
user's home directory.

ls [ remote-directory ] [ local-file ]
Print an abbreviated listing of the contents of a
directory on the remote machine. If remote-
directory is left unspecified, the current working
directory is used. If no local file is specified,
the output is sent to the terminal.

macdef macro-name
Define a macro. Subsequent lines are stored as
the macro macro-name; a null line (consecutive
newline characters in a file or carriage returns
from the terminal) terminates macro input mode.
There is a limit of 16 macros and 4096 total
characters in all defined macros. Macros remain
defined until a close command is executed. The
macro processor interprets "$" and "\" as special
characters. A "$" followed by a number (or
numbers) is replaced by the corresponding argument
on the macro invocation command line. A "$"
followed by an "i" signals that macro processor
that the executing macro is to be looped. On the
first pass "$i" is replaced by the first argument
on the macro invocation command line, on the
second pass it is replaced by the second argument,
and so on. A "\" followed by any character is
replaced by that character. Use the "\" to
prevent special treatment of the "$".

mdelete [ remote-files ]
Delete the specified files on the remote machine.

mdir remote-files local-file
Like dir, except multiple remote files may be
specified. If interactive prompting is on, ftp
will prompt the user to verify that the last
argument is indeed the target local file for
receiving mdir output.

mget remote-files
Expand the remote-files on the remote machine and
do a get for each file name thus produced. See
glob for details on the filename expansion.
Resulting file names will then be processed
according to case, ntrans, and nmap settings.
Files are transferred into the local working
directory, which can be changed with
"lcd directory"; new local directories can be
created with "! mkdir directory".

mkdir directory-name
Make a directory on the remote machine.
mls remote-files local-file
Like ls, except multiple remote files may be
specified. If interactive prompting is on, ftp
will prompt the user to verify that the last
argument is indeed the target local file for
receiving mls output.

mode [ mode-name ]
Set the file transfer mode to mode-name. The
default mode is stream.

mput local-files
Expand wild cards in the list of local files given
as arguments and do a put for each file in the
resulting list. See glob for details of filename
expansion. Resulting file names will then be
processed according to ntrans and nmap settings.

nmap [ inpattern outpattern ]
Set or unset the filename mapping mechanism. If
no arguments are specified, the filename mapping
mechanism is unset. If arguments are specified,
remote filenames are mapped during mput commands
and put commands issued without a specified remote
target filename. If arguments are specified,
local filenames are mapped during mget commands
and get commands issued without a specified local
target filename. This command is useful when
connecting to a non-UNIX remote computer with
different file naming conventions or practices.
The mapping follows the pattern set by inpattern
and outpattern. inpattern is a template for
incoming filenames (which may have already been
processed according to the ntrans and case
settings). Variable templating is accomplished by
including the sequences "$1", "$2", ..., "$9" in
inpattern. Use "\" to prevent this special
treatment of the "$" character. All other
characters are treated literally, and are used to
determine the nmap inpattern variable values. For
example, given inpattern $1.$2 and the remote file
name mydata.data, $1 would have the value mydata,
and $2 would have the value data. The outpattern
determines the resulting mapped filename. The
sequences "$1", "$2", ..., "$9" are replaced by
any value resulting from the inpattern template.
The sequence "$0" is replaced by the original
filename. Additionally, the sequence
"[seq1,seq2]" is replaced by seq1 if seq1 is not a
null string; otherwise it is replaced by seq2.
For example, the command "nmap $1.$2.$3
[$1,$2].[$2,file]" would yield the output filename
myfile.data for input filenames myfile.data and
myfile.data.old, myfile.file for the input
filename myfile, and myfile.myfile for the input
filename .myfile. Spaces may be included in
outpattern, as in the example:

nmap $1 | sed "s/ *$//" > $1

Use the "\" character to prevent special treatment
of the "$", "[", "]", and "," characters.

ntrans [ inchars [ outchars ] ]
Set or unset the filename character translation
mechanism. If no arguments are specified, the
filename character translation mechanism is unset.
If arguments are specified, characters in remote
filenames are translated during mput commands and
put commands issued without a specified remote
target filename. If arguments are specified,
characters in local filenames are translated
during mget commands and get commands issued
without a specified local target filename. This
command is useful when connecting to a non-UNIX
remote computer with different file naming
conventions or practices. Characters in a
filename matching a character in inchars are
replaced with the corresponding character in
outchars. If the character's position in inchars
is longer than the length of outchars, the
character is deleted from the file name.

open host [ port ]
Establish a connection to the specified host's FTP
server. An optional port number can be supplied,
in which case, ftp attempts to contact an FTP
server at that port. If the auto-login option is
on (default), ftp also attempts to automatically
log the user in to the FTP server (see below).

prompt Toggle interactive prompting. Interactive
prompting occurs during multiple file transfers to
allow the user to selectively retrieve or store
files. If prompting is turned off (default), any
mget or mput transfers all files and mdelete will
delete all files.
proxy ftp-command
Execute an ftp command on a secondary control
connection. This command allows simultaneous
connection to two remote FTP servers for
transferring files between the two servers. The
first proxy command should be an open, to
establish the secondary control connection. Enter
the command "proxy ?" to see other ftp commands
executable on the secondary connection. The
following commands behave differently when
prefaced by proxy: open will not define new
macros during the auto-login process, close will
not erase existing macro definitions, get and mget
transfer files from the host on the primary
control connection to the host on the secondary
control connection, and put, mput, and append
transfer files from the host on the secondary
control connection to the host on the primary
control connection. Third party file transfers
depend upon support of the FTP protocol PASV
command by the server on the secondary control
connection.

put local-file [ remote-file ]
Store a local file on the remote machine. If
remote-file is left unspecified, the local file
name is used in naming the remote file, after
processing according to any ntrans or nmap
settings. File transfer uses the current settings
for type, format, mode, and structure.

pwd Print the name of the current working directory on
the remote machine.

quit A synonym for bye.

quote arg1 arg2 ...
The arguments specified are sent, verbatim, to the
remote FTP server.

recv remote-file [ local-file ]
A synonym for get.

remotehelp [ command-name ]
Request help from the remote FTP server. If a
command-name is specified, it is supplied to the
server as well.

rename [ from ] [ to ]
Rename, on the remote machine, the file from to
the file to.
reset Clear reply queue. This command re-synchronizes
command/reply sequencing with the remote FTP
server. Resynchronization may be necessary
following a violation of the FTP protocol by the
remote server.

rmdir directory-name
Delete a directory on the remote machine.

runique Toggle storing of files on the local system with
unique filenames. If a file already exists with a
name equal to the target local filename for a get
or mget command, a ".1" is appended to the name.
If the resulting name matches another existing
file, a ".2" is appended to the original name. If
this process continues up to ".99", an error
message is printed, and the transfer does not take
place. The generated unique filename will be
reported. Note that runique will not affect local
files generated from a shell command (see below).
The default value is off.

send local-file [ remote-file ]
A synonym for put.

sendport Toggle the use of PORT commands. By default, ftp
attempts to use a PORT command when establishing a
connection for each data transfer. The use of PORT
commands can prevent delays when performing
multiple file transfers. If the PORT command
fails, ftp uses the default data port. When the
use of PORT commands is disabled, no attempt is
made to use them for each data transfer. This is
useful for certain FTP implementations that do
ignore PORT commands but wrongly indicate they
have been accepted.

status Show the current status of ftp.

struct [ struct-name ]
Set the file transfer structure to struct-name.
The default structure is stream.

sunique Toggle storing of files on remote machine under
unique file names. Remote FTP server must support
the FTP protocol STOU command for successful
completion. The remote server will report a
unique name. Default value is off.

tenex Set the file transfer type to that needed to talk
to TENEX machines.
trace Toggle packet tracing.

type [ type-name ]
Set the file transfer type to type-name. If no
type-name is specified, the current type is
printed. The default type is network ascii.

user user-name [ password ] [ account ]
The user identifies him/herself to the remote FTP
server. If the password is not specified and the
server requires it, ftp prompts the user for it
(after disabling local echo). If an account field
is not specified, and the FTP server requires it,
the user is prompted for it. If an account field
is specified, an account command will be relayed
to the remote server after the login sequence is
completed if the remote server did not require it
for logging in. Unless ftp is invoked with
"auto-login" disabled, this process is done
automatically on initial connection to the FTP
server.

verbose Toggle verbose mode. In verbose mode, all
responses from the FTP server are displayed to the
user. In addition, if verbose is on, when a file
transfer completes, statistics regarding the
efficiency of the transfer are reported. By
default, verbose is on.

? [ command ]
A synonym for help.

Command arguments that have embedded spaces can be quoted
with double quote (") marks.

ABORTING A FILE TRANSFER
To abort a file transfer, use the terminal interrupt key
(usually <ctrl>C). Sending transfers will be immediately
halted. Receiving transfers will be halted by sending a FTP
protocol ABOR command to the remote server, and discarding
any further data received. The speed at which this is
accomplished depends upon the remote server's support for
ABOR processing. If the remote server does not support the
ABOR command, an ftp> prompt will not appear until the
remote server has completed sending the requested file.

The terminal interrupt key sequence will be ignored when ftp
has completed any local processing and is awaiting a reply
from the remote server. A long delay in this mode may
result from the ABOR processing described above, or from
unexpected behavior by the remote server, including
violations of the FTP protocol. If the delay results from
unexpected remote server behavior, the local ftp program
must be killed by hand.

FILE NAMING CONVENTIONS
Files specified as arguments to ftp commands are processed
according to the following rules.

1. If the file name is -, the standard input (for reading)
or the standard output (for writing) is used.

2. If the first character of the file name is a bar |, the
remainder of the argument is interpreted as a shell
command. ftp then forks a shell, using popen(3S) with
the argument supplied, and reads (writes) from the
stdout (stdin). If the shell command includes spaces,
the argument must be quoted; for example, "| ls -lt". A
particularly useful example of this mechanism is
"dir | more".

3. Failing the above checks, if globbing is enabled, local
file names are expanded according to the rules used in
the csh(1); see the glob command. If the ftp command
expects a single local file (e.g., put), only the first
filename generated by the globbing operation is used.

4. For mget commands and get commands with unspecified
local file names, the local filename is the remote
filename, which may be altered by a case, ntrans, or
nmap setting. The resulting filename may then be
altered if runique is on.

5. For mput commands and put commands with unspecified
remote file names, the remote filename is the local
filename, which may be altered by a ntrans or nmap
setting. The resulting filename may then be altered by
the remote server if sunique is on.

FILE TRANSFER PARAMETERS
The FTP specification identifies many parameters that can
affect a file transfer. The type can be one of ascii, image
(binary), ebcdic, and local byte size (for PDP-10's and
PDP-20's mostly). ftp supports the ascii and image types of
file transfer, plus local byte size 8 for tenex mode
transfers.

ftp supports only the default values for the remaining file
transfer parameters: mode, form, and struct.

OPTIONS
Options can be specified at the command line, or to the
command interpreter.

The -v (verbose on) option forces ftp to show all responses
from the remote server, as well as report on data transfer
statistics.

The -n option restrains ftp from attempting "auto-login"
upon initial connection. If auto-login is enabled, ftp
checks the netrc file in the user's home directory for an
entry describing an account on the remote machine. If no
entry exists, ftp will prompt for the remote machine login
name (default is the user identity on the local machine),
and, if necessary, prompt for a password and an account with
which to login.

The -i option turns off interactive prompting during
multiple file transfers.

The -d option enables debugging.

The -g option disables file name globbing.

THE .netrc FILE
The .netrc file contains login and initialization
information used by the "auto-login" process. It resides in
the user's home directory. The following tokens are
recognized; they may be separated by spaces, tabs, or new-
lines:

machine name
Identify a remote machine name. The auto-login process
searches the .netrc file for a machine token that
matches the remote machine specified on the ftp command
line or as an open command argument. Once a match is
made, the subsequent .netrc tokens are processed,
stopping when the end of file is reached or another
machine token is encountered.

login name
Identify a user on the remote machine. If this token
is present, the "auto-login" process will initiate a
login using the specified name.

password string
Supply a password. If this token is present, the
"auto-login" process will supply the specified string
if the remote server requires a password as part of the
login process. Note that if this token is present in
the .netrc file, ftp will abort the "auto-login"
process if the .netrc is readable by anyone besides the
user.
account string
Supply an additional account password. If this token
is present, the "auto-login" process will supply the
specified string if the remote server requires an
additional account password, or the "auto-login"
process will initiate an ACCT command if it does not.

macdef name
Define a macro. This token functions like the ftp
macdef command functions. A macro is defined with the
specified name; its contents begin with the next .netrc
line and continue until a null line (consecutive new-
line characters) is encountered. If a macro named init
is defined, it is automatically executed as the last
step in the "auto-login" process.

SEE ALSO
csh(1).
ftpd(1M) in the UMAX V Administrator's Reference Manual.

BUGS
Correct execution of many commands depends upon proper
behavior by the remote server.

An error in the treatment of carriage returns in the 4.2BSD
UNIX ASCII-mode transfer code has been corrected. This
correction may result in incorrect transfers of binary files
to and from 4.2BSD servers using the ascii type. Avoid this
problem by using the binary image type.
APPENDIX L: telnet COMMANDS REFERENCE

NAME
telnet - user interface to the TELNET protocol

SYNOPSIS
telnet [ host [ port ] ]

DESCRIPTION
The telnet command communicates with another host using the
TELNET protocol. If telnet is invoked without arguments, it
enters command mode, indicated by its prompt (for example,
telnet>). In this mode, it accepts and executes the
commands listed below. If it is invoked with arguments, it
performs an open command (see below) with those arguments.
Once a connection has been opened, telnet enters input mode.
The input mode entered will be either character at a time or
line by line depending on what the remote system supports.

In character at a time mode, most text typed is immediately
sent to the remote host for processing.
In line by line mode, all text is echoed locally, and
(normally) only completed lines are sent to the remote host.
The local echo character (initially ^E) may be used to turn
off and on the local echo (this would mostly be used to
enter passwords without the password being echoed).

In either mode, if the localchars toggle is TRUE (the
default in line mode; see below), the user's quit, intr, and
flush characters are trapped locally, and sent as TELNET
protocol sequences to the remote side. There are options
(see toggle autoflush and toggle autosynch below) which
cause this action to flush subsequent output to the terminal
(until the remote host acknowledges the TELNET sequence) and
flush previous terminal input (in the case of quit and
intr).

While connected to a remote host, telnet command mode may be
entered by typing the telnet escape character (initially
^]). When in command mode, the normal terminal editing
conventions are available.

COMMANDS
The following commands are available. Only enough of each
command to uniquely identify it need be typed (this is also
true for arguments to the mode, set, toggle, and display
commands).
open host [ port ]
Open a connection to the named host. If no port
number is specified, telnet attempts to contact a
TELNET server at the default port. The host
specification can be either a host name (see
hosts(4)) or an Internet address specified in "dot
notation" (see inet(3N)).

close Close a TELNET session and return to command mode.

quit Close any open TELNET session and exit telnet. An
end-of-file (in command mode) will also close a
session and exit.

<ctrl>Z Suspend telnet. This command only works when the
user is using the csh(1) or the BSD application
environment version of ksh(1).

status Show the current status of telnet. This includes
the peer one is connected to, as well as the
current mode.

display [ argument ... ]
Displays all, or some, of the set and toggle values
(see below).

? [ command ]
Get help. With no arguments, telnet prints a help
summary. If a command is specified, telnet will
print the help information for just that command.

send arguments
Sends one or more special character sequences to
the remote host. The following are the arguments
which may be specified (more than one argument may
be specified at a time):

escape
Sends the current telnet escape character
(initially ^]).

synch
Sends the TELNET SYNCH sequence. This
sequence causes the remote system to discard
all previously typed (but not yet read) input.
This sequence is sent as TCP urgent data (and
may not work if the remote system is a 4.2 BSD
system -- if it doesn't work, a lower case r
may be echoed on the terminal).
brk
Sends the TELNET BRK (Break) sequence, which
may have significance to the remote system.

ip
Sends the TELNET IP (Interrupt Process)
sequence, which should cause the remote system
to abort the currently running process.

ao
Sends the TELNET AO (Abort Output) sequence,
which should cause the remote system to flush
all output from the remote system to the
user's terminal.

ayt
Sends the TELNET AYT (Are You There) sequence,
to which the remote system may or may not
choose to respond.

ec
Sends the TELNET EC (Erase Character)
sequence, which should cause the remote system
to erase the last character entered.

el
Sends the TELNET EL (Erase Line) sequence,
which should cause the remote system to erase
the line currently being entered.

ga
Sends the TELNET GA (Go Ahead) sequence, which
likely has no significance to the remote
system.

nop
Sends the TELNET NOP (No operation) sequence.

?
Prints out help information for the send
command.

set argument value
Set any one of a number of telnet variables to a
specific value. The special value off turns off
the function associated with the variable. The
values of variables may be interrogated with the
display command. The variables which may be
specified are:
echo
This is the value (initially ^E) which, when
in line by line mode, toggles between doing
local echoing of entered characters (for
normal processing), and suppressing echoing of
entered characters (for entering, say, a
password).
escape
This is the telnet escape character (initially
^[) which causes entry into telnet command
mode (when connected to a remote system).

interrupt
If telnet is in localchars mode (see toggle
localchars below) and the interrupt character
is typed, a TELNET IP sequence (see send ip
above) is sent to the remote host. The
initial value for the interrupt character is
taken to be the terminal's intr character.

quit
If telnet is in localchars mode (see toggle
localchars below) and the quit character is
typed, a TELNET BRK sequence (see send brk
above) is sent to the remote host. The
initial value for the quit character is taken
to be the terminal's quit character.

flushoutput
If telnet is in localchars mode (see toggle
localchars below) and the flushoutput
character is typed, a TELNET AO sequence (see
send ao above) is sent to the remote host.
The initial value for the flush character is
taken to be the terminal's flush character.

erase
If telnet is in localchars mode (see toggle
localchars below), and if telnet is operating
in character at a time mode, then when this
character is typed, a TELNET EC sequence (see
send ec above) is sent to the remote system.
The initial value for the erase character is
taken to be the terminal's erase character.
kill
If telnet is in localchars mode (see toggle
localchars below), and if telnet is operating
in character at a time mode, then when this
character is typed, a TELNET EL sequence (see
send el above) is sent to the remote system.
The initial value for the kill character is
taken to be the terminal's kill character.

eof
If telnet is operating in line by line mode,
entering this character as the first character
on a line will cause this character to be sent
to the remote system. The initial value of
the eof character is taken to be the
terminal's eof character.

toggle arguments ...
Toggle (between TRUE and FALSE) various flags that
control how telnet responds to events. More than
one argument may be specified. The state of these
flags may be interrogated with the display command.
Valid arguments are:

localchars
If this is TRUE, then the flush, interrupt,
quit, erase, and kill characters (see set
above) are recognized locally, and transformed
into (hopefully) appropriate TELNET control
sequences (respectively ao, ip, brk, ec, and
el; see send above). The initial value for
this toggle is TRUE in line by line mode, and
FALSE in character at a time mode.

autoflush
If autoflush and localchars are both TRUE,
then when the ao, intr, or quit characters are
recognized (and transformed into TELNET
sequences; see set above for details), telnet
refuses to display any data on the user's
terminal until the remote system acknowledges
(via a TELNET Timing Mark option) that it has
processed those TELNET sequences. The initial
value for this toggle is TRUE if the terminal
user had not done an stty noflsh, otherwise
FALSE (see stty(1)).

autosynch
If autosynch and localchars are both TRUE,
then when either the intr or quit characters
is typed (see set above for descriptions of
the intr and quit characters), the resulting
TELNET sequence sent is followed by the TELNET
SYNCH sequence. This procedure should cause
the remote system to begin throwing away all
previously typed input until both of the
TELNET sequences have been read and acted
upon. The initial value of this toggle is
FALSE.
crmod
Toggle carriage return mode. When this mode
is enabled, most carriage return characters
received from the remote host will be mapped
into a carriage return followed by a line
feed. This mode does not affect those
characters typed by the user, only those
received from the remote host. This mode is
not very useful unless the remote host only
sends carriage return, but never line feed.
The initial value for this toggle is FALSE.

debug
Toggles socket level debugging (useful only to
the super-user). The initial value for this
toggle is FALSE.

options
Toggles the display of some internal telnet
protocol processing (having to do with TELNET
options). The initial value for this toggle
is FALSE.

netdata
Toggles the display of all network data (in
hexadecimal format). The initial value for
this toggle is FALSE.

?
Displays the legal toggle commands.

SEE ALSO
csh(1), ksh(1), rlogin(1N).
inet(3N), services(4), hosts(4) in the UMAX V Programmer's
Reference Manual.
telenetd(1M) in the UMAX V Administrator's Reference Manual.

BUGS
There is no adequate way for dealing with flow control.
On some remote systems, echo has to be turned off manually
when in line by line mode.

There is enough settable state to justify a .telnetrc file.

No capability for a .telnetrc file is provided.

In line by line mode, the terminal's eof character is only
recognized (and sent to the remote system) when it is the
first character on a line.
APPENDIX M: domax1 AND domax0 HARDWARE CONFIGURATION

HuhHuhHuh??
?Cassette ?
? Drive ?
? ? HuhHuhHuh? HuhHuhHuh?
HuhHuhHuh?? ? Disk ? ? Disk ?
? ? Drive ? ? Drive ?
? ? ? ? ?
HuhHuhHuh? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?? HuhHuhHuh?
? Tape HuhHuhHuhHuh?? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? Drive ? ? ?
HuhHuhHuh? ? 4 X 2 MIP HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
HuhHuhHuh? ? ?
? Tape ? ? Multimax 310 HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? Drive HuhHuhHuhHuh?? ?
HuhHuhHuh? ? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuh HuhHuhHuhHuhHuh?
HuhHuhHuhHuhHuhHuhHuh? ? Port ?
? ? HuhHuhHuhHuhHuh? ? Selector ?
? HuhHuhHuh? Console ? ? ?
? HuhHuhHuhHuh? ? Hardcopy ? HuhHuhHuhHuhHuh?
? ? Console ? ? ? ? ? ? ? ? 32 Lines ? ? ? HuhHuhHuhHuhHuh? HuhHuhHuhHuhHuh?
? ? CRT ? ? ?
? HuhHuhHuhHuh? ? Annex 01 ?
? ? ?
? HuhHuhHuhHuhHuh?
Ethernet HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh HuhHuhHuhHuh?
? Annex 00 ?
? ?
HuhHuhHuhHuh?
HuhHuhHuhHuh HuhHuhHuhHuh
? mtlzr ? ? mt_600 ?
? ? ? ?
HuhHuhHuhHuh HuhHuhHuhHuh

NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
APPENDIX N: BASIC UNIX REVIEW

Write the letter(s) of the UNIX component that best fit each
description.

K = Kernel S = Shell U = Utilities D = Directory

_____ 1. Uses standard syntax for all commands.

_____ 2. Schedules tasks and manages data storage.

_____ 3. Memory resident code.

_____ 4. Main interface between UNIX and users.

_____ 5. Heart of the operating system.

_____ 6. Can be easily combined to perform the exact
function which the user desires.

_____ 7. Path name concept.

_____ 8. Written mostly in the "C" programming language.

_____ 9. Multi-level directory structure.

_____ 10. Uses pipes and filters.

_____ 11. Supports control structures.

_____ 12. Includes text processing, electronic mail, file
manipulation, and program generation.
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
INDEX

. (dot)..................................................................................63
.. (dot dot).............................................................................63
Access modes.............................................................................37
Annex Commands
call..............................................................................16
hangup............................................................................21
BourneShell prompt........................................................................6
BSD UNIX..................................................................................2
Current working directory................................................................63
Expiration period........................................................................19
FTP Commands............................................................................108
!................................................................................116
?................................................................................123
cd...............................................................................119
close............................................................................121
get remote-file..................................................................113
help.............................................................................123
lcd..............................................................................115
ls...............................................................................120
open host........................................................................109
Password.........................................................................110
put..............................................................................117
quit.............................................................................122
status...........................................................................124
Kernel...................................................................................33
KornShell.................................................................................2
Mailx Commands...........................................................................74
?.................................................................................82
d.................................................................................80
S.............................................................................77, 78
MICOM....................................................................................14
Number links.............................................................................37
On-line manual pages.....................................................................25
Ownership and group affiliation..........................................................37
Parent...................................................................................64
Password.................................................................................19
Pathname.................................................................................57
PROCOMM+.................................................................................14
Protections..............................................................................34
Redirection..........................................................................94, 95
Root directory............................................................................4
Scrolling................................................................................10
Shell.....................................................................................1
Standard input...........................................................................93
Standard output..........................................................................93
Subdirectory.............................................................................61
System V UNIX.............................................................................2
TAB.....................................................................................153
TCP/IP..................................................................................107
Terminal nodes............................................................................3
UMAX.....................................................................................19
UNIX Commands
assist...........................................................................151
cancel............................................................................48
cat...............................................................................40
cd................................................................................61
chmod.............................................................................35
cp............................................................................49, 50
exit..............................................................................20
file..............................................................................39
lp................................................................................45
lpstat............................................................................47
ls................................................................................37
mkdir.............................................................................58
mv................................................................................62
pg................................................................................42
pwd...............................................................................57
rmdir.............................................................................59
tail..............................................................................43
UNIX filesystem...........................................................................3
UNIX Keyboard Function Commands
#..................................................................................9
@..................................................................................9
Ctrl-D............................................................................20
Ctrl-Q............................................................................10
Ctrl-S............................................................................10
Delete............................................................................10
Hold Screen.......................................................................10
UNIX Primer Plus........................................................................153
vi Commands
:!shell-cmd......................................................................147
:q!..............................................................................145
:r !shell-cmd....................................................................147
:r filename......................................................................147
:w...............................................................................145
:w newfile.......................................................................147
:wq..............................................................................146
Wildcards...............................................................................100        
   
 
250  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: Beginners Guide to understanding Unix on: October 15, 2006, 12:18:46 PM
VAX sample sessions:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>put memo ?
? 200 PORT Command OK. ?
? 125 File transfer started correctly ?
? 226 File transfer completed ok ?
? local: memo remote: memo ?
? 2299 bytes sent in 0.08 seconds (28 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Messages 200, 125, and 226 let you know that the file transferred
properly. The next line shows the local-filename. In this case,
we didn't specify the local-filename, so the local-filename and
the remote-filename are the same. The next line shows the number
of bytes sent and the amount of time for the transfer.
CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>put memo ?
? 200 COMMAND OKAY. ?
? 150 FILE STATUS OKAY; ABOUT TO OPEN DATA CONNECTION. ?
? 226 CLOSING DATA CONNECTION. ?
? local:memo remote:memo ?
? 2299 bytes sent in 0.08 seconds (28 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
7.4.1 Changing the Remote Directory

The directory on the remote computer can be changed to any
directory you want. This is called the remote working directory.
This is the directory where files that are sent from the Multimax
will be stored.

The syntax for the command to change remote working directory is
as follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: cd <remote-dirname> ?
? ?
? remote-dirname - the name of the new remote working ?
? directory ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>cd d_1131:[gholdaway] ?
? 200 Working directory changed to D_1131:[GHOLDAWAY] ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

You must specify a valid directory on the remote computer.

CYBER Example:

.................................................................
. 502 COMMAND NOT IMPLEMENTED. .
.................................................................

The reason this command is not implemented on the CYBER is
because NOS does not support the idea of directories.
7.4.2 Listing the Contents

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: ls [remote-dirname] [local-file] ?
? ?
? remote-dirname - working directory on remote computer ?
? ?
? local-file - local file where the remote-directory ?
? contents will be written. If omitted, ?
? the output is sent to the screen. ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>ls ?
? 200 PORT Command OK. ?
? 125 File transfer started correctly ?
? login.com;13 ?
? jeff.;1 ?
? test.com;1 ?
? 226 File transfer completed ok ?
? 228 bytes received in 0.06 seconds (0.34 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Since no remote directory was specified, the contents of the
current working directory is transferred and no local file was
specified, so the output is displayed on the screen.

CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>ls ?
? 200 COMMAND OKAY. ?
? 150 FILE STATUS OKAY; ABOUT TO OPEN DATA CONNECTION. ?
? PROLOG8 ?
? FSEP1A ?
? FSEP1 ?
? FSEP2 ?
? 226 CLOSING DATA CONNECTION. ?
? 52 bytes received in 1 seconds (0.05 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
7.5 Closing the Connection

The current FTP session with the remote server can be terminated
without leaving FTP. When the current session is terminated a
session to another remote FTP server can be initiated.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: close ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This command will terminate the current FTP session with the
remote server and return to the FTP command interpreter.

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>close ?
? 221 Goodbye. ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>close ?
? 221 SERVICE CLOSING CONTROL CONNECTION. LOGGED OUT. ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
7.6 Exiting FTP

When you have finished using FTP, the following command will
terminate FTP and return control to the shell.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: quit ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This command will terminate the current FTP session and exit FTP.

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>quit ?
? 221 Goodbye. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>quit ?
? 221 SERVICE CLOSING CONTROL CONNECTION. LOGGED OUT. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
7.7 Special FTP Commands

This section will discuss some FTP commands that are useful in
using FTP. They include an on-line help, status, and the !
character.

The help command will display all of the FTP commands on the
screen.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: help [command] ?
? ?
? command - an FTP command ?
? ?
? if omitted, prints a list of all known commands ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>help get ?
? get receive file ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

There is a synonym for the help command. It works in the same
way as the help command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: ? [command] ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>? put ?
? put send one file ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
FTP status can be displayed on the screen by entering the
following command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: status ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>status ?
? Connected to ERC830. ?
? No proxy connection. ?
? Mode: stream; Type: ascii; Form: non-print; Structure: file ?
? Verbose: on; Bell: off; Prompting: on; Globbing: on ?
? Store unique: off; Receive unique: off ?
? Case: off; CR stripping: on ?
? Ntrans: off ?
? Nmap: off ?
? Hash mark printing: off; Use of PORT cmds: on ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

These are the default settings. The meaning of these settings
and how to change them are found in the supplemental material at
the end of this manual.

There are a few "bugs" in FTP.

Correct execution of many FTP commands depends upon the remote
server. The VAX server is supplied by The Wollongong Group, Inc.
If you encounter problems transferring files to/from the
Multimax, please bring them to the attention of the User Support
Branch or call the Hotline (FTS 776-4688 or 6-HOTT).
7.8 Introducing UMAX TELNET

TELNET protocol will allow communication with another host. The
TELNET protocol can be invoked from either the Annex prompt or
from the shell prompt while you are logged into the Multimax. If
you invoke TELNET while logged into the Multimax, that session
will continue to be charged at the appropriate rate. The new
session to another host will also charge the account. This means
you are paying connect charges on both systems.

The syntax to invoke TELNET is as follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: telnet [host [port]] ?
? ?
? host - the host name ?
? ?
? port - the port number, if not given, use default ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $telnet ?
? telnet> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The telnet> prompt indicates that telnet commands can now be
entered. If no parameters are given, telnet enters the command
mode.

In order to create a connection to another host from command
mode, use the open command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command format: open <host> [port] ?
? ?
? host - host name ?
? ?
? port - port number, optional ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? telnet>open erc830 ?
? Trying... ?
? Connected to erc830. ?
? Escape character is '^]'. ?
? ?
? (Warning message from VAX) ?
? ?
? Username: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If you enter the host name on the same command line as telnet,
the open command will be done for you.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $telnet erc830 ?
? Trying... ?
? Connected to erc830. ?
? Escape character is '^]'. ?
? ?
? ( Warning message from VAX) ?
? ?
? Username: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

When you logout of the destination host, you will be
automatically brought back to the originating host.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lo ?
? Connection closed by foreign host .L-1990 15:57:42.19 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
The first $ prompt is the VMS prompt. The lo command logs you
out of the VAX. Notice that we get the connection closed
message, and the next $ prompt is back to the Multimax.
The connection that was created was closed. There is a TELNET
command to close the connection as well.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: close ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This TELNET command will close the connection and return to the
TELNET command mode.

To exit TELNET, enter the following command at the telnet>
prompt.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: quit ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This command will close any open TELNET session and exit TELNET.
An end-of-file (in command mode) will also close a session and
exit.

The current status of TELNET can be shown by entering the
following command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: status ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? telnet>status ?
? Connected to erc830. ?
? Operating in character-at-a-time mode. ?
? Escape character is '^]'. ?
? ?
? telnet> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
A listing of TELNET commands can be displayed by entering the
following command at the TELNET command mode prompt telnet>:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: help ?
? ?
? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? telnet>help ?
? Commands may be abbreviated. Commands are: ?
? ?
? close close current connection ?
? display display operating parameters ?
? mode try to enter line-by-line or char-at-a-time mode ?
? open connect to a site ?
? quit exit telnet ?
? send transmit special characters ('send ?' for more) ?
? set set operating parameters ('set ?' for more) ?
? status print status information ?
? toggle toggle operating parameters ('toggle ?' for more) ?
? z suspend telnet ?
? ? print help information ?
? telnet> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Workshop 7

This workshop will reinforce your understanding of the topics
covered in this chapter. Login to the Multimax with the username
and password given to you by the instructor. Each student is to
complete the entire workshop. Computer exercises might need to
be worked as a team.

COMPUTER EXERCISES

1. Log into the Multimax.

Questions 2 through 11 have to do with a connection between the
local computer (Multimax) and the remote computer (VAX).

2. Initialize FTP on the Multimax and create a connection to
the VAX. (Hint: open)

What is the remote computer default username?
How can you enter a different username?



3. What files are on the remote computer's directory?
(Hint: If you can't remember the FTP command, how can you
find out?)



4. What is the default type? (Hint: status)




Continue on the next page
5. Transfer the file "memo" from the Multimax to the VAX.
Change the name of the file on the VAX to "memo.doc".



6. Transfer the file "DATA.MAY" from the VAX to the Multimax.
Keep the same filename on both platforms.



7. Without entering it, what FTP command would you enter to
change the remote computer working directory to
D_1131:[STUDENT]?



8. Enter the FTP command to list the contents of the local
computer working directory. What files are present?



9. Enter the FTP command to list the contents of the remote
computer working directory. What files are present?



10. Without entering the command, how would you change the
remote working directory to D_1131:[STUDENT1]?



11. What changes would you have to make in order to
transfer a binary file from the Multimax to the VAX?


Continue on the next page
** NOTE **

Questions 12 through 20 have to do with a connection between the
local computer (Multimax) and the remote computer (CYBER).

12. Close the connection with the VAX and then open a connection
to the CYBER.



13. What files are on the remote computer's directory?



14. What is the default type? (Hint: status)



15. Transfer the file "memo" from the Multimax to the CYBER.
Change the name on the CYBER to a filename of your choice.



16. Transfer the file "MAYDATA" from the CYBER to the Multimax.
Keep the same filename on both platforms.



17. Without entering it, what FTP command would you enter to
change the remote computer working directory?



18. Enter the FTP command to list the contents of the local
computer working directory.





Continue on the next page
19. Enter the FTP command to list the contents of the remote
computer working directory.



20. Close the connection with the CYBER and exit FTP.





























Continue on the next page
** NOTE **

The following questions have to do with your understanding of the
Telnet communications protocol.

21. Enter the command to invoke the Telnet protocol.



22. Open a connection to the VAX.



23. Enter a valid username and password.



24. Are you logged into the VAX or the Multimax?



25. Enter the command to exit the VAX. (Hint: logoff)



26. Are you logged into the VAX or the Multimax?



27. Are you confused? Logout of the Multimax and the Annex.

NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
8. INTRODUCTION TO vi

The vi editor was developed at the University of California,
Berkeley. It was originally included as part of BSD UNIX. It
became an official part of AT&T UNIX with the release of System
V. Before vi was invented, the standard UNIX editor was ed. The
ed editor was line oriented and made it difficult to see the
context of the file being edited.

The next progression was an editor called ex. The ex editor had
some distinct advantages over ed. It allowed you to display an
entire screen of text instead of just one line at a time. While
in the ex editor, you could give the command vi (for visual
mode). Users used the visual mode so much that developers of ex
made it possible to use the display editing feature without
having to enter ex and then vi. They called the new facility
simply vi.

The vi editor does its work in a work buffer. When you start vi,
it copies the disk file into the work buffer. During the editing
session, changes are made to this copy. The contents of the disk
file are not changed until you write the contents of the work
buffer to the disk file.

The command to enter the vi editor is:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: vi <file1> ?
? ?
? file1 - the filename to edit ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Your screen is cleared, then the first lines of the file are
displayed, and the cursor is positioned at the top of the screen.
The bottom line of your screen is reserved for certain command
mode activities and for error and status messages and does not
contain any of the file's text. If the file already exists, the
bottom line lists the filename in quotes and the number of lines
and characters it contains. If the file is new, "New file" is
displayed next to the filename. If the file does not fill an
entire screen, a tilde (~) character appears in the leftmost
column of any blank lines.

By default, you are always in command mode at the start of a vi
session. The most common command mode activities are:

cursor positioning
entering text mode
moving, copying, and deleting text
storing changes
quitting
Whenever you wish to return to command mode, or are unsure of
what mode you are in, press the Esc key.

Esc can be entered any number of times without harm. The Esc key
on the VT terminals is the Ctrl-3 combination. On the PC, it is
the key marked Esc.
8.1 vi: Cursor Positioning

Below is a list of cursor positioning commands. Characters are
not echoed on your screen when one of these commands is executed.
The cursor simply moves to the desired location. If a command is
not accepted, the cursor remains where it is. The current line
is defined as the line on which the cursor currently resides.
The letter N is a repeat factor.

N+ move down N lines from current line. The cursor can be
anyplace on the current line. When complete, the
cursor will be located at the first character on the
line N lines down from the current line.

N- move up N lines from current line. The cursor can be
anyplace on the current line. When complete, the
cursor will be located on the first character on the
line located N lines up from the current line.

(Ret) The cursor can be located anyplace on the current line.
The will be on the first character of the next line.

$ The cursor will move to the end of the current line

NG This command will move the cursor to line N. Default
is to move to the last line.

Ctrl-D move down 1/2 screen (11 lines)

Ctrl-U move up 1/2 screen (11 lines)

NOTE: Words are delimited by spaces (ie., a word
begins and ends with a space).

Nw The cursor will be on the first character of the word
located N words from the current word. The current
word is the word where the cursor is located. The
default is to skip to the beginning of the next word.

Nb The cursor will be on the first character of the word
located N words back from the current word. The
default is to skip back to the beginning of the
previous word.

e The cursor will skip to the end of the current word.
The following keys are also defined for moving around the screen:

h back one space

j down one line

k up one line

l forward one space

The arrow keys will also work.

CAUTION NOTE: If you hold the arrow key down to move quickly to
another area of the text, a line might be inserted
into your file.
8.2 vi: Text Mode

Several commands in command mode allow you to enter text. Once
the command is entered, all other characters that you type are
inserted in your text until you press the Esc key.

To add text, use:

I enter text mode, additional text appears at the beginning of
the current line.

i enter text mode, additional text appears before the current
cursor position.

A enter text mode, additional text appears at the end of the
current line.

a enter text mode, additional text appears after the current
position.

O enter text mode, open a line above the current line.

o enter text mode, open a line below the current line.

To replace text, use:

R replace characters until Esc

r replace one character at current cursor position, then
return to command mode

To substitute text, use:

Ns substitute character for the current N characters until
Esc. Default is to substitute for the current
character until Esc.
8.3 vi: Deleting Text

vi commands for deleting text take effect relative to the
cursor's current position. Text deletion commands are not echoed
on your screen.

Ndd delete N lines starting at the current line. The
default is to delete the current line.

Ndw delete N words starting with the current word. The
default is to delete the current word.

Nx delete N characters starting at the current cursor
position. The default is to delete one character.

D delete remainder of line
8.4 vi: Copying Text

Copying text is performed using one of the "yank and put" command
pairs. The most straight forward command sequence for copying
is:

1. Yank a word, line, or number of lines. A copy of the
yanked text is stored invisibly. The original text is
not disturbed.

2. Move the cursor to the desired location.

3. Put the yanked copy into place.

4. Move the cursor to the next block of text you want to
copy, then go to step 1.

Here are some yank and put commands:

NY yank N lines. Default is to yank one line.

Nyw yank N words. Default is to yank one word.

P put yanked lines above current cursor position
or
put yanked words before current cursor position

p put yanked lines below current cursor position
or
put yanked words after current cursor position
8.5 vi: Moving Text

Moving text from one area to another can be accomplished in
several different ways. You can use whichever method is the
easiest for you to remember.

1. Yank, put, and delete:

a. Yank the desired text.

b. Move the cursor to the new location and then "put"
the "yanked" text into its new location.

c. Move the cursor back to the original text and
delete it.

or

2. Delete and put:

a. Delete the desired text

b. Move the cursor to the new location

c. Use a put command to add the text.


NOTE: The delete command stores an invisible copy
of the deleted text in a buffer. This is
done so the undo command is capable of
restoring the previous command. That's why
it is possible to move that deleted text to
another area.
8.6 vi: Restoring the Last Change

The Undo command will reverse the last command you just entered.
It will restore text that you have changed or deleted by mistake.
The undo command will undo only the most recently changed text.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: u ?
? ?
? u - undo the last change ?
? ?
? U - restore the current line to the way it was before you ?
? started changing it, even if several changes were made ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If you delete a line and then change a word, undo will restore
the changed word but will not restore the line.
8.7 vi: Recovering Text After a Crash

You can often recover text that would have been lost because of a
system crash. When the system has been brought back up enter the
following command to see if the system saved a copy of your work
buffer:

Example:

.................................................................
. $vi -r filename .
.................................................................

If your work buffer was saved, you will be editing a recent copy
of the work buffer. Use the w command to write the edited
version to the disk file.

The -r option will recover the version of filename that was in
the buffer when the crash occurred. If no buffer was saved, the
editor will assume you are going to edit a new empty file called
filename.
8.8 vi: Saving Text and Quitting

Commands to save (write) text and to quit are entered from the
Last Line Mode. The Last Line Mode is entered by entering a
colon (Smiley character from the command mode.

To save changes without exiting vi, enter:

Example:

.................................................................
. :w .
.................................................................

This command is displayed on the status line as it is typed in.
The commands are executed by pressing the Enter key. The file's
name and number of lines and characters are displayed on the
status line. With no option, the work buffer will be written
back to the original disk file. If, for some reason, you don't
have write permission to the working directory, you can copy the
work buffer to another file by specifying the complete pathname
of a temporary file.

Example:

.................................................................
. :w /user0/rharding/temp .
.................................................................

Now you can exit vi and not lose any of your work. The editing
session is saved in the file /user/rharding/temp.

To exit vi without saving any of the changes since the last :w
(or to discard all changes if no :w), enter:

Example:

.................................................................
. :q! .
.................................................................

The exclamation mark (!) (in slang, it's a bang) indicates to
quit the current editing session, regardless. If you just enter
q alone, the editor will warn you that existing changes were not
saved. It is difficult to get out of this mode. Use the
exclamation mark to indicate do the exit no matter what and not
save the changes since the last w command.
To save and quit, enter:

Example:

.................................................................
. :wq .
.................................................................

The w command will write the work buffer to the disk file. The q
command will exit the editor. The shell prompt ($) will be
displayed after the file has been saved and the editor exited.
8.9 Other vi Commands

To save the file you are editing under a different name, use:

Example:

.................................................................
. :w newfile .
.................................................................

To copy in the contents of another file, position the cursor on
the last line you want to be above the new text, then execute:

Example:

.................................................................
. :r filename .
.................................................................

The contents of filename will appear on your screen below the
last cursor position. The existing text will be moved down.

To include the output of a shell command (i.e., date) in the file
you are editing, position the cursor as described above, then
enter:

Example:

.................................................................
. :r !shell-cmd .
.................................................................

To execute a shell command without including its output in your
file, enter:

Example:

.................................................................
. :!shell-cmd .
.................................................................

This feature enables you to check man pages or the contents of
other files without exiting vi.
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Workshop 8

This workshop will reinforce your understanding of the topics
covered in this chapter. Login to the Multimax with the username
and password given to you by the instructor. Each student is to
complete the entire workshop. Computer exercises might need to
be worked as a team.

1. Login to the Multimax.



2. Edit the file rocket.sh .
(Hint: vi rocket.sh)


3. Position the cursor at the beginning of line 10.



4. Move the cursor up five lines.



5. Move the cursor to the end of the current line.
What vi command did you use?


6. Move the cursor to the first line of the file.
What vi command did you use?


7. Move to the end of the file and insert a new line after it
that contains the following text:

fi

8. Remove all the blank lines from this file.



Continue on the next page
9. Locate the word grop and change it to grep .



10. Add the following text after the last line of the file.

rm ./temp$$



11. Now execute the script by typing rocket.sh

(Hint: What are the permissions on this file?)

If you did the editing correctly fireworks should appear. If
not, compare your script to /user0/teacher/rocket.sh

To stop the fireworks enter the interrupt character (CTRL-C)


12. Create a file with a name of your own choice. Insert the
output from the UNIX command ls -la . Save your change and
exit vi.



13. Edit the file you just created. Go to the end of the file
and without leaving vi, display a listing of the directory
/user0/teacher. How do you return to the editing session?
Did the listing get inserted into your editing session?





13. What is the option to recover your changes after a system
crash?



14. Logout of the Multimax and the Annex.
9. GETTING HELP

9.1 Assist

The assist command is a menu driven utility that can provide
information on the following topics:

1. Information on a variety of UNIX topics

2. Tutorials

3. The ability to construct and execute command lines

4. A "pop up" menu for advanced users

Assist is set up so you do not have to know the exact command
name in order to get information or use the command. To execute
assist enter:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: assist [name] ?
? assist [-s] ?
? assist [-c name] ?
? ?
? name - invoke an assist-supported UNIX system or ?
? walkthru for name. ?
? ?
? -s - reinvoke the assist setup module to check or ?
? modify the terminal variable. ?
? ?
? -c name - invoke the version of name that is in the ?
? current directory. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Sample session:

.................................................................
. $assist .
.................................................................

The first time assist is executed, assist will automatically
check your terminal capabilities and then runs a brief tutorial.
You can run the tutorial again by entering:

Sample session:

.................................................................
. $assist -s .
.................................................................

This command will also allow you to recheck your terminal setup.

The following is a list of useful assist commands:

Ctrl-A - assist help

Ctrl-O - help with current menu

Ctrl-Y - help with current menu item

Ctrl-T - call top level menu

Ctrl-F - call "pop up" menu

Ctrl-R - go back to previous menu

(Ret),Ctrl-N - move cursor to next menu item

Ctrl-P - return cursor to previous item

Ctrl-G - select (execute) current menu item

Ctrl-V - clear help message or prompt

Ctrl-D - exit

Assist contains information on many, but not all, of the UMAX
commands. In addition, not all options and possibilities for
each command are covered. For complete information about a UMAX
command, please use the on-line manual pages.
9.2 UNIX Primer Plus

This manual is intended to be the reference manual for UNIX. It
has several handy features. The inside of the front cover has a
listing of UNIX command and the page number on which a
description of the command and its options can be found. In
addition, there are some quick reference sheets that can be
removed from the book and used at your terminal. The book is
well written, humorous, and contains a lot of information about
UNIX. There might be subtle differences between generic UNIX and
UMAX.

Another manual that is a good reference for UNIX is "A Practical
Guide to UNIX System V" by Mark G. Sobell.

9.3 TAB (Technical Assistance Bulletin)

The TAB is published monthly and contains current articles and
helpful hints for the Multimax minicomputers and UNIX in general.
To be added to the mailing list to receive a FREE subscription,
contact Gloria Armstrong (FTS) 776-4433 or (303) 236-4433.


9.4 Local Support

If you have a local technical person that is available, try them.
Some regional offices have a hotline that you can call for
assistance.


9.5 CCS Hotline

The is a technical Hotline service available in the Denver
office. This service is available to the entire Bureau. This is
the fastest way to get your questions answered. The Hotline
number is (FTS) 776-HOTT (4688) or Commercial (303) 236-HOTT
(4688).
9.6 CBT (DOS based training for UNIX)

There is a Computer Based Training course available on a PC in
the Denver training room. It runs under DOS and doesn't need to
be connected to a UNIX machine. It is easy to use and has
lessons for the beginning and advanced UNIX user, as well as
courses in C programming and UNIX system administration. It can
also give you instruction about a particular command or topic
that interests you.
Workshop 9

Lucky you! No workshop


Please complete the...

Summary Workshop

and

Course Evaluation
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
APPENDIX A: DENVER OFFICE LOGIN SEQUENCE

PRESS Space Bar

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? WELCOME TO THE B.O.R. NETWORK P/S:B ?
? SYSTEMS PRESENTLY AVAILABLE ARE: ?
? ?
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ENCORE/UNIX MAX ?
? OUT DIAL OD ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 04/010. ENTER RESOURCE MAX ?
? CONNECTED TO 04/052 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Wait 2 seconds then PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
APPENDIX B: GREAT PLAINS LOGIN SEQUENCE

PRESS (Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? WARNING ****** WARNING ****** WARNING ****** WARNING ****** WARNING ?
? PUBLIC LAW 99-474 PROHIBITS UNAUTHORIZED USE OF THIS U.S. GOVERNMENT ?
? COMPUTER SYSTEM AND/OR SOFTWARE. PUNISHMENT INCLUDES FINES AND UP TO ?
? 10 YEARS IN PRISON. REPORT VIOLATIONS TO THE SYSTEM SECURITY OFFICER. ?
? WARNING ****** WARNING ****** WARNING ****** WARNING ****** WARNING ?
? ?
? ?
? ENTER RESOURCE A - BIL640, B - BIL751, OA - BIL630, DEN - DENVER CYBERS ?
? FOR STATUS OF COMPUTER SYSTEMS CALL (406) 657-6828 OR FTS 585-6828 ?
? FOR EMERGENCY AND AFTER HOURS CALL (406) 255-6932 ?
? ?
? CHANNEL 02/035. ENTER RESOURCE DEN(Ret) ?
? CONNECTED TO 02/079 ?
? ?
? WELCOME TO THE B.O.R. NETWORK P/S:B ?
? SYSTEMS PRESENTLY AVAILABLE ARE: ?
? ?
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? CENTER ASC ?
? ENCORE/UNIX MAX ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

PRESS (RET) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

APPENDIX C: LOWER COLORADO LOGIN SEQUENCE

The following operating procedures show how a user gets to Denver
using the Local Area Network (LAN) in Boulder City, starting with
the PC prompt: M:\USERNAME>

ENTER PCPLUS(Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? | ?
? COMMUNICATION SERVICES | PROCOMM PLUS ADD SERVICES MENU ?
? ON NETWORK | ?
? | ?
? GENERAL SPECIFIC SERVER| UP/DOWN ARROW ..Highlight Services ?
?________________________| ?
? MICOM * * | ENTER ....Connect Highlighted Services?
? VAX_19.2 * * | ?
? MI24 * * | PgPd .....Scroll Up One Page ?
? ADMICOM * * | ?
? | PgPn .....Scroll Down One Page ?
? | ?
? | Home .....First Service ?
? | ?
? | End ......Last Service ?
? | ?
? | Alt-E ....Expand/Contract Services ?
? | ?
? | Alt-M ....Manual Connect ?
? | ?
? | Alt-X ....Exit PROCOMM PLUS ?
? | ?
? | Alt-Z ....Help ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

SELECT MICOM. PRESS (Ret) SEVERAL TIMES

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? THIS IS THE LOWER COLORADO REGIONAL OFFICE INSTANET 6600 ?
? RESOURCES AVAILABLE ?
? BLD460 ?
? BLD732 ?
? BLDT50 ?
? DEN (1200BPS) ?
? DEN2 (2400BPS) ?
? OUTDIAL (1200 BPS) ?
? TELEBIT (1400 BPS OUTDIAL) ?
? VAX (19.2 lines only) ?
? CHANNEL 02/008. ENTER RESOURCE ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

ENTER DEN(Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? You are accessing the Denver MICOM through the Boulder City ?
? MICOM. Please remember to hit the break key three times ?
? after logging off. The first DISCONNECTED comes from. The ?
? second DISCONNECTED comes from Boulder City. This will assure?
? that other users can connect when you are finished. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS (Ret) SEVERAL TIMES

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ASC/CORP. CENTER ASC ?
? ENCORE/UNIX MAX ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

APPENDIX D: MID-PACIFIC LOGIN SEQUENCE

NETWORK LOGIN PROCEDURE

TYPE PCOMN(Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ?
? HuhHuhHuh Sacramento Connect Menu HuhHuhHuh?? ?
? ? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ? ?
? ? ? ?
? ? ? ?
? ? 1) Connect to the Sacramento VAX 8300 (USR) ? ?
? ? ? ?
? ? 2) Connect to the Sacramento VAX 780 (CVOCO) ? ?
? ? ? ?
? ? 3) Connect to the Sacramento ENCORE ? ?
? ? ? ?
? ? 4) Connect to the Sacramento (TCP/IP) NETWORK ? ?
? ? ? ?
? ? 5) Manual Setup/Connections ? ?
? ? ? ?
? ? D) Connect to the DENVER Computers ? ?
? ? ? ?
? ? E) EXIT to DOS ? ?
? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS D(Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ?
? HuhHuhHuh Denver Connect Menu HuhHuhHuh?? ?
? ? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ? ?
? ? ? ?
? ? ? ?
? ? 1) Connect to the Denver VAX 8300 (USR) ? ?
? ? ? ?
? ? 2) Connect to the Denver CYBER AA & EE ? ?
? ? ? ?
? ? 3) Connect to the Denver ENCORE ? ?
? ? ? ?
? ? 4) Connect to the Denver IBM (FFS) ? ?
? ? ? ?
? ? 5) Connect to Sacramento Computers ? ?
? ? ? ?
? ? E) EXIT to DOS ? ?
? HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
PRESS 3(Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? hosts ?
? Host Name System Status Load Factor Inet Addr ?
? ==================================================================== ?
? domax0 up 0.46 137.77.1.2 ?
? domax1 up 1.23 137.77.1.3 ?
? dosun0 up 1.28 137.77.1.5 ?
? erc830 up 0.36 137.77.1.4 ?
? annex: c domax0 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2j ns32332 ?
? domax0 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

DEDICATED LINE LOGIN

TYPE PCOM(Ret)

PRESS (Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? NAME OF RESOURCE: DEN(Ret) ?
? ?
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ASC/CORP. CENTER ASC ?
? ENCORE/UNIX MAX ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
APPENDIX E: PACIFIC NORTHWEST LOGIN SEQUENCE

PRESS (Ret) OR Space Bar

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? ******************************* NOTICE ******************************* ?
? USE OF GOVERNMENT COMPUTER RESOURCES AND DATA IS RESTRICTED TO OFFICIAL ?
? GOVERNMENT BUSINESS. FAILURE TO COMPLY COULD RESULT IN DISCIPLINARY ?
? ACTION OR PROSECUTION UNDER FEDERAL LAW. REPORT UNAUTHORIZED USE OR ?
? ACCESS TO THE ADP SECURITY OFFICER AT (208)334-1746 OR (FTS)554-1746. ?
? ?
? C = CYBER ?
? H = HYDROMET ?
? P = OUT DIAL ?
? V = VAX BOISE ?
? Y = YAKIMA VAX ?
? ?
? CHANNEL 02/014. ENTER RESOURCE: C(Ret) ?
? CONNECTED TO CHANNEL 03/094 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

PRESS (Ret) TWO OR THREE TIMES

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ASC/CORP. CENTER ASC ?
? ENCORE/UNIX MAX ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

APPENDIX F: UPPER COLORADO LOGIN SEQUENCE

PRESS (Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Server> C MICOM2400(Ret) ?
? Server -010- Session 1 connected. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS (Ret)

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? SLC PORT SELECTOR ?
? CHANNEL 01/091. ENTER HOST: DEN(Ret) ?
? CONNECTED TO 01/014. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

PRESS (Ret) TWO OR THREE TIMES

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ASC/CORP. CENTER ASC ?
? ENCORE/UNIX MAX ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

APPENDIX G: WASHINGTON OFFICE LOGIN SEQUENCE

PRESS Space Bar ONCE OR TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? CONNECTED TO 01/044 ?
? WELCOME TO THE B.O.R. NETWORK P/S:C ?
? SYSTEMS PRESENTLY AVAILABLE ARE: ?
? ?
? **SYSTEM** **NAME** ?
? ?
? CYBER SYSTEMS ?
? (AA OR EE) ?
? VAX CLUSTER DEN ?
? ?
? OUT-DIAL MODEM OD ?
? ?
? TO SELECT A SYSTEM,ENTER THE SYSTEM ?
? NAME AND CARRIAGE-RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/026. ENTER RESOURCE DEN(Ret) ?
? CONNECTED TO 01/051 ?
? ?
? **SYSTEM** **NAME** ?
? ?
? VAX 8300'S VAX ?
? CYBER/CDCNET F.E. CDC ?
? ASC/CORP. CENTER ASC ?
? ENCORE/UNIX MAX ?
? ?
? TO SELECT A SYSTEM, ENTER THE SYSTEM ?
? NAME AND CARRIAGE RETURN AT NEXT ?
? PROMPT. ?
? ?
? CHANNEL 02/079. ENTER RESOURCE MAX(Ret) ?
? CONNECTED TO 06/025 ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
PRESS (Ret) TWICE

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ?
? Annex Command Line Interpreter * Copyright 1988 Xylogics, Inc. ?
? ?
? ***WARNING***Unauthorized access to U.S. Government computers ?
? is punishable by fine and/or imprisonment. ***WARNING*** ?
? annex: c domax1 ?
? login: your username(Ret) ?
? Password: your password(Ret) ?
? UNIX System V Release ax.2.2o ns32332 ?
? domax1 ?
? Copyright ? 1984 AT&T ?
? All Rights Reserved ?
? ***WARNING***Unauthorized access to/use of this U.S. Government ?
? computer is punishable by fine and/or imprisonment. ***WARNING***?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

APPENDIX H: UNIX COMMANDS QUICK REFERENCE


a > b put the output of command a into
file b

a >> b append the output of command a onto
file b

a < b take the input of command a from
file b

a | c pipe the output of command a to the
input of command c

a & run command a in the background

assist call up the assist menu for
information on UMAX commands

at time < script run script at time

at -l list your at jobs waiting to be
executed

at -r xx remove at job xx

awk '/str1/,/str2/' file display all lines between those
containing str1 and str2

awk '{print $n,$m}' file display fields n and m of file

call host connect to a Multimax from an Annex

cat file display file on the screen

cat file1 >> file2 append file1 onto file2

cd return to your home directory

cd dir work in directory dir

chmod perms file change permissions on file to perms

cp file1 file2 copy file1 to file2

cp f1 f2 f3 dir copy files f1, f2, and f3 into
directory dir

csh the C shell

cu options host dial up a remote host

cut -fx file display field x of file

cut -da -fx file use a as a field separator

diff file 1 file 2 display differences between file1
and file2

echo string display string on the terminal

file file1 describe file1's type (data, text,
binary, etc)

finger user display information on user

ftp interactive remote file transfer

grep string file search for string in file

grep -c string file display only the number of
occurrences of string

grep -l string files list file names that contain string

kill %x kill background job x

ksh the KornShell

lp -ddest file Print file on the printer dest

ls list the files in the current
working directory

ls dir list the files in directory dir

ls -a include files that begin with a
. (period)

ls -l long listing including permissions,
size and ownership

ls -C list in columns

ls -ld display detailed information on a
directory, not its contents

mailx read mail via interactive mail
program

mailx user send mail to user

man command display the man pages for command

mkdir dir create directory dir

mv file1 file2 move file1 to file2

mv f1 f2 f3 dir move files f1, f2, and f3 into
directory dir

nsh host commands execute commands on a remote host

passwd change your password

pg file display file on screen at a time

ps display process status of your
current session

ps -u user display process for user

pwd print (current) working directory

rcp host1:file host2:file copy files from one host to another

rlogin host login to a remote host

rm file remove file

rm -rdir remove directory dir and contents

rmdir dir remove directory dir

ruptime display status of hosts on the
network
251  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: Beginners Guide to understanding Unix on: October 15, 2006, 12:17:08 PM
Workshop 4

This workshop will reinforce your understanding of the topics
presented in this chapter. Login to the Multimax using the
username and password from the previous workshop. All students
should complete the entire workshop. You may need to work in a
team on the computer exercises.

DESK EXERCISES

1. What is a directory?



2. What is an absolute path name?



3. What is a relative path name?



4. What command will create a directory?



5. What command will remove a directory?



6. What command is used to change from one directory to
another?



7. How would you change the name of a directory?



Continue on the next page
8. What do the files . (dot) and .. (dot dot) represent?




9. What does execute permission on a directory mean?




COMPUTER EXERCISES

10. Login to the Multimax.



11. What is the absolute pathname of your current working
directory? Hint: pwd



12. Type cd etc

What message do you get? Can you explain why?



13. Type cd /etc

What is your current working directory? Why did this
happen?



14. Enter the command that will return you to your home
directory.


Continue on the next page

15. Enter the command that will change to your current working
directories parent.




16. List the contents of your current working directory



17. List the permissions, ownership, size, etc. of your current
directories parent.



18. Enter the command to change to your home directory. Create
a new subdirectory with a name of your choice.



19. Change the current working directory to the subdirectory you
just created.



20. Rename the subdirectory to Student. Is this the same
subdirectory as everyone else in the class? Why?



21. Change to your home directory and delete the subdirectory
Student.



22. Logout of the Multimax and the Annex.
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
5. COMMUNICATION UTILITIES

This chapter will deal with the utilities that allow one user to
communicate with another. Some of these utilities require the
other user to be logged in and others do not.

The mail utility can be used to send messages to one or more
users. It is not necessary for the user that is receiving the
message to be logged in. The mail utility delivers the message
to a file belonging to the recipient. The user will be notified
that a mail message exists. Messages can be saved or deleted and
a reply sent.

The talk utility is an interactive session that allows each user
to send message simultaneously to each other. Both users must be
currently logged in for this utility to work.

The write utility is a one-way communication. It allows you to
send a message to another user. The user must be logged in and no
reply is possible.

5.1 Sending Electronic Mail

The basic command line format for sending mail is:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: mailx [options] [user1[usern]] ?
? ?
? options - see man pages for a complete list ?
? ?
? user1[usern] - one or more users to get the mail ?
? message ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The username is the name assigned by the system administrator to
a user on the UNIX system (for example, rharding). The username
can also include a system name if the recipient is on another
UNIX system that can communicate with the sender's (for example,
sys2!rharding). Let's assume that the recipient is on the local
UNIX system.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx rharding(Ret) ?
? Subject: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Now enter the subject of your message followed by a (Ret). The
cursor will appear on the next line. Simply start typing the
message. There is no limit to the length of a message. When you
have finished, send it by typing Ctrl-D on a new line.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx rharding(Ret) ?
? Subject: Work schedule(Ret) ?
? Please check the bulletin board(Ret) ?
? for the new work schedule.(Ret) ?
? Ctrl-D ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The shell prompt on the last line indicates that the message has
been queued (placed in a waiting line) and will be sent.
5.2 Reading Mail

To read your mail enter:

Example:

.................................................................
. $mailx .
.................................................................

Executing this command places you in the command mode of mailx.
If there are no mail messages waiting to be read, you will see
the following message on the screen:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx ?
? No mail for teacher ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Of course, your username will appear instead of 'teacher'.

When a mail message appears in the recipient's mailbox, the
following message will appear on the screen.

Example:

.................................................................
. you have mail .
.................................................................

This notice will appear when you login to the system or upon
return to the shell from another procedure.
When you have been notified of mail waiting to be read, enter the
command to enter mail. The screen will look something like this:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx ?
? ?
? mailx version 3.1 Type ? for help. ?
? "/usr/mail/teacher": 3 messages 3 new ?
? >N 1 bhood Fri Jul 13 13:01 21/324 Review session?
? N 2 class2 Fri Jul 13 14:53 15/211 Meeting notice?
? N 3 phajny Fri Jul 13 16:53 11/272 Reorganization?
? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This first line indicates the version of mailx that is being
used. In this case, version 3.1. There is a reminder that help
is available by typing the ?. The second line shows the path
name of the file used as input (usually the same as the username)
and a count of the total number of messages and their status.
The messages are numbered in sequence with the latest one
received on the bottom of the list. To the left of the sequence
numbers, there may be a status indicator; N for new, U for
unread. The > symbol points to the current message. The other
fields in the header line show the login of the sender, day,
date, and time it was delivered. The next field has the number
of lines and characters in the message. The last field is the
subject of the message; it might be blank.

To read the mail messages you can do any of the following steps:

(Ret) - This will cause the current message to
be displayed. The current message is
the once indicated by the > sign.

p (Ret) - This is equivalent to pressing the (Ret)
key with no argument. The current
message will be displayed.

p 2 (Ret) - You can press p (for print) or t (for
type) followed by the message number(s).

p teacher (Ret) - This will print all messages from user
teacher.
5.3 Saving Mail

All messages that are not specifically deleted are saved when
quitting mailx. Messages that have been saved are placed in a
file in the home directory called mbox. The mbox file is the
default. It is possible to save them in a file of the users
choice. Messages that have not been read are held in the
mailbox. The command to save messages comes in two forms.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: S [msglist] ?
? ?
? msglist = ?
? ?
? n message number n the current message ?
? ?
? ^ the first undeleted message ?
? ?
? $ the last message ?
? ?
? * all messages ?
? ?
? n-m an inclusive range of message numbers ?
? ?
? user all messages from user ?
? ?
? /string All messages with string in the subject line ?
? (case is ignored) ?
? ?
? :c all messages of type c where c is: ?
? ?
? d - deleted messages ?
? n - new messages ?
? o - old messages ?
? r - read messages ?
? u - unread messages ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Messages specified by the msglist argument are saved in a file in
the current directory named for the author of the first message
in the list. If the username 'teacher' sent the message and you
entered:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ? S * ?
? "teacher" [New file] 11/268 ?
? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The mail message has been saved into a file in your current
directory called 'teacher'. If you want to save the file in
another filename, you can do that with the second method of
saving mail. Basically, it works the same as S; but it allows
you to save the mail to a file you specify.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: s [msglist] [file1] ?
? ?
? msglist - same arguments as before ?
? ?
? file1 - filename which will receive the saved mail ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
5.4 Deleting Mail

To delete a message, enter a d at the command mode prompt
followed by a msglist argument. An msglist argument can be any
one the following:


n message number n the current message

^ the first undeleted message

$ the last message

* all messages

n-m an inclusive range of message numbers

user all messages from user

/string All messages with string in the subject line (case
is ignored)

:c all messages of type c where c is:

d - deleted messages
n - new messages
o - old messages
r - read messages
u - unread messages

For example, suppose you wanted to delete all of your mail
messages. Enter the following command at the command mode
prompt. The command mode prompt for mailx is the question mark
(?).

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx ?
? ?
? mailx version 3.1 Type ? for help. ?
? "/usr/mail/teacher": 3 messages 3 new ?
? >N 1 bhood Fri Jul 13 13:01 21/324 Review session ?
? N 2 class2 Fri Jul 13 14:53 15/211 Meeting notice ?
? N 3 phajny Fri Jul 13 16:53 11/272 Reorganization ?
? ? d * ?
? ? q ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

All of the messages have now been deleted. The messages are not
actually deleted until the mailbox is exited. Until that happens
the u (for undelete) command is available. Once the quit command
(q) is entered, however, the deleted messages are gone.
5.5 Undeliverable Mail

If there has been an error in the recipient's username, the mail
command will not be able to deliver the message. For example,
let's say you misspelled the username. It will return the mail
in a message that includes the system name and username of the
sender and recipient. It also includes a message stating the
reason for the failure.

The sender of the message would get a message from mailx
indicating that an error had occurred.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? $mailx ?
? ?
? mailx version 3.1 Type ? for help. ?
? "/usr/mail/teacher": 1 message 1 new ?
? >N 1 teacher Fri Jul 13 13:45 25/655 Returned mail:User unkno?
? ? ?
? Message 1: ?
? From teacher Fri Jul 13 13:45:57 1990 ?
? Received: by domax1.UUCP (5.51/) ?
? id AA01997; Fri, 13 Jul 90 13:45:54 mdt ?
? Date: Fri, 13 Jul 90 13:45:54 mdt ?
? From: Mail Delivery Subsystem <MAILER-DAEMON> ?
? Subject: Returned mail: User unknown ?
? Message-Id: <[email protected]> ?
? To: teacher ?
? Status: R ?
? ?
? ----- Transcript of session follows ----- ?
? 550 snoopy... User unknown: No such file or directory ?
? ?
? ----- Unsent message follows ----- ?
? Received: by domax1.UUCP (5.51/) ?
? id AA01995; Fri, 13 Jul 90 13:45:54 mdt ?
? Date: Fri, 13 Jul 90 13:45:54 mdt ?
? From: Teacher Account D-7130 <teacher> ?
? Message-Id: <[email protected]> ?
? To: snoopy ?
? Subject: Meeting notice ?
? ?
? Meeting will be held at Charlie Brown's house. ?
? July 13, 1990 ?
? 7:30 p.m. ?
? ?
? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

The ? is the mailx command mode prompt. Mailx is asking for
input.

A list of commands available can be shown by entering a ?.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? ? ? ?
? mailx commands ?
? type [msglist] print messages ?
? next goto and type next message ?
? edit [msglist] edit messages ?
? from [msglist] give header lines of messages ?
? delete [msglist] delete messages ?
? undelete [msglist] restore deleted messages ?
? save [msglist] file append messages to file ?
? reply [message] reply to message, including all recipients ?
? Reply [msglist] reply to the authors of the messages ?
? preserve [msglist] preserve messages in mailbox ?
? mail user mail to specific user ?
? quit quit, preserving unread messages ?
? xit quit, preserving all messages ?
? header print page of active message headers ?
? ! shell escape ?
? cd [directory] chdir to directory or home if none given ?
? list list all commands (no explanations) ?
? top [msglist] print top 5 lines of messages ?
? z [-] display next [last] page of 10 headers ?
? ?
? [msglist] is optional and specifies messages by number, author, ?
? or type. ?
? The default is the current message. ?
? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

This is a partial list of mailx commands available to you. We
will not discuss all of them. If you are interested in the other
features, you can use the on-line manual pages to find out how to
use them.
5.6 Talk Utility

Talk is a visual communication program which copies lines from
one terminal to that of another user. This is similar to the
phone utility on VMS. Once communication is established between
two users, they can both type simultaneously with their output
appearing in separate windows.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? Command Format: talk <user1> [ttyname] ?
? ?
? user1 - If you are talking to someone on the same machine, ?
? then this is just the person's username. If ?
? you want to talk to a user on another host, then ?
? user1 is of the form: ?
? ?
? host!user or ?
? host.user or ?
? host:user or ?
? user@host ?
? ?
? user@host being preferred ?
? ?
? ttyname - If the person you want to talk to is logged on ?
? more than once, you can use the ttyname argument ?
? to indicate the terminal name. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

For illustration, let's assume we want to talk with the user
student on the same machine. The command is:

Example originator:

.................................................................
. $talk student .
.................................................................

Example recipient:

.................................................................
. Message from Talk_Daemon@domax1 at 17:36 ... .
. talk: connection requested by teacher@domax1. .
. talk: respond with: talk teacher@domax1 .
.................................................................
When the recipient has typed in talk teacher@domax1, the
following message will appear on the originators screen:

Sample Session originator:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Connection established. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The screen will be divided in half by a row of dash characters.
The originator will type a message on the top half, and the same
message will appear on the lower half of the screen on the
recipient's screen.

Likewise, everything the recipient types on the top of his screen
the same message will appear on the bottom of the originators
screen. Once this communication is established, the parties may
type simultaneously with their output appearing in different
windows. While in talk, Ctrl-L will cause the screen to be
reprinted, and the erase and kill characters work as you would
expect.

Sample Session originator:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Hi Snoopy, ?
? Charlie Brown suggests we meet at noon today. ?
? ?
? ?
? ?
? ?
? ?
? ?
?-------------------------------------------------------------- ?
? OK, but the billiard championship is in my house at 1 P.M. ?
? ?
? ?
? ?
? ?
? ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Sample session recipient:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? OK, but the billiard championship is in my house at 1 P.M. ?
? ?
? ?
? ?
? ?
? ?
? ?
? ?
?-------------------------------------------------------------- ?
? Hi Snoopy, ?
? Charlie Brown suggests we meet at noon today. ?
? ?
? ?
? ?
? ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

When the communication is finished, the interrupt character will
cause the talk utility to exit.

Example:

.................................................................
. [Connection closing. Exiting] .
.................................................................
5.7 Talk Permission Denied

If you don't wish to have your work interrupted by a request to
establish a talk connection, you can deny messages.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: mesg [-[n][y]] ?
? ?
? n - no, forbids messages via write by revoking non-user ?
? write permission on the user's terminal. ?
? ?
? y - yes, reinstates permission ?
? ?
? ?
? mesg with no arguments will report the current state ?
? without changing it. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mesg ?
? is y ?
? $mesg -n ?
? $mesg ?
? is n ?
? $mesg -y ?
? $mesg ?
? is y ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The default permission is enabled. Some UNIX commands, however,
disallow messages in order to prevent messy output.
5.8 Write Utility

This command will write a message to the screen of another user.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: write <user1> [ttyname] ?
? ?
? user1 - username of the user ?
? ?
? ttyname - which terminal to send (i.e. tty00) ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session originator:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $write lucy ?
? Hello Lucy, ?
? What's the latest from the Psychology Department? ?
? (interrupt character) ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session recipient:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? $ ?
? ?
? Message from teacher on domax1 (rt021d0) [ Thu Jul 19 13:43:12 ] .. ?
? Hello Lucy, ?
? What's the latest from the Psychology Department? ?
? <EOT> ?
? ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

Here's a suggestion for using write to communicate a little
easier.

When the user first 'writes' to another user, wait for the
recipient to 'write' back before starting to send. Both users
should agree on a signal to indicate to the other person that
they can reply. How about 'o' for over. The signal 'oo' could
be used for "over and out," which would mean that the
communication is finished.
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Workshop 5

This workshop will reinforce your understanding of the topics
covered in this chapter. Login to the Multimax with the username
and password given to you by the instructor. Each student is to
complete the entire workshop. Computer exercises might need to
be worked as a team.

DESK EXERCISES

1. What is the command to send an electronic mail message to
another user on the Multimax?



2. Once you have entered the mail utility what command can you
enter to get help?



3. What does the command d 5-9 accomplish?



4. What is the command to exit the mail utility and return to
the UNIX system prompt?



5. What is the mailx command mode prompt?



6. How would you create a "talk" session to user Student2 on
the host domax0?



7. What time does the billiard championship start?

Continue on the next page

8. What UNIX command will prevent interruption of your work by
someone wishing to "talk"?



9. Regarding "write", does the recipient need to be logged in?



Regarding "talk", does the recipient need to be logged in?

























Continue on the next page
COMPUTER EXERCISES

10. Login to the Multimax.



11. Send a mail message to another student in the class.



How can you find out who is logged in? (who?)



Does the recipient need to be logged in?




12. Send a mail message to username lucy. (lucy does not exist)

What happened? Why?




13. Read your mail and save one message to the current working
directory.

Delete all other mail messages.








Continue on the next page
14. Establish a talk connection with another student.



15. What UNIX command do you enter to deny permission for a talk
connection? Try it!



16. Send a message to another student using the write command.

How is this different from "talk?"



17. Logout of the Multimax and the Annex.

6. SHELL BASICS

There have been several shells written for UNIX. They have
different features and each is in use through out the world. The
BourneShell is the accepted standard for System V UNIX. Another
shell is called the Cshell, named for "C" which is the high-level
programming language. Another shell is the KornShell; it is
named after the person who developed it, David Korn. It has more
features than the BourneShell and is of special interest to
programmers.

The purpose of this chapter is to give you some idea as to the
functions available through the shells and their general
function. Details of shell programming are discussed in another
class, "UNIX Bourne Shell Programming".

UMAX makes full use of the ASCII character set. Unlike operating
system command languages like VMS or NOS, UNIX is case sensitive.
In addition, several characters have special meanings to the
shell. We have already seen that a slash (/) by itself indicates
the root directory and is used with directory, subdirectory, and
filenames to indicate an absolute or relative pathname.

Other special characters that have meaning to the shell include:

` ' $ { } || && ;

Input to a command is usually taken from your keyboard, and the
output of a command is normally displayed on your monitor screen.
Keyboard input is referred to as "standard input" or "stdin," and
screen output as "standard output" or "stdout."
6.1 Input Redirection

It is possible to instruct UNIX to get data from a file rather
than from the keyboard. This is called input redirection. To
indicate that input to a command is to come from a file rather
than the keyboard, use the input redirection character (<).

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command < input-file1 ?
? ?
? command - a command ?
? ?
? input-file1 - input file that supplies input ?
? to the command ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

A Memory Trick: The less-than symbol looks like a funnel. If
you pour liquid into the wide end, it flows
to the narrow end. The input-file "pours"
its contents into the command.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mailx phajny < report ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The file named report will be sent to the login name phajny.
Mail normally expects the input to come from standard input, the
keyboard. The input redirection symbol causes the input to mail
to come from the file called report.
6.2 Output Redirection

It is also possible to instruct UNIX to send data to a file
rather than sending it to the default monitor screen. This is
called output redirection. To indicate that the output from a
command is to go into a file rather than be displayed on the
monitor screen, use the output redirection character >.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command > output-file1 ?
? ?
? command - a command ?
? ?
? output-file1 - output file that will receive the output ?
? from the command ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The memory trick still works; only now the funnel points toward
the file that will receive the output.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -l > listing ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The output of the ls command will not be displayed on the screen,
instead it will be in the file named listing. If the file does
not exist, the shell will create it. If it already exists, it
will be overwritten.

WARNING: The shell will NOT issue a warning about overwriting
the original file.

It is possible to use the cat command to create a file and input
text into that file using output redirection. The following
example shows how this can be done.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cat > file1 ?
? This is a line of text. ?
? This is another line of text. ?
? (Ctrl-D) ?
? $cat file1 ?
? This is a line of text. ?
? This is another line of text. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
6.3 Output Redirection with Append

The following shell command will also redirect the output to a
file but instead of overwriting the existing file, it will append
the output to the end of output-file.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command >> output-file1 ?
? ?
? command - a command ?
? ?
? output-file1 - receives the output from command ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Believe it or not, the memory trick still works; only in this
case, one funnel feeds onto another. So the output is fed onto
the end of output-file. Okay, it's a little far fetched; but it
can help you remember. Try it.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -l subdir >> listing ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This will append the output of the ls command to the file listing
without destroying any existing data. If the file does not
exist, the shell will create it.

Again, it's possible to append text to the end of an existing
file using the cat command. Note the following example.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cat >> file1 ?
? This is a third line of text. ?
? This is a fourth line of text. ?
? (Ctrl-D) ?
? $cat file1 ?
? This is a line of text. ?
? This is another line of text. ?
? This is a third line of text. ?
? This is a fourth line of text. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If the file does not exist it will be created and the text added.

6.4 Input and Output Redirection

Input and output redirection can occur on the same command line.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command < input-file1 > output-file1 ?
? ?
? command - A command ?
? input-file1 - supplies input to command ?
? output-file1 - receives the output from command ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? $cat command_file ?
? p ?
? $mailx < command_file > result_file ?
? ?
? $cat result_file ?
? mailx version 3.1 Type ? for help. ?
? "/usr/mail/teacher": 1 message 1 new ?
? >N 1 teacher Mon Dec 31 10:16 57/3171 ?
? Message 1: ?
? From teacher Mon Dec 31 10:16:30 1990 ?
? Received: by domax1.UUCP (5.51/) ?
? id AA18976; Mon, 31 Dec 90 10:16:28 mst ?
? Date: Mon, 31 Dec 90 10:16:28 mst ?
? From: Teacher Account D-7130 <teacher> ?
? Message-Id: <[email protected]> ?
? To: teacher ?
? Status: R ?
? ?
? What's Happening ?
? by Pam Hajny ?
? Denver Office ?
? ?
? With IRM Training: ?
? ?
? A Reclamation-wide workshop was held in early October to discuss information ?
? resources management training. Trainers from each region and the Denver Offic?
? shared training techniques, ideas and course materials. We met one afternoon ?
? with the personnel training officers to discuss broad IRM training needs and ?
. .
. .
. .

6.5 Pipes

The output of a command can be used as the input to a second
command by using the "pipe" symbol (|) without using any
temporary files. On some terminals the pipe symbol is a vertical
bar and on others it is a broken vertical bar. Both will work
exactly the same. The following command format shows how to use
the pipe symbol:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: command1 | command2 ?
? ?
? command1 - a command ?
? ?
? command2 - a second command ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Example:

.................................................................
. $man acct | pg .
.................................................................

The output from the command man are processed by the pg command
before appearing on your screen. Normally the output from the
man command will appear on the monitor line after line until the
end is reached. In this case, the output is "piped" to the pg
command; and the screen will stop scrolling after 23 lines so you
can read them.
6.6 Wildcards

Wildcards are special characters that cause the shell to search
over a range of possible values.

? represents any one character, while

* stands for any number of characters including none.

Example:
jo?eph

This indicates that the third letter of the string "jo eph" could
be any single character. Any character could be substituted for
the ? character, including numeric and special characters.

To limit the range of possible values, enclose the possibilities
in brackets [ ].

Example:
jo[a-z]eph

This example limits the range of characters to the set lowercase
a through lowercase z. Uppercase characters, numeric, or special
characters would not make a match. Notice that only one charater
will make a match.

Using a comma as a separator between choices we can further
restrict the range.

Example:
jo[s,m,5]eph

The only set of characters that will make a match are lowercase
s, lowercase m, and the number 5. No other character will make a
match.

The string jos* causes the shell to look for every string that
begins with the letters "jos," regardless of their length while
[i-k]*h finds every string that begins with "i", "j", or "k" and
ends with an "h".






Wildcards are extremely useful in wide variety of applications.
For example, if you want to use the man pages, but do not know
the exact command names on the subject of system accounting, try

Sample Session:

.................................................................
. $man acc* .
.................................................................

All of the commands that begin with the letters acc followed by
any string (including none) will be passed to the man command as
arguments.

If you wanted to get a listing of all the files in your current
working directory that ended in .c (these are the C source code
programs). You could enter the following command:

Sample Session:

.................................................................
. $ls *.c .
.................................................................
In order for the shell to stop interpretation of a special
character (i.e., use it as a normal character), it must be
preceded by a backslash (\) or enclosed in single quotes.

Example:
jo\?eph
or
'jo?eph'

Both of these examples represent the string jo?eph. The shell
will not interpret the question mark character as a wildcard
metacharacter.

6.7 Reestablishing a Background Job

Processes in UNIX can run in the foreground or the background.
Foreground processes are interactive; the input is read from the
keyboard or standard in, and the out goes to the monitor screen
or standard out. Background jobs run with no interaction with an
interactive terminal. Your current interactive process can be
suspended by typing the break character at the shell prompt.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ <break> ?
? annex: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The jobs command displays information on all current jobs
(sessions). The most recent job is marked with a plus sign (+),
and the next previous is marked with a dash or minus sign (-). A
job begins when you execute a command to connect to a host (or
another Annex). A job ends when you logout from the host or
terminate the job at the Annex with the kill or hangup command.

The number of possible jobs allowed per user is determined by the
network administrator. The number of jobs can range from 1 to 16
with a default of 3.
The Annex command to display the information about the current
job(s) is:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: jobs ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If there are no jobs, the annex: prompt will be displayed. If
there are some 'suspended' jobs the following will appear:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? annex: jobs ?
? +1 rlogin domax1 ?
? -2 rlogin domax1 ?
? annex: ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This shows that there are two jobs in suspension. Both of these
sessions did a remote login to domax1. This is just for
illustration.
The fg (foreground) command returns to a suspended job. The
command displays the job number and the Annex command that
created it. When no arguments are provided, fg will return to
the most recent job. With a numeric argument, fg returns the
specified job.

To connect with a suspended job (session) enter the following
Annex command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: fg [n] ?
? ?
? (none) - most recent job (+) to foreground ?
? n - job "n" to foreground ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? annex: jobs ?
? +1 rlogin domax1 ?
? -2 rlogin domax1 ?
? annex:fg 1 ?
? 1 rlogin domax1 ?
? (Ret) ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Workshop 6

This workshop will reinforce your understanding of the topics
covered in this chapter. Login to the Multimax with the username
and password given to you by the instructor. Each student is to
complete the entire workshop. Computer exercises might need to
be worked as a team.

DESK EXERCISES

1. What is the meaning of the term "case sensitive?"



2. What is a wildcard?



3. How does the shell interpret the following wildcards?

a. ?

b. [0-9]

c. *


4. How does the shell interpret the following strings?

a. M[i,r]*

b. b?ll

c. me??[1,2]

d. '*special*'

e. anyone\?


Continue on the next page
5. What is "standard input?"




6. What symbol causes a command to take its input from a file?




7. What is "standard output?"



8. What symbol causes the output of a command to be redirected
to a file?




9. What symbol causes the output of a command to be redirected
to the input of another command?




10. What symbol is used to indicate input is to be from a file
instead of the keyboard?




11. How can the output from a command be saved in an ordinary
file?



Continue on the next page
12. What is a pipe? No, it's not something you smoke.



COMPUTER EXERCISES

13. Login to the Multimax



14. How many different on-line manual entries are displayed by
executing the command man ca*?




15. Execute man ls | pg. What is the purpose of the |
character?



16. Save the on-line manual pages on the cat command in a file
called mp0. (hint: output redirection)



17. Save the on-line manual pages on the assist command in a
file called mp1. (no hint this time)



18. Type cp mp0 man

Does file mp0 still exist after this command is executed?

Why?


Continue on the next page
19. Type mv mp1 assist

Does file mp1 still exist after this command is executed?

Why?



20. Type cp mp3 man

What error message do you get?



21. Logout of the Multimax and the Annex.
7. UMAX FILE TRANSFER PROTOCOL (FTP)

File Transfer Protocol (FTP) is a utility which can transfer
files to and from TCP/IP networked computers. TCP/IP stands for
Transmission Control Protocol/Internet Protocol and consists of a
suite of defacto standard protocols for networking computers.
FTP is one protocol in that suite. (Other significant protocols
within TCP/IP are TELNET, Simple Mail Transfer Protocol (SMTP),
and Network File Systems (NFS).) The Client portion of UNIX FTP
lets users on the Multimax access file systems on a remote
computer. The Server portion of UNIX FTP lets users on remote
computers access Multimax files. For Reclamation, these remote
computers would be VAXes, CYBERs, IBMs, and Sun workstations.

Using FTP, you can access directories and files on a remote
computer and perform common operations, such as list and change
working directories, transfer files, create directories, delete
working directories, delete files and directories, and rename
files and directories. Once you have entered the FTP utility,
you make a connection to the desired remote computer and then
work with the remote computer's files using FTP commands. The
connection to the remote computer's FTP remains in effect until
terminated by the user. Multimax FTP supports both local help
for FTP commands and remote help, which displays FTP elements
available on the remote computer.

Throughout this chapter, the term "local computer" will refer to
the Multimax. The term "remote computer" will refer to the CYBER
mainframe or the VAX minicomputer. Please be aware that these
procedures will work for any computer connected to the Ethernet
that has an FTP server installed. The messages that appear may
be different, but the process will be the same.
7.1 Initializing FTP on UMAX

FTP can be invoked on the Multimax using the following syntax:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: ftp [options] [host] ?
? ?
? options - see man pages for a complete list ?
? ?
? host - the name of the remote computer ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

NOTE: UNIX is case sensitive. The commands and options must
be entered as shown.
7.2 Establishing Connection with the Remote Computer

There are two ways to make a connection with the remote computer.

7.2.1 Calling FTP with no hostname

The first way is to invoke FTP using no options, simply enter the
ftp command at the shell prompt. UMAX will respond with the ftp
prompt: ftp>

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ftp ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

FTP commands can now be entered. The utility has its own set of
commands, and we will discuss about 12 of them in this chapter.
A complete list of the FTP commands can be obtained by entering
help at the FTP prompt.

The command to establish a connection with remote computer is:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: open <host> [port] ?
? ?
? host - hostname, this host must have an FTP server. ?
? ?
? port - port number (optional) ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This command will establish a connection to the remote computer's
FTP server. The hostname for the VAX is ERC830. The following
FTP command will establish a connection with the VAX (ERC830):

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>open erc830 ?
? Connected to erc830. ?
? 220 erc830 Wollongong FTP Server (Version 5.0) at Mon Dec 4 ?
? Name (ERC830:rharding): ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
The cursor will stop after the colon. FTP is waiting for you to
enter the login name to use when signing on to the remote
computer. FTP tries to help you out by giving you a default
login name. In the above example, the default login name is
rharding. To select the default name, press (Ret). You can
enter any login name you want and then press (Ret). After you
have selected the login name, either by choosing the default or
entering a new name, you will be asked for the password.

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? 331 Password required for rharding. ?
? Password: ?
? 230 User logged in, default directory D_1131:[RHARDING] ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Enter the password required for the login name that you
specified. Echoing is disabled and the password you enter will
not be displayed on the screen. If you entered the correct
password, message number 230 will show you are logged in and the
default directory on the remote system. You are now logged into
the remote computer system and can proceed to transfer files.

CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ftp ?
? ftp>open cy2 ?
? Connected to cy2. ?
? 220 SERVICE READY FOR NEW USER. ?
? Name (cy2:rharding): class8 ?
? 331 USER NAME OKAY, NEED PASSWORD. ?
? Password: secret ?
? 230 USER LOGGED IN, PROCEED. ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This example for the CYBER is similar to the VAX example. Notice
that there a few differences. The login name was changed from
rharding and the username class8 was entered instead.
7.2.2 Calling FTP with a hostname

The second method of signing on to the remote computer is to
specify the name of the remote computer on the call to ftp.

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ftp erc830 ?
? 220 erc830 Wollongong FTP Server (Version 5.0) at Fri Dec ?
? Name (ERC830:rharding): ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
You can now enter the username for the remote system, and you
will then be prompted for the password. The effect of specifying
the hostname on the ftp command line is to do an "automatic" open
command.

NOTE: The messages are slightly different from the VAX login.
The login for the CYBER works in a similar manner.
7.3 Local Computer Commands

From the FTP prompt, you can issue commands to the local computer
to display files or show the contents of a directory. The
commands you enter are FTP commands; and although they might
resemble UNIX commands, they are NOT UNIX commands.

The FTP command to transfer file(s) from the remote computer to
the local computer is as follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: get <remote-file> [local-file] ?
? ?
? remote-file - the filename on the remote computer ?
? ?
? local-file - the filename on the local computer ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This FTP command will retrieve the remote-file and store it on
the Multimax. If the local-file name is not specified, the name
of the file on the Multimax will be the same as it was on the
remote computer. The current settings for type, form, mode, and
structure will be used during the file transfer.

VAX Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>get overview.dat ?
? 200 PORT Command OK. ?
? 125 File transfer started correctly ?
? 226 File transfer completed ok ?
? local: overview.dat remote: overview.dat ?
? 884 bytes received in 0.04 seconds (22 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Messages 200, 125, and 226 let you know that the file transferred
properly. The next line shows the local-filename, in this case
we didn't specify the local-filename, so the remote-filename and
the local-filename are the same. The next line shows the number
of bytes transferred and the amount of time it took to transfer
the file.
CYBER Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>get prolog8 ?
? 220 COMMAND OKAY. ?
? 150 FILE STATUS OKAY; ABOUT TO OPEN DATA CONNECTION. ?
? 226 CLOSING DATA CONNECTION. ?
? local: prolog8 remote: prolog8 ?
? 41 bytes received in 0.8 seconds (0.05 Kbytes/s) ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
7.3.1 Changing the Local Directory

The directory on the local computer can be changed to any
directory you desire. This is called the working directory.
This is the directory where files that are transferred from the
remote computer will be stored.

The syntax of the command to change local working directory is as
follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: lcd [dirname] ?
? ?
? dirname - the name of the new local working directory ?
? ?
? if directory is omitted, the home directory is assumed ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ftp>lcd /user0/student0 ?
? Local directory now /user0/student0 ?
? ftp> ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Absolute or relative pathnames can be specified for directory.
7.3.2 Listing the Contents

Any UNIX command can be entered from the FTP utility. You must
preface the command with the FTP command that invokes the
interactive shell.

The syntax to invoke the interactive shell is as follows:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: ! [command [arguments]] ?
? ?
? command - any valid UNIX command, if omitted the ?
? interactive shell is invoked ?
? ?
? arguments - if supplied are arguments to the UNIX command ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If arguments are provided, the first argument is considered to be
the UNIX command and the remaining arguments are considered to be
arguments to that command.

Example:

.................................................................
. ftp>!ls -la .
.................................................................

This command will display the contents of the local working
directory. The l option specifies the 'long' listing, and the a
option requests all files including the initialization files.
7.4 Remote Computer Commands

From the FTP prompt, you can issue commands to the remote
computer to display files or show the contents of the remote
directory. Recall that the commands you enter are FTP commands;
and although they look like UNIX commands, they are not.

Transferring file(s) from the Multimax to the remote computer is
accomplished with the following command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ?
? Command Format: put <local-file> [remote-file] ?
? ?
? local-file - the filename on the local computer ?
? ?
? remote-file - the filename on the remote computer ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This FTP command will retrieve the local-file, transfer it to the
remote computer, and store it in the remote directory. If the
remote-file is not specified, the name of the file on the remote
computer will be the same as it was on the Multimax. The current
settings for type, form, mode, and structure will be used during
the file transfer.
252  THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Ethical Hacking / Security / Viruses / Re: Beginners Guide to understanding Unix on: October 15, 2006, 12:15:41 PM
Continue on the next page
7. What is the name of the tree-like structure under which all
data is stored?



8. What is the name of the highest level directory?



9. What symbol represents the highest level directory?



10. What is the general syntax of a UNIX command?



11. What is the most common form for listing options on a
command line?



12. What character would you use to erase a character on the
command line?



13. What character terminates the execution of a command?



14. What is the default BourneShell prompt?



15. How can you control the flow of output to your monitor
screen?

1. What annex command is entered to make a connection to the
Multimax?



2. What is the UNIX command to change the password?




3. How long is your password valid?




4. How long do you have to wait before changing your password
again? Why?



5. What UNIX command is used to logout of the Multimax?




6. What is the command to logout of the annex?



COMPUTER EXERCISES

7. Login to the Multimax

a. What did you notice when you entered the password?



b. Can you see the password as you enter it?



c. What happens if you make a mistake while entering the
password?



8. What do you see once you have logged in? Write it here.





9. Enter the command which displays the man pages for the man
command. (Don't forget to control output to the screen.)

The first section is titled "NAME," what are the titles of
the other sections?





10. What are the options for the man command?




11. Enter the command to find out who (hint) is logged into the
system.



12. What command will give you more information about the
current users? Try it.


13. Logout of the Multimax and the Annex.

2. FILES

In UNIX, all data is organized in files. An ordinary file is a
memo, source code program or shell script. A shell script or
program source code can be viewed or edited from your terminal.
Other files contain binary data, like programs for the kernel;
these files cannot be viewed or edited on the terminal.

Peripheral devices such as disks, tape drives, printers, and
terminals are also assigned file names. Device files are
considered to be special files. They have 'special'
characteristics. Although input and output can be redirected to
and from a special file, do not attempt to display the contents
of a special file on your terminal.
3.1 File Access Modes

File access modes are the protections that can be assigned to
files. This protection can protect your files from unauthorized
reading or writing. You can even protect your files from
yourself (you can prevent accidental deletion).

There are three access modes for files:

r (read) read, examine, copy data in a file

w (write) modify, delete a file

x (execute) use the file as a command

Users with access to a file fall into one of three groups:

u (user) the file's owner

g (group) users in the same group

o (other) everybody else

The first output field of the ls -l command is a ten character
field. Characters two through ten describe the file access
modes. A typical access mode listing looks like:

rwxr-xr-x

Of the nine columns, the first three describe modes for the
file's owner, the next three for his group, and the last three
for everyone else. Within each group of three, the first column
describes read access mode, the second write, and the third
execute. A letter in a column indicates access granted, a dash
(-) indicates access denied.

Using the previous example, the user has r (read), w (write), and
x (execute) permissions. Members of the user's logical group can
read ? or execute (x). Everyone else has read ? and execute
(x) permissions, too. The effect of these permissions is that
the file's owner is the only one who can modify the file; but
everyone can examine, copy, or execute the file.
To change access modes on a file or directory, use the chmod
command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: chmod <access> <file1[filen]> ?
? ?
? access - access permissions ?
? file1[filen] - one or more files to change permissions ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Access can be expressed in either of two forms:

- with letters: [ugo] [+-=] [rwx]

- with numbers: [0-7] [0-7] [0-7]

Let's look at the method of changing the file permissions with
letters. The letters u, g, and o represent user, group, and
others, respectively. The + (plus) sign means to add the
permission and the - (minus) sign means to remove the permission.
The = (equal) sign means to set the permissions as shown. Of
course, r,w, and x are read, write, and execute.

If, for illustration purposes, we created a file named file1 that
had the following permissions:

rw-rwxrwx

and you want to give yourself (user) execute permission and take
away others' (others' here means group and everyone else) write
permissions.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $chmod u+x,g-w,o-w file1 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Now if we use the ls -la command, and look at the file
permissions for file1, they will look like this:

rwxr-xr-x
If you want to set several protections at once use the equal
sign. The following example will set the permissions for the
user to read and execute.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $chmod u=rx file1 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The second method of changing the permissions is to use the octal
digits (0-7). The octal digits 0 through 7 are represented in
binary in the following manner.

Octal Binary Corresponds to permissions

0 000 ---
1 001 --x
2 010 -w-
3 011 -wx
4 100 r--
5 101 r-x
6 110 rw-
7 111 rwx

Notice that every time a one digit (1) occurs in the binary
number the corresponding permissions are also set. Every time a
zero (0) occurs, the corresponding permission is denied. So to
change the file permissions in the previous example, this is the
command to enter:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $chmod 755 file1 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The first octal digit assigns user permissions of read, write and
execute. The second digit assigns the group permission to read
and execute. The last digit sets the others permission to read
and execute too.
3.2 Listing Contents of Directories

The ls command is used to display file names and their
characteristics. Since file names are stored in directories, ls
actually reads directory files. Executing ls with no flags or
arguments simply lists the names of the files that exist in your
current working directory. The initialization files will not be
listed.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? Command Format: ls [options] [dir1[dirn]] ?
? ?
? options - see man pages for a complete list ?
? ?
? dir1[dirn] - one or more directory names ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

The -a flag will cause the hidden (initialization) and all other
filenames to be displayed.

The -C flag causes the output to be changed from single-column to
multi-column display.

The -F flag adds a character to the end of each displayed
filename:

/ indicates a directory
* indicates the file is executable.
blank indicates a plain or ordinary file

The -l flag causes detailed information to be printed for files
in the directory. This information includes:

file type (directory, block special, character special,
fifo special, symbolic link, or ordinary file)
access modes
number of links
ownership
group affiliation
size in bytes
date and time of last modification
filename
Without a filename argument, ls displays information about the
current working directory. The output is automatically sorted
alphabetically by default.

Example:

.................................................................
. $ls .
.................................................................

The following example provides a long listing of the current
working directory.

Example:

.................................................................
. $ls -l .
.................................................................

This example shows the ls command with no arguments so it uses
the default, the current working directory. The argument could
be a relative or absolute directory name.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -la ?
? total 975 ?
? drwxrwxr-x 4 teacher class 2048 Jul 16 17.56 . ?
? drwxr-xr-x 60 root 1536 Jul 13 14:18 .. ?
? -rwx------ 1 teacher class 4210 May 1 08:27 .profile ?
? -rwxr-xr-x 1 teacher class 1948 May 12 13:42 memo ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

3.3 File Classifications

The file command will classify files according to their contents.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: file [options] <file1[filen]> ?
? ?
? file1[filen] - one or more filenames to analyze ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

A few of the classifications that the file command displays are
shown below. The results of using the file command are not
always correct.

English text
ascii text
c program text
cannot stat
commands text
data
directory
empty
executable

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $file speople ?
? speople: commands text ?
? $file test ?
? test: directory ?
? $file mail ?
? mail: data ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

By convention, files beginning with a dot (.) are called
initialization files or 'hidden files'. These files describe
your environment to the shell. They are sometimes called 'dot
files'.

By convention, files that end with:

.c are C source code programs
.f are Fortran source code programs
.o are object programs
.a are archive files
3.4 Displaying Files

The cat command displays the contents of a file. The command cat
is an abbreviation for catenate. This command will read each file
in sequence and write it to the monitor screen.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: cat [options] [file1[filen]] ?
? ?
? options - see man pages for a complete list ?
? ?
? file1[filen] - one or more file names ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If no filename is given, or the argument - is encountered, cat
reads from standard input.

Sample session:

.................................................................
. $cat .
.................................................................

This is the simpliest example but not very exciting. The cat
command will get its input from the keyboard. Everything that is
typed will be displayed on the monitor.

If an argument is given to the cat command that file will be
displayed on the monitor.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cat main.c ?
? main () ?
? { ?
? printf ("hello from main!\n\n"); ?
? printf ("calling function1!\n\n"); ?
? funct1(); ?
? printf ("back from function1!\n\n"); ?
? printf ("calling function2!\n\n"); ?
? funct2(); ?
? printf ("that's it!\n\n"); ?
? } ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Several files can be displayed on the monitor one after the other
by separating the filenames with a space.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cat main.c main.f ?
? main () ?
? { ?
? printf ("hello from main!\n\n"); ?
? printf ("calling function1!\n\n"); ?
? funct1(); ?
? printf ("back from function1!\n\n"); ?
? printf ("calling function2!\n\n"); ?
? funct2(); ?
? printf ("that's it!\n\n"); ?
? } ?
? program calling ?
? write(6,100) ?
? 100 format('Hello from main!',/) ?
? write(6,110) ?
? 110 format(' Calling subroutine1!',/) ?
? call sub1 ?
? write(6,120) ?
? 120 format(t15' Back from subroutine1!',/) ?
? write(6,130) ?
? 130 format(' Calling subroutine2!',/) ?
? call sub2 ?
? write(6,140) ?
? 140 format(t15' Back from subroutine2!',/) ?
? write(6,150) ?
? 150 format(' Thats all, folks!') ?
? end ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If the file contains more lines than can be displayed on the
screen the display will continue to scroll until the last line
has been displayed then the prompt will be redisplayed. This can
be a problem if you intend to read the text. Be prepared to stop
the screen so it can be read.
The pg command displays the contents of a file one screen at a
time. It allows the user to perform string searches and to
scroll backwards.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: pg [options] [file1[filen]] ?
? ?
? options - see man pages for a complete list ?
? ?
? file1[filen] - one or more files to paginate ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? ?
? $pg memo ?
? What's Happening ?
? by Pam Hajny ?
? Denver Office ?
? ?
? With IRM Training: ?
? ?
. A Reclamation-wide workshop was held in early October to .
. .
. .

? three groups; CYBER, VAX, and other (PC/LAN, scientific, ?
? : ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh

Twenty three lines of the file will appear and the : (colon)
prompt will appear on the last line. To have the next twenty
three line of the file appear, simply press (Ret). If you don't
want to see anymore of the file, enter a q (for quit) and the
shell prompt will be redisplayed.
The following UNIX command is useful for viewing the end of a
file without having to display the entire file.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: tail [options] [file1] ?
? ?
? options - see man pages for a complete list ?
? ?
? file1 - the file to display, if none is given use ?
? standard input ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The tail command displays the last 10 lines of file by default.
The tail command accepts a -N flag to display the last N lines.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
? $tail memo ?
? data communication between the ASC IBM and other Reclamation computers. ?
? Asynchronous communication can be accomplished with the same terminals ?
? we use for other computer tasks, over the same lines and through the MICOM ?
? port selectors. Currently, host-to-host communications is accomplished ?
? over a line between the IBM and the CYBERs. The software that supports ?
? this communication is called NJEF. Although the capability has been there ?
? for some time, we have recently been working with ASC personnel to ?
? improve its reliability and accessibility. For CYBER users, there is ?
? an NJEF Users' Guide available which can be requested through the Hotline ?
? (303) 236-4567. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh
3.5 Removing Files

The rm command will remove the entries for one or more files from
a directory. If an entry was the last link to the file, the file
will be destroyed. Removal of a file requires write permission
to the directory itself, but neither read nor write permission to
the file itself. The format for the rm command is:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? Command Format: rm [options] <file1[filen]> ?
? ?
? options - see man pages for a complete list ?
? ?
? file1[filen] - one or more files to remove ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls ?
? memo ?
? tdata ?
? subdir ?
? $rm memo ?
? $ls ?
? tdata ?
? subdir ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The file memo has been deleted from the current working
directory.
Multiple files can be deleted by separating the filenames with a
space.

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls ?
? memo ?
? tdata ?
? subdir ?
? $rm memo tdata ?
? $ls ?
? subdir ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
3.6 Printing Files

The lp command routes a file to a printer.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: lp [-d<dest>] [-n<number>] [file1[filen]] ?
? ?
? dest - destination (default set by administrator) ?
? ?
? number - number of copies (default is 1) ?
? ?
? file1[filen] - one or more files to be printed ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If no file name is mentioned the standard input is assumed. The
filename dash (-) stands for standard input and may be supplied
in conjunction with named files. The order in which the
filenames appear is the order in which they will be printed.

The printers in Denver have the following destination names:

Mannesman 910 laser printer - mtlzr

Mannesman 600 line printer - mt_600 (Denver default)

If no specific printer is given the default printer will be
selected. The following example will print one copy (default) of
the file called test_285 to the line printer (default).

Sample session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lp test_285 ?
? request id is mt_600-1271 (1 file) ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

It is possible to specify the printer as shown in the following
example. In this case, we specified the default printer.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lp -dmt_600 test_286 ?
? request id is mt_600-1272 (1 file) ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??



To print two copies of a file called test_287 on the laser
printer in Building 53 in Denver, enter the following command:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lp -dmtlzr -n2 test_287 ?
? request id is mtlzr-1273 (1 file) ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
3.7 Print Status

The lpstat command will print information about the current
status of the printer system.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: lpstat [options] ?
? ?
? options - see man pages for a complete list ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If no options are given, the lpstat command will print the status
of all requests made to lp by the user.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lpstat ?
? mtlzr-1274 teacher 22560 Jul 16 09:05 on mtlzr ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The first field is the remote id of the print job. The username
is next and the size (in bytes) of the print file. The date and
time are next and finally the name of the printer.

One of the options available is -t. This option will print all
of the printer status information.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lpstat -t ?
? scheduler is running ?
? system default destination: mt_600 ?
? device for mt_600: /dev/rlp000 ?
? device for mtlzr: /dev/rt0002 ?
? mt_600 accepting requests since Sep 19 16:09 ?
? mtlzr accepting requests since Sep 19 16:43 ?
? printer mt_600 is idle. enabled since Jul 3 16:52 ?
? printer mtlzr is idle. enabled since Jul 3 16:51 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This is an example of the kinds of information available from the
lpstat command.
3.8 Canceling Print Jobs

The cancel command will cancel printer requests made by the lp
command. The command line arguments can be either request id's
(these are returned by the lp command) or the printer name. If
you specify the request id, the cancel command will stop the job
even if it is currently printing. If you specify the printer
name, the job currently being printed will be canceled. In
either case, the cancellation of a request that is currently
printing will free the printer to print the next request.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: cancel <[ids] [printer]> ?
? ?
? ids - request ids (returned by lp command) ?
? ?
? printer - printer name ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $lp -dmt_600 contest ?
? request id is mt_600-1280 (1 file) ?
? $cancel mt_600-1280 ?
? request "mt_600-1280" canceled ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
3.9 Copying Files

A user may make a copy of a file if he has read access to that
file. The cp command can be used to copy the contents of one
file to another.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: cp <file1[filen]> <target> ?
? ?
? file1[filen] - one or more source files ?
? ?
? target - file or dirname ?
? ?
? file1 and target cannot be the same and ?
? if the target is a file its' contents are ?
? destroyed. ?
? ?
? If target is a directory, then the contents ?
? of the source file(s) is copied to that ?
? directory. ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cp contest memo ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This will cause a copy of the file contest to be made into a file
named memo. If memo doesn't exist, it will be created. If it
already exists, it will be written over. The cp command is
nondestructive; that means that the source file will remain
intact.

The cp command can also be used to copy several files into
another directory.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cp file1 file2 /user0/teacher ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

A copy of file1 and file2 has been sent to the directory (in this
case, the target directory) /user0/teacher. The user of cp will
own the newly copied files.
3.10 Moving Files

A user may move a file only if he has write access to that file.
The mv (move) command can be used to rename one file.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: mv <file1[filen]> <target> ?
? ?
? file1[filen] - one or more source files ?
? ?
? target - file or dirname ?
? ?
? file1 and target cannot be the same and ?
? if the target is a file its' contents are ?
? destroyed. ?
? ?
? If target is a directory, then the contents ?
? of the source file(s) are moved to that ?
? directory. ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mv contest memo ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This will have the effect of changing the name of the file
contest into memo. The permissions on the file will remain the
same. The move command is destructive. That means the source
file no longer exists.

The mv command can also be use to move files from one directory
to another.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mv file1 file2 /user0/teacher ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The files, file1 and file2, have been sent to the directory
/user0/teacher. They have been "moved" and no longer reside in
the current directory. The owner remains the same when a file is
moved.
Workshop 3

This workshop will reinforce your understanding of the topics
presented in this chapter. Login to the Multimax using the
username and password given to you by the instructor. Each
student should complete the entire workshop. You might need to
work in a team on the computer exercises.

DESK EXERCISES

1. List four types of files.




2. What does the file command do?




3. The ls command will display the contents of the current
working directory. What does the -F option do?



4. What command is used to display the contents of an ordinary
file?



5. What command would you use to append one file to the end of
another?



6. What is the lp command?



Continue on the next page
7. How can you find out the status of your print job?



8. What command would you enter to cancel a print job called
mt_600-1131?



9. What command will copy the contents of one file to another?



10. What does mv do?



11. What do the following file protections indicate?

rwx------


rwxr-xr-x


---------

rwxr--r--








Continue on the next page
COMPUTER EXERCISES

12. Log into the Multimax.



13. Execute the file command on the files listed below. Record
the output in the space provided.

a. .profile


b. /bin/vax


c. /dev/console



14. Which of the above files is readable?




15. Enter the command to display the contents of the current
working directory. Hint: ls

a. How many files are listed?


b. Type ls -a


c. How many entries are listed?



Continue on the next page
d. Which entries were not listed in your original output
of ls?





16. How does the output of ls -a and ls -Ac differ?
Try it.




17. How many fields are displayed for each entry when you
execute ls -l? What are the fields?



18. What are the current permissions on .profile?



19. Change permissions on .profile so that no one (including
you) has any access to the file.
(Hint: Use the chmod command)



20. Without changing the permissions, list the contents of the
file named .profile to the screen.
What happened? Why?







Continue on the next page
21. Change the permissions on .profile to

u - read, write, execute
g - read
o - read



22. Type cat .profile. What happened? Do you know why?




23. Enter pg memo. What does this command do?





24. Send one copy of the file called memo to the laser printer.




25. Logout of the Multimax and the Annex.
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
4. DIRECTORIES

A directory is a file whose sole job is to store file names and
related information. All files, whether ordinary, special, or
directory, are contained in directories.

The directory in which you find yourself when you first login is
called your home directory. You will be doing much of your work
in your home directory and subdirectories that you'll be creating
to organize your files.


4.1 Absolute/Relative Pathnames

As we saw earlier, directories are arranged in a hierarchy with
root (/) at the top. The position of any file within the
hierarchy is described by its pathname. Elements of a pathname
are separated by a /. A pathname is absolute if it is described
in relation to root, so absolute pathnames always begin with a /.
These are some example of absolute filenames.

/etc/passwd
/users/sjones/chem/notes
/dev/rdsk/Os3

A pathname can also be relative to your current working
directory. Relative pathnames never begin with /. Relative to
user sjones' home directory, some pathnames might look like this:

chem/notes
personal/res

To determine where you are within the filesystem hierarchy at any
time, enter the command to print the current working directory.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: pwd ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $pwd ?
? /user0/teacher ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Notice that this is an absolute pathname. This is the pathname
of the current working directory.
4.2 Creating Directories

Directories are created by the following command:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: mkdir [options] <dirname> ?
? ?
? options - see man pages for a complete list ?
? ?
? dirname - name of the new directory (absolute or ?
? relative pathname). ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

If the option to change permission mode is not given, the
directory will have default permissions set to read,write,execute
for the user and read and execute for group and others. The
files . (dot) and .. (dot dot) are created automatically. In
order to create a sub-directory, you must have write permission
on the parent directory. The owner id and the group id are set
to the real users id and group id, respectively.

4.3 Removing Directories

Directories can be deleted using the rmdir command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: rmdir [options] <dirname> ?
? ?
? options - see man pages for a complete list ?
? ?
? dirname - the directory to remove, it must be empty. ?
? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $pwd ?
? /user0/teacher ?
? $ls -la ?
? total 5 ?
? drwxr-xr-x 2 teacher class 512 Jul 18 08:12 . ?
? drwxrwxr-x 5 root root 2048 Jul 1 13:14 .. ?
? $rmdir teacher ?
? rmdir:teacher:Directory does not exist ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Normally, directories are deleted using the rmdir command.
Before the directory can be removed, it must be empty; that is,
it must not contain any files. Notice that in the above example
two files are present, . (dot) and .. (dot). Remember, these
refer to the current working directory and its parent. They
cannot be removed.
Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $rmdir . ?
? rmdir: .: Can't remove current directory or .. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

For the purposes of deleting a directory, the directory is empty
if it contains only two files, namely . (dot) and .. (dot dot).
4.4 Changing Directories

To "move around" in the filesystem, use the cd (change directory)
command.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: cd [dirname] ?
? ?
? dirname - If not specified, the value of the $HOME ?
? shell variable will be used as the new ?
? current working directory. ?
? ?
? If the directory given is an absolute pathname ?
? that directory is the new current working ?
? directory. A relative pathname can also be ?
? given. ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cd /user0/teacher ?
? $pwd ?
? /user0/teacher ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The current working directory is now /user0/teacher.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $cd memos ?
? $pwd ?
? /user0/teacher/memos ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This command will look for a subdirectory called memos under the
current working directory. If it is found, it will become the
new working directory; otherwise, an error will occur.

Error messages beginning with "cannot access file..." often
indicate that the pathname is incorrect or misspelled.
4.5 Renaming Directories

The mv (move) command can also be used to rename a directory.

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? Command Format: mv <dirname> <target> ?
? ?
? dirname - name of the source directory ?
? target - target directory name ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $mv users newusers ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

This will have the effect of changing the name of the directory
users into newusers. The permissions on the directory will
remain the same.

NOTE: All files and subdirectories in the directory newusers
now have new absolute pathnames.
4.6 The directories . (dot) and .. (dot dot)

The filename . (dot) represents the current working directory;
and the filename .. (dot dot) represent the directory one level
above the current working directory, often referred to as the
parent directory. If we enter the command to show a listing of
the current working directories files and use the -a option to
list all the files and the -l option provides the long listing,
this is the result.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -la ?
? total 975 ?
? drwxrwxr-x 4 teacher class 2048 Jul 16 17.56 . ?
? drwxr-xr-x 60 root 1536 Jul 13 14:18 .. ?
? ---------- 1 teacher class 4210 May 1 08:27 .profile ?
? -rwxr-xr-x 1 teacher class 1948 May 12 13:42 memo ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The ls -la command displays access modes, number of links, the
owner, the group, size, etc. of files in a directory; but also
displays the characteristics of the current working directory and
its parent. The first entry is the entry for the current
directory. The owner is teacher and the group is class. The
second entry is the parent directory. It is one level up from
the current working directory. It is owned by the root
directory.

Instead of asking for information on all of the files in a
directory, you can request just the information on the current
working directory.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -ld ?
? drwxrwxr-x 4 teacher class 2048 Jul 16 17:56 . ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The response from the command simply shows the long information
for the current working directory . (dot).
Information can also be obtained for the parent of the current
working directory by using its name as an argument.

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ls -ld .. ?
? drwxr-xr-x 60 root root 1536 Jul 13 14:18 .. ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

Here's the long list of the current working directories parent.
(.. is the shorthand representation of the current working
directories parent)

Both of the directory names . (dot) and .. (dot dot) can be used
as arguments to commands. To change the parent of the current
working directory into the current working directory, the command
is:

Sample Session:

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $pwd ?
? /user0/teacher ?
? $cd .. ?
? $pwd ?
? /user0 ?
? $ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??

The current working directory is the former parent.

This is all very interesting but what good is it? You can
specify the current working directory or its parent without
typing the entire absolute pathname. It can also be handy when
giving arguments to UNIX commands.

Why are the pathnames sjones/chem and ./sjones/chem equivalent?
4.7 Directory Access Modes

Directory access modes are listed and organized in the same
manner as any other file. There are a few differences that need
to be mentioned.


4.7.1 Read

Access to a directory means that the user can read the contents.
The user can look at the filenames inside the directory.


4.7.2 Write

Access means that the user can add or delete files to the
contents of the directory.


4.7.3 Execute

Executing a directory doesn't really make a lot of sense so think
of this as a traverse permission. This access allows the user to
reference the directory name in a command. The reference is not
necessarily explicit, since the shell deduces the absolute
pathname of a command from the user's environment. For example,
the shell knows that the full pathname of the ls command is
/bin/ls. A user must have execute access to the bin directory in
order to execute ls.

If traverse permissions are denied, others cannot change to it or
through it. Another user can't do a cd to the protected
directory or any subdirectory beneath it.
IN CLASS QUIZ
HuhHuhHuh?
? / ?
HuhHuhHuh?
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh?
? ? ? ? ?
HuhHuhHuhHuh HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh?? HuhHuh?? HuhHuhHuh??
? bin ? ? tmp ? ? etc ? ? mnt ? ? l ? ? dev ?
HuhHuhHuhHuh HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh?? HuhHuh?? HuhHuhHuh??
?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? ? ? ?
HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh??
? Uni1 ? ? Uni2 ? ? Uni3 ? ? Uni4 ?
HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh??
{1} HuhHuhHuhHuhHuhHuhHuhHuhHuh? HuhHuhHuhHuhHuhHuh HuhHuhHuhHuhHuhHuhHuh? HuhHuhHuhHuh??
HuhHuhHuhHuh HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuhHuh? HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuh?? HuhHuhHuh?? HuhHuhHuh??
? filea ? ? fileb ? ? Dira ? ? filea ? ? Filea ? ? file1 ? ? File2 ? file3 ?{5} ? Dir1 ? ? Dir2 ?
HuhHuhHuhHuh HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuhHuh? HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuh?? HuhHuhHuh?? HuhHuhHuh??
? ? ? ? ?
HuhHuhHuhHuhHuhHuhHuhHuhHuh? ? ? HuhHuhHuhHuh?? ?
HuhHuhHuhHuh HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh??
? filea ? ? Dirb ? ? fileb ? {2} {3} ? filea ? ? Filea ? }? File1a ? ? file1b ? ? Dir2a ?
HuhHuhHuhHuh HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuhHuh? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh?? HuhHuhHuh??
? ?
Write the complete pathname for the 5. ________________________________ HuhHuhHuh?? HuhHuhHuhHuhHuh {7}
files numbered above. {4} ? filea ? HuhHuhHuh?? HuhHuhHuh??
6. ________________________________ HuhHuhHuh?? ? File2aa ? ? file2ab ?
1. _______________________________ 8. You are in /mnni1 and want #1. HuhHuhHuh?? HuhHuhHuh??
7. ________________________________
2. _______________________________ ___________________________________

3. _______________________________ Write the minimum pathname needed for 9. You are in /mnni3/File2 and want #4
each of the following:
4. _______________________________ ___________________________________
4.7.4 Typical Root Directory

HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
? $ ls -FC / ?
? ?
? ?
? Student/ bin/ lib/ stand/ u2/ user2/ ?
? ?
? Students/ bad/ lisp/ tmp/ unix* usr/ ?
? ?
? Support/ dev/ lost+found/ tmp.sh unix.bak* usr2/ ?
? ?
? etc/ mnt/ tmp1/ unix.test* usr3/ a.out* ?
? ?
? foo rel_notes tmp2/ user0/ install/ shlib/ ?
? ?
? u1/ user1/ ?
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
NOTES
HuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuhHuh??
Pages: 1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 27
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.972 seconds with 23 queries.