<><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><> #% ..uXu.. 1991 #% %# Underground eXperts United %# #% presents... #% %# -=*=- %# #% The European Digest Series Vol.1 Issue #4 #% %# 1991 By THE CHIEF ..uXu.. %# <><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><> SPECIAL MANUAL ISSUE - SCO XENIX System V TUTORIAL CHAPTER #1 Contents... 01.............Introduction 02.............Contents In Chapter One 03.............Xenix Tutorial Chapter One 04.............Recommended 05.............End Comments 1. INTRODUCTION --------------- Welcome to TED Vol.1, Issue #4! - The uXu File #4. The SCO Xenix System V Tutorial Manual seems to be a nice start to knowing The Xenix operating System. As you might know, Xenix is very similar to Unix (it is a bi-product of unix), and by knowing a bit about Xenix helps you in your knowledge for unix as well. This is The Xenix Tutorial Manual and is not altered, changed or revised in any way, except for personal comments throughout the text shown like this: (* comment *). This Xenix Manual Series will cover all SCO Xenix System V manuals. After the Tutorial Manual, comes the Xenix User's Guide. Then it's time for the Xenix System Administrator's Guide followed by The Xenix User's Reference. Enjoy! 2. CONTENTS IN CHAPTER ONE -------------------------- 1.0 INTRODUCTION 1.1.1...Introduction 1.1.2...About This Tutorial 1.1.3...Notational Conventions 3. XENIX TUTORIAL CHAPTER ONE ----------------------------- 1.0 INTRODUCTION 1.0 =============================================================================== 1.1.1 Introduction 1.1.1 Introduction =============================================================================== This tutorial is an introduction to the XENIX(tm) Operating System. It is intended for users who have little or no familiarity with Xenix or UNIX(tm). The XENIX Operating System is distributed with over two hundred commands and programs. This tutorial does not explain how to use all of these. Instead, the commands and programs described in this tutorial are those that you will use most often, and those you will find most useful. The aim of this tutorial is to teach you how to do useful work on a XENIX system as quickly as possible. To this end, it is not necessary to provide you with complete information about each command described in this tutorial. For complete information, refer to the appropriate sections of the "XENIX User's Reference" and the "XENIX User's Guide", soon to be released in The European Digest Series. =============================================================================== 1.1.2 About This Tutorial 1.1.2 About This Tutorial =============================================================================== This tutorial is organized as follows: * Chapter 1, "Introduction," presents an overview of the contents of the entire tutorial, and explains how to use it. * Chapter 2, "Basic Concepts," explains the concepts that you need to understand to work effectively in the XENIX environment. The chapters that follow presuppose an understanding of the material presented in this chapter. * Chapter 3, "Logging In," explains how to log in to the system, how to keep your account secure, how to edit the login prompt and how to enter XENIX commands. * Chapter 4, "Working With Files And Directories," explains how to perform some of the basic tasks involving files and directories. This chapter explains how to create files and directories, how to move, copy, delete, and rename files and directories. The chapter also explains how to use various XENIX text processing utilities, and how to use access permissions with files and directories. * Chapter 5, "Housekeeping," explains how to use the XENIX "housekeeping" utilities. This chapter explains how to create backups, how to copy diskettes, how to get information about the status of the system, and how to place commands in the back- ground. The chapter also contains a brief discussion of XENIX shell programming. * Chapter 6, "XENIX Desktop Utilities," explains how to use the XENIX desktop utilities. This chapter explains how to use the automatic reminder service, how to communicate with other users on the system and how to use the system calculator. The best way to use this tutorial is to begin by reading chapter 2. This will provide you with the background information that you need in order to understand the material presented in subsequent chapters. You should then read chapters 3 through 6. If you have the XENIX operating system running on a "you-are-welcome-to-use-it" computer, have it ready for entering commands as instructed in the examples of these chapters. Each section of each chapter is a self-contained unit. You do not have to read previous sections in order to understand the material presented in any particular section. If you only need to know how to perform a specific task, for example, if you already know how to create text files but you do not know how to print them, you can turn to the section of the chapter that explains how to perform that task. In this case, you can turn to section 4.4 of chapter 4. You do not have to read sections 4.1 through 4.3 in order to understand the material presented in section 4.4. =============================================================================== 1.1.3 Notational Conventions 1.1.3 Notational Conventions =============================================================================== This tutorial uses the following notational conventions: * Examples in the text are marked by single line lines. (-------) * Commands that you enter are written within < >. * Directories and Filenames are written within [ ]. * Keys to be pressed are written with BIG LETTERS. For example, the Return key is represented by: RETURN * Key combinations are written with a First Big Letter. An example is: Ctrl-d When you see a key combination, you are supposed to hold down the first key and press the second key. In this example, you should hold down the Control key and press the d key. * An uppercase letter in parentheses is often appended to command names, as in: touch(C) The letter in parentheses refers to the section of the XENIX User's Reference that contains complete information on the command. 4. RECOMMENDED -------------- This section is included in every issue of The European Digest and will contain recommended stuff/boards/reading and so on. For this file, A couple of Hacker Books & 'Zines. ------------------------------------------------------------------------------ BOOKS BOOKS ------------------------------------------------------------------------------ The Cuckoo's Egg by Cliff Stoll. ---------------- Cliff Stoll's Story about the German Hacker that almost made it and an interesting viewpoint on Security. Nice Story with a terrible end. The Computer Underground by M. Harry. ------------------------ Contains a few funnies, though the book is old nowadays. Viewpoints on Hackers, how to hack, various networks & dialin-listings, hack-program listings and the general stuff. Also has a few items on pirates. Many Gfile-reprints. The Inner Circle by Bill Landreth ---------------- Bill Landreth on Computer Security. Ex-hacker Landreth shows the weak spots of your system and tells about his up and downfall. Kinda neat. ------------------------------------------------------------------------------ 'ZINES 'ZINES ------------------------------------------------------------------------------ Phrack Inc. - All Issues. The Best 'zine ever produced, now as 'Classic'. Issues Available: 00 - 33 (Classic issues available) Computer Underground Digest - Covers the most in the Underground scene. Issues Available: 1.00 - 3.31 (very active) The Syndicate Report - If you're looking for news, you'll find it here! Issues Available: 01 - 28 (not active anymore) cDc Communications - Funniest! All Subjects covered! Nice Stories! Great! Issues Available: 01 - 193 (very active) ------------------------------------------------------------------------------ 5. END COMMENTS --------------- Well, chapter one isn't that long, but it's a start anyways. I hope this will encourage you to get the rest of the series, because in the next chapter, chapter two, the tutorial begins. I also want to state that the series is meant for the complete Xenix beginner. Those of you who have unix/xenix experience and knowledge already, could perhaps keep the series as a reference guide. The European Digest will not feature Hacking techniques, Phreaking, Carding, information about government systems or the basic underground rap. It will be different. It IS different. Manuals, The Underground Scene, Deep Deep whatever, and so on. Less 'general rag stuff' and More Miscellaneous stuff. Swedish Hacker News will be presented through the 'uXu - Swedish News' series, but ONLY in Swedish. English translations will however be published in other well-known underground rags, as contributions. Check out the Next TED for Chapter Two in the SCO Xenix System V Tutorial. You can reach me on the following boards for comments, contributions, questions or whatever: Condemned Reality [618-397-7702] Land Of Karrus [215-948-2132] Demon Roach Underground [806-794-4362] Balanced pH [818-783-5320] Info Addict [+46-###-####] The Chief 1991 %&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%& % % & "Congress shall make no law respecting an establishment of religion, or & % prohibiting the free exercise thereof; or abridging the freedom of % & speech or of the press; or of the right of the people peaceably to & % assemble, and to petition the Government for a redress of grievances." % & & % This work is released according to the above Constitutional rights % & for INFORMATIONAL PURPOSES ONLY. & % % &%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&% ____________________________________________________________________________ ____________________________________________________________________________