Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Antique Systems :: dghack.txt

Data General Hacking

**                                   **
**       Hacking III: Data           **
**                    General        **
**                                   **
Welcome to the basics of hacking III:
Data General computers.  Data General
is favored by large corporations who
need to have a lot of data on-line.
The Data General AOS, which stands for
Advanced Operating System, is a version
of bastardized UNIX.  All the commands
which were in the UNIX article, will
work on a Data General.  
Once again, we have the problem of not
knowing the format for the login name
on the Data General you want to hack.
As seems to be standard, try names from
one to 8 digits long.  Data General
designed the computer to be for busi-
nessmen, and is thus very simplistic,
and basically fool proof (but not damn
fool proof).  It follows the same login
format as the unix system:
DG=> login:
DG=> password:
YOU=> password
Passwords can be a maximum of 8
characters, and they are almost always
set to a default of 'AOS' or 'DG'.
(any you know about businessmen...)
A word about control characters:
Cntrl-O stops massive print-outs to
the screen, but leaves you in whatever
mode you were.  (A technical word on
what this actually does:  It tells the
CPU to ignore the terminal, and prints
everything out to the CPU!  This is 
about 19200 baud, and so it seems like
it just cancels.)  Cntrl-U kills the
line you are typing at the time.  Now
for the weird one:  Cntrl-C tells the
CPU to stop, and wait for another
cntrl character.  To stop a program,
you actually need to type Cntrl-C and
then a Cntrl-B.
Once you get on, type 'HELP'.  Many
DG (Data General) computers are sold
in a package deal, which also gets the
company free customizing.  So you never
know what commands there might be.  So
we will follow what is known as the
'ECLIPSE STANDARD', or what it comes 
out of the factory like.
To find out the files on the directory
you are using, type => DIR
To run a program, just like on a DEC,
just type its name.  Other than this,
and running other people's programs,
there really isn't a standard...
***  HARK, yon other system users  ***
To see who is on, type => WHO
remember?).  This shows the other
users, what they are doing, and what
paths they are connected across.  This
is handy, so try a few of those paths
yourself.  To send a message, say
=> send username
This is a one time message, just like
send on the DEC 10.  From here on, try
commands from the other previous files
and from the 'HELP' listing.
If you can get privs, just say:
=> superuser on
and you turn those privs on!
By the way, you remember that computers
keep a log of what people do?  type:
=> syslog /stop
and it no longer records anything you
do on the system, or any of the other
users.  It screams to high heaven that
it was you who turned it off, but it
keeps no track of any accounts created
or whatever else you may do.  You can
say=>  syslog /start  
to turn it back on (now why would you
want to do something like that?????)
To exit from the system, type=> BYE
and the system will hang up on you.
Most of the systems around, including
DECs, VAX's, and DG's, have games.
These are usually located in a path or
directory of the name  games or <games>
or games:  Try looking in them, and you
may find some trek games, adventure,
zork, wumpus (with bent arrows in hand)
or a multitude of others.  There may 
also be games called 'CB' or 'FORUM'.
These are a sort of computer conference
call.  Use them on weekends, and you 
can meet all sorts of interesting 
If you would like to see more articles
on hacking (this time far more than 
just the basics), or maybe articles on
networks and such, then leave us mail
if we are on the system, or have the
sysop search us down.  We call a lot
of places, and you may just find us.
This completes the series of articles
on hacking...  These articles were:
The Basics of Hacking: Introduction
The Basics of Hacking I: DEC's
The Basics of Hacking II: VAX's (UNIX)
The Basics of Hacking III: DG's
This and the previous articles by:
The Knights of Shadow

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH