💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › UXU › uxu-004.txt captured on 2022-06-12 at 14:58:59.

View Raw

More Information

-=-=-=-=-=-=-


<><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>
#%       ..uXu..                                                   1991      #%
%#                       Underground eXperts United                          %#
#%                                presents...                                #%
%#                                  -=*=-                                    %#
#%                 The European Digest Series Vol.1 Issue #4                 #%
%#        1991                  By THE CHIEF                      ..uXu..    %#
<><><><><><><><><><><><><><><><><><><>!<><><><><><><><><><><><><><><><><><><><>

       SPECIAL MANUAL ISSUE    -   SCO XENIX System V TUTORIAL CHAPTER #1

                                  Contents...

                          01.............Introduction
                          02.............Contents In Chapter One
                          03.............Xenix Tutorial Chapter One
                          04.............Recommended
                          05.............End Comments





 1. INTRODUCTION
 ---------------
 Welcome to TED Vol.1, Issue #4! - The uXu File #4.
 The SCO Xenix System V Tutorial Manual seems to be a nice start to knowing
 The Xenix operating System. As you might know, Xenix is very similar to 
 Unix (it is a bi-product of unix), and by knowing a bit about Xenix helps
 you in your knowledge for unix as well. This is The Xenix Tutorial Manual
 and is not altered, changed or revised in any way, except for personal comments
 throughout the text shown like this: (* comment *). This Xenix Manual Series
 will cover all SCO Xenix System V manuals. After the Tutorial Manual, comes
 the Xenix User's Guide. Then it's time for the Xenix System Administrator's
 Guide followed by The Xenix User's Reference. Enjoy!



 2. CONTENTS IN CHAPTER ONE
 --------------------------

                      1.0 INTRODUCTION
                          1.1.1...Introduction
                          1.1.2...About This Tutorial
                          1.1.3...Notational Conventions



 3. XENIX TUTORIAL CHAPTER ONE
 -----------------------------

1.0                             INTRODUCTION                                1.0
===============================================================================
1.1.1 Introduction                                           1.1.1 Introduction
===============================================================================

   This tutorial is an introduction to the XENIX(tm) Operating System. It is
intended for users who have little or no familiarity with Xenix or UNIX(tm).
 
   The XENIX Operating System is distributed with over two hundred commands
and programs. This tutorial does not explain how to use all of these. Instead,
the commands and programs described in this tutorial are those that you will
use most often, and those you will find most useful.
 
   The aim of this tutorial is to teach you how to do useful work on a XENIX
system as quickly as possible. To this end, it is not necessary to provide you
with complete information about each command described in this tutorial. For
complete information, refer to the appropriate sections of the "XENIX User's
Reference" and the "XENIX User's Guide", soon to be released in The European
Digest Series.

===============================================================================
1.1.2 About This Tutorial                             1.1.2 About This Tutorial
===============================================================================

   This tutorial is organized as follows:
 
      *   Chapter 1, "Introduction," presents an overview of the contents of
          the entire tutorial, and explains how to use it.

      *   Chapter 2, "Basic Concepts," explains the concepts that you need
          to understand to work effectively in the XENIX environment. The
          chapters that follow presuppose an understanding of the material
          presented in this chapter.

      *   Chapter 3, "Logging In," explains how to log in to the system,
          how to keep your account secure, how to edit the login prompt and
          how to enter XENIX commands.

      *   Chapter 4, "Working With Files And Directories," explains how to
          perform some of the basic tasks involving files and directories.
          This chapter explains how to create files and directories, how to
          move, copy, delete, and rename files and directories. The chapter
          also explains how to use various XENIX text processing utilities,
          and how to use access permissions with files and directories.

      *   Chapter 5, "Housekeeping," explains how to use the XENIX
          "housekeeping" utilities. This chapter explains how to create
          backups, how to copy diskettes, how to get information about the
          status of the system, and how to place commands in the back-
          ground. The chapter also contains a brief discussion of XENIX
          shell programming.
 
      *   Chapter 6, "XENIX Desktop Utilities," explains how to use the
          XENIX desktop utilities. This chapter explains how to use the
          automatic reminder service, how to communicate with other users
          on the system and how to use the system calculator.

   The best way to use this tutorial is to begin by reading chapter 2. This
will provide you with the background information that you need in order to
understand the material presented in subsequent chapters. You should then
read chapters 3 through 6. If you have the XENIX operating system running on
a "you-are-welcome-to-use-it" computer, have it ready for entering commands
as instructed in the examples of these chapters.

   Each section of each chapter is a self-contained unit. You do not have to
read previous sections in order to understand the material presented in any
particular section. If you only need to know how to perform a specific task,
for example, if you already know how to create text files but you do not know
how to print them, you can turn to the section of the chapter that explains
how to perform that task. In this case, you can turn to section 4.4 of chapter
4. You do not have to read sections 4.1 through 4.3 in order to understand
the material presented in section 4.4.

===============================================================================
1.1.3 Notational Conventions                       1.1.3 Notational Conventions
===============================================================================

   This tutorial uses the following notational conventions:

      *   Examples in the text are marked by single line lines. (-------)

      *   Commands that you enter are written within < >.

      *   Directories and Filenames are written within [ ].

      *   Keys to be pressed are written with BIG LETTERS. For example, the
          Return key is represented by:
 
                   RETURN

      *   Key combinations are written with a First Big Letter.
          An example is:
 
                   Ctrl-d

          When you see a key combination, you are supposed to hold down
          the first key and press the second key. In this example, you should
          hold down the Control key and press the d key.

      *   An uppercase letter in parentheses is often appended to command
          names, as in:
 
                   touch(C)

          The letter in parentheses refers to the section of the XENIX User's
          Reference that contains complete information on the command.



 4. RECOMMENDED
 --------------
 This section is included in every issue of The European Digest and will
 contain recommended stuff/boards/reading and so on. For this file,
 A couple of Hacker Books & 'Zines.

 ------------------------------------------------------------------------------
 BOOKS                                                                    BOOKS
 ------------------------------------------------------------------------------
 The Cuckoo's Egg                                      by Cliff Stoll.
 ----------------
 Cliff Stoll's Story about the German Hacker that almost made it
 and an interesting viewpoint on Security. Nice Story with a terrible end.

 The Computer Underground                              by M. Harry.
 ------------------------
 Contains a few funnies, though the book is old nowadays. Viewpoints on
 Hackers, how to hack, various networks & dialin-listings, hack-program
 listings and the general stuff. Also has a few items on pirates. Many
 Gfile-reprints.

 The Inner Circle                                      by Bill Landreth
 ----------------
 Bill Landreth on Computer Security. Ex-hacker Landreth shows the weak
 spots of your system and tells about his up and downfall. Kinda neat.

 ------------------------------------------------------------------------------
 'ZINES                                                                  'ZINES
 ------------------------------------------------------------------------------
   Phrack Inc.   - All Issues. The Best 'zine ever produced, now as 'Classic'.
   Issues Available: 00 - 33                         (Classic issues available)

   Computer Underground Digest - Covers the most in the Underground scene.
   Issues Available: 1.00 - 3.31                       (very active)

   The Syndicate Report - If you're looking for news, you'll find it here!
   Issues Available: 01 - 28                           (not active anymore)

   cDc Communications - Funniest! All Subjects covered! Nice Stories! Great!
   Issues Available: 01 - 193                          (very active)
 ------------------------------------------------------------------------------

 5. END COMMENTS
 ---------------

 Well, chapter one isn't that long, but it's a start anyways. I hope this will
 encourage you to get the rest of the series, because in the next chapter, 
 chapter two, the tutorial begins. I also want to state that the series is meant
 for the complete Xenix beginner. Those of you who have unix/xenix experience
 and knowledge already, could perhaps keep the series as a reference guide.

 The European Digest will not feature Hacking techniques, Phreaking, Carding,
 information about government systems or the basic underground rap. It will 
 be different. It IS different. Manuals, The Underground Scene, Deep Deep
 whatever, and so on. Less 'general rag stuff' and More Miscellaneous stuff.
 Swedish Hacker News will be presented through the 'uXu - Swedish News' series,
 but ONLY in Swedish. English translations will however be published in other
 well-known underground rags, as contributions.
 
 Check out the Next TED for Chapter Two in the SCO Xenix System V Tutorial.

 You can reach me on the following boards for comments, contributions,
 questions or whatever:

 Condemned Reality        [618-397-7702]
 Land Of Karrus           [215-948-2132]
 Demon Roach Underground  [806-794-4362]
 Balanced pH              [818-783-5320]
 Info Addict              [+46-###-####]


 The Chief 1991
 
 %&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&
 %                                                                          %
 &  "Congress shall make no law respecting an establishment of religion, or &
 %  prohibiting the free exercise thereof; or abridging the freedom of      %
 &  speech or of the press; or of the right of the people peaceably to      &
 %  assemble, and to petition the Government for a redress of grievances."  %
 &                                                                          &
 %  This work is released according to the above Constitutional rights      %
 &  for INFORMATIONAL PURPOSES ONLY.                                        &
 %                                                                          %
 &%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%&%

 ____________________________________________________________________________
 ____________________________________________________________________________