💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › UNIX › unix.info captured on 2022-07-17 at 01:59:54.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
*************************************** * * * * * Things To Know * * * * About Unix * * * * * * typed and uploaded * * * * By * * * * Sir Charles Hansen * * * *************************************** The Unix operating system is one of the many operateing systems that the telephone companies use along with big businesses. The information that is contained in this article came from experimentation on the Northwestern Bell computer in Omaha, Ne. The last phone number to the system was: 402-342-1239. When logging onto the Unix system you must enter the logcode and pass- word in lowercase. Most Unix system logcodes contain 3 letters (i.e. some of the working ones when I was exper- imenting on the N.B. Unix system were: rld, glc, rwd, djr, skm, rrc, chg, wgg, sgs, efo, lcs, jrp, glh, glry, stein. Note: Some logcodes have more than 3 letters.) Also, from what I can tell is that the logcodes are generated with the persons name, most of the time anyway (i.e. Ruth Dempster's log- code is:rld Gary Coe's logcode is:glc Don Romain's logcode is:djr Eino Onk- ka's logcode is:efo Note: there are some cases where this is not true like: Jeff Stein's logcode is:stein and Bob Dietrich's logcode is:rwd) Passwords are a little tricky but then again some of the people who work for the telephone co. are not that smart. An example of this is some people like useing there last name for there password or maybe there first, yet another is maybe the will use a computer related password like 'floppys' But trying to find a pass- word other than there name is a task that most people do not want to at- tempt, even me. To help us in finding the users on line and getting users logcodes we need to know a simple com- mand which is 'phone' this is a handy little command which allows you to see who is online at that particular time and also get there logcodes and bus- iness phone numbers. The following is an example of a 'phone' listing: rld Ruth Dempster NPA-XXX-XXXX glc Gary Coe NPA-XXX-XXXX rwd Bob Dietrich NPA-XXX-XXXX djr Don Romain NPA-XXX-XXXX skm Sharon Matcha NPA-XXX-XXXX chg Chuck Gray NPA-XXX-XXXX wgg Gary Giles NPA-XXX-XXXX sgs Steve Schlosser NPA-XXX-XXXX efo Eino Onkka NPA-XXX-XXXX lcs Lin Sletten NPA-XXX-XXXX jrp John Piper NPA-XXX-XXXX glh Gary Humphrey NPA-XXX-XXXX glry Al Ryerson NPA-XXX-XXXX stein Jeff Stein NPA-XXX-XXXX " " " " " " " " " " " " From the above listing we have acquired logcodes and the persons name that matches the logcode along with there business phone number. One last little note is that on the Northwestern Bell Unix system is that you can type 'mesg n' and it will keep everyone from finding out what you are doing, like the operator on duty at that particular time. I do not know if this is true on other systems though. If you would like to know more about the Unix system or hacking a system then you should read the hacking files concerning Cosmos, Data General, Vax, ect. This file is written for Blottoland, and M.B.B., it can be used on RACS III, W.O.P.R., and Crowley Manor.