亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? a novice's guide to hacking.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
字號:
This file is an addendum to "A Novice's Guide To Hacking" written by "TheMentor".  The word "hacking" is here used the way the non-hacking publicthinks it is used, to mean breaking into somebody else's computer.  Itspurpose is to expand and clarify the information about the TOPS-20 operatingsystem, which runs on DECsystem-20 mainframes.  The Mentor basically lumpedthis system in with TOPS-10 and didn't note important differences between thetwo.  I will here reproduce in full what The Mentor had to say about TOPS-10and about VMS, which are the parent and the offspring of TOPS-20.VMS-       The VAX computer is made by Digital Equipment Corporation (DEC),           and runs the VMS (Virtual Memory System) operating system.           VMS is characterized by the 'Username:' prompt.  It will not tell           you if you've entered a valid username or not, and will disconnect           you after three bad login attempts.  It also keeps track of all           failed login attempts and informs the owner of the account next time           s/he logs in how many bad login attempts were made on the account.           It is one of the most secure operating systems around from the           outside, but once you're in there are many things that you can do           to circumvent system security.  The VAX also has the best set of           help files in the world.  Just type HELP and read to your heart's           content.           Common Accounts/Defaults:  [username: password [[,password]] ]           SYSTEM:     OPERATOR or MANAGER or SYSTEM or SYSLIB           OPERATOR:   OPERATOR           SYSTEST:    UETP           SYSMAINT:   SYSMAINT or SERVICE or DIGITAL           FIELD:      FIELD or SERVICE           GUEST:      GUEST or unpassworded           DEMO:       DEMO  or unpassworded           DECNET:     DECNETDEC-10-    An earlier line of DEC computer equipment, running the TOPS-10           operating system.  These machines are recognized by their           '.' prompt.  The DEC-10/20 series are remarkably hacker-friendly,           allowing you to enter several important commands without ever           logging into the system.  Accounts are in the format [xxx,yyy] where           xxx and yyy are integers.  You can get a listing of the accounts and           the process names of everyone on the system before logging in with           the command .systat (for SYstem STATus).  If you seen an account           that reads [234,1001]   BOB JONES, it might be wise to try BOB or           JONES or both for a password on this account.  To login, you type           .login xxx,yyy  and then type the password when prompted for it.           The system will allow you unlimited tries at an account, and does           not keep records of bad login attempts.  It will also inform you           if the UIC you're trying (UIC = User Identification Code, 1,2 for           example) is bad.           Common Accounts/Defaults:           1,2:        SYSLIB or OPERATOR or MANAGER           2,7:        MAINTAIN           5,30:       GAMES**** note:  I'm remembering this stuff from several years ago, and in somecases my memory may be foggy or stuff may be outdated.TOPS-20, once you are inside, resembles VMS much more than it resembles  TOPS-10, as far as I know (I'm not really familiar with VMS).  From theoutside, it's more like TOPS-10, except that the prompt is a @ instead of aperiod.  You can enter many commands without logging in, including SYSTAT andprobably FINGER.  (Sometimes you can even use the mail program withoutlogging in.)  It is very helpful.  Not only does the command HELP lead tolots of useful information, but anywhere in typing a command you can press ?and it will tell you what the format of the command expects.  For instance,if you type ? by itself, it will tell you all the words that a command canbegin with.  If you type S?, it will tell you all the commands that startwith the letter S.  If you type SYSTAT ?, it will tell you the optionsavailable on the systat command.  You can use this at any point in anycommand.  Furthermore, if there is only one possibility (you have typed aunique abbreviation), you can press Escape and it will finish the word foryou.  I'm not sure, but I think TOPS-20 was the system that first introducedfilename completion as well --turning a uniquely abbreviated filename into acomplete name when you press escape, beeping if the abbreviation is notunique.  With command keywords you can leave the abbreviation un-expanded,with filenames you have to expand it (or type it all in) for it to work.Use the "Login" command to log in, followed by a username.  It will promptfor a password.  Note that a password can be something like 39 characterslong, as can the username itself.  TOPS-20 does NOT use numbers like 317,043for user IDs.  (Note that these numbers in TOPS-10 are octal, not decimal.) Furthermore, the password can contain spaces.  So, if somebody wants to makehis password difficult to guess, he can easily do so.(But sometimes they might get overconfident.  I remember a story fromStanford...  Someone asked the large cheese if he would let him know what theoperator password was, and he said "The operator password is currentlyunavailable."  So the guy tried "currently unavailable" as a password, andgot in.  (Which reminds me of the time they got a real bug in the systemthere...  a head crash caused by an ant on the disk platter.))In general, TOPS-20 does not limit the number of login attempts, nor does itkeep a record of bad tries.  However, it is not difficult for the localmanagement to add such measures, or others such as a delay of several secondsafter each attempt.  And unlike Unix, it is difficult to evade these evenonce you're in.  Without heavy in-depth knowledge, you can't test a username-password combination except through a system call, which will enforce delaysand limited failures and such against password-trying programs.So, TOPS-20 is easy to defend against the "database hack", in which you trymany different common passwords with many different usernames.  (Unix ismuch more vulnerable to this.)  But any particular system, especially a laxone like a college machine (DEC is always popular in academia), might havelittle defense here.  But you might not know how much defense until too late.Do try the GUEST username.But TOPS-20 can be very vulnerable to trojan horses.  See, there's this thingcalled the Wheel bit.  A username that has the Wheel property can do anythingthe system operator can do, such as ignore file protection masks, edit thedisks at the track/sector level, change any area of memory...  On Unix, onlyone user, the superuser, can read and write protected files.  On TOPS-20, anyuser can do these things from any terminal, if the Wheel attribute is set inhis user data.  Some campus computers tend to accumulate excess trusted userswith wheel bits, and have to periodically prune away the unnecessary ones.The thing is that a wheel can do these things without knowing that he hasdone them.  Normally the privileged commands are deactivated.  But a programrun by a wheel can activate the privileges, do anything it wants, cover itstracks, and deactivate them without the user ever being the wiser.  So if youcan get any wheel user to run any program you wrote, such as a game or smallutility...  there's no limit to what you can do.  In particular, you cancreate a new username, and make it a wheel.  Or you can simply ask the systemoutright for someone's password, if I'm not mistaken.  (All this requiresaccess to TOPS-20 programming manuals, but some of the necessary materialshould be available on line.)  You cannot actually conceal this creation, asfar as I know...  but maybe with sophisticated enough knowledge you couldmake it not immediately apparent...  Anyway, once you get that far in, you canprobably keep one step ahead of them for a while...  If they erase your newaccounts, you can use the passwords to old ones...  They can change all ofthe wheel passwords, but a lot of the regular users won't change for sometime...  You could even lock the operators out of their own system bychanging all their passwords for them, if you were crazy enough, perhapsforcing them to shut the machine down to regain control of it.  They mighteven have to restore stuff from tape backup.Even if you don't wedge your way into secret stuff, a TOPS-20 system can befun to explore.  It's much more novice-friendly than most systems, and muchmore hacker-friendly as well.  I think the ascendency of Unix as the least-common-denominator OS that everybody can agree on is a definite loss,compared to TOPS-20.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美国产精品一区| 久久久久久久久久电影| 一本久久a久久免费精品不卡| 久久99久久99| 国产一区在线视频| 国产**成人网毛片九色| 韩国毛片一区二区三区| 国产在线精品一区二区夜色 | 国产精品天天看| 欧美激情中文字幕一区二区| 久久久亚洲精品一区二区三区| 久久婷婷国产综合精品青草| 久久精品一区二区三区不卡| 国产精品夫妻自拍| 一区二区三区日韩欧美精品| 视频在线观看一区| 国产精品资源网站| 不卡电影一区二区三区| 日本乱人伦一区| 欧美肥胖老妇做爰| 精品99999| 亚洲人成网站在线| 亚洲bdsm女犯bdsm网站| 狠狠色狠狠色综合系列| 99久久免费精品高清特色大片| 在线免费视频一区二区| 日韩一级欧美一级| 中文字幕在线视频一区| 亚洲mv在线观看| 豆国产96在线|亚洲| 欧美偷拍一区二区| 久久久久久久久久久久久久久99| 国产精品麻豆久久久| 天天影视网天天综合色在线播放| 激情综合网激情| 99久久婷婷国产综合精品| 欧美精品久久99久久在免费线| 久久综合九色综合欧美亚洲| 国产精品久久毛片| 奇米精品一区二区三区在线观看一 | 久久久美女毛片| 亚洲一区二区综合| 国产精品中文有码| 欧美中文字幕一区二区三区| 久久综合精品国产一区二区三区| 亚洲精品国产高清久久伦理二区| 激情综合网av| 欧美精品18+| 国产精品国产三级国产aⅴ入口 | 国产精品久久久久久久久免费相片 | 在线播放欧美女士性生活| 久久精品视频在线免费观看 | 日日摸夜夜添夜夜添精品视频 | 亚洲国产综合色| 不卡av在线免费观看| 精品国产三级电影在线观看| 亚洲一区二区在线视频| 99精品视频在线观看免费| 久久美女高清视频| 久久激五月天综合精品| 欧美三级日韩三级| 亚洲精品国产无套在线观| 国产成人av福利| 精品盗摄一区二区三区| 久久精品72免费观看| 91精品国产91久久综合桃花 | 国产suv一区二区三区88区| 精品国产免费一区二区三区香蕉| 日韩有码一区二区三区| 欧美日韩亚洲不卡| 偷偷要91色婷婷| 91精品国产综合久久福利软件| 亚洲激情欧美激情| 欧美日韩在线精品一区二区三区激情| 亚洲人成精品久久久久| 91免费看片在线观看| 亚洲精选一二三| 91久久精品一区二区三| 亚洲欧美日韩国产成人精品影院 | 色婷婷综合久久久中文一区二区| 国产精品美女久久久久av爽李琼| 国产精品一级二级三级| 久久综合九色欧美综合狠狠| 国产精品一二三四五| 欧美国产精品一区二区| 99精品欧美一区二区三区小说 | 久久女同精品一区二区| 国产一区二区视频在线| 日本一区二区三区dvd视频在线| 国产精品一线二线三线| 国产精品久久久久久亚洲毛片| 色中色一区二区| 日韩综合小视频| 久久男人中文字幕资源站| 国产精品一区二区免费不卡 | 亚洲国产wwwccc36天堂| 欧美一区二区三区公司| 国产综合色精品一区二区三区| 国产亚洲精品福利| 欧日韩精品视频| 激情偷乱视频一区二区三区| 国产精品护士白丝一区av| 欧美日韩色综合| 国产精一品亚洲二区在线视频| 亚洲人成精品久久久久久| 欧美疯狂性受xxxxx喷水图片| 麻豆久久久久久| 亚洲日本电影在线| 日韩欧美国产精品| 色婷婷精品大在线视频 | 欧美成人一区二区| 国产**成人网毛片九色| 一区二区三区免费| 久久综合九色综合97婷婷女人| 91蜜桃网址入口| 国产九色sp调教91| 五月激情丁香一区二区三区| 中文字幕不卡在线观看| 欧美一区二区三区四区高清| www.在线欧美| 国产一区二区三区在线观看精品 | 国产+成+人+亚洲欧洲自线| 图片区小说区区亚洲影院| 国产女主播在线一区二区| 欧美日韩中文字幕一区二区| 国产精一区二区三区| 日韩精品成人一区二区在线| 国产精品视频一二三| 日韩欧美美女一区二区三区| 色综合一区二区| 99久久婷婷国产综合精品| 国产在线不卡一区| 久久爱www久久做| 天堂av在线一区| 亚洲国产另类av| 亚洲一区免费观看| 亚洲欧美精品午睡沙发| 中文字幕精品一区二区精品绿巨人| 日韩视频一区二区| 7777精品伊人久久久大香线蕉完整版 | 亚洲视频一区在线| 中文字幕精品一区 | 91麻豆国产精品久久| 国产乱一区二区| 国产精品99久久久久久似苏梦涵 | 69堂成人精品免费视频| 色婷婷精品大在线视频| 色综合夜色一区| 91麻豆免费视频| 欧美亚洲自拍偷拍| 欧美在线免费视屏| 欧美日韩综合色| 欧美日韩dvd在线观看| 欧美在线视频不卡| 欧美日本在线视频| 51午夜精品国产| 91精品在线一区二区| 欧美视频一区二区| 91精品国产色综合久久不卡蜜臀| 欧美日韩www| 精品噜噜噜噜久久久久久久久试看| 日韩欧美中文一区二区| 日韩精品一区二区三区视频播放 | 久久综合五月天婷婷伊人| 精品剧情在线观看| 久久九九影视网| 亚洲欧美日韩一区二区 | 91精品国产91热久久久做人人| 91精品国产欧美一区二区成人| 日韩免费看的电影| 久久精品一区四区| 亚洲精品免费在线观看| 亚洲一区日韩精品中文字幕| 天天综合色天天| 国产精品2024| 91麻豆免费在线观看| 91精品久久久久久久久99蜜臂| www国产成人| 亚洲一区二区三区四区的| 男女男精品视频网| 成人中文字幕合集| 欧美日韩专区在线| 国产欧美1区2区3区| 亚洲制服丝袜在线| 久久99精品久久只有精品| 国产成人精品免费看| 欧美调教femdomvk| 中文字幕欧美国产| 亚洲超碰97人人做人人爱| 国产尤物一区二区| 欧美无砖专区一中文字| 国产亚洲精品福利| 日韩二区三区四区| 9色porny自拍视频一区二区| 欧美浪妇xxxx高跟鞋交| 国产精品午夜在线| 黄页网站大全一区二区| 在线视频欧美精品| 国产精品国产自产拍在线| 精品一区二区影视|