text stringlengths 0 1.99k |
|---|
The next prompt will be for the password, student account passwords cannot be |
changed and are 7 random letters by default, other account passwords can be |
changed. You get 3 tries until you are logged out. It is very difficult if |
not impossible to use a brute force hacker or try to guess someone's account.. |
so how do you get on? Here's one easy way... Go down to your local college |
(make sure they have a Cyber computer!) then just buy a class catalog (they |
only cost around 50 cents) or you could look, borrow, steal someone else's... |
then find a pascal or fortran class that fits your schedule! You will only |
have to attend the class 3 or 4 times max. Once you get there you should have |
no trouble, but if the instructor asks you questions about why you are not on |
the roll, just tell him that you are auditing the class (taking it without |
enrolling so it won't affect your GPA). The instructor will usually pass out |
accounts on the 3rd or 4th day of class.. this method also works well with |
just about any system they have on campus! Another way to get accounts is to |
go down to the computer lab and start snooping! Look over someone's shoulder |
while they type in their password, or look thru someone's papers while they're |
in the bathroom, or look thru the assistants desk while he is helping |
someone... (I have acquired accounts both ways, and the first way is a lot |
easier with less hassles) Also, you can use commas instead of returns when |
entering username and password. |
Example: at the family prompt, you could type ,nadrajf,dsfgkcd |
or at the username prompt nadrajf,dsfgkcd |
After you enter your info, the system will respond with: |
JSN: APXV, NAMIAF |
/ |
The 'APXV, NAMIAF' could be different depending on what job you were attached |
to. The help program looks a lot neater if you have vt100 emulation, if you |
do, type [screen,vt100] (don't type the brackets! from now on, all commands I |
refer to will be enclosed in brackets) Then type help for an extensive |
tutorial or a list of commands. Your best bet at this point is to buy a quick |
reference guide at the campus because I am only going to describe the most |
useful commands. The / means you are in the batch subsystem, there are usually |
6 or 7 other subsystems like basic, fortran, etc... return to batch mode by |
typing [batch]. |
Some useful commands: |
CATLIST - will show permanent files in your directory. |
ENQUIRE,F - displays temporary files in your workspace. |
LIMITS - displays your privileges. |
INFO - get more on-line help. |
R - re-execute last command. |
GET,fn - loads fn into the local file area. |
CHANGE - change certain specs on a file. |
PERMIT - allow other users to use one of your files. |
REWIND,* - rewinds all your local files. |
NEW,fn - creates new file. |
PURGE - deletes files. |
LIST,F=fn - list file. |
UPROC - create an auto-execute procedure file. |
MAIL - send/receive private mail. |
BYE - logoff. |
Use the [helpme,cmd] command for the exact syntax and parameters of these |
commands. There are also several machine specific 'application' programs such |
as pascal, fortran, spitbol, millions of others that you can look up with the |
INFO command... there are also the text editors; edit, xedit, and fse (full |
screen editor). Xedit is the easiest to use if you are not at a Telray 1061 |
terminal and it has full documentation. Simply type [xedit,fn] to edit the |
file 'fn'. |
Special control characters used with Cyber: |
Control S and Control Q work normally, the terminate character is Control T |
followed by a carriage return. If you wanted to break out of an auto-execute |
login program, you would have to hit ^T C/R very fast and repetitively in |
order to break into the batch subsystem. Control Z is used to set environment |
variables and execute special low level commands, example: [^Z TM C/R] this |
will terminate your connection... |
So now you're thinking, what the hell is Cyber good for? Well, they won't |
have any phone company records, and you can't get credit information from one, |
and I am not going to tell you how to crash it since crashing systems is a |
sin. There are uses for a Cyber though, one handy use is to set up a chat |
system, as there are normally 30-40 lines going into a large university Cyber |
system. I have the source for a chat program called the communicator that I |
will be releasing soon. Another use is some kind of underground information |
exchange that people frequently set up on other systems, this can easily be |
done with Cyber. |
Procedure files: |
A procedure file is similar to a batch file for MS-DOS, and a shell script for |
UNIX. You can make a procedure file auto-execute by using the UPROC command |
like [uproc,auto] will make the file 'auto', auto execute. There is also a |
special procedure file called the procfile in which any procedure may be |
accessed by simply a - in front of it. If your procfile read: |
.proc,cn. |
.* sample procedure |
$catlist/un=7etpdoc. |
$exit. |
then you could simply type -cn and the / prompt and it would execute the |
catlist command. Now back to uprocs, you could easily write a whole BBS in a |
procedure file or say you wanted to run a chat system and you did not want |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.