text
stringlengths
0
1.99k
The next prompt will be for the password, student account passwords cannot be
changed and are 7 random letters by default, other account passwords can be
changed. You get 3 tries until you are logged out. It is very difficult if
not impossible to use a brute force hacker or try to guess someone's account..
so how do you get on? Here's one easy way... Go down to your local college
(make sure they have a Cyber computer!) then just buy a class catalog (they
only cost around 50 cents) or you could look, borrow, steal someone else's...
then find a pascal or fortran class that fits your schedule! You will only
have to attend the class 3 or 4 times max. Once you get there you should have
no trouble, but if the instructor asks you questions about why you are not on
the roll, just tell him that you are auditing the class (taking it without
enrolling so it won't affect your GPA). The instructor will usually pass out
accounts on the 3rd or 4th day of class.. this method also works well with
just about any system they have on campus! Another way to get accounts is to
go down to the computer lab and start snooping! Look over someone's shoulder
while they type in their password, or look thru someone's papers while they're
in the bathroom, or look thru the assistants desk while he is helping
someone... (I have acquired accounts both ways, and the first way is a lot
easier with less hassles) Also, you can use commas instead of returns when
entering username and password.
Example: at the family prompt, you could type ,nadrajf,dsfgkcd
or at the username prompt nadrajf,dsfgkcd
After you enter your info, the system will respond with:
JSN: APXV, NAMIAF
/
The 'APXV, NAMIAF' could be different depending on what job you were attached
to. The help program looks a lot neater if you have vt100 emulation, if you
do, type [screen,vt100] (don't type the brackets! from now on, all commands I
refer to will be enclosed in brackets) Then type help for an extensive
tutorial or a list of commands. Your best bet at this point is to buy a quick
reference guide at the campus because I am only going to describe the most
useful commands. The / means you are in the batch subsystem, there are usually
6 or 7 other subsystems like basic, fortran, etc... return to batch mode by
typing [batch].
Some useful commands:
CATLIST - will show permanent files in your directory.
ENQUIRE,F - displays temporary files in your workspace.
LIMITS - displays your privileges.
INFO - get more on-line help.
R - re-execute last command.
GET,fn - loads fn into the local file area.
CHANGE - change certain specs on a file.
PERMIT - allow other users to use one of your files.
REWIND,* - rewinds all your local files.
NEW,fn - creates new file.
PURGE - deletes files.
LIST,F=fn - list file.
UPROC - create an auto-execute procedure file.
MAIL - send/receive private mail.
BYE - logoff.
Use the [helpme,cmd] command for the exact syntax and parameters of these
commands. There are also several machine specific 'application' programs such
as pascal, fortran, spitbol, millions of others that you can look up with the
INFO command... there are also the text editors; edit, xedit, and fse (full
screen editor). Xedit is the easiest to use if you are not at a Telray 1061
terminal and it has full documentation. Simply type [xedit,fn] to edit the
file 'fn'.
Special control characters used with Cyber:
Control S and Control Q work normally, the terminate character is Control T
followed by a carriage return. If you wanted to break out of an auto-execute
login program, you would have to hit ^T C/R very fast and repetitively in
order to break into the batch subsystem. Control Z is used to set environment
variables and execute special low level commands, example: [^Z TM C/R] this
will terminate your connection...
So now you're thinking, what the hell is Cyber good for? Well, they won't
have any phone company records, and you can't get credit information from one,
and I am not going to tell you how to crash it since crashing systems is a
sin. There are uses for a Cyber though, one handy use is to set up a chat
system, as there are normally 30-40 lines going into a large university Cyber
system. I have the source for a chat program called the communicator that I
will be releasing soon. Another use is some kind of underground information
exchange that people frequently set up on other systems, this can easily be
done with Cyber.
Procedure files:
A procedure file is similar to a batch file for MS-DOS, and a shell script for
UNIX. You can make a procedure file auto-execute by using the UPROC command
like [uproc,auto] will make the file 'auto', auto execute. There is also a
special procedure file called the procfile in which any procedure may be
accessed by simply a - in front of it. If your procfile read:
.proc,cn.
.* sample procedure
$catlist/un=7etpdoc.
$exit.
then you could simply type -cn and the / prompt and it would execute the
catlist command. Now back to uprocs, you could easily write a whole BBS in a
procedure file or say you wanted to run a chat system and you did not want