[ Pobierz całość w formacie PDF ]
understand Unix and TCP/IP (and UUCP), you will become a fish swimming in the sea of cyberspace, an
Uberhacker among hacker wannabes, a master of the Internet universe.
To get technical, the Internet is a world-wide distributed computer/communications network held together
by a common communications standard, Transmission Control Protocol/Internet Protocol (TCP/IP) and a bit
of UUCP. These standards allow anyone to hook up a computer to the Internet, which then becomes
another node in this network of the Internet. All that is needed is to get an Internet address assigned to the
new computer, which is then known as an Internet "host," and tie into an Internet communications link.
Thes e links are now available in almost all parts of the world.
If you use an on-line service from your personal computer, you, too, can temporarily become part of the
Internet. There are two main ways to hook up to an on-line service.
There is the cybercouch potato connection that every newbie uses. It requires either a point-to-point (PPP)
or SLIPconnection, which allows you to run pretty pictures with your Web browser. If you got some sort of
packaged software from your ISP, it automatically gives you this sort of connection.
Or you can connect with a terminal emulator to an Internet host. This program may be something as simple
as the Windows 3.1 Terminal program under the Accessories icon. Once you have dialed in and
connected you are just another terminal on this host machine. It won t give you pretty pictures. This
connection will be similar to what you get on an old-fashioned BBS. But if you know how to use this kind of
connection, it could even give you root access to that host.
But how is the host computer you use attached to the Internet? It will be running some variety of the Unix
operating system. Since Unix is so easy to adapt to almost any computer, this means that almost any
computer may become an Internet host.
For example, I sometimes enter the Internet through a host which is a Silicon Graphics Indigo computer at
Utah State University. Its Internet address is fantasia.idec.sdl.usu.edu. This is a computer optimized for
computer animation work, but it can also operate as an Internet host. On other occasions the entry point
used may be pegasus.unm.edu, which is an IBM RS 6000 Model 370. This is a computer optimized for
research at the University of New Mexico.
Any computer which can run the necessary software -- which is basically the Unix operating system -- has a
modem, and is tied to an Internet communications link, may become an Internet node. Even a PC may
become an Internet host by running one of the Linux flavors of Unix. After setting it up with Linux you can
arrange with the ISP of your choice to link it permanently to the Internet.
In fact, many ISPs use nothing more than networked PCs running Linux!
As a result, all the computing, data storage, and sending, receiving and forwarding of messages on the
Internet is handled by the millions of computers of many types and owned by countless companies,
educational institutions, governmental entities and even individuals.
Each of these computers has an individual address which enables it to be reached through the Internet if
hooked up to a appropriate communications link. This address may be represented in two ways: as a name
or a number.
The communications links of the Internet are also owned and maintained in the same anarchic fashion as the
hosts. Each owner of an Internet host is responsible for finding and paying for a communications link that
will get that host tied in with at least one other host. Communications links may be as simple as a phone
line, a wireless data link such as cellular digital packet data, or as complicated as a high speed fiber optic
link. As long as the communications link can use TCP/IP or UUCP, it can fit into the Internet.
Thus the net grows with no overall coordination. A new owner of an Internet host need only get permission
to tie into one communications link to one other host. Alternatively, if the provider of the communications
link decides this host is, for example, a haven for spammers, it can cut this rogue site off of the Internet.
The rogue site then must snooker some other communications link into tying it into the Internet again.
The way most of these interconnected computers and communications links work is through the common
language of the TCP/IP protocol. Basically, TCP/IP breaks any Internet communication into discrete
"packets." Each packet includes information on how to rout it, error correction, and the addresses of the
sender and recipient. The idea is that if a packet is lost, the sender will know it and resend the packet. Each
packet is then launched into the Internet. This network may automatically choose a route from node to node
for each packet using whatever is available at the time, and reassembles the packets into the complete
message at the computer to which it was addressed.
These packets may follow tortuous routes. For example, one packet may go from a node in Boston to
Amsterdam and back to the US for final destination in Houston, while another packet from the same
message might be routed through Tokyo and Athens, and so on. Usually, however, the communications
links are not nearly so torturous. Communications links may include fiber optics, phone lines and satellites.
The strength of this packet-switched network is that most messages will automatically get through despite
heavy message traffic congestion and many communications links being out of service. The disadvantage is
that messages may simply disappear within the system. It also may be difficult to reach desired computers if
too many communications links are unavailable at the time.
However, all these wonderful features are also profoundly hackable. The Internet is robust enough to
survive -- so its inventors claim -- even nuclear war. Yet it is also so weak that with only a little bit of
instruction, it is possible to learn how to seriously spoof the system (forged email) or even temporarily put
out of commission other people's Internet host computers (flood pinging, for example.) [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl exclamation.htw.pl
understand Unix and TCP/IP (and UUCP), you will become a fish swimming in the sea of cyberspace, an
Uberhacker among hacker wannabes, a master of the Internet universe.
To get technical, the Internet is a world-wide distributed computer/communications network held together
by a common communications standard, Transmission Control Protocol/Internet Protocol (TCP/IP) and a bit
of UUCP. These standards allow anyone to hook up a computer to the Internet, which then becomes
another node in this network of the Internet. All that is needed is to get an Internet address assigned to the
new computer, which is then known as an Internet "host," and tie into an Internet communications link.
Thes e links are now available in almost all parts of the world.
If you use an on-line service from your personal computer, you, too, can temporarily become part of the
Internet. There are two main ways to hook up to an on-line service.
There is the cybercouch potato connection that every newbie uses. It requires either a point-to-point (PPP)
or SLIPconnection, which allows you to run pretty pictures with your Web browser. If you got some sort of
packaged software from your ISP, it automatically gives you this sort of connection.
Or you can connect with a terminal emulator to an Internet host. This program may be something as simple
as the Windows 3.1 Terminal program under the Accessories icon. Once you have dialed in and
connected you are just another terminal on this host machine. It won t give you pretty pictures. This
connection will be similar to what you get on an old-fashioned BBS. But if you know how to use this kind of
connection, it could even give you root access to that host.
But how is the host computer you use attached to the Internet? It will be running some variety of the Unix
operating system. Since Unix is so easy to adapt to almost any computer, this means that almost any
computer may become an Internet host.
For example, I sometimes enter the Internet through a host which is a Silicon Graphics Indigo computer at
Utah State University. Its Internet address is fantasia.idec.sdl.usu.edu. This is a computer optimized for
computer animation work, but it can also operate as an Internet host. On other occasions the entry point
used may be pegasus.unm.edu, which is an IBM RS 6000 Model 370. This is a computer optimized for
research at the University of New Mexico.
Any computer which can run the necessary software -- which is basically the Unix operating system -- has a
modem, and is tied to an Internet communications link, may become an Internet node. Even a PC may
become an Internet host by running one of the Linux flavors of Unix. After setting it up with Linux you can
arrange with the ISP of your choice to link it permanently to the Internet.
In fact, many ISPs use nothing more than networked PCs running Linux!
As a result, all the computing, data storage, and sending, receiving and forwarding of messages on the
Internet is handled by the millions of computers of many types and owned by countless companies,
educational institutions, governmental entities and even individuals.
Each of these computers has an individual address which enables it to be reached through the Internet if
hooked up to a appropriate communications link. This address may be represented in two ways: as a name
or a number.
The communications links of the Internet are also owned and maintained in the same anarchic fashion as the
hosts. Each owner of an Internet host is responsible for finding and paying for a communications link that
will get that host tied in with at least one other host. Communications links may be as simple as a phone
line, a wireless data link such as cellular digital packet data, or as complicated as a high speed fiber optic
link. As long as the communications link can use TCP/IP or UUCP, it can fit into the Internet.
Thus the net grows with no overall coordination. A new owner of an Internet host need only get permission
to tie into one communications link to one other host. Alternatively, if the provider of the communications
link decides this host is, for example, a haven for spammers, it can cut this rogue site off of the Internet.
The rogue site then must snooker some other communications link into tying it into the Internet again.
The way most of these interconnected computers and communications links work is through the common
language of the TCP/IP protocol. Basically, TCP/IP breaks any Internet communication into discrete
"packets." Each packet includes information on how to rout it, error correction, and the addresses of the
sender and recipient. The idea is that if a packet is lost, the sender will know it and resend the packet. Each
packet is then launched into the Internet. This network may automatically choose a route from node to node
for each packet using whatever is available at the time, and reassembles the packets into the complete
message at the computer to which it was addressed.
These packets may follow tortuous routes. For example, one packet may go from a node in Boston to
Amsterdam and back to the US for final destination in Houston, while another packet from the same
message might be routed through Tokyo and Athens, and so on. Usually, however, the communications
links are not nearly so torturous. Communications links may include fiber optics, phone lines and satellites.
The strength of this packet-switched network is that most messages will automatically get through despite
heavy message traffic congestion and many communications links being out of service. The disadvantage is
that messages may simply disappear within the system. It also may be difficult to reach desired computers if
too many communications links are unavailable at the time.
However, all these wonderful features are also profoundly hackable. The Internet is robust enough to
survive -- so its inventors claim -- even nuclear war. Yet it is also so weak that with only a little bit of
instruction, it is possible to learn how to seriously spoof the system (forged email) or even temporarily put
out of commission other people's Internet host computers (flood pinging, for example.) [ Pobierz całość w formacie PDF ]