Folks, Linux has
gotten much easier to install nowadays than it was in 1996 when
I first wrote this. If you are a beginner, your first Linux should
be either Caldera
OpenLinux or SuSE Personal
For greatest ease of installation, use a computer that allows
you to boot from the CD-ROM, and make sure your modem is not
a "Winmodem." .In Windows, you can check this by right
clicking "My Computer," then "Properties,"
then "Device Manager," then "Modem." If it
says you have a Winmodem, buy a real modem, making certain that
the manufacturer says it will work with Linux. If the manufacturer
doesn't say anything about Linux, the modem will still probbaly
work if it is an external modem or a modem in which you can set
the com port and IRQ with jumpers. -- Carolyn Meinel
GUIDE TO (mostly) HARMLESS HACKING
Vol. 2 Number 2
Unix has become the primo operating system of the Internet.
In fact, Unix is the most widely used operating system in the
world among computers with more power than PCs.
True, Windows NT is coming up fast as a common Internet operating
system, and is sooo wonderfully buggy that it looks like it could
become the number one favorite to crack into. But today Unix
in all its wonderful flavors still is the operating system to
know in order to be a truly elite hacker.
So far we have assumed that you have been hacking using a
shell account that you get through your Internet Service Provider
(ISP). A shell account allows you to give Unix commands on one
of your ISP's computers. But you don't need to depend on your
ISP for a machine that lets you play with Unix. You can run Unix
on your own computer and with a SLIP or PPP connection be directly
connected to the Internet.
Newbie note: Serial Line Internet Protocol (SLIP) and Point-to-Point
Protocol (PPP) connections give you a temporary Internet Protocol
(IP) address that allows you to be hooked directly to the Internet.
You have to use either SLIP or PPP connections to get to use
a Web browser that gives you pictures instead on text only. So
if you can see pictures on the Web, you already have one of these
available to you.
The advantage of using one of these direct connections for
your hacking activities is that you will not leave behind a shell
log file for your ISP's sysadmin to pore over. Even if you are
not breaking the law, a shell log file that shows you doing lots
of hacker stuph can be enough for some sysadmins to summarily
close your account.