Learning Unix for Mac OS X 2002.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Learning Unix for Mac OS X 2002.Pdf ti iAIDICI Apple Developer Connection Recommended Title Learning 8.99. 19.95 II II Ill II IIIII Ill IIIII Ill 040027-00-·~ l!A' [11:~ STffi( 11054 MAC 1>54 (t~2B J.L·'.ciiD ~19'13 O'REILLY® Learning Unix for Mac OS X Related Mac OS XTitles from O'Reilly Essentials Unix Essentials AppleScript in a Nutshell Using csh & tcsh Building Cocoa Applications: Unix in a Nutshell A Step-by-Step Guide Unix Power Tools Learning Carbon Learning GNU Emacs Learning Cocoa Learning the vi Editor Mac OS X Pocket Reference REALbasic: The Definitive Guide Related Programming Developing Java Beansr"' Missing Manuals Java TM Cookbook AppleWorks 6: The Missing JavaTM I/0 Manual JavaTM Network Programming iMovie 2: The Missing Manual Java TV in a Nutshell Mac OS 9: The Missing Manual Learning Java TV Mac OS X: The Missing Manual Learning Perl Office 2001 for Macintosh: Perl in a Nutshell The Missing Manual Practical C Programming Office X for Macintosh: Programming with Qt The Missing Manual Mac OS XAdministration Apache: The Definitive Guide Essential System Administration sendmail Learning Unix for Mac OS X Dave Taylor and jerry Peek with Grace Todino and john Strang O'REILLY® Beijing • Cambridge • Farnham • Koln • Paris • Sebastopol • Taipei • Tokyo Learning Unix for Mac OS X by Dave Taylor and Jerry Peek Copyright© 2002 O'Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly & Associates, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly & Associates books may be purchased for educational, business, or sales pro­ motional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Laurie Petrycki Production Editor: Linley Dolby Cover Designer: Emma Colby Interior Designer: David Futato Printing History: May2002: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of an Alaskan malamute and the topic of Mac OS X is a trademark of O'Reilly & Associates, Inc. Apple Computer, Inc. boldly combined open source technologies with its own programming efforts to create Mac OS X, one of the most versatile and stable operating systems now available. In the same spirit, Apple has joined forces with O'Reilly & Associates, Inc. to bring you an indispensable collection of technical publications. The ADC logo indicates that the book has been technically reviewed by Apple engineers and is recommended by the Apple Developer Connection. Apple, the Apple logo, AppleScript, AppleTalk, Apple Works, Cocoa, Finder, Mac, Macintosh, MPW, QuickDraw, QuickTime, and Sherlock are trademarks of Apple Computer, Inc., registered in the United States and other countries. Aqua, Carbon, and Quartz are trademarks of Apple Computer, Inc. While every precaution has been taken in the preparation of this book, the publisher and the authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. ISBN: 0-596-00342-0 [M] [11/02] Table of Contents Preface . vii 1. Getting Started . 1 Working in the Unix Environment 1 Syntax of Unix Command Lines 7 Types of Commands 10 The Unresponsive Terminal 11 2. Using Unix ................................................. 13 The Unix Filesystem 13 Looking Inside Files with less 24 Protecting and Sharing Files 26 Graphical Filesystem Browsers 31 Completing File and Directory Names 32 3. File Management .......................................... 33 File and Directory Names 33 File and Directory Wildcards 34 Creating and Editing Files 36 Managing Your Files 42 4. Customizing Your Session . SO Launching Terminal 50 Customizing Your Shell Environment 55 Further Customization 60 v S. Printing ................................................... 61 Formatting and Print Commands 61 Configuring Your LPR Printer 67 6. Redirecting 1/0 . 72 Standard Input and Standard Output 72 Pipes and Filters 7 6 7. Accessing the Internet ...................................... 81 Remote Logins 81 Transferring Files 84 8. Unix-Based Internet Tools . 91 Lynx, a Text-Based Web Browser 91 Electronic Mail 93 UsenetNews 103 Interactive Chat 107 9. Multitasking .............................................. 114 Running a Command in the Background 114 Checking on a Process 116 Canceling a Process 118 10. Where to Go from Here ..................................... 120 Documentation 120 Shell Aliases and Functions 123 Programming 123 Appendix: Configuring Sendmail .................................. 125 Glossary ....................................................... 127 Index .......................................................... 131 vi I Table of Contents Preface Mac OS X (pronounced "Mac OS Ten"), the latest incarnation of the Macin­ tosh operating system, is a radical departure from previous versions. Not only is there a whole new look and feel (dubbed "Aqua"), there are huge dif­ ferences under the hood. All the old, familiar Macintosh system software has been replaced with another operating system, called Unix. Unix is a mul­ tiuser, multitasking operating system. Being multiuser means Mac OS X allows multiple users to share the same system, each having the ability to customize the desktop, create files that can be kept private from other users, and to make settings that will automatically be restored whenever that per­ son uses the computer. Being multitasking means the computer can easily run many different applications at the same time, and that if one applica­ tion crashes or hangs, the entire system doesn't need to be rebooted. The fact that Mac OS X is Unix under the hood doesn't matter to users who simply want to use its slick graphical interface to run their applications or manage their files. But it opens up worlds of possibilities for users who want to dig a little deeper. The Unix command-line interface, which is accessible through a Mac application called the Terminal, provides an enormous amount of power for advanced users. What's more, once you've learned to use Unix in OS X, you'll also be able to use the command line in other ver­ sions of Unix such as Linux. This book is designed to teach the basics of Unix to Macintosh users. We tell you how to use the command line (which Unix users refer to as "the shell") and the filesystem, as well as some of the most useful commands. Unix is a complex and powerful system, so we only scratch the surface, but we also tell you how to deepen your Unix knowledge once you're ready for more. vii Mac OS Xand the Unix Family of Operating Systems The Macintosh staned out with a single-tasking operating system that allowed simple switching between applications through an application called the Finder. More recent versions of Mac OS have supported multiple applications running simultaneously, but it wasn't until the landmark release of Mac OS X that true multitasking arrived in the Macintosh world. With OS X, Macintosh applications run in separate memory areas. A true multiuser system that includes proper file-level security is also finally part of the Mac. To accomplish these improvements, Mac OS X made the jump from a pro­ prietary underlying operating environment to Unix. Mac OS X is built on top of Darwin, a version of Unix based on BSD 4.4, FreeBSD, and the Mach micro kernel. Unix itself was invented more than 30 years ago for scientific and profes­ sional users who wanted a very powerful and flexible OS. It has evolved. since then through a remarkably circuitous path, with stops at Bell Tele­ phone Labs, UC Berkeley, research centers in Australia and Europe, and the U.S. Department of Defense Advanced Research Projects Agency (for fund­ ing). Because Unix was designed for experts, it can be a bit overwhelming at first. But after you get the basics (from this book!) you'll start to appreciate some of the reasons to use Unix: • It comes with a huge number of powerful application programs. You can get many others for free on the Internet. (The GNU utilities, avail­ able from the Free Software Foundation (ht~:llwww.fsf.org/), are very popular.) You can thus do much more at a much lower cost. • Not only are the applications often free, but some Unix versions are also free. Linux is a good example. Like the free applications, most free Unix versions are of excellent quality. They're maintained by volunteer pro­ grammers who want a powerful OS and are frustrated by the slow, bug­ ridden OS development at some big software companies. With Mac OS X, Unix is also "free" as part of the operating system, and many people use Mac OS X daily without ever knowing about all the power lurking under the hood. • Unix runs on almost any kind of computer, from tiny embedded sys­ tems to giant supercomputers. After you read this book, you'll not only know all about Darwin, but you '11 also be ready to use many other kinds of Unix-based computers without learning a new OS for each one. viii I Preface • In general, Unix (especially without a windowing system) is less resource intensive than other major operating systems. For instance, Linux will run happily on an old system with a x386 microprocessor and let multiple users share the same computer. (Don't bother trying to use the latest versions of Microsoft Windows on a system that's more than a few years old!) If you need a windowing system, Unix lets you choose from modern feature-rich interfaces as well as from simple ones that need much less system power.
Recommended publications
  • The Keys to Using SSH
    The Keys to Using SSH David Tomaschik RHCE, LPIC-1 System Administrator, Kennesaw State University MSCS Student, SPSU [email protected] http://systemoverlord.com Special ALE Central Edition! What is SSH? ● SSH = Secure Shell ● Originally intended as “Encrypted Telnet” ● Allows remote shell (command-line) access ● Connection Encrypted Using Public Key Cryptography ● SSH Version 1: Developed 1995, Now Insecure ● SSH Version 2: Standardized 2006 ● Only use SSH2! Why use SSH? ● Useful for remote system administration ● Transfer files securely ● Run remote applications ● Secure OTHER communications ● Requires Little Bandwidth ● Industry Standard SSH Clients ● Linux: OpenSSH; Usually Installed by Default ● OS X: OpenSSH; Installed by Default ● Windows: PuTTY, OpenSSH under Cygwin, Commercial SSH ● Android: ConnectBot + Others ● IOS: iSSH, Prompt, Others About the Presentation ● Assumes OpenSSH on Linux for both Client and Server ● Some features may require relatively recent versions of OpenSSH Basic Use ● ssh [email protected] Basic Use ● ssh [email protected] Verifying Who You're Connecting To ● The highlighted lines show you which host you are connecting to along with the key fingerprint. ● The key fingerprint is cryptographic proof that your connection is not being tampered with. ● Depending on your level of paranoia: ● Get the fingerprint from the system administrator ● Make your first connection from a 'trusted' network ● Just ignore it and hope its ok What You Can Do Now ● Run Commands Remotely ● Install packages/services ● Configure
    [Show full text]
  • Malware to Crimeware
    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Lab Work 03. Using Ssh/Rdp for Remote Linux/UNIX/Mac/Windows Servers
    LAB WORK 03. USING SSH/RDP FOR REMOTE LINUX/UNIX/MAC/WINDOWS SERVERS MANAGEMENT 1. PURPOSE OF WORK Get the initial skills of working with a remote host via ssh protocol. Secure SHell is the primary means of remotely managing networked computers running UNIX/Linux. The Linux/UNIX commands are used: ssh, scp, uname, passwd, date, who, pwd, mkdir, mc, exit, logout. 2. TASKS FOR WORK 2.1. Install Secure Shell Extension on your Chrome browser in the classroom or at home. Using the Secure Shell Extension, connect to the academy.lv remote server with your student account. Use the uname command (with the appropriate parameters) to determine the type of operating system, hardware platform, and version of the server core (make a Screenshot 1). 2.2. Download Putty.exe on your Windows computer in the classroom or at home. Using the putty.exe, connect to the academy.lv remote server with your student account. Use the passwd command for change Your password on academy.lv remote server. Use the date command (with the appropriate parameters) to determine the date and time of the remote server (make a Screenshot 2). 2.3. Start Your Linux Virtual Machine on VirtualBox on your Windows computer (show Lab Work 01). Start Linux Terminal. 2.4. Use the uname command (with the appropriate parameters) to determine the type of operating system, hardware platform, and version of the server core for local Linux (make a Screenshot 3). 2.5. Use the ssh command on Linux Virtual Machine (without loading the academy.lv remote server shell) to determine the date and time (date command with the appropriate parameters) for academy.lv remote server (make a Screenshot 4).
    [Show full text]
  • Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard Kkapple Inc
    Mac OS X Server Introduction to Command-Line Administration Version 10.6 Snow Leopard K Apple Inc. Apple Remote Desktop, Finder, and Snow Leopard are © 2009 Apple Inc. All rights reserved. trademarks of Apple Inc. Under the copyright laws, this manual may not AIX is a trademark of IBM Corp., registered in the U.S. be copied, in whole or in part, without the written and other countries, and is being used under license. consent of Apple. The Bluetooth® word mark and logos are registered The Apple logo is a trademark of Apple Inc., registered trademarks owned by Bluetooth SIG, Inc. and any use in the U.S. and other countries. Use of the “keyboard” of such marks by Apple is under license. Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may This product includes software developed by the constitute trademark infringement and unfair University of California, Berkeley, FreeBSD, Inc., competition in violation of federal and state laws. The NetBSD Foundation, Inc., and their respective contributors. Every effort has been made to ensure that the information in this manual is accurate. Apple is not Java™ and all Java-based trademarks and logos responsible for printing or clerical errors. are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Apple 1 Infinite Loop PowerPC™ and the PowerPC logo™ are trademarks Cupertino, CA 95014 of International Business Machines Corporation, used 408-996-1010 under license therefrom. www.apple.com UNIX® is a registered trademark of The Open Group. Apple, the Apple logo, AppleScript, FireWire, Keychain, Other company and product names mentioned herein Leopard, Mac, Mac OS, Quartz, Safari, Xcode, Xgrid, and are trademarks of their respective companies.
    [Show full text]
  • Clustershell Documentation Release 1.8.2
    ClusterShell Documentation Release 1.8.2 Stephane Thiell Aug 15, 2019 Contents 1 Introduction 3 2 Release Notes 5 2.1 Version 1.8................................................5 2.1.1 Version 1.8.2..........................................5 2.1.2 Version 1.8.1..........................................6 2.1.3 Main changes in 1.8.......................................6 2.2 Version 1.7................................................8 2.2.1 Version 1.7.3..........................................9 2.2.2 Version 1.7.2..........................................9 2.2.3 Version 1.7.1..........................................9 2.2.4 Main changes in 1.7.......................................9 3 Installation 13 3.1 Requirements............................................... 13 3.2 Distribution................................................ 13 3.2.1 Fedora.............................................. 14 3.2.2 Red Hat Enterprise Linux (and CentOS)............................ 14 3.2.3 openSUSE............................................ 15 3.2.4 Debian.............................................. 16 3.2.5 Ubuntu............................................. 16 3.2.6 Installing ClusterShell using PIP................................ 16 3.3 Source.................................................. 17 4 Configuration 19 4.1 clush................................................... 19 4.2 Node groups............................................... 20 4.2.1 groups.conf........................................... 20 4.2.2 File-based group sources...................................
    [Show full text]
  • DMK BO2K8.Pdf
    Black Ops 2008: It’s The End Of The Cache As We Know It Or: “64K Should Be Good Enough For Anyone” Dan Kaminsky Director of Penetration Testing IOActive, Inc. copyright IOActive, Inc. 2006, all rights reserved. Introduction • Hi! I’m Dan Kaminsky – This is my 9th talk here at Black Hat – I look for interesting design elements – new ways to manipulate old systems, old ways to manipulate new systems – Career thus far spent in Fortune 500 • Consulting now – I found a really bad bug a while ago. • You might have heard about it. • There was a rather coordinated patching effort. • I went out on a very shaky limb, to try to keep the details quiet – Asked people not to publicly speculate » Totally unreasonable request » Had to try. – Said they’d be congratulated here Thanks to the community • First finder: Pieter de Boer – Michael Gersten – 51 hours later – Mike Christian • Best Paper • Left the lists – Bernard Mueller, sec- – Paul Schmehl consult.com – Troy XYZ – Five days later, but had full – Others info/repro • Thanks • Interesting thinking (got close, – Jen Grannick (she contacted kept off lists) me) – Andre Ludwig – DNSStuff (they taught me – Nicholas Weaver LDNS, and reimplemented – “Max”/@skst (got really really my code better) close) – Everyone else (people know – Zeev Rabinovich who they are, and know I owe them a beer). Obviously thanks to the Summit Members • Paul Vixie • People have really been • David Dagon incredible with this. – Georgia Tech – thanks for • What did we accomplish? the net/compute nodes • Florian Weimer • Wouter Wijngaards • Andreas Gustaffon • Microsoft • Nominum • OpenDNS • ISC • Neustar • CERT There are numbers and are there are numbers • 120,000,000 – The number of users protected by Nominum’s carrier patching operation – They’re not the Internet’s most popular server! • That’s BIND, and we saw LOTS of BIND patching – They’re not the only server that got lots of updates • Microsoft’s Automatic Updates swept through lots and lots of users • Do not underestimate MSDNS behind the firewall.
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Xalasys.com <tille wants no spam _at_ xalasys dot com> Version 1.8 Last updated 20060315 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • TR-4569: Security Hardening Guide for Netapp ONTAP 9
    Technical Report Security Hardening Guide for NetApp ONTAP 9 Guidelines for Secure Deployment of ONTAP 9 Product Security Team, NetApp December 2020 | TR-4569 Abstract This technical report provides guidance and configuration settings for NetApp® ONTAP® 9 to help organizations meet prescribed security objectives for information system confidentiality, integrity, and availability. TABLE OF CONTENTS Introduction ................................................................................................................................................. 4 ONTAP image validation ............................................................................................................................ 4 Upgrade image validation ........................................................................................................................................ 4 Boot-time image validation ...................................................................................................................................... 4 Local storage administrator accounts ...................................................................................................... 4 Roles, applications, and authentication ................................................................................................................... 4 Default administrative accounts ............................................................................................................................... 7 Certificate-based API access..................................................................................................................................
    [Show full text]
  • IRC Internet Relay Chat
    IRC Internet Relay Chat Finlandia, 1988,l'idea di IRC prende ispirazione dai primi software quali “MUT” e “Talk”. Da un idea di uno studente finlandese, questa innovazione pian piano si sviluppò in una rete IRC universitaria che permetteva agli studenti di tutte le università del paese di comunicare tramite i loro terminali Unix. Quando divenne disponibile la connessione Internet tra più stati la rete IRC Finlandese si espanse fino a raggiungere alcuni server Statunitensi dando vita poco tempo dopo alla prima rete IRC Internazionale tutt'oggi esistente: Eris Free Net (EfNet). Ben presto, nel giro di poco tempo si ebbe un boom delle reti IRC Nazionali ed Internazionali, con una conseguente crescita esponenziale del numero di utenti nel mondo, tanto da far diventare IRC il sistema di Chat più diffuso. In italia fece la prima comparsa intorno al 1995. L'idea di IRC fu progettato come un sistema di chat "grezzo", dove non ci fosse alcun controllo sulle attività degli utenti. La mancanza di moderazione fu la causa principale della nascita e il conseguente sviluppo del fenomeno dell'IRCWar, che consiste nell'utilizzare tecniche più o meno lecite che vanno dall'attacco della macchina dell'utente fino al disturbo/attacco della stessa chatrom con lo scopo dell'impossersarsene. L'indirizzo principale per collegarsi alla rete di solito è irc.xxx.xxx, quest'ultimo punta a rotazione su tutti i server principali per bilanciarne il carico a favore della stabilità e affidabilità della connessione. DISCLAIMER: Questa guida è stata scritta senza nessun fine di lucro. Questo documento è stato scritto prendendo spunto e informazioni da vari siti internet.
    [Show full text]