perm filename ERRATA.XGP[OK,TES] blob
sn#119649 filedate 1974-09-08 generic text, type T, neo UTF8
/LMAR=0/FONT#4=BASB30/FONT#3=FIX20[DOC,BH]/FONT#2=FIX25/FONT#1=BASI30/FONT#0=BASL30
␈↓ ↓X␈↓∧STANFORD ARTIFICIAL INTELLIGENCE LABORATORY␈↓
∩September, 1974
␈↓ ↓X␈↓∧OPERATING NOTE 54.3 1/2
␈↓ ↓X␈↓∧␈α?␈α?␈α?␈α?␈α4M O N I T O R C O M M A N D M A N U A L
␈↓ ↓X␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈απ(addenda and errata)
␈↓ ↓X␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α↓by
␈↓ ↓X␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈α6Brian Harvey
␈↓ ↓X␈↓This␈α∂document␈α⊂contains␈α∂corrections␈α⊂and␈α∂additions␈α⊂to␈α∂the␈α⊂Monitor␈α∂Command␈α⊂Manual,␈α∂SAILON
␈↓ ↓X␈↓54.3,␈αre∨ecting␈αimprovements␈αin␈αthe␈αsystem␈αfacilities␈αas␈αof␈αthe␈αdate␈αabove.␈αA␈αline␈αprinter␈αversion␈αof
␈↓ ↓X␈↓this␈α∀document␈α∀is␈α∀available␈α∀for␈α∀network␈α∀users␈α∀in␈α∀the␈α∀≡le␈α∀ERRATA.BH[S,DOC].␈α∀ Note:␈α∀page
␈↓ ↓X␈↓numbers␈αmentioned␈αherein␈αrefer␈αto␈αthe␈αXGP␈αedition␈α
of␈αSAILON␈α54.3,␈αeven␈αin␈αthe␈αLPT␈αversion␈α
of
␈↓ ↓X␈↓this document.
␈↓ ↓X␈↓This␈αwork␈α
was␈αsupported␈α
by␈αthe␈α
Advanced␈αResearch␈α
Projects␈αAgency␈α
of␈αthe␈α
O≠ce␈αof␈αthe␈α
Secretary
␈↓ ↓X␈↓of Defense under contract DAHC15-73-C-0435.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 7 i␈↓
␈↓ ↓X␈↓This edition includes the following changes since the August, 1974 edition:
␈↓ ↓X␈↓MAIL/A␈αto␈αappend␈αto␈αan␈αearlier␈αmessage.␈α Also,␈αthe␈αREENTER␈αfacility␈αis␈αbetter␈αinterfaced␈α
to␈αthe
␈↓ ↓X␈↓<lf> continued message feature.
␈↓ ↓X␈↓RESOURCES␈α↔command␈α↔no␈α↔longer␈α↔lists␈α_job␈α↔slots␈α↔and␈α↔Data␈α↔Disc␈α↔channels␈α_available;␈α↔this
␈↓ ↓X␈↓information can be derived from the system WHO line.
␈↓ ↓X␈↓In␈α∪TELNET,␈α∪etc.,␈α∪αβF␈α∪now␈α∪asks␈α∪for␈α∀a␈α∪≡lename␈α∪to␈α∪append␈α∪to,␈α∪rather␈α∪than␈α∪using␈α∀the␈α∪name
␈↓ ↓X␈↓remembered from an earlier ⊗D as βF does. ⊗<form> puts a formfeed in the output ≡le, if any.
␈↓ ↓X␈↓CONTROL-R in the line editor repeats the last CONTROL-S or CONTROL-K.
␈↓ ↓X␈↓Add VOD to the device list.
␈↓ ↓X␈↓New commands DRD (runs DIRED) and PARRY (runs PARRY).
␈↓ ↓X␈↓The␈α∂NET,GUE␈α∞guest␈α∂account␈α∂no␈α∞longer␈α∂exists.␈α∞ However,␈α∂although␈α∂this␈α∞fact␈α∂is␈α∂documented,␈α∞the
␈↓ ↓X␈↓information about the guest account is still included in case They change Their mind again.
␈↓ ↓X␈↓MAIL,␈α⊃SEND,␈α⊂GRIPE,␈α⊃TYPE,␈α⊃PARRY,␈α⊂and␈α⊃DIRECTORY␈α⊃commands␈α⊂may␈α⊃be␈α⊃given␈α⊂without
␈↓ ↓X␈↓being logged in.
␈↓ ↓X␈↓↓(The␈αabove␈αlist␈αdoes␈αnot␈αmention␈αexplicitly␈αsecondary␈αchanges␈αimplied␈αby␈αthe␈αabove,␈αe.g.,␈αchanges␈αto␈αthe
␈↓ ↓X␈↓↓error messages or monitor command summary appendices.)
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 1␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧The ≡rst sentence of the third paragraph on page 4 (section 1.3) should be replaced as follows:
␈↓ ↓X␈↓A␈αvacant␈αterminal␈αshould␈αsay␈α␈↓αTAKE␈αME␈αI'M␈αYOURS!␈↓␈αalong␈αwith␈αa␈αline␈αof␈αcryptic␈αinformation␈αon␈αan
␈↓ ↓X␈↓otherwise blank screen. The cryptic information is the ␈↓↓system WHO line,␈↓ described on page 17.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧The␈α∂following␈α∂lines␈α∂should␈α∂be␈α∂added␈α∂to␈α∂the␈α⊂device␈α∂table␈α∂on␈α∂page␈α∂7␈α∂(section␈α∂1.5)␈α∂The␈α⊂old␈α∂AD
␈↓ ↓X␈↓∧device is still present but not for long.
␈↓ ↓X␈↓β␈↓ ↓xIMP␈↓ βλInterface Message Processor for ARPA network connections
␈↓ ↓X␈↓β␈↓ ↓xADC␈↓ βλAnalog to digital converter
␈↓ ↓X␈↓β␈↓ ↓xDAC␈↓ βλDigital to analog converter
␈↓ ↓X␈↓β␈↓ ↓xVOD␈↓ βλVoder (speech synthesizer)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On page 14 (section 2.2, line editor), add this after the paragraph about CONTROL-K:
␈↓ ↓X␈↓CONTROL-R␈αrepeats␈αthe␈αlast␈αCONTROL-S␈αor␈αCONTROL-K␈αcommand␈αgiven␈αwhile␈αediting␈αthe
␈↓ ↓X␈↓current␈α⊃line.␈α∩ It␈α⊃does␈α∩not␈α⊃use␈α⊃the␈α∩following␈α⊃character␈α∩as␈α⊃an␈α⊃argument,␈α∩since␈α⊃it␈α∩remembers␈α⊃the
␈↓ ↓X␈↓argument from the CONTROL-S or CONTROL-K command. (Inside only.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α
page␈α18␈α
(section␈α2.5,␈α
WHO␈αline),␈α
in␈α
the␈αparagraph␈α
about␈αXTIME,␈α
change␈αthe␈α
last␈αsentence␈α
to
␈↓ ↓X␈↓∧``␈↓... will be ␈↓α"␈↓ instead of ␈↓α'␈↓ as it usually is.␈↓∧''
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add␈αthe␈αfollowing␈αparagraph␈αto␈αthe␈αdescription␈αof␈αthe␈αaudio␈αswitch␈αescape␈αcommands␈αon␈αpage
␈↓ ↓X␈↓∧21 (section 2.9):
␈↓ ↓X␈↓Your␈α∪program␈α∩can␈α∪control␈α∪the␈α∩audio␈α∪switch␈α∩selection␈α∪for␈α∪your␈α∩terminal␈α∪by␈α∪UUO.␈α∩ Although
␈↓ ↓X␈↓programs␈αcannot␈αin␈αgeneral␈αchange␈αthe␈αaudio␈αswitch␈αsetting␈αfor␈αanother␈αterminal,␈αthere␈αis␈αa␈αBEEP
␈↓ ↓X␈↓UUO␈αwhich␈αcan␈αbe␈α
used␈αto␈αcause␈αany␈α
terminal's␈αloudspeaker␈αto␈αbe␈α
connected␈αto␈αthe␈αbeep␈α
generator
␈↓ ↓X␈↓for␈α⊂a␈α∂short␈α⊂time␈α∂(less␈α⊂than␈α∂one␈α⊂second).␈α⊂ This␈α∂is␈α⊂used␈α∂by,␈α⊂e.g.,␈α∂the␈α⊂SEND␈α∂command␈α⊂to␈α⊂call␈α∂the
␈↓ ↓X␈↓recipient's␈αattention␈α
to␈αa␈α
message␈αon␈α
his␈αscreen.␈α
You␈αcan␈α
permit␈αor␈α
refuse␈αsuch␈α
beep␈αconnections␈α
by
␈↓ ↓X␈↓UUO␈αor␈αby␈αescape␈α
commands;␈αBREAK␈αB␈αrefuses␈α
beeps,␈αand␈αESC␈αB␈α
permits␈αthem.␈α Any␈αchange␈α
to
␈↓ ↓X␈↓your␈αaudio␈αswitch␈αsetting␈αby␈αother␈αmeans␈α(e.g.␈αESC␈αU)␈αalso␈αcancels␈αthe␈αe≥ect␈αof␈αBREAK␈αB,␈αso␈αyou
␈↓ ↓X␈↓must repeat the BREAK B command after changing your selection.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 2␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following paragraph to section 4.2, page 24:
␈↓ ↓X␈↓If␈α
your␈α
core␈α
image␈α
includes␈α
an␈α
upper␈α
segment␈α
(see␈α
page␈α
11),␈α
you␈α
can␈α
set␈α
or␈α
clear␈α
the␈αwrite␈α
protection
␈↓ ↓X␈↓bit␈αwith␈αthe␈αSETUWP␈αor␈αCLRUWP␈αcommands.␈α You␈αcannot␈αclear␈αwrite␈αprotection␈αfor␈αa␈αsharable
␈↓ ↓X␈↓upper␈α
segment␈α
if␈α∞it␈α
is␈α
protected␈α
against␈α∞you.␈α
(See␈α
the␈α
␈↓↓UUO␈α∞Manual␈↓␈α
for␈α
a␈α
complete␈α∞discussion␈α
of
␈↓ ↓X␈↓upper␈αsegment␈αprotection.)␈αThese␈αcommands␈αalso␈αtake␈αan␈αoptional␈αoctal␈αargument,␈αwhich␈αis␈αused␈αto
␈↓ ↓X␈↓set the protection code for the segment if you are permitted to change the code.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following sentence to the description of the START command on page 25 (section 4.3):
␈↓ ↓X␈↓If␈α⊃the␈α⊂octal␈α⊃argument␈α⊃is␈α⊂preceded␈α⊃by␈α⊂␈↓α+␈↓␈α⊃or␈α⊃␈↓α-␈↓,␈α⊂the␈α⊃number␈α⊂is␈α⊃added␈α⊃to␈α⊂or␈α⊃subtracted␈α⊃from␈α⊂the
␈↓ ↓X␈↓program's normal starting address to determine the desired starting address.
␈↓ ↓X␈↓∧Also␈α∞add␈α∂the␈α∞following␈α∂sentence␈α∞to␈α∂the␈α∞description␈α∞of␈α∂the␈α∞REENTER␈α∂command␈α∞on␈α∂the␈α∞same
␈↓ ↓X␈↓∧page:
␈↓ ↓X␈↓An␈α
octal␈αargument␈α
preceded␈αby␈α
␈↓α+␈↓␈α(optional␈α
in␈αthis␈α
case)␈αor␈α
␈↓α-␈↓␈αwill␈α
be␈αadded␈α
to␈αor␈α
subtracted␈αfrom
␈↓ ↓X␈↓the reenter address.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following sentence to the description of the FORK command on page 26 (section 4.4):
␈↓ ↓X␈↓If␈α∞the␈α∞system's␈α∞job␈α
capacity␈α∞is␈α∞used␈α∞up,␈α∞so␈α
that␈α∞it␈α∞is␈α∞impossible␈α∞to␈α
start␈α∞a␈α∞new␈α∞job,␈α∞your␈α
terminal
␈↓ ↓X␈↓remains attached to the existing job.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 3␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the description of the ASSIGN command on page 27 (section 4.5):
␈↓ ↓X␈↓Non-local␈α
guest␈αaccount␈α
users␈α
(see␈αLOGIN,␈α
section␈α5.1)␈α
cannot␈α
use␈αmost␈α
non-sharable␈αdevices,␈α
either
␈↓ ↓X␈↓by␈α
program␈α
request␈αor␈α
by␈α
the␈α
ASSIGN␈αcommand.␈α
Since␈α
there␈α
is␈αno␈α
operator␈α
on␈α
this␈αsystem,␈α
remote
␈↓ ↓X␈↓users␈αhave␈αno␈αway␈αto␈αmount␈αtapes,␈αcollect␈αlistings,␈αetc.;␈αhence,␈αthe␈αmonitor␈αdoes␈αnot␈αallow␈αsuch␈α
users
␈↓ ↓X␈↓to attempt I/O on those devices.
␈↓ ↓X␈↓The␈αASSIGN␈αcommand␈αis␈αused␈αin␈α
a␈αspecial␈αway␈αfor␈αUser␈αDisk␈α
Packs.␈α A␈αUDP␈αmay␈αbe␈αused␈α
as␈αa
␈↓ ↓X␈↓␈↓↓public␈↓␈αor␈αa␈α␈↓↓private␈↓␈αdevice.␈α In␈α
the␈αformer␈αcase,␈αother␈αjobs␈αmay␈α
use␈αthe␈αsame␈αUDP␈αat␈αthe␈αsame␈α
time,
␈↓ ↓X␈↓as␈α
with␈αthe␈α
system␈α
≡le␈αdisks.␈α
A␈α
privately␈αassigned␈α
UDP,␈α
however,␈αis␈α
restricted␈α
to␈αthe␈α
one␈αjob␈α
which
␈↓ ↓X␈↓assigned␈α∞it.␈α∞ (Note:␈α∞a␈α∞privately␈α∞assigned␈α∞UDP␈α∞is␈α∂still␈α∞a␈α∞␈↓↓sharable␈↓␈α∞device,␈α∞in␈α∞the␈α∞sense␈α∞that␈α∂the␈α∞job
␈↓ ↓X␈↓which␈α
owns␈α
it␈α
can␈α
operate␈α
on␈αseveral␈α
≡les␈α
simultaneously,␈α
unlike␈α
non-sharable␈α
devices␈αlike␈α
DECtape
␈↓ ↓X␈↓drives,␈α⊃on␈α∩which␈α⊃only␈α∩one␈α⊃operation␈α∩can␈α⊃be␈α∩in␈α⊃progress␈α∩at␈α⊃any␈α∩time.)␈α⊃A␈α∩UDP␈α⊃is␈α∩normally␈α⊃a
␈↓ ↓X␈↓≡le-structured␈αdevice,␈αwith␈αa␈αdirectory␈αstructure␈αjust␈αlike␈αthe␈αone␈αdescribed␈αfor␈αthe␈αmain␈α≡le␈αdisk␈αin
␈↓ ↓X␈↓section␈α∩1.5.␈α∩ However,␈α∩it␈α∩is␈α∩also␈α∩possible␈α∩to␈α∩use␈α∩a␈α∩UDP␈α∩as␈α∩an␈α∩unstructured␈α∩device,␈α∪in␈α∩which
␈↓ ↓X␈↓allocation␈αof␈αstorage␈αon␈αthe␈αdisk␈αpack␈αis␈αdone␈αexplicitly␈αby␈αthe␈αuser␈αprogram.␈α This␈αmode␈αof␈αusing
␈↓ ↓X␈↓the␈α
UDP␈α∞is␈α
called␈α∞␈↓↓old␈↓␈α
mode␈α∞(because␈α
it␈α∞used␈α
to␈α
be␈α∞the␈α
only␈α∞mode␈α
available).␈α∞ The␈α
format␈α∞of␈α
the
␈↓ ↓X␈↓ASSIGN command for a UDP is
␈↓ ↓X␈↓αASSIGN mode UDPn logical-name
␈↓ ↓X␈↓The optional mode argument can be
␈↓ ↓X␈↓β␈↓ ↓xPUBLIC␈↓ βλpublic access, file structured UDP
␈↓ ↓X␈↓β␈↓ ↓xPRIVATE␈↓ βλprivate access, file structured UDP
␈↓ ↓X␈↓β␈↓ ↓xOLD␈↓ βλprivate access, non-structured UDP
␈↓ ↓X␈↓The␈α∂default␈α∞mode␈α∂is␈α∞PUBLIC.␈α∂ A␈α∞later␈α∂ASSIGN␈α∞command␈α∂for␈α∞the␈α∂same␈α∞device␈α∂can␈α∞be␈α∂used␈α∞to
␈↓ ↓X␈↓change␈α
the␈α
mode␈α
from␈α
PRIVATE␈α
to␈α
PUBLIC,␈α
or␈α
from␈α
PUBLIC␈α
to␈α
PRIVATE␈α
if␈α
no␈α
other␈α
jobs
␈↓ ↓X␈↓are␈α⊂using␈α⊂the␈α∂device.␈α⊂ However,␈α⊂to␈α∂change␈α⊂into␈α⊂or␈α⊂out␈α∂of␈α⊂OLD␈α⊂mode,␈α∂the␈α⊂device␈α⊂must␈α⊂≡rst␈α∂be
␈↓ ↓X␈↓deassigned␈α
by␈αall␈α
jobs␈α
using␈αit.␈α
This␈αis␈α
because␈α
a␈αparticular␈α
pack␈αeither␈α
is␈α
or␈αisn't␈α
formatted␈αfor␈α
≡le
␈↓ ↓X␈↓structured␈α∞use,␈α∞and␈α∞the␈α∞mode␈α∞given␈α∞in␈α∞the␈α∞ASSIGN␈α∞command␈α∞must␈α∞agree␈α∞with␈α∞that␈α∞of␈α∞the␈α
pack
␈↓ ↓X␈↓itself.␈α (A␈αmismatch␈αis␈αnot␈αdetected␈αwhen␈αyou␈α
give␈αthe␈αASSIGN␈αcommand,␈αbut␈αwill␈αbe␈αcaught␈α
when
␈↓ ↓X␈↓your␈αprogram␈αactually␈αtries␈αto␈αuse␈αthe␈αdevice.)␈αThe␈αonly␈αexception␈αis␈αthat␈αa␈αformatted␈αpack␈αmay␈αbe
␈↓ ↓X␈↓read, but not written, in OLD mode.
␈↓ ↓X␈↓Although␈α∂we␈α∂have␈α∂only␈α∂one␈α⊂disk␈α∂drive␈α∂for␈α∂user␈α∂packs␈α⊂at␈α∂present,␈α∂the␈α∂monitor␈α∂provides␈α⊂for␈α∂the
␈↓ ↓X␈↓possibility␈α∪of␈α∪several␈α∪such␈α∪drives,␈α∪and␈α∪treats␈α∪␈↓αUDP␈↓␈α∪as␈α∪a␈α∪generic␈α∪device␈α∪name.␈α∀ The␈α∪command
␈↓ ↓X␈↓␈↓αASSIGN UDP␈↓␈α⊂will␈α⊂select␈α∂a␈α⊂drive␈α⊂only␈α∂if␈α⊂it␈α⊂is␈α⊂not␈α∂in␈α⊂use,␈α⊂although␈α∂a␈α⊂command␈α⊂which␈α⊂speci≡es␈α∂a
␈↓ ↓X␈↓particular␈α⊂drive␈α⊂(␈↓αASSIGN UDP1␈↓)␈α∂will␈α⊂succeed␈α⊂if␈α⊂the␈α∂drive␈α⊂is␈α⊂in␈α∂use␈α⊂but␈α⊂PUBLIC.␈α⊂ Unlike␈α∂other
␈↓ ↓X␈↓devices,␈α⊂the␈α∂UDP␈α⊂must␈α∂be␈α⊂ASSIGNed␈α∂before␈α⊂it␈α∂can␈α⊂be␈α∂used␈α⊂by␈α∂a␈α⊂program,␈α∂to␈α⊂ensure␈α⊂that␈α∂the
␈↓ ↓X␈↓proper mode is used. For more details on the use of user packs, see the ␈↓↓UUO Manual␈↓.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 4␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add this paragraph to the description of DEASSIGN on page 27:
␈↓ ↓X␈↓Because␈α
UDPs␈α∞can␈α
be␈α
assigned␈α∞in␈α
a␈α
way␈α∞which␈α
permits␈α
public␈α∞access,␈α
the␈α∞DEASSIGN␈α
command
␈↓ ↓X␈↓for␈α∩a␈α∩UDP␈α∩types␈α∩a␈α∩message␈α∩at␈α∩your␈α∩terminal␈α∩indicating␈α∩whether␈α∩or␈α∩not␈α∩the␈α∩pack␈α∪should␈α∩be
␈↓ ↓X␈↓dismounted.␈α If␈αyou␈αinterrupt␈αa␈αprogram␈αwhich␈αis␈αusing␈αa␈αUDP␈αand␈αdeassign␈αthe␈αUDP,␈αit␈αwill␈αstill
␈↓ ↓X␈↓be␈α∞considered␈α
in␈α∞use␈α
by␈α∞your␈α
program␈α∞until␈α
you␈α∞reset␈α
it␈α∞(for␈α
example,␈α∞by␈α
the␈α∞␈↓αCORE 0␈↓␈α
command).
␈↓ ↓X␈↓You will then be told that you may dismount the pack.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add this to the description of the PJOB command on page 27 (section 4.6):
␈↓ ↓X␈↓The␈αargument␈αcan␈αbe␈αa␈αname␈αof␈αthe␈αform␈α␈↓αDDn␈↓,␈αto␈α≡nd␈αout␈αwho␈αis␈αusing␈αData␈αDisc␈αchannel␈αn.␈α
You
␈↓ ↓X␈↓will␈α
be␈α
told␈α
the␈α
TTY␈α
line␈α
number,␈α
if␈α
any,␈α
as␈αwell␈α
as␈α
the␈α
job␈α
number.␈α
Also,␈α
if␈α
the␈α
argument␈α
is␈αa
␈↓ ↓X␈↓UDP,␈α
the␈αcommand␈α
may␈α
type␈αout␈α
␈↓αUDP1␈α
PUBLIC␈↓␈αif␈α
applicable,␈α
and␈αwill␈α
type␈α
a␈αjob␈α
number␈α
only␈αif
␈↓ ↓X␈↓that job has assigned the drive as PRIVATE or OLD.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following sentence to the description of the command ␈↓αTIME 0␈↓∧ on page 28 (section 4.6):
␈↓ ↓X␈↓It␈αalso␈α
types␈αthe␈α
percentage␈αspent␈α
in␈αthe␈αmonitor␈α
at␈αinterrupt␈α
level,␈αbut␈α
this␈αinformation␈αis␈α
provided
␈↓ ↓X␈↓for the bene≡t of system wizards and is not particularly meaningful to users.
␈↓ ↓X␈↓∧Also, add this to the description of the DAYTIME command on that page:
␈↓ ↓X␈↓If␈α
the␈αjob␈α
has␈αbeen␈α
logged␈α
in␈αsince␈α
the␈αprevious␈α
day,␈αdates␈α
(day␈α
of␈αthe␈α
month)␈αare␈α
typed␈αalong␈α
with
␈↓ ↓X␈↓the three times.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 5␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the description of RESOURCES (page 28, section 4.6) with this:
␈↓ ↓X␈↓The␈αRESOURCES␈α
command␈αlists␈α
the␈αavailable␈α
system␈αresources:␈α
it␈αtypes␈α
the␈αnumber␈α
of␈αfree␈α
tracks
␈↓ ↓X␈↓on␈α⊂the␈α∂≡le␈α⊂disk,␈α⊂and␈α∂the␈α⊂names␈α∂of␈α⊂free␈α⊂devices␈α∂(mag␈α⊂tape,␈α∂etc.)␈α⊂other␈α⊂than␈α∂the␈α⊂disk,␈α⊂IMP,␈α∂and
␈↓ ↓X␈↓terminals.␈α∂ A␈α∞separate␈α∂line␈α∂is␈α∞typed␈α∂for␈α∂each␈α∞UDP␈α∂drive␈α∞(currently␈α∂there␈α∂is␈α∞only␈α∂one)␈α∂unless␈α∞the
␈↓ ↓X␈↓drive␈α
is␈α
detached␈αfrom␈α
the␈α
system␈αor␈α
being␈α
used␈αfor␈α
swapping.␈α
The␈αline␈α
contains␈α
just␈α
the␈αdevice
␈↓ ↓X␈↓name␈αif␈αthe␈α
drive␈αis␈αfree;␈α
otherwise␈αit␈αindicates␈α
whether␈αit␈αis␈α
␈↓αPUBLIC␈↓␈αor␈α␈↓αPRIVATE␈↓;␈α
if␈αthe␈αdrive␈αhas␈α
a
␈↓ ↓X␈↓≡le-structured␈αpack␈αmounted,␈αits␈αname␈α(volume␈αID)␈αand␈αthe␈αnumber␈αof␈αfree␈αtracks,␈αas␈αfor␈αthe␈αDSK
␈↓ ↓X␈↓device,␈αwill␈αbe␈α
typed␈αif␈αknown␈α
to␈αthe␈αmonitor.␈α
(That␈αis,␈αthe␈α
name␈αwill␈αbe␈α
typed␈αif␈αany␈α
input/output
␈↓ ↓X␈↓operation has actually happened on that pack since it was mounted.)
␈↓ ↓X␈↓∧Also,␈α∩add␈α∩this␈α∩to␈α∩the␈α∩FILES␈α∩description␈α∪in␈α∩the␈α∩next␈α∩paragraph,␈α∩after␈α∩the␈α∩sentence␈α∪``␈↓...␈α∩for
␈↓ ↓X␈↓end-of-≡le seen.␈↓∧''
␈↓ ↓X␈↓The letter U indicates that the ≡le is on a UDP.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 6␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace␈αthe␈αlast␈αparagraph␈αon␈αpage␈α30␈αand␈αthe␈α≡rst␈αparagraph␈αon␈αpage␈α31␈α(section␈α5.1,␈αLOGIN)
␈↓ ↓X␈↓∧as follows:
␈↓ ↓X␈↓It␈α
is␈α
possible␈α
to␈α
set␈α
a␈α
password␈α
and␈α
≡le␈α
protection␈α
codes␈α
to␈α
restrict␈α
access␈α
to␈α
a␈α
particular␈α
PPN.␈α If␈α
the
␈↓ ↓X␈↓PPN␈α∂you␈α∂specify␈α∂to␈α∂LOGIN␈α∂has␈α∂a␈α∂password,␈α∂LOGIN␈α∂types␈α∂␈↓αPassword=␈↓␈α∂and␈α∂you␈α∂must␈α∂type␈α∞the
␈↓ ↓X␈↓correct␈α∂password␈α∂to␈α∂log␈α∂in.␈α∂ Echoing␈α∂of␈α∂input␈α∞characters␈α∂is␈α∂turned␈α∂o≥␈α∂so␈α∂the␈α∂password␈α∂does␈α∞not
␈↓ ↓X␈↓print.␈α Passwords␈α
may␈αbe␈αone␈α
to␈αsix␈α
letters␈αor␈αdigits␈α
followed␈αby␈αRETURN.␈α
To␈αprotect␈α
≡les␈αfrom
␈↓ ↓X␈↓unauthorized␈α∂access,␈α∂there␈α∂is␈α⊂a␈α∂protection␈α∂code␈α∂associated␈α∂with␈α⊂each␈α∂≡le.␈α∂ The␈α∂code␈α⊂speci≡es␈α∂the
␈↓ ↓X␈↓access␈α⊃allowed␈α⊃to␈α⊂the␈α⊃≡le␈α⊃for␈α⊃its␈α⊂owner␈α⊃(i.e.,␈α⊃a␈α⊂user␈α⊃logged␈α⊃in␈α⊃under␈α⊂the␈α⊃≡le's␈α⊃PPN),␈α⊃for␈α⊂other
␈↓ ↓X␈↓authorized␈αAI␈α
Lab␈αusers,␈αand␈α
for␈αguest␈αusers␈α
who␈αare␈α
logged␈αin␈αremotely␈α
(from␈αthe␈αARPA␈α
network,
␈↓ ↓X␈↓dial-up␈αtelephone␈αlines,␈α
or␈αcampus␈αterminals).␈α
You␈αcan␈αset␈α
the␈αprotection␈αcode␈α
for␈αa␈α≡le␈α
using␈αthe
␈↓ ↓X␈↓COPY␈α∪program␈α∩(see␈α∪Appendix␈α∩2).␈α∪ However,␈α∩you␈α∪must␈α∩use␈α∪the␈α∩LOGIN␈α∪program␈α∩to␈α∪set␈α∩the
␈↓ ↓X␈↓protection␈α
code␈αof␈α
your␈α
≡le␈αdirectory␈α
itself,␈αand␈α
the␈α
default␈αprotection␈α
code␈α
which␈αis␈α
assigned␈αto␈α
new
␈↓ ↓X␈↓≡les␈αcreated␈αin␈αyour␈αdirectory␈αif␈αthe␈αprogram␈αwriting␈αthe␈α≡le␈αdoes␈αnot␈αspecify␈αa␈αvalue␈αexplicitly.␈α If
␈↓ ↓X␈↓you␈α
use␈α
%␈αas␈α
the␈α
delimiter␈αbetween␈α
the␈α
project␈αand␈α
programmer␈α
names␈αwhen␈α
you␈α
log␈α
in,␈αLOGIN
␈↓ ↓X␈↓will␈αgive␈αyou␈α
the␈αopportunity␈αto␈α
change␈αyour␈αpassword,␈α
the␈α≡le␈αdirectory␈α
protection,␈αand␈αthe␈α
default
␈↓ ↓X␈↓protection␈α∞for␈α∞new␈α∂≡les.␈α∞ The␈α∞protection␈α∂codes␈α∞are␈α∞entered␈α∞as␈α∂three-digit␈α∞octal␈α∞numbers,␈α∂with␈α∞the
␈↓ ↓X␈↓following meanings:
␈↓ ↓X␈↓β␈↓ ↓xBit␈↓ α8Meaning in directory protection code␈↓ π_Meaning in file protection code
␈↓ ↓X␈↓β␈↓ ↓x400␈↓ α8password is for remote logins only (see below)␈↓ π_don't dump this file (see DART, Appendix 5)
␈↓ ↓X␈↓β␈↓ ↓x200␈↓ α8unused␈↓ π_delete protect (see COPY, Appendix 2)
␈↓ ↓X␈↓β␈↓ ↓x100␈↓ α8owner may not write files␈↓ π_owner may not overwrite this file
␈↓ ↓X␈↓β␈↓ ↓x040␈↓ α8local users may not change protection of files␈↓ π_... of this file
␈↓ ↓X␈↓β␈↓ ↓x020␈↓ α8local users may not read directory or any files␈↓ π_... read this file
␈↓ ↓X␈↓β␈↓ ↓x010␈↓ α8local users may not write any files␈↓ π_... overwrite this file
␈↓ ↓X␈↓β␈↓ ↓x004␈↓ α8guest users may not change protection of files␈↓ π_... of this file
␈↓ ↓X␈↓β␈↓ ↓x002␈↓ α8guest users may not read directory or any files␈↓ π_... read this file
␈↓ ↓X␈↓β␈↓ ↓x001␈↓ α8guest users may not write any files␈↓ π_... overwrite this file
␈↓ ↓X␈↓If␈α
the␈α
400␈α
bit␈αis␈α
on␈α
in␈α
the␈α
protection␈αcode␈α
for␈α
a␈α
≡le␈α
directory,␈αthe␈α
password␈α
associated␈α
with␈αthat␈α
area
␈↓ ↓X␈↓is␈α
used␈α
only␈α
for␈α
logins␈α
from␈α
a␈α
remote␈α
site;␈α
no␈α
password␈α
will␈α
be␈α
required␈α
for␈α
local␈α
login␈α
on␈α
that␈α
PPN.
␈↓ ↓X␈↓Except␈α∞for␈α
the␈α∞special␈α
␈↓αNET,GUE␈↓␈α∞guest␈α
account␈α∞(see␈α∞below),␈α
remote␈α∞login␈α
is␈α∞not␈α
allowed␈α∞on␈α∞a␈α
PPN
␈↓ ↓X␈↓which␈αdoes␈αnot␈α
have␈αa␈αpassword;␈α
thus,␈αif␈αyou␈α
want␈αto␈αbe␈α
able␈αto␈αlog␈α
in␈αremotely␈αbut␈α
do␈αnot␈αwant␈α
to
␈↓ ↓X␈↓have␈αto␈αtype␈αa␈αpassword␈αfor␈αlocal␈αlogin,␈αyou␈αcan␈αset␈αthe␈α400␈αbit␈αin␈αyour␈αdirectory's␈αprotection␈αcode.
␈↓ ↓X␈↓Remote␈α∂users␈α⊂without␈α∂accounts␈α⊂on␈α∂the␈α∂system␈α⊂can␈α∂log␈α⊂in␈α∂as␈α∂␈↓αNET,GUE␈↓␈α⊂(network␈α∂guest)␈α⊂without␈α∂a
␈↓ ↓X␈↓password.␈α (Instead,␈α
if␈αyou␈αlog␈α
in␈αas␈α
␈↓αNET,GUE␈↓␈αyou␈αwill␈α
be␈αasked␈α
to␈αtype␈αin␈α
your␈αname.␈α
Any␈αname
␈↓ ↓X␈↓you␈αgive␈αis␈αaccepted␈αand␈αstored␈αto␈αidentify␈αyour␈αjob␈αas␈αlong␈αas␈αyou␈αremain␈αlogged␈αin;␈αthe␈αFINGER
␈↓ ↓X␈↓command␈α
(see␈αSection␈α
5.11)␈α
will␈αtype␈α
the␈α
name␈αyou␈α
give␈α
to␈αidentify␈α
you␈α
to␈αother␈α
users.)␈α
It␈αis␈α
possible
␈↓ ↓X␈↓to␈α
set␈α
up␈α
special␈α
guest␈α
accounts␈α
without␈α
the␈α
password␈α
requirement␈α
for␈α
use␈α
by␈α
speci≡c␈α
AI␈αLab␈α
project
␈↓ ↓X␈↓groups; consult a system programmer for more information on this.
␈↓ ↓X␈↓(Note:␈αat␈α
the␈αpresent␈α
time␈αthe␈α
NET,GUE␈αaccount␈α
has␈αbeen␈α
discontinued,␈αbecause␈α
it␈αwas␈α
using␈αtoo
␈↓ ↓X␈↓much␈αcomputer␈αtime.␈α People␈αwho␈αare␈αnot␈αauthorized␈αusers␈αcannot␈αlog␈αin␈αremotely.␈α A␈αfew␈αmonitor
␈↓ ↓X␈↓commands are allowed without login, as mentioned in the individual command descriptions.)
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 7␈↓
␈↓ ↓X␈↓Users␈α
with␈αaccess␈α
to␈αlocal␈α
terminals␈αwho␈α
sometimes␈αneed␈α
to␈αlog␈α
in␈αremotely␈α
can␈αset␈α
a␈αpassword␈α
(with
␈↓ ↓X␈↓%)␈α∩for␈α∩their␈α∩own␈α∩PPNs;␈α∩remote␈α∩users␈α∩who␈α∩want␈α∩to␈α∩establish␈α∩their␈α∩own␈α∩≡le␈α∩directories␈α⊃should
␈↓ ↓X␈↓communicate␈α∂with␈α∂Lester␈α∞Earnest.␈α∂ (Type␈α∂eth␈α∞command␈α∂␈↓αMAIL␈α∂LES␈↓.)␈α∞Sometimes␈α∂you␈α∂may␈α∂≡nd␈α∞the
␈↓ ↓X␈↓system␈αis␈αin␈α␈↓↓maintenance␈αmode,␈↓␈αwhich␈αmeans␈αthat␈αthe␈αmonitor␈αis␈αbeing␈αdebugged␈αand␈αthe␈αsystem␈αis
␈↓ ↓X␈↓not␈α⊃available␈α⊃for␈α⊃normal␈α⊃use.␈α⊃ If␈α⊂you␈α⊃try␈α⊃to␈α⊃log␈α⊃in␈α⊃at␈α⊃such␈α⊂a␈α⊃time␈α⊃you␈α⊃will␈α⊃be␈α⊃asked␈α⊃for␈α⊂the
␈↓ ↓X␈↓maintenance password.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Change the reference to ␈↓APE␈↓∧ on page 32 (section 5.1, LOGIN) to ␈↓NS␈↓∧.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following at the end of the LOGOUT description (page 33, section 5.2):
␈↓ ↓X␈↓Any␈αof␈αthese␈αcommands,␈αwhen␈αtyped␈αat␈αa␈αPTY␈αwhich␈αis␈αnot␈αowned␈αby␈αa␈αTELNET␈αserver␈α(that␈αis,
␈↓ ↓X␈↓not␈α⊂the␈α⊃virtual␈α⊂terminal␈α⊃of␈α⊂an␈α⊂ARPA␈α⊃network␈α⊂user),␈α⊃simply␈α⊂kills␈α⊂the␈α⊃job␈α⊂without␈α⊃running␈α⊂the
␈↓ ↓X␈↓LOGOUT program. This has approximately the e≥ect of KJOB/F.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the table of E commands on page 33 (section 5.3):
␈↓ ↓X␈↓β␈↓ ↓xREAD␈↓ βλedit with E in book mode
␈↓ ↓X␈↓∧Also, the second line of the table of compile-type RPG commands should be:
␈↓ ↓X␈↓β␈↓ ↓xLOAD␈↓ βλcompile and load programs
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Delete␈α
␈↓αHELP␈↓∧␈α
from␈α
the␈α
list␈α
of␈α
COPY␈α∞commands.␈α
(There␈α
is␈α
now␈α
a␈α
separate␈α
HELP␈α∞program␈α
for
␈↓ ↓X␈↓∧this command.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the last paragraph on page 34 (section 5.4, COPY and SPOOL) with this:
␈↓ ↓X␈↓The␈αcommands␈αin␈αthis␈αsection␈αall␈αrequire␈αthat␈αyou␈αbe␈αlogged␈αin,␈αexcept␈αfor␈αTYPE,␈αDIRECTORY,
␈↓ ↓X␈↓and QSPOOL.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 8␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add this to the table of MAIL commands on page 35 (section 5.5):
␈↓ ↓X␈↓β␈↓ ↓xPLAN␈↓ βλcreate plan file for FINGER (see page 40)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the last paragraph of section 5.5 (MAIL, page 35) with this:
␈↓ ↓X␈↓The␈αcommands␈αin␈αthis␈αsection␈αall␈αrequire␈αthat␈αyou␈αbe␈αlogged␈αin,␈αexcept␈αfor␈αMAIL,␈αSEND,␈αGRIPE,
␈↓ ↓X␈↓and RCV.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In␈αthe␈αtable␈α
of␈αspecial␈αcharacters␈α
for␈αDO␈α(section␈α5.7,␈α
page␈α36),␈αthe␈α
description␈αof␈α?␈α
should␈αsay
␈↓ ↓X␈↓∧``␈↓αDO types out "A= " and waits␈↓∧...'' rather than ␈↓α?A␈↓∧.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the last paragraph of section 5.8 (ZERO, page 37) with this:
␈↓ ↓X␈↓The␈α
ZERO␈αprogram␈α
is␈αnot␈α
used␈αfor␈α
new-format␈α(≡le␈α
structured)␈αUDPs.␈α
It␈αcan␈α
be␈αused␈α
to␈αchange
␈↓ ↓X␈↓the␈α
password␈α
of␈α
an␈α
old-format␈αUDP,␈α
and␈α
also␈α
allows␈α
the␈α
initialization␈αon␈α
such␈α
a␈α
UDP␈α
of␈α
the␈α≡le
␈↓ ↓X␈↓structure␈α∪formerly␈α∪used␈α∪by␈α∩the␈α∪COPY␈α∪program,␈α∪although␈α∩this␈α∪feature␈α∪is␈α∪now␈α∪obsolete.␈α∩ The
␈↓ ↓X␈↓UDPUFD command is used to set passwords and create ≡le directories on new-format UDPs.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following paragraph to the WHO command writeup (section 5.9, page 38):
␈↓ ↓X␈↓From␈αa␈αnon-display␈αterminal␈αonly,␈αthe␈αcommand␈α␈↓αWHO/Q␈↓␈αwill␈αtype␈αonly␈αPPN␈αand␈αTTY␈αfor␈αeach␈αjob
␈↓ ↓X␈↓which␈α∂is␈α∂not␈α⊂detached.␈α∂ ARPA␈α∂network␈α⊂users␈α∂are␈α∂listed␈α∂separately.␈α⊂ This␈α∂is␈α∂intended␈α⊂for␈α∂Quick
␈↓ ↓X␈↓typeout.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the description of FINGER on page 40 (section 5.11):
␈↓ ↓X␈↓If␈α
the␈α
programmer␈α
speci≡ed␈α
as␈α
the␈α
argument␈α
to␈α
FINGER␈α
is␈α
not␈α
logged␈α
in,␈α
the␈α
program␈α
types␈αthe
␈↓ ↓X␈↓date␈α∞and␈α∂time␈α∞of␈α∞his␈α∂last␈α∞logout.␈α∞ Also,␈α∂if␈α∞he␈α∞has␈α∂created␈α∞a␈α∞plan␈α∂≡le␈α∞(with␈α∞the␈α∂PLAN␈α∞command,
␈↓ ↓X␈↓Appendix␈α∪4)␈α∪it␈α∪is␈α∀typed.␈α∪ FINGER␈α∪will␈α∪accept␈α∪human␈α∀being␈α∪names␈α∪as␈α∪argument␈α∀instead␈α∪of
␈↓ ↓X␈↓programmer names, if desired.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ 1 9␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the description of HELP on page 40 (section 5.11) with
␈↓ ↓X␈↓The␈α∞HELP␈α∞command␈α∞provides␈α∞information␈α∞about␈α∞system␈α∞programs␈α∞and␈α∞facilities.␈α∞ It␈α∞takes␈α∂as␈α∞its
␈↓ ↓X␈↓argument␈α⊃the␈α⊂name␈α⊃of␈α⊂some␈α⊃program␈α⊃or␈α⊂concept,␈α⊃and␈α⊂provides␈α⊃some␈α⊂short␈α⊃description␈α⊃of␈α⊂that
␈↓ ↓X␈↓facility,␈αif␈αsuch␈αa␈αdescription␈α
exists.␈α The␈αdata␈αfor␈αHELP␈α
comes␈αfrom␈αthe␈α[3,2]␈αdirectory;␈α
this␈αdata
␈↓ ↓X␈↓consists␈α∂mostly␈α∂of␈α∂short␈α∂text␈α∂≡les␈α∂which␈α∂are␈α∞typed␈α∂by␈α∂HELP,␈α∂but␈α∂may␈α∂also␈α∂include␈α∂programs␈α∞or
␈↓ ↓X␈↓monitor␈αcommands␈αwhich␈αHELP␈αwill␈αrun␈αfor␈αyou.␈α If␈αno␈αHELP␈αis␈αavailable,␈αbut␈αthere␈αis␈αa␈αlonger
␈↓ ↓X␈↓document␈α
available␈αin␈α
one␈α
of␈αthe␈α
standard␈α
documentation␈α≡le␈α
directories,␈α
HELP␈αwill␈α
so␈αinform␈α
you.
␈↓ ↓X␈↓If␈αyou␈α
type␈α␈↓αHELP␈↓␈αwith␈α
no␈αargument,␈αthe␈α
program␈αwill␈αlist␈α
the␈αtopics␈αon␈α
which␈αHELP␈α
is␈αavailable.
␈↓ ↓X␈↓(Some␈αof␈α
the␈αHELPers␈αwhich␈α
run␈αprograms␈αrather␈α
than␈αjust␈αtyping␈α
text␈αat␈αyou␈α
require␈αthat␈αyou␈α
be
␈↓ ↓X␈↓logged in. ␈↓αHELP LOGIN␈↓ is cleverly not among those.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the description of SYSTAT on page 40 (section 5.11) with
␈↓ ↓X␈↓The␈αSYSTAT␈αcommand␈αruns␈αthe␈αWHO␈αprogram␈α(see␈αsection␈α5.9).␈α The␈αold␈αSYSTAT␈αprogram␈αis
␈↓ ↓X␈↓no␈α∞longer␈α∞supported␈α∞on␈α∂this␈α∞system,␈α∞but␈α∞the␈α∞command␈α∂name␈α∞was␈α∞retained␈α∞for␈α∂compatibility␈α∞with
␈↓ ↓X␈↓other systems.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Change␈αthe␈αsentence␈α``␈↓Except␈αfor␈αFIXIMLAC␈α...␈↓∧''␈αin␈αthe␈α≡rst␈αparagraph␈αof␈αsection␈α5.12␈α(page␈α40)
␈↓ ↓X␈↓∧to␈α``␈↓Except␈αas␈αnoted␈αbelow,␈α
they␈αrequire␈αthat␈αyou␈αbe␈αlogged␈α
in.␈↓∧''␈αAlso␈αadd␈α``␈↓This␈αcommand␈α
may␈αbe
␈↓ ↓X␈↓given when not logged in.␈↓∧'' to the FIXIMLAC paragraph on the same page.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 10␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Delete␈αthe␈αsentence␈αbeginning␈α``␈↓If␈αyou␈αend␈αthe␈αcommand␈αline␈αwith␈αALT␈α...␈↓∧''␈αin␈αthe␈αdescription␈αof
␈↓ ↓X␈↓∧the␈αTELNET␈αcommand␈αon␈αpage␈α41␈α(section␈α5.12).␈α The␈αe≥ect␈αformerly␈αachieved␈αby␈αALT␈αis␈αnow
␈↓ ↓X␈↓∧used␈α⊗automatically␈α∃in␈α⊗all␈α∃cases.␈α⊗ Also,␈α⊗add␈α∃the␈α⊗following␈α∃paragraph␈α⊗after␈α⊗the␈α∃TELNET
␈↓ ↓X␈↓∧description:
␈↓ ↓X␈↓It␈α∃is␈α⊗possible␈α∃to␈α∃establish␈α⊗TELNET-like␈α∃connections␈α∃to␈α⊗remote␈α∃computers␈α∃by␈α⊗using␈α∃dial-up
␈↓ ↓X␈↓connections␈α∂via␈α∂the␈α∂dataphones␈α∞normally␈α∂used␈α∂for␈α∂incoming␈α∞dial-up␈α∂lines.␈α∂ Such␈α∂dataphones␈α∞are
␈↓ ↓X␈↓presently␈α∂associated␈α∂with␈α∂TTY10␈α∂and␈α∂TTY11;␈α∂the␈α∂dataphone␈α∂on␈α∂TTY11␈α∂includes␈α∂an␈α∂automatic
␈↓ ↓X␈↓dialing␈α∃circuit.␈α∃ The␈α⊗DIAL␈α∃command␈α∃will␈α∃establish␈α⊗an␈α∃outgoing␈α∃dataphone␈α⊗connection␈α∃and
␈↓ ↓X␈↓thereafter␈α∂behave␈α∂like␈α∂a␈α∂TELNET.␈α∂ The␈α∂dial␈α∞command␈α∂takes␈α∂as␈α∂its␈α∂argument␈α∂either␈α∂the␈α∞device
␈↓ ↓X␈↓name␈α∞of␈α∞a␈α∞TTY,␈α∞in␈α∞which␈α∞case␈α∞you␈α
must␈α∞dial␈α∞the␈α∞number␈α∞you␈α∞want␈α∞manually␈α∞on␈α∞the␈α
associated
␈↓ ↓X␈↓dataphone, or a telephone number in the form
␈↓ ↓X␈↓α{(ddd)}ddd{-}dddd
␈↓ ↓X␈↓where␈α␈↓αd␈↓␈αrepresents␈αa␈αdigit␈αand␈αbraces␈αenclose␈αoptional␈αcharacters.␈α In␈αthe␈αlatter␈αcase,␈αthe␈αtelephone
␈↓ ↓X␈↓number is dialed automatically on TTY11's dataphone.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the end of page 41 (section 5.12):
␈↓ ↓X␈↓The␈αNS␈αcommand␈αruns␈αthe␈αNews␈αService␈αprogram,␈αwhich␈αallows␈αaccess␈αto␈αnews␈αstories␈αwhich␈αhave
␈↓ ↓X␈↓been␈α
received␈α
from␈α
the␈αAssociated␈α
Press␈α
and␈α
New␈α
York␈αTimes␈α
news␈α
wires.␈α
The␈α
HOT␈αcommand
␈↓ ↓X␈↓runs␈α
the␈α
HOT␈α
program,␈α
which␈α
types␈α
AP␈α∞or␈α
NYT␈α
stories␈α
as␈α
they␈α
come␈α
in.␈α
These␈α∞commands␈α
are
␈↓ ↓X␈↓restricted␈α∂to␈α∂local␈α∞users␈α∂at␈α∂the␈α∞request␈α∂of␈α∂the␈α∞Associated␈α∂Press.␈α∂ Full␈α∞documentation␈α∂on␈α∂the␈α∞news
␈↓ ↓X␈↓service is contained in the ≡le NS.ME[S,DOC].
␈↓ ↓X␈↓The␈α
UDPUFD␈α
command␈α
runs␈α∞the␈α
UDPUFD␈α
program,␈α
which␈α
is␈α∞used␈α
to␈α
create␈α
or␈α
delete␈α∞user␈α
≡le
␈↓ ↓X␈↓directories␈αon␈α≡le-structured␈αuser␈αdisk␈αpacks.␈α The␈αcommand␈αformat␈αis␈α␈↓αUDPUFD␈αPRJ,PRG␈↓␈α
(you␈αmust
␈↓ ↓X␈↓≡rst␈αASSIGN␈αthe␈αUDP).␈α To␈αcreate␈αa␈αnew␈αdirectory,␈αyou␈αmust␈αknow␈αthe␈αpack␈αpassword;␈αto␈αchange
␈↓ ↓X␈↓or␈αdelete␈αa␈αdirectory␈αyou␈αmust␈αknow␈αits␈αpassword.␈α You␈αcan␈αchange␈αthe␈αdirectory's␈αpassword␈αor␈α≡le
␈↓ ↓X␈↓protection␈α
codes␈α
with␈α∞UDPUFD␈α
as␈α
you␈α
can␈α∞for␈α
the␈α
main␈α
≡le␈α∞disk␈α
with␈α
LOGIN␈α
(see␈α∞Section␈α
5.1).
␈↓ ↓X␈↓You␈αcan␈αdelete␈αa␈αdirectory␈αonly␈αif␈αit␈αis␈αempty.␈α This␈αis␈αa␈αprivileged␈αprogram,␈αand␈αthe␈α
command␈αis
␈↓ ↓X␈↓restricted to local users (as is the UDP itself).
␈↓ ↓X␈↓The␈αDRD␈αcommand␈α(not␈αrelated␈αto␈αthe␈αDepartment␈αof␈αRedundancy␈αDepartment)␈αruns␈αthe␈αDIRED
␈↓ ↓X␈↓program,␈α
for␈α
displaying␈α
and␈α∞manipulating␈α
≡le␈α
directories␈α
at␈α∞a␈α
Stanford␈α
display␈α
terminal.␈α∞ See␈α
the
␈↓ ↓X␈↓≡le DIRED.SGK[UP,DOC] for instructions.
␈↓ ↓X␈↓The␈α
PARRY␈αcommand␈α
runs␈αPARRY,␈α
the␈α
paranoid␈αmodel.␈α
It␈αmay␈α
be␈αused␈α
without␈α
being␈αlogged
␈↓ ↓X␈↓in.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 11␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to section 6, page 42:
␈↓ ↓X␈↓Privileges␈α
can␈α
be␈α
enabled␈αor␈α
disabled␈α
at␈α
any␈αtime.␈α
That␈α
is,␈α
for␈αeach␈α
job,␈α
the␈α
monitor␈αremembers
␈↓ ↓X␈↓the␈α⊂privileges␈α⊂to␈α⊂which␈α⊂the␈α⊂job␈α⊂is␈α⊂entitled␈α⊂as␈α⊂well␈α⊂as␈α⊂the␈α⊂ones␈α⊂which␈α⊂are␈α⊂presently␈α⊃active.␈α⊂ All
␈↓ ↓X␈↓privileges␈αto␈αwhich␈αyou␈αare␈αentitled␈αare␈αnormally␈α
activated␈αwhen␈αyou␈αlog␈αin,␈αbut␈αyou␈αmay␈αchoose␈α
to
␈↓ ↓X␈↓disable␈α
any␈αor␈α
all␈αfor␈α
safety␈αreasons.␈α
The␈α
ENABLE␈αand␈α
DISABLE␈αcommands,␈α
with␈αno␈α
arguments,
␈↓ ↓X␈↓turn␈α
on␈α
or␈α
o≥␈αall␈α
privileges␈α
to␈α
which␈α
you␈αare␈α
entitled.␈α
These␈α
commands␈αmay␈α
also␈α
be␈α
used␈α
with␈αa
␈↓ ↓X␈↓privilege␈αname␈αas␈αargument,␈αto␈αenable␈αor␈αdisable␈αspeci≡c␈αprivileges.␈α If␈αyou␈αhave␈αthe␈αPRI␈α
privilege,
␈↓ ↓X␈↓you␈α∞can␈α∞enable␈α
speci≡c␈α∞privileges␈α∞to␈α∞which␈α
you␈α∞are␈α∞not␈α∞entitled,␈α
except␈α∞that␈α∞privileges␈α∞which␈α
are
␈↓ ↓X␈↓intended␈α
only␈α
for␈αspeci≡c␈α
programs␈α
(XGP␈αfont␈α
compiler,␈α
service␈αlevel␈α
monitor)␈α
cannot␈α
be␈αenabled
␈↓ ↓X␈↓by any user.
␈↓ ↓X␈↓Also,␈α
a␈α
few␈αsystem␈α
programs␈α
intended␈αfor␈α
general␈α
use␈α
require␈αspecial␈α
privileges.␈α
Such␈αprograms␈α
are
␈↓ ↓X␈↓run␈α⊂by␈α⊂special␈α⊂commands␈α⊂(not␈α⊂R␈α⊂or␈α⊂RUN),␈α⊂and␈α⊂any␈α⊂attempt␈α⊂to␈α⊂modify␈α⊂your␈α⊂core␈α⊂image␈α∂while
␈↓ ↓X␈↓running such a program will disable the temporary privileges involved.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In␈αthe␈αdescription␈αof␈αthe␈αCETV␈αand␈αETV␈αcommands␈αon␈αpage␈α44␈α(appendix␈α1),␈αin␈αthe␈α
last␈αline
␈↓ ↓X␈↓∧of␈αthe␈αparagraph␈αnumbered␈α1,␈αthe␈αword␈α``␈↓of␈↓∧''␈αshould␈αbe␈α``␈↓if␈↓∧''.␈α Also,␈αdelete␈αthe␈αlast␈αsentence␈αin␈αthe
␈↓ ↓X␈↓∧last␈α∀paragraph␈α∀on␈α∃that␈α∀page,␈α∀numbered␈α∃3.␈α∀ (TMPCOR␈α∀≡les␈α∀for␈α∃each␈α∀job␈α∀are␈α∃now␈α∀saved
␈↓ ↓X␈↓∧separately for each alias used by that job.) Add the following paragraph at the end of the page:
␈↓ ↓X␈↓READ
␈↓ ↓X␈↓The␈αREAD␈αcommand␈αstarts␈α
E␈αin␈αa␈αspecial␈α
mode,␈αcalled␈α␈↓↓book␈αmode,␈↓␈αused␈α
to␈αread␈αlong␈α≡les␈α
over␈αan
␈↓ ↓X␈↓extended␈α⊂time␈α⊂period.␈α∂ In␈α⊂this␈α⊂mode,␈α⊂E␈α∂does␈α⊂several␈α⊂things␈α∂di≥erently␈α⊂from␈α⊂the␈α⊂normal␈α∂editing
␈↓ ↓X␈↓procedure:
␈↓ ↓X␈↓1.␈α
If␈α
there␈α
is␈α
a␈α
≡le␈α
with␈α
the␈α
name␈α
in␈α
the␈α
READ␈α
command,␈α
extension␈α
BKP,␈α
and␈α
PPN␈αmatching␈α
that
␈↓ ↓X␈↓given␈αin␈αthe␈αcommand,␈αyour␈αALIAS␈αPPN,␈αor␈αyour␈αlogin␈αPPN␈α(tried␈αin␈αthat␈αorder),␈αit␈αis␈αused␈αas␈αan
␈↓ ↓X␈↓RPG␈α≡le␈α
to␈αdetermine␈αwhere␈α
to␈αstart␈α
editing␈αthe␈αspeci≡ed␈α
≡le.␈α This␈α``bookmark''␈α
≡le␈αis␈α
not␈αdeleted
␈↓ ↓X␈↓by␈αLOGOUT,␈αso␈αyou␈αcan␈αcontinue␈αreading␈αat␈αa␈αlater␈αsession.␈α The␈α≡le,␈αif␈αfound,␈αis␈αupdated␈αwhen
␈↓ ↓X␈↓you exit from E; if there was no BKP ≡le, one is created on your (alias) area when you exit.
␈↓ ↓X␈↓2.␈α⊃ A␈α⊃READ␈α⊃command␈α⊃with␈α⊃no␈α⊃argument␈α∩uses␈α⊃RPG␈α⊃(TMPCOR)␈α⊃≡les␈α⊃as␈α⊃ETV␈α⊃does,␈α∩but␈α⊃the
␈↓ ↓X␈↓≡lename␈αused␈αis␈αdi≥erent,␈α
so␈αyou␈αcan␈αalternate␈αETV␈α
and␈αREAD␈αcommands␈αfor␈αdi≥erent␈α
≡les␈αwith
␈↓ ↓X␈↓no confusion.
␈↓ ↓X␈↓3. E does not allow you to modify the ≡le when using book mode.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 12␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Insert the following entry in the table of ``≡lehack selectors'' on page 58 (appendix 2, COPY):
␈↓ ↓X␈↓β␈↓ ↓xPLAN␈↓ βλ<pn>.PLN[2,2]␈↓ ¬HCurrent user's PLAN file
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In the paragraph about page lists on page 58 (appendix 2, COPY), add this:
␈↓ ↓X␈↓An␈αasterisk␈α
(␈↓α*␈↓)␈αmay␈αbe␈α
used␈αin␈αa␈α
page␈αlist␈αinstead␈α
of␈αthe␈α≡nal␈α
page␈αnumber,␈αto␈α
denote␈αthe␈αlast␈α
page,
␈↓ ↓X␈↓e.g., ␈↓αLIST COPY(3:*)␈↓ would list all but the ≡rst two pages of the ≡le COPY.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the paragraph on the User Disk Pack on page 59 (appendix 2, COPY) with this:
␈↓ ↓X␈↓COPY␈α⊃treats␈α⊃new-format␈α⊃(≡le␈α⊃structured)␈α⊃UDPs␈α∩like␈α⊃the␈α⊃main␈α⊃≡le␈α⊃disk.␈α⊃ The␈α∩old␈α⊃≡le-structure
␈↓ ↓X␈↓simulation which COPY provided for old-format UDPs is no longer available.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Insert this sentence in the paragraph about DECtapes on page 59 (appendix 2, COPY):
␈↓ ↓X␈↓The total ≡le capacity of a DECtape is about 71.4K words.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Insert the following on page 60 (appendix 2, COPY), before the ``Switches'' section:
␈↓ ↓X␈↓Spooling pseudo-devices:
␈↓ ↓X␈↓COPY␈α∞recognizes␈α∞two␈α
pseudo-device␈α∞names,␈α∞TPL:␈α∞and␈α
PGX:,␈α∞to␈α∞allow␈α
spooling␈α∞of␈α∞the␈α∞output␈α
of
␈↓ ↓X␈↓some␈α
copy␈α∞function␈α
to␈α∞the␈α
LPT␈α∞or␈α
XGP,␈α
respectively.␈α∞ These␈α
device␈α∞names␈α
may␈α∞be␈α
used␈α∞only␈α
in
␈↓ ↓X␈↓output␈α∩terms,␈α⊃and␈α∩may␈α⊃not␈α∩be␈α⊃used␈α∩with␈α⊃≡le␈α∩names.␈α⊃ COPY␈α∩creates␈α⊃a␈α∩≡le␈α⊃on␈α∩the␈α⊃[SPL,SYS]
␈↓ ↓X␈↓directory␈α
containing␈α
the␈α
desired␈α∞output,␈α
and␈α
enters␈α
a␈α∞spooling␈α
request␈α
for␈α
the␈α∞appropriate␈α
device.
␈↓ ↓X␈↓The␈α∪≡le␈α∪is␈α∪deleted␈α∪after␈α∪spooling.␈α∪ For␈α∪a␈α∪standard␈α∪COPY␈α∪command,␈α∪the␈α∪e≥ect␈α∀is␈α∪essentially
␈↓ ↓X␈↓equivalent␈α⊃to␈α⊃the␈α∩recommended␈α⊃SPOOL/RECOPY␈α⊃(see␈α⊃page␈α∩66);␈α⊃the␈α⊃main␈α⊃advantage␈α∩of␈α⊃this
␈↓ ↓X␈↓capability is for direct spooling of list terms, e.g.,
␈↓ ↓X␈↓αDIRECT TPL:←[*,SYS]
␈↓ ↓X␈↓to␈α∞spool␈α∞a␈α∞list␈α∞of␈α
the␈α∞[*,SYS]␈α∞≡le␈α∞directories.␈α∞ (Note:␈α
It␈α∞is␈α∞claimed␈α∞that␈α∞these␈α∞pseudo-device␈α
names
␈↓ ↓X␈↓stand for The Pseudo Lpt and Pseudo Graphic Xerox-machine respectively.)
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 13␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In the list of COPY switches (page 61, appendix 2), add this entry:
␈↓ ↓X␈↓β␈↓ ↓xNOSPACES␈↓ βhNOS␈↓ ∧8This switch eliminates spaces at the end of a line.
␈↓ ↓X␈↓∧Also, on page 62, add ␈↓α/REFERENCE␈↓∧ and change the abbreviation for ␈↓α/RENAME␈↓∧ as follows:
␈↓ ↓X␈↓β␈↓ ↓xREFERENCE␈↓ βhREF␈↓ ∧8This␈αswitch␈αis␈αlike␈α/SEARCH␈αbelow,␈αbut␈αincludes␈αin␈αthe␈αdirectory␈αlisting
␈↓ ↓X␈↓β␈↓ ∧8an␈α⊂extra␈α⊂column␈α⊂containing␈α⊂the␈α⊂date␈α⊂on␈α⊂which␈α⊂each␈α⊂file␈α⊂was␈α⊂last␈α⊂read
␈↓ ↓X␈↓β␈↓ ∧8(referenced by LOOKUP).
␈↓ ↓X␈↓β␈↓ ↓xRENAME␈↓ βhREN␈↓ ∧8A␈α⊂rename␈α⊂is␈α⊂done␈α⊂on␈α⊂the␈α⊂input␈α⊂file␈α⊂with␈α⊂the␈α⊂output␈α⊂file␈α⊂information.
␈↓ ↓X␈↓β␈↓ ∧8/QUIET applies when the output filnam.ext already exists.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Remove ␈↓αHELP␈↓∧ from the list of monitor commands which run COPY (page 63, appendix 2).
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In the table of spooler switches (page 66, appendix 3), the entry for ␈↓α/REPEAT␈↓∧ should be
␈↓ ↓X␈↓β␈↓ ↓xREPEAT=n␈↓ β8Make n copies of the listing. (REPEAT is NOT sticky,
␈↓ ↓X␈↓β␈↓ ↓x␈↓ β8and is not allowed in XSPOOL.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Insert the following on page 66 (appendix 3, SPOOL), before the ``Delayed Listing'' section:
␈↓ ↓X␈↓File␈α
speci≡cations␈α
may␈α
be␈α
read␈αfrom␈α
an␈α
auxiliary␈α
≡le␈α
by␈α
including␈αin␈α
the␈α
command␈α
line␈α
the␈αname␈α
of
␈↓ ↓X␈↓the auxiliary ≡le preceded by ␈↓α@␈↓. This ≡le may include ≡le names and switches.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 14␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the table of XSPOOL switches, page 68:
␈↓ ↓X␈↓β␈↓ ↓xNOXGP␈↓ βλOpposite of /XGP.
␈↓ ↓X␈↓β␈↓ ↓xNTNODE=n␈↓ βλSets the number of text nodes allocated by the monitor (see below).
␈↓ ↓X␈↓β␈↓ ↓xNVNODE=n␈↓ βλSets the number of vector nodes allocated.
␈↓ ↓X␈↓∧Also add the following at the end of page 68:
␈↓ ↓X␈↓␈↓↓Text␈αnodes␈↓␈αand␈α␈↓↓vector␈αnodes␈↓␈αare␈αunits␈αof␈αcore␈αstorage␈αallocation␈αused␈αby␈αthe␈αmonitor's␈αXGP␈αservice
␈↓ ↓X␈↓routines.␈α
Generally,␈α
you␈α
need␈α
not␈α
worry␈α
about␈α
them,␈α
but␈α
if␈α
you␈α
have␈α
trouble␈α
printing␈α
a␈αcomplex
␈↓ ↓X␈↓document the allocation control switches may be able to help you. See a system wizard to ≡nd out.
␈↓ ↓X␈↓The␈α∞␈↓α/XGP␈↓␈α∞switch,␈α∞when␈α∞present,␈α∞turns␈α∞o≥␈α∞the␈α∞usual␈α∞default␈α∞assumptions␈α∞about␈α∞other␈α∞switches;␈α∞in
␈↓ ↓X␈↓particular,␈α⊂␈↓α/HEADING␈↓␈α⊂is␈α∂not␈α⊂assumed␈α⊂unless␈α⊂it␈α∂is␈α⊂explicitly␈α⊂used.␈α∂ Spooling␈α⊂a␈α⊂≡le␈α⊂with␈α∂extension
␈↓ ↓X␈↓.XGP implies a default of ␈↓α/NONUMBER␈↓ as well as ␈↓α/XGP␈↓.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add␈αthe␈αfollowing␈αparagraphs␈αto␈αthe␈αQSPOOL␈αand␈αUNSPOOL␈αdescriptions␈α(page␈α69,␈αappendix
␈↓ ↓X␈↓∧3):
␈↓ ↓X␈↓The commands ␈↓αQSPOOL/LPT␈↓ and ␈↓αQSPOOL/XGP␈↓ will list spool requests only for the indicated device.
␈↓ ↓X␈↓The␈α∂commands␈α⊂␈↓αUNSPOOL/LPT␈↓␈α∂and␈α∂␈↓αUNSPOOL/XGP␈↓␈α⊂will␈α∂list␈α⊂and␈α∂delete␈α∂spool␈α⊂requests␈α∂only␈α⊂for␈α∂the
␈↓ ↓X␈↓indicated␈α⊂device.␈α⊂ Also,␈α⊂if␈α⊂you␈α⊂run␈α⊂UNSPOOL␈α⊂and␈α⊂give␈α⊂the␈α⊂monitor␈α⊂REENTER␈α⊂command,␈α∂it
␈↓ ↓X␈↓allows you the extended capabilities described above for the SPL,SYS user.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α⊃page␈α⊃70␈α∩(appendix␈α⊃4,␈α⊃MAIL),␈α∩insert␈α⊃the␈α⊃following␈α⊃after␈α∩the␈α⊃description␈α⊃of␈α∩the␈α⊃GRIPE
␈↓ ↓X␈↓∧command. Also, add PLAN to the subheading on that page.
␈↓ ↓X␈↓A␈α≡nal␈αspecial-purpose␈αcommand␈αis␈αPLAN,␈αwhich␈αcreates␈αa␈α≡le␈αintended␈αto␈αdescribe␈αyour␈αprojected
␈↓ ↓X␈↓whereabouts,␈α⊂travel␈α⊂plans,␈α∂etc.␈α⊂to␈α⊂other␈α∂users␈α⊂who␈α⊂may␈α∂look␈α⊂for␈α⊂you␈α∂while␈α⊂you␈α⊂are␈α⊂away.␈α∂ The
␈↓ ↓X␈↓format is
␈↓ ↓X␈↓αPLAN <message>
␈↓ ↓X␈↓Unlike␈α∪the␈α∩other␈α∪MAIL␈α∩commands,␈α∪PLAN␈α∪creates␈α∩a␈α∪≡le␈α∩containing␈α∪only␈α∩the␈α∪message␈α∪in␈α∩the
␈↓ ↓X␈↓command␈α
rather␈α
than␈α
adding␈α
the␈α
message␈α
to␈α
any␈α
previously␈α
created␈α
messages.␈α
Also,␈α
if␈α
you␈α
use␈α
a
␈↓ ↓X␈↓null␈αmessage,␈αyour␈αplan␈α≡le␈αis␈αdeleted.␈α The␈αplan␈α≡les␈αare␈αread␈αby␈αthe␈αFINGER␈αprogram␈α(see␈αpage
␈↓ ↓X␈↓40).
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 15␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈αpage␈α70␈α(appendix␈α4,␈αMAIL),␈αchange␈αthe␈α≡rst␈αsentence␈αof␈αthe␈αparagraph␈αstarting␈α``␈↓The␈αonly
␈↓ ↓X␈↓switches alowed...␈↓∧'' to
␈↓ ↓X␈↓The switches which can be used with MAIL, SEND, or REMIND are ␈↓α/D␈↓ and ␈↓α/U␈↓.
␈↓ ↓X␈↓∧Also, add this paragraph before the last one beginning on that page:
␈↓ ↓X␈↓The␈α
␈↓α/A␈↓␈α
(append)␈α
switch␈α
can␈α
be␈α
used␈α
with␈αthe␈α
MAIL␈α
command␈α
only.␈α
It␈α
means␈α
that␈α
the␈αmessage␈α
you
␈↓ ↓X␈↓enter␈αshould␈αbe␈αappended␈αto␈αthe␈αmost␈αrecent␈αearlier␈αmessage␈αfrom␈αyou␈α(i.e.,␈αfrom␈αa␈αuser␈α
with␈αyour
␈↓ ↓X␈↓login␈α∂programmer␈α∂name)␈α∂to␈α∂each␈α∞recipient.␈α∂ If␈α∂there␈α∂is␈α∂no␈α∞such␈α∂message,␈α∂a␈α∂new␈α∂message␈α∂will␈α∞be
␈↓ ↓X␈↓created as if ␈↓α/A␈↓ had not been used.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α
page␈α
71␈α
(appendix␈α
4,␈α
MAIL),␈α
insert␈α
the␈α
following␈α
paragraphs␈α
before␈α
the␈α
one␈α
starting␈α``␈↓For
␈↓ ↓X␈↓the SEND command, ...␈↓∧'':
␈↓ ↓X␈↓The␈α∂MAIL␈α⊂command␈α∂also␈α∂allows␈α⊂the␈α∂use␈α∂of␈α⊂destinations␈α∂at␈α∂foreign␈α⊂ARPA␈α∂network␈α⊂sites.␈α∂ This
␈↓ ↓X␈↓facility is described in detail later in this appendix.
␈↓ ↓X␈↓If␈α
there␈α
is␈α
a␈α
≡le␈α
named␈α
OUTGO.MSG␈α
on␈α
your␈α
(ALIAS)␈α
disk␈α
area,␈α
MAIL␈α
will␈α
save␈α
your␈αmessage␈α
at
␈↓ ↓X␈↓the␈αfront␈αof␈αthat␈α≡le␈αas␈αwell␈αas␈αmailing␈αit␈αto␈αthe␈αspeci≡ed␈αdestinations.␈α The␈αdistribution␈αlist␈αwill␈αbe
␈↓ ↓X␈↓included in this ≡le whether or not you use the /D switch.
␈↓ ↓X␈↓If␈α∞you␈α∞do␈α∞not␈α∞know␈α∞the␈α∞programmer␈α∞name␈α∞for␈α∞a␈α∞user,␈α∞you␈α∞can␈α∞use␈α∞his␈α∞human␈α∞being␈α∂type␈α∞name
␈↓ ↓X␈↓instead␈α(≡rst␈αor␈αlast␈αname).␈α The␈αname␈αwill␈αbe␈αfound␈αin␈αthe␈α≡le␈αof␈αauthorized␈αusers,␈αif␈αit␈αis␈αpresent
␈↓ ↓X␈↓there,␈α
and␈α
you␈α
will␈α
be␈α
told␈α
the␈α
programmer␈α
name␈α
for␈α
that␈α
user␈α
to␈α
encourage␈α
you␈α
to␈α
use␈α
it␈α
in␈α
the
␈↓ ↓X␈↓future␈α∂(it's␈α⊂faster).␈α∂ If␈α⊂there␈α∂is␈α∂more␈α⊂than␈α∂one␈α⊂user␈α∂with␈α⊂the␈α∂name␈α∂you␈α⊂give,␈α∂it␈α⊂tells␈α∂you␈α⊂all␈α∂the
␈↓ ↓X␈↓relevant programmer names and invites you to try again.
␈↓ ↓X␈↓∧Also, replace the following paragraph with this one:
␈↓ ↓X␈↓For␈αthe␈α
SEND␈αcommand,␈α
there␈αare␈α
several␈αspecial␈α
forms␈αof␈α
destination:␈αa␈α
job␈αnumber,␈α
the␈αdevice
␈↓ ↓X␈↓name␈α
of␈α
a␈α
terminal␈α
followed␈α
optionally␈α
by␈α
a␈αcolon,␈α
␈↓α*␈↓␈α
(sends␈α
to␈α
all␈α
logged-in␈α
users),␈α
and␈α␈↓αARPA*␈↓␈α
(sends
␈↓ ↓X␈↓to␈α
all␈αusers␈α
logged␈α
in␈αvia␈α
the␈α
ARPA␈αnetwork).␈α
Any␈αof␈α
these␈α
special␈αforms,␈α
if␈α
used,␈αmust␈α
be␈αthe␈α
only
␈↓ ↓X␈↓destination speci≡ed.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 16␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α⊂page␈α⊃72␈α⊂(appendix␈α⊃4,␈α⊂MAIL),␈α⊃replace␈α⊂the␈α⊃paragraph␈α⊂starting␈α⊃``␈↓The␈α⊂check␈α⊃for␈α⊂a␈α⊃≡le...␈↓∧''␈α⊂as
␈↓ ↓X␈↓∧follows:
␈↓ ↓X␈↓The␈α∂check␈α∂for␈α∂a␈α∞≡le␈α∂directory␈α∂for␈α∂the␈α∞speci≡ed␈α∂user(s)␈α∂is␈α∂made␈α∞before␈α∂the␈α∂program␈α∂asks␈α∂for␈α∞the
␈↓ ↓X␈↓message␈α⊂if␈α⊂the␈α⊂multi-line␈α⊃option␈α⊂is␈α⊂used.␈α⊂ If␈α⊂there␈α⊃are␈α⊂no␈α⊂valid␈α⊂destinations,␈α⊂the␈α⊃program␈α⊂exits
␈↓ ↓X␈↓without␈αdoing␈αanything␈αelse.␈α If␈αany␈αdestinations␈αare␈αvalid,␈αhowever,␈αthe␈αprogram␈αasks␈αif␈αyou␈αwish
␈↓ ↓X␈↓to␈αcontinue,␈αand␈αif␈αso␈αit␈αcontinues␈αas␈αif␈αonly␈αthe␈αvalid␈αdestinations␈αwere␈αspeci≡ed.␈α (Exception:␈αThe
␈↓ ↓X␈↓list␈α⊂provided␈α⊂by␈α⊂/D␈α⊂includes␈α∂all␈α⊂speci≡ed␈α⊂destinations,␈α⊂valid␈α⊂or␈α∂invalid.) ␈α⊂The␈α⊂special␈α⊂case␈α⊂of␈α∂a
␈↓ ↓X␈↓command␈αlike␈α␈↓αSEND PRJ,PRG␈↓␈α
where␈αwhat␈αis␈αmeant␈α
is␈α␈↓αSEND [PRJ,PRG]␈↓␈αwill␈αbe␈α
caught␈αif␈α␈↓αPRJ␈↓␈αis␈α
not
␈↓ ↓X␈↓the␈αname␈αof␈αa␈αprogrammer,␈αand␈αthe␈α(probable)␈αdesired␈αe≥ect␈αis␈αsimulated␈αwith␈αa␈αwarning␈αmessage
␈↓ ↓X␈↓given.␈α
Note:␈α
in␈α
the␈α
case␈α
of␈α
SEND,␈α
you␈α
will␈α
be␈α
warned␈α
if␈α
a␈α
destination␈α
user␈α
is␈α
not␈α
logged␈α
in.␈α
Unlike
␈↓ ↓X␈↓the␈αmessage␈αfor␈αan␈αinvalid␈αdestination,␈αthis␈αwarning␈αdoes␈αnot␈αrequire␈αyou␈αto␈αrecon≡rm␈αyour␈αdesire
␈↓ ↓X␈↓to␈α∀continue.␈α∪After␈α∀you␈α∪≡nish␈α∀typing␈α∪in␈α∀the␈α∪message,␈α∀you␈α∪are␈α∀again␈α∪noti≡ed␈α∀of␈α∪not-logged-in
␈↓ ↓X␈↓destinations as described earlier.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α
page␈α
73␈α
(appendix␈α
4,␈α
MAIL),␈α
add␈α
this␈α
to␈α
the␈α
last␈α
paragraph␈α
before␈α
the␈α
REMIND␈α
heading,
␈↓ ↓X␈↓∧about the REENTER command:
␈↓ ↓X␈↓If␈αthe␈αoriginal␈αcommand␈αline␈αcontained␈αtext␈αending␈αwith␈αa␈α<lf>,␈αfor␈αthe␈αcontinued␈αmessage␈αfeature,
␈↓ ↓X␈↓the␈α
text␈αloaded␈α
into␈α
the␈αline␈α
editor␈αwill␈α
not␈α
include␈αthat␈α
text;␈α
therefore,␈αthe␈α
entire␈αmulti-line␈α
message
␈↓ ↓X␈↓will be used as the new message if you do not add any text on the command line.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On page 74 (appendix 4, MAIL), add this to the paragraph after the table of time formats:
␈↓ ↓X␈↓A␈αtime␈αwithout␈αa␈αdate␈αmay␈αbe␈αfollowed␈αby␈αan␈αasterisk␈α(␈↓α*␈↓),␈αin␈αwhich␈αcase␈αthe␈αreminder␈αwill␈αbe␈αsent
␈↓ ↓X␈↓every day at the time speci≡ed.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On␈α
page␈α74␈α
(appendix␈α4,␈α
MAIL),␈αin␈α
the␈αparagraph␈α
starting␈α``␈↓The␈α
optional␈αcount␈α
≡eld...␈↓∧''␈αreplace
␈↓ ↓X␈↓∧``␈↓#∞␈↓∧'' with ``␈↓#␈↓α∞␈↓∧''.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 17␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add␈α∀the␈α∀following␈α∀paragraph␈α∀above␈α∀the␈α∪last␈α∀paragraph␈α∀on␈α∀page␈α∀74␈α∀(appendix␈α∀4,␈α∪MAIL,
␈↓ ↓X␈↓∧description of REMIND command):
␈↓ ↓X␈↓Since␈α
the␈αstructure␈α
of␈αthe␈α
reminder␈α
queue␈αis␈α
rather␈αsensitive␈α
to␈α
incorrect␈αdate␈α
and␈αtime␈α
information,
␈↓ ↓X␈↓the␈α⊂current␈α∂date␈α⊂and␈α⊂time␈α∂according␈α⊂to␈α⊂the␈α∂monitor␈α⊂are␈α⊂checked␈α∂for␈α⊂reasonableness␈α⊂against␈α∂the
␈↓ ↓X␈↓reminder␈α≡le.␈α
If␈αthey␈αare␈α
considered␈αunreasonable,␈αno␈α
reminders␈αwill␈αbe␈α
accepted␈αor␈αdelivered␈α
until
␈↓ ↓X␈↓the␈α
system␈αhas␈α
been␈αup␈α
for␈αat␈α
least␈α≡ve␈α
minutes.␈α
(Hopefully␈αby␈α
then␈αan␈α
incorrect␈αdate␈α
or␈αtime␈α
entry
␈↓ ↓X␈↓will have been noticed and corrected.)
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 18␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add␈α∩the␈α∪following␈α∩new␈α∪section␈α∩before␈α∪the␈α∩description␈α∩of␈α∪the␈α∩RCV␈α∪command␈α∩on␈α∪page␈α∩75
␈↓ ↓X␈↓∧(appendix 4).
␈↓ ↓X␈↓∧␈α?␈α?␈α?␈α?␈α?␈α?␈α?␈ααMAIL to ARPA network hosts
␈↓ ↓X␈↓The␈αMAIL␈αcommand␈αallows␈αmail␈α
to␈αbe␈αsent␈αto␈αusers␈αat␈α
other␈αARPA␈αnetwork␈αsites.␈α (This␈αservice␈α
is
␈↓ ↓X␈↓not available to network guests, sorry.)
␈↓ ↓X␈↓Since␈α⊃the␈α⊃``@''␈α⊃character␈α⊃was␈α⊃already␈α⊃used␈α⊃in␈α⊃MAIL␈α⊃to␈α⊃specify␈α⊃a␈α⊃≡le␈α⊃to␈α⊃be␈α⊃read␈α∩for␈α⊃command
␈↓ ↓X␈↓arguments,␈α
the␈α
character␈α
``%''␈α
is␈α
used␈α
to␈αsignify␈α
ARPA␈α
site␈α
names,␈α
e.g.,␈α
␈↓αBH%SU-AI␈↓␈α
not␈α␈↓αBH@SU-AI␈↓.␈α
Site
␈↓ ↓X␈↓names␈α
can␈α
follow␈αa␈α
user␈α
name,␈αas␈α
above,␈α
or␈αcan␈α
be␈α
used␈αalone␈α
(followed␈α
by␈αa␈α
space)␈α
as␈α
a␈α``sticky''
␈↓ ↓X␈↓site:
␈↓ ↓X␈↓αMAIL %MIT-AI RG,TK,MINSKY,BH%SAIL,PAPERT
␈↓ ↓X␈↓will␈αsend␈αthe␈αmessage␈αto␈αRG,␈αTK,␈αMINSKY,␈αand␈αPAPERT␈αat␈αMIT-AI,␈αand␈αto␈αBH␈αat␈αSAIL.␈α (Of
␈↓ ↓X␈↓course, if SAIL is used as the site name the mail is not actually sent through the network!)
␈↓ ↓X␈↓User␈α∞names␈α∞for␈α∞foreign␈α∞hosts␈α∞can␈α∞be␈α∞of␈α∂(essentially)␈α∞arbitrary␈α∞length.␈α∞ If␈α∞the␈α∞name␈α∞is␈α∞a␈α∂string␈α∞of
␈↓ ↓X␈↓letters␈α∩and␈α∩digits␈α∩starting␈α∩with␈α∩a␈α∩letter,␈α∩it␈α⊃can␈α∩simply␈α∩be␈α∩typed␈α∩as␈α∩is:␈α∩␈↓αTEITELMAN␈α∩%␈α∩MAXC␈↓␈α⊃for
␈↓ ↓X␈↓example.␈α (The␈αcase␈αof␈αletters␈αis␈αpreserved,␈αin␈αcase␈αit␈αmatters␈αto␈αthe␈αforeign␈αhost.)␈αIf␈αthe␈αuser␈αname
␈↓ ↓X␈↓contains␈αcharacters␈αother␈αthan␈αletters␈αand␈αdigits,␈αor␈αstarts␈αwith␈αa␈αdigit,␈αenclose␈αit␈αin␈αquotes␈α(␈↓α"␈↓)␈αwith
␈↓ ↓X␈↓two␈αquotes␈αused␈α
to␈αrepresent␈αa␈α
single␈αquote␈αif␈α
necessary.␈α The␈αhost␈α
name␈αcannot␈αcontain␈αany␈α
special
␈↓ ↓X␈↓characters␈α∪except␈α∪hyphen.␈α∀ Partial␈α∪site␈α∪names␈α∀are␈α∪recognized␈α∪as␈α∀in␈α∪our␈α∪TELNET␈α∀and␈α∪FTP
␈↓ ↓X␈↓programs. Also, a decimal number may be used instead of a host name if necessary.
␈↓ ↓X␈↓If␈α∞the␈α∞destination␈α∞list␈α∞in␈α∞a␈α∞MAIL␈α∂command␈α∞includes␈α∞PPNs␈α∞at␈α∞SAIL␈α∞(which␈α∞must␈α∞be␈α∂enclosed␈α∞in
␈↓ ↓X␈↓square brackets), SAIL is assumed as the destination host and should not be speci≡ed explicitly, e.g.,
␈↓ ↓X␈↓αMAIL %AI [1,BH],TK
␈↓ ↓X␈↓mails to TK at MIT-AI and [1,BH] at SAIL. To mail to a PPN somewhere else, you must say, e.g.:
␈↓ ↓X␈↓αMAIL "[N900AR00]"%CMU
␈↓ ↓X␈↓The␈α∞outcome␈α∞of␈α∞an␈α∞attempt␈α∞to␈α∞send␈α∞network␈α∞mail␈α∞is␈α∞reported␈α∞to␈α∞you,␈α∞in␈α∞a␈α∞format␈α∂somewhat␈α∞like
␈↓ ↓X␈↓SNDMSG in TENEX. The possible outcomes are
␈↓ ↓X␈↓αUSER at SITE -- ok
␈↓ ↓X␈↓αUSER at SITE -- refused
␈↓ ↓X␈↓αUSER at SITE -- queued
␈↓ ↓X␈↓αUSER at SITE -- failed
␈↓ ↓X␈↓The␈α⊂≡rst␈α⊃case␈α⊂means␈α⊃that␈α⊂the␈α⊂mail␈α⊃was␈α⊂successfully␈α⊃sent.␈α⊂ The␈α⊂second␈α⊃means␈α⊂that␈α⊃the␈α⊂network
␈↓ ↓X␈↓connection␈α
was␈α
made␈α
successfully␈α
but␈α
the␈α
MAIL␈α
command␈α
was␈α
rejected,␈α
possibly␈α
because␈α
there␈α
is␈α
no
␈↓ ↓X␈↓such user at that host.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 19␈↓
␈↓ ↓X␈↓Network␈α
mail␈α
will␈α
be␈α
queued␈αif␈α
it␈α
cannot␈α
be␈α
sent␈α
when␈αyou␈α
make␈α
the␈α
request␈α
(remote␈α
host␈αdown,
␈↓ ↓X␈↓etc.)␈αThe␈αmail␈αis␈αqueued␈αvia␈αthe␈αREMIND␈αphantom.␈α The␈αstatus␈αreport␈αfrom␈αthe␈αMAIL␈αcommand
␈↓ ↓X␈↓is␈α∀``queued''.␈α∀ The␈α∀mail␈α∪will␈α∀be␈α∀retried␈α∀at␈α∪three-hour␈α∀intervals␈α∀for␈α∀three␈α∪days.␈α∀ If␈α∀it␈α∀is␈α∪sent
␈↓ ↓X␈↓successfully,␈αor␈αif␈αthe␈αthree␈αdays␈αrun␈αout␈αand␈αthe␈αrequest␈αis␈αdeleted,␈αyou␈αwill␈αreceive␈αa␈αstatus␈αreport
␈↓ ↓X␈↓from the REMIND phantom, in the form of a reminder from yourself saying
␈↓ ↓X␈↓αARPA network mail to USER at SITE -- ok
␈↓ ↓X␈↓if successful, or
␈↓ ↓X␈↓αARPA network mail to USER at SITE -- expired
␈↓ ↓X␈↓if␈αnot.␈α The␈αdate␈αand␈αtime␈αin␈αthe␈αheader␈αof␈αthis␈αstatus␈αreport␈αwill␈αbe␈αthe␈αtime␈αwhen␈αthe␈αmessage␈αis
␈↓ ↓X␈↓actually␈αsent␈αsuccessfully␈α(or␈αdeleted).␈α The␈αdate␈αand␈αtime␈αin␈αthe␈αheader␈αof␈αthe␈αmessage␈αsent␈αto␈αthe
␈↓ ↓X␈↓remote site is the time when you originally tried to send the message.
␈↓ ↓X␈↓It is also possible to get a status report saying
␈↓ ↓X␈↓αARPA network mail to USER at SITE -- refused
␈↓ ↓X␈↓if␈αthe␈αconnection␈αto␈αthe␈αremote␈αhost␈αis␈αmade␈αbut␈αthe␈αhost␈αrefuses␈αthe␈αmail.␈α This␈αstatus␈αreport␈αwill
␈↓ ↓X␈↓also include any error message returned to us by the remote host.
␈↓ ↓X␈↓If␈αa␈αmessage␈αwhich␈αwas␈αtyped␈αin␈α(i.e.,␈αnot␈αfrom␈αa␈α@FILE␈αconstruction)␈αreturns␈αeither␈αa␈αqueued␈αor␈αa
␈↓ ↓X␈↓failed␈α
response,␈α
the␈α∞text␈α
of␈α
the␈α
message␈α∞is␈α
saved␈α
in␈α
a␈α∞≡le␈α
FAILED.TXT␈α
in␈α
your␈α∞(alias)␈α
directory.
␈↓ ↓X␈↓This␈α⊃should␈α⊃not␈α⊃be␈α∩necessary␈α⊃for␈α⊃queued␈α⊃mail,␈α⊃which␈α∩will␈α⊃eventually␈α⊃be␈α⊃sent␈α∩automatically␈α⊃if
␈↓ ↓X␈↓possible,␈α∞but␈α∞is␈α
necessary␈α∞for␈α∞failed␈α
and␈α∞reassuring␈α∞for␈α
queued.␈α∞ The␈α∞≡le␈α
contains␈α∞the␈α∞message␈α
as
␈↓ ↓X␈↓typed,␈α
i.e.,␈α
no␈α
header␈α
of␈α
either␈α
internal␈α
or␈αexternal␈α
format,␈α
and␈α
no␈α
space␈α
added␈α
in␈α
front␈α
of␈αeach␈α
line.
␈↓ ↓X␈↓If␈αthe␈α≡le␈αcannot␈αbe␈α
entered␈α(e.g.,␈αyou␈αare␈αaliased␈αto␈α
a␈αwrite␈αprotected␈αdirectory),␈αnothing␈α
special␈αis
␈↓ ↓X␈↓done, but if the ≡le is written successfully you are so informed.
␈↓ ↓X␈↓The␈α∞CANCEL␈α∞command␈α∞lists␈α∞ARPA␈α∞mail␈α∞which␈α∂you␈α∞have␈α∞queued␈α∞and␈α∞allows␈α∞you␈α∞to␈α∂abort␈α∞the
␈↓ ↓X␈↓request.␈α
The␈α
listing␈αby␈α
CANCEL␈α
contains␈α
the␈αtext␈α
of␈α
your␈α
message␈αand␈α
the␈α
name␈α
of␈αthe␈α
addressee,
␈↓ ↓X␈↓but␈α∪lists␈α∩his␈α∪site␈α∩by␈α∪number␈α∩rather␈α∪than␈α∪by␈α∩name.␈α∪ It␈α∩also␈α∪speci≡es␈α∩the␈α∪number␈α∪of␈α∩attempts
␈↓ ↓X␈↓remaining before the request will be deleted.
␈↓ ↓X␈↓It␈α∂is␈α∂possible␈α∂to␈α∂get␈α⊂a␈α∂``failed''␈α∂status␈α∂report␈α∂from␈α∂a␈α⊂network␈α∂MAIL␈α∂command␈α∂if␈α∂the␈α⊂program␈α∂is
␈↓ ↓X␈↓unable␈α∂to␈α∂enter␈α∂the␈α∂request␈α∂in␈α∂the␈α∂REMIND␈α∞queue,␈α∂for␈α∂instance␈α∂because␈α∂there␈α∂are␈α∂no␈α∂job␈α∞slots
␈↓ ↓X␈↓available␈α
for␈α
the␈α
phantom.␈α
In␈α
this␈α
case␈α
you␈α
must␈α
try␈α
again␈α
later␈α
yourself.␈α
(You␈α
can␈α
save␈α
the␈α
text␈α
of
␈↓ ↓X␈↓a␈α
long␈αmessage␈α
you␈α
have␈αtyped␈α
in␈αby␈α
giving␈α
the␈αmonitor␈α
REENTER␈αcommand␈α
after␈α
MAIL␈αexits
␈↓ ↓X␈↓and redirecting the mail to yourself.)
␈↓ ↓X␈↓Usually␈αif␈αthe␈α
mail␈αis␈αrefused,␈α
and␈αpossibly␈αotherwise,␈α
the␈αremote␈αhost␈α
will␈αsend␈αus␈α
error␈αmessages
␈↓ ↓X␈↓intended␈αto␈αbe␈αhelpful␈αto␈αyou.␈α If␈αany␈αsuch␈αmessages␈αare␈αreceived␈αwhich␈αare␈αnot␈αpart␈αof␈αthe␈αnormal
␈↓ ↓X␈↓MAIL␈α
sequence,␈α
they␈αare␈α
typed␈α
out␈α
along␈αwith␈α
the␈α
status␈α
report.␈α Thus␈α
you␈α
can␈α
hopefully␈α≡gure␈α
out
␈↓ ↓X␈↓why the mail was refused.
␈↓ ↓X␈↓Mail␈αto␈αforeign␈αhosts␈αis␈αpre≡xed␈αwith␈αa␈αTENEX-ish␈αheader␈αincluding␈αyour␈αreal␈αname,␈αif␈αknown␈αto
␈↓ ↓X␈↓the␈αsystem,␈αand␈αyour␈αnet␈αaddress␈α(␈↓αPRG␈α@␈αSU-AI␈↓).␈α Thus␈αrecipients␈αshould␈αbe␈αable␈αto␈α≡gure␈αout␈αhow
␈↓ ↓X␈↓to reply.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 20␈↓
␈↓ ↓X␈↓Distribution␈αlist␈α≡les␈αas␈α
in␈α␈↓αMAIL␈α@FILE␈↓␈αcan,␈αnaturally,␈α
include␈αnetwork␈αdestinations.␈α The␈α/D␈α
switch,
␈↓ ↓X␈↓which␈α
includes␈α
the␈α
list␈α
of␈α
addressees␈α
in␈α
the␈α
message,␈α
includes␈α
network␈α
addressees,␈α
as␈α
typed␈α
(e.g.,␈α
with
␈↓ ↓X␈↓abbreviated␈α
site␈α
names␈αif␈α
that's␈α
what␈αyou␈α
typed).␈α
The␈αmessage␈α
header␈α
as␈αsent␈α
to␈α
each␈αnet␈α
addressee
␈↓ ↓X␈↓has his site name in full, with his user ID as you typed it.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add to the discussion of RCV arguments at the end of page 75 (appendix 4):
␈↓ ↓X␈↓Finally,␈αan␈αargument␈αof␈αthe␈αform␈α␈↓α?PRG␈↓␈αwill␈αtype␈αthe␈αplan␈α≡le␈αfor␈αuser␈αPRG,␈αif␈αthere␈αis␈αone.␈α In␈α
this
␈↓ ↓X␈↓case, the ≡le is merely typed, not edited.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following entries to the table of RCV options on page 76 (appendix 4):
␈↓ ↓X␈↓β␈↓ ↓xA␈↓ βλAppends to it from your terminal
␈↓ ↓X␈↓β␈↓ ↓xP␈↓ βλPostpones the decision for a long message (see below)
␈↓ ↓X␈↓∧In the next paragraph, delete ``␈↓↓except for ␈↓? which activates itself.␈↓∧''
␈↓ ↓X␈↓∧On␈α
the␈α∞same␈α
page,␈α∞in␈α
the␈α∞paragraph␈α
on␈α
the␈α∞Z␈α
option,␈α∞replace␈α
the␈α∞last␈α
two␈α∞sentences␈α
(starting
␈↓ ↓X␈↓∧``␈↓The only way to add new lines...␈↓∧'') with
␈↓ ↓X␈↓You␈α⊃can␈α⊃switch␈α⊂from␈α⊃Z␈α⊃editing␈α⊃mode␈α⊂to␈α⊃A␈α⊃(append)␈α⊂mode␈α⊃by␈α⊃typing␈α⊃<control><meta>A.␈α⊂ The
␈↓ ↓X␈↓current␈α⊃line␈α⊃will␈α⊃be␈α⊂stored␈α⊃as␈α⊃it␈α⊃appeared␈α⊃on␈α⊂your␈α⊃screen␈α⊃before␈α⊃you␈α⊃typed␈α⊂<control><meta>A,
␈↓ ↓X␈↓editing␈α
is␈α
ended␈α
as␈α
if␈α
you␈α
had␈α
typed␈α<control><cr>,␈α
and␈α
you␈α
are␈α
invited␈α
to␈α
type␈α
in␈α
additional␈αtext␈α
as
␈↓ ↓X␈↓in␈αthe␈αA␈αoption.␈α The␈αZ␈α
option␈αeditor␈αis␈αslow␈αand␈αrather␈α
stupid;␈αif␈αyou␈αhave␈αany␈αsizable␈αchanges␈α
to
␈↓ ↓X␈↓make␈α
to␈αthe␈α
message␈αyou␈α
will␈α
probably␈αbe␈α
better␈αo≥␈α
using␈α
the␈αT␈α
option␈αto␈α
move␈α
it␈αto␈α
a␈αseparate␈α
≡le,
␈↓ ↓X␈↓editing it with E, and re-mailing it.
␈↓ ↓X␈↓∧Also,␈α
add␈α
the␈α
following␈α
to␈αthe␈α
paragraph␈α
concerning␈α
long␈α
messages␈αon␈α
page␈α
77,␈α
starting␈α
``␈↓It␈αis
␈↓ ↓X␈↓possible....␈↓∧''
␈↓ ↓X␈↓If␈α
the␈α
option␈α
you␈αselect␈α
is␈α
␈↓αE␈↓␈α
or␈α
␈↓α!␈↓,␈αthen␈α
Quiet␈α
processing␈α
is␈α
always␈αassumed.␈α
If␈α
you␈α
wish,␈α
you␈αmay
␈↓ ↓X␈↓postpone␈αthe␈αdecision␈αon␈αhow␈αto␈αprocess␈αthe␈αmessage␈αuntil␈αafter␈αseeing␈αthe␈αrest␈αof␈αit,␈αby␈αtyping␈α␈↓αP␈↓␈αto
␈↓ ↓X␈↓the␈α
option␈α
request.␈α
This␈αwill␈α
type␈α
the␈α
remainder␈αof␈α
the␈α
message␈α
and␈α
ask␈αagain␈α
for␈α
an␈α
option.␈α ␈↓αQP␈↓␈α
is
␈↓ ↓X␈↓illegal, and ␈↓αP␈↓ is only legal when a message over∨ows.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In␈α
the␈α∞table␈α
of␈α∞DART␈α
monitor␈α
commands␈α∞on␈α
page␈α∞78␈α
(appendix␈α
5),␈α∞the␈α
entries␈α∞for␈α
LOCATE
␈↓ ↓X␈↓∧and TLIST should be:
␈↓ ↓X␈↓β␈↓ ↓xLOCATE␈↓ βλ{<dest>←}{<source>}
␈↓ ↓X␈↓β␈↓ ↓xTLIST␈↓ βλ{<dest>←}{<source>}
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 21␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following after the second line on page 88 (appendix 8, ARPA):
␈↓ ↓X␈↓The␈α⊂information␈α⊂which␈α⊂follows␈α⊂also␈α⊂applies␈α⊂to␈α⊂the␈α⊂DIAL␈α⊂program,␈α⊂a␈α⊂version␈α⊂of␈α⊂T␈α⊂which␈α∂uses
␈↓ ↓X␈↓dial-up␈αtelephone␈αconnections␈αrather␈αthan␈αthe␈αARPA␈αnetwork.␈α The␈αformat␈αof␈αthe␈αDIAL␈αcommand
␈↓ ↓X␈↓is␈α∂explained␈α⊂on␈α∂page␈α⊂41.␈α∂ Another␈α∂version␈α⊂of␈α∂T␈α⊂is␈α∂called␈α∂PTYJOB,␈α⊂for␈α∂communicating␈α⊂with␈α∂a
␈↓ ↓X␈↓pseudo-Teletype; it is not run with its own monitor command, but by ␈↓αR PTYJOB␈↓.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 22␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In␈α
the␈α
list␈α
of␈αtelnet␈α
control␈α
commands␈α
starting␈αon␈α
page␈α
88,␈α
change␈αthe␈α
entry␈α
for␈α
␈↓⊗H␈↓∧␈αto␈α
␈↓<arg>⊗S␈↓∧.
␈↓ ↓X␈↓∧(The␈α
␈↓⊗H␈↓∧␈α
in␈α
the␈α
text␈α
of␈α
that␈α
entry␈α
must␈αalso␈α
be␈α
changed␈α
to␈α
␈↓⊗S␈↓∧.)␈α
The␈α
existing␈α
entry␈α
for␈α␈↓⊗S␈↓∧␈α
should
␈↓ ↓X␈↓∧now say ``␈↓⊗S (no arg)␈↓∧''. The following entries should also be modi≡ed as shown here:
␈↓ ↓X␈↓βE␈↓ αhBegin␈α⊂local␈α⊃echoing.␈α⊂ Also␈α⊃attempts␈α⊂to␈α⊂turn␈α⊃o≥␈α⊂remote␈α⊃echoing.␈α⊂ Di≥erent␈α⊃sites␈α⊂have
␈↓ ↓X␈↓␈↓ αhdi≥erent␈αechoing␈αconventions.␈α Some␈αsites␈αexpect␈αto␈αsend␈αback␈αechoing,␈αsome␈αdo␈αnot.␈α If
␈↓ ↓X␈↓␈↓ αhyou␈α≡nd␈αthat␈αwhat␈αyou␈αtype␈αis␈αnot␈αbeing␈αechoed␈αin␈αa␈αreasonable␈αtime,␈αyou␈αmay␈αuse␈αthis
␈↓ ↓X␈↓␈↓ αhcommand␈αto␈αlet␈αyou␈αsee␈αwhat␈αyou␈αare␈α
typing.␈α In␈αthe␈αDIAL␈αprgram,␈αthis␈αmakes␈αyou␈α
look
␈↓ ↓X␈↓␈↓ αhlike a half duplex terminal, and does not change the state of remote echoing.
␈↓ ↓X␈↓αβE␈↓ αhTerminate␈αlocal␈αechoing.␈α Also␈αattempts␈αto␈α
turn␈αon␈αremote␈αechoing.␈α One␈αdoes␈αthis␈α
when
␈↓ ↓X␈↓␈↓ αheach␈α
key␈α∞one␈α
types␈α∞appears␈α
twice␈α∞on␈α
the␈α
console.␈α∞ Turning␈α
o≥␈α∞local␈α
echoing␈α∞will␈α
often
␈↓ ↓X␈↓␈↓ αheliminate␈αone␈αcopy␈αof␈αthe␈αkey.␈α The␈α
DIAL␈αprogram␈αdoes␈αnot␈αattempt␈αto␈αchange␈αthe␈α
state
␈↓ ↓X␈↓␈↓ αhof remote echoing.
␈↓ ↓X␈↓∧Also add the following new control commands:
␈↓ ↓X␈↓βO␈↓ αhTurn on console typeout. See αβO.
␈↓ ↓X␈↓αβO␈↓ αhTurn␈α
o≥␈α
console␈α
typeout.␈α
Useful␈α
when␈α
output␈αis␈α
already␈α
going␈α
to␈α
a␈α
≡le␈α
and␈α
you␈αdon't
␈↓ ↓X␈↓␈↓ αhwant to waste the time it takes to type out on your console as well.
␈↓ ↓X␈↓βF␈↓ αhOpen␈αoutput␈α
≡le␈αlike␈αβD,␈α
but␈αappend␈αthe␈α
text␈αto␈αan␈α
existing␈α≡le␈αof␈α
the␈αsame␈αname.␈α
You
␈↓ ↓X␈↓␈↓ αhare␈αonly␈αasked␈αfor␈αa␈α≡le␈αname␈αif␈α
you␈αhave␈αnot␈αpreviously␈αopened␈αan␈αoutput␈α≡le␈αwith␈α
βD
␈↓ ↓X␈↓␈↓ αhor␈α⊗F␈αduring␈αthis␈αsession;␈αif␈αyou␈αhave␈αalready␈αnamed␈αan␈αoutput␈α≡le,␈αthe␈αnew␈αoutput␈αwill
␈↓ ↓X␈↓␈↓ αhbe appended to that one.
␈↓ ↓X␈↓αβF␈↓ αhAppend to ≡le, like βF, but always asks for a ≡le name.
␈↓ ↓X␈↓⊗<form>␈↓ αhIf there is an output ≡le open, insert a form feed character in it.
␈↓ ↓X␈↓⊗C␈↓ αh(TELNET␈α
only)␈αSend␈α
interrupt.␈α This␈α
is␈αthe␈α
network␈αprotocol␈α
for␈α``return␈α
to␈αmonitor''␈α
or
␈↓ ↓X␈↓␈↓ αhequivalent.
␈↓ ↓X␈↓βC␈↓ αh(DIAL␈αonly)␈αTurn␈αon␈α
control␈αcharacter␈αmode.␈α In␈α
this␈αmode␈αall␈αcharacters␈αreceived␈α
from
␈↓ ↓X␈↓␈↓ αhthe dataphone are typed on your console.
␈↓ ↓X␈↓αβC␈↓ αh(DIAL␈αonly)␈αTurn␈α
o≥␈αcontrol␈αcharacter␈αmode.␈α
In␈αthis␈αmode,␈α
octal␈αcodes␈α1-10,␈α16-37,␈α
and
␈↓ ↓X␈↓␈↓ αh177 are not typed on your console when received from the dataphone.
␈↓ ↓X␈↓βM␈↓ αh(PTYJOB␈α∃only)␈α∃Enters␈α∃a␈α∃mode␈α∃in␈α∃which␈α∃all␈α∃9-bit␈α∃characters␈α∃you␈α∃type␈α⊗are␈α∃sent
␈↓ ↓X␈↓␈↓ αhunchanged␈α∩to␈α⊃the␈α∩PTY␈α∩except␈α⊃βM,␈α∩αβM,␈α⊃βZ,␈α∩and␈α∩αβZ.␈α⊃ (Of␈α∩course,␈α⊃if␈α∩you␈α∩are␈α⊃in
␈↓ ↓X␈↓␈↓ αhline-at-a-time␈α∪mode␈α∪some␈α∪control␈α∪characters␈α∪are␈α∪still␈α∪interpreted␈α∪by␈α∪the␈α∪system␈α∪line
␈↓ ↓X␈↓␈↓ αheditor.)
␈↓ ↓X␈↓αβM␈↓ αh(PTYJOB␈α∪only)␈α∀Leaves␈α∪the␈α∀above␈α∪mode;␈α∪meta-characters␈α∀are␈α∪again␈α∀interpreted␈α∪as
␈↓ ↓X␈↓␈↓ αhcommands to PTYJOB.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 23␈↓
␈↓ ↓X␈↓⊗Z␈↓ αh(PTYJOB␈α∂only)␈α∂Quotes␈α∂the␈α∂following␈α∂9-bit␈α∂character,␈α∂so␈α∂it␈α∂is␈α∂sent␈α∂to␈α∂the␈α∂PTY␈α∂as␈α∂is,
␈↓ ↓X␈↓␈↓ αhregardless of the βM mode switch.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧On the third line of the FTP description on page 90, ``␈↓⊗FTP←␈↓∧'' should be ``␈↓FTP␈↓∧''.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧In␈αthe␈αdescription␈αof␈αthe␈αXGP␈αon␈αpage␈α97␈α(appendix␈α9),␈αdelete␈αthe␈αreference␈αto␈αthe␈αVERTICAL
␈↓ ↓X␈↓∧POSITION␈αknob.␈α This␈αknob␈αmay␈αbe␈αin␈αany␈αposition,␈αand␈αshould␈αnot␈αnormally␈αbe␈αchanged␈αby
␈↓ ↓X␈↓∧users.
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the last paragraph on page 100 (appendix 9, ≡xing memory stops) as follows:
␈↓ ↓X␈↓Once␈αthe␈αmemory␈αis␈αreset,␈α
the␈αcomputers␈αhave␈αto␈αbe␈α
convinced␈αthat␈αnothing␈αbad␈αhappened.␈α To␈α
do
␈↓ ↓X␈↓this␈α
on␈α
the␈α
PDP-10,␈α
the␈αUSER␈α
MODE␈α
light␈α
on␈α
the␈αconsole␈α
must␈α
be␈α
o≥.␈α
If␈αit␈α
is␈α
on,␈α
≡rst␈α
turn␈αon␈α
the
␈↓ ↓X␈↓SINGLE␈α
INSTRUCTION␈α
switch␈α∞on␈α
the␈α
console,␈α
then␈α∞push␈α
CONTINUE.␈α
This␈α
should␈α∞turn␈α
o≥
␈↓ ↓X␈↓the␈αUSER␈αMODE␈α
light.␈α Then␈αturn␈α
o≥␈αthe␈αSINGLE␈α
INSTRUCTION␈αswitch.␈α When␈α
the␈αUSER
␈↓ ↓X␈↓MODE␈αlight␈αis␈αo≥,␈αenter␈α
700200 010003␈αin␈αthe␈αdata␈αswitches␈α
and␈αpush␈αthe␈αEXECUTE␈αkey.␈α If␈α
the
␈↓ ↓X␈↓MEMORY␈α∞STOP␈α∞light␈α∞on␈α
the␈α∞PDP-6␈α∞is␈α∞on,␈α
follow␈α∞the␈α∞same␈α∞procedure␈α
as␈α∞on␈α∞the␈α∞PDP-10␈α
with
␈↓ ↓X␈↓these␈α
exceptions:␈α
Instead␈α
of␈α
a␈α
USER␈α
MODE␈αlight␈α
on␈α
the␈α
console,␈α
the␈α
PDP-6␈α
has␈α
an␈αEXEC␈α
MODE
␈↓ ↓X␈↓light␈αat␈α
the␈αtop␈αof␈α
the␈αsecond␈α
bay␈αto␈αthe␈α
left␈αof␈αthe␈α
console;␈αthis␈α
light␈αmust␈αbe␈α
on␈αfor␈α
the␈αexecute.
␈↓ ↓X␈↓Also,␈α≠there␈α≠is␈α≠no␈α≠SINGLE␈α≠INSTRUCTION␈α≠switch␈α≠on␈α≠the␈α≠PDP-6;␈α≠instead,␈α≠while␈α~the
␈↓ ↓X␈↓INSTRUCTION␈αSTOP␈αswitch␈αis␈αdown,␈αpush␈αINSTRUCTION␈αCONTINUE␈αonce.␈α Finally,␈αpush
␈↓ ↓X␈↓CONTINUE on both machines.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 24␈↓
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Replace the last paragraph on page 101 (appendix 10, reloading) with the following:
␈↓ ↓X␈↓If␈αthis␈αprocedure␈αfails,␈αcheck␈αthat␈αthe␈αNXM␈αSTOP␈αswitch␈αon␈αthe␈αconsole␈αis␈αturned␈αon;␈αthen␈αcheck
␈↓ ↓X␈↓the␈α∞following␈α∞switches,␈α∞located␈α∞inside␈α∞the␈α∞second␈α∞door␈α∞to␈α∞the␈α∞left␈α∞of␈α∞the␈α∞console:␈α∞JSYS␈α∞ENB␈α∞and
␈↓ ↓X␈↓MAPAC ENB o≥, MA TRP OFFSET on.
␈↓ ↓X␈↓If␈αthe␈α
system␈αloader␈α
tape␈αstill␈α
fails,␈α≡nd␈αthe␈α
DECtape␈αwith␈α
the␈αcurrent␈α
system.␈α The␈α
DECtape␈αwill
␈↓ ↓X␈↓be␈α
labeled␈αwith␈α
the␈α
system␈αname␈α
and␈α
date.␈α Mount␈α
it␈α
on␈αsome␈α
DECtape␈α
drive.␈α Find␈α
the␈αpaper␈α
tape
␈↓ ↓X␈↓labeled␈α⊃256K␈α⊃TENDMP␈α⊂or␈α⊃128K␈α⊃TENDMP,␈α⊃and␈α⊂load␈α⊃it␈α⊃into␈α⊃the␈α⊂paper␈α⊃tape␈α⊃reader␈α⊃(on␈α⊂the
␈↓ ↓X␈↓PDP-10).␈α Stop␈αthe␈αPDP-6.␈α Press␈αRESET␈αand␈αREAD␈αIN␈αon␈αthe␈αPDP-10.␈α The␈αpaper␈αtape␈αwill␈αbe
␈↓ ↓X␈↓read,␈αand␈αthe␈αCTY␈αwill␈αtype␈αcarriage␈αreturn␈αand␈αline␈αfeed.␈α Type␈α␈↓αn$␈↓␈αwhere␈α␈↓αn␈↓␈αis␈αthe␈αnumber␈αof␈αthe
␈↓ ↓X␈↓DECtape␈αdrive␈αand␈α␈↓α$␈↓␈αis␈αan␈αalt␈αmode.␈α The␈αDECtape␈αshould␈αspin␈αfor␈αa␈αwhile,␈αthen␈αit␈αwill␈αstop␈αand
␈↓ ↓X␈↓the␈α⊂CTY␈α⊂will␈α⊂type␈α⊂crlf␈α⊂again.␈α⊂ Type␈α⊂␈↓αL$S␈↓␈α⊂then␈α⊂carriage␈α⊂return.␈α⊂ The␈α⊂DECtape␈α⊂will␈α⊂spin␈α∂again,
␈↓ ↓X␈↓followed␈αby␈αanother␈αcrlf.␈α Type␈α␈↓α206$␈↓␈αthen␈α␈↓αG$␈↓␈αto␈αstart␈αthe␈αsystem.␈α (If␈αthe␈αLibrascope␈αdisk␈αis␈αdown,
␈↓ ↓X␈↓type ␈↓α200$G$␈↓ instead.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧The␈α
following␈α
monitor␈α
error␈α
messages␈α
should␈α
be␈α∞added␈α
to␈α
the␈α
list␈α
in␈α
appendix␈α
11,␈α∞starting␈α
on
␈↓ ↓X␈↓∧page 102, in alphabetical sequence:
␈↓ ↓X␈↓αALREADY IN USE, CAN'T CHANGE FORMAT.
␈↓ ↓X␈↓␈↓ αxYou␈α∂gave␈α∂an␈α∂␈↓αASSIGN␈α∂PUBLIC␈↓␈α∂or␈α∂␈↓αASSIGN␈α∂PRIVATE␈↓␈α∂command␈α∂for␈α∂a␈α∂UDP␈α∂which␈α∞was
␈↓ ↓X␈↓␈↓ αxalready␈α∞assigned␈α∂as␈α∞OLD,␈α∞or␈α∂vice␈α∞versa.␈α∞ The␈α∂UDP␈α∞will␈α∞be␈α∂assigned␈α∞to␈α∞your␈α∂job␈α∞as
␈↓ ↓X␈↓␈↓ αxPUBLIC.
␈↓ ↓X␈↓αALREADY IN USE, CAN'T MAKE PRIVATE.
␈↓ ↓X␈↓␈↓ αxYou␈α∪gave␈α∩an␈α∪␈↓αASSIGN␈α∪PRIVATE␈↓␈α∩or␈α∪␈↓αASSIGN␈α∩OLD␈↓␈α∪command␈α∪for␈α∩a␈α∪UDP␈α∪which␈α∩was
␈↓ ↓X␈↓␈↓ αxalready in use by another job. The UDP will be assigned to your job as PUBLIC.
␈↓ ↓X␈↓αCHANNEL IN USE.
␈↓ ↓X␈↓␈↓ αxYou␈α
gave␈αthe␈α
privileged␈αDETACH␈α
command␈αwith␈α
a␈αData␈α
Disc␈αchannel␈α
as␈αargument,
␈↓ ↓X␈↓␈↓ αxand the channel is in use.
␈↓ ↓X␈↓αILLEGAL ADDRESS FOR ADC-DAC
␈↓ ↓X␈↓␈↓ αxThe␈α∞PDP-6␈α∞has␈α∂detected␈α∞an␈α∞illegal␈α∂address␈α∞which␈α∞you␈α∞speci≡ed␈α∂to␈α∞be␈α∞used␈α∂for␈α∞some
␈↓ ↓X␈↓␈↓ αxfunction␈α
connected␈α
with␈α
the␈α
ADC␈α
or␈α
DAC␈α
device.␈α
This␈α
was␈α
not␈α
detected␈α∞when␈α
your
␈↓ ↓X␈↓␈↓ αxprogram␈αexecuted␈αa␈αUUO,␈αbut␈αasynchronously,␈αin␈αthe␈αdevice␈αservice␈αprogram␈αrunning
␈↓ ↓X␈↓␈↓ αxon the PDP-6.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 25␈↓
␈↓ ↓X␈↓αILLEGAL OLD-STYLE ACCESS TO NEW FORMAT UDP. UUO AT USER <ADDRESS>
␈↓ ↓X␈↓␈↓ αxYou␈αhave␈αgiven␈αan␈α␈↓αASSIGN␈αOLD␈↓␈αcommand␈αfor␈αa␈αUDP,␈αand␈αmounted␈αa␈αpack␈αwhich␈α
has
␈↓ ↓X␈↓␈↓ αxbeen␈α∂formatted␈α∂for␈α∂≡le-structured␈α∂use,␈α∂and␈α∂your␈α∂program␈α∂tried␈α∂to␈α∂write␈α∂on␈α∂the␈α∂pack
␈↓ ↓X␈↓␈↓ αx(gave an ENTER UUO).
␈↓ ↓X␈↓αILLEGAL PROTECTION CODE!
␈↓ ↓X␈↓␈↓ αxYou␈α∞gave␈α
a␈α∞SETUWP␈α
or␈α∞CLRUWP␈α∞command␈α
with␈α∞an␈α
argument␈α∞greater␈α∞than␈α
1000
␈↓ ↓X␈↓␈↓ αxoctal.
␈↓ ↓X␈↓αNO SUCH PRIVILEGE!
␈↓ ↓X␈↓␈↓ αxThe privilege name speci≡ed in an ENABLE or DISABLE command does not exist.
␈↓ ↓X␈↓αNO UPPER SEGMENT!
␈↓ ↓X␈↓␈↓ αxYou␈αtyped␈αa␈αSETUWP␈αor␈αCLRUWP␈αcommand␈αand␈αyour␈αcore␈αimage␈αdoes␈αnot␈αinclude
␈↓ ↓X␈↓␈↓ αxan upper segment.
␈↓ ↓X␈↓αNOT A NEW FORMAT UDP
␈↓ ↓X␈↓␈↓ αxYou␈α∂have␈α∂typed␈α∞an␈α∂␈↓αASSIGN␈α∂PUBLIC␈↓␈α∞or␈α∂␈↓αASSIGN␈α∂PRIVATE␈↓␈α∞command␈α∂for␈α∂a␈α∂UDP,␈α∞and
␈↓ ↓X␈↓␈↓ αxmounted␈αa␈αpack␈αwhich␈αhas␈αnot␈αbeen␈αformatted␈αfor␈α≡le-structured␈αuse.␈α The␈αerror␈αis␈α
not
␈↓ ↓X␈↓␈↓ αxdetected␈α
until␈α
your␈α
program␈αtries␈α
to␈α
perform␈α
some␈α
operation␈αon␈α
the␈α
UDP.␈α
See␈αa␈α
system
␈↓ ↓X␈↓␈↓ αxprogrammer about formatting your pack.
␈↓ ↓X␈↓αNOT ONE OF YOUR JOBS.
␈↓ ↓X␈↓␈↓ αxYou␈α
typed␈α∞a␈α
KILL␈α
command␈α∞with␈α
a␈α∞job␈α
number␈α
not␈α∞belonging␈α
to␈α∞your␈α
programmer
␈↓ ↓X␈↓␈↓ αxname.
␈↓ ↓X␈↓αSORRY, PROTECTION FAILURE!
␈↓ ↓X␈↓␈↓ αxYou␈αtyped␈αa␈αSETUWP␈α
or␈αCLRUWP␈αcommand,␈αand␈α
are␈αnot␈αpermitted␈αto␈α
change␈αthe
␈↓ ↓X␈↓␈↓ αxwrite protection of your core image's upper segment.
␈↓ ↓X␈↓αSORRY, YOU CAN'T HAVE THAT PRIVILEGE!
␈↓ ↓X␈↓␈↓ αxYou␈α∀typed␈α∀an␈α∪ENABLE␈α∀command␈α∀specifying␈α∀a␈α∪privilege␈α∀name,␈α∀and␈α∀neither␈α∪the
␈↓ ↓X␈↓␈↓ αxprivilege␈αyou␈α
speci≡ed␈αnor␈α
the␈αPRI␈α
privilege␈αis␈α
in␈αthe␈α
list␈αassociated␈α
with␈αyour␈αPPN;␈α
or
␈↓ ↓X␈↓␈↓ αxthe privilege is one which is not permitted to any user (XGP or SSL).
␈↓ ↓X␈↓αUDP OFFLINE OR WRITE LOCKED
␈↓ ↓X␈↓␈↓ αxYour␈α
program␈α
has␈α
tried␈α
to␈α
perform␈α
some␈α∞operation␈α
on␈α
a␈α
UDP,␈α
and␈α
there␈α
is␈α∞no␈α
pack
␈↓ ↓X␈↓␈↓ αxmounted,␈αor␈αthe␈αdrive␈αis␈αnot␈αturned␈αon,␈αor␈αit␈αdoes␈αnot␈αhave␈αits␈αID␈αplug␈αinserted␈αin␈αthe
␈↓ ↓X␈↓␈↓ αxfront panel, or it is switched to read-only and your program tried to write on it.
␈↓ ↓X␈↓␈↓∧Monitor Command Manual (addenda and errata)␈↓ " 26␈↓
␈↓ ↓X␈↓αUSE "KJOB" TO LOG YOURSELF OFF.
␈↓ ↓X␈↓␈↓ αxYou typed a KILL command with your own job number as the argument.
␈↓ ↓X␈↓∧Also,␈α⊂add␈α⊂``␈↓or␈α∂KILL␈↓∧''␈α⊂after␈α⊂``␈↓ATTACH␈↓∧''␈α∂in␈α⊂the␈α⊂description␈α∂of␈α⊂the␈α⊂␈↓αNO SUCH JOB␈↓∧␈α⊂message,␈α∂and
␈↓ ↓X␈↓∧remove␈αthe␈αreference␈αto␈αthe␈αKILL␈αcommand␈αin␈αthe␈αdescription␈αof␈αthe␈α␈↓αOUT OF BOUNDS␈↓∧␈αmessage.
␈↓ ↓X␈↓∧Remove␈αthe␈α␈↓αIMP IS DEAD␈↓∧␈α
message.␈α (This␈αcondition␈αis␈α
reported␈αto␈αthe␈α
user␈αprogram␈αby␈αan␈α
error
␈↓ ↓X␈↓∧status bit.)
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧Add the following to the monitor command summary, pages 118 and 119:
␈↓ ↓X␈↓βNAME␈↓ αxDESCRIPTION␈↓ π_NAME␈↓ λ(PROGRAM␈↓ XARGUMENTS␈↓ (PAGE
␈↓ ↓X␈↓βCLruwp␈↓ αxclear upper segment write protect␈↓ π_CLruwp␈↓ λ(␈↓ X{prot}␈↓ (24
␈↓ ↓X␈↓βDIAl␈↓ αxtalk to computer by telephone␈↓ π_DIAl␈↓ λ(DIAL␈↓ Xdv | phone␈↓ (41
␈↓ ↓X␈↓βDISable␈↓ αx⊂ disable privileges ⊃␈↓ π_DISable␈↓ λ(␈↓ X⊂ {priv} ⊃␈↓ (42
␈↓ ↓X␈↓βDRd␈↓ αxrun directory editor␈↓ π_DRd␈↓ λ(DIRED␈↓ X{[prj,prg]}␈↓ (41
␈↓ ↓X␈↓βENable␈↓ αx⊂ enable privileges ⊃␈↓ π_ENable␈↓ λ(␈↓ X⊂ {priv} ⊃␈↓ (42
␈↓ ↓X␈↓βHOt␈↓ αxread AP or NYT news wire␈↓ π_HOt␈↓ λ(HOT␈↓ X-␈↓ (41
␈↓ ↓X␈↓βNS␈↓ αxread AP or NYT stories␈↓ π_NS␈↓ λ(NS␈↓ X-␈↓ (41
␈↓ ↓X␈↓βPLan␈↓ αxcreate plan file␈↓ π_PLan␈↓ λ(MAIL␈↓ X␈↓ (70
␈↓ ↓X␈↓βREAD␈↓ αxedit with E in book mode␈↓ π_READ␈↓ λ(E␈↓ X{fn}␈↓ (44
␈↓ ↓X␈↓βSETuwp␈↓ αxset upper segment write protect␈↓ π_SETuwp␈↓ λ(␈↓ X{prot}␈↓ (24
␈↓ ↓X␈↓βUDpufd␈↓ αxcreate UDP file directory␈↓ π_UDpufd␈↓ λ(UDPUFD␈↓ Xprj,prg␈↓ (41
␈↓ ↓X␈↓∧The␈α∞␈↓αUnspool␈↓∧␈α∞entry␈α∞should␈α∞now␈α∞be␈α
␈↓αUNspool␈↓∧␈α∞(changing␈α∞minimum␈α∞abbreviation).␈α∞ On␈α∞page␈α
119,
␈↓ ↓X␈↓∧the␈α⊂SYSTAT␈α⊂command␈α∂now␈α⊂runs␈α⊂the␈α∂WHO␈α⊂program,␈α⊂not␈α∂SYSTAT.␈α⊂ Also,␈α⊂HELP␈α⊂now␈α∂runs
␈↓ ↓X␈↓∧HELP, not COPY.
␈↓ ↓X␈↓∧Also, the following should be added to the list of abbreviations on page 117:
␈↓ ↓X␈↓αprot octal protection code
␈↓ ↓X␈↓αphone telephone number, format {(ddd)}ddd{-}dddd
␈↓ ↓X␈↓αpriv privilege name
␈↓ ↓X␈↓------
␈↓ ↓X␈↓∧I␈α∞am␈α∞not␈α∞in␈α∞general␈α∞trying␈α∞to␈α∞maintain␈α∞the␈α∞index,␈α∞either␈α∞to␈α∞≡x␈α∞errors␈α∞or␈α∞to␈α∞add␈α∞new␈α
entries.
␈↓ ↓X␈↓∧However, one particular omission has been mentioned to me several times by irate users:
␈↓ ↓X␈↓LOADER switches 54