Skud asked me to give a run down of the facilties here at VUT
St.Albans. After reading this, you should appreciate what you guys
have at Swinnie...
What Have We Got?
Let's begin with a look at the labs and what they have.
Building 4, the Joan Kirner Building (otherwise known as the Big Fat
Bitch Building) contains most of the labs on campus.
- 6 486pc networked labs
- 1 networked Wyse (eek) terminal lab with some stand alone pcs
The Science building, No.6.
- 3 386(?)pc labs, also connected to the network
Library
- 1 Macintosh lab, also connected up to the network
- a bunch of other Macs here and there as well.
- a new 486pc lab (I think, haven't checked this out yet)
The Computer Centre (damn building still looks like a military bunker)
- 1 486pc lab, like most others, connected to the network
- Sequent running POSIX (valiant.vut.edu.au)
- Brand new Sprac10 running Solaris 5.3 (cougar.vut.edu.au)
- and defiance.vut.edu.au (got no idea what this machine is or what
OS it runs)
Oh, and don't let me forget the 486pc lab in the Psychology
Department, and the 486pc lab in the Nursing/Health Science Block.
As you probably already guessed, these are also connected up to the
network.
Adventures at VUT (Part 1 - The Labs)
If you're lucky, you've managed to find a lab not in use by a class.
The usual "No Games To Be Played In This Lab" sign is up in a few
rooms, funnily enough this is where all the MUDders seem to be.
Likewise, you'll normally find all the IRCers in labs with signs sayin
"No IRC in This Lab Allowed". Very cluely us uni students aye? The
good thing is the eediots who call themselves admin forgot the "No
Food or Drinks" signs.
There's a 95% chance the near vacent lab is about to have a class in
it 5 minutes later, so you often end up moving more than you actually
spend in front of the computer. Keep moving and you normally end up in
the Wyse (eek) lab.
After spending 2 years at UTS in Sydney, I'm still coping with the
reality that more people at VUT actually do real work than IRC/MUD in
the labs.
Also expect the following things to happen at least once a week.
- The lights flicker, and your terminal is now rebooting...(and these
are new buildings?!)
- The network has gone down. This is often a daily occurrence, not
just weekly.
- Some moron has deleted have the stuff off C: drive.
- You're wishing you weren't sitting at this Wyse (eek) terminal.
Adventures at VUT (Part 2 - Our chunk of the Internet)
Like some other uni's, VUT is very fascist about giving out accounts.
Either you do a subject that requires access, or you managed to get
our old Administrator (Brett, Supreme on IRC) to make one up before he
left for his new job. I got mine the latter way. =)
Now that Brett has left, it's now run by a most clueless Duty
Programmer, who thinks rebooting a machine is the best cure for any
problem. Let's hope we get someone with a clue soon.
valiant.vut.edu.au
The old machine at VUT, which besides its dodgy OS, was quite decent.
WAS, until now...this will be explained later. This machine has most
things the normal person would want (IRC, telnet, ftp, elm, tin, etc)
but has a stack of regular unix commands missing. Guess they didn't
want us to learn anything.
defiance.vut.edu.au
The gateway for St.Albans, and our IRC server. This machine is now
being repeatedly rebooted, and the eediot doin it never re-starts ircd
(the server.)
cougar.vut.edu.au
The new machine! yay, err, shit...what a mess. Not only does Solaris
5.3 suck the big one, but half the stuff wasn't setup properly.
cougar shares the same student disk as valiant, so you can access
whatever you have from either machine. Problem is, if you compile a
program for 1 machine, it ain't gonna run on the other (unless it's
very simple.) Full marks for effort. Also, as a result of constant
rebooting of all 3 machines, this one isn't up that much. Valiant then
had problems accessing the student disk, then it died too. They really
need to hire someone very soon.
Dialing into valiant/cougar has been made really fun. We must now
apply for accounts on the machine connected to the modem rack, before
wqe can get anywhere. Cheapness at its maximum.
The people using the net are pretty much broken up into 3 groups. The
IRCers, the MUDders and the FTPers. But seeing as accounts are rare,
there's not many of us.
See how lucky you guys are? =)
Mark (Sep on IRC)
s9404600@valiant.vut.edu.au
mark@raid.ctpm.uq.oz.au
mkwhelan@acacia.itd.uts.edu.au
**********************************
7. RMIT COMPUTING - by QED
**********************************
I hate writing introductions, so this'll be quick. This is an article
about computing and stuff at the city campus of RMIT. I'm studying
communications engineering there. I'll be talking about RMIT's
facilities, internet access policies and some other stuff. Here goes...
RMIT's COMPUTER FACILITIES
****************************
RMIT has two general access computer labs. The Kay House computer lab
is on Swanston Street and has 30 Compaq 386sx PCs, 33 NEC 386-20 PCs, 17
Macintosh SE/30s (yuck!) and 12 Colour Macintosh LCs. Most of the PCs
have VGA screens, both 3.5" and 5.25" disk drives and 4meg of memory.
Anyone with a student card can use the computers. A two hour time limit
is enforced during busy times (around midday, and towards the end of
semester). There are 2 Apple Laserwriter II printers and 2 HP 3si laser
printers. Printing costs 10 cents per page.
The computers boot up to a nice menu system which allows you to use
applications such as Microsoft Word, Wordperfect, Lotus 123 etc. Many
windows based apps are also available, but running windoze on a 386sx on
a heavily loaded network is not much fun.
You can also connect to other networks from the menu. You can either
telnet to an internet computer or login to another server on the LAN.
There is also a much smaller computer lab which has 10 386sx computers
and a laser printer. Its almost always booked out.
There are also faculty specific labs spread throughout RMIT. For
example the Communications Engineering faculty has computers spread
throughout the department, ranging from a heap of hercules screened XTs
for computer interfacing projects to a room full of 486DX-50s with CD
ROM drives and sound cards for multimedia work. There are also a few
Sun sparc workstations which are mainly used for CAD work.
Nearly all of RMITs computers are connected to the LAN, which is a
Novell network. Most access to mainframe type computers is done by
telnetting from the network. There are about 100 different servers on
the LAN, spread across all the various departments. Most have email
access. Some have telnet and ftp access as well, but use of either of
these is generally frowned upon.
The network is becoming better and better used by both staff and
students. Electronic mail is obviously an enormously powerful
communications tool for completing group work etc. A pleasing trend by
the lecturors is to leave their lecture notes in electronic form on the
network for anyone to copy. One lecturor even leaves multimedia
presentations on the network, which he delivers via a laptop and one of
those boxes on top of the overhead projector at the lectures. (Trouble
is, he tends to spend more time trying to find the relevant cords. But
thats another story... )
INTERNET ACCESS
******************
Unlike some other universities (eg. Melbourne Uni.) internet access is
not restricted to computer science students. Any RMIT student in the
Higher Education sector (ie. anyone doing a degree or higher) is
entitled to a unix shell account on a computer known as minyos. These
accounts have news, email, telnet, ftp and gopher access. Disk quotas
are approximately 2 meg, but tend to shrink as the newbies fill up the
hard disk with GIFs.
One aspect of computing at RMIT which has brought about a great deal of
controversy is IRC, or the banning of it. The following internet
services are banned at RMIT:
- IRC
- MUDs, MOOs etc.
- External BBSs, such as ISCA and Skynet
- FSP
- term
I wrote to one of the two systems administrators and asked for reasons
why IRC etc. is banned. After a fair bit of asking I managed to get
the following answer from him:
>It is banned because of the abuse of limited resources, a la modems and
>terminals on campus. Simple.
> ... this rule was brought in after the authorities
>tried in 1991 to do the fair thing (eg: irc on terminals if there were
>free terms for people to work from etc etc) but it was thrown in their
>faces and abused.
Yeah, OK, fair enough. But the solution needn't necessarily be the
outright banning of IRC. I sure get pissed off when I've got work to do
and I can't get on a computer because there's 10 people reading news or
whatever, and the same would be true of IRC. But why not compromise?
The computer centre has a rule that games are OK in the labs after 5pm
as long as there are enough computers for people to work on. It would
be fairly simple to write a shell script that uses the unix "at" command
to change the permissions on irc to allow it at non-peak times. It
would also be simple to overlook the times when people irc at 2am,
rather than closing their account for a breach of the rules.
Also, don't forget, IRC can also be a powerful learning tool. Channels
such as #unix and #linux can be extremely helpful, since you get answers
instantly instead of waiting for people to reply to a usenet article or
whatever. Sure, 90% of the time its used for socializing and stuffing
around, but the same could be said of usenet. The fact that one of the
systems administrators is seen on IRC nearly every day doesn't do their
credibility much good either.
FSP is also banned here. For those that don't know, fsp was written to
replace anonymous ftp. It is advantageous because it uses far less
bandwidth than ftp and offers a few superior features. The downside is
that many pirate sites use fsp, since it loads their machine less and
the admins there don't notice whats going on. Last year some users of
RMIT machines were found to be using fsp to get pirate programs.
Solution, you guessed it, ban fsp. The fact that there are just as many
pirate ftp sites doesn't seem to matter...
I'm not entirely sure why term was banned.
CALTS
******
CALTS officially stands for "Computer Assisted Learning and Teaching
Software" but many (not suitable for television) meanings have been
thought of by students. The idea is that students in many faculties,
including Engineering and Business courses, have assessable homework
given out in electronic form. Questions are copied from the network
onto a disk which is read by the calts program.
With the numerical type questions the values are selected at random when
the questions are copied from the network, the idea being that students
can't simply copy answers from each other. The adverse effect of this
is that you have to type in the answer accurate to about 8 decimal
places, or the computer will tell you you're wrong. Once you've
completed the questions you're answers are saved onto disk and you then
copy your results back to the network. This saves the lecturors and
tutors a lot of work as they don't have to mark anything, and the
results are immediately available in a nice database.
Thats how it should work. However the way in which the system has been
implimented has meant that the entire calts system has become a running
joke at RMIT. For one thing there is nothing to stop you running the
program more than once until you get all the answers right. But there
are easier ways.
Both the questions and answers are saved on the floppy in dBASE format.
This meant that anyone with a database program capable of reading this
format could simply read the answers straight from the disk! Eventually
(after a few months of nearly everyone getting 100%) the tutors realized
what was going on and added some trivial encryption of the answers.
This quickly became an exercise in debugging for all the comp. sci.
students and soon there were a few programs written for the purpose of
decoding the answers. One program is floating around is a TSR that
displays the answer on the screen as you are asked the questions, so you
simply type in the number on the screen. Another one fills in the
answers for you, you don't even need to run the CALTS program.
But it doesn't end there. Everyone who uses CALTS was required to pay a
$25 fee for the site license of the software. There was strong
objection to this since it is about the worst written software ever
created. It is rare to get through a CALTS session without endless error
messages and the user interface is about as brain dead as you can get.
For example, when confirming an action such as deleting a file, you have
to type "YES". "Y", "yes" or anything else won't work.
Anyway the SRC lodged a formal complaint about it on the grounds that it
is illegal to force students to pay for any kind of learning resource
and not make it available for free for use at RMIT, such as a text book,
where there must also be a copy in the library. RMIT was forced to
offer a refund to anyone who wanted it on the condition that they
"returned the original install disks and destroyed any copies." But
there is no way for them to know whether your work was done at
RMIT on the network or at home on you're rogue copy of CALTS. Since all
RMIT students are law abiding citizens, I'd imagine everyone who got the
refund also deleted their copies. Yeah, right.
Despite all of this, CALTS is still going to be used this year.
Probably because the powers that be are too embarrased to admit that
someone actually got paid to write the thing. There are even rumours of
a windoze version. We can't wait.
Well I should have bored you shitless by now, I think I'll finish here.
Any comments can be emailed to me at s934186@minyos.xx.rmit.edu.au.
[Connection closing. Exiting.]
***********************************************
8. BEHOLDING THE NET - A NEW KINDA FREEDOM
By Deaska
***********************************************
The Internet. A bunch of cables and computers linked together all
around the globe, enabling thousands upon thousands of people to
communicate via way of text and multimedia. The Net is growing ever
popular amongst the international academic community, with the
availability of bulletin boards, chats, email and a whole array of
other useful tools. But underneath all that is a new breeding culture
unlike anything we have seen in the real world.
The virtuality created by the net is the scene of motions towards
openess and freedom. It is a place where race, gender and political
boundaries are considered the least important features. Most users
take this for granted, and the newbies are too confused to figure it
out anyway. Check it out one day. You log into an account, tinker
around with the email, or IRC and low and behold, you become part of
this living web with your thoughts and typing accuracy; the main
currency that you exchange with others...this is a place of cerebral
activity, only mental and spiritual concepts exist. Take for example
within the IRC; the people on the net are simply just handles,
mysterious identities in the crowd. You would probably approach the
situation a little differently in person, forming immediate
impressions from the way individuals dress, their gender, hold their
poise, the way they sound, their mannerisms, the look in their eyes,
and so forth. You don't have these indications on the net. Therefore,
it would seem that the net is a far more pleasant place than the real
world, and the immediate prejudices that are formed in real life,
simply do not exist here. This has seduced many people in the past
and will continue in future.
Essentially, the Net is not just
computers, cables and nifty programming. The Net is what sits and
blinks at the screen, fingers tapping away at the keyboard. There is
a joke circulating somewhere, regarding the supposed invincibility of
the Net:
"If there was a nuclear war, and everyone was killed,
the internet would still be running..." (anon., idunno)
(hehe) This ofcourse couldn't be more further from the truth. The Net
needs people's input, otherwise it would grind to a halt under
meaningless computer chatter. The fact that there people interacting
is what gives the Net life, and this is as close as you would ever
get to it being a mirror of the world.
The most important thing that we must all consider, is that the Net
remains a frontier for us to explore, free from the restraints and
regulations of the state and corporations that follow the "Gates"
ideology. Freedom of expression, non-censorship, freedom to access
software archives, freedom of information. This freedom has been
achieved to a certain extent, although some people actually pay for
their Net access through public providers. But the momentum should be
continued. "The Net is good, and must be protected.." one of the
frontier laws taken from the Western era, and could/should be adopted
by users universally. In a world of paranoia and systematic
termination of rights and our freedoms, the Net just might become the
only remaining example of what it is like to be free.
***********************************
9. MONASH COMPUTING - by Suzy
***********************************
So you guys at Swinburne want to know about us here at Monash...well
spose it's up to me to tell you something then!
I suppose the logical place to start would be with finding a computer.
Monash has a range of computers hidden where you least expect to find
them, such as in the arts building (arts?? who said that word around
here?? ). The majority of Monash computers can be found in the Computer
Centre funnily enough. There are several rooms of 486 type computers,
as well as a heap of 386's that get used when all the 486's are taken by
labs. There are also 4 rooms of dec stations, but only the third year
computer science students have accounts to use these *grumble grumble*.
It is quite a common experience to find that all these computer labs are
taken by lab classes, so then finding a computer requires some skill and
knowledge.
The next best place to go in search of a computer is in the maths building.
There can be found here a huge room full of computers (fancy that). There
are a number of 486's, as well as some 386's and even some really old looking
terminals. There are a few dec stations that also live here. As well as all
this there are a handful of Macs (LC's I think) that are connected together
and can be telnetted from. One major feature of the maths building is it
houses the student scanner. This can be used by anyone for free!! However
the queue, while usually fairly short, takes hours to get through. However
it does come in handy for those gif files!!
If no spare computers can be found here you start to get desperate - the
arts building!! This usually takes a lot of courage, and should only be
attempted in extreme emergencies, and only after you have made an
appointment to see a therapist afterwards (sorry for all you arts people
reading this - i really do luv yas!!). The arts building (or the Ming
Wing as it is lovingly referred to - yes the one that will fall over in
the next gust of wind) is the home of several 386 type computers and the
possibility of finding a spare computer is very likely. This is the place
where a lot of people doing naughty things on their accounts and don't want
to be caught can be found!!!
I can be found most of the time in the halls of residence computer room.
At Monash there are 5 Halls of Residence, each with their own computer room.
These contain on average 6-7 386 computers linked to the university, which
come in very handy for work (?) and all nighters on IRC (!). These computer
rooms are only available for the use of the people actually living in that
particular hall - one of the benefits of living on campus!!
There are also computers in a lot of other places - the law library for
example is also popular with people not wanting to be caught hacking!!
Computers can also be found in the economics department, the engineering
buildings and lots and lots of other places I have either forgotten or
never knew about!!
OK what can you do once you have a computer?? Well the obvious thing is
to log into your account!! Yoyo is the general access unix machine at
Monash and accounts can be obtained by any student or staff member at the
uni. Yoyo is a very very slow dec station with no disk space to speak of!!
The loads on yoyo range from about 1 to 70, depending on the time of day
and the number of users. And yes that IS 70 and no its not a typo and yes
I am sure that it is the load and YES IT IS INCREDIBLY SLOW!!!! Yoyo has
all the normal features such as email, news, mud, telnet and ftp. IRC is
also available, but much to many peoples annoyance, only between the hours
of 6pm and 9am, and not at all by modem. Similarly, telnetting and ftp
should be done only between 5pm and 9am to reduce the load on yoyo during
peak times.
The problem of no IRC during the day is one that has been thought about by
many people. If we are found to be telnetting for the purpose IRC at any
time of the day or night we lose our accounts. Also even when we can get
into IRC at night several of the features have been disabled. For example,
we are not allowed to change servers - we have to use the yoyo server. Also
the DCC command, the exec command, and even the finger command have all been
disabled. To finger someone's account we need to go into our account and
finger them from the unix prompt - needless to say no one usually bothers.
But for all this I shouldn't complain too much - at least we do have IRC,
unlike a number of other universities.
Several other accounts are available at the university, with names such
as aurora, lindblat, nella, and several others. I have no knowledge
about these except that they exist and that to get one you need to be a
computer science student of some year level higher than first year. And
no, being a second year doing first year subjects doesn't count!!
Well I think that is about all the news around here. Any complaints/
errors/comments/questions/compliments etc can be sent to
Suzy@yoyo.cc.monash.edu.au and they should be answered (providing yoyo
doesn't die of lag in the meantime...). I can also usually be found at
night on IRC under the nick Suzy (original hey!!). Cya!
*****************************************
10. SINN FICTION - by Kaelin
*****************************************
Jason Runner started up the program. His screen broke into life and he flew
into action. He had never tried to hack into the Cyberdyne 3000 system before,
many of his friends had tried but all had failed, till now.
You see Jason's Father worked for Cyberdyne and Jason had been making excuses
to come to his fathers work for about a week now, he had been watching him work
at his terminal and had slowly worked out what his fathers username and Id were.
His pc brought up the screen for the network login and the text to speech
converter on his sound card blared out a computerised voice through his
earphones. He quickly typed the username and Id and was into the system,
technically it wasn't a proper pass code, just a back door for emergency entry.
Jason started to look around, it was bigger system than any he had cracked
before and there were a number of processes constantly running in the back
ground that he had never seen or heard about before. The system was like a
maze in it's complexity, the path's were hidden for most of the command files
and the layout of the system was almost alien in its design. Listed amoungst
the regular user directories were machine coded directories that held large
binary files of no apparrent use, it was becoming obvious to Jason that
whoever had designed this system was either insane or a genious.
Somewhere on the system Jason knew there had to be something that he could use
for his own gain, new code, details for bank accounts, private information about
others, anything that could increase his standing in the computer society.
Back in the real world it was 3 am in the morning and Jason was all alone in his
house, his parents had gone away for the weekend and this had been his first
chance to get to the system, till then there had always been some distraction to
pull him away. A knock on his door, his parents needing to use the phone, his
bothers pestering his to play with them all the time, but now his parents were
gone and his bothers asleep... The perfect time.
Jason's body sat at the pc but his mind was elsewhere, his fingers flashed
across the keyboard, eyes staring blankly at the screen and his ears straining
to hear the compu speech. He started checking what he could of the directory
structure, looking for private information, "Here we go" he thought as he found
the system designs. He pulled up the file viewer and checked out the documents,
"Whoa talk about confusing!" thought Jason. Process and function boxes were
everywhere and all of them seemed to link back to a strange sub process off the
main it looked almost like some weird kind of circuit board diagram.
"Well enough of this crap" thought Jason, "Lets look for something else".
Also in that dir Jason found a sub-dir called Viper, he ls -l 'ed the dir
looking for the owner of the sub-dir but none was listed, "weirder and weirder"
he thought as he tried to change to it.
cd Viper
he entered, to which the machines responce was,
enter passcode:
He entered his stolen id but the system spat the initial responce back at him,
"Ok" he thought, "Lets try something else". Jason started entering standard
system id's looking for the key, then he tried names and places, and finally
went for the tired cliche of the company's name. It couldn't be this he thought
as he typed Cyberdyne 3000 and pushed the return button, but he got what he
wanted,
Access Granted level 01...
A green screen monitor flicked on in an empty office of the Cyberdyne building
had anyone been there they would have seen the 2 lines of code flash to screen:
Viper_trap security system activated
KILL -9 requested...
Internal process's whirred into life in the sleek black machine as it went to
work. Checking first the system integritty it quickly moved on to intrusion
counter measures (ICM).
Jason had been in the sub-dir for only a few minutes before he noticed that
something was happening, interferance started to come thru on the compu speech
giving it a strange alien tone, next the responce time to his commands started to slow down. At this point he created a sub process in which to hide his
actions and started to attach it to a standard file on the system.
No sooner had he done this then his original shell was internally killed.
He had become a ghost in the system, chained to the file and unable to affect
his surroundings. Jason was about to hangup his connection when the compu
speech blarred in his head again, the file he had attached his sub-process to
had been called in part of the security cleanup.
"Must be my lucky day" he thought as the code he'd tacked at the EOF loaded a
new operating shell. "As long as I can keep the chain to the file they can't
kick me off the system" Jason laughed to himself. Soon Jason was whizzing
along the system again, flying past help files looking for untried system
software, after a while he tried some of the stranger dirs he long listed all
the dirs at once, piping the output straight to a text grabber to rip the
names of all dirs from the data. He sorted them into 2 categories, tried
and untried, and systematically went thru viewing the contents of all of them
he had not seen previously. Serveral of them had passcode protection but all
seemed to accept the Cyberdyne 3000 id, and each time he used it the system
tried to kick him off, but his chained file always pulled him back online.
Back in the office room new commands where written to screen :
Referential integrity check failure.
error located and being modified.
File .cleanup still in use Permission denied.
Intruder attachment detected in .cleaup .
Viper_trap program ineffectual... Abort.
ICM upgrade to level 10... done.
Request use of program force.eject ... Granted.
KILL process.id @.cleanup -9 .
As the new programs kicked into effect Jason's screen flickered for a moment,
and there was a single tone pulse from his internal modem. The static on his
head set increased slightly and his screen displayed a new message.
You are an illegal system process.
You have 1 minute to logout from the Cyberdyne 3000 system.
Your minute has elapsed. Your process will be terminated.
You are advised to logout...
"Yeah right" thought Jason, "The system won't be allowed to rm the file, and
without that there's no way they can remove me". He turned his attention back
to the system and started to go through the dirs again.
Slowly the static on his headset increased, finally it got to the point where
it was unuseable and he had to remove them, outside in the street one by one
the street lamps glowed brilliant white and then burnt out in series, then
Jason's own bedroom light went out.
"Great, just what I need!" he said, "Bloody power surges! It's a good thing I
have a surge suppressor on the computer line". Jason turned on his desk lamp,
glad that it was connect to the power board with the suppressor and continued
to hack, seconds later his desk lamp poped and startled him, he looked to see
what had happened, and as he was picking the pieces up he saw out of the corner
of his eye his screen go from its usual black background to entire bright white
before the monitor exploded, throwing him across the room, cuting his face to
shreds and slicing open his throat.
In the office room 3 more lines flashed to screen before the monitor turned off
PROCESS ID KILL SUCCESSFUL.
Thank you for using force.eject.
A program written by Dr David Runner.
EOF.
-- (c) 1994 Callum Shaw. You may distribute this story electronically
providing no changes are made and this notice remains intact.
***********************
11. SINN CLASSIFIEDS
***********************
POSITION VACANT
SINN seeks an enthusiastic, motivated person to fill an upcoming position
as god of a newly formed net.sect.
Applicants should have good leadership and communications skills,
training in theology, philosophy, computer science or any other relevant
field, and should be able to perform miracles such as:
* find a PC in the West Wing at the end of semester
* turn water into VB
* locate OPAX documentation
* solve the IRC newbie crisis
* upload files to stan or other swinburne systems via zmodem or ascii
file upload
* rid swin.general of the "Human Resource Weekly"
Benefits include internet access, newsgroup in the alt.religion hierarchy,
company car (or telecommuting link).
Send applications, resume, and 10 commandments to
god^H^H^Halany@stan.xx.swin.oz.au
NOTE:
For those who couldn't guess, that's called SATIRE ... in other words,
don't mail alan! :)
***********************************************
12. ADDENDUM TO SINN 4's PSYCHO IRCER STORY
***********************************************
The nick-changing exercise that the psycho used, ie. msging her and then
quickly changing his nick is simply counteracted. If she wanted to easily
find out his user@host, this simple ON statement would suffice.
/on -msg "*" echo *$0:$userhost()* $1-
which equates to
*** On MSG from "* *" do echo *$0:$userhost()* $1- [QUIET] <0>
This will display the user@host of the person msging you, followed by the
message itself. So, if I played the part of the psycho IRCer, you'd get a