home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
network
/
nia68
< prev
next >
Wrap
Text File
|
1992-09-26
|
228KB
|
5,387 lines
Founded By: | _ _______
Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? are
Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
\ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
+---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
| 17DEC90 | ___ ______ ___ ___ ___ FidoNet, et al.?
| File 68 | ___ _____ ___ ___ ___ If so please drop us a
+---------+ ____ _ __ ___ line at
___ _ ___ elisem@nuchat.sccsi.com
Other World BBS __
Text Only _ Network Information Access
Ignorance, There's No Excuse.
Due to some complaints about our previous files being to SHORT, we have decided
to make some needed changes. To tell you the truth, we never expeceted anyone
complaining about any of our files, so the mail we have been receiving has
opened our eyes up. PEOPLE ARE READING NIA!
We looked over some of the different text file magazines out there, and decided
to follow this path. We will be printing less frequent files (unless our
Internet Address just starts overflowing w/ submissions), BUT they will be
larger! This change, we hope, will make some of our readers happy. So to kick
off the new file correctly, NIA068 will be the first in a new line of better,
longer files. I trust the change will please you.
NOTE when sending mail to us, if you want your name added to our mailing-list,
please state in the letter the address you want it sent to. This will make
our life much easier and your request go smoother. (elisem@nuchat.sccsi.com)
NIA EDITORS
=============================================================================
Table_Of_Contents
1. DECnet [01]............................................Guardian Of Time
2. Unix: UUCP Files............................................Judge Dredd
3. VAX: Tekno DCS HELP [01]....................................Judge Dredd
4. HP: DBEDIT Manual.......................................Malefactor [OC]
5. *LONG* Surveilance Expo '90 Report................................Thalx
6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom Tcimpidis....Count Nibble
7. Department Of The Army Field Manual [01]...................Death Jester
8. Comments From The Editors......................................GOT & JD
==============================================================================
/ /
/ File 1 / NIA068 /
/ DECnet [01] /
/ Guardian Of Time /
/ /
$_Basic Overview Of DECnet-VAX Networking
All DEC Systems have a capability of Linking up and sharing system wide
resources and increasing the capability of that particular VAX/PDP System. They
participate in what they call the DECnet Network, using its interface called
the DECnet-VAX.
I will try to go into detail about what the DECnet Network IS. This file will
be for the beginner and I hope that I do enough that you can figure out what
is going on. I am new to networking so I figure that the best way to start is
to start with a basic overview then work my way up.
$_What Is A Network?
A Network is an entity of two or more computer systems that are connected by
physical links ( cable,microwave, and or satellites ). The purpose of
Networking is for the exchange of Information, Programs, Ideas, etc...
Networking is the "Wave Of The Future". Forget Phreaking it is basically
dead. If you want to power or if you want to get a jump and leave others
behind in the dust, learn NETWORKING, there are 1000's of networks and they
are all out there, just waiting for someone to dial in and exploit them or
to learn from them or to use them.
If you plan on hacking into Networks please remember the Golden Rule about
Hacking:
NEVER ABUSE THE SYSTEM YOU ARE USING, SET UP AN ACCOUNT, LEARN WHY
YOU COULD SET UP THE ACCOUNT AND SEE IF IT WORKS ELSWHERE. NEVER SELL
SECRECTS, NEVER TRY TO RUIN SYSTEMS ( REMEMBER 414 AND THE HOSPITAL RECORDS
AND WHERE ARE THEY NOW? ).
$_What is DECnet?
DECnet is any of Digital Electronic Corporation's (DEC) operating systems,
linked up by modems, satellites, ethernets and such like things.
Listed below are a few of the different types of Operating Systems that DEC
uses:
VAX/VMS
VAX Station 2000
VAX 8500 Series
Vax 8600 Series
Vax 8800 Series
Microvax 2000
MicroVax 1 Running MicroVMS or VAXEL
PDP-11 Running RSX-11M, RSX-11S, RSX11M-PLUS, RSTS/3 or RT-11
DECsystem-20'S
DECsystem-10'S Both 20's and 10's Running TOPS-20 and TOPS-10
Professional 350 Personal Computers Running P/OS Operating systems
The above mentioned Operating Systems and machines, are completely able to
communicate with DECnet, with no special arrangement (as far as I can tell).
Those of you with NON DEC equipment must find out if the DECnet is
supporting X.25 PROTOCOL. If it is, you can then dial with one Network,
into DECnet with no problem, just as long as they are implementing the X.25
Protocol.
DECnet considers all of their systems as equal, there is NO Coordinator, and
no worry about having to go through one central location. You have complete
and free access from each system, with no hassels.
DECnet can vary in size, it can be very small or become an extensively large
network. A small network might consist of two to four nodes. A maximum of
1023 nodes is possible in an UNDIVIDED DECnet network. Very large DECnet
networks can be divided into multiple Areas, up to 63 areas in fact, and
each area (also called a network), can consist of 1023 nodes each.
Below are some examples of what a DECnet Network could LOOK like. Now, if
you are new to flow charts, I'd suggest you read up but basically its quite
easy to follow, the Boxes represent a location or a mainframe, the lines
that connect the boxes, mean that they are connected either by modems,or by
ETHERNETS.
ZDDDDDDDD? ZDDDDDDDD? ZDDDDDDDD?
3TERMINAL3 3TERMINAL3 3TERMINAL3
@DDDDBDDDY @DDDDBDDDY @DDDDBDDDY
3 ZDDDDDDAD? 3 ZDDDDDDD?
@DDDD4TERMINALCDDDDDDDDDY 3VAX 8003
3SERVER 3 @DDBDDDDY
@DDDBDDDDY 3 ETHERNET
ZDDDDDDDDDDDDDADDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDADDBDDDDDDDDDDBY
ZDDDD? ZDDDD? ZDDDD? 3 3
3VAX CDDD4VAX CDD4VAX 3 ZADDDDDD? 3
386003 388003 388503 3VAX88003 3
@DBDDY @DDBDY @DDBDY @DDDDDDDY 3
3 3 3 ROUTER 3
@DDDDDDDDDADDDDDDDY 3
VAX CLUSTERS 3
3
END NODES ZDDDDDDD4
ZDDDDDD? ZDDDDDDD?ZDDDDDDDDDD? 3LAN 3
3MICRO 3 3RAINBOW33VAXSTATION3 3BRIDGE 3
3PDP-113 3100 33II/GPX 3 3100 3
@DDBDDDY @DDDBDDDY@DDDDBDDDDDY @DDDDDDD4
3 ZDDADD? 3 3
@DDDDDD4DELNICDDDDDDY 3
@DDBDDY ETHERNET 33
ZDDDDDDDBDDDDDADDDDDDBDDDDDDDDDDDDBDDDDDDDDDDDDDDDDDDDDDDDDDDDAY
ZDDDADD? ZDAD? ZDDDDDADDDD?
3PDP-113 3PRO3 3MICROVAXIICDDDDD?
@DDDDDDY 33503 @DDDDDDDDDDY 3
END @DDDY ROUTER ZDADDD?
NODE END 3MODEMCDD?
NODE @DDDDDY 3
3
ZDDDDDDADDDDD?
3MICROVAX35003
@DDDDDDDDDDDDY
END NODE
The above is a Wide Area Network, and as you can tell you can have quite a
bit hooked up to a small network, and before sending over a modem or
satelite or whatever, you could be in one network, and have just one modem
hooked up to it. So you get an idea of how a network can be wide or can be
as small as just a PDP-11 hooked up with a Microvax 3500, like below:
ZDDDDDD? ZDDDDD? ZDDDDDDDDDDDD?
3PDP-11CDDD4MODEMCDDDDD4MICROVAX35003
@DDDDDDY @DDDDDY @DDDDDDDDDDDDY
Below is yet another typical network, this will show you access to a non-dec
network or how typical it is to be spread out around the world:
ZDDDDDDD? ZDDDDDD? ZDDDDDD?
3BOSTON CBDDDDDDDDDDDD4 PSDN CDDDDDDDDDD4LONDON3
@DDDDDDDY3 @DDDDDDY @DDDDDDY
3
3
3
ZDDDDDDDD4
3NEW YORK3
@DDDBDDDDY
3
3 ETHERNET 3
ZDDDADDDDDDDDBDDDDDDY
3 ZDDDDADDDD?
3 GATEWAY CDDDDDD?
@DDDDDDDDDY 3
ZDDDDDADDDDDDDDD?
3IBM SNA NETWORK3
@DDDDDDDDDDDDDDDY
The above example is sorta the same example that Mark Hess used to cross
over into the US during his stunt with Clifford Stroll. Read The CooKoo's
Egg, then you'll get a real understanding of Networks and such.
A PSDN is short for PACKET SWITCHING DATA NETWORK or TYMNET or TELENET those
are PSDN's and with the right accounts you can cross the transatlantic
rather than just the US borders.
Wondering how the two Cities are connected together? They use a format
called DDCMP CONNECTIONS, these are dedicated phone lines, connecting the
two and sharing information using their own form of Protocols.
DDCP Message format are in three different types: data, control and
maintenance. Data messages consist of user data. Control messages return
acknowledgements and other control information to ensure data integrity and
error-free transmission. Maintenance messages consist of information for
downline loading, upline dumping, link testing, or controlling a remotely
located, adjacent system.
$_DATA LINK PROTOCOLS
Currently (1984), there are three protocols residing in the DNA Data Link
layer:
Digital Data Communications Message Protocol (DDCMP)-a byte oriented
protocol.
Ethernet Protocol-Carrier Sense Multiple Access w/ Collision Detect
(CSMA/CD) w/ physical channel encoding and operating over a coaxial cable.
X.25 Levels 2 and 3-Operating over Level 1 of the CCITT X.25 recommendation,
which defines a standard interface between data terminal equipment(DTE),
such as a DECnet node,and the data circuit terminating equipment (DCE) of a
packet-switched data network.
$_DDCMP
DDCMP was designed in 1974 specifically for the Digital Network
Architecture. DDCMP is functionally similar to HDLC-High Level Data Link
Control-which was adopted in 1975 by the Internation Standards
Organization.(HDLC is a BIT oriented protocol however) Another type of data
link protocol that is commonly implemented is BISYNC, which is CHARACTER
oriented.
There are three general types of data link protocols: byte oriented,
character oriented, and bit oriented. DDCMP is a byte oriented protocol.
Such protocol provides a count of the number of bytes that are sent in the
data portion of each message. A character oriented protocol uses special
ASCII characters to indicate the beginning of a message and the end of a
block of text, and a bit oriented protocol uses flags to frame data sent in
undefined lengths. Neither the character oriented nor the bit oriented
protocol contains provisions for checking whether all the transmitted data
has arrived at its destination. The advantage of a byte count in a byte
oriented protocol is that it facilitates checking on the part of the
receiving node to see whether all transmitted data has been received.
DDCMP is a general purpose protocol. It makes maximum use of channel
bandwidth and handles data transparency efficiently.
Data Transparency is the capaility of receiving, w/out misinterpretation,
data containing bit patters that resemble protocol control characters.
Character oriented protocols can not handle transparent data as efficiently
as byte or bit oriented protocols.
DDCMP transmits data grouped into phsyical blocks known as data messages and
provides a mechanism for exchanging error-free messages. This mechanism
works in the following manner: DDCMP assigns a number to each data message,
beginning w/ the number one (after each initialization) and incremented by
one for each subsequent data message. In addition, DDCMP places a 16-bit
cyclic redundancy check (CRC16) error detection polynominal at the end of
each data message transmitted.
The receiving DDCMP module checks for errors and, if there are none, returns
an acknowledgement that it has received the message. Acknowledgement is
efficient since the receiving DDCMP module does not have to acknowledge each
message sent. Acknowledgement of data messages n implies acknoledgement of
all data messages up to and including data message n. If the receiving
DDCMP module detects an error, it uses time-outs and control messages to
resynchronize and trigger retransmission.
DATA MESSAGES
DDCMP formats all messages from the Routing Layer into a data message
format:
SOH COUNT FLAGS RESP NUM ADDR BLKCK1 DATA BLKCK2
8 14 2 8 8 8 16 8n 16
SOH = The numbered data message identifier
COUNT = The byte count field
FLAGS = The link flags
RESP = The response number
NUM = The transmit number
ADDR = The station address field
BLCK1 = The block check on the numbered message header
DATA = The n-byte data field, where 0 < n = COUNT < 2(14)
BLCK2 = The block check on the data field
MAINTENANCE MESSAGES
Maintenance Message is a DDCMP evenlope for data controlling downline
loading and upline dumping, and controlling unattended computer system.
DLE COUNT FLAGS FILL FILL ADDR BLKCK1 DATA BLCKCK2
8 14 2 8 8 8 16 8n 16
DLE = The maintenance message identifier
COUNT = The byte count field
FLAGS = The link flags
FILL = A fill byte with a value of 0
ADDR = The tributary address field
BLCKCK1 = The header block check on fields DLE through ADDR
DATA = The n-byte data field, where 0<n=COUNT<2 (14)
BLCKCK2 = The block check on the DATA field
DDCMP OPERATION
DDCMP Module has 3 functional components:
FRAIMING
LINK MANAGEMENT
MESSAGE EXCHANGE
FRAIMING
Locates beginning and end of a message received from a transmitting DDCMP
module. Process involves locating and locking onto, or by synchronous w/ a
certain bit, byte, or message and then receiving subsequent bits, bytes or
messages at the same rate they come in.
At the phsyical level modems/communications interface synchronize bits.
DDCMP fraiming component synchronizes bytes by locating a certain 8-bit
window in the bit stream. Asynchronous links, DDCMP uses start/stop
transmission techniques to synchronize bytes. Synchronous links, DDCMP
searches for a SYN character. Byte synchronization is inherent in 8 bit
multiple parallel links. DDCMP synchronizes messages by searching for one
of the three special starting bytes:
SOH - Data messages
ENQ - For control messages
DLE - For Maintenance messages
To maintain message synchronization, DDCMP counts out fixed length headers
and when required, counts out variable length data based on count field of
the header.
Definitions:
AREA : Large Number of Nodes together ( 1023 makes one area ).
Maximum Areas are 63 each with a total of 1023 nodes ).
BISYNC : Binary synchronous.
CLUSTER : Group of VMS Systems organized to share processor/storage
resourses.
DCE : Data circuit terminating equipment.
DDCMP : Digital Data Communications Message Protocol.
DEC : Digital Equipment Corporation.
DECNET : The Network used by DIGITAL.
DNA : Digital Network Archictecture or the framework of
specifications within which Digital designs its communications
products and the equipments/networks that it uses.
DTE : Data terminal equipment.
ETHERNET : Thin Cable Connecting DEC systems together can run as long
as 1.4 miles.
HDLC : High Level Data Link Control.
LAN : Local Area Network (withing the same area), systems that
are connected together.
NETWORK : Entity of two or more computer systems that are connected by
physical links.
NODE(s) : A a system that is on DECnet, each System is considered a
node.
SNA : System Network Architecture. ( IBM ).
PSDN : Packet-Switched Data Networks.
SYSTEM MANAGERS : Like Sysops that run a BBS, they run the Vax, Unix etc and
are in control of the system. Assigning accunts, Times,
deletion of users, system security, etc...
VMS : Virtual Memory System or the Operating System of a Vax.
WAN : Wide Area Network, Systems(nodes) that span the Country
and the world.
X25 ROUTER : Protocol to communicate with NON-DEC Operating Systems or
used to communicate with Packing Systems such as Telenet
or Tymnet.
==============================================================================
/ /
/ File 2 / NIA068 /
/ Unix UUCP Files /
/ Judge Dredd /
/ /
Well, this is a file that was in the uucp login dir on a unix system, to all
those of you that are experienced in hackin' unix, enjoy:
TABLE OF CONTENTS
1. cu ---------------------------------- Page 1
2. setuname ---------------------------- Page 1
3. uname,uuname ------------------------ Page 1
4. Sysfiles ---------------------------- Page 2
5. Systems ----------------------------- Page 3
6. Devices ----------------------------- Page 7
7. Dialers ----------------------------- Page 9
8. Dialcodes --------------------------- Page 10
9. Permissions ------------------------- Page 11
10. Maxuuscheds,Maxuuxqts --------------- Page 15
11. remot.unkno ------------------------- Page 15
12. Crontab ----------------------------- Page 16
13. Poll -------------------------------- Page 16
14. uugetty ----------------------------- Page 16
15. uudemon.clup,uudemon.admin ---------- Page 17
16. uudemon.hour,uudemon.poll ----------- Page 17
17. XNS,Towernet ------------------------ Page 17
18. uukick,Uutry ------------------------ Page 17
19. Older uucp connections -------------- Page 18
20. New feature ------------------------- Page 19
This index only highlights major areas of the README
file.
README Page 1
NOTE** The following information is not intended to be a replacement
for the uucp administrator reading the uucp section of the Superuser
Guide. If the uucp administrator is establishing a link to a system
which is running the older version of uucp ( i.e. - does not support
bidirectional communication ) then he/she should consult the uucp
section of documentation for that system.
New Features:
=============
Cu has also been modified to be more transparent to control sequences
sent by the called system. The local system is set for no expansion
regardless of initial tab settings. It is assumed that the called
system will handle expansion.
If cu is being used for a connection to a remote system which
has crashed or is shut down and the connection appears to be
locked up, performing a '~.' (tilde, dot) should disconnect
the user in approximately 10 seconds, or a '~..' should disconnect
sooner.
NOTE** cu does not work over Towernet. Cu is usually used when
using direct connection or over a modem. For a connection over
Towernet, the user should use rlogin if available.
Since many applications, such as "vi", use control characters, cu's
default setting does not follow DC1/DC3 protocol(i.e. -ixoff is not
set on the local port). However, if it appears that data is being
lost during a cu session, the user may opt to toggle the nostop
option which will set ixoff on the local port. Please see the cu man
page for more detail.
#
IMPORTANT
---------
Most of the essential programs, like uucico must run suid uucp and the
uucp uid MUST be 6 and uucp gid MUST be 6 as well. This is NOT the
traditional SysV uucp uid and gid but it DOES correspond to current
practice on Towers, so there should be no problem.
#
#
(/usr/lib/uucp/setuname)
---
An added feature is the program setuname that may be used to modify
the nodename of a running kernel. For uucp and related utilities to
work properly it is important that the name used by uucp be the same as
the nodename that the running kernel is using. Setuname can only
be run by root.
"uname -n" will give you the nodename of the running kernel.
"uuname -l" will give you the name that uucp sees as its local
name.
README Page 2
For uucp to be used correctly, "uuname -l" must be the
same as "uname -n". Uucp must be using the nodename of the
running kernel.
The program setuname will allow you to change the nodename of
the running kernel(memory) and on disk.
EXAMPLE SETUNAME COMMAND
========================
setuname -k -n new_nodename
where -k - specifies to write the new utsname struct
into /dev/kmem01, all other /dev/kmem(s)
present in the system, and /unix.
-n new_nodename - set new nodename to "new_nodename"
NOTE*** The Administrator uses a file called /etc/NODENAME
when making new kernels. After a fresh base installation,
/etc/NODENAME contains by default, a null value. If
setuname is used to change the nodename on disk, then
the default name in /etc/NODENAME is changed by setuname
to match the new nodename.
Please see the setuname(1M) for more information.
#
#
(/usr/lib/uucp/Sysfiles)
---
There is a new control file "Sysfiles" which lets you specify,
and separate, Systems, Devices, and Dialers file entries for
uucico and cu. Although use of Sysfiles is not necessary,
it is useful for certain networks where, for example, requests
for login service might be accepted on a different address than
requests for uucico service (hence different Systems files), or
where there are different chat scripts to request each service
(hence different Dialers files).
Another use of Sysfiles is to split large Systems files into
smaller, more manageable files (e.g., local and global Systems
files).
FORMAT:
service=<service name> systems=<systems file list> \
devices=<devices file list> \
dialers=<dialers file list>
Where service name is "uucico" or "cu". Each file list is a list
of colon-separated file names. File names are relative to
/usr/lib/uucp unless a full path name is given. Files are searched
in the order that they appear in the file list.
The defaults are the usual uucp files: /usr/lib/uucp/Systems,
README Page 3
/usr/lib/uucp/Devices and /usr/lib/uucp/Dialers.
EXAMPLE 1:
This example uses different systems and dialers file to separate
the uucico- and cu-specific information, with information that they
use in common still in the "usual" Systems and Dialers files.
service=uucico systems=Systems.cico:Systems \
dialers=Dialers.cico:Dialers
service=cu systems=Systems.cu:Systems \
dialers=Dialers.cu:Dialers
EXAMPLE 2:
This example uses the same systems files for uucico and cu,
but has split the Systems file into local, company-wide,
and global files.
service=uucico systems=Systems.local:Systems.company:Systems
service=cu systems=Systems.local:Systems.company:Systems
#
#
#
(/usr/lib/uucp/Systems)
---------------------------------------------------------------------------
The Systems file (/usr/lib/uucp/Systems) corresponds to the old L.sys
file. Each line is used to describe a system and a way to get to that
system, and how to login when the connection is established. When
calling out, uucp will try to use each line of this file, in order, until
it can make a connection and tries to login. If the login fails, the
work is postponed.
The format is six space-separated fields:
NAME TIME TYPE CLASS PHONE LOGIN
No leading white space. Lines beginning with '#' are comments.
The NAME is the system name of the remote system. The system name
should contain NO slashes and may be up to eight characters which
is the limit of the nodename structure in the kernel. A system
name of T32_600 is allowed while T32/600 causes errors and
should not be used.
Every system which you call should have at least one entry.
It is possible to have anonymous (strangers) call in, but it is
not desirable from a security point of view. More on this
later in the section about Permissions and remote.unkno.
The TIME field indicates when this phone number/class may be used
to establish a connection. This field has a day field, followed by
an optional time-of-day field, followed by an optional retry field.
There are no spaces separating subfields. The day string is a list of
one or more day abbreviations:
README Page 4
Su Mo Tu We Th Fr Sa
or:
Wk - meaning any weekday
or:
Any - meaning any day
or:
Never - for no calls out to this system, call in only
The TIME field is optional (none means any time) and is a range such as:
1730-0730 - which means 5:30 P.M.to 7:30 A.M.
The RETRY field, if present, consists of a semicolon followed by the
number of minutes to wait before retrying if the dial fails. Otherwise
the number is retried (once) almost immediately.
The TYPE field is used to find a device or port to dial-out on. It MUST
match the FIRST field of a line in the Devices file. The most common
entry is "ACU", which is used for 801-type acus as well as smart modems.
You may also use any other name for other types of connections.
The CLASS field is used to further restrict the search for an available
device. It is also used to set the speed of the connection. The class
field may contain a letter as well as the speed:
D1200
The above example will only match a Devices file line with Class
Field of "D1200" or "Any". The CLASS field of the Systems file may
also use the key word "Any" which will match with the Devices file of
the same type. If the match involves "Any", then in each file 1200
bps is assumed.
The fifth field is the "PHONE" field and is the phone number that will
be sent to the dialing device. There are two possibilities. First,
Phone can contain a phone number, with an optional alphabetic prefix
that will be translated from the Dialcodes file. In the string there
are two other abbreviations: '=' and '-'. The '=' indicates that the
dialer should pause and wait for another dial tone. A '-' means to pause
for approximately four seconds.
It is also possible to have other information in the Phone field to be
used to connect through an intelligent switch to another system. In
this case the field can be sent untranslated. Translation is controlled
by the contents of the Devices file.
The last field(s) are the "expect send" pairs that are typical of the
login sequence. This field is not processed until the connection has
been established. The first subfield is an expect subfield; to send first
a null "expect" may be designated by "". An "expect" may itself have
subfields separated by '-': expect1-send1-expect2-send2-expect3 and so
on, ending with an expect. Send fields may have certain abbreviations
embedded in them:
\c - at the end of a send field indicate no newline is to be sent
otherwise a newline is sent by default
\r - send a carriage return
README Page 5
\n - send a newline
\N - send a null
\b - send a backspace
\d - delay 2 seconds
\p - pause .25 to .5 seconds
\s - send a space character
\t - send a tab character
\\ - send the backslash
EOT- send an EOT (actually the EOT\n pair is sent twice)
BREAK - send a break
\nnn - convert the octal digits nnn to a character and send
An example:
xyz Any;2 ACU 1200 ACpa-555-6695 "" \n ogin--ogin-EOT-ogin--ogin-BREAK-ogin
nuucp
This line is for the remote system "xyz".
We may dial at any time, wait two minutes in case of failure. Uucp will
normally try the same number twice.
Uucp will use some kind of ACU or dialing modem. The first available
line from the Devices file that has a first field with "ACU" will be
used. The system that this particular example comes from, uses a Hayes
Smartmodem.
The phone number passed to the dialing routine will be 555-6695 plus
whatever ACpa is specified as in the Dialcodes file (probably 1-215, the
area code for Southeastern Pa). Pauses will be placed after the area
code and also after the exchange number.
After connection is established by the dialer, a newline will be sent.
It will be sent without waiting because of the initial null expect
field. If the response comes back with "ogin" embedded in it, "nuucp"
will be sent; if not, another newline is sent (the -- ). If ogin is
still not received EOT\n is sent twice. If that doesn't do it another
newline is sent. And if that doesn't work a break is sent. If that
fails to get "ogin" the login sequence is aborted and uucp gives up the
attempt for the time being.
MORE Systems file examples -----
NAME TIME TYPE CLASS PHONE LOGIN
# A direct connection
kudzu Any kudzu 9600 - "" \r\d\r\d\r\d\r ogin: nuucp ssword: sniglet
kudzu - the remote system's name
Any - call any time
kudzu - matches the first field of a line in the Devices file
README Page 6
9600 - the speed
"-" - no phone number
"" \r\d\r\d\r\d\r ogin: nuucp ssword: sniglet - the expect/send string.
---
# Towernet connection - for systems that support Towernet
#####NOTE -- A default Towernet line has already been added to the Devices
file. If you do not have Towernet on your Tower 32, this
line is ignored.
zebra Any tnet,e Any -
zebra - the remote systems name
Any - call any time
tnet,e - is an arbitrary name that matches the first field in
the Devices file and ,e means "use e protocol"
Any - CLASS field since uucp will be using Towernet, the word Any is
sufficient.
- - acts as a null space holder for the phone field.
It is recommended that either e or f protocol be used for Towernet
uucp connections (SEE the Towernet section of this README file).
The protocol selection is done either in the Systems file or may
also be done in the Devices file or both. The following are
examples of ways that protocols can be selected for uucp file
transfer :
If the Systems file looks like :
zebra Any tnet Any -
and the Devices file looks like:
tnet - - Any XNS
THEN -- you will be using the default g protocol, which may cause
the problem noted in the Towernet section of this README file. Instead,
use either the f or e protocols as follows :
---
If the Systems file looks like :
zebra Any tnet,e Any -
and the Devices file looks like:
tnet - - Any XNS
then e protocol will be used.
---
If the Systems file looks like :
zebra Any tnet Any -
and the Devices file looks like:
tnet,e - - Any XNS
then e protocol will be used.
---
If the Systems file looks like :
zebra Any tnet,f Any -
and the Devices file looks like:
tnet,f - - Any XNS
then f protocol will be used.
---
README Page 7
Please refer to the uucp section of the Superuser Guide for more
information on protocol selection.
---
more Systems file examples
#log in kudzu first try 2400 on both lines then try 1200 baud
kudzu Any ACU 2400 =794-6666 "" \r\r@\d@\d@\d@\d@\d@\d@\d
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
kudzu Any ACU 2400 =794-6281 "" \r\r@\d@\d@\d@\d@\d@\d@\d
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
kudzu Any ACU 1200 =794-6666 "" \r\r@\d@\d@\d@\d@\d@\d@\d
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
kudzu Any ACU 1200 =794-6281 "" \r\r@\d@\d@\d@\d@\d@\d@\d
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
# direct to modem
hayes12 Any hayes12 1200
hayes24 Any hayes24 2400
#
#
#
(/usr/lib/uucp/Devices)
----------------------------------------------------------------------------
NOTE*** When you remove entries from the Devices file, you must
remove the corresponding entry in the /etc/inittab file for proper
construction of the Administrator terminal and printer
lists.
For information on modem settings refer to the Hardware Service
Manual.
The Devices file corresponds to the L-devices file of the old uucp.
Each line describes a line and a use of that line to make a connection.
Each line has the following format:
TYPE LINE LINE2 CLASS DIALER TOKEN [DIALER TOKEN] ...
Both type and class will be matched from a line in the Systems file.
Comments beginning with '#' or white space are ignored.
The TYPE field may be any name, but should match the third field of
the Systems file. For direct connections the TYPE field is usually
the remote system's name. It is of importance to note that for cu
connection, the TYPE field of the Devices file MUST have the
word "Direct" with a capital "D". "ACU" is used for all lines that
use either a dialable smart modem or a real acu.
For Towernet connections, the TYPE field may be followed by ",e"
or ",f" to specify the correct protocol.
The LINE field should contain the name of the device through which the
connection will be made. For example, "ttya" will mean that the
connection will be attempted through "/dev/ttya". For entries that
use XNS ( for Towernet ) in the dialer field this should be "-".
README Page 8
The CLASS field has the same format and is matched to the class field of
the line from the Systems file.
The LINE2 (3rd) field should be "-" on most Tower 32 systems. It is
the name of the auxiliary device port to which a good-old-fashioned
801-ACU is attached.
The DIALER field is used to select the method of making the connection.
The field must match either one of the builtin dialers, the first field
of one line in the Dialers file. The word "direct" can be used on
direct connections and cu connections. It matches a line in the Dialers
file with a null script. The word "XNS" is used for Towernet connections.
Current reserved names for builtins are:
"801" 801 ACU Dialer
"212" 801 ACU Dialer
"TCP" 4.2BSD sockets
"Unetserver" 3Com implementation of TCP
"DK", Datakit Network
"XNS" Towernet, XNS (xsp service)
"direct" direct RS232 connections
Builtins are checked first and then the Dialers file for all
remaining dialer fields.
The last field is the string to be sent to the dialer. If none is
present or if only an \D or \T is present then the Phone field from the
Systems file is processed. \D ensures that the contents of the
PHONE field of the Systems file will not be interpreted as a valid
entry in the Dialcodes file, while \T ensures that it will.
Multiple dialer-token pairs may be present. Only the last token may be
missing.
Devices file EXAMPLES:
---
Direct tty03 - 9600 direct
A cu connection where :
Direct - specifies that this is to be used by cu
tty03 - /dev/tty03 will be the port used by cu
"-" - no 801 ACU
9600 - 9600 bps
direct - matches a null script in the Dialers file
---
NOTE ::: FOR SYSTEMS THAT SUPPORT TOWERNET
tnet,e - - Any XNS
A Towernet connection where:
tnet - matches third field in systems file
README Page 9
,e - e protocol for Towernet
- - no tty port
- - no 801 ACU
Any - speed is of no concern since it will be a Towernet
transmission
XNS - specifies Towernet connection
---
more examples----
ACU tty04 - 2400 hayes \T
ACU tty05 - 1200 hayes \D
#
#
#
(/usr/lib/uucp/Dialers)
---
This file contains one line scripts that directs the handshaking that
takes place between the system and various types of dialers. The
first field is the name of the dialer and is matched against the dialer
field of the Devices file.
Comment lines start with "#" or white space.
The second field is a set of translations and may be null (""). These
translations usually are used to map "=" and "-" into the appropriate
characters for the dialer. Other translations may be specified.
The remaining fields are expect-send strings.
The escape sequence permitted in the send strings are:
\p - pause (.25 to .5 sec)
\d - delay (approx. 2 sec.)
\D - take Phone field from Systems file OR token from
Devices file WITHOUT Dialcodes translation
\T - same as \D but WITH Dialcodes translation
\N - null byte
\K - send a Break
\E - enable echo checking (send a char, wait 'til its
received, send the next, wait ...) good if the device
is slow and echos.
\e - disable echo checking
\r - send a carriage return
\c - (at end of string) don't send a newline
\n - send a newline
\nnn - convert octal nnn to a character and send
An example:
hayes =,-, "" \dAT\r\c OK\r \EATDT\T\r\c CONNECT
hayes - matched against the Devices file dialer field, this
field is usually the name of the dialer
README Page 10
=,-, - the "=" (wait for dial tone) is translated to ","
(pause) since the Hayes Smartmodem 1200 does not have
the ability to recognize dial tone; the standard pause
character "-" is also translated to ","
"" - expect nothing, i.e. send first
\dAT\r\c - wait 2 sec, send AT followed by a carriage return with
no newline
OK\r - expect OK followed by a carriage return
\EATDT\T\r\c - turn on echo checking and send ATDT followed by the
phone number as translated by the Dialcodes file,
this is followed by a carriage return without a newline.
CONNECT - the script successfully completes if CONNECT is
received
A SAMPLE Dialers file
---------------------
penril =W-P "" \d > s\p9\c )-W\p\r\ds\p9\c-) y\c : \E\DP > 9\c OK
ventel =&-% "" \r\p \r\p-\r\p-$ <K\D%%\r>\c ONLINE!
rixon =&-% "" \r\p \r\p-\r\p-$ <K\D%%\r>\c ONLINE!
vadic =K-K "" \005\p *-\005\p-*\005\p-* D\p BER? \E\D\e \r\c LINE
develcon "" "" \pr\ps\c est:\007 \D \007
micom "" "" \s\c NAME? \D\r\c GO
hayes =,-, "" \dAT\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
hayes24=,-, "" \dAT\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
bbox =,-, "" \dATB3\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
direct
XNS
---
#
#
#
(/usr/lib/uucp/Dialcodes)
---
The Dialcodes file is a list of abbreviations and their translations.
Abbreviations are alpha strings and the corresponding translation is
passed to the dialer.
An example:
INRB 77=440-
INRB - an abbreviation meaning Internet-Rancho Bernardo is
translated to 77, wait for dial tone then send 440.
From the code, it appears that the Dialcodes file has no formal
mechanism for comments, any abbreviation that never matches will do, or
the translation field may be followed by a comment.
README Page 11
(/usr/lib/uucp/Permissions)
---
The Permissions file is the heart of security administration for uucp.
Comment lines start with a '#'. The format of the Permissions file is a
sequence of logical lines of "option=value" assignments. Logical lines
may consist of multiple physical lines by escaping the newline with "\".
There are two types of logical lines or entries in the Permissions file.
These are LOGNAME entries and MACHINE entries. These entries are
composed of white space delimited "option=value" assignments. No
white space is permitted in these assignments. LOGNAME entries will have
a LOGNAME assignment in it. Likewise MACHINE entries will have a MACHINE
assignment.
All login IDs used by remote systems to login for UUCP transfers MUST be
specified in exactly one LOGNAME entry. In the case of Towernet
connections, where no actual login takes place, a LOGNAME entry must
exist for the uid under which the server (/usr/bin/server) runs, usually
root.
REQUEST assignment
------------------
"REQUEST=yes" or "REQUEST=no" : In a LOGNAME entry this specifies whether
the local host will permit the remote to ask for files to be sent to the
remote, when the remote calls in.
In a MACHINE entry it specifies whether the remote may request files
when the local host calls the remote.
The default is REQUEST=no, the remote may not request files.
SENDFILES assignment
--------------------
The SENDFILES assignment applies only to LOGNAME entries.
"SENDFILES=yes" indicates that the local host will send files to the
remote if the remote calls. "SENDFILES=call" means to only send if the
local host calls the remote. The latter is more secure. The default is
"SENDFILES=call". The yes option needs to be specified for passive
relationships, i.e. the local machine never calls.
READ and WRITE
--------------
The READ and WRITE assignments specify which SUBTREES of a system
a remote machine may access. The format of the value is a colon
separated list of directory path names:
READ=/usr/news:/usr/spool/uucppublic
The defaults are:
READ=/usr/spool/uucppublic
WRITE=/usr/spool/uucppublic
The READ and WRITE assignments in the LOGNAME entry specify the
README Page 12
privileges of any machine that logs in with that user name. This
should be very restrictive for commonly used user names or user names
without password protection.
These assignments in a MACHINE entry specify the permissions when the
local host calls the remote.
READ=/
WRITE=/
is a wide-open machine.
Specification of READ and WRITE replaces the defaults, it does not add
to the defaults.
NOREAD and NOWRITE
------------------
Exceptions to the READ and WRITE access permissions may be specified in
NOREAD and NOWRITE assignments. These have the same format as the READ
and WRITE assignments.
READ=/ NOREAD=/etc
The above combination implies that the remote system may read any file
on the system except those whose path names begin with "/etc".
CALLBACK
--------
This option only applies to LOGNAME entries and indicates whether to
accept ANY work from a remote, or whether to call back first.
CALLBACK=yes means that no work will be done until the local host
returns the call. CALLBACK=no is the default. If both machines specify
CALLBACK=yes, nothing will get done, so assign this carefully.
COMMANDS
--------
The COMMANDS assignment is a colon separated list of commands that a
remote may specify. This assignment only applies to the MACHINE entry.
The default is "COMMANDS=rmail". The command specified may be a
filename or a path name. If the path name is specified then all requests
for the corresponding filename will use the specified path name.
COMMANDS=rmail:/usr/bin/ls:/usr/lbin/rnews
This specifies that rmail, ls, and rnews may be "uux'd" from the remote.
Furthermore the "ls" used will be /usr/bin/ls (regardless of search
path) and rnews will come out of /usr/lbin. The default search path for
commands is "/bin:/usr/bin:/usr/lbin". To permit full access, the
assignment "COMMANDS=ALL" can be used.
To allow forwarding specify "uucp" in the COMMANDS assignment.
README Page 13
VALIDATE
--------
The VALIDATE assignment applies only to LOGNAME entries but is a means
of tying a particular machine to a particular user name. The assignment
is a colon separated list of machine names. If a machine calls in and
claims to be machine xxx, and VALIDATE=xxx is specified for a
LOGNAME=Uxxx then the call will be terminated unless the caller logged
in with user name "Uxxx".
MACHINE
-------
A MACHINE assignment makes an entry a MACHINE entry. The assignment is
a colon separated list of machines (taken from the Systems file) or the
keyword "OTHER". The latter is used to specify a set of defaults for
machines that are not listed in any entry. All other assignments in the
entry apply to each machine named in the MACHINE assignment.
For uux to work properly on the local system, there should be a MACHINE
assignment entry for the local machine (ie. - MACHINE="local system name")
in the local machines /usr/lib/uucp/Permissions file with the allowable
commands defined.
LOGNAME
-------
The LOGNAME assignment is a single user name by which a uucp connection
can be initiated.
A LOGNAME and MACHINE entry can be combined into a single entry.
Example:
--------
LOGNAME=nuucp \
REQUEST=yes \
SENDFILES=yes \
READ=/usr/spool/uucppublic \
README Page 14
WRITE=/usr/spool/uucppublic \
NOREAD= \
NOWRITE= \
CALLBACK=no
# Any machine that logs in as nuucp can request files and we will send
# files on the connection. On requests by the remote to read or write
# into /usr/spool/uucppublic or a subdirectory will be honored. We call
# the local machine "kudzu" for this connection. A tilde in a request
# is translated to "/usr/spool/uucppublic".
LOGNAME=UncrsdX \
REQUEST=yes \
SENDFILES=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
NOREAD= \
NOWRITE= \
CALLBACK=no \
VALIDATE=ncr-sd
#
# The VALIDATE command specifies that ncr-sd must log in as UncrsdX
# any other user name used by ncr-sd would be considered an imposter
#
MACHINE=ncr-sd \
REQUEST=yes \
SENDFILES=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
NOREAD= \
NOWRITE= \
COMMANDS=ALL
#
# The COMMANDS=ALL means any uux request will be accepted. This is the
# reason that the VALIDATE assignment is used in LOGNAME=UncrsdX to
# ensure that more commonly known user names and passwords are not used
# by an imposter posing as ncr-sd
MACHINE=OTHER \
REQUEST=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
COMMANDS=rmail
#
#
#
README Page 15
LOGNAME=root \
REQUEST=yes \
SENDFILES=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
CALLBACK=no
# The LOGNAME=root entry in the Permissions file is necessary
for Towernet connections.
MORE, yes more, /usr/lib/uucp/Permissions file EXAMPLES --
MACHINE=bambi:doozer:grok:gollum:giggle \
REQUEST=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
NOREAD= \
NOWRITE= \
COMMANDS=rmail:uucp:lp:lpr:help:print:who:ls:rnews:cunbatch
MACHINE=OTHER \
REQUEST=yes \
READ=/usr/spool/uucppublic \
WRITE=/usr/spool/uucppublic \
COMMANDS=rmail
NOTE** There should be a machine file entry for the local machine with
the appropriate commands so that uux will work on the local machine.
#
#
(/usr/lib/uucp/Maxuuscheds and /usr/lib/uucp/Maxuuxqts)
---
These two files contain a single line with the number of simultaneous
uuxqts and simultaneous uuscheds that can be running. The number is
given in ascii. A value of 1 or 2 is common. Note that processes
such as news that assume that single threading is provided by uuxqt
require a Maxuuxqts of 1.
#
#
#
(/usr/lib/uucp/remote.unkno)
---
If remote.unkno exists and is executable in /usr/lib/uucp then any
system not listed in the Systems file will not be permitted to make a
connection. Moreover, remote.unkno is executed with its first (and
only) argument, the name of the calling system. This can be used to log
the attempt in a log file or by mailing a message to the uucp
administrator concerning the unknown system.
README Page 16
#
#
#
(/usr/lib/uucp/Crontab)
---
A sample crontab for uucp is recorded in /usr/lib/uucp/Crontab.
This crontab should also be present on your system as -
/usr/spool/cron/crontabs/uucp.
See crontab(1) for more information.
#
#
#
(/usr/lib/uucp/Poll)
---
Poll is a list of machines and the times at which they should be
polled. The first field is a machine name, followed by a TAB followed
by a space separated list of hours at which to call.
EXAMPLE POLL FILE
# "system <tab> hour1 hour2 hour3 ..." lines for polling remote systems.
#
# Lines starting with # are ignored.
# NOTE a tab must follow the machine name
unit1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
unit2 9 16 23
unit3 8 10 12 14 16
unit6 8 10 12 14 16
ncrcae 8 10 12 14 16 18 20 22
#
#
#
(/usr/lib/uucp/uugetty)
---
This is a version of getty that can be used on a port allowing both
dial-in and dial-out connections. Uugetty is identical to getty(1M)
but changes have been made to support using the line for uucico,
cu, and ct for bidirectional exchange of information. Uugetty should
not be used to call into a single direction getty. More on this later
when describing a direct connect to a unit which does not support the
newer uucp.
Please refer to the uugetty man page for more information.
#
#
#
README Page 17
(/usr/lib/uucp/uudemon.adm, /usr/lib/uucp/uudemon.clup,
/usr/lib/uucp/uudemon.hour, /usr/lib/uucp/uudemon.poll)
---
These are the demon scripts invoked by cron. Change as you wish but be
careful.
#
#
XNS and Towernet considerations -- FOR SYSTEMS THAT SUPPORT TOWERNET
---
As mentioned above, a uucp connection over Towernet initiated by a
remote system requires a LOGNAME=root entry.
/etc/service.db
---------------
Put the following line in /etc/service.db:
1:uucp:xsp:444:/usr/lib/uucp/xnsuucico::
/etc/towernet.db
----------------
Put the following line in /etc/towernet.db:
uucp_socket:444
** On the Tower 32, these two lines should already exist in the files
/etc/towernet.db and /etc/service.db if Towernet has been installed.
One problem has been noted when using g protocol for file transfer over
Towernet connections. The file transfer proceeds without fail, but either
one or both sides of the connection will leave a process hanging. On the
slave side, the process "uucico -uroot" may be seen in the process table,
but it will not be accumulating any more processor time. Sometimes it
may be possible to simply kill this process, but if it won't "die", then
Towernet must be taken down and then restarted again. The master side, or
the side that initiated the call ( and also the machine that determines
what protocol will be used ) may not have a process hanging, or may have
a uucico process hanging. Again, go ahead and try to kill this process.
The solution at this time, is to specify use of either the e or the f
protocol for file transfer over Towernet in either the Systems file,
the Devices file or both. A default entry has been provided in the
Devices file for Towernet connections. When adding the corresponding
Systems file entry, the administrator should use the type name(3rd field)
"tnet" to utilize the correct Devices file entry.
The uucp section of the Superuser Guide has more detailed information on
protocol selection.
#
#
#
(/usr/lib/uucp/uukick, /usr/lib/uucp/Uutry
---
The files uukick and Uutry, are shell scripts which
enable the user to start the uucico daemon when retry time has
not yet been reached.
README Page 18
The scripts are all variations on the same theme of removing the
status file, and starting uucico. Uukick will place the
uucico in the background. Uutry will place the diagnostic output
of uucico in a file called /tmp/systemname where systemname is
the name of the remote system.
To start uukick for the remote system pookey :
uukick pookey
Reference the Uutry man page for more information.
---
Connection of a unit running the newer uucp(the uucp installed
on the Tower32 is the newer uucp) and another using the older uucp.
When you are faced with situation of establishing a link
with a computer running the older version of uucp, then
it must be established which system will be designated as
the calling unit (the master or active unit) and which will
be the unit to be called (passive or slave unit). If the
system running the older version of uucp is the master unit,
then either uugetty or getty can be used to receive the call
on the system running the newer version of uucp. However if
the system running the newer uucp is the master unit, then
uugetty cannot be used to call. The master unit must use a
dialout only line to call the system running the older version
of uucp.
As an example, let us designate the system running the newer uucp
as the master or calling unit.
The /etc/inittab for the master unit will have the following
entry :
t01:1:off:/etc/getty tty01 9600 un
The un designates "unknown" terminal type. A terminal type
is needed, as shown above, on the Tower32 (if acting as master)
so that the Administrator's terminal listing is correct
for the direct connection to a system with the old uucp.
The line is acting as a raw line and no getty is being
respawned.
The Poll file on the master unit must be set up to poll
the slave unit periodically to see if the slave unit has
work queued for it.
The master unit's Systems file example :
slave_name Any slave_name 9600 - "" \r\d\r\d\r login: nuucp
The master unit's Devices file example :
slave_name tty01 - 9600 direct
---
Since the slave unit must wait to be polled by the master
unit, its'(the slave's) USERFILE file must be set-up
to allow the master unit to take any work that the slave
has queued for it. This can be accomplished by having the
README Page 19
USERFILE set up as follows :
,Master_unit /
nuucp, /
This, of course, has no restrictions.
*The slave unit's /etc/inittab file must respawn getty with
an entry similar to the following in /etc/inittab :
t02:1:respawn:/etc/getty tty02 9600
*Slaves L-devices file should exist but with a length of zero.
*Slaves L.sys file example
Master_unit NONE Slave 9600 tty02
The device, /dev/tty02 in this case, should have 0666 permissions.
chmod 0666 /dev/tty02
The owner of the line should be uucp.
chown uucp /dev/tty02
Please consult the appropriate superuser guide for further
information on setting up the uucp files for the older version
of uucp.
NEW FEATURES
============
Uucp can now handle modems with full modem control. This is
indicated to uucico by a new syntax in the Devices file.
If the line field of the active line of the Devices file has
a ';N' termination, dialing will take place WITHOUT waiting
for modem signals (like DCD or DSR). Later in the same line
a trailing ';C' on a dialer entry indicates when to expect
carrier (et. al.)
For example:
ACU tty04;N - 1200 hayes;C \T
This indicates that tty04 will not have carrier until the Hayes
Smartmodem dialing sequence successfully completes.
Cu and ct also support the new syntax in the Devices file.
Note that no changes to the Devices file are required in order
to operate as before.
=============================================================================
/ /
/ File 3 / NIA068 /
/ Tekno DCS HELP /
/ Judge Dredd /
/ /
ABO[RT] [taskname][/PMD][/TERM=TTnn:]
The ABORT command terminates execution of a specified task.
taskname The name of the task to abort. If taskname is not specified,
the task started by a RUN command from the issuing terminal
(task TTnn) is aborted. The variable nn is the octal unit
number of the issuing terminal.
/PMD Forces a Postmortem Dump of the task. See also HELP PMD.
/TERM=TTnn: (Privileged keyword.) Aborts a task requested from the
specified terminal. The variable TTnn: can be a logical
name assigned to the terminal (such as MYTERM), or it can
be a physical device name and unit number (such as TT17:).
Nonprivileged users can abort tasks requested from the issuing terminal.
Privileged users can abort any tasks.
ALT[ER] taskname/keyword(s)
/PRI=n
/RPRI=n
/TERM=ttnn:
The ALTER command changes the static or running priority of an
installed task.
Parameters:
taskname Specifies the name of the task that is to have its running,
or running and static priorities changed to n.
n Specifies a priority in the range 1 to 250(decimal).
The system assumes the specified value is octal unless you
append a period to the number.
For more information on the ALTER command keywords, type HELP ALT keyword.
help brk
BRK
The BREAKPOINT TO XDT (BRK) command passes control to the Executive Deb
ugging
Tool (XDT), if it is currently loaded in your system. If XDT has not
been
loaded, the BRK command has no effect.
If XDT is loaded in your system, all system activity halts and XDT
prints a message on the console terminal in the following form:
BE:nnnnn
XDT>
To return control to your CLI, type P. Proceeding from a breakpoint usually
restores the system to the state that existed when you entered the BRK command.
To enter the crash dump routine, type X at the XDT> prompt.
The BRK command is privileged and must be issued from the console terminal.
The CLI command establishes a command line interpreter other
than MCR. Except for the /SHOW keyword, the command is privileged.
The format and valid keywords for the CLI command are:
CLI (/keyword)
/DISABLE=cliname
/ELIM=cliname or ELIM=*
/ENABLE=cliname
/INIT
/MESSAGE=cliname:"message-text"
/SHOW
/UNOVR
For more information, type HELP CLI keyword.
The CLI /INIT command also accepts subkeywords that set various
characteristics for the CLI. For more information, type:
HELP CLI INIT.
DEV[ICES] Displays information about all devices.
DEV[ICES] dd: Displays information about units of device type dd:.
DEV[ICES] dev: Displays information about the specified device. The
parameter dev: can be either a physical or a logical
device name (for example, DB3: or MYDEV).
DEV[ICES] /LOG Displays a list of all logged-in terminals.
The DEVICES display includes the symbolic names of all devices, the names of
all devices of a particular type, the name of a specific device, or all
logged-in terminals.
help hello
To log in on this system, you must have an account on the system. If
you do not have an account, ask your system manager to create one for
you. In addition to your last name or account number, you will also
need to know the appropriate password. Log in to the system by
typing HELLO (or LOGIN).
Formats:
HELLO System prompts for your name or
account and password.
HELLO name[/password] If you do not specify your
password, the system prompts you
for it.
HELLO [grp,mem]/password Displays system messages after
login.
HELLO [grp/mem]/password Displays short form of system
messages after login.
The arguments g and m are the group and member numbers of your account
UIC. The square brackets are optional.
PAR[TITIONS]
The PARTITION DEFINITIONS command displays on the entering terminal a
description of each memory partition in the system.
For each partition in the system, the name, octal address of the
Partition Control Block, octal starting address, octal size, partition
type, and description of partition occupant are displayed.
LOA[D] dd:[/keyword(s)]
/CTB=cca[,b...]
/EXP=expname
/FLAGS
/HIGH
/PAR=parname
/SIZE=parsize
/VEC
The LOAD command reads a nonresident (loadable) device driver into memory.
The parameter dd: represents a two-character ASCII loadable device driver name.
For help on the LOAD command keywords, type HELP LOAD keyword.
help run
The RUN command initiates the execution of a task.
The RUN command has five general forms, depending on the
scheduling parameters and whether or not the task is installed. The
five forms are as follows:
1. RUN immediately (HELP RUN NOW)
2. RUN at a time increment from now (HELP RUN LATER)
3. RUN at a time increment from clock unit synchronization
(HELP RUN CLOCK)
4. RUN at an absolute time of day (HELP RUN ABSOLUTE)
5. Install, run immediately, and remove on exit (HELP RUN INSTALL)
TAL [taskname]
The TAL command displays the names and status of all tasks or
of a specific task installed in the system.
If taskname is not specified, information is displayed for all tasks
installed in the system. The display format is the same as that of the
ATL command.
For more information, type HELP ATL.
UNF[IX] taskname[/keyword]
/REG
/RON
The UNFIX command frees a fixed task from memory, thus allowing tasks
that are waiting for the partition in which the fixed task resides to compete
for the partition. (If a fixed task exits or aborts, it still occupies the
physical memory in the partition.)
Keywords:
/REG Unfixes a common region.
/RON Unfixes the common, read-only segment of a multiuser task.
The UNFIX command is the complement of the FIX command.
ACD [function]
The ANCILLARY CONTROL DRIVER (ACD) command loads and unloads character
translation routines so that the terminal driver can translate between
different character sets. Character translation in the terminal driver
allows terminals that conform to other standards to use the DIGITAL
Multinational Character Set.
Functions:
INSTALL filename AS NUMBER ident [ASSIGN LOGICAL] (Privileged function)
REMOVE NUMBER ident (Privileged function)
LINK term TO NUMBER ident (Nonprivileged function)
UNLINK term (Nonprivileged function)
For more information on these functions, type:
HELP ACD INSTALL
HELP ACD REMOVE
HELP ACD LINK
HELP ACD UNLINK
The ASSIGN (ASN) command defines, deletes, or displays logical
assignments on systems that select extended logical name
support during system generation. Logical device assignments
associate logical names with physical devices, pseudo devices,
or other logical devices.
Formats:
ASN ppnn:=ll[nn]:[/keyword(s)] ! Creates assignments
ASN [/keyword] ! Displays assignments
ASN =[ll[nn]:][/keyword] ! Deletes assignments
Keywords:
/ALL /GR
/TERM /GBL or /SYSTEM
/LOGIN /FINAL
The keywords are privileged options. For more information on the keywords,
type HELP ASN keyword.
For help on the ASN command formats, type: HELP ASN CREATE
HELP ASN DISPLAY
HELP ASN DELETE
The BROADCAST command displays a specified message at one or more
terminals.
The general formats of the BROADCAST command are:
BRO ttnn:message ! Sends a message to one terminal
BRO ALL:message ! Sends a message to all terminals
BRO LOG:message ! Sends a message to logged-in terminals
BRO user-name message ! Sends a message to the user name of
the person to receive it. (Systems with
Resource Accounting only)
BRO @filespec ! Sends a message contained in an indirect
command file
ALL and LOG are privileged options.
If an indirect command file is used, each line has one of the following
formats:
ttnn:message
ALL:message
LOG:message
user-name message
CLQ[UEUE]
The CLOCK QUEUE command displays on the entering terminal information
about tasks currently in the clock queue. The information consists of
the task names, the next time each task is to be run, and each task's
reschedule interval (if one was specified).
Any pending time-based schedule requests are displayed.
help dfl
The DEFINE LOGICALS (DFL) command assigns, deletes, and displays
logical name assignments. Logical names can be assigned to devices,
all or part of a file specification, and to other logical names.
Formats:
DFL = ! Deletes all local logical assignments
DFL ens=lns[/keyword(s)] ! Creates logical name assignments
DFL =[lns][/keyword] ! Deletes logical name assignments
DFL [/keyword(s)] ! Displays logical name assignments
Keywords (privileged options):
/ALL /GR
/TERM /GBL or /SYSTEM
/LOGIN /FINAL
For more information on the keywords, type: HELP DFL keyword
For help on the DFL command formats, type: HELP DFL CREATE
HELP DFL DISPLAY
HELP DFL DELETE
help login
To log in on this system, you must have an account on the system. If
you do not have an account, ask your system manager to create one for
you. In addition to your last name or account number, you will also
need to know the appropriate password. Log in to the system by
typing LOGIN (or HELLO).
Formats:
LOGIN System prompts for name and password.
LOGIN name[/password] If you do not specify your password,
the system prompts you for it.
LOGIN [g,m]/password Displays system messages after login.
LOGIN [g/m]/password Displays short form of system messages
after login.
The arguments g and m are the group and member numbers of your account
UIC. The square brackets are optional.
REA[SSIGN] taskname lun ddnn:
The REASSIGN command reassigns a task's logical unit numbers (LUNs)
from one physical device unit to another.
Parameters:
taskname The name of the installed task whose static assignment is
to be modified.
lun The logical unit number to be reassigned.
ddnn: The new device unit, which can be a physical, logical, or
pseudo device name.
SAV[E] [/keyword(s)]
/WB
/MOU="string"
/SFILE="filespec"
/CSR=x
The SAVE command copies the current RSX-11M-PLUS system image (the contents
of main memory) into the system image file from which the current image was
booted. The command saves the image so that a hardware bootstrap or the BOOT
command can later be used to reload and restart it.
For help on the SAVE command keywords, type HELP SAVE keyword.
TAS[KLIST] [taskname][/DEV=ddnn:]
The TASKLIST command displays a description of each installed task.
taskname The name of a specific task.
/DEV=ddnn: Displays the names and status of all tasks installed from
the specified device.
If you specify both taskname and /DEV, the systems displays
information about the task installed from that device.
For information on the display contents, type HELP TAS CONTENTS.
UNL[OAD] dd: [/keyword]
/EXP=expname
/VEC
The UNLOAD command removes a loadable device driver or extended Executive
partition (EXP) from memory. Note that loadable databases are not unloaded
when a driver with a loadable database is unloaded.
The parameter dd: represents the 2-character ASCII name of the device whose
driver is to be unloaded.
For information on the UNLOAD keywords, type HELP UNLOAD keyword.
help acs
ACS ddnn:/BLKS=n
The ALLOCATE CHECKPOINT SPACE (ACS) command allocates or discontinues
a checkpoint file on disk for systems that support dynamic
allocation of checkpoint space. ACS is a privileged command.
The variable n is the number of blocks to be allocated on device ddnn:.
If n is zero, the use of the file is discontinued after all of the tasks
checkpointed to it can be brought into memory and checkpointed elsewhere.
ATL [taskname]
The ACTIVE TASK LIST command displays on the entering terminal the
names and status of all active tasks in the system, or the status of
a particular task.
If taskname is not specified, information is displayed for all active
tasks in the system. If taskname is specified, only information for
that (active) task is displayed.
For information on task status codes, type HELP ATL STATUS.
BYE [/NOHOLD]
The BYE command logs you out of the system and disconnects the line (if you are
logged in via a remote or DECnet line).
BYE /HOLD
The BYE /HOLD command also logs you out of the system; however, if you are
logged in via a remote or DECnet line, the system holds the line so that you
can log into another account.
When BYE logs you out of the system, devices allocated to you are deallocated
and your privately mounted devices are dismounted. All nonprivileged tasks and
certain privileged tasks active on your terminal are aborted.
If [1,2]SYSLOGOUT.CMD exists and a silent logout has not been requested,
BYE executes the command file.
help dcl
DCL command-line
The DCL command allows you to issue DCL commands from a terminal
that is set to MCR. Instead of MCR processing the command line, DCL
processes it.
Note that the command-line must follow DCL syntax rules.
For more help on DCL, type HELP/DCL.
DMO ddnn:[["]volume-label["]][/keyword(s)]
/DEV
/TERM=term:
/LOCK=option
DMO /USER [/keyword(s)]
/DEV
/TERM=term:
/LOCK=option
The DISMOUNT command requests the file system to mark a volume for dismount and
release its control blocks. The DISMOUNT /USER command dismounts all volumes
that you have mounted.
If you specify a volume-label, it is checked against the label on the volume
to ensure that the proper volume is being dismounted. Privileged users can
dismount any volume.
For more information on the DISMOUNT keywords, type HELP DISMOUNT keyword.
LUN[S] taskname
The LUN command displays the static logical unit number assignments for a
specified task. The display consists of a list of physical device units in one
column and their corresponding LUNs in an adjoining column.
Taskname is the name of the task for which the assignments are to be displayed.
If a task is initiated by the install-run-remove option of the RUN
command, the task has no static LUN assignments. Also, when a task is running,
the display does not necessarily reflect the running task's assignments. (For
example, the Executive directive ALUN$ issued from within the task can alter
the LUN assignments.)
help red
RED[IRECT] nddnn:=oddnn:
The REDIRECT command redirects all I/O requests previously directed to
one physical device unit to another physical device unit.
Parameters:
nddnn: The new device unit to which subsequent requests will go.
oddnn: The old device unit from which requests have been redirected.
You can specify the logical names assigned to the devices or the physical
device names and unit numbers (in the form ddnn:).
help set
SET /keyword=values
The SET command dynamically changes characteristics of and displays
information about the system, tasks, and devices.
Only one keyword per command line is permitted. The valid keywords for the
SET command are grouped according to the functions they perform, as follows:
1. Setting Device Characteristics (Type HELP SET DEVICE)
2. Establishing Directories (Type HELP SET DIRECTORY)
3. Controlling I/O Operations (Type HELP SET MAXPKT)
4. Modifying Memory Allocation (Type HELP SET MEMORY)
5. Networking (Type HELP SET HOST)
6. Using System Tasks and Utilities (Type HELP SET UTILITY)
7. Ensuring System Protection (Type HELP SET PROTECT)
8. Tuning the System (Type HELP SET SYSTEM)
For help on individual keywords, type HELP SET keyword.
TIM[E] [hrs:mins[:secs]] [m1/day/year]
TIM[E] [hrs:mins[:secs]] [day-m2-year]
The TIME command sets the current time of day, the current date, or both.
If you do not specify a time or date, the system displays the current time and
date on the entering terminal.
For a description of the parameters for the TIME command, type:
HELP TIME PARAMETERS
UNS[TOP] [taskname][/TERM=TTnn:]
The UNSTOP command continues execution of a task that has been stopped
internally by the Executive.
Parameters:
taskname The name of the task. If taskname is not specified,
the command unstops the task being run from the issuing
terminal (task TTnn).
/TERM=TTnn: (Privileged keyword.) Unstops the task requested from the
specified terminal.
help active
ACT[IVE] [/keyword]
/ALL
/TERM=TTnn:
The ACTIVE command displays at the entering terminal the names of
all active tasks that have that terminal as their TI:. The display includes
the octal number of the terminal that initiated each task.
If you do not specify a keyword, the names of all active tasks for TI:
are displayed.
For more information, type HELP ACT keyword.
BLK [taskname][/TERM=term:]
The BLOCK command blocks an installed task, making it ineligible to
execute or to compete for memory.
taskname The name of the task to be blocked. If taskname is not
specified, the task started by a RUN command from the
issuing terminal (task TTnn) is blocked.
/TERM=term: (Privileged keyword.) Blocks a task requested from the
specified terminal. Term can be a logical name assigned
to the terminal, or it can be a physical device and unit
number for the terminal (in the form TTnn:).
CAN[CEL] taskname
The CANCEL command cancels time-based initiation requests for a task.
These requests result from the Executive directive Run Task (RUN$) or any of
the time-synchronized variations of the MCR command RUN that are placed in the
clock queue.
If any time-based schedule requests for the task exist, they are
removed. However, if the task is currently active, its execution is not
affected.
Only a privileged user can enter a CANCEL command for a task not initiated from
the issuing terminal.
DEA[LLOCATE] [ddnn:]
The DEALLOCATE command releases a private (allocated) device, thereby allowing
other users to access it.
The parameter ddnn: can be a logical name assigned to the device (such as
MYDEV) or the physical device name and unit number.
Privileged users may deallocate devices assigned to other than the issuing
terminal. If no device is specified, all devices allocated to the issuing
terminal are deallocated.
FIX taskname[/keyword]
/REG=regionname
/RON=taskname
The FIX command loads and locks a task into a partition in memory.
The specified region or task must be installed, inactive, and not
checkpointable. Fixed tasks remain physically in memory even after they exit.
They do not have to be loaded when a request is made to run them.
Keywords:
/REG=regionname Fixes a common task region in memory.
/RON=taskname Fixes a common, read-only segment of a
multiuser task in memory.
INI[TVOLUME] ddnn:["]volume-label["][/keyword(s)]
Keywords: /ACCESS /BAD /DENS /EXT
/FPRO /INDX /INF /LRU
/MXF /OWNER /POS /PRO
/SDI /UIC /VI /WIN
The INITIALIZE VOLUME command produces a Files-11 formatted volume.
ddnn: Specifies the device name and unit number of the volume to be
initialized.
volume-label Specifies a name for the volume being initialized. This is a
required parameter. Specify up to 12 characters for disks and
DECtape and up to 6 characters for magnetic tapes.
For a summary of the INI command keywords, type HELP INI SUMMARY.
For a summary of default values, type HELP INI DEFAULTS.
For additional help on individual keywords, type HELP INI keyword.
help mount
The MOUNT command logically connects devices to Ancillary Control
Processors (ACPs). There are two forms of the MOUNT command,
depending on the device being mounted.
Files-11 Disk or DECtape Format:
MOU[NT] dev:[volume-label][/keyword(s)]
Files-11 (ANSI) Magnetic Tape Format:
MOU[NT] device-list:[file-set-ID] [/keyword(s)]
For more information on these formats, type:
HELP MOUNT FILES11 ! For help on Files-11 format.
HELP MOUNT MAGTAPE ! For help on Magnetic Tape form at.
HELP MOUNT EXAMPLE ! For examples of command usage.
REM[OVE] taskname Deletes an entry (a task name) from the System
Task Directory (STD) and thereby removes the
task from the system.
REM[OVE] region-name/REG Removes a region from the Common Block
Directory (CBD).
If a task is fixed in memory, the REMOVE command unfixes the task and
then removes it. To remove a task that is currently executing, you must first
abort the task.
Note that a region cannot be removed if there are tasks installed in the
system that reference that region.
SSM message
The SSM command inserts text into the Error Logging file (LB:[1,6]LOG.ERR).
The text appears in the error log reports produced by the error log report
generator.
The message is a text string up to a maximum of 79 characters.
UFD ddnn:[volume-label][g,m][/keyword(s)]
/ALLOC=number
/DEL
/OWNER=[uic]
/PRO=[system,owner,group,world]
The USER FILE DIRECTORY command creates a User File Directory on
a Files-11 volume and enters its name into the Master File Directory (MFD).
Before creating a UFD, you must first initialize and mount the volume.
ddnn: Device unit containing the volume on which the UFD being
created will reside.
volume-label If specified, the volume-label is compared to the label on the
volume. If the names match, a UFD can be created.
[g,m] The UIC for the UFD, which establishes the owner of the
UFD. The variables g and m represent group and member
numbers, respectively, and can be in the range 1 to 377
(8).
The square brackets are required.
For information on the keywords, type HELP UFD keyword.
help boot
BOO [filespec]
(Privileged command.) The BOOT command bootstraps a system that exists as a
task image file on a Files-11 volume. It provides a convenient means of
terminating one system and initiating another, especially on minimum hardware
configurations.
Note that the BOOT command immediately terminates the system currently in
operation and destroys any work in progress on the system. Therefore, you
should not enter this command unless you are certain that you want to stop
using your current system.
The file specification (filespec) indicates where the bootstrappable system
image resides. If you do not include a file specification, the BOOT command
bootstraps the current system. For more information on the file specification
format and default values, type: HELP BOOT FILE
CBD [common-region-name [/TASKS]]
The COMMON BLOCK DIRECTORY command displays information about all
entries or a specific entry in the Common Block Directory. The
directory is a table of all named common regions and libraries installed
in the system.
Parameters:
common-region-name The name of a specific common region in the Common
Block Directory.
/TASKS Displays the name of each task attached to a
specific common region and the number of times the
task has mapped to the region (mapping count).
DEB[UG] [taskname]
The DEBUG command forces a task to trap to a debugging aid by setting
the T-bit in the task's Processor Status Word (PSW). To debug a task,
it must have been built with the /DA switch or have issued the Executive
directive Specify SST Vector Table for Debugging Aid (SVDB$).
Nonprivileged users can debug any nonprivileged task that was initiated
from their own terminals (TI:). Privileged users can debug any task.
Parameter:
taskname Specifies the name of the task to be debugged. If you do not
specify a task name, DEBUG searches for the task currently
running from the issuing terminal (task TTnn).
FLA [[ggg]/keyword]
/CRE
/ELIM
The FLA command creates, eliminates, or displays group global
event flags.
If the group number is omitted, the system defaults to the login
UIC group number of the issuing terminal. If you omit the group
number and keyword specification, all the group global event
flags are displayed.
For more information, type HELP FLA keyword.
help ins
The INSTALL command makes a specified task known to the system.
INS[TALL] [$]filespec[/keyword(s)]
filespec ddnn:[g,m]filename.type;version
$ Indicates the system or library UIC
The INSTALL command supports the following keywords:
/AFF /IOP /ROPAR /UIC
/CKP /PAR /SEC /WB
/CLI /PMD /SLV /XHR
/DFB /PRI /SYNC
/FMAP /PRO /TASK
/INC /RON /TIME
For a description of individual keywords, type HELP INSTALL keyword.
OPE[N] memory-address [+ n] [/keyword]
OPE[N] memory-address [- n] [/keyword]
Keywords: /AFF=[CPx,UBy] /CPU=CPx
/DRV=dd: /KNL
/KNLD /KNLI
/REG=region-name /TASK=taskname
/TASKD /TASKI
+ or - n One or more optional octal numbers to be added to or
subtracted from the memory address.
The OPENREGISTER command allows you to examine and modify a word of memory.
To open a location within a task, the task must be fixed in memory.
This is a privileged command.
For information on the keywords, type HELP OPEN keyword.
For help on the OPEN command display format, type HELP OPEN DISPLAY.
RES[UME] taskname[/TERM=TTnn:]
The RESUME command continues execution of a previously suspended task.
Parameters:
taskname The name of the task that is to resume executing. If you omit
the task name, the command attempts to resume task TTnn (where
nn is the octal unit number of the issuing terminal).
/TERM=term: (Privileged keyword.) Resumes a task initiated from the
specified terminal. Term can be a logical name assigned to the
terminal, or it can be the physical device and unit number for
the terminal (in the form ttnn:).
help swr
SWR Displays the current value in the switch register.
SWR value Deposits an octal number in the switch register.
SWR bitposition/keyword
/SET Sets the bit in the specified bit position.
/CLEAR Clears the bit in the specified bit position.
/DISPLAY Displays the bit in the specified bit position.
Diagnostic functions use the values in the switch register to interrupt
diagnostic processing and to select specific diagnostics to execute.
For processors that do not have a console switch register, the Executive
directive Get Sense Switches (GSSW$) accesses the software switch register
(SWR$) in the Executive module SYSCM. To allow a task to access or modify $SWR,
use the SWR command.
UNB[LOCK] [taskname][/TERM=term:]
The UNBLOCK command continues the execution of a blocked task.
UNBLOCK is the complement of the BLOCK command.
A nonprivileged user can unblock only those tasks whose TI: is the same
as the issuing terminal. A privileged user can unblock any blocked task.
Parameters:
taskname The name of the task to be unblocked. If taskname is not
specified, the command unblocks the task that was running
from the issuing terminal (task TTnn).
/TERM=term: (Privileged keyword.) Unblocks a task requested from the
specified terminal. Term can be a logical name assigned to
the terminal, or it can be the physical device and unit number
for the terminal (in the form ttnn:).
The OPR (or DCSOPR) task gives the System Manager or Operator an interface
to the Data Communications Subsystem (DCS). Through English-like commands,
the user has the ability to display or modify line parameters, display any
or all queues, or delete a specific queue entry. Multiple copies of the
task may be active at the same time.
If the command is not entered on the same line as the task mnemonic,
then the prompt "OPR>" will be displayed, and OPR will wait for further
commands. OPR will continue to prompt for and accept commands, until the
user terminates the session with a control-Z.
OPERATOR COMMANDS
Following is a summary of commands available to the operator. For detailed
explanations of each command and/or its options, type
HELP OPR <command>. Most commands and keywords may be abbreviated to 3
characters, both in this help facility and when issued to OPR.
DISPLAY Display information and parameters on all or selected lines
or queues, or current supervisor parameters.
MODIFY Change line states and parameters, or supervisor parameters.
CREATE Create a queue.
DELETE Delete a queue or a queue entry.
RESET Reset all or selected scheduled polls.
QUIET Enable/Disable informative messages from OPR; does not affect
error messages. Options are QUIET ON or QUIET OFF.
QUETST is a Tekno-developed debugging aid for use with VS: queue entries;
it is intended for users with an intimate knowledge of the queue entry
format(s) for your intended application. With that warning in mind, it
is a useful tool that allows the user to insert queue entries, examine
queue entries in several formats, selectively delete queue entries, and
purge individual queues. You must know the name of the queue(s) you wish
to manipulate before issuing any requests, however.
Commands available under QUETST may be abbreviated to the first character;
QUETST only examines the first character, but accepts any number following.
Commands accepted by the current version of QUETST are:
E - Examine a queue entry. You will be prompted for the queue
name and entry number; QUETST will then report information
about the entry, and query you for the output format:
A - ASCII interpretation of all bytes in the entry.
Bytes not within the printing ASCII sequence are
replaced by spaces.
B - Octal byte representation, unsigned.
D - Decimal word representation, unsigned.
O - Octal word representation, unsigned.
R - Radix-50 representation.
L - List current queue entry. This allows the re-display of an
entry in another format; format selection is as for Examine.
P - Purge all entries from the queue; QUETST will prompt for a queue
name.
R - Remove a selected queue entry. QUETST will prompt for a queue
name and entry number, and will display the deleted queue entry.
This command is the only exception to the single-character command
situation: if it is issued as RF (Remove Force), the entry is
simply deleted with no display.
I - Insert a queue entry. QUETST will prompt for the priority and
entry size in bytes; these values are accepted in octal unless
forced to decimal by a terminating period. Thereafter, for as
many bytes as specified, QUETST will accept input data. Data
must be entered in groups of two bytes; thus, for an odd-sized
message, you will have to enter a pad byte.
For information on data input formats and procedures, type HELP QUETST DATA.
ALL[OCATE] dd[nn:] [=llnn:] [/keyword]
/TERM=term:
/TYPE=dev
The ALLOCATE command establishes a specified device as your private device.
Parameters:
dd The 2-letter device mnemonic.
nn: The unit number of the device (optional). If you omit
nn:, the system allocates the first available logical
unit of the dd-type device.
llnn: The name of a logical device, which the system
creates and assigns to the physical device being
allocated (optional).
For information on the ALLOCATE keywords, type HELP ALLOCATE keyword.
=============================================================================
/ File 4 / NIA068 /
/ /
/ ______ /
/ DBEDIT /
/ /
/ ____ ______ /
/ User Manual /
/ /
/ /
/ Submitted By: /
/ Malefactor Of Organized Crime /
Copyright 1984,1988, Robelle Consulting Ltd.
_______ __________ ____
Robelle Consulting Ltd.
8648 Armstrong Road
R.R.#6
Langley, B.C.
Canada V3A 4P9
Phone: (604) 888-3666
Telex: 04-352848
___
Permission is granted to reprint this document (but not for
profit), provided that copyright notice is given.
___
Version 1.3
February, 1988
________ _______
Database Editing
Welcome to version 1.3 of DBEDIT, a module of SUPRTOOL that
permits people to add, change, list, or delete individual records
or "chains" of records from an IMAGE/3000 database. DBEDIT is
useful for debugging applications, for quickly prototyping
systems, and for the data entry of simple applications.
The functions of DBEDIT are similar to QUERY, but the commands
and operations are more consistent and logical. Because DBEDIT
is a part of SUPRTOOL, you can hold SUPRTOOL as a suspended
process from within other software (e.g., QEDIT) with the
database open. This facilitates fast process switching when you
need to examine a test database.
You enter DBEDIT via the EDIT command of SUPRTOOL. Once in
DBEDIT, you cannot use the SUPRTOOL commands (while in SUPRTOOL
you cannot use the DBEDIT commands). Certain commands are the
same in both DBEDIT and SUPRTOOL (e.g., USE, BEFORE, and SET).
The BEFORE command works independently and each software module
___
saves its own last command.
____________
Restrictions
1. Most DBEDIT commands require you to have opened the database
using the BASE command of SUPRTOOL. DBEDIT does not have a
BASE command.
2. DBEDIT does not work with any files other than IMAGE/3000
datasets.
3. You cannot switch to another database while in DBEDIT.
Instead, you must EXIT, do a BASE command in SUPRTOOL, then
EDIT.
4. The maximum size of any individual data item is 80 bytes
(i.e., 5X80 is acceptable, but X100 is not).
5. Only datasets whose search fields are compatible with DBEDIT
can be accessed (i.e., no K5 search fields).
_________ __ ______
Functions of DBEDIT
There are five major functions in DBEDIT:
_________ __ ______
Functions of DBEDIT DBEDIT User Manual
ADD: Add new entries to a dataset.
CHANGE: Change a master search value in all related datasets.
DELETE: Delete entries from a dataset.
LIST: List the value of entries in a dataset.
MODIFY: Modify specific fields of an entry from a dataset.
___________ __ ______
Performance of DBEDIT
SUPRTOOL was designed to be as fast as possible, while DBEDIT was
designed to have as many features as possible. DBEDIT does no
special optimizations. It uses the standard IMAGE intrinsics to
do all of the accesses to the database. DBEDIT does not use the
fast sequential access method of SUPRTOOL, but DBEDIT usually
works only with a few records within your database at one time.
___________
Field-Lists
DBEDIT arranges the list of fields in a dataset differently than
QUERY or SUPRTOOL. The QUERY ADD command prompts for the each
field in the dataset in the order they were declared in the IMAGE
schema. In DBEDIT, the order of field-lists is changed using the
following algorithm:
1. The search-field for a master dataset or the primary
search-field for a detail dataset appear first.
2. Any other detail search fields appear second.
3. Any sort-fields appear third.
4. All other non-search and non-sort fields that are compatible
with DBEDIT appear last.
Example:
The following example shows the difference between QUERY and
DBEDIT. We add an entry to the D-INVENTORY dataset of the STORE
database. In this dataset, SUPPLIER-NAME is the primary search
field and PRODUCT-NO is another non-primary search field.
QUERY/3000 DBEDIT/SUPRTOOL
___ ___
>add d-inventory #add d-inventory
____ ___________
BIN-NO =>>1201 SUPPLIER-NAME >STD Ribbons
_________
LAST-SHIP-DATE =>> PRODUCT-NO >2001001
______
OH-HAND-QTY =>> BIN-NO >1201
_______ __________
PRODUCT-NO =>>2001001 LAST-SHIP-DATE >
___________ ___________
SUPPLIER-NAME =>>STD Ribbons ON-HAND-QTY >
________
UNIT-COST =>> UNIT-COST >
_______
DBEDIT User Manual Locking
_______ __ _________
Locking of Databases
DBEDIT uses the following locking strategy. The ADD command
locks one dataset (using DBLOCK, Mode-3) after all of the field
values have been entered. The MODIFY and DELETE commands do the
following:
1. After all of the field values have been entered, the dataset
is locked.
2. The records are re-read using DBGET, Mode-4 for details or
DBGET, Mode-7 for masters.
3. The re-read record is compared with the original record. If
they are not the same, no update or delete is done.
4. The record is updated or deleted. When a search field or a
sort field is changed with the MODIFY command, the record is
deleted and added again.
5. The dataset is unlocked.
______
The CHANGE command locks the entire database while all key values
are being changed. In all cases, the DBLOCK is done
unconditionally. This means that DBEDIT always waits for other
locks to be released (possibly holding up your terminal).
______ ________
DBEDIT Commands
When you run DBEDIT, it prompts for commands on STDLIST with a
"#" character and reads command lines from STDIN. DBEDIT
commands have a command name followed by one or more parameters
separated by semicolons, colons, and commas. Semicolons are NOT
used to combine several commands on the same line as in SUPRTOOL.
You may shorten command names to any substring that uniquely
defines the command. For example, ADD can be shortened as AD or
A, since there are no other commands that start with "A". SHOW,
however, can be abbreviated only to SH, since there is also a SET
command in DBEDIT.
>base store.pub,5
>edit
_
#l m-customer;all {list}
_
#e {exit}
You may enter letters in either upper-case or lower-case, because
DBEDIT upshifts everything in the command line. These two
commands are identical:
________
Commands DBEDIT User Manual
____
#LIST M-CUSTOMER
____
#list m-customer
________
The maximum physical command line is 256 characters. You may
enter commands on multiple input lines by putting an "&"
_____
continuation character at the end of the line. The maximum total
command length is 256 characters. Multiple commands cannot be
placed on one input line. The separating semicolon, colon, or
comma in commands is REQUIRED, not optional.
:run suprtool.pub.robelle
>base store.pub,5 {open the database in SUPRTOOL}
>edit {enter DBEDIT}
#list m-customer {use all of the defaults}
#list m-customer;all {list all records in m-customer}
#exit {return to SUPRTOOL}
If you depress Control-Y during an operation, DBEDIT responds by
printing a blank line and stopping the current operation.
DBEDIT interprets any command line beginning with a colon (:) as
an MPE command. Only the commands that MPE allows in "break" are
allowed in DBEDIT. This feature can be used to establish :FILE
commands for the SUPRLIST file, to show the time, and to include
:COMMENT lines. For example:
________
#:comment Modify M-CUSTOMER records
#modify m-customer
#exit
Any command line beginning with an equal sign (=) is treated as a
calculator expression. You may use this feature to compute data
entry values without the need of an electronic calculator.
=2745*1.33
Result= 3650.85
The examples in this manual use the revised STORE database
__________ ________
described in the IMAGE/3000 Handbook.
_________ ___ ______ ________
Prompting For Search Criteria
In the CHANGE, DELETE, LIST and MODIFY commands, DBEDIT first
______ ________
prompts you for search criteria and then processes the records
you have selected. Search criteria are any or all of the search
and sort fields of the file. DBEDIT asks for the value of the
primary search field first, unless you override the prompt
ordering with the KEY option. For detail datasets, it then asks
for match values for the other search fields and sort fields.
You may hit the Return key to any of these prompts to indicate
that you don't care what values these fields have.
When DBEDIT finishes processing the records you select, it
recycles and prompts you for the next set of search criteria.
______ ________
DBEDIT User Manual Search Criteria
You may hit the Return key at this point to exit from the command
and return to the # prompt.
_______ __________
Command Parameters
The major commands (FILE, LIST, ADD, DELETE, MODIFY, and CHANGE)
have a similar parameter structure, consisting of the command
____ ______
name, then an optional file part and an optional option part. A
____
space separates the file part from the command name and a
______ ____
semicolon separates the option part from the file part. The
general format of these commands is:
____ _______
#command [file] [;options]
____ _________
File Parameter
The file parameter consists of an IMAGE/3000 dataset name
____
followed by an optional list of field names. If the file part is
missing, DBEDIT uses the previous file. The general format of
the file parameter is:
____ __________
#command [file] [:field-name,...]
Even when you use field-names, DBEDIT will add the search fields
to the field list. In the ADD command, DBEDIT assumes default
values for non-critical fields that are missing, but will prompt
for the search fields and sort fields (they are required).
______
#add d-inventory:bin-no {assume defaults for all but BIN-NO}
___________
SUPPLIER-NAME >STD Ribbons
_________
PRODUCT-NO >105391
____
BIN-NO >10
In this case you will not be prompted for LAST-SHIP-DATE,
ON-HAND-QTY, or UNIT-COST.
In the MODIFY command, you can specify a set of fields to modify.
DBEDIT will not prompt you for new values for any other fields.
For example:
_________
#mod d-inventory:unit-cost {only modify UNIT-COST}
___________
SUPPLIER-NAME >STD Ribbons {prompt for search value}
_________
PRODUCT-NO >105391 {prompt for another one}
Enter new values (or <return> to leave as is):
SUPPLIER-NAME >STD Ribbons {prints the search value}
PRODUCT-NO >105391 {prints the other one}
UNIT-COST >500 {prints existing value}
________ {prompts for new value}
In this case you will not be prompted for BIN-NO, ON-HAND-QTY, or
____ _________
File Parameter DBEDIT Commands
LAST-SHIP-DATE.
When working on a single dataset, it is only necessary to specify
the dataset name in the first command. For example:
___________
#list d-inventory
___________
SUPPLIER-NAME >STD Ribbons
#list {use the previous file parameter}
________________
SUPPLIER-NAME >//
______ _________
Option Parameter
____ _______
The file parameter and the options must be separated by a
semicolon.
____ __________ ______
#command [file] [:field-list] [;option,...]
_______
The available options are:
_____________
numeric-value|ALL|KEY|LIMIT|RELATED|UNDER|UPDATEKEY
These options qualify the operation of the FILE, LIST, MODIFY,
CHANGE, DELETE, and ADD commands. Some options only apply to one
command. Options can be combined. When more than one option is
specified, each option must be separated by a semicolon.
____________________
#list d-inventory;key=product-no;under
_________
PRODUCT-NO >
_____________ ______
Numeric-value Option
Commands normally cycle, prompting for new search values or new
entries, until you hit Return or Control-Y. However, if you
_____________
specify a numeric-value after the semicolon, the command only
_____________
prompts you numeric-value number of times. For example, if you
only want to do one LIST function, you would enter:
_
#list d-inventory;1 {only prompt for SUPPLIER-NAME once}
___ ______
ALL Option
The ALL option works only with the LIST, MODIFY, or DELETE
commands. When ALL is specified, every record in the specified
file is processed sequentially. You can stop the scan by hitting
Control-Y.
___ ______
DBEDIT Commands KEY Option
___ ______
KEY Option
The KEY option overrides the primary search field. DBEDIT
prompts for the primary search field first. Often, this is not
the value that you know. You can use the KEY option to force
DBEDIT to prompt you for another search field. For example:
#list d-inventory {use defaults}
___________
SUPPLIER-NAME >STD Ribbons
_________
PRODUCT-NO >
______________
#list d-inventory;key=product-no {use PRODUCT-NO}
_________
PRODUCT-NO >105391
_______________
SUPPLIER-NAME >
_____ ______
LIMIT Option
The LIMIT option controls the number of entries allowed per key
value. This option is only useful for the ADD command. DBEDIT
limits the number of entries for the first field in the field
list to the LIMIT value specified. For example,
_______
#add d-inventory;limit=2 {two records per supplier}
______________________
#add d-inventory;limit=2;key=product-no
{two records per product}
_______ ______
RELATED Option
The RELATED option is for finding related records and it applies
only to LIST. If you use RELATED when LISTing an entry in a
master dataset, DBEDIT prints the specified master entry and then
___ ___
prints all detail entries with the same search value in all
datasets that are linked to the master dataset by an explicit
path. If you use RELATED with a detail dataset, DBEDIT prints
the specified detail entry, followed by the master entry of each
search field in the detail.
DBEDIT can only use explicitly-defined IMAGE paths to navigate
between datasets. User-defined paths are not supported in
DBEDIT. The following example shows how related records are
listed from a master dataset to a detail dataset:
_______ _______
#list m-supplier;related {all related records}
___________
SUPPLIER-NAME >STD Ribbons
The M-SUPPLIER record is listed here.
D-INVENTORY records with a SUPPLIER-NAME of
___ _______
STD Ribbons are listed here.
-7-
_____ ______
UNDER Option DBEDIT Commands
_____ ______
UNDER Option
When DBEDIT prompts for a value for a field, it prints a series
of underlines. These underlines indicate the maximum field
width.
While these underlines are useful, they may not work on all
terminals or they may become irritating. When this happens, you
may disable underlining by using SET UNDERLINE OFF. Once
underlining is turned off, you may wish to enable it again, but
only for one command. The UNDER option overrides the SET
UNDERLINE, but only for the current command.
_________ ______
UPDATEKEY Option
The UPDATEKEY option allows the MODIFY command to change the
value of search and sort fields (i.e., critical fields).
Normally, MODIFY does not allow any changes to the search or sort
fields. Without the UPDATEKEY option, MODIFY does a DBUPDATE of
the modified record. If you specify UPDATEKEY and you change a
critical field, MODIFY must DBDELETE the existing record, then
DBPUT the record with the new values.
____________
Sub-Commands
You may enter a sub-command anytime DBEDIT prompts for the value
of a field. The available sub-commands are:
// stops the current command immediately.
\\ same as // (you may also use the Control-Y key).
? describes the current field.
< goes back one field to the previous field in the list.
<3 goes back three fields.
<< returns to the first field in the list.
> goes forward one field to the next field in the list.
>3 goes forward three fields.
>> skips the rest of the fields in the list. This is especially
useful when DBEDIT is prompting you for multiple search and
sort fields and you only want to enter the first.
____________
DBEDIT Commands Sub-Commands
' uses blanks for the field (useful in batch).
* uses the last value for this field.
[ forces what follows the [ to be a value and not a subcommand
(e.g., [*BOB ignores the *).
Examples:
#list m-supplier {we'll stop immediately}
________________
SUPPLIER-NAME >//
#list m-supplier {we will start again}
________________
SUPPLIER-NAME >Standard Type
_________
PRODUCT-NO >< {re-enter SUPPLIER-NAME}
___________
SUPPLIER-NAME >STD Ribbons
_________
PRODUCT-NO >>> {skips the rest}
#list m-supplier
___________
SUPPLIER-NAME >STD Ribbons
_________
PRODUCT-NO >[>575 {">575" is the part-no}
The following sections describe the DBEDIT commands in detail.
The commands are presented in alphabetic order. Each command
name is centered, and following it, in brackets, is the minimal
abbreviation for the command. For example: [S] for SET and [SH]
for SHOW.
___ _______ ___
Add Command [A]
Adds new entries to a dataset.
____ _______
ADD [file][;options]
______
Notes:
____
If no field-list is entered as part of the file, DBEDIT will
____
prompt for all of the fields in the file. You may use the ">n"
or ">>" sub-commands to navigate quickly through the field list,
but you must enter values for all search and sort fields.
The database password must give you write access to the entire
dataset. The ADD command will stop after LIMIT= number of
entries have been added for any one key value. DBEDIT checks
each search field value as it is entered. For master datasets
the search field value must not exist. For detail datasets the
___
Add DBEDIT Commands
search field value must exist. To add records from a disc file,
see the >PUT command of SUPRTOOL.
______ _______ ___
Before Command [B]
Re-executes the previous command line.
BEFORE
______
Notes:
In batch mode, SUPRTOOL prints a warning, but takes no action.
In session mode, SUPRTOOL presents the previous command line to
the user for editing. If there are no changes, you simply hit
return. If you wish to change any characters within the line,
the modify operators are the same as those used in QEDIT:
* Any printing characters replace the ones above.
* Control-D plus spaces deletes columns above.
* Control-B puts you into "insert before" mode.
* Control-A appends characters that follow to
the end of the line.
* Control-A, Control-D, plus spaces, deletes
columns from the end of the line.
* Control-T terminates the current mode, so that
you can space over to another column to work.
* Control-G recovers the original line.
* Control-O specifies "overwrite" mode (useful
when you want to replace with spaces).
________
Example:
#=20*15 {15 is incorrect, you meant 115}
Result= 300.0
______
#before
=20*15 {DBEDIT prints the line}
115 {you enter changes}
=20*115 {result is shown}
{you hit return}
Result= 2300.0
______
DBEDIT Commands Change
______ _______ ___
Change Command [C]
Changes all uses of a specific search field value in all detail
datasets related to a master. This command only applies to
master datasets.
____ _______
CHANGE [file][;options]
______
Notes:
This command changes the search field value in all related detail
datasets. DBEDIT can only change values in detail datasets where
there is an explicit IMAGE path. It is up to the user to change
any user-defined paths.
Once this command has started making changes to the database, it
cannot be stopped. Entering Control-Y during the change will
have no effect. DBEDIT locks the entire database while all
changes are taking place. The database password must give you
write access to all related datasets that must be changed.
______ _______ ___
Delete Command [D]
Removes entries from a dataset.
____ _______
DELETE [file][;options]
______
Notes:
If you are deleting entries from a master dataset, all entries
from related detail datasets must be removed first. Before any
record will actually be deleted, DELETE prints the record and
asks you whether it is okay to delete it; the default answer is
NO.
____
The field-list of the file specifies which fields to list before
______
prompting for verification of the deletion. The ALL option
allows you to review all entries in a detail dataset and remove
some or all of them. The database password must give you write
access to the entire dataset. ALL does not work on master
datasets; use the SUPRTOOL >DELETE command instead.
____
Exit DBEDIT Commands
____ _______ ___
Exit Command [E]
Leaves DBEDIT and returns control to SUPRTOOL.
EXIT
____ _______ ___
File Command [F]
Establishes the current file, field list, and search field.
____ _______
FILE [file][;options]
______
Notes:
If SET RESET is OFF, you can use the FILE command to specify the
____
KEY= for the specified file. For example:
#set reset off
______________
#file d-inventory;key=product-no
will cause all subsequent commands to prompt for the PRODUCT-NO
____
before the SUPPLIER-NAME. Specifing a new file or options
parameter in the ADD, CHANGE, DELETE, LIST, or MODIFY commands
____ ______
overrides and replaces the current file and option values.
____ _______ ___
Help Command [H]
Gives helpful instructions on the use of DBEDIT.
HELP [command [keyword]]
(Default: browse through the entire help file)
The parameters have the following meaning:
command: explains the command and gives you a list
of subsidiary keywords to select from.
command,keyword searches for keyword under command
and prints the information found (if any).
command,@ prints everything about the command.
____
DBEDIT Commands Help
_________
Examples:
____
#help {start at the beginning, peruse help file}
_
#h add {explain the ADD command and show sub-keywords}
_
#h add,@ {tell everything about ADD. Comma is required}
______
Notes:
If no parameters are specified, HELP allows you to browse through
the "help" file. HELP works only if the DBEDIT "help-file" has
been installed (:RESTORE *ROBELLE; DBEDIT.HELP.ROBELLE). The
HELP command uses the QHELP subsystem to allow you to browse
through the DBEDIT in the file DBEDIT.HELP.ROBELLE, which
contains most of the User Manual. For "help in help", type "?"
when you see the QHELP prompt character ("?").
The help file is organized into levels. To go back to the
previous level, enter RETURN or ^ instead of a key name. If you
type "^^^", you will exit three levels at once.
____ _______ ___
List Command [L]
Displays entries from a dataset.
____ _______
LIST [file][;options]
______
Notes:
____
The field-list of the file parameter specifies which fields of
the entry to print (default of course is all of them). Search
field values are not listed, unless they are included in the
______
field-list. The ALL option lists all records in the specified
____ ______
file. The RELATED option prints related records from other
datasets as well as the records you select. The listing is
printed to $STDLIST, unless you use SET LP ON to specify SUPRLIST
as the output file.
The SUPRTOOL >LIST command will also display selected records and
has the option of dumping totally in OCTAL/CHAR format. Use
>LIST when you suspect that a dataset may contain bad data or you
need to select from a large dataset (>LIST is faster than #LIST).
______
Modify DBEDIT Commands
______ _______ ___
Modify Command [M]
Changes the values of any or all fields in a dataset entry.
____ _______
MODIFY [file][;options]
______
Notes:
____
The field-list of the file specifies which fields to modify.
______
When the UPDATEKEY option is specified, search and sort field
values may be changed.
The existing value of each field is printed before a new value is
accepted. Entering a carriage return preserves the old value.
If a new value is entered, it replaces the old value. The ALL
______
option allows you to review and modify all of the entries in a
dataset in serial order.
_ _______ ___
Q Command [Q]
Prints a message on $STDLIST.
Q [ string ]
(Default: print a blank line)
The string of up to 80 characters is printed on $STDLIST. The
string should not be enclosed in quotes unless you want the
message printed in quotes.
You can use Q to include instructions in USE files. Use :COMMENT
in USE files for a non-printing comment line.
___ _______ ___
Set Command [S]
Changes certain operating options within DBEDIT. Except for LP,
these options are saved when you return to SUPRTOOL and restored
if you enter DBEDIT again.
SET [LP ] ON|OFF
[PROMPT ] character
[QUIET ] ON|OFF
[RESET ] ON|OFF
[UNDERLINE ] ON|OFF
___
DBEDIT Commands Set
[VERIFY ] ON|OFF
___ __ __
SET LP ON (Default: OFF)
All output from the LIST command is normally sent to $STDLIST.
When you turn SET LP to ON, DBEDIT opens the file SUPRLIST which
defaults to the line printer. Turning SET LP OFF closes the
SUPRLIST file and releases it to the spooler. DBEDIT
automatically closes the SUPRLIST file when you return to
SUPRTOOL.
___ ______ ____
SET PROMPT char (Default: #)
PROMPT tells DBEDIT to use a different character for prompting.
Any special character can be used as the prompt character. For
example:
>edit
___
#set prompt %
%list m-customer
___ _____ __
SET QUIET ON (Default: OFF)
Turning this option ON causes DBEDIT to reduce the number of
helpful messages that are printed and to shorten other messages.
___ _____ ___
SET RESET OFF (Default: ON)
When you use the FILE, LIST, MODIFY, CHANGE, or DELETE commands
you may override the default order that DBEDIT uses to prompt for
______
search fields (using the KEY= option). With RESET ON, DBEDIT
______
always resets the KEY= option to the default. With RESET OFF,
DBEDIT will continue to use the new order of search fields.
___ _________ ___
SET UNDERLINE OFF (Default: ON)
When DBEDIT prompts for field values, it prints a series of
underlines to show the field width. field. Using UNDERLINE OFF
disables this feature. Users with slow printing terminals will
______
find DBEDIT faster with UNDERLINE OFF. The UNDER option may be
used to temporarily enable underlining for a single command.
___ ______ ___
SET VERIFY OFF (Default: ON)
When you are adding new records to a dataset, DBEDIT lists the
contents of new records after you have entered all of the field
values. Turning VERIFY OFF causes DBEDIT to stop listing new
records after they are added.
____
Show DBEDIT Commands
____ _______ ____
Show Command [SH]
Displays the datasets in the current BASE, or the items in the
current BASE, or the fields in the current dataset.
SHOW [SETS|ITEMS|FIELDS]
(Default: sets in the database)
If you request a SHOW SETS, SUPRTOOL prints the number of dataset
entries beside each dataset name (e.g., M-CUSTOMER(15217)). If
you request a SHOW ITEMS or a SHOW FIELDS, SUPRTOOL prints a
description of the item or field beside each name (e.g.,
TOTAL-COSTS(5J2)). This command is identical to the SHOW command
of SUPRTOOL.
___ _______ ___
Use Command [U]
Specifies a file of commands to be executed as a group.
USE filename
Examples:
A USE file makes your task easier by allowing common commands to
be specified once in an external file. USE files can also be set
up for data entry functions such as adding a new customer into
the database (e.g., add one master entry, add one billto entry,
add multiple shipto entries, and then list the master entry plus
RELATED details). For example, here is a USE file that uses the
FILE command to define a dataset:
>base store
>edit {enter DBEDIT}
___
#use dinvent.use {specify commands from the USE file}
#file d-inventory;key=product-no;5 {key and limit}
#:comment You may use the List, Modify, or Delete
#:comment commands to modify inventory records. You
#:comment are restricted to at most five inventory
#:comment records per product number.
# {DBEDIT prompts for commands}
DBEDIT prints the lines in the USE file, including the :COMMENT
lines. This allows you to include instructions and reminders in
the USE file.
___
DBEDIT Commands Use
______
Notes:
USE files cannot be nested in DBEDIT. The USE file may be an
EDITOR /KEEP file,UNN or a QEDIT workfile, but no more than 80
characters per record will be processed.
______ _______ ___
Verify Command [V]
Displays the current status of DBEDIT conditions.
VERIFY [ ALL | @ ]
[ BASE ]
[ DSET ]
[ SET ]
(Default: BASE, DSET, changed SET values)
______
Notes:
Only one item can be verified at a time. The format of the
VERIFY output is organized into columns. VERIFY with no
parameters prints the database and the current dataset. It also
prints those SET options which are not currently at their default
setting.
_________
Examples:
______
#verify dset {current dataset}
______
#verify all {print the status of everything}
=============================================================================
/ File 5 / NIA068 /
/ *LONG* Surveillance Expo '90 Report /
/ Thalx /
Well, Surveillance Expo '90 was touted to be twice the size
of Expo '89. Maybe conference-wise it was, but the Exhibits
area was pretty much the same as last year, if not a bit smaller
and lower-key.
I arrived at the Crystal City Hyatt Regency at about 7:45am,
after a fun little ride on the DC metro, and about a 3/4 mile
walk in blustery cold weather. I had decided to wear a suit
this time...to match my longer-than-ever hair. Last year,
a number of people there were reluctant, or avoided, noticing
or talking to the crowd-o-misfits, in jeans, t-shirts, long
hair, tie-dye, etc. (_H*, were you barefoot there? I think
you were...)
Anyway, to match the suit, are these shoes that, after about
a quarter mile, feel like your feet have been stuffed into
something about the size and shape as a 10-pack of floppy
disks. Luckily, I had brought my black sneakers, stuffed into
my knapsack, which I brought for stuffing full of literature that
the Exhibitors are more than happy to give away.
The Exhibits area didn't open until 9am, but there was a free
"Early Bird" conference at 8am, which I was interested in.
"Surveillance: 90's Style", had 4 people on the panel. One was
Jim Ross himself, who puts together this Expo. The other three
were people from industry, involved in various ways with Tempest
stuff.
For the non-hip, Tempest refers to the act(art?) of spying on someone
else, by receiving and using stray electromagnetic radiation from
devices they use. Things like TV's, put out f*ckloads of stray
EM radiation. Computers. Fax machines. Hi-tech telephones.
Tempest also is a 'rating system', or spec, used by the government.
If something is Tempest-rated, then it passes the govt. spec for
minimal stray EM radiation. There are companies out there that
take off-the-shelf equipment, and Tempest-harden it.
There were maybe 10 or 15 people attending the conference. They
had planned to show a videotape, made and aired by the BBC, about
2 years ago. However, it turns out that NSA goons came out and
said "Gimme gimme gimme", "We gotta review this material before we
say it's ok for you to tell to others!" They were apparently
nonplussed by the fact that the BBC aired it 2 years ago, and that
everything was public knowledge.
Anyway, the guy who planned to show it basically told us that what
it had was a demo of Tempest surveillance. The BBC took a van, put
some equipment in it, and sent it out around town. They would
just drive around the business section of town, until they picked up
something, anything. They locked into what was displayed on a computer
screen in a lawyer's office (Well, the English equivalent), who
was up on the 23rd floor of an office building. The document was
something pertaining to an ongoing court case, or somesuch.
They went up to the 23rd floor, and knocked on the lawyer's door.
"Could you come down to the street? We have something to show you, that
we think you might be interested in."
Apparently the lawyer-type had a typical British reaction to seeing
his classified documents on some scumbag's screen in a van on the street.
The van people went around town, doing this, showing people how vulnerable
they were, etc....until they got bored with the whole thing.
---
At this point, there was some debate over some points.
"Shouldn't this be illegal? Shouldn't there be some law", said a woman.
(Shuffling, muttering, etc.)
Basically, there were a few people who want to slap down a law for anything
like this. Then there's the rest, who realize that if you're broadcasting
your info, mayhap in a 'new, unexplored' form of data, well, then that's
*your* problem.
Apparently, the govt. has known about this sort of Tempest Surveillance
for quite a while. Since the 50's. And back in the 30's or 40's, they
did similar things, to pick up superheterodyne receivers, and could find
radio receivers of spies that way. Without the spy transmitting.
People were pretty damned concerned, mostly about the govt, and banking,
and R&D. Are govt. computers protected? Banking computers?
---
Now, Mr. Ross talked to one of the panelists, and asked "If he could
bring his equipment down for a little demo". The guy replied,
"Well, there's not many people here. Why don't we all go upstairs?"
At this point, my eyes musta bugged out pretty far...
We all headed up to the 18th floor...
I walk into the hotel room. Suite, actually. There, on the far wall,
is a table with some equipment on it. A monitor, displaying static
and snow. Four 'boxes', stacked...2 rack-mount, 2 smallerish. Coax
interconnecting everything.
Then I notice a long piece of coax, running to an antennae, about 3 feet
high, with many elements sticking out in all directions. It's sitting
kinda near two terminals, on a different table. The terminals were
VT302's, or something similar.
"The terminal on the left is unmodified. The one on the right has been
Tempest-hardened by my company."
Another guy sits down at the stack 'o' boxes. He starts fiddling with
the knobs. "Let's see what we can see." He fiddles some more. Something
appears on the monitor screen by the equipment. He twiddles a different
knob.
*Bingo!*
Now, displayed on the equipment monitor, is a replica of what is displayed
on the unmodified terminal screen.
"Yea, but that's a pretty fancy-looking antennae ya got there."
"Oh, ok...we really don't need that."
At this point, the techie-guy unplugs the coax from the antenna, and
inserts an alligator clip into the coax. "Uh, lesse...what's metal
around here? Ah! The table leg"...
He attaches the other end of the alligator clip to the table leg.
*Blam* We get the screen back.
---
"Hey, waittasec...do you hear a TV on above us? Let's see what they're
watching...", sez the techie.
He fiddles with the knobs again...until he's got another screen locked
into the monitor.
"Hey, a movie! I think I've seen this one! It's really funny!"
---
So just *what* are those 4 boxes - equipment? Obviously, I just *had*
to know...
Well, firstly, there's the monitor. Just a regular old B&W monitor,
which accepts seperate horizontal, vertical, and video-level signals.
The two top (smallerish) boxes were Wavetek function generators. Ohe
had been modified with a 10-turn pot, for fine tuning. One of the
larger rack-mount boxes was also a function generator. This was a
high-precision function generator, which was used to do the horizontal
syncing of the monitor. It fed thru one of the Waveteks, simply because
it didn't have a TTL-level output, while the one Wavetek was just being
triggered, so's to use it's TTL-level output.
The other Wavetek was used to trigger the vertical sweep, and was
not as critical as the horizontal. The horizontal, I believe, was
triggered around 30 khz, +/- .5 Hz. This was why they had a large
rack-mount function generator.
The last box was a "VHF/UHF receiver". You dial in one frequency,
your center frequency. Then you select a range, your bandwidth.
Then, whatever signal you feed from it, it'll extract what it sees
as a video signal, at the frequency and bandwidth you dialed in.
The box also had several different modes and such that it can read,
but I'm not familiar with video equipment, so can't relate much about
this, except that the guy said it's an off-the-shelf, common, receiver.
The antenna feeds directly into the receiver. The 3 signals out are fed
to the proper pins on the video monitor.
Voila! You're armed and ready to do some heavy Tempest surveillance,
at distances of 1000 feet and more! (Depending on the type of antenna
of course...your mileage may vary.)
The antenna that they were using was a 20-db gain antenna, with a flat
response from 100 kHz to 1 GHz. (Yea, fucking huge...I still don't quite
believe the guy.) The antenna had knobs and switches and lights and
little meters on it, and had to be plugged into the wall. Not a CB antenna.
All you do is tune the receiver frequency around, until you notice something.
What you're picking off of, is harmonics generated from the CRT driver
circuitry. Them video levels are nearly square waves, which means that
they're rich in harmonics, so you can tune just about anywhere, and find
something.
And what the company does, in this case, is make a new video driver board,
but with slower risetimes, and more rounded signals. Of course, the slower
the risetime, the more blurry the screen, and they try to optimize that.
---
Well, that's about that for Tempest. This is the simplest type of
surveillance...the signal is *here*, *there*, *everywhere*. Your data
is everyone's data.
There are much more advanced types of Tempest surveillance, where they
can lock in onto a microprocessor's clock frequency (and phase), and
read off more harmonics from the data bits flowing across the busses
inside the computer, to printers, etc. This requires some heavy analysis,
however. Oh...one of the people on the talk this morning, apparently
either has, or makes, equipment which will distinguish between 20 different
devices in close proximity...so if you have 20 identical computers in a row,
they can lock in on each one, individually. Apparently clock frequencies
are different by some small amount, and they can exploit that.
---
Well, at this point, it's time for me to head out and down to the Exhibits,
which just opened. But I got caught up in a conversation with a guy who
turned out to be a ham (Then turned out to be a Lieutenant something or other
from the Pentagon) and some butthead with kinda stupid questions (reporter?)
and we basically commented on this stuff in general, and how people respond
in a certain way about interference from others, and how they'd respond very
differently if they were sending out this 'interference'.
If a ham transmits, and your equipment accepts (does not reject) the signal,
and you hear him on your stereo, chances are the typical person would whine
and yell at the ham for causing interference. The ham wouldn't mind that
you were 'eavesdropping', but would help clear up the interference.
If Joe Butthead was using a computer, and Joe Techie picked up his signal,
Joe Butthead would whine and yell that you were 'eavesdropping', while
ignoring the fact that he was basically broadcasting his data all over.
In a new, little-known format, perhaps...but broadcasted, regardless. See
flamage about cellular phones and cordless phones elsewhere...
Ok, we finally are the last ones to leave the room...
---
The Exhibits!
The first booth I came across was Visual Methods, Inc. From New Jersey.
They market all sorts of miniature cameras, placed in virtually anything
you could imagine...sprinkler heads, car-CB-antenna bases, neckties
(the tie-tack is the CCD element, single-element lens), etc. However,
the guy came across as kinda rude to me. He isn't interested in
showing off his neato devices, he only seems to want to talk to people who
are ready to spend buck$ for his devices. "Tell me what you're interested
in, and we'll talk"..."What do you want to do?", etc. Well, I just want
to find out more about what's out there, what's available. I guess this
guy sees it as a threat to his business, and I can understand that.
His products have an implied "People won't think there's a camera in _this!_"
quality, and if he tells everyone about everything he makes, then it reduces
the 'suprise' quality. However, this was a Surveillance Expo, and I really
think their public-relations people should be more friendly. This is the
same guy that was at Expo '89, and perhaps he IS the company. But enough said.
A number of empty booths were there...either people packed up early,
or didn't show at all.
There was an unmanned booth for Pulnix, which sells mini CCD color
cameras...niftly little cameras, some about the size of a 2" cube.
There was another nearby mini-camera booth, with a guy who seemed
bored, and eager to talk and spew his spiel. Even after I told him
that I was an engineering student, and completely unlikely to buy
anything...he seemed proud of what he had to offer. But it was just
more of the mini-camera fare...one neat one was about 1/2" in diameter,
and maybe 2 1/2" long. I have the data sheets from this booth, but there
isn't a company name on it *anywhere*... go figure.
Fiber optics...Closed Circuit TV systems..one booth had for sale, wireless
CCTV units, where you didn't need to run coax. Just plug this box (and
it's antenna) to the back of the camera, place the camera remotely.
Plug this other box into your monitor, and you're set.
A couple rows over from this guy, were some 'bug-detector' people, with
spectrum analyzers. Of course, they tune into this "Really strong signal,
I think it's around 900 MHz...". Gee, wouldn't happen to be this guy a
couple of rows back, could it? You could watch the video signal change,
as people walked by the table with the wireless CCTV system.
Another table, "Advanced Resonant Technologies", had a 6-million candlepower
flashlight. Portable. This was really nifty...nice adjustable spot/flood.
In the fully-lit convention center, the guy aimed it at a wall 30 feet away.
The beam was less than 1 foot in diameter...note that the reflector was
about 6 inches in diameter... the flashlight has a short-arc xenon lamp,
and some exotic metal reflector...gallium over nickel, or some such. It
reflected IR, so you could pop on an IR filter, and use it as an IR source.
The beam is advertised to be useful at over one mile. Weight: 3.2 pounds,
and I think the 12-volt pack lasts 1.5 hours. Microprocessor controlled.
Also at this table was a nice, compact Starlight scope. Fit nicely
into one's hand, about 4 inches long, and 1.5 inches in diameter. 40
degree field of view, so what you see is basically 1:1. I really liked
this item, and if I had a spare $4k, I might consider picking one up.
NCSA (National Computer Security Association) was there. The guy there
said they basically just want to advocate responsible computing practices.
MGrant talked to him, and we shortly discovered that this guy was not
from NCSA, but some random advertising agency. So he knew lotsa key
phrases and such, but seemed utterly useless for real info, aside from
more handouts. But I wasn't really following the conversation, so I
could be way off.
There was a booth at the corner of "TRW ELectronic Products Inc", and
as MGrant and I approached, there was a mournful "Your not gonna make
us stand up, are you" from behind the table.
"No, please, stay sitting....but spill your spiel, anyway!"
They were advertising "Fax Encryptors", boxes that go at each end of
fax communications. The boxes handshake, and use DES, so you can't
have a third box listen in, and decipher. The guys spilling their
spiel had apparently been out late drinking, and were fighting hangovers,
or were just incredibly bored and lame or something. But they were pretty
amusing..."First, you insert the key. That's your 'boot up sequence'. WHen
the display says 'Ready', that means it's ready for use. Your I/O
ports are in the rear...your phone line plugs into this connector, and
another cable goes from this one, to your fax machine" Of course, they
alternate sentences...while one talks, the other holds his head, apparently
in pain...
---
There was also, on a general info table, a stack of papers by Jim Ross,
on "Calling Number ID: A Position Paper in Favor of Universal Service
Without Per-Call Blocking"
Basically, he says that with universally offered CNID, then phone
calls that are harassing, obscene, etc. will virtually stop. Also
anonymous bomb threats will be greatly reduced. Hackers dialing
in will be _more_ traceable, same for voice-mail intrusions, and
"hang-up" calls.
For those wanting blocking...(battered wives, undercover police,
psychotherapists) there's always a pay phone, or, he suggests
getting another line under a pseudonym, with no address, and use that
as an *incoming* line. Make all calls out, on your regular line, but
disable the ringer on that phone. You'll never be disturbed...
Also, if you place a call thru an operator, your number will not be
forwarded. (Dunno about this, but Mr. Ross says so.)
There was a study done out in North Dakota...with the phone number in
CNID, they also displayed the name under which the phone line is
subscribed, and the residential subscribers had a preference for
seeing the name along with the number. Starting next spring, this
service is planned to be offered in the Boise, Idaho area by US West.
During the test, name blocking was offered, and out of 1 million
calls, it was used a total of 145 times.
{Ok, that's all from Jim Ross' paper. It's 10 pages long, and has
points defended much more than I'm willing to type in.}
Well, that about wraps it up for Surveillance Expo '90. It was
kinda fun, kinda lame. I am very glad I got to go, if solely
for the Tempest demo.
-Thalx
==============================================================================
/ /
/ File 6 / NIA068 /
/ TIME-TRIP: 1985 MOG-UR CC Charges Against Tom Ttcimpidis /
/ /
---
Wee Hours of the AM, Februrary 10, 1985...
I plucked this off of USENET, the national network of UNIX systems. I think
all of you will be interested in this, especially those of you out there who
are sysops on your own systems. Please, Please, PLEASE download this and post
it on every BBS and AE you can find. To coin a phrase:
WE HAVE WON!!!!!!!!!
/\/oo\/\ Count Nibble /\/oo\/\
Future Sysop, >The Planet 10 AE<
---
7AM, 02/07/85:
Pursuant to a telephone discussion w/ Reginald Dunn, head of the Criminal
Division of the LA City Attorney's Office, I was informed that the prosecution
believes it has insufficient evidence to continue the prosecution of Tom
Tcimpidis, Sysop of MOG-UR. This determination was made after I requested a
review of the case on 1/11/85 after the departure of city attorney IRA Reiner
to become DA and while the City Attorney's office is being run by the Civil
Service staff pending election of a new City Attorney. Mr. Dunn has given me
his word that the people will seek dismissal of the charges against Tom under
California Penal Code Section 1385, I.E., Dismissal In The Interests Of
Justice. Under California law, such a dismissal is "w/ prejudice" and the
people cannot refile the case subsequently. To put it succinctly, a dismissal
will terminate the presecution permanently.
As the members know, the City Attorney's office has previously reneged on
representations made to me regarding dismissal of the charges....I wish to
assure everyone that I have known Mr. Dunn for 10 years, and I trust his word
completely. If he says the case will be dismissed, I am statisfied that such
an action will occur.
We win. Win....win....win....win....My thanks to everyone who contributed to
supporting Tom and I in the defense of this matter. I consider this to be a
major victory for the rights of free speech over the "Big Brother"
machinations of the phone company.
I would be grateful if you would download this message and place it on other
systems throughout the country.....This is a very big victory, and the BBS and
Modem Communities should know about it.
Again, thanks for the support. Best wishes to all,
Chuck Lindner Attorney for sysop Tom Tcimpidis
8PM, 02/07/85:
The case of People V. Tcimpidis, aka use of a modem, go to jail, was dismissed
in the "Interests Of Justice" this morning, 02/07/85. As noted earlier, this
dismissal is w/ prejudice, and Tom is now free of the pactel scourge. Another
small step for something resmbling justice.
Chuck.
---
[For those of you unaware of the case, Tom Tcimpidis had his system confiscated
after the Shock Troops of PacTel found "illegally obtained" telephone credit
card number(s) on his BBS and was subsequently jerked around by the LA City
Attorney, who first promised that he was not going to be prosecuted, then
changed his mind and (I guess) decided to file charges. Now the case has
supposedly been dropped, permanently. I'm no lawyer, but I think the gist of
this is that you sysops out there probably have little to worry about when it
comes to being prosecuted for leaving something illegal on your board. NOW
will you get rid of those silly disclaimers? -CN]
=============================================================================
/ File 7 / NIA068 /
/ DEPARTMENT OF THE ARMY FIELD MANUAL Part 01 of 02 /
/ Explosives and Demolitions /
/ extract. /
/ HEADQUATERS, DEPARTMENT OF THE ARMY /
/ February 1971 /
/ /
/ Typed by: Death Jester /
/ Date Typed In: 01DEC90
Chaper 2
FIRING SYSTEMS
Section I. NONELECTRIC FIRING SYSTEMS
2-1. Introduction
Two types of systems for firing explosives are in general use--electric and
nonelectric. Both have their individual priming methods and materials. In
addition, detonating cord may be used with both systems to make them more
efficient and effective, as described in paragraphs 2-10 through 2-16.
2-2. System Components and Assembly for Detonation
A nonelectric system is one in which an explosive charge is prepared for
detonation by means of a nonelectric blasting cap. The basic priming
materials consist of a nonelectric blasting cap, which provides the shock
adequate to detonate the explosives, and the time blasting fuse, which
transmits the plame that fires the blasting cap. If more than one charge
must be detonated simultaneously, the nonelectric system must be combined
with a detonating cord (para 2-10 - 2-12) to insure simultaneous firing.
The assembly of a basic nonelectric system follows.
a. Cut and discard a 6-inch length from the free end of the time blasting
fuse to prevent a misfire caused by the exposed powder absorbing moisture
from the air (A, fig 2-1). Then cut off a three foot length of time
blasting fuse to check the burning rate. Split the end of the fuse, insert
a match head into the split, light the match with another match and note
the time it takes for the fuse to burn. Then compute the burning rate
per foot by dividing the time in seconds by the length in feet.
b. Cut the time blasting fuse long enough to enough permit the person
detonating the charge to reach a safe distance by walking at a normal
pace before the eplosion. This cut should be made squarely across the
time fuse.
c. Take on blasting cap from the cap box, inspect it by looking into
the open end. If any foreign matter or dirt is present, hold it with
the open end down, and shake it gently or bump the hand holding it
against the other hand. IF FOREIGN MATTER DOES NOT COME OUT, DISCARD
CAP. NEVER TAP THE CAP WITH A HARD OBJECT OR AGAINST A HARD OBJECT.
NEVER BLOW INTO THE CAP. DO NOT INSERT ANYTHING INTO THE CAP TO REMOVE
AND DIRT OR FOREIGN MATERIAL.
d. Hold the time blasting fuse vertically with the square cut end up
and SLIP TH BLASTING CAP GENTLY DOWN OVER IT SO THAT THE FLASH CHARGE IN
THE CAP IS IN CONTACT WITH THE END OF THE TIME FUSE; IF NOT IN CONTACT,
IT MAY MISFIRE. NEVER FORCE THE TIME FUSE INTO THE BLASTING CAP BY
TWISTING OR ANY OTHER METHOD. If the end is flattened or it is too
large to enter the blasting cap freely, roll it between the thumb and
fingers until the size is reduced to permit free entry.
e. After th blasting cap has been seated, grasp the time blasting
fuse between the thumb and third finger of the left hand and extend the
forefinger over the end of the cap to hold it firmly against the end of
the time fuse. Keep a slight pressure on the closed end of the cap with
the forefinger (B, fig 2-1).
f. Slide the second finger down the outer edge of the blasting cap to
guide the crimpers (B, fig 2-1), and thus obtain accurate crimping, even
in darkness.
g. Crimp the blasting cap at a point 1/8 to 1/4 of an inch from the
open end. A CRIMP TOO NEAR THE EXPLOSIVE IN THE BLASTING CAP MAY CAUSE
DETONATION. POINT THE CAP OUT AND AWAY FROM THE BODY DURING CRIMPING
(fig 2-2).
Note. If the blasting cap should remain in place several days
before firing, protect the joint between the cap and the time blasting
fuse with a coating of a sealing compound or some similar substance.
(As this sealing compound (para 1-50), a standard issue, does not make a
waterproof seal, submerged charges should be fired immediately.)
h. Pass the end of the time blasting fuse through the priming
adapter. (The time fuse should move through the adapter easily.) Then
pull the cap into the adapter until it stops, instert into the cap well
of the the explosive, and screw the adapter in place. If no priming
adapter is available, insert the blasting cap into the cap well and tie
it in place with a string or fasten it with adhesive tape or some other
available material. (For details of nonelectric priming of demolition
blocks, see para 2-18).
Note. For long lengths of time blasting fuse it may be more
conveinent to pass the end of the fuse through the priming adapter
before crimping the cap onto the the time fuse.
i. Attach M60 weatherproof fuse igniter (para 1-57n) as follows:
(1) Unscrew the fuse holder cap two or three turns but do not
remove. Press the shipping plug into the igniter to release the split
collet (fig 1-47), and rotate the plug as it is removed.
(2) Insert the free end of the time fuse in place of the plug
until it rests against the primer.
(3) Tighten the cap sufficiently to hold the fuse in place and
thus weatherproof the joint.
(4) To fire, remove the saftey pin, hold the barrel in one hand,
and pull on the pull ring with the other, taking up the slack before
making the final strong pull. In the event of a misfire, the M60 can be
reset quickly without disassembly by pushing the plunger all the way in
and attempting to fire as before. (It cannot be reset underwater
however, because water can enter the interior of the nylon case through
the holes in the pull rod. The fuse igniter is reusable if the primer
is replaced.)
Note. The M2 weatherproof fuse igniter (fig 1-46) may be attached
by sliding the fuse retainer over the end of the fuse, firmly seating
it, and applying sealing compound at the joint betwwen the time blasting
fuse and the igniter to protect the open end of the fuse from moisture.
In firing, hold the barrel in one hand and pull on the other ring with
the other.
j. If a fuse igniter is not abailable, light th time blasting fuse
with a match by splitting the fuse at the end (fig 2-3), placing the
head of an unlighted match in the powder train, and then light the
inserted match head with a flaming match or by rubbing the abrasive on
the match box against it.
2-3. Nonelectric Misfires
a. PREVENTION. Working on or near a misfire is the most hazardous of
all blasting operations. A misfire should be extremely rare if these
procedures are followed closely:
(1) Prepare all primers properly.
(2) Load charges carefully.
(3) Place primer properly.
(4) Perform any tamping operation with care to avoid damage to an
otherwise carefully prepared charge.
(5) Fire the charge according to the proper technique.
(6) If possible, use dual firing systems (para 2-13 - 2-16). If
both systems are properly assembled, the possibility of a misfire is
reduced to a minimum.
(7) Do not use blasting caps underground; use detonating cord.
b. THE CLEARING OF NONELECTRIC MISFIRES. Occasionally, despite all
painstaking efforts, a nonelectric misfire will occur. Investigation
and correction should be undertaken only by the man that placed the
charge. For a charge primed with a nonelectric cap and time blasting
fuse, the procedure is as follows:
(1) Delay the investigation of the misfire at least 30 minutes
after the expected time of detonation. This should be ample time for
any delayed explosion to take place because of a defective powder train
in the fuse. Under certain combat conditions, however, immediate
investigation may be necessary.
(2) If the misfired charge is not tamped, lay a primed one-pound
charge at the side of the charge, without moving or disturbing it, and
fire.
(3) If the misfired charge has no more than a foot of tamping,
attempt to explode it by detonating a new 2-pound charge placed on top.
(4) If the misfired charge is located in a tamped borehole, or if
the tamped charge is so situated as to make method (3) above
impractical, carefully remove the tamping by means of wooden or
nonmetallic tools. Avoid accidentally digging into the charge. Also,
the tamping may be blown out by means of a stream of compressed air or
water if either is abailable. Constant checking of the depth of the
borehole from the ground surface to the top of the charge during digging
will minimize the danger of striking the charge. When the charge has
been uncovered within 1 foor, insert and detonate a new 2-pound primer.
Whenever possible, detonating cord should be used to prime underground
charges and the blasting cap located above ground (see para 2-10 -
2-12).
(5) An alternate method of reaching a deep misfire charge is to
drill a new hole withing one foot of the old one and to the same depth a
new 2-pound primed charge is then placed in the new hole to detonate the
misfired charge. Extreme care is required in drilling the new hole to
avoid striking the old misfired charge or placing the new charge too far
away to induce detonation.
Section II. ELECTRIC FIRING SYSTEMS
2-4. Components and Assembly for Detonation
An electric firing system is one in which electricity is used to fire
the primary initiating element. An electric impulse supplied from a
power source, usually an electric blasting machine, travels through the
firing wire and cap lead wires to fire an electric blasting cap. The
chief components of the system are the electric blasting cap, firing
wire, and the blasting machine. Detailed information about electric
blasting equipment is contained in TM 9-1375-203-15. The preparation of
the explosive charge for detonation by electric means is called electric
priming. The proper methods and sequence of operations of electric
priming are described below.
a. Place Charges. Prepare and place all explosive charges as
prescribed by the methods in chapter 3. (Details of preparing
demolition blocks for electric priming are given in para 2-18.)
b. Lay Out Firing Wire.
(1) After locating a firing position a safe distance away from the
charges, lay out the firing wire from the charges to the firing
position.
(2) Test the free ends of the firing wire together to prevent an
electric charge from building up in the firing wire.
(3) Twist the free ends of the firing wire together to prevent an
electric charge from building up in the firing wire.
c. Test Blasting Caps.
(1) Test each blasting cap to be used in the electric firing
system as described in paragraph 2-7.
(2) After each cap has been tested, twist the free ends of the cap
lead wire together or shunt them with the short circuit shunt provided
to prevent an electric charge from building up in the cap lead wires.
d. Connect Service Circuit.
(1) If two or more electric blasting caps are used, connect their
lead wires into one of the two series circuits described in paragraph
2-6.
(2) If more than 10 blasting caps are used in the series circuit,
or if the circuit is complicated, it should be tested with the test set
or galvanometer (para 2-7).
(3) Splice the free cap lead wire to the firing wire.
e. Insert Caps Into Charges. Place the blasting caps into the
explosive charges and fasten the caps securely to the charges (fig 2-4).
(For details of electric priming of demolition blocks see para 2-18).
f. Test Entire Circuit.
(1) Move to the firing position and test the entire firing circuit
with the test set or galvanometer as described in paragraph 2-7.
(2) Twist the free ends of the firing wire together.
g. Test Blasting Machine. Test operate the blasting machine several
times as outlined in TM 9-1375-203-15 to insure that it operates
properly.
h. Connect Blasting Machine.
(1) Untwist the free ends of the firing wire and fasten them to
the two posts of the blasting machine.
(2) Operate the blasting machine to fire the charges.
i. Precautions.
(1) TWO OR MORE CAPS. If two or more electric blasting caps are
connected in the same circuit, be sure that they are of the same type
and made by the same manufacturer. This is essential to prevent
misfires, as blasting caps of different manufacturers have different
electrical characteristics which can result in some caps in the circuit
not firing because others fire more quickly and thus break the circuit
before the slower caps have received enough electricity to fire. This
is not true, however, of the M6 special electric blasting caps--all of
which are made according to the same specifications. Blasting caps of
the same manufacturer may be identical by the label, color of the cap,
or shape of the shunt.
(2) FIRING THE CIRCUIT. For safety reasons, only one individual
should be detailed to connect the blasting machine to the firing circuit
and to fire the circuit. He should be responsible for the care and
security of the blasting machine at all times during blasting
activities. He also should either connect the blasting wires in the
circuit or check their connection by on-the-spot visual examination.
2-5. Splicing Electric Wires
Insulated wires, before splicing must have the insulating material
stripped from the ends. Expose about 3 inches of bare wire (fig 2-5),
and remove any foreign matter such as enamel by carefully scraping the
wire with the back of a knife blade or other suitable tools. The wires
should not be nicked, cut, or weakened when the wires are bared, and
multiple strand wires should be twisted lightly after scraping.
a. SPLICING METHOD. Two wires, which have been prepared as described
above, may be spliced as shown in figure 2-5. THis is called the
Western Union "pigtail" splice. Two pairs of wires are spliced in the
same manner as the two wire splice above. One wire of one pair is
spliced to one wire of the other pair, and the process is repeated for
the other two wires.
b. PRECAUTIONS FOR SPLICING. A short circuit may ovvur very easliy
at a splice if certain precautions are not observed. If pairs or wires
are spliced, stagger the two separate splices and tie with twine or tape
as in (1), figure 2-6. An alternate method of preventing a short
circuit at the point of splice is shown in (2), figure 2-6. The splices
are separated, not staggered, in the alternate method. Whenever
possible insulate splices from the ground or other conductors by
wrapping them with friction tape or othe electric insulating tape. This
is particularly necessary when splices are place under wet tamping.
Circuit splices, not taped or insulated, should not lie on moist ground.
The splices should be supported on rocks, blocks, or sticks so that only
the insulated portions of the wires touch the ground. THey may also be
protected by inserting them to hold the splice firmly inside. Splices
may be protected from damage from pull by tying the ends in an overhand
or square knot, allowing sufficient length for each splice ((1), fig
2-5).
2-6. Series Circuits
a. COMMON SERIES. This is used for connecting two or more charges
fired electrically by a single blasting machine (A, fig 2-7). A common
series circuit is prepared by connecting one blasting cap lead wire from
the first charge to the once lead wire in the second charge and so on
until only two end wires are free, then connecting the free ends of the
cap lead wires to the ends of the firing. Connecting wires (usually
annunciator wire) are used when the distance between blasting caps is
greater than the length of the usual cap lead wires.
b. "LEAPFROG" SERIES. The "leapfrog" method of connecting caps in
series (B, fig 2-7) is useful for firing ditching charges or any long
line of charges. It consists of ommitting alternate charges on the way
and then connecting them to form a return path for the electric impulse
to reach the other lead of the firing wire. This brings both end wires
out at the same end of the line of charges, and thus eliminates laying a
long return lead from the far end of the line charges back to the firing
wire.
2-7. Testing Electric Wires, Blasting Caps and Circuits
a. FIRING WIRE MAY BE TESTED AS FOLLOWS:
(1) When using M51 blasting cap test set:
(a) Check test set by connecting the posts with a piece of bare
wire (para 1-54)(fig 2-8). Th indicator lamp should flash when the
handle is squeezed.
(b) Separate the firing wire conductors at bothe ends, and
connect these at one end to the test set binding posts. Actuate test
set. The indicator lamp should not flash. If it does, the firing wire
has a short circuit (fig 2-9).
(c) Twist the wires together at one end and connect those at the
other end to the test set posts. Actuate test set. The indicator lamp
should flash. If it does not flash, the firing wire has a break.
(2) When using the blasting galanometer:
(a) Check galvanometer by holding a piece of metal across its
terminals (para 1-53, fig 2-8). If the batter is good, this should show
a wide deflection of the needle, approximately 25 units (zero ohms).
(b) Separate the firing wire conductors at bothe ends, and touch
those at one end to the galvanometer posts. The needle should not move.
If it does, the firing wire has a short circuit (fig 2-9).
(c) Twist the wires together at one end and touch those at the
other end to the galvanometer posts. This should cause a wide
deflection of the needle (about 6.5 ohms or 23 to 24 units for a
500-foot length). (See note at end of d(2), below.) No movement
indicates a point of break; a slight movement indicates a point of high
resistance whcih may be cause by a dirty wire, loos wire connections, or
wires with several strands broken off at connections.
Note. Firing wire may be tested on the reel, but should be
tested again after unreeling, which may separates broken wires unnoticed
when reeled.
b. Electric Blasting Caps May be Tested as Follows:
(1) When using the M51 blasting cap test set:
(a) Check the test set as described above.
(b) Remove the short circuit shunt from the lead wires of the
electric blasting cap.
(c) Attach one cap lead wire to one binding post and tie other
cap lead wire to the other post, and squeeze the test set handle. If
the indicator lamp flashes, the blasting cap is satisfactory. If it
does not flash, the cap is defective and should not be used. During the
tes, ALWAYS POINT THE EXPLOSIVE END OF THE BLASTING CAP AWAY FROM THE
BODY.
(2) When using the blasting galvanometer:
(a) Check the galvanomter as described above.
(b) Remove the short circuit shunt.
(c) Touch one cap lead wire to one galvanometer post and the
cap lead wire to the other. If the galvanometer's needle deflects
slightly less than it did when instrument was tested ((a) above) the
blasting cap is satisfactory; if not, the cap is defective and should
not be used. During the test, ALWAYS POINT THE EXPLOSIVE END OF THE CAP
AWAY FROM THE BODY.
Note. If the battery is fresh, the galvanometer should read 25
units (zero ohms) when the instrument is tested and about 24 units
(about 2 ohms) when a good blasting cap is tested.
c. Series Circuits May Be Tested as Follows:
(1) Connect charges as shown in figure 208 (either method).
(2) When using the M51 blasting cap test set, connect the free
ends of the blasting caps lead wires to the test set binding posts. THe
indicator lamp should flash.
(3) When using the blasting galvanometer, touch the free ends of
the blasting cap lead wires to the galvanomter posts. This should cause
a wide deflection of the needle.
d. The Entire Circuit May be Tested as Follows:
(1) Splice firing wires to series circuit and move to firing
position.
(2) When using the blasting cap test set connect the free ends of
the firing wire to the binding posts. The indicatior lamp should flash.
If the lamp does not flash, the circuit is defective.
Note. Since the M51 test set cannot discriminate between a firing
circuit that is properly set up and once with a short in it, special
care must be taken in wiring the circuit to avoid shorting.
(3) When using the galvanometer touch the free ends of the firing
wire to the galvanometer posts. This should cause a wide deflectction
of the needle. The magnitude of the deflection depends upon the number
of caps and the length of the firing wire. If there is no deflection,
the circuit is defective. See appendix E for calculation of circuit
resistance.
Note. To get a "wide deflection of the needle" the galvanometer
battery should be in good condition (para 1-53).
(4) If the firing circuit is defective, shunt wires, Then go down
range and recheck the circuit, repeating a and b above. If a splice is
found defective, resplice the wires. If a cap is found defective,
replace it. Continue to test all caps and wire in the circuit, then
test the entire circuit again to make sure that all breaks have been
located before attempting to fire the charge.
2-8. Electric Misfires
a. PREVENTION OF ELECTRIC MISFIRES. In order to prevent misfires,
make one individual responsible for all electrical wiring in a
demolition circuit. He should do all splicing to be sure that--
(1) All blasting caps are included int the firing circuit.
(2) All connections between blasting cap wires, connecting wires,
and firing wires are properly made.
(3) Short circuits are avoided.
(4) Grounds are avoided.
(5) The number of blasting caps in any circuit does not exceed the
rated capacity of the power source on hand.
b. CAUSE OF ELECTRIC MISFIRES. Common specific causes of electric
misfires include--
(1) Inoperative or weak blasting machine or power source.
(2) Improperly-operated blasting machine or power source.
(3) Defective and damaged connections causing either a short
circuit, a break in the circuit, or high resistance with resulting low
current.
(4) Faulty blasting cap.
(5) The use in the SAME CIRCUIT of blasting caps (other than M6)
made by different manufacturers.
(6) The use of more blasting caps than the power source rating
permits.
c. CLEARING ELECTRIC MISFIRES. Because of the hazards of burning
charges and delayed explosions, electric misfire must be cleared with
extreme caution. A burning charge may occur with the use of electric as
well as nonelectric caps. Misfires of charges primed with detonating
cord fired by electric blasting caps are cleared as described in
paragraph 2-12. If the charge is dual-primed electrically and below
ground, wait 30 minutes before investigating to make sure that the
charge is not burning; or if dual-primed above ground, wat 30 minutes
before investigation because a burning charge can set off the second cap
causing the main charge to detonate. On the other hand, if the
electric misfire is above ground and the charge is not dual-primed,
investigate immediately. If the system is below ground and not dual
primed, proceed as follows--
(1) Check the firing wire connection to the blasting machine or
power source terminals to be sure the contacts are good.
(2) Make two or three more attempts to fire the circuits.
(3) Attempt to fire again, using another blasting machine or power
source.
(4) Disconnect the blasting machine firing wire and wait 30
minutes before further investigation. Before moving on to the charge
site, be sure that the firing wires at the power source end of the
circuit are shunted to aboid any posible static electric detonation.
(5) Check the entire circuit, including the firing wire, for
breaks and short circuits.
(6) If the faul is not above ground, remove the tamping material
very carefully from the borehole to avoid striking the electric blasting
cap.
(7) Make not attempt to remove either the primer or the charge.
(8) If the fault is not located by the removal of the tamping
material to withing 1 foot of the charge, place a new electric primer
and 2 pounds of explosive at this point.
(9) Disconnect the blasting cap wires of the original primer from
the circuit, and short the cap's lead wires.
(10) Connect the wires of the new primer in their place.
(11) Replace the tamping material.
(12) Initiate detonation. Detonation of the new primer will fire
the original primer.
Note. In some cases it may be more desirable or expedient to
drill a new hole withing a foot of the old one at the same depth to
avoid accidental detonations of the old charge and then place and prime
a new 2-pound charge.
2-9 Premature Detonation by Induced Currents and Lightning
a. INDUCED CURRENTS. The premature detonation of electric blasting
caps by induced curret from radio frequency signals is possibl. Table
2-1 showing the minimum safe distance in respect to transmitter power,
indicates the distance beyond which it is safe to conduct electrical
blasting even under the most adverse conditions. This table applies to
operating radio, radar, and television transmitting equipment. Mobile
type transmitters and portable transmitters are prohibited within 50
meters of any elctrical blasting caps or electrical firing system. If
blasting distances are less than those shown in table 2-1, the only safe
procedure is to use a nonelectric system, which cannot be prematurely
detonated by RF currents. If however the use of the electric systme is
necessary, follow precautions given in TM 9-1300-206. See also AR
385-63.
Caution. If electric blasting caps are to be transported near
operating transmitters or in vehicles (including helicopters) in which a
transmitter is to be operated, the caps will be placed in a metal can,
the cover of which must be snug fitting and lap over the body of the can
to a minimum depth of one-half inch. Caps will not be removed from
container in proximity to operating transmitter unless the hazard has
been evaluated and estimated to be acceptable.
b. LIGHTNING. Lightning is a hazard to both electric and nonelectric
blasting charges. A strike or a nearby miss is almost certain to
initiate either type of system. Lightning strikes, even at remote
locations, may cause extremely high local earth currents. The effects
of remote lightning strikes are multiplied by proximity to conducting
elements, such as those found in buildings, fences, railroads, bridges,
streams, and underground cables or conduct. Thus, the only safe
procedure is to suspend all blasting activities during electrical storms
and when one is impending.
c. ELECTRIC POWER LINES. Electric firing should not be performed
within 155 meters of energised power transmission lines. When it is
necassary to conduct blasting operations at distances closer than 155
meters to electrical power lines, nonelectric fire systems should be
under or the power lines deenergized (AR 385-63).
table 2-1:
______________________________________________________________
Average or peak ! Minimum distance
transmitting power ! to transmitter(meters)
______________________________________________________________
!
0-30 ! 30
30-50 ! 50
50-100 ! 110
100-250 ! 160
250-500 ! 230
500-1000 ! 305
1000-3000 ! 480
3000-5000 ! 610
5000-20000 ! 915
20000-50000 ! 1530
50000-100000 ! 3050
_______________________________!______________________________
2-10. Methods of Use
Of all firing systems for explosives, a detonating cord firing system is
probably the most versatile and in many cases the most easily installed.
It is especially applicable for underwater and underground blasting
because the blasting cap of the initiating system may remain above the
water or ground.
a. An electric system consisting of an electric blasting cap,
initiated by a blasting machine or other power source, or a nonelectric
blasting cap initiated by a fuse igniter and a length of time blasting
fuse, is used to detonate the cord.
b. The blasting cap, electric or nonelectric, is attached to a point
6 inches from the free end of the detonating cord by numerous wraps of
string, wire, cloth, or tape.
2-11. Detonating Cord Connections
A detonating cord clip (fig 1-33) or square knot pulled tight is used to
splice the ends of detonating cord. At least a 6-inch length should be
left free at both sides of the knot (fig 2-10). When fabric is used to
cover the detonating cord, the fabric must not be removed. The knot may
be placed in water or in the ground but the cord must be detonated from
a dry end.
a. BRANCH LINE CONNECTIONS. A branch line is fastened to a main line
by means of a clip (fig 1-33) or a girth hitch with one extra turn (fig
2-11). The angle formed by the branch line and the cap end of the main
line should not be less than 90 degrees from the direction from which
the blast is coming; at a smaller angle, the branch may be blown off the
main line without being detonated. At least 6 inches of the running end
of the branch line is left free beyond the tie.
b. RING MAIN. A ring main is made by bringing the main line back in
the form of a loop and attaching it to itself with a girth hitch with
one extra turn (fig 2-12). This will detonate an almost unlimited
number of charges. The ring main makes the detonation of all charges
more postitive because the detonating wave approaches the branch lines
from both directions and the charges will be detonated even when there
is one break in the ring main. Branch line connections should be made
perpendicular to the ring main. Kinks in lines should be avoided, and
curves and angles should not be sharp. Any number of branch lines may
be connected to the ring main, but a branch line is never connected at
apoint where the ring main is spliced. In making detonating cord branch
line connections, avoid crossing lines. However, if this is necessary,
be sure to have at least one foot of clearance at all points between the
detonating cords; otherwise, the cords will cut each other and destroy
the firing system.
2-12. Detonating Cord Misfires
a. FAILURE OF NONELECTRIC BLASTING CAP. If a nonelectric blasting
cap attached to detonating cord fails to function, delay the
investigation for at least 30 minutes. Then cut the detonating cord
main line between the blasting cap and the charge, and fasten a new
blasting cap on the detonating cord.
b. FAILURE OF ELECTRIC BLASTING CAP. If an exposed electric blasting
cap fastened to detonating cord fails to fire, disconnect the blasting
machine immediately and investigate. Test the blasting circuit for any
breaks or short circuit. Short the firing wire leads before leaving
firing position to correct the problem. If necessary, replace the
original blasting cap.
c. FAILURE OF DETONATING CORD. If detonating cord fails to function
at the explosion of an exposed electric or nonelectric blasting cap,
investigate immediately. Attach a new blasting cap to the detonating
cord, taking care to fasten it properly.
d. FAILURE OF BRANCH LINE. If the detonating cord main line
detonates but a branch line fails, fasten a blasting cap to the branch
line and fire it seperately.
e. FAILURE OF CHARGE TO EXPLODE. If the charge is above ground, and
the detonating cord leading to a charge detonates but the charge fails
to explode, delay the investigation until it is certain that the charge
is not burning. If the charge is intact, insert a new primer. If the
charge is scattered by the detonation of the original charge as
possible, place a new charge if necessary, and reprime. Make every
attempt possible to recover all explosives scattered by misfire,
particularly those used in training exercises.
Section IV. DUAL FIRING SYSTEMS
2-13. Introduction
There is always a certain amount of danger to personnel investigating
misfires. Since dual priming increases greatly the probability of
successful, firing, it should be used whenever possible. Dual priming
consists of two complete systems independent of each other, and each
capable of firing the same charge. It can be two electric systems, two
nonelectric systems. Or an electric and nonelectric system.
2-14. Nonelectric Dual Firing Systems
This consists of two independent nonelectric systems for firing a single
charge or set of charges. If two or more charges are to be fired
simultaneously, two detonating cord ring mains are laid out, and abranch
line from each charge is tied into each ring main. Figure 2-13 shows
the layout for a nonelectric dual firing system.
2-15. Electric Dual Firing System
This dual firing system consists of two independent electric circuits,
each with an electric blasting cap in each charge, so that the firing of
either circuit will detonate all charges. The correct layout is shown
in figure 2-14. The firing wires of the two circuits should be kept
separated so that both will not be cut by a single bullet or a single
shell fragment. The firing points also should be at two separate
locations.
2-16. Combination Dual Firing System
The combination dual firing system uses an electric and nonelectric
firing system (fig 2-15). Each charge is primed electrically and
nonelectrically. Both the electric and nonelectric systems must be
entirely independent of each other. The nonelectric system must be
fired first.
Section V. PRIMING CHARGES
2-17. Introduction
This section will show nonelectric, electric, and detonating cord
methods of priming most basic explosives. Certain terminology should be
clarified since it will appear frequently in this section.
a. NONELECTRIC FIRING SYSTEM. A nonelectric firing system consists
of a fuse igniter, a length of time blasting fuse, and a nonelectric
blasting cap. (A, fig 2-16).
b. ELECTRIC FIRING SYSTEM. An electric firing system consists of a
blasting machine or some other means of producing current, the necessary
number of reels of firing wire, and electric blasting cap(s) (B, fig
2-16).
c. DETONATING CORD. Detonating cord can be used to fire several
charges simultaneously. Charges in several locations can be detonated
by a single blasting cap wehn detonating cord ring mains are used and
the charges are primed with detonating cord (para 2-10 - 2-12).
2-18. Priming Demolition Blocks
a. NONELECTRIC PRIMING. Demolition blocks may or may not have
threaded cap wells. Priming adapters should be used, if available, to
secure the nonelectric blasting cap and time blasting fuse to demolition
blocks with threaded cap wells (fig 2-17, para 1-45 and 2-2).
(1) If priming adapters are not available but the blocks have
threaded cap wells, they are primed as follows:(method 1, fig 2-18)
(a) Wrap a string tightly around the block and tie it securely
leaving about 6 inches of loose string on each end after making the tie.
(b) Insert a blasting cap with fuse attached into the cap well.
(c) Tie the loose string around the fuse to prevent the blasting
cap from being separated from the block.
Note. Do not tie the string so tight that powder train is
broken in the fuse.
(2) If the demolition block does not have a cap well, proceed as
follows:
(a) Make a hole in the end of the block with a pointed
nonsparking instrument or the pointed handle on the M2 crimpers large
enough to contain the blasting cap (method 2, fig 2-18).
(b) Using string, wrap several turns around the explosive and
tie any knot. Position the tie so it will be at the top of the hole
when the fused cap is inserted.
(c) Insert fused cap into hole.
Note. Never try to force a cap into an expedient cap well that
is too small to admit it easily. Remove and enlarge hole.
(d) Tie string around the time fuse at top of hole with two half
hitches.
b. ELECTRIC PRIMING. Here again demolition blocks may or may not have
threaded cap wells. If the blocks have threaded cap wells, priming
adapters should be used if available. Proceed as follows:
(1) Untwist the free ends of the lead wire and fasten them to the
firing wire (para 2-4).
(2) Pass the lead wires through the slot of the adapter and pull
the cap into place in the adapter (fig 2-19).
(3) Insert the cap into the capwell of the explosive and screw the
adapter into place.
c. If a priming adapter is not available do the following:
(1) If the block does not have a cap well, make one in the manner
described in paragraph 2-18a and figure 2-18.
(2) Untwist the free ends of the lead wire and fasten them to the
firing wire.
(3) Insert the electric cap into the cap well and tie the lead
wires around the block by two half hitches or a girth hitch (fig 2-20).
Allow some slack in the wires between the blasting cap and the tie to
prevent any pull on the blasting cap.
d. DETONATING CORD PRIMING. Demolition blocks may be primed with
detonating cord in several ways.
(1) The method which offers the greatest assurance of detonation
is to affix a nonelectric blasting cap to the end of the detonating cord
and place it in the demolation block similar to nonelectric priming
methods (para 2-19a). The system is then intitiated by a nonelectric or
electric assembly.
(2) The common method (A, fig 2-21) lays one end of a 4-foot
length of detonating cord at an angle across the explosive. The running
end is tehn given three wraps around the block and the end laid at an
angle. On the fourth wrap, slip the running end under all wraps
parallel to the other end and draw tight. Initiate by an electric or
nonelectric system.
(3) Alternate method No. 1 is shown in B, figure 2-21. Tie the
detonating cord around the explosive block (on top of the booster, if
present) with a clove hitch with two extra turns. The cord must fit
snugly against the blocks and the loops must be pushed close together.
Use an electric or nonelectric firing system to initiate the charte.
(4) Alternate method No. 2 places a loop of detonating cord on the
explosive with four wraps around the block and loop. The running end is
pulled through the eye of the loop and tightened (C, fig 2-21). This
method is also initiated by an electric or nonelectric system.
Note. Alternate method No. 2 is more applicable to short than to
long detonation cord branch lines or primers.
2-19. Composition C4 and C3 Demolition Blocks
a. NONELECTRIC AND ELECTRIC PRIMING. When ever whole blocks or
portions of blocks of plastic explosives (Composition C4 and C3) are
used, prime similarly to demolition blocks without cap wells (para
2-18). Plastic explosives can be cut with a knife and then formed into
almost any shape.
b. DETONATING CORD PRIMING. To prime plastic explosives with
detonating cord, form either of the two knots shown in figure 2-22.
Then inser the knot into a block of explosive or a molded piece of
explosive as shown. In either case, insure that there is at least 1/2
inch of explosive on all sides of the knot.
2-20. Sheet Explosive (M118 and M186 Demolition Charges)
a. NONELECTRIC AND ELECTRIC PRIMING. M118 and M186 demolition
charges may be primed in the following ways:
(1) Attach blasting cap holder M8 (para 1-46) to one end or side
of sheet explosive. The blasting cap holder M8 (fig 1-25) is
self-securing to sheet explosive by means of three slanted, protruding
teeth which prevent withdrawl. Two dimpled spring arms firmly hold the
blasting cap in the M8 holder (fig 2-23).
Note. This holder is supplied in each M118 and M186 demolition
charge of recent manufacture. It is also available as a separate item
of issue in quantities of 4,000.
(2) Cut notch approximately 1.5-inches long and 1/4 inch wide in
sheet explosive and insert blasting cap to limit of notch; secure
blasting cap with string, tape or strip of sheet explosive (fig 2-23).
(3) Place blasting cap on top of sheet explosive and sevure with a
strip of sheet explosive at least 3" x 3".
(4) Insert end of blasting cap 1.5 inches between two sheets of
the explosive.
b. DETONATING CORD PRIMING. M118 and M186 demolition charge sheet
explosive may be primed with detonating cord by attaching a nonelectric
blasting cap to the end of the detonating cord and following the methods
outlined in A above. The detonating cord is then attached to a
nonelectric or electric initiating system.
2-21. Dynamite
Dynamite can be primed at either end or the side. End priming is used
when a whole case is fired or when the charges pclaced require no
tamping. Side priming is used when the charge is placed in a tamped
borehole to prevent damage to the prime during placement and tamping.
a. NONELECTRIC PRIMING.
(1) END PRIMING METHOD (A, fig 2-24).
(a) Using the cap crimpers, make a cap well in the end of the
dynamite cartridge.
(b) Insert a fused blasting cap.
(c) Tie the cap and fuse securely in the cartridge with string.
(2) WEATHERPROOF END PRIMING METHOD. This method helps
weatherproof the primed charge (B, fig 2-24).
(a) Unfold the wrapping at the folded end of the dynamite
cartridge.
(b) Use the cap crimpers and make a cap well in the exposed
dynamite.
(c) Insert a fused blasting cap into the cap well.
(d) Close the wrapping around th fuse and fasted securely with
string or tape.
(e) Apply weatherproof sealing compound to the tie.
(3) SIDE PRIMING METHOD. (fig 2-25).
(a) Use the cap crimpers and make a cap well about 1.5 inches
from one end of the dynamite cartridge. Slant the cap well so that the
blasting cap, when insterted, will be nearly parallel with the side of
the cartridge and the explosive end of the cap will be at a point at
about the middle of the cartridge.
(b) Insert a fused blasting cap into the hole.
(c) Tie a string securely around the fuse and then wrap it
tightly around the cartridge making two or three turns before tying it.
(d) The primed cartridge may be weatherproofed by wrapping a
string closely around the cartridge, extending it an inch or so on each
side of the hold to cover it completely. Then cover the string with
weatherproof sealing compound.
b. ELECTRIC PRIMING.
(1) END PRIMING METHOD (A, fig 2-26).
(a) Use the cap crimpers and make a cap well in the end of the
cartridge and insert an electric blasting cap as shown in a(1) above.
(b) Tie the lead wires around the cartridge with two half
hitches or a girth hitch.
(2) SIDE PRIMING METHOD (B, fig 2-26).
(a) Make a cap well in the side of the cartridge and insert an
electric blasting cap as outlined a(3) above.
(b) Tie the lead wire around the cartridge with a girth hitch or
two half hitches or fasten with string or tape.
c. DETONATING CORD PRIMING. Dynamite cartridges may be primed with
detonating cord by attaching a nonelectric blasting cap to the end of
the detonating cord and following any of the methods for nonelectric
priming outlined in A above. Dynamite may also be primed by lacing the
detonating cord through it. This is used chiefly in boreholes,
ditching, or removal of stumps. Punch four equally-spaced holes through
the dynamite cartridge and lace the detonating cord through them as
shown in figure 2-27.
2-22. 40-Pound Ammonium Nitrate Cratering Charge
a. NONELECTRIC PRIMING (fig, 2-28).
(1) Place a fused nonelectric blasting cap in the cap well on the
side of the container.
(2) Tie a string around the fuse and then around the cleat above
the cap well.
(3) Dual prime as outlined in D below.
b. ELECTRIC PRIMING. (fig 2-28).
(1) Place an electric blasting cap in the cap well on the side of
the container.
(2) Tie the lead wires around the cleat above the cap well.
(3) Dual prime as outlined in D below.
c. DETONATING CORD PRIMING (A, fig 2-29).
(1) Pass the end of the detonating cord through the tunnel on the
side of the can.
(2) Tie an overhand knot on the portion passed through at least
6-inches from the end.
(3) Dual prime as outlined in D below.
d. DUAL PRIMING (B, fig 2-29). To insure positive detonation of the
ammonium nitrate cratering charge all charges should be dual primed with
a 1-pound brick of explosive taped to the side of the charge near the
cap well or detonating cord tunnel to detonate the TNT booster in the
center of the charge. This demolition block may be primed by the same
method the cratering charge is primed. Both charges should be primed to
detonate simultaneously.
e. PRECAUTIONS. As ammonium nitrate is hygroscopic and becomes
ineffective if it has absorbed moisture (para 1-33), the metal container
must be carefully inspected for damage or rusting that would indicate
that the ammonium nitrate had absorbed moisture. Damaged or rusted
charges should not be used. For safety in priming use detonating cord
whenever charges are placed underground.
2-23. Shaped Charges
a. NONELECTRIC AND ELECTRIC PRIMING. The M2A3, M2A4, M3 and M3A1
shaped charges have a threaded cap well at the top of the rear cone.
They may be primed by means of a blasting cap and priming adapter as
shown in figure 2-30. If a priming adapter is not available, the primer
may be held in the cap well with string, piece of cloth or tape.
b. DETONATING CORD PRIMING. Shaped charges are primed with
detonating cord by attaching a nonelectric blasting cap to the end of
the detonating cord and following the procedure in A above.
c. DUAL-PRIMING. As shaped charges must be detonated from the center
of the rear of the cone for maximum effectiveness, conventional methods
of dual priming are not applicable to shaped charges.
2-24. Bangalore Torpedo
a. NONELECTRIC PRIMING. The bangalore torpedo may be primed by
assembling alength of time blasting fuse and a nonelectric blasting cap
in a priming adapter and screwing the assembly into the cap well of a
torpedo section (A, fig 2-31). A section may also be primed
nonelectrically by a pull type firing device, with a nonelectric
blasting cap crimped on the base, screwed into the cap well (B, 2-31).
b. ELECTRIC PRIMING. The bangalore torpedo may be primed electrically
by assembling a blasting cap and priming adapter and screwing the
assembly into the cap well of a torpedo section (C, fig 2-31).
CHAPTER 3
CALCULATION AND PLACEMENT OF CHARGES
Section I. INTRODUCTION
3-1. Critical Factors in Charge Calculations
The amount of explosive used in any demolition project is determined by
formula calculations based on the critical factors listed below.
a. TYPE AND STRENGTH OF MATERIAL. A demolition target may be
constructed of timber, steel, concrete or some other material.
Concrete may reinforced with steel thereby increasing its strength.
Formulas for computing specific charges for timber, steel, concrete, and
so on, are given in succeeding sections of this chapter.
b. SIZE AND SHAPE OF TARGET. Consideration must be given to the size
and shape of the target. For example, large targets, such as concreter
piers, and oddly shaped targets, such as steel I-beams, may be more
economically attacked by multiple charges than a single charge.
c. DESIRED DEMOLITION EFFECT. The extent of demolition desired and
other effects, such as direction of falling trees to construct an
abatis, must be considered.
d. TYPE OF EXPLOSIVE. The particular characteristics of each type of
explosive make it applicable to certain demolition projects, in
preference to others. The relative effectiveness of each type of
explosive must be considered in each formula calculation. Explosive
Charges used in military operation and their relative effectiveness
factors are shown in table 1-2.
e. SIZE AND SHAPE OF CHARGE. The amount of explosive is calculated
by each demolition formula, but, in the absence of special placement
techniques, when external charges are used, a flat square charge with a
thickness to width ratio of 1 to 3 or more will give acceptable results.
In general, charges less than 5 pounds should be 1 inch thick (one M112
demolition block; charges 5 pounds to 40 pounds should be 2 inches thick
(one M5A1 demolition block); and charges 40 pounds or more should be 4
inches thick (one M-183 demolition assembly). A more detailed
discussion of charge thickness is found in paragraph 3-2b.
f. CHARGE PLACEMENT.
(1) Charges should be placed at the position that will provide
maximum effectiveness. For cratering, they are place in holes in the
ground; for breaking or collapsing stone or concrete, they are properly
located on the surface or in boreholes; for cutting timber they may be
tied on the outside or placed in boreholes, whichever is the more
practical.
(2) Charges are fastened to the target by wire, adhesive compound,
tape, or string; propped against the target by means of a wooden or
metal frame made of scrap or other available materials; or placed in
boreholes. Special accessories are issued for this purpose--adhesive
compound, the rivet-punching powder-actuated driver, the earth auger,
and pneumatic tools (para 1-58).
g. METHOD OF INITIATION. Generally the method of initiation is not
critical unless the demolition charge is of a special type such as a
shaped charge or diamond charge.
h. TAMPING. The detonation of an explosive produces pressure in all
directions. If the charge is not completely sealed in or confined or if
the material surrounding the explosive is not equally strong on all
sides, the explosive force breaks through the weakest spot and part of
the destructive force is lost. To retain as much of this explosive
force as possible, material is packed around the charge. This material
is called tamping material or tamping, and the process, tamping. On the
other hand, an internal charge (one placed in the target to be
destroyed) is confined by packing material in the borehole on top of the
charge as is done in quarrying and cratering. This is called stemming.
3-2. Principles of Demolition
a. EFFECTS OF DETONATION. When a high explosive detonates, the
explosive changes violently into compressed gas at extremely high
pressure. The rate of change is determined among other things by the
type of explosive and the density, confinement, and dimensions of the
charge. Thus the detonation releases tremendous pressure in the form of
a compressive shock wave which, although it exist for only a few
micro-seconds at any given point, may shatter and displace objects in
its path as it proceeds from its point of origin. This shock wave is
transmitted directly to any substance in contact with the charge, other
characteristics being equal. A high explosive charge detonated in
direct contact with a solid object produces three different easily
detectable destructive effects.
(1) CRATERING. The surface of the object directly under the
explosive charge will be cratered. On a concrete surface the high
pressure of the compressive shock wave crumbles that material in the
immediate vicinity of the charge, forming the crater. On a steel target
an indentation or depression with an are about the size of the contact
area of the charge is made in the surface of the plate.
(2) SPALLING. Providing that the charge is of sufficient size,
the opposite side of the object will be spalled. The strong compressive
shock wave transmitted into the material expands spherically losing
energy as it moves through the material. If the target has a free
surface on the side opposite the charge, the compressive shock wave will
be reflected as a tensile shock wave from that free surface because of
the difference in density between the target and the air. Reflection of
the compressive shock wave as a tensile shock wave causes spalling of
the target free surface, wherein a portion of the material is literally
torn from the free surface. On a concrete wall, depending upon the
relative size of the charge and thickness of the wall, the crater and
spalls meet and form a hole through the wall. On a steel plate, usually
only one spall, approximately the shape of the explosive charge, is
thrown from the plate.
(3) CRACKING. If the explosive charge is of sufficient size the
high pressure gases from the explosive charge will create a pressure
load on the object that will crack and displace the material beyond the
extent of the crater and spall. These cracks will radiate from the
charge position. On concrete walls, this craking may be extensive
enough to break the wall into a large number of chunks which are
projected away from the charge position. On steel plates, the material
may be bent away from the charge position.
b. SIGNIFICANCE OF CHARGE DIMENSIONS. The force of an explosion is
proportional to the quantity and power of the explosive, but the
destructitve effect depends, in part, on the manner that the explosive
force is directed at the target. An optimum relation must exist between
the area of the charge in contact with the target and charge thickness
in order to transmit the greatest shock. If any given wight of
explosive, calculated to cut a given target, is spread too thinly, there
will be insufficient space for the shock wave to attain full velocity
before striking the target. The shock wave will tend to travel more
nearly parallel than normal to the surface over much of the area, and
the volume of the target will be excessive for the strength of the shock
wave. On the other extreme, a thick charge with a small contact area
will transmit the shock wave over too little of the target with
excessive lateral loss of energy. Test results have demonstrated that
the optimum ratio of charge thickness to charge width is about 1:3 for
contact steel cutting charges on structural steel 3 inches or less, and
ranges from about 1:6 to 1:14 for rectangualar external untamped
breaching charges for reinforced concrete from 1 to 7 feet thick.
c. SIGNIFICANCE OF CHARGE PLACEMENT. The destructive effect of an
explosive charge is also dependent upon the contact between the
explosive and the target and the location of the charge in relation to
target size and shape.
(1) For the maximum destructive effect an explosive charge with a
configuration and deimensions optimum for the size and shape of the
target must be detonated in intimate contact with the target. Any
significant air or water gap between the target and the explosive will
not transmit the complete force of the shock wave into the target.
Certain explosives, such as sheet explosive or plastic explosives, are
more desirable for certain targets because they may be cut or molded to
fit odd shaped targets.
(2) Explosive charges are placed to act through the least
dimension of the target whenever possible. In terms of the maximum
destructive effect for the least amount of explosive, internal charges
are the best. The tamping of external charges increases their
destructive effect.
3-3. Types of Charges
a. INTERNAL CHARGES. Internal charges are charges placed in
boreholes in the target. These are confined by tightly packing sand,
wet clay, or other material (stemming) into the opening. This is tamped
and packed against the explosive to fill the hole all the way to the
surface. In drill holes, the explosive (usually dynamite) is tamped as
it is loaded into the hole. Refer to TM 5-332 for details of quarry
practice.
b. EXTERNAL CHARGES. These charges are placed on the surface of the
target. They are tamped by covering them with tightly packed sand, clay
or other dense material. Tamping may be in sandbags or loose. For
maximum effectiveness the thickness of the tamping should at least equal
the breaching radius. Small breaching charges on horizontal surfaces
are sometimes tamped by packing several inches of wet clay or mud around
them. This process is called mudcapping.
3-4. Charge Selection and Calculation
a. CHARGE SELECTION. The selection of the optimum explosive charge
for successful demolition operations is a balance between the important
factors listed above and the practical aspects of the type of target,
the type and amount of explosives available, the amount and type of
material (such as sandbags) and equipment available, the amount of
manpower available, and, probably most important, the time available to
accomplish the mission. Formulas for computing specific charges and
methods of their placement are given below. Formulas based on metric
measurements are given in appendix B.
b. CHARGE CALCULATION. The formulas in this chapter give the weight
of explosive required for a demolition task P in pounds of TNT. If
explosives other than TNT are used, the value of P must be adjusted
according to the strength of these other explosives. The adjusted value
of P corrected weight of explosive required, is computed by dividing the
P value of TNT by the relative effectiveness factor for the explosive
to be used.
c. ROUNDING OFF RULE. When using explosives, NEVER use less than the
calculated amount. Some explosives like plastic explosive (C4) and
sheet explosive (M118 and M186) can be cut to the desired amount, while
with other explosives the ability to size explosives is limited. For
charges calculated by formula, use the following rounding off method:
(1) Claculate the weight of a single charge for TNT using the
selected demolition formula to at least two decimals.
(2) Divide by the relative effectiveness factor, if required.
(3) Round up answer for single charge to next package size.
(4) Multiply answer for single charge by the number of charges to
obtain the total amount of explosive required.
Section II. TIMBER-CUTTING CHARGES
3-5. Size and Placement of Charge
a. TYPE OF EXPLOSIVE USED. For tamped internal charges in boreholes,
dynamite is generally used, as it is the most convenient to place
because of the size of the cartridge and is powerful enough because it
is confined. For untamped concentrated external charges, block
explosive (TNT, Tetrytol, and Composition C4) is used, as it is easily
tied or fastened on its effectiveness in relation to that of TNT
(relative effectiveness factor). For untamped external ring charges,
plastic explosive (Composition C4) or sheet explosive (M118 or M186) is
used, as it is easily fastened to the target and molded around the
target. It is impractical to attempt to cut all kinds of timber with
charges of a size calculated from a single formula. THere is too much
variation in different kinds of timber from locality to locality.
Accordingly, test shots must be made to determine the size of the charge
to cut a specific type of timber. Formulas for the calculation of these
test shots are provided for tamped internal charges, and untamped
external charges. They are as follows:
b. FORMULA FOR TAMPED INTERNAL CHARGES. Tamped internal cutting
charges may be calculated by the following formula:
P = D}/250 or P = .004 D} where,
P = Pounds of TNT required,
D = diameter or least dimension of dressed timber, in inches, and
1/250 = .004 = constant
The amount of explosive required to cut a 15-inch diameter tree,
using tamped internal charges is determined as follows:
P = D}/250 = 225/250 = .9 of 1 pound of TNT
Note. See rounding off rule, paragraph 3-4c.
c. INTERNAL CHARGE PLACEMENT. The charge is placed in a borehole
parallel to the greatest dimension of cross section and tightly tamped
with moist earth. If the charge is too large to be placed in one
borehole, bore two holes side by side in dimensional timber. On round
timber, bore two holes at approximately right angles to each other, but
do not intersect (fig 3-1). Both boreholes are tamped and the charges
are fired simultaneously.
d. FORMULA FOR UNTAMPED EXTERNAL CHARGES. For cutting trees, piles,
posts, beams or other timber members using explosives as an untamped
external charge, the following formula is used:
P = D}/40 or P = .025 D} where,
P = pounds of TNT required,
D = diameter of round timber, or least dimension of dressed
timber, in inches, and
1/40 = .025 = constant.
Adjustment for explosive other than TNT will be made by dividing by the
relative effectiveness factor (table 1-2) that pertains to the
particular explosive being used. The amount of explosive required to
cut a round timber 30 inches in diameter using an untamped external
charge is determined as follows:
P = D}/40
P = (30)}/40 = 900/40 = 22.50 pounds of TNT.
e. CONCENTRATED EXTERNAL CHARGE PLACEMENT. For maximum destructive
effect concentrated charges should be of rectangular configuration, 1 to
2 inches thick and approximately twice as wide as they are high.
Charges are placed as close as possible to the surface of the timber
(fig 3-2). Frequently it is desirable to notch the tree or timber to
hold the explosive in place. If the tree or timber is not round and the
direction of fall is of no concern, the explosive is placed on the
widest face so that the cut will be through the least thickness. The
tree will fall toward the side where the explosive is placed, unless
influenced by lean or wind. Charges on rectangular or square dressed
timber are placed as shown in figure 3-3.
f. RING CHARGE PLACEMENT. The ring charge (fig 3-4) is placed as a
band of explosive completely circling the tree. The width of the
explosive band should be as wide as possible, and a minimum of 1/2 inch
thick for small diameter trees, and 1 inch thick for medium- and large-
diameter trees up to 30 inches. This technique is used when the
direction of fall is not important and the elimination of stumps is
important, e.g., explosive clearing for a helicopter landing zone. The
amount of explosive is calculated by the external charge formula.
3-6. Abatis
a. FORMULA FOR PARTIALLY CUTTING TREES TO CREATE AN OBSTACLE OR
ABATIS. When cutting trees and leaving them attached to the stumps to
create an obstacle, the formula P = D}/ro or P = .02D} is used to
compute the amount of TNT required for the test shot. The result of the
test shot will determine the need for increasing or decreasing the
amount of explosives required for subsequent shots.
b. PLACEMENT OF ABATIS CHARGE. Charges for making fallen-tree
obstacles are placed as a concentrated external charge the same as in
paragraph 3-5c, except that they are placed approximately 5 feet above
ground level. The tree will fall toward the side where the explosive is
placed, unless influenced by lean or wind. To make the direction of
fall more certain, a "kicker charge", a one pound block of explosive,
placed about two-thirds of the distance up the tree on the opposite side
may be used (fig 3-2).
c. SPECIAL CONSIDERATIONS. To be effective these obstacles should be
at least 75 meters in depth and the felled trees should extend at a 45
degree angle toward the enemy. The trees on one side of the road should
not be cut simultaneously, followed by the cutting of the trees on the
other side of the road. Delayed blasting of the second row of trees is
necessary to provide time for the trees in the first row to fall and
thereby eliminate the possibility of trees deflecting one another from
their desired direction of fall. Likewise, in selection of trees to
blast for abatis obstacles, the trees in a row should be selected
spacing great enough to allow the trees to fall without interference
from other falling trees in the same row. To make the obstacles more
difficult to remove, they should be mined, boobytrapped, entangled with
barbed wire or concertina, and covered by fire.
=============================================================================
/ File 8 / NIA068 /
/ Comments From The Editors /
/ Guardian Of Time & Judge Dredd /
Hello, with HoHoCon (XmasCon) '90 around the corner we hope to meet most
of you all there.
Some of our requests for subscriptions have been lost due to system failure.
If you did not get this issue of NIA through the Internet and did send us mail
to be on the list please re-do so. Also, if you wish to subscribe to NIA
through the Internet (or most any WAN) leave mail at elisem@nuchat.sccsi.com,
thanks.
We are currently looking for submissions, if you do have a piece that you
would like to see printed in upcoming NIA issues, mail us at Face2Face or
elisem@nuchcat.sccsi.com
You might have noticed the TIME-TRIP portion of the file, that we will do
occasionally to bring back memories...
Any back issues can be picked up from the CuD ftp site or from Face2Face
BBS. If these two ways are NOT possible, then write to us.
Look for the new Phrack soon, from our insight on the pieces in it, it looks
like a gem.
To get your name off the Lotus marketplace database, call 1.800.343.5414,
when you hear the voice mail, press 3, then press 2. Wait till the person
answers and give your name and address.
EFF newsletter one came out and it is pretty good, take a look at it.
If you have any questions or comments, please make them, and send in feedback
on this new format of NIA. Thank You.
Issues of NIA can be gotten off of Face2Face (Refer: 713.242.6853),
CuD ftp archives (Refer: CuD 2.15) or Unholy Temple (Refer: 408.PRI.VATE),
and other boards around the country.
From GOT "Get to know yourself, if you can't, call the FBI!"
Oh, and just remember: "No matter how *good* looking she is
someone
somewhere
is sick of her shit."
GOT & JD
NIA. Ignorance, There's No Excuse.
=============================================================================
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+