7051 lines
336 KiB
Plaintext
7051 lines
336 KiB
Plaintext
|
|
||
|
Founded By: | _ _______
|
||
|
Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? are
|
||
|
Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
|
||
|
------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
|
||
|
\ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
|
||
|
+---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
|
||
|
| 15TUE91 | ___ ______ ___ ___ ___ FidoNet, et al.?
|
||
|
| File 69 | ___ _____ ___ ___ ___ If so please drop us a
|
||
|
+---------+ ____ _ __ ___ line at
|
||
|
"smells like fish ___ _ ___ elisem@nuchat.sccsi.com
|
||
|
tastes like chicken" __
|
||
|
_ Network Information Access
|
||
|
Other World BBS Ignorance, There's No Excuse.
|
||
|
|
||
|
NIA Issue 69 Volume 2
|
||
|
|
||
|
|
||
|
Welcome to NIA069. Due to the vast amount of information we recieved
|
||
|
you can expect to see NIA070 very soon after this release date.
|
||
|
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
Table_Of_Contents
|
||
|
|
||
|
1. The Future of the Internet................................Jane M. Fraser
|
||
|
2. Tekno DCS HELP [02]..........................................Judge Dredd
|
||
|
3 Computer Security Techniques [04].......................Guardian Of Time
|
||
|
4. Kermit Manual [01].......................................Malefactor [OC]
|
||
|
5. Department Of The Army Field Manual [02]....................Death Jester
|
||
|
6. World News Sept 1990-Jan 1991...................Face 2 Face Publications
|
||
|
7. Comments From Editors...........................................JD & GOT
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 01 / NIA069 /
|
||
|
/ The Future of the Internet /
|
||
|
/ Jane M. Fraser /
|
||
|
/ /
|
||
|
|
||
|
|
||
|
The Internet is network of computer networks used primarily by
|
||
|
educational and research establishments. The parts of the Internet
|
||
|
that have been funded by federal resources (for example, NSFNET) may
|
||
|
be used only for activities that support education and research.
|
||
|
Other parts have not been so funded, and usage is not restricted.
|
||
|
Various proposals have been made to extend the Internet to more
|
||
|
institutions, to allow commercial use on all parts of the Internet,
|
||
|
and to increase the bandwidth of the federally supported part of the
|
||
|
network.
|
||
|
|
||
|
On November 29 through December 1, I was one of approximately 150
|
||
|
attendees at a conference addressing various issues about the future
|
||
|
of the Internet. I have always felt very confused about what is the
|
||
|
Internet, what are the restrictions on usage, what different parts of
|
||
|
the network are doing, and what options are open for the future. I
|
||
|
learned one fact for certain at this conference: almost everyone else
|
||
|
is confused also.
|
||
|
|
||
|
I will report on some of the specifics of what happened at the
|
||
|
conference, putting emphasis on aspects I think will be of most
|
||
|
interest to the readers of the Calendar, but I am also confident that,
|
||
|
no matter how careful I am, this report will contain errors.
|
||
|
|
||
|
The conference, Information Infrastructure for the 1990s, was
|
||
|
sponsored by two programs at the John F. Kennedy School of Government
|
||
|
at Harvard University: Science, Technology and Public Policy and
|
||
|
Strategic Computing and Telecommunications in the Public Sector. The
|
||
|
two primary organizers were Lewis Branscomb and Jerry Mechling. The
|
||
|
two-and-a-half days were heavily packed with presentations of
|
||
|
commissioned papers, comments by panels of discussants, and open
|
||
|
discussion from the floor.
|
||
|
|
||
|
The main points the conference reinforced for me are, first, the
|
||
|
growing importance of computer networks for fast communication and,
|
||
|
second, the growing importance, for many users, of interconnectivity
|
||
|
of networks. The first needs little comment. The second may be of
|
||
|
importance more to some sectors, especially academics, than to others.
|
||
|
Academics and researchers often want to communicate with a wide range
|
||
|
of people and, thus, want to be able to send electronic mail to people
|
||
|
on many different networks. Some companies may want their employees to
|
||
|
communicate only within the company, not with those outside it, but
|
||
|
others find interorganizational communication to be very important.
|
||
|
Some networks already interconnect (although not completely), for
|
||
|
example, AT&T Mail, CompuServe, and the Internet. Others are
|
||
|
isolated, for example, Prodigy. Many barriers, institutional and
|
||
|
technical, make it difficult to interconnect networks, but, I believe,
|
||
|
there will be increasing demand from users to do so.
|
||
|
|
||
|
At the federal level, a proposal has been put forth for federal
|
||
|
funding of NREN, the National Research and Education Network, which
|
||
|
would, roughly, be an extremely high bandwidth version of the
|
||
|
Internet. (The latter sentence is undoubtedly not error free.) Most
|
||
|
uses of supercomputers, almost by definition, require and generate
|
||
|
huge amounts of data. For example, at the conference, we viewed a
|
||
|
short tape of a simulation of the formation of a thundercloud. Remote
|
||
|
access to supercomputers has always been cited as a justification for
|
||
|
investing federal money in the Internet, and this again is one of the
|
||
|
major reasons cited for the need for NREN. Indeed, the ability to
|
||
|
create and manage a network at the data speeds being contemplated is
|
||
|
itself viewed as a research issue.
|
||
|
|
||
|
However, other participants argued that "low-end" use, that is, use
|
||
|
not requiring high bandwidth, is also an appropriate topic for
|
||
|
research. As the network expands and usage grows (which is happening
|
||
|
at an amazing rate), questions arise about the ability of existing
|
||
|
mechanisms to handle traffic. These participants argued that the
|
||
|
networking of the large numbers of computers on the Internet (and its
|
||
|
affiliates) is also worthy of attention, even without the addition of
|
||
|
more bandwidth. This discussion of the importance of low-end use was
|
||
|
naturally related to issues of allowing more general access to the
|
||
|
Internet, for example, for K through 12 educational institutions.
|
||
|
|
||
|
Currently, most academic users of the Internet receive access through
|
||
|
their institution's connection. While the institution itself bears
|
||
|
considerable cost, most academic end users do not receive a bill for
|
||
|
usage. Internet connectivity to researchers is viewed by many
|
||
|
academic institutions as being analogous to the library (for which
|
||
|
usage fees are generally not charged to the end user or to the end
|
||
|
user's academic unit), rather than analogous to the phone (for which
|
||
|
such usage fees are charged). The user (or the academic unit) usually
|
||
|
must provide a terminal or personal computer. Here at OSU, the
|
||
|
computer magnus provides Internet access for anyone who requests it.
|
||
|
(Actually, this is not quite accurate; magnus accounts will shortly be
|
||
|
available to all OSU users.) One paper, "Pricing the NREN: The
|
||
|
Efficient Subsidy," by Gerald Faulhaber, presented an economist's
|
||
|
arguments against current pricing and subsidization schemes.
|
||
|
|
||
|
Several commercial enterprises have been created (for example, PSI) to
|
||
|
provide Internet access for commercial enterprises. Recall that
|
||
|
commercial use is allowed as long as the use is in support of research
|
||
|
and education. For example, a researcher at a commercial enterprise
|
||
|
can communicate with researchers at academic institutions on research
|
||
|
topics. A company can also communicate with researchers about its
|
||
|
products. Two commercial users on different commercial networks must
|
||
|
be very careful, however, since their communication with each other
|
||
|
might traverse parts of the network on which commercial traffic is
|
||
|
forbidden. However, it is often difficult for the user to predict what
|
||
|
route a message will take. If all this seems arcane and unclear, it
|
||
|
is. Many people (including Alison Brown of the Ohio Supercomputer
|
||
|
Center) are working to make these aspects less arcane and more clear.
|
||
|
One paper, "The Strategic Future of the Mid-Level Networks," by
|
||
|
Paulette Mandelbaum and Richard Mandelbaum, explored various possible
|
||
|
models for relationships between commercial and educational
|
||
|
enterprises on the Internet.
|
||
|
|
||
|
A portion of the conference had an Ohio focus. Jerry Mechling visited
|
||
|
Ohio this summer and interviewed many people in order to write a case
|
||
|
paper, which was presented and discussed at the conference, An
|
||
|
Information Infrastructure Strategy for Ohio. Partly because of this,
|
||
|
we had a fairly sizeable Ohio contingent at the conference: Gerald
|
||
|
Anglin (Litel), Alison Brown (Ohio Supercomputer Center), Sally
|
||
|
Cousino (Ohio Bell), Nick Farmer (Chemical Abstracts), myself (CAST),
|
||
|
Jerry Hammett (State of Ohio), Don Olvey (OCLC), Tim Steiner (State of
|
||
|
Ohio), and Ron Vidmar (State of Ohio). I found one of the most
|
||
|
successful parts of the conference to be our caucuses, both before and
|
||
|
after the conference.
|
||
|
|
||
|
Other papers presented at the conference included "Information
|
||
|
Infrastructure for the 1990s: A Public Policy Perspective," by Lewis
|
||
|
Branscomb; "Technology Issues in the Design of the NREN," by Leonard
|
||
|
Kleinrock; "Life after Internet: Making Room for New Applications," by
|
||
|
Larry Smarr and Charles Catlett; "A Coming of Age: Design Issues in
|
||
|
the Low-end Internet," by Ken Klingenstein; and "The NREN as
|
||
|
Information Market: Dynamics of Public, Private, and Voluntary
|
||
|
Publishing," by Brian Kahin. Copies of all the papers are available
|
||
|
for loan from the CAST office.
|
||
|
|
||
|
There were also smaller sessions involving presentations on current
|
||
|
uses of the Internet. One presentation was by Allan Weis, from
|
||
|
Advanced Network and Services, Inc., ANS, a "nonprofit organization
|
||
|
dedicated to the advancement of education and research." ANS is funded
|
||
|
by IBM and MCI to help build computer networks.
|
||
|
As with all conferences, some of the most important discussions went
|
||
|
on in the hallways and at meals and some of the most important results
|
||
|
were the contacts made. Despite my dismay at finding myself at a
|
||
|
conference with presenters who were all white males (including one who
|
||
|
addressed the group as "gentlemen"), I think the conference was
|
||
|
excellently organized and run. I applaud the organizers for focussing
|
||
|
us on such an important issue: information infrastructure for the
|
||
|
1990s.
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 02 / NIA068 /
|
||
|
/ Tekno DCS Help /
|
||
|
/ Part 2 of 2 /
|
||
|
/ Judge Dredd /
|
||
|
/ /
|
||
|
|
||
|
|
||
|
This is the 2nd part of the DCS help. Enjoy.
|
||
|
|
||
|
help accounting
|
||
|
|
||
|
Resource Accounting provides a transaction file of system usage information
|
||
|
for both the user and the system. The collected data allows you to bill
|
||
|
individual users for resources used and to measure overall system usage.
|
||
|
To tailor the accounting information and format it to your application, you can
|
||
|
write a report program. This program accesses the transaction file, reads the
|
||
|
required data fields, and writes a report for you.
|
||
|
|
||
|
For more information, type:
|
||
|
|
||
|
HELP ACCOUNTING START Starting Resource Accounting
|
||
|
HELP ACCOUNTING STOP Stopping Resource Accounting
|
||
|
HELP ACCOUNTING SET Changing accounting parameters
|
||
|
HELP ACCOUNTING SHOW Displaying accounting information
|
||
|
|
||
|
See the RSX-11M-PLUS and Micro/RSX System Management Guide for more
|
||
|
information.
|
||
|
|
||
|
help ascii
|
||
|
|
||
|
Octal Values for the ASCII Character Set -- ASCII is a code used to
|
||
|
translate letters, numbers, and symbols that people can understand into
|
||
|
a code which the computer can use. Most RSX-11M-PLUS and Micro/RSX functions
|
||
|
requiring numerical values for characters use octal ASCII.
|
||
|
|
||
|
000 NUL 020 DLE 040 SP 060 0 100 @ 120 P 140 ` 160 p
|
||
|
|
||
|
001 SOH 021 DC1 041 ! 061 1 101 A 121 Q 141 a 161 q
|
||
|
|
||
|
002 STX 022 DC2 042 " 062 2 102 B 122 R 142 b 162 r
|
||
|
|
||
|
003 ETX 023 DC3 043 # 063 3 103 C 123 S 143 c 163 s
|
||
|
|
||
|
004 EOT 024 DC4 044 $ 064 4 104 D 124 T 144 d 164 t
|
||
|
|
||
|
005 ENQ 025 NAK 045 % 065 5 105 E 125 U 145 e 165 u
|
||
|
|
||
|
006 ACK 026 SYN 046 & 066 6 106 F 126 V 146 f 166 v
|
||
|
|
||
|
007 BEL 027 ETB 047 ' 067 7 107 G 127 W 147 g 167 w
|
||
|
010 BS 030 CAN 050 ( 070 8 110 H 130 X 150 h 170 x
|
||
|
|
||
|
011 HT 031 EM 051 ) 071 9 111 I 131 Y 151 i 171 y
|
||
|
|
||
|
012 LF 032 SUB 052 * 072 : 112 J 132 Z 152 j 172 z
|
||
|
|
||
|
013 VT 033 ESC 053 + 073 ; 113 K 133 [ 153 k 173 {
|
||
|
|
||
|
014 FF 034 FS 054 , 074 < 114 L 134 \ 154 l 174 |
|
||
|
|
||
|
015 CR 035 GS 055 - 075 = 115 M 135 ] 155 m 175 }
|
||
|
|
||
|
016 SO 036 RS 056 . 076 > 116 N 136 ? 156 n 176 ~
|
||
|
|
||
|
017 SI 037 US 057 / 077 ? 117 O 137 _ 157 o 177 DEL
|
||
|
|
||
|
See also HELP ASCII DECIMAL for the decimal values required by EDT and
|
||
|
HELP ASCII HEXADECIMAL for hexadecimal values.
|
||
|
|
||
|
help bad
|
||
|
|
||
|
The Bad Block Locator Utility (BAD) tests disks and DECtapes for
|
||
|
the location and number of bad blocks. BAD then records this bad
|
||
|
block information on the volume. Then you use the Monitor
|
||
|
Console Routine (MCR) command INI, which allocates the bad
|
||
|
blocks to the bad block file [0,0]BADBLK.SYS. The bad blocks are
|
||
|
marked as in-use and therefore cannot be allocated to other
|
||
|
files.
|
||
|
|
||
|
You can use BAD in its task version, which runs at the same time
|
||
|
as other tasks, or in its standalone version included in
|
||
|
[6,54]BRUSYS.SYS, which runs by itself on the computer. The
|
||
|
standalone version is required if you have a system with a single
|
||
|
disk drive.
|
||
|
|
||
|
The command line for BAD is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
ddnn:[/switch[...]]
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
ddnn
|
||
|
Specifies a physical device.
|
||
|
|
||
|
switch
|
||
|
Specifies an optional switch that qualifies the BAD command line. Multiple
|
||
|
BAD switches for a device must be specified on one line. If you do not
|
||
|
specify any switch, BAD begins its pattern checking of individual blocks.
|
||
|
|
||
|
For more information on BAD switches, type HELP BAD SWITCHES.
|
||
|
|
||
|
|
||
|
help basic
|
||
|
|
||
|
PDP-11 BASIC-PLUS-2 is a layered product supported on RSX-11M/M-PLUS
|
||
|
systems. To invoke BASIC-PLUS-2, type the BP2 command: >BP2.
|
||
|
|
||
|
BASIC-PLUS-2 may be installed under a name other than BP2. In this
|
||
|
case, type the three-character name assigned by your system manager.
|
||
|
|
||
|
HELP is available on BASIC-PLUS-2 concepts, statements, functions, and
|
||
|
commands. You can get HELP both at the MCR command level and
|
||
|
within the BASIC environment. For BASIC-PLUS-2 V2.0, HELP topics
|
||
|
available at the MCR command level are:
|
||
|
|
||
|
ARRAYS CONSTANTS DIRECTIVES LABELS QUALIFIERS
|
||
|
CHARACTER CONVENTIONS EXPRESSIONS LINE STATEMENTS
|
||
|
COMMANDS DATA_TYPES HELP MODIFIERS VARIABLES
|
||
|
COMMENTS DEBUGGER IMMEDIATE
|
||
|
|
||
|
HELP on these topics, plus associated subtopics, also is available
|
||
|
within the BASIC environment.
|
||
|
|
||
|
To access HELP text from the MCR command level, type: >HELP/BP2 topic.
|
||
|
To access HELP files within the BASIC environment, first invoke BASIC
|
||
|
with the BP2 command and then type HELP in response to the
|
||
|
BASIC-PLUS-2 prompt.
|
||
|
|
||
|
help bck
|
||
|
|
||
|
RMSBCK copies standard RMS-11 files from one medium to another
|
||
|
(disk-to-disk or disk-to-tape), translating the data into a
|
||
|
special backup format. The backup copy contains the source
|
||
|
file's attributes (with the exception of file placement).
|
||
|
|
||
|
Backup files can be accessed properly only by the RMSRST utility
|
||
|
(type HELP RST for more information). User programs cannot
|
||
|
change backup data.
|
||
|
|
||
|
RMSBCK can use magnetic tapes with ANSI-standard labels only.
|
||
|
However, the backup data written by the utility between the
|
||
|
labels may not comply with ANSI standards.
|
||
|
|
||
|
To invoke installed RMSBCK:
|
||
|
|
||
|
BCK [command-string]
|
||
|
|
||
|
To invoke uninstalled RMSBCK:
|
||
|
|
||
|
RUN $RMSBCK
|
||
|
|
||
|
Type HELP BCK COMMAND for an explanation of RMSBCK's command line.
|
||
|
Type HELP BCK SWITCHES for an explanation of RMSBCK's switches.
|
||
|
|
||
|
See the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
help bru
|
||
|
|
||
|
The Backup and Restore Utility (BRU) allows you to back up and restore
|
||
|
Files-11 volumes. You can use BRU to transfer files from a volume to a
|
||
|
backup volume (or volumes) to ensure that a copy is available in case
|
||
|
the original files are destroyed. If the original files are destroyed,
|
||
|
or if for any other reason the copy needs to be retrieved, you can
|
||
|
restore the backup files with BRU. In the process of copying, BRU also
|
||
|
reorganizes and compresses files for efficient storage and access.
|
||
|
|
||
|
You can use BRU stand alone as well as on line. BRUSYS is the
|
||
|
standalone version.
|
||
|
|
||
|
BRU can also be invoked through the DIGITAL Command Language (DCL)
|
||
|
command BACKUP.
|
||
|
|
||
|
The command line for BRU is shown next.
|
||
|
Format
|
||
|
|
||
|
/qualifier[...] indevice[,...][filespec[,...]] outdevice[,...]
|
||
|
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
qualifier
|
||
|
Specifies any of the command qualifiers. If two or more qualifiers are
|
||
|
specified, they must be contiguous, that is, separated with a slash only.
|
||
|
|
||
|
You can use a shorter form of a qualifier as long as it is unique.
|
||
|
All BRU
|
||
|
qualifiers are unique to three characters.
|
||
|
|
||
|
indevice
|
||
|
Specifies the input device you want to transfer files from. In a backup
|
||
|
operation, the input device contains the files you want to safeguard. In
|
||
|
a restore operation, the input device contains the backup set you are
|
||
|
restoring.
|
||
|
|
||
|
Devices are specified in the following form:
|
||
|
|
||
|
ddnn:
|
||
|
|
||
|
filespec
|
||
|
Specifies the file specification used to select particular files or
|
||
|
categories of files to back up or restore. A file specification takes the
|
||
|
following form:
|
||
|
|
||
|
[directory]filename.type;version
|
||
|
|
||
|
outdevice
|
||
|
Specifies the output device you want to transfer the files to. In a
|
||
|
backup operation, the output device contains the backup set you want to
|
||
|
create. In a restore operation, the output device is the disk that
|
||
|
receives the files you are restoring.
|
||
|
|
||
|
The format of outdevice is the same as for indevice (described
|
||
|
previously). A file specification may not be placed after the output
|
||
|
device.
|
||
|
|
||
|
Type HELP BRU STANDALONE for more information on standalone BRU.
|
||
|
|
||
|
Type HELP BRU QUALIFIERS for a list of the qualifiers for BRU.
|
||
|
|
||
|
Type HELP BRU EXAMPLES for examples of BRU operations.
|
||
|
|
||
|
|
||
|
help cda
|
||
|
|
||
|
CDA helps you determine the cause of system crashes by analyzing and
|
||
|
formatting a memory dump created by the Executive Crash Dump Module.
|
||
|
You can use switches to select the information that CDA formats and
|
||
|
lists.
|
||
|
The general form of the command line is:
|
||
|
|
||
|
>CDA [listfile/sw],[binaryfile/sw]=[symbolfile/STB],crash-input[/sw]
|
||
|
|
||
|
listfile the human-readable CDA output listing
|
||
|
|
||
|
binaryfile a copy of the binary data the crash dump module writes
|
||
|
on the crash dump device
|
||
|
|
||
|
symbolfile the symbol definition file (RSX11M.STB) for the crashed system
|
||
|
|
||
|
crash-input the source of the binary input to CDA; you specify the
|
||
|
crash dump device or a binary file created by CDA
|
||
|
in a previous analysis
|
||
|
|
||
|
For more CDA information, type:
|
||
|
|
||
|
HELP CDA LIST (for the list file switches)
|
||
|
HELP CDA BINARY (for the binary file switch)
|
||
|
HELP CDA ANALYSIS (for the crash-input file switches)
|
||
|
|
||
|
See the RSX-11M/M-PLUS Crash Dump Analyzer Reference Manual for more
|
||
|
information.
|
||
|
|
||
|
help cmp
|
||
|
|
||
|
The File Compare Utility (CMP) compares two ASCII text files. The files are
|
||
|
compared line by line to determine whether parallel records are identical.
|
||
|
|
||
|
The command line for CMP is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
[outfile[/switch[...]]=] infile1,infile2
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
outfile
|
||
|
Specifies the file specification for the output file. The format for
|
||
|
entering file specifications is as follows:
|
||
|
|
||
|
ddnn:[directory]filename.type;version
|
||
|
|
||
|
switch
|
||
|
Specifies switches that you apply to the output file specification.
|
||
|
Some of the switches can be negated and some are mutually exclusive.
|
||
|
|
||
|
infile1
|
||
|
Specifies the file specification for the input file to be compared to
|
||
|
infile2. The file name of this file must be specified. The default file
|
||
|
type is MAC.
|
||
|
|
||
|
infile2
|
||
|
Specifies the file specification for the input file to be compared to
|
||
|
infile1. You do not need a complete file specification. The specifications
|
||
|
for infile1 are used as defaults for any unspecified portions of in file2.
|
||
|
|
||
|
Type HELP CMP SWITCHES for descriptions of the CMP switches.
|
||
|
|
||
|
|
||
|
help cnv
|
||
|
|
||
|
RMSCNV reads records from an RMS-11 file of any type and converts
|
||
|
them into another RMS-11 file of any type. RMSCNV uses standard
|
||
|
RMS-11 file access methods. For initial indexed file loading,
|
||
|
use RMSIFL (type HELP IFL).
|
||
|
|
||
|
To invoke installed RMSCNV:
|
||
|
|
||
|
CNV [command-string]
|
||
|
To invoke uninstalled RMSCNV:
|
||
|
|
||
|
RUN $RMSCNV
|
||
|
|
||
|
Type HELP CNV COMMAND for an explanation of RMSCNV's command line.
|
||
|
Type HELP CNV SWITCHES for an explanation of RMSCNV's switches.
|
||
|
|
||
|
See the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
help cobol
|
||
|
|
||
|
COBOL[/qualifier[,s] filespec
|
||
|
|
||
|
The default extension on filespec is .CBL.
|
||
|
|
||
|
Command Qualifiers:
|
||
|
|
||
|
/[NO]ANSI_FORMAT /[NO]LIST[:filespec]
|
||
|
/[NO]CHECK[:arg] /[NO]NAMES:xx
|
||
|
ALL /[NO]OBJECT:filespec
|
||
|
[NO]BOUNDS /[NO]OVERLAY_DESCRIPTION
|
||
|
NONE /[NO]SHOW:[NO]MAP
|
||
|
[NO]PERFORM /[NO]SKELETON
|
||
|
/CODE:[NO]CIS /[NO]SUBPROGRAM
|
||
|
/[NO]CROSS_REFERENCE /TEMPORARY:device
|
||
|
/[NO]DEBUG /[NO]TRUNCATE
|
||
|
/[NO]DIAGNOSTICS[:filespec] /[NO]WARNINGS:[NO]INFORMATIONAL
|
||
|
|
||
|
|
||
|
The COBOL command invokes the COBOL-81 compiler if it is installed in
|
||
|
your system. See your system manager to determine if the COBOL-81
|
||
|
compiler is installed.
|
||
|
|
||
|
For additional information on a qualifier, type HELP COBOL qualifier.
|
||
|
COBOL can also be used to invoke PDP-11 COBOL (COBOL/C11). For more
|
||
|
help on COBOL/C11, type HELP COBOL C11.
|
||
|
|
||
|
|
||
|
help configure
|
||
|
|
||
|
Reconfiguration is the process of physically and logically connecting and
|
||
|
disconnecting various system resources. By reconfiguring your system, you can
|
||
|
define a set of hardware resources that are accessible from the online
|
||
|
system.
|
||
|
|
||
|
The reconfiguration services consist of three components: a command
|
||
|
interface (CON), a loadable driver (RD:), and a privileged reconfiguration task
|
||
|
(HRC). You must have enough space in memory to contain both CON and HRC at the
|
||
|
same time; otherwise, CON commands fail.
|
||
|
|
||
|
To use the reconfiguration services, invoke the command interface by typing
|
||
|
CON. Then, enter CON commands at the CON> prompt.
|
||
|
|
||
|
Additional help is available on the following commands:
|
||
|
|
||
|
BUILD CLEAR DISPLAY ESTATUS
|
||
|
HELP IDENT LINK LIST
|
||
|
OFFLINE OFFLINE_MEMORY ONLINE ONLINE_MEMORY
|
||
|
SET SWITCH UNLINK
|
||
|
|
||
|
To display information about a command, type HELP CONFIGURE commandname.
|
||
|
|
||
|
help coral
|
||
|
|
||
|
CORAL
|
||
|
The CORAL command invokes the PDP-11 CORAL 66 Compiler.
|
||
|
|
||
|
The general form of the CORAL command is:
|
||
|
|
||
|
COR[AL] [object],[listing]=source1[,source2...][/qualifiers]
|
||
|
|
||
|
where object, listing, source1, source2 ... are standard file specifications.
|
||
|
|
||
|
Qualifiers are not position-sensitive; they may be placed after any file
|
||
|
specification in the command line.
|
||
|
|
||
|
Qualifiers:
|
||
|
|
||
|
/BC /CR /IE /IS /LI /NL /OP /OS
|
||
|
|
||
|
/PI /PS /RO /SP /TE /TR /WI
|
||
|
|
||
|
For information on a particular qualifier, type HELP CORAL qualifier.
|
||
|
|
||
|
help cot
|
||
|
|
||
|
The console output task (COT..) communicates with the Console Logger.
|
||
|
The following is a list of the privileged commands you can use:
|
||
|
|
||
|
SET /COLOG (nonprivileged) Displays Console Logging status
|
||
|
SET /COLOG=ON Starts Console Logging
|
||
|
SET /COLOG=OFF Stops Console Logging
|
||
|
SET /COLOG/COTERM=TTnn: Reassigns the console terminal
|
||
|
SET /COLOG/COTERM Enables the console terminal
|
||
|
SET /COLOG/NOCOTERM Disables the console terminal
|
||
|
SET /COLOG/LOGFILE=filename Reassigns the console log file
|
||
|
SET /COLOG/LOGFILE= Opens a new version of the current log
|
||
|
file
|
||
|
SET /COLOG/LOGFILE Opens a new version of the file
|
||
|
LB:[1,4]CONSOLE.LOG
|
||
|
SET /COLOG/NOLOGFILE Disables the console log file
|
||
|
|
||
|
The /COTERM, /NOCOTERM, /LOGFILE, and /NOLOGFILE options can be
|
||
|
specified with each other, with SET /COLOG, or with SET /COLOG=ON.
|
||
|
|
||
|
See the RSX-11M-PLUS and Micro/RSX System Management Guide for
|
||
|
more information on the Console Logger and the COT... task.
|
||
|
|
||
|
|
||
|
help def
|
||
|
|
||
|
The DEFINE LOGICALS (DFL) command assigns, deletes, and displays
|
||
|
logical name assignments. Logical names can be assigned to devices,
|
||
|
all or part of a file specification, and to other logical names.
|
||
|
|
||
|
Formats:
|
||
|
DFL = ! Deletes all local logical assignments
|
||
|
DFL ens=lns[/keyword(s)] ! Creates logical name assignments
|
||
|
DFL =[lns][/keyword] ! Deletes logical name assignments
|
||
|
DFL [/keyword(s)] ! Displays logical name assignments
|
||
|
|
||
|
Keywords (privileged options):
|
||
|
/ALL /GR
|
||
|
/TERM /GBL or /SYSTEM
|
||
|
/LOGIN /FINAL
|
||
|
For more information on the keywords, type: HELP DFL keyword
|
||
|
For help on the DFL command formats, type: HELP DFL CREATE
|
||
|
HELP DFL DISPLAY
|
||
|
HELP DFL DELETE
|
||
|
|
||
|
help des
|
||
|
|
||
|
RMSDES is an interactive utility that allows you to design and
|
||
|
create RMS-11 sequential, relative, and indexed files. To design
|
||
|
a file, you specify the file's attributes: 1) interactively, by
|
||
|
using the RMSDES SET command, or 2) from an existing, external
|
||
|
file, by using the RMSDES GET command, or 3) by using an indirect
|
||
|
command file to execute RMSDES commands.
|
||
|
|
||
|
DES Invokes installed RMSDES for an
|
||
|
interactive session
|
||
|
|
||
|
DES filename[.ext] [type] Invokes RMSDES and creates a file
|
||
|
from an existing file
|
||
|
|
||
|
DES @filename[.CMD] Invokes RMSDES by using an indirect
|
||
|
command file
|
||
|
|
||
|
RUN $RMSDES Invokes uninstalled RMSDES
|
||
|
|
||
|
After you have invoked RMSDES, you can type HELP or ? to
|
||
|
obtain additional information.
|
||
|
|
||
|
See also the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
help dsp
|
||
|
|
||
|
RMSDSP displays a concise description of any RMS-11 file, including
|
||
|
container files, that is, RMS-11 files that were backed up to an ANSI-
|
||
|
labeled magtape using RMSBCK (type HELP BCK for more information).
|
||
|
|
||
|
To invoke installed RMSDSP:
|
||
|
|
||
|
DSP [command-string]
|
||
|
|
||
|
To invoke uninstalled RMSDSP:
|
||
|
|
||
|
RUN $RMSDSP
|
||
|
|
||
|
Type HELP DSP COMMAND for an explanation of RMSDSP's command line.
|
||
|
Type HELP DSP SWITCHES for an explanation of RMSDSP's switches.
|
||
|
|
||
|
See the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
help dsc
|
||
|
|
||
|
The Disk Save and Compress Utility (DSC) copies a Files-11 disk either to
|
||
|
disk or to tape and from DSC-created tape back onto disk. At the same time,
|
||
|
DSC reallocates and consolidates the disk data storage area: it concatenates
|
||
|
files and their extensions into contiguous blocks whenever possible and,
|
||
|
therefore, reduces the number of retrieval pointers and file headers required
|
||
|
for the same files on the new volume.
|
||
|
|
||
|
DSC copies files that are randomly scattered over a disk volume to a new
|
||
|
volume, without the intervening spaces. This eliminates unused space between
|
||
|
files and reduces the time required to access them.
|
||
|
|
||
|
The command line for DSC is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
outdev[,...][filelabel1][/switch[...]]=indev[,...][filelabel2][/swit
|
||
|
ch[...]]
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
outdev
|
||
|
Specifies the physical volume or volumes to which data is copied. The
|
||
|
format for outdev is as follows:
|
||
|
|
||
|
ddnn:
|
||
|
|
||
|
filelabel1
|
||
|
Identifies the output disk's Volume ID, the tape file, or the tape set
|
||
|
that DSC creates in a data transfer.
|
||
|
|
||
|
switch
|
||
|
Specifies one or more of the optional DSC switches.
|
||
|
|
||
|
indev
|
||
|
Specifies the physical volume or volumes, in the same format as outdev,
|
||
|
from which data is copied.
|
||
|
|
||
|
filelabel2
|
||
|
Identifies the DSC-created tape file that is being transferred to disk or
|
||
|
is being compared.
|
||
|
|
||
|
|
||
|
For a list of the DSC switches, type HELP DSC SWITCHES.
|
||
|
|
||
|
help dmp
|
||
|
|
||
|
The File Dump Utility (DMP) enables the user to examine the contents of a
|
||
|
specific file or volume of files. The output may be formatted in ASCII,
|
||
|
octal, decimal, hexadecimal, or Radix-50 form and dumped to any suitable
|
||
|
output device such as a line printer, terminal, magnetic tape, DECtape,
|
||
|
or disk.
|
||
|
|
||
|
You can dump the header and/or virtual blocks of a file, portions of blocks,
|
||
|
or the virtual records of a file.
|
||
|
|
||
|
DMP operates in two basic modes: file mode and device mode. File mode is
|
||
|
used to dump virtual records or virtual blocks, and device mode is used
|
||
|
to dump logical blocks (the /BL switch is a required parameter in device m
|
||
|
ode).
|
||
|
|
||
|
The command line for DMP is shown next.
|
||
|
|
||
|
Format
|
||
|
[outfile][/switch[...]][=inspec][/switch[...]]
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
outfile
|
||
|
Specifies the output file. The format for entering file specifications is
|
||
|
as follows:
|
||
|
|
||
|
ddnn:[directory]filename.type;version
|
||
|
|
||
|
switch
|
||
|
Specifies any of the DMP switches.
|
||
|
|
||
|
inspec
|
||
|
Specifies the input device and file or input device only.
|
||
|
|
||
|
Type HELP DMP SWITCHES for a description of the DMP switches.
|
||
|
|
||
|
|
||
|
help dte
|
||
|
|
||
|
Data Terminal Emulation (DTE) allows you to log into another DIGITAL computer
|
||
|
system from a terminal connected to a Micro/RSX or RSX-11M-PLUS system.
|
||
|
The other DIGITAL system can be an RSX-11M/M-PLUS system, a VAX/VMS system
|
||
|
running VAX-11/RSX, a Professional Personal Computer, or a Micro/RSX system.
|
||
|
|
||
|
Once a local RSX terminal is logged in to an external system, the external
|
||
|
system becomes the host system. The host system views the system running DTE as
|
||
|
remote. Once you have logged into the host system through DTE, you can use the
|
||
|
File Transfer Utility (MFT) to copy and delete files between the local and the
|
||
|
host systems.
|
||
|
|
||
|
Additional HELP is available on the topics summarized below. To access this
|
||
|
information, type HELP DTE topic.
|
||
|
|
||
|
Topics: CONNECT DISCONNECT SET_HOST
|
||
|
HOOKUP FILE_TRANSFER DCL_COPY
|
||
|
DCL_DELETE MCR_COPY MCR_DELETE
|
||
|
|
||
|
help edi
|
||
|
|
||
|
EDI is a line-oriented editor that allows you to create and modify text files.
|
||
|
EDI operates on most ASCII text files.
|
||
|
|
||
|
EDI accepts commands that determine its mode of operation and control its
|
||
|
actions on input files, output files, and working text buffers.
|
||
|
|
||
|
The command line for EDI is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
filespec
|
||
|
|
||
|
Parameter
|
||
|
|
||
|
filespec
|
||
|
Specifies a file specification in the following format.
|
||
|
|
||
|
ddnn:[directory]filename.type;version
|
||
|
|
||
|
After EDI has identified the input file or created the new file, it is ready
|
||
|
for commands.
|
||
|
|
||
|
EDI runs in two control modes: Edit (command) mode and Input (text) mode.
|
||
|
Edit mode is invoked automatically when you specify an existing file.
|
||
|
|
||
|
In edit mode, EDI issues an asterisk (*) prompt. EDI acts upon commands and
|
||
|
data to open and close files; to bring lines of text from an open file; to
|
||
|
change, delete, or replace information in an open file; or to insert single
|
||
|
or multiple lines anywhere in a file.
|
||
|
|
||
|
Input mode is invoked automatically at program startup if you specify a
|
||
|
nonexistent file.
|
||
|
|
||
|
When in input mode, EDI does not issue an explicit prompt. Lines that you
|
||
|
enter at the terminal are treated as text and are inserted into the output
|
||
|
file. When you complete each input line by pressing the RETURN key, EDI
|
||
|
sends a line feed to the terminal.
|
||
|
|
||
|
To switch from edit mode to input mode, enter the Insert command and press
|
||
|
the RETURN key. To return to edit mode, press the RETURN key as the only
|
||
|
character on an input line. EDI will issue the asterisk prompt, which
|
||
|
signifies edit mode.
|
||
|
|
||
|
EDI provides two modes you can use to access and manipulate lines of text in
|
||
|
the input file. (A line is defined as a string of characters terminated by
|
||
|
pressing the RETURN key.) The two modes are as follows:
|
||
|
|
||
|
Line-by-line mode Allows access to one line of text at a time. Backing up
|
||
|
is not allowed.
|
||
|
|
||
|
Block mode Allows free access within a block of lines, on a line-by-
|
||
|
line basis. Backing up within a block is allowed. Backing
|
||
|
up to previous blocks is not allowed. Block mode is the
|
||
|
default text access mode.
|
||
|
|
||
|
Type HELP EDI COMMANDS for a list of the EDI commands.
|
||
|
|
||
|
help edt
|
||
|
|
||
|
EDT, the DEC Editor, has its own HELP files, which you can access from
|
||
|
within EDT, using the EDT HELP command. To access EDT from MCR, use a
|
||
|
command in the following form:
|
||
|
|
||
|
EDT[/qualifiers] [outfile,][journal][=] infile[,command]
|
||
|
|
||
|
The optional output filespec permits you to give a new name to the
|
||
|
outfile. The journal filespec permits you to give a new name to the
|
||
|
journal file. The equals ( = ) is required if you use either or both
|
||
|
of these two filespecs. The infile is the file you wish to edit.
|
||
|
The optional command filespec refers to a file of EDT commands you
|
||
|
may wish to have read in and executed before you start editing.
|
||
|
|
||
|
There are two qualifiers to the EDT command: /RO and /RECOVER.
|
||
|
|
||
|
EDT/RO infile means you wish read-only access to the file.
|
||
|
|
||
|
EDT/RECOVER infile recovers edits from an editing session that had
|
||
|
been interrupted by a system crash or other problem.
|
||
|
|
||
|
See the EDT Editor Manual for more information on EDT.
|
||
|
|
||
|
help error_logger
|
||
|
|
||
|
The RSX error logging system consists of four tasks: ELI, ERRLOG, RPT, and
|
||
|
CFL. All command descriptions in these help files use MCR syntax. If your
|
||
|
system's Command Line Interpreter (CLI) is DCL, you may wish to use DCL
|
||
|
commands to operate error logging. For help with DCL commands, type HELP.
|
||
|
|
||
|
The Error Log Interface (ELI) task controls the operation of the error
|
||
|
logging task (ERRLOG). ELI turns error logging on and off, changes
|
||
|
error limits, and names error log files and backup files. ERRLOG also
|
||
|
provides a warning whenever one of the error limits is reached.
|
||
|
|
||
|
The Report Generator task (RPT) produces error log reports based on
|
||
|
information in control file modules.
|
||
|
|
||
|
The Control File Language (CFL) compiler compiles the error log control
|
||
|
file modules used by RPT.
|
||
|
|
||
|
Type HELP ERROR_LOG ELI for more information about ELI commands.
|
||
|
Type HELP ERROR_LOG WARNINGS for more information about error limits.
|
||
|
Type HELP ERROR_LOG CFL for information about the CFL commands.
|
||
|
Type HELP ERROR_LOG RPT for more information about the RPT commands
|
||
|
that generate error log reports.
|
||
|
|
||
|
help executive
|
||
|
|
||
|
Help is available for all Executive directives. Type
|
||
|
|
||
|
HELP EXECUTIVE macrocall
|
||
|
|
||
|
for help on the directive that corresponds to the macro call. (Note
|
||
|
that the terminating $ should be eliminated from the macro call when
|
||
|
requesting help. For example, type HELP EXECUTIVE ABRT for help on
|
||
|
the ABRT$ directive.)
|
||
|
|
||
|
You can also type
|
||
|
|
||
|
HELP EXECUTIVE directivename
|
||
|
|
||
|
where directivename is the name of the directive. Remember that many
|
||
|
directives have similar names. Type the full name of the directive as
|
||
|
a single word with underscores between words. For example:
|
||
|
|
||
|
HELP EXECUTIVE SEND_REQUEST_AND_CONNECT
|
||
|
|
||
|
Type HELP EXECUTIVE DIRECTIVES for a list of the directives and their
|
||
|
macro call names.
|
||
|
|
||
|
Type HELP EXECUTIVE DIC for information on the Directive Identification
|
||
|
Codes and HELP EXECUTIVE ERRORS for a list of the error codes returned
|
||
|
in the Directive Status Word.
|
||
|
|
||
|
|
||
|
help fcs
|
||
|
|
||
|
File Control Services (FCS) is a collection of record management
|
||
|
macros and subroutines used to maintain and manipulate data
|
||
|
files. FCS, in contrast to RMS-11, supports only sequential and
|
||
|
fixed record length file organizations. This HELP file contains
|
||
|
brief summaries of the MACRO-11 assembly language interface to
|
||
|
FCS. See also, HELP FCS:
|
||
|
|
||
|
BIGBUFFERS ERRORS ALL FDB INTRO
|
||
|
DATA-STRUC ERRORS err FLUSH MACRO
|
||
|
DATA-SET ERRORS nnn FILES-11 USER-TASK
|
||
|
ERRORS EXAMPLE FILE-SPEC
|
||
|
|
||
|
Code Name Meaning
|
||
|
--------- -------
|
||
|
err Indicates a three-character error code name.
|
||
|
|
||
|
nnn Indicates a three-digit octal error code number.
|
||
|
|
||
|
help flx
|
||
|
|
||
|
The File Transfer Utility Program (FLX) allows you to use foreign volumes
|
||
|
(not in Files-11 format) in DIGITAL's DOS-11 or RT-11 format. FLX converts
|
||
|
the format of a file to the format of the volume the file is being
|
||
|
transferred to.
|
||
|
|
||
|
FLX can be used to initialize and list directories of cassettes and RT-11 or
|
||
|
DOS-11 file-structured volumes. FLX can also be used to delete files from
|
||
|
RT-11 or DOS-11 formatted volumes.
|
||
|
|
||
|
FLX performs file transfers (and format conversions, as appropriate) as
|
||
|
follows:
|
||
|
|
||
|
o DOS-11 to Files-11 and DOS-11 volumes
|
||
|
o Files-11 to DOS-11, Files-11, and RT-11 volumes
|
||
|
o RT-11 to RT-11 and Files-11 volumes
|
||
|
|
||
|
FLX supports all Files-11 devices, including RSX-format cassettes. The
|
||
|
cassettes are volumes that you have initialized using the MCR command
|
||
|
INITVOL or the DCL command INITIALIZE. DOS-11 and RT-11 volumes are
|
||
|
initialized using FLX. On RSX-11M-PLUS operating systems, DOS-11 and RT-11
|
||
|
volumes must be mounted with foreign characteristics before you can use
|
||
|
FLX.
|
||
|
|
||
|
The general format for entering FLX command lines is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
[ddnn:[[directory]]/switch[...]=]infile[,...]/switch[...]
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
ddnn
|
||
|
Specifies the device for the FLX output.
|
||
|
|
||
|
directory
|
||
|
Specifies the directory on the output device.
|
||
|
|
||
|
Do not specify a directory if the output device is in RT-11 format.
|
||
|
|
||
|
switch
|
||
|
Specifies one of the FLX switches.
|
||
|
|
||
|
infile
|
||
|
Specifies the input file specification.
|
||
|
|
||
|
The format for entering file specifications is as follows:
|
||
|
|
||
|
ddnn:[directory]filename.type;version
|
||
|
|
||
|
The directory is not specified for RT-11 volumes.
|
||
|
|
||
|
FLX provides three types of switches for file transfers:
|
||
|
|
||
|
Volume format Specifiy the format of the volume on which files are stored;
|
||
|
that is, Files-11, DOS-11, or RT-11 volumes.
|
||
|
|
||
|
Transfer mode Provide the means for specifying the format of a file on a
|
||
|
non-Files-11 volume. Files can be in formatted ASCII,
|
||
|
formatted binary, or file image format.
|
||
|
|
||
|
Control Provide control functions useful during file transfers.
|
||
|
Using file control switches, you can specify, for example,
|
||
|
the number of blocks to be allocated to an output file or
|
||
|
the directory for an output file.
|
||
|
|
||
|
Type HELP FLX SWITCHES for a list and description of the FLX switches.
|
||
|
|
||
|
help fmt
|
||
|
|
||
|
|
||
|
The Disk Volume Formatter (FMT) utility formats and verifies disk cartridge,
|
||
|
disk pack, fixed media disk, and flexible disk volumes under any RSX-11M-PLUS
|
||
|
operating system that includes online formatting support in the Executive.
|
||
|
|
||
|
In general, FMT performs the following functions:
|
||
|
|
||
|
o Writes a complete header for each sector of the volume it is formatting.
|
||
|
o Verifies the address contents of each sector header.
|
||
|
o Sets the density for RX02 (DY-type) diskettes.
|
||
|
o Lets you specify an error limit for the volume being formatted. FMT
|
||
|
terminates processing when the error limit is reached.
|
||
|
o Lets the Bad Block Locator task run (spawn) if your system permits
|
||
|
spawned tasks.
|
||
|
|
||
|
FMT can also be invoked through the DCL command INITIALIZE/FORMAT.
|
||
|
|
||
|
The command line for FMT is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
ddnn:[/switch[...]]
|
||
|
|
||
|
Parameters
|
||
|
|
||
|
ddnn
|
||
|
Specifies the volume you are formatting.
|
||
|
|
||
|
switch
|
||
|
Specifies an FMT switch. Not all switches can be used with all device
|
||
|
types.
|
||
|
|
||
|
To terminate FMT, press CTRL/Z following the FMT prompt.
|
||
|
|
||
|
Type HELP FMT SWITCHES for a list of the FMT switches.
|
||
|
|
||
|
help fortran
|
||
|
|
||
|
F77 [obj-file] [,list-file] = input-file[,s][/switch[,s]]
|
||
|
|
||
|
You can also use the F77 command in interactive mode, which
|
||
|
permits you to enter multiple compilation commands (lines).
|
||
|
To invoke the interactive mode (if you have installed the
|
||
|
image of the FORTRAN-77 compiler as F77), you simply type:
|
||
|
|
||
|
F77 <RET>
|
||
|
|
||
|
Regardless of the name under which the PDP-11 FORTRAN-77
|
||
|
compiler is installed, the compiler displays the following prompt:
|
||
|
|
||
|
F77>
|
||
|
|
||
|
You may use the following format to enter the command:
|
||
|
|
||
|
F77>[obj-file] [,list-file] = input-file[,s][/switch[,s]]
|
||
|
F77>[obj-file] [,list-file] = input-file[,s][/switch[,s]]
|
||
|
F77> ...
|
||
|
F77> ...
|
||
|
F77> ?Z
|
||
|
Many switchs have a negative form that negates the action
|
||
|
specified by the positive form. You can obtain the negative
|
||
|
generally by following the required slash with a minus sign
|
||
|
or the characters NO. For example, /-SP or /NOSP.
|
||
|
|
||
|
/[NO]CK /CO:n
|
||
|
/[NO]DE /[NO]F77
|
||
|
/ID /[NO]I4
|
||
|
/LA (effective in the MCR interactive mode only)
|
||
|
/LI:n /[NO]RO
|
||
|
/SP /[NO]TR:arg
|
||
|
/[NO]ST[:arg] ALL
|
||
|
ALL BLOCKS
|
||
|
NONE LINES
|
||
|
SOURCE NAMES
|
||
|
SYNTAX NONE
|
||
|
/[NO]WF:n /WR
|
||
|
|
||
|
|
||
|
Type HELP FORTRAN switch for more information.
|
||
|
|
||
|
help ifl
|
||
|
|
||
|
RMSIFL reads records from any type of RMS-11 file and loads them into
|
||
|
an existing, empty, indexed file. RMSCNV also populates indexed files,
|
||
|
but in a nonoptimized fashion (type HELP CNV).
|
||
|
|
||
|
To invoke installed RMSIFL:
|
||
|
|
||
|
RMSIFL [command-string]
|
||
|
|
||
|
To invoke uninstalled RMSIFL:
|
||
|
|
||
|
RUN $RMSRMSIFL
|
||
|
|
||
|
Type HELP IFL COMMAND for an explanation of RMSIFL's command line.
|
||
|
Type HELP IFL SWITCHES for information on RMSIFL's switches.
|
||
|
|
||
|
See the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
help indirect
|
||
|
|
||
|
The Indirect Command Processor allows CLI command lines to be
|
||
|
placed in a file. The file is then executed as though the command lines
|
||
|
were entered from a terminal. Indirect also supports other
|
||
|
numeric and string manipulation commands.
|
||
|
|
||
|
A summary of commands and special symbols can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT SUMMARY
|
||
|
|
||
|
Individual command descriptions can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT commandname
|
||
|
|
||
|
Operators (relational and arithmetic) are described at
|
||
|
|
||
|
HELP INDIRECT OPERATORS
|
||
|
|
||
|
Special symbol descriptions can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT symbolname
|
||
|
NOTE: symbolname does not include the <sym> angle brackets.
|
||
|
|
||
|
A list of Indirect error messages, including their severity class numbers,
|
||
|
can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT MESSAGES
|
||
|
|
||
|
help open
|
||
|
|
||
|
OPE[N] memory-address [+ n] [/keyword]
|
||
|
OPE[N] memory-address [- n] [/keyword]
|
||
|
|
||
|
Keywords: /AFF=[CPx,UBy] /CPU=CPx
|
||
|
/DRV=dd: /KNL
|
||
|
/KNLD /KNLI
|
||
|
/REG=region-name /TASK=taskname
|
||
|
/TASKD /TASKI
|
||
|
|
||
|
+ or - n One or more optional octal numbers to be added to or
|
||
|
subtracted from the memory address.
|
||
|
|
||
|
The OPENREGISTER command allows you to examine and modify a word of mem
|
||
|
ory.
|
||
|
To open a location within a task, the task must be fixed in memory.
|
||
|
|
||
|
This is a privileged command.
|
||
|
|
||
|
For information on the keywords, type HELP OPEN keyword.
|
||
|
For help on the OPEN command display format, type HELP OPEN DISPLAY.
|
||
|
|
||
|
>delete the TOP when e editing on the O!!!!!!
|
||
|
|
||
|
MCR -- Not logged in
|
||
|
|
||
|
help iox
|
||
|
|
||
|
The I/O Exerciser (IOX) detects I/O problems on the disk, terminal, and tape
|
||
|
units in your hardware configuration. IOX tests the hardware (and accompanying
|
||
|
software) by performing repeated operations to the same unit.
|
||
|
|
||
|
IOX exercises devices on two kinds of volumes: non-file-structured (NFS) and
|
||
|
file-structured (Files-11). They are defined as follows:
|
||
|
|
||
|
NFS Volumes All tapes and terminals, some disks.
|
||
|
|
||
|
Files-11 Volumes Disks initialized with the MCR command INITIALIZE.
|
||
|
They have a home block and a Files-11 structure.
|
||
|
|
||
|
Additional help is available on the following topics:
|
||
|
|
||
|
Running an I/O exercise Type HELP IOX RUN
|
||
|
IOX commands Type HELP IOX COMMANDS
|
||
|
IOX operating modes Type HELP IOX MODES
|
||
|
IOX reports Type HELP IOX OUTPUT
|
||
|
|
||
|
|
||
|
help help indirect
|
||
|
|
||
|
The Indirect Command Processor allows CLI command lines to be
|
||
|
placed in a file. The file is then executed as though the command lines
|
||
|
were entered from a terminal. Indirect also supports other
|
||
|
numeric and string manipulation commands.
|
||
|
A summary of commands and special symbols can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT SUMMARY
|
||
|
|
||
|
Individual command descriptions can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT commandname
|
||
|
|
||
|
Operators (relational and arithmetic) are described at
|
||
|
|
||
|
HELP INDIRECT OPERATORS
|
||
|
|
||
|
Special symbol descriptions can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT symbolname
|
||
|
|
||
|
NOTE: symbolname does not include the <sym> angle brackets.
|
||
|
|
||
|
A list of Indirect error messages, including their severity class numbers,
|
||
|
can be obtained by typing
|
||
|
|
||
|
HELP INDIRECT MESSAGES
|
||
|
|
||
|
|
||
|
help lbr
|
||
|
|
||
|
The Librarian Utility Program (LBR) allows you to create, update, modify,
|
||
|
list, and maintain library files. LBR organizes files into library modules
|
||
|
so that you have rapid and convenient access to your files.
|
||
|
|
||
|
Library files contain two directory tables: the EPT and the MNT. The EPT
|
||
|
contains entry point names that consist of global symbols defined as entry
|
||
|
points in MACRO source programs. The MNT contains names of the modules in
|
||
|
the library. Both tables are ordered alphabetically.
|
||
|
|
||
|
Their are three types of libraries: object library files which contain
|
||
|
object files, macro library files which contain source macro files, and
|
||
|
universal library files which contain modules inserted from any kind of file
|
||
|
whether it be a program or text.
|
||
|
|
||
|
The general command line for LBR is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
outfile[,listfile]=infile[,...]
|
||
|
|
||
|
The format for entering file specifications is as follows:
|
||
|
|
||
|
ddnn:[directory]filename.type;version[/switch]
|
||
|
|
||
|
For a list of the LBR switches, type HELP LBR SWITCHES.
|
||
|
|
||
|
|
||
|
help macro
|
||
|
|
||
|
The Macro Assembler (MAC) utility program assembles one or more
|
||
|
MACRO-11 language source files into an object file. The command line
|
||
|
syntax is:
|
||
|
|
||
|
>MAC file.OBJ[/sw],file.LST[/sw]=file.MAC[/sw],file.MAC[/sw]. . .
|
||
|
or
|
||
|
>MAC
|
||
|
MAC>file.OBJ[/sw],file.LST[/sw]=file.MAC[/sw],file.MAC[/sw]. . .
|
||
|
MAC>?Z ! or another command line if another assembly is to be done
|
||
|
|
||
|
Type HELP MAC SWITCHES for a list of available switches.
|
||
|
|
||
|
|
||
|
help mag
|
||
|
|
||
|
The Magtape Control Task, MAG, lets you control magnetic tapes.
|
||
|
The format for the MAG command is as follows:
|
||
|
|
||
|
>MAG SET mmnn:/keyword[/keyword/keyword...] (mmnn: is the magtape unit)
|
||
|
|
||
|
MAG supports the following switches:
|
||
|
|
||
|
/BS Block size for magtape
|
||
|
/CC Type of carriage control
|
||
|
/EOF Specifies that MTAACP should return IE.EOF
|
||
|
/EOT Specifies that MTAACP should return IE.EOT
|
||
|
/EOV Specifies that MTAACP should return IE.EOV
|
||
|
/INITIALIZE Specifies the volume label with which the tape will
|
||
|
be initialized
|
||
|
/POS Specifies the number of files to spaced
|
||
|
/RS Specifies the record size
|
||
|
/REWIND Rewinds magtape to BOT
|
||
|
|
||
|
Type HELP MAG <switch> for more information on each switch.
|
||
|
|
||
|
See Appendix G of the IAS/RSX-11 I/O Operations Reference Manual for details.
|
||
|
|
||
|
|
||
|
help odt
|
||
|
|
||
|
The On-Line Debugging Tool (ODT) is an interactive debugging aid that is
|
||
|
added to a task by the Task Builder /DA (debugging aid) switch or the
|
||
|
/DEBUG qualifier to the LINK command. ODT receives control when you start
|
||
|
your task. ODT can:
|
||
|
|
||
|
o Control task execution
|
||
|
o Display or alter the contents of memory locations or registers
|
||
|
o Search and fill memory
|
||
|
o Perform calculations
|
||
|
|
||
|
You can execute your task gradually or in steps, set breakpoints, open
|
||
|
locations for examination, display bytes or words (in various formats),
|
||
|
and modify task locations. Thus, you can examine and modify your task
|
||
|
while running it, without rebuilding it. For a complete explanation of
|
||
|
ODT, see the RSX-11M-PLUS and Micro/RSX Debugging Reference Manual.
|
||
|
|
||
|
For more information, type HELP ODT subject:
|
||
|
|
||
|
COMMAND INTERNAL_REGISTER OPERATOR
|
||
|
DISPLAY INTERRUPT RETURN
|
||
|
GENERAL_REGISTER LINKING VARIABLE
|
||
|
|
||
|
|
||
|
help pip
|
||
|
|
||
|
The Peripheral Interchange Program (PIP) is a file utility program that
|
||
|
transfers data files from one standard Files-11 device to another. PIP also
|
||
|
performs file control functions. You invoke PIP file control functions by
|
||
|
means of switches and subswitches.
|
||
|
|
||
|
The command line for PIP differs for each function. Therefore, the comm and
|
||
|
line formats are described with the PIP switches.
|
||
|
|
||
|
Type HELP PIP SWITCHES for a list of the PIP switches and subswitches.
|
||
|
|
||
|
|
||
|
help pmd
|
||
|
|
||
|
PMD is the Postmortem Dump task. When a task aborts, PMD generates
|
||
|
a dump of its header and address space to aid in debugging.
|
||
|
|
||
|
You can make a task eligible for a Postmortem Dump in any of three ways:
|
||
|
|
||
|
o Build the task with the TKB switch /PM or the DCL command LINK/POSTMORTEM
|
||
|
o Install the task with the /PMD=YES switch or DCL command INSTALL/POSTMORTEM
|
||
|
o Abort the task with the /PMD switch or the DCL command ABORT/POSTMORTEM
|
||
|
|
||
|
Postmortem Dumps are written on the system disk in directory [1,4] in the file
|
||
|
taskname.PMD and are automatically spooled by PMD. (Note that the print
|
||
|
spooler automatically deletes all files with the type .PMD after printing
|
||
|
them.)
|
||
|
|
||
|
PMD also produces Snapshot Dumps of running tasks (see HELP PMD SNAPSHOT).
|
||
|
|
||
|
|
||
|
help print
|
||
|
|
||
|
PRI [[queuename:][jobname][/jobsw]=]file[/filesw] . . .
|
||
|
|
||
|
The PRINT command submits one or more files for printing. The files are
|
||
|
grouped together into a single print job and are all printed
|
||
|
together.
|
||
|
|
||
|
The optional queuename parameter allows you to submit your job to a queue
|
||
|
other than the default queue PRINT. The optional jobname parameter allows you
|
||
|
to give your print job a name. If you do not specify a job name, the name of
|
||
|
the first file in the job is used as the job name.
|
||
|
|
||
|
The following job switches are available:
|
||
|
|
||
|
/[NO]AD jobname queuename:
|
||
|
/AF /[NO]JO /[NO]RES
|
||
|
/CO:jobcopies /LE:pagelength /[NO]TR
|
||
|
/[NO]FL /[NO]LO
|
||
|
/FO:formnumber /PA:n=files
|
||
|
/[NO]HO /PRIO:priority
|
||
|
|
||
|
If you specify a job switch, the equal sign (=) is required in the PRI command.
|
||
|
|
||
|
The following file switches are available:
|
||
|
|
||
|
/CO:filecopies /[NO]DE /[NO]TR
|
||
|
|
||
|
|
||
|
help queue
|
||
|
|
||
|
QUE [queue:][job]/cmd
|
||
|
QUE /EN:n/cmd
|
||
|
|
||
|
The QUE command allows you to control the system's queues, jobs in the queues,
|
||
|
and the files that make up the jobs in the queues. The available commands
|
||
|
are listed below. For additional help, see HELP QUE command.
|
||
|
|
||
|
AS DEA FU LI STA
|
||
|
BA DEL HO MOD STO
|
||
|
BR EN IN REL UNBA
|
||
|
CR FI KIL SP UNSP
|
||
|
|
||
|
help rms
|
||
|
|
||
|
RMS-11 (Record Management Services for the PDP-11) is one of two file
|
||
|
systems supplied on RSX operating systems. It uses a series of user-callable
|
||
|
subroutines that implement sequential, relative, and indexed file
|
||
|
organizations. RMS-11 is accessible from MACRO-11, BASIC-PLUS-2, COBOL-11,
|
||
|
and other DIGITAL languages.
|
||
|
|
||
|
To display a list of RMS-11 error code explanations, type HELP RMS ERRORS.
|
||
|
Additional help is available on the following topics:
|
||
|
|
||
|
BCK (file back-up) CNV (file conversion)
|
||
|
DES (interactive file design) DEF (file definition)
|
||
|
DSP (file display) IFL (indexed file load)
|
||
|
RST (file restoration)
|
||
|
|
||
|
To obtain help on these topics, type HELP topic.
|
||
|
|
||
|
See also HELP RMS MACROS (for a list of RMS-11 macros) and HELP FCS (for
|
||
|
information on File Control Services (the alternate file system).
|
||
|
|
||
|
|
||
|
help rst
|
||
|
|
||
|
RMSRST restores files from magtape or disk that were backed up
|
||
|
using RMSBCK (type HELP BCK for more information) and produces
|
||
|
standard RMS-11 files as output. The structure, content, and
|
||
|
attributes of the restored files are those of the original files
|
||
|
when they were backed up. However, file placement will not be
|
||
|
restored.
|
||
|
|
||
|
To invoke installed RMSRST:
|
||
|
|
||
|
RST [command-string]
|
||
|
|
||
|
To invoke uninstalled RMSRST:
|
||
|
|
||
|
RUN $RMSRST
|
||
|
|
||
|
Type HELP RST COMMAND for an explanation of RMSRST's command line.
|
||
|
Type HELP RST SWITCHES for an explanation of RMSRST's switches.
|
||
|
|
||
|
See the RMS-11 Utilities manual for more information.
|
||
|
|
||
|
|
||
|
help shadow_recording
|
||
|
|
||
|
The SHADOW (SHA) command invokes the Shadow Recording control task.
|
||
|
|
||
|
Format:
|
||
|
|
||
|
>SHA command parameterlist
|
||
|
|
||
|
Commands:
|
||
|
|
||
|
ABORT ddnn: Stops shadow recording of a shadowed pair wh
|
||
|
ile
|
||
|
catch-up is in progress.
|
||
|
CONTINUE ddnn: TO ddxx: Restarts shadow recording on a pair of disks that
|
||
|
was previously being shadowed.
|
||
|
DISPLAY Displays all shadowed disk pairs.
|
||
|
START ddnn: TO ddxx: Starts shadow recording and initiates a catch-up
|
||
|
on the specified disk pair.
|
||
|
STOP ddnn: Stops shadow recording of a disk pair.
|
||
|
|
||
|
Parameters:
|
||
|
|
||
|
ddnn: Specifies the primary volume
|
||
|
ddxx: Specifies the secondary volume (which must be mounted as
|
||
|
foreign)
|
||
|
|
||
|
help slp
|
||
|
|
||
|
help submit
|
||
|
|
||
|
SUBMIT [[queuename:][jobname][/jobsw]=]file[/filesw] . . .
|
||
|
|
||
|
The SUBMIT command submits one or more batch files for processing on a
|
||
|
batch processor. The files are grouped into a single batch job and are
|
||
|
executed one after the other without interruption.
|
||
|
|
||
|
The optional queuename: switch allows you to submit your job to a queue
|
||
|
other
|
||
|
than the default BATCH. The optional jobname switch allows you to give y
|
||
|
our
|
||
|
job a name. If you do not specify a job name, the name of the first file
|
||
|
in the
|
||
|
job is used as the job name.
|
||
|
|
||
|
The following additional job switches are available:
|
||
|
|
||
|
/AF: /[NO]HO /[NO]LO
|
||
|
/[NO]PRIN:queue /PRIO:priority /[NO]RES
|
||
|
|
||
|
The following file switches are available:
|
||
|
|
||
|
/[NO]DE /[NO]TR
|
||
|
|
||
|
|
||
|
|
||
|
help sysgen
|
||
|
|
||
|
SYSGEN is the indirect command procedure used to tailor and build a version
|
||
|
of the RSX-11M-PLUS operating system for a particular installation. The SYSGEN
|
||
|
procedure asks questions about both the softw
|
||
|
are features you wish to include in your system, and about your system's
|
||
|
hardware configuration. SYSGEN uses that information to assemble and task
|
||
|
build an RSX-11M-PLUS operating system specifically tailored to your needs.
|
||
|
|
||
|
You should read both the System Generation and Installation Guide
|
||
|
and the Release Notes for this release of your operating system before
|
||
|
attempting to run the SYSGEN procedure. Attempts to run SYSGEN
|
||
|
without first consulting the documentation may yield undesired results.
|
||
|
|
||
|
|
||
|
You should also be familiar with the features and structure of
|
||
|
the RSX-11M-PLUS operating system before attempting to generate your own
|
||
|
system so you will understand the consequences of choosing or omitting
|
||
|
the various system options.
|
||
|
|
||
|
|
||
|
help syslib
|
||
|
|
||
|
SYSLIB is an object library containing various support routines that can be
|
||
|
included in a task. These HELP files describe most of the routines. To obtain
|
||
|
expanded information on any of the following SYSLIB routines, type:
|
||
|
|
||
|
HELP SYSLIB routine
|
||
|
|
||
|
The System Library contains the following types of support routines:
|
||
|
|
||
|
Register Handling Routines (For help, type HELP SYSLIB REGISTER)
|
||
|
Arithmetic Routines (For help, type HELP SYSLIB ARITHMETIC)
|
||
|
Data Conversion Routines (For help, type HELP SYSLIB DCONV)
|
||
|
Formatting Routines (For help, type HELP SYSLIB FORMAT)
|
||
|
Dynamic Memory Management
|
||
|
Routines (For help, type HELP SYSLIB DMEMORY)
|
||
|
Virtual Memory Management
|
||
|
Routines (For help, type HELP SYSLIB VMEMORY)
|
||
|
GCML Get Command Line Routine (For help, type HELP SYSLIB GCML)
|
||
|
EGCML Extended GCML Routine (For help, type HELP SYSLIB EGCML)
|
||
|
|
||
|
|
||
|
|
||
|
help tdx
|
||
|
|
||
|
TDX (Catch-All Task)
|
||
|
|
||
|
The RSX-11M-PLUS and Micro/RSX operating systems include a catchall task (TDX).
|
||
|
TDX "catches" commands that are not recognized by the DIGITAL Command
|
||
|
Language (DCL) or the Monitor Console Routine (MCR). If MCR receives an
|
||
|
unrecognized command, it searches for a task with that name and passes the
|
||
|
command line to TDX. TDX allows you to run uninstalled tasks and abbreviate
|
||
|
command names.
|
||
|
|
||
|
Any task installed with the task name ...CA. is treated as a catchall
|
||
|
task. The catchall task image is in the system library directory (usually
|
||
|
directory [3,54]) and is named TDX.TSK. Once installed, TDX checks the typed
|
||
|
command against its list of commands. If the commands match, TDX translates the
|
||
|
command into a valid MCR command.
|
||
|
|
||
|
TDX supports the following commands:
|
||
|
|
||
|
ATS CHD CHU CLR CRE CVT DEL DIR
|
||
|
DLG DLN FRE PUR SHQ SYS TDX TYP
|
||
|
|
||
|
For more information on each of the TDX pseudo-commands, type:
|
||
|
|
||
|
HELP TDX command
|
||
|
|
||
|
help tktn
|
||
|
|
||
|
TKTN is the Task Termination Notification program. When a task
|
||
|
aborts, TKTN displays the cause of the abort and the contents of the
|
||
|
task's registers on the terminal from which the task was running.
|
||
|
|
||
|
TKTN also displays device driver messages on the console, notifying
|
||
|
the operator when a device is not ready or when a device has been
|
||
|
dismounted.
|
||
|
|
||
|
See the RSX-11M-PLUS MCR Operations Manual or the RSX-11M-PLUS
|
||
|
Command Language Manual for a description of the TKTN messages.
|
||
|
|
||
|
help vmr
|
||
|
The Virtual Monitor Console Routine (VMR) is a privileged system task
|
||
|
that allows you to configure an RSX-11M-PLUS system image file.
|
||
|
|
||
|
VMR commands are a subset of Monitor Console Routine (MCR) commands.
|
||
|
VMR commands differ from MCR commands in that they are directed to the
|
||
|
disk image of a system rather than to the current running system. The
|
||
|
system image file that you configure by using VMR commands can later be
|
||
|
bootstrapped.
|
||
|
|
||
|
Before you run VMR, you need to be sure that certain requirements are met.
|
||
|
For help on preparing to run VMR, type HELP VMR PREPARATION.
|
||
|
|
||
|
You can use three methods to invoke VMR. For help on these methods, type
|
||
|
HELP VMR INVOKING.
|
||
|
|
||
|
After you invoke VMR, you can enter VMR commands. HELP is available for
|
||
|
the following commands:
|
||
|
|
||
|
ALT ASN CAN CON DEV INS LOA LUN
|
||
|
PAR REA RED REM RUN SAV SET TAS
|
||
|
TIM UNF UNL
|
||
|
|
||
|
For more information, type HELP VMR commandname.
|
||
|
|
||
|
help vfy
|
||
|
|
||
|
|
||
|
The File Structure Verification Utility (VFY) for Files-11 volumes provides
|
||
|
the ability to perform the following tasks:
|
||
|
|
||
|
o Check the readability and validity of a file-structured volume (default
|
||
|
function).
|
||
|
|
||
|
o Print the number of available blocks on a file-structured volume (the
|
||
|
Free switch (/FR)).
|
||
|
|
||
|
o Search for files in the index file that are not in any directory; that is,
|
||
|
files that are "lost" in the sense that they cannot be accessed by file
|
||
|
name (the Lost switch (/LO)).
|
||
|
|
||
|
o Validate directories against the files they list (the Directory Validation
|
||
|
switch (/DV)).
|
||
|
|
||
|
o List all files in the index file, showing the file ID, file name, and
|
||
|
owner (the List switch (/LI)).
|
||
|
|
||
|
o Mark as "used" all the blocks that appear to be available but are actually
|
||
|
allocated to a file (the Update switch (/UP)).
|
||
|
|
||
|
o Rebuild the storage allocation bit map so that it properly reflects the
|
||
|
information in the index file (the Rebuild switch (/RE)).
|
||
|
|
||
|
o Restore files that are marked for deletion (the Delete switch (/DE)).
|
||
|
|
||
|
o Delete bad file headers (the Header Delete switch (/HD)).
|
||
|
|
||
|
o Perform a read check on every allocated block on a file-structured volume
|
||
|
(the Read Check switch (/RC)).
|
||
|
|
||
|
There should be no other activity on the volume while VFY is executing. In
|
||
|
particular, activities that create new files, extend existing files, or
|
||
|
delete files should not be attempted while VFY is executing a function.
|
||
|
The command line for VFY is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
listfile,scratchdev=indev/switch
|
||
|
|
||
|
Parameter
|
||
|
|
||
|
listfile
|
||
|
Specifies the output file specification as follows:
|
||
|
|
||
|
ddnn:[directory]filename.type;version
|
||
|
|
||
|
scratchdev
|
||
|
Specifies the device on which the scratch file produced by VFY i
|
||
|
s to
|
||
|
be written. This parameter is in the following format:
|
||
|
|
||
|
ddnn:
|
||
|
|
||
|
indev
|
||
|
Specifies the volume to be verified in the same format as scratchdev.
|
||
|
If you do not specify the volume, the default is SY0.
|
||
|
|
||
|
switch
|
||
|
Specifies the function to be performed by VFY. Type HELP VFY SWITCHES
|
||
|
for a list of the VFY switches.
|
||
|
|
||
|
|
||
|
help zap
|
||
|
|
||
|
The Task/File Patch Program (ZAP) allows you to directly and modify task
|
||
|
image and data files on a Files-11 volume. Using ZAP, you can patch these
|
||
|
files interactively without reassembling and rebuilding the task.
|
||
|
|
||
|
ZAP performs many of the functions performed by the RSX-11 online debugging
|
||
|
utility, ODT. Thus, working knowledge of ODT is helpful in using ZAP.
|
||
|
|
||
|
ZAP provides the following features:
|
||
|
|
||
|
o Operating modes that allow you to access specific words and bytes in a
|
||
|
file, modify locations in a file, list the disk block and address
|
||
|
boundaries for each overlay segment in a task image file on disk, and open
|
||
|
a file for reading only.
|
||
|
|
||
|
o A set of internal registers that include eight Relocation Registers.
|
||
|
|
||
|
o Single-character commands that, with other command line elements, allow
|
||
|
you to open and close locations in a file and to display and manipulate
|
||
|
the values in those locations.
|
||
|
|
||
|
Except in read-only mode, the results of ZAP commands are permanent.
|
||
|
|
||
|
Although the ZAP program is relatively straightforward to use, patching
|
||
|
locations in a task image file requires knowing how to use the map (or
|
||
|
memory allocation file) generated by the Task Builder (TKB) and the listings
|
||
|
generated by the MACRO-11 assembler. These maps and listings provide
|
||
|
information you need to access the locations whose contents you want to
|
||
|
change.
|
||
|
|
||
|
The ZAP command line format is shown next.
|
||
|
|
||
|
Format
|
||
|
|
||
|
ddnn:[directory]filename.type;version/switch
|
||
|
|
||
|
After you enter the file specification, ZAP prompts with an underscore (_).
|
||
|
|
||
|
You terminate ZAP by entering the X command. This command exits you from ZAP
|
||
|
and returns control to your command line interpreter (CLI). For more
|
||
|
information on ZAP command line elements, type HELP ZAP ELEMENTS.
|
||
|
|
||
|
For more information on ZAP switches, type HELP ZAP SWITCHES.
|
||
|
|
||
|
ZAP provides two addressing modes and two access modes. For more information
|
||
|
on ZAP addressing and access modes, type HELP ZAP MODES.
|
||
|
|
||
|
---
|
||
|
|
||
|
okay, this with Part 01 (Refer: NIA068) is all the basic help on DCS.
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 03 / NIA069 /
|
||
|
/ Computer Crime: System Security Controls [4] /
|
||
|
/ Guardian Of Time /
|
||
|
/ /
|
||
|
|
||
|
|
||
|
THE BASIC CONCEPT
|
||
|
|
||
|
Computer security reviews to identify and evaluate vulnerabilities,
|
||
|
calculate risks, and select controls have been conducted assuming
|
||
|
differences and uniqueness from one computer center to another b/c of their
|
||
|
one-of-a-kind development. Differences in physical facilities, computer
|
||
|
configurations, types or modes of computer usage, organization patters, and
|
||
|
computer application envrionmental factors have all been emphasized.
|
||
|
However, similarities in the use and security of computers are appearing in
|
||
|
many areas:
|
||
|
|
||
|
: Almost every computer center has secure area needs for housing of at
|
||
|
least one computer in one room and peripherals in the same or adjacent
|
||
|
room.
|
||
|
|
||
|
: Almost every well-run computer center has a procedure for physical access
|
||
|
control to facilities.
|
||
|
|
||
|
: Every well-run computer center has a procedure to assure secure backup
|
||
|
copies of data files and computer programs stored on computer media,
|
||
|
documentation, and computer supplies.
|
||
|
|
||
|
: Every computer center has logs and journals of computer usage and
|
||
|
performance that have importance for security.
|
||
|
|
||
|
: Every computer center has computer programs that contain controls to prevent
|
||
|
erroneous processing.
|
||
|
|
||
|
: Every computer center has computer programs requiring legal ownership
|
||
|
protection as indicated in SECTION III.
|
||
|
|
||
|
: Every well-designed computer center has some form of fire
|
||
|
detection/suppression capabilities.
|
||
|
|
||
|
: Every computer center has staff in positions of trust.
|
||
|
A new concept of baselines of security controls can be developed from these and
|
||
|
many other similar enviroments and vulnerabilities. A baseline of security
|
||
|
controls is a set of generally used controls meeting commonly desired control
|
||
|
objectives that should be present in every well-run computer center. The
|
||
|
justification for having them is derived from common usage and prudent
|
||
|
management rather than from explicit identification of vulnerabilities and
|
||
|
reduction of risk. If a baseline control is not selected for use, its absence
|
||
|
should be recorded or alternatives should be selected and justified.
|
||
|
|
||
|
A control objective is a condition or event that is to be avoided, deterred,
|
||
|
detected, prevented or recovered from. Examples are as follows:
|
||
|
|
||
|
: Avoid violations of laws and regulations
|
||
|
: Detect unathorized system use
|
||
|
: Prevent unauthorized access to sensitive areas.
|
||
|
|
||
|
A control is the policy, method, practice, device or programmed mechanism to
|
||
|
accomplish a control objective. A control has implentation variants that are
|
||
|
established in the detailed specifications for the control in a particular use.
|
||
|
Baseline controls have never before been identified, and it is not known how
|
||
|
many would qualify universally or w/in any specific organization. However, the
|
||
|
baseline concept is now feasible b/c of the control selection experience gained
|
||
|
as the computer security field matures. The 82 controls found in the study of
|
||
|
seven computer field sites are offered in Section VI as a preliminary step in
|
||
|
identifying baseline controls.
|
||
|
|
||
|
A baseline of security need not be a rigid, unalterable set of control
|
||
|
objectives and their required controls and variants. The purpose of a baseline
|
||
|
is to specify a minimum set of controls such that if a control is omitted,
|
||
|
there would be explicit reasons identified why it is absent or why an
|
||
|
alternative control is equivalent. If these exeptions from a baseline are
|
||
|
acceptable to the authority ultimately responsible for security, the baseline
|
||
|
could still be said to be the accepted criterion. In fact, this
|
||
|
exeption-taking is the process by which baselines evolve. When enough support
|
||
|
for an exception exists, a baseline is changed to include the exception as part
|
||
|
of the baseline.
|
||
|
|
||
|
A single, clear-cut baseline is improbable. As espoused by different experts
|
||
|
and organizations, baselines may be different. For example, differing
|
||
|
baselines may be established by insurance companies, banks and manufacturers.
|
||
|
Security experts, auditors and consultants may have differences of opinion over
|
||
|
inclusion of a control in a baseline but little disagreement about control
|
||
|
objectives. In addition, some controls and even some control objectives will
|
||
|
become obsolete as technology changes and advances. For these reasons, a
|
||
|
baseline is not identified as standard. Whereas a baseline may be called a
|
||
|
standard w/in any one domain (e.g., federal standards established by the US,
|
||
|
the US Department of Commerce, National Bureau of Standards, or a particular
|
||
|
company), the acceptance of general standards should be reserved for American
|
||
|
National Standards Institute adoption.
|
||
|
|
||
|
BENEFITS OF BASELINE CONTROLS
|
||
|
|
||
|
The success of the baseline concept lies in obtaining concurrence and
|
||
|
acceptance of a sufficient number of generally used controls by computer
|
||
|
security administrators and, in turn, by the management responsible for the
|
||
|
expenditure of resources for computer security. Certainly enough controls are
|
||
|
now identified in extensive security literature and exist as commercial
|
||
|
products. management must be willing to accept a recommended control justified
|
||
|
only by having a security administrator show that it is part of a baseline.
|
||
|
Prudent management will be motivated to do this out of trust in the security
|
||
|
administrator, the prospect of saving time, the reduction of expenses for
|
||
|
evaluation and study, and the contentment of knowing that the organization is
|
||
|
protected by generally used controls.
|
||
|
|
||
|
Baseline security will allow organizations to avoid unnecessary expenditure of
|
||
|
resources to engage in detailed study of already resolved problems and
|
||
|
selection of solutions by extensive justification efforts, data gathering, and
|
||
|
analysis. It will facilitate providing simple, inpexpensive, effective
|
||
|
safeguards comprehensively before difficult, new problems are attacked. As
|
||
|
computer-using orgainzations adopt the baseline approach for selection of
|
||
|
controls used most successfully by other organizations. This practice , they
|
||
|
will increasingly rely on the best security controls used most successfully by
|
||
|
other organizations. This practice will further advance the baseline concept
|
||
|
by encouraging uniformly high quality security. In addition, this will
|
||
|
stimulate and facilitate a formalized theory of computer security, putting it
|
||
|
on a par w/ other theories in computer technology. The training of computer
|
||
|
security specialists will likewise be formalized and advanced.
|
||
|
|
||
|
Identification of generally used controls and their variants will stabilize and
|
||
|
enlarge the security products market to stimulate a wider range of less
|
||
|
expensive control products that require few model types and options. for
|
||
|
example, when procedures are developed and accepted for cryptography use, then
|
||
|
cryptographic products will become more uniform and cost less.
|
||
|
|
||
|
FUTURE DEVELOPMENT OF BASELINE CONCEPTS
|
||
|
|
||
|
This report alone is not sufficient to assure the feasibility of baseline
|
||
|
concepts. The control objectives and controls identified from the seven field
|
||
|
site visits may form a baseline nucleus b/c they are explicitly documented as
|
||
|
currently in use in several computer centers, and representatives of all seven
|
||
|
sites agreed on their common usage. The literature abounds w/ descriptions of
|
||
|
controls, each usually recommended by one or two authors and not ncecessarily
|
||
|
supported by widespread use. The Systems Auditability and Control Reports from
|
||
|
the Institute of Internal Auditors identifies 300 controls and a set of control
|
||
|
objectives based on a survey of 1,500 computer-using enterprises. However, one
|
||
|
conclusion of these 1977 reports was a significant lack of common usage. Only
|
||
|
a few organizations were found to be using any particular control.
|
||
|
|
||
|
It is hoped that the baseline concepts will not be seen as alternatives to
|
||
|
quantitative and qualitative risk assessment methods now in use. Baseline
|
||
|
controls would be selected before such assessments take place so that the
|
||
|
obvious, accepted, routine controls could be applied before risk assessments
|
||
|
are used. Therefore, assessments can be started further along in the controls
|
||
|
selection process.
|
||
|
|
||
|
When protection from intentionally caused losses is of concern, a game
|
||
|
strategy must be used. The intelligent opponent will normally not attack
|
||
|
where effective controls are in place but will seek vulnerabilities resulting
|
||
|
from a lack of controls. In other words, losses will tend to occur where
|
||
|
victims have not thought to put controls. It must be assumed that an
|
||
|
intelligent opponent will know as much about published baselines as their
|
||
|
originators do and will take advantage of any deficiencies. Therefore, the
|
||
|
baseline concepts are esentially foreced on potential victims. These
|
||
|
vulnerable organizations must establish full baseline protection as routine,
|
||
|
prudent operation to be able to concerntrate on those vulnerabilities created
|
||
|
by the special circumstances and new environmental factors brought about by
|
||
|
use of new technology and new applications. After all, that is what
|
||
|
intelligent opponents will also be concentrating on after being rebuffed by
|
||
|
baseline controls.
|
||
|
|
||
|
The baseline concepts have a solubrious effect on errors and omissions; they
|
||
|
can mitigate unintentional threats. Unlike intentional acts, sources of errors
|
||
|
and omissions can only affect specific vulnerabilities. Therefore, an
|
||
|
escalated game strategy is not required. Prevention of accidental loss
|
||
|
results mostly from control of intentionally caused loss.
|
||
|
Formal bodies for identifying baseline controls might include the American
|
||
|
National Standards Institute, but based on its historical practice the
|
||
|
institute would probably standardize only a few of the most significant
|
||
|
controls such as cryptographic algorithms or uninterruptable power supplies.
|
||
|
The Generally Accepted Accounting Practices adopted by the American Institute
|
||
|
of Certified Public Accountants might be an interesting model to build on.
|
||
|
However, this would require a publicly and legally recognized professional body
|
||
|
in a narrowly defined, highly controlled (certified) practice. The computer
|
||
|
field is probably too highly diversified and changing to fast for the necessary
|
||
|
stability and consolidation of professionalism for a similar concept to work
|
||
|
for adoption of baselines in the near future.
|
||
|
|
||
|
The baseline concepts must therefore evolve slowly over a long period to
|
||
|
achieve a state close to general concurrence. Recognition of the baseline
|
||
|
concepts at this early stage should facilitate their development. It can be
|
||
|
argued that the number of generally used controls is insufficient to form good
|
||
|
baselines. However, the similarity of control needs has never been tested. In
|
||
|
fact, all current methods of selection of controls have been based on the
|
||
|
opposite assumption that every situation is unique. Assuming at least some
|
||
|
commonlity of needs and controls, a biginning based on potential benefits of
|
||
|
baseline concepts may produce sufficient results to counter such arguments.
|
||
|
|
||
|
The types of number of control objectives and controls in each category
|
||
|
described in this report will change as the computer security field matures,
|
||
|
new potential threats arise, and the technology changes. Control objectives
|
||
|
and controls will be moved from special to selective to baseline categories,
|
||
|
some controls will be dropped or replaced, and new controls will be developed.
|
||
|
Today, few control objectives and controls have been achieved explicit,
|
||
|
generally used, baseline status b/c the concept is new and differences rather
|
||
|
than similarities have been emphasized at computer centers. In the future,
|
||
|
baselines should grow and become more strongly accepted. Special controls
|
||
|
could decrease; many will become baseline controls as security needs become
|
||
|
more commonly known. This would occur as selection of controls becomes more
|
||
|
strongly based on what others are doing under similar circumstances.
|
||
|
Justification for recommendations will increasingly be based on the concept
|
||
|
that "we should do this, b/c company X is doining it"
|
||
|
|
||
|
[END OF SECTION IV COMPUTER SECURITY CONTROLS AND THE LAW]
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 04 / NIA069 /
|
||
|
/ KERMIT PROTOCOL MANUAL /
|
||
|
/ Part 01 of 02 /
|
||
|
/ Fifth Edition /
|
||
|
/ /
|
||
|
/ Frank da Cruz /
|
||
|
/ /
|
||
|
/ Columbia University Center for Computing Activities /
|
||
|
/ New York, New York 10027 /
|
||
|
/ /
|
||
|
/ 3 April 1984 /
|
||
|
/ /
|
||
|
/ Submitted By: /
|
||
|
/ Malefactor Of Organized Crime /
|
||
|
/ Dedicated To: /
|
||
|
The Mentor
|
||
|
|
||
|
Copyright (C) 1981,1982,1983,1984
|
||
|
Trustees of Columbia University in the City of New York
|
||
|
|
||
|
Permission is granted to any individual or institution to copy or
|
||
|
use this document and the programs described in it, except for
|
||
|
explicitly commercial purposes.
|
||
|
|
||
|
Preface to the Fourth Edition Page 1
|
||
|
|
||
|
|
||
|
Preface to the Fourth Edition
|
||
|
|
||
|
The fourth edition (November 1983) of the KERMIT Protocol Manual incorporates
|
||
|
some new ideas that grew from our experience in attempting to implement some of
|
||
|
the features described in earlier editions, particularly user/server functions.
|
||
|
These include a mechanism to allow batch transfers to be interrupted gracefully
|
||
|
for either the current file or the entire batch of files; a "capability mask";
|
||
|
a protocol extension for passing file attributes. In addition, numbers are now
|
||
|
written in decimal notation rather than octal, which was confusing to many
|
||
|
readers. Also, several incompatible changes were made in minor areas where no
|
||
|
attempts at an implementation had yet been made; these include:
|
||
|
|
||
|
- The format and interpretation of the operands to the server commands.
|
||
|
|
||
|
- Usurpation of the reserved fields 10-11 of the Send-Init packet, and
|
||
|
addition of new reserved fields.
|
||
|
|
||
|
Most of the remaining material has been rewritten and reorganized, and much new
|
||
|
material added, including a section on the recommended vocabulary for documen-
|
||
|
tation and commands.
|
||
|
|
||
|
The previous edition of the Protocol Manual attempted to define "protocol ver-
|
||
|
sion 3"; this edition abandons that concept. Since KERMIT development is an
|
||
|
unorganized, disorderly, distributed enterprise, no requirement can be imposed
|
||
|
on KERMIT implementors to include a certain set of capabilities in their im-
|
||
|
plementations. Rather, in this edition we attempt to define the basic
|
||
|
functionality of KERMIT, and then describe various optional functions.
|
||
|
|
||
|
The key principle is that any implementation of KERMIT should work with any
|
||
|
other, no matter how advanced the one or how primitive the other. The capabily
|
||
|
mask and other Send-Init fields attempt to promote this principle.
|
||
|
|
||
|
|
||
|
FIFTH EDITION
|
||
|
|
||
|
The fifth edition (March 1984) attempts to clarify some fine points that had
|
||
|
been left ambiguous in the 4th edition, particularly with respect to when and
|
||
|
how prefix encoding is done, and when it is not, and about switching between
|
||
|
block check types. A mechanism is suggested (in the Attributes section) for
|
||
|
file archiving, and several attributes have been rearranged and some others ad-
|
||
|
ded (this should do no harm, since no one to date has attempted to implement
|
||
|
the attributes packet). A more complete protocol state table is provided, a
|
||
|
few minor additions are made to the collection of packet types.
|
||
|
|
||
|
|
||
|
A FEW WORDS...
|
||
|
|
||
|
Before deciding to write a new version of KERMIT, please bear in mind that the
|
||
|
philosophy of KERMIT has always been that is not, and never should become, a
|
||
|
commercial product, sold for profit. Its goal is to promote communication and
|
||
|
sharing, and KERMIT itself should be freely shared, and not sold. Media and
|
||
|
reproduction costs may be recouped if desired, but profit should not be the mo-
|
||
|
tive. Vendors of commercial software, however, may request permission to in-
|
||
|
clude KERMIT with, or in, their programs provided certain conditions are met,
|
||
|
including that credit for the protocol be given to Columbia and that the price
|
||
|
of the product not be raised substantially beyond media and reproduction costs
|
||
|
Preface to the Fourth Edition Page 2
|
||
|
|
||
|
|
||
|
for inclusion of KERMIT. Contact the KERMIT group at Columbia if you have any
|
||
|
questions about this. Prospective KERMIT implementors should check with us in
|
||
|
any case, to be sure that someone else has not already done, or started to do,
|
||
|
the same thing you propose to do.
|
||
|
|
||
|
KERMIT is distributed from Columbia University on magnetic tape. Complete or-
|
||
|
dering instructions can be found in the Kermit Users Guide. Direct inquiries
|
||
|
about KERMIT to:
|
||
|
|
||
|
|
||
|
KERMIT Distribution
|
||
|
Columbia University Center for Computing Activities
|
||
|
7th Floor, Watson Laboratory
|
||
|
612 West 115th Street
|
||
|
New York, NY 10025
|
||
|
|
||
|
|
||
|
ACKNOWLEDGEMENTS
|
||
|
|
||
|
Bill Catchings and I designed the basic KERMIT protocol at Columbia University
|
||
|
in 1981. For ideas, we looked at some of the ANSI models (X3.57, X3.66), the
|
||
|
ISO OSI model, some real-world "asynchronous protocols" (including the Stanford
|
||
|
Dialnet project, the University of Utah TTYFTP project), as well as at file
|
||
|
transfer on full-blown networks like DECnet and ARPAnet.
|
||
|
|
||
|
Bill wrote the first two programs to implement the protocol, one for the
|
||
|
DEC-20, one for a CP/M-80 microcomputer, and in the process worked out most of
|
||
|
the details and heuristics required for basic file transfer. Meanwhile, Daphne
|
||
|
Tzoar and Vace Kundakci, also of Columbia, worked out the additional details
|
||
|
necessary for IBM mainframe communication.
|
||
|
|
||
|
Much credit should also go to Bernie Eiben of Digital Equipment Corporation for
|
||
|
promoting widespread use of KERMIT and for adding many insights into how it
|
||
|
should operate, and to Nick Bush and Bob McQueen of Stevens Institute of Tech-
|
||
|
nology, for many contributions to the "advanced" parts of the protocol, and for
|
||
|
several major KERMIT implementations.
|
||
|
|
||
|
Thanks to the many people all over the world who have contributed new KERMIT
|
||
|
implementations, who have helped with KERMIT distribution through various user
|
||
|
groups, and who have contributed to the quality of the protocol and its many
|
||
|
implementations by reporting or fixing problems, criticizing the design, or
|
||
|
suggesting new features.
|
||
|
|
||
|
|
||
|
DISCLAIMER
|
||
|
|
||
|
No warranty of the software nor of the accuracy of the documentation surround-
|
||
|
ing it is expressed or implied, and neither the authors nor Columbia University
|
||
|
acknowledge any liability resulting from program or documentation errors.
|
||
|
|
||
|
Introduction Page 3
|
||
|
|
||
|
|
||
|
1. Introduction
|
||
|
|
||
|
This manual describes the KERMIT protocol. It is assumed that you understand
|
||
|
the purpose and operation of the Kermit file transfer facility, described in
|
||
|
the Kermit Users Guide, and basic terminology of data communications and com-
|
||
|
puter programming.
|
||
|
|
||
|
1.1. Background
|
||
|
|
||
|
The KERMIT file transfer protocol is intended for use in an environment where
|
||
|
there may be a diverse mixture of computers -- micros, personal computers,
|
||
|
workstations, laboratory computers, timesharing systems -- from a variety of
|
||
|
manufacturers. All these systems need have in common is the ability to com-
|
||
|
municate in ASCII over ordinary serial telecommunication lines.
|
||
|
|
||
|
KERMIT was originally designed at Columbia University to meet the need for file
|
||
|
transfer between our DECSYSTEM-20 and IBM 370-series mainframes and various
|
||
|
microcomputers. It turned out that the diverse characteristics of these three
|
||
|
kinds of systems resulted in a design that was general enough to fit almost any
|
||
|
system. The IBM mainframe, in particular, strains most common assumptions
|
||
|
about how computers communicate.
|
||
|
|
||
|
|
||
|
1.2. Overview
|
||
|
|
||
|
The KERMIT protocol is specifically designed for character-oriented transmis-
|
||
|
sion over serial telecommunication lines. The design allows for the restric-
|
||
|
tions and peculiarities of the medium and the requirements of diverse operating
|
||
|
environments -- buffering, duplex, parity, character set, file organization,
|
||
|
etc. The protocol is carried out by KERMIT programs on each end of the serial
|
||
|
connection sending "packets" back and forth; the sender sends file names, file
|
||
|
contents, and control information; the receiver acknowledges (positively or
|
||
|
negatively) each packet.
|
||
|
|
||
|
The packets have a layered design, more or less in keeping with the ANSI and
|
||
|
ISO philosophies, with the outermost fields used by the data link layer to
|
||
|
verify data integrity, the next by the session layer to verify continuity, and
|
||
|
the data itself at the application level.
|
||
|
|
||
|
Connections between systems are established by the ordinary user. In a typical
|
||
|
case, the user runs KERMIT on a microcomputer, enters terminal emulation, con-
|
||
|
nects to a remote host computer (perhaps by dialing up), logs in, runs KERMIT
|
||
|
on the remote host, and then issues commands to that KERMIT to start a file
|
||
|
transfer, "escapes" back to the micro, and issues commands to that KERMIT to
|
||
|
start its side of the file transfer. Files may be transferred singly or in
|
||
|
groups.
|
||
|
|
||
|
Basic KERMIT provides only file transfer, and that is provided for sequential
|
||
|
files only, though the protocol attempts to allow for various types of sequen-
|
||
|
tial files. Microcomputer implementations of KERMIT are also expected to
|
||
|
provide terminal emulation, to facilitate the initial connection.
|
||
|
|
||
|
More advanced implementations simplify the "user interface" somewhat by allow-
|
||
|
ing the KERMIT on the remote host to run as a "server", which can transfer
|
||
|
files in either direction upon command from the local "user" Kermit. The serv-
|
||
|
|
||
|
Introduction Page 4
|
||
|
|
||
|
|
||
|
er can also provide additional functionality, such as file management, mes-
|
||
|
sages, mail, and so forth. Other optional features also exist, including a
|
||
|
variety of block check types, a mechanism for passing 8-bit data through a
|
||
|
7-bit communication link, a way to compressing a repeated sequence of charac-
|
||
|
ters, and so forth.
|
||
|
|
||
|
As local area networks become more popular, inexpensive, and standardized, the
|
||
|
demand for KERMIT and similar protocols may dwindle, but will never wither away
|
||
|
entirely. Unlike hardwired networks, KERMIT gives the ordinary user the power
|
||
|
to establish reliable error-free connections between any two computers; this
|
||
|
may always be necessary for one-shot or long-haul connections.
|
||
|
|
||
|
Definitions Page 5
|
||
|
|
||
|
|
||
|
2. Definitions
|
||
|
|
||
|
|
||
|
2.1. General Terminology
|
||
|
|
||
|
TTY: This is the term commonly used for a device which is connected to a com-
|
||
|
puter over an EIA RS-232 serial telecommunication line. This device is most
|
||
|
commonly an ASCII terminal, but it may be a microcomputer or even a large
|
||
|
multi-user computer emulating an ASCII terminal. Most computers provide
|
||
|
hardware (RS-232 connectors and UARTs) and software (device drivers) to support
|
||
|
TTY connections; this is what makes TTY-oriented file transfer protocols like
|
||
|
KERMIT possible on almost any system at little or no cost.
|
||
|
|
||
|
LOCAL: When two machines are connected, the LOCAL machine is the one which you
|
||
|
interact with directly, and which is in control of the terminal. The "local
|
||
|
Kermit" is the one that runs on the local machine. A local Kermit always com-
|
||
|
municates over an external device (the micro's communication port, an assigned
|
||
|
TTY line, etc).
|
||
|
|
||
|
REMOTE: The REMOTE machine is the one on the far side of the connection, which
|
||
|
you must interact with "through" the local machine. The "remote Kermit" runs
|
||
|
on the remote machine. A remote Kermit usually communicates over its own
|
||
|
"console", "controlling terminal", or "standard i/o" device.
|
||
|
|
||
|
HOST: Another word for "computer", usually meaning a computer that can provide
|
||
|
a home for multiple users or applications. This term should be avoided in KER-
|
||
|
MIT lore, unless preceded immediately by LOCAL or REMOTE, to denote which host
|
||
|
is meant.
|
||
|
|
||
|
SERVER: An implementation of remote Kermit that can accept commands in packet
|
||
|
form from a local Kermit program, instead of directly from the user.
|
||
|
|
||
|
USER: In addition to its usual use to denote the person using a system or
|
||
|
program, "user" will also be used refer to the local Kermit program, when the
|
||
|
remote Kermit is a server.
|
||
|
|
||
|
|
||
|
2.2. Numbers
|
||
|
|
||
|
All numbers in the following text are expressed in decimal (base 10) notation
|
||
|
unless otherwise specified.
|
||
|
|
||
|
Numbers are also referred to in terms of their bit positions in a computer
|
||
|
word. Since KERMIT may be implemented on computers with various word sizes, we
|
||
|
start numbering the bits from the "right" -- bit 0 is the least significant.
|
||
|
Bits 0-5 are the 6 least significant bits; if they were all set to one, the
|
||
|
value would be 63.
|
||
|
|
||
|
A special quirk in terminology, however, refers to the high order bit of a
|
||
|
character as it is transmitted on the communication line, as the "8th bit".
|
||
|
More properly, it is bit 7, since we start counting from 0. References to the
|
||
|
"8th bit" generally are with regard to that bit which ASCII transmission sets
|
||
|
aside for use as a parity bit. KERMIT concerns itself with whether this bit
|
||
|
can be usurped for the transmission of data, and if not, it may resort to
|
||
|
"8th-bit prefixing".
|
||
|
|
||
|
Definitions Page 6
|
||
|
|
||
|
2.3. Character Set
|
||
|
|
||
|
All characters are in ASCII (American national Standard Code for Information
|
||
|
Interchange) representation, ANSI standard X3.4-1968. All implementations of
|
||
|
KERMIT transmit and receive characters only in ASCII. The ASCII character set
|
||
|
is listed in Appendix V.
|
||
|
|
||
|
ASCII character mnemonics:
|
||
|
|
||
|
NUL Null, idle, ASCII character 0.
|
||
|
SOH Start-of-header, ASCII character 1 (Control-A).
|
||
|
SP Space, blank, ASCII 32.
|
||
|
CR Carriage return, ASCII 13 (Control-M).
|
||
|
LF Linefeed, ASCII 10 (Control-J).
|
||
|
CRLF A carriage-return linefeed sequence.
|
||
|
DEL Delete, rubout, ASCII 127.
|
||
|
|
||
|
A control character is considered to be any byte whose low order 7 bits are in
|
||
|
the range 0 through 31, or equal to 127. In this document, control characters
|
||
|
are written in several ways:
|
||
|
|
||
|
Control-A
|
||
|
This denotes ASCII character 1, commonly referred to as "Control-A".
|
||
|
Control-B is ASCII character 2, and so forth.
|
||
|
|
||
|
CTRL-A This is a common abbreviation for "Control-A". A control character is
|
||
|
generally typed at a computer terminal by holding down the key marked
|
||
|
CTRL and pressing the corresponding alphabetic character, in this case
|
||
|
"A".
|
||
|
|
||
|
?A "Uparrow" notation for CTRL-A. Many computer systems "echo" control
|
||
|
characters in this fashion.
|
||
|
|
||
|
A printable ASCII character is considered to be any character in the range 32
|
||
|
(SP) through 126 (tilde).
|
||
|
|
||
|
|
||
|
2.4. Conversion Functions
|
||
|
|
||
|
Several conversion functions are useful in the description of the protocol and
|
||
|
in the program example. The machine that Kermit runs on need operate only on
|
||
|
integer data; these are functions that operate upon the numeric value of single
|
||
|
ASCII characters.
|
||
|
|
||
|
char(x) = x+32 Transforms the integer x, which is assumed to lie in the range
|
||
|
0 to 94, into a printable ASCII character; 0 becomes SP, 1 be-
|
||
|
comes "!", 3 becomes "#", etc.
|
||
|
|
||
|
unchar(x) = x-32
|
||
|
Transforms the character x, which is assumed to be in the
|
||
|
printable range (SP through tilde), into an integer in the
|
||
|
range 0 to 94.
|
||
|
|
||
|
ctl(x) = x XOR 64
|
||
|
Maps between control characters and their printable represen-
|
||
|
tations, preserving the high-order bit. If x is a control
|
||
|
|
||
|
Definitions Page 7
|
||
|
|
||
|
|
||
|
character, then
|
||
|
x = ctl(ctl(x))
|
||
|
|
||
|
that is, the same function is used to controllify and uncon-
|
||
|
trollify. The argument is assumed to be a true control charac-
|
||
|
ter (0 to 31, or 127), or the result of applying CTL to a true
|
||
|
control character (i.e. 63 to 95). The transformation is a
|
||
|
mnemonic one -- ?A becomes A and vice versa.
|
||
|
|
||
|
|
||
|
2.5. Protocol Jargon
|
||
|
|
||
|
A Packet is a clearly delimited string of characters, comprised of "control
|
||
|
fields" nested around data; the control fields allow a KERMIT program to deter-
|
||
|
mine whether the data has been transmitted correctly and completely. A packet
|
||
|
is the unit of transmission in the KERMIT protocol.
|
||
|
|
||
|
ACK stands for "Acknowledge". An ACK is a packet that is sent to acknowledge
|
||
|
receipt of another packet. Not to be confused with the ASCII character ACK.
|
||
|
|
||
|
NAK stands for "Negative Acknowledge". A NAK is a packet sent to say that a
|
||
|
corrupted or incomplete packet was received, the wrong packet was received, or
|
||
|
an expected packet was not received. Not to be confused with the ASCII charac-
|
||
|
ter NAK.
|
||
|
|
||
|
A timeout is an event that can occur if expected data does not arrive within a
|
||
|
specified amount of time. The program generating the input request can set a
|
||
|
"timer interrupt" to break it out of a nonresponsive read, so that recovery
|
||
|
procedures may be activated.
|
||
|
|
||
|
System Requirements Page 8
|
||
|
|
||
|
|
||
|
3. System Requirements
|
||
|
|
||
|
The KERMIT protocol requires that:
|
||
|
|
||
|
- The host can send and receive characters using 7- or 8-bit ASCII en-
|
||
|
coding over an EIA RS-232 physical connection, either hardwired or
|
||
|
dialup.
|
||
|
|
||
|
- All printable ASCII characters are acceptable as input to the host
|
||
|
1
|
||
|
and will not be transformed in any way . Similarly, any intervening
|
||
|
network or communications equipment ("smart modems", TELENET, ter-
|
||
|
minal concentrators, port selectors, etc) must not transform or swal-
|
||
|
low any printable ASCII characters.
|
||
|
|
||
|
- A single ASCII control character can pass from one system to the
|
||
|
other without transformation. This character is used for packet
|
||
|
synchronization. The character is normally Control-A (SOH, ASCII 1),
|
||
|
but can be redefined.
|
||
|
|
||
|
- If a host requires a line terminator for terminal input, that ter-
|
||
|
minator must be a single ASCII control character, such as CR or LF,
|
||
|
distinct from the packet synchronization character.
|
||
|
|
||
|
- When using a job's controlling terminal for file transfer, the system
|
||
|
must allow the KERMIT program to set the terminal to no echo, in-
|
||
|
finite width (no "wraparound" or CRLF insertion by the operating
|
||
|
system), and no "formatting" of incoming or outgoing characters (for
|
||
|
instance, raising lowercase letters to uppercase, transforming con-
|
||
|
trol characters to printable sequences, etc). In short, the terminal
|
||
|
must be put in "binary" or "raw" mode, and, hopefully, restored af-
|
||
|
terwards to normal operation.
|
||
|
|
||
|
- The host's terminal input processor should be capable of receiving a
|
||
|
single burst of 40 to 100 characters at normal transmission speeds.
|
||
|
This is the typical size of packet.
|
||
|
|
||
|
Note that most of these requirements rule out the use of KERMIT through IBM
|
||
|
3270 / ASCII protocol converters.
|
||
|
|
||
|
KERMIT does not require:
|
||
|
|
||
|
- That the connection run at any particular baud rate.
|
||
|
|
||
|
- That the system can do XON/XOFF or any other kind of flow control.
|
||
|
System- or hardware-level flow control can help, but it's not neces-
|
||
|
sary. See section 5.7.
|
||
|
|
||
|
- That the system is capable of full duplex operation. Any mixture of
|
||
|
|
||
|
_______________
|
||
|
|
||
|
1
|
||
|
If they are translated to another character set, like EBCDIC, the KERMIT
|
||
|
program must be able to reconstruct the packet as it appeared on the communica-
|
||
|
tion line, before transformation.
|
||
|
|
||
|
System Requirements Page 9
|
||
|
|
||
|
|
||
|
half and full duplex systems is supported.
|
||
|
|
||
|
- That the system can transmit or receive 8-bit bytes. KERMIT will
|
||
|
take advantage of 8-bit connections to send binary files; if an 8-bit
|
||
|
connection is not possible, then binary files may be sent using an
|
||
|
optional prefix encoding.
|
||
|
|
||
|
Printable Text versus Binary Data Page 10
|
||
|
|
||
|
|
||
|
4. Printable Text versus Binary Data
|
||
|
|
||
|
For transmission between unlike systems, files must be assigned to either of
|
||
|
two catagories: printable text or binary.
|
||
|
|
||
|
A printable text file is one that can make sense on an unlike system -- a docu-
|
||
|
ment, program source, textual data, etc. A binary file is one that will not
|
||
|
(and probably can not) make sense on an unlike system -- an executable program,
|
||
|
numbers stored in internal format, etc. On systems with 8-bit bytes, printable
|
||
|
2
|
||
|
ASCII files will have the high order bit of each byte set to zero (since ASCII
|
||
|
is a 7-bit code) whereas binary files will use the high order bit of each byte
|
||
|
for data, in which case its value can vary from byte to byte.
|
||
|
|
||
|
Many computers have no way to distinguish a printable file from a binary file
|
||
|
-- especially one originating from an unlike system -- so the user may have to
|
||
|
give an explicit command to Kermit to tell it whether to perform these conver-
|
||
|
sions.
|
||
|
|
||
|
|
||
|
4.1. Printable Text Files
|
||
|
|
||
|
A primary goal of KERMIT is for printable text files to be useful on the target
|
||
|
system after transfer. This requires a standard representation for text during
|
||
|
transmission. KERMIT's standard is simple: 7-bit ASCII characters, with
|
||
|
"logical records" (lines) delimited by CRLFs. It is the responsibility of sys-
|
||
|
tems that do not store printable files in this fashion to perform the necessary
|
||
|
conversions upon input and output. For instance, IBM mainframes might strip
|
||
|
trailing blanks on output and add them back on input; UNIX would prepend a CR
|
||
|
to its normal record terminator, LF, upon output and discard it upon input. In
|
||
|
addition, IBM mainframes must do EBCDIC/ASCII translation for text files.
|
||
|
|
||
|
No other conversions (e.g. tab expansion) are performed upon text files. This
|
||
|
representation is chosen because it corresponds to the way text files are
|
||
|
stored on most microcomputers and on many other systems. In many common cases,
|
||
|
no transformations are necessary at all.
|
||
|
|
||
|
|
||
|
4.2. Binary Files
|
||
|
|
||
|
Binary files are transmitted as though they were a sequence of characters. The
|
||
|
difference from printable files is that the status of the "8th bit" must be
|
||
|
preserved. When binary files are transmitted to an unlike system, the main ob-
|
||
|
jective is that they can be brought back to the original system (or one like
|
||
|
it) intact; no special conversions should be done during transmission, except
|
||
|
to make the data fit the transmission medium.
|
||
|
|
||
|
For binary files, eight bit character transmission is permissible as long as
|
||
|
the two Kermit programs involved can control the value of the parity bit, and
|
||
|
|
||
|
_______________
|
||
|
|
||
|
2
|
||
|
There are some exceptions, such as systems that store text files in so-
|
||
|
called "negative ASCII", or text files produced by word processors that use the
|
||
|
high order bit to indicate underline or boldface attributes.
|
||
|
|
||
|
Printable Text versus Binary Data Page 11
|
||
|
|
||
|
|
||
|
no intervening communications equipment will change its value. In that case,
|
||
|
the 8th bit of a transmitted character will match that of the original data
|
||
|
byte, after any control-prefixing has been done. When one or both sides cannot
|
||
|
control the parity bit, a special prefix character may be inserted, as
|
||
|
described below.
|
||
|
|
||
|
Systems that do not store binary data in 8-bit bytes, or whose word size is not
|
||
|
a multiple of 8, may make special provisions for "image mode" transfer of bi-
|
||
|
nary files. This may be done within the basic protocol by having the two sides
|
||
|
implicitly agree upon a scheme for packing the data into 7- or 8-bit ASCII
|
||
|
characters, or else the more flexible (but optional) file attributes feature
|
||
|
may be used. The former method is used on PDP-10 36-bit word machines, in
|
||
|
which text is stored five 7-bit bytes per word; the value of the "odd bit" is
|
||
|
sent as the parity bit of every 5th word.
|
||
|
|
||
|
File Transfer Page 12
|
||
|
|
||
|
|
||
|
5. File Transfer
|
||
|
|
||
|
The file transfer protocol takes place over a transaction. A transaction is an
|
||
|
exchange of packets beginning with a Send-Init (S) packet, and ending with a
|
||
|
3
|
||
|
Break Transmission (B) or Error (E) packet , and may include the transfer of
|
||
|
one or more files, all in the same direction. In order to minimize the unfor-
|
||
|
seen, KERMIT packets do not contain any control characters except one specially
|
||
|
designated to mark the beginning of a packet. Except for the packet marker,
|
||
|
only printable characters are transmitted. The following sequence charac-
|
||
|
terizes basic Kermit operation; the sender is the machine that is sending
|
||
|
files; the receiver is the machine receiving the files.
|
||
|
|
||
|
1. The sender transmits a Send-Initiate (S) packet to specify its
|
||
|
parameters (packet length, timeout, etc; these are explained below).
|
||
|
|
||
|
2. The receiver sends an ACK (Y) packet, with its own parameters in the
|
||
|
data field.
|
||
|
|
||
|
3. The sender transmits a File-Header (F) packet, which contains the
|
||
|
file's name in the data field. The receiver ACKs the F packet, with
|
||
|
no data in the data field of the ACK (optionally, it may contain the
|
||
|
name under which the receiver will store the file).
|
||
|
|
||
|
4. The sender sends the contents of the file, in Data (D) packets. Any
|
||
|
data not in the printable range is prefixed and replaced by a print-
|
||
|
able equivalent. Each D packet is acknowledged before the next one
|
||
|
is sent.
|
||
|
|
||
|
5. When all the file data has been sent, the sender sends an End-Of-
|
||
|
File (Z) packet. The receiver ACKs it.
|
||
|
|
||
|
6. If there is another file to send, the process is repeated beginning
|
||
|
at step 3.
|
||
|
|
||
|
7. When no more files remain to be sent, the sender transmits an End-
|
||
|
Of-Transmission (B) packet. The receiver ACKs it. This ends the
|
||
|
transaction, and closes the logical connection (the physical connec-
|
||
|
tion remains open).
|
||
|
|
||
|
Each packet has a sequence number, starting with 0 for the Send Init. The ack-
|
||
|
nowledgment (ACK or NAK) for a packet has the same packet number as the packet
|
||
|
being acknowledged. Once an acknowledgment is successfully received the packet
|
||
|
number is increased by one, modulo 64.
|
||
|
|
||
|
If the sender is remote, it waits for a certain amount of time (somewhere in
|
||
|
the 5-30 second range) before transmitting the Send-Init, to give the user time
|
||
|
to escape back to the local KERMIT and tell it to receive files.
|
||
|
|
||
|
|
||
|
|
||
|
_______________
|
||
|
|
||
|
3
|
||
|
A transaction should also be considered terminated when one side or the
|
||
|
other has stopped without sending an Error packet.
|
||
|
|
||
|
File Transfer Page 13
|
||
|
|
||
|
|
||
|
5.1. Conditioning the Terminal
|
||
|
|
||
|
KERMIT is most commonly run with the user sitting at a microcomputer, connected
|
||
|
through a communications port to a remote timesharing system. The remote KER-
|
||
|
MIT is using its job's own "controlling terminal" for file transfer. While the
|
||
|
microcomputer's port is an ordinary device, a timesharing job's controlling
|
||
|
terminal is a special one, and often performs many services that would inter-
|
||
|
fere with normal operation of KERMIT. Such services include echoing (on full
|
||
|
duplex systems), wrapping lines by inserting carriage return linefeed sequences
|
||
|
at the terminal width, pausing at the end of a screen or page full of text,
|
||
|
displaying system messages, alphabetic case conversion, control character in-
|
||
|
tepretation, and so forth. Mainframe KERMIT programs should be prepared to
|
||
|
disable as many of these services as possible before packet communication
|
||
|
begins, and to restore them to their original condition at the end of a trans-
|
||
|
action. Disabling these services is usually known as "putting the terminal in
|
||
|
binary mode."
|
||
|
|
||
|
KERMIT's use of printable control character equivalents, variable packet
|
||
|
lengths, redefinable markers and prefixes, and allowance for any characters at
|
||
|
all to appear between packets with no adverse effects provide a great deal of
|
||
|
adaptability for those systems that do not allow certain (or any) of these fea-
|
||
|
tures to be disabled.
|
||
|
|
||
|
|
||
|
5.2. Timeouts, NAKs, and Retries
|
||
|
|
||
|
If a KERMIT program is capable of setting a timer interrupt, or setting a time
|
||
|
limit on an input request, it should do so whenever attempting to read a packet
|
||
|
from the communication line, whether sending or receiving files. Having read a
|
||
|
packet, it should turn off the timer.
|
||
|
|
||
|
If the sender times out waiting for an acknowledgement, it should send the same
|
||
|
packet again, repeating the process a certain number of times up to a retry
|
||
|
limit, or until an acknowledgement is received. If the receiver times out
|
||
|
waiting for a packet, it can send either a NAK packet for the expected packet
|
||
|
or another ACK for the last packet it got.
|
||
|
|
||
|
If a packet from the sender is garbled or lost in transmission (the latter is
|
||
|
detected when the sequence number increases by more than 1, modulo 64, the
|
||
|
former by a bad checksum), the receiver sends a NAK for the garbled or missing
|
||
|
packet. If an ACK or a NAK from the receiver is garbled or lost, the sender
|
||
|
ignores it; in that case, one side or the other will time out and retransmit.
|
||
|
|
||
|
A retry count is maintained, and there is a retry threshold, normally set
|
||
|
around 5. Whenever a packet is resent -- because of a timeout, or because it
|
||
|
was NAK'd -- the counter is incremented. When it reaches the threshold, the
|
||
|
transaction is terminated and the counter reset.
|
||
|
|
||
|
If neither side is capable of timing out, a facility for manual intervention
|
||
|
must be available on the local KERMIT. Typically, this will work by sampling
|
||
|
the keyboard (console) periodically; if input, such as a CR, appears, then the
|
||
|
same action is taken as if a timeout had occurred. The local KERMIT keeps a
|
||
|
running display of the packet number or byte count on the screen to allow the
|
||
|
user to detect when traffic has stopped. At this point, manual intervention
|
||
|
should break the deadlock.
|
||
|
|
||
|
File Transfer Page 14
|
||
|
|
||
|
|
||
|
Shared systems which can become sluggish when heavily used should adjust their
|
||
|
own timeout intervals on a per-packet basis, based on the system load, so that
|
||
|
file transfers won't fail simply because the system was too slow.
|
||
|
|
||
|
Normally, only one side should be doing timeouts, preferably the side with the
|
||
|
greatest knowledge of the "environment" -- system load, baud rate, and so
|
||
|
forth, so as to optimally adjust the timeout interval for each packet. If both
|
||
|
sides are timing out, their intervals should differ sufficiently to prevent
|
||
|
collisions.
|
||
|
|
||
|
|
||
|
5.3. Errors
|
||
|
|
||
|
During file transfer, the sender may encounter an i/o error on the disk, or the
|
||
|
receiver may attempt to write to a full or write-protected device. Any con-
|
||
|
dition that will prevent successful transmission of the file is called a "fatal
|
||
|
error". Fatal errors should be detected, and the transfer shut down grace-
|
||
|
fully, with the pertinent information provided to the user. Error packets
|
||
|
provide a mechanism to do this.
|
||
|
|
||
|
If a fatal error takes place on either the sending or receiving side, the side
|
||
|
which encountered the error should send an Error (E) packet. The E packet con-
|
||
|
tains a brief textual error message in the data field. Both the sender and
|
||
|
receiver should be prepared to receive an Error packet at any time during the
|
||
|
transaction. Both the sender and receiver of the Error packet should halt, or
|
||
|
go back into into user command mode (a server should return to server command
|
||
|
wait). The side that is local should print the error message on the screen.
|
||
|
|
||
|
There is no provision for sending nonfatal error messages, warnings, or infor-
|
||
|
mation messages during a transaction. It would be possible to add such a fea-
|
||
|
ture, but this would require both sides agree to use it through setting of a
|
||
|
bit in the capability mask, since older KERMITs that did not know about such a
|
||
|
feature would encounter an unexpected packet type and would enter the fatal er-
|
||
|
ror state. In any case, the utility of such a feature is questionable, since
|
||
|
there is no guarantee that the user will be present to see such messages at the
|
||
|
time they are sent; even if they are saved up for later perusal in a "message
|
||
|
box", their significance may be long past by the time the user reads them. See
|
||
|
the section on Robustness, below.
|
||
|
|
||
|
|
||
|
5.4. Heuristics
|
||
|
|
||
|
During any transaction, several heuristics are useful:
|
||
|
|
||
|
1. A NAK for the current packet is equivalent to an ACK for the pre-
|
||
|
vious packet (modulo 64). This handles the common situation in
|
||
|
which a packet is successfully received, and then ACK'd, but the ACK
|
||
|
is lost. The ACKing side then times out waiting for the next packet
|
||
|
and NAKs it. The side that receives a NAK for packet n+1 while
|
||
|
waiting for an ACK for packet n simply sends packet n+1.
|
||
|
|
||
|
2. If packet n arrives more than once, simply ACK it and discard it.
|
||
|
This can happen when the first ACK was lost. Resending the ACK is
|
||
|
necessary and sufficient -- don't write the packet out to the file
|
||
|
again!
|
||
|
|
||
|
File Transfer Page 15
|
||
|
|
||
|
|
||
|
3. When opening a connection, discard the contents of the line's input
|
||
|
buffer before reading or sending the first packet. This is espe-
|
||
|
cially important if the other side is in receive mode (or acting as
|
||
|
a server), in which case it may have been sending out periodic NAKs
|
||
|
for your expected SEND-INIT or command packet. If you don't do
|
||
|
this, you may find that there are sufficient NAKs to prevent the
|
||
|
transfer -- you send a Send-Init, read the response, which is an old
|
||
|
NAK, so you send another Send-Init, read the next old NAK, and so
|
||
|
forth, up to the retransmission limit, and give up before getting to
|
||
|
the ACKs that are waiting in line behind all the old NAKs. If the
|
||
|
number of NAKs is below the cutoff, then each packet may be trans-
|
||
|
mitted multiply.
|
||
|
|
||
|
4. Similarly, before sending a packet, you should clear the input buff-
|
||
|
er (after looking for any required handshake character). Failure to
|
||
|
clear the buffer could result in propogation of the repetition of a
|
||
|
packet caused by stacked-up NAKs.
|
||
|
|
||
|
|
||
|
5.5. File Names
|
||
|
|
||
|
The syntax for file names can vary widely from system to system. To avoid
|
||
|
problems, it is suggested that filenames be represented in the File Header (F)
|
||
|
packet in a "normal form", by default (that is, there should be an option to
|
||
|
override such conversions).
|
||
|
|
||
|
1. Delete all pathnames and attributes from the file specification.
|
||
|
The file header packet should not contain directory or device names;
|
||
|
if it does, it may cause the recipient to try to store the file in
|
||
|
an inaccessible or nonexistent area, or it may result in a very
|
||
|
strange filename.
|
||
|
|
||
|
2. After stripping any pathname, convert the remainder of the file
|
||
|
specification to the form "name.type", with no restriction on length
|
||
|
(except that it fit in the data field of the F packet), and:
|
||
|
|
||
|
a. Include no more than one dot.
|
||
|
b. Use digits, uppercase letters only in name and type.
|
||
|
|
||
|
Special characters like "$", "_", "-", "&", and so forth should be disallowed,
|
||
|
since they're sure to cause problems on one system or another.
|
||
|
|
||
|
The recipient, of course, cannot depend upon the sender to follow this conven-
|
||
|
tion, and should still take precautions. However, since most file systems em-
|
||
|
body the notion of a file name and a file type, this convention will allow
|
||
|
these items to be expressed in a way that an unlike system can understand. The
|
||
|
particular notation is chosen simply because it is the most common.
|
||
|
|
||
|
The recipient must worry about the length of the name and type fields of the
|
||
|
file name. If either is too long, they must be truncated. If the result
|
||
|
(whether truncated or not) is the same as the name of a file that already ex-
|
||
|
ists in the same area, the recipient should have the ability to take some spe-
|
||
|
cial action to avoid writing over the original file.
|
||
|
|
||
|
KERMIT implementations that convert file specifications to normal form by
|
||
|
default should have an option to override this feature. This would be most
|
||
|
|
||
|
File Transfer Page 16
|
||
|
|
||
|
|
||
|
useful when transferring files between like systems, perhaps used in conjunc-
|
||
|
tion with "image mode" file transfer. This could allow, for instance, one UNIX
|
||
|
system to send an entire directory tree to another UNIX system.
|
||
|
|
||
|
|
||
|
5.6. Robustness
|
||
|
|
||
|
A major feature of the KERMIT protocol is the ability to transfer multiple
|
||
|
files. Whether a particular KERMIT program can actually send multiple files
|
||
|
depends on the capabilities of the program and the host operating system (any
|
||
|
KERMIT program can receive multiple files).
|
||
|
|
||
|
If a KERMIT program can send multiple files, it should make every attempt to
|
||
|
send the entire group specified. If it fails to send a particular file, it
|
||
|
should not terminate the entire batch, but should go on the the next one, and
|
||
|
proceed until an attempt has been made to send each file in the group.
|
||
|
|
||
|
Operating in this robust manner, however, gives rise to a problem: the user
|
||
|
must be notified of a failure to send any particular file. Unfortunately, it
|
||
|
is not sufficient to print a message to the screen since the user may not be
|
||
|
physically present. A better solution would be to have the sender optionally
|
||
|
keep a log of the transaction, giving the name of each file for which an at-
|
||
|
tempt was made, and stating whether the attempt was successful, and if not, the
|
||
|
reason. Additional aids to robustness are described in the Optional Features
|
||
|
section, below.
|
||
|
|
||
|
|
||
|
5.7. Flow Control
|
||
|
|
||
|
On full duplex connections, XON/XOFF flow control can generally be used in con-
|
||
|
junction with KERMIT file transfer with no ill effects. This is because XOFFs
|
||
|
are sent in the opposite direction of packet flow, so they will not interfere
|
||
|
with the packets themselves. XON/XOFF, therefore, need not be implemented by
|
||
|
the KERMIT program, but can done by the host system. If the host system
|
||
|
provides this capability, it should be used -- if both sides can respond
|
||
|
XON/XOFF signals, then buffer overruns and the resulting costly packet
|
||
|
retransmissions can be avoided.
|
||
|
|
||
|
Beware, however, of the following situation: remote Kermit is sending periodic
|
||
|
NAKs, local system is buffering them on the operating system level (because the
|
||
|
user has not started the local end of the file transfer yet); local line buffer
|
||
|
becomes full, local systems sends XOFF, remote starts buffering them up on its
|
||
|
end, user finally starts file transfer on local end, clears buffer, local
|
||
|
operating system sends XON, and then all the remotely buffered NAKs show up,
|
||
|
causing the packet echoing problem described above, despite the buffer clear-
|
||
|
ing.
|
||
|
|
||
|
Flow control via modem signals can also be used when available.
|
||
|
|
||
|
Note that flow control should not be confused with "handshake" or "line
|
||
|
turnaround" techniques that are used on simplex or half-duplex communication
|
||
|
lines.
|
||
|
|
||
|
File Transfer Page 17
|
||
|
|
||
|
|
||
|
5.8. Basic KERMIT Protocol State Table
|
||
|
|
||
|
The KERMIT protocol can be described as a set of states and transitions, and
|
||
|
rules for what to do when changing from one state to another. State changes
|
||
|
occur based on the type of packets that are sent or received, or errors that
|
||
|
may occur. Packets always go back and forth; the sender of a file always sends
|
||
|
data packets of some kind (init, header, data) and the receiver always returns
|
||
|
ACK or NAK packets.
|
||
|
|
||
|
Upon entering a given state, a certain kind of packet is either being sent or
|
||
|
is expected to arrive -- this is shown on top of the description of that state.
|
||
|
As a result of the action, various responses may occur; these are shown in the
|
||
|
EVENT column. For each event, an appropriate ACTION is taken, and the protocol
|
||
|
enters a NEW STATE.
|
||
|
|
||
|
The following table specifies basic KERMIT operation. Timeouts and error con-
|
||
|
ditions have been omitted from the following table for simplicity, but the ac-
|
||
|
tion is as described above. Server operation and some of the advanced features
|
||
|
are also omitted. A full-blown state table is given subsequently.
|
||
|
|
||
|
File Transfer Page 18
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
STATE EVENT ACTION NEW STATE
|
||
|
|
||
|
-- SEND STATES --
|
||
|
|
||
|
Send Send-Init Packet
|
||
|
S Get NAK,bad ACK (None) S
|
||
|
Get good ACK Set remote's params, open file SF
|
||
|
(Other) (None) A
|
||
|
|
||
|
Send File-Header Packet
|
||
|
SF Get NAK,bad ACK (None) SF
|
||
|
Get good ACK Get bufferful of file data SD
|
||
|
(Other) (None) A
|
||
|
|
||
|
Send File-Data Packet
|
||
|
SD Get NAK,bad ACK (None) SD
|
||
|
Get good ACK Get bufferful of file data SD
|
||
|
(End of file) (None) SZ
|
||
|
(Other) (None) A
|
||
|
|
||
|
Send EOF Packet
|
||
|
SZ Get NAK,bad ACK (None) SZ
|
||
|
Get good ACK Get next file to send SF
|
||
|
(No more files) (None) SB
|
||
|
(Other) (None) A
|
||
|
|
||
|
Send Break (EOT) Packet
|
||
|
SB Get NAK,bad ACK (None) SB
|
||
|
Get good ACK (None) C
|
||
|
(Other) (None) A
|
||
|
|
||
|
|
||
|
-- RECEIVE STATES --
|
||
|
|
||
|
Wait for Send-Init Packet
|
||
|
R Get Send-Init ACK w/local params RF
|
||
|
(Other) (None) A
|
||
|
|
||
|
Wait for File-Header Packet
|
||
|
RF Get Send-Init ACK w/local params
|
||
|
(previous ACK was lost) RF
|
||
|
Get Send-EOF ACK (prev ACK lost) RF
|
||
|
Get Break ACK C
|
||
|
Get File-Header Open file, ACK RD
|
||
|
(Other) (None) A
|
||
|
|
||
|
Wait for File-Data Packet
|
||
|
RD Get previous
|
||
|
packet(D,F) ACK it again RD
|
||
|
Get EOF ACK it, close the file RF
|
||
|
Get good data Write to file, ACK RD
|
||
|
(Other) (None) A
|
||
|
|
||
|
File Transfer Page 19
|
||
|
|
||
|
|
||
|
|
||
|
-- STATES COMMON TO SENDING AND RECEIVING --
|
||
|
|
||
|
C (Send Complete) start
|
||
|
A ("Abort") start
|
||
|
|
||
|
Packet Format Page 20
|
||
|
|
||
|
|
||
|
6. Packet Format
|
||
|
|
||
|
|
||
|
6.1. Fields
|
||
|
|
||
|
The KERMIT protocol is built around exchange of packets of the following for-
|
||
|
mat:
|
||
|
|
||
|
+------+-----------+-----------+------+------------+-------+
|
||
|
| MARK | char(LEN) | char(SEQ) | TYPE | DATA | CHECK |
|
||
|
+------+-----------+-----------+------+------------+-------+
|
||
|
|
||
|
where all fields consist of ASCII characters. The fields are:
|
||
|
|
||
|
MARK The synchronization character that marks the beginning of the packet.
|
||
|
This should normally be CTRL-A, but may be redefined.
|
||
|
|
||
|
LEN The number of ASCII characters within the packet that follow this
|
||
|
field, in other words the packet length minus two. Since this number
|
||
|
is transformed to a single character via the char() function, packet
|
||
|
character counts of 0 to 94 (decimal) are permitted, and 96 (decimal)
|
||
|
is the maximum total packet length. The length does not include end-
|
||
|
of-line or padding characters, which are outside the packet and are
|
||
|
strictly for the benefit of the operating system or communications
|
||
|
equipment, but it does include the block check characters.
|
||
|
|
||
|
SEQ The packet sequence number, modulo 64, ranging from 0 to 63. Sequence
|
||
|
numbers "wrap around" to 0 after each group of 64 packets.
|
||
|
|
||
|
TYPE The packet type, a single ASCII character. The following packet types
|
||
|
are required:
|
||
|
|
||
|
D Data packet
|
||
|
Y Acknowledge (ACK)
|
||
|
N Negative acknowledge (NAK)
|
||
|
S Send initiate (exchange parameters)
|
||
|
B Break transmission (EOT)
|
||
|
F File header
|
||
|
Z End of file (EOF)
|
||
|
E Error
|
||
|
T Reserved for internal use
|
||
|
|
||
|
The NAK packet is used only to indicate that the expected packet was
|
||
|
not received correctly, never to supply other kinds of information,
|
||
|
such as refusal to perform a requested service. The NAK packet always
|
||
|
has an empty data field. The T "packet" is used internally by many
|
||
|
KERMIT programs to indicate that a timeout occurred.
|
||
|
|
||
|
DATA The "contents" of the packet, if any contents are required in the given
|
||
|
type of packet, interpreted according to the packet type. Control
|
||
|
characters (bytes whose low order 7 bits are in the ASCII control range
|
||
|
0-31, or 127) are preceded by a special prefix character, normally "#",
|
||
|
and "uncontrollified" via ctl(). A prefixed sequence may not be broken
|
||
|
across packets. Logical records in printable files are delimited with
|
||
|
CRLFs, suitably prefixed (e.g. "#M#J"). Logical records need not cor-
|
||
|
respond to packets. Any prefix characters are included in the count.
|
||
|
|
||
|
Packet Format Page 21
|
||
|
|
||
|
|
||
|
Optional encoding for 8-bit data and repeated characters is described
|
||
|
later.
|
||
|
|
||
|
CHECK A block check on the characters in the packet between, but not includ-
|
||
|
ing, the mark and the block check itself. The check for each packet is
|
||
|
computed by both hosts, and must agree if a packet is to be accepted.
|
||
|
A single-character arithmetic checksum is the normal and required block
|
||
|
check. Only six bits of the arithmetic sum are included. In order
|
||
|
that all the bits of each data character contribute to this quantity,
|
||
|
bits 6 and 7 of the final value are added to the quantity formed by
|
||
|
bits 0-5. Thus if s is the arithmetic sum of the ASCII characters,
|
||
|
then
|
||
|
|
||
|
check = char((s + ((s AND 192)/64)) AND 63)
|
||
|
|
||
|
This is the default block check, and all Kermits must be capable of
|
||
|
performing it. Other optional block check types are described later.
|
||
|
|
||
|
The block check is based on the ASCII values of all the characters in
|
||
|
the packet, including control fields and prefix characters. Non-ASCII
|
||
|
systems must translate to ASCII before performing the block check cal-
|
||
|
culation.
|
||
|
|
||
|
|
||
|
6.2. Terminator
|
||
|
|
||
|
Any line terminator that is required by the system may be appended to the
|
||
|
packet; this is carriage return (ASCII 15) by default. Line terminators are
|
||
|
not considered part of the packet, and are included for in the count or check-
|
||
|
sum. Terminators are not necessary to the protocol, and are invisible to it,
|
||
|
as are any characters that may appear between packets. If a host cannot do
|
||
|
single character input from a TTY line, then a terminator will be required when
|
||
|
sending to that host. The terminator can be specified in the initial connec-
|
||
|
tion exchange.
|
||
|
|
||
|
Some KERMIT implementations also use the terminator for another reason
|
||
|
-- speed. Some systems are not fast enough to take in a packet and decode it
|
||
|
character by character at high baud rates; by blindly reading and storing all
|
||
|
characters between the MARK and the EOL, they are able to absorb the incoming
|
||
|
characters at full speed and then process them at their own rate.
|
||
|
|
||
|
|
||
|
6.3. Other Interpacket Data
|
||
|
|
||
|
The space between packets may be used for any desired purpose. Handshaking
|
||
|
characters may be necessary on certain connections, others may require screen
|
||
|
control or other sequences to keep the packets flowing.
|
||
|
|
||
|
Packet Format Page 22
|
||
|
|
||
|
|
||
|
6.4. Encoding, Prefixing, Block Check
|
||
|
|
||
|
MARK, LEN, SEQ, TYPE, and CHECK are control fields. Control fields are always
|
||
|
literal single-character fields, except that the CHECK field may be extended by
|
||
|
one or two additional check characters. Each control field is encoded by
|
||
|
char() or taken literally, but never prefixed. The control fields never con-
|
||
|
tain 8-bit data.
|
||
|
|
||
|
The DATA field contains a string of data characters in which any control
|
||
|
characters are encoded printably and preceded with the control prefix. The
|
||
|
decision to prefix a character in this way depends upon whether its low order 7
|
||
|
bits are in the ASCII control range, i.e. 0-31 or 127. Prefix characters that
|
||
|
appear in the data must themselves be prefixed by the control prefix, but un-
|
||
|
like control characters, these retain their literal value in the packet.
|
||
|
|
||
|
The treatment of the high order ("8th") bit of a data byte is as follows:
|
||
|
|
||
|
- If the communication channel allows 8 data bits per character, then
|
||
|
the original value of the 8th bit is retained in the prefixed charac-
|
||
|
ter. For instance, a data byte corresponding to a Control-A with the
|
||
|
8th bit set would be send as a control prefix, normally "#", without
|
||
|
the 8th bit set, followed by ctl(?A) with the 8th bit set. In binary
|
||
|
notation, this would be
|
||
|
|
||
|
00100011 10000001
|
||
|
|
||
|
In this case, the 8th bit is figured into all block check calcula-
|
||
|
tions.
|
||
|
|
||
|
- If the communication channel or one of the hosts required parity on
|
||
|
each character, and both sides were capable of 8th-bit prefixing,
|
||
|
then the 8th bit will be used for parity, and must not be included in
|
||
|
the block check. 8th bit prefixing is an option feature described in
|
||
|
greater detail in Section 8, below.
|
||
|
|
||
|
- If parity is being used but 8th-bit prefixing is not being done, then
|
||
|
the value of the 8th bit of each data byte will be lost and binary
|
||
|
files will not be transmitted correctly. Again, the 8th bit does not
|
||
|
figure into the block check.
|
||
|
|
||
|
The data fields of all packets are subject to prefix encoding, except S, I, and
|
||
|
A packets, and their ACKs (see below).
|
||
|
|
||
|
Initial Connection Page 23
|
||
|
|
||
|
|
||
|
7. Initial Connection
|
||
|
|
||
|
Initial connection occurs when the user has started up a Kermit program on both
|
||
|
ends of the physical connection. One Kermit has been directed (in one way or
|
||
|
another) to send a file, and the other to receive it.
|
||
|
|
||
|
The receiving Kermit waits for a "Send-Init" packet from the sending Kermit.
|
||
|
It doesn't matter whether the sending Kermit is started before or after the
|
||
|
receiving Kermit (if before, the Send-Init packet should be retransmitted
|
||
|
periodically until the receiving Kermit acknowledges it). The data field of
|
||
|
the Send-Init packet is optional; trailing fields can be omitted (or left
|
||
|
blank, i.e. contain a space) to accept or specify default values.
|
||
|
|
||
|
The Send-Init packet contains a string of configuration information in its data
|
||
|
field. The receiver sends an ACK for the Send-Init, whose data field contains
|
||
|
its own configuration parameters. The data field of the Send-Init and the ACK
|
||
|
to the Send-Init are literal, that is, there is no prefix encoding. This is
|
||
|
because the two parties will not know how to do prefix encoding until after the
|
||
|
configuration data is exchanged.
|
||
|
|
||
|
It is important to note that newly invented fields are added at the right, so
|
||
|
that old KERMIT programs that do not have code to handle the new fields will
|
||
|
act as if they were not there. For this reason, the default value for any
|
||
|
field, indicated by blank, should result in the behavior that occurred before
|
||
|
the new field was defined or added.
|
||
|
|
||
|
1 2 3 4 5 6 7 8 9 10...
|
||
|
+------+------+------+------+------+------+------+------+------+-------
|
||
|
| MAXL | TIME | NPAD | PADC | EOL | QCTL | QBIN | CHKT | REPT | CAPAS
|
||
|
+------+------+------+------+------+------+------+------+------+-------
|
||
|
|
||
|
The fields are as follows (the first and second person "I" and "you" are used
|
||
|
to distinguish the two sides). Fields are encoded printably using the char()
|
||
|
function unless indicated otherwise.
|
||
|
1. MAXL The maximum length packet I want to receive, a number up to 94
|
||
|
(decimal). You respond with the maximum you want me to send. This
|
||
|
allows systems to adjust to each other's buffer sizes, or to the con-
|
||
|
dition of the transmission medium.
|
||
|
|
||
|
2. TIME The number of seconds after which I want you to time me out while
|
||
|
waiting for a packet from me. You respond with the amount of time I
|
||
|
should wait for packets from you. This allows the two sides to ac-
|
||
|
commodate to different line speeds or other factors that could cause
|
||
|
timing problems. Only one side needs to time out. If both sides
|
||
|
time out, then the timeout intervals should not be close together.
|
||
|
|
||
|
3. NPAD The number of padding characters I want to precede each incoming
|
||
|
packet; you respond in kind. Padding may be necessary when sending
|
||
|
to a half duplex system that requires some time to change the direc-
|
||
|
tion of transmission, although in practice this situation is more
|
||
|
commonly handled by a "handshake" mechanism.
|
||
|
|
||
|
4. PADC The control character I need for padding, if any, transformed by
|
||
|
ctl() (not char()) to make it printable. You respond in kind. Nor-
|
||
|
mally NUL (ASCII 0), some systems use DEL (ASCII 127). This field is
|
||
|
|
||
|
Initial Connection Page 24
|
||
|
|
||
|
|
||
|
to be ignored if the value NPAD is zero.
|
||
|
|
||
|
5. EOL The character I need to terminate an incoming packet, if any. You
|
||
|
respond in kind. Most systems that require a line terminator for
|
||
|
terminal input accept carriage return for this purpose (note, because
|
||
|
there is no way to specify that no EOL should be sent, it would have
|
||
|
been better to use ctl() for this field rather than char(), but it's
|
||
|
too late now).
|
||
|
|
||
|
6. QCTL (verbatim) The printable ASCII character I will use to quote control
|
||
|
characters, normally and by default "#". You respond with the one
|
||
|
you will use.
|
||
|
|
||
|
The following fields relate to the use of OPTIONAL features of the KERMIT
|
||
|
protocol, described in section 8.
|
||
|
|
||
|
7. QBIN (verbatim) The printable ASCII character I want to use to quote
|
||
|
characters which have the 8th bit set, for transmitting binary files
|
||
|
when the parity bit cannot be used for data. Since this kind of
|
||
|
quoting increases both processor and transmission overhead, it is
|
||
|
normally to be avoided. If used, the quote character must be in the
|
||
|
range ASCII 33-62 ("!" through ">") or 96-126 ("`" through "~"), but
|
||
|
different from the control-quoting character. This field is inter-
|
||
|
preted as follows:
|
||
|
|
||
|
Y I agree to 8-bit quoting if you request it.
|
||
|
N I will not do 8-bit quoting.
|
||
|
& (or any other character in the range 33-62 or 96-126) I want to
|
||
|
do 8-bit quoting using this character (it will be done if the
|
||
|
other Kermit puts a Y in this field, or responds with the same
|
||
|
prefix character, such as &). The recommended 8th-bit quoting
|
||
|
prefix character is "&".
|
||
|
Anything Else : 8-bit quoting will not be done.
|
||
|
|
||
|
Note that this scheme allows either side to initiate the request, and
|
||
|
the order does not matter. For instance, a micro capable of 8-bit
|
||
|
communication will normally put a "Y" in this field whereas a
|
||
|
mainframe that uses parity will always put an "&". No matter who
|
||
|
sends first, this combination will result in election of 8th-bit
|
||
|
quoting.
|
||
|
|
||
|
8. CHKT Check Type, the method for detecting errors. "1" for single-charac-
|
||
|
ter checksum (the normal and required method), "2" for two-character
|
||
|
checksum (optional), "3" for three-character CRC-CCITT (optional).
|
||
|
If your response agrees, the designated method will be used; other-
|
||
|
wise the single-character checksum will be used.
|
||
|
|
||
|
9. REPT The prefix character I will use to indicate a repeated character.
|
||
|
This can be any printable character in the range ASCII 33-62 or
|
||
|
96-126, but different from the control and 8th-bit prefixes. SP (32)
|
||
|
denotes no repeat count processing is to be done. Tilde ("~") is the
|
||
|
recommended and normal repeat prefix. If you don't respond iden-
|
||
|
tically, repeat counts will not be done. Groups of at least 3 or 4
|
||
|
identical characters may be transmitted more efficiently using a
|
||
|
repeat count, though an individual implementation may wish to set a
|
||
|
different threshhold.
|
||
|
|
||
|
Initial Connection Page 25
|
||
|
|
||
|
|
||
|
10-?. CAPAS
|
||
|
A bit mask, in which each bit position corresponds to a capability of
|
||
|
KERMIT, and is set to 1 if that capability is present, or 0 if it is
|
||
|
not. Each character contains a 6-bit field (transformed by CHAR()),
|
||
|
whose low order bit is set to 1 if another capability byte follows,
|
||
|
and to 0 in the last capability byte. The capabilities defined so
|
||
|
far are:
|
||
|
|
||
|
#1 Reserved
|
||
|
#2 Reserved
|
||
|
#3 Ability to accept "A" packets (file attributes)
|
||
|
|
||
|
The capability byte as defined so far would then look like:
|
||
|
|
||
|
bit5 bit4 bit3 bit2 bit1 bit0
|
||
|
+----+----+----+----+----+----+
|
||
|
| #1 | #2 | #3 | -- | -- | 0 |
|
||
|
+----+----+----+----+----+----+
|
||
|
|
||
|
If all these capabilities were "on", the value of the byte would be
|
||
|
70 (octal). When capabilities 4, 5 and 6 are added, the capability
|
||
|
mask will look like this:
|
||
|
|
||
|
bit5 bit4 bit3 bit2 bit1 bit0 bit5 bit4 bit3 bit2 bit1 bit0
|
||
|
+----+----+----+----+----+----+ +----+----+----+----+----+----+
|
||
|
| #1 | #2 | #3 | #4 | #5 | 1 | | #6 | -- | -- | -- | -- | 0 |
|
||
|
+----+----+----+----+----+----+ +----+----+----+----+----+----+
|
||
|
|
||
|
Next 4: Reserved Fields
|
||
|
Sites that wish to add their own parameters to the initial connection
|
||
|
negotiation must start at the 5th field after the last capability
|
||
|
byte. Any intervening fields may be left blank (that is, they may
|
||
|
contain the space character). These fields are reserved for future
|
||
|
use by the standard KERMIT protocol.
|
||
|
|
||
|
The control, 8th-bit, and repeat prefixes must be distinct.
|
||
|
|
||
|
The receiving Kermit responds with an ACK ("Y") packet in the same format to
|
||
|
indicate its own preferences, options, and parameters. The ACK need not con-
|
||
|
tain the same number of fields as the the Send-Init. From that point, the two
|
||
|
KERMIT programs are "configured" to communicate with each other for the
|
||
|
remainder of the transaction. In the case of 8th-bit quoting, one side must
|
||
|
specify the character to be used, and the other must agree with a "Y" in the
|
||
|
same field, but the order in which this occurs does not matter. Similarly for
|
||
|
checksums -- if one side requests 2 character checksums and the other side
|
||
|
responds with a "1" or with nothing at all, then single-character checksums
|
||
|
will be done, since not all implementations can be expected to do 2-character
|
||
|
checksums or CRCs. And for repeat counts; if the repeat field of the send-init
|
||
|
and the ACK do not agree, repeat processing will not be done.
|
||
|
|
||
|
All Send-Init fields are optional. The data field may be left totally empty.
|
||
|
Similarly, intervening fields may be defaulted by setting them to blank. Ker-
|
||
|
mit implementations should know what to do in these cases, namely apply ap-
|
||
|
propriate defaults. The defaults should be:
|
||
|
|
||
|
MAXL: 80
|
||
|
|
||
|
Initial Connection Page 26
|
||
|
|
||
|
|
||
|
NPAD: 0, no padding
|
||
|
PADC: 0 (NUL)
|
||
|
EOL: CR (carriage return)
|
||
|
QCTL: the character "#"
|
||
|
QBIN: none, don't do 8-bit quoting
|
||
|
CHKT: "1", single-character checksum
|
||
|
REPT: No repeat count processing
|
||
|
MASK: All zeros (no special capabilities)
|
||
|
|
||
|
There are no prolonged negotiations in the initial connection sequence -- there
|
||
|
is one Send-Init and one ACK in reply. Everything must be settled in this ex-
|
||
|
change.
|
||
|
|
||
|
The very first Send-Init may not get through if the sending Kermit makes wrong
|
||
|
assumptions about the receiving host. For instance, the receiving host may re-
|
||
|
quire certain parity, some padding, handshaking, or a special end of line
|
||
|
character in order to read the Send-Init packet. For this reason, there should
|
||
|
be a way for the user the user to specify whatever may be necessary to get the
|
||
|
first packet through.
|
||
|
|
||
|
A parity field is not provided in the Send-Init packet because it could not be
|
||
|
of use. If the sender requires a certain kind of parity, it will also be send-
|
||
|
ing it. If the receiver does not know this in advance, i.e. before getting the
|
||
|
Send-Init, it will not be able to read the Send-Init packet.
|
||
|
|
||
|
Optional Features Page 27
|
||
|
|
||
|
|
||
|
8. Optional Features
|
||
|
|
||
|
The foregoing sections have discussed basic, required operations for any KERMIT
|
||
|
implementation. The following sections discuss optional and advanced features.
|
||
|
|
||
|
|
||
|
8.1. 8th-Bit and Repeat Count Prefixing
|
||
|
|
||
|
Prefix quoting of control characters is mandatory. In addition, prefixing may
|
||
|
also be used for 8-bit quantities or repeat counts, when both KERMIT programs
|
||
|
agree to do so. 8th-bit prefixing can allow 8-bit binary data pass through
|
||
|
7-bit physical links. Repeat count prefixing can improve the throughput of
|
||
|
certain kinds of files dramatically; binary files (particularly executable
|
||
|
programs) and structured text (highly indented or columnar text) tend to be the
|
||
|
major beneficiaries.
|
||
|
When more than one type of prefixing is in effect, a single data character can
|
||
|
be preceded by more than one prefix character. Repeat count processing can
|
||
|
only be requested by the sender, and will only be used by the sender if the
|
||
|
receiver agrees. 8th-bit prefixing is a special case because its use is nor-
|
||
|
mally not desirable, since it increases both processing and transmission over-
|
||
|
head. However, since it is the only straightforward mechanism for binary file
|
||
|
transfer available to those systems that usurp the parity bit, a receiver must
|
||
|
be able to request the sender to do 8th-bit quoting, since most senders will
|
||
|
not normally do it by default.
|
||
|
|
||
|
The repeat prefix is followed immediately by a single-character repeat count,
|
||
|
encoded printably via char(), followed by the character itself (perhaps
|
||
|
prefixed by control or 8th bit quotes, as explained below). The repeat count
|
||
|
may express values from 0 to 94. If a character appears more than 94 times in
|
||
|
a row, it must be "cut off" at 94, emitted with all appropriate prefixes, and
|
||
|
"restarted". The following table should clarify Kermit's quoting mechanism
|
||
|
(the final line shows how a sequence of 120 consecutive NULs would be encoded):
|
||
|
|
||
|
Quoted With
|
||
|
Character Representation Repeat Count for 6
|
||
|
A A ~(A ["(" is ASCII 40 - 32 = 6]
|
||
|
?A #A ~(#A
|
||
|
'A &A ~(&A
|
||
|
'?A &#A ~(&#A
|
||
|
# ## ~(##
|
||
|
'# &## ~(&##
|
||
|
& #& ~(#&
|
||
|
'& &#& ~(&#&
|
||
|
~ #~ ~(#~
|
||
|
'~ &#~ ~(&#~
|
||
|
NUL #@ ~~#@~:#@ [120 NULs]
|
||
|
|
||
|
A represents any printable character, ?A represents any control character, 'x
|
||
|
represents any character with the 8th bit set. The # character is used for
|
||
|
control-character quoting, and the & character for 8-bit quoting. The repeat
|
||
|
count must always precede any other prefix character. The repeat count is
|
||
|
taken literally (after transformation by unchar(); for instance "#" and "&" im-
|
||
|
mediately following a "~" denote repeat counts, not control characters or 8-bit
|
||
|
characters. The control quote character "#" is most closely bound to the data
|
||
|
character, then the 8-bit prefix, then the repeat count; in other words, the
|
||
|
|
||
|
Optional Features Page 28
|
||
|
|
||
|
|
||
|
order is: repeat prefix and count, 8-bit quote, control quote, and the data
|
||
|
character itself. To illustrate, note that &#A is not equivalent to #&A.
|
||
|
|
||
|
When the parity bit is available for data, then 8th-bit quoting should not be
|
||
|
done, and the 8th bit of the prefixed character will have the same value as the
|
||
|
8th bit of the original data byte. In that case, the table looks like this:
|
||
|
|
||
|
Quoted With
|
||
|
Character Representation Repeat Count for 6
|
||
|
'A 'A ~('A
|
||
|
'?A #'A ~(#'A
|
||
|
'# #'# ~(#'#
|
||
|
'& '& ~('&
|
||
|
'~ #'~ ~(#'~
|
||
|
|
||
|
Note that since 8th bit quoting is not being done, "&" is not being used as an
|
||
|
8th bit prefix character, so it does not need to be quoted with "#". Also,
|
||
|
note that the 8th bit is set on the final argument of the repeat sequence, no
|
||
|
matter how long, and not on any of the prefix characters.
|
||
|
|
||
|
Finally, remember the following rules:
|
||
|
|
||
|
- Prefixed sequences must not be broken across packets.
|
||
|
|
||
|
- Control, 8th-bit, and repeat count prefixes must be distinct.
|
||
|
|
||
|
- Data fields of all packets must pass through the prefix encoding
|
||
|
mechanism, except for S, I, and A packets, and ACKs to those packets.
|
||
|
|
||
|
In the first rule above, note that a prefixed sequence means a single character
|
||
|
and all its prefixes, like ~%&#X, not a sequence like #M#J, which is two
|
||
|
prefixed sequences.
|
||
|
|
||
|
|
||
|
8.2. Server Operation
|
||
|
|
||
|
A KERMIT server is a KERMIT program running remotely with no "user interface".
|
||
|
All commands to the server arrive in packets from the local KERMIT. SERVER
|
||
|
operation is much more convenient than basic operation, since the user need
|
||
|
never again interact directly with the remote KERMIT program after once start-
|
||
|
ing it up in server mode, and therefore need not issue complementary SEND and
|
||
|
RECEIVE commands on the two sides to get a file transfer started; rather, a
|
||
|
single command (such as SEND or GET) to the local KERMIT suffices. KERMIT ser-
|
||
|
vers can also provide services beyond file transfer.
|
||
|
|
||
|
Between transactions, a Kermit server waits for packets containing server com-
|
||
|
mands. The packet sequence number is always set back to 0 after a transaction.
|
||
|
A Kermit server in command wait should be looking for packet 0, and command
|
||
|
packets sent to servers should also be packet 0. Certain server commands will
|
||
|
result in the exchange of multiple packets. Those operations proceed exactly
|
||
|
like file transfer.
|
||
|
|
||
|
A KERMIT server program waiting for a command packet is said to be in "server
|
||
|
command wait". Once put into server command wait, the server should never
|
||
|
leave it until it gets a command packet telling it to do so. This means that
|
||
|
after any transaction is terminated, either normally or by any kind of error,
|
||
|
|
||
|
Optional Features Page 29
|
||
|
|
||
|
|
||
|
the server must go back into command wait. While in command wait, a server may
|
||
|
elect to send out periodic NAKs for packet 0, the expected command packet.
|
||
|
Since the user may be disconnected from the server for long periods of time
|
||
|
(hours), the interval between these NAKs should be significantly longer than
|
||
|
the normal timeout interval (say, 30-60 seconds, rather than 5-10). The peri-
|
||
|
odic NAKs are useful for breaking the deadlock that would occur if a local
|
||
|
program was unable to time out, and sent a command that was lost. On the other
|
||
|
hand, they can cause problems for local KERMIT programs that cannot clear their
|
||
|
input buffers, or for systems that do XON/XOFF blindly, causing the NAKs to
|
||
|
buffered in the server's host system output buffer, to be suddenly released en
|
||
|
masse when an XON appears. For this reason, servers should have an option to
|
||
|
set the command-wait wakeup interval, or to disable it altogher.
|
||
|
|
||
|
Server operation must be implemented in two places: in the server itself, and
|
||
|
in any KERMIT program that will be communicating with a server. The server
|
||
|
must have code to read the server commands from packets and respond to them.
|
||
|
The user KERMIT must have code to parse the user's server-related commands, to
|
||
|
form the server command packets, and to handle the responses to those server
|
||
|
commands.
|
||
|
|
||
|
|
||
|
8.2.1. Server Commands
|
||
|
|
||
|
Server commands are listed below. Not all of them have been implemented, and
|
||
|
some may never be, but their use should be reserved. Although server-mode
|
||
|
operation is optional, certain commands should be implemented in every server.
|
||
|
These include Send-Init (S), Receive-Init (R), and the Generic Logout (GL)
|
||
|
and/or Finish (GF) commands. If the server receives a command it does not un-
|
||
|
derstand, or cannot execute, it should respond with an Error (E) packet con-
|
||
|
taining a message like "Unimplemented Server Command" and both sides should set
|
||
|
the packet sequence number back to 0, and the server should remain in server
|
||
|
command wait. Only a GL or GF command should terminate server operation.
|
||
|
|
||
|
Server commands are as follows:
|
||
|
|
||
|
S Send Initiate (exchange parameters, server waits for a file).
|
||
|
R Receive Initiate (ask the server to send the specified files).
|
||
|
I Initialize (exchange parameters).
|
||
|
X Text header. Allows transfer of text to the user's screen in response to a
|
||
|
generic or host command. This works just like file transfer except that
|
||
|
the destination "device" is the screen rather than a file. Data field may
|
||
|
contain a filename, title, or other heading.
|
||
|
C Host Command. The data field contains a string to be executed as a command
|
||
|
by the host system command processor.
|
||
|
K KERMIT Command. The data field contains a string in the interactive com-
|
||
|
mand language of the KERMIT server (normally a SET command) to be executed
|
||
|
as if it were typed in at command level.
|
||
|
G Generic Kermit Command. Single character in data field (possibly followed
|
||
|
by operands, shown in {braces}, optional fields in [brackets]) specifies
|
||
|
the command:
|
||
|
|
||
|
I Login [{*user[*password[*account]]}]
|
||
|
C CWD, Change Working Directory [{*directory[*password]}]
|
||
|
L Logout, Bye
|
||
|
F Finish (Shut down the server, but don't logout).
|
||
|
D Directory [{*filespec}]
|
||
|
|
||
|
Optional Features Page 30
|
||
|
|
||
|
|
||
|
U Disk Usage Query [{*area}]
|
||
|
E Erase (delete) {*filespec}
|
||
|
T Type {*filespec}
|
||
|
R Rename {*oldname*newname}
|
||
|
K Copy {*source*destination}
|
||
|
W Who's logged in? (Finger) [{*user ID or network host[*options]}]
|
||
|
M Send a short Message {*destination*text}
|
||
|
H Help [{*topic}]
|
||
|
Q Server Status Query
|
||
|
P Program {*[program-filespec][*program-commands]}
|
||
|
J Journal {*command[*argument]}
|
||
|
V Variable {*command[*argument[*argument]]}
|
||
|
|
||
|
Note that field length encoding is used within the data field of all
|
||
|
Generic command packets, but not within the data fields of the other pack-
|
||
|
ets, such as S, I, R, X, K, and C.
|
||
|
|
||
|
Asterisk as used above ("*") represents a single-character length field, en-
|
||
|
coded using char(), for the operand that follows it; thus lengths from 0 to 94
|
||
|
may be specified. This allows multiple operands to be clearly delimited
|
||
|
regardless of their contents.
|
||
|
|
||
|
All server commands that send arguments in their data fields should pass
|
||
|
through the prefix encoding mechanism. Thus if a data character or length
|
||
|
field happens to correspond to an active prefix character, it must itself be
|
||
|
prefixed. The field length denotes the length of the field before prefix en-
|
||
|
coding and (hopefully) after prefix decoding. For example, to send a generic
|
||
|
command with two fields, "ABC" and "ZZZZZZZZ", first each field would be
|
||
|
prefixed by char() of its length, in this case char(3) and char(8), giving
|
||
|
"#ABC(ZZZZZZZZ". But "#" is the normal control prefix character so it must be
|
||
|
prefixed itself, and the eight Z's can be condensed to 3 characters using a
|
||
|
repeat prefix (if repeat counts are in effect), so the result after encoding
|
||
|
would be "##ABC(~(Z" (assuming the repeat prefix is tilde ("~"). The recipient
|
||
|
would decode this back into the original "#ABC(ZZZZZZZZ" before attempting to
|
||
|
extract the two fields.
|
||
|
|
||
|
Since a generic command must fit into a single packet, the program sending the
|
||
|
command should ensure that the command actually fits, and should not include
|
||
|
length fields that point beyond the end of the packet. Servers, however,
|
||
|
should be defensive and not attempt to process any characters beyond the end of
|
||
|
the data field, even if the argument length field would lead them to do so.
|
||
|
|
||
|
|
||
|
8.2.2. Timing
|
||
|
|
||
|
KERMIT does not provide a mechanism for suspending and continuing a trans-
|
||
|
action. This means that text sent to the user's screen should not be frozen
|
||
|
for long periods (i.e. not longer than the timeout period times the retry
|
||
|
threshold).
|
||
|
|
||
|
Between transactions, when the server has no tasks pending, it may send out
|
||
|
periodic NAKs (always with type 1 checksums) to prevent a deadlock in case a
|
||
|
command was sent to it but was lost. These NAKs can pile up in the local
|
||
|
"user" Kermit's input buffer (if it has one), so the user Kermit should be
|
||
|
prepared to clear its input buffer before sending a command to a server.
|
||
|
Meanwhile, servers should recognize that some systems provide no function to do
|
||
|
Optional Features Page 31
|
||
|
|
||
|
|
||
|
this (or even when they do, the process can be foiled by system flow control
|
||
|
firmware) and should therefore provide a way turn off or slow down the command-
|
||
|
wait NAKs.
|
||
|
|
||
|
|
||
|
8.2.3. The R Command
|
||
|
|
||
|
The R packet, generally sent by a local Kermit program whose user typed a GET
|
||
|
command, tells the server to send the files specified by the name in the data
|
||
|
field of the R packet. Since we can't assume that the two Kermits are running
|
||
|
on like systems, the local (user) Kermit must parse the file specification as a
|
||
|
character string and let the server to check it. If the server can open and
|
||
|
read the specified file, it sends a Send-Init (S) packet -- not an acknowledge-
|
||
|
ment! -- to the user, and then completes the file-sending transaction, as
|
||
|
described above.
|
||
|
|
||
|
If the server cannot send the file, it should respond with an error (E) packet
|
||
|
containing a reason, like "File not found" or "Read access required".
|
||
|
|
||
|
|
||
|
8.2.4. The K Command
|
||
|
|
||
|
The K packet can contain a character string which the server interprets as a
|
||
|
command in its own interactive command language. This facility is useful for
|
||
|
achieving the same effect as a direct command without having to shut down the
|
||
|
server, connect back to the remote system, continue it (or start a new one),
|
||
|
and issue the desired commands. The server responds with an ACK if the command
|
||
|
was executed successfully, or an error packet otherwise. The most likely use
|
||
|
for the K packet might be for transmitting SET commands, e.g. for switching be-
|
||
|
tween text and binary file modes.
|
||
|
|
||
|
|
||
|
8.2.5. Short and Long Replies
|
||
|
|
||
|
Any request made of a server may be answered in either of two ways, and any
|
||
|
User Kermit that makes such a request should be prepared for either kind of
|
||
|
reply:
|
||
|
|
||
|
- A short reply. This consists of a single ACK packet, which may con-
|
||
|
tain text in its data field. For instance, the user might send a
|
||
|
disk space query to the server, and the server might ACK the request
|
||
|
with a short character string in the data field, such as "12K bytes
|
||
|
free". The user KERMIT should display this text on the screen.
|
||
|
|
||
|
- A long reply. This proceeds exactly like a file transfer (and in
|
||
|
some cases it may be a file transfer). It begins with one of the
|
||
|
following:
|
||
|
|
||
|
* A File-Header (F) packet (optionally followed by one or more At-
|
||
|
tributes packets; these are discussed later);
|
||
|
|
||
|
* A Text-Header (X) packet.
|
||
|
|
||
|
* A Send-Init (S) Packet, followed by an X or F packet.
|
||
|
|
||
|
After the X or F packet comes an arbitrary number of Data (D) pack-
|
||
|
|
||
|
Optional Features Page 32
|
||
|
|
||
|
|
||
|
ets, then an End-Of-File (Z) packet, and finally a Break-Transmission
|
||
|
(B) packet, as for ordinary file transfer.
|
||
|
|
||
|
A long reply should begin with an S packet unless an I-packet exchange has al-
|
||
|
ready taken place, and the type 1 (single-character) block check is being used.
|
||
|
|
||
|
|
||
|
8.2.6. Additional Server Commands
|
||
|
|
||
|
The following server commands request the server to perform tasks other than
|
||
|
sending or receiving files. Almost any of these can have either short or long
|
||
|
replies. For instance, the Generic Erase (GE) command may elicit a simple ACK,
|
||
|
or a stream of packets containing the names of all the files it erased (or
|
||
|
didn't erase). These commands are now described in more detail; arguments are
|
||
|
as provided in commands typed to the user KERMIT (subject to prefix encoding);
|
||
|
no transformations to any kind of normal or canonic form are done -- filenames
|
||
|
and other operands are in the syntax of the server's host system.
|
||
|
|
||
|
I Login. For use when a KERMIT server is kept perpetually running on a dedi-
|
||
|
cated line. This lets a new user obtain an identity on the server's host
|
||
|
system. If the data field is empty, this removes the user's identity, so
|
||
|
that the next user does not get access to it.
|
||
|
|
||
|
L Logout, Bye. This shuts down the server entirely, causing the server it-
|
||
|
self to log out its own job. This is for use when the server has been
|
||
|
started up manually by the user, who then wishes to shut it down remotely.
|
||
|
For a perpetual, dedicated server, this command simply removes the server's
|
||
|
access rights to the current user's files, and leaves the server waiting
|
||
|
for a new login command.
|
||
|
|
||
|
F Finish. This is to allow the user to shut down the server, putting its
|
||
|
terminal back into normal (as opposed to binary or raw) mode, and putting
|
||
|
the server's job back at system command level, still logged in, so that the
|
||
|
user can connect back to the job. For a perpetual, dedicated server, this
|
||
|
command behaves as the L (BYE) command.
|
||
|
|
||
|
C CWD. Change Working Directory. This sets the default directory or area
|
||
|
for file transfer on the server's host. With no operands, this command
|
||
|
sets the default area to be the user's own default area.
|
||
|
|
||
|
D Directory. Send a directory listing to the user. The user program can
|
||
|
display it on the terminal or store it in a file, as it chooses. The
|
||
|
directory listing should contain file sizes and creation dates as well as
|
||
|
file names, if possible. A wildcard or other file-group designator may be
|
||
|
specified to ask the server list only those files that match. If no
|
||
|
operand is given, all files in the current area should be shown.
|
||
|
|
||
|
U Disk Usage Query. The server responds with the amount of space used and
|
||
|
the amount left free to use, in K bytes (or other units, which should be
|
||
|
specified).
|
||
|
|
||
|
E Erase (delete). Delete the specified file or file group.
|
||
|
|
||
|
T Type. Send the specified file or file group, indicating (by starting with
|
||
|
an X packet rather than an F packet, or else by using the Type attribute)
|
||
|
that the file is to be displayed on the screen, rather than stored.
|
||
|
Optional Features Page 33
|
||
|
|
||
|
|
||
|
R Rename. Change the name of the file or files as indicated. The string in-
|
||
|
dicating the new name may contain other attributes, such as protection
|
||
|
code, permitted in file specifications by the host.
|
||
|
|
||
|
K Copy. Produce a new copy of the file or file group, as indicated, leaving
|
||
|
the source file(s) unmodified.
|
||
|
|
||
|
W Who's logged in? (Finger). With no arguments, list all the users who are
|
||
|
logged in on the server's host system. If an argument is specified,
|
||
|
provide more detailed information on the specified user or network host.
|
||
|
|
||
|
M Short Message. Send the given short (single-packet) message to the in-
|
||
|
dicated user's screen.
|
||
|
|
||
|
P Program. This command has two arguments, program name (filespec), and
|
||
|
command(s) for the program. The first field is required, but may be left
|
||
|
null (i.e. zero length). If it is null, the currently loaded program is
|
||
|
"fed" the specified command. If not null, the specified program is loaded
|
||
|
and started; if a program command is given it is fed to the program as an
|
||
|
initial command (for instance, as a command line argument on systems that
|
||
|
support that concept). In any case, the output of the program is sent back
|
||
|
in packets as either a long or short reply, as described above.
|
||
|
|
||
|
J Journal. This command controls server transaction logging. The data field
|
||
|
contains one of the following:
|
||
|
|
||
|
+ Begin/resume logging transactions. If a filename is given, close any
|
||
|
currently open transaction and then open the specified file as the new
|
||
|
transaction log. If no name given, but a log file was already open,
|
||
|
resume logging to that file. If no filename was given and no log was
|
||
|
open, the server should open a log with a default name, like
|
||
|
TRANSACTION.LOG.
|
||
|
|
||
|
- Stop logging transactions, but don't close the current transaction log
|
||
|
file.
|
||
|
C Stop logging and close the current log.
|
||
|
|
||
|
S Send the transaction log as a file. If it was open, close it first.
|
||
|
|
||
|
Transaction logging is the recording of the progress of file transfers. It
|
||
|
should contain entries showing the name of each file transferred, when the
|
||
|
transfer began and ended, whether it completed successfully, and if not,
|
||
|
why.
|
||
|
|
||
|
V Set or Query a variable. The command can be S or Q. The first argument is
|
||
|
the variable name. The second argument, if any, is the value.
|
||
|
|
||
|
S Set the specified variable to the specified value. If the value is
|
||
|
null, then undefine the variable. If the variable is null then do
|
||
|
nothing. If the variable did not exist before, create it. The server
|
||
|
should respond with an ACK if successful, and Error packet otherwise.
|
||
|
|
||
|
Q Query the value of the named variable. If no variable is supplied,
|
||
|
display the value of all active variables. The server responds with
|
||
|
either a short or long reply, as described above. If a queried vari-
|
||
|
|
||
|
Optional Features Page 34
|
||
|
|
||
|
|
||
|
able does not exist, a null value is returned.
|
||
|
|
||
|
Variables are named by character strings, and have character string values,
|
||
|
which may be static or dynamic. For instance, a server might have built-in
|
||
|
variables like "system name" which never changes, or others like "mail
|
||
|
status" which, when queried, cause the server to check to see if the user
|
||
|
has any new mail.
|
||
|
|
||
|
|
||
|
8.2.7. Host Commands
|
||
|
|
||
|
Host commands are conceptually simple, but may be hard to implement on some
|
||
|
systems. The C packet contains a text string in its data field which is simply
|
||
|
fed to the server's host system command processor; any output from the proces-
|
||
|
sor is sent back to the user in KERMIT packets, as either a short or long
|
||
|
reply.
|
||
|
|
||
|
Implementation of this facility under UNIX, with its forking process structure
|
||
|
and i/o redirection via pipes, is quite natural. On other systems, it could be
|
||
|
virtually impossible.
|
||
|
|
||
|
|
||
|
8.2.8. Exchanging Parameters Before Server Commands
|
||
|
|
||
|
In basic KERMIT, the Send-Init exchange is always sufficient to configure the
|
||
|
two sides to each other. During server operation, on the other hand, some
|
||
|
transactions may not begin with a Send-Init packet. For instance, when the
|
||
|
user sends an R packet to ask the server to send a file, the server chooses
|
||
|
what block check option to use. Or if the user requests a directory listing,
|
||
|
the server does not know what packet length to use.
|
||
|
|
||
|
The solution to this problem is the "I" (Init-Info) packet. It is exactly like
|
||
|
a Send-Init packet, and the ACK works the same way too. However, receipt of an
|
||
|
I packet does not cause transition to file-send state. The I-packet exchange
|
||
|
simply allows the two sides to set their parameters, in preparation for the
|
||
|
next transaction.
|
||
|
|
||
|
Servers should be able to receive and ACK "I" packets when in server command
|
||
|
wait. User KERMITs need not send "I" packets, however; in that case, the serv-
|
||
|
er will assume all the defaults for the user listed on page 25, or whatever
|
||
|
parameters have been set by other means (e.g. SET commands typed to the server
|
||
|
before it was put in server mode).
|
||
|
|
||
|
User Kermits which send I packets should be prepared to receive and ignore an
|
||
|
Error packet in response. This could happen if the server has not implemented
|
||
|
I packets.
|
||
|
|
||
|
|
||
|
8.3. Alternate Block Check Types
|
||
|
|
||
|
There are two optional kinds of block checks:
|
||
|
|
||
|
Type 2
|
||
|
A two-character checksum based on the low order 12 bits of the arithmetic
|
||
|
sum of the characters in the packet (from the LEN field through the last
|
||
|
data character, inclusive) as follows:
|
||
|
|
||
|
Optional Features Page 35
|
||
|
|
||
|
|
||
|
1 2
|
||
|
--------+--------------+-------------+
|
||
|
...data | char(b6-b11) | char(b0-b5) |
|
||
|
--------+--------------+-------------+
|
||
|
|
||
|
For instance, if the 16-bit result is 154321 (octal), then the 2 character
|
||
|
block check would be "C1".
|
||
|
|
||
|
Type 3
|
||
|
Three-character 16-bit CRC-CCITT. The CRC calculation treats the data it
|
||
|
operates upon as a string of bits with the low order bit of the first
|
||
|
character first and the high order bit of the last character last. The in-
|
||
|
itial value of the CRC is taken as 0; the 16-bit CRC is the remainder after
|
||
|
16 12 5
|
||
|
dividing the data bit string by the polynomial X +X +X +1 (this calcula-
|
||
|
tion can actually be done a character at a time, using a simple table
|
||
|
lookup algorithm). The result is represented as three printable characters
|
||
|
at the end of the packet, as follows:
|
||
|
|
||
|
1 2 3
|
||
|
--------+---------------+--------------+-------------+
|
||
|
...data | char(b12-b15) | char(b6-b11) | char(b0-b5) |
|
||
|
--------+---------------+--------------+-------------+
|
||
|
|
||
|
For instance, if the 16-bit result is 154321 (octal), then the 3 character
|
||
|
block check would be "-C1". The CRC technique chosen here agrees with many
|
||
|
hardware implementations (e.g. the VAX CRC instruction). A useful refer-
|
||
|
ence on table-driven CRC calculations can be found in "Byte-wise CRC
|
||
|
Calculations" by Aram Perez in IEEE MICRO, June 1983, p.40.
|
||
|
|
||
|
The single-character checksum has proven quite adequate in practice. The other
|
||
|
options can be used only if both sides agree to do so via Init packet (S or I)
|
||
|
exchange. The 2 and 3 character block checks should only be used under con-
|
||
|
ditions of severe line noise and packet corruption.
|
||
|
|
||
|
Since type 2 and 3 block checks are optional, not all KERMITs can be expected
|
||
|
to understand them. Therefore, during initial connection, communication must
|
||
|
begin using the type 1 block check. If type 2 or 3 block checks are agreed to
|
||
|
during the "I" or "S" packet exchange, the switch will occur only after the
|
||
|
Send-Init has been sent and ACK'd with a type 1 block check. This means that
|
||
|
the first packet with a type 2 or 3 block check must always be an "F" or "X"
|
||
|
packet. Upon completion of a transaction, both sides must switch back to type
|
||
|
1 (to allow for the fact that neither side has any way of knowing when the
|
||
|
other side has been stopped and restarted). The transaction is over after a
|
||
|
"B" or "E" packet has been sent and ACK'd, or after any error that terminates
|
||
|
the transaction prematurely or abnormally.
|
||
|
|
||
|
A consequence of the foregoing rule is that if a type 2 or 3 block check is to
|
||
|
be used, a long reply sent by the server must begin with a Send-Init (S)
|
||
|
packet, even if an I packet exchange had already occurred. If type 1 block
|
||
|
checks are being used, the S packet can be skipped and the transfer can start
|
||
|
with an X or F packet.
|
||
|
|
||
|
A server that has completed a transaction and is awaiting a new command may
|
||
|
send out periodic NAKs for that command (packet 0). Those NAKs must have type
|
||
|
1 block checks.
|
||
|
|
||
|
Optional Features Page 36
|
||
|
|
||
|
|
||
|
The use of alternate block check types can cause certain complications. For
|
||
|
instance, if the server gets a horrible error (so bad that it doesn't even send
|
||
|
an error packet) and reverts to command wait, sending NAKs for packet 0 using a
|
||
|
type 1 block check, while a transfer using type 2 or 3 block checks was in
|
||
|
progress, neither side will be able to read the other's packets. Communication
|
||
|
can also grind to a halt if A sends a Send-Init requesting, say, type 3 block
|
||
|
checks, B ACKs the request, switches to type 3 and waits for the X or F packet
|
||
|
with a type 3 block check, but the ACK was lost, so A resends the S packet with
|
||
|
a type 1 block check. Situations like this will ultimately resolve themselves
|
||
|
after the two sides retransmit up to their retry threshhold, but can be rec-
|
||
|
tified earlier by the use of two heuristics:
|
||
|
|
||
|
- The packet reader can assume that if the packet type is "S", the
|
||
|
block check type is 1.
|
||
|
|
||
|
- A NAK packet never has anything in its data field. Therefore, the
|
||
|
block check type can always be deduced by the packet reader from the
|
||
|
length field of a NAK. In fact, it is the value of the length field
|
||
|
minus 2. A NAK can therefore be thought of as a kind of "universal
|
||
|
synchronizer".
|
||
|
|
||
|
These heuristics tend violate the layered nature of the protocol, since the
|
||
|
packet reader should normally be totally unconcerned with the packet type
|
||
|
(which is of interest to the application level which invokes the packet
|
||
|
reader). A better design would have had each packet include an indicator of
|
||
|
the type of its own block check; this would have allowed the block check type
|
||
|
to be changed dynamically during a transaction to adapt to changing conditions.
|
||
|
But it's too late for that now...
|
||
|
|
||
|
|
||
|
8.4. Interrupting a File Transfer
|
||
|
|
||
|
This section describes an optional feature of the KERMIT protocol to allow
|
||
|
graceful interruption of file transfer. This feature is unrelated to server
|
||
|
operation.
|
||
|
|
||
|
To interrupt sending a file, send an EOF ("Z") packet in place of the next data
|
||
|
packet, including a "D" (for Discard) in the data field. The recipient ACKs
|
||
|
the Z packet normally, but does not retain the file. This does not interfere
|
||
|
with older Kermits on the receiving end; they will not inspect the data field
|
||
|
and will close the file normally. The mechanism can be triggered by typing an
|
||
|
interrupt character at the console of the sending KERMIT program. If a
|
||
|
(wildcard) file group is being sent, it is possible to skip to the next file or
|
||
|
to terminate the entire batch; the protocol is the same in either case, but the
|
||
|
desired action could be selected by different interrupt characters, e.g. CTRL-X
|
||
|
to skip the current file, CTRL-Z to skip the rest of the batch.
|
||
|
|
||
|
To interrupt receiving a file, put an "X" in the data field of an ACK for a
|
||
|
data packet. To interrupt receiving an entire file group, use a "Z". The user
|
||
|
could trigger this mechanism by typing an interrupt character by typing, say,
|
||
|
CTRL-X and CTRL-Z, respectively, at the receiving KERMIT's console. A sender
|
||
|
that was aware of the new feature, upon finding one of these codes, would act
|
||
|
as described above, i.e. send a "Z" packet with a "D" code; a sender that did
|
||
|
not implement this feature would simply ignore the codes and continue sending.
|
||
|
In this case, and if the user wanted the whole batch to be cancelled (or only
|
||
|
one file was being sent), the receiving KERMIT program, after determining that
|
||
|
Optional Features Page 37
|
||
|
|
||
|
|
||
|
the sender had ignored the "X" or "Z" code, could send an Error (E) packet to
|
||
|
stop the transfer.
|
||
|
|
||
|
The sender may also choose to send a Z packet containing the D code when it
|
||
|
detects that the file it is sending cannot be sent correctly and completely
|
||
|
-- for instance, after sending some packets correctly, it gets an i/o error
|
||
|
reading the file. Or, it notices that the "8th bit" of a file byte is set when
|
||
|
the file is being sent as a text file and no provision has been made for trans-
|
||
|
mitting the 8th bit.
|
||
|
|
||
|
|
||
|
8.5. Transmitting File Attributes
|
||
|
|
||
|
The optional Attributes (A) packet provides a mechanism for the sender of a
|
||
|
file to provide additional information about it. This packet can be sent if
|
||
|
the receiver has indicated its ability to process it by setting the Attributes
|
||
|
bit in the capability mask. If both sides set this bit in the Kermit
|
||
|
capability mask, then the sender, after sending the filename in the "F" packet
|
||
|
and receiving an acknowledgement, may (but does not have to) send an "A" packet
|
||
|
to provide file attribute information.
|
||
|
|
||
|
Setting the Attributes bit in the capability mask does not indicate support for
|
||
|
any particular attributes, only that the receiver is prepared to accept the "A"
|
||
|
packet.
|
||
|
|
||
|
The attributes are given in the data field of the "A" packet. The data field
|
||
|
consists of 0 or more subfields, which may occur in any order. Each subfield
|
||
|
is of the following form:
|
||
|
|
||
|
+-----------+--------------+------+
|
||
|
| ATTRIBUTE | char(LENGTH) | DATA |
|
||
|
+-----------+--------------+------+
|
||
|
|
||
|
where
|
||
|
|
||
|
ATTRIBUTE is a single printable character other than space,
|
||
|
|
||
|
LENGTH is the length of the data characters (0 to 94), with 32 added to
|
||
|
produce a single printable character, and
|
||
|
|
||
|
DATA is length characters worth of data, all printable characters.
|
||
|
|
||
|
No quoting or prefixing is done on any of this data.
|
||
|
|
||
|
More than one attribute packet may be sent. The only requirement is that all
|
||
|
the A packets for a file must immediately follow its File header (or X) packet,
|
||
|
and precede the first Data packet.
|
||
|
|
||
|
There may be 93 different attributes, one for each of the 93 printable ASCII
|
||
|
characters other than space. These are assigned in ASCII order.
|
||
|
|
||
|
! (ASCII 33)
|
||
|
Length. The data field gives the length in K (1024) bytes, as a
|
||
|
printable decimal number, e.g. "!#109". This will allow the receiver
|
||
|
to determine in advance whether there is sufficient room for the
|
||
|
file, and/or how long the transfer will take.
|
||
|
|
||
|
Optional Features Page 38
|
||
|
|
||
|
|
||
|
" (ASCII 34)
|
||
|
Type. The data field can contain some indicator of the nature of the
|
||
|
file. Operands are enclosed in {braces}, optional items in
|
||
|
[brackets].
|
||
|
|
||
|
A[{xx}] ASCII text, containing no 8-bit quantities, logical records
|
||
|
(lines) delimited by the (quoted) control character sequence
|
||
|
{xx}, represented here by its printable counterpart (MJ =
|
||
|
CRLF, J = LF, etc). For instance AMJ means that the ap-
|
||
|
pearance of #M#J (the normal prefixed CRLF sequence) in a
|
||
|
file data packet indicates the end of a record, assuming the
|
||
|
current control prefix is "#". If {xx} is omitted, MJ will
|
||
|
be assumed.
|
||
|
|
||
|
B[{xx}] Binary. {xx} indicates in what manner the file is binary:
|
||
|
|
||
|
8 (default) The file is a sequence of 8-bit bytes, which
|
||
|
must be saved as is. The 8th bit may be sent "bare", or
|
||
|
prefixed according to the Send-Init negotiation about
|
||
|
8th-bit prefixing.
|
||
|
|
||
|
36 The file is a PDP-10 format binary file, in which five
|
||
|
7-bit bytes are fit into one 36-bit word, with the final
|
||
|
bit of each word being represented as the "parity bit" of
|
||
|
every 5th character (perhaps prefixed).
|
||
|
|
||
|
D{x} Moved from here to FORMAT attribute
|
||
|
|
||
|
F{x} Moved from here to FORMAT attribute
|
||
|
|
||
|
I[{x}] Image. The file is being sent exactly as it is represented
|
||
|
on the system of origin. For use between like systems.
|
||
|
There are {x} usable bits per character, before prefixing.
|
||
|
For instance, to send binary data from a system with 9-bit
|
||
|
bytes, it might be convenient to send three 6-bit characters
|
||
|
for every two 9-bit bytes. Default {x} is 8.
|
||
|
|
||
|
# (ASCII 35)
|
||
|
Creation Date, expressed as "[yy]yymmdd[ hh:mm[:ss]]" (ISO standard
|
||
|
julian format), e.g. 831009 23:59. The time is optional; if given,
|
||
|
it should be in 24-hour format, and the seconds may be omitted, and a
|
||
|
single space should separate the time from the date.
|
||
|
|
||
|
$ (ASCII 36)
|
||
|
Creator's ID, expressed as a character string of the given length.
|
||
|
|
||
|
% (ASCII 37)
|
||
|
Account to charge the file to, character string.
|
||
|
|
||
|
& (ASCII 38)
|
||
|
Area in which to store the file, character string.
|
||
|
' (ASCII 39)
|
||
|
Password for above, character string.
|
||
|
|
||
|
( (ASCII 40)
|
||
|
|
||
|
Optional Features Page 39
|
||
|
|
||
|
|
||
|
Block Size. The file has, or is to be stored with, the given block
|
||
|
size.
|
||
|
|
||
|
) (ASCII 41)
|
||
|
Access:
|
||
|
|
||
|
N New, the normal case -- create a new file of the given name.
|
||
|
S Supersede (overwrite) any file of the same name.
|
||
|
A Append to file of the given name.
|
||
|
|
||
|
* (ASCII 42)
|
||
|
Encoding:
|
||
|
|
||
|
A ASCII, normal ASCII encoding with any necessary prefixing, etc.
|
||
|
H Hexidecimal "nibble" encoding.
|
||
|
E EBCDIC (sent as if it were a binary file).
|
||
|
X Encrypted.
|
||
|
Q{x}
|
||
|
Huffman Encoded for compression. First x bytes of the file are
|
||
|
the key.
|
||
|
|
||
|
# (ASCII 43)
|
||
|
Disposition (operands are specified in the syntax of the receiver's
|
||
|
host system):
|
||
|
|
||
|
M{user(s)} Send the file as Mail to the specified user(s).
|
||
|
|
||
|
O{destination} Send the file as a lOng terminal message to the
|
||
|
specified destination (terminal, job, or user).
|
||
|
|
||
|
S[{options}] Submit the file as a batch job, with any specified
|
||
|
options.
|
||
|
|
||
|
P[{options}] Print the file on a system printer, with any
|
||
|
specified options, which may specify a particular
|
||
|
printer, forms, etc.
|
||
|
|
||
|
T Type the file on the screen.
|
||
|
|
||
|
L[{aaa}] Load the file into memory at the given address, if
|
||
|
any.
|
||
|
|
||
|
X[{aaa}] Load the file into memory at the given address and
|
||
|
eXecute it.
|
||
|
|
||
|
A Archive the file; save the file together with the at-
|
||
|
tribute packets that preceded it, so that it can be
|
||
|
sent back to the system of origin with all its at-
|
||
|
tributes intact. A file stored in this way should be
|
||
|
specially marked so that the KERMIT that sends it
|
||
|
back will recognize the attribute information as dis-
|
||
|
tinct from the file data.
|
||
|
|
||
|
, (ASCII 44)
|
||
|
Protection. Protection code for the file, in the syntax of the
|
||
|
receiver's host file system. With no operand, store according to the
|
||
|
|
||
|
Optional Features Page 40
|
||
|
|
||
|
|
||
|
system's default protection for the destination area.
|
||
|
|
||
|
- (ASCII 45)
|
||
|
Protection. Protection code for the file with respect to the
|
||
|
"public" or "world", expressed generically in a 6-bit quantity (made
|
||
|
printable by char()), in which the bits have the following meaning:
|
||
|
|
||
|
b0: Read Access
|
||
|
b1: Write Access
|
||
|
b2: Execute Access
|
||
|
b3: Append Access
|
||
|
b4: Delete Access
|
||
|
b5: Directory Listing
|
||
|
|
||
|
A one in the bit position means allow the corresponding type of ac-
|
||
|
cess, a zero means prohibit it. For example, the letter "E" in this
|
||
|
field would allow read, execute, and directory listing access
|
||
|
(unchar("E") = 69-32 = 37 = 100101 binary).
|
||
|
|
||
|
. (ASCII 46)
|
||
|
Machine and operating system of origin. This is useful in conjunc-
|
||
|
tion with the archive disposition attribute. It allows a file, once
|
||
|
archived, to be transferred among different types of systems, retain-
|
||
|
ing its archive status, until it finds its way to a machine with the
|
||
|
right characteristics to de-archive it. The systems are denoted by
|
||
|
codes; the first character is the major system designator, the second
|
||
|
designates the specific model or operating system. A third character
|
||
|
may be added to make further distinctions, for instance operating
|
||
|
system version. The systems below do not form a complete collection;
|
||
|
many more can and probably will be added.
|
||
|
|
||
|
A Apple microcomputers
|
||
|
|
||
|
1 Apple II, DOS
|
||
|
2 Apple III
|
||
|
3 Macintosh
|
||
|
4 Lisa
|
||
|
|
||
|
B Sperry (Univac) mainframes
|
||
|
|
||
|
1 1100 series, EXEC
|
||
|
|
||
|
C CDC mainframes
|
||
|
|
||
|
1 Cyber series, NOS
|
||
|
|
||
|
D DEC Systems
|
||
|
|
||
|
1 DECsystem-10/20, TOPS-10
|
||
|
2 DECsystem-10/20, TOPS-20
|
||
|
3 DECsystem-10/20, TENEX
|
||
|
4 DECsystem-10/20, ITS
|
||
|
5 DECsystem-10/20, WAITS
|
||
|
6 DECsystem-10/20, MAXC
|
||
|
7 VAX-11, VMS
|
||
|
8 PDP-11, RSX-11
|
||
|
Optional Features Page 41
|
||
|
|
||
|
9 PDP-11, IAS
|
||
|
A PDP-11, RSTS/E
|
||
|
B PDP-11, RT-11
|
||
|
C Professional-300, P/OS
|
||
|
D Word Processor (WPS or DECmate), WPS
|
||
|
|
||
|
D Honeywell mainframes
|
||
|
|
||
|
1 MULTICS systems
|
||
|
2 DPS series, running CP-6
|
||
|
|
||
|
F Data General machines
|
||
|
|
||
|
1 RDOS
|
||
|
2 AOS
|
||
|
|
||
|
G PR1ME machines, PRIMOS
|
||
|
|
||
|
H Hewlett-Packard machines
|
||
|
|
||
|
1 HP-1000, RTE
|
||
|
2 HP-3000, MPE
|
||
|
|
||
|
I IBM 370-series and compatible mainframes
|
||
|
|
||
|
1 VM/CMS
|
||
|
2 MVS/TSO
|
||
|
3 DOS
|
||
|
4 MUSIC
|
||
|
5 GUTS
|
||
|
6 MTS
|
||
|
|
||
|
J Tandy microcomputers, TRSDOS
|
||
|
|
||
|
K Atari micros, DOS
|
||
|
|
||
|
L-T Reserved
|
||
|
|
||
|
U Portable Operating or File Systems
|
||
|
|
||
|
1 UNIX
|
||
|
2 Software Tools
|
||
|
3 CP/M-80
|
||
|
4 CP/M-86
|
||
|
5 CP/M-68K
|
||
|
6 MP/M
|
||
|
7 Concurrent CP/M
|
||
|
8 MS-DOS
|
||
|
9 UCSD p-System
|
||
|
A MUMPS
|
||
|
|
||
|
/ (ASCII 47)
|
||
|
Format of the data within the packets.
|
||
|
|
||
|
A{xx} Variable length delimited records, terminated by the
|
||
|
character sequence {xx}, where xx is a string of one
|
||
|
|
||
|
Optional Features Page 42
|
||
|
|
||
|
|
||
|
or more control characters, represented here by their
|
||
|
unprefixed printable equivalents, e.g. MJ for ?M?J
|
||
|
(CRLF).
|
||
|
|
||
|
D{x} Variable length undelimited records. Each logical
|
||
|
record begins with an {x}-character ASCII decimal
|
||
|
length field (similar to ANSI tape format "D"). For
|
||
|
example, "D$" would indicate 4-digit length fields,
|
||
|
like "0132".
|
||
|
|
||
|
F{xxxx} Fixed-length undelimited records. Each logical
|
||
|
record is {xxxx} bytes long.
|
||
|
|
||
|
R{x} For record-oriented transfers, to be used in combina-
|
||
|
tion with one of the formats given above. Each
|
||
|
record begins (in the case of D format, after the
|
||
|
length field) with an x-character long position field
|
||
|
indicating the byte position within the file at which
|
||
|
this record is to be stored.
|
||
|
|
||
|
M{x} For record-oriented transfers, to be used in combina-
|
||
|
tion with one of the formats given above. Maximum
|
||
|
record length for a variable-length record.
|
||
|
|
||
|
0 (ASCII 48)
|
||
|
Special system-dependent parameters for storing the file on the sys-
|
||
|
tem of origin, for specification of exotic attributes not covered ex-
|
||
|
plicitly by any of the KERMIT attribute descriptors. These are given
|
||
|
as a character string in the system's own language, for example a
|
||
|
list of DCB parameters in IBM Job Control Language.
|
||
|
|
||
|
1-@ (ASCII 49-64)
|
||
|
Reserved
|
||
|
|
||
|
Other attributes can be imagined, and can be added later if needed. However,
|
||
|
two important points should be noted:
|
||
|
|
||
|
- The receiver may have absolutely no way of honoring, or even record-
|
||
|
ing, a given attribute. For instance, CP/M-80 has no slot for crea-
|
||
|
tion date or creator's ID in its FCB; the DEC-20 has no concept of
|
||
|
block size, etc.
|
||
|
|
||
|
- The sender may have no way of determining the correct values of any
|
||
|
of the attributes. This is particularly true when sending files of
|
||
|
foreign origin.
|
||
|
|
||
|
The "A" packet mechanism only provides a way to send certain information about
|
||
|
a file to the receiver, with no provision or guarantee about what the receiver
|
||
|
may do with it. That information may be obtained directly from the file's
|
||
|
directory entry (FCB, FDB, ...), or specified via user command.
|
||
|
|
||
|
The ACK to the "A" packet may in turn have information in its data field.
|
||
|
However, no complicated negotiations about file attributes may take place, so
|
||
|
the net result is that the receiver may either refuse the file or accept it.
|
||
|
The receiver may reply to the "A" packet with any of the following codes in the
|
||
|
data field of the ACK packet:
|
||
|
|
||
|
Optional Features Page 43
|
||
|
|
||
|
|
||
|
<null> (empty data field) I accept the file, go ahead and send it.
|
||
|
|
||
|
N[{xxx}]
|
||
|
I refuse the file as specified, don't send it; {xxx} is a string of
|
||
|
zero or more of the attribute characters listed above, to specify what
|
||
|
attributes I object to (e.g. "!" means it's too long, "&" means I don't
|
||
|
have write access to the specified area, etc).
|
||
|
|
||
|
Y[{xxx}]
|
||
|
I agree to receive the file, but I cannot honor attributes {xxx}, so I
|
||
|
will store the file according to my own defaults.
|
||
|
|
||
|
Y (degenerate case of Y{xxx}, equivalent to <null>, above)
|
||
|
|
||
|
How the receiver actually replies is an implementation decision. A NAK in
|
||
|
response to the "A" packet means, of course, that the receiver did not receive
|
||
|
the "A" correctly, not that it refuses to receive the file.
|
||
|
|
||
|
|
||
|
8.6. Advanced KERMIT Protocol State Table
|
||
|
|
||
|
The simple table presented previously is sufficient for a basic KERMIT im-
|
||
|
plementation. The following is a state table for the full Kermit protocol, in-
|
||
|
cluding both server mode and sending commands to a server Kermit. It does not
|
||
|
include handling of the file attributes packet (A). Note that states whose
|
||
|
names start with "Send" always send a packet each time they are entered (even
|
||
|
when the previous state was the same). States whose name starts with "Rec",
|
||
|
always wait for a packet to be received (up to the timeout value), and process
|
||
|
the received packet. States whose names do not include either send or receive
|
||
|
do not process packets directly. These are states which perform some local
|
||
|
operation and then change to another state.
|
||
|
|
||
|
The initial state is determined by the user's command. A "server" command
|
||
|
enters at Rec_Server_Idle. A "send" command enters at Send_Init. A "receive"
|
||
|
command (the old non-server version, not a "get" command) enters at Rec_Init.
|
||
|
Any generic command, the "get" command, and the "host" command enter at either
|
||
|
Send_Server_Init or Send_Gen_Cmd, depending upon the expected response.
|
||
|
|
||
|
Under "Rec'd Msg", the packet type of the incoming message is shown, followed
|
||
|
by the packet number in parentheses; (n) means the current packet number, (n-1)
|
||
|
and (n+1) mean the previous and next packet numbers (modulo 64), (0) means
|
||
|
packet number zero. Following the packet number may be slash and a letter, in-
|
||
|
dicating some special signal in the data field. For instance Z(n)/D indicates
|
||
|
a Z (EOF) packet, sequence number n, with a "D" in the data field.
|
||
|
|
||
|
Under "Action", "r+" means that the retry count is incremented and compared
|
||
|
with a threshhold; if the threshhold is exceeded, an Error packet is sent and
|
||
|
the state changes to "Abort". "n+" means that the packet number is incre-
|
||
|
mented, modulo 64, and the retry count, r, is set back to zero.
|
||
|
|
||
|
Optional Features Page 44
|
||
|
|
||
|
|
||
|
|
||
|
State Rec'd Msg Action Next state
|
||
|
|
||
|
Rec_Server_Idle -- Server idle, waiting for a message
|
||
|
|
||
|
Set n and r to 0
|
||
|
|
||
|
I(0) Send ACK Rec_Server_Idle
|
||
|
S(0) Process params,
|
||
|
ACK with params, n+ Rec_File
|
||
|
R(0) Save file name Send_Init
|
||
|
|
||
|
K, C or G(0) Short reply:
|
||
|
ACK(0)/reply Rec_Server_Idle
|
||
|
Long reply:
|
||
|
init needed Send_Init
|
||
|
init not needed, n+ Open_File
|
||
|
|
||
|
Timeout Send NAK(0) Rec_Server_Idle
|
||
|
Other Error Rec_Server_Idle
|
||
|
|
||
|
|
||
|
Rec_Init -- Entry point for non-server RECEIVE command
|
||
|
|
||
|
Set n and r to 0
|
||
|
|
||
|
S(0) Process params, send
|
||
|
ACK with params, n+ Rec_File
|
||
|
Timeout Send NAK(0), r+ Rec_Init
|
||
|
Other NAK Abort
|
||
|
|
||
|
|
||
|
Rec_File -- Look for a file header or EOT message
|
||
|
|
||
|
F(n) Open file, ACK, n+ Rec_Data
|
||
|
X(n) Prepare to type on
|
||
|
screen, ACK, n+ Rec_Data
|
||
|
B(n) ACK Complete
|
||
|
S(n-1) ACK with params, r+ Rec_File
|
||
|
Z(n-1) ACK, r+ Rec_File
|
||
|
Timeout NAK, r+ Rec_File
|
||
|
Other NAK Abort
|
||
|
|
||
|
|
||
|
Rec_Data -- Receive data up to end of file
|
||
|
|
||
|
D(n) Store data, ACK, n+;
|
||
|
If interruption wanted
|
||
|
include X or Z in ACK Rec_Data
|
||
|
D(n-1) Send ACK, r+ Rec-Data
|
||
|
Z(n) Close file, ACK, n+ Rec_File
|
||
|
Z(n)/D Discard file, ACK, n+ Rec_File
|
||
|
F(n-1) Send ACK, r+ Rec_Data
|
||
|
X(n-1) Send ACK, r+ Rec_Data
|
||
|
Timeout Send NAK, r+ Rec_Data
|
||
|
Other Send E Abort
|
||
|
|
||
|
Optional Features Page 45
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Send_Init -- Also entry for SEND command
|
||
|
|
||
|
Set n and r to 0, send S(0) with parameters
|
||
|
|
||
|
Y(0) Process params, n+ Open_File
|
||
|
N, Timeout r+ Send_Init
|
||
|
Other r+ Send_Init
|
||
|
|
||
|
|
||
|
Open_File -- Open file or set up text to send
|
||
|
|
||
|
Send_File
|
||
|
|
||
|
|
||
|
Send_File -- Send file or text header
|
||
|
|
||
|
Send F or X(n)
|
||
|
|
||
|
Y(n), N(n+1) Get first buffer of Send_Data or Send_Eof if
|
||
|
data, n+ empty file or text
|
||
|
N, Timeout r+ Send_File
|
||
|
Other Abort
|
||
|
|
||
|
|
||
|
Send_Data -- Send contents of file or textual information
|
||
|
|
||
|
Send D(n) with current buffer
|
||
|
|
||
|
Y(n), N(n+1) n+, Get next buffer Send_Data or Send_Eof if
|
||
|
at end of file or text
|
||
|
Y(n)/X or Z n+ Send_Eof
|
||
|
N, Timeout r+ Send_Data
|
||
|
Other Abort
|
||
|
|
||
|
|
||
|
Send_Eof -- Send end of file indicator
|
||
|
|
||
|
Send Z(n); if interrupting send Z(n)/D
|
||
|
|
||
|
Y(n), N(n+1) Open next file, n+ Send_File if more, or
|
||
|
Send_Break if no more
|
||
|
or if interrupt "Z".
|
||
|
N, Timeout r+ Send_Eof
|
||
|
Other Abort
|
||
|
|
||
|
|
||
|
Send_Break -- End of Transaction
|
||
|
|
||
|
Send B(n)
|
||
|
|
||
|
Y(n), N(0) Complete
|
||
|
N(n), Timeout Send_Break
|
||
|
Other Abort
|
||
|
|
||
|
Optional Features Page 46
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Send_Server_Init - Entry for Server commands which expect large response.
|
||
|
|
||
|
Send I(0) with parameters
|
||
|
|
||
|
Y(0) Process params Send_Gen_Cmd
|
||
|
N, Timeout r+ Send_Server_Init
|
||
|
E Use default params Send_Gen_Cmd
|
||
|
Other Abort
|
||
|
|
||
|
|
||
|
Send_Gen_Cmd - Entry for Server commands which expect short response (ACK)
|
||
|
|
||
|
Send G, R or C(0)
|
||
|
|
||
|
S(0) Process params,
|
||
|
ACK with params, n+ Rec_File
|
||
|
X(1) Setup to type on
|
||
|
terminal, n+ Rec_Data
|
||
|
Y(0) Type data on TTY Complete
|
||
|
N, Timeout r+ Send_Gen_Cmd
|
||
|
Other Abort
|
||
|
|
||
|
|
||
|
Complete -- Successful Completion of Transaction
|
||
|
|
||
|
Set n and r to 0;
|
||
|
If server, reset params, enter Rec_Server_Idle
|
||
|
otherwise exit
|
||
|
|
||
|
|
||
|
Abort -- Premature Termination of Transaction
|
||
|
|
||
|
Reset any open file, set n and r to 0
|
||
|
|
||
|
If server, reset params, enter Rec_Server_Idle
|
||
|
otherwise exit
|
||
|
|
||
|
|
||
|
Exit, Logout states
|
||
|
Exit or Logout
|
||
|
|
||
|
|
||
|
Note that the generic commands determine the next state as follows:
|
||
|
|
||
|
1. If the command is not supported, an error packet is sent and the
|
||
|
next state is "Abort".
|
||
|
|
||
|
2. If the command generates a response which can be fit into the data
|
||
|
portion of an ACK, an ACK is sent with the text (quoted as
|
||
|
necessary) in the data portion.
|
||
|
|
||
|
3. If the command generates a large response or must send a file, noth-
|
||
|
ing is sent from the Rec_Server_Idle state, and the next state is
|
||
|
either Send_Init (if either no I message was received or if alter-
|
||
|
|
||
|
Optional Features Page 47
|
||
|
|
||
|
|
||
|
nate block check types are to be used), or Open_File (if an I mes-
|
||
|
sage was received and the single character block check is to be
|
||
|
used).
|
||
|
|
||
|
4. If the command is Logout, an ACK is sent and the new state is
|
||
|
Logout.
|
||
|
|
||
|
5. If the command is Exit, an ACK is sent and the new state is Exit.
|
||
|
|
||
|
KERMIT Commands Page 48
|
||
|
|
||
|
|
||
|
9. KERMIT Commands
|
||
|
|
||
|
The following list of KERMIT commands and terms is suggested. It is not in-
|
||
|
tended to recommend a particular style of command parsing, only to promote a
|
||
|
consistent vocabulary, both in documentation and in choosing the names for com-
|
||
|
mands.
|
||
|
|
||
|
|
||
|
9.1. Basic Commands
|
||
|
|
||
|
SEND This verb tells a Kermit program to send one or more files from its own
|
||
|
file structure.
|
||
|
|
||
|
RECEIVE This verb should tell a Kermit program to expect one or more files to
|
||
|
arrive.
|
||
|
|
||
|
GET This verb should tell a user Kermit to send one or more files. Some
|
||
|
Kermit implementations have separate RECEIVE and GET commands; others
|
||
|
use RECEIVE for both purposes, which creates confusion.
|
||
|
|
||
|
Since it can be useful, even necessary, to specify different names for source
|
||
|
and destination files, these commands should take operands as follows (optional
|
||
|
operands in [brackets]):
|
||
|
|
||
|
SEND local-source-filespec [remote-destination-filespec]
|
||
|
If the destination file specification is included, this will go in the
|
||
|
file header packet, instead of the file's local name.
|
||
|
|
||
|
RECEIVE [local-destination-filespec]
|
||
|
If the destination filespec is given, the incoming file will be stored
|
||
|
under that name, rather than the one in the file header pakcet.
|
||
|
|
||
|
GET remote-source-filespec [local-destination-filespec]
|
||
|
If the destination filespec is given, the incoming file will be stored
|
||
|
under that name, rather than the one in the file header packet.
|
||
|
|
||
|
If a file group is being sent or received, alternate names should not be used.
|
||
|
|
||
|
|
||
|
9.2. Program Management Commands
|
||
|
|
||
|
EXIT Leave the KERMIT program, doing whatever cleaning up must be done
|
||
|
-- deassigning of devices, closing of files, etc.
|
||
|
|
||
|
QUIT Leave the KERMIT program without cleaning up, in such a manner as to
|
||
|
allow further manipulation of the files and devices.
|
||
|
|
||
|
PUSH Preserve the current KERMIT environment and enter the system command
|
||
|
processor.
|
||
|
|
||
|
TAKE Read and execute KERMIT program commands from a local file.
|
||
|
|
||
|
LOG Specify a log for file transfer transactions, or for terminal session
|
||
|
loggin.
|
||
|
|
||
|
KERMIT Commands Page 49
|
||
|
|
||
|
|
||
|
9.3. Terminal Emulation Commands
|
||
|
|
||
|
CONNECT This verb, valid only for a local Kermit, means to go into terminal
|
||
|
emulation mode; present the illusion of being directly connected as a
|
||
|
terminal to the remote system. Provide an "escape character" to allow
|
||
|
the user to "get back" to the local system. The escape character, when
|
||
|
typed, should take a single-character argument; the following are sug-
|
||
|
gested:
|
||
|
|
||
|
0 (zero) Transmit a NUL
|
||
|
B Transmit a BREAK
|
||
|
C Close the connection, return to local KERMIT command level
|
||
|
P Push to system command processor
|
||
|
Q Quit logging (if logging is being done)
|
||
|
R Resume logging
|
||
|
S Show status of connection
|
||
|
? Show the available arguments to the escape character
|
||
|
(a second copy of the escape character): Transmit the escape
|
||
|
character itself
|
||
|
|
||
|
Lower case equivalents should be accepted. If any invalid argument is
|
||
|
typed, issue a beep.
|
||
|
|
||
|
Also see the SET command.
|
||
|
|
||
|
|
||
|
9.4. Special User-Mode Commands
|
||
|
|
||
|
These commands are used only by Users of Servers.
|
||
|
|
||
|
BYE This command sends a message to the remote server to log itself out,
|
||
|
and upon successful completion, terminate the local Kermit program.
|
||
|
|
||
|
FINISH This command causes the remote server to shut itself down gracefully
|
||
|
without logging out its job, leaving the local KERMIT at KERMIT command
|
||
|
level, allowing the user to re-CONNECT to the remote job.
|
||
|
|
||
|
==============================================================================
|
||
|
|
||
|
|
||
|
/ File 05 / NIA069 /
|
||
|
/ DEPARTMENT OF THE ARMY FIELD MANUAL Part 02 of 02 /
|
||
|
/ Explosives and Demolitions /
|
||
|
/ extract. /
|
||
|
/ HEADQUATERS, DEPARTMENT OF THE ARMY /
|
||
|
/ February 1971 /
|
||
|
/ /
|
||
|
/ Typed by: Death Jester /
|
||
|
/ Date Typed In: 01DEC90 /
|
||
|
|
||
|
|
||
|
Section III. STEEL-CUTTING CHARGES [Part 02 of 02]
|
||
|
|
||
|
3-7. Cutting Steel With Explosives
|
||
|
|
||
|
a. IMPORTANT FACTORS. In the preparation of steel-cutting charges,
|
||
|
the factors of type, size and placement of the explosive are important
|
||
|
for successful operations. The confinement or tamping of the charge is
|
||
|
rarely practical or possible. Formulas for the computation of the size
|
||
|
of the charge vary with the type of steel--structural, high carbon, and
|
||
|
so forth. Placement of the charge in direct contact with the target is
|
||
|
more important with steel than with other materials.
|
||
|
(1) FORMULA FOR STRUCTURAL STEEL. Charges to cut I-beams,
|
||
|
builtup girders, steel plates, columns, and other structural steel
|
||
|
sections are computed by formal as follows:
|
||
|
P = 3/8 A or P = 0.375 A where,
|
||
|
P = pounds of TNT required,
|
||
|
A = cross-section area, in square inches, of the steel member to
|
||
|
be cut, and
|
||
|
3/8 = 0.375 = constant
|
||
|
(2) FORMULA FOR OTHER STEELS.
|
||
|
(a) The formula below is recommended for the computation of
|
||
|
block cutting charges for high-carbon or alloy steel, such as that found
|
||
|
in machinery.
|
||
|
P = D}
|
||
|
P = pounds of TNT
|
||
|
D = diameter or thickness in inches of section to be cut.
|
||
|
(b) For round steel bars, such as concrete reinforcing rods,
|
||
|
where the small size makes charge placement difficult or impossible and
|
||
|
for chains, cables, and steel rods, of a diameter of 2 inches or less,
|
||
|
use
|
||
|
P = D
|
||
|
P = pounds of TNT
|
||
|
D = diameter in inches of section to be cut.
|
||
|
Such steel, however, may be cut by "rule of thumb:"
|
||
|
For round bars up to 1 inch in diameter, use 1 pound TNT.
|
||
|
For round bars over 1 inch up to 2 inches in diameter, use 2 pounds
|
||
|
of TNT.
|
||
|
(3) RAILROAD RAIL. The height of ralroad rail is the critical
|
||
|
dimension for calculating explosive required. Rails 5 inches or more in
|
||
|
height may be cut with 1 pound of TNT. For rails less than 5 inches in
|
||
|
height, 1/2 pound of TNT is adequate.
|
||
|
(4) PROBLEM:
|
||
|
Determine the amount of TNT required to cut the steel I-beam shown in
|
||
|
figure 3-5. THe solution is given in the figure.
|
||
|
(5) PROBLEM:
|
||
|
How much TNT is needed to cut the steel chain in figure 3-6? The
|
||
|
solution is given in figure 3-6. Notice that the link is to be cut in
|
||
|
two places (one cut on each side) to cause complete failure. If the
|
||
|
explosive is long enough to bridge both sides of the link, or large
|
||
|
enough to fit snugly between the two links, use one charge; but if it is
|
||
|
not, use two separately primed charges.
|
||
|
(6) USE OF THE TABLE IN MAKING CALCULATIONS. Table 3-1 shows the
|
||
|
correct weight of TNT necessary to cut steel sections of various
|
||
|
dimensions calculated from the formula P = 3/8 A.
|
||
|
In using this table:
|
||
|
(a) Measure separately the rectangular sections of members.
|
||
|
(b) Find the corresponding charge for each section by using the
|
||
|
table.
|
||
|
(c) Total the charges for the sections.
|
||
|
(d) Use the next larger given dimension if dimensions of section
|
||
|
do not appear in the table.
|
||
|
(7) SOLUTION.
|
||
|
The problem in figure 3-5 may be solved as folows:
|
||
|
Charge for flanges: Charge for web:
|
||
|
width = 5 inches height = 11 inches
|
||
|
thickness = 1/2 inch thickness = 3/8 inch
|
||
|
Charge from table = Charge from table =
|
||
|
1.0 pounds 1.6 pounds
|
||
|
Total charge: 2 flanges = 2 x 1.0 = 2.0 pounds
|
||
|
web = 1 x 1.6 = 1.6 pounds
|
||
|
----------
|
||
|
3.6 pounds
|
||
|
Use 4 pounds of TNT.
|
||
|
|
||
|
b. FORMULAS FOR PLASTIC OR SHEET EXPLOSIVE CHARGES. When using
|
||
|
plastic explosives (M5A1 or M112) charges or sheet explosive (M118 or
|
||
|
M186) charges, which may be cut to fit the target and attached to the
|
||
|
surface of the target with little or no air gap, the following formulas,
|
||
|
based upon optimum charge configuration and optimum contact with the
|
||
|
target, may be used. The following charge calculations are based upon
|
||
|
the dimensions of the target, and with some practice these charges may
|
||
|
be calculated, prepared, and placed in less time than the charges
|
||
|
calculated by the formulas listed above. Thes charges may also be
|
||
|
prepared in advance for transportation to the site by wrapping them in
|
||
|
aluminum foil or heavy paper. The wrapper should be removed when the
|
||
|
charge is attached to the target. When preparing these charges the
|
||
|
explosive should be cut to the proper dimensions, not molded, as molding
|
||
|
the explosive will reduce its density thereby decreasing its
|
||
|
effectiveness.
|
||
|
(1) RIBBON CHARGE METHOD. The charge, if properly calculated and
|
||
|
placed, cuts stell with considerably less explosive than standard
|
||
|
charges. It is effective on noncircular steel targets up to 3 inches
|
||
|
thick (fig 3-7). Although this charge is based upon the used of C4
|
||
|
plastic explosive, sheet explosive may be used provided the 1/4- by 3 by
|
||
|
12-inch sheets of flexible explosive are used intact and complete
|
||
|
charges are at least 1/2 inch thick.
|
||
|
(a) CALCULATION. The effectiveness of the explosive depends
|
||
|
upon the width and thickness of the explosive. THe thickness of the
|
||
|
charge is one half the thickness of the stell. The width of the charge
|
||
|
is three times the thickness of the charge. The length of the charge
|
||
|
should be equal to the length of the desired cut.
|
||
|
(b) EXAMPLE. Determine the thickness and width of a ribbon
|
||
|
charge for cutting a steel plate 1 inch thick.
|
||
|
Charge thickness = 1/2 steel thickness
|
||
|
Charge thickness = 1/2(1) = 1/2 inch
|
||
|
Charge width = 3 times charge thickness
|
||
|
Charge width = 3(1/2) = 3/2 = 1 1/2 inches
|
||
|
Charge is 1/2 inch thick and 1 1/2 inches wide.
|
||
|
(c) DETONTATION. The ribbon charge may be detonated from the
|
||
|
center or from either end. It may be necessary when the charge
|
||
|
thickness is small (less than 3/4 inch) to place extra explosive around
|
||
|
or over the blasting cap.
|
||
|
(d) USE OF STRUCTURAL STEEL SECTIONS. The ribbon charge
|
||
|
(computed by formula given in (b) above) has proven applicable to
|
||
|
cutting structural steel sections (fig 3-8).
|
||
|
On wide-flange or I-beams of less than 2 inches of steel thickness, a
|
||
|
C-shaped charge is placed on one side to cut the web and half the top
|
||
|
and bottom flanges. THe other sides of these flanges are cut by two
|
||
|
offset ribbon charges, placed so that once edge is opposite the center
|
||
|
of th C-shaped charge as shown in A, figure 3-8. For beams with steel
|
||
|
thickness of 2 inches and over, the offset charges are placed so that
|
||
|
one edge is opposite the edge of the C-shaped charge as shown in B,
|
||
|
figure 3-8. FOr acceptable results, the charges must be detonated at
|
||
|
the SAME INSTANT. This is accomplished by priming the charges with
|
||
|
three exactly EQUAL LENGTHS of detonating cord with blasting caps
|
||
|
attached and placed in the charges as shown in C, figure 3-8. The
|
||
|
detonating cord primer may be initiated by an electric or nonelectric
|
||
|
system. Simultaneous detonation may also be accomplished with M6
|
||
|
electric blasting caps wired in series in the same circuit.
|
||
|
(2) CROSS FRACTURE METHOD (SADDLE CHARGE) FOR CUTTING MILLED STEEL
|
||
|
BARS. This method of steel cutting utilizes the destructive effect of
|
||
|
the end split or cross fracture formed in steel at the end of a charge
|
||
|
opposite the end where detonation was initiated. This technique may be
|
||
|
used on round, square, or rectangular milled steel bars up to 8 inches
|
||
|
square or 8 inches diameter. The cross fracture method uses a charge
|
||
|
cut in the shape of a triangle and is called a SADDLE CHARGE (fig 3-9).
|
||
|
(a) CALCULATION. The dimensions of the saddle charge are
|
||
|
computed from the dimensions of the target as follows:
|
||
|
Thickness of charge = 1 inch (thickness of M112 block of plastic
|
||
|
explosive).
|
||
|
Base of charge = 1/2 circumference of target.
|
||
|
Long axis of charge = Circumference of target.
|
||
|
(b) EXAMPLE. Determine the dimensions of a charge for cutting a
|
||
|
shaft 18 inches in circumference (may be measured with a string).
|
||
|
Thickness = 1 inch
|
||
|
Base = 1/2 x 18 = 9 inches
|
||
|
Long axis = 18 inches
|
||
|
Charge is 9 inches at base, 18 inches at long axis, and 1 inch thick.
|
||
|
(c) DETONATION. Detonation of the saddle charge is by the
|
||
|
placement of a military electric or nonelectric blasting cap at the apex
|
||
|
of the long axis.
|
||
|
(d) PLACEMENT. The long axis of the saddle charge should be
|
||
|
parallel with the long axis of the target. THe charge should be cut to
|
||
|
the correct shape and dimensions and then molded around the target,
|
||
|
taking care to insure that the charge is in intimate contact with the
|
||
|
target. This may be accomplished by taping the charge to the target.
|
||
|
|
||
|
(3) STRESS WAVE METHOD (DIAMOND CHARGE). This method of steel
|
||
|
cutting utilizes the destructive effect of tensile fractures induced
|
||
|
through the interaction of two colliding shock wave fronts from an
|
||
|
explosive charge simultaneously detonated at opposite ends. This
|
||
|
techniquie may be used on high carbon steel or steel alloy bars either
|
||
|
circular or square in cross section. The stress wave method uses a
|
||
|
charge cut in the shape of a diamond, and thus called a diamond charge
|
||
|
(fig 3-10).
|
||
|
(a) CALCULATION. The dimensions of the diamond charge are
|
||
|
computed from the dimensions of the target as follows:
|
||
|
Thickness of charge = 1 inch (thickness of M112 block of plastic
|
||
|
explosive).
|
||
|
Long axis of charge = Circumference of target.
|
||
|
Short axis of charge = 1/2 the circumference of the target.
|
||
|
(b) EXAMPLE. Determine the size of a charge for cutting a steel
|
||
|
alloy shaft 15 inches in circumference.
|
||
|
Thickness = 1 inch
|
||
|
Long axis = 15 inches
|
||
|
Short axis = 1/2 x 15 = 7 1/2 inches
|
||
|
Charge is 15 inches at long axis, 7 1/2 inches at short axis, and 1 inch
|
||
|
thick.
|
||
|
(c) DETONATION. The detonation of diamond charge must be done
|
||
|
SIMULTANEOUSLY from both short axis ends. This may be done by priming
|
||
|
with two pieces of detonating cord of the SAME LENGTH with nonelectric
|
||
|
blasting caps crimped to the ends. The detonating cord primers may be
|
||
|
detonated with an electric or nonelectric blasting cap. Simultaneous
|
||
|
detonation may also be accomplished with M6 electric blasting caps wired
|
||
|
in series in the same circuit.
|
||
|
(d) PLACEMENT. Wrap the explosive completely around the target
|
||
|
so that the ends of the long axis touch. It may be necessary to
|
||
|
slightly increase the dimensions of the charge so this may accomplished.
|
||
|
If necessary to insure complete contact with the target, tape the charge
|
||
|
to the target.
|
||
|
|
||
|
3-9. Charge Placement
|
||
|
|
||
|
a. STEEL SECTIONS. The size and type of a steel section determine
|
||
|
the placement of the explosive charge. Some elongated sections may be
|
||
|
cut by placing the explosive on one side of the section completely along
|
||
|
the proposed line of rupture. In some steel trusses in which the
|
||
|
individual memebers are fabricated from two or more primary sections,
|
||
|
such as angle irons or bars separated by space washers or gusset plates,
|
||
|
the charge must be placed with the opposing portions of the charge
|
||
|
offset the same distance as the thickness of the section being cut to
|
||
|
produce a shearing action (para 3-8b(1)(d)). Heavier I-beams, wide
|
||
|
flange beams, and columns may also require auxilliary charges placed on
|
||
|
the outside of the flanges. Care must be taken to insure that opposing
|
||
|
charges are never directly opposite each other, otherwise they tend to
|
||
|
neutralize the explosive effect.
|
||
|
|
||
|
b. RODS, CHAINS, AND CABLES. Block explosive, often difficult to
|
||
|
emplace, is not recommended for cutting steel rods, chains, and cables
|
||
|
if plastic explosive is available.
|
||
|
|
||
|
c. STEEL MEMBERS AND RAILROD RAILS. Charge placement for cutting
|
||
|
these are found in figures 3-11 and 4-39.
|
||
|
|
||
|
d. BUILT-UP MEMBERS. Built-up members frequently have an irregular
|
||
|
shape, which makes it difficult to obtain a close contact between the
|
||
|
explosive charge and all of the surface. If it is impractical to
|
||
|
distribute the charge properly to obtain close contact, the amount of
|
||
|
explosive should be increased.
|
||
|
|
||
|
e. IRREGULAR STEEL SHAPES. Composition C4 is a good explosive for
|
||
|
cutting irregular steel shapes because it is easily molded or pressed
|
||
|
into place to give maximum contact. In the case of the M5A1 block
|
||
|
charge, which uses C4, a light coating of adhesive compound or
|
||
|
automotive grease (GAA) applied to the steel surface will help hold the
|
||
|
explosive on the target. The M112 block, which also uses C4, and the
|
||
|
M118 sheet explosive have an adhesive coating on one side, which makes
|
||
|
placement easier.
|
||
|
|
||
|
f. SECURING EXPLOSIVES IN PLACE. All explosives except adhesive
|
||
|
types must be tied, taped, wedged in place unless they rest on
|
||
|
horizontal surfaces and are not in danger of being jarred out of place.
|
||
|
|
||
|
g. PRECAUTIONS. In cutting steel, the charge should be placed on the
|
||
|
same side as the firing party, as explosive charges throw steel
|
||
|
fragments (missiles) long distance at high velocities.
|
||
|
|
||
|
Section IV. PRESSURE CHARGES
|
||
|
|
||
|
3-10. Size of Charge
|
||
|
|
||
|
The pressure charge is used for the demolition of reinforced concrete
|
||
|
T-beam bridge superstructures. Since it requires the use of more
|
||
|
explosives than breaching charges, with comparable placement, it has
|
||
|
been replaced by the breaching charge (para 3-12 - 3-14).
|
||
|
|
||
|
a. FORMULA FOR TAMPED PRESSURE CHARGES. The amount of TNT required
|
||
|
for a tamped pressure charge is calculated by the formula below. If
|
||
|
explosive other than TNT is used, the calculated value must be divided
|
||
|
by the relative effectiveness factor.
|
||
|
P = 3H}T
|
||
|
P = pounds of TNT required for each beam (stringer)
|
||
|
H = height of beam (including thickness of roadway) in feet
|
||
|
T = thickness of beam in feet.
|
||
|
|
||
|
b. FORMULA FOR UNTAMPED PRESSURE CHARGES. The valure calculated for
|
||
|
P by the above formula is increased by one-third if the pressure charge
|
||
|
is not tamped to a minimum of 10 inches (P = 4H}T).
|
||
|
|
||
|
3-11. Charge Placement and Tamping
|
||
|
|
||
|
a. PLACEMENT. The correct amount of explosive is placed on the
|
||
|
roadway over the centerline of each stringer (fig 3-12) and alined
|
||
|
between the ends of the span. If a curb or sied rail prevents placing
|
||
|
the charge directly above the outside stringer, it is placed against
|
||
|
the curb or side rail. This does not require an increase in the size of
|
||
|
the explosive charge (See also para 4-22).
|
||
|
|
||
|
b. TAMPING. Pressure charges should be tamped whenever possible.
|
||
|
Effective tamping require a minimum of 10 inches of material. All
|
||
|
charges are primed to fire simultaneously.
|
||
|
|
||
|
Section V. BREACHING CHARGES
|
||
|
|
||
|
3-12. Critical Factors and Computation
|
||
|
|
||
|
Breaching charges are applied chiefly to the destruction of concrete
|
||
|
slab bridges, bridge beams, bridge piers, bridge abutments, and
|
||
|
permanent field fortifications. The size and shape, placement, and
|
||
|
tamping or confinement of the breaching charge are critical factors--
|
||
|
the size and confinement of the explosive being relatively more
|
||
|
important because of strength and bulk of the material to be breached.
|
||
|
High explosive breaching charges detonated in or against a target must
|
||
|
produce and transmit enough energy to the target to crater and spall the
|
||
|
material. THe metal reinforcing bars in reinforced concrete are not cut
|
||
|
by breaching charges. If it is necessary to remove or cut the
|
||
|
reinforcement, the necessary steel cutting formula is used after the
|
||
|
concrete is breached.
|
||
|
|
||
|
a. CALCULATION FORMULA. The size of a charge required to breach
|
||
|
concrete, masonry, rock or similar material is calculated by the formula
|
||
|
below. By proper adjustment of the P-value, the charge size for any
|
||
|
explosive may be readily determined.
|
||
|
P = R(cubed) KC where;
|
||
|
P = pounds of TNT required,
|
||
|
R = breaching radius (b below),
|
||
|
K = material factor, given in table 3-4, which reflects the
|
||
|
strength, hardness and mass of the material to be demolished (c
|
||
|
below),
|
||
|
C = a tamping factor, given in figure 3-13, which depends on the
|
||
|
location and tamping of the charge (d below)
|
||
|
|
||
|
b. BREACHING RADIUS R. The breaching radius R is the distance in
|
||
|
feet from an explosive in which all material is displaced or destroyed.
|
||
|
The breaching radius for external charges is the thickness of the mass
|
||
|
to be breached. The breaching radius for internal charges is one-half
|
||
|
the thickness of the mass to be breached if the charge is placed midway
|
||
|
into the mass. If holes are drilled less than halfway into the mass,
|
||
|
the breaching radius becomes the longer distance from center of the
|
||
|
charge to the outside of the mass. For example, if a 4-foot wall is to
|
||
|
be breached by an internal charge placed 1 foot into the wall, the
|
||
|
breaching radius is 3 feet. If it is to be breached by a centered
|
||
|
internal charge, the breaching radius is 2 foeet. The breaching radius
|
||
|
is 4 feet is an external charge is used. Values of R are rounded off to
|
||
|
the next highest 1/2-foot for external charges, and to the next highest
|
||
|
1/4-foot for internal charges.
|
||
|
|
||
|
c. MATERIAL FACTOR K. K is the factor that reflects the strength and
|
||
|
hardness of the material to be breached. Table 3-2, gives values for
|
||
|
the factor K for various types and thicknesses of material. If the type
|
||
|
of material in the object is in doubt, it is always assumed to be of the
|
||
|
stronger type. Concrete is assumed to be reinforced, unless it is known
|
||
|
not to be.
|
||
|
|
||
|
TABLE 3-2. VALUES OF K(MATERIAL FACTOR) FOR BREACHING CHARGES.
|
||
|
-------------------------!--------------------!------!
|
||
|
MATERIAL ! BREACHING RADIUS ! K !
|
||
|
-------------------------!--------------------!------!
|
||
|
Ordinary earth ! All values ! 0.07 !
|
||
|
-------------------------!--------------------!------!
|
||
|
Poor masonry, shale, ! Less than 5 ft ! 0.32 !
|
||
|
hardpan: Good Timber ! 5 ft or more ! 0.29 !
|
||
|
and earth construction ! ! !
|
||
|
-------------------------!--------------------!------!
|
||
|
Good masonry ! 1 ft or less ! 0.88 !
|
||
|
ordinary concrete ! 1.5-2.5 ft ! 0.48 !
|
||
|
rock ! 3.0-4.5 ft ! 0.40 !
|
||
|
! 5.0-6.5 ft ! 0.32 !
|
||
|
! 7 ft or more ! 0.27 !
|
||
|
-------------------------!--------------------!------!
|
||
|
Dense concrete ! 1 ft or less ! 1.14 !
|
||
|
first-class masonry ! 1.5-2.5 ft ! 0.62 !
|
||
|
! 3.0-4.5 ft ! 0.52 !
|
||
|
! 5.0-6.5 ft ! 0.41 !
|
||
|
! 7 ft or more ! 0.35 !
|
||
|
-------------------------!--------------------!------!
|
||
|
Reinforced concrete ! 1 ft or less ! 1.76 !
|
||
|
(concrete only: Will not ! 1.5-2.5 ft ! 0.96 !
|
||
|
cut reinforcing steel) ! 3.0-4.5 ft ! 0.80 !
|
||
|
! 5.0-6.5 ft ! 0.63 !
|
||
|
! 7 ft or more ! 0.54 !
|
||
|
-------------------------!--------------------!------!
|
||
|
|
||
|
d. TAMPING FACTOR C. The value of the tamping factor C depends on
|
||
|
the location and the tamping of the charge. Figure 3-13 shows typical
|
||
|
methods for placing charges and gives values of C to be used in the
|
||
|
breaching formula with both tamped and untamped charges. In selecting a
|
||
|
value of C from figure 3-13, a charge should be tamped with a solid
|
||
|
material such as sand or earth or tamped by water is not considered full
|
||
|
tamped unless it is covered to a depth equal to or greater than the
|
||
|
breaching radius.
|
||
|
|
||
|
e. USE OF FIGURE IN MAKING CALCULATIONS. Figure 3-14 gives the
|
||
|
amount of TNT required to breach reinforced concrete targets. The
|
||
|
amounts of TNT in the table were calculated from the formula
|
||
|
P = R(cubed)KC. To use the figure:
|
||
|
(1) Measure thickness of concrete.
|
||
|
(2) Decide how the charge will be placed against the target.
|
||
|
Compare the method of placement with the diagrams at the top of the
|
||
|
figure. If there is any question as to which column to use, always use
|
||
|
the column that will give the greater amount of explosive.
|
||
|
(3) For explosive other than TNT, use the relative effectiveness
|
||
|
factor (table 1-2).
|
||
|
|
||
|
f. EXAMPLE. Using figure 3-14, calculate the amount of TNT required
|
||
|
to breach a reinforced concrete wall 7 feet thick with an untamped
|
||
|
charge placed at a distance R above the ground. From the figure the
|
||
|
required amount of TNT is 334 pounds.
|
||
|
|
||
|
g. USING FIGURE FOR MATERIAL OTHER THAN REINFORCED CONCRETE. The
|
||
|
values given in figure 3-13 may be used to calculate breaching charges
|
||
|
for obstacles of material other than reinforced concrete by multiplying
|
||
|
the valure obtained from figure 3-14 by the proper conversion factor
|
||
|
given in table 3-3. To use the table ---
|
||
|
(1) Determine the type of material in the object. If in doubt
|
||
|
assume the material to be of the stronger type, e.g. assume concrete
|
||
|
reinforced, unless known otherwise.
|
||
|
(2) Using figure 3-14, determine the amount of explosive that
|
||
|
would be required if the object were made of reinforced concrete.
|
||
|
(3) Using table 3-3, determine the appropriate conversion factor.
|
||
|
(4) Multiply the number of pounds of explosive by the conversion
|
||
|
factor.
|
||
|
|
||
|
h. EXAMPLE. Using figure 3-14 and table 3-3, determine the amount of
|
||
|
TNT required to breach an ordinary masonry pier 4 1/2 feet thick with an
|
||
|
untamped charge placed 4 feet below the waterline. If the pier were
|
||
|
made of reinforced concrete, 146 pounds of TNT would be required to
|
||
|
breach it (fig 3-14). The conversion factor (table 3-3) is 0.5.
|
||
|
Therefore 146 x 0.5 = 73 pounds of TNT are required to breach the pier.
|
||
|
|
||
|
3-13. Placement and Number of Charges
|
||
|
|
||
|
a. PLACEMENT. In the demolition of piers and walls, the position for
|
||
|
the placement of explosive charges are rather limited. Unless a
|
||
|
demolition chamber is available, the charge (or charges) may be placed
|
||
|
against once face of the target either at ground level, somewhat above
|
||
|
ground level, or beneath the surface. A charge placed above ground
|
||
|
level is more effective than one placed directly on the ground. When
|
||
|
several charges are required to destroy a pier, slab, or wall and
|
||
|
elevated charges are desired, they are distributed equally at no less
|
||
|
than one breaching radius high from the base of the object to be
|
||
|
demolished. In this manner, the best use is obtained from the shock
|
||
|
waves of the blast. BREACHING CHARGES SHOULD BE PLACED SO THAT THERE IS
|
||
|
A FREE REFLECTION SURFACE ON THE OPPOSITE SIDE OF THE TARGET. This free
|
||
|
reflection surface is necessary for spalling to occur (see para 3-2).
|
||
|
All charges are thoroughly tamped with damp soil or filled sandbags if
|
||
|
time permits. (Tamping must be equal to or greater than the breaching
|
||
|
radius.) For piers, slabs, or walls partially submerged in water,
|
||
|
charges are placed equal to or greater than the breaching radius below
|
||
|
the waterline (fig 3-13).
|
||
|
|
||
|
b. CHARGE CONFIGURATIONS. In order to transmit the maximum
|
||
|
destructive shock into the target, the explosive charge should be placed
|
||
|
in the shape of a flat square with the flat side to the target. The
|
||
|
thickness of the charge is dependent upon the amount of explosive and is
|
||
|
given in table 3-4.
|
||
|
|
||
|
TABLE 3-4. THICKNESS OF BREACHING CHARGES*
|
||
|
___________________________________________________
|
||
|
Amount of explosive ! Thickness of charge
|
||
|
____________________________!______________________
|
||
|
Less than 5 lbs ! 1 inch
|
||
|
5 lbs to less than 40 lbs ! 2 inches
|
||
|
40 lbs to less than 300 lbs ! 4 inches
|
||
|
300 lbs or more ! 5 inches
|
||
|
____________________________!______________________
|
||
|
*These are approximate values
|
||
|
|
||
|
c. NUMBER OF CHARGES. The number of charges required to demolish a
|
||
|
pier, slab, or wall is calculated be the formula:
|
||
|
N = W/2R where,
|
||
|
N = number of charges,
|
||
|
W = width of pier, slab, or wall, in feet,
|
||
|
R = breaching radius in feet (para 3-12b).
|
||
|
2 = constant
|
||
|
If the calculated value of N is less that 1 1/4, use one charge; if it
|
||
|
is 1 1/4 to less than 2 1/2, use 2 charges; if it is 2 1/2 or more,
|
||
|
round off to nearest whole number. In breaching concrete beam bridges,
|
||
|
each beam is breached individually.
|
||
|
|
||
|
3-14. Opposed (Counterforce) Charge
|
||
|
|
||
|
This special breaching techniqure is effective against comparatively
|
||
|
small cubical or columnar concrete and masonry objects 4 feet or less in
|
||
|
thickness and wideth. It is not effective against piers or long
|
||
|
obstacles. The obstacle must also have at least three free faces or be
|
||
|
free standing. If constructed of plastic explosive properly placed and
|
||
|
detonated, counterforce charges produce excellent results with a
|
||
|
relatively small amount of explosive. Their effectiveness results from
|
||
|
simultaneous detonation of two charges placed directly opposite eache
|
||
|
other and as neer the center of the target as possible (fig 3-15).
|
||
|
|
||
|
a. CHARGE CALCULATION. The size is computed from the diameter or
|
||
|
thickness of the target in feet, as --
|
||
|
The amount of explosive = 1 1/2 x the thickness of the target in
|
||
|
feet (1 1/2 pounds per foot).
|
||
|
Fractional measurements are rounded off to the next higher foot prior to
|
||
|
multiplication. Fot example, a concrete target measuring 3 feet 9
|
||
|
inches thick requires 1 1/2 x 4 = 6 pounds of plastic explosive
|
||
|
(composition C4).
|
||
|
|
||
|
b. PREPARATION AND EMPLACEMENT. Divide the calculated amount of
|
||
|
explosive in half to make two identical charges. The two charges MUST
|
||
|
be placed diametrically opposite each other. This requires
|
||
|
accessibility to both sides of the target so that the charges may be
|
||
|
placed flush against the respective target sides.
|
||
|
|
||
|
c. PRIMING. The simultaneous explosion of both charges is mandatory
|
||
|
for optimum results. Crimp nonelectric blasting caps to equal lengths
|
||
|
of detonating cord. Prime both charges at the center rear point; then
|
||
|
form a V with the free ends of detonating cord and attach an electric or
|
||
|
nonelectric means of firing. Simultaneous detonation may also be
|
||
|
accomplished with M6 electric blasting caps wired in series in the same
|
||
|
circuit.
|
||
|
|
||
|
Section VI. CRATERING AND DITCHING CHARGES
|
||
|
|
||
|
3-15. Critical Factors
|
||
|
|
||
|
a. SIZE. Road craters, to be effective obstacles, must be too wide
|
||
|
for spanning by track-laying vehicles and too deep and steep sided for
|
||
|
any vehicle to pass through them. Blasted road craters will not stop
|
||
|
modern tanks indefinitely, because repeated attempts by the tank to
|
||
|
traverse the crater will pull loose soil from the slopes of the crater
|
||
|
into the bottom reducing both the depth of the crater and angle of the
|
||
|
slopes. Road craters are considered effective antitank obstacles if the
|
||
|
tank requires three or more passes to traverse the crater, thereby
|
||
|
providing sufficient time for antitank weapons to stop the tank. Road
|
||
|
craters must also be large enough to tie into natural or manmade
|
||
|
obstacles at each end. The effectiveness of blasted road craters may be
|
||
|
improved by placing log hurdles on either side, by digging the face on
|
||
|
the friendly side nearly vertical, by mining the site with antitank and
|
||
|
antipersonnel mines.
|
||
|
|
||
|
b. EXPLOSIVE. All military explosives may be used for blasting
|
||
|
antitank craters. A special 40-pound cratering charge, ammonium
|
||
|
nitrate, sued in a waterproof metal container, is used when available
|
||
|
(para 1-4).
|
||
|
|
||
|
c. SIZE AND PLACEMENT OF CHARGE. In deliberate cratering, holes are
|
||
|
bored to specific depths and spaced according to computation by formula,
|
||
|
as described below. In ditching, test shots are made and the diameter
|
||
|
and depth are increased as required.
|
||
|
|
||
|
d. CONFINEMENT OF CHARGE. Charges at cratering sites and antitank
|
||
|
ditching sites are placed in boreholes and properly stemmed. Those at
|
||
|
culvert sites are tamped with sandbags.
|
||
|
|
||
|
e. BREACHING HARD-SURFACED PAVEMENTS FOR CRATERING CHARGES.
|
||
|
Hard-surfaced pavement of roads and airfields is breached so that holes
|
||
|
may be dug for cratering charges. This is done effectively exploding
|
||
|
tamped charges on the pavement surface. A 1-pound charge of explosive
|
||
|
is used for each 2 inches of pavement thickness. It is tamped with
|
||
|
material twice as thick as the pavement. The pavemenmt may also be
|
||
|
breached by charges placed in boreholes drilled or blasted through it.
|
||
|
(A shaped charge readily blasts a small diameter borehole through the
|
||
|
pavement and into the subgrade.) Concrete should not be breached at an
|
||
|
expansion joint, because the concrete will shatter irregularly.
|
||
|
|
||
|
f. BOREHOLES FOR CRATERING CHARGES. Boreholes for cratering charges
|
||
|
may be dug by using motorized post hole augers or diggers. Boreholes
|
||
|
may also be made by use of the earth rod kit (para 1-41) or by a
|
||
|
mechanically drivin pin, widened with a detonating cord wick (para
|
||
|
3-27).
|
||
|
|
||
|
g. BLASTING BOREHOLES WITH SHAPED CHARGES. Standard shaped charges
|
||
|
may be used to blast boreholes in both paved and unpaved surfaces for
|
||
|
rapid road cratering with explosives. The 15-pound M2A4 shaped charge
|
||
|
detonated at 3 1/2 foot standoff and the 40-pound M3A1 shaped charge
|
||
|
detonated at 5-foot standoff will blast boreholes of up to 9-foot open
|
||
|
depths with 7-inch and larger diameters in both reinforced concrete
|
||
|
pavements and gravel surfaced roads. For maximum effectiveness, M3A1
|
||
|
shaped charges should be used to blast boreholes in thick, reinforced
|
||
|
concrete pavements laid on dense high-strength base courses. The M2A4
|
||
|
shaped charges may be used effectively to blast cratering charge
|
||
|
boreholes in reinforced concrete pavement of less than 6-inch thickness
|
||
|
laid on thin base courses or to blast boreholes in unpaved roads. Most
|
||
|
any kind of military explosive, including the cratering charges, can be
|
||
|
loaded directly into boreholes made by the M3A1 and the M2A4 shaped
|
||
|
charges. Shaped charges do not always produce open boreholes capable of
|
||
|
being loaded directly with 7-inch diameter cratering charges without
|
||
|
removal of some earth or widening of narrow areas. Many boreholes
|
||
|
having narrow diameters but great depth can be widened simply by
|
||
|
knocking material from the constricted areas with a pole or rod or by
|
||
|
breaking off the shattered surface concrete with a pick or crowbar. For
|
||
|
road cratering on asphalt or concrete surfaced roadways, blasting the
|
||
|
boreholes with shaped charges will expedite the cratering task by
|
||
|
eliminating the requirement for first breaching the pavement with
|
||
|
explosive charges (table 3-5).
|
||
|
|
||
|
3-16. Hasty Road Crater
|
||
|
|
||
|
This method (fig 3-16) takes the least amount of time for construction,
|
||
|
based upon number and depth of boreholes, but produces the least
|
||
|
effective barrier because of its depth and shape. The method described
|
||
|
below forms a V-shaped crater, about 6 to 7 feet deep and 20 to 25 feet
|
||
|
wide extending about 8 feet beyond each end crater. The sides have
|
||
|
slopes of 25 degrees to 35 degrees. Modern U.S. combat tanks (the M48
|
||
|
and M60) require an average of four passes to traverse hasty road
|
||
|
craters. Craters formed by boreholes less than 5 feet deep and loaded
|
||
|
with charges less than 50 pounds are ineffective against tanks. The
|
||
|
following hasty cratering method has proved satisfactory:
|
||
|
|
||
|
a. Dig all boreholes to the same depth; at least 6 feet. Space the
|
||
|
holes 5 feet apart center-to-center across the road. The formula for
|
||
|
the computation of the number of holes is : N = L-16/5 + 1, where
|
||
|
|
||
|
L = length of crater in feet measured across the roadway. Any
|
||
|
fractional number of holes is rounded off to the next highest number.
|
||
|
|
||
|
b. Load the boreholes with 10 pounds of explosive per foot of depth.
|
||
|
|
||
|
c. Prime all charges with detonating cord and connect them to fire
|
||
|
simultaneously. Under ground charges should always be primed with
|
||
|
detonating cord branch lines. A dual firing system should be used.
|
||
|
|
||
|
d. If the standard cratering charge is used, place a 1-pound priming
|
||
|
charge on the side of the charge for dual priming. For hasty cratering,
|
||
|
if standard cratering charges are used, each charge must be supplemented
|
||
|
with 10 pounds of additional explosive to total 50 pounds of explosive
|
||
|
per borehole.
|
||
|
Note. Each cratering charge must be carefully inspected for
|
||
|
possible water damage prior to emplacement.
|
||
|
|
||
|
e. Stem all boreholes with suitable material.
|
||
|
3-17. Deliberate Road Crater
|
||
|
|
||
|
This cratering method (fig 3-17) produces road craters that are more
|
||
|
effective than those resulting from the hasty method as they require an
|
||
|
average of eight passes to be crossed by modern U.S. tanks. The crater
|
||
|
produced is V-shaped, approximately 7 feet deep, 25 feet wide, with side
|
||
|
slopes about 30 degrees to 37 degrees. The crater extends about 8 feet
|
||
|
beyond the end holes. The method of placing charges is as follows:
|
||
|
|
||
|
a. Bore the holes 5 feet apart, center-to-center, in a line across
|
||
|
the roadway. The end holes are 7 feet deep and the others are
|
||
|
alternately 5 feet and 7 feet deep. The formula for the computation of
|
||
|
the number of holes is :
|
||
|
N = L-16/5 + 1
|
||
|
L = length of crater in feet measured across roadway
|
||
|
Any fractional number of holes is rounded off to the next highest
|
||
|
number. Two 5-foot holes must not be made next to each other. If they
|
||
|
are so calculated, one of them must be a 7-foot hole. The resulting two
|
||
|
adjacent 7-foot holes may be placed anywhere along the line.
|
||
|
|
||
|
b. Place 80 pounds of explosive in the 7-foot holes and 40 pounds of
|
||
|
explosive in the 5-foot holes.
|
||
|
|
||
|
c. Prime the charges as for hasty cratering. Dual priming of the
|
||
|
7-foot holes may be accomplished by independent priming of each of the
|
||
|
two cratering charges, if used.
|
||
|
|
||
|
d. Stem all holes with suitable material.
|
||
|
|
||
|
3-18. Relieved Face Road Crater
|
||
|
|
||
|
This cratering method (fig 3-18) produces road craters that are more
|
||
|
effective obstacles to modern tanks than the standard V-shaped craters.
|
||
|
This technique produces a trapezoidal-shaped crater about 7 feet deep
|
||
|
and 25 to 30 feet wide with unequal side slopes. In compact soil, such
|
||
|
as clay, the relieved face cratering method will provide and obstace
|
||
|
shaped as shown in A, figure 3-18. The side nearest the enemy slopes at
|
||
|
about 25 degrees from the road surface to the bottom while that on the
|
||
|
opposite side or friendly side is about 30 degrees to 40 degrees steep.
|
||
|
The exact shape, however depends of the type of soil found in the area
|
||
|
of operations. The procedure is as follows:
|
||
|
|
||
|
a. On dirt or gravel surfaced roads, drill two rows of boreholes 8
|
||
|
feet apart, spacing the boreholes on 7-foot centers. On hard surfaced
|
||
|
roads, drill the two rows 12 feet apart. The number of charges for the
|
||
|
friendly side row can be calculated by the formula N = L-10/7 + 1, where
|
||
|
L = length of crater in feet measured across the width of the road.
|
||
|
Any fractional number of holes should be rounded off to the next highest
|
||
|
number. Stagger the boreholes in the other row, as shown in B, figure
|
||
|
3-18. This row will always contain one less borehole than the other
|
||
|
row.
|
||
|
|
||
|
b. Make the boreholes on the friendly side 5 feet deep and load with
|
||
|
40 pounds of explosive, and those on the enemy side 4 feet deep and
|
||
|
load with 30 pounds of explosive.
|
||
|
|
||
|
c. Prime the charges is each row separately for simultaneous
|
||
|
detonation. There should be a delay of detonation of 1/2 to 1 1/2
|
||
|
seconds between rows, the row on the enemy side being detonated first.
|
||
|
Best results will be obtained if the charges on the friendly side are
|
||
|
fired while the earth moved in the first row is still in the air.
|
||
|
Standard delay caps may be used for delay detonation.
|
||
|
d. Acceptable results may be obtained by firing both rows
|
||
|
simultaneously, if adequate means are sufficient time for delay firing
|
||
|
are not available. However the resulting crater will not have the same
|
||
|
depth and trapezoidal shape as described above.
|
||
|
|
||
|
e. To prevent misfires from the shock and blast of the row of charges
|
||
|
on the enemy side (detonated first), the detonation cord mains and
|
||
|
branch lines of the row on the friendly side (detonated last) must be
|
||
|
protected by a covering of about 6 inches of earth.
|
||
|
|
||
|
3-19. Angled Road Crater Method
|
||
|
|
||
|
This method is useful against tanks traveling in defiles or road cuts
|
||
|
where the must approach the crater straightaway and is the most
|
||
|
effective cratering method. The road crater is blasted using either the
|
||
|
hast or deliberate cratering methods described in paragraphs 3-16 and
|
||
|
3-17, except the boreholes are drilled across the roadway at about a 45
|
||
|
degree angle as shown in figure 3-19. Because of the angle at which
|
||
|
tanks must attempt to cross an angled crater, they tend to slip sideways
|
||
|
and ride off their tracks.
|
||
|
|
||
|
3-20. Blasting Permafrost and Ice
|
||
|
|
||
|
a. BLASTING PERMAFROST.
|
||
|
(1) NUMBER OF BOREHOLES AND SIZE OF CHARGE. In permafrost,
|
||
|
blasting requires about 1 1/2 to 1 times the number of boreholes and
|
||
|
larger charges than those calculated by standard formulas for moderate
|
||
|
climates. Frozen soil, when blasted breaks into large clods 12 to 18
|
||
|
inches thick and 6 to 8 feet in diameter. A the charge has
|
||
|
insufficient force to blow these clods clear of the hole, they fall back
|
||
|
into it when the blast subsides. Testing to determine the number of
|
||
|
boreholes needed should be made before extensive blasting is attempted.
|
||
|
In some cases, permafrost may be as difficult to blast as solid rock.
|
||
|
(2) METHOD OF MAKING BOREHOLES. Boreholes are made by three
|
||
|
methods--use of standard drilling equipment, steam pount drilling
|
||
|
equipment, and shaped charges. Standard drill equipment has one serious
|
||
|
defect--the air holes in the drill bits freeze and there is no known
|
||
|
method of avoiding it. Steam point drilling is satisfactory in sand,
|
||
|
silt or clay, but not in gravel. Charges must be placed immediately
|
||
|
upon withdrawl of the steam point, otherwise the area around the hole
|
||
|
thaws out and plugs it. Shaped charges also are satisfactory for
|
||
|
producing boreholes, especially for cratering. Table 3-5 shows the size
|
||
|
of boreholes in permafrost and ince made by M3A1 and M2A4 shaped
|
||
|
charges.
|
||
|
(3) EXPLOSIVES. A low velocity explosive like ammonium nitrate,
|
||
|
satisfactory for use in arctic temperatures, should be used, if
|
||
|
available. The heaving quality of low velocity explosives will aid in
|
||
|
clearing the hole of large boulders. If only high velocity explosives
|
||
|
are available, charges should be tamped with water and permitted to
|
||
|
freeze. Unlesss high velocity explosives are thoroughly tamped, they
|
||
|
tend to blow out of the borehole.
|
||
|
|
||
|
b. BLASTING ICE.
|
||
|
(1) ACCESS HOLES. These are required for water supply and
|
||
|
determining the thickness of ice for the computation of safe bearing
|
||
|
pressures for aircraft and vehicles. As ice carries much winter
|
||
|
traffic, its bearing capacity must be ascertained rapidly when forward
|
||
|
movements are required. Small diameter access holes are made by shaped
|
||
|
charges. On solid lake ice, the M2A4 penetrates 7 feet and the M3A1, 12
|
||
|
feet. These charges will penetrate farther but the penetration
|
||
|
distances were tested in only ice approximately 12 feet thick. If the
|
||
|
regular standoff is used, a large crater formes at the top, which makes
|
||
|
considerable probing necessary to finde the borehole. If a standoff of
|
||
|
42 inches or more is used with the M2A4 shaped charge, a clean hole
|
||
|
without a top crater is formed. Holes made by the M2A4 average 3 1/2
|
||
|
inches in diameter, while those made by the M3A1 average 6 inches.
|
||
|
(2) ICE CONDITIONS. In the late winter after the ice has aged, it
|
||
|
grows weaker and changes color from blue to white. Although the
|
||
|
structure of ice varies and its strength depends on age, air
|
||
|
temperature, and conditions of the original formation, the same size and
|
||
|
type of crater is formed regardless of the standoff distance. If the
|
||
|
lake or river is not frozen to the bottom, the blown hole will fill with
|
||
|
shattered ice and clearing will be extremely difficult. Under some
|
||
|
conditions, shaped charges may penetrate to a depth much less than that
|
||
|
indicated in table 3-5.
|
||
|
(3) SURFACE CHARGES. Surface craters may be made with ammonium
|
||
|
nitrate cratering charges or demolition blocks. For the best effects,
|
||
|
the charges are placed on the surface of cleared ice and tamped on top
|
||
|
with snow. The tendency of ice to shatter more rapidly than soil should
|
||
|
be considered when charges are computed.
|
||
|
(4) UNDERWATER CHARGES.
|
||
|
(a) Charges are placed underwater by first making boreholes in
|
||
|
the ice with boreholes in the ice with shaped charges, and then placing
|
||
|
the charge below th ice. An 80-pound charge of M3 demolition blocks
|
||
|
under ice 4 1/2 feet thick forms a crater 40 feet in diameter. This
|
||
|
crater, however, is filled with floating ice particles, and at
|
||
|
temperatures around 20 degrees F. freezes over in 40 minutes.
|
||
|
(b) A vehicle obstacle may be cratered in ice by sinking
|
||
|
boreholes 9 feet apart in staggered rows. Charges (tetrytol or plastic)
|
||
|
are suspended about 2 feet below the bottom of the ice by means of cord
|
||
|
with sticks bridging the tops of the holes. The size of the charge
|
||
|
depends upon the thickness of the ice. An obstacle like this may retard
|
||
|
or halt enemy vehicles for approximately 24 hours at temperatures around
|
||
|
-24 degrees F.
|
||
|
|
||
|
3-21. Cratering at Culverts
|
||
|
|
||
|
A charge detonated to destroy a culvert not more than 15 feet deep may,
|
||
|
at the same time, produce an effective road crater. Explosive charges
|
||
|
should be primed for simultaneous firing and thoroughly tamped with
|
||
|
sandbags. Culverts with 5 feet or less of fill may be destroyed by
|
||
|
explosive charges placed in the same manner as in hasty road cratering.
|
||
|
Concentrated charges equal to 10 pounds per foot of depth are placed in
|
||
|
boreholes at 5-foot intervals in the fill above and alongside the
|
||
|
culvert.
|
||
|
|
||
|
3-22. Antitank Ditch Cratering
|
||
|
|
||
|
a. CONSTRUCTION. In open country, antitank ditches are constructed
|
||
|
to strengthen prepared defensive positions. As they are costly in time
|
||
|
and effort, much is gained if the excavation can be made by means of
|
||
|
cratering charges. To be effective, an antitank ditch must be wide
|
||
|
enough to stop an enemy tank. It may be improved by placing a log
|
||
|
hurdle on the enemy side and spoil on the friendly side. Ditches are
|
||
|
improved by digging the face on the friendly side nearly vertical by
|
||
|
means of handtools (para 3-15a).
|
||
|
|
||
|
b. DELIBERATE CRATERING METHOD. The deliberate cratering method
|
||
|
outlined in paragraph 3-17 is adequate for the construction of heavy
|
||
|
tank ditches in most types of soil.
|
||
|
|
||
|
c. HASTY CRATERING METHOD. An antitank ditch may be constructed by
|
||
|
placing 50 pounds of cratering explosive in 5-foot holes, and spacing
|
||
|
the holes at 5-foot intervals (fig 3-16). The ditch crater will be
|
||
|
approximately 8 feet deep and 25 feet wide.
|
||
|
3-23. Blasting of Ditches
|
||
|
|
||
|
In combat areas, ditches may be constructed to drain terrain flooded by
|
||
|
the enemy or as initial excavations for the preparation of
|
||
|
entrenchments. Rough open ditches 2 1/2 to 12 feet deep and 4 to 40
|
||
|
feet wide may be blasted in most types of soils. A brief outline of the
|
||
|
method is given below.
|
||
|
|
||
|
a. TEST SHOTS. Before attempting the actual ditching, make test
|
||
|
shots to determine the proper depth, spacing, and weight of charges
|
||
|
needed to obtain the required results. Make beginning test shots with
|
||
|
holes 2 feet deep and 18 inches apart and then increase the size of the
|
||
|
charge and the depth as required. A rule of thumb for ditching is to
|
||
|
use 1 pound of explosive per cubic yard of earth in average soil.
|
||
|
|
||
|
b. ALINEMENT AND GRADE. Mark the ditch centerline by transit line or
|
||
|
expedient means and drill holes along it. When a transit or hand level
|
||
|
is used, the grade of the ditch may be accurately controlled by checking
|
||
|
the hole depth every 5 to 10 holes and at each change in grade. In soft
|
||
|
ground, the holes may be made with a sharp punch, a quicksand punch (fig
|
||
|
3-20) or an earth auger. Holes are loaded and tamped immediately to
|
||
|
prevent cave-ins and insure that the charges are at proper depth.
|
||
|
Ditches are sloped at a rate of 2 to 4 feet per 100 feet.
|
||
|
|
||
|
c. METHODS OF DETONATION.
|
||
|
(1) PROPAGATION METHOD. By this method (fig 3-21) only one charge
|
||
|
is primed-- the charge placed in the hole at one end of the line of
|
||
|
holes made to blast the ditch. The concussion from this charge
|
||
|
sympathetically detonates the next charge and so on until all are
|
||
|
detonated. Only 50-60 percent straight commercial dynamite should be
|
||
|
used in this operation. The propagation method is effective, however,
|
||
|
only in moist or wet soils and may be effectively used in swamps where
|
||
|
the ground is covered by several inches of water. If more than one line
|
||
|
of charges is required to obtain a wide ditch, the first charge of each
|
||
|
line is primed. The primed hole is overcharge 1 or 2 pounds.
|
||
|
(2) ELECTRICAL METHOD. Any high explosive may be used in ditching
|
||
|
by the electrical firing method which is effective in all soils except
|
||
|
sand, regardless of moisture content. Each charge is primed with an
|
||
|
electric cap and the caps are connected in leapfrog series (para 2-6b).
|
||
|
Al charges are fired simultaneously.
|
||
|
(3) DETONATING CORD METHOD. In this ditching method any high
|
||
|
explosive may be used. It is effective in any type of soil, except
|
||
|
sand, regardless of moisture content. Each charge is primed with
|
||
|
detonating cord and connected to a detonating cord main or ring main
|
||
|
line.
|
||
|
|
||
|
d. METHODS OF LOADING.
|
||
|
(1) The method of loading for a deep, narrow ditch is illustrated
|
||
|
in figure 3-22.
|
||
|
(2) The relief method of loading for shallow ditches is depicted
|
||
|
in figure 3-23. Ditches 1 and 3 are blasted first to relieve ditch 2.
|
||
|
(3) Figure 3-24 shows the posthole method of loading for shallow
|
||
|
ditches in mud.
|
||
|
(4) The cross section method of loading to clean and widen ditches
|
||
|
is explained graphically in figure 3-25.
|
||
|
|
||
|
Section VII. LAND CLEARING CHARGES
|
||
|
|
||
|
3-24. Introduction
|
||
|
|
||
|
In military operations, construction jobs occur in which explosives may
|
||
|
be employed to advantage. Among these jobs are land clearing, which
|
||
|
includes stump and boulder removal, and quarrying. The explosives
|
||
|
commonly used are military and commercial dynamite and detonating cord.
|
||
|
The quantity of explosive used is generally calculated by rule of thumb.
|
||
|
Charges may be placed in boreholes in the ground under or at the side of
|
||
|
the target, in the target itself, or on top of the target. All charges
|
||
|
should be tamped or mudcapped, which is a form of light tamping.
|
||
|
|
||
|
3-25. Stump Removal
|
||
|
|
||
|
In certain military operations it may be necessary to remove stumps as
|
||
|
well as trees. Stumps are of two general types, tap- and lateral-rooted
|
||
|
(fig 3-26). Military Dynamite is the explosive best suited for stump
|
||
|
removal. A rule of thumb is to use 1 pound per foot of diameter for
|
||
|
dead stumps and 2 pounds per foot for live stumps, and if both tree and
|
||
|
stump are to be removed, to increase the amount of explosive by 50
|
||
|
percent. Measurements are taken at points 12 to 18 inches above the
|
||
|
ground.
|
||
|
|
||
|
a. TAPROOT STUMPS. For taproot stumps, one method is to bore a hole
|
||
|
in the taproot below the level of the ground. The best method is to
|
||
|
place charges on both sides of the taproot to obtain a shearing effect
|
||
|
(fig 3-26). For best results, tamp the charges.
|
||
|
|
||
|
b. LATERAL-ROOT STUMPS. In blasting later-root stumps, drill sloping
|
||
|
holes as shown in figure 3-26. Place the charge as nearly as possible
|
||
|
under the center of the stump and at a depth approximately equal to the
|
||
|
radius of the stump base. If for some reason the root formation cannot
|
||
|
be determined, assume that it is the lateral type and proceed
|
||
|
accordingly.
|
||
|
|
||
|
3-26. Boulder Removal
|
||
|
|
||
|
In the building of roads and airfields or other military construction,
|
||
|
boulders can be removed by blasting. The most practical methods are
|
||
|
snakeholing, mudcapping, and blockholing.
|
||
|
|
||
|
a. SNAKEHOLING METHOD. By this method, a hole large enough to hold
|
||
|
the charg is dug under the boulder. The explosive charge is packed
|
||
|
under and against the bould as shown in A, figure 3-27. For charge
|
||
|
size, see table 3-6.
|
||
|
|
||
|
b. MUDCAPPING METHOD. For surface or slightly embedded boulders, the
|
||
|
mudcapping method is very effective. The charge is placed on top or
|
||
|
against the side of the boulder wherever a crack or seam exists that
|
||
|
will aid in breakage, and covered with 10 to 12 inches of mud or clay
|
||
|
(B, fig 3-27). For charge size, see table 3-6.
|
||
|
|
||
|
c. BLOCKHOLING METHOD. This method is very effective of boulders
|
||
|
lying on the surface or slightly embedded in the earth. A hole is
|
||
|
drilled on top of the boulder deep and wide enough to hold the amount of
|
||
|
explosive indicated in table 3-6. The charge is then primed, put into
|
||
|
the borehole, and stemmed (C, fig 3-27).
|
||
|
|
||
|
Table 3-6. Charge Sizes for Blasting Boulders.
|
||
|
________________________________________________________________
|
||
|
! Pounds of explosive required
|
||
|
Boulder diameter (ft) !----------------------------------------
|
||
|
! Blockholing ! Snakeholing ! Mudcapping
|
||
|
-----------------------!-------------!-------------!------------
|
||
|
3 ! 1/4 ! 3/4 ! 2
|
||
|
4 ! 3/8 ! 2 ! 3 1/2
|
||
|
5 ! 1/2 ! 3 ! 6
|
||
|
----------------------------------------------------------------
|
||
|
3-27. Springing Charges
|
||
|
|
||
|
a. DEFINITION AND METHOD. A springing charge is a comparatively
|
||
|
small charge detonated in the bottom of a drilled borehole to form an
|
||
|
enlarged chamber for placing a larger charge. At times two or more
|
||
|
springing charges in succession may be needed to make the chamber large
|
||
|
enough for the final charge. Under these conditions at least 2 hours
|
||
|
should be allowed between firing and placing successive charges for the
|
||
|
boreholes to cool unless the sprung holes are cooled with water or
|
||
|
compressed air.
|
||
|
|
||
|
b. DETONATING CORD WICK. This is several strands of detonating cord
|
||
|
taped together and used to enlarge boreholes in soils. One strand
|
||
|
generally widens the diameter of the hole about 1 inch.
|
||
|
(1) A hole is made by driving a steel rod approximately 2 inches
|
||
|
in diameter into the ground to the depth required. According to the
|
||
|
rule of thumb, a hole 10 inches in diameter requires 10 strands of
|
||
|
detonating cord. These must extend the full length of the hole and be
|
||
|
taped or tied together into a "wick" to give optimum results. The wick
|
||
|
may be placed into the hole by an inserting rod or some field expedient.
|
||
|
Firing may be done electrically or nonelectrically. An unlimited number
|
||
|
of wicks may be fired at one time by connecting them by a detonated cord
|
||
|
ring main or line main.
|
||
|
(2) The best results from the use of the detonating cord wick are
|
||
|
obtained in hard soil. If successive charges are placed in the holes,
|
||
|
excess gases must be blown out andthe hole inspected for excessive heat.
|
||
|
|
||
|
3-28. Quarrying
|
||
|
|
||
|
Quarrying is the extraction of rock in the natural state. Militarty
|
||
|
quarries, generally of the open face type, are developed by the single
|
||
|
or multiple bench method. See TM 5-332 for detailed information.
|
||
|
|
||
|
Section III. DESTRUCTION TO PREVENT ENEMY USE
|
||
|
|
||
|
5-10. General
|
||
|
|
||
|
a. The destruction of damaged or unserviceable explosives and
|
||
|
demolition materials is accomplished by explosive ordnance disposal
|
||
|
units as specified in AR 75-14, AR 75-15, TM 9-1375-200 and FM 9-16.
|
||
|
|
||
|
b. Destruction of demolition materials, when subject to capture or
|
||
|
abandonment, will be undertaken by the using of arm only when, in the
|
||
|
judgment of the unit commander concerned, such action is necessary in
|
||
|
accordance with orders of, or policy established by, the Army commander.
|
||
|
The conditions under which destruction will be effected are command
|
||
|
decisions and may vary in each case, dependent upon a number of factors
|
||
|
such as the tactical situation, security classification of the
|
||
|
demolition materials, their quantity and location, facilities for
|
||
|
accomplishing destruction, and time available. In general, destruction
|
||
|
can be accomplished most effectively by burning or detonation, or a
|
||
|
combination of these.
|
||
|
|
||
|
c. If destruction to prevent enemy use is resorted to, explosive and
|
||
|
nonexplosive demolition materials must be so completely destroyed that
|
||
|
they cannot be restored to usable condition in the combat zone. Equally
|
||
|
important, the same essential components of sets and kits must be
|
||
|
destroyed so that the enemy cannot assemble complete ones from undamaged
|
||
|
components by cannibalization.
|
||
|
|
||
|
d. If destruction of demolition materials is directed, due
|
||
|
consideration should be given to (1) and (2) below.
|
||
|
(1) Selection of a site that will cause greatest obstruction to
|
||
|
enemy movement and also prevent hazard to friendly troops from fragments
|
||
|
and blast which will occur incidental to the destruction.
|
||
|
(2) Observation of appropriate safety precautions.
|
||
|
|
||
|
5-11. Destruction Methods
|
||
|
|
||
|
Demolition materials can be most quickly destroyed by burning or
|
||
|
detonation. The methods in A and B below, in order of preference, are
|
||
|
considered the most satisfactory for destruction of demolition materials
|
||
|
to prevent enemy use. For additional information on the destruction of
|
||
|
explosives and ammunition see TM 9-1300-206 and TM 9-1300-214.
|
||
|
|
||
|
a. METHOD No.1--BY BURNING.
|
||
|
(1) GENERAL. Packed and unpacked high explosive items such as
|
||
|
linear demolition charges, shaped demolition charges, block demolition
|
||
|
charges, dynamite sticks, detonating cord, firing devices, time blasting
|
||
|
fuse, and similar items may be destroyed quickly and effectively by
|
||
|
burning. Blasting caps set aside for destruction by burning must be
|
||
|
stacked in separate piles and not with other explosives.
|
||
|
(2) METHOD OF DESTRUCTION.
|
||
|
(a) Stack the explosives in a pile, if possible (not over 2,000
|
||
|
pounds to a pile), over a layer of combustible material.
|
||
|
(b) Pour FUEL OIL over the entire pile.
|
||
|
(c) Ignite the pile by means of a combustible train (excelsior
|
||
|
or slow-burning propellant) of suitable length and take cover
|
||
|
immediately. The danger area for piles being burned in the open is
|
||
|
calculated from the safe distances given in paragraph 5-2 but never
|
||
|
less than 400 meters.
|
||
|
|
||
|
WARNING. COVER MUST BE TAKEN WITHOUT DELAY, SINCE DETONATION OF THE
|
||
|
EXPLOSIVE MATERIAL MAY BE CAUSED BY THE FIRE.
|
||
|
|
||
|
b. METHOD No.2--BY DETONATION.
|
||
|
(1) GENERAL. Packed and unpacked high explosive items such as
|
||
|
linear demolition charges, shaped demolition charges, block demoltion
|
||
|
charges, dynamite sticks, detonating cord, blasting caps, firing
|
||
|
devices, time blasting fuse, and similar items may be destroyed by
|
||
|
placing them in piles and detonating them with initiating charges of
|
||
|
TNT, or composition C series explosives, or other explosives having
|
||
|
equivalent potential.
|
||
|
(2) METHOD OF DESTRUCTION.
|
||
|
(a) The explosives should be stacked in piles, if possible (not
|
||
|
over 2,000 pounds to a pile).
|
||
|
(b) Each 100 pounds of packed explosives (mine, blocks, etc.),
|
||
|
require a 2-pound (minimum) explosive charge to insue complete
|
||
|
detonation of the pile. For unpacked explosives, a 1-pound (minimum)
|
||
|
explosive charge for each 100 pounds is sufficient.
|
||
|
(c) Provide for dual priming as explained in chapter 2 to
|
||
|
minimize the possibility of a misfire. For priming, either a
|
||
|
nonelectric blasting cap crimped to at least 5 feet of time blasting
|
||
|
fuse or an electric cap and firing wire may be used.
|
||
|
(d) Detonate the charges. If primed with nonelectric blasting
|
||
|
cap and time blasting fuse, ignite and take cover; if primed with
|
||
|
electric blasting cap, take cover before firing charges. The danger
|
||
|
area for piles detonated in the open is calculated according to the safe
|
||
|
distance given in paragraph 5-2.
|
||
|
|
||
|
|
||
|
APPENDIX D
|
||
|
EXPEDIENT DEMOLITIONS
|
||
|
________________________________________________________________
|
||
|
|
||
|
D-1. Use of Epedient Techniques
|
||
|
|
||
|
These techniques are not presented as a replacement for the standard
|
||
|
demolition methods but for use by experienced blasters in special
|
||
|
projects. Availability of trained men, time, and material will
|
||
|
generally determine their use.
|
||
|
|
||
|
D-2. Shaped Charges
|
||
|
|
||
|
a. DESCRIPTION. Shaped charges concentrate the energy of the
|
||
|
explosion released on a small area, making a tubular or linear fracture
|
||
|
in the target. Their versatility and simplicity makes them effective
|
||
|
against many targets, especially those made of concrete or those with
|
||
|
armour plating. Shaped charges may be improvised (fig D-1). Because of
|
||
|
the many variables, such as explosive density, configuration, and
|
||
|
density of the cavity liner, consistent results are impossible to
|
||
|
obtain. Thus experiment, or trial and error, is necessary to determine
|
||
|
the optimum standoff distances. Plastic explosive is best suited for
|
||
|
this type of charge. Dynamite and molten TNT, however may be used as an
|
||
|
expedient.
|
||
|
|
||
|
b. PREPARATION. Almost any kind of container is usable. Bowls,
|
||
|
funnels, cone-shaped glasses (champagne glasses with the stem removed),
|
||
|
and copper, tin, or zinc may be used as cavity linerse; or wine bottles
|
||
|
with a cone in the bottome (champagne or cognac bottles) are excellent.
|
||
|
If none of these is available, a reduced effect is obtained by cutting a
|
||
|
cavity into a plastic explosive block. Optimum shaped charge
|
||
|
characteristics are --
|
||
|
(1) Angle of cavity = between 30 degrees and 60 degrees (most HEAT
|
||
|
ammunition has a 42 degree to 45 degree angle).
|
||
|
(2) Standoff distance = 1 1/2 x diameter of cone
|
||
|
(3) Height of explosive in container = 2 x height of cone measured
|
||
|
from base of the cone to the top of the explosive.
|
||
|
(4) Point of detonation = exact top center of charge. Cover cap,
|
||
|
if any any part of it is exposed or extends above the charge, with a
|
||
|
small quantity of C4 explosive.
|
||
|
Note. The narrow necks of bottles or the stems of glasses may be
|
||
|
cut by wrapping tem with a piece of soft absorbant type twine or string
|
||
|
soaked in gasoline and lighting it. Two bands of adhesive tape, one on
|
||
|
each side of the twine or string, will hold it firmly in place. The
|
||
|
bottle or stemm must be turned continuously with the neck up, to heat
|
||
|
the glass uniformly. Also, a narrow band of plastic explosive placed
|
||
|
around the nexk and burned gives the same resulte. After the twine or
|
||
|
plastic has burned, submerge the neck of the bottle in water and tap it
|
||
|
against some object to break it off. TAPE THE SHARP EDGES OF THE BOTTLE
|
||
|
TO PREVENT CUTTING HANDS WHILE TAMPING THE EXPLOSIVE IN PLACE.
|
||
|
|
||
|
D-3. Platter charge
|
||
|
|
||
|
This device utilizes the Miznay-Chardin effect. It turns a metal plate
|
||
|
into a powerful blunt-nosed projectile (fig D-2). The platter should be
|
||
|
steel (preferably round, but square is satisfactory) and should weigh
|
||
|
from 2 to 6 pounds.
|
||
|
|
||
|
a. CALCULATIONS. Weight of explosives = approximately the weight of
|
||
|
the platter.
|
||
|
|
||
|
b. PREPARATION.
|
||
|
(1) Pack the explosive uniformly behind the platter. A container
|
||
|
is not necessary if the explosive can be held firmly against the
|
||
|
platter. Tape is acceptable.
|
||
|
(2) Prime the charge from the exact rear center. Cover cap, if
|
||
|
any part is exposed, with a small quantity of C4 explosive to insure
|
||
|
detonation.
|
||
|
(3) Aim the charge at the direct center of the target.
|
||
|
|
||
|
c. EFFECT. The effective range (primarily a problem of aim) is
|
||
|
approximately 35 yards for a small target. With practive, a
|
||
|
demolitionist may hit a 55-gallon drum, a relatively small target, at 25
|
||
|
yards about 90 percent of the time.
|
||
|
|
||
|
D-4. Grapeshot Charge
|
||
|
|
||
|
This charge consists of a container, preferably a No. 10 can,
|
||
|
projectiles (small pieces of steel), buffer material, an explosive
|
||
|
charge, and a blasting cap. These are assembled as shown in figure D-3.
|
||
|
|
||
|
a. COMPUTATION. The weight of the explosive is approximately 1/4 x
|
||
|
the weight of the projectiles.
|
||
|
|
||
|
b. PREPARATION.
|
||
|
(1) Assemble the projectiles, a few inches of buffer
|
||
|
material-earth, leaves, wood, felt, cloth, cardboard, etc., and the
|
||
|
explosive charge. This should be C4, packed firmly.
|
||
|
(2) Prime the charge from the exact rear center. Cover the cap,
|
||
|
if any part is exposed, with a small quantity of C4 to insure
|
||
|
detonation.
|
||
|
(3) Aim the charge toward the center of the target.
|
||
|
|
||
|
D-5. Dust Initiator
|
||
|
|
||
|
This device consists of an explosive charge (powdered TNT or C3; C4 will
|
||
|
not properly mix with the incendiary), an incendiary mix (2 parts of
|
||
|
aluminum powder or magnesium powder to 3 parts ferric oxide), and a
|
||
|
suitable finely-divided organic material (dust) or a volatile fuel such
|
||
|
as gasoline called a surround. The dust initiator is most effective in
|
||
|
an inclosed space, like a box car or a warehouse or other relatively
|
||
|
windowless structure. At detonation, the surround is distributed
|
||
|
throughout the air within the target and ignited by the incendiary
|
||
|
material.
|
||
|
|
||
|
a. COMPUTATION.
|
||
|
(1) Charge size = 1 pound (1/2 explosive, 1/2 incendiary mix).
|
||
|
(2) Cover size = 3 to 5 pounds of each 1,000 cubic feet of target.
|
||
|
The one-pound charge will effectively detonate up to 40 pounds of cover.
|
||
|
|
||
|
b. PREPARATION. Powdered TNT may be obtained by crushing it in a
|
||
|
canvas bag. The incendiary mix must be thoroughly dispersed throughout
|
||
|
the explosive. A great number of dust materials may be used as cover,
|
||
|
among which are coal dust, cocoa, bulk powdered coffee, confectioners
|
||
|
sugar, tapioca, wheat flour, corn starch, hard rubber dust, aluminum
|
||
|
powder, magnesium powder, and powdered soap. If gasoline is used, 3
|
||
|
gallons is the maximum, as more will not disperse evenly in the air and
|
||
|
thus give poor results.
|
||
|
|
||
|
D-6. Improvised Cratering Charge
|
||
|
|
||
|
This charge is a mixture of ammonium nitrate fertilizer containing at
|
||
|
least 33 1/3 percent nitrogen and diesel fuel, motor oil, or gasoline at
|
||
|
a ratio of 25 pounds of fertilizer to a quart of fuel. The ferilizer
|
||
|
must not be damp. From this mixture, improvised charges of almost any
|
||
|
sixe or configuration can be made. Proceed as follows:
|
||
|
|
||
|
a. Pour the liquid on the fertilizer.
|
||
|
|
||
|
b. Allow the mixture to soak for an hour.
|
||
|
c. Place about half the charge in the borehole. Then place the
|
||
|
primer, a primed 1-pound block of TNT, and add the remainder of the
|
||
|
charge. (Never leave the charge in the borehole for a long period, as
|
||
|
accumulated moisture reduces its effectiveness.)
|
||
|
|
||
|
d. Detonate the charge.
|
||
|
|
||
|
D-7. Ammonium Nitrate Satchel Charge
|
||
|
|
||
|
Although the cratering charge (para D-6) is excellent, it is suitable
|
||
|
only for cratering. A more manageable charge may be used by mixing
|
||
|
ammonium nitrate fertilizer with melted wax instead of oil. The primer
|
||
|
is set in place before the mixture hardens.
|
||
|
|
||
|
a. PREPARATION.
|
||
|
(1) Melt ordinary paraffin and stir in ammonium nitrate pellets,
|
||
|
making sure that the paraffin is hot while mixing.
|
||
|
(2) Before the mixture hardens add a half-pound block of TNT or
|
||
|
its equivalent as a primer.
|
||
|
(3) Pour the mixture into a container. Shrapnel material may be
|
||
|
added to the mixture if desired or attached on the outside of the
|
||
|
container to give a shrapnel effect.
|
||
|
|
||
|
b. USE. Because the wax and fertilizer may be molded into almost any
|
||
|
size or shape, it may be applied to agreat many demolition projects with
|
||
|
satisfactory effects.
|
||
|
|
||
|
_______________________________________________________
|
||
|
|
||
|
|
||
|
It seems that it is "New and Improved by the U.S. Army!" (censored), chapters
|
||
|
1,4, almost all of 5, and at least 3 appendices have been eliminated.
|
||
|
I'm sorry (yeah right) about no pictures, but what was I to do?
|
||
|
I'd pay close attention to the Appendix D, there is a lot of useful
|
||
|
information in there.
|
||
|
|
||
|
'Til Next Time
|
||
|
|
||
|
Death Jester.
|
||
|
12/01/90
|
||
|
|
||
|
===============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 06 / NIA069 /
|
||
|
/ World News Sept 1990-Jan 1991 /
|
||
|
/ Face-To-Face Publications /
|
||
|
/ /
|
||
|
|
||
|
|
||
|
International Symposium on the Prevention And Prosecution of Computer Crime
|
||
|
08/31/90
|
||
|
PR NEWSWIRE (PRN)
|
||
|
HAVANA, Aug. 31 /PRNewswire/ -- A group of experts from around the
|
||
|
world today unanimously expressed concern, at a symposium held in
|
||
|
conjunction with the eighth United Nations Congress on the
|
||
|
Prevention of Crime and Treatment of Offenders, over the lack of a
|
||
|
comprehensive international strategy to address the serious risks
|
||
|
posed by the vulnerability of computers and telecommunications to
|
||
|
criminal activity and reckless misuse.
|
||
|
"The rapid emergence of the technology and its penetration into
|
||
|
virtually every aspect of economic, industrial and intellectual
|
||
|
activity, have significantly outpaced the development of substantive
|
||
|
standards and norms of behavior for the responsible use of
|
||
|
computers," said Brian Bawden of Canada, the keynote speaker. "Yet,
|
||
|
the profound needs of the world community will continue to contribute
|
||
|
to the ready, if not eager, adoption of technological solutions."
|
||
|
Ulrich Sieber of Germany, an expert in the emerging field of
|
||
|
criminal information law, agreed. "Increasing public dependence on
|
||
|
computers has magnified the risk immensely," said Sieber, who pointed
|
||
|
out the need for a close international harmonization of applicable
|
||
|
law. "Inconsistent national laws and the current lack of mutual
|
||
|
legal assistance treaties are contributing to the creation of
|
||
|
`computer crime havens,' which in turn may provoke market
|
||
|
restrictions and national barriers to the free flow of information,"
|
||
|
said Sieber.
|
||
|
Dr. Abdulrahman al-Shenaifi of Saudi Arabia, director general of
|
||
|
the Saudi Arabian National Information Center, emphasized the global
|
||
|
character of the problems, given the development of a worldwide
|
||
|
information economy. "Lack of international cooperation will not
|
||
|
only lead to more computer-related crimes, it will imperil the free
|
||
|
economic development of an international information market," said
|
||
|
al-Shenaifi.
|
||
|
"It is important to realize that effective remedial action is just
|
||
|
as important to the economic and social interests of developing
|
||
|
nations as it is to the large industrialized countries," said Tamar
|
||
|
Oppenheimer, O.C., a former assistant secretary general of the United
|
||
|
Nations and the moderator of today's symposium. "It is equally
|
||
|
important to appreciate that action at the national level is not
|
||
|
sufficient to achieve the necessary results -- political borders are
|
||
|
largely transparent to this kind of crime and abuse, but the efforts
|
||
|
of law enforcement are very much governed by them. And the task is
|
||
|
far from simple -- over 170 sovereign states constitute the
|
||
|
international community."
|
||
|
"This is everyone's problem -- users of technology, suppliers of
|
||
|
technology and those who depend on its reliability without even
|
||
|
realizing their dependency," said Enrique Duhau of Argentina,
|
||
|
founder and president of two of Argentina's leading hardware and
|
||
|
software suppliers. "We in the technology supplier community must
|
||
|
take a leadership role, or we will have to accept solutions imposed
|
||
|
by others," said Duhau, a point amply supported in a paper by Chew
|
||
|
Teck Soon of Singapore, a Coopers & Lybrand partner and an expert in
|
||
|
information security
|
||
|
The day's proceedings, titled "International Symposium on the
|
||
|
Prevention and Prosecution of Computer Crime," will be published.
|
||
|
The symposium was organized by the Foundation for Responsible
|
||
|
Computing - Fondation pour une informatique responsable, a non-profit
|
||
|
membership organization established to assist in the development of
|
||
|
substantive national and international standards, laws, policies and
|
||
|
guidelines for the responsible use of computers and
|
||
|
telecommunications in the public and private sectors.
|
||
|
/CONTACT: Brian Bawden of Osler, Hoskin & Harcourt, 416-862-6407,
|
||
|
or Tamar Oppenheimer of the Foundation for Responsible Computing
|
||
|
(Austria), 43-222-725754/ 16:26 EDT
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
LeeMah DataCom Offers Defeated Hackers Another Chance;
|
||
|
Announcing The Second LeeMah Hacker Challenge
|
||
|
08/08/90
|
||
|
BUSINESS WIRE (BWR)
|
||
|
HAYWARD, Calif.--(BUSINESS WIRE FEATURES)--You might think a
|
||
|
computer security company that had successfully defeated 7,476
|
||
|
hackers would rest on its laurels, but LeeMah DataCom Security Corp.
|
||
|
is giving the international hacker community a second chance.
|
||
|
During its second annual LeeMah Hacker Challenge, the company is
|
||
|
daring all comers to try to beat its TraqNet security system by
|
||
|
retrieving a secret message from TraqNet-protected computers in the
|
||
|
offices of Coopers & Lybrand, the international accounting and
|
||
|
consulting firm.
|
||
|
LeeMah is even giving away the password. John Tuomy, president of
|
||
|
LeeMah, remarked, ``With most types of computer security, whether
|
||
|
software or hardware based, the password is all that stands between
|
||
|
an intruder and everything that is stored on the computer. LeeMah's
|
||
|
TraqNet system has several layers of security, so even with the
|
||
|
password, the odds against a hacker penetrating the system are one
|
||
|
in 72 quadrillion.''
|
||
|
Beginning on Aug. 22, hackers and computer enthusiasts who wish to
|
||
|
try their skill are invited to call either 212/307-6243 (New York),
|
||
|
or 415/512-7170 (San Francisco).
|
||
|
The password at either number is 533624. LeeMah is offering a
|
||
|
vacation for two to either Tahiti or St. Moritz to the first hacker
|
||
|
who succeeds in electronically breaking into one of the protected
|
||
|
computers.
|
||
|
Last year, in the first LeeMah Hacker Challenge, hackers were
|
||
|
given the password and one week to try to retrieve the secret message
|
||
|
stored on the computer.
|
||
|
This year, LeeMah has extended the contest to two weeks (Aug. 22 -
|
||
|
Sept. 5) and more telephone lines will be available, making it
|
||
|
easier to get access to the protected computer lines. The protected
|
||
|
computers will reside in the New York and San Francisco offices of
|
||
|
Coopers & Lybrand, which is overseeing the contest.
|
||
|
``When we announced our Challenge last year, a lot of hackers
|
||
|
boasted that it was going to be child's play,'' said Tuomy.
|
||
|
``When we beat them, some of them said it was because we only had
|
||
|
one phone line and they couldn't get through. Now we're giving them
|
||
|
their best shot. Those vacations are still waiting.''
|
||
|
He added, ``The problem with all the coverage of successful hacker
|
||
|
break-ins is that some people might get the impression that these
|
||
|
hackers are invincible, or that the FBI arrests of some of them will
|
||
|
act as a deterrent. The fact is that the government couldn't
|
||
|
possibley arrest all the hackers out there, and certainly cannot
|
||
|
guaranteee the safety of the nation's computers. We believe strongly
|
||
|
that computer crime can be prevented, but that businesses have to do
|
||
|
it themselves.''
|
||
|
Al Decker, Coopers & Lybrand's partner in charge of information
|
||
|
technology security services, added, ``Confidential information,
|
||
|
whether it's the specifications on a new product, a customer list, a
|
||
|
financial report, or a medical diagnosis, is frequently a company's
|
||
|
most valuable asset. Threats to information systems and
|
||
|
communication networks are real and they are growing. That's why, in
|
||
|
order to protect themselves and their customers, and to avoid severe
|
||
|
business damage, companies of all types must safeguard information
|
||
|
with the most effective means available.''
|
||
|
The results of the Challenge will be announced on Sept. 6.
|
||
|
CONTACT: Dobbin/Bolgla Associates, New York
|
||
|
Gina Fiering or Peter Dobbin, 212/807-1400
|
||
|
|
||
|
|
||
|
|
||
|
AFSA Testifies On Fair Credit Reporting Measures
|
||
|
06/12/90
|
||
|
PR NEWSWIRE (PRN)
|
||
|
WASHINGTON, June 12 /PRNewswire/ -- No new comprehensive changes
|
||
|
to the Fair Credit Reporting Act (FCRA) are needed, stated Kenneth
|
||
|
E. Hoerr, chairman and chief executive officer, USA Financial
|
||
|
Services, Inc., Peoria, Ill., in testimony today on behalf of the
|
||
|
American Financial Services Association (AFSA).
|
||
|
Hoerr noted that the credit reporting system in the United States
|
||
|
works to the benefit of consumers and creditors, and the principal
|
||
|
law governing credit reporting, FCRA, "still remains a balanced
|
||
|
approach to the area of credit reporting that has served the credit
|
||
|
industry and served and protected the consumer well." Hoerr
|
||
|
testified today before the House Banking Committee's Subcommittee on
|
||
|
Consumer Affairs and Coinage, on three bills introduced in the House
|
||
|
to amend the act (H.R. 4213, H.R. 4122, and H.R. 3740).
|
||
|
He said that AFSA shares the public concern about unauthorized
|
||
|
access to consumer credit reporting files. However, he pointed out
|
||
|
that current federal law relating to computer crime includes stiff
|
||
|
penalties for illegal access to computer files. "Before this
|
||
|
subcommittee considers enacting a new credit reporting law in the
|
||
|
interest of consumer privacy, AFSA submits that more examination is
|
||
|
needed as to how vigorously current laws ... are being enforced," he
|
||
|
said.
|
||
|
Hoerr also addressed the issue of prescreening -- a marketing
|
||
|
technique whereby computerized lists of consumers are evaluated
|
||
|
according to those most likely to desire and qualify for a
|
||
|
particular product or service. "We commend the chairman for
|
||
|
recognizing in H.R. 4213 that prescreening should continue," Hoerr
|
||
|
said. "AFSA believes that all consumers benefit from efficient
|
||
|
marketing techniques like prescreening through greater accessibility
|
||
|
to consumer credit," he added. For those consumers who do not wish
|
||
|
to receive such offers, Hoerr suggested that "a voluntary program
|
||
|
allowing consumers to opt-out of the marketing of such products may
|
||
|
be a workable system" and added that such a program is already
|
||
|
successfully operated by the Direct Marketing Association. He noted
|
||
|
that several national creditors are considering a voluntary program
|
||
|
for credit solicitations and offered to have AFSA bring together
|
||
|
interestd parties to discuss this concept.
|
||
|
To assess the level of consumer complaints relating to crediting
|
||
|
reporting issues, AFSA filed Freedom of Information/Freedom of
|
||
|
Access Acts requests with the banking or financial institution
|
||
|
agencies of all 50 states. Hoerr noted that the responses to date
|
||
|
from 31 states were included as an appendix to his testimony. In
|
||
|
reference to the responses received, Hoerr questioned the need for
|
||
|
changes to the FCRA: "We have not discovered any significant amount
|
||
|
of consumer complaints in this area and are confident that the
|
||
|
additional states not yet responding will not provide any variance
|
||
|
from our findings.
|
||
|
"In sum, there seems to be no public unhappiness with the current
|
||
|
system and no need for significant legislative change," he said.
|
||
|
AFSA is the national trade association for consumer finance, sales
|
||
|
finance, and diversified financial services firms that provide
|
||
|
credit to consumers. Its members hold one-quarter of all consumer
|
||
|
credit outstanding.
|
||
|
/CONTACT: Judy Kent of the American Financial Services
|
||
|
Association, 202-289-0400/ 12:15 EDT
|
||
|
|
||
|
|
||
|
|
||
|
Illinois Resident Testifies On Credit Reporting Measures
|
||
|
06/12/90
|
||
|
PR NEWSWIRE (PRN)
|
||
|
WASHINGTON, June 12 /PRNewswire/ -- No new comprehensive changes
|
||
|
to the Fair Credit Reporting Act (FCRA) are needed, stated Peoria
|
||
|
resident, Kenneth E. Hoerr, chairman and chief executive officer,
|
||
|
USA Financial Services, Inc., Peoria, Ill., in testimony today on
|
||
|
behalf of the American Financial Services Association (AFSA).
|
||
|
Hoerr noted that the credit reporting system in the United States
|
||
|
works to the benefit of consumers and creditors, and the principal
|
||
|
law governing credit reporting, FCRA, "still remains a balanced
|
||
|
approach to the area of credit reporting that has served the credit
|
||
|
industry and served and protected the consumer well." Hoerr
|
||
|
testified today before the House Banking Committee's Subcommittee on
|
||
|
Consumer Affairs and Coinage, on three bills introduced in the House
|
||
|
to amend the act (H.R. 4213, H.R. 4122, and H.R. 3740).
|
||
|
He said that AFSA shares the public concern about unauthorized
|
||
|
access to consumer credit reporting files. However, he pointed out
|
||
|
that current federal law relating to computer crime includes stiff
|
||
|
penalties for illegal access to computer files. "Before this
|
||
|
subcommittee considers enacting a new credit reporting law in the
|
||
|
interest of consumer privacy, AFSA submits that more examination is
|
||
|
needed as to how vigorously current laws ... are being enforced," he
|
||
|
said.
|
||
|
Hoerr also addressed the issue of prescreening -- a marketing
|
||
|
technique whereby computerized lists of consumers are evaluated
|
||
|
according to those most likely to desire and qualify for a
|
||
|
particular product or service. "We commend the chairman for
|
||
|
recognizing in H.R. 4213 that prescreening should continue," Hoerr
|
||
|
said. "AFSA believes that all consumers benefit from efficient
|
||
|
marketing techniques like prescreening through greater accessibility
|
||
|
to consumer credit," he added. For those consumers who do not wish
|
||
|
to receive such offers, Hoerr suggested that "a voluntary program
|
||
|
allowing consumers to opt-out of the marketing of such products may
|
||
|
be a workable system" and added that such a program is already
|
||
|
successfully operated by the Direct Marketing Association. He noted
|
||
|
that several national creditors are considering a voluntary program
|
||
|
for credit solicitations and offered to have AFSA bring together
|
||
|
interestd parties to discuss this concept.
|
||
|
To assess the level of consumer complaints relating to crediting
|
||
|
reporting issues, AFSA filed Freedom of Information/Freedom of
|
||
|
Access Acts requests with the banking or financial institution
|
||
|
agencies of all 50 states. Hoerr noted that the responses to date
|
||
|
from 31 states were included as an appendix to his testimony. In
|
||
|
reference to the responses received, Hoerr questioned the need for
|
||
|
changes to the FCRA: "We have not discovered any significant amount
|
||
|
of consumer complaints in this area and are confident that the
|
||
|
additional states not yet responding will not provide any variance
|
||
|
from our findings.
|
||
|
"In sum, there seems to be no public unhappiness with the current
|
||
|
system and no need for significant legislative change," he said.
|
||
|
AFSA is the national trade association for consumer finance, sales
|
||
|
finance, and diversified financial services firms that provide
|
||
|
credit to consumers. Its members hold one-quarter of all consumer
|
||
|
credit outstanding.
|
||
|
/CONTACT: Judy Kent of the American Financial Services
|
||
|
Association, 202-289-0400/ 13:47 EDT
|
||
|
|
||
|
|
||
|
|
||
|
NEW CRIMINAL JUSTICE MANUAL ISSUED TO HELP COMBAT COMPUTER CRIMINALS
|
||
|
12/01/89
|
||
|
PR NEWSWIRE (PRN)
|
||
|
|
||
|
[Editors Note: This is the Computer Crimes And Security Manual GOT is typing
|
||
|
up by chapter, Chapter 4 can be found in this issue of NIA and 1-3 in previous
|
||
|
NIA issues. -JD]
|
||
|
|
||
|
MENLO PARK, Calif., Dec. 1 /PRNewswire/ -- The National Institute
|
||
|
of Justice has published a new resource manual on computer crime in
|
||
|
an effort to keep auditors, security experts and criminal justice
|
||
|
agencies one step ahead of malicious hackers and other
|
||
|
high-technology criminals.
|
||
|
The "Criminal Justice Resource Manual on Computer Crime" provides
|
||
|
the latest information on ways to deter, detect, investigate, and
|
||
|
prosecute perpetrators of computer viruses, telephone intrusions into
|
||
|
computer networks, programmed fraud, computer larceny, software
|
||
|
piracy, and more.
|
||
|
Prepared by information security expert Donn B. Parker and
|
||
|
computer systems consultant David C. Smith of SRI International, the
|
||
|
350-page document replaces an SRI-produced manual that has been one
|
||
|
of the Justice Department's most popular publications but is now more
|
||
|
than 12 years old.
|
||
|
Using recently reported computer crime cases as illustrations, the
|
||
|
updated manual describes the many subsequent advances in computer
|
||
|
and communications technology -- and their misuse by perpetrators
|
||
|
ranging from juvenile hackers to career criminals and terrorists.
|
||
|
Of particular interest to auditors, investigators, and
|
||
|
prosecutors, the manual explains how to obtain valid evidence of a
|
||
|
crime, for example, through the design of audit logs that will
|
||
|
produce records that hold up in court.
|
||
|
The manual also includes detailed descriptions of the newest
|
||
|
federal and state laws on computer crime; a glossary of terminology;
|
||
|
and recommendations for fostering multidisciplinary cooperation and
|
||
|
reporting of suspected computer crimes.
|
||
|
A broad-based research and consulting organization, SRI houses one
|
||
|
of the world's leading consultancies on information security and
|
||
|
computer crime. It also operates the International Information
|
||
|
Integrity Institute, which helps 50 of the world's largest
|
||
|
corporations develop effective information security practices.
|
||
|
The new computer crime manual was produced for the U.S. Department
|
||
|
of Justice by SRI under subcontract to Abt Associates.
|
||
|
To order the new manual, write to the National Institute of
|
||
|
Justice, Box 60900, Rockville, Md., 20850. Or call, 800-851-3420 or
|
||
|
301-251-5500. Ask for: "Computer Crime: Criminal Justice Resource
|
||
|
Manual," NCJ 118214. $16.50.
|
||
|
/CONTACT: Suzanne Dillon of SRI International, 415-859-2304/ 17:27EST
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Biometric Cops: High Tech Securit Guards are Putting a New Lock on Security
|
||
|
10/13/89
|
||
|
BUSINESS WIRE (BWR)
|
||
|
SANTA ANA, Calif.--(BUSINESS WIRE)--Viruses, worms, hackers --
|
||
|
intruders who forced entry into vulnerable computer stystems cost
|
||
|
businesses more than $500 million last year in the United States
|
||
|
alone, according to the Los Angeles-based National Center for
|
||
|
Computer Crime Data.
|
||
|
That's a statistic likely to increase dramatically as computer
|
||
|
usage continues to escalate.
|
||
|
To the rescue, though, is a new breed of security guard, armed
|
||
|
with biometric technology, to restrict access to everything from
|
||
|
corporate data bases and secured areas to cold cash and FAX machines.
|
||
|
And, the phrase ``hands up|'' suddenly takes on new meaning to make
|
||
|
sure who's who.
|
||
|
Biometrics are the physical human traits that make people unique.
|
||
|
To verify a person's identity, biometric cops can measure hand
|
||
|
shape, fingerprints, voice patterns, retina geometry, signature
|
||
|
dynamics and keystroke rhythms -- all virtually foolproof
|
||
|
informants.
|
||
|
To be sure, biometric security is still in its infancy with less
|
||
|
than two dozen companies in the United States, Europe and Japan
|
||
|
actively marketing products. Yet, industry watchers predict the
|
||
|
market will exceed $25 million by 1991, rocketing along at a 40
|
||
|
percent annual growth rate.
|
||
|
Beaming Science Fiction Down to Earth
|
||
|
It's thought the Greeks, circa 2,000 B.C., were the first to bar
|
||
|
the door with lock and key. Now, 4,000 years later, traditional
|
||
|
locking devices still comprise a majority of the multibillion dollar
|
||
|
access control systems market around the world.
|
||
|
True, today's keys might be magnetic-striped tokens or
|
||
|
microchip-embedded ``smart'' cards. But, just as the Greeks of
|
||
|
yesteryear must have discovered to their dismay, keys -- technology
|
||
|
notwithstanding -- can be lost, stolen or borrowed. Open sesame|
|
||
|
Not a problem aboard the Starship Enterprise. The vehicle's
|
||
|
computer would verify Mr. Spock's handprint before allowing him
|
||
|
access to its secrets. Now, back to the future and down to earth,
|
||
|
examining physical hand characteristics is one of six currently
|
||
|
available biometric technologies that offer near fail-safe identity
|
||
|
verification for subsequent access:
|
||
|
Hand geometry measures finger length, skin translucency, palm
|
||
|
thickness and shape;
|
||
|
Fingerprint systems analyze the unique ridges, loops and
|
||
|
bifurcations of finger and thumb topology;
|
||
|
Retina scans read the size, location and pattern of blood vessels
|
||
|
in the back of the eye;
|
||
|
Signature dynamics tracks the motions used in the writing process,
|
||
|
rather than the signature itself;
|
||
|
Keystroke analysis compares the individual patterns and rhythms of
|
||
|
typing repetitive character groups;
|
||
|
Voice verification maps the actual physiology that produces
|
||
|
speech,
|
||
|
not merely sounds or pronunciation.
|
||
|
In all cases, these biometric portraits are captured by sensor
|
||
|
devices, converted digitally into algorithms and compared with
|
||
|
pre-stored authorized profiles. Access is denied unless a match is
|
||
|
made. Additionally, a detailed audit trail automatically documents
|
||
|
all the particulars.
|
||
|
Not Being There
|
||
|
Most of these technologies require physical presence, contact or,
|
||
|
at least, proximity: the hand on a sensor pad, the eye into a
|
||
|
scanner, fingers over a keyboard. Only one, voice verification,
|
||
|
offers the opportunity for identification and access from remote
|
||
|
locations.
|
||
|
Indeed, voice verification can handle physical access control for
|
||
|
buildings, vaults, computer terminals of the executive washroom.
|
||
|
But, its added value, particularly in today's ``telecommunicating''
|
||
|
world, is in not being there.
|
||
|
In fact, it's incalculable how much business is conducted by
|
||
|
telephone from the desk, from phone booths, from cars and, for that
|
||
|
matter, from briefcases. For a rapidly growing number of instances,
|
||
|
it's crucial to know exactly who's on the line: bank fund
|
||
|
transfers, confidential corporate information, stock and commodity
|
||
|
trades or computer access, just to name a few. And the horror
|
||
|
stories abound, healined by teenaged hackers, computer viruses,
|
||
|
mountains of junk FAX mail and electronic embezzlement.
|
||
|
Existing telephone security methods consist primarily of passsword
|
||
|
and dialback systems. But just like keys, passwords easily can fall
|
||
|
into the wrong hands. Dialback procedures only work when the caller
|
||
|
always originates contact from the same location. Neither,
|
||
|
furthermore, keeps fail-safe records of each transaction, completed
|
||
|
or not.
|
||
|
Voice Verification Speaks Out
|
||
|
Until now, voice verification security has been limited to
|
||
|
dedicated, stand-alone systems confined to local sites. Used
|
||
|
primarily to police door entry and exit, these localized systems
|
||
|
compete with other biometrics such as hand, fingerprint and retinal
|
||
|
scanners, as well as with traditional badge readers and the old
|
||
|
standby, armed guards.
|
||
|
However, Ver-A-Tel, from Alpha Microsystems, Santa Ana, Calif.,
|
||
|
took a giant step forward as the only commercially available
|
||
|
biometric security system that can be used over standard dial-in
|
||
|
telephone lines. A typical Ver-A-Tel microcomputer-based system
|
||
|
handles as many as 5,000 callers at just about $4 each, connects to
|
||
|
virtually any PBX (private branch exchange) and scores 99.88 percent
|
||
|
accuracy.
|
||
|
With Ver-A-Tel, callers need enroll only once by simply recording
|
||
|
their voices -- using a brief phrase of their choice -- over a
|
||
|
standard telephone. Then, when access is sought, the PC-AT
|
||
|
compatible personal computer scans and analyzes the caller's voice
|
||
|
and compares it to the authorized vocal pattern on file.
|
||
|
(Incidentally, Ver-A-Tel automatically adjusts for long-term changes
|
||
|
in the users' voices.)
|
||
|
Uniquely, enrollment, access request and verification occur over
|
||
|
local or long-distance telephone lines.
|
||
|
When verification is successful, the caller gets through --
|
||
|
directly or to one of nine pre-selected extensions that could be a
|
||
|
computer terminal, a FAX machine, an encryption device or a
|
||
|
higher-security telephone. The answering person or device is told
|
||
|
the caller has been verified. If the caller can't be verified after
|
||
|
three attempts, Ver-A-Tel politely disconnects and documents the
|
||
|
attempt.
|
||
|
Alpha Micro's Ver-A-Tel produces a comprehensive audit trail,
|
||
|
including who was verified and when, rejections, where the caller
|
||
|
was transferred, busy signals, whether a modem was detected, or if
|
||
|
someone answered by voice. In addition, the centralized access
|
||
|
control feature enables administrators to instantly remove
|
||
|
authorization regardless of caller location.
|
||
|
For guarding secured areas on site, Ver-A-Tel centrally controls
|
||
|
as many as 250 door locks connected over existing telephone wiring.
|
||
|
In addition, physical access authorization can be integrated with
|
||
|
the dial-in enrollment database to effectively and efficiently
|
||
|
consolidate the entire security system. The result? A unified force
|
||
|
of caller-friendly biometric cops on the beat armed appropriately for
|
||
|
the Electronic Age.
|
||
|
CONTACT: Alpha Microsystems, Santa Ana
|
||
|
Mike Grimes, 714/641-6266
|
||
|
or
|
||
|
Gary Nelson, 714/641-6275
|
||
|
or
|
||
|
Hill and Knowlton, Newport Beach
|
||
|
Michaela Brohm, 714/752-1106
|
||
|
|
||
|
|
||
|
|
||
|
Virus Maker Who Hit NASA Computers May be Probed
|
||
|
Credit: SPECIAL DALLAS MORNING NEWS
|
||
|
12/31/90
|
||
|
Toronto Star (TOR)
|
||
|
Edition: HOLIDAY
|
||
|
Section: BUSINESS TODAY
|
||
|
Page: B3
|
||
|
Origin: DALLAS
|
||
|
(Copyright The Toronto Star)
|
||
|
--- Virus maker who hit NASA computers may be probed ---
|
||
|
DALLAS (Special) - The U.S. space agency has asked Dallas
|
||
|
authorities to investigate and try to prosecute a former
|
||
|
Electronic Data Systems Corp. employee suspected of creating a
|
||
|
computer virus that attacked hundreds of government, university,
|
||
|
business and even congressional computers, police have reported.
|
||
|
Since 1988, the widespread electronic bug called Scores has
|
||
|
infected and wiped out information in Apple Macintosh personal
|
||
|
computers used by the National Aeronautics and Space
|
||
|
Administration, the Environmental Protection Agency and other
|
||
|
government agencies.
|
||
|
If Dallas authorities believe the evidence is sufficient, the
|
||
|
suspect could be charged with a third-degree felony under the
|
||
|
state's five-year-old computer crime law.
|
||
|
NASA investigators believe a disgruntled employee of EDS, a Plano,
|
||
|
Texas-based computer services and data processing firm, created
|
||
|
the Scores virus, planted it in his employer's computers and then
|
||
|
resigned before the infection broke out.
|
||
|
|
||
|
|
||
|
|
||
|
New Crime Busters Tote Calculators
|
||
|
Credit: CP
|
||
|
12/31/90
|
||
|
Toronto Star (TOR)
|
||
|
Edition: HOLIDAY
|
||
|
Section: BUSINESS TODAY
|
||
|
Page: B5
|
||
|
Origin: WINNIPEG
|
||
|
(Copyright The Toronto Star)
|
||
|
--- New crime busters tote calculators ---
|
||
|
WINNIPEG (CP) - Forensic accountant.
|
||
|
The phrase crops up with increasing frequency in stories about
|
||
|
corporate crime or business bungling and you can forget the
|
||
|
bean-counter stereotype about a life of bottom-line boredom.
|
||
|
The exploits of forensic accountants read like a hit television
|
||
|
show, as they nail fraud artists, conduct autopsy-like audits to
|
||
|
unravel money-laundering schemes and act as star witnesses in
|
||
|
cases that get headlines.
|
||
|
Take, for instance, Michael Mumford, manager of the Lindquist
|
||
|
forensic and investigative accounting practice for Peat Marwick
|
||
|
Thorne in Winnipeg.
|
||
|
Late one evening he gets the call that his help is needed in a raid
|
||
|
on a Great Lakes commercial fishing operation.
|
||
|
The next morning, there he is, armed with his calculator alongside
|
||
|
real gun-toting crime busters about to storm the fishing lodge.
|
||
|
"I think I've got the sexiest side of it," Mumford says of his
|
||
|
niche in the accounting world.
|
||
|
"This is definitely not a scenario of what an accountant normally
|
||
|
does."
|
||
|
Applying accounting knowledge to legal problems is not new but the
|
||
|
term forensic accountant is still far from a household phrase.
|
||
|
Even Mumford says he had to ask what it was when he first heard the
|
||
|
term in 1985 and he still has to explain the nature of his work to
|
||
|
his colleagues at the firm.
|
||
|
"Forensics has been around as long as accounting," says Alan
|
||
|
Martyszenko of Price Waterhouse's financial services group.
|
||
|
"But the term is relatively new. It used to be you were an
|
||
|
investigative accountant."
|
||
|
No matter what you call them, essentially what you get when you
|
||
|
call on a forensic accountant is a combination of detective and
|
||
|
auditor, who will come up with the story behind the numbers.
|
||
|
Peat Marwick Thorne hypes its forensic team with a catchy case
|
||
|
study entitled Bloodhounds of the Bottomline.
|
||
|
"We try and shed some light and find out what really occurred,"
|
||
|
Mumford says.
|
||
|
Insurance claims, regulatory matters, conflicts of interest,
|
||
|
shareholder disputes or the smell of kickbacks all draw the
|
||
|
forensic accountant.
|
||
|
"Every case is different," says Walter Dubowec, managing partner of
|
||
|
Deloitte & Touche.
|
||
|
"If you have a nose for that kind of work you can zero in and look
|
||
|
past the forest for what needs to be done."
|
||
|
For forensic accountants, what needs to be done is to provide the
|
||
|
kind of information and analysis that will stand up in court.
|
||
|
That's where the word forensic - meaning of or used in courts of
|
||
|
law - comes in.
|
||
|
Inspector Hank Moorlag of the RCMP commercial crime section in
|
||
|
Winnipeg suggests their importance cannot be overemphasized in
|
||
|
some cases, such as the recent charges of illegal trading that
|
||
|
rocked the Winnipeg Commodity Exchange, where explaining the
|
||
|
numbers is what really counts.
|
||
|
Mumford says he sometimes feels like Sherlock Holmes.
|
||
|
|
||
|
|
||
|
|
||
|
Angry Former Employee Probed In Computer Virus Case
|
||
|
Credit: Associated Press
|
||
|
12/29/90
|
||
|
HOUSTON CHRONICLE (HOU)
|
||
|
Edition: 2 STAR
|
||
|
Section: A
|
||
|
Page: 28
|
||
|
Origin: DALLAS
|
||
|
(Copyright 1990)
|
||
|
DALLAS - A man suspected of creating a computer virus that
|
||
|
infected personal computers at NASA and other government agencies is
|
||
|
being investigated by the Dallas police, officials said.
|
||
|
The unidentified suspect, who has not been arrested, is a
|
||
|
disgruntled former employee of Electronic Data Systems Corp., police
|
||
|
Sgt. Gary White told the Dallas Times Herald. EDS is based in
|
||
|
Dallas.
|
||
|
White said the suspect, who resigned from EDS shortly before the
|
||
|
virus broke out, could be charged with a third-degree felony under
|
||
|
the Texas computer crime law.
|
||
|
Police are investigating the suspect and will decide in late
|
||
|
January or February whether to file charges using evidence turned
|
||
|
over by NASA investigators, White said.
|
||
|
``At this point we're just gathering as much information as we
|
||
|
can on who has been infected, looking over case reports, seeing if it
|
||
|
can be prosecuted under state law,'' White said.
|
||
|
Federal authorities decided the case could be better prosecuted
|
||
|
at the local level because of difficulty in proving the suspect's
|
||
|
intent to contaminate government computers.
|
||
|
The virus, known as Scores, was among the first in the late 1980s
|
||
|
to draw attention to the susceptibility of government computer
|
||
|
networks to remote tampering.
|
||
|
The program, which affects only MacIntosh computers, lies dormant
|
||
|
before gradually destroying files, systems and hard disks.
|
||
|
The virus attacked NASA computers in Washington, Maryland and
|
||
|
Florida for five months in 1988. It also attacked computers at the
|
||
|
Environmental Protection Agency, the National Oceanic and Atmospheric
|
||
|
Administration and the U.S. Sentencing Commission.
|
||
|
NASA and FBI investigators traced the virus to EDS because it was
|
||
|
designed to attack two programs used exclusively by the company.
|
||
|
``It was by no means one of the more destructive viruses. It was
|
||
|
widespread,'' said John McAfee, chairman of the Computer Virus
|
||
|
Industry Association.
|
||
|
White said the virus has been purged from government computers
|
||
|
but continues to infect private systems.
|
||
|
``You can go in and erase them out of your system, but somebody
|
||
|
always has a disk in a desk drawer or somewhere they haven't used for
|
||
|
a while,'' White said. ``They don't think and stick it back in.''
|
||
|
|
||
|
|
||
|
Prosecution of Computer Virus Creator Urged
|
||
|
Credit: Dallas Morning News
|
||
|
12/29/90
|
||
|
The San Diego Union and Tribune (SDU)
|
||
|
Pub: UNION
|
||
|
Edition: 1,2,3,4,5,6
|
||
|
Section: BUSINESS
|
||
|
Page: D-1
|
||
|
Origin: DALLAS
|
||
|
(Copyright 1990)
|
||
|
DALLAS -- The National Aeronautics and Space Administration has asked
|
||
|
Dallas authorities to investigate and try to prosecute a former
|
||
|
Electronic Data Systems Corp. employee suspected of creating a
|
||
|
computer virus that attacked hundreds of government, university,
|
||
|
business and even congressional computers, police said yesterday.
|
||
|
Since 1988, the widespread electronic bug called Scores has infected
|
||
|
and wiped out information in Apple Macintosh personal computers used
|
||
|
by NASA, the Environmental Protection Agency, the National Oceanic
|
||
|
and Atmospheric Administration and the U.S. Sentencing Commission.
|
||
|
Mainly by way of publicly accessible electronic bulletin boards, the
|
||
|
infection spread to computers in universities and U.S. and European
|
||
|
companies. The virus destroyed files, made systems shut down or
|
||
|
"crash" or ruined hard disks that store valuable data and a variety
|
||
|
of programs such as word processing, spreadsheets or graphics.
|
||
|
"It's even gotten into some of the congressional computers used in
|
||
|
Washington, D.C., and in the home (district) states," said Dallas
|
||
|
police Sgt. Gary White.
|
||
|
White is one of two officers who will investigate the case if the
|
||
|
Dallas Police Department gives the OK.
|
||
|
The suspect, whose identity has not been released, could be charged
|
||
|
with a third-degree felony under the state's 5-year-old computer
|
||
|
crime law.
|
||
|
NASA investigators believe a disgruntled employee of EDS, a suburban,
|
||
|
Plano, Texas-based computer services and data processing firm,
|
||
|
created the Scores virus, planted it in his employer's computers and
|
||
|
then resigned before the infection broke out.
|
||
|
|
||
|
|
||
|
|
||
|
Suspect Targeted in Computer Virus Case
|
||
|
Credit: AP
|
||
|
12/29/90
|
||
|
AUSTIN AMERICAN-STATESMAN (AAS)
|
||
|
Edition: FINAL
|
||
|
Section: CITY/STATE
|
||
|
Page: C3
|
||
|
Origin: DALLAS
|
||
|
(Copyright 1990)
|
||
|
DALLAS (AP) - A man suspected of creating a computer virus that
|
||
|
infected personal computers at NASA and other government agencies is
|
||
|
being investigated by the Dallas police, officials said.
|
||
|
The unidentified suspect, who has not been arrested, is a former
|
||
|
employee of Electronic Data Systems Corp., police Sgt. Gary White
|
||
|
told the Dallas Times Herald. EDS is based in Dallas.
|
||
|
White said the suspect, who resigned from EDS shortly before the
|
||
|
virus broke out, could be charged with a third-degree felony under
|
||
|
Texas computer crime law.
|
||
|
Police are investigating and will decide in late January or
|
||
|
February whether to file charges using evidence turned over by NASA
|
||
|
investigators, White said.
|
||
|
Federal authorities decided the case could be better prosecuted
|
||
|
at the local level because of difficulty in proving the suspect's
|
||
|
intent to contaminate government computers.
|
||
|
The virus, known as Scores, was among the first in the late 1980s
|
||
|
to draw attention to the susceptibility of government computer
|
||
|
networks to remote tampering.
|
||
|
The program, which affects only Macintosh computers, lies dormant
|
||
|
before gradually destroying files, systems and hard disks.
|
||
|
The virus attacked NASA computers in Washington, Maryland and
|
||
|
Florida for five months in 1988. It also attacked computers at the
|
||
|
Environmental Protection Agency, the National Oceanic and Atmospheric
|
||
|
Administration and the U.S. Sentencing Commission.
|
||
|
NASA and FBI investigators traced the virus to EDS because it was
|
||
|
designed to attack two programs used exclusively by the company.
|
||
|
"It was by no means one of the more destructive viruses. It was
|
||
|
widespread," said John McAfee, chairman of the Computer Virus
|
||
|
Industry Association.
|
||
|
White said the virus has been purged from government computers,
|
||
|
but continues to infect private systems.
|
||
|
|
||
|
|
||
|
|
||
|
Former EDS Employee Suspected of Planting Federal Computer Virus
|
||
|
Credit: AP
|
||
|
12/29/90
|
||
|
AUSTIN AMERICAN-STATESMAN (AAS)
|
||
|
Edition: CENTEX
|
||
|
Section: CENTEX
|
||
|
Page: C3
|
||
|
Origin: DALLAS
|
||
|
(Copyright 1990)
|
||
|
DALLAS (AP) - A man suspected of creating a computer virus that
|
||
|
infected personal computers at NASA and other government agencies is
|
||
|
being investigated by the Dallas police, officials said.
|
||
|
The unidentified suspect, who has not been arrested, is a former
|
||
|
employee of Electronic Data Systems Corp., police Sgt. Gary White
|
||
|
told the Dallas Times Herald. EDS is based in Dallas.
|
||
|
White said the suspect, who resigned from EDS shortly before the
|
||
|
virus broke out, could be charged with a third-degree felony under
|
||
|
Texas computer crime law.
|
||
|
Police are investigating and will decide in late January or
|
||
|
February whether to file charges using evidence turned over by NASA
|
||
|
investigators, White said.
|
||
|
Federal authorities decided the case could be better prosecuted
|
||
|
at the local level because of difficulty in proving the suspect's
|
||
|
intent to contaminate government computers.
|
||
|
The virus, known as Scores, was among the first in the late 1980s
|
||
|
to draw attention to the susceptibility of government computer
|
||
|
networks to remote tampering.
|
||
|
The program, which affects only Macintosh computers, lies dormant
|
||
|
before gradually destroying files, systems and hard disks.
|
||
|
The virus attacked NASA computers in Washington, Maryland and
|
||
|
Florida for five months in 1988. It also attacked computers at the
|
||
|
Environmental Protection Agency, the National Oceanic and Atmospheric
|
||
|
Administration and the U.S. Sentencing Commission.
|
||
|
NASA and FBI investigators traced the virus to EDS because it was
|
||
|
designed to attack two programs used exclusively by the company.
|
||
|
"It was by no means one of the more destructive viruses. It was
|
||
|
widespread," said John McAfee, chairman of the Computer Virus
|
||
|
Industry Association.
|
||
|
White said the virus has been purged from government computers,
|
||
|
but continues to infect private systems.
|
||
|
|
||
|
|
||
|
|
||
|
Bulgarians Adept at Breeding Lethal Computer Bugs // U.S. Military
|
||
|
Network Among Those Attacked by Virus
|
||
|
Byline: Chuck Sudetic
|
||
|
Credit: New York Times
|
||
|
12/25/90
|
||
|
STAR TRIBUNE: NEWSPAPER OF THE TWIN CITIES Mpls.-St. Paul (MSP)
|
||
|
Edition: METRO
|
||
|
Section: NEWS
|
||
|
Page: 18B
|
||
|
Origin: Sofia, Bulgaria
|
||
|
(Copyright 1990)
|
||
|
Bulgaria has become the breeding ground of some of the world's most
|
||
|
lethal computer viruses, programs that are maliciously designed to
|
||
|
spread through computer memories and networks and at times destroy
|
||
|
valuable stored information such as bank and medical records.
|
||
|
"We've counted about 300 viruses written for the IBM personal
|
||
|
computer; of these, 80 or 90 originated in Bulgaria," said Morton
|
||
|
Swimmer of Hamburg University's Virus Test Center, which specializes
|
||
|
in diagnosing and curing Eastern European computer viruses.
|
||
|
"Not only do the Bulgarians produce the most computer viruses,
|
||
|
they produce the best."
|
||
|
One Bulgarian virus, Dark Avenger, has infected U.S. military
|
||
|
computers, said John McAfee, who runs the Computer Virus Industry
|
||
|
Association, which is based in Santa Clara, Calif., and tracks
|
||
|
viruses for computer hardware and software companies.
|
||
|
"I'm not saying that any super-secure computers have been
|
||
|
infected," he said. "But the U.S. Defense Department has about
|
||
|
400,000 personal computers and anyone who has that many machines has
|
||
|
a 100 percent probability of being hit."
|
||
|
"It is causing some people in sensitive places a lot of
|
||
|
problems," a Western diplomat said, "and they are very reluctant to
|
||
|
admit they have them."
|
||
|
"I would say that 10 percent of the 60 calls we receive each
|
||
|
week are for Bulgarian viruses and 99 percent of these are for Dark
|
||
|
Avenger," McAfee said, adding that the virus has attacked computers
|
||
|
belonging to banks, insurance and accounting companies,
|
||
|
telecommunications companies and medical offices.
|
||
|
"I've had a lot of calls from Frankfurt," Swimmer said. "One
|
||
|
bank was very nervous about it, but I can't reveal its name for
|
||
|
obvious reasons."
|
||
|
Several experts say the spread of the Bulgarian viruses is less
|
||
|
the result of activities by the secret police than it is the
|
||
|
consequence of having developed a generation of young Bulgarians
|
||
|
whose programming skills found few outlets beyond hacking
|
||
|
interventions.
|
||
|
A decade ago, the country's Communist leaders decided to make
|
||
|
Bulgaria an Eastern-bloc Silicon Valley, said Vesselin Bontchev, a
|
||
|
Bulgarian computer specialist.
|
||
|
Bulgarian factories began producing computers and the government
|
||
|
placed them in workshops, schools and institutes. Many computers,
|
||
|
however, stood idle because people did not know how to apply them or
|
||
|
lacked an economic interest in doing so.
|
||
|
"People took office computers home and their children began
|
||
|
playing on them," he said, adding that buying a private computer was
|
||
|
almost impossible.
|
||
|
These children quickly acquired software-writing skills, but had
|
||
|
little or no chance to apply them constructively, he said.
|
||
|
They began bootlegging copyrighted Western software, especially
|
||
|
computer games, by overriding devices written into the software to
|
||
|
prevent it from being copied. Then they started altering the
|
||
|
operating systems that drive the computer itself.
|
||
|
"From there it was one small step to creating viruses that
|
||
|
attack files when they are acted on by the operating system," he
|
||
|
said.
|
||
|
Bontchev estimated there are only about a dozen young Bulgarian
|
||
|
computer programmers who have written the viruses that have caused
|
||
|
all the trouble.
|
||
|
"Computer hackers here write viruses to show who is who in
|
||
|
computer science in Bulgaria, to find a place in the sun," said Slav
|
||
|
Ivanov, editor of a Bulgarian computer magazine. "The young computer
|
||
|
people just don't rank in our society. They don't receive enough
|
||
|
money."
|
||
|
The average wage of a software writer in Bulgaria is about $30 a
|
||
|
month, Bontchev said.
|
||
|
One virus designer, however, acknowledged that revenge was also
|
||
|
a factor.
|
||
|
"I designed my first computer virus for revenge against people
|
||
|
at work," said Lubomir Mateev, who helped write a nondestructive
|
||
|
virus known as Murphy, which shares many of Dark Avenger's tricks.
|
||
|
"Our first virus made all the computers at work send out a noise
|
||
|
when they were switched on."
|
||
|
Mateev, 23, said he collaborated with Dark Avenger's designer
|
||
|
last spring on a new virus that is harder to diagnose and cure
|
||
|
because it is self-mutating.
|
||
|
"Dark Avenger's designer told me he would take a job as a
|
||
|
janitor in a Western software firm just to get out of Bulgaria," he
|
||
|
said. Attempts during several months to get in touch with Dark
|
||
|
Avenger's creator proved fruitless.
|
||
|
For now, Bulgaria's computer-virus designers can act with
|
||
|
complete legal immunity.
|
||
|
"We have no law on computer crime," said Ivanov, whose magazine
|
||
|
offers free programs that cure known Bulgarian viruses. "The police
|
||
|
are only superficially interested in this matter."
|
||
|
Bulgaria's secret-police computers have also been infected, said
|
||
|
a well-placed Bulgarian computer expert.
|
||
|
Dark Avenger has also spread to the Soviet Union, Britain,
|
||
|
Czechoslovakia, Poland and Hungary, Bontchev said, adding, "I've
|
||
|
even had one report that it has popped up in Mongolia."
|
||
|
"The Dark Avenger is the work of a Sofia-based programmer who is
|
||
|
known to have devised 13 different viruses with a host of different
|
||
|
versions," Bontchev said. "He is a maniac."
|
||
|
Bontchev said he was almost certain Bulgaria's government was
|
||
|
not involved with Dark Avenger.
|
||
|
"A computer virus cannot be used as a weapon because it cannot
|
||
|
be aimed accurately and can return like a boomerang to damage
|
||
|
programs belonging to the creator himself," he said. "It can be used
|
||
|
only to cause random damage, like a terrorist bomb."
|
||
|
Unlike less-infectious viruses, Dark Avenger attacks computer
|
||
|
data and programs when they are copied, printed or acted on in other
|
||
|
ways by a computer's operating system, Bontchev said. The virus
|
||
|
destroys information every 16th time an infected program is run.
|
||
|
A virus can spread from one computer to another either on floppy
|
||
|
disks or through computer modems or computer networks, he said. Many
|
||
|
viruses are spread at computer fairs and through computer
|
||
|
bulletin-board systems where enthusiasts exchange information over
|
||
|
the telephone.
|
||
|
Legislation on computer crime will be introduced in parliament
|
||
|
once a criminal code is adopted, said Ilko Eskanazi, a parliamentary
|
||
|
representative who has an interest in the virus issue.
|
||
|
"We are now seeing viruses emerging on entirely new ground in
|
||
|
Eastern Europe," Bontchev said.
|
||
|
"Things may get much worse before they improve," he warned. "The
|
||
|
first law of computer viruses is that if a virus can be made, it
|
||
|
will be. The second law is that if a computer virus cannot be made,
|
||
|
it will be anyway."
|
||
|
|
||
|
|
||
|
|
||
|
CALIFORNIA
|
||
|
12/14/90
|
||
|
USA TODAY (USAT)
|
||
|
Edition: FINAL
|
||
|
Section: NEWS
|
||
|
Page: 10A
|
||
|
Category: Across the USA
|
||
|
(Copyright 1990)
|
||
|
SAN FRANCISCO - Auto insurance rate cuts for good drivers, rate
|
||
|
hikes up to 40% for others were OK'd by Insurance Commissioner Roxani
|
||
|
Gillespie. Insurers may use new rates in '91 - ending freeze in
|
||
|
place since '89 passage of Proposition 103 insurance rules. ...
|
||
|
BERKELEY - 386 absentee ballots in city's mayoral race cannot be
|
||
|
counted because they arrived day after Dec. 4 election, judge ruled.
|
||
|
Loni Hancock beat challenger Fred Weekes by 77 votes. ... HAYWARD -
|
||
|
Peace activist Susan Rodriguez, 36, was convicted of felony
|
||
|
vandalism, burglary for using sledge hammer to smash computers at
|
||
|
Physics Intl. Firm does defense work, officials said.
|
||
|
|
||
|
|
||
|
|
||
|
IDAHO
|
||
|
12/14/90
|
||
|
USA TODAY (USAT)
|
||
|
Edition: FINAL
|
||
|
Section: NEWS
|
||
|
Page: 10A
|
||
|
Category: Across the USA
|
||
|
(Copyright 1990)
|
||
|
BOISE - Salmon protection on Columbus, Snake rivers is main goal of
|
||
|
new 30,000-member coalition of business, environmental, sport groups,
|
||
|
coordinator said. Group will push for changes at federal dams to
|
||
|
stop salmon deaths. ... NAMPA - Zilog Inc. - computer chip maker -
|
||
|
will pay $3,959 fine for violating labeling laws on hazardous waste
|
||
|
containers, Dept. of Health and Welfare spokesman said.
|
||
|
|
||
|
|
||
|
|
||
|
Bulgaria Has One World-Class Export
|
||
|
Byline: Chuck Sudetic
|
||
|
Credit: NEW YORK TIMES
|
||
|
12/26/90
|
||
|
Ottawa Citizen (OTT)
|
||
|
Edition: Final
|
||
|
Section: NEWS
|
||
|
Page: A2
|
||
|
Category: NEWS
|
||
|
Origin: SOFIA, Bulgaria
|
||
|
(Copyright The Ottawa Citizen)
|
||
|
--- Bulgaria has one world-class export ---
|
||
|
Not only do the Bulgarians produce the most computer viruses,"
|
||
|
says a Hamburg University expert on the matter, "they produce the
|
||
|
best."
|
||
|
Morton Swimmer and his Virus Test Centre have counted about 300
|
||
|
programs that attack IBM personal computers -- spread through
|
||
|
their computer memories and, at times, destroy valuable
|
||
|
information stored there, like bank or medical records. Eighty or
|
||
|
90 of them originated in Bulgaria.
|
||
|
The most notable, called Dark Avenger, has attacked banks,
|
||
|
insurance and accounting companies, telecommunications firms and
|
||
|
medical offices.
|
||
|
It has even infected American military computers, according to
|
||
|
John McAfee, who runs the Computer Virus Industry Association in
|
||
|
Santa Clara, Calif.
|
||
|
"I'm not saying that any super-secure computers have been
|
||
|
infected, but the U.S. Defence Department has about 400,000
|
||
|
personal computers, and anyone who has that many machines has a
|
||
|
100-per-cent probability of being hit."
|
||
|
Perhaps it wasn't the most ingratiating way of doing it, but
|
||
|
Bulgaria has at last shown Western countries it can compete with
|
||
|
them on their own terms.
|
||
|
Hackers without a cause
|
||
|
Experts say Bulgarian viruses don't spring from some secret-police
|
||
|
plot but are the consequence of the country's former Communist
|
||
|
leaders having developed a generation of young people with great
|
||
|
programming skills but few outlets beyond hacking.
|
||
|
A decade ago, Bulgaria decided to make itself into the East bloc's
|
||
|
Silicon Valley, says Vesselin Bontchev, a Bulgarian computer
|
||
|
specialist.
|
||
|
Factories began churning out computers, and the government
|
||
|
introduced them into workshops, schools and institutes. Many of
|
||
|
them, however, stood idle because people did not know how to apply
|
||
|
them or lacked an economic interest in doing it.
|
||
|
So, "people took office computers home, and their children began
|
||
|
playing on them," Bontchev says. These children quickly acquired
|
||
|
software-writing skills, but had little or no chance to apply them
|
||
|
constructively.
|
||
|
They began bootlegging copyrighted Western software, especially
|
||
|
computer games, by overriding devices written into the software to
|
||
|
prevent it from being copied. Soon they were altering the
|
||
|
operating systems that drive the computer itself.
|
||
|
"From there it was one small step to creating viruses that attack
|
||
|
files when they are acted on by the operating system," Bontchev
|
||
|
says.
|
||
|
He estimates no more than a dozen young Bulgarian computer
|
||
|
programmers are responsible for the viruses that have caused all
|
||
|
the trouble.
|
||
|
"Computer hackers here write viruses to show who is who in
|
||
|
computer science in Bulgaria, to find a place in the sun," says
|
||
|
Slav Ivanov, editor of a Bulgarian computer magazine. "The young
|
||
|
computer people just don't rank in our society. They don't
|
||
|
receive enough money."
|
||
|
The average wage of a software writer in Bulgaria is about $30 a
|
||
|
month, Bontchev says.
|
||
|
One virus designer, however, says that revenge plays a large part
|
||
|
in Bulgaria's viral productivity.
|
||
|
"I designed my first computer virus for revenge against people at
|
||
|
work," says Lubomir Mateev, who helped write a non-destructive
|
||
|
virus known as Murphy, which shares many of Dark Avenger's tricks.
|
||
|
"Our first virus made all the computers at work send out a noise
|
||
|
when they were switched on."
|
||
|
Mateev, 23, says he collaborated with Dark Avenger's designer last
|
||
|
spring on a new virus that is harder to diagnose and cure because
|
||
|
it is self-mutating.
|
||
|
"Dark Avenger's designer told me he would take a job as a janitor
|
||
|
in a Western software firm just to get out of Bulgaria," he says.
|
||
|
Attempts during several months to get in touch with Dark Avenger's
|
||
|
creator proved fruitless.
|
||
|
Bulgaria's secret-police computers have also been infected, says a
|
||
|
well-placed Bulgarian computer expert, who spoke on condition of
|
||
|
anonymity and refused to elaborate.
|
||
|
Dark Avenger has spread to the Soviet Union, Britain,
|
||
|
Czechoslovakia, Poland and Hungary, Bontchev says. "I've even had
|
||
|
one report that it has popped up in Mongolia."
|
||
|
He is almost certain Bulgaria's government had nothing to do with
|
||
|
Dark Avenger's success.
|
||
|
"A computer virus cannot be used as a weapon because it cannot be
|
||
|
aimed accurately and can return like a boomerang to damage
|
||
|
programs belonging to the creator himself," he says. "It can be
|
||
|
used only to cause random damage, like a terrorist bomb."
|
||
|
Unlike less infectious viruses, Dark Avenger attacks computer data
|
||
|
and programs when they are copied, printed or acted on in other
|
||
|
ways by a computer's operating system, Bontchev says. The virus
|
||
|
destroys information every 16th time an infected program is run.
|
||
|
There's no law against it
|
||
|
For now, Bulgaria's computer virus designers can act with complete
|
||
|
legal immunity.
|
||
|
"We have no law on computer crime," says Ivanov, whose magazine
|
||
|
offers free programs that cure known Bulgarian viruses. "The
|
||
|
police are only superficially interested in this matter."
|
||
|
Legislation on computer crime will be introduced in parliament
|
||
|
once a criminal code is adopted, says Ilko Eskanazi, a
|
||
|
parliamentary representative who has taken an interest in the
|
||
|
virus issue.
|
||
|
"We are now seeing viruses emerging on entirely new ground in
|
||
|
Eastern Europe," Bontchev says.
|
||
|
"Things may get much worse before they improve," he warns. "The
|
||
|
first law of computer viruses is that if a virus can be made, it
|
||
|
will be. The second law is that if a computer virus cannot be
|
||
|
made, it will be anyway."
|
||
|
ILLUSTRATION: AP/Pat Lyons/ COMPUTER VIRUSES
|
||
|
|
||
|
|
||
|
|
||
|
County's FBI Staff Keeps Up With Crime // Work Now Revolves Around
|
||
|
Fraud and Computer Cases
|
||
|
Byline: Steve Eddy:The Orange County Register
|
||
|
12/23/90
|
||
|
THE ORANGE COUNTY REGISTER (OCR)
|
||
|
Edition: EVENING
|
||
|
Section: METRO
|
||
|
Page: b01
|
||
|
Origin: SANTA ANA, CA
|
||
|
TX The walls of the Orange County office of the FBI feature the usual
|
||
|
mug shots of wanted fugitives -- kidnappers, terrorists, bank
|
||
|
robbers.
|
||
|
But there are other photographs too, annual "team photo" shots of
|
||
|
the office staff taken over the past dozen years.
|
||
|
Each picture has more smiling faces than the year before.
|
||
|
As crime has evolved into high technology, massive investment
|
||
|
swindles and international terrorism, the bureau has evolved with it.
|
||
|
What was once a one-man cubbyhole in the 1950s is now the largest FBI
|
||
|
satellite office in the nation, with more than 60 full-time special
|
||
|
agents and 25 support personnel.
|
||
|
Gone, too, are the "do everything" special agents of the '50s and
|
||
|
'60s, who have been replaced by specialists.
|
||
|
"We tended to do a little bit of everything," said Jim Conway, 63,
|
||
|
who went to work for the FBI in 1952 and moved to the Santa Ana
|
||
|
office in 1967. "There were eight or nine agents assigned to the
|
||
|
office and no clerical help at all. We all sat in one room and got
|
||
|
to know each other very well. I have been to (the current
|
||
|
headquarters) a couple of times and it boggles my mind."
|
||
|
While FBI agents in Orange County still do their share of chasing
|
||
|
down bank robbers, drug dealers and other criminals, more than half
|
||
|
of the workload involves fraud and computer crime.
|
||
|
The expansion reflects a greater focus on white-collar crime, said
|
||
|
Jim Annes, recently retired supervisor of the Santa Ana office, who
|
||
|
now works for a private security firm.
|
||
|
Annes said that emphasis started with the Carter administration,
|
||
|
as the demographics of Orange County were changing.
|
||
|
"There were lots of financial centers going up," Annes said.
|
||
|
"Orange County began attracting a lot of flashy con men."
|
||
|
The mid-1980s brought agents the largest bank fraud case in US
|
||
|
history. Bank of America alone lost an estimated $95 million in a
|
||
|
scheme involving sale of fraudulent mortgage loans. It took six
|
||
|
years to investigate and prosecute the case.
|
||
|
"There are agents who devoted 25 percent of their careers to that
|
||
|
one," Annes said.
|
||
|
New investigations of fraud, including the continuing Lincoln
|
||
|
Savings & Loan investigation, have taxed local FBI agents. Help is
|
||
|
on the way.
|
||
|
Bucky Cox, current senior supervisory resident FBI agent, said a
|
||
|
"significant increase" in white-collar-crime staffing is expected
|
||
|
within the next few months, although the exact number of new
|
||
|
personnel is not known.
|
||
|
The local office continues to devote resources to bank robbery,
|
||
|
drugs, organized crime, counterterrorism and other matters.
|
||
|
Cox said terrorism may be foreign or domestic.
|
||
|
"In domestic terrorism, we look at organizations who have espoused
|
||
|
violence as a group, or are involved in racial incidents," he said.
|
||
|
Foreign terrorism hit home in 1985, when a bomb killed
|
||
|
Arab-American activist Alex Odeh in his Santa Ana office. The FBI
|
||
|
investigated and identified a former Jewish Defense League member as
|
||
|
a suspect. The man, residing in Israel, has not been formally
|
||
|
charged.
|
||
|
Counterintelligence comes into play because of Orange County's
|
||
|
huge defense industry -- with plenty of technical secrets to be
|
||
|
stolen by foreign agents.
|
||
|
The basic job of FBI agents is to conduct interviews and present
|
||
|
criminal cases to the US Attorney's Office for prosecution.
|
||
|
Often, agents are in contact with their counterparts in other
|
||
|
parts of the nation. Cox said that was the situation last month when
|
||
|
three teen-age girls were kidnapped from a Michigan township by two
|
||
|
men.
|
||
|
One of the suspects, David Alan House, 33, was a former Orange
|
||
|
County resident.
|
||
|
"It started with a late-night call from a supervisor in Michigan
|
||
|
to my house," Cox said. "He said it (looked) like Orange County was
|
||
|
going to play an important part in the case."
|
||
|
On his way to work the next morning, Cox got a call on his car
|
||
|
phone and learned that, as of midnight, the pair was in Las Vegas.
|
||
|
By this time, all three victims had been located.
|
||
|
One of the three kidnapped teen-agers was found bound, but
|
||
|
unharmed, in a Las Vegas hotel room. The other two were released in
|
||
|
Chicago.
|
||
|
"It was obvious that (the kidnappers) were coming here," Cox said.
|
||
|
"We had agents out on the streets all that day checking places where
|
||
|
he had lived and worked, talking with close associates, looking in
|
||
|
bars he used to frequent. That's the kind of thing you do -- talk to
|
||
|
people who will tell you that the guy is likely to go to
|
||
|
such-and-such a place or see such-and-such a person."
|
||
|
That same evening, Nov. 27, House was arrested outside a Santa
|
||
|
Ana towing company where he once worked. He apparently had come
|
||
|
there to see his former boss. The second suspect still is being
|
||
|
sought.
|
||
|
Phil Hanlon, now 66, joined the FBI in 1951, serving in various
|
||
|
locations before being assigned to the Santa Ana office in 1963. He
|
||
|
retired in 1978.
|
||
|
In earlier days, Hanlon and other retired agents said, the thrust
|
||
|
of work included bank robbery and rounding up military deserters.
|
||
|
"It was a different world then," Hanlon said. "People wanted to
|
||
|
come here because of the rural atmosphere. It was a much less
|
||
|
complicated existence. You didn't have the narcotics element, the
|
||
|
computer crime."
|
||
|
"Nowadays, crooks are slick -- they're smart in the brain," said
|
||
|
retired Special Agent Bill Carroll, who worked in the Santa Ana
|
||
|
office from 1963 to 1978. More agents than ever spend their days
|
||
|
poring over records of a failed bank.
|
||
|
That wasn't always so, Carroll recalled.
|
||
|
"One time we were investigating an unlawful flight case and had
|
||
|
been looking for this guy for about a month," Carroll said. "He was
|
||
|
labeled armed and dangerous and said he would never be taken alive.
|
||
|
We got a tip he was going to go see his girlfriend in Laguna Beach.
|
||
|
"Sure enough, his car drove up in front of her house and she got
|
||
|
in," Carroll said. "We followed, and he drove into this empty
|
||
|
parking lot. We sort of snuck up on them, and he was, well ... they
|
||
|
were having sex in there. He had a gun on the floor, but no chance
|
||
|
to get to it."
|
||
|
In his day, Carroll said, "Everybody basically had to know
|
||
|
everybody else's work. You had to be able to handle a real broad
|
||
|
spectrum of cases. Things weren't as complex as they are now."
|
||
|
Today, the heavy concentration on white-collar crime has attracted
|
||
|
a new breed of agents -- young attorneys and certified public
|
||
|
accountants who possess skills that are essential to untangling the
|
||
|
intricate web of fraud, Cox said.
|
||
|
Unfortunately, he said, many don't stay long, principally for
|
||
|
financial reasons.
|
||
|
An FBI agent right out of the training facility at Quantico, Va.,
|
||
|
has a starting pay of about $28,000 a year, moving to $44,000 within
|
||
|
about three years. Current top base pay for a journeyman agent is
|
||
|
$57,650. Cox said that scale puts FBI agents in the bottom 5 percent
|
||
|
of police agencies in Southern California.
|
||
|
"You don't come in expecting to be well-paid," Annes said.
|
||
|
"You'll have enough money for a steak and a beer, but you're always
|
||
|
going to be counting the pennies. If money were the object, nobody
|
||
|
would be in the FBI."
|
||
|
Some of the appeal, Cox said, comes from actual working
|
||
|
conditions.
|
||
|
"Special agents begin work in a suit and tie," Cox said. "They
|
||
|
aren't going to go out in a patrol car. They probably won't get spat
|
||
|
on or have to roll around in the street with a drunk. They don't
|
||
|
have to work in a jail. There are opportunities to travel."
|
||
|
|
||
|
|
||
|
|
||
|
1st Computer Pirate Convicted In Quebec Under Criminal Code
|
||
|
Byline: JAN RAVENSBERGEN
|
||
|
Credit: GAZETTE
|
||
|
12/21/90
|
||
|
Montreal Gazette (GAZ)
|
||
|
Edition: FINAL
|
||
|
Section: BUSINESS
|
||
|
Page: C1
|
||
|
(Copyright The Gazette)
|
||
|
--- 1st computer pirate convicted in Quebec under Criminal
|
||
|
Code ---
|
||
|
The first criminal conviction for software piracy in the province
|
||
|
was registered in Quebec Court this week - more than five years
|
||
|
after the offence was added to the federal Criminal Code.
|
||
|
Marc Alarie was convicted Wednesday.
|
||
|
His fate sends a strong signal to the many users of illegally
|
||
|
copied software - across the province and in the rest of Canada -
|
||
|
that they are guilty of a criminal act, Michel King, president of
|
||
|
St. Laurent software producer SBI Technologies Inc., said
|
||
|
yesterday. Alarie is a former employee of SBI.
|
||
|
A software pirate is someone who copies, uses and/or sells computer
|
||
|
software illegally. Industry leaders recently estimated that such
|
||
|
piracy costs the Canadian software business some $200 million a
|
||
|
year in foregone revenue.
|
||
|
"We often have the impression that this type of crime is more
|
||
|
common in Quebec," said King. Several hundred mostly small Quebec-
|
||
|
based software producers currently generate annual revenue of
|
||
|
about $100 million, estimated Jacques Saint-Pierre. He's a
|
||
|
consultant to the Conseil de l'Industrie Electronique du Quebec,
|
||
|
whose representatives attended a news conference called by SBI to
|
||
|
publicize the conviction.
|
||
|
Fined $5,000, criminal record
|
||
|
"It is the first time that someone in Quebec is convicted under
|
||
|
section 342.1 (which covers software piracy) of the Criminal
|
||
|
Code," Crown prosecutor Christian Cyr said when contacted late
|
||
|
yesterday. Cyr said he believes it is also the first such
|
||
|
conviction anywhere in Canada - but added that he wasn't entirely
|
||
|
certain. Federal Department of Justice officials could not be
|
||
|
reached for confirmation.
|
||
|
Alarie was fined $5,000 by Quebec Court judge Andre Chaloux and now
|
||
|
carries a criminal record. He could have received a maximum
|
||
|
sentence of 10 years in prison, and an unlimited fine.
|
||
|
Alarie and Normand Pigeon, another former SBI employee, currently
|
||
|
face civil lawsuits filed on SBI's behalf claiming a total of
|
||
|
$180,000.
|
||
|
During a preliminary hearing Dec. 10 and 11, Cyr said, the Crown
|
||
|
presented evidence gathered in three raids by the police fraud
|
||
|
squad. Alarie subsequently switched his plea on the piracy charge
|
||
|
to guilty.
|
||
|
Annual sales of $2.5 million
|
||
|
Alarie operated through a company called Services Cite Informatique
|
||
|
Enr. King estimated that the activities of that firm cost SBI
|
||
|
$200,000 in revenue.
|
||
|
SBI employs about 25 people, has annual sales of more than $2.5
|
||
|
million and is embarking on a sales campaign in the United States,
|
||
|
through as many as 800 software resellers. Its sophisticated
|
||
|
software is used by manufacturers and distributors, mostly
|
||
|
businesses with between 50 and 150 employees, and was conceived
|
||
|
and developed entirely in Quebec. Over the past eight years, King
|
||
|
said, the research-and-development effort has cost SBI about $1.4
|
||
|
million.
|
||
|
Richard Pelletier, a director of the industry council, said his
|
||
|
organization is continuing to encourage businesses, school boards
|
||
|
and individuals to cease using pirated software. So far, about 160
|
||
|
Quebec businesses have formally adopted the council's guidelines
|
||
|
on software use.
|
||
|
|
||
|
|
||
|
In brief
|
||
|
Credit: PUBLISHERS WEEKLY
|
||
|
Column: In brief
|
||
|
12/16/90
|
||
|
HOUSTON CHRONICLE (HOU)
|
||
|
Edition: 2 STAR
|
||
|
Section: ZEST
|
||
|
Page: 31
|
||
|
Category: Book Review
|
||
|
(Copyright 1990)
|
||
|
MONSIEUR PAMPLEMOUSSE INVESTIGATES.
|
||
|
By Michael Bond.
|
||
|
Fawcett Columbine, $16.95.
|
||
|
RTURNING from ``Monsieur Pamplemousse Aloft,'' the eccentric
|
||
|
flatfoot/gourmand and Pommes Frites, his clever dog, team up to sniff
|
||
|
out clues when a not-so-merry prankster sabotages Le Guide,
|
||
|
``France's oldest and most respected food guide.''
|
||
|
The fictional food bible's staff finds itself in a stew when a
|
||
|
false obituary of the director appears in the local paper on the very
|
||
|
day the final manuscript - the first edition produced by computer,
|
||
|
with influential new restaurant ratings - is to be unveiled at a
|
||
|
company celebration.
|
||
|
There the director faints dead away when he finds the manuscript
|
||
|
completely botched, riddled with missratings and erroneous reviews.
|
||
|
Jovial food maven Aristide Pamplemousse, an Inspector
|
||
|
Clousseau-meets-Hercule Poirot type, smells something foul when the
|
||
|
company's accountant - the sole employee other than the director with
|
||
|
access to the computer password - cannot be found.
|
||
|
British writer Bond, also the creator of the Paddington Bear
|
||
|
children's series, smartly sidesteps cliches about computer crime,
|
||
|
instead devising an old-fashioned puzzle with immensely pleasurable
|
||
|
characters and pervasive comic zest.
|
||
|
|
||
|
|
||
|
|
||
|
Computer Miscreants Could be Facing a Major Crackdown
|
||
|
Byline: CAIRN MACGREGOR
|
||
|
Credit: FREELANCE
|
||
|
Column: PERSONAL COMPUTING
|
||
|
09/22/90
|
||
|
Montreal Gazette (GAZ)
|
||
|
Edition: FINAL
|
||
|
Section: COMICS & HOBBIES
|
||
|
Page: M2
|
||
|
Category: COLUMN
|
||
|
(Copyright The Gazette)
|
||
|
--- Computer miscreants could be facing a major crackdown ---
|
||
|
Virus-builders are the scum of the earth. They are also poor,
|
||
|
sick puppies, who need to locked away for their own good as well
|
||
|
as ours. On the other hand, a cracker who goes sniffing around
|
||
|
within some government computer is often only an adolescent
|
||
|
prankster, play-acting like some sort of modern James Bond. Even
|
||
|
if he joyrides along some long-distance telephone lines to get
|
||
|
into a remote computer, he is not a major criminal, despite all
|
||
|
the indignant protestations of Bell.
|
||
|
There is a major difficulty in prosecuting technological crime - it
|
||
|
is technological, hard for the lay person to understand. The
|
||
|
police and the courts sway and bend in the winds of public and
|
||
|
political pressure, with their justice sometimes harsh, sometimes
|
||
|
mild, but usually inappropriate.
|
||
|
I remember some years ago when Montreal had its first, big
|
||
|
"computer crime." The RCMP conducted raids, arrested people,
|
||
|
confiscated computers, boasted of using technological means to
|
||
|
catch technological criminals, and hinted they had secret,
|
||
|
science- fiction, digital equipment for catching these high-tech
|
||
|
criminals who threatened the security of the nation. The media
|
||
|
were abuzz about a secret computerized organization known as the
|
||
|
"Top 40" crackers of Montreal. At that time, you could count
|
||
|
Montreal's microcomputer assembly-language programmers on the
|
||
|
fingers of both hands, but those programmers were scratching their
|
||
|
heads and agreeing that this Top 40 must be a pretty secret
|
||
|
organization because no one had ever heard of it, or anyone who
|
||
|
belonged to it.
|
||
|
Our high-tech threats to society turned out to be a group of four
|
||
|
or five kids, led by "the Prisoner" (Richard Brandow), who were
|
||
|
using their Apple II computers as "blue boxes" - telephone tone
|
||
|
generators that would allow them to make uncharged long-distance
|
||
|
telephone calls. Plans for doing this were available on many
|
||
|
electronic bulletin-board services (BBSs). These kids ran their
|
||
|
own BBSs, and used their blue-box Apples to call, free of charge,
|
||
|
BBSs in the U.S., and swap boastful stories of their antics with
|
||
|
other young would-be crackers.
|
||
|
What high-tech device was used to track down these digital terrors?
|
||
|
An inside informant. One kid had a spat with another and barred
|
||
|
him from his BBS. The banned kid went to the RCMP and turned in
|
||
|
the others. And the Top 40? - a pimple-faced miscreant telephoned
|
||
|
reporters and told them a made-up story, because he "wanted to
|
||
|
tell them something they wanted to hear".
|
||
|
A few years after this vigorous RCMP investigation and prosecution,
|
||
|
a virus with Richard Brandow's name on it infected thousands,
|
||
|
possibly millions, of Mac computers, yet the RCMP did nothing.
|
||
|
U.S. courts and law-enforcement organizations swing between almost
|
||
|
ignoring computer crime and vicious witchhunts. Right now, they
|
||
|
are in a witchhunt. Secret-service officers have been crashing
|
||
|
through doors all over the U.S. In New York City a woman was
|
||
|
startled by about 20 heavily armed state troopers and
|
||
|
secret-service men pounding on her door. One carried a sledge
|
||
|
hammer. She let them in, and they found her 14-year-old, terrified
|
||
|
son wrapped in a towel, standing in the bathtub.
|
||
|
"Zod" (the handle the boy uses on BBSs) said that despite his
|
||
|
repeated requests for an attorney, the agents interrogated him for
|
||
|
the next six hours, threatening to confiscate his father's
|
||
|
computer if he did not co-operate and tell them about computer
|
||
|
hacking.
|
||
|
They arrested Zod on felony charges of computer trespassing and
|
||
|
tampering, accusing him of setting up BBSs on a toll-free
|
||
|
Washington state computer and a Pentagon computer that contained
|
||
|
"sensitive but unclassified" material. I'm not sure how it is
|
||
|
possible to set up a BBS on someone else's computer - I would love
|
||
|
to hear the arguments in this trial.
|
||
|
U.S. Secret Service agents are conducting Operation Sun Devil, a
|
||
|
crackdown on computer crime, and have, so far, confiscated
|
||
|
computer equipment in more than 40 cases. They raided Steve
|
||
|
Jackson Games, refusing to say what they were looking for, but
|
||
|
confiscating three computer systems, two laser printers, and
|
||
|
miscellaneous other equipment. They also raided the home of an
|
||
|
employee, Loyd Blankenship, and confiscated his personal computer
|
||
|
equipment. For months, the company could not ship new products,
|
||
|
and had to lay off eight of its 17 employees. Most of the company
|
||
|
equipment has been returned, some of it damaged beyond repair.
|
||
|
Blankenship has not been charged, but his equipment has not been
|
||
|
returned. He had been using his computer as a word-processor,
|
||
|
writing a role-playing game called "Gurps Cyberpunk". Characters
|
||
|
in the game can break into a fictitious computer system.
|
||
|
Operation Sun Devil has alarmed a number of people in the U.S.
|
||
|
computer industry, including Apple inventor Steve Wozniak, and
|
||
|
they are forming legal foundations to protect the rights of
|
||
|
computer users. In matters of computer crime, Canada tends to
|
||
|
mimic the U.S., after the mandatory Canadian-identity time lag of
|
||
|
about a year. So - ya all take care, ya hear?
|
||
|
Personal Computing appears Wednesdays in the Business section and
|
||
|
Saturdays in Comics and Hobbies. Columns are also available online
|
||
|
in the Leisure section of Gazetel, The Gazette's electronic
|
||
|
financial-information and news source. Please address letters to
|
||
|
Cairn MacGregor, The Gazette, 250 St. Antoine W., Montreal H2Y
|
||
|
3R7. Online messages from Gazetel members will be forwarded, as
|
||
|
will fax messages. To send fax messages, dial (514) 987-2399.
|
||
|
==============================================================================
|
||
|
|
||
|
/ /
|
||
|
/ File 07 / NIA069 /
|
||
|
/ Comments From The Editors /
|
||
|
/ JD & GOT /
|
||
|
/ /
|
||
|
|
||
|
The previous NIA Mailing (NIA068), was mailed out on 17DEC90 we recieved
|
||
|
several returns. Please, when subscribing to NIA, include the _correct address_
|
||
|
so that we deliver the latest issue without delay. Also make sure that
|
||
|
your system can handle files in excessive size. If you mailer can NOT handle
|
||
|
it, please tell us and we will make special arrangements for your system.
|
||
|
|
||
|
We would like to thank So76 & Lord Kalkin for ya'lls help in this mailing. Also
|
||
|
thanks go out to Montresor for his help and contributions in this issue.
|
||
|
|
||
|
Back issues can be found off of Face 2 Face (Refer:713.242.NUKE), and off of
|
||
|
Unholy Temple (Refer:408.PRI.VATE). They can also be found off of the CuD
|
||
|
Archives (Refer:CuD 2.15).
|
||
|
|
||
|
Submissions, questions, comments, and requests to be added to the mailing list
|
||
|
should be mailed to elisem@nuchat.sccsi.com
|
||
|
|
||
|
Out Of Step magazine. For those of you that love your country but fear
|
||
|
your government. If you wish to get the latest issue of Out Of Step, or
|
||
|
want to submit an aritcle of your own, then contact them at:
|
||
|
malrj or mawilli @indsvax1 Bitnet
|
||
|
|
||
|
Based on popular demand, we have decided to adhere to this format. Well, all
|
||
|
I can say is, if you don't like us, I bet your *sister* will.
|
||
|
|
||
|
JD & GOT
|
||
|
NIA Ingnorance, There's No Excuse.
|
||
|
=============================================================================
|
||
|
|