5385 lines
218 KiB
Plaintext
5385 lines
218 KiB
Plaintext
|
|
Founded By: | _ _______
|
|
Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? are
|
|
Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
|
|
------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
|
|
\ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
|
|
+---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
|
|
| 17DEC90 | ___ ______ ___ ___ ___ FidoNet, et al.?
|
|
| File 68 | ___ _____ ___ ___ ___ If so please drop us a
|
|
+---------+ ____ _ __ ___ line at
|
|
___ _ ___ elisem@nuchat.sccsi.com
|
|
Other World BBS __
|
|
Text Only _ Network Information Access
|
|
Ignorance, There's No Excuse.
|
|
|
|
Due to some complaints about our previous files being to SHORT, we have decided
|
|
to make some needed changes. To tell you the truth, we never expeceted anyone
|
|
complaining about any of our files, so the mail we have been receiving has
|
|
opened our eyes up. PEOPLE ARE READING NIA!
|
|
|
|
We looked over some of the different text file magazines out there, and decided
|
|
to follow this path. We will be printing less frequent files (unless our
|
|
Internet Address just starts overflowing w/ submissions), BUT they will be
|
|
larger! This change, we hope, will make some of our readers happy. So to kick
|
|
off the new file correctly, NIA068 will be the first in a new line of better,
|
|
longer files. I trust the change will please you.
|
|
|
|
NOTE when sending mail to us, if you want your name added to our mailing-list,
|
|
please state in the letter the address you want it sent to. This will make
|
|
our life much easier and your request go smoother. (elisem@nuchat.sccsi.com)
|
|
|
|
NIA EDITORS
|
|
|
|
|
|
=============================================================================
|
|
|
|
Table_Of_Contents
|
|
|
|
1. DECnet [01]............................................Guardian Of Time
|
|
2. Unix: UUCP Files............................................Judge Dredd
|
|
3. VAX: Tekno DCS HELP [01]....................................Judge Dredd
|
|
4. HP: DBEDIT Manual.......................................Malefactor [OC]
|
|
5. *LONG* Surveilance Expo '90 Report................................Thalx
|
|
6. TIME-TRIP: 1985 MOG-UR CC Charges Against Tom Tcimpidis....Count Nibble
|
|
7. Department Of The Army Field Manual [01]...................Death Jester
|
|
8. Comments From The Editors......................................GOT & JD
|
|
|
|
==============================================================================
|
|
|
|
/ /
|
|
/ File 1 / NIA068 /
|
|
/ DECnet [01] /
|
|
/ Guardian Of Time /
|
|
/ /
|
|
|
|
$_Basic Overview Of DECnet-VAX Networking
|
|
|
|
All DEC Systems have a capability of Linking up and sharing system wide
|
|
resources and increasing the capability of that particular VAX/PDP System. They
|
|
participate in what they call the DECnet Network, using its interface called
|
|
the DECnet-VAX.
|
|
|
|
I will try to go into detail about what the DECnet Network IS. This file will
|
|
be for the beginner and I hope that I do enough that you can figure out what
|
|
is going on. I am new to networking so I figure that the best way to start is
|
|
to start with a basic overview then work my way up.
|
|
|
|
$_What Is A Network?
|
|
|
|
A Network is an entity of two or more computer systems that are connected by
|
|
physical links ( cable,microwave, and or satellites ). The purpose of
|
|
Networking is for the exchange of Information, Programs, Ideas, etc...
|
|
|
|
Networking is the "Wave Of The Future". Forget Phreaking it is basically
|
|
dead. If you want to power or if you want to get a jump and leave others
|
|
behind in the dust, learn NETWORKING, there are 1000's of networks and they
|
|
are all out there, just waiting for someone to dial in and exploit them or
|
|
to learn from them or to use them.
|
|
|
|
If you plan on hacking into Networks please remember the Golden Rule about
|
|
Hacking:
|
|
|
|
NEVER ABUSE THE SYSTEM YOU ARE USING, SET UP AN ACCOUNT, LEARN WHY
|
|
YOU COULD SET UP THE ACCOUNT AND SEE IF IT WORKS ELSWHERE. NEVER SELL
|
|
SECRECTS, NEVER TRY TO RUIN SYSTEMS ( REMEMBER 414 AND THE HOSPITAL RECORDS
|
|
AND WHERE ARE THEY NOW? ).
|
|
|
|
$_What is DECnet?
|
|
|
|
DECnet is any of Digital Electronic Corporation's (DEC) operating systems,
|
|
linked up by modems, satellites, ethernets and such like things.
|
|
|
|
Listed below are a few of the different types of Operating Systems that DEC
|
|
uses:
|
|
|
|
VAX/VMS
|
|
VAX Station 2000
|
|
VAX 8500 Series
|
|
Vax 8600 Series
|
|
Vax 8800 Series
|
|
Microvax 2000
|
|
MicroVax 1 Running MicroVMS or VAXEL
|
|
PDP-11 Running RSX-11M, RSX-11S, RSX11M-PLUS, RSTS/3 or RT-11
|
|
DECsystem-20'S
|
|
DECsystem-10'S Both 20's and 10's Running TOPS-20 and TOPS-10
|
|
Professional 350 Personal Computers Running P/OS Operating systems
|
|
|
|
The above mentioned Operating Systems and machines, are completely able to
|
|
communicate with DECnet, with no special arrangement (as far as I can tell).
|
|
|
|
Those of you with NON DEC equipment must find out if the DECnet is
|
|
supporting X.25 PROTOCOL. If it is, you can then dial with one Network,
|
|
into DECnet with no problem, just as long as they are implementing the X.25
|
|
Protocol.
|
|
|
|
DECnet considers all of their systems as equal, there is NO Coordinator, and
|
|
no worry about having to go through one central location. You have complete
|
|
and free access from each system, with no hassels.
|
|
|
|
DECnet can vary in size, it can be very small or become an extensively large
|
|
network. A small network might consist of two to four nodes. A maximum of
|
|
1023 nodes is possible in an UNDIVIDED DECnet network. Very large DECnet
|
|
networks can be divided into multiple Areas, up to 63 areas in fact, and
|
|
each area (also called a network), can consist of 1023 nodes each.
|
|
|
|
Below are some examples of what a DECnet Network could LOOK like. Now, if
|
|
you are new to flow charts, I'd suggest you read up but basically its quite
|
|
easy to follow, the Boxes represent a location or a mainframe, the lines
|
|
that connect the boxes, mean that they are connected either by modems,or by
|
|
ETHERNETS.
|
|
|
|
ZDDDDDDDD? ZDDDDDDDD? ZDDDDDDDD?
|
|
3TERMINAL3 3TERMINAL3 3TERMINAL3
|
|
@DDDDBDDDY @DDDDBDDDY @DDDDBDDDY
|
|
3 ZDDDDDDAD? 3 ZDDDDDDD?
|
|
@DDDD4TERMINALCDDDDDDDDDY 3VAX 8003
|
|
3SERVER 3 @DDBDDDDY
|
|
@DDDBDDDDY 3 ETHERNET
|
|
ZDDDDDDDDDDDDDADDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDADDBDDDDDDDDDDBY
|
|
ZDDDD? ZDDDD? ZDDDD? 3 3
|
|
3VAX CDDD4VAX CDD4VAX 3 ZADDDDDD? 3
|
|
386003 388003 388503 3VAX88003 3
|
|
@DBDDY @DDBDY @DDBDY @DDDDDDDY 3
|
|
3 3 3 ROUTER 3
|
|
@DDDDDDDDDADDDDDDDY 3
|
|
VAX CLUSTERS 3
|
|
3
|
|
END NODES ZDDDDDDD4
|
|
ZDDDDDD? ZDDDDDDD?ZDDDDDDDDDD? 3LAN 3
|
|
3MICRO 3 3RAINBOW33VAXSTATION3 3BRIDGE 3
|
|
3PDP-113 3100 33II/GPX 3 3100 3
|
|
@DDBDDDY @DDDBDDDY@DDDDBDDDDDY @DDDDDDD4
|
|
3 ZDDADD? 3 3
|
|
@DDDDDD4DELNICDDDDDDY 3
|
|
@DDBDDY ETHERNET 33
|
|
ZDDDDDDDBDDDDDADDDDDDBDDDDDDDDDDDDBDDDDDDDDDDDDDDDDDDDDDDDDDDDAY
|
|
ZDDDADD? ZDAD? ZDDDDDADDDD?
|
|
3PDP-113 3PRO3 3MICROVAXIICDDDDD?
|
|
@DDDDDDY 33503 @DDDDDDDDDDY 3
|
|
END @DDDY ROUTER ZDADDD?
|
|
NODE END 3MODEMCDD?
|
|
NODE @DDDDDY 3
|
|
3
|
|
ZDDDDDDADDDDD?
|
|
3MICROVAX35003
|
|
@DDDDDDDDDDDDY
|
|
END NODE
|
|
|
|
The above is a Wide Area Network, and as you can tell you can have quite a
|
|
bit hooked up to a small network, and before sending over a modem or
|
|
satelite or whatever, you could be in one network, and have just one modem
|
|
hooked up to it. So you get an idea of how a network can be wide or can be
|
|
as small as just a PDP-11 hooked up with a Microvax 3500, like below:
|
|
|
|
ZDDDDDD? ZDDDDD? ZDDDDDDDDDDDD?
|
|
3PDP-11CDDD4MODEMCDDDDD4MICROVAX35003
|
|
@DDDDDDY @DDDDDY @DDDDDDDDDDDDY
|
|
|
|
Below is yet another typical network, this will show you access to a non-dec
|
|
network or how typical it is to be spread out around the world:
|
|
|
|
ZDDDDDDD? ZDDDDDD? ZDDDDDD?
|
|
3BOSTON CBDDDDDDDDDDDD4 PSDN CDDDDDDDDDD4LONDON3
|
|
@DDDDDDDY3 @DDDDDDY @DDDDDDY
|
|
3
|
|
3
|
|
3
|
|
ZDDDDDDDD4
|
|
3NEW YORK3
|
|
@DDDBDDDDY
|
|
3
|
|
3 ETHERNET 3
|
|
ZDDDADDDDDDDDBDDDDDDY
|
|
3 ZDDDDADDDD?
|
|
3 GATEWAY CDDDDDD?
|
|
@DDDDDDDDDY 3
|
|
ZDDDDDADDDDDDDDD?
|
|
3IBM SNA NETWORK3
|
|
@DDDDDDDDDDDDDDDY
|
|
|
|
The above example is sorta the same example that Mark Hess used to cross
|
|
over into the US during his stunt with Clifford Stroll. Read The CooKoo's
|
|
Egg, then you'll get a real understanding of Networks and such.
|
|
|
|
A PSDN is short for PACKET SWITCHING DATA NETWORK or TYMNET or TELENET those
|
|
are PSDN's and with the right accounts you can cross the transatlantic
|
|
rather than just the US borders.
|
|
|
|
Wondering how the two Cities are connected together? They use a format
|
|
called DDCMP CONNECTIONS, these are dedicated phone lines, connecting the
|
|
two and sharing information using their own form of Protocols.
|
|
|
|
DDCP Message format are in three different types: data, control and
|
|
maintenance. Data messages consist of user data. Control messages return
|
|
acknowledgements and other control information to ensure data integrity and
|
|
error-free transmission. Maintenance messages consist of information for
|
|
downline loading, upline dumping, link testing, or controlling a remotely
|
|
located, adjacent system.
|
|
|
|
|
|
$_DATA LINK PROTOCOLS
|
|
|
|
Currently (1984), there are three protocols residing in the DNA Data Link
|
|
layer:
|
|
|
|
Digital Data Communications Message Protocol (DDCMP)-a byte oriented
|
|
protocol.
|
|
|
|
Ethernet Protocol-Carrier Sense Multiple Access w/ Collision Detect
|
|
(CSMA/CD) w/ physical channel encoding and operating over a coaxial cable.
|
|
|
|
X.25 Levels 2 and 3-Operating over Level 1 of the CCITT X.25 recommendation,
|
|
which defines a standard interface between data terminal equipment(DTE),
|
|
such as a DECnet node,and the data circuit terminating equipment (DCE) of a
|
|
packet-switched data network.
|
|
|
|
$_DDCMP
|
|
|
|
DDCMP was designed in 1974 specifically for the Digital Network
|
|
Architecture. DDCMP is functionally similar to HDLC-High Level Data Link
|
|
Control-which was adopted in 1975 by the Internation Standards
|
|
Organization.(HDLC is a BIT oriented protocol however) Another type of data
|
|
link protocol that is commonly implemented is BISYNC, which is CHARACTER
|
|
oriented.
|
|
|
|
There are three general types of data link protocols: byte oriented,
|
|
character oriented, and bit oriented. DDCMP is a byte oriented protocol.
|
|
Such protocol provides a count of the number of bytes that are sent in the
|
|
data portion of each message. A character oriented protocol uses special
|
|
ASCII characters to indicate the beginning of a message and the end of a
|
|
block of text, and a bit oriented protocol uses flags to frame data sent in
|
|
undefined lengths. Neither the character oriented nor the bit oriented
|
|
protocol contains provisions for checking whether all the transmitted data
|
|
has arrived at its destination. The advantage of a byte count in a byte
|
|
oriented protocol is that it facilitates checking on the part of the
|
|
receiving node to see whether all transmitted data has been received.
|
|
|
|
DDCMP is a general purpose protocol. It makes maximum use of channel
|
|
bandwidth and handles data transparency efficiently.
|
|
|
|
Data Transparency is the capaility of receiving, w/out misinterpretation,
|
|
data containing bit patters that resemble protocol control characters.
|
|
|
|
Character oriented protocols can not handle transparent data as efficiently
|
|
as byte or bit oriented protocols.
|
|
|
|
DDCMP transmits data grouped into phsyical blocks known as data messages and
|
|
provides a mechanism for exchanging error-free messages. This mechanism
|
|
works in the following manner: DDCMP assigns a number to each data message,
|
|
beginning w/ the number one (after each initialization) and incremented by
|
|
one for each subsequent data message. In addition, DDCMP places a 16-bit
|
|
cyclic redundancy check (CRC16) error detection polynominal at the end of
|
|
each data message transmitted.
|
|
|
|
The receiving DDCMP module checks for errors and, if there are none, returns
|
|
an acknowledgement that it has received the message. Acknowledgement is
|
|
efficient since the receiving DDCMP module does not have to acknowledge each
|
|
message sent. Acknowledgement of data messages n implies acknoledgement of
|
|
all data messages up to and including data message n. If the receiving
|
|
DDCMP module detects an error, it uses time-outs and control messages to
|
|
resynchronize and trigger retransmission.
|
|
|
|
|
|
DATA MESSAGES
|
|
|
|
DDCMP formats all messages from the Routing Layer into a data message
|
|
format:
|
|
|
|
SOH COUNT FLAGS RESP NUM ADDR BLKCK1 DATA BLKCK2
|
|
8 14 2 8 8 8 16 8n 16
|
|
|
|
SOH = The numbered data message identifier
|
|
COUNT = The byte count field
|
|
FLAGS = The link flags
|
|
RESP = The response number
|
|
NUM = The transmit number
|
|
ADDR = The station address field
|
|
BLCK1 = The block check on the numbered message header
|
|
DATA = The n-byte data field, where 0 < n = COUNT < 2(14)
|
|
BLCK2 = The block check on the data field
|
|
|
|
|
|
MAINTENANCE MESSAGES
|
|
|
|
Maintenance Message is a DDCMP evenlope for data controlling downline
|
|
loading and upline dumping, and controlling unattended computer system.
|
|
|
|
DLE COUNT FLAGS FILL FILL ADDR BLKCK1 DATA BLCKCK2
|
|
8 14 2 8 8 8 16 8n 16
|
|
|
|
DLE = The maintenance message identifier
|
|
COUNT = The byte count field
|
|
FLAGS = The link flags
|
|
FILL = A fill byte with a value of 0
|
|
ADDR = The tributary address field
|
|
BLCKCK1 = The header block check on fields DLE through ADDR
|
|
DATA = The n-byte data field, where 0<n=COUNT<2 (14)
|
|
BLCKCK2 = The block check on the DATA field
|
|
|
|
|
|
DDCMP OPERATION
|
|
|
|
DDCMP Module has 3 functional components:
|
|
|
|
FRAIMING
|
|
LINK MANAGEMENT
|
|
MESSAGE EXCHANGE
|
|
|
|
FRAIMING
|
|
|
|
Locates beginning and end of a message received from a transmitting DDCMP
|
|
module. Process involves locating and locking onto, or by synchronous w/ a
|
|
certain bit, byte, or message and then receiving subsequent bits, bytes or
|
|
messages at the same rate they come in.
|
|
|
|
At the phsyical level modems/communications interface synchronize bits.
|
|
DDCMP fraiming component synchronizes bytes by locating a certain 8-bit
|
|
window in the bit stream. Asynchronous links, DDCMP uses start/stop
|
|
transmission techniques to synchronize bytes. Synchronous links, DDCMP
|
|
searches for a SYN character. Byte synchronization is inherent in 8 bit
|
|
multiple parallel links. DDCMP synchronizes messages by searching for one
|
|
of the three special starting bytes:
|
|
|
|
SOH - Data messages
|
|
ENQ - For control messages
|
|
DLE - For Maintenance messages
|
|
|
|
To maintain message synchronization, DDCMP counts out fixed length headers
|
|
and when required, counts out variable length data based on count field of
|
|
the header.
|
|
|
|
|
|
Definitions:
|
|
|
|
AREA : Large Number of Nodes together ( 1023 makes one area ).
|
|
Maximum Areas are 63 each with a total of 1023 nodes ).
|
|
BISYNC : Binary synchronous.
|
|
CLUSTER : Group of VMS Systems organized to share processor/storage
|
|
resourses.
|
|
DCE : Data circuit terminating equipment.
|
|
DDCMP : Digital Data Communications Message Protocol.
|
|
DEC : Digital Equipment Corporation.
|
|
DECNET : The Network used by DIGITAL.
|
|
DNA : Digital Network Archictecture or the framework of
|
|
specifications within which Digital designs its communications
|
|
products and the equipments/networks that it uses.
|
|
DTE : Data terminal equipment.
|
|
ETHERNET : Thin Cable Connecting DEC systems together can run as long
|
|
as 1.4 miles.
|
|
HDLC : High Level Data Link Control.
|
|
LAN : Local Area Network (withing the same area), systems that
|
|
are connected together.
|
|
NETWORK : Entity of two or more computer systems that are connected by
|
|
physical links.
|
|
NODE(s) : A a system that is on DECnet, each System is considered a
|
|
node.
|
|
SNA : System Network Architecture. ( IBM ).
|
|
PSDN : Packet-Switched Data Networks.
|
|
SYSTEM MANAGERS : Like Sysops that run a BBS, they run the Vax, Unix etc and
|
|
are in control of the system. Assigning accunts, Times,
|
|
deletion of users, system security, etc...
|
|
VMS : Virtual Memory System or the Operating System of a Vax.
|
|
WAN : Wide Area Network, Systems(nodes) that span the Country
|
|
and the world.
|
|
X25 ROUTER : Protocol to communicate with NON-DEC Operating Systems or
|
|
used to communicate with Packing Systems such as Telenet
|
|
or Tymnet.
|
|
|
|
|
|
==============================================================================
|
|
|
|
/ /
|
|
/ File 2 / NIA068 /
|
|
/ Unix UUCP Files /
|
|
/ Judge Dredd /
|
|
/ /
|
|
|
|
|
|
Well, this is a file that was in the uucp login dir on a unix system, to all
|
|
those of you that are experienced in hackin' unix, enjoy:
|
|
|
|
|
|
TABLE OF CONTENTS
|
|
|
|
1. cu ---------------------------------- Page 1
|
|
2. setuname ---------------------------- Page 1
|
|
3. uname,uuname ------------------------ Page 1
|
|
4. Sysfiles ---------------------------- Page 2
|
|
5. Systems ----------------------------- Page 3
|
|
6. Devices ----------------------------- Page 7
|
|
7. Dialers ----------------------------- Page 9
|
|
8. Dialcodes --------------------------- Page 10
|
|
9. Permissions ------------------------- Page 11
|
|
10. Maxuuscheds,Maxuuxqts --------------- Page 15
|
|
11. remot.unkno ------------------------- Page 15
|
|
12. Crontab ----------------------------- Page 16
|
|
13. Poll -------------------------------- Page 16
|
|
14. uugetty ----------------------------- Page 16
|
|
15. uudemon.clup,uudemon.admin ---------- Page 17
|
|
16. uudemon.hour,uudemon.poll ----------- Page 17
|
|
17. XNS,Towernet ------------------------ Page 17
|
|
18. uukick,Uutry ------------------------ Page 17
|
|
19. Older uucp connections -------------- Page 18
|
|
20. New feature ------------------------- Page 19
|
|
|
|
This index only highlights major areas of the README
|
|
file.
|
|
|
|
|
|
README Page 1
|
|
|
|
|
|
NOTE** The following information is not intended to be a replacement
|
|
for the uucp administrator reading the uucp section of the Superuser
|
|
Guide. If the uucp administrator is establishing a link to a system
|
|
which is running the older version of uucp ( i.e. - does not support
|
|
bidirectional communication ) then he/she should consult the uucp
|
|
section of documentation for that system.
|
|
|
|
|
|
New Features:
|
|
=============
|
|
|
|
Cu has also been modified to be more transparent to control sequences
|
|
sent by the called system. The local system is set for no expansion
|
|
regardless of initial tab settings. It is assumed that the called
|
|
system will handle expansion.
|
|
|
|
If cu is being used for a connection to a remote system which
|
|
has crashed or is shut down and the connection appears to be
|
|
locked up, performing a '~.' (tilde, dot) should disconnect
|
|
the user in approximately 10 seconds, or a '~..' should disconnect
|
|
sooner.
|
|
|
|
NOTE** cu does not work over Towernet. Cu is usually used when
|
|
using direct connection or over a modem. For a connection over
|
|
Towernet, the user should use rlogin if available.
|
|
|
|
Since many applications, such as "vi", use control characters, cu's
|
|
default setting does not follow DC1/DC3 protocol(i.e. -ixoff is not
|
|
set on the local port). However, if it appears that data is being
|
|
lost during a cu session, the user may opt to toggle the nostop
|
|
option which will set ixoff on the local port. Please see the cu man
|
|
page for more detail.
|
|
#
|
|
IMPORTANT
|
|
---------
|
|
Most of the essential programs, like uucico must run suid uucp and the
|
|
uucp uid MUST be 6 and uucp gid MUST be 6 as well. This is NOT the
|
|
traditional SysV uucp uid and gid but it DOES correspond to current
|
|
practice on Towers, so there should be no problem.
|
|
|
|
#
|
|
#
|
|
(/usr/lib/uucp/setuname)
|
|
---
|
|
|
|
An added feature is the program setuname that may be used to modify
|
|
the nodename of a running kernel. For uucp and related utilities to
|
|
work properly it is important that the name used by uucp be the same as
|
|
the nodename that the running kernel is using. Setuname can only
|
|
be run by root.
|
|
|
|
"uname -n" will give you the nodename of the running kernel.
|
|
|
|
"uuname -l" will give you the name that uucp sees as its local
|
|
name.
|
|
|
|
|
|
README Page 2
|
|
|
|
|
|
For uucp to be used correctly, "uuname -l" must be the
|
|
same as "uname -n". Uucp must be using the nodename of the
|
|
running kernel.
|
|
|
|
The program setuname will allow you to change the nodename of
|
|
the running kernel(memory) and on disk.
|
|
|
|
EXAMPLE SETUNAME COMMAND
|
|
========================
|
|
setuname -k -n new_nodename
|
|
|
|
where -k - specifies to write the new utsname struct
|
|
into /dev/kmem01, all other /dev/kmem(s)
|
|
present in the system, and /unix.
|
|
-n new_nodename - set new nodename to "new_nodename"
|
|
|
|
NOTE*** The Administrator uses a file called /etc/NODENAME
|
|
when making new kernels. After a fresh base installation,
|
|
/etc/NODENAME contains by default, a null value. If
|
|
setuname is used to change the nodename on disk, then
|
|
the default name in /etc/NODENAME is changed by setuname
|
|
to match the new nodename.
|
|
|
|
Please see the setuname(1M) for more information.
|
|
|
|
#
|
|
#
|
|
|
|
(/usr/lib/uucp/Sysfiles)
|
|
---
|
|
|
|
There is a new control file "Sysfiles" which lets you specify,
|
|
and separate, Systems, Devices, and Dialers file entries for
|
|
uucico and cu. Although use of Sysfiles is not necessary,
|
|
it is useful for certain networks where, for example, requests
|
|
for login service might be accepted on a different address than
|
|
requests for uucico service (hence different Systems files), or
|
|
where there are different chat scripts to request each service
|
|
(hence different Dialers files).
|
|
|
|
Another use of Sysfiles is to split large Systems files into
|
|
smaller, more manageable files (e.g., local and global Systems
|
|
files).
|
|
|
|
FORMAT:
|
|
|
|
service=<service name> systems=<systems file list> \
|
|
devices=<devices file list> \
|
|
dialers=<dialers file list>
|
|
|
|
Where service name is "uucico" or "cu". Each file list is a list
|
|
of colon-separated file names. File names are relative to
|
|
/usr/lib/uucp unless a full path name is given. Files are searched
|
|
in the order that they appear in the file list.
|
|
The defaults are the usual uucp files: /usr/lib/uucp/Systems,
|
|
|
|
|
|
README Page 3
|
|
|
|
|
|
/usr/lib/uucp/Devices and /usr/lib/uucp/Dialers.
|
|
|
|
EXAMPLE 1:
|
|
This example uses different systems and dialers file to separate
|
|
the uucico- and cu-specific information, with information that they
|
|
use in common still in the "usual" Systems and Dialers files.
|
|
|
|
service=uucico systems=Systems.cico:Systems \
|
|
dialers=Dialers.cico:Dialers
|
|
service=cu systems=Systems.cu:Systems \
|
|
dialers=Dialers.cu:Dialers
|
|
|
|
EXAMPLE 2:
|
|
This example uses the same systems files for uucico and cu,
|
|
but has split the Systems file into local, company-wide,
|
|
and global files.
|
|
|
|
service=uucico systems=Systems.local:Systems.company:Systems
|
|
service=cu systems=Systems.local:Systems.company:Systems
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Systems)
|
|
---------------------------------------------------------------------------
|
|
|
|
The Systems file (/usr/lib/uucp/Systems) corresponds to the old L.sys
|
|
file. Each line is used to describe a system and a way to get to that
|
|
system, and how to login when the connection is established. When
|
|
calling out, uucp will try to use each line of this file, in order, until
|
|
it can make a connection and tries to login. If the login fails, the
|
|
work is postponed.
|
|
|
|
The format is six space-separated fields:
|
|
|
|
NAME TIME TYPE CLASS PHONE LOGIN
|
|
|
|
No leading white space. Lines beginning with '#' are comments.
|
|
|
|
The NAME is the system name of the remote system. The system name
|
|
should contain NO slashes and may be up to eight characters which
|
|
is the limit of the nodename structure in the kernel. A system
|
|
name of T32_600 is allowed while T32/600 causes errors and
|
|
should not be used.
|
|
|
|
Every system which you call should have at least one entry.
|
|
It is possible to have anonymous (strangers) call in, but it is
|
|
not desirable from a security point of view. More on this
|
|
later in the section about Permissions and remote.unkno.
|
|
|
|
The TIME field indicates when this phone number/class may be used
|
|
to establish a connection. This field has a day field, followed by
|
|
an optional time-of-day field, followed by an optional retry field.
|
|
There are no spaces separating subfields. The day string is a list of
|
|
one or more day abbreviations:
|
|
|
|
|
|
README Page 4
|
|
|
|
|
|
Su Mo Tu We Th Fr Sa
|
|
or:
|
|
Wk - meaning any weekday
|
|
or:
|
|
Any - meaning any day
|
|
or:
|
|
Never - for no calls out to this system, call in only
|
|
|
|
The TIME field is optional (none means any time) and is a range such as:
|
|
|
|
1730-0730 - which means 5:30 P.M.to 7:30 A.M.
|
|
|
|
The RETRY field, if present, consists of a semicolon followed by the
|
|
number of minutes to wait before retrying if the dial fails. Otherwise
|
|
the number is retried (once) almost immediately.
|
|
|
|
The TYPE field is used to find a device or port to dial-out on. It MUST
|
|
match the FIRST field of a line in the Devices file. The most common
|
|
entry is "ACU", which is used for 801-type acus as well as smart modems.
|
|
You may also use any other name for other types of connections.
|
|
|
|
The CLASS field is used to further restrict the search for an available
|
|
device. It is also used to set the speed of the connection. The class
|
|
field may contain a letter as well as the speed:
|
|
|
|
D1200
|
|
|
|
The above example will only match a Devices file line with Class
|
|
Field of "D1200" or "Any". The CLASS field of the Systems file may
|
|
also use the key word "Any" which will match with the Devices file of
|
|
the same type. If the match involves "Any", then in each file 1200
|
|
bps is assumed.
|
|
|
|
The fifth field is the "PHONE" field and is the phone number that will
|
|
be sent to the dialing device. There are two possibilities. First,
|
|
Phone can contain a phone number, with an optional alphabetic prefix
|
|
that will be translated from the Dialcodes file. In the string there
|
|
are two other abbreviations: '=' and '-'. The '=' indicates that the
|
|
dialer should pause and wait for another dial tone. A '-' means to pause
|
|
for approximately four seconds.
|
|
|
|
It is also possible to have other information in the Phone field to be
|
|
used to connect through an intelligent switch to another system. In
|
|
this case the field can be sent untranslated. Translation is controlled
|
|
by the contents of the Devices file.
|
|
|
|
The last field(s) are the "expect send" pairs that are typical of the
|
|
login sequence. This field is not processed until the connection has
|
|
been established. The first subfield is an expect subfield; to send first
|
|
a null "expect" may be designated by "". An "expect" may itself have
|
|
subfields separated by '-': expect1-send1-expect2-send2-expect3 and so
|
|
on, ending with an expect. Send fields may have certain abbreviations
|
|
embedded in them:
|
|
\c - at the end of a send field indicate no newline is to be sent
|
|
otherwise a newline is sent by default
|
|
\r - send a carriage return
|
|
|
|
|
|
README Page 5
|
|
|
|
|
|
\n - send a newline
|
|
\N - send a null
|
|
\b - send a backspace
|
|
\d - delay 2 seconds
|
|
\p - pause .25 to .5 seconds
|
|
\s - send a space character
|
|
\t - send a tab character
|
|
\\ - send the backslash
|
|
EOT- send an EOT (actually the EOT\n pair is sent twice)
|
|
BREAK - send a break
|
|
\nnn - convert the octal digits nnn to a character and send
|
|
|
|
An example:
|
|
|
|
xyz Any;2 ACU 1200 ACpa-555-6695 "" \n ogin--ogin-EOT-ogin--ogin-BREAK-ogin
|
|
nuucp
|
|
|
|
This line is for the remote system "xyz".
|
|
We may dial at any time, wait two minutes in case of failure. Uucp will
|
|
normally try the same number twice.
|
|
|
|
Uucp will use some kind of ACU or dialing modem. The first available
|
|
line from the Devices file that has a first field with "ACU" will be
|
|
used. The system that this particular example comes from, uses a Hayes
|
|
Smartmodem.
|
|
|
|
The phone number passed to the dialing routine will be 555-6695 plus
|
|
whatever ACpa is specified as in the Dialcodes file (probably 1-215, the
|
|
area code for Southeastern Pa). Pauses will be placed after the area
|
|
code and also after the exchange number.
|
|
|
|
After connection is established by the dialer, a newline will be sent.
|
|
It will be sent without waiting because of the initial null expect
|
|
field. If the response comes back with "ogin" embedded in it, "nuucp"
|
|
will be sent; if not, another newline is sent (the -- ). If ogin is
|
|
still not received EOT\n is sent twice. If that doesn't do it another
|
|
newline is sent. And if that doesn't work a break is sent. If that
|
|
fails to get "ogin" the login sequence is aborted and uucp gives up the
|
|
attempt for the time being.
|
|
|
|
MORE Systems file examples -----
|
|
|
|
NAME TIME TYPE CLASS PHONE LOGIN
|
|
|
|
# A direct connection
|
|
kudzu Any kudzu 9600 - "" \r\d\r\d\r\d\r ogin: nuucp ssword: sniglet
|
|
|
|
kudzu - the remote system's name
|
|
Any - call any time
|
|
kudzu - matches the first field of a line in the Devices file
|
|
|
|
|
|
README Page 6
|
|
|
|
|
|
9600 - the speed
|
|
"-" - no phone number
|
|
"" \r\d\r\d\r\d\r ogin: nuucp ssword: sniglet - the expect/send string.
|
|
|
|
---
|
|
|
|
# Towernet connection - for systems that support Towernet
|
|
#####NOTE -- A default Towernet line has already been added to the Devices
|
|
file. If you do not have Towernet on your Tower 32, this
|
|
line is ignored.
|
|
zebra Any tnet,e Any -
|
|
|
|
zebra - the remote systems name
|
|
Any - call any time
|
|
tnet,e - is an arbitrary name that matches the first field in
|
|
the Devices file and ,e means "use e protocol"
|
|
Any - CLASS field since uucp will be using Towernet, the word Any is
|
|
sufficient.
|
|
- - acts as a null space holder for the phone field.
|
|
|
|
It is recommended that either e or f protocol be used for Towernet
|
|
uucp connections (SEE the Towernet section of this README file).
|
|
The protocol selection is done either in the Systems file or may
|
|
also be done in the Devices file or both. The following are
|
|
examples of ways that protocols can be selected for uucp file
|
|
transfer :
|
|
|
|
If the Systems file looks like :
|
|
zebra Any tnet Any -
|
|
|
|
and the Devices file looks like:
|
|
tnet - - Any XNS
|
|
|
|
THEN -- you will be using the default g protocol, which may cause
|
|
the problem noted in the Towernet section of this README file. Instead,
|
|
use either the f or e protocols as follows :
|
|
---
|
|
If the Systems file looks like :
|
|
zebra Any tnet,e Any -
|
|
|
|
and the Devices file looks like:
|
|
tnet - - Any XNS
|
|
|
|
then e protocol will be used.
|
|
---
|
|
If the Systems file looks like :
|
|
zebra Any tnet Any -
|
|
|
|
and the Devices file looks like:
|
|
tnet,e - - Any XNS
|
|
|
|
then e protocol will be used.
|
|
---
|
|
If the Systems file looks like :
|
|
zebra Any tnet,f Any -
|
|
|
|
and the Devices file looks like:
|
|
tnet,f - - Any XNS
|
|
|
|
then f protocol will be used.
|
|
---
|
|
|
|
README Page 7
|
|
|
|
|
|
Please refer to the uucp section of the Superuser Guide for more
|
|
information on protocol selection.
|
|
---
|
|
more Systems file examples
|
|
|
|
#log in kudzu first try 2400 on both lines then try 1200 baud
|
|
|
|
kudzu Any ACU 2400 =794-6666 "" \r\r@\d@\d@\d@\d@\d@\d@\d
|
|
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
|
|
|
|
kudzu Any ACU 2400 =794-6281 "" \r\r@\d@\d@\d@\d@\d@\d@\d
|
|
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
|
|
|
|
kudzu Any ACU 1200 =794-6666 "" \r\r@\d@\d@\d@\d@\d@\d@\d
|
|
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
|
|
|
|
kudzu Any ACU 1200 =794-6281 "" \r\r@\d@\d@\d@\d@\d@\d@\d
|
|
ogin-BREAK-ogin--ogin-BREAK-ogin-BREAK-ogin-BREAK-ogin nuucp
|
|
|
|
# direct to modem
|
|
|
|
hayes12 Any hayes12 1200
|
|
hayes24 Any hayes24 2400
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Devices)
|
|
----------------------------------------------------------------------------
|
|
|
|
NOTE*** When you remove entries from the Devices file, you must
|
|
remove the corresponding entry in the /etc/inittab file for proper
|
|
construction of the Administrator terminal and printer
|
|
lists.
|
|
|
|
For information on modem settings refer to the Hardware Service
|
|
Manual.
|
|
|
|
The Devices file corresponds to the L-devices file of the old uucp.
|
|
Each line describes a line and a use of that line to make a connection.
|
|
Each line has the following format:
|
|
|
|
TYPE LINE LINE2 CLASS DIALER TOKEN [DIALER TOKEN] ...
|
|
|
|
Both type and class will be matched from a line in the Systems file.
|
|
Comments beginning with '#' or white space are ignored.
|
|
|
|
The TYPE field may be any name, but should match the third field of
|
|
the Systems file. For direct connections the TYPE field is usually
|
|
the remote system's name. It is of importance to note that for cu
|
|
connection, the TYPE field of the Devices file MUST have the
|
|
word "Direct" with a capital "D". "ACU" is used for all lines that
|
|
use either a dialable smart modem or a real acu.
|
|
|
|
For Towernet connections, the TYPE field may be followed by ",e"
|
|
or ",f" to specify the correct protocol.
|
|
|
|
The LINE field should contain the name of the device through which the
|
|
connection will be made. For example, "ttya" will mean that the
|
|
connection will be attempted through "/dev/ttya". For entries that
|
|
use XNS ( for Towernet ) in the dialer field this should be "-".
|
|
|
|
|
|
README Page 8
|
|
|
|
|
|
The CLASS field has the same format and is matched to the class field of
|
|
the line from the Systems file.
|
|
|
|
The LINE2 (3rd) field should be "-" on most Tower 32 systems. It is
|
|
the name of the auxiliary device port to which a good-old-fashioned
|
|
801-ACU is attached.
|
|
|
|
The DIALER field is used to select the method of making the connection.
|
|
The field must match either one of the builtin dialers, the first field
|
|
of one line in the Dialers file. The word "direct" can be used on
|
|
direct connections and cu connections. It matches a line in the Dialers
|
|
file with a null script. The word "XNS" is used for Towernet connections.
|
|
|
|
Current reserved names for builtins are:
|
|
|
|
"801" 801 ACU Dialer
|
|
"212" 801 ACU Dialer
|
|
"TCP" 4.2BSD sockets
|
|
"Unetserver" 3Com implementation of TCP
|
|
"DK", Datakit Network
|
|
"XNS" Towernet, XNS (xsp service)
|
|
"direct" direct RS232 connections
|
|
|
|
Builtins are checked first and then the Dialers file for all
|
|
remaining dialer fields.
|
|
|
|
The last field is the string to be sent to the dialer. If none is
|
|
present or if only an \D or \T is present then the Phone field from the
|
|
Systems file is processed. \D ensures that the contents of the
|
|
PHONE field of the Systems file will not be interpreted as a valid
|
|
entry in the Dialcodes file, while \T ensures that it will.
|
|
|
|
Multiple dialer-token pairs may be present. Only the last token may be
|
|
missing.
|
|
|
|
Devices file EXAMPLES:
|
|
|
|
---
|
|
|
|
Direct tty03 - 9600 direct
|
|
|
|
A cu connection where :
|
|
|
|
Direct - specifies that this is to be used by cu
|
|
tty03 - /dev/tty03 will be the port used by cu
|
|
"-" - no 801 ACU
|
|
9600 - 9600 bps
|
|
direct - matches a null script in the Dialers file
|
|
|
|
---
|
|
|
|
NOTE ::: FOR SYSTEMS THAT SUPPORT TOWERNET
|
|
|
|
tnet,e - - Any XNS
|
|
|
|
A Towernet connection where:
|
|
|
|
tnet - matches third field in systems file
|
|
|
|
|
|
README Page 9
|
|
|
|
|
|
,e - e protocol for Towernet
|
|
- - no tty port
|
|
- - no 801 ACU
|
|
Any - speed is of no concern since it will be a Towernet
|
|
transmission
|
|
XNS - specifies Towernet connection
|
|
|
|
---
|
|
|
|
more examples----
|
|
ACU tty04 - 2400 hayes \T
|
|
ACU tty05 - 1200 hayes \D
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Dialers)
|
|
|
|
---
|
|
|
|
This file contains one line scripts that directs the handshaking that
|
|
takes place between the system and various types of dialers. The
|
|
first field is the name of the dialer and is matched against the dialer
|
|
field of the Devices file.
|
|
|
|
Comment lines start with "#" or white space.
|
|
|
|
The second field is a set of translations and may be null (""). These
|
|
translations usually are used to map "=" and "-" into the appropriate
|
|
characters for the dialer. Other translations may be specified.
|
|
|
|
The remaining fields are expect-send strings.
|
|
|
|
The escape sequence permitted in the send strings are:
|
|
|
|
\p - pause (.25 to .5 sec)
|
|
\d - delay (approx. 2 sec.)
|
|
\D - take Phone field from Systems file OR token from
|
|
Devices file WITHOUT Dialcodes translation
|
|
\T - same as \D but WITH Dialcodes translation
|
|
\N - null byte
|
|
\K - send a Break
|
|
\E - enable echo checking (send a char, wait 'til its
|
|
received, send the next, wait ...) good if the device
|
|
is slow and echos.
|
|
\e - disable echo checking
|
|
\r - send a carriage return
|
|
\c - (at end of string) don't send a newline
|
|
\n - send a newline
|
|
\nnn - convert octal nnn to a character and send
|
|
|
|
An example:
|
|
|
|
hayes =,-, "" \dAT\r\c OK\r \EATDT\T\r\c CONNECT
|
|
|
|
hayes - matched against the Devices file dialer field, this
|
|
field is usually the name of the dialer
|
|
|
|
|
|
README Page 10
|
|
|
|
|
|
=,-, - the "=" (wait for dial tone) is translated to ","
|
|
(pause) since the Hayes Smartmodem 1200 does not have
|
|
the ability to recognize dial tone; the standard pause
|
|
character "-" is also translated to ","
|
|
|
|
"" - expect nothing, i.e. send first
|
|
|
|
\dAT\r\c - wait 2 sec, send AT followed by a carriage return with
|
|
no newline
|
|
|
|
OK\r - expect OK followed by a carriage return
|
|
|
|
\EATDT\T\r\c - turn on echo checking and send ATDT followed by the
|
|
phone number as translated by the Dialcodes file,
|
|
this is followed by a carriage return without a newline.
|
|
|
|
CONNECT - the script successfully completes if CONNECT is
|
|
received
|
|
|
|
A SAMPLE Dialers file
|
|
---------------------
|
|
|
|
penril =W-P "" \d > s\p9\c )-W\p\r\ds\p9\c-) y\c : \E\DP > 9\c OK
|
|
ventel =&-% "" \r\p \r\p-\r\p-$ <K\D%%\r>\c ONLINE!
|
|
rixon =&-% "" \r\p \r\p-\r\p-$ <K\D%%\r>\c ONLINE!
|
|
vadic =K-K "" \005\p *-\005\p-*\005\p-* D\p BER? \E\D\e \r\c LINE
|
|
develcon "" "" \pr\ps\c est:\007 \D \007
|
|
micom "" "" \s\c NAME? \D\r\c GO
|
|
hayes =,-, "" \dAT\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
|
|
hayes24=,-, "" \dAT\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
|
|
bbox =,-, "" \dATB3\r\c K\r \dAT\r\c K\r \EATDT\T\r\d\d\d\d\d\c CONNECT
|
|
direct
|
|
XNS
|
|
---
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Dialcodes)
|
|
---
|
|
|
|
The Dialcodes file is a list of abbreviations and their translations.
|
|
Abbreviations are alpha strings and the corresponding translation is
|
|
passed to the dialer.
|
|
|
|
An example:
|
|
|
|
INRB 77=440-
|
|
|
|
INRB - an abbreviation meaning Internet-Rancho Bernardo is
|
|
translated to 77, wait for dial tone then send 440.
|
|
|
|
From the code, it appears that the Dialcodes file has no formal
|
|
mechanism for comments, any abbreviation that never matches will do, or
|
|
the translation field may be followed by a comment.
|
|
|
|
|
|
README Page 11
|
|
|
|
|
|
(/usr/lib/uucp/Permissions)
|
|
---
|
|
The Permissions file is the heart of security administration for uucp.
|
|
Comment lines start with a '#'. The format of the Permissions file is a
|
|
sequence of logical lines of "option=value" assignments. Logical lines
|
|
may consist of multiple physical lines by escaping the newline with "\".
|
|
|
|
There are two types of logical lines or entries in the Permissions file.
|
|
These are LOGNAME entries and MACHINE entries. These entries are
|
|
composed of white space delimited "option=value" assignments. No
|
|
white space is permitted in these assignments. LOGNAME entries will have
|
|
a LOGNAME assignment in it. Likewise MACHINE entries will have a MACHINE
|
|
assignment.
|
|
|
|
All login IDs used by remote systems to login for UUCP transfers MUST be
|
|
specified in exactly one LOGNAME entry. In the case of Towernet
|
|
connections, where no actual login takes place, a LOGNAME entry must
|
|
exist for the uid under which the server (/usr/bin/server) runs, usually
|
|
root.
|
|
|
|
REQUEST assignment
|
|
------------------
|
|
"REQUEST=yes" or "REQUEST=no" : In a LOGNAME entry this specifies whether
|
|
the local host will permit the remote to ask for files to be sent to the
|
|
remote, when the remote calls in.
|
|
|
|
In a MACHINE entry it specifies whether the remote may request files
|
|
when the local host calls the remote.
|
|
|
|
The default is REQUEST=no, the remote may not request files.
|
|
|
|
SENDFILES assignment
|
|
--------------------
|
|
|
|
The SENDFILES assignment applies only to LOGNAME entries.
|
|
"SENDFILES=yes" indicates that the local host will send files to the
|
|
remote if the remote calls. "SENDFILES=call" means to only send if the
|
|
local host calls the remote. The latter is more secure. The default is
|
|
"SENDFILES=call". The yes option needs to be specified for passive
|
|
relationships, i.e. the local machine never calls.
|
|
|
|
READ and WRITE
|
|
--------------
|
|
|
|
The READ and WRITE assignments specify which SUBTREES of a system
|
|
a remote machine may access. The format of the value is a colon
|
|
separated list of directory path names:
|
|
|
|
READ=/usr/news:/usr/spool/uucppublic
|
|
|
|
The defaults are:
|
|
|
|
READ=/usr/spool/uucppublic
|
|
WRITE=/usr/spool/uucppublic
|
|
|
|
The READ and WRITE assignments in the LOGNAME entry specify the
|
|
|
|
|
|
README Page 12
|
|
|
|
|
|
privileges of any machine that logs in with that user name. This
|
|
should be very restrictive for commonly used user names or user names
|
|
without password protection.
|
|
|
|
These assignments in a MACHINE entry specify the permissions when the
|
|
local host calls the remote.
|
|
|
|
READ=/
|
|
WRITE=/
|
|
|
|
is a wide-open machine.
|
|
|
|
Specification of READ and WRITE replaces the defaults, it does not add
|
|
to the defaults.
|
|
|
|
|
|
NOREAD and NOWRITE
|
|
------------------
|
|
|
|
Exceptions to the READ and WRITE access permissions may be specified in
|
|
NOREAD and NOWRITE assignments. These have the same format as the READ
|
|
and WRITE assignments.
|
|
|
|
READ=/ NOREAD=/etc
|
|
|
|
The above combination implies that the remote system may read any file
|
|
on the system except those whose path names begin with "/etc".
|
|
|
|
CALLBACK
|
|
--------
|
|
This option only applies to LOGNAME entries and indicates whether to
|
|
accept ANY work from a remote, or whether to call back first.
|
|
CALLBACK=yes means that no work will be done until the local host
|
|
returns the call. CALLBACK=no is the default. If both machines specify
|
|
CALLBACK=yes, nothing will get done, so assign this carefully.
|
|
|
|
|
|
COMMANDS
|
|
--------
|
|
|
|
The COMMANDS assignment is a colon separated list of commands that a
|
|
remote may specify. This assignment only applies to the MACHINE entry.
|
|
The default is "COMMANDS=rmail". The command specified may be a
|
|
filename or a path name. If the path name is specified then all requests
|
|
for the corresponding filename will use the specified path name.
|
|
|
|
COMMANDS=rmail:/usr/bin/ls:/usr/lbin/rnews
|
|
|
|
This specifies that rmail, ls, and rnews may be "uux'd" from the remote.
|
|
Furthermore the "ls" used will be /usr/bin/ls (regardless of search
|
|
path) and rnews will come out of /usr/lbin. The default search path for
|
|
commands is "/bin:/usr/bin:/usr/lbin". To permit full access, the
|
|
assignment "COMMANDS=ALL" can be used.
|
|
|
|
To allow forwarding specify "uucp" in the COMMANDS assignment.
|
|
|
|
|
|
README Page 13
|
|
|
|
|
|
VALIDATE
|
|
--------
|
|
|
|
The VALIDATE assignment applies only to LOGNAME entries but is a means
|
|
of tying a particular machine to a particular user name. The assignment
|
|
is a colon separated list of machine names. If a machine calls in and
|
|
claims to be machine xxx, and VALIDATE=xxx is specified for a
|
|
LOGNAME=Uxxx then the call will be terminated unless the caller logged
|
|
in with user name "Uxxx".
|
|
|
|
MACHINE
|
|
-------
|
|
A MACHINE assignment makes an entry a MACHINE entry. The assignment is
|
|
a colon separated list of machines (taken from the Systems file) or the
|
|
keyword "OTHER". The latter is used to specify a set of defaults for
|
|
machines that are not listed in any entry. All other assignments in the
|
|
entry apply to each machine named in the MACHINE assignment.
|
|
For uux to work properly on the local system, there should be a MACHINE
|
|
assignment entry for the local machine (ie. - MACHINE="local system name")
|
|
in the local machines /usr/lib/uucp/Permissions file with the allowable
|
|
commands defined.
|
|
|
|
|
|
LOGNAME
|
|
-------
|
|
The LOGNAME assignment is a single user name by which a uucp connection
|
|
can be initiated.
|
|
|
|
A LOGNAME and MACHINE entry can be combined into a single entry.
|
|
|
|
Example:
|
|
--------
|
|
LOGNAME=nuucp \
|
|
REQUEST=yes \
|
|
SENDFILES=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
|
|
|
|
README Page 14
|
|
|
|
|
|
WRITE=/usr/spool/uucppublic \
|
|
NOREAD= \
|
|
NOWRITE= \
|
|
CALLBACK=no
|
|
|
|
# Any machine that logs in as nuucp can request files and we will send
|
|
# files on the connection. On requests by the remote to read or write
|
|
# into /usr/spool/uucppublic or a subdirectory will be honored. We call
|
|
# the local machine "kudzu" for this connection. A tilde in a request
|
|
# is translated to "/usr/spool/uucppublic".
|
|
|
|
LOGNAME=UncrsdX \
|
|
REQUEST=yes \
|
|
SENDFILES=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
NOREAD= \
|
|
NOWRITE= \
|
|
CALLBACK=no \
|
|
VALIDATE=ncr-sd
|
|
#
|
|
# The VALIDATE command specifies that ncr-sd must log in as UncrsdX
|
|
# any other user name used by ncr-sd would be considered an imposter
|
|
#
|
|
MACHINE=ncr-sd \
|
|
REQUEST=yes \
|
|
SENDFILES=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
NOREAD= \
|
|
NOWRITE= \
|
|
COMMANDS=ALL
|
|
#
|
|
# The COMMANDS=ALL means any uux request will be accepted. This is the
|
|
# reason that the VALIDATE assignment is used in LOGNAME=UncrsdX to
|
|
# ensure that more commonly known user names and passwords are not used
|
|
# by an imposter posing as ncr-sd
|
|
|
|
MACHINE=OTHER \
|
|
REQUEST=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
COMMANDS=rmail
|
|
#
|
|
#
|
|
#
|
|
|
|
|
|
README Page 15
|
|
|
|
|
|
LOGNAME=root \
|
|
REQUEST=yes \
|
|
SENDFILES=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
CALLBACK=no
|
|
|
|
# The LOGNAME=root entry in the Permissions file is necessary
|
|
for Towernet connections.
|
|
|
|
MORE, yes more, /usr/lib/uucp/Permissions file EXAMPLES --
|
|
|
|
MACHINE=bambi:doozer:grok:gollum:giggle \
|
|
REQUEST=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
NOREAD= \
|
|
NOWRITE= \
|
|
COMMANDS=rmail:uucp:lp:lpr:help:print:who:ls:rnews:cunbatch
|
|
|
|
MACHINE=OTHER \
|
|
REQUEST=yes \
|
|
READ=/usr/spool/uucppublic \
|
|
WRITE=/usr/spool/uucppublic \
|
|
COMMANDS=rmail
|
|
|
|
NOTE** There should be a machine file entry for the local machine with
|
|
the appropriate commands so that uux will work on the local machine.
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Maxuuscheds and /usr/lib/uucp/Maxuuxqts)
|
|
---
|
|
|
|
These two files contain a single line with the number of simultaneous
|
|
uuxqts and simultaneous uuscheds that can be running. The number is
|
|
given in ascii. A value of 1 or 2 is common. Note that processes
|
|
such as news that assume that single threading is provided by uuxqt
|
|
require a Maxuuxqts of 1.
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/remote.unkno)
|
|
---
|
|
|
|
If remote.unkno exists and is executable in /usr/lib/uucp then any
|
|
system not listed in the Systems file will not be permitted to make a
|
|
connection. Moreover, remote.unkno is executed with its first (and
|
|
only) argument, the name of the calling system. This can be used to log
|
|
the attempt in a log file or by mailing a message to the uucp
|
|
administrator concerning the unknown system.
|
|
|
|
|
|
README Page 16
|
|
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Crontab)
|
|
---
|
|
|
|
A sample crontab for uucp is recorded in /usr/lib/uucp/Crontab.
|
|
This crontab should also be present on your system as -
|
|
/usr/spool/cron/crontabs/uucp.
|
|
|
|
See crontab(1) for more information.
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/Poll)
|
|
|
|
---
|
|
|
|
Poll is a list of machines and the times at which they should be
|
|
polled. The first field is a machine name, followed by a TAB followed
|
|
by a space separated list of hours at which to call.
|
|
|
|
EXAMPLE POLL FILE
|
|
|
|
# "system <tab> hour1 hour2 hour3 ..." lines for polling remote systems.
|
|
#
|
|
# Lines starting with # are ignored.
|
|
# NOTE a tab must follow the machine name
|
|
unit1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
|
|
unit2 9 16 23
|
|
unit3 8 10 12 14 16
|
|
unit6 8 10 12 14 16
|
|
ncrcae 8 10 12 14 16 18 20 22
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/uugetty)
|
|
---
|
|
This is a version of getty that can be used on a port allowing both
|
|
dial-in and dial-out connections. Uugetty is identical to getty(1M)
|
|
but changes have been made to support using the line for uucico,
|
|
cu, and ct for bidirectional exchange of information. Uugetty should
|
|
not be used to call into a single direction getty. More on this later
|
|
when describing a direct connect to a unit which does not support the
|
|
newer uucp.
|
|
Please refer to the uugetty man page for more information.
|
|
|
|
#
|
|
#
|
|
#
|
|
|
|
README Page 17
|
|
|
|
(/usr/lib/uucp/uudemon.adm, /usr/lib/uucp/uudemon.clup,
|
|
/usr/lib/uucp/uudemon.hour, /usr/lib/uucp/uudemon.poll)
|
|
---
|
|
|
|
These are the demon scripts invoked by cron. Change as you wish but be
|
|
careful.
|
|
#
|
|
#
|
|
XNS and Towernet considerations -- FOR SYSTEMS THAT SUPPORT TOWERNET
|
|
---
|
|
|
|
As mentioned above, a uucp connection over Towernet initiated by a
|
|
remote system requires a LOGNAME=root entry.
|
|
|
|
/etc/service.db
|
|
---------------
|
|
Put the following line in /etc/service.db:
|
|
|
|
1:uucp:xsp:444:/usr/lib/uucp/xnsuucico::
|
|
|
|
/etc/towernet.db
|
|
----------------
|
|
Put the following line in /etc/towernet.db:
|
|
|
|
uucp_socket:444
|
|
|
|
** On the Tower 32, these two lines should already exist in the files
|
|
/etc/towernet.db and /etc/service.db if Towernet has been installed.
|
|
|
|
One problem has been noted when using g protocol for file transfer over
|
|
Towernet connections. The file transfer proceeds without fail, but either
|
|
one or both sides of the connection will leave a process hanging. On the
|
|
slave side, the process "uucico -uroot" may be seen in the process table,
|
|
but it will not be accumulating any more processor time. Sometimes it
|
|
may be possible to simply kill this process, but if it won't "die", then
|
|
Towernet must be taken down and then restarted again. The master side, or
|
|
the side that initiated the call ( and also the machine that determines
|
|
what protocol will be used ) may not have a process hanging, or may have
|
|
a uucico process hanging. Again, go ahead and try to kill this process.
|
|
|
|
The solution at this time, is to specify use of either the e or the f
|
|
protocol for file transfer over Towernet in either the Systems file,
|
|
the Devices file or both. A default entry has been provided in the
|
|
Devices file for Towernet connections. When adding the corresponding
|
|
Systems file entry, the administrator should use the type name(3rd field)
|
|
"tnet" to utilize the correct Devices file entry.
|
|
|
|
The uucp section of the Superuser Guide has more detailed information on
|
|
protocol selection.
|
|
|
|
#
|
|
#
|
|
#
|
|
(/usr/lib/uucp/uukick, /usr/lib/uucp/Uutry
|
|
---
|
|
The files uukick and Uutry, are shell scripts which
|
|
enable the user to start the uucico daemon when retry time has
|
|
not yet been reached.
|
|
|
|
|
|
README Page 18
|
|
|
|
|
|
The scripts are all variations on the same theme of removing the
|
|
status file, and starting uucico. Uukick will place the
|
|
uucico in the background. Uutry will place the diagnostic output
|
|
of uucico in a file called /tmp/systemname where systemname is
|
|
the name of the remote system.
|
|
|
|
To start uukick for the remote system pookey :
|
|
|
|
uukick pookey
|
|
|
|
Reference the Uutry man page for more information.
|
|
|
|
---
|
|
|
|
Connection of a unit running the newer uucp(the uucp installed
|
|
on the Tower32 is the newer uucp) and another using the older uucp.
|
|
|
|
|
|
When you are faced with situation of establishing a link
|
|
with a computer running the older version of uucp, then
|
|
it must be established which system will be designated as
|
|
the calling unit (the master or active unit) and which will
|
|
be the unit to be called (passive or slave unit). If the
|
|
system running the older version of uucp is the master unit,
|
|
then either uugetty or getty can be used to receive the call
|
|
on the system running the newer version of uucp. However if
|
|
the system running the newer uucp is the master unit, then
|
|
uugetty cannot be used to call. The master unit must use a
|
|
dialout only line to call the system running the older version
|
|
of uucp.
|
|
|
|
As an example, let us designate the system running the newer uucp
|
|
as the master or calling unit.
|
|
|
|
The /etc/inittab for the master unit will have the following
|
|
entry :
|
|
|
|
t01:1:off:/etc/getty tty01 9600 un
|
|
|
|
The un designates "unknown" terminal type. A terminal type
|
|
is needed, as shown above, on the Tower32 (if acting as master)
|
|
so that the Administrator's terminal listing is correct
|
|
for the direct connection to a system with the old uucp.
|
|
The line is acting as a raw line and no getty is being
|
|
respawned.
|
|
|
|
The Poll file on the master unit must be set up to poll
|
|
the slave unit periodically to see if the slave unit has
|
|
work queued for it.
|
|
|
|
The master unit's Systems file example :
|
|
|
|
slave_name Any slave_name 9600 - "" \r\d\r\d\r login: nuucp
|
|
|
|
The master unit's Devices file example :
|
|
|
|
slave_name tty01 - 9600 direct
|
|
---
|
|
Since the slave unit must wait to be polled by the master
|
|
unit, its'(the slave's) USERFILE file must be set-up
|
|
to allow the master unit to take any work that the slave
|
|
has queued for it. This can be accomplished by having the
|
|
|
|
|
|
README Page 19
|
|
|
|
|
|
USERFILE set up as follows :
|
|
|
|
,Master_unit /
|
|
nuucp, /
|
|
|
|
This, of course, has no restrictions.
|
|
|
|
|
|
*The slave unit's /etc/inittab file must respawn getty with
|
|
an entry similar to the following in /etc/inittab :
|
|
|
|
t02:1:respawn:/etc/getty tty02 9600
|
|
|
|
|
|
*Slaves L-devices file should exist but with a length of zero.
|
|
|
|
*Slaves L.sys file example
|
|
|
|
Master_unit NONE Slave 9600 tty02
|
|
|
|
The device, /dev/tty02 in this case, should have 0666 permissions.
|
|
chmod 0666 /dev/tty02
|
|
|
|
The owner of the line should be uucp.
|
|
chown uucp /dev/tty02
|
|
|
|
Please consult the appropriate superuser guide for further
|
|
information on setting up the uucp files for the older version
|
|
of uucp.
|
|
|
|
|
|
NEW FEATURES
|
|
============
|
|
|
|
Uucp can now handle modems with full modem control. This is
|
|
indicated to uucico by a new syntax in the Devices file.
|
|
If the line field of the active line of the Devices file has
|
|
a ';N' termination, dialing will take place WITHOUT waiting
|
|
for modem signals (like DCD or DSR). Later in the same line
|
|
a trailing ';C' on a dialer entry indicates when to expect
|
|
carrier (et. al.)
|
|
|
|
For example:
|
|
|
|
ACU tty04;N - 1200 hayes;C \T
|
|
|
|
This indicates that tty04 will not have carrier until the Hayes
|
|
Smartmodem dialing sequence successfully completes.
|
|
|
|
Cu and ct also support the new syntax in the Devices file.
|
|
|
|
Note that no changes to the Devices file are required in order
|
|
to operate as before.
|
|
|
|
=============================================================================
|
|
|
|
/ /
|
|
/ File 3 / NIA068 /
|
|
/ Tekno DCS HELP /
|
|
/ Judge Dredd /
|
|
/ /
|
|
|
|
|
|
ABO[RT] [taskname][/PMD][/TERM=TTnn:]
|
|
|
|
The ABORT command terminates execution of a specified task.
|
|
|
|
taskname The name of the task to abort. If taskname is not specified,
|
|
the task started by a RUN command from the issuing terminal
|
|
(task TTnn) is aborted. The variable nn is the octal unit
|
|
number of the issuing terminal.
|
|
|
|
/PMD Forces a Postmortem Dump of the task. See also HELP PMD.
|
|
|
|
/TERM=TTnn: (Privileged keyword.) Aborts a task requested from the
|
|
specified terminal. The variable TTnn: can be a logical
|
|
name assigned to the terminal (such as MYTERM), or it can
|
|
be a physical device name and unit number (such as TT17:).
|
|
|
|
Nonprivileged users can abort tasks requested from the issuing terminal.
|
|
Privileged users can abort any tasks.
|
|
|
|
|
|
ALT[ER] taskname/keyword(s)
|
|
/PRI=n
|
|
/RPRI=n
|
|
/TERM=ttnn:
|
|
|
|
The ALTER command changes the static or running priority of an
|
|
installed task.
|
|
|
|
Parameters:
|
|
|
|
taskname Specifies the name of the task that is to have its running,
|
|
or running and static priorities changed to n.
|
|
|
|
n Specifies a priority in the range 1 to 250(decimal).
|
|
The system assumes the specified value is octal unless you
|
|
append a period to the number.
|
|
|
|
For more information on the ALTER command keywords, type HELP ALT keyword.
|
|
|
|
help brk
|
|
|
|
BRK
|
|
|
|
The BREAKPOINT TO XDT (BRK) command passes control to the Executive Deb
|
|
ugging
|
|
Tool (XDT), if it is currently loaded in your system. If XDT has not
|
|
been
|
|
loaded, the BRK command has no effect.
|
|
|
|
If XDT is loaded in your system, all system activity halts and XDT
|
|
prints a message on the console terminal in the following form:
|
|
|
|
BE:nnnnn
|
|
XDT>
|
|
|
|
To return control to your CLI, type P. Proceeding from a breakpoint usually
|
|
restores the system to the state that existed when you entered the BRK command.
|
|
To enter the crash dump routine, type X at the XDT> prompt.
|
|
|
|
The BRK command is privileged and must be issued from the console terminal.
|
|
|
|
|
|
The CLI command establishes a command line interpreter other
|
|
than MCR. Except for the /SHOW keyword, the command is privileged.
|
|
|
|
The format and valid keywords for the CLI command are:
|
|
|
|
CLI (/keyword)
|
|
/DISABLE=cliname
|
|
/ELIM=cliname or ELIM=*
|
|
/ENABLE=cliname
|
|
/INIT
|
|
/MESSAGE=cliname:"message-text"
|
|
/SHOW
|
|
/UNOVR
|
|
|
|
For more information, type HELP CLI keyword.
|
|
|
|
The CLI /INIT command also accepts subkeywords that set various
|
|
characteristics for the CLI. For more information, type:
|
|
HELP CLI INIT.
|
|
|
|
|
|
DEV[ICES] Displays information about all devices.
|
|
|
|
DEV[ICES] dd: Displays information about units of device type dd:.
|
|
|
|
DEV[ICES] dev: Displays information about the specified device. The
|
|
parameter dev: can be either a physical or a logical
|
|
device name (for example, DB3: or MYDEV).
|
|
|
|
DEV[ICES] /LOG Displays a list of all logged-in terminals.
|
|
|
|
The DEVICES display includes the symbolic names of all devices, the names of
|
|
all devices of a particular type, the name of a specific device, or all
|
|
logged-in terminals.
|
|
|
|
help hello
|
|
|
|
To log in on this system, you must have an account on the system. If
|
|
you do not have an account, ask your system manager to create one for
|
|
you. In addition to your last name or account number, you will also
|
|
need to know the appropriate password. Log in to the system by
|
|
typing HELLO (or LOGIN).
|
|
|
|
Formats:
|
|
|
|
HELLO System prompts for your name or
|
|
account and password.
|
|
|
|
HELLO name[/password] If you do not specify your
|
|
password, the system prompts you
|
|
for it.
|
|
|
|
HELLO [grp,mem]/password Displays system messages after
|
|
login.
|
|
|
|
HELLO [grp/mem]/password Displays short form of system
|
|
messages after login.
|
|
|
|
The arguments g and m are the group and member numbers of your account
|
|
UIC. The square brackets are optional.
|
|
|
|
|
|
PAR[TITIONS]
|
|
|
|
The PARTITION DEFINITIONS command displays on the entering terminal a
|
|
description of each memory partition in the system.
|
|
|
|
For each partition in the system, the name, octal address of the
|
|
Partition Control Block, octal starting address, octal size, partition
|
|
type, and description of partition occupant are displayed.
|
|
|
|
|
|
|
|
LOA[D] dd:[/keyword(s)]
|
|
/CTB=cca[,b...]
|
|
/EXP=expname
|
|
/FLAGS
|
|
/HIGH
|
|
/PAR=parname
|
|
/SIZE=parsize
|
|
/VEC
|
|
|
|
The LOAD command reads a nonresident (loadable) device driver into memory.
|
|
|
|
The parameter dd: represents a two-character ASCII loadable device driver name.
|
|
For help on the LOAD command keywords, type HELP LOAD keyword.
|
|
|
|
help run
|
|
|
|
The RUN command initiates the execution of a task.
|
|
|
|
The RUN command has five general forms, depending on the
|
|
scheduling parameters and whether or not the task is installed. The
|
|
five forms are as follows:
|
|
|
|
1. RUN immediately (HELP RUN NOW)
|
|
2. RUN at a time increment from now (HELP RUN LATER)
|
|
3. RUN at a time increment from clock unit synchronization
|
|
(HELP RUN CLOCK)
|
|
4. RUN at an absolute time of day (HELP RUN ABSOLUTE)
|
|
5. Install, run immediately, and remove on exit (HELP RUN INSTALL)
|
|
|
|
|
|
|
|
TAL [taskname]
|
|
|
|
The TAL command displays the names and status of all tasks or
|
|
of a specific task installed in the system.
|
|
|
|
If taskname is not specified, information is displayed for all tasks
|
|
installed in the system. The display format is the same as that of the
|
|
ATL command.
|
|
|
|
For more information, type HELP ATL.
|
|
|
|
|
|
|
|
UNF[IX] taskname[/keyword]
|
|
/REG
|
|
/RON
|
|
|
|
The UNFIX command frees a fixed task from memory, thus allowing tasks
|
|
that are waiting for the partition in which the fixed task resides to compete
|
|
for the partition. (If a fixed task exits or aborts, it still occupies the
|
|
physical memory in the partition.)
|
|
|
|
Keywords:
|
|
|
|
/REG Unfixes a common region.
|
|
/RON Unfixes the common, read-only segment of a multiuser task.
|
|
|
|
The UNFIX command is the complement of the FIX command.
|
|
|
|
|
|
|
|
ACD [function]
|
|
|
|
The ANCILLARY CONTROL DRIVER (ACD) command loads and unloads character
|
|
translation routines so that the terminal driver can translate between
|
|
different character sets. Character translation in the terminal driver
|
|
allows terminals that conform to other standards to use the DIGITAL
|
|
Multinational Character Set.
|
|
|
|
Functions:
|
|
|
|
INSTALL filename AS NUMBER ident [ASSIGN LOGICAL] (Privileged function)
|
|
REMOVE NUMBER ident (Privileged function)
|
|
LINK term TO NUMBER ident (Nonprivileged function)
|
|
UNLINK term (Nonprivileged function)
|
|
|
|
For more information on these functions, type:
|
|
|
|
HELP ACD INSTALL
|
|
HELP ACD REMOVE
|
|
HELP ACD LINK
|
|
HELP ACD UNLINK
|
|
|
|
|
|
|
|
The ASSIGN (ASN) command defines, deletes, or displays logical
|
|
assignments on systems that select extended logical name
|
|
support during system generation. Logical device assignments
|
|
associate logical names with physical devices, pseudo devices,
|
|
or other logical devices.
|
|
|
|
Formats:
|
|
ASN ppnn:=ll[nn]:[/keyword(s)] ! Creates assignments
|
|
ASN [/keyword] ! Displays assignments
|
|
ASN =[ll[nn]:][/keyword] ! Deletes assignments
|
|
|
|
Keywords:
|
|
/ALL /GR
|
|
/TERM /GBL or /SYSTEM
|
|
/LOGIN /FINAL
|
|
|
|
The keywords are privileged options. For more information on the keywords,
|
|
type HELP ASN keyword.
|
|
|
|
For help on the ASN command formats, type: HELP ASN CREATE
|
|
HELP ASN DISPLAY
|
|
HELP ASN DELETE
|
|
|
|
|
|
|
|
The BROADCAST command displays a specified message at one or more
|
|
terminals.
|
|
|
|
The general formats of the BROADCAST command are:
|
|
|
|
BRO ttnn:message ! Sends a message to one terminal
|
|
BRO ALL:message ! Sends a message to all terminals
|
|
BRO LOG:message ! Sends a message to logged-in terminals
|
|
BRO user-name message ! Sends a message to the user name of
|
|
the person to receive it. (Systems with
|
|
Resource Accounting only)
|
|
BRO @filespec ! Sends a message contained in an indirect
|
|
command file
|
|
|
|
ALL and LOG are privileged options.
|
|
|
|
If an indirect command file is used, each line has one of the following
|
|
formats:
|
|
|
|
ttnn:message
|
|
ALL:message
|
|
LOG:message
|
|
user-name message
|
|
|
|
|
|
|
|
CLQ[UEUE]
|
|
|
|
The CLOCK QUEUE command displays on the entering terminal information
|
|
about tasks currently in the clock queue. The information consists of
|
|
the task names, the next time each task is to be run, and each task's
|
|
reschedule interval (if one was specified).
|
|
|
|
Any pending time-based schedule requests are displayed.
|
|
|
|
help dfl
|
|
|
|
The DEFINE LOGICALS (DFL) command assigns, deletes, and displays
|
|
logical name assignments. Logical names can be assigned to devices,
|
|
all or part of a file specification, and to other logical names.
|
|
|
|
Formats:
|
|
DFL = ! Deletes all local logical assignments
|
|
DFL ens=lns[/keyword(s)] ! Creates logical name assignments
|
|
DFL =[lns][/keyword] ! Deletes logical name assignments
|
|
DFL [/keyword(s)] ! Displays logical name assignments
|
|
|
|
Keywords (privileged options):
|
|
/ALL /GR
|
|
/TERM /GBL or /SYSTEM
|
|
/LOGIN /FINAL
|
|
|
|
For more information on the keywords, type: HELP DFL keyword
|
|
For help on the DFL command formats, type: HELP DFL CREATE
|
|
HELP DFL DISPLAY
|
|
HELP DFL DELETE
|
|
|
|
help login
|
|
|
|
To log in on this system, you must have an account on the system. If
|
|
you do not have an account, ask your system manager to create one for
|
|
you. In addition to your last name or account number, you will also
|
|
need to know the appropriate password. Log in to the system by
|
|
typing LOGIN (or HELLO).
|
|
|
|
Formats:
|
|
|
|
LOGIN System prompts for name and password.
|
|
|
|
LOGIN name[/password] If you do not specify your password,
|
|
the system prompts you for it.
|
|
|
|
LOGIN [g,m]/password Displays system messages after login.
|
|
|
|
|
|
LOGIN [g/m]/password Displays short form of system messages
|
|
after login.
|
|
|
|
The arguments g and m are the group and member numbers of your account
|
|
UIC. The square brackets are optional.
|
|
|
|
|
|
|
|
REA[SSIGN] taskname lun ddnn:
|
|
|
|
The REASSIGN command reassigns a task's logical unit numbers (LUNs)
|
|
from one physical device unit to another.
|
|
|
|
Parameters:
|
|
|
|
taskname The name of the installed task whose static assignment is
|
|
to be modified.
|
|
|
|
lun The logical unit number to be reassigned.
|
|
|
|
ddnn: The new device unit, which can be a physical, logical, or
|
|
pseudo device name.
|
|
|
|
|
|
|
|
SAV[E] [/keyword(s)]
|
|
/WB
|
|
/MOU="string"
|
|
/SFILE="filespec"
|
|
/CSR=x
|
|
|
|
The SAVE command copies the current RSX-11M-PLUS system image (the contents
|
|
of main memory) into the system image file from which the current image was
|
|
booted. The command saves the image so that a hardware bootstrap or the BOOT
|
|
command can later be used to reload and restart it.
|
|
|
|
For help on the SAVE command keywords, type HELP SAVE keyword.
|
|
|
|
|
|
|
|
TAS[KLIST] [taskname][/DEV=ddnn:]
|
|
|
|
The TASKLIST command displays a description of each installed task.
|
|
|
|
taskname The name of a specific task.
|
|
|
|
/DEV=ddnn: Displays the names and status of all tasks installed from
|
|
the specified device.
|
|
|
|
If you specify both taskname and /DEV, the systems displays
|
|
information about the task installed from that device.
|
|
|
|
For information on the display contents, type HELP TAS CONTENTS.
|
|
|
|
|
|
|
|
UNL[OAD] dd: [/keyword]
|
|
/EXP=expname
|
|
/VEC
|
|
|
|
The UNLOAD command removes a loadable device driver or extended Executive
|
|
partition (EXP) from memory. Note that loadable databases are not unloaded
|
|
when a driver with a loadable database is unloaded.
|
|
|
|
The parameter dd: represents the 2-character ASCII name of the device whose
|
|
driver is to be unloaded.
|
|
|
|
For information on the UNLOAD keywords, type HELP UNLOAD keyword.
|
|
|
|
help acs
|
|
|
|
ACS ddnn:/BLKS=n
|
|
|
|
The ALLOCATE CHECKPOINT SPACE (ACS) command allocates or discontinues
|
|
a checkpoint file on disk for systems that support dynamic
|
|
allocation of checkpoint space. ACS is a privileged command.
|
|
|
|
The variable n is the number of blocks to be allocated on device ddnn:.
|
|
If n is zero, the use of the file is discontinued after all of the tasks
|
|
checkpointed to it can be brought into memory and checkpointed elsewhere.
|
|
|
|
|
|
|
|
ATL [taskname]
|
|
|
|
The ACTIVE TASK LIST command displays on the entering terminal the
|
|
names and status of all active tasks in the system, or the status of
|
|
a particular task.
|
|
|
|
If taskname is not specified, information is displayed for all active
|
|
tasks in the system. If taskname is specified, only information for
|
|
that (active) task is displayed.
|
|
|
|
For information on task status codes, type HELP ATL STATUS.
|
|
|
|
|
|
|
|
BYE [/NOHOLD]
|
|
|
|
The BYE command logs you out of the system and disconnects the line (if you are
|
|
logged in via a remote or DECnet line).
|
|
|
|
BYE /HOLD
|
|
|
|
The BYE /HOLD command also logs you out of the system; however, if you are
|
|
logged in via a remote or DECnet line, the system holds the line so that you
|
|
can log into another account.
|
|
|
|
When BYE logs you out of the system, devices allocated to you are deallocated
|
|
and your privately mounted devices are dismounted. All nonprivileged tasks and
|
|
certain privileged tasks active on your terminal are aborted.
|
|
|
|
If [1,2]SYSLOGOUT.CMD exists and a silent logout has not been requested,
|
|
BYE executes the command file.
|
|
|
|
help dcl
|
|
|
|
DCL command-line
|
|
|
|
The DCL command allows you to issue DCL commands from a terminal
|
|
that is set to MCR. Instead of MCR processing the command line, DCL
|
|
processes it.
|
|
|
|
Note that the command-line must follow DCL syntax rules.
|
|
|
|
For more help on DCL, type HELP/DCL.
|
|
|
|
|
|
|
|
DMO ddnn:[["]volume-label["]][/keyword(s)]
|
|
/DEV
|
|
/TERM=term:
|
|
/LOCK=option
|
|
|
|
DMO /USER [/keyword(s)]
|
|
/DEV
|
|
/TERM=term:
|
|
/LOCK=option
|
|
|
|
The DISMOUNT command requests the file system to mark a volume for dismount and
|
|
release its control blocks. The DISMOUNT /USER command dismounts all volumes
|
|
that you have mounted.
|
|
|
|
If you specify a volume-label, it is checked against the label on the volume
|
|
to ensure that the proper volume is being dismounted. Privileged users can
|
|
dismount any volume.
|
|
|
|
For more information on the DISMOUNT keywords, type HELP DISMOUNT keyword.
|
|
|
|
|
|
|
|
LUN[S] taskname
|
|
|
|
The LUN command displays the static logical unit number assignments for a
|
|
specified task. The display consists of a list of physical device units in one
|
|
column and their corresponding LUNs in an adjoining column.
|
|
|
|
Taskname is the name of the task for which the assignments are to be displayed.
|
|
|
|
If a task is initiated by the install-run-remove option of the RUN
|
|
command, the task has no static LUN assignments. Also, when a task is running,
|
|
the display does not necessarily reflect the running task's assignments. (For
|
|
example, the Executive directive ALUN$ issued from within the task can alter
|
|
the LUN assignments.)
|
|
|
|
help red
|
|
|
|
RED[IRECT] nddnn:=oddnn:
|
|
|
|
The REDIRECT command redirects all I/O requests previously directed to
|
|
one physical device unit to another physical device unit.
|
|
|
|
Parameters:
|
|
|
|
nddnn: The new device unit to which subsequent requests will go.
|
|
|
|
oddnn: The old device unit from which requests have been redirected.
|
|
|
|
You can specify the logical names assigned to the devices or the physical
|
|
device names and unit numbers (in the form ddnn:).
|
|
|
|
help set
|
|
|
|
SET /keyword=values
|
|
|
|
The SET command dynamically changes characteristics of and displays
|
|
information about the system, tasks, and devices.
|
|
|
|
Only one keyword per command line is permitted. The valid keywords for the
|
|
SET command are grouped according to the functions they perform, as follows:
|
|
|
|
1. Setting Device Characteristics (Type HELP SET DEVICE)
|
|
2. Establishing Directories (Type HELP SET DIRECTORY)
|
|
3. Controlling I/O Operations (Type HELP SET MAXPKT)
|
|
4. Modifying Memory Allocation (Type HELP SET MEMORY)
|
|
5. Networking (Type HELP SET HOST)
|
|
6. Using System Tasks and Utilities (Type HELP SET UTILITY)
|
|
7. Ensuring System Protection (Type HELP SET PROTECT)
|
|
8. Tuning the System (Type HELP SET SYSTEM)
|
|
|
|
For help on individual keywords, type HELP SET keyword.
|
|
|
|
|
|
|
|
TIM[E] [hrs:mins[:secs]] [m1/day/year]
|
|
|
|
TIM[E] [hrs:mins[:secs]] [day-m2-year]
|
|
|
|
The TIME command sets the current time of day, the current date, or both.
|
|
If you do not specify a time or date, the system displays the current time and
|
|
date on the entering terminal.
|
|
|
|
For a description of the parameters for the TIME command, type:
|
|
|
|
HELP TIME PARAMETERS
|
|
|
|
|
|
|
|
UNS[TOP] [taskname][/TERM=TTnn:]
|
|
|
|
The UNSTOP command continues execution of a task that has been stopped
|
|
internally by the Executive.
|
|
|
|
Parameters:
|
|
|
|
taskname The name of the task. If taskname is not specified,
|
|
the command unstops the task being run from the issuing
|
|
terminal (task TTnn).
|
|
|
|
/TERM=TTnn: (Privileged keyword.) Unstops the task requested from the
|
|
specified terminal.
|
|
|
|
help active
|
|
|
|
ACT[IVE] [/keyword]
|
|
/ALL
|
|
/TERM=TTnn:
|
|
|
|
The ACTIVE command displays at the entering terminal the names of
|
|
all active tasks that have that terminal as their TI:. The display includes
|
|
the octal number of the terminal that initiated each task.
|
|
|
|
If you do not specify a keyword, the names of all active tasks for TI:
|
|
are displayed.
|
|
|
|
For more information, type HELP ACT keyword.
|
|
|
|
|
|
|
|
BLK [taskname][/TERM=term:]
|
|
|
|
The BLOCK command blocks an installed task, making it ineligible to
|
|
execute or to compete for memory.
|
|
|
|
taskname The name of the task to be blocked. If taskname is not
|
|
specified, the task started by a RUN command from the
|
|
issuing terminal (task TTnn) is blocked.
|
|
|
|
/TERM=term: (Privileged keyword.) Blocks a task requested from the
|
|
specified terminal. Term can be a logical name assigned
|
|
to the terminal, or it can be a physical device and unit
|
|
number for the terminal (in the form TTnn:).
|
|
|
|
|
|
|
|
CAN[CEL] taskname
|
|
|
|
The CANCEL command cancels time-based initiation requests for a task.
|
|
These requests result from the Executive directive Run Task (RUN$) or any of
|
|
the time-synchronized variations of the MCR command RUN that are placed in the
|
|
clock queue.
|
|
|
|
If any time-based schedule requests for the task exist, they are
|
|
removed. However, if the task is currently active, its execution is not
|
|
affected.
|
|
|
|
Only a privileged user can enter a CANCEL command for a task not initiated from
|
|
the issuing terminal.
|
|
|
|
|
|
|
|
DEA[LLOCATE] [ddnn:]
|
|
|
|
The DEALLOCATE command releases a private (allocated) device, thereby allowing
|
|
other users to access it.
|
|
|
|
The parameter ddnn: can be a logical name assigned to the device (such as
|
|
MYDEV) or the physical device name and unit number.
|
|
|
|
Privileged users may deallocate devices assigned to other than the issuing
|
|
terminal. If no device is specified, all devices allocated to the issuing
|
|
terminal are deallocated.
|
|
|
|
|
|
FIX taskname[/keyword]
|
|
/REG=regionname
|
|
/RON=taskname
|
|
|
|
The FIX command loads and locks a task into a partition in memory.
|
|
|
|
The specified region or task must be installed, inactive, and not
|
|
checkpointable. Fixed tasks remain physically in memory even after they exit.
|
|
They do not have to be loaded when a request is made to run them.
|
|
|
|
Keywords:
|
|
|
|
/REG=regionname Fixes a common task region in memory.
|
|
/RON=taskname Fixes a common, read-only segment of a
|
|
multiuser task in memory.
|
|
|
|
|
|
|
|
INI[TVOLUME] ddnn:["]volume-label["][/keyword(s)]
|
|
|
|
Keywords: /ACCESS /BAD /DENS /EXT
|
|
/FPRO /INDX /INF /LRU
|
|
/MXF /OWNER /POS /PRO
|
|
/SDI /UIC /VI /WIN
|
|
|
|
The INITIALIZE VOLUME command produces a Files-11 formatted volume.
|
|
|
|
ddnn: Specifies the device name and unit number of the volume to be
|
|
initialized.
|
|
|
|
volume-label Specifies a name for the volume being initialized. This is a
|
|
required parameter. Specify up to 12 characters for disks and
|
|
DECtape and up to 6 characters for magnetic tapes.
|
|
|
|
For a summary of the INI command keywords, type HELP INI SUMMARY.
|
|
For a summary of default values, type HELP INI DEFAULTS.
|
|
For additional help on individual keywords, type HELP INI keyword.
|
|
|
|
help mount
|
|
|
|
The MOUNT command logically connects devices to Ancillary Control
|
|
Processors (ACPs). There are two forms of the MOUNT command,
|
|
depending on the device being mounted.
|
|
|
|
Files-11 Disk or DECtape Format:
|
|
|
|
MOU[NT] dev:[volume-label][/keyword(s)]
|
|
|
|
Files-11 (ANSI) Magnetic Tape Format:
|
|
|
|
MOU[NT] device-list:[file-set-ID] [/keyword(s)]
|
|
|
|
|
|
For more information on these formats, type:
|
|
|
|
HELP MOUNT FILES11 ! For help on Files-11 format.
|
|
HELP MOUNT MAGTAPE ! For help on Magnetic Tape form at.
|
|
HELP MOUNT EXAMPLE ! For examples of command usage.
|
|
|
|
|
|
|
|
REM[OVE] taskname Deletes an entry (a task name) from the System
|
|
Task Directory (STD) and thereby removes the
|
|
task from the system.
|
|
|
|
REM[OVE] region-name/REG Removes a region from the Common Block
|
|
Directory (CBD).
|
|
|
|
If a task is fixed in memory, the REMOVE command unfixes the task and
|
|
then removes it. To remove a task that is currently executing, you must first
|
|
abort the task.
|
|
|
|
Note that a region cannot be removed if there are tasks installed in the
|
|
system that reference that region.
|
|
|
|
SSM message
|
|
|
|
The SSM command inserts text into the Error Logging file (LB:[1,6]LOG.ERR).
|
|
The text appears in the error log reports produced by the error log report
|
|
generator.
|
|
|
|
The message is a text string up to a maximum of 79 characters.
|
|
|
|
|
|
|
|
UFD ddnn:[volume-label][g,m][/keyword(s)]
|
|
/ALLOC=number
|
|
/DEL
|
|
/OWNER=[uic]
|
|
/PRO=[system,owner,group,world]
|
|
|
|
The USER FILE DIRECTORY command creates a User File Directory on
|
|
a Files-11 volume and enters its name into the Master File Directory (MFD).
|
|
Before creating a UFD, you must first initialize and mount the volume.
|
|
|
|
ddnn: Device unit containing the volume on which the UFD being
|
|
created will reside.
|
|
|
|
volume-label If specified, the volume-label is compared to the label on the
|
|
volume. If the names match, a UFD can be created.
|
|
|
|
[g,m] The UIC for the UFD, which establishes the owner of the
|
|
UFD. The variables g and m represent group and member
|
|
numbers, respectively, and can be in the range 1 to 377
|
|
(8).
|
|
The square brackets are required.
|
|
|
|
For information on the keywords, type HELP UFD keyword.
|
|
|
|
help boot
|
|
|
|
BOO [filespec]
|
|
|
|
(Privileged command.) The BOOT command bootstraps a system that exists as a
|
|
task image file on a Files-11 volume. It provides a convenient means of
|
|
terminating one system and initiating another, especially on minimum hardware
|
|
configurations.
|
|
|
|
Note that the BOOT command immediately terminates the system currently in
|
|
operation and destroys any work in progress on the system. Therefore, you
|
|
should not enter this command unless you are certain that you want to stop
|
|
using your current system.
|
|
|
|
The file specification (filespec) indicates where the bootstrappable system
|
|
image resides. If you do not include a file specification, the BOOT command
|
|
bootstraps the current system. For more information on the file specification
|
|
format and default values, type: HELP BOOT FILE
|
|
|
|
CBD [common-region-name [/TASKS]]
|
|
|
|
The COMMON BLOCK DIRECTORY command displays information about all
|
|
entries or a specific entry in the Common Block Directory. The
|
|
directory is a table of all named common regions and libraries installed
|
|
in the system.
|
|
|
|
Parameters:
|
|
|
|
common-region-name The name of a specific common region in the Common
|
|
Block Directory.
|
|
|
|
/TASKS Displays the name of each task attached to a
|
|
specific common region and the number of times the
|
|
task has mapped to the region (mapping count).
|
|
|
|
DEB[UG] [taskname]
|
|
|
|
The DEBUG command forces a task to trap to a debugging aid by setting
|
|
the T-bit in the task's Processor Status Word (PSW). To debug a task,
|
|
it must have been built with the /DA switch or have issued the Executive
|
|
directive Specify SST Vector Table for Debugging Aid (SVDB$).
|
|
|
|
Nonprivileged users can debug any nonprivileged task that was initiated
|
|
from their own terminals (TI:). Privileged users can debug any task.
|
|
|
|
Parameter:
|
|
|
|
taskname Specifies the name of the task to be debugged. If you do not
|
|
specify a task name, DEBUG searches for the task currently
|
|
running from the issuing terminal (task TTnn).
|
|
|
|
|
|
FLA [[ggg]/keyword]
|
|
/CRE
|
|
/ELIM
|
|
|
|
The FLA command creates, eliminates, or displays group global
|
|
event flags.
|
|
|
|
If the group number is omitted, the system defaults to the login
|
|
UIC group number of the issuing terminal. If you omit the group
|
|
number and keyword specification, all the group global event
|
|
flags are displayed.
|
|
|
|
For more information, type HELP FLA keyword.
|
|
|
|
help ins
|
|
|
|
The INSTALL command makes a specified task known to the system.
|
|
|
|
INS[TALL] [$]filespec[/keyword(s)]
|
|
|
|
filespec ddnn:[g,m]filename.type;version
|
|
|
|
$ Indicates the system or library UIC
|
|
|
|
The INSTALL command supports the following keywords:
|
|
|
|
/AFF /IOP /ROPAR /UIC
|
|
/CKP /PAR /SEC /WB
|
|
/CLI /PMD /SLV /XHR
|
|
/DFB /PRI /SYNC
|
|
/FMAP /PRO /TASK
|
|
/INC /RON /TIME
|
|
|
|
For a description of individual keywords, type HELP INSTALL keyword.
|
|
|
|
|
|
OPE[N] memory-address [+ n] [/keyword]
|
|
OPE[N] memory-address [- n] [/keyword]
|
|
|
|
Keywords: /AFF=[CPx,UBy] /CPU=CPx
|
|
/DRV=dd: /KNL
|
|
/KNLD /KNLI
|
|
/REG=region-name /TASK=taskname
|
|
/TASKD /TASKI
|
|
|
|
+ or - n One or more optional octal numbers to be added to or
|
|
subtracted from the memory address.
|
|
|
|
The OPENREGISTER command allows you to examine and modify a word of memory.
|
|
To open a location within a task, the task must be fixed in memory.
|
|
|
|
This is a privileged command.
|
|
|
|
For information on the keywords, type HELP OPEN keyword.
|
|
For help on the OPEN command display format, type HELP OPEN DISPLAY.
|
|
|
|
|
|
RES[UME] taskname[/TERM=TTnn:]
|
|
|
|
The RESUME command continues execution of a previously suspended task.
|
|
|
|
Parameters:
|
|
|
|
taskname The name of the task that is to resume executing. If you omit
|
|
the task name, the command attempts to resume task TTnn (where
|
|
nn is the octal unit number of the issuing terminal).
|
|
|
|
/TERM=term: (Privileged keyword.) Resumes a task initiated from the
|
|
specified terminal. Term can be a logical name assigned to the
|
|
terminal, or it can be the physical device and unit number for
|
|
the terminal (in the form ttnn:).
|
|
|
|
help swr
|
|
|
|
SWR Displays the current value in the switch register.
|
|
|
|
SWR value Deposits an octal number in the switch register.
|
|
|
|
SWR bitposition/keyword
|
|
/SET Sets the bit in the specified bit position.
|
|
/CLEAR Clears the bit in the specified bit position.
|
|
/DISPLAY Displays the bit in the specified bit position.
|
|
|
|
Diagnostic functions use the values in the switch register to interrupt
|
|
diagnostic processing and to select specific diagnostics to execute.
|
|
For processors that do not have a console switch register, the Executive
|
|
directive Get Sense Switches (GSSW$) accesses the software switch register
|
|
(SWR$) in the Executive module SYSCM. To allow a task to access or modify $SWR,
|
|
use the SWR command.
|
|
|
|
|
|
|
|
UNB[LOCK] [taskname][/TERM=term:]
|
|
|
|
The UNBLOCK command continues the execution of a blocked task.
|
|
UNBLOCK is the complement of the BLOCK command.
|
|
|
|
A nonprivileged user can unblock only those tasks whose TI: is the same
|
|
as the issuing terminal. A privileged user can unblock any blocked task.
|
|
|
|
Parameters:
|
|
|
|
taskname The name of the task to be unblocked. If taskname is not
|
|
specified, the command unblocks the task that was running
|
|
from the issuing terminal (task TTnn).
|
|
|
|
/TERM=term: (Privileged keyword.) Unblocks a task requested from the
|
|
specified terminal. Term can be a logical name assigned to
|
|
the terminal, or it can be the physical device and unit number
|
|
for the terminal (in the form ttnn:).
|
|
|
|
|
|
The OPR (or DCSOPR) task gives the System Manager or Operator an interface
|
|
to the Data Communications Subsystem (DCS). Through English-like commands,
|
|
the user has the ability to display or modify line parameters, display any
|
|
or all queues, or delete a specific queue entry. Multiple copies of the
|
|
task may be active at the same time.
|
|
|
|
If the command is not entered on the same line as the task mnemonic,
|
|
then the prompt "OPR>" will be displayed, and OPR will wait for further
|
|
commands. OPR will continue to prompt for and accept commands, until the
|
|
user terminates the session with a control-Z.
|
|
|
|
OPERATOR COMMANDS
|
|
Following is a summary of commands available to the operator. For detailed
|
|
explanations of each command and/or its options, type
|
|
HELP OPR <command>. Most commands and keywords may be abbreviated to 3
|
|
characters, both in this help facility and when issued to OPR.
|
|
|
|
DISPLAY Display information and parameters on all or selected lines
|
|
or queues, or current supervisor parameters.
|
|
|
|
MODIFY Change line states and parameters, or supervisor parameters.
|
|
|
|
CREATE Create a queue.
|
|
|
|
DELETE Delete a queue or a queue entry.
|
|
|
|
RESET Reset all or selected scheduled polls.
|
|
|
|
QUIET Enable/Disable informative messages from OPR; does not affect
|
|
error messages. Options are QUIET ON or QUIET OFF.
|
|
|
|
|
|
QUETST is a Tekno-developed debugging aid for use with VS: queue entries;
|
|
it is intended for users with an intimate knowledge of the queue entry
|
|
format(s) for your intended application. With that warning in mind, it
|
|
is a useful tool that allows the user to insert queue entries, examine
|
|
queue entries in several formats, selectively delete queue entries, and
|
|
purge individual queues. You must know the name of the queue(s) you wish
|
|
to manipulate before issuing any requests, however.
|
|
|
|
Commands available under QUETST may be abbreviated to the first character;
|
|
QUETST only examines the first character, but accepts any number following.
|
|
|
|
Commands accepted by the current version of QUETST are:
|
|
|
|
E - Examine a queue entry. You will be prompted for the queue
|
|
name and entry number; QUETST will then report information
|
|
about the entry, and query you for the output format:
|
|
|
|
A - ASCII interpretation of all bytes in the entry.
|
|
Bytes not within the printing ASCII sequence are
|
|
replaced by spaces.
|
|
|
|
B - Octal byte representation, unsigned.
|
|
|
|
D - Decimal word representation, unsigned.
|
|
|
|
O - Octal word representation, unsigned.
|
|
|
|
R - Radix-50 representation.
|
|
|
|
L - List current queue entry. This allows the re-display of an
|
|
entry in another format; format selection is as for Examine.
|
|
|
|
P - Purge all entries from the queue; QUETST will prompt for a queue
|
|
name.
|
|
|
|
R - Remove a selected queue entry. QUETST will prompt for a queue
|
|
name and entry number, and will display the deleted queue entry.
|
|
This command is the only exception to the single-character command
|
|
situation: if it is issued as RF (Remove Force), the entry is
|
|
simply deleted with no display.
|
|
|
|
I - Insert a queue entry. QUETST will prompt for the priority and
|
|
entry size in bytes; these values are accepted in octal unless
|
|
forced to decimal by a terminating period. Thereafter, for as
|
|
many bytes as specified, QUETST will accept input data. Data
|
|
must be entered in groups of two bytes; thus, for an odd-sized
|
|
message, you will have to enter a pad byte.
|
|
|
|
For information on data input formats and procedures, type HELP QUETST DATA.
|
|
|
|
|
|
|
|
ALL[OCATE] dd[nn:] [=llnn:] [/keyword]
|
|
/TERM=term:
|
|
/TYPE=dev
|
|
|
|
The ALLOCATE command establishes a specified device as your private device.
|
|
|
|
Parameters:
|
|
|
|
dd The 2-letter device mnemonic.
|
|
|
|
nn: The unit number of the device (optional). If you omit
|
|
nn:, the system allocates the first available logical
|
|
unit of the dd-type device.
|
|
|
|
llnn: The name of a logical device, which the system
|
|
creates and assigns to the physical device being
|
|
allocated (optional).
|
|
|
|
For information on the ALLOCATE keywords, type HELP ALLOCATE keyword.
|
|
|
|
=============================================================================
|
|
|
|
/ File 4 / NIA068 /
|
|
/ /
|
|
/ ______ /
|
|
/ DBEDIT /
|
|
/ /
|
|
/ ____ ______ /
|
|
/ User Manual /
|
|
/ /
|
|
/ /
|
|
/ Submitted By: /
|
|
/ Malefactor Of Organized Crime /
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Copyright 1984,1988, Robelle Consulting Ltd.
|
|
|
|
|
|
|
|
_______ __________ ____
|
|
Robelle Consulting Ltd.
|
|
8648 Armstrong Road
|
|
R.R.#6
|
|
Langley, B.C.
|
|
Canada V3A 4P9
|
|
Phone: (604) 888-3666
|
|
Telex: 04-352848
|
|
|
|
|
|
|
|
|
|
___
|
|
Permission is granted to reprint this document (but not for
|
|
profit), provided that copyright notice is given.
|
|
|
|
|
|
___
|
|
Version 1.3
|
|
February, 1988
|
|
|
|
|
|
|
|
|
|
|
|
________ _______
|
|
Database Editing
|
|
|
|
|
|
|
|
Welcome to version 1.3 of DBEDIT, a module of SUPRTOOL that
|
|
permits people to add, change, list, or delete individual records
|
|
or "chains" of records from an IMAGE/3000 database. DBEDIT is
|
|
useful for debugging applications, for quickly prototyping
|
|
systems, and for the data entry of simple applications.
|
|
|
|
The functions of DBEDIT are similar to QUERY, but the commands
|
|
and operations are more consistent and logical. Because DBEDIT
|
|
is a part of SUPRTOOL, you can hold SUPRTOOL as a suspended
|
|
process from within other software (e.g., QEDIT) with the
|
|
database open. This facilitates fast process switching when you
|
|
need to examine a test database.
|
|
|
|
You enter DBEDIT via the EDIT command of SUPRTOOL. Once in
|
|
DBEDIT, you cannot use the SUPRTOOL commands (while in SUPRTOOL
|
|
you cannot use the DBEDIT commands). Certain commands are the
|
|
same in both DBEDIT and SUPRTOOL (e.g., USE, BEFORE, and SET).
|
|
The BEFORE command works independently and each software module
|
|
___
|
|
saves its own last command.
|
|
|
|
|
|
____________
|
|
Restrictions
|
|
|
|
1. Most DBEDIT commands require you to have opened the database
|
|
using the BASE command of SUPRTOOL. DBEDIT does not have a
|
|
BASE command.
|
|
|
|
2. DBEDIT does not work with any files other than IMAGE/3000
|
|
datasets.
|
|
|
|
3. You cannot switch to another database while in DBEDIT.
|
|
Instead, you must EXIT, do a BASE command in SUPRTOOL, then
|
|
EDIT.
|
|
|
|
4. The maximum size of any individual data item is 80 bytes
|
|
(i.e., 5X80 is acceptable, but X100 is not).
|
|
|
|
5. Only datasets whose search fields are compatible with DBEDIT
|
|
can be accessed (i.e., no K5 search fields).
|
|
|
|
|
|
_________ __ ______
|
|
Functions of DBEDIT
|
|
|
|
There are five major functions in DBEDIT:
|
|
|
|
_________ __ ______
|
|
Functions of DBEDIT DBEDIT User Manual
|
|
|
|
ADD: Add new entries to a dataset.
|
|
CHANGE: Change a master search value in all related datasets.
|
|
DELETE: Delete entries from a dataset.
|
|
LIST: List the value of entries in a dataset.
|
|
MODIFY: Modify specific fields of an entry from a dataset.
|
|
|
|
|
|
___________ __ ______
|
|
Performance of DBEDIT
|
|
|
|
SUPRTOOL was designed to be as fast as possible, while DBEDIT was
|
|
designed to have as many features as possible. DBEDIT does no
|
|
special optimizations. It uses the standard IMAGE intrinsics to
|
|
do all of the accesses to the database. DBEDIT does not use the
|
|
fast sequential access method of SUPRTOOL, but DBEDIT usually
|
|
works only with a few records within your database at one time.
|
|
|
|
|
|
___________
|
|
Field-Lists
|
|
|
|
DBEDIT arranges the list of fields in a dataset differently than
|
|
QUERY or SUPRTOOL. The QUERY ADD command prompts for the each
|
|
field in the dataset in the order they were declared in the IMAGE
|
|
schema. In DBEDIT, the order of field-lists is changed using the
|
|
following algorithm:
|
|
|
|
1. The search-field for a master dataset or the primary
|
|
search-field for a detail dataset appear first.
|
|
|
|
2. Any other detail search fields appear second.
|
|
|
|
3. Any sort-fields appear third.
|
|
|
|
4. All other non-search and non-sort fields that are compatible
|
|
with DBEDIT appear last.
|
|
|
|
Example:
|
|
|
|
The following example shows the difference between QUERY and
|
|
DBEDIT. We add an entry to the D-INVENTORY dataset of the STORE
|
|
database. In this dataset, SUPPLIER-NAME is the primary search
|
|
field and PRODUCT-NO is another non-primary search field.
|
|
|
|
QUERY/3000 DBEDIT/SUPRTOOL
|
|
|
|
___ ___
|
|
>add d-inventory #add d-inventory
|
|
|
|
____ ___________
|
|
BIN-NO =>>1201 SUPPLIER-NAME >STD Ribbons
|
|
_________
|
|
LAST-SHIP-DATE =>> PRODUCT-NO >2001001
|
|
______
|
|
OH-HAND-QTY =>> BIN-NO >1201
|
|
_______ __________
|
|
PRODUCT-NO =>>2001001 LAST-SHIP-DATE >
|
|
___________ ___________
|
|
SUPPLIER-NAME =>>STD Ribbons ON-HAND-QTY >
|
|
________
|
|
UNIT-COST =>> UNIT-COST >
|
|
|
|
_______
|
|
DBEDIT User Manual Locking
|
|
|
|
_______ __ _________
|
|
Locking of Databases
|
|
|
|
DBEDIT uses the following locking strategy. The ADD command
|
|
locks one dataset (using DBLOCK, Mode-3) after all of the field
|
|
values have been entered. The MODIFY and DELETE commands do the
|
|
following:
|
|
|
|
1. After all of the field values have been entered, the dataset
|
|
is locked.
|
|
|
|
2. The records are re-read using DBGET, Mode-4 for details or
|
|
DBGET, Mode-7 for masters.
|
|
|
|
3. The re-read record is compared with the original record. If
|
|
they are not the same, no update or delete is done.
|
|
|
|
4. The record is updated or deleted. When a search field or a
|
|
sort field is changed with the MODIFY command, the record is
|
|
deleted and added again.
|
|
|
|
5. The dataset is unlocked.
|
|
|
|
______
|
|
The CHANGE command locks the entire database while all key values
|
|
are being changed. In all cases, the DBLOCK is done
|
|
unconditionally. This means that DBEDIT always waits for other
|
|
locks to be released (possibly holding up your terminal).
|
|
|
|
|
|
|
|
|
|
______ ________
|
|
DBEDIT Commands
|
|
|
|
|
|
|
|
When you run DBEDIT, it prompts for commands on STDLIST with a
|
|
"#" character and reads command lines from STDIN. DBEDIT
|
|
commands have a command name followed by one or more parameters
|
|
separated by semicolons, colons, and commas. Semicolons are NOT
|
|
used to combine several commands on the same line as in SUPRTOOL.
|
|
|
|
You may shorten command names to any substring that uniquely
|
|
defines the command. For example, ADD can be shortened as AD or
|
|
A, since there are no other commands that start with "A". SHOW,
|
|
however, can be abbreviated only to SH, since there is also a SET
|
|
command in DBEDIT.
|
|
|
|
>base store.pub,5
|
|
>edit
|
|
_
|
|
#l m-customer;all {list}
|
|
_
|
|
#e {exit}
|
|
|
|
You may enter letters in either upper-case or lower-case, because
|
|
DBEDIT upshifts everything in the command line. These two
|
|
commands are identical:
|
|
|
|
________
|
|
Commands DBEDIT User Manual
|
|
|
|
____
|
|
#LIST M-CUSTOMER
|
|
____
|
|
#list m-customer
|
|
|
|
________
|
|
The maximum physical command line is 256 characters. You may
|
|
enter commands on multiple input lines by putting an "&"
|
|
_____
|
|
continuation character at the end of the line. The maximum total
|
|
command length is 256 characters. Multiple commands cannot be
|
|
placed on one input line. The separating semicolon, colon, or
|
|
comma in commands is REQUIRED, not optional.
|
|
|
|
:run suprtool.pub.robelle
|
|
>base store.pub,5 {open the database in SUPRTOOL}
|
|
>edit {enter DBEDIT}
|
|
#list m-customer {use all of the defaults}
|
|
#list m-customer;all {list all records in m-customer}
|
|
#exit {return to SUPRTOOL}
|
|
|
|
If you depress Control-Y during an operation, DBEDIT responds by
|
|
printing a blank line and stopping the current operation.
|
|
|
|
DBEDIT interprets any command line beginning with a colon (:) as
|
|
an MPE command. Only the commands that MPE allows in "break" are
|
|
allowed in DBEDIT. This feature can be used to establish :FILE
|
|
commands for the SUPRLIST file, to show the time, and to include
|
|
:COMMENT lines. For example:
|
|
|
|
________
|
|
#:comment Modify M-CUSTOMER records
|
|
#modify m-customer
|
|
#exit
|
|
|
|
Any command line beginning with an equal sign (=) is treated as a
|
|
calculator expression. You may use this feature to compute data
|
|
entry values without the need of an electronic calculator.
|
|
|
|
=2745*1.33
|
|
Result= 3650.85
|
|
|
|
The examples in this manual use the revised STORE database
|
|
__________ ________
|
|
described in the IMAGE/3000 Handbook.
|
|
|
|
|
|
_________ ___ ______ ________
|
|
Prompting For Search Criteria
|
|
|
|
In the CHANGE, DELETE, LIST and MODIFY commands, DBEDIT first
|
|
______ ________
|
|
prompts you for search criteria and then processes the records
|
|
you have selected. Search criteria are any or all of the search
|
|
and sort fields of the file. DBEDIT asks for the value of the
|
|
primary search field first, unless you override the prompt
|
|
ordering with the KEY option. For detail datasets, it then asks
|
|
for match values for the other search fields and sort fields.
|
|
You may hit the Return key to any of these prompts to indicate
|
|
that you don't care what values these fields have.
|
|
|
|
When DBEDIT finishes processing the records you select, it
|
|
recycles and prompts you for the next set of search criteria.
|
|
|
|
______ ________
|
|
DBEDIT User Manual Search Criteria
|
|
|
|
You may hit the Return key at this point to exit from the command
|
|
and return to the # prompt.
|
|
|
|
|
|
_______ __________
|
|
Command Parameters
|
|
|
|
The major commands (FILE, LIST, ADD, DELETE, MODIFY, and CHANGE)
|
|
have a similar parameter structure, consisting of the command
|
|
____ ______
|
|
name, then an optional file part and an optional option part. A
|
|
____
|
|
space separates the file part from the command name and a
|
|
______ ____
|
|
semicolon separates the option part from the file part. The
|
|
general format of these commands is:
|
|
|
|
____ _______
|
|
#command [file] [;options]
|
|
|
|
|
|
____ _________
|
|
File Parameter
|
|
|
|
The file parameter consists of an IMAGE/3000 dataset name
|
|
____
|
|
followed by an optional list of field names. If the file part is
|
|
missing, DBEDIT uses the previous file. The general format of
|
|
the file parameter is:
|
|
|
|
____ __________
|
|
#command [file] [:field-name,...]
|
|
|
|
Even when you use field-names, DBEDIT will add the search fields
|
|
to the field list. In the ADD command, DBEDIT assumes default
|
|
values for non-critical fields that are missing, but will prompt
|
|
for the search fields and sort fields (they are required).
|
|
|
|
______
|
|
#add d-inventory:bin-no {assume defaults for all but BIN-NO}
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
_________
|
|
PRODUCT-NO >105391
|
|
____
|
|
BIN-NO >10
|
|
|
|
In this case you will not be prompted for LAST-SHIP-DATE,
|
|
ON-HAND-QTY, or UNIT-COST.
|
|
|
|
In the MODIFY command, you can specify a set of fields to modify.
|
|
DBEDIT will not prompt you for new values for any other fields.
|
|
For example:
|
|
|
|
_________
|
|
#mod d-inventory:unit-cost {only modify UNIT-COST}
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons {prompt for search value}
|
|
_________
|
|
PRODUCT-NO >105391 {prompt for another one}
|
|
|
|
Enter new values (or <return> to leave as is):
|
|
SUPPLIER-NAME >STD Ribbons {prints the search value}
|
|
PRODUCT-NO >105391 {prints the other one}
|
|
UNIT-COST >500 {prints existing value}
|
|
________ {prompts for new value}
|
|
|
|
In this case you will not be prompted for BIN-NO, ON-HAND-QTY, or
|
|
|
|
____ _________
|
|
File Parameter DBEDIT Commands
|
|
|
|
LAST-SHIP-DATE.
|
|
|
|
When working on a single dataset, it is only necessary to specify
|
|
the dataset name in the first command. For example:
|
|
|
|
___________
|
|
#list d-inventory
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
|
|
#list {use the previous file parameter}
|
|
|
|
________________
|
|
SUPPLIER-NAME >//
|
|
|
|
|
|
______ _________
|
|
Option Parameter
|
|
|
|
____ _______
|
|
The file parameter and the options must be separated by a
|
|
semicolon.
|
|
|
|
____ __________ ______
|
|
#command [file] [:field-list] [;option,...]
|
|
|
|
_______
|
|
The available options are:
|
|
|
|
_____________
|
|
numeric-value|ALL|KEY|LIMIT|RELATED|UNDER|UPDATEKEY
|
|
|
|
These options qualify the operation of the FILE, LIST, MODIFY,
|
|
CHANGE, DELETE, and ADD commands. Some options only apply to one
|
|
command. Options can be combined. When more than one option is
|
|
specified, each option must be separated by a semicolon.
|
|
|
|
____________________
|
|
#list d-inventory;key=product-no;under
|
|
|
|
_________
|
|
PRODUCT-NO >
|
|
|
|
_____________ ______
|
|
Numeric-value Option
|
|
|
|
Commands normally cycle, prompting for new search values or new
|
|
entries, until you hit Return or Control-Y. However, if you
|
|
_____________
|
|
specify a numeric-value after the semicolon, the command only
|
|
_____________
|
|
prompts you numeric-value number of times. For example, if you
|
|
only want to do one LIST function, you would enter:
|
|
|
|
_
|
|
#list d-inventory;1 {only prompt for SUPPLIER-NAME once}
|
|
|
|
|
|
___ ______
|
|
ALL Option
|
|
|
|
The ALL option works only with the LIST, MODIFY, or DELETE
|
|
commands. When ALL is specified, every record in the specified
|
|
file is processed sequentially. You can stop the scan by hitting
|
|
Control-Y.
|
|
|
|
___ ______
|
|
DBEDIT Commands KEY Option
|
|
|
|
___ ______
|
|
KEY Option
|
|
|
|
The KEY option overrides the primary search field. DBEDIT
|
|
prompts for the primary search field first. Often, this is not
|
|
the value that you know. You can use the KEY option to force
|
|
DBEDIT to prompt you for another search field. For example:
|
|
|
|
#list d-inventory {use defaults}
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
_________
|
|
PRODUCT-NO >
|
|
|
|
______________
|
|
#list d-inventory;key=product-no {use PRODUCT-NO}
|
|
|
|
_________
|
|
PRODUCT-NO >105391
|
|
_______________
|
|
SUPPLIER-NAME >
|
|
|
|
|
|
_____ ______
|
|
LIMIT Option
|
|
|
|
The LIMIT option controls the number of entries allowed per key
|
|
value. This option is only useful for the ADD command. DBEDIT
|
|
limits the number of entries for the first field in the field
|
|
list to the LIMIT value specified. For example,
|
|
|
|
_______
|
|
#add d-inventory;limit=2 {two records per supplier}
|
|
|
|
______________________
|
|
#add d-inventory;limit=2;key=product-no
|
|
{two records per product}
|
|
|
|
|
|
_______ ______
|
|
RELATED Option
|
|
|
|
The RELATED option is for finding related records and it applies
|
|
only to LIST. If you use RELATED when LISTing an entry in a
|
|
master dataset, DBEDIT prints the specified master entry and then
|
|
___ ___
|
|
prints all detail entries with the same search value in all
|
|
datasets that are linked to the master dataset by an explicit
|
|
path. If you use RELATED with a detail dataset, DBEDIT prints
|
|
the specified detail entry, followed by the master entry of each
|
|
search field in the detail.
|
|
|
|
DBEDIT can only use explicitly-defined IMAGE paths to navigate
|
|
between datasets. User-defined paths are not supported in
|
|
DBEDIT. The following example shows how related records are
|
|
listed from a master dataset to a detail dataset:
|
|
|
|
_______ _______
|
|
#list m-supplier;related {all related records}
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
|
|
The M-SUPPLIER record is listed here.
|
|
|
|
D-INVENTORY records with a SUPPLIER-NAME of
|
|
___ _______
|
|
STD Ribbons are listed here.
|
|
|
|
-7-
|
|
|
|
_____ ______
|
|
UNDER Option DBEDIT Commands
|
|
|
|
|
|
|
|
_____ ______
|
|
UNDER Option
|
|
|
|
When DBEDIT prompts for a value for a field, it prints a series
|
|
of underlines. These underlines indicate the maximum field
|
|
width.
|
|
|
|
While these underlines are useful, they may not work on all
|
|
terminals or they may become irritating. When this happens, you
|
|
may disable underlining by using SET UNDERLINE OFF. Once
|
|
underlining is turned off, you may wish to enable it again, but
|
|
only for one command. The UNDER option overrides the SET
|
|
UNDERLINE, but only for the current command.
|
|
|
|
|
|
_________ ______
|
|
UPDATEKEY Option
|
|
|
|
The UPDATEKEY option allows the MODIFY command to change the
|
|
value of search and sort fields (i.e., critical fields).
|
|
Normally, MODIFY does not allow any changes to the search or sort
|
|
fields. Without the UPDATEKEY option, MODIFY does a DBUPDATE of
|
|
the modified record. If you specify UPDATEKEY and you change a
|
|
critical field, MODIFY must DBDELETE the existing record, then
|
|
DBPUT the record with the new values.
|
|
|
|
|
|
____________
|
|
Sub-Commands
|
|
|
|
You may enter a sub-command anytime DBEDIT prompts for the value
|
|
of a field. The available sub-commands are:
|
|
|
|
// stops the current command immediately.
|
|
|
|
\\ same as // (you may also use the Control-Y key).
|
|
|
|
? describes the current field.
|
|
|
|
< goes back one field to the previous field in the list.
|
|
|
|
<3 goes back three fields.
|
|
|
|
<< returns to the first field in the list.
|
|
|
|
> goes forward one field to the next field in the list.
|
|
|
|
>3 goes forward three fields.
|
|
|
|
>> skips the rest of the fields in the list. This is especially
|
|
useful when DBEDIT is prompting you for multiple search and
|
|
sort fields and you only want to enter the first.
|
|
|
|
____________
|
|
DBEDIT Commands Sub-Commands
|
|
|
|
' uses blanks for the field (useful in batch).
|
|
|
|
* uses the last value for this field.
|
|
|
|
[ forces what follows the [ to be a value and not a subcommand
|
|
(e.g., [*BOB ignores the *).
|
|
|
|
Examples:
|
|
|
|
#list m-supplier {we'll stop immediately}
|
|
|
|
________________
|
|
SUPPLIER-NAME >//
|
|
|
|
#list m-supplier {we will start again}
|
|
|
|
________________
|
|
SUPPLIER-NAME >Standard Type
|
|
_________
|
|
PRODUCT-NO >< {re-enter SUPPLIER-NAME}
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
_________
|
|
PRODUCT-NO >>> {skips the rest}
|
|
|
|
#list m-supplier
|
|
|
|
___________
|
|
SUPPLIER-NAME >STD Ribbons
|
|
_________
|
|
PRODUCT-NO >[>575 {">575" is the part-no}
|
|
|
|
The following sections describe the DBEDIT commands in detail.
|
|
The commands are presented in alphabetic order. Each command
|
|
name is centered, and following it, in brackets, is the minimal
|
|
abbreviation for the command. For example: [S] for SET and [SH]
|
|
for SHOW.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
___ _______ ___
|
|
Add Command [A]
|
|
|
|
Adds new entries to a dataset.
|
|
|
|
____ _______
|
|
ADD [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
____
|
|
If no field-list is entered as part of the file, DBEDIT will
|
|
____
|
|
prompt for all of the fields in the file. You may use the ">n"
|
|
or ">>" sub-commands to navigate quickly through the field list,
|
|
but you must enter values for all search and sort fields.
|
|
|
|
The database password must give you write access to the entire
|
|
dataset. The ADD command will stop after LIMIT= number of
|
|
entries have been added for any one key value. DBEDIT checks
|
|
each search field value as it is entered. For master datasets
|
|
the search field value must not exist. For detail datasets the
|
|
|
|
___
|
|
Add DBEDIT Commands
|
|
|
|
search field value must exist. To add records from a disc file,
|
|
see the >PUT command of SUPRTOOL.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
______ _______ ___
|
|
Before Command [B]
|
|
|
|
Re-executes the previous command line.
|
|
|
|
BEFORE
|
|
|
|
______
|
|
Notes:
|
|
|
|
In batch mode, SUPRTOOL prints a warning, but takes no action.
|
|
In session mode, SUPRTOOL presents the previous command line to
|
|
the user for editing. If there are no changes, you simply hit
|
|
return. If you wish to change any characters within the line,
|
|
the modify operators are the same as those used in QEDIT:
|
|
|
|
* Any printing characters replace the ones above.
|
|
|
|
* Control-D plus spaces deletes columns above.
|
|
|
|
* Control-B puts you into "insert before" mode.
|
|
|
|
* Control-A appends characters that follow to
|
|
the end of the line.
|
|
|
|
* Control-A, Control-D, plus spaces, deletes
|
|
columns from the end of the line.
|
|
|
|
* Control-T terminates the current mode, so that
|
|
you can space over to another column to work.
|
|
|
|
* Control-G recovers the original line.
|
|
|
|
* Control-O specifies "overwrite" mode (useful
|
|
when you want to replace with spaces).
|
|
|
|
|
|
________
|
|
Example:
|
|
|
|
#=20*15 {15 is incorrect, you meant 115}
|
|
Result= 300.0
|
|
______
|
|
#before
|
|
=20*15 {DBEDIT prints the line}
|
|
115 {you enter changes}
|
|
=20*115 {result is shown}
|
|
{you hit return}
|
|
Result= 2300.0
|
|
|
|
______
|
|
DBEDIT Commands Change
|
|
|
|
______ _______ ___
|
|
Change Command [C]
|
|
|
|
Changes all uses of a specific search field value in all detail
|
|
datasets related to a master. This command only applies to
|
|
master datasets.
|
|
|
|
____ _______
|
|
CHANGE [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
This command changes the search field value in all related detail
|
|
datasets. DBEDIT can only change values in detail datasets where
|
|
there is an explicit IMAGE path. It is up to the user to change
|
|
any user-defined paths.
|
|
|
|
Once this command has started making changes to the database, it
|
|
cannot be stopped. Entering Control-Y during the change will
|
|
have no effect. DBEDIT locks the entire database while all
|
|
changes are taking place. The database password must give you
|
|
write access to all related datasets that must be changed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
______ _______ ___
|
|
Delete Command [D]
|
|
|
|
Removes entries from a dataset.
|
|
|
|
____ _______
|
|
DELETE [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
If you are deleting entries from a master dataset, all entries
|
|
from related detail datasets must be removed first. Before any
|
|
record will actually be deleted, DELETE prints the record and
|
|
asks you whether it is okay to delete it; the default answer is
|
|
NO.
|
|
|
|
____
|
|
The field-list of the file specifies which fields to list before
|
|
______
|
|
prompting for verification of the deletion. The ALL option
|
|
allows you to review all entries in a detail dataset and remove
|
|
some or all of them. The database password must give you write
|
|
access to the entire dataset. ALL does not work on master
|
|
datasets; use the SUPRTOOL >DELETE command instead.
|
|
|
|
____
|
|
Exit DBEDIT Commands
|
|
|
|
____ _______ ___
|
|
Exit Command [E]
|
|
|
|
Leaves DBEDIT and returns control to SUPRTOOL.
|
|
|
|
EXIT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
____ _______ ___
|
|
File Command [F]
|
|
|
|
Establishes the current file, field list, and search field.
|
|
|
|
____ _______
|
|
FILE [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
If SET RESET is OFF, you can use the FILE command to specify the
|
|
____
|
|
KEY= for the specified file. For example:
|
|
|
|
#set reset off
|
|
______________
|
|
#file d-inventory;key=product-no
|
|
|
|
will cause all subsequent commands to prompt for the PRODUCT-NO
|
|
____
|
|
before the SUPPLIER-NAME. Specifing a new file or options
|
|
parameter in the ADD, CHANGE, DELETE, LIST, or MODIFY commands
|
|
____ ______
|
|
overrides and replaces the current file and option values.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
____ _______ ___
|
|
Help Command [H]
|
|
|
|
Gives helpful instructions on the use of DBEDIT.
|
|
|
|
HELP [command [keyword]]
|
|
|
|
(Default: browse through the entire help file)
|
|
|
|
The parameters have the following meaning:
|
|
|
|
command: explains the command and gives you a list
|
|
of subsidiary keywords to select from.
|
|
|
|
command,keyword searches for keyword under command
|
|
and prints the information found (if any).
|
|
|
|
command,@ prints everything about the command.
|
|
|
|
____
|
|
DBEDIT Commands Help
|
|
|
|
_________
|
|
Examples:
|
|
|
|
____
|
|
#help {start at the beginning, peruse help file}
|
|
|
|
_
|
|
#h add {explain the ADD command and show sub-keywords}
|
|
|
|
_
|
|
#h add,@ {tell everything about ADD. Comma is required}
|
|
|
|
______
|
|
Notes:
|
|
|
|
If no parameters are specified, HELP allows you to browse through
|
|
the "help" file. HELP works only if the DBEDIT "help-file" has
|
|
been installed (:RESTORE *ROBELLE; DBEDIT.HELP.ROBELLE). The
|
|
HELP command uses the QHELP subsystem to allow you to browse
|
|
through the DBEDIT in the file DBEDIT.HELP.ROBELLE, which
|
|
contains most of the User Manual. For "help in help", type "?"
|
|
when you see the QHELP prompt character ("?").
|
|
|
|
The help file is organized into levels. To go back to the
|
|
previous level, enter RETURN or ^ instead of a key name. If you
|
|
type "^^^", you will exit three levels at once.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
____ _______ ___
|
|
List Command [L]
|
|
|
|
Displays entries from a dataset.
|
|
|
|
____ _______
|
|
LIST [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
____
|
|
The field-list of the file parameter specifies which fields of
|
|
the entry to print (default of course is all of them). Search
|
|
field values are not listed, unless they are included in the
|
|
______
|
|
field-list. The ALL option lists all records in the specified
|
|
____ ______
|
|
file. The RELATED option prints related records from other
|
|
datasets as well as the records you select. The listing is
|
|
printed to $STDLIST, unless you use SET LP ON to specify SUPRLIST
|
|
as the output file.
|
|
|
|
The SUPRTOOL >LIST command will also display selected records and
|
|
has the option of dumping totally in OCTAL/CHAR format. Use
|
|
>LIST when you suspect that a dataset may contain bad data or you
|
|
need to select from a large dataset (>LIST is faster than #LIST).
|
|
|
|
______
|
|
Modify DBEDIT Commands
|
|
|
|
______ _______ ___
|
|
Modify Command [M]
|
|
|
|
Changes the values of any or all fields in a dataset entry.
|
|
|
|
____ _______
|
|
MODIFY [file][;options]
|
|
|
|
______
|
|
Notes:
|
|
|
|
____
|
|
The field-list of the file specifies which fields to modify.
|
|
______
|
|
When the UPDATEKEY option is specified, search and sort field
|
|
values may be changed.
|
|
|
|
The existing value of each field is printed before a new value is
|
|
accepted. Entering a carriage return preserves the old value.
|
|
If a new value is entered, it replaces the old value. The ALL
|
|
______
|
|
option allows you to review and modify all of the entries in a
|
|
dataset in serial order.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_ _______ ___
|
|
Q Command [Q]
|
|
|
|
Prints a message on $STDLIST.
|
|
|
|
Q [ string ]
|
|
|
|
(Default: print a blank line)
|
|
|
|
The string of up to 80 characters is printed on $STDLIST. The
|
|
string should not be enclosed in quotes unless you want the
|
|
message printed in quotes.
|
|
|
|
You can use Q to include instructions in USE files. Use :COMMENT
|
|
in USE files for a non-printing comment line.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
___ _______ ___
|
|
Set Command [S]
|
|
|
|
Changes certain operating options within DBEDIT. Except for LP,
|
|
these options are saved when you return to SUPRTOOL and restored
|
|
if you enter DBEDIT again.
|
|
|
|
SET [LP ] ON|OFF
|
|
[PROMPT ] character
|
|
[QUIET ] ON|OFF
|
|
[RESET ] ON|OFF
|
|
[UNDERLINE ] ON|OFF
|
|
|
|
|
|
___
|
|
DBEDIT Commands Set
|
|
|
|
[VERIFY ] ON|OFF
|
|
|
|
|
|
___ __ __
|
|
SET LP ON (Default: OFF)
|
|
|
|
All output from the LIST command is normally sent to $STDLIST.
|
|
When you turn SET LP to ON, DBEDIT opens the file SUPRLIST which
|
|
defaults to the line printer. Turning SET LP OFF closes the
|
|
SUPRLIST file and releases it to the spooler. DBEDIT
|
|
automatically closes the SUPRLIST file when you return to
|
|
SUPRTOOL.
|
|
|
|
|
|
___ ______ ____
|
|
SET PROMPT char (Default: #)
|
|
|
|
PROMPT tells DBEDIT to use a different character for prompting.
|
|
Any special character can be used as the prompt character. For
|
|
example:
|
|
|
|
>edit
|
|
___
|
|
#set prompt %
|
|
%list m-customer
|
|
|
|
|
|
___ _____ __
|
|
SET QUIET ON (Default: OFF)
|
|
|
|
Turning this option ON causes DBEDIT to reduce the number of
|
|
helpful messages that are printed and to shorten other messages.
|
|
|
|
|
|
___ _____ ___
|
|
SET RESET OFF (Default: ON)
|
|
|
|
When you use the FILE, LIST, MODIFY, CHANGE, or DELETE commands
|
|
you may override the default order that DBEDIT uses to prompt for
|
|
______
|
|
search fields (using the KEY= option). With RESET ON, DBEDIT
|
|
______
|
|
always resets the KEY= option to the default. With RESET OFF,
|
|
DBEDIT will continue to use the new order of search fields.
|
|
|
|
|
|
___ _________ ___
|
|
SET UNDERLINE OFF (Default: ON)
|
|
|
|
When DBEDIT prompts for field values, it prints a series of
|
|
underlines to show the field width. field. Using UNDERLINE OFF
|
|
disables this feature. Users with slow printing terminals will
|
|
______
|
|
find DBEDIT faster with UNDERLINE OFF. The UNDER option may be
|
|
used to temporarily enable underlining for a single command.
|
|
|
|
|
|
___ ______ ___
|
|
SET VERIFY OFF (Default: ON)
|
|
|
|
When you are adding new records to a dataset, DBEDIT lists the
|
|
contents of new records after you have entered all of the field
|
|
values. Turning VERIFY OFF causes DBEDIT to stop listing new
|
|
records after they are added.
|
|
|
|
____
|
|
Show DBEDIT Commands
|
|
|
|
____ _______ ____
|
|
Show Command [SH]
|
|
|
|
Displays the datasets in the current BASE, or the items in the
|
|
current BASE, or the fields in the current dataset.
|
|
|
|
SHOW [SETS|ITEMS|FIELDS]
|
|
|
|
(Default: sets in the database)
|
|
|
|
If you request a SHOW SETS, SUPRTOOL prints the number of dataset
|
|
entries beside each dataset name (e.g., M-CUSTOMER(15217)). If
|
|
you request a SHOW ITEMS or a SHOW FIELDS, SUPRTOOL prints a
|
|
description of the item or field beside each name (e.g.,
|
|
TOTAL-COSTS(5J2)). This command is identical to the SHOW command
|
|
of SUPRTOOL.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
___ _______ ___
|
|
Use Command [U]
|
|
|
|
Specifies a file of commands to be executed as a group.
|
|
|
|
USE filename
|
|
|
|
Examples:
|
|
|
|
A USE file makes your task easier by allowing common commands to
|
|
be specified once in an external file. USE files can also be set
|
|
up for data entry functions such as adding a new customer into
|
|
the database (e.g., add one master entry, add one billto entry,
|
|
add multiple shipto entries, and then list the master entry plus
|
|
RELATED details). For example, here is a USE file that uses the
|
|
FILE command to define a dataset:
|
|
|
|
>base store
|
|
>edit {enter DBEDIT}
|
|
___
|
|
#use dinvent.use {specify commands from the USE file}
|
|
#file d-inventory;key=product-no;5 {key and limit}
|
|
#:comment You may use the List, Modify, or Delete
|
|
#:comment commands to modify inventory records. You
|
|
#:comment are restricted to at most five inventory
|
|
#:comment records per product number.
|
|
# {DBEDIT prompts for commands}
|
|
|
|
DBEDIT prints the lines in the USE file, including the :COMMENT
|
|
lines. This allows you to include instructions and reminders in
|
|
the USE file.
|
|
|
|
|
|
___
|
|
DBEDIT Commands Use
|
|
|
|
______
|
|
Notes:
|
|
|
|
USE files cannot be nested in DBEDIT. The USE file may be an
|
|
EDITOR /KEEP file,UNN or a QEDIT workfile, but no more than 80
|
|
characters per record will be processed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
______ _______ ___
|
|
Verify Command [V]
|
|
|
|
Displays the current status of DBEDIT conditions.
|
|
|
|
VERIFY [ ALL | @ ]
|
|
[ BASE ]
|
|
[ DSET ]
|
|
[ SET ]
|
|
|
|
(Default: BASE, DSET, changed SET values)
|
|
|
|
______
|
|
Notes:
|
|
|
|
Only one item can be verified at a time. The format of the
|
|
VERIFY output is organized into columns. VERIFY with no
|
|
parameters prints the database and the current dataset. It also
|
|
prints those SET options which are not currently at their default
|
|
setting.
|
|
|
|
_________
|
|
Examples:
|
|
|
|
______
|
|
#verify dset {current dataset}
|
|
______
|
|
#verify all {print the status of everything}
|
|
|
|
=============================================================================
|
|
|
|
|
|
/ File 5 / NIA068 /
|
|
/ *LONG* Surveillance Expo '90 Report /
|
|
/ Thalx /
|
|
|
|
|
|
Well, Surveillance Expo '90 was touted to be twice the size
|
|
of Expo '89. Maybe conference-wise it was, but the Exhibits
|
|
area was pretty much the same as last year, if not a bit smaller
|
|
and lower-key.
|
|
|
|
I arrived at the Crystal City Hyatt Regency at about 7:45am,
|
|
after a fun little ride on the DC metro, and about a 3/4 mile
|
|
walk in blustery cold weather. I had decided to wear a suit
|
|
this time...to match my longer-than-ever hair. Last year,
|
|
a number of people there were reluctant, or avoided, noticing
|
|
or talking to the crowd-o-misfits, in jeans, t-shirts, long
|
|
hair, tie-dye, etc. (_H*, were you barefoot there? I think
|
|
you were...)
|
|
|
|
Anyway, to match the suit, are these shoes that, after about
|
|
a quarter mile, feel like your feet have been stuffed into
|
|
something about the size and shape as a 10-pack of floppy
|
|
disks. Luckily, I had brought my black sneakers, stuffed into
|
|
my knapsack, which I brought for stuffing full of literature that
|
|
the Exhibitors are more than happy to give away.
|
|
|
|
The Exhibits area didn't open until 9am, but there was a free
|
|
"Early Bird" conference at 8am, which I was interested in.
|
|
|
|
"Surveillance: 90's Style", had 4 people on the panel. One was
|
|
Jim Ross himself, who puts together this Expo. The other three
|
|
were people from industry, involved in various ways with Tempest
|
|
stuff.
|
|
|
|
For the non-hip, Tempest refers to the act(art?) of spying on someone
|
|
else, by receiving and using stray electromagnetic radiation from
|
|
devices they use. Things like TV's, put out f*ckloads of stray
|
|
EM radiation. Computers. Fax machines. Hi-tech telephones.
|
|
|
|
Tempest also is a 'rating system', or spec, used by the government.
|
|
If something is Tempest-rated, then it passes the govt. spec for
|
|
minimal stray EM radiation. There are companies out there that
|
|
take off-the-shelf equipment, and Tempest-harden it.
|
|
|
|
There were maybe 10 or 15 people attending the conference. They
|
|
had planned to show a videotape, made and aired by the BBC, about
|
|
2 years ago. However, it turns out that NSA goons came out and
|
|
said "Gimme gimme gimme", "We gotta review this material before we
|
|
say it's ok for you to tell to others!" They were apparently
|
|
nonplussed by the fact that the BBC aired it 2 years ago, and that
|
|
everything was public knowledge.
|
|
|
|
Anyway, the guy who planned to show it basically told us that what
|
|
it had was a demo of Tempest surveillance. The BBC took a van, put
|
|
some equipment in it, and sent it out around town. They would
|
|
just drive around the business section of town, until they picked up
|
|
something, anything. They locked into what was displayed on a computer
|
|
screen in a lawyer's office (Well, the English equivalent), who
|
|
was up on the 23rd floor of an office building. The document was
|
|
something pertaining to an ongoing court case, or somesuch.
|
|
|
|
They went up to the 23rd floor, and knocked on the lawyer's door.
|
|
|
|
"Could you come down to the street? We have something to show you, that
|
|
we think you might be interested in."
|
|
|
|
Apparently the lawyer-type had a typical British reaction to seeing
|
|
his classified documents on some scumbag's screen in a van on the street.
|
|
|
|
The van people went around town, doing this, showing people how vulnerable
|
|
they were, etc....until they got bored with the whole thing.
|
|
|
|
---
|
|
|
|
At this point, there was some debate over some points.
|
|
|
|
"Shouldn't this be illegal? Shouldn't there be some law", said a woman.
|
|
|
|
(Shuffling, muttering, etc.)
|
|
|
|
Basically, there were a few people who want to slap down a law for anything
|
|
like this. Then there's the rest, who realize that if you're broadcasting
|
|
your info, mayhap in a 'new, unexplored' form of data, well, then that's
|
|
*your* problem.
|
|
|
|
Apparently, the govt. has known about this sort of Tempest Surveillance
|
|
for quite a while. Since the 50's. And back in the 30's or 40's, they
|
|
did similar things, to pick up superheterodyne receivers, and could find
|
|
radio receivers of spies that way. Without the spy transmitting.
|
|
|
|
People were pretty damned concerned, mostly about the govt, and banking,
|
|
and R&D. Are govt. computers protected? Banking computers?
|
|
|
|
---
|
|
|
|
Now, Mr. Ross talked to one of the panelists, and asked "If he could
|
|
bring his equipment down for a little demo". The guy replied,
|
|
|
|
"Well, there's not many people here. Why don't we all go upstairs?"
|
|
|
|
At this point, my eyes musta bugged out pretty far...
|
|
|
|
We all headed up to the 18th floor...
|
|
|
|
I walk into the hotel room. Suite, actually. There, on the far wall,
|
|
is a table with some equipment on it. A monitor, displaying static
|
|
and snow. Four 'boxes', stacked...2 rack-mount, 2 smallerish. Coax
|
|
interconnecting everything.
|
|
|
|
Then I notice a long piece of coax, running to an antennae, about 3 feet
|
|
high, with many elements sticking out in all directions. It's sitting
|
|
kinda near two terminals, on a different table. The terminals were
|
|
VT302's, or something similar.
|
|
|
|
"The terminal on the left is unmodified. The one on the right has been
|
|
Tempest-hardened by my company."
|
|
|
|
Another guy sits down at the stack 'o' boxes. He starts fiddling with
|
|
the knobs. "Let's see what we can see." He fiddles some more. Something
|
|
appears on the monitor screen by the equipment. He twiddles a different
|
|
knob.
|
|
|
|
*Bingo!*
|
|
|
|
Now, displayed on the equipment monitor, is a replica of what is displayed
|
|
on the unmodified terminal screen.
|
|
|
|
"Yea, but that's a pretty fancy-looking antennae ya got there."
|
|
|
|
"Oh, ok...we really don't need that."
|
|
|
|
At this point, the techie-guy unplugs the coax from the antenna, and
|
|
inserts an alligator clip into the coax. "Uh, lesse...what's metal
|
|
around here? Ah! The table leg"...
|
|
|
|
He attaches the other end of the alligator clip to the table leg.
|
|
|
|
*Blam* We get the screen back.
|
|
|
|
---
|
|
|
|
"Hey, waittasec...do you hear a TV on above us? Let's see what they're
|
|
watching...", sez the techie.
|
|
|
|
He fiddles with the knobs again...until he's got another screen locked
|
|
into the monitor.
|
|
|
|
"Hey, a movie! I think I've seen this one! It's really funny!"
|
|
|
|
---
|
|
|
|
So just *what* are those 4 boxes - equipment? Obviously, I just *had*
|
|
to know...
|
|
|
|
Well, firstly, there's the monitor. Just a regular old B&W monitor,
|
|
which accepts seperate horizontal, vertical, and video-level signals.
|
|
|
|
The two top (smallerish) boxes were Wavetek function generators. Ohe
|
|
had been modified with a 10-turn pot, for fine tuning. One of the
|
|
larger rack-mount boxes was also a function generator. This was a
|
|
high-precision function generator, which was used to do the horizontal
|
|
syncing of the monitor. It fed thru one of the Waveteks, simply because
|
|
it didn't have a TTL-level output, while the one Wavetek was just being
|
|
triggered, so's to use it's TTL-level output.
|
|
|
|
The other Wavetek was used to trigger the vertical sweep, and was
|
|
not as critical as the horizontal. The horizontal, I believe, was
|
|
triggered around 30 khz, +/- .5 Hz. This was why they had a large
|
|
rack-mount function generator.
|
|
|
|
The last box was a "VHF/UHF receiver". You dial in one frequency,
|
|
your center frequency. Then you select a range, your bandwidth.
|
|
Then, whatever signal you feed from it, it'll extract what it sees
|
|
as a video signal, at the frequency and bandwidth you dialed in.
|
|
The box also had several different modes and such that it can read,
|
|
but I'm not familiar with video equipment, so can't relate much about
|
|
this, except that the guy said it's an off-the-shelf, common, receiver.
|
|
|
|
The antenna feeds directly into the receiver. The 3 signals out are fed
|
|
to the proper pins on the video monitor.
|
|
|
|
Voila! You're armed and ready to do some heavy Tempest surveillance,
|
|
at distances of 1000 feet and more! (Depending on the type of antenna
|
|
of course...your mileage may vary.)
|
|
|
|
The antenna that they were using was a 20-db gain antenna, with a flat
|
|
response from 100 kHz to 1 GHz. (Yea, fucking huge...I still don't quite
|
|
believe the guy.) The antenna had knobs and switches and lights and
|
|
little meters on it, and had to be plugged into the wall. Not a CB antenna.
|
|
|
|
All you do is tune the receiver frequency around, until you notice something.
|
|
What you're picking off of, is harmonics generated from the CRT driver
|
|
circuitry. Them video levels are nearly square waves, which means that
|
|
they're rich in harmonics, so you can tune just about anywhere, and find
|
|
something.
|
|
|
|
And what the company does, in this case, is make a new video driver board,
|
|
but with slower risetimes, and more rounded signals. Of course, the slower
|
|
the risetime, the more blurry the screen, and they try to optimize that.
|
|
|
|
---
|
|
Well, that's about that for Tempest. This is the simplest type of
|
|
surveillance...the signal is *here*, *there*, *everywhere*. Your data
|
|
is everyone's data.
|
|
|
|
There are much more advanced types of Tempest surveillance, where they
|
|
can lock in onto a microprocessor's clock frequency (and phase), and
|
|
read off more harmonics from the data bits flowing across the busses
|
|
inside the computer, to printers, etc. This requires some heavy analysis,
|
|
however. Oh...one of the people on the talk this morning, apparently
|
|
either has, or makes, equipment which will distinguish between 20 different
|
|
devices in close proximity...so if you have 20 identical computers in a row,
|
|
they can lock in on each one, individually. Apparently clock frequencies
|
|
are different by some small amount, and they can exploit that.
|
|
|
|
---
|
|
|
|
Well, at this point, it's time for me to head out and down to the Exhibits,
|
|
which just opened. But I got caught up in a conversation with a guy who
|
|
turned out to be a ham (Then turned out to be a Lieutenant something or other
|
|
from the Pentagon) and some butthead with kinda stupid questions (reporter?)
|
|
and we basically commented on this stuff in general, and how people respond
|
|
in a certain way about interference from others, and how they'd respond very
|
|
differently if they were sending out this 'interference'.
|
|
|
|
If a ham transmits, and your equipment accepts (does not reject) the signal,
|
|
and you hear him on your stereo, chances are the typical person would whine
|
|
and yell at the ham for causing interference. The ham wouldn't mind that
|
|
you were 'eavesdropping', but would help clear up the interference.
|
|
|
|
If Joe Butthead was using a computer, and Joe Techie picked up his signal,
|
|
Joe Butthead would whine and yell that you were 'eavesdropping', while
|
|
ignoring the fact that he was basically broadcasting his data all over.
|
|
In a new, little-known format, perhaps...but broadcasted, regardless. See
|
|
flamage about cellular phones and cordless phones elsewhere...
|
|
|
|
Ok, we finally are the last ones to leave the room...
|
|
|
|
---
|
|
|
|
The Exhibits!
|
|
|
|
The first booth I came across was Visual Methods, Inc. From New Jersey.
|
|
They market all sorts of miniature cameras, placed in virtually anything
|
|
you could imagine...sprinkler heads, car-CB-antenna bases, neckties
|
|
(the tie-tack is the CCD element, single-element lens), etc. However,
|
|
the guy came across as kinda rude to me. He isn't interested in
|
|
showing off his neato devices, he only seems to want to talk to people who
|
|
are ready to spend buck$ for his devices. "Tell me what you're interested
|
|
in, and we'll talk"..."What do you want to do?", etc. Well, I just want
|
|
to find out more about what's out there, what's available. I guess this
|
|
guy sees it as a threat to his business, and I can understand that.
|
|
His products have an implied "People won't think there's a camera in _this!_"
|
|
quality, and if he tells everyone about everything he makes, then it reduces
|
|
the 'suprise' quality. However, this was a Surveillance Expo, and I really
|
|
think their public-relations people should be more friendly. This is the
|
|
same guy that was at Expo '89, and perhaps he IS the company. But enough said.
|
|
|
|
A number of empty booths were there...either people packed up early,
|
|
or didn't show at all.
|
|
|
|
There was an unmanned booth for Pulnix, which sells mini CCD color
|
|
cameras...niftly little cameras, some about the size of a 2" cube.
|
|
|
|
There was another nearby mini-camera booth, with a guy who seemed
|
|
bored, and eager to talk and spew his spiel. Even after I told him
|
|
that I was an engineering student, and completely unlikely to buy
|
|
anything...he seemed proud of what he had to offer. But it was just
|
|
more of the mini-camera fare...one neat one was about 1/2" in diameter,
|
|
and maybe 2 1/2" long. I have the data sheets from this booth, but there
|
|
isn't a company name on it *anywhere*... go figure.
|
|
|
|
Fiber optics...Closed Circuit TV systems..one booth had for sale, wireless
|
|
CCTV units, where you didn't need to run coax. Just plug this box (and
|
|
it's antenna) to the back of the camera, place the camera remotely.
|
|
Plug this other box into your monitor, and you're set.
|
|
|
|
A couple rows over from this guy, were some 'bug-detector' people, with
|
|
spectrum analyzers. Of course, they tune into this "Really strong signal,
|
|
I think it's around 900 MHz...". Gee, wouldn't happen to be this guy a
|
|
couple of rows back, could it? You could watch the video signal change,
|
|
as people walked by the table with the wireless CCTV system.
|
|
|
|
Another table, "Advanced Resonant Technologies", had a 6-million candlepower
|
|
flashlight. Portable. This was really nifty...nice adjustable spot/flood.
|
|
|
|
In the fully-lit convention center, the guy aimed it at a wall 30 feet away.
|
|
The beam was less than 1 foot in diameter...note that the reflector was
|
|
about 6 inches in diameter... the flashlight has a short-arc xenon lamp,
|
|
and some exotic metal reflector...gallium over nickel, or some such. It
|
|
reflected IR, so you could pop on an IR filter, and use it as an IR source.
|
|
The beam is advertised to be useful at over one mile. Weight: 3.2 pounds,
|
|
and I think the 12-volt pack lasts 1.5 hours. Microprocessor controlled.
|
|
Also at this table was a nice, compact Starlight scope. Fit nicely
|
|
into one's hand, about 4 inches long, and 1.5 inches in diameter. 40
|
|
degree field of view, so what you see is basically 1:1. I really liked
|
|
this item, and if I had a spare $4k, I might consider picking one up.
|
|
|
|
NCSA (National Computer Security Association) was there. The guy there
|
|
said they basically just want to advocate responsible computing practices.
|
|
MGrant talked to him, and we shortly discovered that this guy was not
|
|
from NCSA, but some random advertising agency. So he knew lotsa key
|
|
phrases and such, but seemed utterly useless for real info, aside from
|
|
more handouts. But I wasn't really following the conversation, so I
|
|
could be way off.
|
|
|
|
There was a booth at the corner of "TRW ELectronic Products Inc", and
|
|
as MGrant and I approached, there was a mournful "Your not gonna make
|
|
us stand up, are you" from behind the table.
|
|
|
|
"No, please, stay sitting....but spill your spiel, anyway!"
|
|
|
|
They were advertising "Fax Encryptors", boxes that go at each end of
|
|
fax communications. The boxes handshake, and use DES, so you can't
|
|
have a third box listen in, and decipher. The guys spilling their
|
|
spiel had apparently been out late drinking, and were fighting hangovers,
|
|
or were just incredibly bored and lame or something. But they were pretty
|
|
amusing..."First, you insert the key. That's your 'boot up sequence'. WHen
|
|
the display says 'Ready', that means it's ready for use. Your I/O
|
|
ports are in the rear...your phone line plugs into this connector, and
|
|
another cable goes from this one, to your fax machine" Of course, they
|
|
alternate sentences...while one talks, the other holds his head, apparently
|
|
in pain...
|
|
|
|
---
|
|
|
|
There was also, on a general info table, a stack of papers by Jim Ross,
|
|
on "Calling Number ID: A Position Paper in Favor of Universal Service
|
|
Without Per-Call Blocking"
|
|
|
|
Basically, he says that with universally offered CNID, then phone
|
|
calls that are harassing, obscene, etc. will virtually stop. Also
|
|
anonymous bomb threats will be greatly reduced. Hackers dialing
|
|
in will be _more_ traceable, same for voice-mail intrusions, and
|
|
"hang-up" calls.
|
|
|
|
For those wanting blocking...(battered wives, undercover police,
|
|
psychotherapists) there's always a pay phone, or, he suggests
|
|
getting another line under a pseudonym, with no address, and use that
|
|
as an *incoming* line. Make all calls out, on your regular line, but
|
|
disable the ringer on that phone. You'll never be disturbed...
|
|
|
|
Also, if you place a call thru an operator, your number will not be
|
|
forwarded. (Dunno about this, but Mr. Ross says so.)
|
|
|
|
There was a study done out in North Dakota...with the phone number in
|
|
CNID, they also displayed the name under which the phone line is
|
|
subscribed, and the residential subscribers had a preference for
|
|
seeing the name along with the number. Starting next spring, this
|
|
service is planned to be offered in the Boise, Idaho area by US West.
|
|
|
|
During the test, name blocking was offered, and out of 1 million
|
|
calls, it was used a total of 145 times.
|
|
|
|
{Ok, that's all from Jim Ross' paper. It's 10 pages long, and has
|
|
points defended much more than I'm willing to type in.}
|
|
|
|
Well, that about wraps it up for Surveillance Expo '90. It was
|
|
kinda fun, kinda lame. I am very glad I got to go, if solely
|
|
for the Tempest demo.
|
|
|
|
-Thalx
|
|
==============================================================================
|
|
|
|
/ /
|
|
/ File 6 / NIA068 /
|
|
/ TIME-TRIP: 1985 MOG-UR CC Charges Against Tom Ttcimpidis /
|
|
/ /
|
|
|
|
|
|
---
|
|
Wee Hours of the AM, Februrary 10, 1985...
|
|
|
|
I plucked this off of USENET, the national network of UNIX systems. I think
|
|
all of you will be interested in this, especially those of you out there who
|
|
are sysops on your own systems. Please, Please, PLEASE download this and post
|
|
it on every BBS and AE you can find. To coin a phrase:
|
|
|
|
WE HAVE WON!!!!!!!!!
|
|
|
|
/\/oo\/\ Count Nibble /\/oo\/\
|
|
|
|
Future Sysop, >The Planet 10 AE<
|
|
|
|
---
|
|
|
|
7AM, 02/07/85:
|
|
|
|
Pursuant to a telephone discussion w/ Reginald Dunn, head of the Criminal
|
|
Division of the LA City Attorney's Office, I was informed that the prosecution
|
|
believes it has insufficient evidence to continue the prosecution of Tom
|
|
Tcimpidis, Sysop of MOG-UR. This determination was made after I requested a
|
|
review of the case on 1/11/85 after the departure of city attorney IRA Reiner
|
|
to become DA and while the City Attorney's office is being run by the Civil
|
|
Service staff pending election of a new City Attorney. Mr. Dunn has given me
|
|
his word that the people will seek dismissal of the charges against Tom under
|
|
California Penal Code Section 1385, I.E., Dismissal In The Interests Of
|
|
Justice. Under California law, such a dismissal is "w/ prejudice" and the
|
|
people cannot refile the case subsequently. To put it succinctly, a dismissal
|
|
will terminate the presecution permanently.
|
|
|
|
As the members know, the City Attorney's office has previously reneged on
|
|
representations made to me regarding dismissal of the charges....I wish to
|
|
assure everyone that I have known Mr. Dunn for 10 years, and I trust his word
|
|
completely. If he says the case will be dismissed, I am statisfied that such
|
|
an action will occur.
|
|
|
|
We win. Win....win....win....win....My thanks to everyone who contributed to
|
|
supporting Tom and I in the defense of this matter. I consider this to be a
|
|
major victory for the rights of free speech over the "Big Brother"
|
|
machinations of the phone company.
|
|
|
|
I would be grateful if you would download this message and place it on other
|
|
systems throughout the country.....This is a very big victory, and the BBS and
|
|
Modem Communities should know about it.
|
|
|
|
Again, thanks for the support. Best wishes to all,
|
|
Chuck Lindner Attorney for sysop Tom Tcimpidis
|
|
|
|
8PM, 02/07/85:
|
|
The case of People V. Tcimpidis, aka use of a modem, go to jail, was dismissed
|
|
in the "Interests Of Justice" this morning, 02/07/85. As noted earlier, this
|
|
dismissal is w/ prejudice, and Tom is now free of the pactel scourge. Another
|
|
small step for something resmbling justice.
|
|
|
|
Chuck.
|
|
|
|
---
|
|
|
|
[For those of you unaware of the case, Tom Tcimpidis had his system confiscated
|
|
after the Shock Troops of PacTel found "illegally obtained" telephone credit
|
|
card number(s) on his BBS and was subsequently jerked around by the LA City
|
|
Attorney, who first promised that he was not going to be prosecuted, then
|
|
changed his mind and (I guess) decided to file charges. Now the case has
|
|
supposedly been dropped, permanently. I'm no lawyer, but I think the gist of
|
|
this is that you sysops out there probably have little to worry about when it
|
|
comes to being prosecuted for leaving something illegal on your board. NOW
|
|
will you get rid of those silly disclaimers? -CN]
|
|
|
|
|
|
=============================================================================
|
|
|
|
/ File 7 / NIA068 /
|
|
/ DEPARTMENT OF THE ARMY FIELD MANUAL Part 01 of 02 /
|
|
/ Explosives and Demolitions /
|
|
/ extract. /
|
|
/ HEADQUATERS, DEPARTMENT OF THE ARMY /
|
|
/ February 1971 /
|
|
/ /
|
|
/ Typed by: Death Jester /
|
|
/ Date Typed In: 01DEC90
|
|
|
|
|
|
Chaper 2
|
|
FIRING SYSTEMS
|
|
|
|
Section I. NONELECTRIC FIRING SYSTEMS
|
|
|
|
2-1. Introduction
|
|
|
|
Two types of systems for firing explosives are in general use--electric and
|
|
nonelectric. Both have their individual priming methods and materials. In
|
|
addition, detonating cord may be used with both systems to make them more
|
|
efficient and effective, as described in paragraphs 2-10 through 2-16.
|
|
|
|
2-2. System Components and Assembly for Detonation
|
|
|
|
A nonelectric system is one in which an explosive charge is prepared for
|
|
detonation by means of a nonelectric blasting cap. The basic priming
|
|
materials consist of a nonelectric blasting cap, which provides the shock
|
|
adequate to detonate the explosives, and the time blasting fuse, which
|
|
transmits the plame that fires the blasting cap. If more than one charge
|
|
must be detonated simultaneously, the nonelectric system must be combined
|
|
with a detonating cord (para 2-10 - 2-12) to insure simultaneous firing.
|
|
The assembly of a basic nonelectric system follows.
|
|
|
|
a. Cut and discard a 6-inch length from the free end of the time blasting
|
|
fuse to prevent a misfire caused by the exposed powder absorbing moisture
|
|
from the air (A, fig 2-1). Then cut off a three foot length of time
|
|
blasting fuse to check the burning rate. Split the end of the fuse, insert
|
|
a match head into the split, light the match with another match and note
|
|
the time it takes for the fuse to burn. Then compute the burning rate
|
|
per foot by dividing the time in seconds by the length in feet.
|
|
|
|
b. Cut the time blasting fuse long enough to enough permit the person
|
|
detonating the charge to reach a safe distance by walking at a normal
|
|
pace before the eplosion. This cut should be made squarely across the
|
|
time fuse.
|
|
|
|
c. Take on blasting cap from the cap box, inspect it by looking into
|
|
the open end. If any foreign matter or dirt is present, hold it with
|
|
the open end down, and shake it gently or bump the hand holding it
|
|
against the other hand. IF FOREIGN MATTER DOES NOT COME OUT, DISCARD
|
|
CAP. NEVER TAP THE CAP WITH A HARD OBJECT OR AGAINST A HARD OBJECT.
|
|
NEVER BLOW INTO THE CAP. DO NOT INSERT ANYTHING INTO THE CAP TO REMOVE
|
|
AND DIRT OR FOREIGN MATERIAL.
|
|
|
|
d. Hold the time blasting fuse vertically with the square cut end up
|
|
and SLIP TH BLASTING CAP GENTLY DOWN OVER IT SO THAT THE FLASH CHARGE IN
|
|
THE CAP IS IN CONTACT WITH THE END OF THE TIME FUSE; IF NOT IN CONTACT,
|
|
IT MAY MISFIRE. NEVER FORCE THE TIME FUSE INTO THE BLASTING CAP BY
|
|
TWISTING OR ANY OTHER METHOD. If the end is flattened or it is too
|
|
large to enter the blasting cap freely, roll it between the thumb and
|
|
fingers until the size is reduced to permit free entry.
|
|
e. After th blasting cap has been seated, grasp the time blasting
|
|
fuse between the thumb and third finger of the left hand and extend the
|
|
forefinger over the end of the cap to hold it firmly against the end of
|
|
the time fuse. Keep a slight pressure on the closed end of the cap with
|
|
the forefinger (B, fig 2-1).
|
|
|
|
f. Slide the second finger down the outer edge of the blasting cap to
|
|
guide the crimpers (B, fig 2-1), and thus obtain accurate crimping, even
|
|
in darkness.
|
|
|
|
g. Crimp the blasting cap at a point 1/8 to 1/4 of an inch from the
|
|
open end. A CRIMP TOO NEAR THE EXPLOSIVE IN THE BLASTING CAP MAY CAUSE
|
|
DETONATION. POINT THE CAP OUT AND AWAY FROM THE BODY DURING CRIMPING
|
|
(fig 2-2).
|
|
Note. If the blasting cap should remain in place several days
|
|
before firing, protect the joint between the cap and the time blasting
|
|
fuse with a coating of a sealing compound or some similar substance.
|
|
(As this sealing compound (para 1-50), a standard issue, does not make a
|
|
waterproof seal, submerged charges should be fired immediately.)
|
|
|
|
h. Pass the end of the time blasting fuse through the priming
|
|
adapter. (The time fuse should move through the adapter easily.) Then
|
|
pull the cap into the adapter until it stops, instert into the cap well
|
|
of the the explosive, and screw the adapter in place. If no priming
|
|
adapter is available, insert the blasting cap into the cap well and tie
|
|
it in place with a string or fasten it with adhesive tape or some other
|
|
available material. (For details of nonelectric priming of demolition
|
|
blocks, see para 2-18).
|
|
Note. For long lengths of time blasting fuse it may be more
|
|
conveinent to pass the end of the fuse through the priming adapter
|
|
before crimping the cap onto the the time fuse.
|
|
|
|
i. Attach M60 weatherproof fuse igniter (para 1-57n) as follows:
|
|
(1) Unscrew the fuse holder cap two or three turns but do not
|
|
remove. Press the shipping plug into the igniter to release the split
|
|
collet (fig 1-47), and rotate the plug as it is removed.
|
|
(2) Insert the free end of the time fuse in place of the plug
|
|
until it rests against the primer.
|
|
(3) Tighten the cap sufficiently to hold the fuse in place and
|
|
thus weatherproof the joint.
|
|
(4) To fire, remove the saftey pin, hold the barrel in one hand,
|
|
and pull on the pull ring with the other, taking up the slack before
|
|
making the final strong pull. In the event of a misfire, the M60 can be
|
|
reset quickly without disassembly by pushing the plunger all the way in
|
|
and attempting to fire as before. (It cannot be reset underwater
|
|
however, because water can enter the interior of the nylon case through
|
|
the holes in the pull rod. The fuse igniter is reusable if the primer
|
|
is replaced.)
|
|
Note. The M2 weatherproof fuse igniter (fig 1-46) may be attached
|
|
by sliding the fuse retainer over the end of the fuse, firmly seating
|
|
it, and applying sealing compound at the joint betwwen the time blasting
|
|
fuse and the igniter to protect the open end of the fuse from moisture.
|
|
In firing, hold the barrel in one hand and pull on the other ring with
|
|
the other.
|
|
|
|
j. If a fuse igniter is not abailable, light th time blasting fuse
|
|
with a match by splitting the fuse at the end (fig 2-3), placing the
|
|
head of an unlighted match in the powder train, and then light the
|
|
inserted match head with a flaming match or by rubbing the abrasive on
|
|
the match box against it.
|
|
|
|
2-3. Nonelectric Misfires
|
|
|
|
a. PREVENTION. Working on or near a misfire is the most hazardous of
|
|
all blasting operations. A misfire should be extremely rare if these
|
|
procedures are followed closely:
|
|
(1) Prepare all primers properly.
|
|
(2) Load charges carefully.
|
|
(3) Place primer properly.
|
|
(4) Perform any tamping operation with care to avoid damage to an
|
|
otherwise carefully prepared charge.
|
|
(5) Fire the charge according to the proper technique.
|
|
(6) If possible, use dual firing systems (para 2-13 - 2-16). If
|
|
both systems are properly assembled, the possibility of a misfire is
|
|
reduced to a minimum.
|
|
(7) Do not use blasting caps underground; use detonating cord.
|
|
b. THE CLEARING OF NONELECTRIC MISFIRES. Occasionally, despite all
|
|
painstaking efforts, a nonelectric misfire will occur. Investigation
|
|
and correction should be undertaken only by the man that placed the
|
|
charge. For a charge primed with a nonelectric cap and time blasting
|
|
fuse, the procedure is as follows:
|
|
(1) Delay the investigation of the misfire at least 30 minutes
|
|
after the expected time of detonation. This should be ample time for
|
|
any delayed explosion to take place because of a defective powder train
|
|
in the fuse. Under certain combat conditions, however, immediate
|
|
investigation may be necessary.
|
|
(2) If the misfired charge is not tamped, lay a primed one-pound
|
|
charge at the side of the charge, without moving or disturbing it, and
|
|
fire.
|
|
(3) If the misfired charge has no more than a foot of tamping,
|
|
attempt to explode it by detonating a new 2-pound charge placed on top.
|
|
(4) If the misfired charge is located in a tamped borehole, or if
|
|
the tamped charge is so situated as to make method (3) above
|
|
impractical, carefully remove the tamping by means of wooden or
|
|
nonmetallic tools. Avoid accidentally digging into the charge. Also,
|
|
the tamping may be blown out by means of a stream of compressed air or
|
|
water if either is abailable. Constant checking of the depth of the
|
|
borehole from the ground surface to the top of the charge during digging
|
|
will minimize the danger of striking the charge. When the charge has
|
|
been uncovered within 1 foor, insert and detonate a new 2-pound primer.
|
|
Whenever possible, detonating cord should be used to prime underground
|
|
charges and the blasting cap located above ground (see para 2-10 -
|
|
2-12).
|
|
(5) An alternate method of reaching a deep misfire charge is to
|
|
drill a new hole withing one foot of the old one and to the same depth a
|
|
new 2-pound primed charge is then placed in the new hole to detonate the
|
|
misfired charge. Extreme care is required in drilling the new hole to
|
|
avoid striking the old misfired charge or placing the new charge too far
|
|
away to induce detonation.
|
|
|
|
Section II. ELECTRIC FIRING SYSTEMS
|
|
|
|
2-4. Components and Assembly for Detonation
|
|
|
|
An electric firing system is one in which electricity is used to fire
|
|
the primary initiating element. An electric impulse supplied from a
|
|
power source, usually an electric blasting machine, travels through the
|
|
firing wire and cap lead wires to fire an electric blasting cap. The
|
|
chief components of the system are the electric blasting cap, firing
|
|
wire, and the blasting machine. Detailed information about electric
|
|
blasting equipment is contained in TM 9-1375-203-15. The preparation of
|
|
the explosive charge for detonation by electric means is called electric
|
|
priming. The proper methods and sequence of operations of electric
|
|
priming are described below.
|
|
|
|
a. Place Charges. Prepare and place all explosive charges as
|
|
prescribed by the methods in chapter 3. (Details of preparing
|
|
demolition blocks for electric priming are given in para 2-18.)
|
|
|
|
b. Lay Out Firing Wire.
|
|
(1) After locating a firing position a safe distance away from the
|
|
charges, lay out the firing wire from the charges to the firing
|
|
position.
|
|
(2) Test the free ends of the firing wire together to prevent an
|
|
electric charge from building up in the firing wire.
|
|
(3) Twist the free ends of the firing wire together to prevent an
|
|
electric charge from building up in the firing wire.
|
|
|
|
c. Test Blasting Caps.
|
|
(1) Test each blasting cap to be used in the electric firing
|
|
system as described in paragraph 2-7.
|
|
(2) After each cap has been tested, twist the free ends of the cap
|
|
lead wire together or shunt them with the short circuit shunt provided
|
|
to prevent an electric charge from building up in the cap lead wires.
|
|
|
|
d. Connect Service Circuit.
|
|
(1) If two or more electric blasting caps are used, connect their
|
|
lead wires into one of the two series circuits described in paragraph
|
|
2-6.
|
|
(2) If more than 10 blasting caps are used in the series circuit,
|
|
or if the circuit is complicated, it should be tested with the test set
|
|
or galvanometer (para 2-7).
|
|
(3) Splice the free cap lead wire to the firing wire.
|
|
|
|
e. Insert Caps Into Charges. Place the blasting caps into the
|
|
explosive charges and fasten the caps securely to the charges (fig 2-4).
|
|
(For details of electric priming of demolition blocks see para 2-18).
|
|
|
|
f. Test Entire Circuit.
|
|
(1) Move to the firing position and test the entire firing circuit
|
|
with the test set or galvanometer as described in paragraph 2-7.
|
|
(2) Twist the free ends of the firing wire together.
|
|
|
|
g. Test Blasting Machine. Test operate the blasting machine several
|
|
times as outlined in TM 9-1375-203-15 to insure that it operates
|
|
properly.
|
|
|
|
h. Connect Blasting Machine.
|
|
(1) Untwist the free ends of the firing wire and fasten them to
|
|
the two posts of the blasting machine.
|
|
(2) Operate the blasting machine to fire the charges.
|
|
|
|
i. Precautions.
|
|
(1) TWO OR MORE CAPS. If two or more electric blasting caps are
|
|
connected in the same circuit, be sure that they are of the same type
|
|
and made by the same manufacturer. This is essential to prevent
|
|
misfires, as blasting caps of different manufacturers have different
|
|
electrical characteristics which can result in some caps in the circuit
|
|
not firing because others fire more quickly and thus break the circuit
|
|
before the slower caps have received enough electricity to fire. This
|
|
is not true, however, of the M6 special electric blasting caps--all of
|
|
which are made according to the same specifications. Blasting caps of
|
|
the same manufacturer may be identical by the label, color of the cap,
|
|
or shape of the shunt.
|
|
(2) FIRING THE CIRCUIT. For safety reasons, only one individual
|
|
should be detailed to connect the blasting machine to the firing circuit
|
|
and to fire the circuit. He should be responsible for the care and
|
|
security of the blasting machine at all times during blasting
|
|
activities. He also should either connect the blasting wires in the
|
|
circuit or check their connection by on-the-spot visual examination.
|
|
|
|
2-5. Splicing Electric Wires
|
|
|
|
Insulated wires, before splicing must have the insulating material
|
|
stripped from the ends. Expose about 3 inches of bare wire (fig 2-5),
|
|
and remove any foreign matter such as enamel by carefully scraping the
|
|
wire with the back of a knife blade or other suitable tools. The wires
|
|
should not be nicked, cut, or weakened when the wires are bared, and
|
|
multiple strand wires should be twisted lightly after scraping.
|
|
|
|
a. SPLICING METHOD. Two wires, which have been prepared as described
|
|
above, may be spliced as shown in figure 2-5. THis is called the
|
|
Western Union "pigtail" splice. Two pairs of wires are spliced in the
|
|
same manner as the two wire splice above. One wire of one pair is
|
|
spliced to one wire of the other pair, and the process is repeated for
|
|
the other two wires.
|
|
|
|
b. PRECAUTIONS FOR SPLICING. A short circuit may ovvur very easliy
|
|
at a splice if certain precautions are not observed. If pairs or wires
|
|
are spliced, stagger the two separate splices and tie with twine or tape
|
|
as in (1), figure 2-6. An alternate method of preventing a short
|
|
circuit at the point of splice is shown in (2), figure 2-6. The splices
|
|
are separated, not staggered, in the alternate method. Whenever
|
|
possible insulate splices from the ground or other conductors by
|
|
wrapping them with friction tape or othe electric insulating tape. This
|
|
is particularly necessary when splices are place under wet tamping.
|
|
Circuit splices, not taped or insulated, should not lie on moist ground.
|
|
The splices should be supported on rocks, blocks, or sticks so that only
|
|
the insulated portions of the wires touch the ground. THey may also be
|
|
protected by inserting them to hold the splice firmly inside. Splices
|
|
may be protected from damage from pull by tying the ends in an overhand
|
|
or square knot, allowing sufficient length for each splice ((1), fig
|
|
2-5).
|
|
|
|
2-6. Series Circuits
|
|
|
|
a. COMMON SERIES. This is used for connecting two or more charges
|
|
fired electrically by a single blasting machine (A, fig 2-7). A common
|
|
series circuit is prepared by connecting one blasting cap lead wire from
|
|
the first charge to the once lead wire in the second charge and so on
|
|
until only two end wires are free, then connecting the free ends of the
|
|
cap lead wires to the ends of the firing. Connecting wires (usually
|
|
annunciator wire) are used when the distance between blasting caps is
|
|
greater than the length of the usual cap lead wires.
|
|
|
|
b. "LEAPFROG" SERIES. The "leapfrog" method of connecting caps in
|
|
series (B, fig 2-7) is useful for firing ditching charges or any long
|
|
line of charges. It consists of ommitting alternate charges on the way
|
|
and then connecting them to form a return path for the electric impulse
|
|
to reach the other lead of the firing wire. This brings both end wires
|
|
out at the same end of the line of charges, and thus eliminates laying a
|
|
long return lead from the far end of the line charges back to the firing
|
|
wire.
|
|
|
|
2-7. Testing Electric Wires, Blasting Caps and Circuits
|
|
|
|
a. FIRING WIRE MAY BE TESTED AS FOLLOWS:
|
|
(1) When using M51 blasting cap test set:
|
|
(a) Check test set by connecting the posts with a piece of bare
|
|
wire (para 1-54)(fig 2-8). Th indicator lamp should flash when the
|
|
handle is squeezed.
|
|
(b) Separate the firing wire conductors at bothe ends, and
|
|
connect these at one end to the test set binding posts. Actuate test
|
|
set. The indicator lamp should not flash. If it does, the firing wire
|
|
has a short circuit (fig 2-9).
|
|
(c) Twist the wires together at one end and connect those at the
|
|
other end to the test set posts. Actuate test set. The indicator lamp
|
|
should flash. If it does not flash, the firing wire has a break.
|
|
(2) When using the blasting galanometer:
|
|
(a) Check galvanometer by holding a piece of metal across its
|
|
terminals (para 1-53, fig 2-8). If the batter is good, this should show
|
|
a wide deflection of the needle, approximately 25 units (zero ohms).
|
|
(b) Separate the firing wire conductors at bothe ends, and touch
|
|
those at one end to the galvanometer posts. The needle should not move.
|
|
If it does, the firing wire has a short circuit (fig 2-9).
|
|
(c) Twist the wires together at one end and touch those at the
|
|
other end to the galvanometer posts. This should cause a wide
|
|
deflection of the needle (about 6.5 ohms or 23 to 24 units for a
|
|
500-foot length). (See note at end of d(2), below.) No movement
|
|
indicates a point of break; a slight movement indicates a point of high
|
|
resistance whcih may be cause by a dirty wire, loos wire connections, or
|
|
wires with several strands broken off at connections.
|
|
Note. Firing wire may be tested on the reel, but should be
|
|
tested again after unreeling, which may separates broken wires unnoticed
|
|
when reeled.
|
|
|
|
b. Electric Blasting Caps May be Tested as Follows:
|
|
(1) When using the M51 blasting cap test set:
|
|
(a) Check the test set as described above.
|
|
(b) Remove the short circuit shunt from the lead wires of the
|
|
electric blasting cap.
|
|
(c) Attach one cap lead wire to one binding post and tie other
|
|
cap lead wire to the other post, and squeeze the test set handle. If
|
|
the indicator lamp flashes, the blasting cap is satisfactory. If it
|
|
does not flash, the cap is defective and should not be used. During the
|
|
tes, ALWAYS POINT THE EXPLOSIVE END OF THE BLASTING CAP AWAY FROM THE
|
|
BODY.
|
|
(2) When using the blasting galvanometer:
|
|
(a) Check the galvanomter as described above.
|
|
(b) Remove the short circuit shunt.
|
|
(c) Touch one cap lead wire to one galvanometer post and the
|
|
cap lead wire to the other. If the galvanometer's needle deflects
|
|
slightly less than it did when instrument was tested ((a) above) the
|
|
blasting cap is satisfactory; if not, the cap is defective and should
|
|
not be used. During the test, ALWAYS POINT THE EXPLOSIVE END OF THE CAP
|
|
AWAY FROM THE BODY.
|
|
Note. If the battery is fresh, the galvanometer should read 25
|
|
units (zero ohms) when the instrument is tested and about 24 units
|
|
(about 2 ohms) when a good blasting cap is tested.
|
|
|
|
c. Series Circuits May Be Tested as Follows:
|
|
(1) Connect charges as shown in figure 208 (either method).
|
|
(2) When using the M51 blasting cap test set, connect the free
|
|
ends of the blasting caps lead wires to the test set binding posts. THe
|
|
indicator lamp should flash.
|
|
(3) When using the blasting galvanometer, touch the free ends of
|
|
the blasting cap lead wires to the galvanomter posts. This should cause
|
|
a wide deflection of the needle.
|
|
|
|
d. The Entire Circuit May be Tested as Follows:
|
|
(1) Splice firing wires to series circuit and move to firing
|
|
position.
|
|
(2) When using the blasting cap test set connect the free ends of
|
|
the firing wire to the binding posts. The indicatior lamp should flash.
|
|
If the lamp does not flash, the circuit is defective.
|
|
Note. Since the M51 test set cannot discriminate between a firing
|
|
circuit that is properly set up and once with a short in it, special
|
|
care must be taken in wiring the circuit to avoid shorting.
|
|
(3) When using the galvanometer touch the free ends of the firing
|
|
wire to the galvanometer posts. This should cause a wide deflectction
|
|
of the needle. The magnitude of the deflection depends upon the number
|
|
of caps and the length of the firing wire. If there is no deflection,
|
|
the circuit is defective. See appendix E for calculation of circuit
|
|
resistance.
|
|
Note. To get a "wide deflection of the needle" the galvanometer
|
|
battery should be in good condition (para 1-53).
|
|
(4) If the firing circuit is defective, shunt wires, Then go down
|
|
range and recheck the circuit, repeating a and b above. If a splice is
|
|
found defective, resplice the wires. If a cap is found defective,
|
|
replace it. Continue to test all caps and wire in the circuit, then
|
|
test the entire circuit again to make sure that all breaks have been
|
|
located before attempting to fire the charge.
|
|
|
|
2-8. Electric Misfires
|
|
|
|
a. PREVENTION OF ELECTRIC MISFIRES. In order to prevent misfires,
|
|
make one individual responsible for all electrical wiring in a
|
|
demolition circuit. He should do all splicing to be sure that--
|
|
(1) All blasting caps are included int the firing circuit.
|
|
(2) All connections between blasting cap wires, connecting wires,
|
|
and firing wires are properly made.
|
|
(3) Short circuits are avoided.
|
|
(4) Grounds are avoided.
|
|
(5) The number of blasting caps in any circuit does not exceed the
|
|
rated capacity of the power source on hand.
|
|
|
|
b. CAUSE OF ELECTRIC MISFIRES. Common specific causes of electric
|
|
misfires include--
|
|
(1) Inoperative or weak blasting machine or power source.
|
|
(2) Improperly-operated blasting machine or power source.
|
|
(3) Defective and damaged connections causing either a short
|
|
circuit, a break in the circuit, or high resistance with resulting low
|
|
current.
|
|
(4) Faulty blasting cap.
|
|
(5) The use in the SAME CIRCUIT of blasting caps (other than M6)
|
|
made by different manufacturers.
|
|
(6) The use of more blasting caps than the power source rating
|
|
permits.
|
|
|
|
c. CLEARING ELECTRIC MISFIRES. Because of the hazards of burning
|
|
charges and delayed explosions, electric misfire must be cleared with
|
|
extreme caution. A burning charge may occur with the use of electric as
|
|
well as nonelectric caps. Misfires of charges primed with detonating
|
|
cord fired by electric blasting caps are cleared as described in
|
|
paragraph 2-12. If the charge is dual-primed electrically and below
|
|
ground, wait 30 minutes before investigating to make sure that the
|
|
charge is not burning; or if dual-primed above ground, wat 30 minutes
|
|
before investigation because a burning charge can set off the second cap
|
|
causing the main charge to detonate. On the other hand, if the
|
|
electric misfire is above ground and the charge is not dual-primed,
|
|
investigate immediately. If the system is below ground and not dual
|
|
primed, proceed as follows--
|
|
(1) Check the firing wire connection to the blasting machine or
|
|
power source terminals to be sure the contacts are good.
|
|
(2) Make two or three more attempts to fire the circuits.
|
|
(3) Attempt to fire again, using another blasting machine or power
|
|
source.
|
|
(4) Disconnect the blasting machine firing wire and wait 30
|
|
minutes before further investigation. Before moving on to the charge
|
|
site, be sure that the firing wires at the power source end of the
|
|
circuit are shunted to aboid any posible static electric detonation.
|
|
(5) Check the entire circuit, including the firing wire, for
|
|
breaks and short circuits.
|
|
(6) If the faul is not above ground, remove the tamping material
|
|
very carefully from the borehole to avoid striking the electric blasting
|
|
cap.
|
|
(7) Make not attempt to remove either the primer or the charge.
|
|
(8) If the fault is not located by the removal of the tamping
|
|
material to withing 1 foot of the charge, place a new electric primer
|
|
and 2 pounds of explosive at this point.
|
|
(9) Disconnect the blasting cap wires of the original primer from
|
|
the circuit, and short the cap's lead wires.
|
|
(10) Connect the wires of the new primer in their place.
|
|
(11) Replace the tamping material.
|
|
(12) Initiate detonation. Detonation of the new primer will fire
|
|
the original primer.
|
|
Note. In some cases it may be more desirable or expedient to
|
|
drill a new hole withing a foot of the old one at the same depth to
|
|
avoid accidental detonations of the old charge and then place and prime
|
|
a new 2-pound charge.
|
|
|
|
2-9 Premature Detonation by Induced Currents and Lightning
|
|
|
|
a. INDUCED CURRENTS. The premature detonation of electric blasting
|
|
caps by induced curret from radio frequency signals is possibl. Table
|
|
2-1 showing the minimum safe distance in respect to transmitter power,
|
|
indicates the distance beyond which it is safe to conduct electrical
|
|
blasting even under the most adverse conditions. This table applies to
|
|
operating radio, radar, and television transmitting equipment. Mobile
|
|
type transmitters and portable transmitters are prohibited within 50
|
|
meters of any elctrical blasting caps or electrical firing system. If
|
|
blasting distances are less than those shown in table 2-1, the only safe
|
|
procedure is to use a nonelectric system, which cannot be prematurely
|
|
detonated by RF currents. If however the use of the electric systme is
|
|
necessary, follow precautions given in TM 9-1300-206. See also AR
|
|
385-63.
|
|
Caution. If electric blasting caps are to be transported near
|
|
operating transmitters or in vehicles (including helicopters) in which a
|
|
transmitter is to be operated, the caps will be placed in a metal can,
|
|
the cover of which must be snug fitting and lap over the body of the can
|
|
to a minimum depth of one-half inch. Caps will not be removed from
|
|
container in proximity to operating transmitter unless the hazard has
|
|
been evaluated and estimated to be acceptable.
|
|
|
|
b. LIGHTNING. Lightning is a hazard to both electric and nonelectric
|
|
blasting charges. A strike or a nearby miss is almost certain to
|
|
initiate either type of system. Lightning strikes, even at remote
|
|
locations, may cause extremely high local earth currents. The effects
|
|
of remote lightning strikes are multiplied by proximity to conducting
|
|
elements, such as those found in buildings, fences, railroads, bridges,
|
|
streams, and underground cables or conduct. Thus, the only safe
|
|
procedure is to suspend all blasting activities during electrical storms
|
|
and when one is impending.
|
|
|
|
c. ELECTRIC POWER LINES. Electric firing should not be performed
|
|
within 155 meters of energised power transmission lines. When it is
|
|
necassary to conduct blasting operations at distances closer than 155
|
|
meters to electrical power lines, nonelectric fire systems should be
|
|
under or the power lines deenergized (AR 385-63).
|
|
|
|
table 2-1:
|
|
______________________________________________________________
|
|
Average or peak ! Minimum distance
|
|
transmitting power ! to transmitter(meters)
|
|
______________________________________________________________
|
|
!
|
|
0-30 ! 30
|
|
30-50 ! 50
|
|
50-100 ! 110
|
|
100-250 ! 160
|
|
250-500 ! 230
|
|
500-1000 ! 305
|
|
1000-3000 ! 480
|
|
3000-5000 ! 610
|
|
5000-20000 ! 915
|
|
20000-50000 ! 1530
|
|
50000-100000 ! 3050
|
|
_______________________________!______________________________
|
|
|
|
|
|
|
|
2-10. Methods of Use
|
|
|
|
Of all firing systems for explosives, a detonating cord firing system is
|
|
probably the most versatile and in many cases the most easily installed.
|
|
It is especially applicable for underwater and underground blasting
|
|
because the blasting cap of the initiating system may remain above the
|
|
water or ground.
|
|
|
|
a. An electric system consisting of an electric blasting cap,
|
|
initiated by a blasting machine or other power source, or a nonelectric
|
|
blasting cap initiated by a fuse igniter and a length of time blasting
|
|
fuse, is used to detonate the cord.
|
|
|
|
b. The blasting cap, electric or nonelectric, is attached to a point
|
|
6 inches from the free end of the detonating cord by numerous wraps of
|
|
string, wire, cloth, or tape.
|
|
|
|
2-11. Detonating Cord Connections
|
|
|
|
A detonating cord clip (fig 1-33) or square knot pulled tight is used to
|
|
splice the ends of detonating cord. At least a 6-inch length should be
|
|
left free at both sides of the knot (fig 2-10). When fabric is used to
|
|
cover the detonating cord, the fabric must not be removed. The knot may
|
|
be placed in water or in the ground but the cord must be detonated from
|
|
a dry end.
|
|
|
|
a. BRANCH LINE CONNECTIONS. A branch line is fastened to a main line
|
|
by means of a clip (fig 1-33) or a girth hitch with one extra turn (fig
|
|
2-11). The angle formed by the branch line and the cap end of the main
|
|
line should not be less than 90 degrees from the direction from which
|
|
the blast is coming; at a smaller angle, the branch may be blown off the
|
|
main line without being detonated. At least 6 inches of the running end
|
|
of the branch line is left free beyond the tie.
|
|
|
|
b. RING MAIN. A ring main is made by bringing the main line back in
|
|
the form of a loop and attaching it to itself with a girth hitch with
|
|
one extra turn (fig 2-12). This will detonate an almost unlimited
|
|
number of charges. The ring main makes the detonation of all charges
|
|
more postitive because the detonating wave approaches the branch lines
|
|
from both directions and the charges will be detonated even when there
|
|
is one break in the ring main. Branch line connections should be made
|
|
perpendicular to the ring main. Kinks in lines should be avoided, and
|
|
curves and angles should not be sharp. Any number of branch lines may
|
|
be connected to the ring main, but a branch line is never connected at
|
|
apoint where the ring main is spliced. In making detonating cord branch
|
|
line connections, avoid crossing lines. However, if this is necessary,
|
|
be sure to have at least one foot of clearance at all points between the
|
|
detonating cords; otherwise, the cords will cut each other and destroy
|
|
the firing system.
|
|
|
|
2-12. Detonating Cord Misfires
|
|
|
|
a. FAILURE OF NONELECTRIC BLASTING CAP. If a nonelectric blasting
|
|
cap attached to detonating cord fails to function, delay the
|
|
investigation for at least 30 minutes. Then cut the detonating cord
|
|
main line between the blasting cap and the charge, and fasten a new
|
|
blasting cap on the detonating cord.
|
|
|
|
b. FAILURE OF ELECTRIC BLASTING CAP. If an exposed electric blasting
|
|
cap fastened to detonating cord fails to fire, disconnect the blasting
|
|
machine immediately and investigate. Test the blasting circuit for any
|
|
breaks or short circuit. Short the firing wire leads before leaving
|
|
firing position to correct the problem. If necessary, replace the
|
|
original blasting cap.
|
|
|
|
c. FAILURE OF DETONATING CORD. If detonating cord fails to function
|
|
at the explosion of an exposed electric or nonelectric blasting cap,
|
|
investigate immediately. Attach a new blasting cap to the detonating
|
|
cord, taking care to fasten it properly.
|
|
|
|
d. FAILURE OF BRANCH LINE. If the detonating cord main line
|
|
detonates but a branch line fails, fasten a blasting cap to the branch
|
|
line and fire it seperately.
|
|
|
|
e. FAILURE OF CHARGE TO EXPLODE. If the charge is above ground, and
|
|
the detonating cord leading to a charge detonates but the charge fails
|
|
to explode, delay the investigation until it is certain that the charge
|
|
is not burning. If the charge is intact, insert a new primer. If the
|
|
charge is scattered by the detonation of the original charge as
|
|
possible, place a new charge if necessary, and reprime. Make every
|
|
attempt possible to recover all explosives scattered by misfire,
|
|
particularly those used in training exercises.
|
|
|
|
Section IV. DUAL FIRING SYSTEMS
|
|
|
|
|
|
2-13. Introduction
|
|
|
|
There is always a certain amount of danger to personnel investigating
|
|
misfires. Since dual priming increases greatly the probability of
|
|
successful, firing, it should be used whenever possible. Dual priming
|
|
consists of two complete systems independent of each other, and each
|
|
capable of firing the same charge. It can be two electric systems, two
|
|
nonelectric systems. Or an electric and nonelectric system.
|
|
|
|
2-14. Nonelectric Dual Firing Systems
|
|
|
|
This consists of two independent nonelectric systems for firing a single
|
|
charge or set of charges. If two or more charges are to be fired
|
|
simultaneously, two detonating cord ring mains are laid out, and abranch
|
|
line from each charge is tied into each ring main. Figure 2-13 shows
|
|
the layout for a nonelectric dual firing system.
|
|
|
|
2-15. Electric Dual Firing System
|
|
|
|
This dual firing system consists of two independent electric circuits,
|
|
each with an electric blasting cap in each charge, so that the firing of
|
|
either circuit will detonate all charges. The correct layout is shown
|
|
in figure 2-14. The firing wires of the two circuits should be kept
|
|
separated so that both will not be cut by a single bullet or a single
|
|
shell fragment. The firing points also should be at two separate
|
|
locations.
|
|
|
|
2-16. Combination Dual Firing System
|
|
|
|
The combination dual firing system uses an electric and nonelectric
|
|
firing system (fig 2-15). Each charge is primed electrically and
|
|
nonelectrically. Both the electric and nonelectric systems must be
|
|
entirely independent of each other. The nonelectric system must be
|
|
fired first.
|
|
|
|
Section V. PRIMING CHARGES
|
|
|
|
2-17. Introduction
|
|
|
|
This section will show nonelectric, electric, and detonating cord
|
|
methods of priming most basic explosives. Certain terminology should be
|
|
clarified since it will appear frequently in this section.
|
|
|
|
a. NONELECTRIC FIRING SYSTEM. A nonelectric firing system consists
|
|
of a fuse igniter, a length of time blasting fuse, and a nonelectric
|
|
blasting cap. (A, fig 2-16).
|
|
|
|
b. ELECTRIC FIRING SYSTEM. An electric firing system consists of a
|
|
blasting machine or some other means of producing current, the necessary
|
|
number of reels of firing wire, and electric blasting cap(s) (B, fig
|
|
2-16).
|
|
|
|
c. DETONATING CORD. Detonating cord can be used to fire several
|
|
charges simultaneously. Charges in several locations can be detonated
|
|
by a single blasting cap wehn detonating cord ring mains are used and
|
|
the charges are primed with detonating cord (para 2-10 - 2-12).
|
|
|
|
2-18. Priming Demolition Blocks
|
|
|
|
a. NONELECTRIC PRIMING. Demolition blocks may or may not have
|
|
threaded cap wells. Priming adapters should be used, if available, to
|
|
secure the nonelectric blasting cap and time blasting fuse to demolition
|
|
blocks with threaded cap wells (fig 2-17, para 1-45 and 2-2).
|
|
(1) If priming adapters are not available but the blocks have
|
|
threaded cap wells, they are primed as follows:(method 1, fig 2-18)
|
|
(a) Wrap a string tightly around the block and tie it securely
|
|
leaving about 6 inches of loose string on each end after making the tie.
|
|
(b) Insert a blasting cap with fuse attached into the cap well.
|
|
(c) Tie the loose string around the fuse to prevent the blasting
|
|
cap from being separated from the block.
|
|
Note. Do not tie the string so tight that powder train is
|
|
broken in the fuse.
|
|
(2) If the demolition block does not have a cap well, proceed as
|
|
follows:
|
|
(a) Make a hole in the end of the block with a pointed
|
|
nonsparking instrument or the pointed handle on the M2 crimpers large
|
|
enough to contain the blasting cap (method 2, fig 2-18).
|
|
(b) Using string, wrap several turns around the explosive and
|
|
tie any knot. Position the tie so it will be at the top of the hole
|
|
when the fused cap is inserted.
|
|
(c) Insert fused cap into hole.
|
|
Note. Never try to force a cap into an expedient cap well that
|
|
is too small to admit it easily. Remove and enlarge hole.
|
|
(d) Tie string around the time fuse at top of hole with two half
|
|
hitches.
|
|
|
|
b. ELECTRIC PRIMING. Here again demolition blocks may or may not have
|
|
threaded cap wells. If the blocks have threaded cap wells, priming
|
|
adapters should be used if available. Proceed as follows:
|
|
(1) Untwist the free ends of the lead wire and fasten them to the
|
|
firing wire (para 2-4).
|
|
(2) Pass the lead wires through the slot of the adapter and pull
|
|
the cap into place in the adapter (fig 2-19).
|
|
(3) Insert the cap into the capwell of the explosive and screw the
|
|
adapter into place.
|
|
|
|
c. If a priming adapter is not available do the following:
|
|
(1) If the block does not have a cap well, make one in the manner
|
|
described in paragraph 2-18a and figure 2-18.
|
|
(2) Untwist the free ends of the lead wire and fasten them to the
|
|
firing wire.
|
|
(3) Insert the electric cap into the cap well and tie the lead
|
|
wires around the block by two half hitches or a girth hitch (fig 2-20).
|
|
Allow some slack in the wires between the blasting cap and the tie to
|
|
prevent any pull on the blasting cap.
|
|
|
|
d. DETONATING CORD PRIMING. Demolition blocks may be primed with
|
|
detonating cord in several ways.
|
|
(1) The method which offers the greatest assurance of detonation
|
|
is to affix a nonelectric blasting cap to the end of the detonating cord
|
|
and place it in the demolation block similar to nonelectric priming
|
|
methods (para 2-19a). The system is then intitiated by a nonelectric or
|
|
electric assembly.
|
|
(2) The common method (A, fig 2-21) lays one end of a 4-foot
|
|
length of detonating cord at an angle across the explosive. The running
|
|
end is tehn given three wraps around the block and the end laid at an
|
|
angle. On the fourth wrap, slip the running end under all wraps
|
|
parallel to the other end and draw tight. Initiate by an electric or
|
|
nonelectric system.
|
|
(3) Alternate method No. 1 is shown in B, figure 2-21. Tie the
|
|
detonating cord around the explosive block (on top of the booster, if
|
|
present) with a clove hitch with two extra turns. The cord must fit
|
|
snugly against the blocks and the loops must be pushed close together.
|
|
Use an electric or nonelectric firing system to initiate the charte.
|
|
(4) Alternate method No. 2 places a loop of detonating cord on the
|
|
explosive with four wraps around the block and loop. The running end is
|
|
pulled through the eye of the loop and tightened (C, fig 2-21). This
|
|
method is also initiated by an electric or nonelectric system.
|
|
Note. Alternate method No. 2 is more applicable to short than to
|
|
long detonation cord branch lines or primers.
|
|
|
|
2-19. Composition C4 and C3 Demolition Blocks
|
|
|
|
a. NONELECTRIC AND ELECTRIC PRIMING. When ever whole blocks or
|
|
portions of blocks of plastic explosives (Composition C4 and C3) are
|
|
used, prime similarly to demolition blocks without cap wells (para
|
|
2-18). Plastic explosives can be cut with a knife and then formed into
|
|
almost any shape.
|
|
|
|
b. DETONATING CORD PRIMING. To prime plastic explosives with
|
|
detonating cord, form either of the two knots shown in figure 2-22.
|
|
Then inser the knot into a block of explosive or a molded piece of
|
|
explosive as shown. In either case, insure that there is at least 1/2
|
|
inch of explosive on all sides of the knot.
|
|
|
|
2-20. Sheet Explosive (M118 and M186 Demolition Charges)
|
|
|
|
a. NONELECTRIC AND ELECTRIC PRIMING. M118 and M186 demolition
|
|
charges may be primed in the following ways:
|
|
(1) Attach blasting cap holder M8 (para 1-46) to one end or side
|
|
of sheet explosive. The blasting cap holder M8 (fig 1-25) is
|
|
self-securing to sheet explosive by means of three slanted, protruding
|
|
teeth which prevent withdrawl. Two dimpled spring arms firmly hold the
|
|
blasting cap in the M8 holder (fig 2-23).
|
|
Note. This holder is supplied in each M118 and M186 demolition
|
|
charge of recent manufacture. It is also available as a separate item
|
|
of issue in quantities of 4,000.
|
|
(2) Cut notch approximately 1.5-inches long and 1/4 inch wide in
|
|
sheet explosive and insert blasting cap to limit of notch; secure
|
|
blasting cap with string, tape or strip of sheet explosive (fig 2-23).
|
|
(3) Place blasting cap on top of sheet explosive and sevure with a
|
|
strip of sheet explosive at least 3" x 3".
|
|
(4) Insert end of blasting cap 1.5 inches between two sheets of
|
|
the explosive.
|
|
|
|
b. DETONATING CORD PRIMING. M118 and M186 demolition charge sheet
|
|
explosive may be primed with detonating cord by attaching a nonelectric
|
|
blasting cap to the end of the detonating cord and following the methods
|
|
outlined in A above. The detonating cord is then attached to a
|
|
nonelectric or electric initiating system.
|
|
|
|
2-21. Dynamite
|
|
|
|
Dynamite can be primed at either end or the side. End priming is used
|
|
when a whole case is fired or when the charges pclaced require no
|
|
tamping. Side priming is used when the charge is placed in a tamped
|
|
borehole to prevent damage to the prime during placement and tamping.
|
|
|
|
a. NONELECTRIC PRIMING.
|
|
(1) END PRIMING METHOD (A, fig 2-24).
|
|
(a) Using the cap crimpers, make a cap well in the end of the
|
|
dynamite cartridge.
|
|
(b) Insert a fused blasting cap.
|
|
(c) Tie the cap and fuse securely in the cartridge with string.
|
|
(2) WEATHERPROOF END PRIMING METHOD. This method helps
|
|
weatherproof the primed charge (B, fig 2-24).
|
|
(a) Unfold the wrapping at the folded end of the dynamite
|
|
cartridge.
|
|
(b) Use the cap crimpers and make a cap well in the exposed
|
|
dynamite.
|
|
(c) Insert a fused blasting cap into the cap well.
|
|
(d) Close the wrapping around th fuse and fasted securely with
|
|
string or tape.
|
|
(e) Apply weatherproof sealing compound to the tie.
|
|
(3) SIDE PRIMING METHOD. (fig 2-25).
|
|
(a) Use the cap crimpers and make a cap well about 1.5 inches
|
|
from one end of the dynamite cartridge. Slant the cap well so that the
|
|
blasting cap, when insterted, will be nearly parallel with the side of
|
|
the cartridge and the explosive end of the cap will be at a point at
|
|
about the middle of the cartridge.
|
|
(b) Insert a fused blasting cap into the hole.
|
|
(c) Tie a string securely around the fuse and then wrap it
|
|
tightly around the cartridge making two or three turns before tying it.
|
|
(d) The primed cartridge may be weatherproofed by wrapping a
|
|
string closely around the cartridge, extending it an inch or so on each
|
|
side of the hold to cover it completely. Then cover the string with
|
|
weatherproof sealing compound.
|
|
|
|
b. ELECTRIC PRIMING.
|
|
(1) END PRIMING METHOD (A, fig 2-26).
|
|
(a) Use the cap crimpers and make a cap well in the end of the
|
|
cartridge and insert an electric blasting cap as shown in a(1) above.
|
|
(b) Tie the lead wires around the cartridge with two half
|
|
hitches or a girth hitch.
|
|
(2) SIDE PRIMING METHOD (B, fig 2-26).
|
|
(a) Make a cap well in the side of the cartridge and insert an
|
|
electric blasting cap as outlined a(3) above.
|
|
(b) Tie the lead wire around the cartridge with a girth hitch or
|
|
two half hitches or fasten with string or tape.
|
|
|
|
c. DETONATING CORD PRIMING. Dynamite cartridges may be primed with
|
|
detonating cord by attaching a nonelectric blasting cap to the end of
|
|
the detonating cord and following any of the methods for nonelectric
|
|
priming outlined in A above. Dynamite may also be primed by lacing the
|
|
detonating cord through it. This is used chiefly in boreholes,
|
|
ditching, or removal of stumps. Punch four equally-spaced holes through
|
|
the dynamite cartridge and lace the detonating cord through them as
|
|
shown in figure 2-27.
|
|
|
|
2-22. 40-Pound Ammonium Nitrate Cratering Charge
|
|
|
|
a. NONELECTRIC PRIMING (fig, 2-28).
|
|
(1) Place a fused nonelectric blasting cap in the cap well on the
|
|
side of the container.
|
|
(2) Tie a string around the fuse and then around the cleat above
|
|
the cap well.
|
|
(3) Dual prime as outlined in D below.
|
|
|
|
b. ELECTRIC PRIMING. (fig 2-28).
|
|
(1) Place an electric blasting cap in the cap well on the side of
|
|
the container.
|
|
(2) Tie the lead wires around the cleat above the cap well.
|
|
(3) Dual prime as outlined in D below.
|
|
|
|
c. DETONATING CORD PRIMING (A, fig 2-29).
|
|
(1) Pass the end of the detonating cord through the tunnel on the
|
|
side of the can.
|
|
(2) Tie an overhand knot on the portion passed through at least
|
|
6-inches from the end.
|
|
(3) Dual prime as outlined in D below.
|
|
|
|
d. DUAL PRIMING (B, fig 2-29). To insure positive detonation of the
|
|
ammonium nitrate cratering charge all charges should be dual primed with
|
|
a 1-pound brick of explosive taped to the side of the charge near the
|
|
cap well or detonating cord tunnel to detonate the TNT booster in the
|
|
center of the charge. This demolition block may be primed by the same
|
|
method the cratering charge is primed. Both charges should be primed to
|
|
detonate simultaneously.
|
|
|
|
e. PRECAUTIONS. As ammonium nitrate is hygroscopic and becomes
|
|
ineffective if it has absorbed moisture (para 1-33), the metal container
|
|
must be carefully inspected for damage or rusting that would indicate
|
|
that the ammonium nitrate had absorbed moisture. Damaged or rusted
|
|
charges should not be used. For safety in priming use detonating cord
|
|
whenever charges are placed underground.
|
|
|
|
2-23. Shaped Charges
|
|
|
|
a. NONELECTRIC AND ELECTRIC PRIMING. The M2A3, M2A4, M3 and M3A1
|
|
shaped charges have a threaded cap well at the top of the rear cone.
|
|
They may be primed by means of a blasting cap and priming adapter as
|
|
shown in figure 2-30. If a priming adapter is not available, the primer
|
|
may be held in the cap well with string, piece of cloth or tape.
|
|
|
|
b. DETONATING CORD PRIMING. Shaped charges are primed with
|
|
detonating cord by attaching a nonelectric blasting cap to the end of
|
|
the detonating cord and following the procedure in A above.
|
|
|
|
c. DUAL-PRIMING. As shaped charges must be detonated from the center
|
|
of the rear of the cone for maximum effectiveness, conventional methods
|
|
of dual priming are not applicable to shaped charges.
|
|
|
|
2-24. Bangalore Torpedo
|
|
|
|
a. NONELECTRIC PRIMING. The bangalore torpedo may be primed by
|
|
assembling alength of time blasting fuse and a nonelectric blasting cap
|
|
in a priming adapter and screwing the assembly into the cap well of a
|
|
torpedo section (A, fig 2-31). A section may also be primed
|
|
nonelectrically by a pull type firing device, with a nonelectric
|
|
blasting cap crimped on the base, screwed into the cap well (B, 2-31).
|
|
|
|
b. ELECTRIC PRIMING. The bangalore torpedo may be primed electrically
|
|
by assembling a blasting cap and priming adapter and screwing the
|
|
assembly into the cap well of a torpedo section (C, fig 2-31).
|
|
|
|
|
|
CHAPTER 3
|
|
|
|
CALCULATION AND PLACEMENT OF CHARGES
|
|
|
|
|
|
Section I. INTRODUCTION
|
|
|
|
3-1. Critical Factors in Charge Calculations
|
|
|
|
The amount of explosive used in any demolition project is determined by
|
|
formula calculations based on the critical factors listed below.
|
|
|
|
a. TYPE AND STRENGTH OF MATERIAL. A demolition target may be
|
|
constructed of timber, steel, concrete or some other material.
|
|
Concrete may reinforced with steel thereby increasing its strength.
|
|
Formulas for computing specific charges for timber, steel, concrete, and
|
|
so on, are given in succeeding sections of this chapter.
|
|
|
|
b. SIZE AND SHAPE OF TARGET. Consideration must be given to the size
|
|
and shape of the target. For example, large targets, such as concreter
|
|
piers, and oddly shaped targets, such as steel I-beams, may be more
|
|
economically attacked by multiple charges than a single charge.
|
|
|
|
c. DESIRED DEMOLITION EFFECT. The extent of demolition desired and
|
|
other effects, such as direction of falling trees to construct an
|
|
abatis, must be considered.
|
|
|
|
d. TYPE OF EXPLOSIVE. The particular characteristics of each type of
|
|
explosive make it applicable to certain demolition projects, in
|
|
preference to others. The relative effectiveness of each type of
|
|
explosive must be considered in each formula calculation. Explosive
|
|
Charges used in military operation and their relative effectiveness
|
|
factors are shown in table 1-2.
|
|
|
|
e. SIZE AND SHAPE OF CHARGE. The amount of explosive is calculated
|
|
by each demolition formula, but, in the absence of special placement
|
|
techniques, when external charges are used, a flat square charge with a
|
|
thickness to width ratio of 1 to 3 or more will give acceptable results.
|
|
In general, charges less than 5 pounds should be 1 inch thick (one M112
|
|
demolition block; charges 5 pounds to 40 pounds should be 2 inches thick
|
|
(one M5A1 demolition block); and charges 40 pounds or more should be 4
|
|
inches thick (one M-183 demolition assembly). A more detailed
|
|
discussion of charge thickness is found in paragraph 3-2b.
|
|
|
|
f. CHARGE PLACEMENT.
|
|
(1) Charges should be placed at the position that will provide
|
|
maximum effectiveness. For cratering, they are place in holes in the
|
|
ground; for breaking or collapsing stone or concrete, they are properly
|
|
located on the surface or in boreholes; for cutting timber they may be
|
|
tied on the outside or placed in boreholes, whichever is the more
|
|
practical.
|
|
(2) Charges are fastened to the target by wire, adhesive compound,
|
|
tape, or string; propped against the target by means of a wooden or
|
|
metal frame made of scrap or other available materials; or placed in
|
|
boreholes. Special accessories are issued for this purpose--adhesive
|
|
compound, the rivet-punching powder-actuated driver, the earth auger,
|
|
and pneumatic tools (para 1-58).
|
|
|
|
g. METHOD OF INITIATION. Generally the method of initiation is not
|
|
critical unless the demolition charge is of a special type such as a
|
|
shaped charge or diamond charge.
|
|
|
|
h. TAMPING. The detonation of an explosive produces pressure in all
|
|
directions. If the charge is not completely sealed in or confined or if
|
|
the material surrounding the explosive is not equally strong on all
|
|
sides, the explosive force breaks through the weakest spot and part of
|
|
the destructive force is lost. To retain as much of this explosive
|
|
force as possible, material is packed around the charge. This material
|
|
is called tamping material or tamping, and the process, tamping. On the
|
|
other hand, an internal charge (one placed in the target to be
|
|
destroyed) is confined by packing material in the borehole on top of the
|
|
charge as is done in quarrying and cratering. This is called stemming.
|
|
|
|
3-2. Principles of Demolition
|
|
|
|
a. EFFECTS OF DETONATION. When a high explosive detonates, the
|
|
explosive changes violently into compressed gas at extremely high
|
|
pressure. The rate of change is determined among other things by the
|
|
type of explosive and the density, confinement, and dimensions of the
|
|
charge. Thus the detonation releases tremendous pressure in the form of
|
|
a compressive shock wave which, although it exist for only a few
|
|
micro-seconds at any given point, may shatter and displace objects in
|
|
its path as it proceeds from its point of origin. This shock wave is
|
|
transmitted directly to any substance in contact with the charge, other
|
|
characteristics being equal. A high explosive charge detonated in
|
|
direct contact with a solid object produces three different easily
|
|
detectable destructive effects.
|
|
(1) CRATERING. The surface of the object directly under the
|
|
explosive charge will be cratered. On a concrete surface the high
|
|
pressure of the compressive shock wave crumbles that material in the
|
|
immediate vicinity of the charge, forming the crater. On a steel target
|
|
an indentation or depression with an are about the size of the contact
|
|
area of the charge is made in the surface of the plate.
|
|
(2) SPALLING. Providing that the charge is of sufficient size,
|
|
the opposite side of the object will be spalled. The strong compressive
|
|
shock wave transmitted into the material expands spherically losing
|
|
energy as it moves through the material. If the target has a free
|
|
surface on the side opposite the charge, the compressive shock wave will
|
|
be reflected as a tensile shock wave from that free surface because of
|
|
the difference in density between the target and the air. Reflection of
|
|
the compressive shock wave as a tensile shock wave causes spalling of
|
|
the target free surface, wherein a portion of the material is literally
|
|
torn from the free surface. On a concrete wall, depending upon the
|
|
relative size of the charge and thickness of the wall, the crater and
|
|
spalls meet and form a hole through the wall. On a steel plate, usually
|
|
only one spall, approximately the shape of the explosive charge, is
|
|
thrown from the plate.
|
|
(3) CRACKING. If the explosive charge is of sufficient size the
|
|
high pressure gases from the explosive charge will create a pressure
|
|
load on the object that will crack and displace the material beyond the
|
|
extent of the crater and spall. These cracks will radiate from the
|
|
charge position. On concrete walls, this craking may be extensive
|
|
enough to break the wall into a large number of chunks which are
|
|
projected away from the charge position. On steel plates, the material
|
|
may be bent away from the charge position.
|
|
|
|
b. SIGNIFICANCE OF CHARGE DIMENSIONS. The force of an explosion is
|
|
proportional to the quantity and power of the explosive, but the
|
|
destructitve effect depends, in part, on the manner that the explosive
|
|
force is directed at the target. An optimum relation must exist between
|
|
the area of the charge in contact with the target and charge thickness
|
|
in order to transmit the greatest shock. If any given wight of
|
|
explosive, calculated to cut a given target, is spread too thinly, there
|
|
will be insufficient space for the shock wave to attain full velocity
|
|
before striking the target. The shock wave will tend to travel more
|
|
nearly parallel than normal to the surface over much of the area, and
|
|
the volume of the target will be excessive for the strength of the shock
|
|
wave. On the other extreme, a thick charge with a small contact area
|
|
will transmit the shock wave over too little of the target with
|
|
excessive lateral loss of energy. Test results have demonstrated that
|
|
the optimum ratio of charge thickness to charge width is about 1:3 for
|
|
contact steel cutting charges on structural steel 3 inches or less, and
|
|
ranges from about 1:6 to 1:14 for rectangualar external untamped
|
|
breaching charges for reinforced concrete from 1 to 7 feet thick.
|
|
|
|
c. SIGNIFICANCE OF CHARGE PLACEMENT. The destructive effect of an
|
|
explosive charge is also dependent upon the contact between the
|
|
explosive and the target and the location of the charge in relation to
|
|
target size and shape.
|
|
(1) For the maximum destructive effect an explosive charge with a
|
|
configuration and deimensions optimum for the size and shape of the
|
|
target must be detonated in intimate contact with the target. Any
|
|
significant air or water gap between the target and the explosive will
|
|
not transmit the complete force of the shock wave into the target.
|
|
Certain explosives, such as sheet explosive or plastic explosives, are
|
|
more desirable for certain targets because they may be cut or molded to
|
|
fit odd shaped targets.
|
|
(2) Explosive charges are placed to act through the least
|
|
dimension of the target whenever possible. In terms of the maximum
|
|
destructive effect for the least amount of explosive, internal charges
|
|
are the best. The tamping of external charges increases their
|
|
destructive effect.
|
|
|
|
3-3. Types of Charges
|
|
|
|
a. INTERNAL CHARGES. Internal charges are charges placed in
|
|
boreholes in the target. These are confined by tightly packing sand,
|
|
wet clay, or other material (stemming) into the opening. This is tamped
|
|
and packed against the explosive to fill the hole all the way to the
|
|
surface. In drill holes, the explosive (usually dynamite) is tamped as
|
|
it is loaded into the hole. Refer to TM 5-332 for details of quarry
|
|
practice.
|
|
|
|
b. EXTERNAL CHARGES. These charges are placed on the surface of the
|
|
target. They are tamped by covering them with tightly packed sand, clay
|
|
or other dense material. Tamping may be in sandbags or loose. For
|
|
maximum effectiveness the thickness of the tamping should at least equal
|
|
the breaching radius. Small breaching charges on horizontal surfaces
|
|
are sometimes tamped by packing several inches of wet clay or mud around
|
|
them. This process is called mudcapping.
|
|
|
|
3-4. Charge Selection and Calculation
|
|
|
|
a. CHARGE SELECTION. The selection of the optimum explosive charge
|
|
for successful demolition operations is a balance between the important
|
|
factors listed above and the practical aspects of the type of target,
|
|
the type and amount of explosives available, the amount and type of
|
|
material (such as sandbags) and equipment available, the amount of
|
|
manpower available, and, probably most important, the time available to
|
|
accomplish the mission. Formulas for computing specific charges and
|
|
methods of their placement are given below. Formulas based on metric
|
|
measurements are given in appendix B.
|
|
|
|
b. CHARGE CALCULATION. The formulas in this chapter give the weight
|
|
of explosive required for a demolition task P in pounds of TNT. If
|
|
explosives other than TNT are used, the value of P must be adjusted
|
|
according to the strength of these other explosives. The adjusted value
|
|
of P corrected weight of explosive required, is computed by dividing the
|
|
P value of TNT by the relative effectiveness factor for the explosive
|
|
to be used.
|
|
|
|
c. ROUNDING OFF RULE. When using explosives, NEVER use less than the
|
|
calculated amount. Some explosives like plastic explosive (C4) and
|
|
sheet explosive (M118 and M186) can be cut to the desired amount, while
|
|
with other explosives the ability to size explosives is limited. For
|
|
charges calculated by formula, use the following rounding off method:
|
|
(1) Claculate the weight of a single charge for TNT using the
|
|
selected demolition formula to at least two decimals.
|
|
(2) Divide by the relative effectiveness factor, if required.
|
|
(3) Round up answer for single charge to next package size.
|
|
(4) Multiply answer for single charge by the number of charges to
|
|
obtain the total amount of explosive required.
|
|
|
|
Section II. TIMBER-CUTTING CHARGES
|
|
|
|
3-5. Size and Placement of Charge
|
|
|
|
a. TYPE OF EXPLOSIVE USED. For tamped internal charges in boreholes,
|
|
dynamite is generally used, as it is the most convenient to place
|
|
because of the size of the cartridge and is powerful enough because it
|
|
is confined. For untamped concentrated external charges, block
|
|
explosive (TNT, Tetrytol, and Composition C4) is used, as it is easily
|
|
tied or fastened on its effectiveness in relation to that of TNT
|
|
(relative effectiveness factor). For untamped external ring charges,
|
|
plastic explosive (Composition C4) or sheet explosive (M118 or M186) is
|
|
used, as it is easily fastened to the target and molded around the
|
|
target. It is impractical to attempt to cut all kinds of timber with
|
|
charges of a size calculated from a single formula. THere is too much
|
|
variation in different kinds of timber from locality to locality.
|
|
Accordingly, test shots must be made to determine the size of the charge
|
|
to cut a specific type of timber. Formulas for the calculation of these
|
|
test shots are provided for tamped internal charges, and untamped
|
|
external charges. They are as follows:
|
|
|
|
b. FORMULA FOR TAMPED INTERNAL CHARGES. Tamped internal cutting
|
|
charges may be calculated by the following formula:
|
|
P = D}/250 or P = .004 D} where,
|
|
P = Pounds of TNT required,
|
|
D = diameter or least dimension of dressed timber, in inches, and
|
|
1/250 = .004 = constant
|
|
The amount of explosive required to cut a 15-inch diameter tree,
|
|
using tamped internal charges is determined as follows:
|
|
P = D}/250 = 225/250 = .9 of 1 pound of TNT
|
|
Note. See rounding off rule, paragraph 3-4c.
|
|
|
|
c. INTERNAL CHARGE PLACEMENT. The charge is placed in a borehole
|
|
parallel to the greatest dimension of cross section and tightly tamped
|
|
with moist earth. If the charge is too large to be placed in one
|
|
borehole, bore two holes side by side in dimensional timber. On round
|
|
timber, bore two holes at approximately right angles to each other, but
|
|
do not intersect (fig 3-1). Both boreholes are tamped and the charges
|
|
are fired simultaneously.
|
|
|
|
d. FORMULA FOR UNTAMPED EXTERNAL CHARGES. For cutting trees, piles,
|
|
posts, beams or other timber members using explosives as an untamped
|
|
external charge, the following formula is used:
|
|
P = D}/40 or P = .025 D} where,
|
|
P = pounds of TNT required,
|
|
D = diameter of round timber, or least dimension of dressed
|
|
timber, in inches, and
|
|
1/40 = .025 = constant.
|
|
Adjustment for explosive other than TNT will be made by dividing by the
|
|
relative effectiveness factor (table 1-2) that pertains to the
|
|
particular explosive being used. The amount of explosive required to
|
|
cut a round timber 30 inches in diameter using an untamped external
|
|
charge is determined as follows:
|
|
P = D}/40
|
|
P = (30)}/40 = 900/40 = 22.50 pounds of TNT.
|
|
|
|
e. CONCENTRATED EXTERNAL CHARGE PLACEMENT. For maximum destructive
|
|
effect concentrated charges should be of rectangular configuration, 1 to
|
|
2 inches thick and approximately twice as wide as they are high.
|
|
Charges are placed as close as possible to the surface of the timber
|
|
(fig 3-2). Frequently it is desirable to notch the tree or timber to
|
|
hold the explosive in place. If the tree or timber is not round and the
|
|
direction of fall is of no concern, the explosive is placed on the
|
|
widest face so that the cut will be through the least thickness. The
|
|
tree will fall toward the side where the explosive is placed, unless
|
|
influenced by lean or wind. Charges on rectangular or square dressed
|
|
timber are placed as shown in figure 3-3.
|
|
|
|
f. RING CHARGE PLACEMENT. The ring charge (fig 3-4) is placed as a
|
|
band of explosive completely circling the tree. The width of the
|
|
explosive band should be as wide as possible, and a minimum of 1/2 inch
|
|
thick for small diameter trees, and 1 inch thick for medium- and large-
|
|
diameter trees up to 30 inches. This technique is used when the
|
|
direction of fall is not important and the elimination of stumps is
|
|
important, e.g., explosive clearing for a helicopter landing zone. The
|
|
amount of explosive is calculated by the external charge formula.
|
|
|
|
3-6. Abatis
|
|
|
|
a. FORMULA FOR PARTIALLY CUTTING TREES TO CREATE AN OBSTACLE OR
|
|
ABATIS. When cutting trees and leaving them attached to the stumps to
|
|
create an obstacle, the formula P = D}/ro or P = .02D} is used to
|
|
compute the amount of TNT required for the test shot. The result of the
|
|
test shot will determine the need for increasing or decreasing the
|
|
amount of explosives required for subsequent shots.
|
|
|
|
b. PLACEMENT OF ABATIS CHARGE. Charges for making fallen-tree
|
|
obstacles are placed as a concentrated external charge the same as in
|
|
paragraph 3-5c, except that they are placed approximately 5 feet above
|
|
ground level. The tree will fall toward the side where the explosive is
|
|
placed, unless influenced by lean or wind. To make the direction of
|
|
fall more certain, a "kicker charge", a one pound block of explosive,
|
|
placed about two-thirds of the distance up the tree on the opposite side
|
|
may be used (fig 3-2).
|
|
|
|
c. SPECIAL CONSIDERATIONS. To be effective these obstacles should be
|
|
at least 75 meters in depth and the felled trees should extend at a 45
|
|
degree angle toward the enemy. The trees on one side of the road should
|
|
not be cut simultaneously, followed by the cutting of the trees on the
|
|
other side of the road. Delayed blasting of the second row of trees is
|
|
necessary to provide time for the trees in the first row to fall and
|
|
thereby eliminate the possibility of trees deflecting one another from
|
|
their desired direction of fall. Likewise, in selection of trees to
|
|
blast for abatis obstacles, the trees in a row should be selected
|
|
spacing great enough to allow the trees to fall without interference
|
|
from other falling trees in the same row. To make the obstacles more
|
|
difficult to remove, they should be mined, boobytrapped, entangled with
|
|
barbed wire or concertina, and covered by fire.
|
|
|
|
=============================================================================
|
|
|
|
/ File 8 / NIA068 /
|
|
/ Comments From The Editors /
|
|
/ Guardian Of Time & Judge Dredd /
|
|
|
|
Hello, with HoHoCon (XmasCon) '90 around the corner we hope to meet most
|
|
of you all there.
|
|
Some of our requests for subscriptions have been lost due to system failure.
|
|
If you did not get this issue of NIA through the Internet and did send us mail
|
|
to be on the list please re-do so. Also, if you wish to subscribe to NIA
|
|
through the Internet (or most any WAN) leave mail at elisem@nuchat.sccsi.com,
|
|
thanks.
|
|
We are currently looking for submissions, if you do have a piece that you
|
|
would like to see printed in upcoming NIA issues, mail us at Face2Face or
|
|
elisem@nuchcat.sccsi.com
|
|
You might have noticed the TIME-TRIP portion of the file, that we will do
|
|
occasionally to bring back memories...
|
|
Any back issues can be picked up from the CuD ftp site or from Face2Face
|
|
BBS. If these two ways are NOT possible, then write to us.
|
|
Look for the new Phrack soon, from our insight on the pieces in it, it looks
|
|
like a gem.
|
|
To get your name off the Lotus marketplace database, call 1.800.343.5414,
|
|
when you hear the voice mail, press 3, then press 2. Wait till the person
|
|
answers and give your name and address.
|
|
EFF newsletter one came out and it is pretty good, take a look at it.
|
|
If you have any questions or comments, please make them, and send in feedback
|
|
on this new format of NIA. Thank You.
|
|
Issues of NIA can be gotten off of Face2Face (Refer: 713.242.6853),
|
|
CuD ftp archives (Refer: CuD 2.15) or Unholy Temple (Refer: 408.PRI.VATE),
|
|
and other boards around the country.
|
|
From GOT "Get to know yourself, if you can't, call the FBI!"
|
|
Oh, and just remember: "No matter how *good* looking she is
|
|
someone
|
|
somewhere
|
|
is sick of her shit."
|
|
GOT & JD
|
|
NIA. Ignorance, There's No Excuse.
|
|
=============================================================================
|
|
|
|
|
|
|