... OLDDATE
Causes the date and time used in the page heading to be the file’s last change date and time. When this option is not used the current system date and time displays.
PAGE
Indicates that the first page displayed is page number nnn. Note: When the output is to the console, the browse keys can still be used to display pages before page number nnn.
PRTnn
Indicates that List is to print file on the attached printer number nn. The option keyword PRT may be specified as PRT, PRINT or PRINTER.
TITLE
The word or quoted term following the keyword TITLE is used in the heading line instead of the file’s file name. >list / (title "Device Names" Device Names GUTENB1 12:136:0 GUTENB2 21:136:1 GUTENB3 22:136:2
...
326 List
23 Mar 2002 11:55am Page 1 SPO C241,W8;Jupiter.cpw.lan - HP LJ 4 Plus SPO C241,W8;Jupiter.cpw.lan - HP DeskJet 690C SPO C241,W8;Jupiter.cpw.lan - Phaser 860DP
TO
This option can only be used when file is direct, indexed or keyed. For direct files, kkk is a number that specifies the last record number displayed. For indexed and keyed files, kkk is the key of the last record displayed. Only records whose keys are less than or equal to this kkk will be included in the display.
TRUNCATE
Each line output is truncated at column nnn. If used in combination with the INDENT nn option, the truncation is performed after the indent spaces are added. When TRUNCATE is not used, lines are not truncated and those lines that are longer than the attached length of the display device (console or printer) are wrapped to the next line.
fromline
The first numeric token is assumed to be the starting line or record number. This can only be used on stream and direct files. Use the FROM option for keyed and indexed files. This option indicates that the first line or record displayed is fromline. When the output is to the console, the browse keys can still be used to display pages containing records before fromline.
toline
The second numeric token is assumed to be the ending line or record number. This can only be used if fromline is specified on a stream or direct file. Use the TO option for keyed and indexed files. This option indicates that the last line or record displayed is toline. The browse keys cannot be used to display beyond this toline record.
List
327
Commands
This option can be used with or without the FROM option.
List Displays
Most files are displayed as text. For instance: >list /theos/help/english/cat.hlp /THEOS/HELP/ENGLISH/CAT.HLP:S
23 Oct 2002 8:26am Page 1
Commands
THEOS Help for Cat Command Cat Command
...
This type of display is used by default for all files except programs, which use the binary display format described next. The heading line of all displays on the console or printer (not those redirected to a file) shows the file name on the left and the date, time and page number on the right. This heading line can be suppressed with the NOHEAD option, and the date can be set to the file’s last change date with the OLDDATE option. C language source programs can set the left side of this heading line with the #title directive. For multiple-page displays, the standard page browsing keys are recognized. Refer to “Multiple-page Display Browsing” on page 79 of the THEOS Corona Version 5 Operating System Reference. In addition to these standard keys, you may also use (PageUp) and (PageDown) following a number such as: (6),(PageDown). This means to advance six pages rather than the default of one page.
328 List
Binary & Hex Displays
Program files do not contain ASCII text data and are always displayed using the BINARY display format. >list sample. command SAMPLE.COMMAND
23 Oct 2002 8:26am Page 1
Commands
000000: 8603DEC0 4E060000 6C010000 00080000 '..݃N...l.......' 000010: 940e0000 01000800 00006000 00000100 '..........`.....' 000020: 00000000 b00ac15f 35623e56 061b8161 '....».‰_5b>V...a' ...
In this display each line contains three pieces of information. On the left side is the relative location in hexadecimal. In the middle, 16 bytes of the file are shown in hexadecimal. This middle section is grouped in four, four-byte columns. On the right is the ASCII representation of those 16 bytes of the file. Any bytes that do not have a corresponding ASCII character are shown with a period. This display format can be forced for any file by using the BINARY option. Data files (direct, indexed and keyed) can use a third type of display invoked with the HEX option: >list customer.master (hex
CUSTOMER.MASTER KEY: 0000: 0010: 0020: DATA: 0000: 0010: 0020: ...
23 Oct 2001 8:26am Page 1
41414120 56656E64 696E6720 53706563 'AAA Vending Spec' 69616C69 73747300 00000000 00000000 'ialists.........' 00000000 00000000 '........' 041A3132 38323820 536F7574 68776573 '..12828 Southwes' 74205061 726B2050 6C616365 0400040D 't Park Place....' 43617374 726F2056 616C6C65 79040243 'Castro Valley..C'
or >list system.theos32.keyword (hex
SYSTEM.THEOS32.KEYWORD Direct record: 0000: 31594553 Direct record: 0000: 314E4F20 ...
1, reclen: 10 20202020 200D 2, reclen: 10 20202020 200D
23 Oct 2001 8:26am Page 1 '1YES
.'
'1NO
.'
List
329
This HEX display is similar to the BINARY display except each record is displayed separately, with the first column showing the relative location of the data within the record. For keyed and indexed files, the key is shown separately from the record. Direct files show the record number and record length on a line directly above the record contents.
Commands
Notes
If file is a “typeless” file description, there is no default library defined and the environment variable FILETYPE is defined, the value of FILETYPE is appended to file to form a complete file description with file name and file type. To list a typeless file, you should specify the file description with a period terminator. Refer to page 103 for more information about this environment variable. MultiUser BASIC language source programs are displayed by passing the file name with the option LIST to the BASIC32 command. For instance: >list sample.basic
is identical to: >basic32 sample.basic (list
Defaults
HEADING is a default option. BINARY is a default option when programs
are listed. Restrictions
The file must have read access enabled. See “File Access Protection” on page 145.
See also
CopyFile, FileManager, More, TBrowse, Viewer, WinWrite
The BASIC language compiler has a built-in ability to list BASIC language source programs.
330 List
Load Command The Load command loads a program or data file into memory for subsequent usage.
LOAD
program...
Operation
»
name of program or file to load into memory
The program is loaded into memory. When program is a simple name, the following locations are searched: /THEOS/COMMAND/program.CMD program.CMD
If program is already loaded into memory a second copy is not loaded. Notes
Any compiled program (organization code “P” or “Program”) may be loaded into memory. In addition, the /THEOS/CONFIG/DEVNAMES.TXT file may also be loaded. Programs are normally loaded into memory when needed and their use count is set to one. If a program is already in memory because another user or task is using it, or the program was loaded by this command or the system start-up process, that copy of the program is used and its use count is incremented. When a program is no longer needed by a user (program exit), its use count is decremented and, if zero, the program is unloaded. Programs loaded by this command or the system start-up process never have their use count decremented to zero except by Unload which is described on page 717.
Disk Caching
Loading programs and certain key data files into memory before they are needed can increase the performance of your system slightly. However, if sufficient memory is set aside for disk caching, the performance increase will be minimal, at best, and may even degrade. When disk caching is enabled, it is best to not load any programs or files with this command or Sysgen.
Load
331
Commands
program
Commands
Caution
Do not make changes to programs or files (with LineEdit, Patch, recompilation, etc.) that have been loaded into memory. Any changes to the files affect only the disk image of the file and not the loaded version. Before making changes you should first Unload the program and file. Do not erase or change the location of a file from disk after it has been loaded. If this is done, the loaded copy of the file will not be used and cannot be unloaded except by rebooting the system.
Restrictions
The Load command requires a privilege level of five.
See also
Sysgen, Unload
332 Load
LogName Command Displays the account name that you are logged onto.
LOGNAME The current account name is output to the standard output device. >logon develop >logname DEVELOP
See also
Ident, Show WHO, WhoAmI
LogName 333
Commands
Operation
Commands
334 LogName
Logoff Command Logon Command The Logoff command logs off of the current account; the Logon command logs onto a new account.
LOGOFF
2
LOGON
account ( option
account
»
account name
option
»
NOEXEC
Operation
Commands
1
NOTERM
TERM
Mode 1—You are logged off of the current account. Logging off includes: All files opened by this user are closed and all file and record locks are removed. (This is actually done by the system prior to invoking the Logoff command.) All screen windows are closed. See wFinish command described on page 750. A message displays showing the time and date of the logoff and the elapsed time that you were logged onto the system, along with the amount of CPU time used while logged onto the system. If HISTORY is ON, a record is written to the system history log file recording the fact that you have logged off of an account. See “System History File” on page 217 of the THEOS Corona Version 5 Operating System Reference. All privately attached devices (other than the console, slave printers and VDI devices) are detached. All publicly attached devices are reattached. This includes the devices attached via Sysgen and those attached by you or other users with the Attach command with option PUBLIC. The queues assigned to the public spooled printers are reassigned to their initial values. Spooled printers defined by Sysgen are assigned the queues defined in Sysgen, other printers are assigned queues in a one-to-one basis such as queue A to PRT1, queue B to PRT2, etc. All user environment variables are cleared.
Logoff
335
>logoff Logoff at 9:12am PDT on Wednesday, October 16, 2001. Duration 1:48:36, cpu 53.780.
Commands
After Logoff completes (and the connection was not terminated because of the Exit command or the TERM option), it invokes a special mode of the Logon command that prompts you for the new account name and password.
Mode 2—The Logon command has two modes of operation: one invoked by the Logoff command and the other invoked when Logon is invoked from a command line. When Logon is invoked by Logoff, it finds and displays the contents of the file /THEOS/MENU/language/LOGON.MNU:S. It then displays the Logon form shown above. When Logon is invoked from a command line, it performs a lateral logon. The Logoff process is not invoked but the current elapsed time and CPU time are transferred to the new logon session. In this mode you must specify the account name on the command line and you cannot include the password with the account name. If the account has a password, you are prompted for it with Logon form shown above but with the “Account Name” field already filled in with the account name. A lateral logon does not clear existing user environment variables, does not detach private devices and does not reattach public devices. It resets only the account name and number and the privilege level of the account. Other system environment variables are changed only if the new account’s 336 Logon
environment definition specifies new settings. The UserName is not changed unless there is no value for that variable currently. In both modes of Logon, when the account name and password are properly entered, the logon process is performed:
The system’s time-of-day clock is adjusted for any change in daylight savings time, if necessary. See “Daylight Savings Time and Automatic Adjustment” on page 259 of the THEOS Corona Version 5 Operating System Reference. If the TERM option is in effect, the EXEC program that invoked the Logon is terminated. When NOTERM is in effect (a default option), the EXEC program that invoked the Logon command is not terminated. If HISTORY is ON, a record is written to the system history log file recording the fact that you have logged onto an account. See “System History File” on page 217. Unsuccessful attempts to log onto an account are also recorded there. If a /SYSTEM.LOGON:S file exists it is displayed on the console. If account is not the system account or a synonym to it, the /account.LOGON file is displayed on the console. If a /SYSTEM.REMINDER file exists and there is one or more entries for today’s date, the reminder messages are displayed. If account is not the system account or a synonym to it and the account.REMINDER file exists and there is one or more entries for today’s date, the reminder messages are displayed. See “Reminder” on page 479. If the NOEXEC option is not used, a search is made for an EXEC program with a file-name or member-name of account. The normal locations for programs are searched and the environment variable PATH is used when searching for these logon files. All drives in the drive search sequence are examined. If an EXEC program is found, it is executed; otherwise processing continues at the CSI or with the next statement in the EXEC program that invoked Logon (if NOTERM is in effect).
Logon
337
Commands
The environment switches and variables are set according to the account definition. See “Account” on page 13. If the new work drive is different than the prior work drive, the work files are copied to the new work drive.
Commands
Options
Notes
NOEXEC
Do not execute the account EXEC.
NOTERM
Do not terminate execution of the EXEC calling the Logon command. This is a default option.
TERM
Terminates execution of an EXEC program if it was executing when Logon was invoked.
When the user is connected via a network connection, use the Exit command to log off and disconnect the user. Neither the Logoff nor the Logon commands clear the console display. However, one or more of the displayed files ( /SYSTEM.LOGON:S or /account.LOGON:S ) may clear the screen by embedding a form-feed code (^L) in the text file. You may refresh the display by pressing (Enter) on a blank logon name. This is useful if you have started a user session on a terminal that was powered off. When the user turns the terminal on they can press (Enter) to see the logon prompt.
Defaults
NOTERM is a default option.
See also
Account, Exit, LogName, Show, Start, Stop, Sysgen
338 Logon
Look Command The Look command searches files for specific text.
LOOK
file ( pattern ...
2
LOOK
file ( option pattern ...
3
LOOK
pattern
Commands
1
file
»
file name with optional path; may include wild cards
pattern
»
text string to look for; may contain “regular expressions”
option
»
APPEND EXEC FILES
Operation
Mode 1—Search file for every instance of pattern. When more than one pattern is specified, each record or line is search for each of the patterns. Mode 2—Similar to Mode 1 except that file may be a text file containing a list of files (option FILES) or the result of the search may be output to FOUND.EXEC rather than displayed on the standard output device. Mode 3—Similar to Mode 1 except that the files searched are found in the currently defined default library or, if no default library is defined, all files using the default FILETYPE. For all modes, file is examined, record by record, looking for any and all instances of pattern. An exact match must occur between pattern and the text in the file. This exact match does not include the case mode of the characters. To perform inexact match comparisons, the pattern must contain regular expressions (see “Regular Expressions” on page 341). When Look displays its results on the console, it displays every line of the file that contains pattern. The pattern in the line is highlighted in reverse video and the line is identified with its line number: >look /theos/help/english/look.hlp ("THEOS" File: /THEOS/HELP/ENGLISH/LOOK.HLP:S 3 THEOS Help for Look Command 17 Unlike other THEOS commands, the options 38 >LOOK SYSTEM. THEOS 32.DEVNAMES ("Wyse"
Look
339
When more than one pattern is specified, it means “or.” For instance: >look some.file ("the" "and" "of"
Will look in SOME.FILE for the characters “the” or “and” or “of.”
Commands
Options
If any of the following options are used, they must be specified at the beginning of the option list before any pattern is specified. APPEND
Indicates that, if file contains pattern, the complete path and file name of file is output to FOUND.EXEC, appending a line to any existing FOUND.EXEC.
EXEC
Indicates that, if file contains pattern, the complete path and file name of file is output to FOUND.EXEC, similar to the FileList EXEC option. Any existing FOUND.EXEC file is erased first. Thus, if no file contains pattern, the FOUND.EXEC will be empty. If APPEND is used instead of, or in addition to EXEC, any existing FOUND.EXEC is not erased and any file containing pattern causes lines to be appended to the end of the existing FOUND.EXEC. >look /Theos/Help/English/*.* (exec FILES >list found.exec (nohead &1 &1 &1 &1
/THEOS/HELP/ENGLISH/B3220.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10 /THEOS/HELP/ENGLISH/BASIC32.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10 /THEOS/HELP/ENGLISH/CHANGE.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10 /THEOS/HELP/ENGLISH/COPYFILE.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
... FILES
Indicates that file is an ASCII stream file with each record in the file specifying a single file name. The file name specifications in this file may include the path to the file and wild cards. The SELECTED.EXEC and SELECTED.FILES files created by the FileList command and the FOUND.EXEC created by previous usage of the Look command, can be used for this specification file or you may create the file with an editor or application program. For instance, the FileList is used to create a list of files to be examined: >filelist /Theos/Help/English/*.* (10/1/01 exec append
340 Look
A SELECTED.EXEC file now exists that lists all help files that have been changed since 10/01/2001. The following commands create a list of these files that contain “PRT” and then, using that list, examines the files that contain “PRT” to find files that also contain “SORT.” Commands
>look selected.exec (files exec "PRT" >look found.exec (files "SORT" File: /THEOS/HELP/ENGLISH/ACCOUNT.HLP:S 40 SORT When used with the TYPE or PRT ...
Notes
When one or more options are used, they must be specified before any pattern. If no option is used and the pattern looks like an option, a “null” option should be used. >look some.file ("" "EXEC"
If file is a “typeless” file description, there is no default library defined and the environment variable FILETYPE is defined, the value of FILETYPE is appended to file to form a complete file description with file name and file type. To examine a typeless file, you should specify the file description with a period terminator. See “FILETYPE” on page 103 THEOS Corona Version 5 Operating System Reference for more information about this environment variable. The search pattern is case-insensitive. The Look command can examine non-text files and it can examine nonstream data files. When Look opens file it opens it as a stream of bytes and does not consider the file’s organization. For instance, when file is an indexed data file it can find character patterns in deleted records. When file is not a stream text file the location that it reports is the offset from the beginning of the file, in bytes. Return Codes
The return code is set to zero if file does not contain pattern; otherwise, the return code is set to one.
See also
Compare, FileManager, List
Regular Expressions
pattern is actually a string expression called a regular expression. A regular expression is a sequence of characters consisting of literal characters and metacharacters. Literal characters are characters that match in a one-for-one relationship with the text in the file. For instance, the search pattern “abc” is comLook
341
posed solely of literal characters. This pattern matches only when the text file contains a sequence of three characters that exactly equals ‘a,’ ‘b,’ and ‘c.’
Commands
In addition to the normal ASCII characters, you may specify certain control characters as literal characters. These control characters must be specified with the following codes: Specification
Meaning
\a
BELL or (Ctrl)+(G) code.
\b
Backspace or (Ctrl)+(H) code.
\f
Form-feed or (Ctrl)+(L) code.
\n
New-line or (Ctrl)+(J) code.
\r
Return or (Ctrl)+(M) code.
\t
Tab or (Ctrl)+(I) code.
\v
Vertical tab or (Ctrl)+(K) code.
\0
Null or (Ctrl)+(@) code.
\'
Single-quote character
\"
Double-quote character
Table 9: Regular Expression Control Character Specification
A metacharacter is a character or group of characters that represents something other than themselves. The wild cards allowed for file specifications by most of the THEOS commands are examples of metacharacters.
342 Look
The following table shows all of the metacharacters allowed in regular expressions. Specification
Meaning Anchor to start of line.
\$
Anchor to end of line.
\. or \?
Commands
\^
Any character matches.
\@
Any letter matches (A–Z and a–z).
\#
Any digit matches (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0).
\\
Metacharacter escape. This is how a backslant literal character is specified.
\[
Start character set.
\]
End character set.
\{
Start general repeat specification.
\}
End general repeat specification.
\*
Repeat zero or more times.
\+
Repeat one or more times. Table 10: Regular Expression Metacharacters
• Regular Expression Anchors The first two metacharacters are called anchors. These anchor other text to the beginning or end of the record searched. For instance, the pattern "\^The"
means that “The” is searched for but only when it occurs at the beginning of a record. Similarly, "the\$"
is a pattern that means search for “the” at the end of a record. Note that this last pattern will not find “the” if there is a space at the end of the line.
Look
343
• Regular Expression Wild Cards There are three “wild card” metacharacters that allow you to search for matches on any character (\.), any letter (\@) and any digit (\#). For example, the pattern:
Commands
"THEOS\#86"
will match any sequence of characters starting with “THEOS,” followed by any single digit, followed by an “8” and a “6.” Thus, it will match “THEOS186,” “THEOS286,” “THEOS386,” “THEOS486,” etc. • Regular Expression Character Sets Searching for one character of a set of characters is done by specifying a character set. For instance, to search for a hexadecimal digit you would specify a pattern containing: "\[0123456789ABCDEFabcdef\]"
This pattern specifies a match on any character that is either a digit, an uppercase ‘A’ through ‘F’ or a lowercase ‘a’ through ‘f.’ As a convenience, when specifying character sets there are two characters that have special meaning. The hyphen or dash character ( - ), when specified between two characters, indicates a character set range. For instance, the above pattern could have been specified with: "\[0-9A-Fa-f\]"
which means the set of characters ‘0’ through ‘9,’ ‘A’ through ‘F’ and ‘a’ through ‘f.’ Ranges specified with the hyphen character refer to ranges in the ASCII collating sequence. The hyphen does not have a special meaning when it occurs at the beginning or end of a character set specification. Thus, the pattern: "\[-0-9\]"
means the set of characters dash and the digits 0 through 9. The circumflex ( ^ ) is the other character that has special meaning when used in a character set specification. When the circumflex is used at the start of the character set specification, it means that it is an exception set. That is, it is a specification of characters that do not match. For instance, the pattern: "\[^A-Z\]"
344 Look
means a match on any character except uppercase letters. When the circumflex is used in a position other than at the start, it is merely a character included in the set. • Regular Expression Repeat Counts
" \@\{4,6\}\[ .\]"
means that you want a match on a space, followed by four to six letters, followed by a space or period. It is not necessary to specify both the minimum and maximum repeat count values. A missing minimum value uses the default value of one for the minimum; a missing maximum value uses infinity for the maximum. Thus, a pattern repeat count of “\{5\}” means five or more occurrences; a pattern of “\{,5\}” means one to five occurrences. As a convenience, there are two special metacharacters for specifying common repeat counts. The metacharacter “\*” is a shorthand specification for the repeat count “\{0\}” meaning zero or more occurrences. The metacharacter “\+” is a shorthand specification for the repeat count “\{1\}” meaning one or more occurrences.
Look
345
Commands
A search pattern may be repeated by using the repeat metacharacters “\{” and “\}” to enclose the minimum and maximum repeat counts. For instance, the pattern:
Commands
346 Look
Lowcase Command Filter Lowcase copies a file to the standard output device, converting all letters to lowercase.
LOWCASE
2
LOWCASE
file
file
»
Command synonym: Operation
Commands
1
file name with optional path; wild cards are not allowed LC
Mode 1—file is copied to the standard output device with all uppercase letters converted to lowercase. The original file is unchanged. >lowcase /Theos/OS/Message/English/synonym.txt account 3 archive 2 asm32 3 attach 1 ... >lowcase /Theos/OS/Message/English/synonym.txt > synonym.list
Mode 2—Copies standard input to standard output, converting all uppercase letters to lowercase. This form is normally used only in a pipe. However, if standard input is the console, records are copied until a (Ctrl)+(D) is encountered, signaling the end of the input file. >filelist *.* | lowcase > file.list
Notes
The command name LC is a synonym to the Lowcase command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGES/language/ SYNONYM.TXT file and, if standard synonyms are disabled (see “Account” on page 13 of this manual and “STDSYN” on page 110 of the THEOS Corona Version 5 Operating System Reference), this synonym name may not be allowed.
Restrictions
file must be a stream file.
See also
Upcase
Lowcase
347
Commands
348 Lowcase
Mailbox Command The Mailbox command sends a message to another user’s mailbox or retrieves your messages.
MAILBOX
user
2
MAILBOX
user text
3
MAILBOX
user file
4
MAILBOX
( option
file
»
file name with optional path
text
»
message text to send
user
»
account name to send mail to
option
»
PURGE PURGE *
Commands
1
The first three modes of the Mailbox command send mail to other users. The fourth mode retrieves or removes your mail. Operation
Mode 1—This is the normal, multi-line mode of the Mailbox command. When the command is entered, you are prompted to enter one or more lines of text. To end the “mail,” press (EnterÌ˛) at the beginning of a line with no text or spaces in it. >mail shirley Enter message text terminated by empty line. Shirley,(EnterÌ˛)
(EnterÌ˛) The company picnic has been scheduled in August.(EnterÌ˛)
(EnterÌ˛)
Please call me by Friday so we can arrange a planning(EnterÌ˛) meeting as we have a lot to do in the next two weeks.(EnterÌ˛)
(EnterÌ˛) >
To enter a blank line without ending the message, remember to enter at least one space before pressing (EnterÌ˛). After a line is entered you cannot edit it. You can prepare a long message with an editing program and then send it with Mode 3.
Mailbox 349
Mode 2—For short, single-line messages, this mode allows you to specify the message text on the command line. If the text contains commas, quotation marks or other punctuation characters, you should enclose the entire message in quotation marks. >mail dave Please call me when you get in. It's important.
Commands
>mail eric "Your package arrived, and it's big. Call me."
Single-word messages cannot be sent with this mode because Mailbox will assume that the single word is a file name and it will try to use Mode 3. Mode 3—Sends a previously created text file to account’s mailbox. Use this mode to send large messages to a user or to send the same message to several user accounts. Create the file with LineEdit, WindoWriter or a customized application. >mail accntg my.mail
Mode 4—This mode retrieves your mail or removes old mail from your mailbox. >logon accntg
>mailbox
As each message is displayed you are asked if you want to delete it. If you respond (Y) then the message is marked as deleted (it is not physically
350 Mailbox
deleted until the system manager uses the PURGE option described below). Respond with (N) if you do not want it deleted at this time. Each time that Mode 4 is used without one of the PURGE options, all mail for your account is displayed whether it has been read before or not. When a message is read and marked as deleted it is not displayed again.
Notes
The two PURGE options can be used only when you are logged onto the SYSTEM account (id zero) and require a privilege level of five. PURGE
Removes all mail that has been marked as deleted.
PURGE *
Removes all mail that has been marked as deleted and all mail that has been read but not deleted.
Users are notified that there is mail waiting for them when they log onto the account (see “Logoff” on page 335). They can then use Mode 4 of the Mailbox command to read their mail. Mail for all users is saved in the file SYSTEM.MAILBOX:S. This file is created automatically the first time that Mailbox is used. Mail is only removed from this file with the PURGE option. Do not confuse this command with THEO+Mail and the mail sent and received over the Internet with that command. Mailbox operates on mail sent by the Mailbox or Msg commands only.
Restrictions
The PURGE and PURGE * options require that you be logged onto the SYSTEM account (account id=0) and that you have a privilege level of five.
See also
Logon, Msg , Reminder
Mailbox 351
Commands
Options
Commands
352 Mailbox
MakeBoot Command EXEC MakeBoot creates an Emergency Boot Diskette using the current operating system and
configuration.
drive Operation
drive »
Commands
MAKEBOOT
optional disk drive attachment letter
When MakeBoot is invoked it displays the following menu screen.
Use the normal menu selection keys to select the desired function. Use existing floppies. Choose this menu item if the diskettes are already formatted. MakeBoot clears the existing directory and resizes it to gain some additional space. Format floppies first. Choose this menu item if the diskettes are not formatted. MakeBoot formats the diskettes using the highest capacity available on the drive. Then it copies the necessary files. Exit. This menu item exits MakeBoot without modifying the diskette. Notes
MakeBoot requires two diskettes to hold the necessary files for booting the
computer. Be sure that you have these diskettes available before starting the process. MakeBoot will ask you to put the first diskette in the drive and then it will
format the diskette (if that option was selected), copy the necessary files to the diskette and then ask for the second diskette. It then formats that diskette (if selected) and copies the necessary files to that diskette.
A bootstrap loader is written to the first sectors of the first diskette. There will be some space available on the second diskette and you may copy additional files and programs if there is sufficient room for them.
MakeBoot 353
MAKEBOOT Files:
The files copied to this “Emergency Boot Diskette” include:
Commands
File Operating system
/THEOS/OS/NUCLEUS.SYS
Command string interpreter
/THEOS/OS/CSI.SYS
Device drivers
/THEOS/DRIVER/CLASS901.SYS /THEOS/DRIVER/DEV1.SYS /THEOS/DRIVER/DEV2.SYS /THEOS/DRIVER/DEV3.SYS /THEOS/DRIVER/DEV64.SYS /THEOS/DRIVER/DEV101.SYS /THEOS/D RIVER/FORM2.SYS
354 MakeBoot
SYSGEN configuration
/THEOS/CONFIG/SYSGEN.CFG /THEOS/CONFIG/INSTL IST.CFG /THEOS/CONFIG/L ANGCODE.CFG
Accounting structure
/THEOS/CONFIG/ACCOUNT.BIN
System support files
/THEOS/OS/L OADER3.SYS /THEOS/OS/L OADER4.SYS /THEOS/OS/L OADER5.SYS /THEOS/OS/PCMCIA.SYS /THEOS/OS/CLOCK.SYS /THEOS/CONFIG/DEVNAMES.TXT /THEOS/OS/RESMGR.SYS /THEOS/OS/M BR.SYS /THEOS/OS/L OAD04GB.SYS /THEOS/OS/L OAD0LFS.SYS /THEOS/OS/SESSMAN.SYS /THEOS/OS/WM.SYS /THEOS/OS/M ESSAGE/ENGLISH/K EYWORD.BIN /THEOS/OS/M ESSAGE/ENGLISH/M ESSAGE.BIN /THEOS/OS/SCSI1.SYS /THEOS/OS/SCSI2.SYS /THEOS/OS/SCSI3.SYS /THEOS/OS/SCSI4.SYS /THEOS/OS/SCSI5.SYS /THEOS/OS/I2OMSG.SYS /THEOS/OS/USB.SYS /THEOS/OS/M ESSAGE/ENGLISH/SYNONYM.TXT
Commands
/THEOS/COMMAND/ATTACH.CMD /THEOS/COMMAND/COPYFILE.CMD /THEOS/COMMAND/DISK.CMD /THEOS/COMMAND/FILEL IST.CMD /THEOS/COMMAND/LOGON.CMD /THEOS/COMMAND/M OUNT.CMD /THEOS/COMMAND/SETUP.CMD /THEOS/COMMAND/SYSTEM.CMD /THEOS/COMMAND/TBACKUP.CMD
File Command support files
1. The specific class code currently attached to the main console. When this “Emergency Boot Diskette” is booted, there are sufficient commands to format the hard disk, attach different devices, restore from tape, “system” to the hard disk, etc. It is not intended as a general boot disk. There may be sufficient space available on the disk to add more commands. If you do, remember to include any support files needed by the command (such as menus). You should not copy help files to this diskette. If any significant changes are made to the system on the hard disk, you should recreate the “Emergency Boot Diskette.” Significant changes would include an upgrade to the operating system, new or changed account environments, hard disk controller change and a change in the main console configuration or attachment. Defaults
The default drive is F, which is normally the first floppy drive.
Restrictions
MakeBoot can only be run if you are logged onto the system account.
The diskette must be 1.44MB. 1.2MB diskettes are too small to hold the necessary files. Using the Diskettes
Refer to the section “Booting with the Emergency Boot Diskettes” on page 28 THEOS Corona Version 5 Operating System Reference for a description of how these disks are used.
See also
CopyFile, Disk
MakeBoot 355
Commands
/T HEOS/MENU/ENGLISH/ATTACH.MNU /T HEOS/MENU/ENGLISH/DISK.MNU /T HEOS/MENU/ENGLISH/FILELIST.MNU /T HEOS/MENU/ENGLISH/FORM2.MNU /T HEOS/MENU/ENGLISH/RESTORE.MNU /T HEOS/MENU/ENGLISH/SETUP.MNU /T HEOS/MENU/ENGLISH/TBACKUP.MNU /T HEOS/MENU/ENGLISH/TLOGON.MNU /T HEOS/MENU/ENGLISH/LOADER5.MNU
Commands
356 MakeBoot
Message Command The Message command displays or maintains the /THEOS/OS/MESSAGE/language/MESSAGE.BIN file.
MESSAGE
* ( PRTnn
2
MESSAGE
3
MESSAGE nnn operand...
nnn
»
message number to display
operand
»
optional argument used by the message
Operation
Commands
1
Mode 1—Displays all of the messages defined in /THEOS/OS/MESSAGE/language/MESSAGE.BIN. >message * 0: 1: 2: 3:
Logon please: \a Password? Command not found.\n Insufficient memory.\n
...
Mode 2—This is the message maintenance mode. When this mode is entered, you are prompted to enter the message number: >message Enter message number:
At this prompt enter either the number of the message you want to view or change, or press (EnterÌ˛), (Esc) or (F9) without a number to exit. When a number is entered the current definition is displayed and you are asked for the new definition: >message Enter message number: 3 Old text: Insufficient memory.\n New text:
Message
357
To leave the message unchanged, press (EnterÌ˛), (Esc) or (F9) without any characters or spaces. To change or define a message, enter the new text. Messages may be a maximum of 64 characters in length. For information about message content and codes used, refer to “Message File Syntax” below. Commands
When the new text for the message is entered, press (EnterÌ˛) and you are prompted for another message to change. Mode 3—Displays message number nnn on the console (not the standard output device). If the message uses variables, the operands are used for the value of these variables. Any missing operands are displayed with an ellipsis. >message 7 Invalid command syntax. >message 19 File "..." not found. >message 19 abc.def:g File "ABC.DEF:G" not found. >message 117 "Wednesday" "August" 7 2001 Date is set to Wednesday, August 7, 2001.
Options
PRTnn
Message File Syntax
Message text may contain plain text, display codes, video attributes, variable arguments and conditional expressions. Plain text includes all of the ASCII displayable characters (letters, digits, punctuation, etc.).
Indicates that Message is to print the messages on the attached printer number nn. The option keyword PRT may be specified as PRT, PRINT or PRINTER. As a convenience, PRINTER1 may be specified as P.
• Display Codes There are four display codes that can be embedded in a message: Code
358 Message
Meaning
\a
Sound the console bell.
\n
Start a new display line.
\t
Output spaces to next tab stop.
\\
Output a single backslant character.
• Video Attributes Video attributes such as reverse video, blink, etc. are specified by using their octal values preceded by a backslant, zero. Some of the common codes include: Meaning
\016
Reverse video on.
\017
Reverse video off.
\013
Underline on.
\026
Underline off.
\035
Blink on.
\036
Blink off.
\04
Half intensity on.
\05
Half intensity off.
\0202
Status line start.
\0203
Status line end.
Commands
Code
• Variables Message text may specify that variable information will be inserted at the time the message is displayed. For instance, message 19 displays as “File "xxx" not found.” To indicate that the file name is inserted between the quotation marks, a variable number is used. In message text, variables are always indicated by using a pair of “curly brace” characters to surround a variable number. Messages containing only one variable use variable number zero. Messages with more than one variable use numbers one, two, three, etc. For instance: 19: File "{0}" not found.\n 34: Device "{1}" is already attached to process {2}.\n
• Conditional Expressions Messages can use conditional expressions to evaluate the value of a variable and display different information depending upon that value. The general syntax for a conditional expression is: {variable?value1=text1,value1=text2,...,text}
The value of variable is tested to see if it is value1, value2, etc. If it matches any of those values, then the corresponding text is output as the value of the expression. When a term does not have an equal sign it means Message
359
that this is the “otherwise” clause and that text is output when the variable is not one of the previously listed values. An asterisk means that the original value of variable is used. For instance, message 105 is defined as: 105: {0?0=No,1=One,*} file{0?1=,s} changed.\n
Commands
This message will be displayed three different ways depending upon the value of the variable zero. >message 105 0 No files changed. >message 105 1 One file changed. >message 105 2 2 files changed.
As you can see from the second variable expression {0?1=,s}, you can specify that nothing is output when the variable is a specific value. This expression states that if variable 0 is a “1,” output nothing; otherwise output an “s.” Notes
Although the display produced by Mode 1 is similar to the display produced by the List command, there are two significant differences: 1. The message numbers displayed by the Message command are numbered from zero, corresponding to the numbers used by programs to request one of the messages. 2. Embedded control codes are displayed graphically rather than interpreted. For instance, a new-line is displayed as \n.
Cautions
The /THEOS/OS/MESSAGE/language/MESSAGE.BIN file contains all of the message text used by the operating system and its utilities. Changing an existing message can affect many programs. You should not use any of the currently unused message numbers for your own purposes. All unused numbers are reserved for operating system usage. As updates to the software require new message text, they are added to this file. Also, this file is replaced in its entirety whenever the operating system is installed or updated.
See also
360 Message
Keyword
Mixer Command The Mixer command allows you to set the volume for various sound devices and files.
MIXER When invoked, the Mixer command displays the Mixer control screen:
Use your mouse or the (TabÌ¢) and (ñÌShift)+(TabÌ¢) keys to position to fields that you want to change and then enter the desired values. The top line of values set the left channel volume for the device and the middle line sets the right channel volume. The bottom check boxes mute or unmute the devices. The volume values are set by using the (˚) and (˙) keys or by using the mouse and clicking on the upper or lower portion of the object. Volume values range from 0 (off) to 31 (maximum). Master
Controls the volume for all devices. The actual volume for a specific device is a combination of the value for the device and the value specified here.
Wave
Controls the volume of WAV sounds (see “Play” on page 455)
Midi
Controls the volume for playing midi sounds (not supported at this time).
Mixer 361
Commands
Operation
Commands
CD
Controls the volume of the sounds played from an audio CD (see “CDPlayer” on page 59).
Line
Controls the line-in component of the sound card.
Mic
Controls the microphone input volume of the sound card.
Notes
This command only controls the volume of sounds played from the main console. Sounds played during a TWS session are controlled by the computer and software on the client system.
Restrictions
You must have a sound card configured. Refer to the THEOS Corona Version 5 Operating System Installation and Setup Guide for a description of Setup SndCard.
See also
CDPlayer, Play
362 Mixer
MkDir Command The MkDir command creates a new subdirectory.
MKDIR
directory
( option »
new subdirectory name; may include path
option
»
SIZE
Command synonym: Operation
Commands
directory
MD
Creates a new, empty subdirectory named directory. >tree / >mkdir subdir >tree / subdir >md subdir/sub >tree / subdir sub
You can create a directory on another account by prepending the account name to the path for directory. For example: >mkdir account\subdir
The above command creates the directory SUBDIR in the account named ACCOUNT. Options
SIZE
Specifies the initial size of the new directory. The number of initial entries is specified following the keyword SIZE. >mkdir Example (size 48
When SIZE is specified, the new directory will be created large enough to contain the requested number of directory entries if the file names for each directory entry use 8.8 names. When this option is not used, the initial size of the directory is suffiMkDir
363
cient to hold about 130 files with 8.8 character file names. Use the SIZE option if you want to create a small directory size or one that is much larger than the default.
Commands
Notes
Directories in the Corona operating system are automatically extendable. When a directory becomes full and a request is made to add another file to it, the directory is made larger. The SIZE option should be used if you know that a directory will need to contain a certain number of files. Directory access is more efficient if it is not an extended directory but was created sufficiently large enough to start with. Directory names may be “long file names.” Unlike other commands, it is not necessary to enclose a long directory name within quotes unless you want to maintain the casemode of the characters used in the name. All tokens in the directory portion of the command line are interpreted as part of the directory name. For instance: >mkdir "THIS IS A LONG DIRECTORY NAME" >mkdir this is a long directory name
The above two commands will perform the same operation and create the same directory name. The command name MD is a synonym to the MkDir command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGE/language/ SYNONYM.TXT file. If standard synonyms are disabled (see “Account” on page 13 and “STDSYN” on page 110), this synonym name may not be allowed. Defaults
If no account name is specified for directory, the new subdirectory will be owned by the current account. If no path is specified for directory, the new subdirectory is created as a subdirectory to the current working directory.
Restrictions
directory must not be the name of an existing file or subdirectory and it may not be a member of a library. directory should not be /PIPE because this is a reserved name used by the system. You may, however, create a subordinate directory named PIPE, such as: /PRIVATE/PIPE. Subdirectories may be 21 levels deep. This means that /A/B/C/D/E/F/G/H/I/J/K/ L/M/N/O/P/Q/R/S/T/U is valid, but adding another directory under U would be beyond the limit.
See also
ChDir, Create, PWD, RmDir
See “Directories and Files” on page 131 of the THEOS Corona Version 5 Operating System Reference for additional information about directories and subdirectories. 364 MkDir
More Command Filter More copies a text file to the standard output device with page wait and browse capabilities.
MORE
file... ( nnn
2
MORE
( nnn
file
»
file name with optional path; wild cards are not allowed
nnn
»
number of lines to display per page
Operation
Commands
1
Mode 1—Copies file to the standard output device. If standard output is the console, page-waits are performed and browsing capabilities are present. >more /theos/config/devnames.txt
When the console screen is full, More displays its prompt on the last line. The MORE prompt consists of the word “More” and the amount of the file that has been displayed so far. --More--(52%)
At this time you may use any of the browse keys described on page 366. Multiple files may be specified by listing the file names on the command line, one file name after the other. When multiple files are listed this way, the (N) and (P) browse keys are enabled. >more one.file two.file three.file
Mode 2—This mode applies when More is used in a pipe. >number /theos/os/message/english/synonym.txt | more
Options
nnn
Specifies the console page depth to use. When this option is not specified, the console’s attached screen size is used. The screen size can be changed during the display with the (Z) browse key.
More
365
Browse Keys
When the More prompt is displayed at the bottom of the screen you may use the special More browse keys.
Commands
Key
Action
(EnterÌ˛)
Display next line of file.
(ÌÌSpaceÌÌ)
Display next screenful of file.
(D) nnn(F)
Display next half-screenful of file. Skip next nnn screens.
(N)
Skip to next file.
(P)
Skip back to previous file.
(Q)
Quit.
nnn(S)
Skip nnn lines.
nnn(Z)
Set screen depth to nnn and display next screenful of file.
(/)expression
Search for text matching expression. Expression is a regular expression as described on page 341.
(!)command (?)
Execute CSI command and return. Display browse help screen. Table 11: More Command Browse Keys
Notes
When used in a pipe, More should be the last command in the pipe so that its output goes to the console and you can browse through the file using the keyboard. If file is a “typeless” file description, there is no default library defined and the environment variable FILETYPE is defined, the value of FILETYPE is appended to file to form a complete file description with file name and file type. To list a typeless file, you should specify the file description with a period terminator. See “FILETYPE” on page 103 of the THEOS Corona Version 5 Operating System Reference for more information about this environment variable.
Defaults
The default screen depth is the console’s attached page size.
Restrictions
file must be an ASCII stream file.
See also
CopyFile, List, Tee
366 More
Mount Command Mount tells the operating system to reread the label information from a drive because the disk might have been changed.
MOUNT
drive
Operation
»
disk drive letter
This program assumes that the disk in the drive might have been changed. Any current information about drive is disregarded and the disk drive is instructed to recalibrate its heads. This is a process that moves the read/ write head to its home position. If supported by the drive mechanism and controller, the heads are moved slowly. Once the heads are in a known position, the first sectors of the disk are read and the information is saved.
Notes
If a disk is changed and the Mount command is not used, you will receive a message “Disk drive changed, need “XXXX” -” the next time that drive is accessed.
Cautions
Use the MOUNT command every time that a disk is changed, even if the new disk has the same format as the prior disk. If the new disk has the same label as the prior disk, THEOS will not know that the disk has changed and may use information saved from the prior disk to do writes!
Return Codes
This command reads the first sectors of the disk and, depending upon what it finds, sets the return code as follows: Return Code 0
Meaning/Message THEOS disk, mounted successfully
201
Disk not ready
203
Disk not initialized
204
Data transfer error
205
Sector not found
206
Track not found
207
Sector address error
563
Disk does not have a THEOS file system on it
Restrictions
You cannot Mount the S drive. Use the System command instead.
See also
Attach, Disk, Reboot, System
Mount
367
Commands
drive
Commands
368 Mount
Move Command Move a file or group of files from one location to another.
MOVE from-file
to-file ( options
2
MOVE from-file
to-drive ( options
3
MOVE file ( FILES options
4
MOVE ( options
Commands
1
file
»
file name of specifications file, with optional path
from-file
»
file name of source file, with optional path; may contain wild cards
to-file
»
file name of destination file, with optional path; may contain wild cards
to-drive
»
disk drive letter for destination files
options
»
KEEP NOQUERY NOTYPE QUERY
Operation
REPLACE SUBDIR TYPE
Mode 1—Each file matching from-file is copied to to-file, similar to the CopyFile command. Both the from-file and the to-file may use wild card specifications. >MOVE /programs/some.command:s /private/programs/newname.command:d
Mode 2—Each file matching from-file is copied to to-drive using the same file name as the source. A >Move some.files f (notype >move *.basic =.basiccpy:d (keep noquery
Mode 3—file must be a text file containing one or more records. Each record in this file specifies a from-file and either a to-file or a to-drive specification. For each line in file, a Move is performed. Wild cards may be used. >Move listof.files (files
Move
369
This mode of the Move command is convenient when one or more sets of files are repetitively moved. Merely edit a file containing file description pairs, such as:
Commands
>edit daily.files customer.master:s /prior/customer.master:s customer.history:s /prior/customer.history:s general.ledger.*:s /prior/=.=.=:s check.*:s /prior/=.= >move daily.files (file noquery notype keep replace
Mode 4—This is the interactive form of the Move command where you are prompted to enter a from-file and a to-file or to-drive. This can be repeated until all of the desired files are specified and moved. The operation is terminated by entering a blank line. Options
KEEP
Tells Move to not erase the source file after it is successfully moved to the destination. With this option specified, the Move command operates similar to a CopyFile command.
NOQUERY
Tells Move to not ask for confirmation before moving each file. This is a default option when wild cards are not used. >move gl.* f (noq "GL.MASTER:S" moved to "GL.MASTER:F". "GL.JOURNAL:S" moved to "GL.JOURNAL:F". "GL.HISTORY:S" moved to "GL.HISTORY:F".
To disable this option use the QUERY option. NOTYPE
Do not display the results of each file moved on the standard output device. The general result message (the “nn files copied.” message displayed prior to exiting Move) is also suppressed with this option. >move Ok to Ok to Ok to
gl.* move move move
f (not "GL.MASTER:S" (Yes,No,All) Y "GL.JOURNAL:S" (Yes,No,All) Y "GL.HISTORY:S" (Yes,No,All) Y
To disable this option use the TYPE option.
370 Move
QUERY
Tells Move to “query” or ask if each file matching the source file specifications is to be moved. This is a default option when wild cards are used. >move *.data i Ok to move "CUSTOMER.DATA:S" (Yes,No,All)
To disable this option use the NOQUERY option. REPLACE
Allows a file to be moved even if it already exists at the destination location. Normally, when the destination file name already exists, Move will not perform the copy. This option tells Move that if it already exists it should erase the existing file and replace it with a copy of the from-file. If the destination file does not exist, this option has no effect. >move *.data:s f (replace noquery keep "HISTORY.DATA:S" replaces "HISTORY.DATA:F". "CUSTOMER.DATA:S" replaces "CUSTOMER.DATA:F". "NEW.DATA:S" moved to "NEW.DATA:F". 3 files moved.
SUBDIR
When from-file is a subdirectory specification, this option specifies that all of the subdirectories of from-file, and the contents of those subdirectories, are moved to to-file or to-drive. If the subdirectories do not exist at the destination location they are created. >move *.* /Copy:i (subdir replace noquery keep SYSTEM\samples/tws/images/animals/bear.jpg:S moved to /COPY/tws/images/animals/bear.jpg:I SYSTEM\samples/tws/images/animals/bird.jpg:S moved to /COPY/tws/images/animals/bird.jpg:I SYSTEM\samples/tws/images/animals/buttfly.jpg:S moved to /COPY/tws/images/animals/buttfly.jpg:I SYSTEM\samples/tws/images/animals/wolf2.jpg:S moved to /COPY/tws/images/animals/wolf2.jpg:I SYSTEM\samples/tws/images/animals/cows.jpg:S moved to /COPY/tws/images/animals/cows.jpg:I
TYPE
A default option that displays the status message “... moved to ...” after each file is successfully moved. To disable this option use the NOTYPE option. Move
371
Commands
When the “Ok to move” question is asked you may respond with a (Y) for yes, (N) for no or (A) for all. Responding with (A) means yes to this file and all remaining files are moved without being queried. Respond with (Esc) to cancel the copy operation.
The source or from-file is erased unless the KEEP option is specified.
Defaults
The QUERY option is a default if from-file contains wild cards. TYPE is a default option.
See also
CopyFile, Erase, Rename
Commands
Notes
372 Move
Msg Command Similar to the Mailbox command, Msg sends a message to another user. However, if the user is logged on, the message is displayed on their console immediately.
MSG user ( option
2
MSG user message ( option
3
MSG * ( option
4
MSG * message ( option
user
»
account name or process number
message
»
optional message text to transmit
option
»
TITLE
Operation
Commands
1
Mode 1—This is the multi-line mode of the Msg command. When the command is invoked, you are prompted to enter one or more lines of text. To end the message press (EnterÌ˛) at the beginning of a line with no text or spaces in it. >msg Ted Enter message text terminated by empty line. Call me as soon as you get back from lunch. Something(EnterÌ˛) important has come up that changes EVERYTHING!(EnterÌ˛)
(EnterÌ˛) On Ted’s console, the message appears in a pop-up window as:
The receiving person must acknowledge the message by pressing (Esc) before it is erased. To enter a blank line without ending the message, remember to enter at least one space before pressing (EnterÌ˛).
Msg
373
Mode 2—For short, single-line messages, this mode allows you to specify the message text on the command line. If the text contains lowercase text, commas, quotation marks or other punctuation characters that you want in the message, you should enclose the entire message in quotation marks. >mail dave Please call me when you get in. It's important.
Commands
>mail eric "Your package arrived, and it's big. Call me."
These single-line messages are displayed on the receiving user’s screen in a pop-up window just like the Mode 1 messages. Mode 3—Similar to Mode 1 except that the message is transmitted to all users logged onto the system. This mode requires a privilege level of five. The message is only sent to the active session of a console with multiple sessions defined. Mode 4—Similar to Mode 2 except that the message is transmitted to all users logged onto the system. This mode requires a privilege level of five. The message is only sent to the active session of a console with multiple sessions defined. Options
TITLE text
Notes
When user is specified with an account name, and more than one user is logged onto that account, all users logged onto that account receive the message. When there are no users logged onto the account name, you are asked if you want to put the message in the user’s mailbox. When this happens, the operation is identical to the Mailbox command.
Specifies an alternate title for the receiving user’s message window. The title is displayed in the top frame, centered. When this option is not used the default title of “ MSG From your-account (Pid=your-pid) ” is used.
>msg accounts "Where is my pay check?"
The “Receive messages” field in the account environment prevents messages from being sent directly to a user’s screen. Msg checks this switch on the user’s environment and if is is disabled, informs you and allows you to put the message in the user’s mailbox.
374 Msg
When the message is directed to a user of a multiple-session console, the message is displayed on that session only. If the session is not active it will not appear until the user switches to the session. Messages directed to all users (* specification) are displayed only on the active session of a multiple-session console. When a message is sent to a user that already has an unacknowledged message on its screen, the new message is queued and is not displayed until the prior message is acknowledged and cleared from the display. When a message is sent to an account name and there is more than one user logged onto that account name, all of those users will receive the message. Restrictions
Mode 3 and Mode 4 require a privilege level of five.
You cannot send a message to yourself. See also
Mailbox
Msg
375
Commands
The “Receive messages” field status is ignored in Mode 3 and Mode 4: The message is sent to all users that are currently logged on.
376 Msg
Commands
Net Command The Net command controls Corona networking and provides a common interface for many of the functions and simple clients available Corona. NET
2
NET ARP
-a [ -N if-addr ]
3
NET ARP
-s ip-addr hw-addr [ if-addr ]
4
NET ARP
-d ip-addr [ if-addr ]
5
NET BROWSE
6
NET EXEC
7
NET RECEIVE
8
NET SEND file
9
NET SHARE
10 NET USE
Commands
1
program ( program-options exec-options file
destination-file ( send-rec-options
destination-file ( send-rec-options
share-name
unc-name
path
password
access-mode comment
password
11 NET SERVER 12 NET START 13 NET STOP
server-name server-name
14 NET IPCFG 15 NET function 16 NET service Operation
parameters host parameters
Mode 1—NET: Invoke the Net command in interactive mode. In this mode you are presented with choices allowing you to Ping, Lookup, Trace, IP Cfg, DNS, WhoIs, Finger and Scan. See “Net Interactive” on page 379. Mode 2—NET ARP: Display the Address Resolution Protocol table. See “Net ARP” on page 388.
Net
377
Mode 3—NET ARP: Assign an IP address to a network interface card.See “Net ARP” on page 388. Mode 4—NET ARP: Delete an IP address from a network interface card.See “Net ARP” on page 388.
Commands
Mode 5—NET BROWSE: Browse the local network looking for Network File System servers. See “Net Browse” on page 390. Mode 6—NET EXEC: When executed from a client workstation connection, execute a program on the client system. See “Net Exec” on page 391. Mode 7—NET RECEIVE: When executed from a client workstation connection, receive a file from the server system. See “Net Receive” on page 393. Mode 8—NET SEND: When executed from a client workstation connection, send a file to the server system. See “Net Send” on page 393. Mode 9—NET SHARE: Display or maintain share names to other Network File System directories. See “Net Share” on page 399. Mode 10—NET USE: Display or maintain drives names for attachable shared drives. See “Net Use” on page 399. Mode 11—NET SERVER: Show the status of all of the network servers. This form also allows you to start and stop the servers. See “Net Server” on page 401. Mode 12—NET START: Start the network or a specific network server. See “Net Start” on page 402. Mode 13—NET STOP: Stop the network, a specific network server or all network servers. See “Net Stop” on page 402. Mode 14—NET IPCFG: Displays the basic configuration information for this network. See “Net IPCFG” on page 408. Mode 15—NET function: Perform one of the network functions available with Corona networking. See “Net” on page 409. Mode 16—NET service: Use one of the TCP/IP simple services. See “Net service” on page 411. Restrictions
The Net command requires at least a privilege level of one. Higher privilege levels may be required of specific functions of the command.
See also
DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
378 Net
Net Interactive Command The interactive form of the Net command presents the following form allowing you to use any of functions shown. These functions, for the most part, are useful in diagnosing problems that you may have with your local network or with accessing a remote server.
Host
Enter the domain name or dotted IP address of the host that you want to test.
Go
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
For a description of the trace display refer to the Ping command on page 453.
See also
Net Ping function, Ping command
Net Interactive
379
Commands
The Ping button provides a means of testing if a host can be accessed over the network or whether or not it is responding.
Commands
The Lookup button is used to resolve a domain name into an IP address or to perform a reverse lookup of an IP address into a domain name.
Host
Enter the domain name or dotted IP address of the host that you are interested in.
Go
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
For a description of the trace display refer to the NsLookup command on page 425. See also
NsLookup
380 Net Interactive
The Trace button traces the route that a packet takes to get from this machine to a target host.
Commands
Host
Enter the domain name that you want to inquire about. You may also enter the dotted IP address.
Go
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
For a description of the trace display refer to the TraceRT command on page 675. See also
TraceRT
Net Interactive
381
Commands
The IP Cfg button displays the basic configuration information for this system.
The IPCFG display shows the information for this computer system’s network configuration. See also
Net IPCFG
382 Net Interactive
The DNS button allows you to see what is returned by the Domain Name System when your system requests various types of records from the server.
Commands
Domain
Enter the domain name that you want to inquire about. You may also enter the dotted IP address.
Record
Select one of the offered records (Address, MX, NS, SOA). The DNS server identified in the next field (Server) will be queried for this specific record.
Server
Enter the domain name or dotted IP address of the DNS server that you want queried. It is possible that, if that server does not know the answer, it might pass the query onto another DNS server. This field is initially filled in with the DNS server address that has been configured for this systems network access.
Go
Select this button to perform the query. Note, this button is the default for this form. This means that if you use the (Enter) key for any of the other fields, this Go button is selected automatically.
Net Interactive
383
Commands
The information displayed by this function is always in the general form: Id................ nnnn Length............ length of response Code.............. xxxxxxxxxxxxxxxxxxxxxxxx QdCount........... number-of-questions AnCount........... number-of-answer-records NsCount........... number-of-nameserver-records ArCount........... number-of-address-records Question 1: domain-name Type: n=record Class: 1=IN
Following this portion of the reply is the information specific to the query. That is, information about the domain’s address, mail exchanges, name servers or start of authority data.
384 Net Interactive
The WhoIs button allows you to issue a request to the Internet domain database to get the registration information about a second-level domain name.
Commands
Host
Enter the second-level domain name that you want to inquire about. A second-level domain name is a name with only two parts, a .com, .us, .org, etc. (first-level) and the domain name for the desired entity such as theos, microsoft, ibm, etc. It does not have any other parts of a URL such as www, ftp, etc. Alternately, you may enter the administrative contact name or the #handle for the administrative contact of the domain in question. However, not all registrars support querying by name or handle.
Go
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
The format and content of the registration database may vary depending upon the administrator for the first-level domain of the requested domain. See also
WhoIs
Net Interactive
385
Commands
The Finger button allows you to issue a finger request to a mail server.
Host
Enter one of the two forms of requesting finger information username@server This syntax requests information about a
specific user account of the mail server. @server
Go
This syntax requests information about the list of user accounts on the mail server.
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
Many mail servers do not support a Finger server or do not have it enabled for security reasons. Mail servers that do support it might not have enabled the capability to perform a general request with the “@server” request. See also
Finger
386 Net Interactive
The Scan button allows you to perform a scan of a network computer looking for active servers.
Commands
Host
Enter the second-level domain name that you want to inquire about. A second-level domain name is a name with only two parts, a .com, .us, .org, etc. (first-level) and the domain name for the desired entity such as theos, microsoft, ibm, etc. It does not have any other parts of a URL such as www, ftp, etc.
Go
Select this button to perform the query. This button is also the default for this form. This means that if you use the (Enter) key for the Host fields, this Go button is selected automatically.
From
Enter the lowest port number that you want scanned.
To
Enter the highest port number that you want scanned.
Known ports only Check this field if you want to limit the scan to the com-
mon, known port numbers. These known port numbers are listed in the file /THEOS/CONFIG/SERVICES.TXT:S. When the Go button action is selected, the Host is queried for every port number between From and To or, if Known ports only is checked, the common, known port numbers between From and To. Each port that responds is reported with the server name associated with that port number. Net Interactive
387
Net ARP Command
Commands
The Net ARP command displays the Address Resolution Protocol table and allows you to assign an IP address to a network interface card.
1
NET ARP
-a [ -N if-addr ]
2
NET ARP
-s ip-addr hw-addr [ if-addr ]
3
NET ARP
-d ip-addr [ if-addr ]
ip-addr
»
Dotted, internet address
hw-addr
»
Hardware or MAC address
if-addr
»
Interface address
Operation
Mode 1—Display the Address Resolution Protocol table. >net arp -a Interface: 192.168.100 Internet Address Physical Address 192.168.1.105 00-03-47-D5-24-E1 192.168.1.104 00-E0-7D-9D-87-BB
Except for the entries that are manually added with Mode 2, the entries in the ARP are transitory. They are added each time that a local IP is resolved into a specific network interface card’s MAC address and then removed a short time later. Mode 2—Assign an IP address to a network interface card. >net arp -s 192.168.1.157 00-e0-7d-9d-87-bb
This is the primary function of the ARP command. In some situations a particular network interface card might not be assigned an IP address through the normal means (Setup Net Interface and DHCP). With this mode of the ARP command a specific interface card is assigned the IP address that you want. In the above example, the interface card with the MAC address of 00-E0-7D-9D-87-BB is assigned the IP address of 192.168.1.157. If that
card already has an IP address assigned, then this address is added to its list of addresses.
388 Net ARP
Unlike the automatic entries in the ARP table, these manual entries are not transitory and remain until the entry is manually deleted (Mode 3) or the system is restarted. Mode 3—Delete an IP address from a network interface card. >net arp -d 192.168.1.101
In the first example above, the ARP table is searched for any entry of the address 192.168.1.101. If an entry is found it is deleted from the table. The associated network interface card is instructed to remove that IP from its internal list of addresses that it responds to. The second example is similar to the first except that the ARP table is searched for an entry that has the IP address of 192.168.1.103 and has the specific MAC address of 00-1A-C9-9D-45-DF. If an entry is found with that combination then it is removed from the table and the interface card is reprogrammed. Options
The only option available with this command is the -N option that might be used with Mode 1. When it is used the ARP table display is limited to the entries matching the specified MAC address and interface card.
Net ARP 389
Commands
>net arp -d 192.168.1.103 00-1a-c9-9d-45-df
Net Browse Command The Net Browse command scans the local network computers and reports on the systems currently available for network file system access.
Commands
NET BROWSE Operation
The TNFS client on this system is queried for computers on the network with network file systems available. The list of computers available is displayed.
All systems that have a network file system installed and operating are reported. There is some latency inherent in the reporting system and it is possible that a system will be listed that has been powered off for as long as 45 minutes. You may get the list of share names available on a system by positioning the highlight bar to the system’s name and pressing (Enter) or (+). If there are any shares defined on that system they will be listed. Similarly, you can remove the display of the share names for a system by pressing the (-) key when the system name is hightlighted. Restrictions
There must be a TNFS client running on this computer system.
See also
Ping, Setup TNFS
390 Net Browse
Net Exec Command The Net Exec command is used from a client workstation connection to a THEOS host and causes the client system to execute a program. NET EXEC
program ( program-options exec-options »
program to execute on client, with parameters
exec-options
»
MAXIMIZE MINIMIZE
Operation
NORMAL NOWAIT
Commands
program
WAIT
Forces the client system to execute program. You must already be connected as a client to a THEOS server to use this mode. NetTerm, Telnet and THEOS WorkStation Client (TWS) connections can use this command. When specifying program, be sure to specify the command in the format required by the client’s operating system. For instance, assuming that the client connection is from TWS: >net exec "edit c:\autoexec.bat" >net exec "edit /autoexec.bat:c"
Only the first command is proper because that is the format used for specifying directory paths and drive codes on Windows and DOS systems. The second command will not edit the desired file. The exec-options can be specified to control the display of the command on the client system. These options are specified at the end of the command line. To avoid confusion it is best to enclose the program specification within quotation marks: >net exec "list some.file (printer" (nowait
The above command might be used with a Telnet or NetTerm connection from a THEOS system and it executes the command line list some.file (printer
on the client system as a background task. The Net command returns control to you as soon as the task is started.
Net Exec 391
Commands
Options
The following options may be used the NET EXEC command. The Maximum, Minimum and Normal options are effective only when the client is a THEOS WorkStation Client. Maximum
Indicates that the program is executed in its maximized mode. When neither this option nor the Minimum option is used, the program is executed with its default size of window.
Minimum
Indicates that the program is executed as a minimized icon.
Normal
The program is executed in its default or normal-sized window.
NoWait
Tells the THEOS Server to not wait for completion of the program on the client system. When executed from the command line, control returns to the CSI and you may enter another THEOS command. When executed from an application program or an EXEC, control returns to the calling program. Note: When the client system is a THEOS system, the program is executed as a background task. This means that it does not have a console keyboard available to it. If the program needs a keyboard it will exit.
Wait
A default option that tells the THEOS Server to wait for completion of the program on the client system before returning control to you or the calling program.
Restrictions
When the client system is a THEOS 4.x or THEOS Corona system, do not use the Maximum, Minimum or Normal options.
See also
DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
392 Net Exec
Net Receive Command Net Send Command The Net Receive and Net Send commands allow you to receive and send files when a NetTerm or TWS client connection is made with a THEOS host system or directly from a system connected to a network. NET RECEIVE
file
destination-file ( send-rec-options
2
NET RECEIVE
url
( send-rec-options
3
NET SEND
file
destination-file ( send-rec-options
4
NET SEND
url
( send-rec-options
Commands
1
file
»
file name to send to or receive from THEOS server, with optional path; may contain wild cards
destination-file
»
name to assign to file on receiving system, with optional path
send-rec-options
»
ABORT FILES
url
»
Uniform Resource Locator of file to receive or send
Operation
NEWFILE NOTYPE
OLDER REPLACE
SKIP TRANSLATE
All transfers are relative to the client system issuing the request. For instance, a Net Receive means a file is received on the client system; a Net Send means a file is sent from the client system. Mode 1—Transfers file from the server to this client. You must already be connected as a client to a THEOS server and you must be logged onto an account to use this mode. Client connections are made with the NetTerm or the THEOS Workstation Client programs. (Because the Telnet protocol does not support file transfers, connections made with a Telnet client cannot use the file transfer capabilities of the Net command.) >net receive data.file /private/data.fil:a
The file and destination-file can be specified with wild cards. The syntax and operation of the wild cards is similar to the syntax and operation of wild cards used with the CopyFile command. >net receive *.data:s >net receive *.data:s =.=
Net Receive 393
The above two command receive all files with a file-type of DATA on the S drive of the host system. The files are received with the file names unchanged into the current account, root directory. >net receive *.data:s =.newdata
Commands
In the above command, all files with a file-type of DATA on the S drive of the host system are received on the client system. They are received on the with the same file-name but the file-type changed to NEWDATA for each file. >net receive my.library.* your.library.=
In this command, each of the member files of MY.LIBRARY on the host system are received on the client system into the library YOUR.LIBRARY. The member-names are not changed. Obviously, this command could only be used when the client is NetTerm on a THEOS system as other operating systems do not have libraries. >net receive file*.data abc=x.files
The above command sends all files with a file-type of DATA and with a file-name that starts with FILE on the host system. The files are received on the client system with the file-name changed to ABC=X where the equal sign is replaced with the portion represented by the * in the source file-name. For instance, FILEONE.DATA is received as ABCONEX.DATA, FILE486.DATA is received as ABC486X.DATA, etc. >net send *.data* =.new=
The specification of file and destination-file must use the file naming conventions of its operating system. If the destination is a THEOS system then use THEOS naming conventions; if the destination is a Windows system then use Windows naming conventions. When the destination-file is specified with a drive code the file is received with a file name equal to the source file name but on the designated drive. When destination-file is omitted, the file is received with the source file name on its default drive. Mode 2—Receives a file from some system on the network that is accessible to this client. The remote system and the file to be transmitted is identified by the url. The name of the file received is taken from the file name portion of the url. The file will be received into the current account, current working directory on the system drive. >net receive ftp://fileserver/sample.txt
Note that, in the above example, the url specifies the network protocol (ftp://). This is necessary for two reasons. First, it tells the Net command 394 Net Send
that this is a url and not a simple file name. Second, it specifies the file transfer protocol and default port to use for the file transfer.
For a complete description of the url syntax and usage, refer to Appendix D: “File References,” on page 247 in the THEOS Corona Version 5 Operating System Reference. Mode 3—Transfers file from this client to the THEOS server (RECEIVE) or transfers file from the THEOS server to this client (SEND). You must already be connected as a client to a THEOS server and you must be logged onto an account to use this mode. Client connections are made with the NetTerm or the THEOS Workstation Client programs. (Because the Telnet protocol does not support file transfers, connections made with a Telnet client cannot use the file transfer capabilities of the Net command.) >net send c:\windows\readme.txt >net receive data.file /private/data.fil:a
The send or receive direction is relative to the client system. Therefore, Net Receive receives a file from the host on the client; Net Send sends a file
from the client to the host. Both SEND and RECEIVE allow the file and destination-file to be specified with wild cards. The syntax and operation of the wild cards is similar to the syntax and operation of wild cards used with the CopyFile command. >net send *.data:s
The above command sends all files with a file-type of DATA on the S drive. The files are received with the file names unchanged. >net send *.data:s =.=
This command performs the same function as the first command: All files with a file-type of DATA on the S drive are sent and received with the same file names. >net send *.data:s =.newdata
In the above command, all files with a file-type of DATA on the S drive are sent to the host system. They are received on the host system with the same file-name but the file-type is changed to NEWDATA for each file. Net Send
395
Commands
Files may only be received from an FTP or HTTP server and the appropriate protocol must be specified in the url. The url must also specify the host and path of the file to receive. It may specify the account and account password of the owning account on the remote server. When the account is not specified the “anonymous” account is used.
>net send my.library.* your.library.=
In this command, each of the member files of MY.LIBRARY are sent to the host system and received into the host system’s library YOUR.LIBRARY. The member-names are not changed.
Commands
>net send file*.data abc=x.files
The above command sends all files with a file-type of data and with a file-name that starts with file. The files are received on the host system with the file-name changed to ABC=X where the equal sign is replaced with the portion represented by the * in the source file name. For instance, FILEONE.DATA is received as ABCONEX.DATA, FILE486.DATA is received as ABC486X.DATA, etc. >net send *.data* =.new=
In this example, all files with a file-type of data are sent to the host system. The host system receives these files with the same file-name but the file-type is changed to NEW= where the equal sign is replaced with the source file’s file-type wild card component. For instance, FILE1.DATA111 is received as FILE1.NEW111, FILE486.DATA2002 is received as FILE486.NEW2002. The specification of file and destination-file must use the file naming conventions of its operating system. If the source is a THEOS system then use THEOS naming conventions; if the source is a Windows system then use Windows naming conventions. When the destination-file is specified with a drive code the file is received with a file name equal to the source file name but on the designated drive. When destination-file is omitted, the file is received with the source file name on its default drive. Mode 4—Sends a file from this system to a remote system on the network. The remote system is identified by the url. The name of the file sent is taken from the file name portion of the url. The file must be in the current account, current working directory on the system drive. >net send http://fileserver/myfile.txt
Files may only be sent to an FTP or HTTP server and the appropriate protocol must be specified in the url. The url must also specify the host and path of the file to send. It may specify the account and account password. When the account is not specified the “anonymous” account is used.
396 Net Send
For a complete description of the url syntax and usage, refer to Appendix D: “File References,” on page 247 in the THEOS Corona Version 5 Operating System Reference. Options
With the exception of Files and Translate, they control the actions to be taken when the receiving system already has a file with the same file name. Specifies that, if the receiving system has an existing file with the same name as file, the transfer is to terminate without replacing this file or attempting to transfer any other files.
Files
The files listed in file are sent to or received from the server. file must be an ASCII stream file containing one or two file descriptions per line. The SELECTED.FILES and SELECTED.EXEC files created by the FILELIST command and the FOUND.EXEC created by the LOOK command can be used for this specification file. You may also create the specification file with an editor or application program. For instance, the FILELIST command is used to create a list of files to be compressed: >filelist a (10/1/01 10/8/01 exec
A file now exists that lists all of the files on the A disk that have been changed between 10/01/2001 and 10/08/2001. The following command will transfer these files from the server to the client system: >net receive selected.exec (files
When a record in file contains two file descriptions, the first file name specifies the file to transfer and the second file name specifies the name that it will be saved as on the receiving system. NewFile
Specifies that, if the receiving system has an existing file with the same name as file, you are to be asked if it should be replaced with the new file. The method of asking and the options available at that time are dependent upon the receiving system.
NoType
Suppresses the display of the transfer progress window.
Older
This option specifies that the file is only transferred if the file does not exist on the destination or if the time-stamp of the file
Net Send
397
Commands
Abort
Commands
on the destination system is older than the time-stamp of the file on the source system. Replace
This is the default option specifying that, if the receiving system has an existing file with the same name as file, that file is replaced with the file from the sending system.
Skip
Specifies that, if the receiving system has an existing file with the same name as file, the transfer is to skip this file and continue with the next file in the list.
Translate
When the file being transferred is an ASCII stream file, the record terminators are to be translated to the receiving system’s syntax (CR for THEOS, CRLF for DOS/Windows).
Restrictions
This command may only be used when you are connected to the host computer using NetTerm, Telnet or THEOS WorkStation client software.
See also
DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
398 Net Send
Net Share Command Net Use Command The Net Share and Net Use commands define and maintain the names used by others to access the TNFS resources on this computer (SHARE) and for this computer to have client access to the TNFS resources on other computers (USE). NET SHARE
share-name
2
NET SHARE
share-name
3
NET SHARE
4
NET USE
unc-name
5
NET USE
unc-name password
6
NET USE
unc-name ( DELETE
7
NET USE
path
password
access-mode
comment
share-name
»
One to eight character name for directory
path
»
Path to directory on a local disk
password
»
Password required for remote access to share-name
access-mode
»
Access mode permitted: RO for read-only, RW for read & write access
comment
»
Text describing share
unc-name
»
Uniform Naming Convention name for remote share
Operation
Mode 1—Defines a share name for a directory on one of the local disks. This share name is what other computers on the network will see when they request access to this system’s files. The other systems do not refer to a disk drive but to a share name on this system. Mode 2—Removes a share name definition on this system. After removal and after restarting the TNFS server on this system, other computers on the network will no longer have access to the directory that this share name referred to. Mode 3—Displays the currently defined share names on this system.
Net Share 399
Commands
1
Commands
Mode 4—Adds unc-name to the list of use names defined on this system. This syntax is only valid if the unc-name does not require a password to access it. When password is required, use the Mode 5 syntax. Mode 5—Similar to Mode 4 except the use name is added with a password. If the share name is defined on the server system with a password, you must specify that same password on the use name defined here. This password is supplied to the remote system when a connection is established from this client system to the file server system. The password should be enclosed within quotation marks to preserve the casemode and spacing. Mode 6—This syntax will delete the use name from the list of use names defined on this client system. Mode 7—Displays the currently defined use names to directories on other systems.
Restrictions
The Net command requires a privilege level of one.
See also
DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
400 Net Use
Net Server Command The Net Server command examines the servers installed on this system and reports about their status in a form that also allows you to change the status. NET SERVER The system is examined for each of the possible servers. If a server exists on the system (its primary program file is found) then the status of that server is shown. The configuration of the server is examined to determine how it is normally started and that startup mode is also shown.
Server list box Each server installed on the system is listed along with its
current status and startup mode. Use this area to select a server that you want to change. Stop/Start
Depending upon the current status of a selected server, the button here will display either “Stop” or “Start”, whatever is the opposite of the server’s current state. Press this button if you want to change the status of the selected server.
Mode
Press this button if you want to change the startup mode of the selected server. If the server is currently started manually, pressing this button will change it to start automatically the next time that the system is booted. If the server is started automatically, pressing this button will change it to only start manually.
Restrictions
This mode of the Net command requires a privilege level of 3 or better.
See also
Net Start, Net Stop
Net Server 401
Commands
Operation
Net Start Command Net Stop Command
Commands
The Net Start and Net Stop commands start or stop network servers on this system. 1
NET START NETWORK
2
NET START server-name
3
NET START SERVERS
4
NET STOP server-name
5
NET STOP SERVERS
6
NET STOP NETWORK
server-name
Operation
»
DHCP DNS FTP HTTP LOGIN
LPD PPP NETALIVE NETEXEC NETPRT
NETTAPE TCP TDBS TELNET TFTP
THEOPOST TNFS TWINDOWS WEBMAINT
Mode 1—Starts the network or starts one of the network servers installed on this system. >net start network
The network can be automatically started at system bootup if the configuration requests it (refer to the THEOS Corona Version 5 Operating System Installation and Setup Guide). If it is not started at bootup it can be started manually with the above command. When the network is started, either automatically or manually, other network servers are also started if they have been enabled to start automatically. Mode 2—The network must be started before any of the network servers. If you attempt to start a server without first starting the network the message “Network not operational” is displayed and the return code is set to one. Once the network is started, you may start any of the other network servers installed on this system. See “Servers” on page 403 for a list and description of these servers.
402 Net Start
Mode 3—If the network is started, this command starts all of the network servers that have been defined as automatic start but are not currently running.
Mode 5—Stops all of the servers that are currently running on this system. You can perform a Show Servers to see a list of the currently active network servers. Mode 6—Stops all networking operations on this system by stopping all of the servers and then stopping the network server itself. Servers
DHCP
The Dynamic Host Configuration Protocol server is used by other computers on the local network for network IP number assignment and other configuration information. The DHCP Server is an optional product available with the HostingServer Plus Pak or the NetServer Plus Paks.
DNS
The Domain Name System server is used by this system and other systems on the local or wide area network for domain name to IP number resolution of the various servers on this local network. Generally, there is only one DNS server enabled on a local network. The DNS Server is an optional product available with the HostingServer Plus Pak or the NetServer Plus Paks.
ExecNet
The ExecNet server allows remote clients to execute commands and programs on this system. The ExecNet Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
FTP
The File Transfer Protocol server is used by this system and other system on the local or wide area network when they want to transfer files from this computer using an FTP client program. Synonyms accepted for FTP include FTPSERVER. >net start ftp >net stop ftp
Net Stop 403
Commands
Mode 4—Stops a network server that is currently running on this system. See “Servers” on page 403 for a list of the servers that might be started. You can perform a Show Servers to see a list of the currently active network servers.
The THEOS FTP Server is an optional product available with the WebServer Plus Pak or the NetServer Plus Paks.
Commands
HTTP
The HyperText Transfer Protocol server is used by this system and other systems on the local or wide area network when they want to use this system as a web server. Synonyms accepted for HTTP include HTTPSERVER, WEB and WEBSERVER. >net start web >net stop web
The THEOS WebServer is an optional product available with the WebServer Plus Pak or the NetServer Plus Paks. Login
The login server is used by this system and other systems on the local or wide area network when they want to connect to this system using a NetTerm client or a THEOS WorkStation client. Synonyms accepted for LOGIN include NETLOGIN. >net start login >net stop login
The Login Server may be started automatically when the network is started. Refer to the Setup Net Login Server command. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) This server must be started on this system to allow other clients on the network to use this system as a host when connecting as a user with the THEOS WorkStation Client (Windows-based clients) or the NetTerm (THEOS-based clients). LPD
The Line Printer Daemon server is used by this system and other systems on the local or wide area network when they want to access the printers controlled by this computer. The LPD Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
Mail
The Mail server is used by this system and other systems on the local or wide area network to send or receive mail using this system as the mail server. PostOffice is a synonym name for this server. >net start mail >net stop mail
404 Net Stop
The THEOS MailServer is an optional product available with the HostingServer or the NetServer Plus Pak. Both the MAILSERVER and MAIL names may be used to refer to the Mail Server.
NetAlive
The NetAlive server is used by this system to monitor access to local or wide area network servers and perform actions when they start or stop being available to this computer. The NetAlive Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
NetWork
The Network server refers to the TCP/IP and Ethernet server. It is the software used by all other servers for communication capabilities and it must be started before any other server.
PPP
The Point-to-Point Protocol server is used by this system to establish a connection to an Internet Service Provider (ISP) using a PPP client such as DialNet. Synonyms accepted for PPP include DIALNET, DIALUP and PPPSERVER. >net start dialup >net stop dialup
The DIALUP service is used by the PPP client DialNet and is necessary if you use a dial-up or modem to connect to another network such as the Internet. PrtNet
The PrtNet server is used by this system and other systems on the local or wide area network when they want to access the printers controlled by this computer. The PrtNet Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
TapeNet
The TapeNet server is used by this system and other systems on the local or wide area network when they want to use the tape drives controlled by this computer. The TapeNet Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks. Net Stop 405
Commands
The Mail Server must be started on this system to allow other clients on the network to use this system as a POP3 host for their mail clients.
TCP
The TCP server is used by this system and other systems on the local or wide area network when they want to use the simple TCP services on this computer. See “Services” on page 412 for a list of these services. >net start tcp
Commands
>net stop tcp
The TCPSERVE, TCPSERVER and TCP names may be used to refer to the TCP Simple Services Server. A brief description of the TCP Simple Services can be found on page 411. The TCP Simple Services may be started automatically when the network is started. Refer to the Setup Net Simple TCP Services in the THEOS Corona Version 5 Operating System Installation and Setup Guide. These services must be started on this system to allow other clients on the network to use this system as the host for the TCP simple services described on page 411. TDB
The THEOS DataBase server is used by this system and other systems on the local or wide area network when they want to use the THEOS database managed by this computer.
Telnet
The Telnet server is used by this system and other systems on the local or wide area network when they want to connect to this system using a Telnet client application.
TFTP
The Trivial File Transfer Protocol server is used by this system and other systems on the local or wide area network when they want to transfer files from this computer using an TFTP client program. The TFTP Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
TNFS
The THEOS Network File System server is used by this system and other systems on the local or wide area network The TNFS Server is an optional product available with the FileServer or the NetServer Plus Paks.
TWindows
406 Net Stop
The TWindows server is used by this system and other systems on the local or wide area network when they want to connect to this system using a THEOS WorkStation client.
WebIndex
The Web Index server is a companion server to the HTTP server. It provides word indexing and searching capabilities of the web pages stored on the HTTP server. The WebIndex Server is an optional product available with the WebServer or the NetServer Plus Paks. The Web Maintenance server is used by other systems on the local or wide area network to access this computer and perform system and network server maintenance. The WebMaint Server is an optional product available with the FileServer, HostingServer, WebServer or the NetServer Plus Paks.
Mode 7—Stops a network server. Mode 8—Stops all network servers. Restrictions
The Net command requires a privilege level of five. To use the START or STOP functions, you must be logged onto the SYSTEM account (id = zero) and have a privilege level of five.
See also
DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
Net Stop 407
Commands
WebMaint
Net IPCFG Command The Net IPCFG command display various configuration information about the network.
Commands
NET IPCFG Operation
Reports the current network configuration information: >net ipcfg Host Name: Saturn Domain: my.lan NIC-1: Realtek 8139 10/100 Fast Ethernet MAC = 00-00-21-C3-1E-44 IP = 192.168.1.100 / 255.255.255.0 Gateway: 192.168.1.1 DNS: 24.0.53.55 24.0.53.56
See also
408 Net IPCFG
WhoAmI
Net function Command The Net function commands display various configuration information about the network and who is currently connected to the network. NET function »
DISCONNECT PING
Commands
function
PINGALL WHO
Operation
Invokes the requested function, displaying the results on stdout.
Functions
Disconnect This function can only be used while you are connected to the Login Server via a NetTerm or a THEOS WorkStation Client.
This function disconnects you from the host Login Server. Although this is equivalent to the Exit command, this Disconnect function cannot be used on a Telnet connect while the Exit command can be used with all connections. Ping
Broadcasts a “ping” on the network requesting that all nodes respond. The responding nodes are displayed. This display is identical to the Ping * command. >net ping Network Broadcast Ping Name Accounting Executive Administration
Address 192.168.87.12 192.168.87.15 192.168.87.63
3 Network nodes responded. PingAll
Similar to the Ping function, a “ping” is broadcast to all nodes requesting that they respond. However, it does this repeatedly every few seconds until the program is exited with (Esc) or (F9). This is identical to the Ping * * command.
Net
409
Who
All THEOS login servers that this system can access are displayed along with the client nodes that are actively connected to those servers. >net who
Server/Client
Commands
Administration Executive Accounting Plant Development Documentation
Connect Date&Time
Pid
Account
1 Sep 2001 1 Sep 2001 1 Sep 2001
8:15am 7:48am 5:00am
6 7 8
Brad Payroll Products
1 Sep 2001
10:15am
9
Develop
Restrictions
A privilege level of five is required to use the Who function.
See also
DialNet, Exit, NetTerm, Ping, Setup, Telnet, THEOS WorkStation Client
410 Net
Net service Command The Net service commands establish a client-server relationship between this system (client) and a TCP/IP Simple Services server. NET service host parameters
2
NET service host parameters
service
»
CHARGEN
host
»
TCP/IP address or name from the host names database. LOCALHOST may be used to access this system.
parameters
»
Optional parameters that may be used with the service
Operation
ECHO
TIME
DAYTIME
Invokes the TCP/IP Simple Services server-function. The server-functions refer to the TCP Simple Services that are available with network operations. These services are standard services available from most TCP/IP servers. TCP Simple Services are not necessarily enabled at all times. They may be enabled automatically if “Enable TCP Simple Services” is checked in the Setup Net Simple TCP Services (see THEOS Corona Version 5 Operating System Installation and Setup Guide). They may also be started manually with the Net Start TCPSERVE function described on page 402. A host name may be specified following the service name. When host is not specified the implied host is LOCALHOST, which is the default name of this computer’s network address. When a host is specified, that host is used for the TCP Simple Service instead of your system’s TCP server. This capability is particularly useful for the Time service. By specifying a host whose time is known to be accurate, you can find out and optionally set your system to the current time.
Net service 411
Commands
1
Services
Chargen
Generates a continuous sequence of characters until terminated by entry of (Esc). Although trivial, this service is valuable when testing and debugging network applications that use data from a server.
Commands
The text string generated by the CHARGEN service is a 72-character line of ASCII characters in normal collating sequence. Each successive line increments the starting character by one. >net chargen !"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQ... !"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQR... >net chargen 192.168.1.102 CHARGEN connect() Connection was refused >net chargen 192.168.1.104 !"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQ... !"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQR...
In the second example above, a host was specified in an attempt to have that host use its CHARGEN service to generate the text strings. That host was a valid host but its TCP CHARGEN server was not started. The third example above also specified a host. In this case, that host’s CHARGEN server was available and it started generating and sending text strings to this client. DayTime
Displays the current date and time from the server. Although there is no specific standard for the format of the string returned, the THEOS DAYTIME service returns it formatted as day-name, month-name day-number, year time UTC-offset. >net daytime Tuesday, November 26, 2001 12:08:15 -0800
Note: The UTC-offset is only displayed if the system has been configured for time zones and the UTC offset has been defined. Use the SYSGEN command to set these attributes. Like the other TCP services, this service can get the information from another server by specifying a host. >net daytime time-nw.nist.gov 52219 01-11-06 17:54:13 00 0 0 224.7 UTC(NIST) *
412 Net service
As illustrated in the above example, other system’s DAYTIME servers might not return the date and time in the same format as used by the THEOS DAYTIME server. Echo
All data sent to the server is echoed back to this client.
This service may also be requested from another host system. Time
Displays the time on a network server or gets that time and sets the time on your system. Invoking the TIME function with no host displays the current system time on your system. >net time Tue Nov 06 15:22:20 2001
When a host is specified with the TIME service, the current time from that host is retrieved and displayed. >net time time-a.timefreq.bldrdoc.gov Tue Nov 06 15:24:45 2001
Note: The above host name is for the National Institute of Standards and Technology (NIST), located in Boulder, Colorado. It reports a time that is accurate to the nearest second, depending upon the time lag of the Internet. There are other time servers maintained by NIST and they can be found by visiting the NIST web page at HTTP://WWW.BOULDER.NIST.GOV/TIMEFREQ/SERVICE/TIME-SERVERS.HTML. It does not matter where the server is physically located because the time information provided by any time server will include its UTC offset. If your system is configured properly for UTC offset the time is automatically adjusted by NET TIME. When a host is specified you may also request that this system’s date and time be set to the date and time retrieved from the remote time server. With this form, the remote server is contacted and that system’s current time is retrieved. That time is then used to set the system time of this client machine.
Net service
413
Commands
>net echo >This is a test of the TCP/IP echo command.
>show time 15:11:32 Monday, November 05, 2001. >net time time-nw.nist.gov (set
Commands
>show time 15:26:23 Tuesday, November 06, 2001.
See also
414 Net service
DialNet, FTP, NetTerm, Ping, Setup, Telnet, THEOS WorkStation Client
NetTerm Client The NetTerm command establishes a client/server connection between the THEOS system that you are currently using (client) to another THEOS system that is a server on your network.
NETTERM
( options
2
NETTERM
server ( options
3
NETTERM
server account ( options
Commands
1
server
»
network server name, IP name or IP address (may also be localhost)
account
»
account name to log to after connection
localhost
»
LOCALHOST
options
»
ACCOUNT account CTL NOPRT PRTnn
Command synonym: Operation
NT
Mode 1—Invokes the NetTerm command without connecting to any server. NetTerm queries the network to find all of the THEOS servers that are connected to the network.
When no other THEOS servers are present on the network, an error message displays and the program exits. The names of the available servers are displayed in a menu.
NetTerm
415
Commands
The list of servers is updated approximately once per second to reflect servers that are joining or leaving the network and servers whose permission list is changed. Choose one of the servers offered and a client connection is established with that server. If no default connection is defined (see “Default Connections” on page 417) and the ACCOUNT option is not used, you are started at that server’s logon prompt. Mode 2—Invokes NetTerm and connects to server. If server is not a THEOS Network Login Server, or if that THEOS server does not give you permission to connect to it, an error message displays. If no default connection is defined (see “Default Connections”) and the ACCOUNT option is not used (Mode 3), you are started at that server’s logon prompt. Mode 3—Same as Mode 2 except that you are automatically logged onto account. If that account has a password, you must enter the password when the connection is established. Options
ACCOUNT account After a connection is established, log onto account on
the server system. If account has a password, you are prompted to enter the password before you are allowed to log onto the account.
416 NetTerm
CTL
Set control mode for this console on the server. Control mode causes all control characters received to be displayed visually. For instance, receipt of a CR is displayed as ^M.
NOPRT
Do not connect any of your printers as a slave printer to the server.
PRTnn
Default Connections
Your printer number PRTnn becomes a slave printer for your session on the remote server. When this option is not used (and the NOPRT option is not specified), your lowest numbered, attached printer becomes the slave printer.
performed on the server and you are prompted to “Logon please.” NetTerm searches your system for the NetTerm configuration file using the
following file specifications: environ/account.NTCFG environ/SYSTEM.NTCFG account.NTCFG SYSTEM.NTCFG
where environ is the current value of the environment variable NetTerm and account is the name of the account that you are using on your system when you invoked NetTerm. NetTerm Configuration File
NetTerm configuration files are ASCII text files containing the following
information: [name1 Server] Account=account [name2 Server] Account=account
etc. name1, name2 are the names of remote servers that you connect to. account is the name of the account that you want to automatically log onto when you connect with that server. For instance: [Administration Server] Account=Reports [Executive Server] Account=Remote [Production Server] Account=Guest [Development Server] Account=Programs
When this file is used to connect to the “Development” server, you are automatically logged onto the account “Programs.”
NetTerm
417
Commands
When an account name is not defined on the command line (Mode 1 or Mode 2), the account name specified in your system’s NetTerm configuration file is used. If no NetTerm configuration file is found, a normal user start is
NetTerm Menu
Once you are connected to the server, your system is a client to the remote server. This means that any keys pressed are transmitted to the server as if you had a terminal directly connected to that system. Text received from the server is displayed on your console.
Commands
Exceptions to this transmission to the remote server are (Break) key sequences. Only (Break),(C) and (Break),(Q) are passed directly to the remote server. All other (Break) key sequences are acted upon by this NetTerm client. To transmit a (Break) key sequence other than (Break),(C) or (Break),(Q), you must press (Break),(B) followed by the key you want transmitted. For instance, to transmit a (Break),(X) to the server, you must press (Break),(B),(X). Pressing (Break),(M) displays the NetTerm menu:
Disconnect. Selecting this item performs a disconnect from this server. If you are in the middle of executing a program, a (Break),(Q) is transmitted. You are logged off the server, if necessary. When the disconnect is finished, you are presented with the menu of available servers that was described on page 415. This disconnect and reconnect can be performed directly, without using the menu, by pressing (Break),(R). Send File. Sends a file from this client to the server system. You are prompted for the file name you want transferred. You may specify any file on your system that you have access to. Specify the complete path, if necessary.
418 NetTerm
You may also send files to the server by executing the Net Send command on the server system. This ability is particularly useful for transferring files under program control. Receive File. Similar to the “Send File” function described above except that it transfers a file from the server to this client system. You may also receive files from the server by executing the Net Receive command on the server system. Help. Displays help information about NetTerm. Note that you may press (F1) with any of the menu items selected to receive addition information about that specific menu item. About NetTerm. Displays copyright and version information about the NetTerm command and displays information about your current connection on the network: Shell to OS. Invokes the CSI shell without exiting the NetTerm command. This is the only way to maintain the connection with the server while executing another command on your system from this terminal and session. To return to the NetTerm command environment, execute the command name EXIT. Exit. Disconnects from the server and exits NetTerm. This action can also be performed without the menu by pressing (Break),(X). Notes
When connected to a remote THEOS server, you may execute any programs on that server that you have access to. While connected, the programs that you execute have the full resources of the server available to them. Additionally, they may have access to one of the printers on your client system if a printer was attached when you established the connection and you did not use the NOPRT option. NetTerm
419
Commands
Unless a different path is specified, the file is received on the server system into the current account, current working directory. An information window and status bar displays during the transfer.
Cautions
You may execute the NetTerm command on the server. This will attempt to establish a link to another THEOS server. When this is done you will be communicating to the second server via the first server.
Commands
Although this is allowed and is useful at times, it can be quite confusing. To transmit a (Break),(C) to the second server, you must use the (Break),(B),(C) keys to tell the first server to transmit a (Break),(C) to the second system. Similarly, to terminate the connection with the second server, you must use the (Break),(B),(B),(X) keys to tell the first server to transmit a (Break),(X) to the second system. If you use the NetTerm command on the second system to connect to a third THEOS server, it is even more confusing. Restrictions
You may only connect to a THEOS server that gives your system permission to connect to it. Refer to Chapter 5 “Network Security,” starting on page 63 of the THEOS Corona Version 5 Operating System Reference for additional information about access permissions and security issues.
See also
Net, Setup, Telnet, THEOS WorkStation Client
420 NetTerm
Notes Command The Notes command displays and maintains a user’s database of notes and messages to themselves.
NOTES
2
NOTES
folder Operation
Commands
1
folder »
Directory name for notes files
Mode 1—Using the NOTES directory for the currently set USERNAME, the notes form is displayed allowing you to view and maintain your notes:
Mode 2—Similar to Mode 1 except the directory used will be /THEOS/USERS/username/folder:S. Notes form
Notes list box The large area in the form is a list of the currently defined notes for the Category selected. You can and must select one of these notes if you want to Open, Print, Send, Remove or Change
it. Category
A drop-down list box that allows you to select a note category. The available predefined categories include: All, Business, Ideas,
Notes
421
Miscellaneous, Personal, To Do and Unfiled . You may also define
your own categories. The category selected here determines which notes are displayed in the Notes list box. It also determines the category to be assigned to a New note that you create. Commands
New
To create a new note select the New button and the following form is displayed allowing you to enter the title and text of the note. The note is categorized with the currently selected Category unless that category is “All,” in which case the new note is saved as an “Unfiled” category. The category of a note can be changed after it is created by using the Change function.
When entering the text of the note remember that the first line of text will also be used as the title for the note and it is what appears in the Notes list box area of the main Notes form. You can advance from line-to-line by pressing the (Enter) key. To terminate entry of the new note press the (Esc) or (F10) keys.
422 Notes
Open
This button allows you to change or review an existing note.
Print
Prints the selected note on one of the attached printers.
Send
This button displays another form allowing you to send this note as an e-mail message to someone:
Commands
You must fill in a valid From and To e-mail address. You may modify the message body by adding additional lines of text or changing the note text that is pre-loaded into the body of the message. Remove
Selecting this button deletes the note that is currently selected in the Notes list box.
Change
You can change an existing note’s category with this button. It displays the following form allowing you to select the new category for the note.
Notes
423
You can create your own categories by using the “Edit categories” selection of the Category selection item. When this is selected you are presented with:
Commands
Creating New Categories
Just enter your new category name in the “New category” field and press the “Add” button. You can also delete any of the categories, including the preset category names. The “Reset” button allows you to restore the category list to the standard names. When this is done you are asked to confirm your choice:
When a category name is deleted, any notes that were assigned to that category are reclassified as “Unfiled.” Notes
Press the (Esc) key to exit from this command.
Defaults
Unless Mode 2 is used, the directory used to store the notes is /THEOS/USERS/username/NOTES:S.
See also
Reminder
424 Notes
NsLookup Client The NsLookup client looks up domain names and returns their associated IP address, or looks up an IP address and returns its domain name.
NSLOOKUP
2
NSLOOKUP
domain Operation
domain
»
Commands
1
domain name or IP address or host name
Mode 1—Looks up and reports on domain. The information displayed is Server name, alias (if any), and the dotted IP addresses associated with domain. >nslookup teleport.com Server: teleport.com Address: 192.108.254.10 192.108.254.12 >nslookup www.microsoft.com Server: www.microsoft.com Address: 207.68.137.62 207.68.156.53 207.68.156.54 207.68.156.61 207.68.156.16 207.68.156.58 ...
Multiple addresses listed for a domain indicate that all of those addresses are associated with the domain. They refer to different machines at that site’s location. One may be for their FTP server, another for incoming mail, etc. Their exact function cannot be determined by this display. If the DNS server that is being used supports the feature, it is possible that NsLookup will display multiple lines identifying the Alias domain names. This is done only if there is a single IP address associated with the name requested and the DNS server supplied the alias names or the names have already been cached by the DNS resolver on this system.
NsLookup 425
Mode 2—Enters an interactive mode where you can specify more than one domain before exiting. >nslookup
Commands
Enter name to lookup: ftp.theos-software.com Server: ftp.theos-software.com Address: 207.21.75.100 Enter name to lookup: ibm.com "ibm.com" not found. Enter name to lookup: www.ibm.com Server: www.ibm.com Address: 204.146.17.33 Enter name to lookup: laptop Server: Laptop Alias: Laptop.Documentation-system Address: 192.48.200.3 Enter name to lookup:
Pressing (EnterÌ˛) only, terminates the NsLookup command. Domain Specification
When domain is entered, the name resolver searches the following locations until a match is found or until all locations have been searched without success: 1. Cached names and IP addresses. 2. The file /THEOS/CONFIG/HOSTS.TXT:S. 3. The DNS servers. The DNS server locations are maintained by the Setup Net Name Services command. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) domain may be specified in several ways. As a dotted IP address. When an IP address is specified, a “reverse lookup” is performed. That is, the domain name associated with the IP address is determined and displayed. >nslookup 207.21.75.100 Server: theos-software.com Address: 207.21.75.100
The host name as defined in the file /THEOS/CONFIG/HOSTS.TXT:S. This file can be maintained by you with Setup Net Name Services. >nslookup Server: Alias: Address:
426 NsLookup
my-company my-company my-company.theos-system 192.12826.30
When domain is found in the host names database, the alias entry is displayed with the host name, dot, your-computer-name. Yourcomputer-name is defined in the Setup Net Identification . (See THEOS Corona Version 5 Operating System Installation and Setup Guide.)
>nslookup www.theos-software.com Server: www.theos-software.com Address: 207.21.75.100
NsLookup 427
Commands
Or the domain name as defined by the Domain Name Service specified in Setup Net Name Services.
Commands
428 NsLookup
Number Command Filter Number copies a file to the standard output device, numbering each line as it is copied.
NUMBER
2
NUMBER
file... ( options
file
»
file name with optional path
options
»
start increment
Operation
Commands
1
Mode 1—Each file is copied to the standard output device and numbered as it is copied. Specifying multiple files causes the second and remaining files to be appended to the first file copied to the standard output device and the numbering continues without being reset at the beginning of each file. >number one.file 1 Line one 2 Line two 3 Line three >number one.file one.file 1 Line one 2 Line two 3 Line three 4 Line one 5 Line two 6 Line three
This command is frequently used in a pipe: >number some.text | tee numbered.text | more
Mode 2—Copies the file from the standard input device to the standard output device, numbering each line as it is copied. When the console is the standard input device you terminate the input by entering (Ctrl),(D) on a line by itself.
Number 429
Options
start
The starting number to use for the first file copied to standard output. The default starting number is one.
Commands
increment This option may only be used in combination with start. Specifies the increment value for each line number used. The default increment is one. >number one.file (100 100 100 Line one 200 Line two 300 Line three
Defaults
start and increment have default values of one and one.
Restrictions
file must be an ASCII stream file.
See also
Unnumber
430 Number
Password Command The Password command allows you to change the password to your account.
PASSWORD The current account must have a password. If it does, you are prompted to enter the existing password to the account.
After entering the current password you are asked to enter the new password twice to make sure that you did not mistype it. For information about the usage and limitations of passwords, refer to “Passwords” on page 98 of the THEOS Corona Version 5 Operating System Reference. Notes
You cannot remove a password with this command. Only the Account command can remove the password for an account.
Cautions
Remember to make a note of this new password. You will not be able to log onto this account without this password and the password is not recorded anywhere in the system in plain text.
Restrictions
The account must have a password. If it doesn’t, ask the system administrator to add the password to the account with the Account command. The new password must match the current password policies. Password policies are rules governing passwords such as must contain upper and lower case characters, must not match any single word in the dictionary, etc. The policies also define the expiration time for a password. These polices are maintained by the Account command.
See also
Account, Logon
Password
431
Commands
Operation
Commands
432 Password
Patch Command The Patch command is a general purpose file and disk maintenance program. With it you can examine and change any file on the system or any sector of any attached disk.
PATCH
file ( options
2
PATCH
drive ( options
file
»
file name with optional path
drive
»
disk drive letter
options
»
BINARY NOVIDEO
Operation
Commands
1
Mode 1—With this mode you can view and make changes to file. The file may be any data or program disk file. file may not be a subdirectory or a library name. Refer to “Patching Files” on page 449 for a description of how Patch operates depending upon the file type (organization). Mode 2—This mode allows you to view and make changes to the data in a specific disk sector. Refer to “Patching Sectors” on page 450 for a description of this mode.
Options
BINARY
Tells Patch that file is to be treated as a stream of bytes rather than records or a program. Caution: You should only use this mode to view files. Essentially, this option tells Patch to ignore the structure of the file. If you make changes while this option is in effect, you may change a key (indexed or keyed file) to be unreachable or you may make records unreadable or programs unloadable.
NOVIDEO
Tells Patch to start in the command mode rather than the fullscreen display mode. This option is useful when Patch is being invoked from an EXEC program that has &STACK data that automatically updated a file.
Patch
433
Video Display Mode
Patch has two basic display modes: full-screen video mode and command mode. In full-screen video mode the screen is used to display as much as one sector (256 bytes) of the disk or file at a time.
Commands
>patch /theos/config/browscap.txt
As you can see, this display is very similar to the display used by the List command when option HEX is specified. The first column shows the relative location of the data in the file. The middle portion of the screen shows the hexadecimal values for each byte of the file. And on the right is the ASCII display of those same data bytes. In full-screen video mode you can make changes to the data on the screen or move to display other sectors of the file. The keys that can be used in this mode are:
434 Patch
Meaning
(Quit)
Exits Patch without saving changes to the file.
(File)
Saves all changes made to the file and exits Patch. Note that saving changes when the file is direct, indexed or keyed must be done for each record with the (Save) key, before selecting another record in the file.
(Save)
Saves all changes made to the record or sector without exiting Patch.
(Home)
Position to the first byte of data on this screen. If you are already positioned on the first byte, then (Home) displays the first sector of the file or record and positions to the first byte of that sector.
(End)
Position to the last byte of data on this screen. If you are already positioned on the last byte, then (End) displays the last sector of the file and positions to the last byte of that sector.
(Esc)
Exits full-screen video mode and switches to command mode. Pressing (Esc) while in command mode returns to the full-screen video mode.
(PageDown)
Displays the next sector of the file. The cursor does not move. That is, if you were positioned to the third line, second byte of the current sector, you will still be positioned to the third line, second byte of the new sector.
(PageUp)
Displays the previous sector of the file. The cursor does not move.
(Transpose) or (Ctrl)(O)
Moves the cursor from the ASCII column to the hexadecimal column, or vice versa.
(˜) (¤) (˚) (˙)
Move the cursor in the direction of the arrow. The left and right arrow keys move one byte; the up and down keys move by one line or 16 bytes. If the arrow key moves you off of this sector, the next or previous sector of the file or record is displayed. If there is no more file or record available in the direction desired, the cursor moves to the last or first byte of the file, as appropriate. Table 12: Patch Video Mode Commands
Patch
435
Commands
Key
Key
Meaning
(Find)
Allows you to jump to a new location in the file or disk. The operation of this key depends upon the type of Patch operation being performed.
Commands
Direct, indexed and keyed files: You are asked for the record key that you want to find. Other files: You are asked for the relative location to jump to (in hexadecimal). Mode 2 of Patch: You are asked for the sector number to
patch. (SchFwd) (SchBck)
Allows you to position to the next or prior occurrence of a sequence of bytes in the file or record. The operation of these keys depends upon the location of the cursor when the key is pressed. ASCII column: Enter the ASCII text to search for. Hexadecimal columns: Enter the sequence of hexadecimal values to search for.
(Again)
Repeats the last (SchFwd) or (SchBck) performed. Table 12: Patch Video Mode Commands
• Changing Data on the Screen Initially, when a sector of the file or record is displayed in full-screen video mode, the cursor is positioned to the first byte of the sector, in the ASCII display area of the screen. If the information that you want to change to is ASCII data, merely move the cursor to the position that you want changed and then type the replacement characters. (Patch only has replace mode. It is not possible to insert characters or bytes with Patch.) If you need to change one or more locations to some binary or hexadecimal values, make sure the cursor is positioned in the middle, hexadecimal columns. Use the (Transpose) or (Ctrl)+(O) to switch back and forth. Position the cursor to the location that you want changed and type the replacement values. Note, when moving left or right with the arrow keys you move by bytes, not “nibbles” (four-bit hexadecimal characters).
436 Patch
Command Mode
The Patch command or NOVIDEO mode provides all of the functionality of the full-screen mode plus some other important capabilities that are not easily implemented in a full-screen video mode. In command mode, Patch displays the PATCH prompt ( / ) indicating that it is ready to accept a command. • Expressions
Numeric Constant ASCII String Constant Operator Variable Another expression enclosed within parentheses • Numeric Constants Numeric constants are numbers specified in hexadecimal or decimal. By default, a number is a hexadecimal value unless it is terminated with the letter “t” or “T.” 1234 1234t
This is the number for 4,66010 or 123416 This is the number for 1,23410 or 04D216
• ASCII String Constants A value may be specified in ASCII by enclosing the ASCII characters within a pair of single quotation marks. Numeric values are always limited to 32 bits which is four bytes or four characters. When more than four characters are specified only the last four are used. 'abcd' 'AbCdEfGh' 'EfGh'
This is the value 1,633,837,92410 or 6162636416 This is the value 1,164,330,85610 or 4566476816 This is the value 1,164,330,85610 or 4566476816
Patch
437
Commands
Most of the Patch commands require an address or data values to be specified. Although these addresses and data values are normally specified with a numeric constant, they can be specified with an expression. In Patch, an expression contains one or more of the following elements:
• Operators
Commands
There are many operators that may be used in an expression to modify an element or to join two or more elements together. In the following table address, value1 and value2 may be any value including another expression. Operator
Meaning
@address
Indirection: Use value of location pointed to by address
*
Value of current address pointer
~value
Unary 1’s complement of value (NOT)
-value
Unary 2’s complement of value (NEG)
(expression)
Parenthesized subexpression
value1 | value2
value1 is OR’d with value2
value1 ^ value2
value1 is XOR’d with value2
value1 & value2
value1 is AND’d with value2
value1 << value2
Shift value1 left value2 bit positions
value1 >> value2
Shift value1 right value2 bit positions
value1 + value2
Add value1to value2
value1 - value2
Subtract value2 from value1
value1 * value2
Multiply value1 by value2
value1 / value2
Divide value1 by value2
value1 % value2
Compute the remainder of value1 divided by value2 Table 13: Patch Expression Operators
• Variables As many as 26 variables may be assigned values and used in expressions. Variable names are single letters, case insensitive (an uppercase “A” is the same as a lowercase “a”). A variable is assigned a value by using an assignment statement: variable
=
expression
A variable is used in an expression by using its name followed by the dollar sign character ( $ ).
438 Patch
For instance: /a=2000 0x00002000 (hex), 8192 (dec) /b=a$+1000 0x00003000 (hex), 12288 (dec) /
When the Patch prompt is displayed the following commands may be used. Note that some of the commands have no meaning in certain situations. For instance, when patching a stream file the KEY command is invalid. Assemble Command Patch contains a built-in assembly language compiler that allows you to use Intel mnemonics when specifying changes to a program file. A A
address
The A command accepts assembly language commands and stores the assembled code starting at location address. If address is omitted, the next location following the last assembled code stored is used. /a 339d2 000339D2: 000339D4: 000339DA: 000339DB: 000339DC: 000339DD: /
7470 8D8551FFFFFF 50 90 90
jz lea push nop nop end
33a44 eax,(ebp-af) eax
In the above example only the boldface text is entered. Patch supplied all of the other information and assembled the instructions as indicated. To terminate the entry of assembly language instructions, use the end pseudo-op or merely enter a blank line. Use one or more spaces to separate the assembly language opcodes from the operand fields. Any valid Patch expression may be used in the operand.
Patch
439
Commands
Patch Commands
Calculator An expression calculator is available whenever Patch is waiting for a command. To use the calculator merely enter an expression. To insure that the expression is not interpreted as a command, make sure that it starts with a digit, unary operator or a question mark. Commands
/?abcd 0x0000ABCD (hex), 43981 (dec) /?2000-23 0x00001FDD (hex), 8157 (dec) /?'abcd' 0x61626364 (hex), 1633837924 (dec) /
The calculator always displays the result in both hexadecimal and decimal. Checksum Command The CHECK command computes the checksum for the entire file or for a region specified. check check check check
checksum address-range address-range checksum
It either displays this checksum or compares it to the checksum specified. /check Checksum is /check 1000 Checksum is /check 1000 Mismatch. /
F602 2000 B75E 2000 abcd
Code Command Most programs have a code segment and a data segment. Initially, when Patch starts, it assumes that addresses requested and displayed are in the program’s code segment. This assumption can be changed with the Data Command. The CODE command returns to the code segment. Code
440 Patch
Compare Command The C command compares what is in the file at a specified location with what you specify should be in the file at that location. C
address value-list
/d 1000 100f 001000: E8C70B07 006A0368 FB0F0000 E8BCC707 'ºÍ...j.h....º.Í.' /c 1000 e8 c7 b Match. /c 1000 e8 c7 c Mismatch. /
Data Command Most programs have a code segment and a data segment. Initially, when Patch starts, it assumes that addresses requested and displayed are in the program’s code segment. This assumption can be changed with the DATA command. The Code Command returns to the code segment. Data
To view or make any changes to the data portion of a program, you must use the video display mode. Delete Command This command is valid only when the file is a direct, indexed or keyed data file. It deletes the current record from the file. De
Only the current record is deleted from the file. To get the current record use the Key Command.
Patch
441
Commands
For instance:
Display Command This command displays data from the file, record or sector. D D D
address address-range
Commands
This command displays one or more lines of 16 bytes each, starting with address. If address or address-range is not specified, the next line following the last line is displayed. When address-range is not specified, 16 lines of data are displayed. /d 2000 200f
002000: /d 2000 002000: 002010: 002020: 002030: 002040: 002050: 002060: 002070: 002080: 002090: 0020A0: 0020B0: 0020C0: 0020D0: 0020E0: 0020F0: /
055B3BD8 7E0C8B45 F4488945 F8E95700 '.[;«~..E.H.E.¾W.' 055B3BD8 0000FF35 0000005B B640055B 288B4508 8D048500 038B45F4 098B45F4 FCE9CCFE 000000E8 45088B00 8B45088B 0C8B000F 400450E8 45FCE93A 508B4508
7E0C8B45 3C51FFFF 8B04180F 3BD87D09 4050FF35 0000005B E91F0000 488945F8 FFFF33C0 34FB0600 FF308B45 000FB640 B64004EB 538A0700 0000008B 8B000FB6
F4488945 8B45F448 B6400450 8B45F440 3C51FFFF 8B04188B 00EB1683 EB078B45 8BE55DC2 8B450C8B 0C8B000F 045B3BD8 098B4508 8945FC85 450C8B00 40045B93
F8E95700 8D048500 8B45080F 8945FCEB 8B45F448 40055B89 7DF0007E F4408945 0400B804 00FF308B B6400450 7D0B8B45 8B000FB6 C074088B 0FB64004 2BC38945
'.[;«~..E.H.E.¾W.' '...5
End Command The E command saves the changes that have been made and exits Patch. E
Note that when direct, indexed and keyed data files are being patched, the Put Command must be used to save the changes made to a record.
442 Patch
Fill Command This command fills a block of the file with a single value. F
address-range value
/d 2000 002000: /f 2000 /d 2000 002000: /
200f 055B3BD8 7E0C8B45 F4488945 F8E95700 '.[;«~..E.H.E.¾W.' 2008 0 200f 00000000 00000000 F4488945 F8E95700 '.........H.E.¾W.'
Get Command The G command reads and displays one sector of the disk. This command is only valid in Mode 2 of Patch (patching disk sectors). G G
sector
If sector is omitted, the next sector of the disk is read and displayed. Help Command The H command displays a brief summary of all of the commands and the expression operators and elements. H
(F1) Key Command The K command reads a record of a direct, indexed or keyed file. This command is valid only when patching those types of files. K K
key
The key must match in type with the type of file. That is, for direct files the key must be a record number, but for indexed and keyed files the key must be an alphanumeric string. Indexed and keyed file keys may not contain the space character. For direct files the record number specified is assumed to be a decimal number, even without the trailing “t” specifier.
Patch
443
Commands
Unlike the Set Command which can set a series of locations with a string of data, the F command sets the series of locations to a single value.
Length Command The LEN command displays the length of the file (stream files), the length of the file and allocated record size (direct, indexed and keyed files), or the length and type of program (program files). For program files it also allows you to change the size of the heap and stack space used by the program. Commands
Len Len HEAP size Len STACK size
For instance: >patch sample.stream (novideo /len Length = 2,031 / >patch sample.direct (novideo /len Length = 280 Reclen = 28 / >patch sample.indexed (novideo /len Length = 3,593,330 Keylen = 10 /
Reclen = 36
>patch sample.command /len Length = 92,824 Code = 0x00012834 Data = 0x00004098 Stack = 0x00002000 Heap = 0x0000C350 Entry = 0x00000140 Type = 32 bit Program /len stack 3000 /len heap d000
A change to the heap or stack space is only saved when the End Command is used.
444 Patch
Move Command The M command copies data from one location in the file, record or sector to another location. M
from-address to-address length
This move operation is done as a byte-by-byte copy, not a copy and paste. Therefore, when the source and destination address ranges overlap, the result may be undesirable. The following example wants to copy the first 32 characters of the file to location 0x10. The first attempt fails because the address ranges overlap. /d 0 30 000000: 000010: 000020: 000030: /m 0 10 /d 0 30 000000: 000010: 000020: 000030: /
54686973 65737420 73656420 20636F6D 20
20697320 66696C65 62792074 6D616E64
6A757374 20746F20 68652050 2E0D0D54
20612074 62652075 41544348 68697320
'This is just a t' 'est file to be u' 'sed by the PATCH' ' command...This '
54686973 54686973 54686973 20636F6D
20697320 20697320 20697320 6D616E64
6A757374 6A757374 6A757374 2E0D0D54
20612074 20612074 20612074 68697320
'This is just a t' 'This is just a t' 'This is just a t' ' command...This '
To perform this type of operation properly the move must be done in two stages. First the overlapped region must be copied and then the remaining region is copied. If a larger region were copied, there might be several stages to avoid specifying an overlapped region. /d 0 30 000000: 54686973 000010: 65737420 000020: 73656420 000030: 20636F6D /m 10 20 10 /m 0 10 10 /d 0 30 000000: 54686973 000010: 54686973 000020: 65737420 000030: 20636F6D /
20697320 66696C65 62792074 6D616E64
6A757374 20746F20 68652050 2E0D0D54
20612074 62652075 41544348 68697320
'This is just a t' 'est file to be u' 'sed by the PATCH' ' command...This '
20697320 20697320 66696C65 6D616E64
6A757374 6A757374 20746F20 2E0D0D54
20612074 20612074 62652075 68697320
'This is just a t' 'This is just a t' 'est file to be u' ' command...This '
Patch
445
Commands
The from-address, to-address, from-address+length and the to-address+ length must be within the bounds of the current file or record. This restriction does not apply when patching disk sectors.
This operation of the M command is not entirely undesirable because it can be advantageous to repetitively duplicate a region of the file or sector.
Commands
/d 0 30 000000: 54686973 000010: 65737420 000020: 73656420 000030: 20636F6D /m 0 5 45t /d 0 30 000000: 54686973 000010: 68697320 000020: 69732054 000030: 73206F6D
20697320 66696C65 62792074 6D616E64
6A757374 20746F20 68652050 2E0D0D54
20612074 62652075 41544348 68697320
'This is just a t' 'est file to be u' 'sed by the PATCH' ' command...This '
20546869 54686973 68697320 6D616E64
73205468 20546869 54686973 2E0D0D54
69732054 73205468 20546869 68697320
'This This This T' 'his This This Th' 'is This This Thi' 's ommand...This '
Patch Level Command The PL command displays and sets the current patch level for a program file. PL PL
patch-level
Patch levels may only be assigned to program files. The PL command always displays the current patch level for the program. /pl Old New /pl Old /
patch level: patch level: 40001 40002 patch level: 40001
The patch-level must be a field using a format of @####### or #######. That is, a single letter followed by seven or fewer digits, or seven or fewer digits without the leading letter. A program’s patch level can also be set or changed with the Change command described on page 65 and it can be viewed with the FileList command described on page 229.
446 Patch
Put Command The P command is the complement of the Get Command and Key Command. P writes a record or sector back to disk. P P P
key sector
Use the P sector when you are patching disk sectors and you want to write the current sector to a different location on the disk. To merely write the current record or sector back to the file or disk in the same place that it was read, use the P command with no argument. Quit Command The Q command exits the Patch command without updating the file or disk. Any unsaved changes are lost. Q
Use the End Command or Put Command to save changes before quitting. Replace Command The R command changes the contents of consecutive locations to values specified. R
address value-list
The values in value-list are assigned to the locations address, address+1, address+2, etc. until the list is exhausted. The range of locations from address to address plus the number of items in value-list must be within the bounds of the file, record or sector. /d 2000 002000: /r 2000 /d 2000 002000: /r 2000 /d 2000 002000:
200f 54686973 20697320 6A757374 20612074 'This is just a t' 15 23 0f 2d 200f 15230F2D 20697320 6A757374 20612074 '.#.- is just a t' 'Now is the time ' 200f 4E6F7720 69732074 68652074 696D6520 'Now is the time '
Patch
447
Commands
Use the P key when you are patching a direct, indexed or keyed file and you want to write the current record to the file with a different key. The key must match the file organization. That is, key must be numeric for direct files and alphanumeric for indexed and keyed files.
Search Command The S command locates an occurrence of a specified series of values. S
address value-list
Commands
The file, record or sector is searched, starting at location address, for the next occurrence of the sequence of values indicated by value-list. The range of locations from address to address plus the number of items in value-list must be within the bounds of the file, record or sector. If a match is found, its location is displayed and you are asked if you want to search for the next occurrence. Any response other than (Y) is treated as (N). /s 0 'This' Match at 0x00000000, again? y Match at 0x0000003B, again? y /
Set Command The S command allows you to set a series of locations, one location at a time. S
address
When S starts, it displays address and its contents in both hexadecimal and ASCII and then it allows you to change the value at that location. /s 2000 0x00002000: 0F (.)
At this time you may enter a new value, terminate the S command or advance to the next or prior locations. Entry of (ÌÌSpaceÌÌ), (¤) or (˙) is interpreted as a request to advance to the next address. Entry of (˚) backs up to the prior address. The location may be set to any expression value as described in “Expressions” on page 437. You may set it to a string of ASCII characters by enclosing the characters within a pair of single quotation marks. Terminate the entry of a value with (ÌÌSpaceÌÌ), (¤), (˙) or (˚) and the locations are set to the values requested and the location pointer is advanced or backed up. Terminate entry with (EnterÌ˛) and the values are set and the S command terminates.
448 Patch
Use Command The USE command tells Patch to use either 16-bit or 32-bit instructions when using the Assemble Command. Use 16 Use 32
This command will only be necessary when you are patching disk sectors (Mode 2). When patching a program file, Patch will know whether the program is a 16-bit program or a 32-bit program. Full-Screen Video Mode Command Entry of (Esc) switches Patch from the command mode to the full-screen video mode or vice versa. Patching Files
How Patch operates depends upon the type of file being patched. • Stream Files or BINARY Option Patching a stream file or using the BINARY option causes Patch to start in its video display mode. The entire file may be viewed or modified because all addresses are valid from zero through the length of the file. You must use the End Command (in command mode) or the (File) or (Save) commands (in video display mode) to save any changes made to a stream file. • Direct, Indexed and Keyed Files Patching a direct, indexed or keyed file starts Patch in the video display mode. You may only view and change one record at a time. The key to a record cannot be changed except by using the Put Command to write the record with a different key and the Delete Command to delete the old record (perform a DE first and then a P with the new key).
Patch
449
Commands
/s 2000(EnterÌ˛) 0x00002000: 0F (.) 0(ÌÌSpaceÌÌ) 0x00002001: 8B (.) 23(ÌÌSpaceÌÌ) 0x00002002: 5D (]) 14(ÌÌSpaceÌÌ) 0x00002003: 14 (.) 253t-48t(ÌÌSpaceÌÌ) 0x00002004: 81 (.) 0(ÌÌSpaceÌÌ) 0x00002005: FB (.) 'This is a test'(ÌÌSpaceÌÌ) 0x00002013: 95 (.) 0(EnterÌ˛) /d 2000 2013 002000: 002314CD 00546869 73206973 20612074 '.#.Ì.This is a t' 002010: 65737400 C083E001 741EA180 C0FFFFF6 'est.ƒ.™.t.¿.ƒ...' /
Changes made to a record must be saved with the Put Command (in command mode) or the (Save) command (in video display mode). • Program Files Patching a program file causes Patch to start in command mode with the Commands
CODE segment selected.
You must use the End Command (in command mode) or the (File) or (Save) commands (in video display mode) to save any changes made to a program file. Patching Sectors
When Mode 2 of Patch is used you can view and change one sector at a time. Patch starts out in video display mode. After specifying the first sector number you may get the next sector of the disk with either the Get Command (in command mode) or the (PageDown) commands (in video display mode). In video display mode you may get the prior sector with the (PageUp) command. You must use the End Command (in command mode) or the (File) or (Save) commands (in video display mode) to save any changes made to a sector before getting a different sector.
Restrictions
file must not be read or write protected. The Patch command requires a privilege level of three.
450 Patch
Peek Command The Peek command allows you to see what is displayed on another user’s console.
PEEK
name
2
PEEK
process
name
»
account name
process
»
process number
Operation
Commands
1
Mode 1—The first user that is logged onto name (other than yourself) is peeked at. Mode 2—The user on process number process is peeked at.
Notes
When you first peek at another user’s console, the current text displayed on that console is displayed on your console. After this initial display, all characters that are displayed on that user’s console are also displayed on your console. Users may notice a slight degradation in performance because every character displayed on their console has to be displayed twice. There may be a significant degradation if your console is slower than the other user’s, for instance, when you are connected via a slow-speed modem. You should always inform the user before peeking at their console. In some countries it may be illegal to peek at a user’s console without their permission. Peek is a good tool to use when training a user on how to use some piece of software or for technical support when the support person is not near the user needing assistance. Multiple users can peek at the same console which is often used in a training class.
Restrictions
The Peek command requires a privilege level of four.
See also
Show USER, VNC Client
Peek 451
Commands
452 Peek
Ping Client The Ping client allows you to broadcast a “Are you there?” or a “Who’s there?” query to a specific node or to all nodes on the local intranet.
PING
2
PING
address... ( options
3
PING
*
4
PING
* *
address
»
node IP address or name (may also be localhost)
localhost
»
LOCALHOST
options
»
NOTYPE
Operation
Commands
1
Mode 1—Invokes the interactive or windowed display mode of this command. This provides the most information about the queried node.
Entry is allowed for the “Host” field only. Enter the dotted IP address for a node or its name as defined in the host names database. Host names are defined in the /THEOS/CONFIG/HOSTS.TXT:S file. The “Host Name” and “Host Id” fields display the name and matching IP address for the specified host. In this mode, queries are repeatedly sent to the specified node until the operator terminates the operation with entry of any key, by using the mouse and selecting the “Stop” button, or when the node fails to respond. (The “Start” button changes to “Stop” after a host is specified.) As each query is sent, the information on the screen is updated to reflect the success rate and the response time for the node.
Ping
453
Mode 2—With this form, Ping queries the network one time for a response from the specified host. The host is a dotted IP address or its name as defined in the host names database. >ping accounting
Commands
Host:
Accounting, address: 192.168.87.12 round-trip time = 2 milliseconds.
>ping 192.168.87.15 Host:
Executive, address: 192.168.87.15 round-trip time = 1 milliseconds.
If the NOTYPE option is used, the display is suppressed. However, the return code is set to a success/fail code of zero or one. Mode 3—The network is queried for responses from all nodes connected to the local intranet. This is the same operation performed by the Ping command. >ping * Network Broadcast Ping Name Accounting Executive Admin
Address 192.168.87.12 192.168.87.15 192.168.87.63
3 Network nodes responded.
Some network operating systems, such as Windows 95/98/Me, may not respond to this type of broadcast ping. Mode 4—Similar to Mode 3, the network is queried for responses from all nodes connected to the local intranet. This mode differs in that the network is continuously queried until the operator terminates the program by pressing (Esc) or (F9). This is the same operation performed by the Net PingAll command. Return Code
A return code (RC) of zero indicates a successful ping response. An RC of 1 indicates no ping response. An RC of 2 indicates that the address could not be resolved.
See also
Net
454 Ping
Play Command The Play command plays WAV files through the system’s sound card.
PLAY file
2
PLAY wildcard-file
3
PLAY
4
PLAY STOP
Commands
1
file
»
file name with optional path; may contain wild cards
wildcard-file
»
file name using wildcard specifications with optional path
Operation
Mode 1—Play the sound file through the system’s sound card. Mode 2—If there are any files matching the wildcard-file specification, a menu of those matching files is displayed. (When no files match the specification the Play command merely exits.) >play c*
It is not necessary to specify the file-type unless you want to play wavformat sound files with a file-type other than WAV.
Play 455
Using the menu, position to the desired sound file and press (EnterÌ˛) to play the sound. Once Play has initiated playing the sound file it returns to the menu with the next item highlighted. Only one sound file can play at a time, therefore requesting a new sound file when a sound is already playing causes the currently playing sound to be stopped and the new sound started. Commands
Mode 3—Operates the same as the Mode 2 command: >play *.wav
Mode 4—Any currently playing sound is stopped. Notes
Sound files with a file-type of WAV can also be played by merely entering the file name at the command prompt: >play mysound.wav >play mysound >mysound.wav
Each of the above commands play the file MYSOUND.WAV through the system’s configured sound card. It does this because the /THEOS/CONFIG/ TYPES.CFG:S file defines the open action for a WAV file to use the Play command to open the file. Defaults
Unless file or wildcard-file explicitly specify a file-type, the file-type used is always WAV.
Restrictions
This command can only play sounds when executed from the main console or from a TWS connection. When executed from the main console you must have a sound card configured on the THEOS system. Refer to the Setup SndCard command. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) When executed from a TWS connection you must be using a connection to the TWindows server and the TWS must be configured to support Distributed Window Manager features for “Distributed Sound and Video.” The sound is played through the Windows machine’s speakers.
See also
456 Play
CDPlayer, Mixer
POP3Test Command The POP3Test command tests an e-mail account on the email server (POP3 server).
POP3TEST
account@host
2
POP3TEST
account@host
3
POP3TEST
account
password
account
»
E-mail account name
host
»
Domain or host of account
password
»
Password for account
Operation
Commands
1
Mode 1—The POP3 server at host is contacted and queried about account mail status. The password is given to the server for validation. The status returned from the server is displayed on the console. This mode also updates the POP3Test configuration file with this account, host and password information. This configuration information is needed to use Mode 2 or Mode 3. Mode 2—The POP3Test configuration file is searched and the entry for account and host is used to contact the POP3 server for this account with the password read from the configuration file entry. Mode 3—The POP3Test configuration file is searched and the first entry matching account is used to contact the POP3 server for this account with the password read from the configuration file entry. This mode should only be used if account is unique in the configuration file.
Notes
Account names are case-sensitive on some servers. Passwords are casesensitive on most servers. To ensure that the account and password that you provide is the same as the ones given to the host, enclose each of the arguments in quotation marks. >POP3TEST "[email protected]" "MyPaSsWoRD"
The POP3Test configuration file is named /THEOS/CONFIG/POP3TEST.CFG:S. It is only maintained by Mode 1 of this command. There is no Setup program to create and maintain this configuration file as there is with most other configuration files.
POP3Test 457
No text is displayed on the console when this command is executed from an EXEC program or a MultiUser BASIC language program using the SYSTEM or CSI statement or a C language program using the system() function.
Commands
Return Codes
Because this program is frequently invoked from within a program the return code is set to the number of messages read or an error code. A zero or positive return code indicates the number of messages waiting for account on the specified host. A negative return code indicates an error condition. The errors that might be detected and reported by this command are: RC
Error
-1
Invalid command-line arguments
-2
Missing host name
-3
Missing password
-4
Cannot create POP3Test configuration file
-5
Connect failure
-6
Account or password rejected by host
-7
Remote host disconnected with no reply
-8
Cannot resolve host name
-9
Socket error
Restrictions
You must have the network started and a Dial-up Networking profile defined or you an always-on connection to your network.
See also
TheoMail
Example
>POP3test "[email protected]" "PasSwORd99" 242 messages RC = 242, 11:46:44, ET = 0.01, CPU = 0.032
458 POP3Test
Printer Command The Printer command is a complement to the CRT command. It tests the printer’s display capabilities with the attached class code for the printer.
PRINTER
2
PRINTER
PRTnn
Operation
Commands
1
PRTnn »
Attached printer
When Printer is invoked the “Printer Test Menu” is displayed.
Use the normal menu selection keys to select the desired tests. These keys are described in “Using Menus” on page 77. Options
PRTnn
Indicates that Printer is to test the attached printer number nn. When this option is not used the first attached printer is tested. The option keyword PRT may be specified as PRT, PRINT or PRINTER. As a convenience, PRINTER1 may be specified as P.
Printer
459
Tests:
• Test Attributes Tests the printer attributes supported by THEOS including: boldface, underline, italics, second color or shading, compressed text, double-wide text and double-high text.
Commands
Class code: 135 Printer name: HP LaserJet II & III
Normal text (no attributes) 0x0E: Boldfaced text 0x0F 0x0B: Underline text 0x16 0x1D: Italics or alternate character set 0x1E 0x04: Second color or shading 0x05 0x02: Compressed text 0x03
0x17: Double-wide text 0x18 0x15: Double-high text 0x19
The display on your printer will, of course, be dependent upon your printer’s capabilities.
460 Printer
• Ripple Pattern Displays a “ripple pattern” using the entire ASCII character set. This test can be used to check for dropped characters or improper column alignment.
• Column Registration Displays a columnar pattern.
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde !"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde !"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde !"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde !"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
• Line Registration Displays lines of repetitive characters. This pattern can be used to determine if lines of text are printed straight on the printer.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! """"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" ##################################################################### $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Printer
461
Commands
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde !"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdef "#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg #$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh
• Line Graphics
Commands
Displays all of the line-drawing graphics characters supported in the THEOS character set. See “THEOS Character Sets” on page 265. Also, a sample illustration of line graphics is printed. Ú = ULC
¿ = URC
Ù = LRC
À = LLC
à = LI
 = UI
´ = RI
Á = DI
Å = FWI
Ä = HORIZ
³ = VERT
Ú = RULC
¿ = RURC
Ù = RLRC
À = RLLC
É = DULC
» = DURC
¼ = DLRC
È = DLLC
Ì = DLI
Ë = DUI
¹ = DRI
Ê = DDI
Î = DFWI
Í = DHORIZ
º = DVERT
Most printers do not support the rounded corner characters. If your printer does not then define them with the normal square corner characters. • National Characters Displays all of the international characters supported by the THEOS character set. See “THEOS Character Sets” on page 265. Notes
The exact appearance of these tests depends upon the capabilities of your printer and the class code definition.
See also
Attach, ClassGen, CRT, Sysgen
462 Printer
PutFile Command The PutFile command copies a file from this system to a DOS-formatted hard disk partition or diskette.
PUTFILE
file DOS-file ( options
2
PUTFILE
drive ( CLEAR
Commands
1
drive
»
attached drive letter
DOS-file
»
DOS file name with optional path; may contain wild cards
file
»
file name with optional path; may contain wild cards
options
»
BINARY EOF HIDDEN NOQUERY
QUERY RDONLY SUBDIR SYSTEM
This command’s function has been replaced with the DOSDiskA and DOSDiskC attachment capability. For information about this capability refer to the “Attaching DOSDiskA Floppy Disk Drives” on page 32. Operation
Mode 1—Copies the file from this system to a DOS formatted disk. >put sample.testfile sample.txt:f "SAMPLE.TEXTFILE:S" copied to "SAMPLE.TXT:F".
The DOS-file must be a valid DOS file description. >putfile *.txt:s =.=:f Ok to copy "LETTER1.TXT:S" (Yes,No,All) Y "LETTER1.TXT:S" copied to "LETTER1.TXT:F". Ok to copy "LETTER3.TXT:S" (Yes,No,All) Y "LETTER3.TXT:S" copied to "LETTER3.TXT:F". Ok to copy "LETTER2.TXT:S" (Yes,No,All) A "LETTER2.TXT:S" copied to "LETTER2.TXT:F". "LETTER4.TXT:S" copied to "LETTER4.TXT:F". "LETTER5.TXT:S" copied to "LETTER5.TXT:F". "LETTER6.TXT:S" copied to "LETTER6.TXT:F".
The DOS-file specification may be just the drive code for the DOS disk. This is equivalent to specifying =.=:drive. The destination name is the same as the source file name. Do not use this syntax when the THEOS file name is not a valid DOS file description. That is, do not copy library members or files whose file type is longer than three characters.
PutFile
463
Mode 2—Clears the directory on the DOS formatted diskette. >putfile f (clear Enter disk label: DosXfer
Commands
Use this mode only when drive is a diskette drive. It is not designed to clear hard disks or removable hard disks. Options
BINARY
Tells PutFile that file may contain binary information and it is not to translate CR to CRLF. Whenever in doubt as to the content of the file, use this option.
EOF
Appends a ^Z to the end of the file. This is the standard DOS end-of-file mark character.
HIDDEN
Sets the “hidden” file attribute on the DOS disk for the files transferred.
NOQUERY
Tells PutFile to not ask for confirmation before copying each file. This is a default option when wild cards are not used. >putfile readme/*.txt:s f (noq "/README/LANMAN.TXT:S" copied to "LANMAN.TXT:F". "/README/VINES.TXT:S" copied to "VINES.TXT:F". "/README/PCTCP.TXT:S" copied to "PCTCP.TXT:F". "/README/IBMLAN.TXT:S" copied to "IBMLAN.TXT:F". 4 files copied.
To disable this option use the QUERY option. QUERY
Tells PutFile to “query” or ask if each file matching the file specifications is to be copied. This is a default option when wild cards are used. >putfile readme/*.txt:s f Ok to copy "/README/LANMAN.TXT:S" (Yes,No,All)
When the “Ok to copy” question is asked, you may respond with a (Y) for yes, (N) for no or (A) for all. Responding with (A) means yes to this file and all remaining files are copied without being queried. Respond with (Esc) to cancel the copy operation. To disable this option use the NOQUERY option. RDONLY
464 PutFile
Sets the “read only” file attribute on the DOS disk for the files transferred.
If the path specified in DOS-file does not exist on the DOS disk, this option tells PutFile to create the subdirectories that are missing.
SYSTEM
Sets the “system” file attribute on the DOS disk for the files transferred.
Unless the BINARY option is used, the THEOS end-of-record mark (CR) is translated to the DOS end-of-record mark (CRLF).
DOS Partitions The disk drive specified by DOS-file or drive may be an attached removand Disks able disk such as a floppy or removable hard disk, or it may be a partition on an attached hard disk drive. This disk or partition may be a DOS-formatted partition (16-bit FAT) or a Windows 95 disk or partition (32-bit FAT). When it is a partition of an attached THEOS drive, the DOS partition is referenced by specifying the attached THEOS drive code, for instance S or C: for drive if the DOS partition is a partition of the same physical drive that is attached as the S drive in THEOS. >putfile special.txt /windows/*.*:s >putfile /dos/ansi.sys:s =.=:s (bin "SPECIAL.TXT:S" copied to "C:\SPECIAL.TXT".
Windows NTFS (NT File System) disks and partitions cannot be accessed with this command. Disks using Windows NT FAT can be used with this command. Cautions
THEOS direct, indexed and keyed files should not be transferred with this command. These file organizations are not usable by the DOS operating system. To transfer one of these types of files, first translate it into a normal stream file with the FileType and then copy the resulting file.
Restrictions
The destination disk must be a DOS-formatted disk. The DOS-file must be a valid DOS file description. DOS files have eight character file names and zero to three character file extensions. When a path is specified for the DOS-file, the path must already exist on the DOS disk. The path will only be created if the SUBDIR option is used.
See also
GetFile, FileType, Send, THEO+COM
PutFile
465
Commands
Notes
SUBDIR
Commands
466 PutFile
PWD Command This command displays the current working directory.
PWD The current working directory is displayed on the standard output device. >pwd /LETTERS/PERSONAL:S >show subdir SUBDIR = /LETTERS/PERSONAL:S
Notes
PWD stands for print working directory.
See also
Account, ChDir, FileManager, Logon, Show
PWD
467
Commands
Operation
468 PWD
Commands
Quote Client The Quote client queries a quote server for the next random quotation.
QUOTE
2
QUOTE server
localhost
»
LOCALHOST
server
»
network server name or id (may also be localhost)
Operation
Commands
1
Mode 1—Displays a random quotation from the /THEOS/CONFIG/NETQUOTE.TXT:S database. >quote The difference between the right word and the almost right word is the difference between lightning and a lightning bug. --Mark Twain
The quote server on this system must be started. The quote server is part of the TCP Simple Services. Mode 2—Accesses server and uses its quote server to display a random quotation from server’s database. server may be specified with: The dotted IP address for the TCP server. >quote 207.21.75.100
The host name as defined in the file /THEOS/CONFIG/HOSTS.TXT:S. This file can be maintained by you with WinWrite. >quote my-company
By the special name LOCALHOST, meaning that this machine’s server is queried. This is the equivalent of a Mode 1 command. Or the domain name as defined by the Domain Name Service specified in Setup Net Name Services. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) >quote theos-software.com
Restrictions
The TCP Simple Services on this system must be enabled and started on this system to use Mode 1. The Quote server on the remote host must be enabled and started to use Mode 2.
Quote 469
Examples
>quote
Life is so unlike theory. --Anthony Trollope
Commands
>quote Time is that quality of nature which keeps events from happening all at once. Lately it doesn’t seem to be working. --Anonymous
470 Quote
Reboot Command The Reboot command shuts down and then reboots the computer.
REBOOT
2
REBOOT ( option
option
Operation
»
DOS FAST LINUX NOQUERY
NOTYPE QUERY REBOOT RESET
SHUTDOWN SINGLE THEOS TYPE
Commands
1
UPDATE WINDOWS
Mode 1—In this mode, you are presented with the reboot menu and allowed to select how you want the system rebooted:
Shut down. This selection shuts the computer down by stopping all servers and users and, if possible, turns the power off. The Shutdown Status is displayed during this process. This is the same as using the SHUTDOWN option with Mode 2. Restart in single user. Reboots the computer in single-user mode. Normal shutdown occurs and a flag in the hard disk’s MBR (Master Boot Record) is set causing the THEOS Multibooter to boot automatically with THEOS Corona in single-user mode. This is the same as using the SINGLE option with Mode 2.
Reboot
471
Restart in THEOS Corona. The default selection. The system is shutdown by stopping all servers and users and then rebooting the system. A normal system restart is performed just as if you had pressed the system’s reset button. This is the same as using the REBOOT, RESET or THEOS option with Mode 2.
Commands
If a Mode 1 reboot is requested from an EXEC or application program, the Reboot Menu is not offered. The computer is restarted just as if a (Ctrl)+(Alt)+(Del) were entered from the main console. When used with a NetTerm connection to a remote system, you are warned with the message “You are about to reboot a remote system.” Mode 2—Instead of automatically displaying the Reboot Menu, the options specified control what is displayed and what reboot or shutdown process is performed. Options
472 Reboot
DOS
This and the WINDOWS option will boot the DOS or Windows primary disk partition without displaying the Reboot Menu. This option is only valid if there is a DOS/Windows primary partition on the disk drive. If the TYPE option is also specified, the Reboot Menu is displayed with the “Restart in Windows 98/ ME/2000” item preselected.
FAST
Performs a REBOOT without saving the console sessions locations and sizes. It is fast because the various servers and users are not stopped first, the system is merely rebooted.
LINUX
Boots the Linux primary disk partition without displaying the Reboot Menu. This option is only valid if there is a Linux primary partition on the disk drive. If the TYPE option is also specified, the Reboot Menu is displayed with the “Restart in Linux” item preselected.
NOQUERY
Do not display the Reboot Menu. This is a default option when the Reboot command is invoked from within an EXEC program.
NOTYPE
Do not show the Shutdown Status display. This is a default option when the Reboot command is invoked from within an EXEC program.
QUERY
Display the Reboot Menu . This is a default option unless the Reboot command is invoked from within an EXEC program.
This option, the RESET and the THEOS option reboot the THEOS Corona primary disk partition without displaying the Reboot Menu. This is the default option unless DOS, LINUX, SHUTDOWN, SINGLE or WINDOWS option is used. If the TYPE option is also specified, the Reboot Menu is displayed with the “Restart in THEOS Corona” item preselected.
RESET
Synonym to the REBOOT option.
SHUTDOWN Shuts down the system without displaying the Reboot Menu.
After shutting down the system, this option specifies that the system is not automatically restarted. If APM (Advanced Power Manager) is available, the system is powered off. If APM is not available, a message displays informing you that it is okay to turn off the system. If the TYPE option is also specified, the Reboot Menu is displayed with the “Shut down” item preselected. SINGLE
Reboot the THEOS Corona primary disk partition without displaying the Reboot Menu. Normal shutdown occurs and a flag in the hard disk’s MBR (Master Boot Record) is set causing the THEOS Multibooter to automatically boot THEOS Corona in single-user mode. If the TYPE option is also specified, the Reboot Menu is displayed with the “Restart in single user” item preselected.
THEOS
This option, the REBOOT and the RESET option reboot the THEOS Corona primary disk partition without displaying the Reboot Menu. This is the default option unless DOS, LINUX, SHUTDOWN, SINGLE or WINDOWS option is used. If the TYPE option is also specified, the Reboot Menu is displayed with the “Restart in THEOS Corona” item preselected.
TYPE
Show the Shutdown Status display. This is a default option unless the Reboot command is invoked from within an EXEC program.
UPDATE
Reboot the THEOS Corona primary disk partition without displaying the Reboot Menu. Normal shutdown occurs and a flag in the hard disk’s MBR (Master Boot Record) is set causing the THEOS Multibooter to automatically boot THEOS Corona using the special, pseudo-account SYSUPDAT. Similar to the SINGLE option, the system is booted in single-user mode.
WINDOWS This and the DOS option will boot the DOS or Windows primary disk partition without displaying the Reboot Menu. This
option is only valid if there is a DOS/Windows primary partition on the disk drive. If the TYPE option is also specified, the
Reboot
473
Commands
REBOOT
Reboot Menu is displayed with the “Restart in Windows 98/ME/ 2000” item preselected.
Note
A CACHE SYNC operation is performed before rebooting to maintain data integrity.
Commands
If history logging is enabled an entry is added reflecting that the system was rebooted. When this command is executed from an EXEC or another program, the options NOQUERY and NOTYPE are enabled unless specifically requested with the QUERY or TYPE options. When any of the options DOS, LINUX, SINGLE, UPDATE or WINDOWS is used, the THEOS Multibooter does not ask which partition to boot and the system will reboot in the requested mode. When that mode is rebooted, the THEOS Mutiboot will allow normal selection of boot partitions. Cautions
This is an extremely dangerous command because other users are terminated without notice. If another user is in the process of updating one or more files, those files will be inaccurate because the update was not completed. Always do a Show USERS or a Who command before using this command and verify that all other users are at a Logon, CSI or stopped.
474 Reboot
Reboot Menu
If the computer has multiple operating systems installed on it, the reboot menu that is displayed will have additional options than those displayed on page 471. For instance, a system with both THEOS Corona installed and Microsoft Windows installed will display the following reboot menu:
Commands
A system with THEOS Corona, THEOS 4.2 and Microsoft Windows installed on it will display the following reboot menu:
Reboot
475
For all reboot options including SHUTDOWN, the Reboot command must first shutdown the operating system. It also saves the main console session sizes and positions. It can display this shutdown process.
Commands
Shutdown Status
Users are stopped by issuing a Break,Q request to the user and forcing an Exit. It is possible that a server or user is busy or “hung” and cannot be
stopped with this process. If this should occur, the “End Task” button can be pressed to terminate the server or user. The “Restart” button can be used to shut the system down without going through the process of stopping each server and task. Restrictions
The Reboot command requires a privilege level of five.
See also
Exit, Show, ShutDown, Who
476 Reboot
Receive Command EXEC The Receive command is an EXEC language program giving you convenient, command-line access to the THEO+COM command’s file receive capability.
file ( options
file
»
file name with optional path
options
»
ASCII COMnn THEOS
Operation
TRACE XMODEM XMODEM-1K TRACEFILE fn XMODEM-CRC YMODEM
Invokes the THEO+COM command in RECEIVE mode. The first attached COM device is used unless the COMnn option is specified. If no protocol option is specified, THEOS protocol is used. If the connection to the other computer is via a modem, it is assumed that the telephone connection has already been established with the Dial command or by using THEO+COM directly. >dial 1 800 123-4567 Dialing 1 800 123-4567 >receive updated.stocklst
Protocol..... File name.... File size.... Blocks....... Transmitted.. Byte count... Block count.. File count... Elapsed time. Errors....... Message...... Progress.....
Receive THEOS UPDATED.STOCKLST:S 1,235 5 0% 0 0 1 0:02 0 Waiting for sender
File transfer in process. Press ESC to cancel.
Receive 477
Commands
RECEIVE
Commands
Options
ASCII
Use the ASCII file transfer protocol. Essentially, this is no protocol and should be used only for short text files.
COMnn
Use the currently attached COMnn for the communications port. When this option is not specified the first attached COM device is used.
THEOS
Use the THEOS SEND/RECEIVE protocol. This is the default protocol.
TRACE
Enables file transfer tracing. A window is opened in the upperright corner of the display, showing the protocol activity during a transfer.
TRACEFILE fn Similar to the TRACE option except that the protocol activ-
ity is output to the file fn. XMODEM
Use XMODEM checksum, 256-byte protocol.
XMODEM-CRC Use XMODEM CRC-16, 256-byte protocol. XMODEM-1K Use XMODEM-1K, CRC-16, 1024-byte protocol for single file
transfers. YMODEM
Use YMODEM CRC-16, 1024-byte protocol. This protocol might be called YMODEM-BATCH in the other computer’s communication program because it can receive multiple files.
Notes
Refer to the THEO+COM Installation and User’s Guide manual for a full description of the operation of file transfers and the protocols used.
Defaults
The first attached COM device is used by default and the THEOS protocol is the default.
Restrictions
A COM device must be attached.
See also
Dial, GetFile, Send , THEO+COM
478 Receive
Reminder Command This command maintains reminder messages that can be displayed when a user logs on to an account.
The /SYSTEM.REMINDER and the account.REMINDER files are files accessed when you log onto an account. These are keyed access files with a calendar date for the key. When you log onto an account, these files are searched for a record with today’s date. If they are found, the message text for the date is displayed. Those message records are maintained by this command. Operation
A search is made for account.REMINDER file where account is the name of the account that you are currently logged onto. If the file is not found, then it is created. The program prompts you for a reminder date: >reminder Enter date (MMDDYY):
You may enter a specific date such as 07/04/02, or a “generic date” such as 07/04 without the year. A specific date means that the message appears on that date only; a generic date means that the message appears every year on that month and day. See “Notes” on the next page for additional information about entering dates. When a message already exists for the date entered, the message text is displayed and you can change it. Otherwise, you can enter the new message for the date. >reminder Enter date (MMDDYY): 07/19/02 Enter message text: This message displays every time that I log onto this account. Enter date (MMDDYY):
The message text may be as long as 256 characters, but it cannot contain any new-line characters or carriage returns. Entry of (EnterÌ˛) terminates the message text.
Reminder
479
Commands
REMINDER
To delete an existing message, replace or add the word “DELETE” to the beginning of the message text. When the first six characters of a message are “delete” (uppercase or lowercase), the message is deleted from the file.
Commands
To exit from the Reminder command, respond with (EnterÌ˛), (Esc) or (F9) for the date. Notes
If you are logged onto an account with account number of 0 the /SYSTEM.REMINDER file is always the file maintained. Otherwise, the file maintained is account.REMINDER with account being the currently logged on account name. The date format requested by the Reminder command is dependent upon the current DATEFORM (see “Set” on page 541 and “Sysgen” on page 591). DATEFORM 1
DATEFORM 2
DATEFORM 3
MMDDYY
DDMMYY
YYMMDD
10/15/96 101596 10/15 1015
15-10-96 151096 15-10 1510
96.10.15 961015 15.10 1510
Format: Examples:
The delimiters between the date elements are optional and can be any non-numeric character. When you log onto a private account a maximum of four reminder messages may be displayed. 1. The first message searched for is today’s complete date in the /SYSTEM.REMINDER file. 2. The next messaged that might be displayed is the generic date for today in the /SYSTEM.REMINDER file. 3. Then today’s complete data is searched for in the account.REMINDER file. 4. The last message that might be displayed will be the generic date for today in the account.REMINDER file. For instance: >logon myaccount This message is for July 4, 2002 This message is for any July 4th This message is the myaccount message for July 4, 2002
480 Reminder
This message is the myaccount message for any July 4th. >
See also
Logon
Commands
Reminder
481
Commands
482 Reminder
Remote Command The REMOTE command executes a command over a network connection.
REMOTE
REP://server command ( options
2
REMOTE
REP://acct@server command ( option
3
REMOTE
windows-command Corona-file-desc ( options
4
REMOTE
windows-command windows-file-desc ( options
5
REMOTE
Corona-file-desc ( options
6
REMOTE
windows-file-desc ( options
server
»
Name or address of ExecNet server
command
»
THEOS command name and arguments, options
acct
»
windows-command »
Program name with path if needed
Corona-file-desc
»
File name including drive code
windows-file-desc »
File name on Windows system
Operation
Commands
1
Mode 1—The ExecNet server operating on the machine identified by server is instructed to execute command. >remote rep://saturn eject r
Mode 2—Similar to Mode 1 but, after connecting to the server identified by server, it logs on to acct an executes command. >remote rep://private:password23@saturn "erase *.backup (not noq"
Mode 3, Mode 4, Mode 5 and Mode 6 are only valid when invoked from a
TWS console. Mode 3—When executed, it instructs the Corona system to transfer Corona-file-desc to the windows client system. It is saved on the Windows system as a tempory file and then the program windows-command is invoked with the temporary file name as a parameter for that program to operate on.
Remote 483
If the temporary file is changed, upon exiting the windows-command, the temporary file is transferred back to the Corona system and replaces the original version of the Corona-file-desc.
Commands
Mode 4—Similar to Mode 3 except no file is transferred from the Corona system. Instead, the file is already on the Windows system and the windows-command is invoked with windows-file-desc as its argument. Mode 5—When executed, it instructs the Corona system to transfer Corona-file-desc to the windows client system. This file name is saved with a temporary file name on the windows system but the file extension is retained. The temporary file is then invoked as a command, relying upon the current file-type associations of the Windows system to choose the proper program to use with this data file. If the temporary file is changed, upon exiting the program the temporary file is transferred back to the Corona system and replaces the original version of the Corona-file-desc. Mode 6—Similar to Mode 5 except there is no file transfer between the systems. Instead, the windows-file-desc is used with the file already residing on the Windows system. Options
484 Remote
MAXIMIZE
When used with Mode 3, Mode 4, Mode 5 or Mode 6, this option instructs the window’s application to open in a maximized window.
MINIMIZE
When used with Mode 3, Mode 4, Mode 5 or Mode 6, this option instructs the window’s application to open in a minimized window.
NOTYPE
Suppresses any error message text display by the REMOTE command. Only the return code will indicate the result of the request.
NOWAIT
This option tells the REMOTE command to not wait for the completion of the execution of the remote command. Also, when used with Mode 3 or Mode 5, the file is not transferred back to the Corona system even when the file is changed on the remote system.
Notes
When Corona-file-desc is used (Mode 3 and Mode 5) you must specify the drive code for the file. It is the colon and drive code at the end of the file description that identifies it as Corona file description instead of a Windows file description.
>remote rep://admin "tbackup s tape1 (backup verify full"
Restrictions
For Mode 1 and Mode 2, the server machine specified by server must, of course, be accessible from this machine and it must have an ExecNet server operating on it. Also for Mode 1 and Mode 2, the command executed must not require a console keyboard or display. You may, however, invoke commands that use the printer or other public device: >remote rep://private@saturn "list some.txt (prt2"
Mode 3, Mode 4, Mode 5 and Mode 6 are only valid when invoked from a
TWS console. See also
NetTerm, TWS
Remote 485
Commands
The options on this REMOTE command line are not passed as options to the command or Windows-command. The command may have options specified but to do so you must enclose the desired command name and its options within quotes. For instance:
Commands
486 Remote
Rename Command Rename changes the name of an existing file, library or directory.
RENAME
from-file to-file ( options
2
RENAME
file ( FILES options
3
RENAME
( options
Commands
1
file
»
file name with optional path
from-file
»
file name with optional path; may contain wild cards
to-file
»
file name with optional path; may contain wild cards
options
»
NOQUERY NOTYPE QUERY TYPE
Operation
Mode 1—Changes the name of from-file to to-file. >rename this.file that.file "THIS.FILE:S" renamed "THAT.FILE:S". 1 file renamed.
The from-file and to-file may contain wild-card specifications. See “Wild Card Specifications” on page 138. They may also contain complete or partial path specifications as long as the referenced file or directory is one that you have access to that location. Mode 2—file is an ASCII stream file containing two file descriptions per line. The first file description in the line is treated as a from-file and the second file description is the to-file. For each line in file, a Mode 1 Rename is performed. This mode of the Rename command is convenient when one or more sets of files are repetitively renamed. Merely edit a file containing file description pairs, such as: >edit daily.files customer.master:s /prior/customer.master:s customer.history:s /prior/customer.history:s general.ledger.*:s /prior/=.=.=:s check.*:s /prior/=.= >rename daily.files (file noquery notype
Rename
487
Mode 3—This is the interactive mode of the Rename command. Since no files are specified on the command line you are prompted to enter the file descriptions to rename.
Commands
>rename (noquery Enter file name list, terminate with empty line. ?MENU.BASIC Destination file name missing. ?MENU.BASIC PROGRAM.BASIC.= "MENU.BASIC:S" renamed "PROGRAM.BASIC.MENU:S". ?SAMPLE.FILE* /COPIED/SAMPLES/=.= "SAMPLE.FILE1:S" renamed "/COPIES/SAMPLES/SAMPLE.FILE1:S". "SAMPLE.FILE2:S" renamed "/COPIES/SAMPLES/SAMPLE.FILE2:S". ?
Options
NOQUERY
Indicates that you do not want to be asked for confirmation before renaming each file. This is a default option when wild cards are not used. >rename gl.* general.ledger.= (noq "GL.MASTER:S" renamed "GENERAL.LEDGER.MASTER:S". "GL.JOURNAL:S" renamed "GENERAL.LEDGER.JOURNAL:S". "GL.HISTORY:S" renamed "GENERAL.LEDGER.HISTORY:S". 3 files renamed.
To disable this option use the QUERY option. NOTYPE
Tells Rename to not display the results of each file renamed on the standard output device. The general result message (the “nn files renamed.” message displayed before exiting Rename) is also suppressed with this option. >rename gl.* Ok to rename Ok to rename Ok to rename
gltest.= (not "GL.MASTER:S" (Yes,No,All) Y "GL.JOURNAL:S" (Yes,No,All) Y "GL.HISTORY:S" (Yes,No,All) Y
To disable this option use the TYPE option. QUERY
Tells Rename to “query” or ask if each file matching the file specifications is to be renamed. This is a default option when wild cards are used. >rename *.data =.testdata Ok to rename "CUSTOMER.DATA:S" (Yes,No,All)
When the “Ok to rename” question is asked, you may respond with a (Y) for yes, (N) for no or (A) for all. Responding with (A) means yes to this file and all remaining files are renamed without being queried. Respond with (Esc) to cancel the Rename operation. 488 Rename
To disable this option use the NOQUERY option. TYPE
A default option that tells Rename to display the results of each file erased on the standard output device. This display can be redirected.
To disable this option use the NOTYPE option. Defaults
TYPE and QUERY are default options.
Restrictions
You cannot rename a file that is erase, read or write protected. You cannot rename a file to another drive. Use CopyFile or move Move for that. You cannot rename a file to a file description of an existing file. By default, only files owned by the current account are renamed. To rename a file owned by another account, you must specify the owning account name as part of the path: >rename private\his.file my.file
This command renames the file HIS.FILE owned by the account named PRIVATE to your account, current working directory, with the name MY.FILE. By default, the to-file is in your account in the current working directory but you may specify a path to the account and directory that you want to rename it to. >rename my.file account\textfile/samples/new.file "/MY.FILE:S" renamed to "ACCOUNT\TEXTFILE/SAMPLES/ NEW.FILE:S".
When the destination file specification includes a path, that path must exist. Rename does not create subdirectories. See also
Change, FileManager, CopyFile, Move
Rename
489
Commands
>rename program.source.* =.basic (noquery "PROGRAM.SOURCE.CUST:S" renamed "CUST.BASIC:S". "PROGRAM.SOURCE.LEDGER:S" renamed "LEDGER.BASIC:S". "PROGRAM.SOURCE.MENU:S" renamed "MENU.BASIC:S". "PROGRAM.SOURCE.REPORTS:S" renamed "REPORTS.BASIC:S". 4 files renamed.
Commands
490 Rename
Repeat Command EXEC The Repeat EXEC executes a command several times.
REPEAT
count command-line »
any valid THEOS command
count
»
number of times to execute command-line
Operation
Commands
command-line
This EXEC program merely repeats the execution of some command one or more times. >repeat 3 copyfile one.file to.another (append Repeat # 1 of 3 >COPYFILE ONE.FILE TO.ANOTHER (APPEND "ONE.FILE:S" appended to "TO.ANOTHER:S". One file copied. Repeat # 2 of 3 >COPYFILE ONE.FILE TO.ANOTHER (APPEND "ONE.FILE:S" appended to "TO.ANOTHER:S". One file copied. Repeat # 3 of 3 >COPYFILE ONE.FILE TO.ANOTHER (APPEND "ONE.FILE:S" appended to "TO.ANOTHER:S". One file copied. >
Repeat 491
Commands
492 Repeat
Replace Command Filter The Replace command modifies text files by changing (replacing) existing text strings with a new text strings.
REPLACE file ( option ... from-text to-text ...
2
REPLACE ( option ... from-text to-text ...
file
»
file name with optional path
from-text
»
text string specifying existing text in file
to-text
»
text string specifying the “change to” text
option
»
NOCASE
Operation
Commands
1
NODATA
Mode 1—The text file is opened and read. Every occurrence of the character sequence from-text is replaced with the character sequence to-text. If there are multiple from-text to-text pairs, then each occurrence of each of the from-text strings in the file is replaced with the corresponding to-text. The result is saved using the original file name. No backup copy of the original file is kept. Mode 2—Similar to Mode 1 except the source and destination files are stdin and stdout respectively.
Options
Because it is possible that an option keyword might be a desired from-text, to use one of the options you must specify a null or empty field first, followed by the option keyword. For example: >replace my.txt ("" nocase "existing text" "new text"
The above command uses the NOCASE option. If you had entered the command: >replace my.txt (nocase "existing text" "new text"
it will report a syntax error because the “nocase” token and the “new text” token are interpreted as from-text arguments but there is no matching totext argument for the “new text” token. NOCASE
Indicates that the case mode of the from-text item and the text in the file should be ignored when looking for matches. The case of the to-text item is used when text is replaced.
Replace 493
NODATA
Commands
Notes
Indicates that, when a from-text item is replaced in the file, if the result is a blank line then the line should be deleted from the file.
The to-text argument may be a null or empty string. To specify an empty string use a pair of quotation marks with no characters between them. The return code is set to the total number of instances that from-text was found and replaced with to-text.
Cautions
No backup copy of the original file is made.
Restrictions
Because the from-text and to-text are specified with ASCII text strings, the file should be an ASCII text file. For instance, a MultiUser BASIC source program file can be used if it was saved with the SAVEA or SAVEU commands.
See also
LineEdit, WinWrite
494 Replace
Restore Command The Restore command retrieves the “archive copy” of a file, set of files or an entire disk volume. This command is the complement of the TArchive command.
RESTORE
from-drive to-drive ( options
2
RESTORE
file to-drive ( options
3
RESTORE
from-drive ( SHOW options
4
RESTORE
from-drive ( VERIFY
Commands
1
aaa
»
account name
d
»
drive code or disk volume name
lll
»
disk volume name of first disk in archive
file
»
file name with optional path; may contain wild cards
from-drive
»
drive letter of archive source or logical tape name
name
»
archived file name
nnn
»
new directory size
to-drive
»
drive letter of destination disk
options
»
ACCOUNT ALL ASK CLEAR DRIVE d FROM aaa LABEL lll
MULTIUSE NAME name NEWFILE NOASK NOQUERY NOSYSFILE
NOTYPE OLDER OLDFILE PRTnn QUERY REPLACE
REWIND SHOW SIZE nnn SUBDIR TYPE VOLUME
The Restore command only restores files from an archive volume created with the TArchive command or the Archive command from a THEOS 4.x system. The archive volume contains special, compressed copies of files. See “TArchive” on page 601. The TArchive and Restore commands have been replaced with the TBackup command.
Restore 495
Operation
Mode 1—Restores all of the files from the archive volume in from-drive to the disk in to-drive. >restore tape s
Commands
Mode 2—Restores file from the archive volume to the to-drive in the current account. Unless one or more options are used to indicate otherwise, the file in the archive volume must be owned by the current account name. >logon private >restore some.file:f s (noask Searching for account "PRIVATE". Searching for file "SOME.FILE". Restoring "SOME.FILE:S". >logon develop >restore those.files.*:f s (from private Source is Disk F Destination is Disk S Mount volumes now: Source is labeled "ArchiveD". Archive from disk "THEOS" on 10/15/96, at 08:36. Destination is labeled "THEOS". OK to start restore (Y/N) Y Searching Searching Restoring Restoring Restoring Restoring Restoring
for account "PRIVATE". for file "THOSE.FILES". "THOSE.FILES:S". "THOSE.FILES.FILE1:S". "THOSE.FILES.FILE2:S". "THOSE.FILES.FILE3:S". "THOSE.FILES.FILE4:S".
In this mode files are always restored to the current account. Mode 3—Displays a file listing of the files in the archive volume in fromdrive. >restore f (show Account: 10\PRIVATE Filename Filetype Member SOME THOSE
FILE FILES
FILE1 FILE2 FILE3 FILE4
28 Aug 2001 9:01am Page 1 Dr
Date 01/26/01 01/20/01 03/19/00 09/00/00 10/22/01 12/01/87
Time Org Protect
Size
12:46 13:34 17:09 11:28 11:34 05:00
1335 1280 1284 2257 31 9895
S L S S S S
..WR.... ........ ..W..... ..W..... ..W..... ..W.....
The SHOW option does not have to be specified. 496 Restore
Recl Keyl 20
>restore f Account: 10\PRIVATE Filename Filetype Member SOME THOSE
FILE FILES
Dr
Date 01/26/01 01/20/01 03/19/00 09/00/00 10/22/00 12/01/87
Time Org Protect
Size
12:46 13:34 17:09 11:28 11:34 05:00
1335 1280 1284 2257 31 9895
S L S S S S
..WR.... ........ ..W..... ..W..... ..W..... ..W.....
Recl Keyl 20
Mode 4—Verifies the integrity and readability of the archive volume in from-drive. It also displays a listing of the files in the archive volume similar to the display output by the TArchive. This mode does not compare the archive volume to its original source disk. Options
ACCOUNT
Tells Restore to only restore those files from the archive volume that are owned by one account. This is a default option when Mode 2 is used. If the FROM account option is not specified, an implied FROM current-account is used. That is, only those files owned by the account that you are currently logged onto are restored. >restore tape s (account noask Searching for account "SYSTEM". Restoring "SYSTEM.B3220LIB:S". Restoring "SYSTEM.B3220LIB.ACCESS:S". ...
The ACCOUNT option is the opposite of the VOLUME option. ACCOUNT is the default option when Mode 2 is used; VOLUME is the default option when Mode 1 is used. ALL
Restores files from the archive volume even if the file already exists on the to-drive and even if the file has erase protection set. Also see the options NEWFILE, OLDFILE and REPLACE.
Restore 497
Commands
FILE1 FILE2 FILE3 FILE4
28 Aug 2001 9:01am Page 1
ASK
This is a default option that instructs Restore to ask the operator to mount the source and destination volumes and waits for confirmation that the proper volumes are mounted. >restore tape s
Commands
Source is TAPE1 Destination is Disk S Mount volumes now: Source is labeled "Archived". Archive from disk "THEOS" on 10/15/96, at 08:36. Destination is labeled "THEOS". OK to start restore (Y/N)
The first question, “Mount volumes now,” must be answered with an (EnterÌ˛). All responses other than (EnterÌ˛) or (F9) are ignored. The second question, “OK to start restore (Y/N),” may be answered with any response. All responses other than (N) are treated as a (Y) response. CLEAR
Tells Restore that, before restoring the first file, the directory of to-drive is to be cleared. A current directory size is used unless the SIZE option is also specified. This option may only be used when option VOLUME is in effect with a Mode 1 Restore. When restoring to the S drive with this option you must be in single-user mode...the MULTIUSER option is ignored. Also, the NOASK option is ignored. After the restore you are prompted to reboot the system.
DRIVE d
Used with a multiple disk archive volume to specify that you want to restore only those files that were archived from drive d. d may be specified as a drive code or a volume name. >archive s a b tape (noask notype >restore tape c (drive a
This Restore command restores the files to the C drive that were archived from the A drive.
498 Restore
FROM account Tells Restore to only select those files on the archive vol-
ume that were owned by account name account at the time the archive was created. See the second Mode 2 example. LABEL label Tells Restore that the multiple disk/tape archive volume uses
This label is used in the prompt messages only and is not related to the disk label written when a disk is formatted. MULTIUSER
Allows Restore to restore to a public drive even though other users may be logged on and active. Normally, when Restore is instructed to perform a full volume restore (option VOLUME) on a public disk, it requires single-user mode. If other users are logged onto the system, it displays the message: “Must be single-user or private volume.” Using this option tells Restore to not restrict the restore to single-user operation (the message is still displayed). THIS CAN BE EXTREMELY DANGEROUS! If another user changes some files while the restore is being done, the integrity of the files restored may be lost. Use this option only if you are sure that all other users are inactive.
NAME name Specifies the name of the archive volume set. When the file-
type is not specified in name the default file-type of ARCHIVE is used. When this option is not used the name of the archive volume must be ARCHIVE.VOLUME01. NEWFILE
Specifies that Restore will only attempt to restore a file if it does not already exist on to-drive.
NOASK
Disables the source and destination volume operator confirmation at the beginning of the restore and when subsequent disks or tapes are needed.
NOQUERY An option that tells Restore to not ask for confirmation on each
file being restored. In addition, this option suppresses the query when a file exists and the REPLACE option is not specified, as well as the query when a file exists, is protected and the ALL option is not specified.
Restore 499
Commands
disk/tape labels of label, with each disk/tape of the set incrementing the last character of label. For instance, disk one is labeled “Mon-1,” disk two is labeled “Mon-2” and so on.
With NOQUERY in effect the following questions are never asked: Ok to restore "XXX" (Yes/No/All) File "XXX" exists, ok to restore (Yes,No,All) File "XXX" protected, ok to restore (Yes,No,All)
Commands
NOSYSFILES Do not restore operating system files. See “NOSYSFILES” on page 503. NOTYPE
Tells Restore to not display account names, subdirectory names, library names or file names on the standard output device as they are being restored.
OLDER
Only restore files if the file does not exist on the destination or if the existing file on the destination is older than the archived file.
OLDFILE
Specifies that Restore will only attempt to restore a file if it does exist on to-drive. This option implies the REPLACE option.
PRTnn
Indicates that Restore is to print the display of account names, subdirectory names, library names and file names on the attached printer number nn. The option keyword PRT may be specified as PRT, PRINT or PRINTER. PRINTER1 may be specified as P.
QUERY
Tells Restore that the operator is to be “queried” or asked if each file matching the selection criteria is to be restored. >restore f s (noask query notype Ok to restore "SAMPLE.FILE:S" (Yes/No/All) N Ok to restore "SELECTED.EXEC:S" (Yes/No/All) N
When the “Ok to restore” question is asked, you may respond with a (Y) for yes, (N) or (EnterÌ˛) for no or (A) for all. Responding with (A) means yes to this file and all remaining files are included without being queried. Respond with (Esc) to cancel the restore (files already restored remain restored).
500 Restore
REPLACE
This option tells Restore that it is okay to attempt to restore a file even if it already exists on the to-drive. When this option is not used (and the NOQUERY option is not used), an attempt to restore an existing file causes you to be queried: File "XXX" exists, ok to restore (Yes,No,All)
REWIND
When source is tape, rewind to start of tape before beginning the restore operation. This is a default option.
SHOW
Display the contents of the archive volume without restoring any files.
SIZE nnnn Used in conjunction with the CLEAR option. This option tells Restore what size to make the newly cleared directory on the
to-drive. SUBDIR
Tells Restore to restore the files into the current working directory. When this option is not used, files are restored to the todrive’s root directory. This option is normally only used when restoring files that were archived from a root directory. When restoring a file that was in a subdirectory, it is restored to that same directory but subordinate to the current working directory. For instance: /SUBDIR/SOME.FILE:S is archived and then you CHDIR to the SUBDIR directory and perform a restore with the SUBDIR option. The file is restored to /SUBDIR/SUBDIR/SOME.FILE:S.
TYPE
A default option that tells Restore to display each account name, subdirectory name, library name and file name on the standard output device (normally the console) as it is being restored. This display can be redirected. The display with this option differs between an ACCOUNT restore and a VOLUME restore. A VOLUME restore displays like the TArchive display, showing the account names, subdirectory names, library names and file names with indentation to indicate the hierarchy of the account and directory structure.
Restore 501
Commands
Valid responses are identical to the QUERY option responses.
For instance, the following is a typical display during a full volume restore:
Commands
ACCOUNT: 2=SAMPLES File: READ.ME File: SAMPLES.EXEC Subdirectory: C32 Library: C32.CMD32 Member: C32.CMD32.FINS Member: C32.CMD32.PRTF ...
An ACCOUNT restore displays a simple message for each file restored: Searching Restoring Restoring Restoring Restoring Restoring ...
for account "SAMPLES". "READ.ME:S". "SAMPLES.EXEC:S". "/C32/C32.CMD32:S". "/C32/C32.CMD32.FINS:S". "/C32/C32.CMD32.PRTF:S".
When a qualifying file cannot be restored for some reason, the TYPE option displays an appropriate message: File "XXX" not restored because file exists. File "XXX" not restored because disk full. File "XXX" not restored because directory full.
To disable this option use the NOTYPE option. VOLUME
Restores the entire archive volume to the to-drive. This is the default option with Mode 1 and can only be used with Mode 1.
Defaults
ASK and TYPE are default options. VOLUME is a default option with Mode 1, ACCOUNT is a default option with Mode 2.
Restrictions
The Restore command requires a privilege level of four. Individual files on a multivolume archive can only be restored with the Mode 2 form of this command if the files are on the first volume of the archive set. When the files are on secondary volumes of the set, use the Mode 1 form of the command with the QUERY option.
502 Restore
NOSYSFILES
When the NOSYSFILES option is specified, the following sets of files are skipped if found on the archive volume. System command files System help files System menu files Commands
Device drivers Class code definitions etc. See also
TArchive, Backup, CopyFile, Disk, Tape, TBackup
Restore 503
Commands
504 Restore
RMCP Command Similar to the POP3Test command, the RMCP command checks a mail server to see if there is any mail available for a specified email account.
user@host
user
»
E-mail account name
host
»
Domain or host of account
Operation
Commands
RMCP
Using the Remote Mail Checking Protocall (RMCP) the host is contacted with user as the account name. The response code received from the mail server is interpreted and displayed on the console and the return code is set to reflect this response. The possible messages displayed by this command are: You have new mail. You have some old mail. You have no mail. There may also be error messages displayed.
Notes
Account names are case-sensitive on some servers. To ensure that the account that you provide is the same as the ones given to the host, enclose the argument in quotation marks. >RMCP "[email protected]"
No text is displayed on the console when this command is executed from an EXEC program or a MultiUser BASIC language program using the SYSTEM or CSI statement or a C language program using the system() function.
RMCP
505
Return Codes
Because this program is frequently invoked from within a program the return code is set to specific code reflecting the status of mail for the user@host.
Commands
RC
See also
506 RMCP
Meaning
0
There is no mail on the server for this account.
1
Some connection error occurred or the server does did not respond.
2
There is no new mail for the user on the server but there is some old mail there.
3
There is some new mail for the user on the server.
POP3Test, TheoMail
RmDir Command The RmDir or Remove Directory command erases a subdirectory and all of its files.
RMDIR
directory… ( options »
subdirectory name; may contain path; may contain wild cards
options
»
NOQUERY NOSAVE NOTYPE QUERY TYPE
Command synonym: Operation
RD
Note: This command does not normally remove directories from disk. Instead, it moves the requested directory and its files to the recycle bin. You must use the NOSAVE option to remove the directory from the disk with this command. Refer to Recycle Bin in the THEOS Corona Version 5 Operating System Reference manual. The directory or directories specified are erased. >rmdir subdir1 subdir2 "/SUBDIR1:S" erased. "/SUBDIR2:S" erased.
If a directory contains files or subordinate directories, you are asked to confirm that you want to remove the directory and all of its subordinate files and directories. >rd sample (notype
RmDir 507
Commands
directory
Options
NOQUERY
Indicates that you do not want to be asked for confirmation before erasing a subdirectory containing files.
Commands
>rd subdir1 (noquery "/SUBDIR1/TEST1.FILE:S" erased. "/SUBDIR1/TEST2.FILE:S" erased. "/SUBDIR1/TEST3.FILE:S" erased. "/SUBDIR1/SUBDIR11/TEST1.FILE:S" erased. "/SUBDIR1/SUBDIR11/TEST2.FILE:S" erased. "/SUBDIR1/SUBDIR11/TEST3.FILE:S" erased. "/SUBDIR1/SUBDIR11:S" erased. "/SUBDIR1/SUBDIR12:S" erased. "/SUBDIR1:S" erased.
Subdirectories that do not contain files are not queried, even without this option. NOSAVE
Causes the directories to be erased from the disk at this time. When this option is not specified and the drive is an image drive or hard disk drive, the directories are simply moved to the recycle bin.
NOTYPE
Tells RmDir to not display the results of each file or directory erased on the standard output device. >tree / subdir1 subdir11 subdir12 subdir2 >rd subdir1 (noq >tree / subdir2
QUERY
508 RmDir
Tells RmDir to “query” or ask if each directory matching the file specifications is to be removed. This is a default option when wild cards are used.
When the “Ok to remove” question is asked, you may respond with a (Y) for yes, (N) for no or (A) for all. Responding with (A) means yes to this directory and all remaining directories are removed without being queried. Respond with (C) or (Esc) to cancel the remove operation. TYPE
>rmdir * "/SUBDIR1:S" erased. "/SUBDIR2:S" erased.
To disable this option use the NOTYPE option. Notes
The command name RD is a synonym to the RmDir command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGES/language/ SYNONYM.TXT file and, if standard synonyms are disabled (see “Account” on page 13 of this manual and “STDSYN” on page 110 of the THEOS Corona Version 5 Operating System Reference), this synonym name may not be allowed. This command does not normally remove the directory or its files from disk. Instead, it moves the requested directory and files to the recycle bin. You must use the NOSAVE option to remove the file from the disk with this command.
Recycle Bin
When the NOSAVE option is not used, all of the files erased by this command are not actually erased. Instead, the file is moved to the recycle bin which is a special, reserved directory on the SYSTEM account. Should the need arise, an erased directory and its files can be recovered from this recycle bin by using the UnErase command. However, due to space limitations, files in the recycle bin are not retained forever.
Defaults
TYPE is a default option.
See also
FileManager, Erase, UnErase
RmDir 509
Commands
A default option that tells RmDir to display the results of each file and directory erased on the standard output device. This display can be redirected.
Commands
510 RmDir
Route Command The Route command displays and maintains the routing tables used to establish network paths to various IP addresses. ROUTE
2
ROUTE ( PRTnn
3
ROUTE ( ADD net-addr net-mask gateway-addr host-addr
4
ROUTE ( DELETE net-addr net-mask
Commands
1
gateway-addr
»
dotted IP address of gateway machine
host-addr
»
dotted IP address of NIC in local machine used to access gateway-addr
net-addr
»
dotted IP address of destination network
net-mask
»
dotted subnet mask for the destination network
The routing table maintained by this command is the internal, memory-resident table. This table is created dynamically each time that the network is started. It is a combination of default entries, entries provided by a gateway (if any) and by dynamic network processes such as DialUp Networking. It is augmented by the routes defined with this command and by routes defined in the /THEOS/CONFIG/NETROUTE.CFG:S file. Operation
Mode 1—Displays the current internal routing table on stdout. >route Net Address
Subnet Mask
Gateway Address Host Address
127.0.0.1 127.255.255.255 127.0.0.0 192.168.100.1 192.168.100.255 192.168.100.0
255.255.255.255 255.255.255.255 255.0.0.0 255.255.255.255 255.255.255.255 255.255.255.0
127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.100.1 192.168.100.1
127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.100.1 192.168.100.1
Mode 2—Displays the current internal routing table on the designated printer. Mode 3—Adds another route definition to the internal routing table. >route (add 192.168.0.0 255.255.255.0 192.168.100.2 192.168.100.1
The above command adds another entry to the routing table. Route 511
Mode 4—Deletes a route definition from the internal routing table. >route (delete 192.168.0.0 255.255.255.0
Notes
For most networks, it is not necessary to modify this table.
Commands
All IP addresses starting with 127 are “loopback addresses.” By convention, only the 127.0.0.1 address is used. Network packets addressed to this address are not sent to the network hardware. Instead, they are captured by the network software and handled internally on this machine. When the network on this machine wants to send a network packet to another node on the network the internal routing table is used to determine and control what path is used to find that machine. For instance, the following diagram shows a typical, small LAN with access to the Internet through an router. The router could be replaced with a DSL modem or a network modem-sharing device. It could even be a computer with a proxy server and modem connection to an ISP. .1
.3
.2
.5
.4
.7
.6
.9
.8
.100 router
The .1, .2 etc. references are to the last portion of the IP address of the node.
Each of the THEOS-machine nodes on the LAN can use the default routing tables generated when the network software is started. These default routes are identical with the exception that each machine’s routing table points to its own NIC address. Assuming that the LAN is a Class C network addressed with 192.168.100.*, the routing table for the .1 node is:
512 Route
Net Address
Subnet Mask
Gateway Address Host Address
0.0.0.0 127.0.0.1 127.255.255.255 127.0.0.0 192.168.100.1 192.168.100.255 192.168.100.0
0.0.0.0 255.255.255.255 255.255.255.255 255.0.0.0 255.255.255.255 255.255.255.255 255.255.255.0
192.168.100.100 127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.100.1 192.168.100.1
192.168.100.1 127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.100.1 192.168.100.1
This table specifies: Line 1: All packets not routed by the other entries are sent to the router at 192.168.100.100 via the NIC addressed at 192.168.100.1. Line 2: All packets addressed to localhost are sent to the loopback address.
Line 5: All packets addressed to this machine (from this machine) are sent to the loopback address. Line 6: All packets broadcast to the local network are sent to this network via the NIC addressed at 192.168.100.1. Line 7: All packets broadcast to other machines on the subnet are sent to this network via the NIC addressed at 192.168.100.1. A more complex network might be: .1
.3
.2
.5
.4 .9
.7
.6
.9
.8
192.168.100.*
.100 router
192.168.50.*
.1
.2
This network is comprised of three networks: the 192.168.100.* LAN, the 192.168.50.* LAN and the Internet. One of machines has two NICs installed in it and acts as a “bridge” between the two LANs. Each of the machines on the 192.168.100.* LAN must be configured to route packets addressed to the other LAN through the .4 node. You could do this by using the Route command to add an additional route definition. On the .1 machine you would: >route (add 192.168.50.0 255.255.255.0 192.168.100.4 192.168.100.1
Route
513
Commands
Line 3 and 4: All packets broadcast to the localhost are sent to the loopback address.
On the .2 machine you would: >route (add 192.168.50.0 255.255.255.0 192.168.100.4 192.168.100.2
Commands
Similar commands are done for each of the other machines except the .4 machine itself. On that machine the default routing is already different because the two NICs were configured in Setup NET. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) Net Address
Subnet Mask
Gateway Address Host Address
0.0.0.0 127.0.0.1 127.255.255.255 127.0.0.0 192.168.50.9 192.168.50.255 192.168.50.0 192.168.100.4 192.168.100.255 192.168.100.0
0.0.0.0 255.255.255.255 255.255.255.255 255.0.0.0 255.255.255.255 255.255.255.255 255.255.255.0 255.255.255.255 255.255.255.255 255.255.255.0
192.168.100.100 127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.50.9 192.168.50.9 127.0.0.1 192.168.100.4 192.168.100.4
192.168.100.4 127.0.0.1 127.0.0.1 127.0.0.1 127.0.0.1 192.168.50.9 192.168.50.9 127.0.0.1 192.168.100.4 192.168.100.4
These additional entries tell the network software to “forward” all packets received for the 192.168.50.* network to that network by transmitting them via the NIC at 192.168.50.9. No additional routing entries need to be added on this machine. Similar routing entries must be added to the machines on the 192.168.50.* LAN.
514 Route
Initial Routing Table
When the network is first started at boot time or with the NET START NETWORK command, the internal routing tables are initialized to include: A path to the default gateway, if defined Three entries for loopback addresses Three entries for each NIC IP address defined
During the course of operation, additional entries are added and deleted from the routing table due to transient PPP connections. Restrictions
Routes added or deleted by this command are only defined until the network is restarted by a system reboot. If you want the changes made with this command to be used the next time that your network is restarted, you must manually add them to the /THEOS/CONFIG/NETROUTE.CFG:S file.
Route
515
Commands
Entries copied from the /THEOS/CONFIG/NETROUTE.CFG:S file, if any
Commands
516 Route
Script Command Process and format the text in a file including page headings, paragraph justification, chapters, contents, etc.
SCRIPT
filename ( options
2
SCRIPT
filename outfile ( FILE options
3
SCRIPT
filename readfile ( options
Commands
1
filename
»
Script text file with commands
outfile
»
Name of output file when FILE option used
readfile
»
File name for source of READ command variables
options
»
Cnn FILE
Operation
INDEX PRTnn
REPEAT nn TYPE
WAIT
nn mm
Mode 1—Process the text and commands in the file filename and output the result according to the options specified. Mode 2—Process the text and commands in the file filename and output the result to outfile according to the options specified. Mode 3—Process the text and commands in the file filename and output the result according to the options specified. If there are any READ commands in filename, they read their values from readfile.
Options
Cnn
Use printer class code nn for formatting the output.
FILE
Output the formatted result to outfile. outfile must be specified as the first parameter after filename.
INDEX
Only create and output the index information.
PRTnn
Output the result to printer nn.
REPEAT nn Producs nn copies of the output. TYPE
Output the result to the console.
WAIT
Pause at the end of each page for operator confirmation/ release.
Script
517
nn mm Defaults
Only output from page nn through page mm.
The default output is to the console.
Commands
The initial definition of the special characters is: . (period) for start of command, @ for escape, _ for underline, & for boldface. Script Commands
ALIGN
Align following text lines to the left or to the right.
APPENDIX Start a new appendix. BIBLIOGRAPHY Start the bibliography. BREAK
Line break.
BOX
Draw a box.
CENTER
Center some text.
CHAPTER
Start a new chapter.
CONTENTS Insert table of contents here. COPY
Copy and process a file.
CPI
Set the character size.
EJECT
Start a new page.
END
End of this file.
FAX
Invoke THEO+Fax.
FILL
Set fill mode.
FOOTING
Set left and right footing text.
FORMAT
Format text.
FOREWARD Begin forward. GLOSSARY Begin glossary. GUTTER
Set inside and outside gutter character.
HEADING
Set left and right heading text.
HYPHENATE
518 Script
Enable word hyphenation or define hyphenation for a word.
IGUTTER
Set inside gutter character.
INDENT
Set paragraph indent.
INDEX
Insert index here.
INPVAR
Read value of variable.
JUSTIFY
Commands
INTRODUCTION
Begin introduction.
Set justify mode.
LFOOTING Set left footing text. LHEADING Set left heading text. LINE
Create line of repeated characters.
LINK
Link to a new text file.
LPI
Set lines per inch.
LSIZE
Set left page size.
LMARGIN
Set left margin.
NOFILL
Turn off fill mode and justification.
NOHYPHENATE
Disable hyphenation mode.
NOJUST
Disable justification mode.
OGUTTER
Set outside gutter character.
PAGE
Conditional eject.
PARASKIP Set paragraph spacing. PART
Start a new part.
PAUSE
Wait for operator to respond.
PITCH
Define font sizes to use.
POSITION
Move to line position.
PREFACE
Begin preface.
READ
Read values for a variable from an external file.
Script
519
REMARK
Comment line.
RFOOTING Set right footing text.
Commands
RHEADING Set right heading text. RMARGIN
Set right margin.
RSIZE
Set right page size.
SECTION
Start a new section.
SETAPPENDIX SETBOLD
Define next appendix letter.
Define boldface character. (&)
SETCHAPTER SETCOL
Define next chapter number.
Define tab character.
SETCOMM Define command character. (.) SETESCAPE SETHYPH
Define escape character. (@)
Define hyphenation character (-).
SETITALIC Define italics character. SETPAGE
Define next page number.
SETPART
Define next part number.
SETSPACE Define hard space character SETTAB
Define tab character.
SETUNDERLINE
520 Script
Define underline character. (_)
SETVAR
Define variable value.
SIZE
Set page size.
SKIP
Output blank lines.
SPACE
Set line spacing.
TABSET
Define tab stop columns.
TITLE
Define output as book and set book title.
Variables and codes
Display text on console.
.
This character is used at the beginning of a line that is a command. The character can be changed with the SETCOMM command.
&
This character surrounds text that is to be boldfaced. Character can be changed with the SETBOLD command.
_
This character surrounds text that is to be underlined. Character can be changed with the SETUNDERLINE command.
@
The following character is to be interpreted differently than normal. This “escape” character can be changed with the SETESCAPE command.
@1 - @99
Variables.
@D
Date in mm/dd/yy format.
@d
Date in Monthname, dd, yyyy format.
@T
Time in hh:mm (24 hour) format.
@t
Time in hh:mm am/pm format.
@P
Current page number.
@S
Current chapter or appendix name.
@,
Tab to center or right zone (only in heading/footing/format text).
@;
Begin new line (only in heading/footing/format text)
Script
521
Commands
TYPE
Commands
522 Script
See Command Filter The See command copies a file to the standard output device, making all nonprintable characters visible.
SEE
2
SEE
file Operation
file...
»
Commands
1
file name with optional path; may contain wild cards
Mode 1—Each file in the list of files is copied to the standard output device. Each nonprintable character in file is displayed with two or three displayable characters: Nonprintable character values less than the space character (32) display with a leading up-caret ( ^ ) followed by the control character. For instance, a tab character displays as ^I. Nonprintable character values greater than 127 display with a leading tilde ( ~ ) followed by the display for the character value minus 128. For instance, the character value 137 displays as ~^I and the value 159 displays as ~^_. The DEL character (value 127) displays as ^?. The end-of-line character (carriage return) and NULL characters (0) display as a dollar sign ( $ ) unless the file specification is preceded with a minus sign character. >see system.cmd32.repeat system.cmd32.repeat:s: ; get type of first argument$ &t = &typ &1$ $ ; validate count and command$ &if (&index < 2) | (&t <> N)$ ^I&control off$ ^Ihelp repeat$ ...
Multiple files can be specified on the command line: >see file1 file2 file3
See
523
Each file is displayed on the standard output device. The minus sign specification (Mode 2) can be used to indicate that the end-of-line character is not displayed as a dollar sign:
Commands
>see - system.cmd32.repeat system.cmd32.repeat:s: ; get type of first argument &t = &typ &1 ; validate count and command &if (&index < 2) | (&t <> N) ^I&control off ^Ihelp repeat ...
Multiple files can be specified, some without the minus sign specification and some with: >see file1 file2 file3 - file4 file5
In the above command, the first three files are output with the dollar sign character displayed and the last two files are displayed without this character. Mode 2—Copies the file from standard input to standard output, displaying the nonprintable characters as described above. This mode is normally used when the See command is part of a pipe. >upcase system.cmd32.repeat | see ; GET TYPE OF FIRST ARGUMENT$ &T = &TYP &1$ $ ; VALIDATE COUNT AND COMMAND$ &IF (&INDEX < 2) | (&T <> N)$ ^I&CONTROL OFF$ ...
The minus sign specification can be used with this mode: >upcase system.cmd32.repeat | see ; GET TYPE OF FIRST ARGUMENT &T = &TYP &1 ; VALIDATE COUNT AND COMMAND &IF (&INDEX < 2) | (&T <> N)
Restrictions
file must be a stream file.
See also
List, More
524 See
Send Command EXEC The Send command is an EXEC language program that gives you convenient, command-line access to the THEO+COM command’s file send capability.
SEND
file ( options
2
SEND
file ( FILES options
file
»
file name with optional path; may contain wild cards
options
»
ASCII COMnn EOT
Operation
NOEOT THEOS TRACE
Commands
1
TRACEFILE fn XMODEM-1K XMODEM YMODEM XMODEM-CRC
Mode 1—Invokes the THEO+COM command in SEND mode. The first attached COM device is used unless the COMnn option is specified. If no protocol option is specified, the THEOS protocol is used. If the connection to the other computer is via a modem, it is assumed that the telephone connection has already been established with the Dial command or by using THEO+COM directly. >dial 1 800 123-4567 Dialing 1 800 123-4567 >send updated.stocklst
Mode 2—Similar to Mode 1, except file is an ASCII stream file that contains one file description per line. The SELECTED.FILES and SELECTED.EXEC files created by FileList and the FOUND.EXEC created by Look can be used for this specification file (see “The EXEC and FILES Options” on page 239). You may also create the file with an editor or application program. For instance, FileList is used to create a list of files to be sent: >filelist *.data:a (exec >filelist a not *.data:a (10/1/00 exec append
A file now exists that lists all of the “data” files and all files that have been changed since 10/01/2000. The following command sends these files to another computer connected via a COM attachment: >send selected.exec (file
Send
525
The THEOS protocol must be used in this mode. The files are sent with NOEOT in effect for all files except the last file, which uses EOT.
Commands
Protocol..... File name.... File size.... Blocks....... Transmitted.. Byte count... Block count.. File count... Elapsed time. Errors....... Message...... Progress.....
Send THEOS MY.DATA:S 1,235 5 0% 0 0 1 0:02 0 Waiting for receiver
File transfer in process. Press ESC to cancel.
Options
ASCII
Use the ASCII file transfer protocol. Essentially, this is no protocol and should be used only for short text files.
COMnn
Use the currently attached COMnn for the communications port. When this option is not specified, the first attached COM device is used.
EOT
A default option that tells THEO+COM to send the end-of-transmission codes after the file is sent. To disable this option use the NOEOT option.
NOEOT
Tells THEO+COM to not send the end-of-transmission codes after the file is sent. This option is used when several files will be sent. >send this.file (theos noeot >send that.file (theos eot
The above two commands send the two files to another computer. The other computer used the Receive command only once because the first file used NOEOT and the transmission was not terminated.
526 Send
THEOS
Use the THEOS SEND/RECEIVE protocol. This is the default protocol.
TRACE
Enables file transfer tracing. A window is opened in the upperright corner of the display, showing the protocol activity during a transfer.
ity is output to the file fn. XMODEM
Use XMODEM checksum, 256-byte protocol.
XMODEM-CRC Use XMODEM CRC-16, 256-byte protocol. XMODEM-1K Use XMODEM-1K, CRC-16, 1024-byte protocol for single file
transfers. YMODEM
Use YMODEM CRC-16, 1024-byte protocol. This protocol might be called YMODEM-BATCH in the other computer’s communication program because it can receive multiple files.
Notes
Refer to the THEO+COM Installation and User’s Guide manual for a full description of the operation of file transfers and the protocols used.
Defaults
The first attached COM device is used by default and the THEOS protocol is the default.
Restrictions
A COM device must be attached.
See also
Dial, PutFile, Receive, THEO+COM
Send
527
Commands
TRACEFILE fn Similar to the TRACE option except that the protocol activ-
Commands
528 Send
SendMail Client The SendMail client is a utility program that sends a text file as a mail message to a mail server on the network. This program is designed with a simple, command-line interface suitable for usage as a tool in application programs. For a mail client with a more userfriendly interface, use the TheoMail described on page 653.
SENDMAIL filename
Commands
1
( options
filename
»
name of file on local system
options
»
ATTACH BCC CC
FILES FROM HTML
RAW REPLYTO SMTP
SUBJECT TO
Operation
filename is sent to the SMTP Server specified in the THEOS E-mail configuration file (/THEOS/CONFIG/EMAIL). At a minimum, the TO and FROM option must be specified with valid e-mail addresses.
Options
ATTACH
Specifies that a file is attached to the message when it is sent. The file may be a text file or a non-text file such as a program or binary stream data file. The file must be accessible from the current account. Multiple files may be attached to a message by using the ATTACH option multiple times. >sendmail my.message (to [email protected] from [email protected] subject "example message w/attachments" attach sample.attach1 attach sample.attach2
The attached files may be of any type. As a THEOS command, it automatically converts formatted data files and compiled programs to a portable format. BCC
Indicates that a “blind carbon-copy” of the message is sent to the address specified. Recipient addresses specified with the BCC option receive a copy of the message. However, their address does not appear in any of the headers in any of the copies of the message sent. >sendmail my.message (to [email protected] from [email protected] bcc [email protected] subject "You're history"
SendMail
529
The above command sends the my.message file to both [email protected] and [email protected]. However, both copies are received with [email protected] in the “To” field and nothing in the “CC” field. Received messages never have a “BCC” field. Compare with the CC option described next. Commands
Multiple BCC addresses may be specified by either using one BCC option with an argument containing multiple addresses separated by comma, space, or by using multiple BCC option specifications. For instance, the following two commands produce the same result: >sendmail my.message (to [email protected] from [email protected] bcc [email protected] bcc [email protected] subject "Your termination" >sendmail my.message (to [email protected] from [email protected] bcc "[email protected], [email protected]" subject "Your termination" CC
Indicates that a “carbon-copy” of the message is sent to the address specified. >sendmail my.message (to [email protected] from [email protected] cc [email protected] subject "You're history"
The above command sends the my.message file to both [email protected] and [email protected]. Both copies are received with [email protected] in the “To” field and [email protected] in the “CC” field. In other words, all recipients of the message see that the message was sent to the addresses specified with the TO option and the CC option. Compare with the BCC option described above. Multiple CC addresses may be specified by either using one CC option with an argument containing multiple addresses separated by comma, space, or by using multiple CC option specifications. FILES
530 SendMail
Indicates that filename is not the name of the file to be mailed, but is a file that contains a list of files to be mailed. The files SELECTED.EXEC, SELECTED.FILES and FOUND.EXEC created by the FileList, Look and FileManager commands can be used for this purpose.
For instance, the FileList command is used to create a list of messages to be sent: >filelist *.message:a (01/20/01 exec
&1 ABC.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10 &1 GENERAL.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10 &1 GEORGE.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10
Only the file names in each line are used. Other characters are ignored. Assuming that these message files each start with the message headers necessary to send the message, they can be sent with this command: >sendmail selected.exec (files
Note that the SELECTED.FILES file created with the FileList command is only usable when the FD option is used also. For instance: >filelist *.message:a (01/20/01 files fd
FROM
Specifies the e-mail address of the author or creator of the message. This should be your e-mail address but, in fact, may be any valid-appearing address. The domain-name of this address must be valid because most mail servers will perform a DNS lookup on the domain-name specified. All e-mail messages must have a “From” field specified. It may be specified either with this command-line option or, if embedded mail headers are used, with one of those. >sendmail my.message (to [email protected] from [email protected] replyto [email protected] subject "Example message"
HTML
The text portion of the mail message is already formatted with HTML tags and SendMail should use the appropriate MIME headers to indicate this when it sends the message.
RAW
This option specifies that the filename already contains all of the necessary MIME headers and SendMail should send the message without examination or modification.
SendMail
531
Commands
This creates a SELECTED.EXEC file containing a list of all of the message files on the A drive that were created or modified after January 19, 2001. This file might look like:
REPLYTO
Specifies the e-mail address you want replies sent to. This should be your e-mail address and should refer to an actual e-mail account. Use this option when you want replies to a message to be sent to a different address than the one specified in the “From” field.
Commands
>sendmail my.message (to [email protected] from [email protected] replyto [email protected] subject "New product release"
Most e-mail clients (TheoMail, for example) provide an easy method of addressing a response to a received message. The address used by those “reply-to” capabilities of e-mail clients is the address specified with this REPLYTO option. When a REPLYTO address is not specified, the FROM e-mail address is used by e-mail clients. SMTP server
This option causes server to be used as the SMTP server instead of any value that might have been defined in the SETUP SMTP configuration file.
SUBJECT
Specifies the general subject of the message. Although not required, every message should have a subject line. The subject text may appear on the recipient’s e-mail client’s mailbox summary screens.
TO
Perhaps the most important piece of information in a message header, this option specifies the recipient address for the message. The address specified must be a valid e-mail address. >sendmail my.message (to [email protected] from [email protected] subject "New product release"
Multiple destination addresses may be specified with the CC or BCC options (along with this TO option) or by specifying a TO argument containing multiple addresses separated by comma, space, or by specifying the option multiple times. For instance, the following three commands will each send the message to [email protected] and [email protected]: >sendmail my.message (to [email protected] from [email protected] cc [email protected] subject "Staff meeting at 1:00" >sendmail my.message (to "[email protected], [email protected]" from [email protected] subject "Staff meeting at 1:00"
532 SendMail
>sendmail my.message (to [email protected] to [email protected] from [email protected] subject "Staff meeting at 1:00"
Embedded Mail Headers
The addressing headers for a message may be specified on the command line or with embedded headers at the beginning of the message file. For instance, a message file containing A staff meeting is scheduled at 1:00pm today in the 4th floor conference room. Your attendance is required. The Boss.
This file could be sent with the following command: >sendmail my.message (to "Alice " from "J.C. " subject "Staff meeting at 1:00"
If the message uses embedded headers, such as: To: Alice From: J.C. Subject: Staff meeting at 1:00 A staff meeting is scheduled at 1:00pm today in the 4th floor conference room. Your attendance is required. The Boss.
It can be sent with the following command: >sendmail my.message
SendMail
533
Commands
The difference between these messages will only be in the interpretation by the recipient. The first form sends the message to you with an informational copy to yourboss. The second and third forms send the message with equal importance to both recipients.
The following headers may be embedded at the start of a message file:
Commands
To: Cc: Bcc: From: Subject: Reply-to: Attach: When used, the mail headers must be the first lines in the file, they must start on the first column of the line and there must be one or more spaces following the colon character. A blank line separates the mail headers from the body of the message. Do not include any blank lines between embedded mail header lines. The Attach embedded header is followed with the path to the desired attachment file. You may use more than one Attach header when you want to attach multiple files. Wild cards are not permitted. When a file uses embedded mail headers, do not use any of the following command-line options: BCC, CC, FROM, REPLYTO, SUBJECT or TO. You can use the command-line options ATTACH and FILES. E-mail addresses
The general form for an e-mail address specification is: accountname@domainname
For instance: [email protected] [email protected]
The domain name portion of an e-mail address must always be a valid domain name. Most mail servers validate the domain name for every address specified, prior to attempting to send the message. The account name portion of the e-mail address must also be valid if the address is used as a destination address. For instance, addresses specified with the TO, CC and BCC options are destination addresses. Addresses specified with the options FROM and REPLYTO should contain valid account names because they may be used by the recipient as destination addresses for replies to the message. Since many account names are cryptic, an e-mail address may include comment text that specifies a real person’s name or department. When comment text is included as part of the e-mail address, the actual address is enclosed within a pair of angle brackets. For instance:
534 SendMail
"John Doe "
Comment text may appear before or after, or before and after the actual e-mail address. "John Doe FYI only"
The message file may use an embedded command that causes another text file to be included in the message. For instance, • MESSAGE.TEXT file: %include /sendmail/staff.distrib% From: The Boss Subject: Weekly Staff Meeting %include weekly.meeting% %include 010311.agenda% We will also be discussing plans for the company picnic and vacation schedules. %include signature.files.theboss%
• STAFF.DISTRIB file: To: Cc: Cc: Cc:
Tom Shirley Richard Rebecca
• WEEKLY.MEETING file: The weekly staff meeting is scheduled for Wednesday in the 4th floor conference room.
• 010311.AGENDA file: Agenda for March 11, 2001 meeting: Widget sales status Sales incentives Increased CEO bonus
• SIGNATURE.FILES.THEBOSS file: John Curtis (J.C.) President Widgets, Inc.
As illustrated in the above example, the %include command feature is very useful for creating “boilerplate” messages, for specifying e-mail distribution lists, etc. The referenced file is included only when the file is transmit-
SendMail
535
Commands
Including Text Files
ted by SendMail. The above example transmits as if it contained the following text:
Commands
To: Tom Cc: Shirley Cc: Richard Cc: Rebecca From: The Boss Subject: Weekly Staff Meeting The weekly staff meeting is scheduled for Wednesday in the 4th floor conference room. Agenda for March 11, 2001 meeting: Widget sales status Sales incentives Increased CEO bonus We will also be discussing plans for the company picnic and vacation schedules. John Curtis (J.C.) President Widgets, Inc.
When the %include command is used, it appears on a line by itself, starts on the first column of that line, and starts and ends with the percent symbol ( % ). It may be used at any location in the file, including the mail headers section. An included file may contain %include commands, with a maximum of 32 levels of nesting, including the original message file. The file name referenced in the %include command may include absolute or relative path specifications as long as the file is still accessible from the account used to actually send the message. Notes
The E-Mail configuration file is created and maintained with the Setup Email command which is described in the THEOS Corona Version 5 Operating System Installation and Setup Guide. Enclose the option arguments within quotation marks. Although not required, without quotation marks the arguments will be folded to uppercase and embedded commas or spaces will terminate the argument. When there are more than 50 addresses in the To, Cc and Bcc fields (command-line options or in the embedded addressing fields), multiple copies of the message are sent, 50 addresses per message.
536 SendMail
SendMail Command Restrictions
The E-Mail Configuration file must have a SMTP Server defined (see Setup SMTP in the THEOS Corona Version 5 Operating System Installation and Setup Guide).
Every message must have a “To” field specified with the TO option and a “From” field specified with the FROM option or embedded mail headers. See also
EmailChk, EmailDel, EmailGet, EmailPut, TheoMail
Examples
The following is a simple MultiUser BASIC language program. It accepts the various fields of information for a message and then sends the message. OPTION BASE 1, CASE "M", PROMPT "" DIM MSG$(100) START: ! First, paint the screen WINDOW OPEN ADDROF(MAIN%),1,1,80,24; SELECT UPDATE ON PRINT AT(20,1);"Send Mail to Remote Recipient"; PRINT AT(1,4);"To:"; PRINT AT(1,5);"From:"; PRINT AT(1,6);"Subject:"; PRINT AT(1,8);"CC:"; PRINT AT(1,9);"BCC:"; PRINT AT(1,10);"Reply To:"; WINDOW OPEN ADDROF(MSG%),2,13,78,9;FRAME SINGLE; SELECT UPDATE TOP; TITLE " Message Text " TOP, CENTER ENTER.MESSAGE: WINDOW SELECT MAIN%, UPDATE ON ENTER.TO: ! Accept message header information PRINT AT(12,4); LINPUT USING RPAD(TO$,60), TO$ TO$ = TRIM(TO$) IF UCASE(TO$)="END" THEN GOTO END.JOB IF TO$="" THEN GOTO ENTER.TO ENTER.FROM: PRINT AT(12,5); LINPUT USING RPAD(FROM$,60), FROM$ FROM$ = TRIM(FROM$) IF FROM$="" THEN GOTO ENTER.FROM PRINT AT(12,6); LINPUT USING RPAD(SUBJ$,60), SUBJ$ SUBJ$ = TRIM(SUBJ$) PRINT AT(12,8); LINPUT USING RPAD(CC$,60), CC$ CC$ = TRIM(CC$)
SendMail
537
Commands
The file name specified for the message text file, and any %include files, must refer to ASCII text files. These files, and the optional attachment files, must be accessible from the current account. The file name specification may include the path specification.
Commands
PRINT AT(12,9); LINPUT USING RPAD(BCC$,60), BCC$ BCC$ = TRIM(BCC$) PRINT AT(12,10); LINPUT USING RPAD(REPLYTO$,60), REPLYTO$ REPLYTO$ = TRIM(REPLYTO$) WINDOW EDIT MSG%, 100, MSG$ ! Get message body WINDOW SELECT MAIN%, UPDATE ON PRINT AT(1,23);"Okay to send? "; LINPUT USING "!", REPLY$ IF UCASE(REPLY$)="N" THEN GOTO ENTER.MESSAGE MSG.COUNT% = 0 FOR I% = 100 TO 1 STEP -1 ! Find out how many message lines IF TRIM(MSG$(I%))<>"" MSG.COUNT% = I% I% = 0 IFEND NEXT ! Make sure that there is a message IF MSG.COUNT% PRINT AT(1,23);"Creating message file...";CRT("EOL"); MSG.FILE$ = SYS.ENV$(20,"SENDMAIL.XXXXXX") ! Work name OPEN #1:MSG.FILE$, OUTPUT SEQUENTIAL ! Save msg in file PRINT #1:"To: ";tO$ PRINT #1:"From: ";FROM$ IF SUBJ$ THEN PRINT #1:"Subject: ";SUBJ$ IF CC$ THEN PRINT #1:"Cc: ";CC$ IF BCC$ THEN PRINT #1:"Bcc: ";BCC$ IF REPLYTO$ THEN PRINT #1:"ReplyTo: ";REPLYTO$ PRINT #1: ! Blank line separates headers from body FOR I% = 1 TO MSG.COUNT% PRINT #1:MSG$(I%) NEXT CLOSE #1 PRINT AT(1,23);"Sending message...";CRT("EOL"); SYSTEM "SENDMAIL "&MSG.FILE$ ! Send the message ELSE PRINT AT(1,23);"No message text...ignoring!";CRT("BELL"); SLEEP 2 IFEND ! Clear input areas on screen MAT MSG$ =("") \ WINDOW CLEAR MSG% WINDOW SELECT MAIN%, UPDATE ON REPLYTO$ = "" \ PRINT AT(12,10);CRT("EOL"); BCC$ = "" \ PRINT AT(12,9);CRT("EOL"); CC$ = "" \ PRINT AT(12,8);CRT("EOL"); SUBJ$ = "" \ PRINT AT(12,6);CRT("EOL"); FROM$ = "" \ PRINT AT(12,5);CRT("EOL"); TO$ = "" \ PRINT AT(12,4);CRT("EOL"); PRINT AT(1,23);CRT("EOL"); GOTO ENTER.MESSAGE END.JOB: QUIT
538 SendMail
Session Command The Session command allows you to control the attributes, position and size of the session window.
function
»
CHANGE DISABLE ENABLE
FOCUS MAXIMIZE MINIMIZE
MOVE RESTORE
Commands
SESSION function SIZE TITLE
Operation
Set the session attribute or position as specified.
Options
CHANGE OFF Disable session-switching. Applies to the console and all
sessions of this console. CHANGE ON Enable session-switching ( (Break),n and (Break),Fn and
(Break),(Tab̢) and application program switching). CHANGE ? Display the current session-switching status. DISABLE attr Disable mouse changes of session attribute. attr may be one
of: MAXIMIZE MINIMIZE MOVE SIZE
The session attributes can still be changed with the Session command or with application programs using the appropriate API. ENABLE attr Enable mouse changes of session attribute. attr may be any
of the ones listed above. The attr are normally enabled by default are only disabled by a specific call to the Session command or with an application API call. FOCUS
Make this session the active session. Normally, this would only be invoked from an EXEC program or by a Force command.
MAXIMIZE
Maximize the session to the full console screen size. A maximized session has no frame and no title displayed.
MINIMIZE
Minimize the session to an icon.
Session
539
MOVE col row Move the upper-left corner of the session window to col, row
position on the screen. RESTORE
Restore the session window to its normal size and position (not MINIMIZE or MAXIMIZE).
Commands
SIZE width height Set the session width to width columns and the session height to height lines. Similar to using the Attach command to
change the console size. >session size 80 24
TITLE text
Set the session title to text. text should be enclosed within quotation marks. When text is not specified (TITLE is the last option specified on the command line), the title is set to the default title which is the currently logged on account name.
Defaults
The session attributes are enabled when a session is first started. The position, size and maximize/minimize state are the last values saved when the system was last shutdown or rebooted.
See also
Attach, Reboot, ShutDown, TWS
540 Session
Set Command The Set command sets and changes system and user-defined environment parameters.
SET
system-env-name value
2
SET
user-variable=value
3
SET
Commands
1
system-env-name
»
ABBREV on-off BREAK c COPYLIB lib CWD dir DATE date DATEFORM n DATEIN n DATEOUT n
user-variable
»
user-defined environment variable
value
»
value to assign to environment variable
Operation
HISTORY on-off LIBRARY lib LINKLIB lib MSG on-off OBJLIB lib PATH path PRIORITY n PROMPT string
QUIT on-off RDYMSG on-off SEARCH drive-seq SUBDIR dir SYNONYM file TIME time WORKVOL drive
Mode 1—Changes a system-defined environment parameter. These parameters are normally set in the Account environment for each user. >set rdymsg on RC = 0, 16:58:36, ET = 0:00, CPU = 0.088 >
A description for each of the system-defined environment names can be found in Chapter 7 “User Account Environments” of the THEOS Corona Version 5 Operating System Reference. Because setting the date and time is different than setting other environment variables, it is described separately, on page 542.
Set 541
Mode 2—Changes a user-defined environment parameter. User-defined environment parameters may be any name that uses alphanumeric characters, does not contain a space character, and is not the same as a systemdefined environment parameter. >set MyName="Ralph Kramden"
Commands
>set showname="The Honeymooners"
The value of a user-defined environment parameter may be any string of characters. If the value contains characters that might be misinterpreted by the CSI, you should enclose the value in a pair of double quotation marks. To clear a user-defined environment parameter, specify nothing after the equal sign. >set username=(EnterÌ˛)
Mode 3—This mode displays all of the currently defined environment variables, system- and user-defined, along with their values. >set RDYMSG = OFF MSG = ON WORK = M SEARCH = S DESCRIPTION = System maintenance account USERNAME = Boss PROMPT = !14\a!15\ s !4!!\!!5> CLIST = YES HOME = /:S LANGNAME = English OSVER = 5.0 OSPL = 50099 PROFILE = Office
Date and Time
All of the system- and user-defined environment names are assigned values without any special input form or confirmation response. There are two exceptions: DATE and TIME. DATE. Changing this variable changes the system’s date which is used by the system and application programs. The date may be changed by entering the new date on the command line: >Set date 3/5/02 Date is set to Tuesday, March 5, 2002. >Set date 3.7 Date is set to Thursday, March 7, 2002.
542 Set
The date is interpreted by the Set command using the currently set DATEFORM format.
The date may also be changed by using the Date Selection form: >Set date (Enter)
Commands Unlike most other parameters, changing the DATE or TIME requires a privilege level of five and it affects all users on the system. TIME. Changing this variable changes the current system time. When setting the time you must specify the hours and minutes. You may also specify the seconds. Since time can be set to the nearest second you are prompted to press a key when you want the system time set to the specified time. >Set time 12:15(Enter)
Set 543
Notes
Environment variables have values that are strings, numeric values or Boolean values (true/false). Single-word strings are assigned normally: >Set UserName Fred
Commands
Multiple word strings are assigned by enclosing the string within quotation marks: >Set FullName "John Q. Adams"
For variables that are Boolean in nature, some have YES/NO values and others have ON/OFF values, depending upon their usage. Refer to their description in the Chapter 7 “User Account Environments” of the THEOS Corona Version 5 Operating System Reference. The syntax for assigning values may include the equal sign or you may omit it. The following commands are both acceptable for the same assignment: >Set FileType Basic >Set FileType=Basic
The Logoff command clears all user-defined and system-defined environments. The Logon command resets only those parameters that are defined in the Account environment. The parameters DATE, DATEFORM, DATEIN, DATEOUT, HISTORY and TIME affect all users on the system. These parameters (except for DATE and TIME) are normally only set in the system configuration file (Sysgen command). Defaults
The default or initial values for most of the environment variables are set during system boot using information from the Sysgen command or when you log onto an account.
Restrictions
User-defined environment parameter values may not contain a double quotation mark. That character is ignored when assigning the value to the name. Changing the DATE, DATEFORM, DATEIN, DATEOUT, HISTORY or TIME parameters requires a privilege level of five. Changing the PRIORITY for your process requires a privilege level of three.
See also
544 Set
Account, ChDir, Logon, Mailbox, Msg, Show, Sysgen
Setup Command The Setup command provides a single command to configure and initialize the major components of THEOS Corona and various types of devices.
SETUP
2
SETUP function
3
SETUP NET subfunction
function
Operation
»
ACCOUNT CACHE CENTLP COLOR CRT CX DIGIXE DISK EMAIL
Commands
1
FAX FD950 FLOPPY FONT INSTALL MAKEBOOT MAXSPEED MIXER NET
PRINTER PROFILE RECYCLED RESTORE SIO SMTP SNDCARD SOUND SPOOLER
SYSGEN TIME TYPES UNINSTALL UPDATE UPS USERCOUNT VGA
Mode 1—Invokes Setup in its menu mode. See “Setup Menu” below. Mode 2—Bypassing the Setup Menu, the function screen is displayed. Refer to “Functions” on page 546. Mode 3—Invoking Setup with a function and a subfunction is only applicable when the function is NET. The Setup NET invoked with Mode 2 displays a menu of the subfunctions available when configuring your network. If you know you only want to configure one portion of the network and you know the subfunction name that you want to configure, then specify that subfunction on the command-line. For instance, >setup net dhcp
The above command invokes the configuration program for the DHCP server. Setup Menu
When Setup is invoked with Mode 1, the Setup Menu is displayed. This menu is dynamic because only those components installed on your system are presented in the menu. For instance, if you to not have the DigiBoard CX software installed on the system, the CX menu item is not offered.
Setup
545
Commands
There may be additional items displayed on the menu, depending upon any add-on products that you may have installed on your system. Use the normal menu selection keys to select the desired function. These keys are described in “Using Menus” on page 77 of the THEOS Corona Version 5 Operating System Reference. Functions
The various functions that can be configured with the Setup command are described in the THEOS Corona Version 5 Operating System Installation and Setup Guide.
Setup Command Restrictions
The Setup command can only be used when you are logged onto the SYSTEM account (account id zero). Although the Setup command requires only a privilege level of one, some of the functions may require higher privilege levels. Although Setup may be invoked from any console, because it primarily configures the system it is intended to be used from the main console. Many changes in configuration will not be effective until the system is rebooted.
See also
546 Setup
Account, ClassGen, Disk, FileManager, Sysgen, Tape
Shell Command The Shell command is designed to be called from another program. It provides access to the “CSI shell” so users may temporarily leave a program, enter commands and, upon completion, return to that program.
Operation
The current program’s environment is saved and the CSI Shell is entered. Upon entry, the CSI clears the currently active window and displays the reminder message: THEOS® Command SHELL Type "EXIT" to terminate.
If the current prompt string contains the default CSI prompt character ( > ), it is displayed with the blink attribute as a reminder to the operator that the user is in the CSI Shell and should return back to the calling program. An example usage from a MultiUser BASIC Version 2.1 program might be: 001000 001010 001020 001030 001040 001050 001060 ...
WINDOW WINDOW WINDOW WINDOW
OPEN 1,2,10,76,10; COLOR 7,4 FRAME 1, RAISED, RIGHT, COLOR 7,4 TITLE 1," CSI Shell ", CENTER TOP, COLOR 6,4 SELECT 1
SYSTEM "shell" PRINT "I'm back...";
CSI Shell THEOS® Command SHELL Type "EXIT" to terminate. >
Shell
547
Commands
SHELL
Notes
As illustrated in the example, the Shell command uses the current window for its display and input. That window is cleared before Shell displays its reminder message.
Commands
Files are not closed by this command. However, the statement or function that you use to invoke the command in your program may. For instance, in a MultiUser Basic language program, if you use the SYSTEM statement to invoke the Shell command, no files are closed. If you use the CSI statement to invoke the Shell command, your files will be closed before invoking the Shell command. Use the Exit to exit the shell environment and return to the calling environment. The ability to use this command can be disabled by renaming or deleting the file /THEOS/COMMAND/SHELL.CMD:S. WindoWriter has a command-line option that can disable usage of the command during its editing session.
548 Shell
Show Command The Show command displays the current value of system-parameters, user-variables and other information about the system.
SHOW
2
SHOW
env-name
3
SHOW
function
4
SHOW
*
Commands
1
env-name
»
ABBREV BREAK CALPHA CASE CLIST CMDLIB COPYLIB CREATE CWD DATEFORM
DATEIN DATEOUT DECIMAL DESCRIPTION FILETYPE FULLNAME HISTORY HOME LANG LANGNAME
LIBRARY LINKLIB MSG
PROMPT QUIT RDYMSG NOTLIBCOMPATIBLE SEARCH OBJLIB STDSYN OSPL SUBDIR OSVER SYNONYM PATH USERNAME PRIVLEV WORK name PROFILE
function
»
CLOCK DEVICE DISK IDE
IRQ MEMORY MEMORY * PCI
PCMCIA SCSI TAPE USB
USER USER n mm-nn VERSION WHO
Show 549
Mode 1—Invokes the display showing all environment variables, IRQs, PCI devices, all disks, tapes and other devices. When this mode is used a form is displayed with a drop-down list of the various devices that it can show:
Commands
Operation
Settings. Shows the currently defined environment variables.
550 Show
Interrupt Request Table (IRQ). Shows the 16 IRQ numbers and the devices that use these IRQ numbers and the addresses associated with them. When adding a new device to the computer, this information is useful in determining which IRQs are available for use by the new device.
Commands
A text-only, non-object display of this information can be obtained by using the command SHOW IRQ. Peripheral Component Interconnect (PCI). Shows the PCI devices currently configured on this system.
Show 551
A text-only, non-object display of this information can be obtained by using the command SHOW PCI.
Commands
PCMCIA / PC-Card. This display will normally only be useful on laptop computers. It shows all of the currently installed PC-cards on the system.
A text-only, non-object display of this information can be obtained by using the command SHOW PCMCIA. Universal Serial Bus (USB). If the system supports USB ports, the hub, adapter and installed devices are displayed:
552 Show
A text-only, non-object display of this information can be obtained by using the command SHOW USB. Disk/CD-ROM devices. This item displays all of the hard disk and CDROM disc devices that are currently connected to the system. These devices are listed whether they use IDE, SCSI, USB, PCMCIA, I2O or ATAPI technology. Commands
A text-only, non-object display of this information can be obtained by using the command SHOW DISK.
Show 553
Commands
SCSI Devices. Shows the SCSI devices (Small Computer System Interface) currently configured on this system.
The “Rem” column indicates whether or not the device uses removable media. A text-only, non-object display of this information can be obtained by using the command SHOW SCSI. Tape Devices. Displays information about all, currently attached TAPE devices.
554 Show
A text-only, non-object display of this information can be obtained by using the command SHOW TAPE. Device Properties. Displays information about all, currently attached devices.
Commands
The above display reports on the same devices that the Attach command lists but this display provides different information about those attached devices. A text-only, non-object display of this information can be obtained by using the command SHOW DEVICE. Mode 2—This mode displays a specific system-parameter or user-defined variable. >show search SEARCH = S >show fullname FULLNAME = John Doe
For a list and description of the system-defined environment names refer to Chapter 7 “User Account Environments” in the THEOS Corona Version 5 Operating System Reference. Mode 3—Display the requested function display. Each of the functions is described below in the Functions section.
Show 555
Mode 4—Displays the following information:
Commands
>show * ACCOUNT USERNUM PORT PRIVLEV LOGON ABBREV MSG RDYMSG SEARCH WORKVOL SERIAL IDENT SYNONYM SUBDIR LIBRARY PATH OBJLIB COPYLIB LINKLIB
556 Show
= = = = = = = = = = = = = = = = = = =
SYSTEM 0 16 9 15:29:09 09/04/01 ON ON OFF S M 102-12345 "TheosServer" USER.SYNONYM /
Functions
CLOCK
Displays the current time and date continuously. The time is updated once per second. Use the (Esc) or (F9) to quit. >show clock 16:12:24 PST Thursday, January 17, 2002.
Use the Clock command to display a graphic clock. Commands
DATE
Displays the current time and date, once. >show date 16:12:24 PDT Monday, April 20, 2002.
MEMORY
Displays a summary of the current memory usage.
MEMORY * Displays a map of all of memory, followed by the summary dis-
play above.
Show 557
TIME
Displays the current time and date, once. This is synonymous to the DATE function. >show time 16:12:24 PDT Monday, April 20, 2002.
Commands
You can use the CLOCK function to display the time continuously or the Clock command to display it graphically. USER
Displays a continuous status report of all defined processes which is refreshed every second. The number of processes or tasks is defined in the system configuration with the Sysgen command. Unused processes are omitted.
The buttons “End Task,” “Stop,” “Peek” and “Exit” are only available if you have sufficient privilege. The privilege level required for these features is defined in the file /THEOS/CONFIG/ SHOWUSER.CFG:S file, in the entry “ButtonPriv=.” If this file or entry does not exist then the privilege level required is 5. These buttons may also be suppressed by using the option NOASK.
558 Show
The “Status & Info” column uses codes for the status condition of the process: Code *
Indicates that this is the process performing the Show USERS . Process is waiting for semaphore nn to be set.
I
Waiting for interrupt. Usually, the program is waiting for another character from the console.
L
Waiting for a locked resource.
N
(Break),(Q) is disabled for the process.
O
(Break),(O) is in effect for the process.
P
Stopped by (Break),(S) or screen pause command.
R
The process is running a program.
Z
Process is “sleeping.”
This function can be used with the option PRIORITY. >show user (priority
When this option is used, the priority for the user (1-7) is displayed immediately following the status codes. USER n…
Displays a status report for process n. Multiple processes can be specified by listing the process numbers: >show user 1 2 5 6 7 10
The above command displays the status for the six processes listed. Any unused process is omitted from the display. Ranges of processes can be specified by using the syntax n-m where n is the from process number and m is the to process number. For instance: >show user 1-4 10 16-20
This command displays the status for processes 1, 2, 3, 4, 10, 16, 17, 18, 19 and 20. Any unused process is omitted from the display.
Show 559
Commands
E=nn
Meaning
Displays the version and date for the operating system and all major components installed on your system.
Commands
VERSION
The list of programs displayed by the VERSION function comes from the file /THEOS/MENU/language/SHOW_VER.MNU. Note the display of the “THEOS Corona Operating System,” “Network Login Server” and “Twindows Server” items. In the “Version” column for these items, in addition to the version number the number of licensed users is also reported. For the TWindows Server this is reported as two numbers, the first number identifies the number of network TWS users and the second number the number of serial TWS users. WHO
Displays information identifying you and your process. >show who ACCOUNT = USERNUM = PORT = PRIVLEV = LOGON =
SYSTEM 0 16 5 15:29:09 01/04/02
Notes
When the environment variable LINEGRAPH is set to “N,” the line graphics used in the display for MEMORY and VERSION are suppressed.
Restrictions
The display for Show USER and the Show MEMORY * functions requires a privilege level of five.
See also
Account, Set, Sysgen, Who , WhoAmI
560 Show
ShutDown Command The ShutDown command allows you to shutdown or reboot your computer.
SHUTDOWN
2
SHUTDOWN ( option
option
Operation
»
DOS FAST LINUX NOQUERY
NOTYPE QUERY REBOOT RESET
SHUTDOWN SINGLE THEOS TYPE
Commands
1
UPDATE WINDOWS
The ShutDown command operates identically to the Reboot command except for the default options enabled. Mode 1—This mode is identical to the following command: >Reboot (shutdown query
Mode 2—This mode is identical to the Reboot command. Options
Refer to the option description for the Reboot command.
Cautions
This is an extremely dangerous command because other users are terminated without notice. If another user is in the process of updating one or more files, those files will be inaccurate because the update was not completed. Always do a Show USERS or a Who command before using this command and verify that all other users are at a Logon, CSI or stopped.
Restrictions
The ShutDown command requires a privilege level of five.
See also
Reboot
ShutDown
561
Commands
562 ShutDown
Sleep Command The Sleep command causes your process to suspend execution for an interval of time or until a specified time-of-day.
SLEEP
seconds
2
SLEEP
time-of-day
seconds
»
number of seconds to sleep
time-of-day
»
time to wake up
Operation
Commands
1
Mode 1—Sleeps for seconds number of seconds. >sleep 30
This command puts your process to sleep for 30 seconds. Mode 2—Sleeps until the system clock is equal to time-of-day. >sleep 23:30
This command puts your process to sleep until 11:30 pm. Notes
Once “sleeping” has started with this command it may only be awakened early by entry of the (Break),(Q) or by a Force from another user. The EXEC language has its own &sleep statement, BASIC has its own SLEEP statement and C has its own sleep function. If you need to put the process to sleep while executing a program, it is more efficient to use one of these statements or functions.
Restrictions
seconds must be an integer number.
Sleep 563
Commands
564 Sleep
Sort Command Filter This command sorts a stream file using the entire record as a sort key or designated portions of each record as the sort key.
SORT -options -o output infile…
2
SORT -options +position1 -position2 -field-options -o output infile…
+position1
»
sort key start position
-position2
»
sort key end position
output
»
optional output file name with optional path
infile
»
file name with optional path
field-options
»
b d
f i
n r
options
»
b c d
f i m
n r tn
Commands
1
u
Sort is a filter program and, as such, defaults to using the standard input device for its input file and the standard output device for its output file. It is suitable for use in pipes. >list vendor.names | sort -d | more
The above command sorts the output of the LIST command using dictionary order and then displays the sorted output with the MORE command. Operation
Mode 1—Sorts the infiles into one output file using the entire record as the sort key. >sort -o sorted.data unsorted.data >sort -briu -o sorted.data unsorted.data
The above two commands sort the file UNSORTED.DATA. The result of the sort is output as SORTED.DATA. The first command sorts the file using the sort order of the ASCII collating sequence. The second command also sorts the file but it ignores leading blanks in the records and it ignores any characters outside the range of ASCII characters. It also ignores duplicate records and outputs the file in reverse sequence.
Sort
565
Mode 2—Sorts the infiles into one file using the designated sort keys for determining the sort order of the records. Input Files
Sort can sort multiple input files into a single output file. Merely list the input files on the command line, one after the other.
Commands
>sort -o sort.output sort.input1 sort.input2 sort.input3
The sequence of the listed input files does not matter unless the -m option is used. If no input file is specified, the standard input device is used for the input file. Sort can sort as large an input file or files as will fit in available memory.
Sort Keys
Unless otherwise specified, the entire record is used as a sort key. By using the +position and -position fields, portions of the record can be specified as the sort key(s). The format for +position and -position is f.c where f is the number of fields to skip from the beginning of the record and c is the number of characters to skip from the beginning of the field. Fields are separated in records with a tab character. If a different character is used to separate fields, the -t option must be used to identify the separating character. For instance, a specification of +3.2 indicates that the sort key starts with the third character of the fourth field in the record. Multiple sort keys can be specified. For example: >sort +3.2 -3.10 +1.0 -1.20 sort.input -o sort.output
This command line states that the file SORT.INPUT is to be sorted using two keys, one starting with the third character of the fourth field through the eleventh character of the fourth field and the other using the first 21 characters of the second field. Each sort key may have its own field-options specified immediately following the sort key specifications. For example: >sort +3.2 -3.10 -ri +1.0 -1.20 -n sort.input -o sort.output
Sort keys that do not have their own field-options use the options specified for the entire sort. These options are specified before the sort key specifications.
566 Sort
Options
b
Ignores leading blanks and other white space characters in the sort key for comparison purposes. Input Keys
Comparison Keys
John F. Kennedy
John F. Kennedy
John F. Kennedy F.
Kennedy
John F. Kennedy
c
Checks if input files are already sorted.
d
Uses dictionary order when comparing sort keys. In dictionary order the sort order is changed so that digits come last, preceded by letters. All other characters (punctuation and other nonalphanumeric characters) are ignored when comparing two sort keys.
f
For sort purposes, folds uppercase sort key characters to lowercase. Thus, “AARDVARK” sorts to the same location as “aardvark.”
i
Ignores characters outside of the ASCII set of 7-bit characters for sort purposes only. This ASCII set of characters includes all of the characters from character value 32 (space) through 127 (tilde).
m
Indicates that no sorting is to be done; the infiles are merged into the outfile in the sequence that the infiles are specified.
n
The key is a number and should be sorted according to the value of the number. Sort Keys
w/o -n option
with -n option
423
2
2
32
20
20
2
200
32
20
32
200
200
423
423
r
The key is sorted in descending order, not the normal ascending sequence.
tc
Specifies that the tab, or field delimiting character, is the character c. This option is used with the +position and -position
Sort
567
Commands
John
John F. Kennedy
options to specify that a character other than (Tab) separates the fields in the record. >sort "-t," +2.0 +0.0 names.data
Commands
This command sorts a file of names and specifies that the comma character separates the fields in the records. It is placed in quotation marks to prevent the CSI from interpreting the comma as one of its characters. Input Keys
u
Defaults
Sorted Keys
Ken, E., Larvik
Joseph, William, Cone
Robert, G., Holbrook
Duncan, S., Holbrook
Michael, K., Malley
Robert, G., Holbrook
Robert, L., Lewison
Ken, E., Larvik
Shirley, L., McCartney
Robert, T., Lewis
Duncan, S., Holbrook
Robert, L., Lewison
Robert, T., Lewis
Michael, K., Malley
Joseph, William, Cone
Shirley, L., McCartney
Specifies that only records with unique keys are output. When this option is not used, records with duplicate sort keys are output in the sequence that they were found in the input file(s).
The default infile is the standard input device and the default outfile is the standard output device. The default sort sequence is ascending by character value. Refer to Appendix G: “THEOS Character Sets” of the THEOS Corona Version 5 Operating System Reference for a list of the characters and their values.
Restrictions
Only stream files are sorted with this command. The file is sorted using the currently available memory. Maximum line length of each record is 2,048 characters.
568 Sort
Split Command Filter The Split command splits a stream file into multiple files, each one containing a portion of the original file.
SPLIT
infile outfile ( option
2
SPLIT -nnn infile outfile
infile
»
optional input file name with optional path
outfile
»
optional output file name with optional path
option
»
nnn
Operation
Commands
1
Both Modes 1 and 2 operate the same. The only difference is that Mode 2 is “UNIX-like” in syntax. The infile is read and output in nnn line chunks to the outfile. outfile name is modified with a two-letter suffix added. The first output file is outfileAA, the second is outfileAB, and so on. >split system.history system.hist (1000
This command divides the SYSTEM.HISTORY file into 1,000 line chunks. The first 1,000 lines are written to SYSTEM.HISTAA, the second 1,000 lines are written to SYSTEM.HISTAB, etc. Option
nnn
Defaults
The default number of lines for each of the output files is 100.
Specifies the number of lines each output file will contain. When not specified the default value of 100 is used.
When outfile is not specified the output file name is XAA. When infile is not specified the input comes from the standard input device. Restrictions
The infile must be a stream file. The nnn option must be a nonzero positive value.
See also
Cat
Split 569
Commands
570 Split
Spooler Command The Spooler command controls the print spooler.
SPOOLER printer
2
SPOOLER printer manager-function
3
SPOOLER printer function
4
SPOOLER
printer
»
Commands
1
optional spooled printer number
manager-function »
ATTACH options BUILD count drive FORM queue
INIT QUIT START
function
»
ABORT ALIGN report page BACKUP pages CHANGE report queue copies hold
report
»
nnn
page
»
page number
queue
»
letter
copies
»
number of copies to print
hold
»
HOLD NOHOLD
reports
»
report reports report-report reports *
STOP VERIFY KILL reports LIST PRINT report page STATUS
Spooler
571
Operation
Mode 1—Displays the status of a spooled printer or on all of the spooled printers. >spooler 1 Printer #1 "CENTLP1" L80,P58,HPLASER,W8 -- is waiting for work -- and has form "A" mounted
Commands
>spool * Printer #1 --Printer #2 ----
"CENTLP1" L80,P58,HPLASER,W8 is waiting for work and has form "A" mounted "SIO3" L80,P58,CANON2 is printing report # 9 "CHECKREG" created by account ACCTNG - on page 7 of 9 and has form "B" mounted
Mode 2—Changes the status of a spooled printer or enables or disables the print spooler. >spooler 3 stop >spooler 3 Printer #3 "SIO4" L80,P58,EPSON -- is stopped -- and has form "C" mounted
Mode 3—Changes the attributes of a spooled report or performs print management of a spooled report. >spooler change 11 2 d hold >s list File Acc-name Rpt-name 11 SYSTEM
Date
Time
Q Pages C Status
DEVNAMES 09/05/96 16:25 D
9
2 Closed, Hold
Mode 4—Display form allowing interactive display of all spooled printers or spooled reports. Refer to “Spooler Status” on page 573 for a description of this mode.
572 Spooler
Spooler Status When Mode 4 is used and the console is configured for graphics display, the following form is displayed:
Commands
Printer list box
This area displays each of the printers that are currently configured as spooled printers. The information displayed for each printer includes the printer number, printer name (see “Setup Printer” on page 173 of the THEOS Corona Version 5 Operating System Installation and Setup Guide), status, page and pages, report, report number, account, form device and attachment parameters. The values for page, pages, report, report number and account are only displayed when that printer is printing a report. The pages value refers to the total number of pages in the report.
Report
Pressing this button changes the display to the report listing form described on page 574.
Start
This button can be pressed to start the printer selected in the Printer list box. If the printer is already started, this button’s label is “Stop” and, when pressed, stops the selected printer.
Abort
If the printer selected in the Printer list box is printing a report this button is enabled. When pressed, report printing is aborted.
Form
Pressing this button allows you to change the form for the printer selected in the Printer list box. You are presented with a maintenance form allowing you to enter up to eight form letters for the selected printer.
Spooler
573
Commands
Report Listing
When the Report button is used the display changes to:
Report list box
This area displays each of the reports that are currently queued. Use this area to select the report that you want to perform some action on with the buttons displayed on the right. Each report line shows the report number, account name that created the report, the report name, creation date, queue letter, printer to be used, pages in report, number of copies remaining to print and the current status of the report. You may have to scroll the list left or right to see all of these columns of information.
574 Spooler
Status
Pressing this button changes the display to the spooler status form described on page 573.
Order
Pressing this button changes the display order of the reports in the Report list box. There are four orders and each time the button is pressed the next order is used:
Report number Queue letter then report number Creation date then report number Account name then report number Print
This button can be pressed to start printing the report selected in the Report list box. If the report is already printing or has been printed, this button is disabled. This button is labeled “Remove” or “Abort,” depending upon the status of the report selected in the Report list box. If the report is currently being printed the button is labeled “Abort” and pressing it aborts printing of that report. Otherwise, the button is labeled “Remove” and pressing it deletes the selected report from the queue.
Spooler Manager Functions
A Spooler Manager is a user who has sufficient privilege and is responsible for the printers controlled by the print spooler. The following functions are reserved for users logged onto the SYSTEM account with a privilege level of five. ATTACH options Changes the attachment parameters of the spooler’s
printer. Note that this attachment refers to the spooler’s printer and not the attachment of a logical printer to the spooler. You may change any of the attachment parameters except the actual device. For instance, if the printer is currently connected and attached to CENTLP1, you cannot change it to SIO4 with this function. To add or change the physical device used for a spooled printer, you must use the Sysgen command and then reboot the system. You may change any of the other parameters, such as baud rate, line and page length, class code, etc. >spooler 3 attach l132 p60 b38400 w8 e2 c135 >spooler 3 Printer #3 "SIO4" L132,P60,HPLASER,B38400,W8,XON/XOFF -- is waiting for work -- and has form "C" mounted
The printer must be either stopped or idle (waiting for work). You cannot change the attachment of a printer that is currently printing a report. BUILD nnn drv This function creates a new /THEOS/SPOOLER/SYSTEM.SPOOLER library. The only time that you might need to use
Spooler
575
Commands
Remove/Abort
this function is when you are first installing the system and want to create a spooler queue library that is larger than the 400 member default size used when the spooler is first installed by the Sysgen command. >spooler build 2000 s
Commands
The nnn parameter specifies the size of the new /THEOS/ SPOOLER/SYSTEM.SPOOLER library and the drv specifies the drive used. If nnn is not specified, a library size of 400 is used. If drv is not specified, drive S is used. Make sure that the drv used here is the same drive specified in the INIT function or in the system configuration for the spooler. See “Sysgen” on page 591. Note: If you want to change the size of an existing /THEOS/ SPOOLER/SYSTEM.SPOOLER library, you must stop the print spooler, erase the existing library, and then use the BUILD option to create a new library. FORM queues Specifies which queues are printed on printer. >spooler 4 form r
This command tells the spooler that spooled printer 4 has form R mounted on it and that it can print any reports in the R queue. Refer to the description of “Forms and Queues” on page 581 for more information about form specifications. printer must be specified if there is more than one spooled printer. A printer may be printing from as many as eight queues. >spooler 3 form abcdefgh
This command tells the spooler that spooled printer 3 can print reports in queue A, B, C, D, E, F, G or H. >spooler 3 form "AX$g"
This command tells the spooler that spooled printer 3 can print reports in queue A, X, g or $. If a report is currently printing on printer, it will finish printing even if the report’s queue no longer matches the printer’s form. The queue of a report is only matched to the form of a printer when it first starts to print.
576 Spooler
INIT drive
This function initializes and starts the print spooler. This initialization can also be done automatically at boot time if the “Enable Print Spooler” is set in the system configuration (see “Sysgen” on page 591).
At least one printer must be attached when this INIT function is performed. All printers that are currently attached are transferred to the print spooler. (Slave printers are not transferred and cannot be spooled.) For each physical printer that is transferred to the print spooler, a logical printer is attached to the spooler. These logical printers are available to you and to any other user when they logon to the system. (If they are already logged on they will have to Logon again to get these attachments.) Assuming that three printers are attached: >spooler init >spooler Printer #1 "CENTLP1" L80,P58,HPLASER,W8 -- is stopped -- and has form "A" mounted Printer #2 "SIO3" L80,P58,CANON2 -- is stopped -- and has form "B" mounted Printer #3 "SIO4" L80,P58,EPSON -- is stopped -- and has form "C" mounted QUIT
This function stops the print spooler. It is the opposite of the INIT function. You may only stop the spooler if the spooler is idle (not printing any reports) and the system is in single-user mode. In this case, single-user mode means that no other processs are started. >spooler quit
START
This function activates a specific spooled printer or all spooled printers. This is the opposite of the STOP function. >spooler 2 start
STOP
Stops a specific spooled printer. printer must be specified if there is more than one spooled printer. If a report is currently Spooler
577
Commands
drive is the disk drive code for the drive containing the /THEOS/ SPOOLER/SYSTEM.SPOOLER library. If drive is not specified, S is used.
printing on printer, it is finished before that printer is actually stopped. >spooler 3 stop
Commands
>spooler Printer #1 "CENTLP1" L80,P58,HPLASER,W8 -- is waiting for work -- and has form "A" mounted Printer #2 "SIO3" L80,P58,CANON2 -- is waiting for work -- and has form "B" mounted Printer #3 "SIO4" L80,P58,EPSON -- is stopped -- and has form "C" mounted
It is best to STOP a printer before changing the paper in the printer. This insures that no report will print on the new paper until you tell the spooler that it is ready. Use the START function to restart the printer. VERIFY
Verifies that the spooler’s queue file matches the spooled reports that are in the spooler queue library and that the spooler queue library matches the spooler queue. This function can also be performed when the system is booted by enabling the “Check at system start” field in the system configuration (see Chapter 25 “Setup SysGen” of the THEOS Corona Version 5 Operating System Installation and Setup Guide). If errors are detected and it advises you to rebuild the spooler queue you must: 1. Use the QUIT function to stop the spooler (or boot the system in maintenance mode). 2. Erase the file /THEOS/SPOOLER/SYSTEM.SPOOLER:S and all of its member files. 3. Rebuild the file by using the BUILD nnn drv function. Or, if the spooler is configured and enabled in the system configuration file, reboot the system. The boot process will create a missing spooler library and queue when it starts the spooler (see “Setup SysGen” in the THEOS Corona Version 5 Operating System Installation and Setup Guide).
578 Spooler
Functions
ABORT
Stops printing the current report on the specified printer. printer must be specified if there is more than one spooled printer.
To successfully abort a report may depend upon the printer’s status and the transmission protocol. If the printer is off-line or powered off and the transmission protocol requires a response from the printer, then the report will not abort until the printer is powered on and made ready to print. ALIGN report page Specifies that an alignment pattern is printed for
spooled report number report starting with page number page. If the page number is not specified, page one is assumed. printer must be specified if there is more than one spooled printer. The alignment pattern printed is a copy of the report’s page page with all letters on that page replaced with X’s and all digits on the page replaced with 9’s. After an alignment pattern is printed you are asked “Do you wish another alignment page (Y/N).” Respond with (N) to cause the report to print. Before responding with (Y) make any alignment adjustments on the printer. When the alignment pattern is accepted the report is printed starting with the same page number. A report is never printed nor is an alignment pattern created unless the report’s queue is the same as the requested printer’s form. If no printer is specified, the single spooled printer must have the proper form mounted. BACKUP pages After the current page of the current report being printed
on printer is printed, the report is backed up pages number of pages and printing resumes. Omitting pages causes the report printout to back up one page. printer must be specified if there is more than one spooled printer. CHANGE report queue copies hold Changes the attributes of spooled
report number report. You must be logged onto the same account, or a synonym account, as the account used to create Spooler
579
Commands
When a report is aborted, the spooler prints the message “**** A B O R T ****” and performs a form-feed. The report is marked as printed and the report copies is set to zero. If the report does not have HOLD status, it is deleted.
the report. The queue, copies and hold attributes can be specified in any order and one or more may be omitted, indicating that that attribute is not changed.
Commands
The queue is a single character identifying one of the 64 possible queues. Refer to the description of “Forms and Queues” on page 581. copies is specified as one or two digits in the range 0–99. For descriptive purposes, you may specify the copies with the syntax COPIES=copies or COPY=copies. hold is specified with either HOLD or NOHOLD. If the report is currently printing and you change the queue to a letter that the printer is not set for, the report will continue to print on that printer. The queue of a report is only matched to the form of a printer when it first starts to print. KILL report Removes and deletes spooled report number report. If the
report is currently printing, it must be aborted first with the ABORT function. The ABORT function will kill the report unless it is marked as HOLD, in which case you must use the KILL function to remove it. report may be specified with * or it may specify a single report number, a range of report numbers, a list of reports numbers, or any combination of these. >spooler kill *
Removes all reports in the spooler queue. >spooler kill 8-11
Removes reports numbered 8, 9, 10, and 11. >spooler kill 2 6 7 33
Removes reports numbered 2, 6, 7 and 33. >spooler kill 1, 3, 30-33, 45, 50-55
Removes reports numbered 1, 3, 30, 31, 32, 33, 45, 50, 51, 52, 53, 54 and 55.
580 Spooler
LIST
Displays a list of the spooled reports on the standard output device. The information displayed includes: Column File
Content The report number. Owning account name.
Rpt-name
Report name
Date Time
Date and time report created.
Q Pages
C Status
Queue of report. Number of pages in report. This is only an estimated number based upon the number of form-feeds in the report. Number of copies still to print. Current status of the report. Status messages include Open, Closed, Printing, Printed, Hold.
The return code is set to 1 if one or more reports listed. Otherwise it is set to zero. PRINT report page Specifies that spooled report number report is to be
printed on printer starting with page number page. If the page number is not specified, page one is assumed. printer must be specified if there is more than one spooled printer. The report is printed even if printer is currently stopped. A report is never printed unless the report’s queue is the same as the requested printer’s form. If no printer is specified, the single spooled printer must have the proper form mounted. STATUS
Forms and Queues
Reports on the status of the spooled printer or on all of the spooled printers. This is equivalent to a Mode 1 Spooler command.
Forms and queues are identified with single-characters. There are 64 possible forms and queues: A – Z
26 forms/queues
a – z
26 forms/queues
# $ % & * + - < = > ^ ~
12 forms/queues
Previous versions of the spooler only supported the first 26 forms and queues. To provide compatibility with programs and procedures designed for previous versions of the operating system, form and queue specifications default to the uppercase form and queue letters. Spooler
581
Commands
Acc-name
To specify one of the lowercase form letters you must enclose the form within quotation marks. The 12 special character forms may be specified without quotation marks. For instance:
Commands
>spooler >spooler >spooler >spooler >spooler >spooler
1 1 1 1 1 1
form form form form form form
a "a" x % abc$ "Aix$%"
; ; ; ; ; ;
Refers Refers Refers Refers Refers Refers
to to to to to to
form A form a form X form % forms A, B C and $ forms A, i, x, $ and %
To specify one of the lowercase queue letters you must enclose the letter in quotation marks or use the special syntax “QUEUE=$queue.” >spooler >spooler >spooler >spooler >spooler >spooler
change change change change change change
2 2 2 2 2 2
a "a" $ queue=a queue=$a queue=$$
; ; ; ; ; ;
Refers Refers Refers Refers Refers Refers
to to to to to to
queue queue queue queue queue queue
A a $ A a $
When in doubt about how a form or queue specification will be interpreted by the Spooler command, always use quotes and then specify the desired character with the desired case. Restrictions
The functions ABORT, BACKUP, PRINT, ATTACH, FORM, START and STOP all require a privilege level of one. For all functions other than BUILD and INIT, the print spooler must be initialized before the function can be used.
See also
582 Spooler
Attach, Sysgen
Start Command Stop Command The Start command starts a user, session or background task. The Stop command stops a user, session or background task. START process console ( attach-options
2
START process console ( attach-options ACCOUNT name PASSWORD password
3
START process console ( attach-options MODEM
4
START command
5
STOP
Commands
1
process
attach-options
»
console attachment parameters
command
»
any THEOS or user-supplied command name with parameters
console
»
physical device name for console attachment
name
»
account name for automatic logon
process
»
an unused process id number
password
»
account password
Operation
Mode 1—Starts a process as a user with console. process must be the number of an unused memory process. The number of memory processs is defined in the field “Maximum Number of Tasks” by the Sysgen. console must be a physical device name listed in /THEOS/CONFIG/ DEVNAMES.TXT. The attach-options are any valid console attachment parameters as defined by the Attach command (see “Attach” on page 21). >start 20 multi5 ( c190 b38400 w8 e5
When a user is started with this command, it has all publicly attached devices available and the privately attached console as specified in this command. Once the user environment is defined, it executes the Logon command and awaits the operator’s response to the “Logon please:” prompt. See “Session Management” on page 62 for a description of starting a new session on your console.
Start
583
Mode 2—Identical in operation to Mode 1 except the new user is automatically logged onto account. The PASSWORD parameter is optional and is used when the account has a password. If the account has no password, the PASSWORD parameter is ignored. >start 20 multi5 ( c190 b38400 w8 e5 acc develop password "supreme"
Commands
If the PASSWORD parameter is not used and account has a password, the new user is started and Logon displays its “Password” prompt. Mode 3—This mode starts a user similar to Mode 1 and Mode 2. However, when the MODEM keyword is used it tells Start that the user is connected via a remote modem connection. A user started with this mode differs from both Mode 1 and Mode 2 in that the user’s console device is attached with this mode but no initialization strings are sent for the console class code. A special indicator is set that Logon uses. Instead of starting the user with the “Logon please” prompt, the Logon command programs the modem to auto-answer the telephone line. It then waits for an incoming call and connection. After the connection is established between the two modems Logon then sends the classcode initialization string and requests that the user logs on. When the remote user performs a Logoff (not lateral Logon), the connection is terminated and the modem is reinitialized to wait for the next incoming call. Mode 4—This mode starts a background task. A background task is a user process started without a console. command must be specified and may be any valid command line. >start archive s tape (multiuse noask noquery volume Task started as process #29
The process number used for the new background task is the highest numbered process currently available. It has all of the publicly attached devices available to it but does not have a console display or keyboard. Instead of executing the Logon command, command is executed. command must be a command that does not require any console input. command may be an EXEC language program that executes a series of commands before exiting. Whenever a background task command requests console input or exits to the CSI, it is stopped. Background tasks do have access to the standard input and standard output devices and can use i/o redirection to simulate console input. Background tasks are described on page 60. 584 Stop
Mode 5—Stops user process number process. The process must be in the program Logon. If necessary, use the Force to force the user to Logoff first before stopping the process. >stop 20 Process is still active. >force 20 logoff
Before using the Force, you should first check to make sure that the user is not in the process of updating any files. If the user process was started with a Mode 3 start (modem server), the modem connection is first terminated before stopping the user. Notes
In Mode 1, Mode 2 and Mode 3, when a process is started with a console on a serial port, a modem initialization string is sent to the process’s console port. The specific string of characters transmitted is defined by a file in the /THEOS/CONFIG/SSYSTEM.MODEM library or by the file /THEOS/CONFIG/ MODEM.CFG. These files can be edited to customize the modem initialization string to that required by your modems. Refer to “Starting Users” on page 58 for a description of this user startup process. See also “SYSTEM.MODEM Library” on page 220 . For compatibility, the Start command accepts the command syntax used in prior versions: >Start
Defaults
process
(
console attach-options start-options
New users started with this command always have the devices that are defined in the system configuration file (see “Sysgen” on page 591) and any other devices that are publicly attached. Spooled printers defined by the system configuration file are assigned the queues defined in that file, other printers are assigned queues in a one-toone basis such as queue A to PRT1, queue B to PRT2, etc.
Return Codes
The Start command sets the return code to a non-zero value less than 1,000 when an error occurs and to a value greater than 1,000 when the process is successfully started. Return values greater than 1,000 specify that the process was started successfully and give the specific process number used for the new task. Subtract 1,000 from the return code to produce the process number.
Restrictions
The Stop command requires a privilege level of five. Mode 1 and Mode 2 of the Start command require a privilege level of five. Stop 585
Commands
>stop 20
When attempting to Start a new user or task, the message “All available tasks are in use” indicates that all processs are already in use. You must either wait for a process to become availble (another tasks stops) or increase the number of processs available by setting a larger “Maximum Number of Tasks” in your system configuration (see “Sysgen” on page 591) and then reboot. Commands
When starting a new user, if the device specified as console is already in use by another user or task, the message “Device is attached to user ...” or “Device ... is already attached to process ...” is displayed. Either choose a different device for this user or free up the device by stopping the other users. See also
586 Stop
Attach, Net Start, Sysgen
SUMode Command Test the system for single-user operation.
SUMODE
The system is examined to see if it has only one logged on user (this user). It performs this test by counting the number of logged on users, background tasks and servers running. It then subtracts the number of these tasks that are dedicated to print spooler operation and disk cache. If the remainder is not one then it reports that the system is not in single user mode by displaying the message:
If the system is in single user mode then no message is displayed. Return Code
Because this program would normally be called from an EXEC program or other program, the return code is set to indicate the results of the test. A return code of 0 indicates that the system is in single user mode. A return code of 1 indicates that one or more processes are still operating.
SUMode 587
Commands
Operation
Commands
588 SUMode
SysEd EXEC This command allows you to view and optionally modify some common system configuration data files.
SYSED
2
SYSED MODIFY
Operation
Mode 1—SysEd uses WindoWriter to open the following files in READONLY mode: /THEOS/CONFIG/SYSGEN.CFG:S /THEOS/CONFIG/DEVNAMES.TXT:S /THEOS/CONFIG/START.CFG:S /THEOS/CONFIG/MODEM.CFG:S /THEOS/CONFIG/NET.CFG:S
Mode 2—When MODIFY is specified, SysEd opens the above files without specifying READONLY and allows you to make changes and save the files.
SysEd
589
Commands
1
Commands
590 SysEd
Sysgen Command Sysgen maintains the system configuration file (/THEOS/CONFIG/SYSGEN.CFG:S).
SYSGEN
Operation
»
optional disk drive letter for /THEOS/CONFIG/SYSGEN.CFG file
Maintains the system configuration file on drive. If drive is not specified, S is assumed. Refer to the THEOS Corona Version 5 Operating System Installation and Setup Guide for a complete description of the operation of this configuration program. The drive parameter is used to change the system configuration file for a boot disk other than the current system disk. For instance, the Emergency Boot Floppy.
Notes
The system configuration file contains information used when THEOS is booted. Changes made to the configuration are not effective until the system is reset or rebooted.
Restrictions
The Sysgen command may only be used when you are logged onto the SYSTEM account (user number 0) with a privilege level of five.
See also
Attach, Load, Setup , Spooler, Start
Sysgen
591
Commands
drive
drive
Commands
592 Sysgen
System Command The System command changes the system disk drive.
SYSTEM
2
SYSTEM
drive Operation
Commands
1
drive »
optional drive letter code
Mode 1—This mode is used when the system disk is a removable disk drive and you want to change the disk volume in the drive. When the command is executed, you are prompted with: Mount new system disk on drive S[1:1:0]
Change the disk volume to another valid THEOS system disk and press (EnterÌ˛). Mode 2—This mode is used when you want to change the system disk to a different drive. For instance, after booting from an Emergency Boot Diskette, the System command is used to switch to the hard disk. >system m
Caution
You may change to a non-system disk. That is, you may change to a disk that does not contain an operating system or its support files. Although this may be desirable, in this situation there will be some limitations to the commands that you may execute. Any command that requires a file in the /THEOS/MENU/language, /THEOS/CONFIG or /THEOS/OS directories will not execute properly because these libraries are always assumed to be resident on the current system disk. Since command use files in those directories, there will not be much that you can do.
Notes
You must use this command to change the attachment of the system disk. The Attach cannot change the S disk assignment. The System command does not load any programs or files from the new system disk. Unless they are loaded into memory, it does check for the presence of the following files: /THEOS/OS.CSI, /THEOS/OS/MESSAGE/language/KEYWORD.BIN and /THEOS/OS/MESSAGE/language/MESSAGE.BIN. If WORK is S, all of the system work files are copied to the new system disk.
System
593
Restrictions
The System command requires a privilege level of five. You must be in true single-user mode. That is, no users or background tasks started, including the print spooler or Network Login Server. The disk cache may be enabled.
Commands
See also
594 System
Reboot, Sysgen
Tail Command Filter The Tail command displays the ending of a text file on the standard output device.
TAIL
file... ( options
2
TAIL
file ( options FOLLOW
file
»
file name with optional path; may contain wild cards
options
»
+nnn -nnn
Commands
1
CHARS FOLLOW LINE
Operation
Mode 1—The last lines or characters of file are output to the standard output device. When more than one file is specified, the last lines or characters of each of the files are output. >tail /theos/config/sysgen.cfg USER1 5:3:7:1 L80,P24,C90,ACCOUNT=SYSTEM USER2 5:3:7:2 L80,P24,C90 USER3 5:3:7:3 L80,P24,C90 USER4 5:3:7:4 L80,P24,C90 USER5 5:3:7:5 L80,P24,C90 USER6 5:3:7:8 L80,P24,C90 DATEFORM A NAME "Saturn" MAXPCB 40 LOWCASE
This mode outputs the tail of a file and then monitors the file for any growth in the file. When additional data is written to the file by another user or task, it is displayed and monitoring continues. You must use (Esc) or (F9) or (Break),(Q) to terminate this command. >tail system.history (-2 follow 09/08/96 15:55:06.579 1 End Program RC: 0 CPU: 0.380 09/08/ 96 15:56:16.078 16 Start Program Command: TAIL SYSTEM.HISTORY ( -2 FOLLOW
When another user causes additional records to be written to the history file, they are displayed here.
Tail
595
Commands
Options
Notes
CHARS
Count characters instead of lines.
FOLLOW
Use Mode 2 of the Tail command. If multiple files are specified, only the first file is output and followed.
LINES
Count lines instead of characters. This is a default option.
+nnnn
Begin output nnnn lines or characters from the start of the file.
-nnnn
Begin output nnnn lines or characters from the end of the file. The default is -10.
When multiple files are displayed, each file’s output is identified with a line displaying the complete path to the file. A file specification can omit the file type if the environment variable FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Variables” on page 111 of the THEOS Corona Version 5 Operating System Reference. Defaults
LINES is a default option and -10 is the default count.
See also
Head, List, More
596 Tail
Tape Command The Tape command initializes and manipulates a tape volume.
TAPE
2
TAPE
tape functions
tape
»
tape device name, such as TAP2 or TAP4
functions
»
EJECT FORMAT INIT label
Operation
Commands
1
LABEL REWIND RUN
SHOW TENSION UNLOAD
VERIFY WTM
Mode 1—Using the TAP1 device, this mode rewinds to the beginning of the tape volume and reads the header information. The tape label, the first file name and its creation date are displayed. >tape Tape TAPE1 label "TBACKUP". Tbackup from system "Production" on Wednesday, January 16, 2002, at 5:22pm. Data set name: "January 16, 2002 17:22:14" >
Mode 2—The requested function is performed on tape. If tape is not specified, TAP1 is assumed. >tape show Tape TAPE1 label "FRIDAY". Archived from disk "PRODUCTN" on 12/06/96, at 17:35. >
Tape 597
Function
EJECT
If the tape device supports a programmable eject feature, the tape cartridge is ejected from the tape drive.
FORMAT
A TENSION function is performed on the tape and then new header labels are written. If the tape supports physical formatting, the tape is formatted instead of just being tensioned.
Commands
>tape format Enter tape label: Tuesday > INIT label
A REWIND operation is performed and then it writes a new volume label without tensioning or formatting the tape. >tape init "Monday"
Tape labels are one to eight characters in length. LABEL
A REWIND operation is performed and then all file labels are displayed and data blocks are counted. >tape label VOL1TSC002 HDR1ARCHIVE.DISKTAPE 0001000100000098316 HDR2F0409600128 ** Tape Mark ** Number of data blocks = 28917 ** Tape Mark ** EOF1ARCHIVE.DISKTAPE 0001000100000098316 EOF2F0409600128 ** Tape Mark ** ** Tape Mark **
000000
028917
REWIND
Rewinds to the start of the tape.
RUN
This function is synonymous with the EJECT function. If the tape device supports a programmable eject feature, the tape cartridge is ejected from the tape drive.
SHOW
Reads the next tape header. The header and the file name and creation date are displayed. If the tape is positioned to the end of the tape, then “Tape mark” is displayed.
>tape show Tape TAPE1 label "TBACKUP". Tbackup from system "Production" on Wednesday, January 16, 2002, at 5:22pm. Data set name: "January 16, 2002 17:22:14" >
598 Tape
A “fast forward” and a “fast rewind” are performed on the tape to ensure uniform tension throughout the tape volume.
UNLOAD
This function is synonymous with the EJECT function. If the tape device supports a programmable eject feature, the tape cartridge is ejected from the tape drive.
VERIFY
Verifies the readability of the entire tape by rewinding to the start and then reading every block on the tape. >tape verify Block: 40, length: 0 >
WTM
Writes a tape mark on the volume. Every file on the tape is automatically terminated with a tape mark. The end of a tape is indicated by two consecutive tape marks.
Notes
Before a tape can be used by THEOS, it must be initialized with a tape label.
Restrictions
The Tape command requires a privilege level of four.
See also
TArchive, Attach, Backup, CopyFile, Eject, Restore, TBackup
Tape 599
Commands
TENSION
Commands
600 Tape
TArchive Command The TArchive command makes an “archive copy” of a file, a set of files, an entire disk volume or a set of disk volumes. This is a legacy command. The current version of software that should be used for archiving and backing up systems is TBackup.
TARCHIVE
from-drive to-drive ( options
2
TARCHIVE
file to-drive ( options
3
TARCHIVE
file from-drive to-drive ( FILES options
4
TARCHIVE
from-drive1 from-drive2 ... to-drive ( options
Commands
1
file
»
file name with optional path; may contain wild cards
from-drive
»
drive letter of source drive to archive
to-drive
»
drive letter of destination drive or logical tape name
options
»
ACCOUNT ASK
FILES INCREMENTAL date1 LABEL name date2 MULTIUSER DIFFERENTIAL NAME file
NOASK NOQUERY NOTYPE QUERY SHARE
SIZE file SUBDIR TYPE VOLUME
The TArchive command creates an archive volume that can be used by the Restore command. The TArchive and Restore commands have been replaced with the TBackup command as it is more capable and supports the latest storage devices. Operation
The file or files specified with file or from-drive are copied in a compressed form to an archive volume on the destination to-drive. The archive volume created can only be interpreted with the complementary Restore command described on page 495. Mode 1—Unless one or more options restrict the file selection, all of the files on the from-drive are archived to the to-drive. With this mode VOLUME is a default option. For instance, the following command archives all files in all accounts in all subdirectories on the S drive to the drive attached as TAPE1. >TARCHIVE S TAPE
TArchive 601
Mode 2—The file(s) specified by file are archived to the to-drive. With this mode ACCOUNT is a default option. For instance, the following command archives a single file to the floppy diskette in drive F.
Commands
>TARCHIVE CUSTOMER.MASTER F
The following command archives all of the “master” files in the current account to the tape drive. >TARCHIVE *.MASTER TAPE
Mode 3—The files listed in file are archived to the to-drive. file must be an ASCII stream file containing one file description per line. The SELECTED.FILES and SELECTED.EXEC files created by the FileList command and the FOUND.EXEC created by the Look command can be used for this specification file (see “The EXEC and FILES Options” on page 239). You may also create the specification file with an editor or application program. For instance, FileList is used to create a list of files to be archived: >FILELIST *.DATA:A (EXEC >FILELIST A NOT *.DATA:A (10/1/01 EXEC APPEND
A file now exists that lists all of the “data” files and all files that have been changed since 10/01/2001. The following command will archive these files to tape: >TARCHIVE SELECTED.EXEC A TAPE (FILE
Mode 4—Similar to Mode 1 except that multiple volumes are archived onto to-drive. With this mode, VOLUME is a default option. For instance, the following command archives all files in all accounts in all subdirectories on the S drive, the A drive and the B drive to the F drive. >TARCHIVE S A B F
602 TArchive
Options
The following options are available with the TArchive command. They can be used with any of the modes described above, either singly, or in combinations. ACCOUNT
Specifies that only the files owned by the current account are candidates for archiving. This is a default option when Mode 2 is used.
ASK
A default option that instructs TArchive to ask the operator to mount the source and destination volumes, and waits for confirmation that the proper volumes are mounted. For instance: >tarchive s f Source is Disk S Destination is Disk F Mount volumes now: Source is labeled "SYSTEM". Destination is labeled "ARCHIVE1". OK to start archive (Y/N)
Respond with a (EnterÌ˛) for the “Mount volumes now:” request and a (Y) or (N) for the “OK to start archive” question. Use the NOASK option to override this default. date1
The first token that looks like a date is interpreted as a selection date. Only files with a date stamp greater than or equal to this date (new files) are candidates for archiving. For instance: >tarchive s f (10/1/01
With this command only those files on the S drive that have been changed on or since 10/01/2001 will be archived. See also the INCREMENTAL and DIFFERENTIAL options. date2
A second token that looks like a date is interpreted as a selection date. Only files with a date stamp less than or equal to this date (old files) are candidates for archiving. >tarchive s f (1/1/86 9/30/01
TArchive 603
Commands
Use the VOLUME option to override this default.
This command archives only those files on the S drive that have not been changed since 9/30/2001. The date 1/1/86 is the earliest date maintained by the THEOS file system and is interpreted as “from the earliest date.” DIFFERENTIAL Tells TArchive to include only those files that have their modified bit set. This is the only option that prevents TArchive
Commands
from resetting the modified bit for files that it archives. See “Differential Archives” on page 608. FILES
Indicates that Mode 3 of the TArchive command is to be used. The file specifies an ASCII stream file with each record in the file specifying a single file name. The file name specifications in this file may include the account name and path to the file. For instance, a line in the specification file might contain: develop\custom/programs/program.source.sample:s
If this file is used in an archive, the display will be: >tarchive selected.exec s f (file noask Account: 4=DEVELOP Subdirectory: CUSTOM Subdirectory: PROGRAMS Library: PROGRAM.SOURCE Member: PROGRAM.SOURCE.SAMPLE INCREMENTAL Tells TArchive to include only those files that have their
modified bit set. The modified bit is reset for each file archived. See “Incremental Archives” on page 609. LABEL label Specifies that the to-drive’s volume label is set to label. For
instance: >tarchive s f (label "Monday1" notype
sets the label of the diskette in drive F to “Monday1.” If additional disks are required, the last character of the label is incremented. When this might happen, try to use a starting label name that ends with a sequence identifier, such as “1” or “-A” etc.
604 TArchive
MULTIUSER Allows TArchive to archive a public drive even though other users may be logged on and active. Normally, when TArchive is instructed to perform a full volume archive (option VOLUME)
on a public disk, it requires single-user mode. If other users are logged onto the system, it displays the message: “Must be single user or private volume.”
Use this option only if you are sure that all other users are inactive. NAME
Specifies that the archive volume file name is to be set to the token following this option. Additionally, the archive volume file will only use as much space as needed. None of the existing files on the to-drive are erased (an implied SHARE option). For instance: >tarchive s f ( account name "programs.archive"
This creates an archive volume file on drive of PROGRAMS.ARCHIVE.
F
with a file name
If the archive cannot fit in the space remaining on the destinatin drive, it will report that the disk is full and not create the archive volume. Use of this option sets the NOASK option. To reenable this option, you must specify ASK after the NAME option and its file name. One of the principal advantages of this option is that the resulting archive file uses only as much disk space as is needed for the actual archive volume. When this option is not used the archive volume name is ARCHIVE.VOLUME01, the archive volume uses the entire disk space of the to-drive and it may use multiple volumes for the output file. NOASK
Disables the source and destination volume operator confirmation at the beginning of the archive and when subsequent disks or tapes are needed.
TArchive 605
Commands
Using this option tells TArchive to not restrict the archive to single-user operation (the message is still displayed). THIS CAN BE EXTREMELY DANGEROUS! If another user changes some files while the archive is being created, the integrity of the archive is lost.
Commands
NOQUERY
A default option that tells TArchive to not ask for confirmation on each file being archived.
NOTYPE
Tells TArchive to not display account names, subdirectory names, library names or file names on the standard output device as they are being archived.
QUERY
Tells TArchive that the operator is to be “queried” or asked if each file matching the selection criteria is to be included in the archive volume. >tarchive s f (query Source is Disk S Destination is Disk F Mount volumes now: Source is labeled "THEOS". Destination is labeled "ARCHIVE". OK to start archive (Y/N)? Y Ok to archive "SAMPLE.FILE:S" (Yes/No/All) N Ok to archive "SELECTED.EXEC:S" (Yes/No/All) N ... 94.3 MB, 8,834 files selected. ...
When the “Ok to archive” question is asked you may respond with a (Y) for yes, (N) for no or (A) for all. Responding with (A) means yes to this file and all remaining files are included without being queried. Respond with (Esc) to cancel to archive. SHARE
Tells TArchive that the archive volume is to share the space on the first disk with any existing files. This is a default option when to-drive is a removable hard disk. When this option is not used, TArchive clears the directory of the first disk and creates an archive volume file that uses the entire disk space. If multiple disks are required they will use the entire disk space for the archive file.
606 TArchive
SIZE file
The total size of all of the files selected for archiving is computed and appended to file. This is done before the archive is created.
SUBDIR
Tells TArchive that only files in the current working directory and all of its subordinate directories are included.
TYPE
A default option that tells TArchive to display each account name, subdirectory name, library name and file name on the standard output device (normally the console) as it is being archived. This display can be redirected. For instance, the following is a typical display during an archive: Commands
ACCOUNT: 2=SAMPLES File: CHARSET.H File: LIBS.EXEC File: MAKE.FILE File: READ.ME File: SAMPLES.EXEC Subdirectory: C32 Library: C32.CMD32 Member: C32.CMD32.FINS Member: C32.CMD32.PRTF ...
The indentation of the display indicates the hierarchy of the directory structure. To disable this option use the NOTYPE option. VOLUME
Full Volume Archives
Specifies that all accounts, all subdirectories and all files on the from-drive are to be archived. This option requires that the from-drive be a private disk volume, that all other users be logged off or that the MULTIUSER option be used.
Full volume archives (option VOLUME in effect) are copies of the entire contents of disks. They should be created on a frequent and periodic basis to assure yourself of having adequate protection in the case of disk or computer failure. Since a full volume archive contains a copy of every file, subdirectory and account on a disk, it is the only archive volume that needs to be accessed if you must restore a system. Because full volume archives do include all of the files on a disk, it includes files that rarely change, such as the operating system programs and data files, application programs and other static data files.
TArchive 607
Multivolume Archives
Mode 4 of this command archives multiple disk volumes onto a single archive volume. This allows you to archive your entire system in one operation. For instance, a system with four hard drives can be archived with the command:
Commands
>tarchive s a b c tape
Should the need ever arise where you want to restore a volume or a file from this archive volume, use the DRIVE option of the Restore command. >restore tape b (drive b
Differential Archives
A differential archive is an archive volume that includes only those files that have changed since the last full volume archive. For instance, if a disk contains three files: PROGRAM.COMMAND DATA1.FILE DATA2.FILE
A full volume archive will create an archive volume that contains all of these files. If DATA1.FILE is changed and a differential archive is performed, it will create an archive volume that contains only that file. The other files are not included in this differential archive volume because they have not changed and there is a current copy of those files in the last full volume archive. If DATA2.FILE is then changed and another differential archive is performed, it will create an archive volume that contains both the DATA1.FILE and the DATA2.FILE because both of those files have been changed since the last full volume archive was performed. Full Volume
Differential 1
Differential 2
DATA1.FILE
DATA1.FILE
PROGRAM.COMMAND DATA1.FILE DATA2.FILE
DATA2.FILE Differential Archives
Should a disk failure occur, the system could be restored by first restoring the full volume archive and then the last differential archive volume.
608 TArchive
Incremental Archives
Full Volume
Incremental 1
Incremental 2
PROGRAM.COMMAND DATA1.FILE
DATA1.FILE
DATA2.FILE
DATA2.FILE Incremental Archives
Should a disk failure occur, the system could be restored by first restoring the full volume archive followed by the first incremental archive volume and then the second incremental archive volume. Notes
The output of the TArchive command is an archive volume. This is a special stream file that contains the compressed forms of the archived files along with their directory entries. This archive volume can be manipulated like any other file, and it can even be opened and read like any other file. However, since it is a compressed form of the original files and it contains the directory entries for the files, it is not usable except by programs that know how to interpret this information. The Restore command is a program that knows how to interpret the information and copy it back to its original, usable form. The files in an archive volume are sorted in ascending file name sequence within account number sequence. An archive volume is a single file named ARCHIVE.VOLUME01 (unless the NAME option is used). This single file contains all of the files included in this archive. Frequently a file or set of files being archived from hard disk to floppy, removable hard disk or tape will be larger than the disk or tape. In that situation the TArchive command will ask you to mount another disk or tape so that it can continue the archive of the file or files. In this situation each of the disks or tapes used will contain a single file named ARCHIVE.VOLUMEnn (see SHARE option for an exception to this situation). Unless the DIFFERENTIAL option is used, the modified bit for each file archived is reset by the archive process.
TArchive 609
Commands
An incremental archive is an archive volume that includes only those files that have changed since the last full volume or incremental archive was created. For instance, in the example used for the differential archive, a full volume archive is performed and then DATA1.FILE is changed. When the incremental archive is performed, it creates an archive volume that contains only the DATA1.FILE. When DATA2.FILE is changed and another incremental archive is performed, it creates an archive volume that contains only the DATA2.FILE. The DATA1.FILE is not included in this archive volume because it has not changed since the last incremental archive was created.
ACCOUNT (Mode 2), ASK, NOQUERY, TYPE, VOLUME (Mode 1 and Mode 4).
Cautions
The MULTIUSER option tells the TArchive command to not check whether or not other users are logged on or active. It does not prevent those other users from performing operations that change the database being archived. If another user does change the database during the archive operation, the integrity of the archive volume is compromised.
Commands
Defaults
For instance, a disk volume being archived includes a customer master file with current balance fields and an invoice database. While the archive volume is being created, another user posts a transaction to the invoice database before it is included in the archive but after the customer master file is archived. If the archive volume is ever restored, the invoice database will not match the current balance fields in the customer master file. Restrictions
Unless the NAME option is used, the destination drive must be an image drive or some type of a removable mass-storage device such as a floppy diskette, removable hard disk or tape. The destination media must be preformatted. If the archive requires more disks or tapes than anticipated, you can use another session or terminal to format the disk while TArchive waits for you to confirm that the proper disk is mounted. To do this the ASK option must be in effect and the to-drive must be publicly attached. When option VOLUME is in effect and the from-drive is publicly attached, all other users must be logged off or the MULTIUSER option must be specified. See “Caution” notes above regarding the MULTIUSER option. The TArchive command requires a privilege level of four.
See also
610 TArchive
Backup, CopyFile, Disk, Restore, Tape, TBackup
TBackup Command The TBackup command backs up files to another drive, or restores those files. It can also be used to verify or compare the backup files to their original source files.
TBACKUP
file-spec... backup ( BACKUP backup-options
2
TBACKUP
backup ( COMPARE compare-options
3
TBACKUP
backup file-spec... ( RESTORE restore-options
4
TBACKUP
backup ( VERIFY verify-options
5
TBACKUP
( PASSFILE filename
Commands
1
backup
»
drive letter of disk or tape volume containing backup or the file name specification for the backup data set
file-spec
»
drive letter of source drive for backup or specification of files for backup
backup-options
»
ACCOUNT ASK COMPARE DIFFERENTIAL EJECT ERROR FILES
FULL INCREMENTAL LABEL LIST MULTIUSER NOASK NOEJECT
PASSWORD PASSFILE PRTnn SETNAME SUBDIR VERIFY VOLUME
WAIT
date1 date2
compare-options
»
ASK DISKMAP EJECT ERROR
LIST NOASK NOEJECT NOWAIT
PASSFILE PASSWORD PRTnn SETNAME
WAIT
restore-options
»
ACCOUNT ASK DISKMAP EJECT ERROR FILES FROM
LIST NEWFILE NOASK NOEJECT NOQUERY NOSYSFILES NOWAIT
OLDER OLDFILE PASSFILE PASSWORD PRTnn QUERY
REPLACE SETNAME VOLUME WAIT
ASK ERROR EJECT
LIST NOASK NOEJECT
NOWAIT PASSFILE PASSWORD
PRTnn SETNAME WAIT
verify-options
»
date1 date2
TBackup 611
Operation
Mode 1—Creates a backup data set on backup of the files specified by filespec. Although no options are required, you should specify the SETNAME for the data set. The backup destination may be specified in one of two ways:
Commands
1. With a drive code. When this is used, the backup data set is written to a file named TBACKUP.VOL00001:backup. The destination volume is cleared of all existing files before this data set is created. >tbackup s tape (backup setname "Weekly backup"
If the data set does not fit on a single volume, subsequent volumes will be requested and the file names used on those volumes will be TBACKUP.VOLnnnnn:backup, with nnnnn being a sequential number incremented for each volume. 2. With a file name specification. When this is used, the destination volume is not cleared and the backup data set is written to the file name specified. >tbackup s weekly.backup:d (backup differential
The data set must fit in the available space on the destination drive. If the data set does not fit in the space remaining on that volume, an error message will display. The file-spec may be a list of several file specifications. For instance: >tbackup *.data *.program *.notes tape (backup
With the above command, all files on all drives in the default search sequence with a file-type of “data,” “program” or “notes ” are backed up to tape. file-spec may be omitted, in which case it means that all files on all drives in the drive search sequence are candidates for the backup. The drive search sequence is defined in the account environment (see “Account” on page 13) or by the SEARCH environment variable (see “Set” on page 541). Unless specifically identified in file-spec the following sets of files are not backed up with this command: /SYSTEM.CSI* /SYSTEM.CSISV* /SYSTEM.EXEC* /SYSTEM.PIPE* /SYSTEM.WORK* /THEOS/TEMP/SYSTEM.CHIST*
612 TBackup
Mode 2—Compares the contents of a backup data set specified by backup with the files that it was originally backed up from. For instance: >tbackup s tape (backup setname "Weekly Backup" >tbackup tape (compare setname "Weekly Backup"
Mode 3—Restores the files from the backup data set to the original location of the files. >tbackup tape s (restore >tbackup tape *.data:s *.data:a program.source.*:s (restore
The DISKMAP option may be used to instruct TBackup to restore the contents of the data set to a drive other than the original source of the backup. >tbackup s.file:s a.file:a tape (backup setname "Test" >tbackup tape (restore diskmap s-a diskmap a-s setname "Test"
After the restore operation is complete, the A drive will have the file named S.FILE and the S drive will have the file named A.FILE. Mode 4—Verifies the readability and integrity of the backup data set specified by backup. Verifying a data set does not test to see if the data set is an exact copy of the original file as the Mode 2 compare operation does. Instead, it does read every byte of the data set, verifies that all of the checksums are correct, and that every file and “record” in the data set starts and ends where it should. Mode 5—This mode creates a file containing an encrypted password. This file can then be used for any of the other modes of the TBackup command. When envoked, a form is displayed allowing you to enter a password and to confirm that you entered the desired password by requiring you to reenter it. The resulting password is encrypted and stored in the file named filename.
TBackup 613
Commands
If the source files have been changed since the backup data set was created, this compare operation will fail. Remember, in a multiuser environment, other users may be changing the database during the backup or between the start of the backup and the comparison operation.
Backup Options
ACCOUNT
Only the files owned by the current account are candidates for the backup. This option sets SUBDIR option. Use the VOLUME option to override this default.
Commands
ASK
When TBackup is ready to begin writing the backup data, this option instructs TBackup to ask the operator to mount the destination volume and waits for confirmation that the proper volume is mounted.
After you load the proper volume in the disk or tape drive and acknowledge this message, TBackup looks for an existing file named TBACKUP.VOLnnnnn. If there is an existing file, TBackup displays the following information about it:
Select “Overwrite volume” to use this disk or tape as the backup volume. “Mount new volume” returns to the prior question, allowing you to insert a different disk or tape into the drive. ASK is a default option unless backup is a file name specification, in which case this option is ignored. Use the NOASK option to override this default. COMPARE Indicates that, after the backup data set is created, TBackup
should compare the data set against the original files. The NOASK option is in effect when the comparison starts.
614 TBackup
DIFFERENTIAL
Only those files that have their modified bit set are included in the backup. This is the only option that prevents TBackup from resetting the modified bit for files that it copies. See “Differential Backups” on page 629. This option applies when the to-drive is a tape drive or a removable hard drive. It specifies that the final volume is ejected from the drive after the backup is complete.
ERROR
Specifies that all errors detected during the backup are written to the indicated file. For instance: >tbackup *.data:s tape (backup error backup.log:s
This command backs up all files with a file-type of DATA to the TAPE drive. Errors detected are logged to the file BACKUP.LOG:S. FILES
Indicates that file-spec is the name of an ASCII stream file with each record in the file specifying a single file name or a wild-card file specification. The file name specifications in this file may include the account name and path to the file. For instance, lines in the specification file might contain: *.data:s develop\custom/programs/program.source.sample:s
The SELECTED.FILES and SELECTED.EXEC files created by FileList and the FOUND.EXEC created by Look can be used for this specification file (see “The EXEC and FILES Options” on page 239). You may also create the file with an editor or application program. For instance, FileList is used to create a list of files to be backed up: >filelist *.data:a (exec >filelist a not *.data:a (10/1/01 exec append
A SELECTED.EXEC file now exists that lists all of the “data” files and all files that have been changed since 10/01/2001. The following command backs up these files: >tbackup selected.exec tape (backup file FULL
The modified bit of a file does not affect whether or not it is included in the data set. This is a default option that can be overridden by using the DIFFERENTIAL or INCREMENTAL option. TBackup 615
Commands
EJECT
The modified bit is always reset when this option is in effect and the file is backed up. INCREMENTAL Tells TBackup to include only those files that have their
modified bit set. The modified bit is reset for each file copied. See “Incremental Backups” on page 630. Commands
LABEL
Specifies that the to-drive’s volume label is set to label. For instance: >tbackup s f (backup label "Monday1"
sets the label of the diskette in drive F to “Monday1.” If additional disk volumes are required, the last character of the label is incremented. When this might happen, try to use a starting label name that ends with a sequence identifier, such as “1.” Or use a label name with seven or less characters. MULTIUSER
Allows TBackup to back up files from a public drive even though other users may be logged on and active. Normally, when TBackup is instructed to perform a full-volume backup (VOLUME option) on a public disk, it requires single-user mode. If other users are logged onto the system, it displays the message: “Must be single user or private volume.” Using this option tells TBackup to not restrict the backup to single-user operation (the message is still displayed). THIS CAN BE EXTREMELY DANGEROUS! If another user changes some files while the backup is being created, the integrity of the backup is lost. Use this option only if you are sure that all other users are inactive and will remain so while the backup is created.
616 TBackup
NOASK
Disables the destination volume operator confirmation at the beginning of the backup. This option is useful for unattended backups.
NOEJECT
A default option that specifies that the last volume in backup is not ejected when the backup is complete.
NOWAIT
Disables the WAIT option and allows TBackup to terminate without waiting for the operator to acknowledge the status message upon completion of the backup operation.
PASSFILE
Specifies the file name containing the encrypted password. This password is used to encrypt the data set. When used, the
data set cannot be used for COMPARE, RESTORE or VERIFY purposes without specifying the exact same password. PASSWORD Specifies the password to use for encrypting the data set. When used, the data set cannot be used for COMPARE, RESTORE or VERIFY purposes without specifying the exact
If PASSWORD is the last option specified on the command line and there is no password specified after the keyword, TBackup will prompt the operator for the password. SETNAME
Specifies the backup data set name. This name may be up to 64 characters in length and it may include letters, digits, spaces and other punctuation characters. Enclose the data set name in quotation marks. >tbackup s tape1 (backup volume setname "Full system backup"
The name for a backup data set can be used to ensure that the proper backup is being used later when it is restored When the data set is used at a later time, this data set name is displayed (unless NOASK is in effect). You can specify that the backup must have the same data set name as specified when you created it by using the SETNAME option with the Mode 3 command. SUBDIR
Tells TBackup that files in the current working directory and all of its subdirectories are included in the backup. When not specified, only the files in the current working directory are included. None of the files in subordinate directories are included in the backup.
VERIFY
Indicates that, after the backup data set is created, TBackup should verify the readability of the data set. The NOASK option is in effect when the verify operation starts. Verifying a data set does not test to see if the data set is an exact copy of the original file as the COMPARE option does. Instead, it does read every byte of the data set, verifies that all of the checksums are correct, and that every file and “record” in the data set starts and ends where it should.
VOLUME
Specifies that file-spec refers to files in all accounts, not just the current account. The default ACCOUNT option limits filespec to files on the current account. TBackup 617
Commands
same password. Passwords may be up to 32 characters in length, are case sensitive, and may contain spaces and other special characters.
Commands
This option requires a privilege level of five, that you be currently logged onto the system account, and that the source disk be a private disk volume or, if it is a publicly attached disk, that all other users be logged off or that the MULTIUSER option be used. WAIT
A default option that specifies that TBackup should wait for an operator response before clearing the status message and exiting.
date1
The first token that looks like a date is interpreted as a selection date. Only files with a date stamp greater than or equal to this date are candidates for the backup. For instance: >tbackup s tape2 (backup 1/1/02
With this command only those files on the S drive that have been changed on or since January 1, 2002 will be backed up. See also the INCREMENTAL and DIFFERENTIAL options. date2
A second token that looks like a date is interpreted as a selection date. Only files with a date stamp less than or equal to this date are candidates for the backup. >tbackup s tape2 (backup 2/1/02 2/28/02
This command backs up only those files on the S drive that were changed between and including the beginning and ending of February, 2002. Files changed before February or since February are excluded.
618 TBackup
Compare Options
ASK
This option operates the same as the ASK option on page 614.
DISKMAP
Changes the drive codes used during the comparison. For instance: >tbackup f (compare diskmap s-d
Multiple DISKMAP options may be used to map files on multiple drives: >tbackup s a b tape (backup >tbackup tape (compare diskmap s-d diskmap a-e diskmap b-f
Here, the files backed up from S are compared to files on the current D drive, files backed up from A are compared to files on the current E drive, and files backed up from B are compared to files on the current F drive. EJECT
This option operates the same as the EJECT option on page 615.
ERROR
This option operates the same as the ERROR option on page 615.
LIST
Lists the files in the backup to the specified file or device. For instance, to list the files in the backup to a disk file, use: >tbackup tape1 (compare list backup.listing:s
To list the files to a printer you would use: >tbackup tape1 (compare list prt5 NOASK
This option operates the same as the NOASK option on page 616.
NOEJECT
This option operates the same as the NOEJECT option on page 616.
NOWAIT
Disables the WAIT option and allows TBackup to terminate without waiting for the operator to acknowledge the status message upon completion of the backup operation.
TBackup 619
Commands
The specification “s-d” in the above command specifies that files originally backed up from the S drive are to be compared with the files on the current D drive.
PASSFILE
Specifies the file name containing an encrypted password. This password is used to decrypt the data set so that it can be compared against the original data on disk. The data set must have been created with the exact same password that is specified here.
Commands
PASSWORD Specifies the password to use for decrypting the data set.
If PASSWORD is the last option specified on the command line and there is no password specified after the keyword, TBackup will prompt the operator for the password. The data set must have been created with the exact same password that is specified here.
620 TBackup
PRTnn
This option is a synonym to the LIST PRTnn option.
SETNAME
This option operates the same as the SETNAME option on page 617.
WAIT
Indicates that, after the backup data set is compared and the status message is displayed, TBackup should wait for an operator response before clearing the status message and exiting.
Restore Options
ACCOUNT
Restores files matching the file-spec that were backed up from the current account. Compare with the VOLUME option. >logon data >tbackup tape (restore account
ASK
This option operates the same as the ASK option on page 614.
DISKMAP
This option operates the same as the DISKMAP option on page 619.
EJECT
This option operates the same as the EJECT option on page 615.
ERROR
This option operates the same as the ERROR option on page 615.
FROM
Tells TBackup to only select those files on the backup data set that were owned by account name account at the time the backup was created. The originating account name is specified immediately after the FROM keyword. >logon develop >tbackup tape (restore from project4
The above command restores all of the files that were backed up from the account “PROJECT4” into the current account “DEVELOP.” LIST
This option operates the same as the LIST option on page 619.
NEWFILE
Specifies that TBackup will only attempt to restore a file if it does not already exist on the destination drive. This option is mutually exclusive with the OLDFILE option (you may use one or the other, but not both).
NOASK
This option operates the same as the NOASK option on page 616.
NOEJECT
This option operates the same as the NOEJECT option on page 616.
NOQUERY A default option that tells TBackup to not ask for confirmation
on each new or existing file being restored. TBackup 621
Commands
In the above example, only files that were originally backed up from the DATA account are restored.
To disable this option use the QUERY option. NOSYSFILES The standard, system-supplied files are omitted when files are restored. See “NOSYSFILES” on page 503 for a listing of
Commands
the files skipped with this option. NOWAIT
Disables the WAIT option and allows TBackup to terminate without waiting for the operator to acknowledge the status message upon completion of the backup operation.
OLDER
Qualifying files are restored only if the backed-up file is older than the same file on the destination. In other words, files are restored only if they have been changed since the backup was made.
OLDFILE
Specifies that TBackup will only attempt to restore a file if it does exist on the destination drive. This option implies the REPLACE option and is mutually exclusive with the NEWFILE option (you may use one or the other, but not both).
PASSFILE
Specifies the file name containing an encrypted password. This password is used to decrypt the data set before restoring it to disk. The data set must have been created with the exact same password that is specified here.
PASSWORD Specifies the password to use for decrypting the data set.
If PASSWORD is the last option specified on the command line and there is no password specified after the keyword, TBackup will prompt the operator for the password. The data set must have been created with the exact same password that is specified here. PRTnn
622 TBackup
This option is a synonym to the LIST PRTnn option.
Tells TBackup that the operator is to be “queried” or asked if each file matching the selection criteria is to be restored.
REPLACE
This option tells TBackup that it is okay to attempt to restore a file even if it already exists on the destination drive. When this option is not used (and the NOQUERY option is not used), an attempt to restore an existing file causes you to be queried.
SETNAME
This option operates the same as the SETNAME option on page 617.
VOLUME
Specifies that all of the files on the data set may be restored if they match the file-spec and other options specified do not restrict them. Compare with the ACCOUNT option.
WAIT
Indicates that, after the backup data set is restored and the status message is displayed, TBackup should wait for an operator response before clearing the status message and exiting.
date1
The first token that looks like a date is interpreted as a selection date. Only files in the backup data set with a date stamp greater than or equal to this date (new files) are candidates for restoring. For instance:
Commands
QUERY
>tbackup tape a (restore 10/1/01
With this command only those files in the backup data set with a file change data of October 1, 2001 or later are restored to the A drive. date2
A second token that looks like a date is interpreted as a selection date. Only files in the backup data set with a date stamp less than or equal to this date (old files) are candidates for the restore operation. >tbackup tape a (restore 1/1/86 9/30/01
TBackup 623
Commands
This command restores only those files from the data set with a file change date less than or equal to September 30, 2001, are restored to the A drive. The date 1/1/86 is the earliest date maintained by the THEOS file system and is interpreted as “from the earliest date.”
624 TBackup
Verify Options
This option operates the same as the ASK option on page 614.
EJECT
This option operates the same as the EJECT option on page 615.
ERROR
This option operates the same as the ERROR option on page 615.
LIST
This option operates the same as the LIST option on page 619.
NOASK
This option operates the same as the NOASK option on page 616.
NOEJECT
This option operates the same as the NOEJECT option on page 616.
NOWAIT
Disables the WAIT option and allows TBackup to terminate without waiting for the operator to acknowledge the status message upon completion of the backup operation.
PASSFILE
Specifies the file name containing an encrypted password. This password is used to decrypt the data set so that it can be compared against the original data on disk. The data set must have been created with the exact same password that is specified here.
PASSWORD Specifies the password to use for decrypting the data set.
If PASSWORD is the last option specified on the command line and there is no password specified after the keyword, TBackup will prompt the operator for the password. The data set must have been created with the exact same password that is specified here. PRTnn
This option is a synonym to the LIST PRTnn option.
SETNAME
This option operates the same as the SETNAME option on page 617.
WAIT
Indicates that, after the backup data set is verified and the status message is displayed, TBackup should wait for an operator response before clearing the status message and exiting.
TBackup 625
Commands
ASK
Defaults
Mode 1 (BACKUP) defaults are: ASK, FULL, NOEJECT. ACCOUNT is a default when file-spec specifies a drive code only. NOASK is the default and cannot
be overridden when backup is a file name specification. Mode 2 (COMPARE) defaults are: ASK and NOEJECT.
Commands
Mode 3 (RESTORE) defaults are: ASK, NOEJECT, NOQUERY, VOLUME. Mode 4 (VERIFY) defaults are: ASK and NOEJECT.
Notes
Because of the compression algorithm used, some files may be larger than the original source file. For instance, a backup of a zipped file or a file that has already been compressed with the Compress command will be larger than the original file. The compression percentage displayed refers to the difference in size between the original files and the resulting data set, including the data set catalog information and other data set overhead. When the original size is small, this compression percentage may be greater than 100%.
Backup Data Set
The output of the TBackup command is a backup data set. This is a special stream file that contains the compressed forms of the files along with a catalog of the files on the data set. This data set can be manipulated like any other file, and it can even be opened and read like any other file. However, since it is a compressed form of the original files and it contains the directory entries for the files, it is not usable except by programs that know how to interpret this information. TBackup is the only supplied program that knows how to interpret the information and copy it back to its original, usable form. A backup data set is a single file normally named TBACKUP.VOL00001. This single file contains all of the files included in this backup. Frequently a file or set of files being backed up from hard disk to floppy or tape will be larger than a single diskette or tape. In that situation the TBackup command will ask you to mount another diskette or tape so that it can continue the backup of the file or files. In this situation each of the diskettes or tapes used will contain a single file named TBACKUP.VOLnnnnn. Unless the DIFFERENTIAL option is used, the modified bit for each backedup file is reset by the TBackup process.
626 TBackup
TBackup Screens
TBackup, invoked with Mode 1 (BACKUP) displays the following status
screen while it is collecting information about the files:
Commands
The file counts do not include libraries or directories, only files. After TBackup has collected all of the file names that it is going to copy, it is ready to start the first volume of the data set:
After mounting the tape it is read and you are asked to confirm that it is the proper tape to use:
TBackup 627
TBackup, invoked with Mode 2 (COMPARE), Mode 3 (RESTORE) or Mode 4 (VERIFY), displays screens similar to the following status screen while it is
Commands
collecting information and comparing, verifying or restoring files:
The ECC counts refer to the number of errors detected using the error-correcting checksum fields in the data set. Full Volume Backups
A full volume backup of a drive can be made easily with the TBackup command by using the VOLUME option and using a file-spec that specifies a drive-code only. >tbackup s tape (backup volume
Full volume backups should be created on a frequent and periodic basis to assure yourself of having adequate protection in the case of disk or computer failure. Since a full volume backup contains a copy of every file, subdirectory and account on a disk, it is the only backup volume that needs to be accessed if you must restore a system. Multivolume Backups
You can backup your entire system in one operation by performing a full volume backup for all drives on the system. For instance, a system with four hard drives can be archived with the command: >tbackup s a b c tape (backup volume
An even more convenient method is to allow TBackup to backup all of the drives defined in the default search sequence. For instance: >show search SEARCH = SAB >tbackup tape (backup volume
628 TBackup
When the file-spec is omitted, TBackup uses the default search sequence as the file-spec specification. The above command is identical to: >tbackup s a b tape (backup volume
Should the need every arise where you want to restore the files on this backup volume, use the restore mode of the TBackup command (Mode 3 ).
When file-spec is omitted with the restore mode, TBackup restores all of the files in the backup volume to their original locations. Differential Backups
A differential backup is a backup that includes only those files that have changed since the last full-volume backup. For instance, if a disk contains three files: PROGRAM.COMMAND DATA1.FILE DATA2.FILE
A full-volume backup will create a backup data set that contains all of these files. If DATA1.FILE is changed and a differential backup is performed, it will create a backup data set that contains only that file. The other files are not included in this differential backup because they have not changed and there is a current copy of those files in the last full-volume backup. If DATA2.FILE is then changed and another differential backup is performed, it will create a backup dadta set that contains both the DATA1.FILE and the DATA2.FILE because both of those files have been changed since the last fullvolume backup was performed. Full-volume
Differential 1
Differential 2
DATA1.FILE
DATA1.FILE
PROGRAM.COMMAND DATA1.FILE DATA2.FILE
DATA2.FILE
Should a disk failure occur, the system could be restored by first restoring the full-volume backup and then the last differential backup.
TBackup 629
Commands
>tbackup tape (restore
Commands
Incremental Backups
An incremental backup is a backup that includes only those files that have changed since the last full-volume or incremental backup was created. For instance, in the example used for the differential backup, a full-volume backup is performed and then DATA1.FILE is changed. When the incremental backup is performed, it creates a backup data set that contains only the DATA1.FILE. When DATA2.FILE is changed and another incremental backup is performed, it creates a backup data set that contains only the DATA2.FILE. The DATA1.FILE is not included in this backup because it has not changed since the last incremental backup was created. Full-volume
Incremental 1
Incremental 2
PROGRAM.COMMAND DATA1.FILE DATA2.FILE
DATA1.FILE DATA2.FILE
Should a disk failure occur, the system could be restored by first restoring the full-volume backup followed by the first incremental backup and then the second incremental backup. Cautions
The MULTIUSER option tells the TBackup command to not check whether or not other users are logged on or are active. It does not prevent those other users from performing operations that change the database being backed up. If another user does change the database during the backup operation, the integrity of the backup data set is compromised. For instance, a disk volume being backed up includes a customer master file with current balance fields and an invoice database. While the backup data set is being created, another user posts a transaction to the invoice database before it is included in the backup but after the customer master file is copied. If the backup data set is ever restored (Mode 3) or compared (Mode 2), the invoice database will not match the current balance fields in the customer master file.
Automated Backups
To use the TBackup command for automated backups, be sure that you have mounted the proper backup volume before the backup is initiated and use the following options: COMPARE, to validate that the backup was accurate. ERROR, to output the error messages to a file that can be checked after the backup is complete. NOASK, to prevent the interruption of the backup process. SETNAME, to put an identifying label in the backup data set.
Use the ACCOUNT, DIFFERENTIAL, FULL, INCREMENTAL, SUBDIR and VOLUME as appropriate.
630 TBackup
Restrictions
When creating a backup data set (Mode 1), the destination media must be preformatted. If the backup requires more disks or tapes than anticipated, you can use another session or terminal to format the disk or tape while TBackup waits for you to confirm that the proper volume is mounted. To do this, the ASK option must be in effect and the destination drive must be publicly attached.
The TBackup command requires a privilege level of four. To use the VOLUME option of the Mode 1 (BACKUP) requires a privilege level of five. See also
TArchive, Backup, Compress, CopyFile, Eject, Expand, Restore
TBackup 631
Commands
When creating a backup (Mode 1) with option VOLUME in effect and the drives specified in file-spec are publicly attached, all other users must be logged off or the MULTIUSER option must be specified. See “Caution” notes above regarding the MULTIUSER option.
Commands
632 TBackup
TBrowse Command The TBrowse command displays and allows you to browse the contents of HTML-encoded files.
TBROWSE url
2
TBROWSE file
url
»
Uniform Resource Locator (URL) for HTML-encoded file
file
»
file name with optional path; may contain wild cards
Operation
Mode 1—Open the HTML page defined by url and display the hypertext content. >tbrowse www.theos-software.com >tbrowse www.mydomain.com/private/page44.htm
Mode 2—Open the local file and display the hypertext content. >tbrowse /html_home/webpages/default.htm
HTM Files
1. It does support most HTML tags including: !DOCTYPE HTML HEAD TITLE BODY (with BGCOLOR LINK VLINK and TEXT attributes) H1 - H6 P, BR and HR FONT but only the COLOR attribute is used B, I, EM and STRONG OL, UL and LI BLOCKQUOTE PRE and CODE TABLE with BORDER, COLSPAN and WIDTH attributes TH, TR and TD DL, DT and DD CENTER A HREF
Comments 2. If your formatted document uses tables or the PRE tag, then the width of the page may be larger than the width of the viewing winTBrowse 633
Commands
1
dow. In this case, a horizontal scroll bar will appear at the bottom of the window. Use your mouse to scroll left and right. Restrictions
1. The file or URL being viewed must fit in memory. 2. There is no JavaScript support. You should remember to hide SCRIPT information with HTML comments.
Commands
3. There is no FORM support (this means that you cannot use INPUT, SUBMIT, TEXTAREA, METHOD, MODE, SELECT, etc.) 4. There is no Cascading Style Sheet support. This means that you should include the HTML comments to hide the STYLE information. 5. There is no authorization support. This means that you cannot access documents that require a logon and password. 6. It does not recognize return status code 302 -- "Document has been moved/renamed". This is frequently used to deliver the correct URL back to the browser when the URL you requested is a directory name. For example, if you code an anchor href as "http:// www.theos-software.com", the THEOS server would return a 302 URL as "http://www.theos-software.com/default.htm". 7. Frames are not supported and will cause a trap. 8. Since it is text only, graphic images cannot be displayed. You should code ALT with images that are also hyperlink anchors. 9. The only way to execute your CGI applications is to code them in SSI or in a hyperlink (A HREF). For example: Click to show report See also
634 TBrowse
Help, Viewer
Tee Command Filter The Tee command copies standard input to standard output and makes additional copies to a file.
file... ( option
file
»
file name with optional path
option
»
APPEND
Operation
Commands
TEE
The file from the standard input device is copied to both the standard output device and to file. If multiple files are specified, then multiple copies are made, one to each file. >filelist s | tee file.list:s | more
The above command line creates a directory listing of the S drive. The listing is piped to the Tee command, which makes a copy of it in the file FILE.LIST:S and also pipes it to the More command, which displays the directory listing on the console. stdin
tee
stdout
file Options
APPEND
Notes
The file specified with this command may have a complete path specification, including the account name. However, when file is on another account, it is created using default attributes which include shared read and shared write protection. Therefore, the file is created but data cannot be written to it from non-owning accounts. Use the CREATE environment variable to set default attributes allowing shared file write access. See “CREATE” on page 102.
See also
CopyFile
The output is appended to the end of file. Without this option, the output replaces file.
Tee
635
636 Tee
Commands
Telnet Client The Telnet command establishes a client/server connection between this THEOS system and a remote Telnet server system. The remote system need not be THEOS-based.
TELNET
server ( options
2
TELNET
server port ( options
Commands
1
localhost
»
LOCALHOST
server
»
network server name or id (may also be localhost)
port
»
numeric port number to use for this session
options
»
ANSI CLASSnnn CTL
Operation
ECHO FLOW NOPROXY
PCTERM PCTERM-aa PROXY
TRACE VT100 VT220
Mode 1—Invokes the Telnet client and connects to server using its standard Telnet port number (23). Refer to “Server Specification” on page 642 for information about the server parameter specification. Mode 2—Invokes the Telnet client and connects to server using its port number port. Do not use this mode unless you know that the remote server uses a nonstandard port for Telnet access. The port value may be specified with a numeric, such as 23, or a name. The name must be the name of a well-known service, such as FTP, HTTP, etc. Service names are defined in the file /THEOS/CONFIG/SERVICES.TXT:S.
Options
ANSI
Requests ANSI terminal emulation by the Telnet server.
CLASSnn
Emulate a PcTerm with the requested class file. The class code number is in the range 180–189 or 210–219. The 180 series does not support intense background colors; the 210 series does support intense background colors.
CTL
Sets control mode for display of control characters received from the server. Control mode causes all control characters received to be displayed visually. For instance, receipt of a CR is displayed as ^M.
ECHO
Displays characters typed on your keyboard. This is the default when Mode 2 is used with a port value other than 23.
Telnet
637
This option tells the Telnet client to echo all outbound characters. This character-echo might be in addition to the remote server or the application running on the server. If characters are displayed twice, then terminate this session and reconnect without the ECHO option.
Commands
FLOW
Displays the commands interchanged between this Telnet client and the Telnet server. When used in conjunction with the TRACE option, the command interchange is also written to the TELNET.TRACE file. The flow-control commands may be useful for diagnostic purposes when there is some type of problem negotiating a proper connection with the remote server. These flow-control commands will generally only occur during the start-up phase of the connection: >telnet some.host (flow Connecting to 192.168.100.4 port 23 ..recv: DO TermType send: WILL TermType recv: SB TermType SEND send: SB TermType IS VT220 recv: SB TermType SEND send: SB TermType IS VT220 recv: WILL Echo send: DO Echo recv: DO Window-Size send: WILL Window-Size send: SB NAWS 80 24
session text begins here... For a description of the meanings of any flow-control commands displayed, refer to RFC 854. NOPROXY
638 Telnet
If the Telnet configuration file (/THEOS/CONFIG/TELNET.CFG:S) specifies a default proxy server, this option ignores that specification and connects to the requested Telnet server address directly.
PCTERM PCTERM-aa Emulate PcTerm terminal display and specified language
keyboard. When -aa is not specified, the current default keyboard definition is used. -aa -UK
English (United Kingdom)
-FR
French
-GR
Greek
-IT
Italian
-SP
Spanish
-SG
Spanish, Catalan
-LA
Spanish, Latin American
-CF
Canadian/French
-BE
Belgium/Dutch
Indicates that, whether or not a proxy server is specified in the Telnet configuration file, the proxy server specified here is used as the proxy server for this Telnet session. The requested proxy server name or IP address is specified immediately following the PROXY option keyword: >telnet myip.com (proxy 128.24.100.0
A default proxy server can be specified in the Telnet configuration file (/THEOS/CONFIG/TELNET.CFG:S) which is maintained by the Setup Telnet Client screen. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.) When specified there you do not need to use this PROXY option...the proxy is always used unless the NOPROXY option is specified. TRACE
All characters displayed by the Telnet client are also copied to the file TELNET.TRACE. If FLOW is also specified, those characters are also copied to this file. The TELNET.TRACE file is written to the system disk, root directory, of the current account. This file will replace any file with the same name. All characters copied to the trace file are copied in CTL mode, even when the display uses interpreted control codes.
VT100
Requests VT-100 terminal emulation by the remote server. (Class code 100 on THEOS Telnet Server.) Telnet
639
Commands
PROXY
Language
VT220
Notes
Requests VT-220 terminal emulation by the remote server. (Class code 220 on THEOS Telnet Server.)
Telnet is one of three clients used to connect as a user to another computer
system on the network. THEOS WorkStation Client - Used from a Windows system to estab-
Commands
lish a user terminal session on a THEOS Login Server system. NetTerm - Used from one THEOS system to establish a user termi-
nal session on another THEOS system’s Login Server. Telnet - Used from a THEOS system to establish a user terminal session on another system’s Telnet Server. The other system may be a THEOS system (a Telnet Server is included as part of the Login Server) or any other system with a Telnet server, such as provided by most Internet Service Providers (ISP). The other system may be on the local intranet or on the Internet. RFC 854. This Telnet client conforms to the standards proposed in RFC 854. That document can be found at many sites on the Internet, including: http://www.faqs.org/rfcs/
When connected to the remote server, you may execute any programs on that server that you have access to. The THEOS Telnet server supports additional terminal emulations not used by this Telnet client. When connecting to a THEOS server from another operating system’s Telnet client, you may be able to use: ANSIC, ANSICOLOR, SCOANSI, SCO-ANSI, VT320, DEC-VT220, VT220AM, DEC-VT100, WYSE-50, WYSE50, WYSE-60, WYSE60, PCTERM, PCTERM-US, PCTERM-UK and PCTERM-SP. Whether or not any of these are actually used will depend upon the Telnet client. Connecting to a THEOS Telnet Server Telnet can connect to a THEOS Login Server only if the THEOS system has
its Login Server started. When connected to a THEOS Telnet Server, you are emulating a “dumb terminal” connected to the THEOS system. You will not be able to use your local printer as a slave printer and you cannot transfer files back and forth with the Net command. Localhost: For testing purposes, you can connect to your own system’s Telnet server by using the server name of localhost. This is a reserved host name that always refers to the client system.
640 Telnet
Console Attachment: When you first connect to the THEOS Telnet Server your console attachment will have a line and page size that is equal to your local system’s line and page size. After you logon you may change the console attachment to another size supported by your local system. If you change your console screen size during the Telnet session, when you terminate the session your console will be reset to its original width and depth.
Non-VT220 emulations can use the (Break) key itself to transmit a break signal. Terminating Session: Executing the LOGOFF command on the THEOS Telnet Server will log off of the account but it will not terminate the Telnet session. Use the EXIT command to logoff and disconnect from the server. Terminating Telnet Sessions A Telnet session is terminated and the Telnet program is exited when you either fail to make a connection to the Telnet Server or, after making the connection, you use the server’s “log off” command. The name of this command is dependent upon the server but will generally be LOGOUT, BYE, QUIT or something similar. Of course, when the server is a THEOS Telnet Server, use the EXIT command. During the Telnet session, characters are transmitted immediately.
Telnet
641
Commands
Break Signal: When using VT220 emulation, to transmit a break signal to the THEOS Telnet Server, use the (`) key (single back quote). For instance, to tell the THEOS Telnet Server to abort the program that it is running, press (`),(Q). To type a back quote that is not interpreted as a break signal, press (`),(`).
Server Specification The specification of the server, for Mode 1 or Mode 2, may be accomplished by specifying: The dotted IP address for the server. Commands
>telnet 207.21.75.100
The host name as defined in the file /THEOS/CONFIG/HOSTS.TXT:S. This file can be maintained by you with Setup Net Name Services. >telnet my-company
Or the domain name as defined by the DNS servers specified in Setup Net Name Services. >telnet myisp.com
For instance, your company might be registered with Internic (http:// www.internic.net/index.html) with a domain name of my-company.com, with an IP address of 128.100.2.1. If you have specified a host name of “HEADQUARTERS” in the host names database with that IP address, you can specify your company’s Telnet site with any of the following server specifications: 128.100.2.1 headquarters my-company.com Domain names and host names are case-insensitive. Restrictions
When the remote server is THEOS-based, and the “Allow/Deny” capability is enabled, your IP address must pass those tests. Other servers may have similar access restrictions implemented. Also, when the remote server is a THEOS Login Server, it may have enabled its “Remote User Security,” in which case you will be required to enter your network user name and password as defined in the server’s Setup Net Network User Security database. (See THEOS Corona Version 5 Operating System Installation and Setup Guide.)
See also
642 Telnet
Net, NetTerm, Setup , THEOS WorkStation Client
Example
This first example shows a successful connection to an ISP. >telnet ispname.com Telnet Open >ISPNAME.COM Connecting... Possible introductory information messages from the remote Telnet server
Commands
login: cpw Password: Other information messages from the remote Telnet server, such as: For a menu driven interface type TERM was vt100 Setting default terminal size to pacifier:~% dir -l total 4 drwx------ 2 cpw user 512 Aug drwxr-xr-x 2 cpw user 512 Aug pacifier:~%exit logout
menu from the prompt 80x24.
13 12:11 mail 22 08:07 public_htm
In this second example, an attempt is made to connect to the THEOS Internet site. The server name “theos” is defined in the local host-names database so the server name is translated to the IP address defined there. However, this site does not support Telnet connections and the connection request is refused. >telnet theos Telnet Open >207.21.75.100 Connecting... 425 Unable to connect with remote host
Telnet
643
In this final example, a connection is made to the home office system over the Internet. The name is defined in your host names database. This system is THEOS-based and has remote security enabled. (The screen is cleared before the Network login window is displayed and after you have successfully entered your user name and password.) >telnet home-office
Commands
Telnet Open >128.100.2.0 Connecting...
User name: [myname
]
Password:
]
[********
HOMEOFFICE>show who ACCOUNT = REMOTE USERNUM = 25 PORT = 36 PRIVLEV = 3 LOGON = 11:10:20 11/14/97 HOMEOFFICE>
644 Telnet
Terminal Command EXEC The Terminal command is an EXEC language program that provides convenient, commandline access to the THEO_COM command’s terminal emulation capability.
options
Operation
Commands
TERMINAL
( options »
ALF ANSI ASCII COMnn CTL DIAL number EOF= EOT FILES
HALF HANGUP MASTER NOEOT NOLOGO PCTERM RECEIVE file REDIAL SCRIPT file
SEND file THEOS TRACE TRACEFILE file TVI TYPE VT100 VT220 VT220-8
WYSE50 WYSE60 XMODEM XMODEM-CRC XMODEM-1K YMODEM
This EXEC program merely invokes the THEO_COM command described described on page 649. It is provided for users upgrading to THEOS Corona from a prior version of THEOS that might have not included THEO+COM™. For operation and usage of this TERMINAL EXEC, refer to the THEO_COM command or to the THEO+COM Installation and User’s Guide.
Terminal
645
Commands
646 Terminal
TFTP Command The TFTP command is a Trivial File Transfer Protocol client that provides file transfer capabilities over a network between this client and any TFTP server available on the network.
TFTP RECEIVE host
2
TFTP SEND
filename
host filename
remote-filename
Commands
1
remote-filename
host
»
server server:port
filename
»
name of file on local client system containing FTP script
remote-filename
»
name of file on local client system containing FTP script
server
»
name or id of TFTP network server (may also be localhost)
port
»
port number on server for TFTP communication (default is 69)
Operation
Mode 1—Receive a file from a TFTP server. This client connects to the TFTP server located at host and receives the file named remote-filename from that server and saves it on this system with the name filename. If remote-filename is not specified then filename is used for requesting the remote file from the host. Mode 2—Send a file to a TFTP server. This client connects to the TFTP server located at host and sends the file named filename from this system to the remote host. The server is requested to receive the file and save it with the name remote-filename. If remote-filename is not specified then filename is used by the server when it saves the file.
Notes
TFTP is a simple protocol to transfer files using the Internet User Datagram protocol (UDP). Data is sent in fixed-length blocks of 512 bytes. Each data packet must be acknowledged by the recipient before the next packet is sent. Most errors will cause termination of the transfer.
Defaults
The default port number used by this client is 69. This is a “well-known” port for TFTP clients and servers. You should only specify a different port if you know that the server that you are attempting to connect to uses a different port number.
Restrictions
Only sequential files may be sent or received with this client.
See also
FTP, NetTerm, Receive, Send
Examples
>tftp send laptop my.file "recipient-filename.txt" >tftp receive 201.228.56.13:70 newtext.fil remote.name
TFTP 647
Commands
648 TFTP
THEO+COM Command THEO+COM is a communications program that allows your computer to communicate with another computer by sending and receiving files and emulating a terminal to provide access to the other system as a console.
( options
options
»
ALF ANSI ASCII COMnn CTL DIAL number EOF= EOT FILES
HALF HANGUP MASTER NOEOT NOLOGO PCTERM RECEIVE file REDIAL SCRIPT file
SEND file THEOS TRACE TRACEFILE file TVI TYPE VT100 VT220 VT220-8
WYSE50 WYSE60 XMODEM XMODEM-CRC XMODEM-1K YMODEM
Command synonyms: COM, TERMINAL Operation
Invokes THEO+COM in terminal emulation mode. The remote system must be connected to the first communications port on your system. Use command-line options or the built-in menu to perform any of the functions supported by THEO+COM or to change the configuration. The built-in menu is invoked by pressing (Break),(M). Refer to the THEO+COM Installation and User’s Guide for a complete description of the operation and usage of this command.
Options
ALF
Tells THEO+COM to add a line-feed at the end of every line transmitted. When this option is omitted, CR is used as the default End-of-Line character.
ANSI
Emulates an ANSI compatible terminal.
ASCII
Uses the ASCII protocol to send and receive files from the remote computer system.
C7
Synonym to the TVI option.
C55
Synonym to the WYSE50 option.
C58
Synonym to the WYSE60 option.
THEO+COM 649
Commands
THEO+COM
C90-C99
Synonym to the PCTERM option.
C180-C189 Synonym to the PCTERM option. C100
Synonym to the VT100 option.
Commands
C210-C219 Synonym to the PCTERM option. C220
Synonym to the VT220 option.
COMnn
The currently attached COMnn is used for the communications port. When this option is not specified, the first attached COM device is used. Refer to the Attach and the Sysgen for information about attaching COM devices.
CTL
Sets control mode on. With control mode on every control character received in terminal emulation mode is displayed as two characters. For instance, Control-I is displayed as ^I.
DIAL number Using the modem connected to the communications port,
dials number and waits for a connection. After the connection is established, THEO+COM is exited, leaving the telephone connection open. DIAL must be the last option specified because characters following the word DIAL are treated as part of the number to dial.
Refer to “Dial” on page 163 for information about number. EOF=
Sets the character used to mark the end of a file transmitted with the ASCII protocol.
EOT
Used with the SEND file option to indicate that the end-oftransmission character is sent after all of the files are transmitted. This is a default option.
FILES
Can be used with the THEOS protocol and the SEND file option. It indicates that the file contains a list of files to be sent. This file is typically created by the FileList with its option FILES.
HALF
Uses half-duplex communications. Half-duplex is also called “Echoplex” because it causes every character transmitted to the remote system to be automatically echoed on your system. When this option is omitted, full-duplex communications is uses.
HANGUP
Using the modem connected to the communications port, issue the hang-up command.
650 THEO+COM
Use master-mode duplex communications in terminal emulation. Each character typed is displayed on your screen. Each character received from the remote system is echoed back to that system.
NOEOT
Can be used with the THEOS protocol and the SEND file option. It indicates that no end-of-transmission character is sent after the last file is transmitted.
NOLOGO
Suppress the THEO+COM logo and copyright screen.
NOTYPE
Suppress the display of dialing messages and responses.
PCTERM
Emulate a PC Term or scan-code type keyboard and monitor. C90-C99 and C180-C189 may be used as synonyms to this option. C90-C99 selects a monochrome PC Term terminal emulation; C180-C189 selects a color PC Term terminal emulation.
RECEIVE file Receive file from the communications port. The transmis-
sion protocol is specified with other options or it uses the default THEOS protocol. REDIAL
Using the modem connected to the communications port, the last number dialed is redialed. After a connection is established, THEO+COM exits.
SCRIPT file Execute the Modem Script Language file file. Refer to the
THEO+COM Installation and User’s Guide for a description of the Modem Script Language. SEND file
Send file on the communications port. The transmission protocol is specified with other options or it uses the default THEOS protocol. file may contain wild cards.
THEOS
Use the THEOS protocol to send and receive files from the remote computer system.
TRACE
Enables file transfer tracing. A window is opened in the upper right corner of the display, showing the protocol activity during a transfer.
TRACEFILE file Similar to the TRACE option, except the protocol activity
is output to file. TVI
Emulate a TeleVideo model 910 or model 925+ compatible terminal. C7 may be used as a synonym to this option.
TYPE
Display dialing and redialing messages and responses. This is a default option. THEO+COM 651
Commands
MASTER
Commands
VT100
Emulate a DEC VT100 compatible terminal. C100 may be used as a synonym to this option.
VT220
Emulate a DEC VT220 compatible terminal in 7-bit mode. C220 may be used as a synonym to this option.
VT220-8
Emulate a DEC VT220 compatible terminal in 8-bit mode.
WYSE50
Emulate a Wyse model 50 compatible terminal. C55 may be used as a synonym to this option.
WYSE60
Emulate a Wyse model 60 compatible terminal. C58 may be used as a synonym to this option.
XMODEM
Use the XMODEM checksum, 256-byte protocol to send and receive files from the remote computer system.
XMODEM-CRC Use the XMODEM CRC-16, 256-byte protocol to send and
receive files from the remote computer system. XMODEM-1K Use the XMODEM-1K CRC-16, 1024-byte protocol to send
and receive files from the remote computer system. YMODEM
Use the YMODEM, CRC-16, 1024-byte protocol to send and receive files from the remote computer system.
Notes
The command name COM is a synonym to the THEO+COM command. It is not a separate program but only an entry in the SYSTEM.THEOS32.SYNONYM file. If standard synonyms are disabled (see “Account” on page 13 and “STDSYN” on page 110), this synonym name may not be allowed.
Defaults
EOT, THEOS, TYPE
Restrictions
A communications port must be attached.
652 THEO+COM
TheoMail Client The TheoMail command is the principal component of THEO+Mail. It is a client application program that allows you to create and send e-mail messages to other people and to receive, read and manage messages sent to you. .
THEOMAIL ( option
2
THEOMAIL
mailbox ( option
mailbox
»
name of the mailbox to check
option
»
CHECK COMPACT NOPROXY SEND
Command synonym: Operation
Commands
1
EMAIL
Mode 1—Invokes the TheoMail client program using the default mailbox for the account that you are currently logged on to. For information about mailboxes and default mailboxes, refer to the THEO+Mail User’s Guide and Reference manual. Mode 2—Invokes the TheoMail client program using the specified mailbox.
Options
CHECK
This option invokes TheoMail in non-interactive mode. It starts TheoMail with the mailbox selected according to the command line entered but it ignores the settings for Send on Check and Check for New Mail frequency. Instead, it checks each of the POP3 servers specified in the configuration and retrieves any mail waiting on those servers. After receiving the mail and possibly filtering it, TheoMail exits.
COMPACT
This option invokes TheoMail in non-interactive mode and performs a compact or reorganization of the mailbox database. The database is not checked for integrity first. This option should be used if the database is corrupted and you cannot start TheoMail normally because of the corruption. By compacting and reorganizing the database you should be able to invoke TheoMail normally afterward.
NOPROXY
This option invokes TheoMail and tells it to not use any Proxy Server setting from the SETUP SMTP configuration, even if one is specified there. You should not use this option unless you TheoMail 653
have an alternate connection to your SMTP and POP3 servers available.
Commands
SEND
Notes
Similar to the CHECK option, this invokes TheoMail in noninteractive mode. However, instead of checking for new mail it sends any mail that has been queued and then exits.
If the mailbox has a password defined, you must enter the password for the mailbox before it can be opened. Unless the COMPACT option is used, when you start TheoMail the mailbox database is checked for integrity. If the database is large (tens or hundreds of megabytes), this may take some time. During this time the copyright message is displayed which lets you know that has started. If the database appears corrupt or has a lot of unused space in it, you are warned about the situation and, after acknowledging the warning, the database is rebuilt using the same function as the Tools Menu, Compact menu item. If this happens often it is an indication that something serious is wrong and you should contact your system administrator. After TheoMail checks the integrity of the database it checks the Sent and Deleted folders to see if there are any messages that should be removed. This is done during TheoMail exit and at startup time just in case TheoMail was exited abnormally the last time it was used. TheoMail first checks the Sent Expiration setting. If it is non-zero the messages in the Sent folder are examined to see if they qualify for deletion. Any messages in that folder that are older than the Sent Expiration value are moved to the Deleted folder.
Next, the Empty Deleted setting is checked. If it is enabled any messages in the Deleted folder are removed by erasing them. If the Empty Deleted item is not enabled, but the Deleted Expiration specifies a non-zero age, messages in the Deleted folder are removed if they are older than the number of days specified in that field. Unless the CHECK or SEND options are specified, if the Check for New Mail item in the Tools Menu, Options screen (see the THEO+Mail User’s Guide and Reference manual) specifies a time frequency for automatic mail checking, mail is checked as soon as TheoMail starts. • Invoking TheoMail with an EXEC When the TheoMail client is invoked from an EXEC program you may use the &Stack or &BegStack statements to initiate actions by the client program without operator input. When TheoMail is invoked with an EXEC it
654 TheoMail
may operate differently depending upon whether there is data on the EXEC stack and what that data is.
&Stack Q\ TheoMail mymail EmailChk mymail &If &RetCode > 0 EmailGet mymail &IfEnd
In the above example, the “Q” in the first line is a Control-Q. This can be entered with WindoWriter by using the Tools menu, Control Characters font. Enter the letter “Q” and then use Tools menu, Normal Font to return to normal text input. The above EXEC invokes TheoMail using the “mymail” mailbox and gets any incoming mail. It then used EmailChk to see if there is any new mail and, if so, uses the EmailGet to extract that mail to a standard text file. If there is data on the EXEC stack but the first character is not a ControlQ, TheoMail will not try to perform any automatic check for incoming mail but will instead accept those stacked characters as normal input. For instance: &BegStack [CNTheos Support Problem Report &End TheoMail mymail
In this example, the “[” character in the first line is a Control-[ or the Esc character. This EXEC invokes TheoMail and starts the composition of a new message to THEOS Technical Support. The cursor will be positioned to the body of the new message, ready for the operator to enter the text. Defaults
The default mailbox used when TheoMail is invoked without specifying a mailbox is determined by the current account name that you are logged on to. This relationship between account names and default mailboxes is defined in Setup Email, which is described in THEOS Corona Version 5 Operating System Installation and Setup Guide.
Restrictions
Only one user may use a mailbox at any one time.
See also
EmailChk, EmailDel, EmailGet, EmailPut, SendMail
TheoMail 655
Commands
If the first character on the EXEC stack is a Control-Q character, TheoMail will perform its automatic check for incoming mail and then exit. This is identical to the CHECK command-line option. This feature is useful if all you want to do is to get any mail and not stay in the TheoMail environment. For instance:
Commands
656 TheoMail
TIM Command The TIM command invokes the THEOS Instant Messenger and allows you to communicate with other users that are in your contact list.
TIM
2
TIM
passport password
3
TIM
passport
passport
»
Passport E-mail account and domain
password
»
Password to the passport account
Operation
Commands
1
Invokes the THEOS Instant Messenger using either the default passport account (Mode 1) or the requested account. Mode 1—This mode starts in one of two ways, depending upon whether or not the TIM_PROTO and TIM_AUTOLOGIN environment variables are defined. If these variables are defined then TIM signs onto the default account. Otherwise, it displays the Sign-In Form allowing you to specify the protocol, account and options desired for this session. Mode 2—Invoke TIM and display the sign-in form with passport and password filled in: >tim "[email protected]" "paSsWoRd"
TIM 657
Click on “Ok” to sign in. Refer to User Interface for descriptions of the various fields. Mode 3—Similar to Mode 2 except the password is not typed in the command line and therefore is never displayed in clear text.
Commands
Notes
The TIM command uses a central configuration file to maintain the information about the passport account to use and the options desired for that account. You may have multiple accounts defined and there may be multiple instances of TIM in use on one system at any one time. During the normal operation of TIM, it may need to open several windows. Since the software does not know how you want your screen arranged, each of these windows is initially positioned in the center of your screen. You should drag the windows to other positions so that you can see each of the windows on your desktop. The position that you drag them to will be remembered by TIM during this session. When the TIM command is exited you are signed off of the passport account.
Defaults
There are two environment variables that can be used by TIM. If these variables are defined and have values then those values are used as the defaults. The variables are: TIM_AUTOLOGIN Specifies the default passport account name. Normally,
this name is a complete E-mail address such as [email protected]. TIM_PROTO Specifies the default protocol to be used by TIM. Set this variable to MSN, TIMP or YAHOO.
For ease of use, these variables can be defined in the Account profile Before defining these variables refer to “First-time Usage” on the next page. Restrictions
This program requires an internet connection. You must also have an account on one of the supported protocol servers.
See also
FileManager, FTP, Mailbox, Msg, Receive, Send, TFTP, TheoMail
658 TIM
First-time Usage
Before using THEOS Instant Messenger for the first time you must have a passport account. Specifically, in order to use the MSN version 7 protocol you must have a passport account with the .NET service provided by Microsoft. If you do not have a passport account or if you want to have an additional account, use your web browser and connect to http://www.passport.com and click on the “Sign up for your free .NET Passport today” link.
After you have acquired a passport account you can define the environment variables TIM_PROTO and TIM_AUTOLOGIN. >set tim_proto=MSN >set [email protected]
Once this has been done and you invoke TIM it asks you to supply the password. After that initial sign-in TIM will remember the password for that account and you can invoke TIM and it will sign into that account automatically.
TIM 659
Commands
When signing up for the new passport account you are asked for an E-mail address and a password. The password it is asking for is the password that you want to use for the passport account and it should not be the same as your E-mail account password. The E-mail address will be used as your account name and, although you are not normally sending or receiving Email with TIM, the address must be a valid address at the time that you sign up for the passport account. After signing up for the account the passport system will send an E-mail message to the account asking the owner of the account to confirm that they (you) wanted this passport account.
User Interface
When TIM is invoked without the environment variables TIM_PROTO and TIM_AUTOLOGIN defined or when this default account is bypassed, the TIM sign-in form is displayed allowing you to specify the protocol, account and password for that account.
Commands
Sign-In Form
Protocol
Select the protocol from the protocols supported by TIM: TIMP
This is the native TIM protocol which is used by the TIM server.
MSN V7 The Microsoft messenger protocol, version 7. Yahoo
The Yahoo instant messenger protocol.
The protocol selected tells TIM where to find the server for passport names and, at the server, it can find your list of contact names, etc.
660 TIM
Options
Select this button to set or change the options associated with this passport name. This option screen is described on page 661. You cannot change the options until there is a Passport and a Password defined.
Passport
Enter the passport account name. For the MSN V7 protocol, this is an E-mail account name and domain name. For instance, [email protected].
Password
Enter the password for the passport account. This is a casesensitive field and the password is not displayed as you type it. Be careful to enter it correctly.
The above form is normally only displayed when you are signing in to a passport name that you have not used before. However, you may display this screen (to get to the Options button) by signing on to a passport and then changing your Status to “Offline.” This will cause the above form to display and you can either sign on to another passport, create a new sign on or change the options of an existing passport. TIM Options The options form is used to configure the various options that can be specific to an account.
Password
This field is used when you need to change the password that you have saved for this account. Making a change in this field does not change the password that has been recorded at the instant messenging protocol server for your account. It only changes the profile that is saved and used by TIM.
TIM 661
Commands
When you select the Ok button or the Options button for an account that has not been saved before, you will be asked if you want to add it to the database. If you have entered the name and password correctly respond with a “Yes.” Otherwise, respond with a “No” and you can make the necessary changes.
Font
Selecting this button invokes the Fonts form described below.
Use EmotIcons When enabled you can send and receive emoticons during
chat conversations. Change to TIM session automatically This feature controls whether or not
Commands
the TIM session will “wake up” and make itself the active session when a message is received. Enable sound Enables the sounds capability of TIM. Show a message when someone logs in If enabled, when one of your regis-
tered contacts signs on a message will be displayed on the active session of this console. Download path The path specified in this field is used when you receive a
file. You can either type in the path that you want to use or use the Browse button to search for the desired location. Show away after xx minutes When your console is idle for a period of time, TIM will change your status to “Appear away.” The length of
that time is specified here. Fonts The font selection form is used to defined the font used to display the message text in the Message history and Message text boxes when chatting with a contact.
Font
This area lists the fonts that are available on this system and highlights the font that is currently defined as the display font. You can move this highlight bar to any of the available fonts. Changing the font is immediately reflected in the Sample area.
662 TIM
Style
The style list box shows the various font styles that are available with the Font that is currently selected and it highlights the style that is currently selected. Changing the style is immediately reflected in the Sample area. This list box shows the font sizes that are supported by TIM and highlights the size that is currently selected. The sizes range from 8 pts to 72 pts. A point is 1/72 of an inch and is a standard unit of measurement in typography.
Effects
Strikeout
Checking this box will display the text with a line through the characters: The quick brown fox jumped...
Underline
Checking this box underlines the text: The quick brown fox jumped...
Color
This list box shows the colors that are supported by TIM and shows the currently selected color.
Changing the effects is immediately reflected in the Sample area. Sample
This area displays a sample using the selected Font, Style, Size and Effects.
Downloads The Download path in the TIM Options form allows you to specify the location where all received files are to be saved. You may either type in the path or use the Browse button to search for an existing directory to use. The path specified here is used when you receive a file from a contact during a chat session (see “XFile” on page 668).
TIM 663
Commands
Size
Commands
The default location for downloads is /PROGRAMS/TIM/DOWNLOAD:S. Connection Options The connection options refers controls whether or not a proxy server is used to establish the connection between this system and the instant messaging server.
664 TIM
Use proxy
This field must be checked to enable the other fields on this form and to enable the usage of a proxy server.
Type
Use the drop-down list to select the type of proxy server.
Server
Enter the IP address of the proxy server that you are using.
Port
The default port number is set when the Type of proxy is selected. You may override that default and set the port to another value if you wish.
Username
This field is required when using a Type of SOCKS Version 5.
Password
This field is required when using a Type of SOCKS Version 5. Commands TIM 665
Using TIM
Commands
After you have signed on to your passport account TIM displays the contact list form:
Contact list The contact list is the large box in this form. It lists each of the
users that have been defined as your contacts and it shows each of the “nick names” or “screen names” that the contacts have defined, along with their current status. When any of these contacts change their status, you will see this list updated within seconds. Contacts are added to an account in one of two ways. You either add them using the Add button on this form or a remote user requests that you be added to their contact list and you agree. The actual list of contacts is maintained by and on the protocol server. Nick name
This is your “screen name” or nick name. It is the name that other users on your Contact list will see you as. For instance, in the above display, “Susan” is the nick name that she has chosen. Her actual account name might be [email protected]. In the above display, other users see the current user as “Chris @ home.”
666 TIM
Status
This field defines your status as others see you.
Sort by
You can refresh or change the order of the displayed contacts by selecting this field.
Chat
Selecting this button initiates a chat session with the currently highlighted contact in the Contact list. When the button is pressed the chat form is displayed (shown on page 668). Refer to “Chatting with a contact” on page 668 for additional information about instant messenger chats.
Add
This button allows you to add another contact to your list. Refer to “Adding New Contacts” on page 670 for additional information about adding people to your contact list.
Delete
Selecting this button deletes the currently highlighted contact from your Contact list.
Block
Use this button if you want to block messages from the currently highlighted contact in the Contact list.
TIM 667
Commands
The status field is only an indicator to others of what you want them to see. Except for “Offline,” all of the status labels are just comments. Changing your status from “Online” to “Away” or “Busy” does not prevent others from trying to imitate a ‘conversation’ with you.
Chatting with a contact
Commands
When you select the Chat button or when a user on your Contact list initiates a chat session with you, the following form is displayed allowing you to enter messages to be sent to the other user and allowing you to see the “conversion” as it progresses.
Message history
The top text box is an area that shows the message history. Every message from the contact to you and every message from you to the contact is displayed here. When the list of messages is longer than the display area a vertical scroll bar appears. You can you this scroll bar to look back in the conversation.
Message text
The bottom text box is the area that you use to type your message to the contact. When entering the text, do not press (Enter) until you are ready to send. Although the text might appear as a long line of characters, when it is sent and when it is displayed in the Message history field, it is formatted to fit the area available.
668 TIM
XFile
Selecting this button allows you to send a file to the contact that you are chatting with. Refer to “Sending and Receiving Files” on page 671 for information about sending and receiving files with contacts.
Font
Selecting this button invokes the Fonts form described on page 662.
EmotIcons
This button allows you to ask another member of your contact list to join in the chat conversation. When selected you are presented with a form that allows you to select the contact name that you want to invite into the conversation. Only the contacts that are currently signed on are offered.
Send
The “Send” button causes any and all of the text that you have typed in the Message text field to be sent to the contact. It is also reformatted and displayed in the Message history field.
Exit
This button exits the chat session and offers you a chance to save the text of the session in a file:
TIM 669
Commands
Invite
If you choose “Yes” you will be offered the standard file save dialog box and you can specify the location and name of the file to save this chat session text. Adding New Contacts
Commands
You can add a new contact to your contact list at any time. Merely select the Add button when the Contact List form has the focus.
Email address Enter the email address of the person that you want to add
to your contact list. Group
670 TIM
Select the group that you want this contact listed as.
Sending and Receiving Files During a chat conversation you can send a file from your system to the contact’s system by selecting the XFile button of the chat form. When this is done you are presented with a standard file selection form allowing you to select the file that you want to send to the other party. Commands
After the file is selected and the Open button is pressed, a request is sent to the contact that you are chatting with asking them to either accept the file transmission or to decline it. At the same time your chat form displays a message stating that you are waiting for the other party. When they accept, the file is sent to them and messages are displayed on both chat forms reporting the progress and status of the transfer.
TIM 671
Commands
A similar but reverse process occurs if the contact wants to send you a file. After they select the file that they want to send to you a message pops up asking if you want to accept the file.
672 TIM
Touch Command Sets the date and time-stamp on a file.
TOUCH file ( options
2
TOUCH date
file
3
TOUCH date
time
Commands
1
file
file
»
file name with optional path; may contain wild cards
options
»
DATE reffile NOTYPE TYPE
date
»
date in current DATEFORM format
time
»
time specification using colon delimiters
Operation
date time
Mode 1—The date and time-stamp on file is changed and the modified attribute is set. If no options are used, the date is set to the current date and time. >touch example.file File "EXAMPLE.FILE:S" touched: 10/22/01 10:22:54 One file changed.
Mode 2—The date-stamp for file is changed to date. The time is set to 08:00. >touch 01/02/03 example.file File "EXAMPLE.FILE:S" touched: 01/02/03 08:00:00 One file changed.
Mode 3—The time-stamp for file is changed to date and time. >touch 01/02/03 04:05:06 *.txt File "EXAMPLE.TXT:S" touched: 01/02/03 04:05:06 File "EXAMPLE1.TXT:S" touched: 01/02/03 04:05:06 File "EXAMPLE2.TXT:S" touched: 01/02/03 04:05:06 3 files changed.
Touch
673
Options
DATE reffile Set the date and time of file to the date and time of reffile. NOTYPE
Suppress the display of result messages and the summary line. >touch example.* (notype
Commands
TYPE
A default option that displays the results of each file changed and a summary line of the total number of files changed. >touch example.* File "EXAMPLE.BASIC:S" touched: 10/12/01 11:02:22 File "EXAMPLE.INDEXED:S" touched: 10/12/01 11:02:22 File "EXAMPLE.DIRECT:S" touched: 10/12/01 11:02:22 File "EXAMPLE.FILE:S" touched: 10/12/01 11:02:22 File "EXAMPLE.MAIL:S" touched: 10/12/01 11:02:22 File "EXAMPLE.DIRECT1:S" touched: 10/12/01 11:02:22 File "EXAMPLE.COMMAND:S" touched: 10/12/01 11:02:22 7 files changed.
date
Set the date of file to date. If time is not specified, the time is set to 08:00:00. >touch test.file (10/15/97 File "TEST.FILE:S" touched: 10/15/01 08:00:00 One file changed.
The earliest date that you can use in the THEOS file system is 01/01/86. time
Set the time of file to time. If date is not specified, date is set to the current date. >touch test.file (15:32 File "TEST.FILE:S" touched: 10/12/01 15:32:00 One file changed.
Notes
A file specification can omit the file-type if the environment variable FILETYPE is defined. For more information about the FILETYPE variable, see “Environment Variables” on page 111 of the THEOS Corona Version 5 Operating System Reference manual. The “modified” attribute for file is set with this command. The display of the Touch command (output when option TYPE is in effect), is output to stderr, not stdout. To redirect this output use the >& operator.
Defaults
The current date and time are used unless otherwise specified.
See also
Change, FileManager
674 Touch
TraceRT Client The TraceRT client reports the path and the time taken for a message to be sent to and received from a remote host. “TRACERT” stands for “TRACE ROUTE.”
TRACERT
server
2
TRACERT
server ( options
server
»
network server name or id (may also be localhost)
localhost
»
LOCALHOST
options
»
HOPS
Operation
NORESOLVE
Commands
1
RESOLVE
Mode 1—Traces the route between you and server, using default options of RESOLVE, and HOPS 30. >tracert www.theos-software.com Tracing route to WWW.THEOS-SOFTWARE.COM (65.45.113.228) over a maximum of 30 hops. 1 2 3 4 5 6 7 8 9 10 11 12 13
20 20 14 23 23 24 106 24 26 28 28 33 48
ms ms ms ms ms ms ms ms ms ms ms ms ms
10.88.74.1 bb1-ge2-1.potlnd1.or.home.net (65.4.47.1) c1-pos5-2.ptldor1.home.net (24.7.75.229) c1-pos1-0.snfcca1.home.net (24.7.64.22) c2-pos1-0.snjsca1.home.net (24.7.65.161) above-athome.sjc2.above.net (208.185.175.133) core4-core3-oc48.sjc2.above.net (208.184.102.198) pao1-sjc2-oc48-2.pao1.above.net (208.185.175.162) allegainace-abovenet.allegiancetelecom.com (216.200.249.90) POS3-0.SNFECAEJ15W.core.algx.net (66.2.95.101) SNFECAEJ05W.gw.SFO.algx.net (216.99.234.11) 65-45-94-218.customer.algx.net (65.45.94.218) WWW.THEOS-SOFTWARE.COM (65.45.113.228)
Trace complete.
Mode 2—Traces the route between you and server, using the specified options. >tracert 199.2.117.161 (noresolve hops 10 Tracing route to 199.2.117.161 over a maximum of 10 hops. 1 2 3 4 5 6 7 8 9 10
11 10 11 23 25 25 24 25 28 27
ms ms ms ms ms ms ms ms ms ms
10.88.74.1 65.4.47.1 24.7.79.17 24.7.64.22 24.7.65.157 129.250.9.85 129.250.3.121 129.250.3.162 129.250.3.34 129.250.3.18
Trace complete.
TraceRT 675
Options
HOPS count
Specifies the maximum number of segments or hops to report. If server is not reached within this number of hops, the trace is abandoned. The default number of HOPS is 30.
NORESOLVE Suppress the translation of IP addresses to domain names.
Commands
RESOLVE
Notes
Translate each IP address to its domain name. This is a default option.
TraceRT is used to determine how many routers are involved in a particular connection to a remote site. Often this will explain why access to some sites appears slow while others are quick to respond. Each router in the path requires additional time to transmit each packet of data. This is particularly noticeable when viewing web pages. Many HTML pages require hundreds of packets of data to be communicated back and forth before the page is completely displayed on the screen. TraceRT attempts to trace the route that an IP packet travels between you and server. It does this by sending a short packet to an unused port on server. The message is sent as many times as specified with the HOPS option, or a default value of 30. A field in the header of the packet is used to cause the packet to fail at each of the routers in the path of the message.
The time displayed by TraceRT for each of the hosts is the round trip time that it took for the message to get to that router and return to you. The times reported by TraceRT will be different, almost every time that it is run. The amount of traffic on the Internet is constantly changing, from millisecond to millisecond. Heavy traffic causes slow delivery because of message collisions and retransmissions over each of the various mediums between you and the destination. See also
676 TraceRT
Ping
Tree Command Displays the subdirectory tree.
TREE
( options
2
TREE
path ( options
path
»
starting directory name; may not include account name
options
»
NOSORT PRTnn SIZE SORT
Operation
Commands
1
Mode 1—Starting at the current working directory, the directory tree structure is displayed on the standard output device. >pwd /VERTICAL:S >tree /vertical doc programs files programs
Mode 2—Starting with path, the directory tree structure is displayed on the standard output device. >pwd /VERTICAL:S >tree /package /package doc programs
Tree
677
Options
NOSORT
Causes the directory tree to be displayed in the sequence it is found on disk. No sorting of the directory names is attempted.
Commands
>tree (nosort / data vertical doc programs files programs package doc programs misc programs doc
PRTnn
Indicates that Tree is to print the current directory tree structure on the attached printer number nn. The option keyword PRT may be specified as PRT, PRINT or PRINTER. As a convenience, PRINTER1 may be specified as P.
SIZE
Includes a count of the files in the subdirectory and the total disk space used by those files. >tree (size / ............................... data ......................... misc ......................... doc ....................... programs .................. package ...................... doc ....................... programs .................. vertical ..................... doc ....................... files .................. programs ............... programs ..................
678 Tree
(1186, 29012K) (219, 17205K) (27, 77K) (2, 16K) (23, 54K) (248, 3162K) (5, 4K) (240, 3150K) (648, 8401K) (33, 62K) (19, 27L) (11, 27K) (413, 4062K)
SORT
A default option that sorts the directory tree structure in alphabetical sequence.
Commands
>tree (size / data misc doc programs package doc programs vertical doc files programs programs
Notes
The line-graphics characters used to show the directory hierarchy are suppressed if the environment variable LINEGRAPH is set to “N.”
Defaults
SORT is a default option.
Restrictions
You may only access directories in the current account.
Tree
679
Commands
680 Tree
TWS Command The TWS command allows users of the THEOS WorkStation Client on a Microsoft Windows system to control the behavior of the client session window or control the Gutenberg slave printer to the TWS client.
1
TWS
function
2
TWS
Gutenberg-function
function
»
Operation
FULL MAXIMIZE MINIMIZE ONTOP RECEIVE RESTORE
SEND SHELL TITLE TOP
TWS
Gutenberg-function »
ACCOUNT ALLOW CHANGE DISCONNECT EXEC FOCUS
ALIGN FONT PRINT_WINDOW BARCODES HAS_FONTS REC_PAGE CHANGE_AREA IMAGE ROTATE CHECK_PRINTERLIST_FILE SELECT_AREA CLOSE MODE SETPOS COLOR NEW_FILE SIZE DEFAULT_UNITSPICTURE STYLE ERASE_FILE PRINT_NEXT_PAGE TEXT_FILE FIELD PRINT_RECORD FILE_RECORDSPRINT_TXT
Mode 1—Performs function on the THEOS WorkStation Client session window. >tws disconnect off >tws change off >tws ontop on
The above commands prevent the operator from disconnecting from the THEOS Login Server and from changing the focus or size of the window used by the THEOS WorkStation Client. Additionally, the window will remain displayed on top of all other windows, even if the Net or Remote command is used to execute another program.
TWS 681
Mode 2— Functions
These functions are used to control the TWS session and its display window:
Commands
ACCOUNT ALLOW
Synonym to the DISCONNECT option.
CHANGE
This option allows you to control whether or not the TWS session can lose the focus: CHANGE OFF
Disables the ability of the user to select another window, either manually with the mouse or keyboard or with the EXEC mode of the Net. This function also disables the ability to minimize the client session window with the mouse. The session may be minimized with the TWS MINIMIZE function.
CHANGE ON
Enables the ability to select another window on the client and to minimize and maximize the THEOS WorkStation Client window.
CLOSE
Closes an image that was displayed by the PICTURE function and removes it from the display.
DISCONNECT
This option either performs a disconnection operation or it controls whether or not the user is allowed to manually disconnect the TWS session from the THEOS server:
DISCONNECT OFF
Prevents the user from disconnecting this THEOS WorkStation Client session using the disconnect icon. The user may only disconnect under program control.
DISCONNECT ON
The user may disconnect this session by clicking on the disconnect icon.
EXEC
Execute a command on the Windows system. >TWS EXEC WINIPCFG
682 TWS
FOCUS
Causes the TWS program to become the active window on the client system. If the session window was minimized, it is restored to its prior size as it is activated.
FULL
The window used by the TWS session is set to full screen. Similar to MAXIMIZE except there is no frame, scroll bars, menu
bar, title, etc. The entire screen of the Windows system is used for the display of the THEOS server session. The window used by the TWS session is set to its largest size.
MINIMIZE
The window used by the TWS session is minimized to an icon and the prior window is selected as the focus.
ONTOP
This option controls whether or not the display of the TWS session is on top of all other windows displayed on the Windows’ console, or not: ONTOP OFF Disables the “on-top” feature for the THEOS
WorkStation Client session window. That is, when the window is not the active window, other windows may overlay it. ONTOP ON Enables the “on-top” feature for the THEOS Work-
Station Client session window. That is, when the client session window is not the active window, it still is the topmost window displayed on the screen and might overlay the window that has the focus. If the client session window is currently minimized, the on-top feature is not evident until the window is restored. That is, the minimized icon is not displayed on top of other windows. The option TOP may be used as a synonym to ONTOP. RECEIVE RESTORE
The TWS session window is restored to its size before being set to maximized, minimized or full-screen.
SEND SHELL
Synonym to the EXEC option.
TITLE “title” Change the title used in the THEOS WorkStation Client ses-
sion window. TOP
This is a synonym to the ONTOP option.
TWS 683
Commands
MAXIMIZE
Gutenberg Functions
The following functions are used, generally in an EXEC program, to format and print reports on the TWS slave printer or to an attached Gutenberg printer. These functions are generally used as a set in a programmed sequence.
Commands
TWS TWS TWS TWS TWS TWS TWS TWS TWS TWS TWS TWS
684 TWS
New_File ; start a new report Font "Times New Roman" ; set the font Style 2 ; boldface Size 240 ; 24 point Align 1 ; center Print_Txt "This is the Title" Align 3 ; left and right justified Style 0 ; normal Size 120 ; 12 point Print_Txt "Now is the time for all good men to come to" Print_Txt "the aid of their party." List_File prt3 ; print the report
ALIGN Define the text alignment and text background for subsequent text written to the report.
TWS ALIGN
align-code »
Bit-mapped value indicating text alignment
The formatting specified by this function is only applied to subsequent text written to the report. If print windows are being used and the mode setting of extended is specified, then the alignment specified here only applies to the currently selected print window (see “SELECT_AREA” on page 702). If extended is not specified, which is the default, then the alignment specified here applies to all windows. Align codes The alignment attribute is specified using a bit-mapped code. This code is one or more of the following values: Code
Meaning
0x0000
0
Left
0x0001
1
Center
0x0002
2
Right
0x0003
3
Justified
0x0008
8
No wrap
0x0020
32
Frame
0x0040
64
Light gray background
0x0080
128
White background
0x00C0
192
Background color
The alignment codes listed above can be combined together by adding the desired values. tws align 3 tws align 2+8+32+64 tws align 106
; left and right alignment ; right, no wrap, frame and light gray bg ; right, no wrap, frame and light gray bg
TWS 685
Commands
align-code
Commands
Each time that the align function is used it completely replaces any previous alignment specifications but it only applies to text that is subsequently written to the report.
686 TWS
BARCODES Print text interpreted as barcode using the 3 of 9 barcode algorithm.
TWS BARCODES
text
width
height units
fontname
»
Text to print
width
»
Optional width of bar code in units
height
»
Optional height of bar code in units
units
»
Optional unit of measurement code
fontname
»
Optional name of font to use for
Commands
text
The text is printed using the default font for barcodes and size or using the parameters specified. The default width is 240 decipoints, the height is proportional to the width, units is decipoints and the fontname is “3 of 9 Barcode.” You may request the default width, height or units by specifying a value of zero for the parameter. When a fontname is specified, it should be the name of a font that conforms to the 3 of 9 barcode character set. The barcode interpretation of text is written to the report at the current position using the currently defined style (see “STYLE” on page 703). No line breaks or spacing is output before or after the barcode is printed. If you desire any line breaks or spacing you must specify it by using the PRINT_TXT function. Afterward printing the barcode, the prior font and size is restored. Unit codes The unit-of-measurement attribute is specified using a bit-mapped code. This code is one or more of the following values: Code
Meaning
0x0001
1
Pixels
0x0002
2
Columns and rows
0x0004
4
Millimeters
0x0008
8
Inches
0x0010
16
Decipoints
Table 1: Unit of Measurement Codes
TWS 687
Multiple barcodes can be printed with one command by enclosing the string in quotation marks.
Commands
tws barcodes 12345-67890 tws barcodes "09876 54321" 10 0 4
688 TWS
CHANGE_AREA Change some of the attributes of an existing window area.
TWS CHANGE_AREA
window
last-page
flags
»
Number of existing window
last-page
»
Optional last page number to use window
flags
»
Optional flags to change
To change a defined window, the window must exist on the page that is currently being built in the report. A last-page value of zero means that the window exists in all remaining pages of the report. Flag codes Code
Meaning
0x0020
16
Link to next window
0x0040
64
Accept links from other windows
0x0080
128
Repeat on all following even numbered pages
0x0100
256
Repeat on all following odd numbered pages
0x0180
384
Repeat on all following pages
0x0200
512
Rows in table are separated
0x0400
1024
Area is a column of a table
tws print_window 4 3 2 20 10 4+32+64+256 ; repeat odd pages ... tws change_area 4 384 ; repeat on all pages
TWS 689
Commands
window
CHECK_PRINTER Test an attached printer to see if it is a Gutenberg-capable printer.
TWS CHECK_PRINTER Commands
TWS HAS_FONTS prt
prt
prt »
Attached printer name to test
Test printer prt to determine if it is a Gutenberg printer. If prt is not specified then the default PRT1 is tested. Sets the return code to a non-zero value if the result is true; otherwise, when the specified prt is not attached or not a Gutenberg printer the return code is set to zero. tws check_printer prt3 RC = 1, 09:10:23, ET = 0:01, CPU = 0.080
CLOSE Close the image displayed in a window in the report.
TWS CLOSE window
window »
Number of window containing image/picture
?????? Why, what does closing it do? It is hardcopy after all. tws align 0xC8
690 TWS
COLOR Set the font color for subsequent text output to the report.
TWS COLOR
fg bg »
Foreground color code
bg
»
Background color code
Sets the color of text that is subsequently output to the report. The foreground (fg) and background (bg) colors are specified with RGB values (red. green, blue), which are normally specified in hexadecimal. If print windows are being used and the mode setting of extended is specified, then the colors specified here only applies to the currently selected print window (see “SELECT_AREA” on page 702). If extended is not specified, which is the default, then the colors specified here apply to all windows. tws color 0xFFFFFF 0xFF0000 ; white on red
Some common color definitions: Code
Color
0x000000
Black
0x000080
Blue
0x008080
Cyan (green+blue)
0x008000
Green
0x404040
Grey
0x0000FF
Intense blue
0x00FFFF
Intense cyan
0x00FF00
Intense green
0xFF00FF
Intense magenta
0xFF0000
Intense red
0xFFFF00
Intense yellow
0x800080
Magenta (red+blue)
0x800000 0x808080
Red White or light grey
0x808000
Yellow (red+green)
TWS 691
Commands
fg
DEFAULT_UNITS Set the default unit-of-measurement to be used by functions that do not specify a U/M explicitly.
Commands
TWS DEFAULT_UNITS
unit-codes
columns
rows
unit-code
»
Unit of measurement code
columns
»
Optional number of columns
rows
»
Optional number of rows 1
When this function is not used the default U/M is decipoints which is ------ of 10 1 a point or --------- of an inch. 720
For unit-code description, refer to Table 1: “Unit of Measurement Codes” on page 687. When the U/M selected is columns and rows, this function may specify the desired column and/or row values. tws default_units 8 ... tws default_units 2 100 ... tws default_units 2 0 60
692 TWS
; set to inches ; set to 100 characters per line ; set to 60 lines per page
FIELD Output a field containing the current value of a variable.
TWS FIELD
field
mask »
Field name
mask
»
String specifying formatting information
xxxx Variable field names Name
Meaning
PAGE
Current page number
DATE
Current date
TIME
Current time
ENV
Environment variable
Mask codes Field
Code
PAGE
%u
Current page number
d
Day number, one or two digits
dd
Day number, two digit
ddd
Day of week name (Mon, Tue, etc.)
dddd
Full weekday name (Monday, Tuesday, etc.)
M DATE
Meaning
MM MMM
Month number, one or two digits Month number, two digit Month name (Jan, Feb, etc.)
MMMM
Full month name (January, February, etc.)
y
Year number in century, one or two digits
yy
Year number in century, two digits
yyyy
Four-digit year number
TWS 693
Commands
field
Field
Code hh
Two-digit hour number, 12-hour format
H
Hour number, 24-hour format, one or two digits
HH
Commands
m TIME
ENV
Meaning
mm
Hour number, 24-hour format, two digits Minute number, one or two digits Minute number, two digits
s
Second number, one or two digits
ss
Second number, two digits
t
‘a’ or ‘p’ for am or pm
tt
‘AM’ or ‘PM’ for am or pm
text
Environment name
>tws align 0xC8
694 TWS
FILE_RECORDS TWS FILE_RECORDS »
flags
»
divider
»
first
»
lines
»
flags
divider
first lines
Commands
xxxx
xxxx
xxxx Flag codes Code
Meaning
0x0400
1024
0x0800
2048
>tws align 0xC8
FONT Select the font to use for subsequent text output.
TWS FONT font-name
font-name »
Complete name of font on client system
The default font is “Arial.” >tws font "Times Roman"
IMAGE Output the graphic image file to the report at the current position.
TWS 695
Commands
TWS IMAGE
filename
flags
filename
»
Name of image file
flags
»
Code indicating image-type and scaling
xxxx Flag codes Code
Meaning
0x0000
0
Image type is defined by its file extension (BMP, GIF, JPG, PCX, TIF)
0x0001
1
Image type is BMP
0x0002
2
Image type is JPG
0x0100
256
Scale horizontal width to window width
0x0200
512
Scale vertical height to window width
0x0400
1024
Center the image horizontally in the window
0x0800
2048
Center the image vertically in the window
0x1000
4096
Scale the window to fit the image size
0x8000
32768
File is a local file on the client machine
>tws align 0xC8
LIST_FILE Close the current report and print it on an attached printer.
TWS LIST_FILE prt
prt »
Name of attached printer
xxxx >tws align 0xC8
MODE Define the page orientation for the report.
696 TWS
TWS MODE
mode-code
mode-code
»
Orientation code
xxxx Commands
Mode codes Code
Meaning
0x0000
0
Portrait orientation
0x0100
256
Landscape orientation
0x0400
1024
Extended windows
0x1000
4096
Duplex horizontal
0x2000
8192
Duplex vertical
>tws align 0xC8
NEW_FILE Begin a new report.
TWS NEW_FILE TWS ERASE_FILE
Any existing report that has not been output to the printer (see “LIST_FILE” on page 696) is cleared and not printed.
TWS 697
PICTURE
Commands
TWS PICTURE
window
window
»
x
»
y
»
width
»
height
»
filename
»
flags
»
x y
width
height
xxxx Flag codes Code 0x0000
>tws align 0xC8
PRINT_NEXT_PAGE Add a page break to the report.
TWS PRINT_NEXT_PAGE xxxx 698 TWS
Meaning
filename
flags
>tws align 0xC8
PRINT_RECORD Output the fields of a table record to the printer.
record
»
divider
»
record
divider
Commands
TWS PRINT_RECORD
xxxx >tws align 0xC8
PRINT_TXT Output some text to the report.
TWS PRINT_TXT
text
text
»
Text string
When text is not blank, no CR is added to the report. If text is a blank or empty string a CR is output to the report. tws tws tws tws tws
print_txt print_txt print_txt print_txt print_txt
"This is some text in a paragraph." " This is another sentence in the same paragraph." "Second paragraph with a break but no blank line " "between the paragraphs when printed."
TWS 699
PRINT_WINDOW Define a print area on the report.
Commands
TWS PRINT_WINDOW
window
x
y
width
height
flags
window
»
Window number to define
x
»
Top left corner of window, x position
y
»
Top left corner of window, y position
width
»
Width of window in U/M specified in flags
height
»
Height of window in U/M specified in flags
flags
»
Codes specifying U/M and other attributes
xxxx Flag codes Code
Meaning
0x0001
1
Pixels
0x0002
2
Columns and rows
0x0004
4
Millimeters
0x0008
8
Inches
0x0010
16
Decipoints
0x0020
32
Link to next window
0x0040
64
Accept links from other windows
0x0080
128
Repeat on all following even numbered pages
0x0100
256
Repeat on all following odd numbered pages
0x0180
384
Repeat on all following pages
0x0200
512
Rows in table are separated
0x0400
1024
Area is a column of a table
>tws align 0xC8
700 TWS
REC_PAGE action
action
»
first
»
last
»
type
»
first
last
type
Commands
TWS REC_PAGE
xxxx Align codes Code
Meaning
0x0000
>tws align 0xC8
ROTATE Set the rotation angle for text that is subsequently output to the report.
TWS ROTATE angle
angle »
Angle in degrees
A positive angle value indicates a clockwise rotation direction; negative values are a counter-clockwise rotation direction.
TWS 701
>tws align 0xC8
SELECT_AREA Select a previously defined window for subsequent text output.
Commands
TWS SELECT_AREA window
window
»
xxxx >tws align 0xC8
SETPOS Position the print-head cursor for subsequent text written to the report.
TWS SETPOS
x
y
x
»
y
»
units
»
window
»
units
window
xxxx Align codes Code
702 TWS
Meaning
Code
Meaning
>tws align 0xC8
Commands
SIZE Set the font size for subsequent text output to the report.
TWS SIZE
width
height
units
width
»
Optional font width
height
»
Optional font height
units
»
Optional code for unit of measurement
xxxx Unit codes For unit code description, refer to Table 1: “Unit of Measurement Codes” on page 687. >tws align 0xC8 >tws size 100 ; 10pt
STYLE Set the font style for subsequent text output to the report.
TWS STYLE
style-code
style-code
»
Bit-mapped code for font style
xxxx Style codes Code 0x0000
Meaning 0
Normal TWS 703
Commands
Code
Meaning
0x0001
1
Italic
0x0002
2
Boldface
0x0004
4
Underline
0x0008
8
Compressed
0x0010
16
Double-wide
0x0020
32
Double-high
0x0040
64
Use alternate color
0x0080
128
Crossout
0x0100
256
Transparent background
>tws align 0xC8 >tws style 0x101 ;
TEXT_FILE Include a text file in the printer output.
TWS TEXT_FILE
filename flags
filename
»
Name of file to print
flags
»
Codes controlling print actions
start-line
»
First line in file to print
lines
»
Number of lines to print
start-line
lines
xxxx Flags Code
704 TWS
Meaning
0x0001
1
Suppress any CR in the file.
0x0002
2
Suppress any FF in the file.
0x0400
1024
Translate characters in the file into ???
0x0800
2048
Interpret characters as ANSI characters
0x2000
8192
Print the file using client machine application associated with the file’s extension.
0x4000
16384
The file is printed by the client machine.
Code 0x8000
Meaning
32768
File resides on client machine. The filename must conform to the syntax rules of the client machine.
>tws align 0xC8
Although this program can be executed from the command line, it is normally used in an EXEC language program or by an application program. The operator of the THEOS WorkStation Client has on-screen controls that can control most of these functions and operations. The CHANGE, DISCONNECT and ONTOP functions of the THEOS WorkStation Client session can only be enabled/disabled with this program. There are no comparable screen-buttons or menu items that the operator can use to access these functions.
Restrictions
This program is only effective when it is executed in a partition that has a THEOS WorkStation Client for a console.
See Also
Net
TWS 705
Commands
Notes
706 TWS
Commands
UnErase Command This command allows you to restore a file that has been previously erased and placed in the recycle bin.
UNERASE
2
UNERASE
drive
3
UNERASE
drive ( CLEAR
4
UNERASE
file ( options
Commands
1
drive
»
Drive code or label of attached hard disk or image drive
file
»
File name with optional path; may contain wild cards
options
»
NOTYPE TYPE
Operation
Mode 1—Invokes the User Interface of the Unerase command. The drive for this mode is the first drive in the currently defined search sequence. Mode 2—Similar to Mode 1, invokes the User Interface of the Unerase command but the drive for this mode is specified by drive. Mode 3—Clear the recycle bin from drive. Mode 4—Undeletes the requested file. The result of the unerase operation is displayed or not displayed according to the option in effect.
Options
Defaults
NOTYPE
Suppress the display of the unerase attempt for each of the files specified. The summary line is also suppressed with this option.
TYPE
A default option that displays the result of each unerase attempt and displays a summary line prior to exiting Unerase.
For Mode 4, TYPE is the default option. The drive used for Mode 1 is the first drive in the current search sequence. Normally, this will be the S drive.
Restrictions
To view or unerase an erased file you must be logged onto the same account that owned the file prior to the file being erased.
UnErase
707
For Mode 3, you must be logged on to the SYSTEM account and have a privilege level of 5. When Mode 2 or Mode 4 is used, the UnErase command displays the user interface form. This form allows you to view the files that are in the recycle bin for a drive and selectively restore them, delete them or clear the entire recycle bin.
Commands
User Interface
At the bottom of the form is the information about the file that is currently highlighted in the list box above. The “Path” refers to the original location of the file which is also the location that the file would be restored to. Restore
Selecting this button restores or “unerases” the file highlighted in the list box to the left.
Delete
This button will delete the hightlighted file from the recycle bin. Once a file is deleted this way it cannot be restored or unerased. Before the highlighted file is actually removed, you are asked to confirm your request:
708 UnErase
You can control the sequence of the recycle bin files displayed in the list box. The choices are: Name sequence Orders the deleted file names by their file
name. Path sequence Orders the deleted files by their original path
location. Within path, the names are ordered by their file name. Date ascending Orders the deleted files by the date and time
that they were erased, in ascending sequence. Date descending Orders the deleted files by the date and time
that they were erased, in descending sequence. Size Ascending Orders the deleted files by the file size, in
ascending sequence. Size Descending Orders the deleted files by the file size, in
descending sequence. Clear
See also
This button allows you to clear or delete all of the files in the recycle bin. Because this operation cannot be reversed, you are asked to confirm your request before the files are permanently removed from the recycle bin.
Erase, FileManager, RmDir
UnErase
709
Commands
Sequence
Commands
710 UnErase
UnInstall Command The UnInstall command removes all of the files associated with an installed product.
UNINSTALL If there are any products registered with an uninstall control file a menu displays allowing you to select the product that you want to uninstall:
Select the product by moving the highlight bar to the desired item and then either click on the “Remove” button or use the (TabÌ¢) key to move to the “Remove” button and press (EnterÌ˛). All of the files listed in the uninstall control file for the selected item are removed from the system, the uninstall control file for that item is removed and the item is removed from the menu. Control returns to the menu and you may select another product to uninstall or use the “Exit” button to exit the Uninstall command. Notes
The uninstall control files reside in the directory /THEOS/UNINSTALL:S. Only files listed in the uninstall control file for the selected product are erased. Sometimes the control file does not list all of the files. For instance, it is common for a product’s control file to not include the configuration file for the product. In this situation the configuration file is not erased. This is UnInstall
711
Commands
Operation
Commands
convenient if you need to reinstall the product at a later time. After reinstallation, the prior configuration file is still there and will be used again. Some products require other products to operate. For instance, a networking product like THEO+Mail requires TCPIP networking to be installed on the system. If you uninstall a product that has other products dependent upon it, those other products are removed at the same time. For instance, uninstalling “THEOS TCP/IP Networking” causes all of the other products that depend upon networking to also be uninstalled. Cautions
All of the files registered in the uninstall control file for a product are erased from the system. There is no backup copy of these files made.
Restrictions
The Uninstall command can only remove files for a product that created an uninstall control file for the product when it was installed on the system.
See also
Install
712 UnInstall
Unique Command Filter Unique copies standard input to standard output, or copies one file to another, omitting any
duplicated lines.
UNIQUE
infile outfile ( options
2
UNIQUE
infile ( options
3
UNIQUE
( options
infile
»
file name with optional path
outfile
»
file name with optional path
options
»
COUNT DUP UNIQUE +nnn
Commands
1
nnn The examples used in the descriptions that follow use an input file containing: >list sample.file The The The The And The The
Operation
1st line. 2nd line. 2nd line. 2nd line. the third line. last line. last line.
Mode 1—Each line in infile is examined and compared to the previous line. If it is different than the prior line, it is written to outfile. >unique sample.file The 1st line. The 2nd line. And the third line. The last line.
Mode 2—This mode is identical to Mode 1 except that the output is written to the standard output device. >unique sample.file > unique.lines
Unique 713
Mode 3—This mode is normally used in a pipe command-line because the input file comes from the standard input device and the output is written to the standard output device. COUNT
Commands
Options
Each line in the file is output preceded by a count of the number of consecutive instances of the line. The duplicated instances of a line are not output. >unique sample.file (count 1 The 1st line. 3 The 2nd line. 1 And the third line. 2 The last line.
Option COUNT cannot be used in combination with the DUP or UNIQUE options. DUP
The UNIQUE command outputs only one copy of each duplicated line in the file. All unique lines in the input file are not copied to the output file. >unique sample.file (dup The 2nd line. The last line.
UNIQUE
This option causes the Unique command to output only the unique lines in the file. That is, only the lines that have no duplicate lines. >unique sample.file The 1st line. The 2nd line. And the third line. The last line. >unique sample.file (unique The 1st line. And the third line.
+nnn
With this option the first nnn characters of each line are not used when testing for duplicate lines. >unique sample.file (+7 The 1st line. And the third line. The last line.
714 Unique
nnn
Specifies that the first nnn fields of each line are not used when testing for duplicate lines. A field is identified by a tab character or a space character. >unique sample.file (2 count 4 The 1st line. 1 And the third line. 2 The last line.
An infile or outfile specification can omit the file type if the environment variable FILETYPE is defined. For more information about the FILETYPE variable, see “Environment Variables” on page 111.
Restrictions
infile must be a stream file.
See also
List, Sort
Unique 715
Commands
Notes
Commands
716 Unique
Unload Command The Unload command unloads a program or data file from memory.
program
program
»
Commands
UNLOAD
name of program or file to load into memory
Operation
The program or data file is unloaded from memory.
Notes
If program is not currently loaded into memory, no message displays. If program is in memory but was not loaded during system startup or by Load, it is not unloaded by this command and no message displays.
Restrictions
The Unload command requires a privilege level of five. You may only Unload a program or data file from memory if it was loaded with Load or during system startup. If program is in use by another user, it is not unloaded at this time. However, its “use count” is decremented so when the other user finishes using the program it will be unloaded at that time.
See also
Load, Sysgen
Unload
717
Commands
718 Unload
Unnumber Command Filter Unnumber copies a file to the standard output device, removing any line number from each line as it is copied.
UNNUMBER
2
UNNUMBER
file Operation
file...
»
Commands
1
file name with optional path
Mode 1—Each file is copied to the standard output device and unnumbered as it is copied. Specifying multiple files causes the second and remaining files to be appended to the first file copied to the standard output device. >unnumber program1.basic ! Program: JULIAN Compute Julian date ! Programmer: Jane Doe OPTION VERSION 1.1,"Copyright 2001 by ABC Software." IF CMDARG$(1)="" GOSUB COMPUTE.JULIAN ELSE GOSUB COMPUTE.DATE IFEND ... >unnumber program1.basic program2.basic ! Program: JULIAN Compute Julian date ! Programmer: Jane Doe OPTION VERSION 1.1,"Copyright 2001 by ABC Software." IF CMDARG$(1)="" ... ! Program2: Compute late charge. INPUT "beginning balance",AMOUNT INPUT "month number",M% CUR.MONTH% = VAL(LEFT$(DATE$(0),2)) TOT.TOT.INT = TOT.TOT.INT+TOT.INT
This command is frequently used in a pipe: >unnumber numbered.text | tee some.text | more
Mode 2—Copies the file from the standard input device to the standard output device, unnumbering each line as it is copied. Notes
A line is considered numbered if the first non-space character is a digit. A line is unnumbered by removing all leading spaces and digits. If the resulting line is blank, it is not output.
Unnumber
719
When a line contains multiple “line numbers,” only the first line number is removed. For instance: 10 10 This is line number 10.
The above line is unnumbered to: Commands
10 This is line number 10.
Restrictions
file must be a stream file. Compressed or encoded files, such as those used by MultiUser BASIC, cannot be unnumbered with this command.
See also
720 Unnumber
Number
UnZip Command This command lists, tests or extracts compressed files from a ZIP archive.
UNZIP
zipfile
2
UNZIP
-options
zipfile
3
UNZIP
-options
zipfile
filelist
zipfile
»
Source of archived files
options
»
Options applied during extraction or list
filelist
»
List of file names to extract
Operation
Commands
1
Mode 1—The files in the zipfile are restored into the current working directory. >unzip cdrom Archive: CDROM.zip inflating: diskette.img inflating: theos.img inflating: pluspak.exc inflating: pluspak.instcmp
Because no options are used with this mode, the files are attempted to be restored whether they exist or not. If a file already exists in the destination directory you are asked: replace
filename?
[y]es, [n]o, [All], [N]one, [r]ename:
When this occurs you must respond with a (Y), (N), (Shift)+(A), (Shift)+(N) or (R). If an archived file name has a path specified, it is restored to that path of the destination disk. If the path is relative (does not start with a “/”) then it is restored to that path relative to the current working directory. If the path does not exist, it is created. These actions can be controlled by specifying options. Mode 2—The files in the zipfile archive are restored according to the options specified. Mode 3—The files specified in filelist are extracted from the zipfile archive according to the options specified.
UnZip
721
Commands
Options
The following options may be combined into a single specification. For instance, to request quiet mode (-q) and replace mode (-o) you would specify -qo. -f
Similiar to the NEWER option of the CopyFile command, this option causes UnZip to only attempt to restore a file if the file does not exist in the destination directory of if the archived version of the file is newer than the existing version of the file in the destination directory.
-h
Display help text.
-j
Ignore the paths specified in the zipfile and restore the file into the current working directory.
-l
List the files in the archive. Compare with the -v option. >unzip -l cdrom Archive: CDROM.zip Length Date ----------1474560 02-16-02 26214400 02-16-02 748 01-30-02 3876 02-16-02 -------27693584
Time ---10:50 10:51 15:29 10:48
Name ---diskette.img theos.img pluspak.exc pluspak.instcmp ------4 files
-n
Similar to the NEWFILE option of the CopyFile command, files in the archive are only restored if the file does not exist in the destination directory.
-o
Equivalent to the REPLACE and NOQUERY option used by other THEOS commands, Any existing files are replaced if they have the same name as a file that is being exploded. You are not asked if you want to explode the archive file.
-p
This option causes UnZip to expand the contents of the archived files to stdout. Normally, this is a pipe to another command and is normally only useful when the archived files are plain text files. >unzip -p myfiles | list
In the above example, the contents of MYFILES.ZIP is displayed on the console by the List command.
722 UnZip
-q
Quiet mode. This is the equivalent of the NOTYPE option used by other THEOS commands. >unzip -tq cdrom.zip No errors detected in compressed data of CDROM.ZIP.
-t
Test the zipfile by verifying the readability of the archive and by checking the integrity of each file in the archive.
Archive: CDROM.ZIP testing: diskette.img testing: theos.img testing: pluspak.exc testing: pluspak.instcmp No errors detected in compressed data
OK OK OK OK of CDROM.ZIP.
-u
Similiar to the NEWER option of the CopyFile command, this option causes UnZip to only attempt to restore a file if the file does not exist in the destination directory of if the archived version of the file is newer than the existing version of the file in the destination directory. Compare with the -f option, which only restores if the file exists and is older.
-v
Display the zipfile directory in verbose mode. Compare to the -Z option display. >unzip -v cdrom Archive: CDROM.zip Length Method Size Ratio Date Time CRC-32 Name -------- ------ ------- ----------- ------- ---1474560 Defl:N 1277225 13% 02-16-02 10:50 76c9056f diskette.img 26214400 Defl:N 21782773 17% 02-16-02 10:51 b480088c theos.img 748 Defl:N 396 47% 01-30-02 15:29 ad55cfc6 pluspak.exc 3876 Defl:N 1435 63% 02-16-02 10:48 a8b548b9 pluspak.instcmp -------------- --------27693584 23061829 17% 4 files
-z
Display the archive file name. >unzip -z foo Archive: FOO.zip
UnZip
723
Commands
>unzip -t cdrom.zip
-Z
Display the zip file directory. Compare to the -v option. >unzip "-Z" cdrom Archive: CDROM.zip 23062393 bytes 4 files S.M...... 2.3 ths 1474560 bx defN 16-Feb-02 S.M...... 2.3 ths 26214400 bx defN 16-Feb-02 S........ 2.3 ths 748 tx defN 30-Jan-02 S.MW..... 2.3 ths 3876 bx defN 16-Feb-02 4 files, 27693584 bytes uncompressed, 23061829
10:50 10:51 15:29 10:48 bytes
diskette.img theos.img pluspak.exc pluspak.instcmp compressed: 16.7%
Commands
This option allows you to use additional options that are specific to this listing: -1
Display the file names only. >unzip -Z -1 cdrom diskette.img theos.img pluspak.exc pluspak.instcmp
-2
Display the file names only but allow and display other information if the -h, -t or -z sub-option is specified. >unzip -Z -2h cdrom Archive: CDROM.zip diskette.img theos.img pluspak.exc pluspak.instcmp
23062393 bytes
4 files
>unzip -Z -2ht cdrom Archive: CDROM.zip 23062393 bytes 4 files diskette.img theos.img pluspak.exc pluspak.instcmp 4 files, 27693584 bytes uncompressed, 23061829 bytes compressed: 16.7% -h
Display heading line. >unzip -Z -h cdrom Archive: CDROM.zip
-l
724 UnZip
23062393 bytes
4 files
Display the zip file directory in Unix “ls -l” long format. This display is identical to the plain -Z display. Compare with the -m and -s sub-option displays.
-m Display the zip file directory in Unix “ls -l” medium format. >unzip -Z -m cdrom Archive: CDROM.zip 23062393 bytes 4 files S.M...... 2.3 ths 1474560 bx 13% defN 16-Feb-02 10:50 diskette.img S.M...... 2.3 ths 26214400 bx 17% defN 16-Feb-02 10:51 theos.img S........ 2.3 ths 748 tx 47% defN 30-Jan-02 15:29 pluspak.exc S.MW..... 2.3 ths 3876 bx 63% defN 16-Feb-02 10:48 pluspak.instcmp 4 files, 27693584 bytes uncompressed, 23061829 bytes compressed: 16.7%
Display the zip file directory in Unix “ls -l” short format. >unzip -Z -s cdrom Archive: CDROM.zip 23062393 bytes 4 files S.M...... 2.3 ths 1474560 bx defN 16-Feb-02 S.M...... 2.3 ths 26214400 bx defN 16-Feb-02 S........ 2.3 ths 748 tx defN 30-Jan-02 S.MW..... 2.3 ths 3876 bx defN 16-Feb-02 4 files, 27693584 bytes uncompressed, 23061829
-t
10:50 10:51 15:29 10:48 bytes
diskette.img theos.img pluspak.exc pluspak.instcmp compressed: 16.7%
Display the totals line. >unzip -Z -t cdrom 4 files, 27693584 bytes uncompressed, 23061829 bytes compressed:
16.7%
-T
Display the date/time information of each listing line in a sortable format. That is, the date/time is formatted as: yyyymmdd.hhmmss.
-v
Display the directory in verbose, multi-page mode. >unzip -Z -v cdrom pluspak.instcmp offset of local header from start of archive: bytes file system or operating system of origin: version of encoding software: minimum file system compatibility required: minimum software version required to extract: compression method: compression sub-type (deflation): file security status: extended local header: file last modified on (DOS date/time): 32-bit CRC value (hex): compressed size: uncompressed size: length of filename: length of extra field: length of file comment: disk number on which file begins: apparent file type: Theos file attributes (87FD hex): MS-DOS file attributes (00 hex):
23060570 (015FE05Ah) Theos 2.3 MS-DOS, OS/2 or NT FAT 2.0 deflated normal not encrypted no 2002 Feb 16 10:48:24 a8b548b9 1435 bytes 3876 bytes 15 characters 18 bytes 0 characters disk 1 binary Sequential .MW..... none
The central-directory extra field contains: - A subfield with ID 0x6854 (Theos) and 14 data bytes: 00 24 0f 00 00 10 00 00 00 00 00 e0 00 00. There is no file comment.
-z
Display the zipfile comment, if any.
UnZip
725
Commands
-s
Commands
Notes
This program, and the Zip program, are implementations of the UnZip and Zip programs from Info-ZIP. Info-ZIP provides free, portable, high-quality versions of the Zip and UnZip compressor-archiver utilities that are compatible with the DOS-based PKZIP by PKWARE, Inc. This version is available for most other operating system platforms. Information about Info-ZIP may be found on the Internet at http://www.info-zip.org/.
See also
Zip
726 UnZip
Upcase Command Filter Upcase copies a file to the standard output device, converting all letters to uppercase. Upcase can also change the names of files or library members to uppercase-only characters.
1
UPCASE
2
UPCASE
3
UPCASE
directory
4
UPCASE
library
Commands
file
file
»
file name with optional path; wild cards are not allowed
directory
»
path to file names
library
»
library name of member files
Command synonym: Operation
UC
Mode 1—file is copied to the standard output device with all lowercase letters converted to uppercase. The original file is unchanged. >upcase /theos/config/crt.cfg SCREENSAVER=0 YESSCANCODE=0X15 NOSCANCODE=0X31 RESETLITERAL=OK TO REBOOT? (Y/N) MOUSE=0 INTELLIMOUSE=FALSE KEYPADMODE=TRUE REPEATRATE=30 ... >upcase /theos/config/crt.cfg > crt.config
Mode 2—Copies standard input to standard output, converting all lowercase letters to uppercase. This form is normally used only in a pipe. However, if standard input is the console, records are copied until a (Ctrl)+(D) is encountered, signaling the end of the input file. >filelist *.* | upcase > file.list
Upcase
727
Mode 3—All of the file names in directory are converted to use uppercaseonly characters. Files in subdirectories of directory and members of libraries in directory are not renamed. This mode of Upcase is not a filter.
Commands
>upcase myfiles /MYFILES/address.basic:S /MYFILES/browscap.basic:S /MYFILES/ctr.basic:S /MYFILES/cust1.basic:S /MYFILES/custbrws.basic:S /MYFILES/custjs.basic:S /MYFILES/customer.basic:S /MYFILES/mainmenu.basic:S /MYFILES/testit.basic:S
Only file names that are converted are displayed. Mode 4—All of the members of library are renamed to use uppercase-only characters. This mode of Upcase is not a filter. >upcase example.library /EXAMPLE.LIBRARY.customer:T /EXAMPLE.LIBRARY.cust1:T /EXAMPLE.LIBRARY.custjs:T
Only member names that are converted are displayed. Notes
The command name UC is a synonym to the Upcase command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGE/language/ SYNONYM.TXT file. If standard synonyms are disabled (see “Account” on page 13 and “STDSYN” on page 110), this synonym name may not be allowed. Mode 3 and Mode 4 of the Upcase command are useful when you need to
ensure that the file names are usable when accessed by an operating system that does not recognize lowercase file names. Restrictions
file must be a stream file.
See also
Lowcase
728 Upcase
Viewer Command The Viewer command displays and allows you to browse the contents of text files.
VIEWER file... ( options »
file name with optional path; may contain wild cards
options
»
FILES MAXIMIZE
Operation
NUMBER TITLE
WINDOW
The requested file is opened and displayed in a Viewer form: >view colors.basic
While viewing the file you can browse the contents with the normal navigation keys of (˜), (¤), (˚), (˙), (Home), (End), (PageUp) and (PageDown). To terminate viewing of a file press the (Esc) or (F9) key. If multiple files were specified on the command line then the current file is closed and the next file is viewed. Use (Break),(Q) to terminate viewing of the current file and to exit the Viewer command.
Viewer 729
Commands
file
Options
FILES
Indicates that file is an ASCII stream file with each record in the file specifying a single file name. The file name specifications in this file may include the path and wild cards.
Commands
The SELECTED.FILES and SELECTED.EXEC files created by FileList and FileManager and the FOUND.EXEC created by Look and FileManager can be used for this specification file (see “The EXEC and FILES Options” on page 239). You may also create the file with an editor or application program. For instance, FileList is used to create a list of files to be examined: >filelist *.data:a (exec >filelist a not *.data:a (10/1/01 exec append
A SELECTED.EXEC file now exists that lists all of the “data” files and all files that have been changed since 10/01/2001. The following command lists these files: >viewer selected.exec (file
MAXIMIZE
The Viewer form is displayed in its maximum size.
NUMBER
Each line of the text file is numbered.
TITLE
Allows you to specify the title for the Viewer form. If this option is not used the title is set to the name of the file being viewed. When the TITLE option is used, the title text is specified immediately following the TITLE keyword. The title text should be enclosed within quotation mark characters.
730 Viewer
>view selected.files (title "List of files to view"
Commands
WINDOW
This option allows you to specify the initial Viewer form position and size. When the option is not used the Viewer form’s initial position and size comes from the VIEWER.CFG file in Users and Configuration Files directory. To use the WINDOW option, follow the WINDOW keyword with the col, row, width and height values desired, in that sequence. >viewer somefile.txt (window 3 5 70 10
The above command specifies that the Viewer form is positioned with its upper-left corner at column 3, line 5 and it has a width of 70 characters and a height of 10 lines. Notes
This command uses a standard form and objects. Refer to Chapter 11 “Sessions, Forms and Objects” in the THEOS Corona Version 5 Operating
System Reference manual for information about manipulating the form’s size and position. The Viewer form’s initial position and size is comes from the VIEWER.CFG file in Users and Configuration Files directory. Any change in this position and size made during its operation is saved in that file for subsequent usage of the Viewer command with your UserName. The text file(s) are viewed in read-only mode. Although you can type characters into the viewer display, no change is made to the actual text file.
Viewer 731
You may print the file that you are viewing by pressing the (F8) key while it is displayed. When this is done you are presented with a form allowing you to select the printer that you want to use for the printing.
HTM Files
The viewer command can display and navigate files encoded with HTML tags and hyperlinks. However, the TBrowse is better suited to this task.
Defaults
The default TITLE is the name of the file being viewed. The default WINDOW size and position is the saved values in the /THEOS/USERS/username/VIEWER.CFG:S file.
Restrictions
Only stream files can be viewed with this command. Only ASCII text files will display the contents meaningfully.
See also
Img, List, More, TBrowse, WinWrite
Commands
Printing Files
732 Viewer
VNC Client Command The VNC command is the client portion of a VNC client/server protocol. It allows you to be a “Virtual Network Console” to another system on the network that is running a VNC server.
VNC
host Operation
host »
Commands
1
IP address or name of machine running VNC server
When VNC is executed you may provide the VNC server host IP address or name on the command-line. If you do not then you are asked to supply it:
After connecting to a server, that server’s IP name or address is remembered and will be used by default the next time that VNC is invoked. When you do supply the host name or address on the command line you are not asked to supply it with the above form nor are you allowed to change the options which are only accessible by selecting the Options button in that form. (See “Options” on page 735.) Most VNC servers require a password to connect to the server. If a password is required you will be asked:
Remember that passwords are case-sensitive.
VNC Client
733
Commands
After a valid password is entered and accepted by the server the connection is completed and the desktop of the server is displayed on this console.
The above display is a VNC connection to a Windows VNC server. The resolution of the actual display is much better than shown here because of scaling and printing limitations. If you have not checked the View (inputs ignored) option then mouse and keyboard actions performed in this session of THEOS will be communicated to and will control the remote desktop. To exit from VNC use the (Break),(Q) sequence.
734 VNC Client
Options
Options for the VNC client may be set by invoking VNC without specifying a host on the command line and then selecting the Options button in the connection form.
Commands
Preferred encoding. This set of options determine how this client handles the graphical data transmitted. Check one of the following encodings and this client will request that type of encoding from the server. The default Hextile is potentially the most efficient in transmission bandwidth. Hextile
Hextile is a variation on the CoRRE encoding. Rectangles are split up into 16x16 tiles, allowing the dimensions of the subrectangles to be specified in 4 bits each, 16 bits in total.
CoRRE
CoRRE is a variant of RRE, where it is guaranteed that the largest rectangle sent is no more than 255x255 pixels. A server which wants to send a rectangle larger than this simply splits it up and sends several smaller RFB rectangles. Within each of these smaller rectangles, a single byte can then be used to represent the dimensions of the subrectangles. For a typical desktop, this results in better compression than RRE.
RRE
RRE stands for rise-and-run-length encoding and is essentially a two-dimensional analogue of run-length encoding.
Raw
This is the simplest encoding of pixel data. With it, data consists of n pixel values where n is the width times the height of the rectangle.
Allow CopyRect encoding The copy rectangle encoding is a very simple and
efficient encoding which can be used when the client already has the same pixel data elsewhere in its framebuffer. You should always enable this option to optimize data transfer if and when possible.
VNC Client
735
Misc. Miscellaneous options. Request shared session Normally, when you establish a VNC connection
Commands
to a remote server, any existing VNC connections to that server are terminated allowing you to be the only VNC on that server. By enabling this option, existing connections on the server are not terminated. Deiconify on Bell Disable clipboard transfer Clipboard changes caused by cutting or copying
at either the viewer or server end are normally transmitted to the other end. This option disables clipboard transfers. Mouse. The following options control how the mouse on the local console is interpreted and used by the remote host desktop. Emulate 3 Buttons This option allows a two-button mouse to emulate a
middle button by pressing both buttons at once. Swap mouse buttons 2 and 3 Normally the mouse buttons left-middle-right
are mapped on to buttons 1,2,3. This option causes them to be mapped onto buttons 1,3,2, which may be more useful for twobutton users who only have left and right mouse buttons because they will then get buttons 1 & 2 instead of 1 & 3. If combined with 3-button emulation, this also causes the middle button to emulate button 3 instead of button 2. Display. These options control how the VNC viewer displays the desktop of the remote host system. Restrict pixels to 8-bit The VNC client normally accepts whatever pixel for-
mat the server offers. This option requests 8-bit true-color pixels from the server, which reduces network traffic. View (inputs ignored) Checking this item prevents you from actually con-
trolling the remote host. Instead, you are allowed view-only access. Full-screen mode This option is useful if the local screen is smaller than
the remote host desktop. When not enabled, the larger desktop is displayed on the local screen with scroll bars on the right and bottom edges of the display. To view the portions that are not displayed you must use the mouse to drag the scroll bar buttons in the direction desired. With the Full-screen mode option enabled, the scroll bars are not displayed. Instead, moving the mouse to the edge of the
736 VNC Client
screen causes the display to shift its viewing “window” of the desktop in that direction. Notes
This VNC client is based upon program code that is copyrighted by AT&T Laboratories Cambridge and is used under the conditions of the GNU General Public License. is a trademark of AT&T Labs-Cambridge Ltd.
Cautions
The normal cautions apply when accessing a computer that is remote to yourself. Since you cannot physically see the computer and you may not have physical access to the computer, do not perform opertions such as clearing diskettes, tapes, etc. or printing on any of the printers unless you are sure of the media loaded in the drive or printer.
Restrictions
The VNC client may only be used on a VGA display configured for graphics mode.
See also
NetTerm
VNC Client
737
Commands
The VNC logo
Commands
738 VNC Client
WhereIs Command This command searches the directory tree of the current account looking for all instances of a file name.
file... ( options
file
»
file name with optional path; may contain wild cards
options
»
date1 date2
Operation
Starting with the root directory of the current account, a search is made for all files that match file. If file specifies a path, the search starts at that path. All subdirectories subordinate to the starting search directory are examined. >tree / / data abc doc programs files programs Programs Backups doc Special
>whereis backups.c
As shown above, when a file is found that matches file, the complete path to the file is displayed and you are asked: “Continue searching?” You may select the Yes, No or Go buttons.
WhereIs 739
Commands
WHEREIS
Selecting the Yes button means that you want to continue the search; the No button means that you do not want to continue searching and you want to exit WhereIs without changing anything.
Commands
Selecting the Go button means that you want to discontinue the search and that you want to set your current working directory to the path of the file found. Options
date1
Includes a file only if the file’s last change date is greater than or equal to this date. That is, if the file was changed on or after this date. This option may be used with the date2 option. >whereis *.*:s f (10/15/01
The above command will include in the search only those files that have been created or changed since October 14, 2001. date2
Includes a file only if the file’s last change date is less than or equal to this date. That is, if the file was changed on or before this date. May only be specified by first specifying the date1 option. >whereis *.*:s f (10/15/01 10/30/01
This command includes only those files that have been created or changed since October 14, 2001, but not any files that were created or changed after October 30, 2001. To specify a date2 when you don’t care about date1, use a date of 1/1/86 for the date1 option. This is the earliest date maintained by the THEOS file system. >whereis *.*:s f (1/1/86 11/20/01
Here, since the date1 specification is 1/1/86, only files created or changed prior to November 21, 2001, are included. Defaults
Unless a path is specified with file, the search starts with the root directory of the current account.
Restrictions
You may only search for files in the current account.
See also
ChDir, FileManager
740 WhereIs
Which Command The Which command displays the complete path to a program. It searches in the current directory and in the standard locations for programs.
file Operation
»
Commands
WHICH file ... program name with optional file-type
Search for each of the files specified in the standard program locations including any defined PATH and user command libraries. This is the same search locations and search sequence used when file is executed as specified. As soon as a program file is found matching file its complete path is displayed. >which fileman SYSTEM\Programs/FileManager/FileMan.cmd:s >which fm makeimg SYSTEM\Programs/FileManager/FileMan.cmd:s /Theos/Command/MAKEIMG.EXC:S
Notes
The primary purpose of the Which command is to find the location of a program when there are multiple files with the same name. For instance, there may be files in the current account and directory named MYPROG.COMMAND, MYPROG.CMD, MYPROG.EXEC and there may be a file in the SYSTEM account named /THEOS/COMMANDS/M YPROG.CMD. When you enter the command name MYPROG on the command line you may wonder why it keeps executing a program that you did not expect or executes a different program depending upon what the current working directory is. The Which command will report the location and name of the program that is executed when the path and/or file extension is not specified.
See also
FileList, FileManager, Find, WhereIs
Which
741
Commands
742 Which
Who Command WhoAmI Command EXEC The Who command displays all started user processs and who is logged onto them. The WhoAmI command displays which account you are logged onto and other information about yourself.
WHO
2
WHO AM I
3
WHOAMI
Operation
Commands
1
Mode 1—The Who command shows all processs that have been started with consoles attached. For instance, the processs used by the print spooler, disk cache and network server programs are not displayed. >who
Mode 2—The Who Am I command displays the following information about yourself: Account Name: Account Number: User Name: Logon Date: Pid: Console: Description: Workgroup: Server Name: Server Address: Client Name:
SYSTEM 0 Myname 10 April 2002, 09:52 AM 10 NET1 C210,L80,P24,REMOTE=JUPITER Primary Corona system ACCOUNTING Saturn 192.168.1.100 JUPITER
Who
743
Client Address: 192.168.1.104
Commands
The above information was produced when the user was using a network client as a user to the THEOS system. Mode 3—This mode is synonymous with Mode 2. It is actually an EXEC language program that invokes the Who Am I command. You could modify this EXEC program to supply other information if you choose. Notes
On non-graphic consoles, if the environment variable LINEGRAPH is defined to be “N,” the line graphics are suppressed. For instance: >who 1 SYSTEM 2 SYSTEM 3 SAMPLES 4 SYSTEM 5 SYSTEM 6 16 PRIVATE >
See also
744 WhoAmI
Show
HELP CSI CSI CSI CSI LOGON WHO
CRT1:1 CRT1:2 CRT1:3 CRT1:4 CRT1:5 CRT1:8 NET1
C90,L80,P29 C90,L80,P29 C90,L80,P33 C90,L80,P29 C90,L80,P33 C90,L80,P24 C210,L80,P28,REMOTE=DocSystem
WhoIs Command Queries the Internet domain database regarding registered domain name and users.
WHOIS
domain
2
WHOIS
"user"
3
WHOIS
#handle
Commands
1
domain
»
second-level domain name
user
»
user name in form of “last-name, first-name”
handle
»
user handle
Operation
Mode 1—Issues a request to the Internet domain database to get the registered information about a second-level domain name. >whois theos-software.com Registrant: Theos Software (THEOS-SOFTWARE-DOM) 1801 Oakland Blvd, Suite 315 Walnut Creek, CA 94596 US Domain Name: THEOS-SOFTWARE.COM Administrative Contact, Technical Contact: THEOS Host Master (YGTAWDHKBO) [email protected] THEOS Software Corporation 1801 Oakland Blvd; Suite 315 Walnut Creek, CA 94596 USA 925 935-1118 Record expires on 13-Oct-2002. Record created on 12-Oct-1995. Database last updated on 10-Jul-2002 18:57:57 EDT. Domain servers in listed order: DNS1.THEOS-SOFTWARE.COM DNS2.THEOS-SOFTWARE.COM NS1.ALGX.NET NS2.ALGX.NET
65.45.113.228 65.45.113.229 216.99.225.30 216.99.225.31
WhoIs 745
Mode 2—Issues a request to the Internet domain database to get the registered information about a user contact. Note that, in the Mode 1 example, the administrative contact is “THEOS Hostmaster:” >whois "THEOS Hostmaster"
Commands
No match for "THEOS HOSTMASTER"
Not all registrars support a query by contact name. Mode 3—Issues a request to the Internet domain database to get the registered information about a user handle. Note that, in the Mode 1 example, the administrative contact has a handle of YGTAWDHKBO: >whois #ygtawdhkbo THEOS Host Master (YGTAWDHKBO) [email protected] THEOS Software Corporation 1801 Oakland Blvd; Suite 315 Walnut Creek, CA 94596 USA 925 935-1118 Database last updated on 10-Jul-2002 20:00:57 EDT.
Not all registrars with a WhoIs server support the querying of contact handles. Notes
Although all second-level domains are registered, only the responsible parties to those domains are registered by name and handle. The format and content of the registration database may vary depending upon the administrator for the first-level domain of the requested domain.
See also
746 WhoIs
NsLookup
Window Management Commands These 18 commands are primarily used by EXEC language programs to provide window and session management control.
mode
2 wClear
window char
3 wClip
window clip
4 wClose
window
5 wClose
ALL
6 wColor
window Fg Bg Rfg Rbg
Commands
1 wBypass
7 wFinish 8 wFrame
window frame shadow attribute
9 wInvert
window invert
10 wMenu
Count Col Row Title Invert Invert Color Fg Bg Rfg Rbg KEEP window HOT
11 wMove
window col row
12 wMsgBox
title message type ( WAIT seconds
13 wMsgBox
icon title message type ( WAIT seconds
14 wOpen
window col row columns rows
15 wRefresh
window
16 wRemove
window
17 wRestore
window file
18 wSave
window file
19 wSelect
window update display
20 wStat 21 wStat
window
22 wStat
?
23 wStat
? window field
24 wSwitch
switch
25 wSwitch
session
26 wTitle
window title top-bottom align attribute
747
Commands
748
align
»
LEFT CENTER RIGHT
attribute
»
bg
»
char clip
» »
bit-mapped color and attributes fg bg background color code or name (black, blue, green, cyan, red, magenta, yellow and white) character or character value
col columns count display
» » » »
leftmost column number width of window (1–255) number of items in menu list
fg
»
file frame
» »
foreground color code or name (black, blue, green, cyan, red, magenta, yellow and white) file name with optional path
invert
»
OFF ON
mode
»
OFF ON
row rows session shadow
» » » »
topmost row number height of window (1–255) session number (1–8)
switch
»
OFF ON
title top-bottom
» »
text for window title
update
»
OFF ON
window
»
window number
OFF ON
TOP HIDDEN
NONE SINGLE DOUBLE RAISED SUNKEN
NONE LEFT RIGHT
BOTTOM TOP
wBypass
The wBypass command enables or disables the window manager’s bypass mode. >wbypass off
>wbypass on
When window manager bypass mode is enabled, characters sent to the console are not intercepted by window manager. The character is displayed immediately on the console and it is not saved in any window in memory. Invoking wBypass with no parameter displays the current window manager bypass mode. >wbypass Bypass mode is not set
wClear
The wClear command clears the interior of an open window to a specified character or to spaces. >wclear 5 >wclear 8 176
The first command clears window five to spaces. The second clears window eight, filling it with the “stipple pattern” character. Refer to Appendix G: “THEOS Character Sets,” starting on page 265 of the THEOS Corona Version 5 Operating System Reference manual for a list of characters supported by THEOS. The window must be selected or refreshed to see the effects of this command. wClip
The wClip command changes the text clip attribute of a window. The clip attribute of a window controls whether text is truncated (clipped) or wrapped when it flows beyond the right edge of the window. The initial or default clip attribute is ON, meaning that text is truncated.
749
Commands
Normally, window manager bypass mode is off, meaning that all characters sent to the console are intercepted and processed by the window manager. Window manager saves the character and its attributes in the appropriate window in memory and transmits the character to the console if the window is selected and its update status is enabled.
wClose
The wClose command closes and removes the specified window. If that window is the active window, then the next lower window is selected as the active window.
Commands
>wclose 4
The wClose ALL command selects window zero and then closes and removes all other open windows. >wclose all
wColor
Change the interior colors of an open window. The window does not have to be the active window. The display of the window might not be updated immediately, unless it is selected with update on. The colors may be specified with color numbers or with the the color name. Color names must be completely spelled out. Code
Name
Code
Name
0
Black
4
Red
1
Blue
5
Magenta
2
Green
6
Yellow
3
Cyan
7
White
wFinish
The wFinish command is synonymous with a wClose ALL command. It selects window zero and closes and removes all other windows.
wFrame
The wFrame command changes an existing window’s frame and shadow style. The window’s frame and shadow are set to the indicated styles with the requested colors and attributes. >wframe 3 single right >wframe 4 double none white red >wframe 30 single right 0x70
Both frame and shadow must be specified but the attribute or color of the frame can be omitted, in which case it is left unchanged. For a description of the attribute specification, refer to “Frame & Title Attributes” on page 151 of the THEOS Corona Version 5 Operating System Reference manual. The changed frame and shadow styles and attributes are not displayed until the window is selected or refreshed, unless it is the current window.
750
wInvert
The wInvert command changes the normal video/reverse video status of the indicated window. Although this command can be used on color or monochrome displays, it is only effective on monochrome displays. Windows should be defined with color attributes and invert attributes. The color attributes are ignored on monochrome displays and the invert attributes are ignored on the color displays.
>winvert 23 off
The initial or default invert mode for a window depends upon its window number. Odd numbered windows default to invert ON, even numbered windows default to invert OFF. wMenu
The wMenu command can only be used in an EXEC program because it requires the menu item text to be placed in the EXEC program’s stack (&BEGSTACK or &STACK statements) before executing the command. This command displays a menu or choice list on the screen and lets the operator select one of the items. The count, col and row parameters must be supplied but the other fields are optional. &begstack Item 1 Item 2 Item 3 &end wmenu 3 5 10 Item 1 Item 2 Item 3
Blank items in the list of menu choices display as a horizontal line. For instance: &begstack Item 1 Item 2 Item 3 Last Item &end wmenu 5 5 10
751
Commands
>winvert 14 on
Item 1 Item 2 Item 3 Last Item
Commands
The window used by wMenu is always double-line framed and has a drop shadow on the right, space permitting. col and row specify the upper-left corner of the interior of the window. The width and height of the menu depend upon the items displayed. The width of the window is the larger of the longest item in the list and the length of the menu title. The height of the window is the smaller of the remaining screen depth minus 4 and count. When the window height is less than count, a scroll bar is displayed on the right side of the menu frame. INVERT Parameter. Use this parameter if the EXEC program may be used on a monochrome display. It has the same effect on the menu window as the wInvert command has on user-defined windows. wmenu 10 3 3 invert on color white blue white red
COLOR Parameters. This parameter defines the colors used for the frame, title, menu item text and the selection highlight bar. It should be used if the EXEC program may be used on a color display. wmenu 10 3 3 invert on color white blue white red
The fg and bg colors are used for the menu item text, the frame and the title text. rvfg and rvbg colors are used for the selection highlight bar. When the COLOR phrase is not used and the display is capable of colors, the default colors are used for the menu window. Refer to “Window Colors and Invert Status” on page 150 of the THEOS Corona Version 5 Operating System Reference manual. KEEP Parameter. This parameter performs two functions: It specifies the window number used for the menu and it tells wMenu to not close or remove the window when a selection is made. When this parameter is not used the menu window is automatically closed and removed when the operator selects a menu item.
752
Note: The menu window is always opened or reopened when wMenu starts, even if it is the same window number and menu item list used the last time that wMenu executed.
&begstack 6 Item 1 6 Item 2 6 Item 3 &end wmenu 3 5 10 HOT Item 1 Item 2 Item 3
In this list, the sixth character of each item is the hot-key character. Character positions are counted starting with the first non-space character following the hot-key character number. In the above example, the hot keys are the characters 1, 2 and 3, respectively. Item Selection. When the menu displays, the selection highlight bar is positioned on the first item in the menu. You may use the (˚) and (˙) keys to move the highlight bar up and down. The (Home) and (End) keys move the highlight bar to the first and last items in the list. The (ÌÌSpaceÌÌÌ) key advances the highlight bar to the next item. Unlike the (¤) key, the (ÌÌSpaceÌÌÌ) key wraps from the last item to the first. Pressing (EnterÌ˛) selects the highlighted item. You may also position to and/or select an item using a hot-key or soft hotkey. Hot-keys are enabled with the HOT parameter and are indicated with underlined characters in the item list. Soft hot-keys are enabled when the HOT parameter is not used. When hot-keys are enabled, you may press an underlined character. This causes the highlight bar to move to the first item containing the underlined character. If there is only one item with that hot-key, the item is automatically selected just as if you had pressed (EnterÌ˛). When soft hot-keys are enabled, pressing a character positions the highlight bar to the next item that starts with that character. If there are no
753
Commands
HOT Parameter. The HOT parameter tells wMenu that menu items can be selected using “hot-keys.” When this parameter is used, each item in the menu list must specify the position of the character used for hot-key selection of the item. For instance:
more items starting with that character, then the highlight bar moves to the first item starting with the character.
Commands
Hot-key and soft hot-key selection is case-insensitive. Selecting an item sets the return code (EXEC &RETCODE variable) to the selected item’s number. Pressing (Esc) selects no item but exits wMenu, setting the return code to zero. wMove
The wMove command moves a window to a new location on the screen. col and row are the column and row numbers of the new location for the upper-left corner of the interior of the window. Note that windows can be moved by the operator using a mouse or a virtual mouse.
wMsgBox
Display a message box form. A message box form is a form with a title, message text and optional operator response buttons. For instance: >wmsgbox question "Title text" "Example message text" YNC
Icon. This is an optional parameter that can be used to specify that the message form has a graphical icon displayed on it. There are four icons available and they are specified with their icon names: Icon name
Displays
Exclamation Information Question Stop Title. The text specified in this position is displayed in the title bar of the form. Although you can specify an empty string, there will always be a title bar for the form. You should enclose the title text in quotation marks 754
to ensure that it uses the text that you specify rather than just the first word. Message. This is the text that is displayed in the body of the form. You should enclose this text in quotation marks.
Code
Mneumonic
Buttons
0
O
1
OC
OK, Cancel
2
ARI
Abort, Retry and Cancel
3
YNC
Yes, No and Cancel
4
YN
Yes and No
5
RC
Retry and Cancel
6
C
7
YNAN
Yes, No, Yes to All and No to All
8
NONE
No buttons
OK
Cancel
WAIT seconds. This option allows you to display the message form and, if there is no response from the operator for seconds amount of time, the message form clears itself and exits.
755
Commands
Type. This parameter specifies the operator response buttons that are displayed in the message box form. It can be specified with a numeric code or a mneumonic code.
Return code. The return code is set according to the way that the message form is exited. Return Code 0
Exited by The (Esc) key, mouse clicking on the (X) symbol or the
Commands
WAIT seconds timed out.
wOpen
1
The “OK” button.
2
The “Cancel” button.
3
The “Abort” button.
4
The “Retry” button.
5
The “Ignore” button.
6
The “Yes” button.
7
The “No” button.
8
The “Yes to All” button.
9
The “No to All” button.
The wOpen command defines a new window or redefines an existing window. window refers to the window number of the new or existing window. col and row are the column number and row number of the upper-left corner of the interior of the window (excluding the frame and shadow). columns and rows refer to the width and depth of the interior of the window. >wopen 1 10 5 58 10 >wframe 1 sunken right >wtitle 1 " Window 1 " top center >wselect 1
756
>wopen 1 10 5 58 10 >wframe 1 sunken right
Window 1
> >wtitle 1 " Window 1 " top center >wselect 1
Commands
The window may be specified with a question mark. When this is done, the next available window number is used for the new window. The window number is returned as the return code of the wOpen command. This command does not select the new window, it only creates it in memory. The initial attributes of a new or reopened window are: double-line frame with no shadow or title; clip on and update on. It has neither the hidden nor top attribute set (see wSelect command on page 759). If there is insufficient space around the interior of the window for a frame, then the window has no frame. The interior of a new or reopened window is empty with the cursor location at the upper-left corner. The color and invert status of the window and its frame are dependent upon its window number, the capabilities of the console and the setup for session colors for this console. Refer to “Window Colors and Invert Status” on page 150 of the THEOS Corona Version 5 Operating System Reference manual for more information about default colors and invert status. wRefresh
The wRefresh command updates the display of a window on the console without making it the active window. This command updates the display of the window interior, frame, title and shadow. It does not change the order of the window. That is, if the window is covered by another window, then the portion that is covered is not displayed. The wSelect command changes the order of display for a window. 757
wRemove
The wRemove command erases the display of a window from the screen. Any and all windows previously covered by window become visible. This command does not close the window.
Commands
wRestore
The wRestore command retrieves a window definition and contents that were previously saved to disk with the wSave command. wrestore 30 sample.copyrite
The above command restores the window saved in the file SAMPLE.COPYRITE (see wSave command example). A restored window has all of the attributes of the saved window including: Window location Window size Cursor location Frame style, attributes and color Shadow position Title position, alignment, attributes and color Clip status Invert status Display type (hidden, top or neither) Interior contents including text, attributes and color The window is restored with this command but not displayed. You must use the wRefresh command or the wSelect command to display the new window on the screen.
758
wSave
The wSave command saves a window description and contents to a disk file.
Commands
wopen 1 46 4 30 3 wframe 1 double right 0x17 wclip 1 on wselect 1 top color white blue &crt pon &crt 7 1 &type SAMPLE Version 1.0 \ &crt 2 2 &type by ABC Software Corporation \ &crt 7 3 &type All rights reserved \ &crt poff wselect 1 on top wsave 1 sample.copyrite
The preceding EXEC statements and commands create a window and fills it with a copyright notice for the program SAMPLE. This window definition is saved in the disk file SAMPLE.COPYRITE. A window definition saved with the wSave command can be used by the wRestore command, the BASIC language WINDOW RESTORE statement or the C language wRestore function. wSelect
The wSelect command selects a window as the active window for text display and operator input, and it defines the display order of the window. For instance: wselect 3 on
This command specifies that window number three is the active window, that it is refreshed and that all text written to the window will appear on the screen if the window is not overlaid by windows with the TOP attribute. Selecting a window always makes it the active window. It also restores the display attributes in effect the last time that the window was selected. Specifically, the following attributes are restored: the cursor location, cursor on/off mode, video attributes (blink, underline, etc.) and normal and reverse video colors. The first time that a window is selected, its cursor location is 1,1. Selecting a window places it on top of all other windows except those that were last selected with the TOP display mode.
759
Window zero is always open and can be selected with this command but it cannot be specified as TOP or HIDDEN.
Commands
Update ON. Selecting a window with update mode ON means that the window is refreshed on screen and subsequent text written to this active window is displayed on the screen. This is the default mode when selecting a window. Update OFF. Selecting a window with update mode OFF means that the window is not refreshed on screen. Text written to the window is not displayed on the screen but it is saved in memory and will appear the next time that the window is refreshed or selected with update ON status. Display TOP. Selecting a window with the TOP display attribute causes the window to be displayed on the screen on top of all other windows, including other windows marked as TOP. TOP implies an update ON status. >wselect 3 top >wselect 3 off top
The above two commands have identical effects: window three is selected as the active window, its display order is on top of all other windows, it is refreshed on screen and subsequent text written to the window appears on the screen. Display HIDDEN. Selecting a window with the HIDDEN display attribute causes the window to be removed from the screen. HIDDEN implies update OFF status. Although it is the active window, it does not appear on the screen until it is refreshed or reselected with update ON status. A hidden window has all the properties of non-hidden windows except it is not visible on the screen until it is refreshed or selected without the HIDDEN attribute.
760
wStat
The wStat command displays the general status for all windows, the complete status for a specific window or it returns the currently active window number. General Window Status. Using wStat with no parameters displays a brief summary of all open windows. Commands
>wopen 1 2 2 70 20 >wopen 2 4 4 68 18 >wopen 3 6 6 66 16 >wstat 0* 80x24 1 70x20 2 68x18 3 66x16
beg=0,0 beg=1,1 beg=3,3 beg=5,5
cur=0,11 order=0 cur=0,0 order=-1 cur=0,0 order=-1 cur=0,0 order=-1
update=1 update=0 update=0 update=0
Each open window is listed with the following information: Window number. The active window is denoted with an asterisk. Window interior size using number base one. Window interior origin (upper-left corner) using number base zero. Current cursor location within the window using number base zero. Display order. An order number of -1 indicates that the window is not currently displayed on the screen. Either it has never been selected or refreshed, or it is HIDDEN. Window update status. A code of one means that text written to the window is displayed on the screen.
761
Display Current Window Number. When wStat is invoked with a question mark, it sets the return code to the current window number. This return code is easily used in an EXEC program by referencing the &RETCODE variable.
Commands
wstat ? &type The current window number is &retcode &curr_window = &retcode
Specific Window Status. When wStat is given a window number, the complete status of that window is displayed. >wselect 2 >wstat 2 status: begin col,row: width: height: curr col,row: cursor: frame-type: shadow-type: title-type: title-align: title-attr: frame-attr: clip: update: curr-attr: order: color: invert:
762
1 3,3 68 18 0,6 0 2 1 2 2 0x1C5F 0x1C5F 1 0 0x1C5F 0 7,5,7,0 0
Status Element
Meaning
status
Window status
Codes Used
width
Window interior width, base one
height
Window interior height, base one
curr col,row
Cursor location, base zero
cursor
Cursor display type
frame-type
shadow-type
title-type
title-align
title-attr
Commands
begin col,row
0 = Not open 1 = Open, not active 2 = Open, active Window interior origin, base zero
0 = Not displayed 1 = Blinking underline 2 = Blinking block 3 = Steady underline 4 = Steady block Frame style 0 = None 1 = Single line 2 = Double line 3 = Raised 4 = Sunken Shadow style 0 = None 1 = Right 2 = Left Title position 0 = None 1 = Top 2 = Bottom Title alignment 0 = Center 1 = Left 2 = Right Bit-mapped value indicating the foreground and background title colors and the attributes.
frame-attr
Bit-mapped value indicating the foreground and background frame colors and the attributes.
clip
Interior text clipping
update
Update and display status
0 = Off 1 = On 0 = Update OFF 1 = Update ON 2 = Update ON, TOP 4 = Update OFF, HIDDEN
763
Commands
Status Element
Meaning
Codes Used
curr-attr
Bit-mapped value indicating the current window interior foreground and background colors and the attributes.
order
Window display sequence
color
Window interior color codes for fg, bg, rvfg, rvbg.
invert
Monochrome invert status
Lowest or bottom-most window is 0. A -1 means window is not displayed (hidden or has never been displayed). 0 = Off 1 = On
The bit-mapped values used for the title, frame and current attribute fields are not useful in an EXEC program. This same information is available by using the appropriate functions in a program. Refer to the language’s reference manual for a description of these codes.
Specific Window Field Status. You may get a specific parameter of a specific window’s status. When wStat is given a question mark followed by a window number and a status field number, the status of that window’s field is displayed. >wstat ? 3 4 RC = 30, 08:53:45, et = 0:00, cpu = 0.072 >
In the above example, a request is made for the width of window 3. The return code is set to 30 indicating that that is the width of the window. The field codes for window status are: Code
764
Field
0
Status
1
Top left column
2
Top left row
3
Width
4
Height
5
Current cursor column
6
Current cursor row
Code 7
Cursor shape
8
Window frame type
9
Window shadow type
10
Title type
11
Title alignment
12
Title attributes
13
Frame attributes
14
Text clip
15
Window update mode
16
Current text attribute
17
Window display order
18
Text foreground color
19
Text background color
20
Text reverse video foreground color
21
Text reverse video background color
22
Invert
Commands
wSwitch
Field
The wSwitch command can enable or disable session-switching, or it can switch to another session on your console. Session-switching is normally enabled. The wSwitch command can disable it if, for some reason, you do not want the operator switching to a different session while your EXEC program continues to execute. wswitch OFF
The above command disables session-switching. wswitch ON
The above command enables session-switching. Session switching may also be controlled with the Session command. The wSwitch command can also switch to a different session running on your console. Merely enter the session number desired. wswitch 4
765
Note that if you use wSwitch to switch to a session other than the one that this EXEC program is running on, you will not be able to see any display from this EXEC. It will continue to execute on its own session.
Commands
To determine which session you are using, use the wSwitch command with a question mark argument. This causes wSwitch to set the return code to the session number in use by this program. wswitch ? &type My session is &retcode
wTitle
The wTitle command defines the title for a window. With this command you may either specify that a window has no title, or specify the title and its position and attributes. A window must have a frame in order to have a title. >wtitle 3
The above command removes any title that window three might have. >wtitle 2 " Window Two " bottom right
When a title is defined without the top-bottom specified, the default of TOP is used. When defined without the align parameter specified, the default of CENTER is used. The attribute for the title can be omitted, in which case it uses the default attributes of the frame for the title text. For a description of the attribute specification, refer to “Frame & Title Attributes” on page 151 of the THEOS Corona Version 5 Operating System Reference manual. The changed title and attributes are not displayed until the window is selected or refreshed, unless it is the current window. Restrictions
wOpen and wRestore are the only window management commands that can create or define a new window. All other commands except wStat operate
on existing, open windows. See also
Session and Chapter 10 “Windows,” starting on page 147 of the THEOS
Corona Version 5 Operating System Reference manual
766
WinWrite Command The WinWrite command invokes the WindoWriter program, which is a general purpose, fullscreen text editor.
file
»
file name with optional path; may contain wild cards
options
»
FILES NOBACKUP
Command synonym:
NOSHELL PASSWORD
READONLY
WW
For a complete description of the operation and usage of this program, refer to the WindoWriter User’s Guide. Operation
WindoWriter is loaded and the first file is opened as the current text file to
edit. The file specification may contain wild cards and there may be more than one file specified on the command-line. In either case, the first file is opened and, when you close that file, the next file is opened, and so on. Options
FILES
Indicates that file is an ASCII stream file with each record in the file specifying a single file name. The file name specifications in this file may include the path and wild cards. The SELECTED.FILES and SELECTED.EXEC files created by FileList and the FOUND.EXEC created by Look can be used for this specification file. See “The EXEC and FILES Options” on page 239 of the THEOS Corona Version 5 Operating System Reference manual. You may also create the file with an editor or application program. For instance, FileList is used to create a list of files to be examined: >filelist *.txt:a (exec >filelist a not *.txt:a (10/1/01 exec append
A SELECTED.EXEC file now exists that lists all of the “text” files and all files that have been changed since 10/01/2001. The following command edits these files:
WinWrite 767
Commands
WINWRITE file... ( options
>ww selected.exec (file
The FileManager command can also create and add to SELECTED.EXEC, SELECTED.FILES and FOUND.EXEC files.
Commands
NOBACKUP
This option specifies that any and all files saved during this session will not have a backup version created. This NOBACKUP option also applies to automatic file-saves performed by WindoWriter. The NOBACKUP option, although it takes away a safeguard, is invaluable when disk space is at a premium. Editing a large file or a file that resides on a floppy diskette can use up large amounts of disk space, particularly when more than one level of backup is maintained.
NOSHELL
This option disables the CSI Shell... item of the File menu of WindoWriter. This option would normally be used when WindoWriter is invoked from an application program. By specifying NOSHELL, the user is prevented from using WindoWriter to gain easy access to system commands that might cause problems for the application.
PASSWORD pw Use pw to access the file using DES private key encryp-
tion. If the file is currently encrypted, the pw is used to decrypt the file and open it. When the file is saved, pw is used to encrypt the file. pw should be enclosed within quotation marks to ensure that it is passed to WinWrite unmodified. Refer to the Decrypt and Encrypt commands for more information about DES encrytion. READONLY Do not allow changes to the file. This causes WindoWriter to
operate just as if the file were read protected. Notes
The command name WW is a synonym to the WinWrite command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGE/language/ SYNONYM file. If standard synonyms are disabled (see “Account” on page 13 and “STDSYN” on page 110), this synonym name may not be allowed. A file specification can omit the file type if the environment variable FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Variables” on page 111 of the THEOS Corona Version 5 Operating System Reference manual.
768 WinWrite
The keys used while in WindoWriter may differ from the keys used in other programs. See “Function Key Remapping” in the WindoWriter User’s Guide. The default configuration of WindoWriter is determined by the configuration file for WindoWriter. Each account may have their own configuration file. Refer to the WindoWriter User’s Guide for more information about this configuration file.
Restrictions
file must be a stream text file.
See also
Decrypt, Encrypt, LineEdit, WindoWriter User’s Guide
WinWrite 769
Commands
Defaults
Commands
770 WinWrite
WordCount Command This command counts lines, words and characters in a stream file.
WORDCOUNT
file... ( options
2
WORDCOUNT
file... ( FILES options
file
»
file name with optional path; may contain wild cards
options
»
BYTES CHARS FILES LINES WORDS
Command synonym: Operation
WCOUNT
Mode 1—The file is analyzed and the total number of characters or bytes, words and lines is counted. The totals of these counts are displayed on the standard output device. >wordcount /theos/config/devnames.txt Lines 554
Words 14,537
Chars 31,694
File-name /THEOS/CONFIG/DEVNAMES.TXT
Omitting file means that the standard input device supplies the text of the file. This would normally be used in a pipe command-line. When the text comes from the console keyboard, it is terminated with a (Ctrl)+(D). >wc The quick brown fox jumped over the lazy gray dog. Now is the time for all good men to come to the aid of their party. (Ctrl)+(D) Lines 3
Words 26
Chars 119
File-name
WordCount 771
Commands
1
Multiple files may be specified on the command-line. Each one of the files is analyzed separately and the totals are displayed. The total for all of the files is then displayed at the end. >wordcount first.file second.file third.file
Commands
Lines 55 120 32 207
Words 1,127 2,500 600 4,227
Chars 5,635 10,389 1,357 17,381
File-name first.file second.file third.file Totals 3
Mode 2—In this mode file is an ASCII stream file containing one file description per line. Each file description in file is counted. The file descriptions may contain wild-card specifications. This mode of the WordCount command is convenient when one or more sets of files are repetitively being counted. Merely edit a file containing the file description, such as: >list daily.counts system.history:s *.log:s >wc daily.counts (file Lines Words Chars 13,398 200,690 862,356 250 2,435 10,389 3,029 4,398 25,942 16,677 207,523 898,687
772 WordCount
File-name system.history private.log user.log Totals 3
Options
BYTES
Count and display the total number of bytes in the file. This is synonymous with the CHARS option.
CHARS
Count and display the total number of characters in the file. This is synonymous with the BYTES option. >wordcount /theos/config/devnames.txt (chars
LINES
File-name /THEOS/CONFIG/DEVNAMES.TXT
Count and display the total number of lines or records in the file. >wordcount /theos/config/devnames.txt (lines Lines 554
WORDS
File-name /THEOS/CONFIG/DEVNAMES.TXT
Count and display the total number of words in the file. >wordcount /theos/config/devnames.txt (words Words 14,537
Notes
File-name /THEOS/CONFIG/DEVNAMES.TXT
The command name WCount is a synonym to the WordCount command. It is not a separate program but only an entry in the /THEOS/OS/MESSAGE/language/SYNONYM file. If standard synonyms are disabled (see “Account” on page 13 and “STDSYN” on page 110), this synonym name may not be allowed. A file specification can omit the file type if the environment variable FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Variables” on page 111 of the THEOS Corona Version 5 Operating System Reference manual. Defaults
Unless a specific option is specified, CHARS, LINES and WORDS are displayed by default.
Restrictions
file must be a stream file.
WordCount 773
Commands
Chars 31,694
Commands
774 WordCount
Zip Command This command lists, tests or creates compressed files in a ZIP archive.
ZIP
zipfile
2
ZIP
-options
filename... zipfile
filename...
zipfile
»
Archive file
filename
»
Name of file to add to archive file
options
»
Options for archiving
Operation
Commands
1
Mode 1—Add the list of files to the archive file zipfile. Mode 2—Perform the actions specified by options. The zipfile and the list of filenames may be necessary, depending upon the specific options requested.
Options
The following options may be combined into a single specification. For instance, to request comments (-c) and move mode (-m) you would specify -cm. -c
Allows you to add a one-line comment for each file that is added to the archive. >zip -c htms *.htm adding: beta2.htm (deflated adding: beta3.htm (deflated adding: beta4.htm (deflated adding: beta5.htm (deflated adding: beta6.htm (deflated Enter comment for beta2.htm: Comment for file one Enter comment for beta3.htm: Comment for the second file Enter comment for beta4.htm:
65%) 62%) 67%) 63%) 63%)
Enter comment for beta5.htm: This is my comment for the beta5.htm file Enter comment for beta6.htm: My last comment, for the beta6.htm file
Zip
775
Commands
>unzip -l htms Archive: HTMS.zip Length Date Time Name ----------------34262 08-24-00 15:45 beta2.htm Comment for file one 23593 10-03-00 00:42 beta3.htm Comment for the second file 34194 03-07-01 11:27 beta4.htm 21651 08-30-01 11:03 beta5.htm This is my comment for the beta5.htm file 22811 12-12-01 13:58 beta6.htm My last comment, for the beta6.htm file -------------136511 5 files -d filelist
The list of file names in filelist is deleted from the zipfile. >zip htms -d beta3.htm beta6.htm deleting: beta3.htm deleting: beta6.htm >unzip -l htms Archive: HTMS.zip Length Date ----------34262 08-24-00 34194 03-07-01 21651 08-30-01 -------90107
Time ---15:45 11:27 11:03
Name ---beta2.htm beta4.htm beta5.htm ------3 files
-D
When the zipfile is created with the -r option (include subdirectories) this option suppresses the addition of the subdirectory names themselves. Each file will still have its path specified unless the -j option is used.
-f
Using the file names that are already compressed in zipfile, the original source locations are checked for newer versions of those files. Any file that is newer is updated by replacing the version that is archived. >zip -q example *.txt >ww some.txt ; update this file ... >zip -f example freshening: some.txt (deflated 71%)
776 Zip
-F
Examine the archive file and correct any errors found. >zip zip: zip: zip: zip: zip:
-F example reading examplemenu.command reading examplescreen.command reading testgutenberg.command reading testit.command reading testprt.command
Display help text.
-j
Do not include the path when archiving a file. Compare the following two zips: >zip example /corona-cd/*.htm adding: corona-cd/beta2.htm adding: corona-cd/beta3.htm adding: corona-cd/beta4.htm adding: corona-cd/beta5.htm adding: corona-cd/beta6.htm
(deflated (deflated (deflated (deflated (deflated
65%) 62%) 67%) 63%) 63%)
>zip -j example2 /corona-cd/*.htm adding: beta2.htm (deflated 65%) adding: beta3.htm (deflated 62%) adding: beta4.htm (deflated 67%) adding: beta5.htm (deflated 63%) adding: beta6.htm (deflated 63%) -l
Convert CR to CR,LF while archiving each file. This option is useful if you are archiving a THEOS text file and you know that it will be used on a DOS/Windows system.
-ll
Convert CR,LF to CR while archiving each file. This option is useful if you are archiving a file that originated on a DOS/WIndows system and you know that it will be restored onto THEOS systems.
-m
Each file that is added to the zip archive is deleted from the source location.
-o
Set the date for the zipfile to the date of the newest file added to the zipfile.
-q
Quiet mode. This is the equivalent of the NOTYPE option used by other THEOS commands.
-r
Similar to the SUBDIR option of the CopyFile command, the subdirectories of the current working directory are included when Zip searches for the files to include in the archive.
Zip
777
Commands
-h
-t mmddyyyy Of the files listed in filelist, only those files with a last
change date on or after the date specified here are added or updated in the zipfile. -T
Test integrity of the zip file.
Commands
>zip -T mailwavs test of MAILWAVS.zip OK -u
Update the files already compressed in the zipfile. When no filename list is provided, all of the current files in the zipfile are tested to see if they are older than the files in the original directory. >zip -q example *.* >touch some.file File "/MYDIRECTORY/SOME.FILE:S" touched: 02/20/2002 10:58:49 One file changed >zip -u example updating: some.file (deflated 53%)
-v
Enables verbose operation. Compare the following two commands: >zip example1 test.* adding: test.direct (deflated 99%) adding: test.indexed (deflated 100%) adding: test.keyed (deflated 99%) adding: test.lisam (deflated 87%) >zip -v example2 test.* adding: test.direct (in=1280) (out=12) (deflated 99%) adding: test.indexed (in=15996) (out=45) (deflated 100%) adding: test.keyed (in=4069) (out=21) (deflated 99%) adding: test.lisam.... (in=176560) (out=23125) (deflated 87%) total bytes=197905, compressed=23203 -> 88% savings
-z
Add a multiple-line comment to the zipfile. After the requested files are compressed and added to zipfile you are asked to enter your comment. Although it accepts and saves multiple lines of text, generally, only the last line will be displayed by the UnZip command when you list the contents. To terminate the comment, enter a line with a period character only. >zip -z example1 test.* adding: test.direct (deflated 99%) adding: test.indexed (deflated 100%) adding: test.keyed (deflated 99%) adding: test.lisam (deflated 87%) enter new zip file comment (end with .): This is just a test of the comment capability.
778 Zip
.
-0
Do not compress the files, just store them in the zipfile.
-1
Compress the files into zipfile faster at the expense of the compression factor. That is, it doesn’t make it quite as small as it would if the -1 option were not used.
Notes
This program, and the UnZip program, are implementations of the UnZip and Zip programs from Info-ZIP. Info-ZIP provides free, portable, highquality versions of the Zip and UnZip compressor-archiver utilities that are compatible with the DOS-based PKZIP by PKWARE, Inc. This version is available for most other operating system platforms. Information about Info-ZIP may be found on the Internet at http://www.info-zip.org/.
See also
UnZip
Zip
779
Commands
A zip file may have only one comment. That is, when you are adding files to an existing zipfile and you specify a comment, the new comment replaces any comment that the zipfile may have had in it. However, the comments that may be added on a file-by-file basis (see the option -c) are not replaced unless the specific file is replaced.
780 Zip
Commands
A: Contacting THEOS Support for THEOS Corona and other THEOS products is provided to authorized dealers and reseller’s of THEOS products. End users should contact their THEOS dealer regarding questions or problems relating to installation or operation of the THEOS operating system and other THEOS products. THEOS Support Services for Resellers and Distributors are designed to provide the type of assistance best suited to your needs. Support options range from no-cost / low-cost information services on the World Wide Web to THEOS on-site training classes, fee-based direct support or an annual support contract. Depending upon your needs and budget, you may choose any one of these options or combine several into a custom program suitable to your requirements. When contacting Technical Support, include or be prepared to provide the following information: Product name and version number. Product patch level (use the SHOW VERSION command). Operating system serial number (displayed on bootup or use the SHOW SERIAL command).
Operating system version number (displayed on bootup or use the SHOW VERSION command). Type of hardware being used. What happened and what you were doing when the problem occurred. The exact wording of any messages that appeared on the screen(s). How you tried to solve the problem. If you are contacting support via the Internet help desk or email, attach the file created by the Config command. Dealers and THEOS resellers may contact THEOS Technical Support by mail, fax, telephone or the Internet. The following is a list of the help resources available to THEOS dealers and developers.
781
On-line system helps. Virtually all THEOS software has some form of online help available. Because it is the easiest, this should be checked first to see if it has information or advice about the situation or feature that you are trying to use.
Commands
Manuals. Printed or on-line manuals should be checked before contacting THEOS. The current version of a manual may be downloaded from the internet in PDF form by accessing the THEOS web site at: http://www.theos-software.com/manual/ If the information in the manual does not answer your question then please inform technical support about that when you contact them. Internet help desk. For SDK dealers and developers, a knowledge base of previously reported problems is available on the Internet. http://helpdesk.theos-software.com http://www.theos-software.com/support/ If you cannot find the answer in the on-line help system or in the product manual then check this help desk to see if the problem or question has been asked by another dealer. If you cannot find a previous report that addresses the problem then post your query here. It will be answered promptly and the dialog about your problem will become available in the future to help other dealers and developers should they encounter a similar situation. Attachments can and should be included with your postings when appropriate. Typical attachments would be sample code, system configuration dumps, etc. Internet e-mail technical support representative. All THEOS dealers are assigned to a specific support representative. Questions posted on the Internet help desk are automatically forwarded to your assigned representative. Direct e-mail to your representative should only be done when the problem involves beta or pre-release software or when responding to a query from your representative. If you do not know your support representative’s email address, you can send your request to: [email protected]
782
Internet “Dealer Forum” and “Corona Forum”. For SDK dealers and developers a general dealer-to-dealer forum and a Corona-specific dealerto-dealer forum are available on the THEOS web site. These forums should be monitored by all dealers and can be used by SDK dealers to inform other dealers about a situation that you have encountered or to report and ask other dealers about marketing opportunities, application design questions, hardware availability, etc.
This is a dealer-to-dealer forum and THEOS staff do not generally reply to questions posted in the forum. Internet “Ask THEOS Forum”. For SDK dealers and developers a forum is available on the THEOS web site that allows you to post questions to THEOS engineering staff. This forum should be used when you have questions that THEOS engineering staff or THEOS management might be able to answer about marketing, future directions of THEOS software, etc. http://www.theos-software.com/forums/ Telephone technical support representative. Telephone support is available to all dealers but should be used only when the problem you are encountering is of a very urgent or site-down situation. 1-925-935-1118 ext 211 Hours: Monday-Friday, 8:30am - 4:30pm, Pacific Time Fax technical support representative. Material may be faxed to THEOS support. This should be done when you have paperwork to communicate about a problem and the papers are not generated by computer or cannot be scanned in for transmission as e-mail/helpdesk attachments. 1-925-935-1177 Postal service mail, Package delivery services. Although dealers may mail questions and materials to THEOS support representatives, because of the time required for delivery you should only do so when there is a lot of paperwork involved in the question or there is product that needs to be returned to THEOS Software Corporation. When sending questions or product you should also send e-mail to your support representative informing them that the package is being sent. THEOS Technical Support THEOS Software Corporation 1801 Oakland Boulevard, Suite 315 Walnut Creek, CA 94596-7000
783
Commands
http://www.theos-software.com/forums/
784
Commands