ITS wiki

The Incompatible Timesharing System

User Tools

Site Tools


luser

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
luser [2015-12-29 16:24] – [Directories and files] victorluser [2016-03-05 16:42] (current) – [LOCK] victor
Line 2: Line 2:
 ====== A Luser's Guide to ITS ====== ====== A Luser's Guide to ITS ======
  
 +<note>
 Disclaimer: I write this as friendly advice to new users of ITS, and the term "luser" is not meant degeneratively. I'm still discovering ITS myself, and while I know PDP-10 assembly language, TECO and DDT from my TOPS-20 days, I'm probably still an ITS luser myself. I'm working on it, though...  Disclaimer: I write this as friendly advice to new users of ITS, and the term "luser" is not meant degeneratively. I'm still discovering ITS myself, and while I know PDP-10 assembly language, TECO and DDT from my TOPS-20 days, I'm probably still an ITS luser myself. I'm working on it, though... 
 +</note>
 ===== ITS is an open system ===== ===== ITS is an open system =====
  
Line 26: Line 26:
  
  
-  * Don't overwrite files in other directories than your own. If you do it anyway, please let someone know so they can perhaps do something about it. ({{emacs_init|Here}} is a piece of TECO for your EMACS init file to help against involuntary disasters.)+  * Don't overwrite files in other directories than your own. If you do it anyway, please let someone know so they can perhaps do something about it. ([[emacs_init|Here]] is a piece of TECO for your EMACS init file to help against involuntary disasters.)
   * Please try to shut the system down nicely if you have to, instead of crashing it (or its host system). This minimizes the risk of filesystem breakage.   * Please try to shut the system down nicely if you have to, instead of crashing it (or its host system). This minimizes the risk of filesystem breakage.
  
Line 41: Line 41:
     *    <key>^_</key> is (probably) the Help character in EMACS, but also a special escape character in ITS, so you have to type it twice!     *    <key>^_</key> is (probably) the Help character in EMACS, but also a special escape character in ITS, so you have to type it twice!
     *    The key marked <key>BACKSPACE</key> or <key>RUBOUT</key> or <key>DELETE</key> is different from <key>^H</key> (<key>CTRL-H</key>). The first typically removes the previous character. The latter (<key>^H</key>) typically moves backwards through a file, or in DDT, resumes the current program (but for full details, try '':DDTDOC ^H'').     *    The key marked <key>BACKSPACE</key> or <key>RUBOUT</key> or <key>DELETE</key> is different from <key>^H</key> (<key>CTRL-H</key>). The first typically removes the previous character. The latter (<key>^H</key>) typically moves backwards through a file, or in DDT, resumes the current program (but for full details, try '':DDTDOC ^H'').
 +
 +If your connection is lost and you connect again, your old job (set of processes) is probably still around.
 +  * Sometimes ITS detects your disconnection, "detaches" your old job from its "terminal", and offers you to attach it when you log in the next time. If you get prompted ''--Attach Your Detached Tree--'' when you log in, just press <key>SPACE</key> to say "yes" (or <key>RUBOUT</key> for "no").
 +  * Sometimes ITS doesn't detect your disconnection. When you log in again, your visible username will have a "0" (or "1", "2" etc) at the end, and if you try '':FINGER'' you see your old job without the "0". You can then "reattach" the old job (replace your new job with the old one) by using the command '':REATTACH uname/K'' where uname is your username (without the "0" etc).
 +
  
 ===== Some commands ===== ===== Some commands =====
Line 67: Line 72:
 :: lists the files in the default directory. Also try '':LF'', which is different. !! :: lists the files in the default directory. Also try '':LF'', which is different. !!
  
- +More commands: 
-  * For a fun introduction to more commands, read [[hactrn|The HACTRN]] by Guy L. Steele.+  * For a fun introduction to more commands, read [[http://victor.se/bjorn/its/hactrn.php|The HACTRN]] by Guy L. Steele.
   * For a gentle introduction to more commands, read {{AI_WP_235.pdf|Getting Started Computing at the AI Lab}} especially chapter 6.   * For a gentle introduction to more commands, read {{AI_WP_235.pdf|Getting Started Computing at the AI Lab}} especially chapter 6.
   * For a serious introduction to DDT/HACTRN, read the [[http://victor.se/bjorn/its/ddt.html|DDT Primer and Reference Manual]], e.g. by using the command :INFO DDT.   * For a serious introduction to DDT/HACTRN, read the [[http://victor.se/bjorn/its/ddt.html|DDT Primer and Reference Manual]], e.g. by using the command :INFO DDT.
-  * For historical information, read the Wikipedia article.+  * For historical information, read the Wikipedia article on the [[wp>Incompatible Timesharing System]].
  
 ===== Directories and files ===== ===== Directories and files =====
Line 78: Line 83:
  
 File names have four components. Each can be up to six characters. File names have four components. Each can be up to six characters.
-  *         Device, ended by : (colon), e.g. DSK: or MD: (ITS host name) +  *         Device, ended by '':'' (colon), e.g. ''DSK:'' or ''MD:'' (an ITS host name) 
-  *         Directory, ended by ; (semicolon), e.g. USERS1;, .TEMP.;, or HACK;.+  *         Directory, ended by '';'' (semicolon), e.g. ''USERS1;''''.TEMP.;'', or ''HACK;''.
   *         "FN1" (File Name 1), the "main file name".   *         "FN1" (File Name 1), the "main file name".
-  *         "FN2" (File Name 2), separated from FN1 by a space. FN2 is used for file type (e.g. BIN) or more often for file version/generation.+  *         "FN2" (File Name 2), separated from FN1 by a space. FN2 is used for file type (e.g. ''BIN'') or more often for file version/generation.
 Example: "MD:.INFO.;DDTORD >". Example: "MD:.INFO.;DDTORD >".
 Sometimes filenames are shown in another order, as DIR; DEV: FN1 FN2. Sometimes filenames are shown in another order, as DIR; DEV: FN1 FN2.
  
 About file versions: About file versions:
-  *         If you //write// a file FOO >, you create the next version of FOO. If FOO 41 exists, you create FOO 42. +  *         If you //write// a file ''FOO >'', you create the **next** version of FOO. If ''FOO 41'' exists, you create ''FOO 42''
-  *         If you //read// a file FOO >, you read the latest version (or largest version number).+  *         If you //read// a file ''FOO >'', you read the latest version (or largest version number).
   *         The FN2 "<" represents the oldest (lowest) version.   *         The FN2 "<" represents the oldest (lowest) version.
-  *         So you may need to clean up once in a while, e.g. by using the H command in DIRED (in EMACS).+  *         So you may need to clean up once in a while, e.g. by using the <key>H</key> command in DIRED (in EMACS).
  
  
Line 99: Line 104:
 The program used for (among other things) shutting down the system cleanly. The program used for (among other things) shutting down the system cleanly.
  
-  *         Type :LOCK to start it, and it prompts you with _ (underscore). +  *         Type '':LOCK'' to start it, and it prompts you with _ (underscore). 
-  *         To schedule a shutdown, give the command nDOWN, where n is the number of minutes to wait (minimum 5). +  *         To schedule a shutdown, give the command ''nDOWN'', where ''n'' is the number of minutes to wait (minimum 5). 
-  *         You are now asked if you really want the system to go down. Answer y if you really do. +  *         You are now asked if you really want the system to go down. Answer <key>y</key> if you really do. 
-  *         You are then asked to enter a brief message to users, ended by ^C. Please do.+  *         You are then asked to enter a brief message to users, ended by <key>^C</key>. Please do.
  
 The system will start shutting down when either the n minutes have passed, or all users have logged out. (Please do not quit KLH10 or shut down the host system until ITS has shut down completely, which is visible on its console or by observing the CPU usage of kn10-ks going up towards 100%.) The system will start shutting down when either the n minutes have passed, or all users have logged out. (Please do not quit KLH10 or shut down the host system until ITS has shut down completely, which is visible on its console or by observing the CPU usage of kn10-ks going up towards 100%.)
Line 108: Line 113:
 To cancel a shutdown, use the REVIVE command of LOCK.  To cancel a shutdown, use the REVIVE command of LOCK. 
  
-From HUMOR;JARGON 68 [August 1983]:+==== DSKUSE ==== 
 +'':DSKUSE'' 
 +shows how full your current directory is. 
 +'':DSKUSE hack;'' 
 +shows how full the HACK; directory is. 
 + 
 +==== PRUFD ==== 
 +'':PRUFD''  
 +PRints the User File Directories, i.e., lists the directories on disk. 
 +===== Footnotes ===== 
 + 
 +==== Lusers ==== 
 + 
 + 
 +From ''HUMOR;JARGON 68'' [August 1983]: 
 + 
 +  ?? LUSER 
 +::    See USER. !! 
 +  ?? USER n. 
 +::    A programmer who will believe anything you tell him. One who asks questions. Identified at MIT with "loser" by the spelling "luser". See REAL USER. !! 
 + 
 +[Note by GLS: I don't agree with RF's definition at all. Basically, there are two classes of people who work with a program: there are implementors (hackers) and users (losers). The users are looked down on by hackers to a mild degree because they don't understand the full ramifications of the system in all its glory. (A few users who do are known as real winners.) It is true that users ask questions (of necessity). Very often they are annoying or downright stupid.]  
 + 
 +==== Alice's PDP-10 ==== 
 +(See [[http://www.hactrn.net/sra/alice/alices.pdp10|Alice's PDP-10]].)
  
-LUSER +You can hack anything you want, with TECO and DDT.\\ 
-    See USER.  +You can hack anything you want, with TECO and DDT.\\ 
-USER n+$U in and begin to hack.\\ 
-    A programmer who will believe anything you tell him. One who asks questions. Identified at MIT with "loser" by the spelling "luser"See REAL USER+Twiddle bits in a core dump and write 'em back.\\ 
-    [Note by GLS: I don't agree with RF's definition at allBasicallythere are two classes of people who work with a program: there are implementors (hackers) and users (losers). The users are looked down on by hackers to a mild degree because they don't understand the full ramifications of the system in all its glory. (A few users who do are known as real winners.It is true that users ask questions (of necessity). Very often they are annoying or downright stupid.] +You can hack anything you want, with TECO and DDT.\\ 
 +(But be careful typing <RET>)\\ 
 +With TECO and DDT! 
  
luser.1451402664.txt.gz · Last modified: by victor