ITS wiki

The Incompatible Timesharing System

User Tools

Site Tools


luser

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
luser [2015-12-29 16:28] – [LOCK] victorluser [2016-03-05 16:42] (current) – [LOCK] victor
Line 2: Line 2:
 ====== A Luser's Guide to ITS ====== ====== A Luser's Guide to ITS ======
  
 +<note>
 Disclaimer: I write this as friendly advice to new users of ITS, and the term "luser" is not meant degeneratively. I'm still discovering ITS myself, and while I know PDP-10 assembly language, TECO and DDT from my TOPS-20 days, I'm probably still an ITS luser myself. I'm working on it, though...  Disclaimer: I write this as friendly advice to new users of ITS, and the term "luser" is not meant degeneratively. I'm still discovering ITS myself, and while I know PDP-10 assembly language, TECO and DDT from my TOPS-20 days, I'm probably still an ITS luser myself. I'm working on it, though... 
 +</note>
 ===== ITS is an open system ===== ===== ITS is an open system =====
  
Line 26: Line 26:
  
  
-  * Don't overwrite files in other directories than your own. If you do it anyway, please let someone know so they can perhaps do something about it. ({{emacs_init|Here}} is a piece of TECO for your EMACS init file to help against involuntary disasters.)+  * Don't overwrite files in other directories than your own. If you do it anyway, please let someone know so they can perhaps do something about it. ([[emacs_init|Here]] is a piece of TECO for your EMACS init file to help against involuntary disasters.)
   * Please try to shut the system down nicely if you have to, instead of crashing it (or its host system). This minimizes the risk of filesystem breakage.   * Please try to shut the system down nicely if you have to, instead of crashing it (or its host system). This minimizes the risk of filesystem breakage.
  
Line 72: Line 72:
 :: lists the files in the default directory. Also try '':LF'', which is different. !! :: lists the files in the default directory. Also try '':LF'', which is different. !!
  
- +More commands: 
-  * For a fun introduction to more commands, read [[hactrn|The HACTRN]] by Guy L. Steele.+  * For a fun introduction to more commands, read [[http://victor.se/bjorn/its/hactrn.php|The HACTRN]] by Guy L. Steele.
   * For a gentle introduction to more commands, read {{AI_WP_235.pdf|Getting Started Computing at the AI Lab}} especially chapter 6.   * For a gentle introduction to more commands, read {{AI_WP_235.pdf|Getting Started Computing at the AI Lab}} especially chapter 6.
   * For a serious introduction to DDT/HACTRN, read the [[http://victor.se/bjorn/its/ddt.html|DDT Primer and Reference Manual]], e.g. by using the command :INFO DDT.   * For a serious introduction to DDT/HACTRN, read the [[http://victor.se/bjorn/its/ddt.html|DDT Primer and Reference Manual]], e.g. by using the command :INFO DDT.
-  * For historical information, read the Wikipedia article.+  * For historical information, read the Wikipedia article on the [[wp>Incompatible Timesharing System]].
  
 ===== Directories and files ===== ===== Directories and files =====
Line 83: Line 83:
  
 File names have four components. Each can be up to six characters. File names have four components. Each can be up to six characters.
-  *         Device, ended by : (colon), e.g. DSK: or MD: (ITS host name) +  *         Device, ended by '':'' (colon), e.g. ''DSK:'' or ''MD:'' (an ITS host name) 
-  *         Directory, ended by ; (semicolon), e.g. USERS1;, .TEMP.;, or HACK;.+  *         Directory, ended by '';'' (semicolon), e.g. ''USERS1;''''.TEMP.;'', or ''HACK;''.
   *         "FN1" (File Name 1), the "main file name".   *         "FN1" (File Name 1), the "main file name".
-  *         "FN2" (File Name 2), separated from FN1 by a space. FN2 is used for file type (e.g. BIN) or more often for file version/generation.+  *         "FN2" (File Name 2), separated from FN1 by a space. FN2 is used for file type (e.g. ''BIN'') or more often for file version/generation.
 Example: "MD:.INFO.;DDTORD >". Example: "MD:.INFO.;DDTORD >".
 Sometimes filenames are shown in another order, as DIR; DEV: FN1 FN2. Sometimes filenames are shown in another order, as DIR; DEV: FN1 FN2.
  
 About file versions: About file versions:
-  *         If you //write// a file FOO >, you create the next version of FOO. If FOO 41 exists, you create FOO 42. +  *         If you //write// a file ''FOO >'', you create the **next** version of FOO. If ''FOO 41'' exists, you create ''FOO 42''
-  *         If you //read// a file FOO >, you read the latest version (or largest version number).+  *         If you //read// a file ''FOO >'', you read the latest version (or largest version number).
   *         The FN2 "<" represents the oldest (lowest) version.   *         The FN2 "<" represents the oldest (lowest) version.
-  *         So you may need to clean up once in a while, e.g. by using the H command in DIRED (in EMACS).+  *         So you may need to clean up once in a while, e.g. by using the <key>H</key> command in DIRED (in EMACS).
  
  
Line 104: Line 104:
 The program used for (among other things) shutting down the system cleanly. The program used for (among other things) shutting down the system cleanly.
  
-  *         Type :LOCK to start it, and it prompts you with _ (underscore). +  *         Type '':LOCK'' to start it, and it prompts you with _ (underscore). 
-  *         To schedule a shutdown, give the command nDOWN, where n is the number of minutes to wait (minimum 5). +  *         To schedule a shutdown, give the command ''nDOWN'', where ''n'' is the number of minutes to wait (minimum 5). 
-  *         You are now asked if you really want the system to go down. Answer y if you really do. +  *         You are now asked if you really want the system to go down. Answer <key>y</key> if you really do. 
-  *         You are then asked to enter a brief message to users, ended by ^C. Please do.+  *         You are then asked to enter a brief message to users, ended by <key>^C</key>. Please do.
  
 The system will start shutting down when either the n minutes have passed, or all users have logged out. (Please do not quit KLH10 or shut down the host system until ITS has shut down completely, which is visible on its console or by observing the CPU usage of kn10-ks going up towards 100%.) The system will start shutting down when either the n minutes have passed, or all users have logged out. (Please do not quit KLH10 or shut down the host system until ITS has shut down completely, which is visible on its console or by observing the CPU usage of kn10-ks going up towards 100%.)
Line 113: Line 113:
 To cancel a shutdown, use the REVIVE command of LOCK.  To cancel a shutdown, use the REVIVE command of LOCK. 
  
 +==== DSKUSE ====
 +'':DSKUSE''
 +shows how full your current directory is.
 +'':DSKUSE hack;''
 +shows how full the HACK; directory is.
 +
 +==== PRUFD ====
 +'':PRUFD'' 
 +PRints the User File Directories, i.e., lists the directories on disk.
 ===== Footnotes ===== ===== Footnotes =====
 +
 +==== Lusers ====
  
  
Line 124: Line 135:
  
 [Note by GLS: I don't agree with RF's definition at all. Basically, there are two classes of people who work with a program: there are implementors (hackers) and users (losers). The users are looked down on by hackers to a mild degree because they don't understand the full ramifications of the system in all its glory. (A few users who do are known as real winners.) It is true that users ask questions (of necessity). Very often they are annoying or downright stupid.]  [Note by GLS: I don't agree with RF's definition at all. Basically, there are two classes of people who work with a program: there are implementors (hackers) and users (losers). The users are looked down on by hackers to a mild degree because they don't understand the full ramifications of the system in all its glory. (A few users who do are known as real winners.) It is true that users ask questions (of necessity). Very often they are annoying or downright stupid.] 
 +
 +==== Alice's PDP-10 ====
 +(See [[http://www.hactrn.net/sra/alice/alices.pdp10|Alice's PDP-10]].)
 +
 +You can hack anything you want, with TECO and DDT.\\
 +You can hack anything you want, with TECO and DDT.\\
 +$U in and begin to hack.\\
 +Twiddle bits in a core dump and write 'em back.\\
 +You can hack anything you want, with TECO and DDT.\\
 +(But be careful typing <RET>)\\
 +With TECO and DDT! 
  
luser.1451402883.txt.gz · Last modified: by victor