ManualTheosCorona PDF
ManualTheosCorona PDF
System Commands
Reference
First Edition: September, 2002
The software described in this document is furnished under a license agreement or nondisclosure agreement. The soft-
ware may be used only in accordance with the terms of the agreement. Information in this document is subject to
change. No part of this manual may be reproduced, transmitted, transcribed or translated into any language in any
form by any means without the written permission of THEOS Software Corporation. Printed in the United States of
America.
Telephone: 925-935-1118
Fax: 925-935-1177
E-mail: [email protected]
WWW: http://www.theos-software.com
THEOS® and the THEOS logo are registered trademarks of THEOS Software Corporation. Microsoft®, Windows®,
Windows 95® and Windows NT® are registered trademarks of Microsoft Corporation.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Attach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Calculator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Calendar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Cat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
CDPlayer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
ChDir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
ClassGen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Color . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Compare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Compress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
CopyFile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
CRLF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
CRT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Decrypt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Dial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
DialNet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Echo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Edit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Eject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
EmailChk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
EmailDel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
EmailGet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
EmailPut . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Encrypt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Expand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
3
File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
FileList . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
FileManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
FileType. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Find . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Finger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
FTP Script File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
GetFile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Head. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Ident . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Img. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
IXDiag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Keyword. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Killfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
LineEdit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
LogName . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Logoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Look . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Lowcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
MakeBoot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Mixer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
MkDir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
More. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Move . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Msg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Net Interactive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Net ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Net Browse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Net Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Net Receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Net Send . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Net Share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Net Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
4
Net Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Net Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Net Stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Net IPCFG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Net service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
NetTerm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
NsLookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Peek . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Play. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
POP3Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
PutFile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
PWD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Quote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Reboot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Reminder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Remote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Rename. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Repeat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Replace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
RMCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
RmDir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
See . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Send . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
SendMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
ShutDown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
Sleep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Sort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Split . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Spooler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
5
Stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
SUMode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
SysEd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Sysgen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Tail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597
TArchive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
TBackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
TBrowse. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Tee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
THEO+COM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
TheoMail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
TIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
Using TIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
Touch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
TraceRT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
TWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
ALIGN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
BARCODES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
CHANGE_AREA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
CHECK_PRINTER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
CLOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
COLOR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
DEFAULT_UNITS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
FIELD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
FILE_RECORDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
FONT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
IMAGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
LIST_FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
MODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
NEW_FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
PICTURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
PRINT_NEXT_PAGE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
PRINT_RECORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
PRINT_TXT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
PRINT_WINDOW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
REC_PAGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
ROTATE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 701
SELECT_AREA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
SETPOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
SIZE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
6
STYLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
TEXT_FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
UnErase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
UnInstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Unique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Unload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
Unnumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
UnZip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 721
Upcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727
Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
VNC Client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
WhereIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 739
Which . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Who. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
WhoAmI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
WhoIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
wBypass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
wClear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
wClip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
wClose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
wColor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
wFinish. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
wFrame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
wInvert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
wMenu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
wMove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
wMsgBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 754
wOpen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756
wRefresh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757
wRemove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
wRestore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
wSave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
wSelect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
wStat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
wSwitch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
wTitle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
WinWrite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
WordCount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Zip. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
Appendices
A Contacting THEOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
7
8
List of Tables
1 RAM Disk Names and Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
9
10
Introduction
This manual describes each of the commands provided with the THEOS 32
operating system. They are arranged in alphabetical order by thier com-
mand names.
Introduction 11
Documentation Conventions
Throughout this manual, syntax is used that looks like:
MAILBOX user
MAILBOX user text
MAILBOX user file
MAILBOX ( option
LIST file ( FILES option…
These symbols are used to show the correct syntax for typing the com-
mand.
(EnterÌ˛) Specific keys on the keyboard are shown with a “Key Caps”
font.
These standards are used in the formal definitions of the syntax of a com-
mand or feature and in the descriptive text of the feature. The descriptive
text also uses the following typographic conventions to identify the various
items described.
File names File names that appear in text are always shown in small caps.
For instance, the SYSTEM.THEOS32.DEVNAMES file.
12 Documentation Conventions
Account Command
1 C omm a nds
1 ACCOUNT drive
Commands
2 ACCOUNT drive ( option
Operation For all modes the drive parameter is optional. It tells the Account command
which drive to find the /THEOS/CONFIG/ACCOUNT.BIN file. By default, Account
uses the S drive. Specify another drive when you want to maintain the
accounts on another disk, such as your emergency boot diskette.
Commands 13
Options DELETE account Deletes an existing account definition. Specify the
account name immediately following the DELETE keyword.
IDENT Use with the PRTnn or TYPE option to request that the account
listing be in account number sequence. This is the default
sequence for account listings. For a description of the account
listing display, refer to “Listing Accounts” on page 18.
IMPORT filename Merges the account definitions in filename with the cur-
rently defined definitions on this system. Any duplicate
accounts names are replaced with the account definitions in
filename.
SORT Used with the PRTnn or TYPE option to request that the
account listing is in account name sequence. For a description
of the account listing display, refer to “Listing Accounts” on page
18.
TYPE Lists all of the existing accounts on the console. The options
IDENT or SORT may be used in combination with this option.
When neither is used, the accounts are listed in account num-
ber sequence. Refer to “Listing Accounts” on page 18.
14 Account
Add Options COPY acct-name Specifies that the new account definition will default to
the switches and environment variables defined for the
account acct-name specified. When the acct-name exists the
settings for the PROMPT prompt-string, CSI case mode, SUBDIR
directory, PRIVLEV value, Decimal is comma, Language, and
Work drive are copied from the acct-name definition to this
new account definition. Also, any user-defined variables speci-
fied in the current definition of acct-name are copied to this
Commands
new account definition.
FULLNAME name The name is a free format name that will be assigned to
the FullName environment variable when a user logs onto this
account.
HOME directory Enter the directory name that you want any user to use
as their “home” directory. This is not necessarily the starting
or initial current working directory, which is set by the SUBDIR
directory option. The HOME directory is the quick access direc-
tory that can be quickly set as the current working directory by
merely entering the CD command. It is also set as the Home
environment variable which can be used by applications for
their own purposes.
PASSWORD password Specifies the password for the account. The pass-
word is specified immediately following the PASSWORD key-
word. When this option is not used the new account will have
no password.
PRIVLEV value Specifies the privilege level for the new account. Privilege
levels are in the range 0–9. When this option is not used a priv-
ilege level of 1 is assigned to the account.
Account 15
PROMPT prompt-string Specifies the CSI command prompt for the new
account. When this option is not used the currently defined
prompt is used for the new account.
The directory specified here does not have to exist at this time.
However, it should exist when the account is next used by
Logon. If the directory does not exist when you log onto this
account the HOME directory is set to the root.
SYNONYM name Specifies the synonym account name for the new
account. The synonym account name is specified immediately
following the SYNONYM keyword. The synonym account must
be an existing account name. The new account is assigned the
same account number as the synonym account.
When this option is not used the new account is assigned the
next account number available.
USER name This option sets the UserName environment variable to name,
which is used by some utilities and applications to find any
user-specific configurations that may be defined. For a descrip-
tion of USER names, refer to the UserName description in the
THEOS Corona Version 5 Operating System Reference.
16 Account
Notes Refer to Appendix D: “System Files” in the THEOS Corona Version 5 Oper-
ating System Reference for a description of the file “Account.bin”.
The Account command can also be invoked via the Setup command.
Adding You can add new accounts using either the command-line mode (Mode 3) or
Accounts the interactive mode. (You can also add new accounts by importing them
from another systems account file. See “Importing Accounts” on page 19.)
Commands
Which method you choose depends upon your needs. The command-line
method only allows you to define some of the properties of the new
account. However, because they are the most important properties, it may
be sufficient for most uses.
The interactive method allows you to define all of the attributes of the new
account including password policies specific to the account, an account
description field, the various system switches, search sequence, command
path, default file-type, and any user-defined variables. For a description of
this method refer to the Setup Account command described in the THEOS
Corona Version 5 Operating System Installation and Setup Guide.
Deleting Account definitions can be deleted with the command-line option DELETE
Accounts account or by using the interactive mode of the Account command and using
the “Remove” button. Before deleting an account name first check to see if
there are any synonym accounts defined for it (list the accounts sorted by
account number). If the account does not have a synonym account name
defined check to see if there are any files owned by the account. Remember
to check any removable disks. DO NOT DELETE an account name that
does not have any synonyms and owns files.
When deleting an account name that owns files, either create a synonym
account name or use the Change command to change the ownership of the
files to another account that will not be deleted. Access to files owned by a
deleted account can be difficult.
Account 17
Listing All of the accounts defined can be listed on the console or on any of the
Accounts attached printers.
>account (type
account for the id. You can use the SORT option to sort the account listing
by account name sequence.
>account (type
18 Account
Importing The import option can be used to import the accounting structure from
Accounts another THEOS system, either a Corona system or an older THEOS 32,
Version 4.x system. For instance, if you have just installed a new Corona
system at a site that had an existing THEOS 32 system, you can copy the
accounting structure from that existing system by first copying it to a
floppy:
>copy system.theos32.account f
Commands
Then, put that floppy in the new system and:
Cautions Do not delete an account name if that account has any files and the
account does not have a synonym account name already defined.
Restrictions The Account command may be used by only one user at a time.
The Account command may only be executed when you are logged onto the
SYSTEM account (user number 0).
Account 19
Commands
20 Account
Attach Command
This command associates logical device names such as PRINTER with physical device driv-
ers and specifies the attachment options for a device.
Commands
2 ATTACH logical ( options
3 ATTACH logical
4 ATTACH
System commands and application programs perform input and output to devices by speci-
fying a logical device name. A logical device name is merely a standard name that any
program can use to communicate with a device such as a disk drive, tape drive, printer, con-
sole or general communications device. The operating system takes this request from the
program and passes it on to the physical device driver that is currently associated with the
particular logical device name.
For instance, a printer might be connected to the first serial port on the computer. When a
program wants to print something on that printer, it outputs data to the logical device name
PRT. The operating system passes the data to the SIO1 physical device driver which, in turn,
passes it on to the printer connected to the first serial port.
The Attach command is the primary method of changing the association of logical device
names with physical device drivers. Other methods include Start and Sysgen.
Attach 21
Operation Mode 1—Attaches the logical device name logical to the physical device
driver physical, with options. The following examples show the attachment
of the second hard disk drive to logical drive letter A, the attachment of the
COM1 logical device to the third serial port, with options and the attach-
ment of logical TAPE2 to a 250MB streaming tape drive.
>attach a disk2
>attach prt4
>attach g
This display is always output to the standard output device and thus can
be redirected to a file or another device:
22 Attach
When the standard output device is not the console, the title, column head-
ings and line graphics are not output.
Commands
The “Device” displayed is the first name or synonym name found in the
/THEOS/CONFIG/DEVNAMES.TXT:S file that matches the “Physical” parameters.
For a description of this file, refer to Appendix D: “System Files” in the
THEOS Corona Version 5 Operating System Reference.
Options ALF Applies to printer attachments only. Specifies that the printer
will perform an automatic line-feed upon receipt of a carriage
return character. Normally THEOS appends a line-feed to a
carriage return when sent to a printer. This option tells
THEOS to not append the line-feed because the printer will do
that automatically.
Bnnnnnn Specifies the baud rate (serial devices only). Valid baud rates
are dependent upon the physical device driver and are limited
to the following values: 110, 300, 600, 1200, 1800, 2400, 3600,
4800, 7200, 9600, 19200, 38400, 57600, 76800 and 115200.
Attach 23
Cnnn Applies to console and printer attachments only. Specifies the
class code for input and output translation for the console or
printer. For an explanation of class codes, refer to “Console
Class Codes” on page 69.
ter.
Enable Meaning
E0 Disables flow control.
E1 Synonym to DTR option.
E2 Synonym to XON option.
E3 Synonym to ETX option.
E4 Synonym to CTS option.
E5 Synonym to XPC option. PC Term software hand-
shaking. Similar to XON/XOFF handshaking
except that scan codes 103 and 101 are used to
enable/disable transmission.
24 Attach
The line-length value for printers may be any value in the
range 1–254.
Commands
To change the line length of a session on the main console, use
the Session command.
Attach 25
The page length value for printers may be any value in the
range 1–254.
Vnnn Applies to VDI devices only and specifies the VDI device driver
to use. See “Attaching VDI Graphics” on page 38.
26 Attach
If the device is a console with a PC Term class code specified,
then an XON request is interpreted as an XPC request.
Commands
Spooler The following options may be used when attaching a printer to the Spooler.
Options These options specify how subsequent reports sent to this printer will be
handled by the printer spooler. They do not affect reports already sent to
the printer spooler.
A–Z 26 forms/queues
a–z 26 forms/queues
#$%&*+-<=>^~ 12 forms/queues
Previous versions of the spooler supported only the first 26 queues. To pro-
vide compatibility with programs and procedures designed for previous
versions of the operating system, queue specifications default to the upper-
case queue letters.
Attach 27
To specify one of the lowercase queue letters you must enclose the queue
within quotation marks. The 12 special character queues may be specified
without quotation marks. For instance:
To specify one of the lowercase queue letters you must either enclose the
Commands
Attaching Your console is initially attached via the Sysgen configuration or from a
Consoles Start command issued from another console or user. You cannot detach
your own console.
The Attach command can be used to change the attachment of your console,
either to another device or merely changing one or more of the attachment
options. For instance:
The class code is very important when attaching a console. It controls both
how information is displayed on the screen and how keyboard characters
are interpreted.
To change the page or line length of a session on the main console, use the
Session command.
28 Attach
Attaching THEOS allows each user to have as many as 64 printers attached (PRT1
Printers through PRT64). Printers may be attached as private devices, public
devices, spooled printers and slave printers.
When attaching a printer you should specify a class code. A printer class
code tells THEOS how to translate the various font attribute requests such
as bold and italic. It also defines the translations for graphic and interna-
tional character sets.
Commands
A printer class code can define a printer setup string. This is a sequence of
characters that initializes the printer. This string is sent to the printer by
Attach when it is first attached. If the printer is not ready (powered off,
unplugged or off-line), Attach will display a message for approximately 10
seconds as it waits for the printer to become ready. If it is not ready at the
end of this time, the setup string is not sent but the printer will be
attached.
or
To attach a spooled printer the printer spooler must be started (see “Sys-
gen” on page 591 or “Spooler” on page 571). If the spooler is started, a
printer may be attached to it by using a command like:
or
Attach 29
Attaching Remote Network Printers
If your system is connected to a local area network (LAN) and one or more
of the other computers on the LAN have a printer connected and attached,
your system may be able to use that remote printer. What determines this
usability is whether or not the other computer has its printer server
started and whether or not your system has configured names for the con-
nection to the remote printer.
Commands
When attaching a network printer, do not specify the class code. Let the
definition of the physical name define the class code.
30 Attach
Attaching Physical disk drives may only be attached to logical disk drive letters A–Z.
Disks Logical drive S is always attached as the “system disk” and cannot be
changed with this command. Use the System command described on page
593 to reattach the system disk.
Commands
DosDiskC hard drive: C, D, etc.
THEOS floppy: F and G
Ram disk: M
CD Rom: R
Booted drive: S
Other THEOS hard drives: other letters
Most disk drives are attached when the system is booted, depending upon
the configuration defined with Setup Sysgen. Drives attached at boot time
are PUBLIC drives and every user that logs on to the system will have
those drives attached and available for usage.
The only option available when attaching a hard disk drive is the PUBLIC
option. Hard disk drive attachments are normally performed during
system bootup due to specifications in the Sysgen (see page 591).
Before a hard disk can be used for the first time it must be formatted.
Refer to the THEOS Corona Version 5 Operating System Installation and
Setup Guide for information about disk formatting and partitioning.
The only options available when attaching a floppy disk drive are PUBLIC
and STPnnn. Floppy disk drive attachments are also normally performed
during system bootup due to specifications in the Sysgen command.
Attach 31
Attaching DOSDiskA Floppy Disk Drives
>attach f floppy1
Commands
>attach a dosdiska
In the above example, both drive attachments refer to the same physical
diskette drive. When drive code F is referenced, the diskette in the drive
must have a THEOS file system. Similarly, when drive code A is refer-
enced the diskette in the drive must have a DOS or Windows file system.
The DOSDiskC physical device name refers to the boot disk’s DOS or Win-
dows partition. In a dual-boot system, you could access the Windows’ parti-
tion by attaching the drive:
>attach c dosdiskc
Once it is attached, you can access the drive in the same manner that you
would access it if it contained a THEOS file system. If your system has
additional drives that are formatted with DOS or Windows file system you
can attach them using other DOSDiskC drive names. The /THEOS/CON-
FIG/DEVNAMES.TXT file defines two additional DOSDiskC drive names:
DOSDISKD and DOSDISKE.
32 Attach
Attaching RAM Disk Drives
To attach a RAM disk, use one of the physical device names in the
/THEOS/CONFIG/DEVNAMES.TXT file that indicate it is a RAM disk. The specific
Commands
name used determines the physical size or capacity of the RAM disk.
You cannot attach a RAM disk that is larger than available memory, and
you should not attach a RAM disk that uses so much memory that it pre-
vents users from executing their programs.
Since a RAM disk is only a pseudo-disk, do not use it for long-term storage
because its contents are lost whenever the system is rebooted.
Attach 33
Attaching Image Disk Drives
>attach i image2
Any drive letter (other than S) can be used as the logical drive name and it
may be attached with the PUBLIC option.
When an image drive is attached, the Attach command first looks to see if it
can find a file named DISK.IMAGEn where the IMAGEn matches the device
name used. If it can find that file, it uses it as the image drive. When it
does not find the file it asks you for the image file name:
File Name. You must enter a file name. This name is used to find or create
a file on an existing attached drive that contains the image drive contents.
Be careful to use a name that is not an existing file name unless it is the
name of an existing image drive file. If you expect to be using this image
drive many times use the name DISK.IMAGEn where n is the number of this
image drive attachment. If the file exists, Attach uses it as the image drive
and does not change its contents.
If the file is not found you must specify the file size using one of the three
following methods.
34 Attach
Size MB. Enter a value here to create an image drive with a capacity mea-
sured in megabytes.
Size GB. Enter a value here to create an image drive with a capacity mea-
sured in gigabytes.
Size cylinders. Use these three field if you want to create an image drive
that has the same capacity as some real disk drive. For instance, if the
Commands
image drive will be used to hold a copy of a floppy diskette you would spec-
ify that it has 80 cylinders, 2 heads and 36 sectors. This image drive could
then be used to backup from or to a real diskette.
File System. Choose the file system for the image drive. A 4GB system
must be used if the image drive will be used as a copy of a diskette. In gen-
eral, except for diskette images, you should only use a 4GB file system on
an image drive if the image drive file will be shared with a THEOS 32 Ver-
sion 4.x system. An LFS file system provides more than just large files and
drives. It also has dynamic main directory size and dynamic library sizes.
You may also specify the image drive file name on the Attach command
line:
>attach i example.img:a
If the file does not exist, Attach responds with the same form as above but
the file name is already filled in with the name that you specified on the
command line.
After an image drive is attached, it can be used like any other disk drive.
If your system is connected to a local area network (LAN) your system may
be able to use directories and files on that remote system. What deter-
mines this usability is whether or not the other computer has given per-
mission to access its file system and defined a share name for a directory
on that file system.
When there is a share name to a directory on a remote file system you can
attach a drive letter to it by using UNC syntax:
>attach x //REMOTE-COMPUTER-NAME/SHARE-NAME
If you do not know the name of the remote computer then use the Net
Browse command to find all of the computers that you can currently access
on the network.
Attach 35
Attaching CD-ROM Drives
CD-ROM drives are accessed using the CDROM Installable File System
and they are attached similar to hard disk drives.
Attaching THEOS allows each user to have as many as four tape drives attached at
Commands
Tapes one time (TAPE1, TAPE2, TAPE3 and TAPE4). The only option available
when attaching a tape drive is the PUBLIC option. For instance:
Before a tape can be used for the first time it should be initialized. Refer to
“Tape” on page 597 for information about tape initialization. (TArchive
requires manual tape initialization; TBackup performs automatic initial-
ization prior to creating a new backup.)
This attaches the logical device name COM1 to the same port used by your
console and it does not change any of the existing settings used by the con-
sole. For instance, the baud rate, word length, parity, etc. remain
unchanged.
When using this type of attachment, the operation of the com port will
depend upon the COM=CON Default Bypass setting in the system configura-
tion file. Refer to the Sysgen command for a description of this setting.
36 Attach
“Self Testing” Communications
Commands
For instance, a pair of programs that are intended to communicate
between two THEOS systems via a COM port can be tested on a single
computer system by using two users on the system. The first user would
use an attachment like:
The second user on the same system would use an attachment like:
Attach 37
Attaching VDI A VDI or Virtual Device Interface device is a peripheral capable of display-
Graphics ing graphics. The main console can be used as a VDI device and also some
printers. Some PC Term terminals can also be used as VDI devices. Each
user may have as many as four VDI devices attached at one time (VDI1,
VDI2, VDI3 and VDI4).
or
or
Notes Except for the console and the optional slave printer, all other private
devices are detached when you log off and all publicly attached devices are
reattached when you log on. See “Logoff” on page 335.
The logical devices PRT1, COM1, TAPE1 and VDI1 can all be specified as
PRT, COM, TAPE and VDI respectively.
Defaults There are no built-in default options for an attachment. Any defaults used
by the Attach command are defined in the DEVNAMES.TXT file for the physical
device being attached. For a description of this file see Appendix D: “Sys-
tem Files”, “/Theos/Config Directory”, “Devnames.txt” on page 211 of the
THEOS Corona Version 5 Operating System Reference.
Cautions Be careful when reattaching the console. Because the console is the device
used to display the result of the attachment and to make further changes,
reattaching the console incorrectly might result in loss of control for your
process.
Restrictions The CON and S logical devices cannot be detached. (It is possible to define
a “user” that has no console. See “Start” on page 583.)
38 Attach
Backup Command
The Backup command makes an exact copy of one disk onto another disk or tape, or it
restores a backup copy from a tape to a disk.
Commands
2 BACKUP from-drive to-tape ( options
Operation Mode 1—This syntax causes BACKUP to copy the entire contents of from-
drive to the to-drive. The two drives may be any combination of hard disks,
floppy disks, RAM disks, image drives or network drives, but they must
both be the same capacity and format.
Mode 2—Creates a backup copy of the from-drive contents onto the to-
tape. The backup copy on the tape can only be used with a Mode 3 form of
the BACKUP command.
Mode 3—Restores a backup copy on the from-tape onto the to-drive. The
backup copy on the tape must have been created by a Mode 2 form of the
BACKUP command, and it must be a backup copy of a disk volume that has
the same capacity and format as the to-drive.
Mode 4—Creates a backup copy of the contents of drive by using one disk
drive only. drive must be a removable disk drive.
Backup 39
kette, copying the memory image to the destination diskette, and then
asking you to switch back to the source diskette. This process is repeated
until the entire source diskette is copied to the destination diskette.
This mode of the Backup command is most efficient when the BUFFER, TO
or FROM options are used.
Options ASK A default option that instructs Backup to ask the operator to
Commands
mount the source and destination volumes, and waits for con-
firmation that the proper volumes are mounted. For instance:
>backup f i
Source is Disk F
Destination is Disk I
Mount volumes now:
BUFFER Valid only with Mode 4 of the command. When used without
the FROM or TO options, this option causes Backup to use a
temporary file on the S drive as an image buffer of the single
drive backup.
40 Backup
MULTIUSER Allows Backup to copy a public drive even though other users
may be logged on and active. When Backup is instructed to per-
form a backup of a public disk, it requires single user mode. If
other users are logged onto the system, it displays the mes-
sage: “Must be single user or private volume.”
Using this option tells Backup to not restrict the backup to sin-
gle-user operation (the message is still displayed). THIS CAN
Commands
BE EXTREMELY DANGEROUS! If another user changes
some files while the backup is being created, the integrity of
the backup is lost.
Use this option only if you are sure that all other users are
inactive.
NOVERIFY Disables the verify after write operation. See VERIFY option
below.
VERIFY Applies only when the to-drive is a disk not a tape. This option
causes Backup to read each track of data immediately after
writing it to the to-drive. The information is then compared
with the original information from the from-drive. Only when
the data is the same does the backup continue to the next
track.
Backup 41
Notes When a backup is performed, both the from-drive and the to-drive are mod-
ified to reflect that the disk was the source or destination of a backup. For
instance, after a backup of the F drive:
>disk f
Disk F label "Programs".
Backup to disk "ProgCopy" on 10/26/01, at 13:20.
File system = THEOS/4GB.
Capacity = 1,474,560 (80 cylinders, 2 heads, 36 sectors).
Commands
While the backup copy is being created the current cylinder and head
number are displayed on the console. This information is provided so the
operator can see how the backup is progressing.
Cautions The MULTIUSER option tells the Backup command to not check whether or
not other users are logged on or active. It does not prevent those other
users from performing operations that change the database that’s being
backed up. If another user does change the database during the backup
operation, the integrity of the backup is compromised.
Backup always destroys the prior contents of the destination drive, before
any new data is written to the drive.
Restrictions The from-drive and the to-drive must have the same format. That is, they
must both have the same number of cylinders, heads and sectors.
42 Backup
Cache Command
The Cache command enables, disables, controls or reports on the disk cache. For a general
description of the THEOS disk caching capabilities, refer to “Disk Caching” on page 126.
1 CACHE
Commands
2 CACHE function
Operation Mode 1—Invokes the interactive mode of the Cache command as described
on page 44.
Functions DELAY OFF Disable disk write delay. Note that this also will disable direc-
tory write caching.
OFF Disable disk caching. When disk caching is disabled, the mem-
ory used by the disk cache is freed.
Cache 43
Cache Status When the STATUS command line option is used, or when Mode 1 of the
and Statistics Cache command is used, the following screen appears.
Display
Commands
This display remains on the screen and has two sections: a top section that
displays the Cache Status Display and a lower section showing the Cache
Statistics Display that is updated approximately once per second.
44 Cache
Cache Status Display
The top portion of the display shows the current disk cache settings. These
settings are controlled by the Cache command itself or from information
recorded in the Sysgen configuration.
Commands
Cache size (kilo- The value shown here indicates the amount of mem-
bytes) ory used by the disk cache system for caching data
from physical disks. It is shown in kilobytes so the
value illustrated in the previous figure reflects a six
megabyte disk cache.
Cache 45
Cache Statistics Display
The lower portion of the display shows the current cache statistics. This
information is updated approximately once per second, thus showing the
disk activity of other users and tasks.
Instantaneous hit rate: Shows the rate of success for the most
recent disk access requests over the last
three seconds, or so.
Average hit rate: Shows the overall rate of success reflect-
ing the percentage of the times a disk
access request was satisfied since disk
caching was enabled
Number of modified blocks: Shows the number of blocks of data cur-
rently in the disk cache that have not
been written to the physical disk yet.
Number of probes: Shows the total number of times that a
read or write request was made.
Number of hits: Shows the number of times that a request
for information from the disk was able to
be satisfied by information already in the
disk cache memory.
Number of syncs: Indicates the number of times that the
disk cache system has been forced to syn-
chronize itself with the physical disk.
(See SYNC function.)
Number of reads: Shows the number of times the disk
cache system has provided information
from a disk read request. This includes
the times when the information is
already in the disk cache memory and the
times that it had to read from the physi-
cal disk.
Number of writes: Shows the number of times the disk
cache system was asked to write informa-
tion to the disk. This includes the number
of blocks still in the cache memory wait-
ing to be written to the physical disk
(dirty blocks).
Number of bypasses Indicates the number of times that the
disk cache system was bypassed, proba-
bly due to a request from a large read or
write operation for “one time only” data.
Cache Statistics Display
46 Cache
Cache Control When using Mode 1 of the Cache command, when you select the “Control”
button, a form is displayed allowing you to change the various disk caching
parameters.
Commands
Notes A Cache SYNC operation is performed when you reboot the system using
Reboot or (Ctrl)+(Alt)+(Del).
Cautions The performance improvements when using disk caching with write delay
enabled are considerable. However, there is a slight risk to data integrity.
If a power failure occurs or if the system is reset between the time that a
program requests a disk write operation and when the disk caching soft-
ware actually performs the write to the physical disk, the data cannot be
written.
If this risk is unacceptable, you can still take advantage of disk caching
with write delay enabled and greatly reduce this risk by utilizing an on-
line uninterruptable power supply (UPS) for your computer system.
Cache 47
Commands
48 Cache
Calculator Command
CALCULATOR
Commands
Operation The displayed calculator is:
Notes With the calculator displayed you may perform the following actions:
Calculator 49
Mouse Keyboard Action
(%) Multiply the total by the current entry
interpreted as a percentage.
(R) Change the current entry to the reciprical
of that value.
(G) Change the sign of the current entry.
Commands
Return Code Upon exit from Calculator, the return code is set to the integer value of the
last displayed value.
Restrictions The values that may be entered or displayed are limited to 13 digits of pre-
cision and must be in a range of ±9.999999999999×10126.
50 Calculator
Calendar Command
1 CALENDAR
Commands
2 CALENDAR month
4 CALENDAR year
Initially, the current date is highlighted with a circle around the date. You
can highlight different days or change the calendar view by using the (˜),
(¤), (˚), (˙), (PageUp), (PageDown), (Home) and (End) keys. You can also use the
mouse to select different days, months or years.
Calendar 51
Mode 2—Displays the calendar for month in the current year in month
display format (see “Month Display” on page 53). The month may be speci-
fied as a month number of the year (1–12), a month name (January, Feb-
ruary, etc.) or with a month name abbreviation (Jan, Feb, Mar, etc.). For
example:
>calendar 3
>calendar March
Commands
>calendar mar
The above three commands will display the calendar for March of the cur-
rent year.
Mode 3—Displays the calendar for month in year in month display format
(see “Month Display” on page 53). The month may be specified as it is for
Mode 2. The year may be specified as a year number in the current century
(0–99) or as a complete year number (1776, 1812, 1997, 2004, etc.). See
“Date Limitations” on page 52. For instance:
Mode 4—Displays the calendar for year in year display format (see “Year
Display” on page 53). The year may be specified as in Mode 3, with the
exception of current century years less than 13. To avoid confusion with a
Mode 2 request, years between 1–12 must be specified with their century
number (1901, 1902, etc.). For example:
Date Only Gregorian calendar dates are displayed correctly by this program.
Limitations Because the Gregorian calendar was inaugurated October 15, 1582, only
calendars for years greater than or equal to 1583 are displayed by this
command.
52 Calendar
Month Display When a single month is displayed by Calendar (Mode 2 and Mode 3), a simu-
lated calendar page is drawn on the screen. For instance:
April 2002
Commands
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30
Year Display When a full year is displayed by Calendar (Mode 4), two screen displays
may be used if the attached screen size is insufficient to display the entire
calendar. For instance, if a CALENDAR 2002 is requested with a display
attached at 80 by 24:
Calendar 53
Notes The month names are defined in the /THEOS/OS/MESSAGE/language/MES-
SAGE.BIN file, numbers 260–261. For a description of this file, refer to
Appendix D: “System Files,” starting on page 209.
If the calendar display is redirected to a device or file other than the con-
sole, month displays are output in a format similar to the year display, but
for one month only.
Commands
54 Calendar
Cat Command Filter
The Cat command is a filter that concatenates one or more files and outputs the result to the
standard output device. For a description of command filters, refer to “Standard Input, Stan-
dard Output and I/O Redirection” on page 53 of the THEOS Corona Version 5 Operating System
Reference.
Commands
1 CAT ( options
file » file name with optional path; may contain wild cards
options » NOTYPE
TYPE
Operation Mode 1—Copies text from the standard input device to the standard
output device.
Mode 2—Each file is copied to the standard output device, one after the
other.
This command copies ONE.FILE to the standard output device and then
appends TWO.FILE to the end.
This second example uses i/o redirection to change the standard output
device for this command. It is equivalent to:
The standard input device file can be included in the list of files to be
copied by using the “-” specification as a file name:
This command copies the contents of the standard input device file to the
standard output device and then appends ONE.FILE and TWO.FILE onto the
standard output device file.
Cat 55
When one or more of file contains a wild card specification, the files match-
ing the specification are sorted in alphabetical sequence and then pro-
cessed as if they were specified individually. For instance, assume that
there are files named LETTER.DOCUMENT, MEMO.DOCUMENT and SPECIAL.DOCU-
MENT:
>cat *.document
Commands
Notes A file specification can omit the file type if the environment variable FILE-
TYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111 of the THEOS Corona Version 5 Operating System Ref-
erence.
When the standard input device is the console, the end-of-file is indicated
by pressing (Ctrl)+(D).
When the standard output device is a disk file, it is erased prior to output-
ing the first file. Subsequent files are then appended to this new file. To
append a file to an existing file, use the append i/o redirection symbol:
>cat new.file >> old.file
56 Cat
This command line creates a directory listing and pipes this output to the
Cat command, which first outputs HEADING.FILE to RESULT.FILE and then
appends the directory listing which is now in the standard input device.
Commands
Cat 57
Commands
58 Cat
CDPlayer Command
1 CDPLAYER drive
Commands
2 CDPLAYER drive PLAY
Operation Mode 1—This is the interactive play mode of the CDPlayer command. In
this mode, the audio CD is played, starting at track one.
>cdplayer
If the artist, title and track titles have been entered into the CD-ROM cat-
alog for the disc in drive, that information is displayed as each track plays
CDPlayer 59
(see “CDDB” on page 62). If the information is not available, only the time
remaining and the track number are displayed. See “Graphics Display” on
page 62 for additional information.
>cdplayer d
Commands
1: [01:52]
While this mode is operating, you may use the (PageDown) or (¤) key to jump
to the next track, and the (PageUp) or (˜) key to jump to the previous track.
The (EnterÌ˛) key replays the current track and the (Esc) key exits the pro-
gram and terminates playing the album.
Mode 2—Starts playing the audio CD in drive. If the artist and album
title have been entered into the CD-ROM catalog for the disc in the drive,
that information is displayed (see “CDDB” on page 62). The command exits
but the disc continues playing until it reaches the end of the album.
>cdplayer c play
Don Ho: Tiny Bubbles
>
While the disc plays, there are very few, if any, resources used and there is
minimal impact on the operation of the system.
Mode 3—Pauses but does not stop the playing of an audio disc in drive. If
no disc is playing (see Mode 2), no error is detected or reported.
Mode 4—Resumes playing of an audio disc in drive that was paused with
a Mode 3 command. If no disc is playing (see Mode 2) or it is not paused, no
error is detected or reported.
Mode 5—Stops playing the audio disc in drive. If no disc is playing (see
Mode 2), no error is detected or reported.
>cdplayer d random
Lawrence Welk: His Greatest Hits
10: [-03:21] Beer Barrel Polka
If the artist, title and track titles have been entered into the CD-ROM cat-
alog for the disc in drive, that information is displayed as it plays each
track (see “CDDB” on page 62). If the information is not available, only the
time remaining and the track number are displayed.
60 CDPlayer
While this mode is operating, you may use the (PageDown) or (¤) key to jump
to the next track in the random order. The (EnterÌ˛) key replays the current
track and the (Esc) key exits the program and terminates playing the
album.
When each track has been played once, the program exits.
Commands
>cdplayer d list
The times listed for each track are the times specified in the index on the
audio CD. The disc and track titles are from the CD-ROM catalog of the
disc (see “CDDB” on page 62).
Mode 8—Plays the single track of the audio CD in drive. If the artist and
album title have been entered into the CD-ROM catalog for the disc in the
drive, that information is displayed along with the track title (see “CDDB”
on page 62). The command exits but the disc continues playing until it
reaches the end of the requested track.
Mode 9—Identical to Mode 2 except, after all of the tracks on the disc have
played once, the disc is played again. This continues until CDPlayer is
exited by entry of the (Esc) key.
Mode 10—Identical to Mode 6 except the tracks are played randomly until
CDPlayer is exited by entry of the (Esc) key.
Notes A drive mount operation is performed when CDPlayer first starts. This
operation closes the drive tray if it is not already closed. You can open the
drive tray with the Eject command or by using the eject button of the
graphic CD Player (see “Graphics Display” on page 62).
CDPlayer 61
Defaults The drive specification may be omitted. When not specified, the first
attached CD-ROM drive is used.
CDDB When CDPlayer starts playing a disc it determines a unique code for the
disc and checks to see if the system has disc and track title information
saved for the disc. This information is saved in the /THEOS/CON-
FIG/CDDB.BIN:S file. When there is no information in this file and you have
an active internet connection, the FREEDB.ORG database is queried for infor-
Commands
Not all discs are cataloged with FREEDB.ORG, although it is updated con-
stantly. Some discs will display no disc or track titles.
A mouse (either actual or virtual) can be used to control the actions of the
CDPlayer command. When the mouse pointer hovers over one of the con-
trols its description is displayed just below the control buttons.
The two list boxes near the bottom of the graphic player show the tracks
on the disc and the attached disc drives that are available.
62 CDPlayer
Restrictions The system must have at least one CDROM drive attached; there must be
a supported sound card installed and configured.
Commands
CDPlayer 63
Commands
64 CDPlayer
Change Command
Commands
2 CHANGE file ( FILES options
3 CHANGE ( options
file » file name with optional path; may contain wild cards
options » ACCOUNT name PRIVATE codes
FILES PRIVLEV nn
GROW n.m QUERY
NOQUERY SHARED codes
NOTYPE TOUCH
OWNER name TYPE
PATCH nnnnnnn
Mode 2—The files listed in file are changed according to options. file must
be an ASCII stream file containing one file description per line. The
SELECTED.FILES and SELECTED.EXEC files created by FileList and the
FOUND.EXEC created by Look can be used for this specification file (see “The
EXEC and FILES Options” on page 239). You may also create the file with an
editor or application program.
A file now exists that lists all of the “data” files and all files that have been
changed since 10/01/2001. The following command will change the owner-
ship of these files to another account:
Change 65
>change selected.exec (file account develop
>change (touch
Enter file name list, terminate with empty line.
?
You may enter any file name desired, with optional path and possibly wild
Commands
>
Options ACCOUNT Changes the account ownership of the files. The new owning
account is specified immediately following this keyword:
You must be logged onto the account that currently owns the
file. This option must be used by itself. That is, you may not
change the ownership of a file and its protection codes, growth
factor, etc.
You may only change the ownership of a file in the root direc-
tory. You may not change members of a library (however, the
library itself may be changed).
custom/programs/program.source.sample:s
66 Change
>change selected.exec (file
"/CUSTOM/PROGRAMS/PROGRAM.SOURCE.SAMPLE:S" changed.
Commands
1, 2, 3, etc., or as a fraction, such as 0.1, 0.3, 0.5, etc. Do not
specify a combination like 1.3. If you do, only the integer por-
tion is used. Program and stream files do not have growth fac-
tors.
NOQUERY Tells Change to not ask for confirmation before applying the
requested change to a file. This is a default option for explicit
file specifications.
PATCH Changes the patch level for a program file. The new patch level
is specified immediately following this keyword:
PRIVATE Changes the owning account protection codes. The new protec-
tion codes are specified immediately following this keyword:
Change 67
QUERY Tells Change that you want to be “queried” or asked if each file
matching the selection criteria is to be changed. This is a
default option when the file specification used wild cards.
"FILE3.DATA:S" changed.
"FILE4.DATA:S" changed.
When asked, you may respond with a (Y) to change the file, an
(N) to not change this file, or an (A) to change this file and all
subsequent files. Pressing (Esc) exits the CHANGE command
but, all changes made prior to the (Esc) entry are retained.
SHARED Changes the shared access protection codes. The new protec-
tion codes are specified immediately following this keyword:
TOUCH Changes the file’s date and time to the current system date
and time.
TYPE A default option that tells Change to display each file that is
successfully changed.
Notes Multiple options may be specified on a single command. For instance, you
may request a change in a file’s growth factor, private and shared protec-
tion codes and its file date. However, you may not use the ACCOUNT or
OWNER option with any other option.
68 Change
Changing A file has two types of protection codes associated with it: private and
Protection shared access. The private protection codes restrict what a user on the
Codes owning account may do with the file. The shared access protection codes
restrict what a user on a non-owning account may do with the file.
Code Meaning
Commands
w Write protection. The file cannot be written to.
r Read protection. The file cannot be read.
e Erase protection. The file cannot be deleted.
x Execute protection. The file cannot be executed.
There are two other codes that may be specified here although they are not
really protection codes:
Code Meaning
m Set the “modified” attribute.
h Set the “hidden” attribute.
Code Meaning
w Write protection. The file cannot be written to.
r Read protection. The file cannot be read.
Shared access erase protection exists when a file has any of the following
protection codes enabled: erase, shared read or shared write. Shared read
and write protection is always enabled if the private protection is set to
read or write protected. That is, setting private write protection enables
shared write protection.
With the exception of private read protection, each of these attributes may
be turned off by preceding the protection code with the letter n. Multiple
attributes may be set at one time by specifying the multiple codes one after
the other without any separating spaces. The protection codes may be
specified in any sequence.
For example:
Change 69
The above command sets the following attributes for the file: not modified,
erase protected, not write protected, not read protected, shared access read
and write protected.
Private read protection, once set, cannot be removed. Shared read and
shared write protection cannot be disabled if the file still has private read
or private write protection enabled. For instance, to disable shared write
protection you must also disable private write protection.
Commands
Defaults Touch is a default option when no other options are specified. QUERY is a
default option for file specifications using wild cards. TYPE is a default
option.
Cautions After changing a file to hidden, it will not appear in a directory listing (see
“FileList” on page 229). However, most commands, including Change, allow
access to a hidden file.
To apply any changes to a file with this command, you must be logged onto
the owning account.
70 Change
ChDir Command
1 CHDIR directory
Commands
2 CHDIR
Command synonym: CD
Operation Mode 1—Changes the current working directory to the specified directory.
>chdir programs
When directory does not start with the root directory specifier ( / ), it is
assumed to be a subdirectory of the current working directory or a refer-
ence to a directory relative to the current working directory. For instance:
>pwd
/DEVELOP:S
>chdir programs
>pwd
/DEVELOP/PROGRAMS:S
>chdir ../doc/files
>pwd
/DEVELOP/DOC/FILES:S
The second example of the ChDir command shows a usage of the special
double period directory name ( .. ) pronounced dot, dot. This syntax is a ref-
erence to the parent directory of the current working directory. In the
example, the current working directory was /DEVELOP/PROGRAMS:S so the
parent of this directory is /DEVELOP.
Multiple dot, dot specifications can be used to indicate that the reference is
to the parent of the parent of the parent, etc. For instance:
../../../../some.file
ChDir 71
If the current working directory were AAA/BBB/CCC/DDD/EEE:S, this reference
is to the file /AAA/SOME.FILE:S. Alternately, you could use the dot, dot specifi-
cation and add additional dots to it, one for each additional parent. The
above reference could be specified with:
...../some.file
A directory name may be specified with less than the complete name. For
Commands
example:
>tree
/develop
doc
files
screens
programs
doc
>cd d
The ChDir command above specified a directory name that does not exist
(there is no directory named “D” under DEVELOP, the current working direc-
tory). In this situation, ChDir will try to find a directory name that starts
with the specified name. In this example, it will find the subdirectory “DOC”
and it will change to it.
When searching for a directory name that starts with the specified name,
ChDir does not search the tree alphabetically (although the Tree command
displays the subdirectories sorted alphabetically). Instead it performs a
sequential search and uses the first one that it finds. If there is more than
one directory name that matches, it might not use the one that you
thought it would. For instance, if there are two directories named TEST1
and TEST2, changing to the T directory might change to TEST2.
72 ChDir
>show home
HOME=/DEVELOP:S
>pwd
/DEVELOP/PROGRAMS/DOC:S
>cd
>pwd
/DEVELOP:S
Commands
Notes The command name CD is a synonym to the ChDir command. It is not a
separate program but only an entry in the /THEOS/OS/MESSAGES/language/
SYNONYM.TXT file and, if standard synonyms are disabled (see “Account” on
page 13 of this manual and “STDSYN” on page 110 of the THEOS Corona
Version 5 Operating System Reference), this synonym name may not be
allowed.
When you change the current working directory using either Mode 1 or
Mode 2 of this command a search is made for a file named _ChDir.msg in
that new directory. If this file is found then it is displayed on the console.
This file may contain the special characters and macros that may be used
in logon message files.
ChDir 73
Commands
74 ChDir
ClassGen Command
The ClassGen command creates or changes a console or printer class code specification file.
Commands
number » console or printer class code number (1–255)
option » PRTnn
Operation The SYSTEM.THEOS32 library is searched for an existing class code definition
file for class code number. If one is found, it is examined to determine if it
is a console class code or a printer class code definition.
To determine the proper number to use for a new class code, refer to
Appendix D: “System Files” in the THEOS Corona Version 5 Operating
System Reference.
If no existing class code definition can be found for number, you are
prompted with:
Any response other than (Y) is interpreted as a “no” response and the class
code definition will be for a printer.
If the PRT option is specified, the class code definition is output to the
printer. (A new class code number will print a report with all fields blank.)
When the PRT option is not used, the appropriate set of maintenance
screens are used to allow you to define or change the definitions of the
class code.
Options PRTnn Indicates that ClassGen is to print the current class code defi-
nition on the attached printer number nn. nn may be a value
between 1 and 64.
ClassGen 75
Console Class ClassGen uses several screens to define a class code for consoles. These
Codes screens group the definition fields into several categories:
The following shows the fields in each of the maintenance screens used for
console class codes.
The first screen shows the fields for setup and cursor movement.
76 ClassGen
The “Direct Cursor Address” field is coded to tell THEOS how to position
the cursor on consoles using this class code. Specify the string of character
that, when output to the console, positions the cursor to a specific location.
Where the line or column number would be specified, use one of the follow-
ing codes:
Commands
128 (0x80) Absolute 129 (0x81) Absolute
Absolute The value substituted is the row or column number. That is,
positioning to row five is accomplished by outputting a charac-
ter whose value is five.
Standard The value substituted is the row or column number plus 32. To
position to row five, a character is output whose value is 37.
ASCII The ASCII digit characters are output for the row and column.
To position to row 12, the characters ‘1’ and ‘2’ are output.
ClassGen 77
The second screen shows display attribute fields.
Reverse video on........ 0xBD ESC G 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Commands
Reverse video off....... 0xBD ESC G 0x80 '0' 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Underline on............ 0xBD ESC G 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Underline off........... 0xBD ESC G 0x80 '0' 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Blink on................ 0xBD ESC G 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Blink off............... 0xBD ESC G 0x80 '0' 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Half intensity on....... 0xBD ESC G 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Half intensity off...... 0xBD ESC G 0x80 '0' 0x81 @ 0x84 '4' 0x88 '2' 0x90 '8'
Format mode on.......... ESC &
Format mode off......... ESC 0x27
Cursor off.............. ESC . '0'
Cursor on............... ESC . '1'
Most terminals use one of two methods for enabling various video display
attributes: bit-mapped and ANSI X3.64.
Bit Meaning
7 Must be “on.”
6 Requires backspace for multiple attributes.
5 “On” means attributes are bit-mapped.
“Off” means attributes use ANSI X3.64 coding.
4 Coding applies to UNDERLINE attribute.
3 Coding applies to BLINK attribute.
2 Coding applies to REVERSE VIDEO attribute.
1 Coding applies to FORMAT attribute.
0 Coding applies to HALF INTENSITY attribute.
78 ClassGen
For instance, a terminal using bit-maps that supports all of the attributes
and doesn’t require a backspace for multiple attribute encoding would use
a code of 191 (0xBF).
Commands
that must be output to the terminal to enable the attribute. In this charac-
ter string, where the specific attribute is specified, precede the attribute
code with a special code derived from the following table:
Bit Meaning
7 Must be “on.”
6 Not used.
5 Not used.
4 Character following applies to UNDERLINE attribute.
3 Character following applies to BLINK attribute.
2 Character following applies to REVERSE VIDEO attribute.
1 Character following applies to FORMAT attribute.
0 Character following applies to HALF INTENSITY attribute.
For example, a terminal using bit-mapped coding for reverse video, blink
and underline attributes might be coded as:
where:
Each attribute “on” field must be defined such that all of the attribute
enable codes are specified, and that each attribute “off” field be defined
such that all attributes are turned off, followed by the codes that re-enable
the attributes that might be still on. The example shown in Figure 2:
ClassGen 79
“ClassGen, Consoles, Screen 2” on page 78 shows an example of this tech-
nique.
ESC [ '7' m
This specific string would enable the reverse video attribute. To turn off
this attribute a string looking like the following is used:
Because ANSI encoding is common, THEOS class codes have built-in capa-
bility to output the proper character strings for the various video
attributes supported by THEOS.
A terminal using ANSI X3.64 coding has the lead-in character described
above followed by a 255 (0xFF). Make sure that bit position 5 is off in the
lead-in character. For instance:
0xBD 0xFF
This tells the class code that the terminal uses ANSI coding for underlin-
ing, blink, reverse video and half- intensity.
80 ClassGen
The third screen shows the fields used for screen editing commands.
Commands
Insert character........ ESC Q
Delete character........ ESC W
Insert line............. ESC E
Delete line............. ESC R
Clear screen............ ESC *
Erase unprotected....... ESC & ESC ; ESC 0x27
Erase to end of line.... ESC T
Erase to end of screen.. ESC Y
Monitor mode on......... ESC U
Monitor mode off........ ESC u
Send to status on....... ESC g ESC f
Send to status off...... CR
Enable Slave Printer.... ESC `
Disable Slave Printer... ESC a
Set alpha color......... ESC ETX 0x88 0x90 0xA0 0xC0
These fields are fairly obvious in their nature and the manual for your ter-
minal should specify exactly what characters to use for each of these fields.
There are three fields at the bottom of this screen that are not so obvious.
The “Enable Slave Printer” and “Disable Slave Printer” fields, refer to the
commands that will tell the terminal to activate its auxiliary or secondary
port that should be connected to a local printer. If the terminal supports
this concept, find the commands in the terminal manual that instruct the
terminal to pass subsequent data to the auxiliary port and to not display
them on the terminal screen. This will probably be identified as “transpar-
ent” mode.
The last field, “Set alpha color,” is used on color display terminals. If the
terminal does not support colors, leave this field blank.
The definition in this field tells the class code how to change colors on the
terminal. Specify the command string required by the terminal for chang-
ing colors. In this command string substitute the following codes in the
appropriate character positions:
ClassGen 81
Code Meaning
136 or 0x88 Foreground color
144 or 0x90 Background color
160 or 0xA0 Reverse Video foreground color
192 or 0xC0 Reverse Video background color
Commands
When a color change is requested, THEOS changes these codes to the cor-
responding color code. The color codes used by THEOS are:
If your terminal does not use these same numbers or characters for its
colors there is a mechanism for setting the “color palette.” If the first char-
acter of the “Set Alpha Color” field is a 255 (0xFF), then the next eight
characters are interpreted as the color palette definition. This color palette
must be specified in the same sequence that THEOS uses colors.
For instance, if your terminal uses letters for its color codes: ‘R’ for red, ‘Y’
for yellow, ‘G’ for green, ‘W’ for white, ‘C’ for cyan, ‘B’ for blue, ‘M’ for
magenta and ‘N’ for black, the color palette is defined with:
255 N B G C R M Y W
The following definition is taken from class code 180. This class code is
used on color PC Terminals. It has a color palette that matches the one
used by THEOS but uses ASCII digits instead of the default numeric
values for the colors codes.
0xFF '0' '1' '2' '3' '4' '5' '6' '7' ESC / 0x88 0x90 0xA0 0xC0
82 ClassGen
Screens four and five show the fields defining the keyboard input key
translation values.
Commands
Up...................... 0xFF H
Down.................... 0xFF P
Left.................... 0xFF K
Right................... 0xFF M
Escape.................. ESC
Top..................... 0xFF G
Bottom.................. 0xFF O
Delete character........ 0xFF S
Delete left character... DEL
Page forward............ 0xFF Q
Page backward........... 0xFF I
Word right.............. 0xFF 0xD2
Word left............... 0xFF 0xD3
Search forward.......... 0xFF 0xC1
Search backward......... 0xFF 0xD1
For each of the fields, specify the characters or codes transmitted by the
terminal when the key is pressed that corresponds to the function.
For instance, if the terminal manual indicates that the (Home) key sends
ESC, [, H then define the “Home” field as ESC [ 'H'.
If the terminal’s keyboard transmits scan codes, define the field starting
with the value 255 followed by the scan code value of the key or key combi-
nation. (See above figure.)
ClassGen 83
Screens six and seven show the line graphics character definitions for the
terminal.
You should define a code for each of these fields even if the terminal does
not support a specific line-drawing character or even if it doesn’t support
any line-drawing characters.
Many programs assume that the console can display line-drawing charac-
ters and do not make any allowances for consoles that do not. For fields not
supported by the terminal, use either some other line-drawing character
that appears similar to the one desired or use a regular text character.
In the above example notice that the rounded corner characters (at the
bottom of the display) are the same codes as the square corner characters
(at the top of the display). Most terminals do not support rounded corners
so the square corners should be substituted.
If the terminal does not have line-drawing graphics, leave the various
fields blank. THEOS will use regular text characters for any fields that are
undefined. For instance, a ‘+’ character for all corners and the four-way
intersection, a ‘|’ for vertical and left and right intersections, and a ‘-’ for
horizontal and up and down intersections.
84 ClassGen
Screens eight, nine and ten show the fields defining the codes used to dis-
play international characters.
Commands
Uppercase A dieresis.... 0x8E
Lowercase a dieresis.... 0x84
Lowercase a circumflex.. 0x83
Lowercase a grave accent 0x85
Lowercase a acute accent 0xA0
Uppercase E acute accent 0x90
Lowercase e dieresis.... 0x89
Lowercase e circumflex.. 0x88
Lowercase e grave accent 0x8A
Lowercase e acute accent 0x82
Lowercase i dieresis.... 0x8B
Lowercase i circumflex.. 0x8C
Lowercase i grave accent 0x8D
Lowercase i acute accent 0xA1
Uppercase O dieresis.... 0x99
Lowercase o dieresis.... 0x94
Lowercase o circumflex.. 0x93
Lowercase o grave accent 0x95
Lowercase o acute accent 0xA2
Dieresis Another word for umlaut ( ¨ ) which is two dots on top of the
character. Example: Ä, Ö, Ü, ä, ë, ï, ö, ü, ÿ.
Grave accent A diacritical mark that looks like a backward quote ( ` ) over
the character. Example: à, è, ì, ò, ù.
Acute accent A diacritical mark that looks like an apostrophe ( ´ ) over the
character. Example: á, É, é, í, ó, ú.
Cedilla A diacritical mark that looks like a tail ( ¸ ) under the charac-
ter. Example: ç, Ç.
ClassGen 85
Diphthong A ligature or letter combination. Example: Æ, æ.
Bolle A diacritical mark that looks like a small circle ( ° ) over the
character. Example: Å, å.
The last three screens show the definitions of the codes received from the
Commands
Printer ClassGen also uses several screens to define class codes for printers. These
Class Codes screens group the definition fields into several categories:
A printer class code uses fewer screens than a console class code mainly
because there is no keyboard to define.
86 ClassGen
Printer Class Code Maintenance Screens
The following shows the fields used in each of the maintenance screens
used for printer class codes.
Commands
PRINTER Attributes for class: 135 HP LaserJet II & III
Of interest in this first screen is the “Setup” field. The content of this field
is sent to the printer when it is first attached. For spooled printers, this
string is also sent at the beginning of each report printed by the printer
spooler.
The remaining fields on this screen and the other screens that follow are
similar to those described in Figure 2 on page 78 and Figure 5 on page 84 .
Notes To move around a screen use the (˚) or (˙) keys, or merely enter (EnterÌ˛) to
advance to the next field.
The (PageDown) and (PageUp) keys move from screen to screen while the (Home)
and (End) keys move to the first or last screens.
To save any changes made and then exit, use the (F10) key. The (F9) or (Esc)
keys exit without saving your changes.
ClassGen 87
• Entering Characters
All displayable characters except for digit characters are entered as plain
text. Digit characters are enclosed in a pair of single quotation marks.
Commands
Most fields in a class code definition will require that you indicate that a
control character is part of the definition. Since entry of a control character
will be treated by THEOS as a command rather than data, you will have to
specify the control character value in another way.
88 ClassGen
Control characters are always displayed with the ASCII name.
Example:
ESC &
27 &
ESC g ESC f
0xFC ESC G 132 '4' 136 '2' 144 '8'
Commands
Restrictions The ClassGen command requires a privilege level of five and may only be
executed when you are logged onto the SYSTEM account (user number 0).
ClassGen 89
Commands
90 ClassGen
Cleanup Command
The Cleanup command erases backup, work and other temporary files.
1 CLEANUP
Commands
2 CLEANUP ( options
Operation Mode 1—A menu is displayed allowing the operator to select the type of
cleanup desired.
The specific options checked initially depend upon the currently saved con-
figuration for this UserName (see “Environment Variables” on page 111).
Cleanup 91
Mode 2—Similar to Mode 1 except that the initial defaults may be set by
the various options available. Cleanup is not started until the “Start”
button is pressed.
Options ACCOUNTS All accounts and all directories of those accounts are cleaned
up. Requires a high privilege level and you must be logged on
to the system account (account id = 0).
Commands
QUERY For each file that matches the cleanup specification, ask the
operator if it is okay to erase it.
Defaults This command uses the /THEOS/USERS directory to save and get its configu-
ration. The default actions will depend upon the saved settings for the cur-
rent user as defined in the account environment variable UserName .
92 Cleanup
Cautions Because Cleanup erases groups of files and because it uses defaults from a
possibly shared user-defined configuration, you can easily erase files that
you did not intend. Always review the menu settings before starting the
cleanup operation.
Also, enable the logging option so that there will be a log of the files that
were erased.
Commands
Restrictions The ACCOUNTS option requires a high privilege level and that you be
logged onto the system account.
Cleanup 93
Commands
94 Cleanup
Clear Command
The Clear command clears the console and positions the cursor to the upper left corner.
CLEAR
Commands
Operation The console screen is cleared.
The console screen may also be cleared by pressing (¤) at the CSI prompt.
The action of this key differs from the Clear command in two ways: The
CSI prompt is displayed on line 1 and the status line is not cleared.
Clear 95
Commands
96 Clear
Clock Command
1 CLOCK
Commands
2 CLOCK Analog
3 CLOCK Digital
Operation Mode 1—Displays a clock using the last mode requested (analog or digi-
tal).
Mode 3—Display a digital clock on the screen using the default clock font
or the font defined in this user’s CLOCK.CFG file.
Notes To terminate this clock display click on the [X] in the upper right corner of
the window or press (Break),(Q).
The position and size of the clock displayed can be changed by the user
with the mouse. The initial position and size is determined by the last
Clock 97
position and size used by this user and it is saved in the /THEOS/USERS/user-
name/CLOCK.CFG:S file.
98 Clock
Color Command
The Color command sets the default colors used on the console.
1 COLOR
Commands
2 COLOR fg bg rvfg rvbg
Operation Mode 1—Display the current colors in effect for this console.
>color
Normal: WHITE on BLUE
Reverse: WHITE on RED
This mode also reprograms the console to use these colors and performs an
“Erase to end-of-screen” operation. This operation can be useful if the dis-
played colors on your console are changed without THEOS’ knowledge (for
instance, by ScanTerm).
Mode 2—The default colors for this console are changed. The text color is
set to fg, the text background color is set to bg, reverse video text color is
set to rvfg and reverse video text background color is set to rvbg.
>color 7 3 7 1
>color
Normal: WHITE on CYAN
Reverse: WHITE on BLUE
>color
Normal: WHITE on RED
Reverse: RED on WHITE
Color 99
If fewer than four colors are specified the colors are set accordingly:
>color
Normal: GREEN on BLACK
Reverse: BLACK on GREEN
Omit all but fg: The background color is set to BLACK (unless fg is BLACK,
in which case the background color is set to WHITE). The
reverse video colors are set to the reverse of the normal
video colors.
>color 1
>color
Normal: BLUE on BLACK
Reverse: BLACK on BLUE
Colors The colors for fg, bg, rvfg and rvbg may be specified with the color number,
the color name or the single letter abbreviation of the color name. When a
color name is used, it must be completely spelled out.
Notes The colors changed by this command only affect the display of text output
after this command. Text already on the screen is not changed. Although a
program might change the color representation of the text or graphics that
the program displays, the system will restore the colors to those assigned
by the last usage of this command after each program exits.
Defaults When a console is first started, the default colors used are defined by the
/THEOS/CONFIG/COLOR.CFG:S file. This file is maintained by the Setup COLOR
command.
Restrictions The console must be color-capable and its class code must have a properly
defined “Set alpha color” field.
100 Color
Compare Command
Commands
2 COMPARE file ( FILE options
Operation Mode 1—Compares file1 with file2 and reports on the differences between
the two files. The minimum report is a message: “Files are equivalent.” or
“Files are not equivalent.” Specific information about the differences is dis-
played if the PRTnn or TYPE option is used.
Mode 2—The ASCII stream file specified by file is used as a source for a
list of file name pairs to be compared. Each line in file specifies the two file
names that are compared. Using this mode of the command is identical to
using the Mode 1 form for each pair of files specified in file.
>list compare.files
program.source.program1:s programs.original.program1:s
program.source.program4:s programs.original.program4:s
program.source.programx:s programs.original.programx:s
PROGRAM.SOURCE.PROGRAM4:S PROGRAMS.ORIGINAL.PROGRAM4:S
Files are equivalent.
PROGRAM.SOURCE.PROGRAMX:S PROGRAMS.ORIGINAL.PROGRAMX:S
Files are not equivalent.
Compare 101
Mode 3—Similar to Mode 2 except only the first file name in each line of
file is used. The second file name is created by using the first file name and
replacing the drive-code for that file with the drive specified on the com-
mand line.
File: /SAMPLE.FILE1:S, A
Files are equivalent.
File: /SAMPLE.FILE2:S, A
Files are not equivalent.
File: /SAMPLE.FILE3:S, A
Files are equivalent.
Options BINARY Compares the two files byte-by-byte rather than line-by-line.
This is a default option when either of the files is not a stream
file.
NOCASE The case mode of the characters in the two files is not signifi-
cant in the comparison.
NOSPACE Extra white space in the two files is not significant in the com-
parison.
PRTnn Displays the differences between the two files on the printer.
nn specifies which attached printer to use and is in the range
of 1–64. If nn is omitted, PRT1 is assumed.
The format of the display depends upon the BINARY option. See
“Binary File Display” on page 104 and “ASCII File Display:” on page
103.
TYPE Displays the differences between the two files on the standard
output device (normally the console). The format of the display
depends upon the BINARY option.
102 Compare
ASCII File When two stream files contain ASCII data and the BINARY option is not
Display: specified, the files are compared on a line-by-line basis. When option
PRTnn or TYPE is used, the specific differences between the two files are
shown with a plus ( + ) or minus ( - ) symbol to indicate the line that must
be added or deleted from file2 to make it equivalent to file1.
For instance, a MultiUser BASIC language program has been edited with
new comments added at the beginning of the program (line numbers 1–6).
Commands
Additionally, the capitalization of one word was changed at line 110.
This display indicates that the files are not the same and that the second
file (JULIAN.BACKUP) must have the following changes made to it to make it
the same as the first file (JULIAN.BASIC):
Compare 103
Binary File When two non-stream files are compared or when the BINARY option is
Display specified, the files are compared on a byte-by-byte basis. When option
PRTnn or TYPE is used, the specific differences between the two files are
shown.
Each line of the display shows a location in the files, the value of that loca-
tion in file1, followed by the value of that location in file2.
Defaults NOTTYPE is a default option. BINARY is a default option when either of the
files is not a stream file.
Return Codes Unless an error is detected, when the two files are equivalent the return
code is zero ( 0 ); otherwise the return code is one ( 1 ).
Cautions Comparing two stream files that contain coded or binary information with-
out using the BINARY option might produce erroneous results. When in
doubt, always use the BINARY option.
104 Compare
Compress Command
The Compress command compresses a file and saves the compressed form in a “compression
library file.”
Commands
2 COMPRESS compress-file file ( FILES options
4 COMPRESS compress-file
Operation Mode 1—Each file specified on the command line is compressed and
added to the compression library file compress-file.
Unless the PRESERVED option is used, each file that is compressed has its
modified attribute reset. (The modified attribute is set on the compress-file
so it may be included on the next incremental or differential archive.)
Compress 105
Mode 2—The files listed in file are compressed and copied into compress-
file. file must be an ASCII stream file containing one file description per
line. The SELECTED.FILES and SELECTED.EXEC files created by FileList and the
FOUND.EXEC created by Look can be used for this specification file (see “The
EXEC and FILES Options” on page 239). You may also create the specifica-
tion file with an editor or application program.
A file now exists that lists all of the files that have been changed since
10/01/2001. The following command will compress these files:
Mode 3—Similar to Mode 1 except that each file preceded by a minus sign
is deleted from the compress-file instead of being added to it.
Mode 4—No files are compressed with this mode. Instead, the list of files
already contained in compress-file are displayed on the standard output
device.
>compress old.files
The “Date,” “Time” and “Size” columns refer to the time-stamp and size of
the original, uncompressed form of the file. “Rate” refers to the compres-
sion ratio of the file.
106 Compress
Options DELETE Tells Compress to delete file after adding it to compress-file. (If
file is preceded by a minus sign, as in Mode 3, it is removed
from the compress-file but it is not deleted.)
MODIFIED Specifies that only files that have their modified attribute set
are to be compressed.
Commands
NOTYPE Tells Compress to not display the results of each file com-
pressed and also to suppress the progress bar. Only error mes-
sages are displayed on the stderr device. The general result
message (the “nn files compressed.” message prior to exiting
Compress) is also suppressed with this option.
>
PRESERVED Tells Compress to not clear the modified attribute from a file
that is compressed. Without this option, every file that is com-
pressed has its modified attribute cleared.
SUBDIR Tells Compress that the full path of the file is to be used when
saving the image of file. When this option is not used, only the
file name is saved, not its path information.
Compress 107
TYPE In combination with the NOTYPE option, this is a tri-state
option that tells Compress whether to display the results of
each file compression or not. When TYPE and NOTYPE are not
specified, Compress displays a progress bar and any error mes-
sages but does not display the names of the files being com-
pressed. Specifying TYPE displays the names of the files being
compressed. NOTYPE displays only error messages. This dis-
play can be redirected.
Commands
Typically, ASCII text files are compressed to 40% to 60% of their original
size; binary files (programs and formatted data files) are compressed to
50% to 70% of their original size.
108 Compress
Config EXEC
This command is used to save the various system configuration files in a format that is suit-
able for sending to THEOS customer support.
1 CONFIG
Commands
2 CONFIG options
Options NAME filename Defines the output name. This name is used for both the
text file that is generated and for the compressed version of the
text file. The compressed version has a file-type of CMP. When
this mode is not used, the text file that is created is named
with the serial number of the system and a file-type of CFG. The
output files are always written to the S drive.
All System-related config. Causes the file generated to include the infor-
mation from the various configuration files relating to the system.
All Network-related config. Causes the file generated to include the infor-
mation from the various network configuration files.
Config 109
All System and Network configs. Causes the file generated to include the
information from all of the system and network related configuration files.
Customize. This displays a menu of the configuration files and allow you
to specify which ones to include when generating the text file. Some of the
most common items will be enabled by default.
Commands
110 Config
System configuration file (Setup Sysgen)
Show command information for various devices
SIO device configuration file (Setup SIO)
CRT configuration file (Setup CRT)
Startup configuration file (part of Setup Sysgen)
General network configuration (Setup Net Ident)
Commands
THEOMail configuration file (THEOMail)
FTP client configuration file (Setup Net FTP Client)
FTP server configuration file (Setup Net FTP Server)
HTTP server configuration file (Setup Net HTTP Server)
Gutenberg client configuration file (Setup Net Gutenberg Client)
Web Maintenance server configuration file (Setup Net WebMaint)
Post Office server configuration file (Setup Net PostOffice)
DHCP server configuration file (Setup Net DHCP)
DNS server configuration file (Setup Net DNS)
TNFS server and client configuration file (Setup Net TNFS)
TFTP server configuration file (Setup Net TFTP)
Restrictions This command may be used only while logged onto the SYSTEM account.
Config 111
Commands
112 Config
CopyFile Command
Commands
2 COPYFILE from-file to-device ( options
6 COPYFILE ( options
CopyFile 113
Operation Mode 1—Copies from-file to the to-file.
The from-file and to-file may contain wild-card specifications. See “Wild
Card Specifications” on page 138.
>copyfile *.data:s f
This mode is also used when you want to copy a file to a communications
port, console, printer or to a tape volume.
Mode 3—This is a shorthand method for specifying that you want all files
copied from one drive to another.
>copyfile s f
Remember, unless you use the PUBLIC option, only files owned by the cur-
rent account may be copied. Unless the SUBDIR option is used, only files in
a single directory are copied.
This mode can also be used to copy stream data from one communications
port to another, or from or to a tape drive.
114 CopyFile
Mode 4—file is an ASCII stream file containing two file descriptions per
line. The first file description in the line is treated as a from-file and the
second file description is the to-file. For each line in file, a Mode 1 or Mode 2
CopyFile is performed, as appropriate.
This mode of the CopyFile command is convenient when one or more sets of
files are repetitively copied. Merely edit a file containing file description
pairs, such as:
Commands
>edit daily.files
customer.master:s /backup/customer.master:s
customer.history:s /backup/customer.history:s
customer.invoices:s /backup/customer.invoices:s
general.legder.*:s /backup/=.=.=:s
check.*:s /backup/=.=
/programs/program.source.*:s a
By using some of the file selection options in addition to this file specifica-
tions file, the copy operation can be even more powerful. For instance:
Here, the OLDER option restricts the copy operation so that only files that
have been changed since the last copy are copied this time. Similarly:
This command copies only those files that have their modified status set.
Mode 5—Similar to Mode 4, file is an ASCII stream file but it contains one
file description per line. This file description is the source file specification.
If it contains a drive code, that drive code is ignored and the from-drive
specified on the command line is used instead.
>edit daily.files
customer.master
customer.history
customer.invoices
general.ledger.*
check.*
/programs/program.source.*
is equivalent to:
CopyFile 115
>copyfile customer.history:a b (replace notype noq
>copyfile (noquery
Enter file name list, terminate with empty line.
?sample.file* j
"SAMPLE.FILE1:S" copied to "SAMPLE.FILE1:J".
"SAMPLE.FILE2:S" copied to "SAMPLE.FILE2:J".
?sample.file* /copies/samples/=.=:j
"SAMPLE.FILE1:S" copied to "/COPIES/SAMPLES/SAMPLE.FILE1:J".
"SAMPLE.FILE2:S" copied to "/COPIES/SAMPLES/SAMPLE.FILE2:J".
?
Options APPEND Applies only to stream files. This option tells CopyFile that, if
the destination file already exists and it is a stream file, the
source file is appended to the end of the existing destination
file.
BYREC Applies only to indexed, keyed and direct files. Indicates that,
if the destination file already exists, the records in the source
file are added to the destination file.
If the destination file does not exist, a new, empty file is cre-
ated and the records in the source file are copied to the new
destination file one record at a time. Although this copy pro-
cess is slower than a file copy, the destination is a “clean” ver-
sion of the source file because no deleted records are copied
and the tree structure of an indexed or keyed file is built from
scratch.
Use this option only when the from-file is not a disk or tape
file. That is, when the source file is coming from the console or
a communications port.
116 CopyFile
EXPORT from-file is “exported” to to-file. This option is ignored when
the from-file’s organization is not direct, indexed or keyed. The
purpose of the EXPORT option is to convert a file so that it can
be used in an environment that does not support THEOS for-
matted records, or direct, indexed or keyed organization files.
Commands
to quoted string fields. The key field of each record in from-file
is output as the first field in to-file.
WRITE #1,KEY$:STRING$,PHRASE$,INTEGER%,FLOAT
INPUT #1:KEY$,STRING$,PHRASE$,INTEGER%,FLOAT
The EXPORT option implies the BYREC option and can be used
with other record selection options such as FOR, FRKEY, FROM
and TOKEY. The SPECS and TRANS options are ignored when
specified with EXPORT.
For a Mode 4 request, the records in file specify both the source
file name and the destination file name. In a Mode 5 request,
the records need only specify the source file name.
FOR Indicates that only nnn records of the source file are copied to
the destination file. The FRKEY, FRLABEL or FROM option
CopyFile 117
must be used or the FOR option will be ignored (the entire file
is copied).
This command copies the first eight lines of one file to another
file.
Commands
FRKEY Used with indexed and keyed files to specify the first record to
copy.
kkk represents the key of the first record to copy. Only records
whose keys are greater than or equal to this key are copied.
Can be used with the FOR and TOKEY options to limit the num-
ber of records copied after this first record is located.
FRLABEL Used with ASCII stream files to specify the first record to copy.
FROM Used with ASCII stream files to specify the first record to copy.
118 CopyFile
This option is ignored if to-file is not a direct, indexed or keyed
file.
Commands
You can control the conversion of the fields by using the SPECS
option.
LOWCASE Used with ASCII stream files to translate all uppercase char-
acters to their lowercase equivalents. All non-alphabetic char-
acters are copied without any translation.
MODIFIED Copies the source file only if its modified attribute is set. After
the file is copied, the modified attribute of the source file is
reset (unless the PRESERVE option is also used). This option
provides a method of creating a set of incremental copies of
files. For instance, if the following command is executed every-
day:
Then each day a copy is made of all files that have been
updated or changed since the last time the copy was performed
or the modified attributes were cleared. See “Change” on page
65 .
NEWDATE The destination file’s directory entry is updated with the cur-
rent date and time. This is a default option when any other
option is used that causes the destination file to differ from the
source file, such as: APPEND, BYREC, EXPORT, FOR, FRKEY,
FRLABEL, FROM, LOWCASE, SPECS, TOKEY, TOLABEL, TRANS,
TRUNCATE and UPCASE.
NEWFILE Indicates that CopyFile should only attempt to copy files if the
destination file name does not already exist. Note that, if
CopyFile 119
QUERY is used, you are not queried about files if the destina-
tion file name already exists.
NOQUERY Tells CopyFile to not ask for confirmation before copying each
file. This is a default option when wild cards are not used.
Commands
NOSORT A default option that tells CopyFile to copy the files matching
the source file specifications in the order that the file names
are found on disk.
NOTYPE Tells CopyFile to not display the results of each file copy on the
standard output device. The general result message (the “nn
files copied.” message prior to exiting CopyFile) is also sup-
pressed with this option.
NOVERIFY A default option that tells CopyFile to not verify that the copy
was done successfully. Normally, the hardware verification
that is always done is more than sufficient to assure that the
copy is correct.
OLDDATE Each destination file’s directory entry is set to the source file’s
last change date. This is a default option when the destination
is an exact copy of the source file.
OLDER Copies the source file to the destination file only if the destina-
tion file’s last change date is older than the source file’s or if
120 CopyFile
the destination file does not exist. The REPLACE option is
implied by this option. Note that, if QUERY is used, you are not
queried about files if the destination file is newer.
OLDFILE Indicates that CopyFile should attempt to copy a file only if the
destination file name already exists. This option implies a
REPLACE option. Note that, if QUERY is used, you are not que-
ried about files if the destination file name does not exist.
Commands
Note that only the destination file name is checked. It could be
a totally different file. For instance, an existing command pro-
gram could be replaced by a stream file or indexed file.
PRESERVE Used with the MODIFIED option to specify that source file’s
modified attribute is not to be reset. This option provides a
method of creating a set of differential copies of files. For
instance, if the following command is executed every day:
Then each day a copy is made of all files that have been
updated or changed since the last time the modified attributes
were cleared. See “Change” on page 65.
>copy *.data i
Ok to copy "CUSTOMER.DATA:S" (Yes,No,All)
When the “Ok to copy” question is asked you may respond with
a (Y) for yes, (N) for no or (A) for all. Responding with (A) means
yes to this file and all remaining files are included without
being queried. Respond with (Esc) to cancel the copy operation.
CopyFile 121
REPLACE Allows a file to be copied even if it already exists on the desti-
nation drive. Normally, when the destination file name
already exists, CopyFile will not perform the copy. This option
tells CopyFile that if it already exists it should erase the exist-
ing file and replace it with a copy of the source file.
If the destination file does not exist, this option has no effect.
Commands
SORT Tells CopyFile to find all of the files that match the source file
specifications and to sort the file names in ascending alphabet-
ical order. When CopyFile has created this sorted list of possible
file names to copy, it begins the normal copy operation, using
the QUERY option if it is in effect.
SUBDIR Indicates that all subdirectories in the source file directory are
to be copied to the destination drive. If a subdirectory does not
exist on the destination drive, it is automatically created.
122 CopyFile
In this example all of the files in /ART directory of the S drive
are copied to the J drive. When a subdirectory of /ART is encoun-
tered, it is copied along with all files in that subdirectory. If a
subdirectory contains a subdirectory, its files will also be cop-
ied, and so on.
Commands
those subdirectories are not copied.
TOKEY Used with indexed and keyed files to specify the last record to
copy. Can be used with the FRKEY option to limit the number
of records copied before this last record is located.
kkk represents the key of the last record to copy. Only records
whose keys are less than or equal to this key are copied.
TOLABEL Used with ASCII stream files to specify the last record to copy.
Can be used with the FRLABEL option to limit the number of
records copied before this last record is located.
TRUNCATE Used with stream files to truncate each record in the destina-
tion file to nnn characters.
CopyFile 123
TYPE A default option that tells CopyFile to display the results of
each file copy on the standard output device. This display can
be redirected.
4 files copied.
UPCASE Used with ASCII stream files to translate all lowercase charac-
ters to their uppercase equivalents. All non-alphabetic charac-
ters are copied without any translation.
VERIFY Tells CopyFile to verify that the copy was made correctly by
performing a read after each block of the file is written. The
data read from the destination file is compared with the data
that was written to the file at that location. A mismatch causes
CopyFile to retry the write operation.
date1 Copies a file only if the source file’s last change date is greater
than or equal to this date. That is, if the source file was
changed on or after this date.
The above command will copy only those files that have been
created or changed since October 14, 2001.
date2 Copies a file only if the source file’s last change date is less
than or equal to this date. That is, if the source file was
changed or or before this date. May only be specified by first
specifying the date1 option.
This command copies only those files that have been created or
changed since October 14, 2001, but not any files that were cre-
ated or changed after October 30, 2001.
124 CopyFile
To specify a date2 when you don’t care about date1, use a date
of 1/1/86 for the date1 option. This is the earliest date main-
tained by the THEOS file system.
Commands
CopyFile 125
Copying Many of the CopyFile options apply only to the copying of stream or sequen-
Stream Files tial organization files. With stream files you can add information to the
end of an existing file by using the APPEND option, change the case made
of text in each record with the LOWCASE and UPCASE options, rearrange
the contents in each record with the SPECS option or translate characters
in each record with the TRANS option.
Stream files may also be copied to devices other than disks. For instance:
Commands
If the file is not a stream file and you attempt to copy it to a device other
than a disk, the message “Invalid access method” is displayed.
The above three specification are identical: They each specify that
the letter “A” is to be placed in column one of each output record.
126 CopyFile
?"New record: " 1
?\Some text\ 20
?+abbreviated+ 30
The position of existing text in the source record. Existing text to
be copied is indicated by two decimal numbers separated by a
dash:
?1-10 10
?11-12 48
Commands
?13-13 47
?14-99 50
In this example each output record will have a bullet symbol in column
one, the literal text “New ” in columns three through six, and the original
source record text is output starting at column 10 of each record. Columns
seven through nine are output as spaces because nothing was specified for
that area of the output record.
Note that the records output contain only the text and data specified in the
specification list. For instance, if the previous example was changed to:
CopyFile 127
The data in the input records, columns 1 through 9, is not copied to the
output record because it is not part of the specification list.
The SPECS option may be used in combination with the TRANS option.
When other text modification options are specified in combination with the
SPECS option (i.e., UPCASE, LOWCASE), they will manipulate the source
text before the specifications are applied and therefore do not apply to the
specifications text. For instance, if SPECS and UPCASE were used with the
Commands
previous specifications list, the literal text “New ” would still be output in
columns three through six. It would not be converted to “NEW ”.
You can abandon the copy operation during entry of the specifications list
by using the (Esc) or (F9) keys.
The TRANS option allows you to translate the characters in each source
record as it is copied to the destination record. When the TRANS option is
used, CopyFile prompts you to enter the translations:
The TRANS option may be used in combination with the SPECS option.
When other text modification options are specified in combination with the
TRANS option (i.e., UPCASE, LOWCASE), they will manipulate the source
text after the specifications are applied and therefore the “translate to”
128 CopyFile
character might be changed. For instance, if TRANS and LOWCASE were
used with the previous specifications list, the accented, uppercase letters
would be translated to unaccented lowercase characters.
You can abandon the copy operation during entry of the translation list by
using the (Esc) or (F9) keys.
Copying Of most interest when copying an indexed or keyed file is the BYREC
Commands
Indexed and option. This option creates an optimized copy of the source file with a com-
Keyed Files pletely rebuilt index to the records in the file. The BYREC option is implied
by all of the options that might copy less than the entire file (FOR, FRKEY,
and TOKEY).
When the BYREC option is used to optimize file access, it is best to first
create an empty destination file with the CREATE command described on
page 131. By creating the empty file first, you can specify a contiguous file
and change the key length, record length and file size. The BYREC option
will use this empty file and copy the source file to it, one record at a time.
The BYREC option can also be used to copy the records from one type of file
organization to another. For instance, from a keyed file to an indexed file.
Copying Direct Similar to indexed and keyed files, the BYREC option can reorganize a
Files direct file.
Notes The FOR option requires that the FRKEY option be used. When FOR is used
without the FRKEY option, the entire file will be copied.
If the source and destination files are members of a library and that
library does not exist on the destination drive, CopyFile asks if you want to
create it:
>copyfile customer.data.june j
Ok to create library "/CUSTOMER.DATA:J" (Yes,No)
If you respond with (Y), the library is created on the destination drive with
a size equal to the source file’s library size.
Defaults NEWDATE (when a modified copy of the source file is created), NEWFILE,
NOQUERY (when wild cards are not used), NOSORT (unless the SUBDIR
option is used), NOVERIFY, OLDDATE (when an exact copy of the source file
is created), QUERY (when wild cards are used), SORT (when SUBDIR option
is used), TYPE.
Restrictions By default, only files owned by the current account are copied. You can
copy a public file (owned by the SYSTEM account) when logged onto a private
account by specifying the PUBLIC option.
CopyFile 129
To copy a file owned by another account, you must specify the owning
account name as part of the path and the file must provide shared read
access:
This command copies the file HIS.FILE owned by the account named PRIVATE,
to your account, current working directory, file name MY.FILE.
Commands
You may only copy a file to your account. By default, the destination file is
in the current working directory, but you may specify a path to the direc-
tory that you want to copy it to.
When the destination file specification includes a path, then that path
must exist. CopyFile does not create subdirectories (except with the SUBDIR
option).
See also Backup, FileManager, FileType , IXDiag, Move, Receive , Rename, Net, Restore,
Send, TArchive, TBackup, THEO+COM
130 CopyFile
Create Command
The Create command creates direct, indexed and keyed files, libraries of files and subdirec-
tories.
Commands
2 CREATE file ( SUBDIR
Create 131
Operation Mode 1—Creates a new library or resizes an existing library. file must be
a file description containing both a file-name and a file-type. Libraries may
not be a member of another library.
Although the Create command can create subdirectories, the MkDir com-
mand is the preferred method. With MkDir you can specify the initial size of
the subdirectory.
When creating a direct-access file, you must specify the FILESIZE and the
record length (RECLEN).
When creating an indexed-access file, you must specify the FILESIZE, the
record length (RECLEN) and the key length (KEYLEN).
When creating a keyed-access file, you must specify the FILESIZE, the
record length (RECLEN) and the key length (KEYLEN).
132 Create
Mode 6—Creates a new LISAM-access file. LISAM files may be members
of an existing library.
When creating an large indexed-access file, you must specify the FILESIZE,
the record length (RECLEN) and the key length (KEYLEN). You may specify
the sort organization for the file (BINARY, DICTIONARY or NOCASE).
Commands
Mode 7—Clears the contents of an existing direct, indexed, keyed or
LISAM file. The contents of all records in a direct file are initialized to
zeros. Although indexed and keyed files are not zeroed with this command
all of the records are removed and the space is returned to the file’s free
space list. Effectively, this is the same as erasing the file and then recreat-
ing it with its current file size. However, the clearing process is faster
because the disk space does not have to be reallocated.
If the requested size of the new library is less than the number
of members already in the existing library, the size is adjusted
upward so that the new library can contain all of the existing
member files.
SIZE This option is required and specifies the size of the library.
This size represents the minimum size to create. Because a
library uses the same search algorithm as the root directory,
its size is determined by the requirements of the algorithm.
For instance, requesting a size of 100 will create a library with
a size of 116.
Create 133
Direct File CONTIG Forces the new file to use contiguous disk space. If sufficient
Options contiguous disk space is not available, the file is not created
and a “Disk full” message is reported. See “Notes” on page 135.
required.
RECLEN This option is required and specifies the length of each record.
Indexed and CONTIG Forces the new file to use contiguous disk space. If sufficient
Keyed File contiguous disk space is not available the file is not created
Options and a “Disk full” message is reported. See “Notes” on page 135.
GROW Specifies the growth factor for the file. This is the same as the
GROW option described above.
KEYLEN This option is required and specifies the allocated length of the
keys for each record.
RECLEN This option is required and specifies the length of each record.
This record length is separate from the KEYLEN value.
134 Create
LISAM File When creating LISAM files you may use the Indexed and Keyed File Options
Options and also the following LISAM-specific options.
Commands
DICTIONARY The file is maintained in dictionary order. With this
sequence, although the case mode is significant, the uppercase
alphabetic keys are not sorted separately from the lowercase
alphabetic keys of the same letter. Specifically, the sort order
for each character is: space, !, ", #, $, %, &, ', (, ), *, +, ,, -, ., /, :, ;,
<, =, >, ?, @, [, \, ], ^, _, `, {, |, }, ~, ¿, ¡, ¢, £, ¥ , euro, ¼, ½, ÿ, §,
°, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, a, Ä, ä, â, à, á, Å, å, Æ, æ, B, b, C,
c, D, d, E, e, ë, ê, è, É, é, F, f, G, g, H, h, I, i, î, ì, í, J, j, K, k, L, l,
M, m, N, n, Ñ, ñ, O, o, Ö, ö, ô, ò, ó, P, p, Q, q, R, r, S, s, ß, T, t, U,
u, Ü, ü, û, ù, ú, V, v, W, w, X, x, Y, y, Z, z, other characters in
binary order.
NOCASE Specifies that the case mode of the key is ignored. The file is
maintained in DICTIONARY order. Duplicate keys are not
allows and a key is considered a dupicate if it is identical to an
existing key except for case mode.
Recreate CLEAN May only be used with the CLEAR option. It causes the con-
Options tents of the file to be cleared by writing binary zeros.
Notes If the CONTIG option is not used for direct, indexed and keyed files, the file
is created using any available disk space, contiguous or not. If there is
insufficient disk space available, the requested FILESIZE of the file is
reduced so that the file can fit in the largest contiguous disk space that is
available.
Create 135
>create private\program.source (library size 44
The growth factor of an existing file can be changed with the Change com-
mand described on page 65.
Defaults When the CREATE environment variable is not defined, a data file created
with this command has the following attributes: modified, shared read
protected, shared write protected, execute protected, not erase protected,
not read protected, not write protected and not hidden. If the CREATE vari-
able is defined, it specifies the attributes for the new file.
The modified attribute and the file’s last change date is always set for
newly created data files (direct, indexed, keyed and LISAM).
The default growth factor for direct, indexed, keyed and LISAM files is 0.3
or 30%.
Cautions The REPLACE option should not be used if any other user might be using
one of the members of the library. The REPLACE option is actually a
“macro” command in that several separate operations are performed:
renaming an existing library, creating a new library, and renaming exist-
ing members and erasing the old library. It is best if all users are inactive
so that all of the steps can be completed without interruption.
136 Create
Restrictions Libraries and subdirectories cannot be members of libraries.
The various limitations on key length, record length and file size depends
upon the type of file system in use on the resident drive:
Commands
Item 4GB LFS
Library size 262,100 Limited by disk space only
Indexed, key length 128 128
Indexed, record length 65,535
Indexed, file size 1.7GB 4GB
Direct, record length 65,535
Direct, file size 1.7GB 4GB
LISAM, key length 256
LISAM, record length 65,535, or
> 16MB if using LISAM-specific i/o statements
LISAM, file size 1.7GB Limited by disk space only
Create 137
Commands
138 Create
CRLF Command
The CRLF command operates on stream files and converts the end-of-record mark and
national characters.
Commands
2 CRLF file... ( os options
file » file name with optional path, may contain wild cards
options » NOTYPE TYPE XLATE OEM
NOXLATE XLATE DOS
os » DOS
THEOS
UNIX
Mode 2—The record terminators in the file are converted to the termina-
tors used by the operating system specified. The normal end-of-record ter-
mination character for the common operating systems is:
CRLF 139
Options NOTYPE Do not display the conversion messages.
TYPE A default option that displays the conversion message for each
file converted. The messages are of the form “Changing CR
into CRLF on file “SAMPLE.FILE:S”.”
Commands
Notes The file is converted “in place.” That is, the output of this command is a file
with the same name as the input. The actual process used is to output the
file with a temporary file name, erase the input file, and then rename the
temporary file to be the input file name.
Restrictions Only ASCII stream files can be converted with this command. Other file
organizations are incompatible between operating systems or do not have
end-of-record marks.
140 CRLF
CRT Command
The CRT command demonstrates and tests the console’s display capabilities and keyboard
definitions.
CRT
Commands
Operation When CRT is invoked the “CRT Test Menu” is displayed.
Video Attributes
Character Sets...
Screen Sizes...
Throughput Performance
Window Manager...
Mouse and ON-Key...
Keyboard
Exit to THEOS
Use the normal menu selection keys to select the desired tests.
CRT 141
Video Attributes
This test shows the video attributes supported by THEOS and how they
are displayed on this console with the current class code.
normal half
Monitor mode: v u ä ã å ç b T ` U J K M N é P d e ‹ Q S
The specific information shown on your screen may differ depending upon
your terminal’s or monitor’s capabilities and upon the definitions in the
class code (see “ClassGen” on page 75).
The “Monitor mode” line shows the characters that your console will dis-
play when the monitor mode is enabled. This line is only shown if the class
code defines a code for monitor mode on and off. The characters shown
here are displayed when the console is a VGA monitor and class code 90 is
used.
The line showing the color names is displayed only if the class code has a
“set alpha color” definition.
142 CRT
Direct Cursor Addressing
The direct cursor addressing display tests the console’s and class code’s
ability to accurately position the cursor. The screen should fill with aster-
isk ( * ) characters in a top-left to bottom-right manner. Each asterisk is
displayed by positioning the cursor to the desired location, displaying the
asterisk and then positioning to the next desired location.
Commands
If the screen does not completely fill with asterisks (except for the bottom,
right-hand position), there is either something wrong with the class code
definition for direct cursor addressing or there is a problem with the com-
munication’s line (baud rate, parity, etc.).
This screen display tests the console’s and class code’s ability to move the
cursor relative to its current location (left, right, up and down).
The spiraling lines shown here are drawn by moving the cursor with the
left, right, up and down codes, and then outputting a single line-drawing
character.
CRT 143
Scroll Up and Down
This display tests the console’s ability to scroll text up and down on the
screen. First, lines of text are displayed terminated by a carriage-return,
line-feed. When the bottom of the screen is reached, lines continue to dis-
play which should cause the lines above this to scroll up.
Commands
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abc
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcd
"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdef
$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh
&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi
'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghij
()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijk
)*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkl
*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklm
+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmn
,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmno
-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnop
./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopq
/0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqr
0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrs
123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrst
23456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu
3456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuv
456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvw
56789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwx
After approximately 100 lines are displayed in this manner, the screen is
cleared and new lines of text are displayed. These are displayed at the top
of the screen proceeded by an “insert line” command. This causes the dis-
play to scroll down.
144 CRT
Insert/Delete Line/Char
This display tests the console’s and class code’s insert and delete capabili-
ties. First, the screen is filled with rows of numbers. Then the six insert
and delete commands are performed on this displayed text:
01234567890123456789012345678901234567890123456789012345678901234
1123567890123456789012345678901234567890123456789012345678901234
Commands
21234567890123456789012345678901234567890123456789012345678901234
312345 6789012345678901234567890123456789012345678901234567890123
41234567890123456789012345678901234567890123456789012345678901234
51234567890123456789012345678901234567890123456789012345678901234
71234567890123456789012345678901234567890123456789012345678901234
81234567890123456789012345678901234567890123456789012345678901234
912345678901
01234567890123456789012345678901234567890123456789012345678901234
11234567890123
4,1 = DC 6,3 = IC
8,5 = IL 10,7 = DL
12,9 = EOL 14,11 = EOS
If your console supports all of these insert and delete capabilities, the
screen should look like the one displayed here (except yours should have
your attached line length used).
The text in the middle of the screen indicates which commands were
issued and at which locations. When studying these locations, note that
this program addresses the cursor with a number base of zero. Therefore,
the upper left corner is location 0,0.
CRT 145
Character Sets
There are multiple character sets supported by THEOS. When this option
is selected from the main CRT menu, a Character Sets menu appears:
Character Sets
Use the normal menu selection keys to select the desired tests.
146 CRT
Line Drawing Graphics
The two screens displayed by this menu item show the characters dis-
played when line-drawing graphics are used and a sample of the graphics
display.
Commands
= LI = UI = RI = DI
CRT 147
National Characters
A special help text file is supplied that shows how to compose these charac-
ters from the keyboard.
Commands
>help compose
THEOS Characters
This display shows the THEOS character set. It includes the ASCII char-
acters, the line-drawing graphics characters and the multinational charac-
ters.
0 1 2 3 4 5 6 7 8 9 A B C D E F
0: . . . . . . . . . . . . . . . .
1: . . . . . . . . . . . . . . . .
2: ! " # $ % & ' ( ) * + , - . /
3: 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4: @ A B C D E F G H I J K L M N O
5: P Q R S T U V W X Y Z [ \ ] ^ _
6: ` a b c d e f g h i j k l m n o
7: p q r s t u v w x y z { | } ~ .
8: . . . . . . . . . . . . . . . .
9: . . . . . . . . . . . . . . . .
A:
B: . . . . . .
C: Ä ä â à á É ë ê è é ï î ì í Ö ö
D: ô ò ó Ü ü û ù ú Ç ç Ñ ñ Æ æ Å å
E: ß ¿ ¡ ¢ £ ¥ l =C ¼ ½ ÿ § a ² . .
F: . . . . . . . . . . . . . . . .
148 CRT
IBM PC Characters
The IBM PC character set is available on most consoles that are PC Term
compatible. This character set is “Code Page 437” and is accessed by a pro-
gram by enabling monitor mode.
Commands
0 1 2 3 4 5 6 7 8 9 A B C D E F
0: v u ä ã å ç b T ` U J K M N =C
1: P d e ▄ Q S
2: ! " # $ % & ' ( ) * + , - . /
3: 0 1 2 3 4 5 6 7 8 9 : ; < = > ?
4: @ A B C D E F G H I J K L M N O
5: P Q R S T U V W X Y Z [ \ ] ^ _
6: ` a b c d e f g h i j k l m n o
7: p q r s t u v w x y z { | } ~ O
8: Ç ü é â ä à å ç ê ë è ï î ì Ä Å
9: É æ Æ ô ö ò û ù ÿ Ö Ü ¢ £ ¥ ₧ ƒ
A: á í ó ú ñ Ñ ª º ¿ ⌐ ¬ ½ ¼ ¡ « »
B: ░ ▒ ▓
C:
D: ' █ ▄ ▌ ▐ ▀
E: α ß Γ π ∑ σ µ τ Φ Θ Ω δ ∞ ø ε ∩
F: ≡ ± ≥ ≤ ⌠ ⌡ ÷ ≈ ˚ • · √ ⁿ ² ■
This screen does not display properly if the console does not support the
“Code Page 437” character set. It will not display at all if the class code
number is not one of the known class codes for PC Term compatible termi-
nals (see “CLASSnnn (Class Codes)” on page 213).
CRT 149
Screen Sizes
Some terminals support multiple screen sizes. For instance, most VGA dis-
play monitors support the sizes shown in the following menu. When the
console supports multiple screen sizes, a menu like the following appears.
This screen allows you to demonstrate the various sizes that THEOS
thinks are available on your console.
Commands
40 columns X 24 rows
80 columns X 24 rows
80 columns X 29 rows
80 columns X 33 rows
80 columns X 42 rows
80 columns X 49 rows
80 columns X 59 rows
100 columns X 39 rows
132 columns X 24 rows
132 columns X 27 rows
132 columns X 43 rows
Use the normal menu selection keys to select the desired tests.
This menu allows you to select various screen sizes and see how they
appear on your console. The CRT command will not change the screen size
of your console except during this demonstration. Once a desirable screen
size is found, use the Attach or Sysgen command to set the attached screen
size.
Note: A VGA console can only support multiple screen sizes if the console
is not using graphics. That is, SETUP VGA is configured to use “THEOS
Sysgen.”
150 CRT
Throughput Performance
This test uses two screens to test the actual throughput performance of the
console as it is currently attached. First it tests the transmission rate
when one full page of text is sent to the console, and then it tests the scroll
rate. The accuracy of this test may be effected by buffering if the console is
attached via an intelligent multiport.
Commands
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll Noscroll
Full page: 81 msec; 28,000 cps (280,000) throughput bps)
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll Scroll
Scroll: 1,066 msec; 54 lines/sec
Press ENTER for menu.
CRT 151
Window Manager
This function of the CRT command tests and demonstrates the capabilities
of window management on the console.
Open and display some windows, reorder them, then remove and close.
Use the normal menu selection keys to select the desired demonstrations.
152 CRT
Mouse and ON-Key
This function presents a menu that allows you to test the mouse and the
“ON-KEY” capabilities of the console.
Commands
Supported Mouse APIs
Window Manager
Manager Mouse API
ON-Key Events
Use the normal menu selection keys to select the desired demonstrations.
CRT 153
Window Manager Mouse API
Window 2 Window 1
E
Left-click
X
Commands
Left-down
Left-dclick I
T
Left-drag
Window 3
Row: 12 Col: 28
Button 0804
Window 4
Win: 1 Button 0804
Row: 12 Col: 28
The four windows in this display screen are used to report various infor-
mation about mouse activity.
Window 2: A display window that shows the last mouse event, such as:
“Left-down,” “Left-click,” “Right-dclick,” etc.
Window 3: A display window showing the last mouse event relative to the
screen origin (upper left corner of screen).
Window 4: A display window showing the last mouse event relative to the
window origin.
To exit from this test click on the “Exit” display button or press (Esc).
154 CRT
ON-Key Events
This display allows you to test the keyboard for all keys that can be
detected by the “ON-KEY” capability of THEOS’ Window Manager soft-
ware. Merely press the keys you are interested in to determine if the ON-
KEY mechanism can detect it. If nothing displays on the screen, then ON-
KEY could not detect the key or key combination.
Commands
To exit from this test press (Esc) twice.
Keyboard
This test allows you to test the console’s class code definitions for the input
function keys. A simulated keyboard is displayed on the screen. As each
key on the keyboard is pressed, the cursor is positioned to the key received
and decoded by the class code.
Notes The operation and specific displays seen when the CRT command is used
will greatly depend upon your specific console and the class code associ-
ated with that console.
CRT 155
Commands
156 CRT
Date Command
The Date command displays the current system date and time on the standard output device
(normally the console).
1 DATE
Commands
2 DATE +format
>date
Thursday, July 4, 2002 2:49 PM PST
The day of the week name and the month name are specific to the current
language in use..
Mode 2—Outputs the current date and time formatted according to the
format specifications. The format must start with a plus sign ( + ) and, if
there are any lowercase characters, it must be enclosed within a pair of
quotation marks.
Date 157
Format Codes The format specification is a string of characters specifying the literal
characters and symbols that are output, along with codes specifying the
date or time element to output. The formatting codes use the percent char-
acter ( % ) followed by a single letter. The letter indicates the specific date
or time element to use.
%t Tabs to the next tab stop. Tab stops are positioned every eight
columns.
07/04/2002 DATEFORM = 1
04-07-2002 DATEFORM = 2
2002.07.04 DATEFORM = 3
158 Date
%d Day number of month (01–31).
Commands
%m The current month number (01–12).
Notes Remember that the format specification must start with a plus sign. If
format contains any spaces or lowercase letters you must enclose it within
quotation marks.
Date 159
Commands
160 Date
Decrypt Command
The Decrypt command decrypts a sequential file using public key/private key Data Encryp-
tion Standard (DES) 56-bit or 128-bit encryption algorithms.
Commands
3 DECRYPT ( password < source > destination
DES DES128
DES56 TDES
Operation Using the public key built into the Decrypt command (which is the same
public key that Encrypt uses) and the private key password specified, the
source file is decrypted and the result is output to the destination file.
Notes Refer to the enckjsdf command for a description of the DES encryption
standard.
Because the password is case-sensitive and the CSI normally folds the
arguments to uppercase, it is best to always enclose the password in quota-
tion marks to ensure that it is passed to the Decrypt command properly.
When not specified, the destination file for both Decrypt command is stdout.
This can be redirected to a file or another program.
Decrypt 161
The above command will decrypt the source file and output it to the screen.
This second command will decrypt the source file and pipe the result to the
LIST command which will print it to the primary printer.
This last command might be used to decrypt the file generated in the pre-
vious Encrypt example. Note that the sequence of the passwords is the
reverse. It decrypts the source file using password2 and pipes the result to
the Decrypt command to decrypt it again with password1. The result is
saved in dest.
Defaults When decrypting a file, if the algorithm is not specified then DES 56-bit
encryption is used.
Cautions The private-key password is not embedded in the encrypted file. If a differ-
ent key is used to decrypt the file than was used to encrypt it, the Decrypt
command cannot report the error and will merely generate a destination
file that is not a properly decrypted form of the original file. Remember
your passwords but do not write them down for security reasons.
162 Decrypt
Dial Command EXEC
The Dial command is an EXEC language program that provides convenient access to the
THEO+COM command’s modem and telephone number dialing capabilities.
1 DIAL
Commands
2 DIAL number
Operation Mode 1—Invokes THEO+COM in DIAL mode. The first attached communi-
cations port is used and the “Dialing Directory” is then invoked, allowing
you to choose one of the entries to dial. Dialing directory maintenance is
allowed along with manual dialing.
Dial automatically exits after a number is dialed or if you abort the selec-
tion of a number. Any modem or telephone connection remains connected.
Dial 163
Character Meaning or Effect
letters A–Z Generates the tones or pulses corresponding to the tele-
phone dial letters. For instance, the number “93THEOS”
would dial “9384367.” The letters A, B and C match the
digit 1, the letters D, E and F match the digit 2, etc.
Notes To use a communications port other than the first attached COM n device,
or to use any of the THEO+COM command line options, you must use the
THEO+COM command (synonym name is COM).
164 Dial
DialNet Command
The DialNet command is used to control and monitor Dial-Up Networking connections
(DUN).
2 DIALNET
function » START
STOP
STATUS
profile » name of profile defined in SETUP NET
DIALNET
The DialNet command can operate with a command-line interface or as a
windowed interface. This is reflected in the two modes of operation. Both
modes can perform the same operations, but the information shown and
how it is displayed differs between the two.
Operation Mode 1—This is the command-line interface to DialNet and is suitable for
usage by EXECs and application programs. To use this mode when there
are multiple profiles defined, you must know the name of the profile defini-
tion that you want to use. If there is only one profile defined, that profile is
used automatically and you do not have to specify the profile name.
To display the status of a current connection to a PPP server, use the com-
mand:
DialNet 165
Mode 2—This is the windowed interface to the DialNet command.
Windowed When Mode 2 is used, it displays the following screen and menu:
Interface
Commands
Use the normal menu selection keys to select the desired item.
The window on the right displays a brief summary about each profile that
is currently connected.
When Connect, Disconnect or Status is selected, and you have multiple pro-
files defined, you are offered a list of the profiles available for that func-
tion. Profiles are defined with the Setup Net Dial-Up Networking menu. (See
THEOS Corona Version 5 Operating System Installation and Setup
Guide.) When only one profile is defined, the operation is performed auto-
matically on that single profile.
You may exit this menu be selecting the Exit item, by pressing (Esc) or by
pressing (F9).
Connect. Selecting this item connects to the single profile defined in your
configuration or, if there are multiple profiles defined it displays a list of
those profiles that are not currently connected. Select the profile that you
want connected. An attempt is made to dial and connect to the PPP server
specified in the profile definition. Press (Esc) if you do not want to connect
to any of those profiles at this time.
166 DialNet
When successfully connected, the “Connected Profiles” window on the
right is updated with the new connection summary information. Note that
the “Connect Time” information display is only updated every ten seconds.
Commands
that profile. When multiple profiles are connected a list of those connected
profiles is displayed and you can select the one that you want discon-
nected. Press (Esc) if you do not want to disconnect any of those profiles at
this time. If there are no profiles connected, an error message displays.
DUN connections are available to all users on your system, so be sure that
the connection is not being used at this time. It is possible that another
session on this terminal or another user on the system is using the connec-
tion.
Status. When only one profile is connected the status of that connection is
displayed. When multiple profiles are connected a list of those connected
profiles displays and you can select the one that you want the status dis-
played. Press (Esc) if you do not want to see the status of any of those pro-
files at this time. If there are no profiles connected, an error message
displays.
Connection Status
Profile: PACIFIER
Host IP: 206.163.58.6
Remote IP: 204.245.231.131
Connected on: 03/12/2001 08:02:45 for: 00:06:12
Bytes sent: 1,591 received: 2,611
Packets sent: 34 received: 27
Packets rejected: 2
Largest packet sent: 133 received: 576
Handshake: CTS/RTS Baud rate: 38,400
Inactivity time-out: 00:10:00 remaining: 00:07:39
Modem phone speed: 28,800
Most of the meanings of the fields in this display are apparent. To clarify
those that might not be apparent:
DialNet 167
Host IP The IP address for your computer. This was assigned by the
remote PPP server and may be different each time that you
connect. (Dynamic IP address assignment.)
Remote IP The IP address of the remote PPP server. This may be different
each time that you connect if the remote site has multiple PPP
servers.
Commands
Packets rejected The number of packets sent to or received from the PPP
server that were rejected for one reason or another. Each time
that a packet is rejected, a log entry is added to the DUN log
file defined in Setup Net Dial-Up Networking . (See THEOS
Corona Version 5 Operating System Installation and Setup
Guide.)
Baud rate The transmission speed between your computer and the
modem. This is specified in the profile definition.
Note: This field and the “Inactivity Time-out” field are only dis-
played if there is a timeout value specified for the profile.
Modem phone speed This is the transmission speed between the two
modems: your modem and the remote modem. This speed may
be lower than the Baud rate speed because it is the result of
negotiations between the two modems and is the best speed
that they support with the current telephone connection.
168 DialNet
Command- The DialNet command-line interface provides all of the capabilities of the
Line Interface menued interface and can be used from an EXEC or application program.
Unlike the menued interface, which displays a list of profile names that
you can choose from, the command-line interface requires that you know
the name of the profile definition that you want to use.
Commands
>dialnet start myisp > connect.message
This disk file can then be read and used by the application program.
• DialNet Start
The DialNet Start function connects this system to the remote PPP server
defined in the profile definition. For instance:
The PPP server is not started. (See the Setup Net Dial-Up Networking
command.)
The profile name specified is not defined.
The profile is already in use by another user.
The serial port referenced in the profile definition is in use by
another task.
The telephone number is invalid or cannot be reached at this time
(busy or your phone line is already in use).
The “Login Name” and/or “Password” specified in the profile defini-
tion is invalid. Remember that some PPP servers use case-sensi-
tive account names and almost all use case-sensitive passwords.
DialNet 169
• DialNet Stop
The DialNet Stop function disconnects this system from a currently con-
nected remote PPP server. For instance:
• DialNet Status
The fields displayed in this status report have the following meanings:
170 DialNet
Connection task The user process number assigned for this connection.
Host IP address The dotted IP address assigned by the remote PPP server
for your system on its network.
Commands
Bytes received The number of bytes received over this connection.
Packets sent The number of TCP/IP packets transmitted over this connec-
tion.
Packets received The number of TCP/IP packets received over this connec-
tion.
Largest packet received Size of largest packet received from PPP server.
Registered users for this profile Indicates the number of users that are
actively using this connected profile at this time.
Connect time The length of time that this profile has been connected.
Serial port speed The transmission speed between your computer and the
modem. This value is specified in the profile definition.
This connection is the default gateway. Indicates that, while this profile is
connected, it is the default gateway. When the profile is discon-
nected, the default gateway reverts to the gateway specified in
the Setup Net Identification menu. (See THEOS Corona Version 5
Operating System Installation and Setup Guide.)
DialNet 171
Dynamic IP Because dial-up connections to ISPs cause your IP address to be dynami-
Addresses cally assigned, each time that you connect you may have a different IP
address assigned to your computer on their network. Besides displaying
the IP address assigned to you, DialNet also writes the information to a disk
file.
Each time that you successfully connect to a profile, DialNet writes the
“Host IP address” to the file /THEOS/CONFIG/DUN_IP:S. When you disconnect
Commands
Restrictions To successfully use the DialNet command, several conditions must be met:
To connect two profiles, the definitions for the profiles must use different
serial ports and each must have its own telephone line.
172 DialNet
Disk Command
The Disk command formats and partitions disk volumes, reports on the status of the disk
and disk allocation, and performs diagnostic tests of a disk volume.
1 DISK
Commands
2 DISK /:drive
Operation Mode 1—Invokes the Disk command menu described on page 184.
Mode 2—Display the main, root directory size and location for drive
attached as drive.
>disk /:s
"/:S" directory is at sector 4; offset 20
232 256
116 4,511,768
The above example shows a root directory with two extents (indicating
that it has grown since it was originally allocated). It has a total size of 348
sectors.
Disk 173
Mode 3—Performs one of the status reports or diagnostic tests indicated
by the specific options specified. When no option is specified the default
option of FAST is performed.
>disk i
Disk I label "Image".
File system = THEOS.
Capacity = 2,097,152 (128 cylinders, 2 heads, 32 sectors).
Main directory size = 964 files.
Commands
When the option is FAST or SHOW the drive specification may be the wild
card asterisk ( * ). This displays the disk status for each of the currently
attached drives, in drive search sequence. Drives not included in the drive
search sequence are omitted from this report. (The drive search sequence
is described on page 110.)
The above commands define a drive search sequence that includes the
system drive and two other attached drives. Using i/o redirection, a date
stamp is output to a log file and then the disk status report is appended to
that log file. This log file contains:
174 Disk
Mode 4—Formats a disk volume. Formatting involves the physical for-
matting of every sector on the disk volume and the building of a THEOS
disk volume, including the disk label information and an empty root direc-
tory. See “Formatting Disks” on page 186.
Commands
>disk master.control:s
"MASTER.CONTROL:S" directory is at sector 92; offset 0
64 137
>disk julian.*
"JULIAN.COMMAND:S" directory is at sector 97; offset 128
174 376,638
"JULIAN.BASIC:S" directory is at sector 164; offset 128
1 12,516
4 19,898
"JULIAN.ORIGINAL:S" directory is at sector 203; offset 0
5 9,157
"JULIAN.OLDCMD:S" directory is at sector 245; offset 128
174 376,464
The first number displayed on the second line is the count of the number of
sectors used by the file starting at the sector number shown on the right.
Thus, in the above example, the MASTER.CONTROL:S file has a single extent
that uses 64 sectors starting at sector number 137.
Options ACCOUNT This option has meaning only when used with the MAP option.
It restricts the map display to those files owned by the current
account. Compare the following example with the example
shown with the MAP option.
>logon acct9
Disk 175
Normally when a file is erased, its directory entry is marked as
deleted and the disk space is returned to the free space map.
The data in the file still resides on the disk and could be
accessed by someone using the patch command. The data is not
destroyed until the space is overwritten by another file.
CLEAR Clears the disk of all files and directory entries. The root direc-
tory is rebuilt as an empty directory using its current allocated
size. Use the SIZE option to clear the directory to a different
size.
>disk f (clear
FAST Displays a quick disk status. Unlike the SHOW option, files are
not counted and misallocations are not checked. This is the
default option when no options are indicated
>disk j
Disk I label "Image".
File system = THEOS/IMG.
Capacity = 1,048,576 (64 cylinders, 2 heads, 32 sectors).
Main directory size = 964 files.
Allocated bytes = 941,568.
Available bytes = 107,008.
Compare this display with the display from the SHOW option.
FRAGMENT Displays a list of all of the files that are fragmented or use
more than one extent.
176 Disk
A file may be fragmented for one of three reasons: When it was
originally created there was insufficient contiguous disk space
for the entire file; the file grew in size and, at that time, the
next free space available was not contiguous with the existing
file; the file is larger than the maximum size for one extent.
Commands
FREE Displays the list of available sectors for the disk.
>disk j (free
Sector Count
867 79
2,189 308
2,891 27
4,092 4
HEX This option can be used with the MAP and FREE options to
cause the numbers to display in hexadecimal.
0 4 ** boot
4 1 ** label
5 0x35 ** main directory
0x3A 1 ** free space map
0x3B 0x1FC5 ** available sectors
LABEL Changes the disk volume label. The new label can either be
specified on the command line by following the LABEL keyword
with an equal sign and the new label or, when this is not done,
you are asked for the new label.
>disk f (label
>disk f (label=Example
Disk labels may use upper and lowercase letters, digits. the
underscore, space or period characters. Labels are limited to a
maximum of eight characters.
Disk 177
MAP Displays a usage map of all sectors on the drive volume. This
map display is in disk sector number sequence.
>disk i (map
0 4 ** boot
4 1 ** label
Commands
The “Ext” column has numbers in it only for those files that are
fragmented. See the FRAGMENT option description on page
176.
Message Meaning
178 Disk
Message Meaning
Commands
tifies an area of the disk that is
“owned” by two or more files.
MULTIUSER Tells Disk not to check for multiuser operation before perform-
ing the requested function. When Disk is instructed to FORMAT
or FIX a public disk, it requires single user mode. If other users
are logged onto the system, it displays the message: “Must be
single user or private volume.”
Using this option tells Disk to not restrict the function to sin-
gle-user operation (the message is still displayed). See “Cau-
tions” on page 187.
NOASK When used with the CLEAR option, suppresses the request “Ok
to erase all files...”. Use this option only if you are certain that
you have specified the proper disk.
Note that disk caching is not bypassed. For small disk volumes
with disk caching enabled, this means that most if not all of
the disk testing will be satisfied by the disk cache memory and
is not a true test of the disk access. In this situation, disk cach-
ing should be disabled. See “Cache” on page 43.
Disk 179
SHOW Analyzes the disk and displays the disk status. All files are
counted and the allocations for each file are checked. Under or
over-allocated amounts are reported.
>disk s (show
Disk S label "THEOS5".
Archived to disk "Thursday" on 8 January, 2002, at 16:25.
File system = THEOS/LFS.
Capacity = 13,752,668,160 (1,672 cylinders, 255 heads, 126 sec).
Main directory uses 125 out of 855 files.
Commands
180 Disk
SIZE This option can be used with the CLEAR or SHOW option.
When used with the CLEAR option, you must specify the
desired directory size immediately following this keyword.
Commands
>disk a
Disk A label "Image".
File system = THEOS/IMG.
Capacity = 2,097,152 (128 cylinders, 2 heads, 32 sectors).
Main directory size = 212 files.
Allocated bytes = 15,104.
Available bytes = 2,082,048.
>disk s (verify
Note: The VERIFY option causes the Disk command to first ver-
ify that the disk contains a THEOS file system (4GB, LFS,
IMG, RAMDISK). If it contains another file system (DOS,
FAT32, CDROM, etc.) it reports “IFS disks cannot be opened”
and exits without verifing the sectors on the disk.
Disk 181
Format BOOT Copies the file /THEOS/OS/LOADER1.SYS to sectors 0–3. Refer to in
Options Appendix D: “System Files” in the THEOS Corona Version 5
Operating System Reference for a description.
DENSITY Specifies the density of each sector on the disk and whether or
not the disk is removable or fixed. The code is specified imme-
diately following the DENSITY keyword.
182 Disk
LABEL Specifies the disk volume label for the newly formatted or built
disk. The new label can either be specified on the command
line by following the LABEL keyword with an equal sign and
the new label or, when this is not done, you are asked for the
new label after the disk is formatted or built.
Disk labels may use upper and lowercase letters, digits and the
underscore character.
Commands
This is a default option whenever a disk is formatted or built.
SIZE Specifies the size of the main directory. This size cannot be
changed again without reformatting, building or clearing the
disk.
Disk 183
Disk Menu When no drive code or options are specified, the Disk command menu is
displayed:
Commands
Select Drive... Selects the drive that will be used in this next menu selec-
tion. Unless this item is used to select a different drive, the default drive of
S is used. You cannot clear or format the system disk.
Test Disk Misallocation. Performs a Disk (SHOW on the selected drive and
then exits. Refer to the SHOW option description on page 180.
Fast Show. Performs a Disk (FAST on the selected drive and then exits.
Refer to the FAST option description on page 176.
File Map. Performs a Disk (MAP on the selected drive. Refer to the MAP
option description on page 178.
Account File Map. Performs a Disk (MAP ACCOUNT on the selected drive
and then exits. Refer to the ACCOUNT option description on page 175.
Free Map. Performs a Disk (FREE on the selected drive and then exits.
Refer to the FREE option description on page 177.
Fix Misallocations. Performs a Disk (FIX on the selected drive and then
exits. Refer to the FIX option description on page 176.
Seek to Random Sectors. Performs a Disk (SEEK on the selected drive and
then exits. Refer to the SEEK option description on page 179.
Surface Analysis. Performs a Disk (VERIFY on the selected drive and then
exits. Refer to the VERIFY option description on page 181.
Write Boot Strap Program. Performs a Disk (BOOT on the selected drive
and then exits. Refer to the BOOT option description on page 182.
184 Disk
Change Drive Label. Performs a Disk (LABEL on the selected drive and
then exits. Refer to the LABEL option description on page 177.
Clear Main Directory. Performs a Disk (CLEAR on the selected drive and
then exits. Refer to the CLEAR option description on page 176. You cannot
clear the system disk.
Clean Unused Disk Space. Performs a Disk (CLEAN on the selected drive
Commands
and then exits. Refer to the CLEAN option description on page 175.
Disk 185
Formatting Floppy diskettes and removable hard disks can be formatted by using the
Disks Disk menu described on page 184 or Mode 4 of the Disk command. Use the
Setup Disk to perform initial partitioning and setup of hard disks and Setup
Floppy to format floppy diskettes or Setup Disk to format removable hard
disks in bulk.
Before a floppy diskette can be used for the first time by THEOS, it must
be formatted or built. A “quick format” or BUILD can be done on an unused,
preformatted diskette or a previously formatted diskette. This writes the
THEOS/4GB file system information on the disk with an empty directory.
For instance:
If all of these parameters are not specified on the command line, you are
asked to select one of the known formats supported by the drive:
>disk f (format
186 Disk
In either situation, you are next asked to put the diskette in the drive.
Pressing any key other than (Esc) starts the formatting process:
Cylinder: 5 Head: 1
7%
Commands
After the diskette is formatted, Disk needs a label. This label can be speci-
fied on the command line with a LABEL= option. When it is not supplied on
the command line, you are asked for the label. After the label is known, the
diskette is built by writing the label sector, empty directory and free space
map. The size of the directory can be specified on the command line with
the SIZE option or, if that is not done, a default size is used.
Although space is reserved on the disk for a bootstrap loader (sectors 0–3),
it is not written to the disk unless the BOOT option is used.
Defaults The FAST option is the default option when only a drive code is specified.
Cautions The MULTIUSER option tells the Disk command to not check whether or not
other users are logged on or active. It does not prevent those other users
from performing operations that change the database that this Disk com-
mand might be using.
Do not use the MULTIUSER option unless you are sure that any other users
logged onto the system are not going to be using the drive that you are
modifying.
Disk 187
Restrictions The Disk command requires a privilege level of four.
The Disk command cannot show the status of a a file on a CD-ROM disc,
nor can it be used on a DOS-formatted disk except to reformat it as a
THEOS-formatted disk.
188 Disk
Echo Command
The Echo command defines a file or device that will be used for subsequent echoing of con-
sole displays. Alternately, it echoes the remainder of the command line to the standard out-
put device.
Commands
1 ECHO file
2 ECHO device
3 ECHO
4 ECHO text
Operation Mode 1—Indicates that file is to be opened to receive console display ech-
oes. To specify a file that has no file type, be sure to use the period termi-
nator after the file name.
>echo console.output
>echo example.
Console echoing is not enabled with this command. That is done by entry
of (Break),(P).
>echo prt12
Console echoing is not enabled with this command. That is done by entry
of (Break),(P).
Echo 189
Mode 4—Displays text on the console. If console echoing was enabled with
Mode 1 or 2 of the Echo command and (Break),(P) has been entered, this text
is also echoed to the echo file.
>echo example
example
Commands
Make sure that text does not look like a file or device name. Any text that
contains two or more words or tokens will not be misinterpreted. If neces-
sary, add a “dummy” token.
Notes Except for Mode 4, the Echo command does not actually echo anything to a
file. After a file or device is defined with the Echo command, you must
enter a (Break),(P) to start and stop the echoing process.
The Echo command is normally used with I/O redirection or in EXEC pro-
grams to add text to a log file.
See also I/O redirection, described on page 53 in the “Fundamentals” section of the
THEOS Corona Version 5 Operating System Reference.
190 Echo
Edit Command
1 EDIT filename
Commands
2 EDIT filename ( option
Operation This command edits an existing text file or creates a new text file.
>edit sample.text
Top of file "/SAMPLE.TEXT:S".
End of file "/SAMPLE.TEXT:S".
>edit _chdir.msg
Top of file "/THEOS/COMMAND/_ChDir.msg:S".
Standard THEOS Command directory
Options NOBACKUP Does not make a backup file when changes to this file are
saved.
Notes WinWrite is a more modern full-screen text file editor and should be used
instead of this command.
Edit While in full-screen mode, you can type text and use the following keys for
Full-Screen editing the text in the file:
Commands
Command Meaning
(F1) Search forward
(ShiftÌñ)+(F1) Search backward
(F2) Move to start of next word
(ShiftÌñ)+(F2) Move to start of previous word
(F3) Repeat last find or search
(F4) Find line starting with specified text
Edit 191
Command Meaning
(F5) Erase from cursor to end of line
(F6) Insert line above current line
(ShiftÌñ)+(F6) Delete current line
(F7) Change case of character under cursor
Commands
(ShiftÌñ)+(F7) Transpose
(F8) Move to start of current line
(ShiftÌñ)+(F8) Move to end of current line
(F9) Quit
(F10) Save and quit
(ShiftÌñ)+(F10) Save
(Insert) Toggle between insert and replace character mode
(Delete) Delete the character under the cursor
(Home) Move to top of file (Top)
(End) Move to end of file (Bottom)
(PageÌUp) Move to and display previous page
(PageÌDown) Move to and display next page
(¤) Move cursor one character to right
(˜) Move cursor one character to left
(˚) Move cursor one line up
(˙) Move cursor one line down
(Esc) Change to Command mode
Edit Most of the actions that you can perform in full-screen mode can also be
Commands performed in command mode. To switch between the two modes use the
(Esc) key. When in command mode you can use the following commands:
BOTTOM
BOTTOM
192 Edit
CHANGE
1 CHANGE
2 CHANGE /from/to
Commands
3 CHANGE /from/to/lines
Mode 1—Repeat the last CHANGE command on the text in the current
line.
Mode 3—Change the first occurrence of from to to for each of the next
lines number of lines, starting with the current line.
CSI
Edit 193
CSI command
DELETE
Commands
1 DELETE
2 DELETE lines
3 DELETE /string/
Mode 2—Delete lines number of lines starting with the current line.
Mode 3—Delete each line in the file, starting with the current line, and
continuing until a line containing string is found. Does not delete the line
containing string.
DUP
1 DUP
2 DUP lines
FORMAT
194 Edit
GET
1 GET
Commands
3 GET filename from to
Mode 1—Get and insert the text in the clipboard into this file at the cur-
rent line. Text is placed in the clipboard by the PUT command and by copy
and paste operations supported by other applications.
Mode 2—Get lines of text from the file specified as filename. Get zero or
more lines of that file until, but not including, the line specified by from.
from specifies a line either by a line number or by identifying the line with
a text string that occurs in the line.
Mode 3—Get lines of text from the file specified as filename. Get zero or
more lines of that file, starting with the line specified by from up to but not
including the line specified by to.
Edit 195
GOTO
GOTO line
Commands
The cursor and the current line is set to line number line of the text file. If
that line is beyond the end of the file the current line is set to the line after
the current end of the file.
LENGTH
NAME
1 NAME
2 NAME filename
filename »
PRT
PUT
196 Edit
1 PUT
2 PUT to
3 PUT filename to
Commands
filename » Name of file to put text to
to » /string/
line
Mode 2—Copy text to the clipboard starting with the current line and con-
tinuing until, but not including, the line specified by to. This replaces any
text currently in the clipboard.
PUT 3
PUT /the/
The above command puts zero or more lines of text to the clipboard, start-
ing with the current line and continuing until the line containing text is
found.three lines of text to the clipboard.
Mode 3—Copy text to the specified filename, starting with the current
line and continuing until the line specified by to is found. These lines
replace any text that may be in the file currently.
PUTD
Similar to the PUT command except that the text lines are removed from
this file after they are copied to the clipboard or the specified filename.
Edit 197
1 PUTD
2 PUTD to
3 PUTD filename to
Commands
QUIT
QUIT
If there have been any changes made to the file you will be asked:
TOP
TOP
VIEW
Restrictions Only ASCII, stream files can be edited with this command.
198 Edit
Eject Command
The Eject command ejects the media in a removable disk, disc drive or tape drive, or it ejects
a page in a printer.
1 EJECT device
Commands
device » name of tape or CD-ROM device or output device such as PRT3
Operation When device is an attached CD-ROM drive, the drive’s disc tray is opened.
Cautions If the device is publicly attached, you may be interfering with the opera-
tion of another user’s program.
Restrictions The removable disk drive, tape or CD-ROM must support software-con-
trolled ejecting.
Eject 199
Commands
200 Eject
EmailChk Command
Commands
mailbox » name of the mailbox to check
password » password for mailbox
folder » name of folder in mailbox to check
Operation Mode 1—The default Inbox folder in mailbox is tested for unread mes-
sages. The number of unread messages found in mailbox is returned as the
return code of the command.
Notes This command does not check for mail on your POP server. The mail mes-
sages must have been previously downloaded from the server to this
system with the TheoMail command.
Defaults When a folder is not specified (Mode 1), the standard Inbox folder is used.
RC Meaning
-1 mailbox name is invalid, doesn’t exist or is corrupted.
-2 folder in mailbox does not exist.
-3 THEO+Mail is not installed correctly or not configured.
-4 mailbox name is missing.
-5 mailbox is password-protected.
Restrictions As indicated by the error return codes, EmailChk can only access mailboxes
that exist and are configured properly.
EmailChk 201
If mailbox is password-protected, you can only access it if the PASSWORD
option is specified on the command line.
Examples The following MultiUser BASIC language program segment checks a spe-
cific folder in a mailbox for incoming, unread messages.
Commands
202 EmailChk
EmailDel Command
The EmailDel command deletes messages from the Inbox folder of a mailbox.
Commands
mailbox » name of mailbox to be checked
options » PASSWORD
Operation All of the messages marked as read in the Inbox of mailbox are removed.
These messages are removed without being moved to the mailbox’s Deleted
folder.
Options The only option for this command is the PASSWORD option. It is used
when the mailbox is password-protected. Specify the password after the
keyword PASSWORD.
Restrictions mailbox must refer to an existing THEO+Mail mailbox and that mailbox
must not be currently in use by TheoMail.
>EmailDel General
EmailDel 203
Commands
204 EmailDel
EmailGet Command
The EmailGet command gets the next unread message from a folder in a mailbox.
Commands
mailbox » name of mailbox to be checked
folder » name of folder in mailbox to check
options » ALL FN PASSWORD
Operation Mode 1—The default Inbox folder in mailbox is tested for unread messages
and, if there is at least one unread message, that message is converted to a
plain text file named mailbox.TEXT.
If the message has attachment files associated with it, they are extracted
and saved in files named mailbox.ATTACH1 through mailbox.ATTACHn. Addi-
tionally, a file is created named mailbox.ATTACH that lists the message’s
headers and includes a line for each attachment extracted that shows the
original file name of the attachment. The return code is set to the number
of attachment files saved.
Options ALL Extracts and saves the message with all of the MIME headers
for the message. The message saved is the same as if TheoMail
was used and its File Menu, Save As “E-mail” menu item was
used.
When this option is not used, the message is saved with only
the standard headers From, To, Cc, Date and Subject.
EmailGet 205
FN This option specifies the saved message’s file-name. The file-
type of a saved message is always TEXT. Attached files also use
this file-name.
When this option is not used the message is saved with a file-
name that is the same as the mailbox name.
Notes The message retrieved with this command is marked as read in the mail-
box folder. A subsequent EmailGet on the mailbox will get the next unread
message in the folder.
This command does not get mail from your POP server. The mail messages
must have been previously downloaded from the server to this system with
the TheoMail program.
You can get mail from the POP server without operator attendance by
invoking the TheoMail with the command-line argument CHECK:
>TheoMail (CHECK
When TheoMail is started with the CHECK option TheoMail ignores the
Check for New Mail and Send on Check settings in the mailbox’s configura-
tion and checks for incoming mail one time and then exits. Message filter-
ing may occur on those messages according to the filter rules defined in the
mailbox.
206 EmailGet
Attachments When the unread message contains one or more attached files, those
attachments are extracted from the message and saved as separate files
with file-types of ATTACHnn where nn indicates the attachment number of
the attachment within the message.
Also, when there are attachments for the message, an additional file is cre-
ated named mailbox.ATTACH (or filename.ATTACH if the FN option was used.
This file contains the message headers and one line for each attachment
Commands
file specifying the original attached file name and the saved-as file name.
Fred Flintstone
<<Attachment: archive.test>>
<<Attachment: cleanup.exe>>
PRIVATE.TEXT This file contains the text of the message. For instance:
Fred Flintstone
PRIVATE.ATTACH This file contains the message headers and the attach-
ment summary. For instance:
EmailGet 207
PRIVATE.ATTACH1 Contains the first attached file from the message.
Defaults In Mode 1 the default folder name that is checked for unread mail is Inbox.
When the FN option is not used the file-name portion of the saved message
and attachments is mailbox.
Commands
RC Meaning
-1 No unread messages in folder of mailbox.
-2 mailbox name is invalid, doesn’t exist or is corrupted.
-3 THEO+Mail is not installed correctly or not configured.
-4 mailbox name is missing.
-5 folder in mailbox does not exist.
-6 Cannot create mailbox.TEXT or one of mailbox.ATTACH1
through mailbox.ATTACHn files (mailbox may be
filename if FN option is used).
-7 mailbox is password-protected.
Restrictions As indicated by the error return codes, EmailGet can only get a message
when there is at least one unread message in the indicated folder; can only
access mailboxes that exist and are configured properly; and can only
access folders in the mailbox that exist and are configured properly.
Cautions The message and attachment files saved by this utility may overwrite pre-
vious message and attachment files. If the information needs to be saved
for any period of time, it should be renamed to an unused file name.
208 EmailGet
Example The following MultiUser BASIC language program segment is the continu-
ation of the example segment used for the EmailChk on page 201.
Commands
1170
1180 IF CSI.RETURN.CODE<0 ! Error?
1190 PRINT "Error encountered when getting mail."
1200 PRINT "Return code =";CSI.RETURN.CODE
1210 QUIT 1
1220 IFEND
1230
1240 ! Process message file
1250
1260 ATTACH.COUNT% = CSI.RETURN.CODE! Number of attachments
1270
1280 OPEN #16: "PRINTER" OUTPUT SEQUENTIAL
1290 OPEN #1: "SALES.TEXT" INPUT SEQUENTIAL
1300 LINPUT #1: TEXT.LINE$
1310 WHILE NOT EOF(1)
1320 PRINT #16: TEXT.LINE$
1330 LINPUT #1: TEXT.LINE$
1340 WEND
1350 PRINT #16:
1360 CLOSE #1
1370
1380 FOR ATTACH% = 1 TO ATTACH.COUNT%
1390 PRINT #16: "Attached file: ";CRT$("EOL");
1400 PRINT #16: "SALES.ATTACH"&STR$(ATTACH%);CRT$("EOS")
1410 NEXT
1420 CLOSE #16
1430
1440 WEND
...
EmailGet 209
Commands
210 EmailGet
EmailPut Command
The EmailPut command is a utility program that operates similar to the SendMail but,
instead of sending the message to the SMTP server, merely places it in a mailbox’s Outbox
folder. The message is ready to be sent the next time that that mailbox is used for sending
messages. This program is designed with a simple, command-line interface suitable for
usage as a tool in application programs. For a mail client with a more user-friendly inter-
Commands
face, use the TheoMail command described on page 143.
BCC addr Add the addr as a “Blind Carbon Copy” recipient of the mes-
sage.
REPLYTO addr Use addr as the “Reply To” address of this message. The
default reply-to is the FROM addr.
EmailPut 211
Embedded The filename may contain embedded mail headers.
Mail Headers
Refer to the SendMail command description of Embedded Mail Headers on
page 533.
Including Text The filename may also contain “boilerplate” text file inclusions.
Files
Refer to the SendMail command description of Including Text Files on page
Commands
535.
Notes Enclose the option arguments within quotation marks. Although not
required, without quotation marks the arguments will be folded to upper-
case and embedded commas or spaces will terminate the argument.
When there are more than 50 addresses in the To, Cc and Bcc fields (com-
mand-line options or in the embedded addressing fields), multiple copies of
the message are sent, 50 addresses per message.
SendMail mailbox must refer to an existing THEO+Mail mailbox and that mailbox
Command must not be currently in use by TheoMail.
Restrictions
The file name specified for the message text file, and any %include files,
must refer to ASCII text files. These files, and the optional attachment
files, must be accessible from the current account. The file name specifica-
tions may include the path specification.
Every message must have a To field and a From field specified with com-
mand-line options or embedded headers.
...
212 EmailPut
Encrypt Command
The Encrypt command encrypts a sequential file using public key/private key Data Encryp-
tion Standard (DES) 56-bit or 128-bit encryption algorithms.
Commands
2 ENCRYPT source ( option password > destination
DES DES128
DES56 TDES
Operation Using the public key built into the Encrypt command and the private key
password specified, the source file is encrypted using the requested algo-
rithm and the result is output to the destination file. The source file must
be a stream or sequential organization file.
Notes Data Encryption Standard (DES) originated at IBM in 1977 and was
adopted by the U.S. Department of Defense. It is specified in the American
National Standards Institute X3.92 and X3.106 standards and in the Fed-
eral FIPS 46 and 81 standards. DES is a widely-used method of data
encryption that uses a public key and a private or secret key.
With 56-bit DES encryption, there are 72×1015 (72 quadrillion) or more
possible encryption keys that can be used. Like other private-key encryp-
tion methods, both the sender and the receiver must know and use the
same private key. DES was once judged so difficult to break by the U.S.
government that it was restricted for exportation to other countries. Most
Encrypt 213
of these restrictions have been lifted, partly because it has been proven
that the encryption can be broken using “brute force” techniques. Still, the
security it provides is more than sufficient for all but the most sensitive
data privacy needs. 128-bit encryption provides much better security but it
can also be broken given sufficient time.
Because the password is case-sensitive and the CSI normally folds the
arguments to uppercase, it is best to always enclose the password in quota-
Commands
When not specified, the destination file is stdout. This can be redirected to a
file or another program.
The above command will encrypt the source file and output it to the screen.
This command encrypts the source file using password1 with 128-bit
encryption, pipes the result to the Encrypt command again to re-encrypt the
encrypted file using password2 and 128-bit encryption. The result is saved
in dest.
Defaults When encrypting a file, if the algorithm is not specified then DES 56-bit
encryption is used.
Cautions The private-key password is not embedded in the encrypted file. If a differ-
ent key is used to decrypt the file the Decrypt command cannot report the
error and will merely generate a destination file that is not a properly
decrypted form of the original file. Remember your passwords but do not
write them down for security reasons.
214 Encrypt
Erase Command
Commands
2 ERASE ( options
file » file name with optional path; may contain wild cards
options » CLEAN NOTYPE
NOQUERY QUERY
NOSAVE TYPE
Operation Note: This command does not normally remove files from disk. Instead, it
moves the requested files to the recycle bin. You must use the NOSAVE
option to remove the file from the disk with this command. Refer to Recycle
Bin in the THEOS Corona Version 5 Operating System Reference manual.
Mode 1—Attempts to erase file and displays the result of the attempt.
>erase sample.data
"SAMPLE.DATA:S" erased.
One file erased, 3,840 bytes recovered.
Unless the NOTYPE option is used, a result message is displayed after all
files are erased. This shows the number of files erased and the number of
bytes recovered due to erasing those files.
When file is a subdirectory name, the Erase command will only erase the
directory if it contains no files. Use the RmDir command to erase directories
that contain files or erase the files first and then erase the directory.
>erase
Enter file name list, terminate with empty line.
?OUTPUT.LOG
"OUTPUT.LOG:S" erased.
?SAMPLE.OUTPUT
"SAMPLE.OUTPUT:S" erased.
?*.BACKUP
Erase 215
Commands
Mode 3—file is an ASCII stream file containing one file description per
line. Each file description in file is erased. As each file is erased its file
description is displayed (unless the NOTYPE option is specified). When the
file description in file contains wild cards, you are queried for permission
to erase each file that matches the specifications (unless the NOQUERY
option is specified).
This mode of the Erase command is convenient when one or more sets of
files are repetitively being erased. Merely edit a file containing the file
description, such as:
>edit daily.erase
work.master:s
work.history:s
work.invoices:s
work.ledger.*:s
temp*.*:s
sort*.*:s
/programs/program.backlib.*:s
Options CLEAN Specifies that the contents of file are cleaned by writing zeros
to every byte of the file. The file is erased after it is cleaned.
NOQUERY Tells Erase to not ask for confirmation before erasing each file.
This is a default option when wild cards are not used.
216 Erase
NOSAVE Causes the files to be erase from the disk at this time. When
this option is not specified and the drive is an image drive or
hard disk drive, the file is moved to the recycle bin.
NOTYPE Tells Erase to not display the results of each file erased on the
standard output device. The general result message (the “nn
files erased, nnn bytes recovered.” message displayed before
exiting Erase) is also suppressed with this option.
Commands
>erase gl.* (not
Ok to erase "GL.MASTER:S" (Yes,No,All) Y
Ok to erase "GL.JOURNAL:S" (Yes,No,All) Y
Ok to erase "GL.HISTORY:S" (Yes,No,All) Y
QUERY Tells Erase to “query” or ask if each file matching the file speci-
fications is to be erased. This is a default option when wild
cards are used. To disable this option use the NOQUERY
option.
>erase *.backup
TYPE A default option that tells Erase to display the results of each
file erased on the standard output device. This display can be
redirected.
Erase 217
Notes If file is a “typeless” file description, there is no default library defined and
the environment variable FILETYPE is defined, the value of FILETYPE is
appended to file to form a complete file description with file-name and file-
type. To erase a typeless file you should specify the file description with a
period terminator. See “FILETYPE” on page 103 of the THEOS Corona
Version 5 Operating System Reference for more information about this
environment variable.
Commands
Recycle Bin When the NOSAVE option is not used, all of the files erased by this com-
mand are not actually erased. Instead, the file is moved to the recycle bin
which is a special, reserved directory on the SYSTEM account. Should the
need arise, an erased file can be recovered from this recycle bin by using
the UnErase command. However, due to space limitations, files in the recy-
cle bin are not retained forever.
Restrictions You may erase files that are owned by the current account if the files are
not erase protected. You may erase files owned by another account if they
are not erase protected and they do not have shared read or shared write
protection enabled.
A library cannot be erased if it has any member files. The members must
be erased first and then the library may be erased.
218 Erase
Exit Command
This command exits from the Shell environment or, if you are not using Shell environment,
this command logs off of the system.
EXIT
Commands
Operation The specific operation of this command depends upon your current envi-
ronment:
Exit 219
Commands
220 Exit
Expand Command
The Expand command extracts and expands a file from a “compression library” created with
the Compress command.
1 EXPAND compress-file
Commands
2 EXPAND compress-file destination ( options
compress-file » file name with optional path of the compression library file
destination » destination file name with optional path; may contain wild
cards; may be a simple drive specification
file » file name of compressed file to be expanded, with optional
path; may contain wild cards
options » NEWFILE OLDER QUERY date1
NOQUERY OLDFILE REPLACE date2
NOTYPE PASSWORD TYPE
>expand programs.cmp s
/bmenu.basic:s
/func_key.basic:s
/menu.basic:s
/model.basic:s
/paint.basic:s
If the compression library uses the default file-type of .CMP you may omit
specifying the file-type in the command line. For instance:
>expand programs s
Expand 221
Mode 3—Each file specified on the command line is extracted from com-
press-file, expanded and stored on destination.
Mode 4—The files listed in file are extracted from compress-file, expanded
and stored on destination. file must be an ASCII stream file containing one
file description per line. The SELECTED.FILES and SELECTED.EXEC files created
by FileList and the FOUND.EXEC created by Look can be used for this specifi-
cation file (see “The EXEC and FILES Options” on page 239 of the THEOS
Corona Version 5 Operating System Reference.) You may also create the
specification file with an editor or application program.
A file now exists (SELECTED.FILES:S) that lists all of the files on the A disk
that have been changed between 10/01/2001 and 10/08/2001. The following
command will expand these files from their compressed form:
Options NEWFILE A default option that tells Expand to expand files if file does not
already exist. Note: If QUERY is used, you are not queried
about files if the destination file name already exists.
NOQUERY Tells Expand to not ask for confirmation before expanding each
file. This is a default option when Mode is used or when wild
cards are not used.
>expand programs s
/bmenu.basic:s
/func_key.basic:s
/menu.basic:s
/model.basic:s
/paint.basic:s
/phonenbr.basic:s
222 Expand
To disable this option use the QUERY option.
NOTYPE Tells Expand to not display the results of each file compressed
and also to suppress the progress bar. Only error messages are
displayed on the stderr device. The general result message (the
“nn files expanded.” message prior to exiting Expand) is also
suppressed with this option.
Commands
>expand gl.compress s gl.* (not
Ok to replace "/GL.MASTER:S" (Y|N|A|G)? Y
Ok to replace "/GL.JOURNAL:S" (Y|N|A|G)? Y
Ok to replace "/GL.HISTORY:S" (Y|N|A|G)? Y
OLDER Expands the file to the destination only if the destination file’s
last change date is older than the compressed file’s or if the
destination file does not exist. The REPLACE option is implied
by this option. Note: If QUERY is used, you are not queried
about files if the destination file is newer.
OLDFILE Indicates that Expand should expand a file only if the destina-
tion file name already exists. This is the opposite of the NEW-
FILE option and implies a REPLACE option. Note: If QUERY is
used, you are not queried about files if the destination file
name does not exist.
Expand 223
Note the message reports this as a fatal error. That is done
because Expand cannot tell if the file really is corrupted or that
you merely type the wrong password.
QUERY Tells Expand to “query” or ask if each file matching the file
specification is to be expanded. This is a default option when
wild cards are used.
Commands
>expand backups i
If the destination file does not exist, this option has no effect:
The file is created just as if the REPLACE option was not speci-
fied.
224 Expand
TYPE In combination with the NOTYPE option, this is a tri-state
option that tells Compress whether to display the results of
each file compression or not. When TYPE and NOTYPE are not
specified, Compress displays a progress bar and any error mes-
sages but does not display the names of the files being com-
pressed. Specifying TYPE displays the names of the files being
compressed. NOTYPE displays only error messages. This dis-
play can be redirected.
Commands
>expand programs s (noquery
/program.source.bmenu:s
/program.source.func_key:s
/program.source.menu:s
/program.source.model:s
/program.source.paint:s
/program.source.phonenbr:s
date1 Expands a file only if the file in compress-file has a last change
date that is greater than or equal to this date. That is, if the
compressed file was changed on or after this date.
The above command will expand only those files that have
been created or changed since January 1, 2002.
date2 Expands a file only if the compressed file’s last change date is
less than or equal to this date. That is, if the compressed file
was changed on or before this date. May only be specified by
first specifying the date1 option.
Expand 225
This command expands only those files that have been created
or changed since October 14, 2002, but not any files that were
created or changed after October 30, 2002.
To specify a date2 when you don’t care about date1, use a date
of 1/1/86 for the date1 option. This is the earliest date main-
tained by the THEOS file system.
Commands
226 Expand
File Command
The File command analyzes a file and reports on its organization and general function.
1 FILE file...
Commands
2 FILE file ( FILES
Operation Mode 1—Each file specified on the command line is examined for its orga-
nization (program command, stream, indexed, etc.) and its contents (pro-
gram object, formatted records, program source, etc.). The result of this
analysis is output as a message on the standard output device.
>file /theos/os/*.*
"/THEOS/OS/Message:S" is a subdirectory.
"/THEOS/OS/TIMESYNC.SYS:S" is a 32-bit program file.
"/THEOS/OS/UPGRADE1:S" is a 32-bit program file.
"/THEOS/OS/TEST.O:S" is a 32-bit object file.
...
In addition to using wild card specifications, more than one file may be
specified on the command line.
Mode 2—The files listed in file are analyzed. file must be an ASCII stream
file containing one file description per line. The SELECTED.FILES and
SELECTED.EXEC files created by FileList and the FOUND.EXEC created by Look
can be used for this specification file (see “The EXEC and FILES Options” on
page 239). You may create the file with an editor or application program.
A file now exists that lists all of the “data” files and all files that have been
changed since 10/01/2001. The following command checks these files for
organization and content:
>file selected.exec (file
File 227
Notes If file is a “typeless” file description, there is no default library defined and
the environment variable FILETYPE is defined, then the value of FILETYPE
is appended to file to form a complete file description with file name and
file type. To report on a typeless file you should specify the file description
with a period terminator. See “FileType” on page 245 .
228 File
FileList Command
1 FILELIST ( options
Commands
2 FILELIST file... ( options
This command produces a directory listing of files. By default, this directory listing includes
the file name description (file-name, file-type, member-name and file-drive), the last date
and time that the file was changed, the file organization or type (program, indexed, library,
etc.), the physical size of the file on disk and, for data files, the record and key length.
By using various options, additional information about the file can be displayed including
the checksum for the file, number of records in the file, growth factor, program privilege
level, protection and attribute codes for the file and program version number.
This directory listing is normally output to the console but it also can be displayed on one of
the attached printers, redirected to a file or device or output as an EXEC language program
or a data file.
FileList 229
Operation Mode 1—Displays a directory listing of all “flat files” in the current direc-
tory of the current account. A flat file is a file that is not a member of a
library.
>Filelist
Commands
>filelist
230 FileList
Mode 2—Displays a directory listing of the specified file description(s).
This is a very powerful mode because, by using wild cards and multiple file
specifications, it allows many different operations to be performed. For
instance:
>filelist *.*.*:s
This displays a list of all libraries, library members and files not related to
Commands
any library (flat files) that are owned by the current directory of the cur-
rent account on the S drive.
>filelist *.*
This displays a listing of libraries and non-library files for all drives in the
default drive search sequence. No library members are included.
>filelist *.*.?*:s
This displays a listing of library member files but not the library itself or
any flat files.
The example above displays a listing of all programs, either flat files (file
type is COMMAND or CMD), EXEC language flat files (file type is EXEC or EXC)
and the commands, execs and link files in the /THEOS/COMMAND directory.
Mode 3—This mode is similar to Mode 2 with the added ability to specify
that groups of files are excluded from the listing. The directory listing pro-
duced includes files that match the file specification before the keyword
NOT as long as they don’t match the file specification following the key-
word NOT. For instance:
This displays all entries for files on the S drive excluding those files with a
file-name of SYSTEM.
Each specification of files that are to be excluded from the listing must be
preceded by the NOT keyword.
This displays all files with a file type of COMMAND or EXEC excluding those
programs with a file name starting with TEST.
FileList 231
The NOT file specifications exclude files that might match the specifica-
tions. For instance,
This command only excludes the “*.DATA” files from the “EXAMPLE.*” specifi-
cation. All files matching “TEST.*” are still included. Also, you may not spec-
ify two or more NOT specifications in a row: There must be a normal
Commands
Mode 4—This is a shorthand method of specifying that you want all files
on the specified drive(s) owned by the current account and in the current
working directory. The following two commands produce the same results:
>filelist s
>filelist *.*:s
>filelist f g
Options ACCOUNT The directory listing will include files owned by all accounts if
they match the file specifications and the other options. This
option requires a privilege level of five.
EXEC and FILES option note: The OWNER option does cause all
qualifying files from all accounts to be included. However, the
owning account name or number is not output.
232 FileList
CUSTOMER.ROUTE1 CUSTOMER.ROUTE1
CUSTOMER.ROUTE2 CUSTOMER.ROUTE10
CUSTOMER.ROUTE10 CUSTOMER.ROUTE102
CUSTOMER.ROUTE20 CUSTOMER.ROUTE2
CUSTOMER.ROUTE102 CUSTOMER.ROUTE20
CHECKSUM Compute and display the checksum for each file. A checksum
is a 16-bit value computed by adding the values of each byte in
a file.
Commands
The checksum value is output in place of the “Recl” and “Keyl”
columns.
COUNT Computes and displays the record count for data files (stream,
indexed, keyed and relative). This record count information
replaces the “Recl” and “Keyl” columns on the right side of a
normal directory listing. Files other than data files are not
analyzed and there is no count information displayed for them.
See “The EXEC and FILES Options” on page 239 for a descrip-
tion of the SELECTED.EXEC file produced with this option and
some of its uses.
See “The EXEC and FILES Options” on page 239 for a descrip-
tion of the SELECTED.FILES file produced with this option and
some of its uses.
GROW Output the protection codes and growth factor for each file.
The GROW and PUBLIC options produce the same results.
FileList 233
The protection codes and growth factor are output in place of
the “Recl” and “Keyl” columns.
HIDDEN Include “hidden” files if they match file specification and the
other options. (Files are marked as hidden with the CHANGE
command described on page 65.)
KEY Each program file matching the file specifications and any
Commands
NEWEST Sorts the output by descending date and time and ascending
file-name, file-type, member-name and file-drive. Thus, the
newest files are listed first. Synonym to the SORT6 option.
NOTYPE Do not display the directory listing, only the summary line.
This option is ignored if the option EXEC or FILES is also speci-
fied.
OWNER The directory listing includes the files owned by account name.
This option requires that you be logged onto the system
account and that you have a privilege level of five.
PRIVLEV Each program file matching the file specifications and any
other restrictive options is analyzed for its privilege level
requirements, its version and version date, and its patch level.
These values are output, replacing the “Org,” “Size,” “Recl” and
“Keyl” columns. All files other than programs will have these
columns blank.
234 FileList
PROTECT Output the protection codes and growth factor for each file.
The GROW and PROTECT options produce the same results.
Commands
M W R E X W R
Owner read protected
Owner write protected
Execute protected
Erase protected
Shared access read protect
Shared access write protect
Modified
PUBLIC Includes files owned by the system account, if they match the
file specifications and any other restrictive options.
SERIAL Analyzes each program file matching the file specifications and
any other restrictive options. The serial number and the privi-
lege level, version number and version date are output, replac-
ing the “Org,” “Size,” “Recl” and “Keyl” columns. All files other
than programs will have these columns blank.
SIZE Sets the return code to the total size of the files listed, in kilo-
bytes (K).
FileList 235
SORT2 Sorts the output by file-drive, file-name, file-type and member-
name.
SORT6 Sorts the output by descending date and time and ascending
file-name, file-type, member-name and file-drive. Thus, the
newest files are listed first.
This second examples sort the listing by file type and file size.
TYPE A default option that outputs the directory listing to the con-
sole.
VERSION Each program file matching the file specifications and any
other restrictive options is analyzed for its privilege level
requirements, its version and version date, and its patch level.
These values are output, replacing the “Org,” “Size,” “Recl” and
“Keyl” columns. All files other than programs will have these
columns blank.
236 FileList
The PRIVLEV and VERSION options produce the same results.
date1 Includes a file only if the file’s last change date is greater than
or equal to this date. That is, if the file was changed on or after
this date.
Commands
>filelist *.*:s (10/15/01
The above command will include only those files that have
been created or changed since October 14, 2001.
date2 Includes a file only if the file’s last change date is less than or
equal to this date. That is, if the file was changed on or before
this date. May only be specified by first specifying the date1
option.
This command includes only those files that have been created
or changed since October 14, 2001, but not any files that were
created or changed after October 30, 2001.
To specify a date2 when you don’t care about date1, use a date
of 1/1/86 for the date1 option. This is the earliest date main-
tained by the THEOS file system.
FileList 237
FileList When the output of FileList is redirected to a file, the information can be
Columns extracted by a program reading the file. Use the following column numbers
for each of the fields.
The columns Keyl, Recl and Gr are not output to a redirected file.
238 FileList
The EXEC and When the option APPEND, EXEC or FILES is used, the directory listing is
FILES Options written to a disk file, either SELECTED.EXEC or SELECTED.FILES. When these
files are created with the FileList command, several options may have no
meaning and will be ignored while several others can be used.
The options that can be used are: FD, FN, FT, MN and OFF. These options
limit the amount of file description information included in the file.
Commands
• SELECTED.EXEC
Option APPEND and EXEC create a special file named SELECTED.EXEC. This
file contains only the file description information with command line vari-
ables added. For instance:
>list selected.exec
&1 BACCESS.C:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 BACCESS.O:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 BJ.BASIC:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 BJ.COMMAND:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 "BJ.Data file:S" &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 BJ.HELP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 BJ.MENU:S &2 &3 &4 &5 &6 &7 &8 &9 &10
...
This file can be a real timesaver because the SELECTED.EXEC file can be used
with many other commands that are used to modify or list your files. The
FileList’s command selection capability is generally superior to most other
commands. For instance, the above file could be used by executing the pro-
gram:
>selected.exec copyfile f
>copyfile BACCESS.C:S f
>copyfile BACCESS.O:S f
>copyfile BJ.BASIC:S f
...
When the SELECTED.EXEC file is executed, each occurrence of the variable &1
is replaced with copyfile, each &2 is replaced with f.
FileList 239
The same program could be used in another command:
>selected.exec erase
>erase BACCESS.C:S
>erase BACCESS.O:S
>erase BJ.BASIC:S
...
Many commands have their own FILES option that allows them to use this
SELECTED.EXEC or SELECTED.FILES file as a list of files. The previous usage of
the SELECTED.EXEC program that changes the protection codes and then
erases the files could have been done with:
The commands that have a FILES option can use a SELECTED.EXEC file
because they have programming that ignores the &1, &2, etc. variables in
each line and uses only the file name information.
• SELECTED.FILES
The FILES option creates a special file named SELECTED.FILES that can be
used as a data file for an application that needs directory-type informa-
tion, or as a list of files used by other commands with their own FILES
option.
When the FILES option is used with no options or options that do not
include FD, FN, FT or MN, the SELECTED.FILES is created containing all of the
information requested in the same format as a displayed or printed listing
(without line graphics):
>list selected.files
240 FileList
An application can use this file by opening it and reading each record. Use
the column information shown in “FileList Columns” on page 238.
When any of the options FD, FN, FT or MN is used, the file name informa-
tion is output as a packed file description:
>filelist s (files fd
>list selected.files
Commands
BACCESS.C:S
BACCESS.O:S
BJ.BASIC:S
...
This file can be used by other commands with their FILES option in the
same way that the SELECTED.EXEC file was used in its example. For
instance:
Notes Although the FileList command may be abbreviated to the single letter “f,”
it must not be abbreviated to four characters because File is the full name
of a different command.
For multiple-page displays, the standard page browsing keys are recog-
nized. Refer to “Multiple-page Display Browsing” on page 79of the THEOS
Corona Version 5 Operating System Reference. When the display is termi-
nated early with the Quit key ( (Break),(Q) ), the summary line is displayed.
Return Codes When option SIZE is used, the return code is set to the total size of the files
listed, in number of kilobytes.
Restrictions Options ACCOUNT and OWNER require a privilege level of five. The
ACCOUNT option also requires that you be logged onto the SYSTEM account.
FileList 241
Commands
242 FileList
FileManager Command
The FileManager command allows you to explore and browse file directories. It also allows
you to launch a file by merely selecting the file from the displayed list.
1 FILEMANAGER ( options
Commands
2 FILEMANAGER :drive ( options
Command synonym: FM
Operation Mode 1—Using the current working directory as a starting point, display
the directory listing and begin browsing of that directory.
Mode 2—Set the current working directory to the root directory of drive,
display the directory listing and allow browsing of that directory.
Mode 3—Sets the current working directory to directory and then opens a
FileManager view of that directory.
>fm /theos/command
FileManager 243
Commands
TYPE Include the size, date, time and type in the directory listing.
Defaults FileManager users the /THEOS/USERS directory to save and get its configu-
ration. The default actions will depend upon the saved settings for the cur-
rent user as defined in the account environment variable UserName .
See also Calendar, Change, ChDir, Cleanup, Compress, Config, CopyFile, Create, CRLF,
Decrypt, Disk, Encrypt, Erase, Exit, Expand, FileList, FileType, Find, FTP, Img,
List, Logoff, Logon, Look, MkDir, Move, NetTerm, Play, Rename, RmDir, Setup,
Shell, Show, ShutDown, TBackup, Touch, Tree, UnZip, Upcase, Viewer, WhereIs,
Who, WhoAmI, WinWrite, and the THEOS Corona FileManager User’s
Guide and Reference.
244 FileManager
FileType Command
The FileType command converts a THEOS file into an operating system independent form of
the file, or it converts it back to a THEOS file.
Commands
2 FILETYPE file... ( RESTORE options
file » file name with optional path; may contain wild cards
options » NOQUERY QUERY
NOTYPE TYPE
This command converts THEOS-specific files into “THEOS File Save” format files (TFS)
that are portable between operating systems. Although the contents of a TFS file may not
be usable on another operating system, they can be copied and transmitted without any
problems. Thus, a TFS file is useful when a THEOS file must be sent to another THEOS
computer via an intermediate system such as a bulletin board system (BBS), network file
server or non-THEOS FTP server.
The THEOS File Save format is a file that contains the original THEOS directory entry for
the file along with the binary contents of the file. This is a stream file format that is recog-
nized and supported by all operating systems.
Operation Mode 1—Converts a THEOS file into a THEOS File Save file. The SAVE
keyword does not have to be specified because it is the default. The con-
verted file uses the same file-name as the original file and a file-type of TFS.
If the original file was a member of a library, the output file-name is the
original file’s member-name.
>filetype sample.file
"SAMPLE.FILE:S" copied to "SAMPLE.TFS:S".
One file copied.
>filetype data.lib.customer
"DATA.LIB.CUSTOMER:S" copied to "CUSTOMER.TFS:S".
One file copied.
The file-type of file may not be TFS nor may it be a simple wildcard of *.
Mode 2—Converts a THEOS File Save file back to the original THEOS
file.
FileType 245
Options NOQUERY Tells FileType to not ask for confirmation before converting
each file. This is a default option when wild cards are not used.
NOTYPE Tells FileType to not display the results of each file converted on
the standard output device. The general result message (the
“nn files copied.” message before exiting FileType) is also sup-
pressed with this option.
QUERY Tells FileType to “query” or ask if each file matching the file
specifications is to be converted. This is a default option when
wild cards are used.
>filetype *.data
Ok to copy "INDEXED.DATA:S" (Yes,No,All)
When the “Ok to copy” question is asked you may respond with
a (Y) for yes, (N) for no or (A) for all. Responding with (A) means
yes to this file and all remaining files are then copied without
being queried. Respond with (Esc) to cancel the conversion oper-
ation. This option is disabled with the NOQUERY option.
TYPE A default option that tells FileType to display the results of each
file copied on the standard output device. This display can be
redirected. This option is disabled with the NOTYPE option.
Restrictions file may not specify a file-type of TFS nor may the file-type use a wildcard.
See also Compress, CopyFile (EXPORT option), Expand, Receive , Send, THEO+COM
246 FileType
Find Command
Commands
file » file name with optional path; may contain wild cards
options » APPEND SUBDIR
EXEC date1
PRTnn date2
SORT
Operation The current working directory, or the path specified in file, and all directo-
ries subordinate to it, are searched. All files matching the file specification
are output to the standard output device.
>tree
/
data
misc
doc
programs
package
doc
programs
vertical
doc
files
programs
programs
Any Find command executed in this example will search all of the subdirec-
tories shown above for any and all files specified on the command line. In
the following command these directories are searched for any work files:
>find *.work*
/vertical/checkreg.work0:s
/vertical/checkreg.work1:s
/data/routeb.workfile:s
Find 247
In the next command, the directories are searched for all backup files, with
the list of files piped to the Erase command.
"/VERTICAL/PROGRAMS/ABC.BACKLIB.XFER:S" erased.
"/VERTICAL/PROGRAMS/ABC.BACKLIB.STATUS:S" erased.
"/PACKAGE/PROGRAMS/PACKAGE.BACKLIB.MENU:S" erased.
"/PACKAGE/PROGRAMS/PACKAGE.BACKLIB.CHECKREG:S" erased.
"/VERTICAL/LIBS.BACKUP:S" erased.
"/VERTICAL/DOC/FILES/CUSTOMER.BACKUP:S" erased.
11 files erased, 53,504 bytes recovered.
&1 file-description &2 &3 &4 &5 &6 &7 &8 &9 &10
PRTnn Indicates that Find is to print the list of files on the attached
printer number nn.
SORT Sorts the list before outputting it. This option cannot be used
when the SUBDIR option is used. Compare the two lists pro-
duced with and without the SORT option.
>find *.work*
/vertical/checkreg.work0:s
/vertical/checkreg.work1:s
/data/routeb.sortfile:s
248 Find
When the SORT option is used the lines are sorted in alphabet-
ical order, including any path specification.
Commands
>find *.*.*:s (subdir | erase (notype
date1 Includes a file only if the file’s last change date is greater than
or equal to this date. That is, if the file was changed on or after
this date.
The above command will include only those files that have
been created or changed since October 14, 2001.
date2 Includes a file only if the file’s last change date is less than or
equal to this date. That is, if the file was changed on or before
this date. May only be specified by first specifying date1.
This command includes only those files that have been created
or changed since October 14, 2001, but not any files that were
created or changed after October 30, 2001.
To specify a date2 when you don’t care about date1, use a date
of 1/1/86 for the date1 option. This is the earliest date main-
tained by the THEOS file system.
Find 249
Restrictions The SUBDIR and SORT options cannot both be specified.
250 Find
Finger Client
The Finger client queries a server for the status of a specific account or for other information
about accounts on a server.
1 FINGER user-name@server
Commands
2 FINGER @server
>finger [email protected]
Querying user "acavallo" at host "pacifier.com".
Mode 2—Requests information about all users logged onto server. Many
finger servers do not support this request.
>finger @theos-software.com
Querying user "" at host "theos-software.com".
>finger @ccnet.com
Querying user "" at host "ccnet.com".
Finger 251
>finger @netcom.com
Querying user "" at host "netcom.com".
Notes Specifying a name before the “@” of the server name specifies a particular
user on the server. This name is almost always the same as the person's
e-mail address. However, for the Finger client to work, the site “fingered”
must be running a finger server that accepts the command and responds
with the relevant information. Having an e-mail address does not guaran-
tee that Finger will produce any results.
>finger [email protected]
Querying user "president" at host "whitehouse.gov".
>finger [email protected]
Querying user "me" at host "myisp.com".
>finger [email protected]
Querying user "support" at host "theos-software.com".
The first response from the server at whitehouse.gov doesn’t provide any
information about the specific account. Instead, it responds with a text
message. The second response from myisp.com provides almost complete
information while the last response from theos-software.com provides
minimal information sufficient to confirm that the account name exists
and includes a more descriptive name for the user at that account.
252 Finger
Server Specification
Commands
The host name as defined in the file /THEOS/CONFIG/HOSTS.TXT:S.
This file can be maintained by you with WinWrite or Setup Net Name
Services.
>finger @my-company
Or the domain name as defined by the Domain Name Service spec-
ified in Setup Net Name Services.
>finger @theos-software.com
172.20.2.1
headquarters
my-company.com
Finger 253
Commands
254 Finger
Force Command
This command attempts to force another logged-on user to cancel the command that they
are executing and to optionally execute another command or EXEC program.
Commands
2 FORCE process command
Operation Mode 1—Starting with process number one, all logged-on users are exam-
ined. The first user found to be logged onto the account username is forced
to perform a (Break),(Q) operation and, if that is successful and there is a
command specified, that user is forced to execute command.
With this mode of the command, if command contains options then the
NOQUERY option of the Force command must be specified with a second
open parenthesis.
Mode 4—Identical to Mode 3 but the no query feature is specified with the
“UNIX style” option. This mode is useful when command contains its own
options.
Force 255
The following two commands perform identical functions:
Notes It is possible that a user may not be forced with this command. A user’s
account environment can be set to ignore (Break),(Q) requests. See “Account”
on page 13. Additionally, some programs disable (Break),(Q) during some or
Commands
If the user’s (Break),(Q) is not being honored at the time that Force attempts
to make it abort its operation, Force will not know if the force was success-
ful unless you use specify a command with the Force command. In that sit-
uation, the following message is displayed:
Respond with (Y) to have Force try harder by reenabling the other user’s
(Break),(Q). If this also fails, Force exits with an error message.
Cautions It is dangerous to force another user if you do not know what that user is
doing. Always use the Who or Show USERS command to find out which pro-
gram the other user is executing before using the Force command. It is
always best if the user is at the CSI.
You can only Force users or processs that are logged onto an account.
256 Force
FTP Client
The FTP command is a File Transfer Protocol client that provides file transfer capabilities
over a network between this client and any FTP server available on the network.
1 FTP ( options
Commands
2 FTP host ( options send-rec-options
Operation Mode 1—Starts the FTP client in interactive mode. In interactive mode,
the FTP Commands described on page 264 are used to connect to a server,
log onto an account, change directories, list directories, view, send and
receive files, etc.
Because a user name is not specified, “anonymous” is used for the user
name. Refer to “User Account Specification” on page 261 for a description of
anonymous user accounts.
FTP 257
Mode 3—Similar to Mode 2 except that, after a connection to host is estab-
lished, you are logged onto user account with password. See “User Account
Specification” for information about user accounts on the FTP server.
Note: The password does not have to be specified on the command line. For
security purposes, it is best to not specify it on the command line because
it will appear in plain text there. Instead, omit the password. When it is
not specified, FTP will prompt you to enter it “silently.”
Commands
Mode 4—This mode uses a site definition to define the host and other con-
nection parameters. Site definitions are created with the Setup Net FTP
Client command. (See THEOS Corona Version 5 Operating System Instal-
lation and Setup Guide.) All site definition names are simple names with-
out dots or other punctuation characters.
When a simple name is used, as in this mode of the command, the FTP
program first checks to see if it matches one of the site definitions. If it
does, it uses that site definition to make a connection to the remote server.
Mode 2 of the command is assumed when it doesn’t match a site definition.
Mode 5—In this mode, the contents of filename are used as a script of
commands to the FTP client. This script should contain several of the FTP
Commands described on page 264. See “FTP Script File” on page 280.
Options ASCII This is a default option that specifies that files are transferred
as ASCII files. Compare with the BINARY option.
VERBOSE Enables verbose mode. With verbose mode on, commands sent
to and responses received from the remote FTP server are dis-
played. With verbose mode off, these commands are not dis-
played.
258 FTP
Send-Receive These two options may only be used when the FTP server name or site
Options name is specified on the command line (Mode 2, Mode 3 or Mode 4). The
user-password may also be specified on the command line.
RECEIVE remote-name Transfer the file remote-name from the FTP server
to the local computer using the current transfer mode (ASCII or
BINARY).
Commands
If remote-name contains a path specification, a CD command is
issued to change to that directory. remote-name may contain
wild-card specifications for the file description. All files
received from the remote server are received into the current
working directory of the local system.
SEND local-name Transfer the file local-name from the local computer to
the FTP server using the current transfer mode (ASCII or
BINARY).
Notes This FTP client conforms to the standards proposed in RFC-959. That doc-
ument can be found on the Internet at the following site:
http://www.faqs.org/rfcs/rfc959.html
This program accepts all user input from stdin and displays all output on
stdout. These can be redirected to disk files or other devices, if desired.
Additionally, if invoked by an EXEC program, commands may be entered
with the &stack or &begstack commands.
As mentioned in the section “Options” on page 258, the remote FTP server
may be connected via a proxy server on another system that you can
access. For general information about using proxy servers, refer to Appen-
dix D: “Using a Proxy Server,” starting on page 203 of the THEOS Corona
Version 5 Operating System Reference.
FTP 259
Server Specification
Specification of the host, for Mode 2 or Mode 3 or with the OPEN commands,
may be accomplished by specifying:
172.20.2.1
headquarters
my-company.com
The host specification may include a port number. When not specified, the
default port number of 21 is used for FTP transfers and communication. In
some situations, you may need to specify a port other than 21 to access the
server.
For instance, a host machine may have two FTP servers. In this situation,
one of the servers will use port number 21 and the other server will use a
different port number. To access this other server you will have to specify
the port number used by that server. A similar situation exists when a
host machine that has an FTP server and a proxy server.
To specify a port number other than 21, use a server name or IP address
followed by a colon and the port number for that server.
260 FTP
FTP Server Response Messages
In the examples used in this chapter, the response text shown for various
commands is not necessarily what is displayed for a specific connection to
a remote FTP server. The server is responsible for the specific text dis-
played by the FTP client.
Commands
FTP? cd temp
CWD command successful
FTP? cd temp
Directory changed to "/temp"
Most FTP servers require that client connections are made only when a
valid user account is specified and the password for that account is entered
successfully. When connecting to a remote FTP server, the user account
determines your home directory, which files you “own,” and what directo-
ries you can view, upload and download from.
Note that, in the above example, the user name and password were speci-
fied with enclosing quotes. This was done because some servers use case-
sensitive name and password verification. Without the enclosing quotes,
the Command String Interpreter (CSI) folds all tokens to uppercase before
passing the argument to the program. This might cause the user name or
password to be invalid.
FTP 261
>ftp
FTP? open headquarters
Connecting to my-company.com (172.20.2.1)
--------------------------------------------------
User-name: my-name
Password: (enter my-private-password )
Welcome to My Company FTP site.
MY-NAME user logged in.
--------------------------------------------------
FTP?
Commands
or
>ftp
FTP? open headquarters
Connecting to my-company.com (172.20.2.1)
--------------------------------------------------
User-name: anonymous
Password: [email protected]
Welcome to My Company FTP site.
Anonymous user logged in.
--------------------------------------------------
FTP?
262 FTP
Note: Most FTP sites do not allow full access to anonymous users. For
instance, they will frequently not allow you to upload files. They may also
restrict the directories that you may view or download files from.
Commands
ers are implemented on systems that may or may not use case-sensitive
names. It is always best to specify user names and passwords in the same
case as they were given to you and to specify directory names and file
names in the same case as displayed by the directory listing on the server.
The file name specifications for files on the server must be specified in the
syntax used by the server’s operating system. For instance, you may use
the directory-name shortcuts of “./” and “../” only if the server’s operating
system supports it. In most cases, this syntax will be identical to the
syntax used by the THEOS operating system.
The FTP standard transfers stream files. However, this FTP Client can be
used to send a non-stream file, such as a compiled command, indexed,
keyed or relative data file, etc. It does this by repackaging the file using
the FileType protocol before sending it to the remote server. When the des-
tination is a THEOS-based FTP server, the received stream data is con-
verted back to its original format by the THEOS FTP server. A THEOS
FTP server is included in the NetServer or the WebServer Plus Paks.
Although non-stream files transferred by this client are not usable by any
system other than a THEOS-based system, non-THEOS FTP sites can be
used for intermediate storage. For instance, a data file could be uploaded
to a generic Internet Service Provider (ISP) FTP server and then subse-
quently downloaded to another THEOS system.
FTP 263
FTP The following commands may be used in the interactive mode of the FTP
Commands command or they may be added to a text file and then invoked with Mode 5
of the FTP command. When the FTP command is in its interactive mode, it
uses a prompt text of FTP? For instance:
>ftp
FTP? verbose
Verbose mode ON
Commands
FTP?
A valid connection with a remote server must be made before most of the
commands may be used. The only commands that do not require a connec-
tion to a remote FTP server are: BYE, CLOSE, EXIT, HELP, LCD, LMD,
LPWD, MODE, OPEN, OS, QUIT, SHELL, TYPE and VERBOSE.
Note: Many of the commands described here look like THEOS commands,
DOS commands or UNIX commands, but they are not. These are FTP com-
mands and only have the syntax and options as described in the following
pages.
Control
Edit Key Function
Key
(Home) (Ctrl)+(G) Move to the beginning of the command line.
(End) (Ctrl)+(E) Move to the end of the command line.
(Backspace) Delete the character to the left of the cursor.
(Del) (Ctrl)+(Z) Delete the character under the cursor.
(F5) (Ctrl)+(N) Delete all characters to end-of-line.
(˜) (Ctrl)+(H) Move the cursor left one character position.
(¤) (Ctrl)+(L) Move the cursor right one character position.
(Insert) (Ctrl)+(R) Toggle between character insert and replace
mode. *
(Esc) (Ctrl)+(”) Erase the entire command line.
(EnterÌ˛) (Ctrl)+(M) Terminate editing and execute the command.
Table 5: FTP Command-Line Edit Keys
264 FTP
APPEND Transfer a file from the local computer to the remote FTP
server, using the current transfer mode (ASCII or BINARY). If
the file already exists on the remote server, this file is
appended to the end of that existing file.
APPEND local-name
Commands
APPEND local-name remote-name
ASCII Sets the current file transfer mode to ASCII. This mode should
be used for text files only. Any characters that look like line-
ending characters might be translated into the local system’s
line-ending character.
BINARY Sets the current file transfer mode to binary. All character
codes are transferred without translation or interpretation.
BYE Terminate the current FTP session and exit the FTP client.
This command is synonymous with the EXIT and QUIT com-
mands. Use the CLOSE command if you want to terminate the
session with the FTP site but remain in the FTP client pro-
gram.
FTP? pwd
"/" is current directory.
FTP? cd ..
Directory changed to "/one"
FTP 265
CLOSE Terminate the current FTP session without exiting from the
FTP client. Some servers may display an informational mes-
sage when you terminate the session.
FTP? close
Goodbye.
FTP?
Commands
DELETE Erases a file from the remote FTP server. The file name for the
file is specified with the command:
DELETE filename
DIR
DIR filename
DIR dirname
The first form (DIR) displays the directory listing of the current
working directory on the remote FTP server.
266 FTP
FTP? dir
accounts 16 May 2001 5:58p
files 11 Aug 2001 7:29p
programs 29 Jul 2001 11:37a
FTP? v
Verbose mode ON
FTP? dir
d--------- 1 owner group 0 May 16 15:58 accounts
Commands
d--------- 1 owner group 0 Aug 11 19:29 files
d--------- 1 owner group 0 Jul 29 11:37 programs
The second form (DIR filename) displays the directory entry for
filename on the remote FTP server. filename may contain path
and wild-card specifications. Only files matching the filename
specification are included.
EXIT Terminate the current FTP session and exit the FTP environ-
ment. This command is synonymous with the BYE and QUIT
commands.
HELP
HELP cmd-name
FTP 267
FTP? help
The second form displays the specific help text for cmd-name.
FTP? h lcd
Syntax: LCD <directory> (change local directory)
LCD Change the current working directory on the local client sys-
tem and display the new current working directory. The com-
mand name must be followed by the path to the new directory.
FTP? lpwd
Local directory: (null)
Note: When the FTP client exits, your current working direc-
tory is restored to the directory in use at the time that FTP
was invoked.
LDIR
LDIR filename
The first form (DLIR) displays the directory listing of the cur-
rent working directory on the local system.
268 FTP
FTP? lcd tips
Local directory: /TIPS:S
FTP? ldir
aol.tip 1,454 2 Sep 2000 12:06p
config.tip 2,950 12 Nov 2000 2:04p
ftp.tip 557 2 Sep 2000 11:54a
...
Commands
The second form (LDIR filename) displays the directory entry
for filename on the local system. filename may contain path
and wild-card specifications. Only files matching the filename
specification are included.
LLS Display the directory listing from the local system for the cur-
rent working directory, a specific file or group of files. This is
similar to the LDIR command but only the file names or direc-
tory names are displayed, without any detail about the files or
directories.
Like the LDIR command, there are two forms of this command:
LLS
LLS filename
The first form displays the files and directories in the current
working directory of the local system.
FTP? lls
aol.tip
config.tip
ftp.tip
...
FTP 269
LMD Creates a new directory on the local client system. The new
directory name is specified with the command:
LMD dirname
LPWD Display the current working directory of the local client sys-
tem.
FTP? lpwd
Local directory: /FAX:S
LS Display the directory listing from the remote server for the
current working directory, a specific file or group of files, or
directory other than the current working directory. Unlike the
DIR command, the setting of the VERBOSE mode does not
affect the information displayed, except for the normal inclu-
sion of reply codes and intermediate messages. Also, only the
file names or directory names are displayed, without any detail
about the files or directories.
Similar to the DIR command, there are three forms of this com-
mand:
LS
LS filename
LS dirname
The first form displays the files and directories in the current
working directory of the remote server.
FTP? ls
.login
public_html
.history
mail
.pinerc
270 FTP
The third form (LS dirname) displays the files in the specified
dirname.
MKDIR Creates a new directory on the remote FTP server. The new
Commands
directory name is specified with the command:
MKDIR dirname
FTP? ls
myip.htm
FTP? ls
myip.htm
example
MODE Display the current file transfer mode (ASCII or BINARY). This
command is synonymous with the TYPE command.
>ftp (binary
FTP? mode
Using Binary mode to transfer files.
OPEN
OPEN host
OPEN host user
OPEN host user password
OPEN site
Basically, these are all the same command. You are prompted
for any information omitted from the command or the site defi-
nition. For a description of the host parameter, refer to “Server
Specification ” on page 260. For a description of user and pass-
word, refer to “User Account Specification” on page 261. Sites are
defined in Setup Net FTP Client. (See THEOS Corona Version 5
Operating System Installation and Setup Guide.)
FTP 271
The user and password cannot be enclosed within quotation
marks. Case mode is retained as entered and quotation marks
are passed to the server as part of the user name or password.
With the first form of the command, you are prompted to enter
the server name, user name and password.
FTP? open
Commands
Host-name: ftp.theos-software.com
Connecting to ftp.theos-software.com (207.21.75.100)
-------------------------------------------------
User-name: anonymous
Password: [email protected]
Welcome to THEOS Software Corporation FTP site.
Anonymous user logged in.
The second form connects to host and then asks you for the
user name and password. The third form connects to host and
logs on as user; you are prompted for the password. The fourth
form supplies all of the information.
Note that, with the fourth form, the password is supplied with
the command and is visible. The other forms prompt you for
the password, which is entered “silently.”
Some servers allow you to use a dash at the start of the pass-
word to suppress any information messages. This may not
work for all servers.
272 FTP
QUIT Terminate the current FTP session and exit the FTP environ-
ment. This command is synonymous with the BYE and EXIT
commands.
FTP? quit
Thanks for visiting our site.
You were online for 0 minutes.
>
Commands
The actual text displayed after the QUIT command is depen-
dent upon the FTP server. Generally, the message is just
“Goodbye.”
RECV Transfers one or more files from the remote FTP server to the
local system using the current transfer mode (ASCII or
BINARY).
RECV remote-name
RECV remote-name local-name
FTP 273
FTP? cd ..
Directory change to "/"
the local system using the location and name specified with
local-name. If local-name does not specify a path, the current
working directory on the local system is used. Any existing file
on the local computer with the same name as local-name is
replaced with the received file.
REMOTE command
274 FTP
transfer MODE: Stream
No data connection
211 End of status.
Commands
commands available.
RENAME Renames a file on the remote FTP server. There are three
forms of this command:
RENAME
RENAME old-filename
RENAME old-filename new-filename
These three forms all operate the same. You are prompted for
the old and new file names if they are not specified with the
command. Path specifications are allowed but wild cards are
not.
FTP? rename
Old-filename: example.fil
File exists, ready for destination name
New-filename: example.txt
File "example.fil" renamed to "example.txt".
RMDIR dirname
FTP 275
FTP? rmdir temp
temp: File exists.
FTP? cd temp
Directory change to "/temp"
FTP? delete myfile.command
DELE command successful.
FTP? cd ..
Directory change to "/"
Commands
FTP? rd temp
Directory "temp" removed.
SAVEDIR Similar to the DIR command except that the output is saved in
a file. The format of the command is:
SAVEDIR filename
SAVEDIR filespec filename
SAVEDIR dirname filename
The filespec and dirname have the same meanings as the DIR
command. They specify which files on the remote system are
included in the directory listing. When filespec is omitted, all
files in the current working directory are included. filename
specifies the name of the file on your system that is used to
save this directory listing.
SAVELS Similar to the SAVEDIR command except that the directory list-
ing format used the LS command format. The format of the
command is:
SAVELS filename
SAVELS filespec filename
SAVELS dirname filename
SEND Transfers one or more files from the local system to the remote
FTP server using the current transfer mode (ASCII or BINARY).
If a file already exists on the remote server system with the
same destination name, it is replaced by this transferred file.
Use the APPEND command to send a file and append it to an
existing file on the remote server.
SEND local-name
SEND local-name remote-name
276 FTP
In the first form (SEND local-name), the local-name may con-
tain path specifications or wild cards, but not both. When
local-name does not include any path specification, the files are
located on the local client system in its local current working
directory (LPWD). When local-name does include a path specifi-
cation, the files are located on the local client system using
that path specification.
Commands
The file or files are sent to the remote server and saved in its
current working directory (PWD).
is equivalent to:
FTP 277
SHELL Use the local system’s CSI SHELL to execute commands on
the local system. This command is synonymous with the OS
command.
SHELL
SHELL command
Commands
In the first form, the CSI SHELL is entered. You can then enter
any command, or series of commands, that you want executed
on the local system. When you are finished and want to return
to the FTP environment, use the special EXIT command.
FTP? shell
>logon data
>exit
FTP?
FTP?
TYPE Display the current file transfer mode (ASCII or BINARY). This
command is synonymous with the MODE command.
USER Changes the user account that you are logged into on the
remote server. There are three forms of the command:
USER
USER name
USER name password
All three forms perform the same operation. With the first
form of the command, you are prompted for the new user name
and password. With the second form, the user name is supplied
and you are prompted for the password. With the third form,
you supply the user name and the password. Note that first
two forms allow you to enter the password “silently.”
278 FTP
To connect as an anonymous user, specify a user name of
“anonymous.” For more information about user accounts, refer
to “User Account Specification” on page 261.
FTP? user
User-name: myname
Password:
User MYNAME logged in.
Commands
VERBOSE Toggles the verbose mode and displays the new, current mode.
FTP? verbose
Verbose mode ON
FTP? pwd
257 "/e/download/os/" is current directory.
FTP? v
Verbose mode OFF
FTP 279
FTP? v
Verbose mode OFF
FTP? dir
Config.cmp 336 26 Feb 2001 6:21p
FAX.C 13,080 30 Jan 2001 5:05p
FTP.CMP 63,632 16 Jul 2001 12:08p
FTP? v
Verbose mode ON
Commands
FTP? dir
200 PORT command successful.
150 Opening ASCII mode data connection for /bin/ls.
-rwxrwxrwx 1 owner group 336 Feb 26 18:21 Config.cmp
-rwxrwxrwx 1 owner group 13080 Jan 30 17:05 FAX.C
-rwxrwxrwx 1 owner group 63632 Jul 16 12:08 FTP.CMP
226 Transfer complete.
VIEW Transfer an ASCII text file from the FTP server computer and
displays the transferred file with Viewer. The file name to
transfer is specified with the command:
VIEW filename
FTP Script File Mode 5 of the FTP Client command allows you to specify an FTP script file.
This script file is used to set up for an FTP session or to perform a com-
plete, unattended file transfer. An FTP script file contains a list of FTP
Commands to be executed. For instance:
The above FTP script file would connect to the THEOS Software FTP site
and download the latest service pack for the operating system. It is
received into the local “downloads” directory. After the file is received, the
connection is terminated and the FTP Client is exited.
280 FTP
>ftp example.ftp (file
open ftp.theos-software.com anonymous [email protected]
Connecting to ftp.theos-software.com (207.21.75.100)
------------------------------------------------------
Welcome to THEOS Software Corporation FTP site.
Anonymous user logged in.
------------------------------------------------------
binary
Using Binary mode to transfer files.
Commands
lcd /downloads
Local directory: /DOWNLOADS:S
cd theos/theos32
CWD command successful.
recv sp*.zip
Receiving SP40210.ZIP (1 of 1)
477,742 bytes received in 161.8 seconds (2.95 Kbytes/sec)
quit
Goodbye
Of course, the above simple example could be handled easier with a Mode 3
command:
>cd /downloads
However, the FTP script file capability does not have to be a single file
transfer. For instance, an FTP script that connects to your company’s main
office and downloads the current databases could be written as:
This script downloads all of the files from two different directories. It
resets both the local system and the remote system back to the root direc-
tory and then retrieves and displays the contents of the NOTICES.TXT file.
Notice that there is no QUIT command at the end. When a script is not ter-
minated with a QUIT or a CLOSE command (or their synonyms), the FTP
Client is not exited. Instead, after the last command in the script is exe-
cuted, interactive mode is entered. At this point you can perform other
operations and exit when you desire.
FTP 281
Commands
282 FTP
GetFile Command
This command accesses a DOS-formatted disk or partition and copies files from it.
Commands
2 GETFILE DOS-file:drive file ( dos-options options
This command’s function has been replaced with the DOSDiskA and DOS-
DiskC attachment capability. For information about this capability refer
to the “Attaching DOSDiskA Floppy Disk Drives” on page 32.
Operation Mode 1—Accesses the DOS disk in drive and displays the directory of
files.
>getfile f ( dir
Unless a specific path is indicated, the listing is of the root directory. For
instance, to list the files in the README directory you would use:
Note that the path and file description syntax of the DOS disk may use
THEOS conventions or DOS file name syntax. For instance, the following
two commands perform identical requests:
GetFile 283
>getfile a: (dir
>getfile f (dir
Mode 2—Copies one or more files from the DOS disk to the THEOS file.
As indicated in the above example, specifying a drive code only for file tells
GetFile to use the DOS file name as the destination name. Because the
BINARY option was not used, GetFile assumes that the DOS file is a text file
and converts CR,LF pairs into CR only. Also, the file transfer is termi-
nated when the end-of-file mark is detected.
The DOS-file and drive may be specified with THEOS file name syntax or
with DOS file name syntax. For instance, the following two commands
copy the same file:
Options EXEC This option tells GetFile to not transfer the files from the DOS
disk. Instead, the list of file names found on the DOS disk are
output as an EXEC language program in the file
SELECTED.EXEC. This file will contain only the file description
information with command line variables added. For instance:
>list selected.exec
&1 README/DECNET.TXT:F &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 README/IBMLAN.TXT:F &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 README/LANMAN.TXT:F &2 &3 &4 &5 &6 &7 &8 &9 &10
...
284 GetFile
>selected.exec getfile s (dos binary
OWNER=nn Specifies the account number that currently owns the file on
the transmitting THEOS system.
NOQUERY Tells GetFile to not ask for confirmation before copying each
Commands
file. This is a default option when wild cards are not used.
QUERY Tells GetFile to “query” or ask if each file matching the file
specifications is to be copied. This is a default option when wild
cards are used.
>getfile readme/*.txt:f s
Ok to copy "/README/LANMAN.TXT:F" (Yes,No,All)
DOS Options BINARY Tells GetFile that the DOS file contains binary information and
that it should transfer the entire file without any translation.
When the BINARY option is not used, GetFile assumes that the
DOS file is a text file and converts CR,LF pairs into CR only.
Also, the file transfer is terminated when the end-of-file mark
is detected. When in doubt as to the type of DOS file it is,
always use the BINARY option. The CRLF command can always
be used on the file after it has been transferred successfully.
GetFile 285
Notes • Wild-Card Specifications
Similar to the CopyFile command, the destination file specification may use
the equal sign character ( = ) to indicate that the destination file descrip-
tion uses the corresponding element of the source file description. An equal
sign used as the complete term of the file description (i.e., the file-name,
file-type or member-name) means that the corresponding complete term
from the source file description is used. For instance:
Commands
The equal sign wild card, combined with regular characters, can have two
different effects depending upon whether or not the corresponding term in
the source file description used wild cards. When the source file descrip-
tion uses a wild card then the equal sign is replaced with the portion repre-
sented by the source file’s wild card.
When the source file description does not use a wild card for the corre-
sponding term, the equal sign is replaced with the complete source file
term.
DOS Partitions The disk drive specified by drive may be an attached removable disk such
and Disks as a floppy or removable hard disk, or it may be a partition on an attached
hard disk drive. This disk or partition may be a DOS-formatted partition
(16-bit FAT) or a Windows 95 disk or partition (32-bit FAT).
>getfile s (dir
>getfile /windows/*.*:s
286 GetFile
Windows NT disks and partitions cannot be accessed with this command.
Return Codes When no files are transferred, the return code is set to one, indicating fail-
ure.
Commands
GetFile 287
Commands
288 GetFile
Head Command Filter
The Head command displays the beginning of a text file on the standard output device.
1 HEAD ( option
Commands
2 HEAD file... ( option
Operation Mode 1—The first 10 lines from the standard input device are output to
the standard output device. This form of the Head command would nor-
mally be used in a pipe command line:
>
Mode 2—The first lines of file are output to the standard output device.
When more than one file is specified then the first lines of each of the files
are output.
>head /theos/help/english/_command.hlp (4
ACCOUNT Maintain the user account names file.
ARCHIVE Back up hard disks onto floppies or tapes.
ATTACH Logically connect a device for future access.
BACKUP Copy full disk to disk or tape.
Options nnn Specifies the number of lines of each file to output. This specifi-
cation must be in the range 1–999. The default value is 10.
Notes When the standard output device is the console and multiple files are spec-
ified, the screen is cleared between each file display. When multiple files
are specified, the output for each file has a heading added that identifies
the file.
Head 289
The nnn option may use the DOS/UNIX style which is a leading minus
sign and the option is specified before the file specifications. The following
two commands produce the same results:
>head /theos/help/english/_command.hlp (4
>head -4 /theos/help/english/_command.hlp
290 Head
Help Command
The Help command displays a summary of all THEOS commands or a detailed description
about a specific command.
1 HELP
Commands
2 (F1)
3 HELP program
4 program(F1)
5 HELP *
The Help command uses the files in the directory /THEOS/HELP/language:S as the source of the
help text displayed. If this directory has been removed for any reason, the Help command
cannot operate.
Help 291
You may also use the (Home) and (End) keys to move to the beginning or end
of the list. The (PageDown) and (PageUp) keys advance to the next or previous
display page.
>help message
Mode 4—This is a shortcut method of invoking the Mode 3 Help display for
program.
292 Help
Notes Besides the standard command names, the Help command can display
information about any subject for which there is a file in the /THEOS/HELP/
language:S directory. Provided with the operating system are files provid-
ing information about:
Subject Description
_B3221 Internal help for MultiUser BASIC language.*
Commands
_LEDIT Internal help for LineEdit command.*
_MORE Internal help for More command.*
_PATCH Internal help for Patch command.*
COMPOSE Help for composing characters on PC-Term keyboards.
CSI Help for entering commands.
EXEC Help for the EXEC language.
VDI Help for using the Virtual Device Interface.
* This information is normally displayed from within the indicated
program. It can be displayed at any time with the Help command.
Help 293
Commands
294 Help
Ident Command
This command displays the current account number on the standard output device.
IDENT
Commands
Operation The account number of the current account is output to the standard
output device (normally the console).
>ident
5
Ident 295
Commands
296 Ident
Img Command
The Img command displays graphic image files on the graphics console.
Commands
file » file name with optional path; may contain wild cards
options » CENTER FRAME MAXIMIZE SLIDESHOW
CYCLE KEEP NOFRAME WAIT
Operation If file is the name of a single image file (no wild cards) then the image is
displayed on the screen and Img exits leaving the image displayed. If file is
omitted or is specified with wild cards, a menu of the matching files is dis-
played and you can select the desired file. Omitting file is the same as
using a file specification of *.*.
Options CENTER Display the image positioned at the center of the session win-
dow. This option is only effective when a single file is specified.
KEEP When exiting the Img command the displayed image remains
on the screen. This is the default action when a single file is
specified.
Img 297
MAXIMIZE Display the image in a window that shows the entire image, or
a window as large as the current session window.
NOFRAME Display the image without a frame around it. This is a default
option.
SLIDESHOW This option is effective only when file is omitted or uses wild-
cards. It causes Img to not display a menu of file names but
Commands
Key Action
(EnterÌ˛)
Advance to next image.
(PageDown)
(PageUp) Backup to prior image.
(Home) Display first image.
(End) Display last image.
(Space) Pause or resume slide show.
(Esc) Terminate slide show.
Defaults For single files, NOFRAME and KEEP are the default options. For multiple
files (wild cards), there are no default options.
Restrictions The format of the file must be BMP, GIV, PCX or JPG. The console must be
graphics-capable and in graphics mode. Refer to Setup VGA for information
about configuring the main console display. (See THEOS Corona Version 5
Operating System Installation and Setup Guide.)
298 Img
Install Command
The Install command installs software from a removable disk or disc drive.
INSTALL drive
Commands
drive » optional disk drive letter
Operation This Install command attempts to execute the Install Exec program that it
finds on either the floppy disk drive or the CD-ROM drive. The Install pro-
gram that it searches for can be named INSTALL.EXC or INSTALL.EXEC. When
drive is specified, only that drive is searched.
When drive is not specified the Install command seaches the removable
media drives in the following order: floppies in attached drive-letter
sequence, image drives in attached drive-letter sequence and then all
other removable media drives in attached drive-letter sequence (zip, CD-
ROM, etc.).
When an Install program is found the search is terminated and that Install
program is executed.
Install 299
Commands
300 Install
IXDiag Command
Commands
file » file name with optional path; may include wildcards
options » APPEND EXEC NOWAIT SUBDIR
DATA BASIC FILES RECLEN TYPE
DATA BINARY KEYLEN REPAIR VERIFY DATA
DETAILS LOGFILE REPLACE VOLUME
EXCEPTIONS NOTYPE SAVE WAIT
Operation The file is examined for indexed file structure integrity. Many, non-serious
errors may be detected and reported along with serious, data-loss errors.
The file is repaired only if specifically directed to with the REPAIR or SAVE
options. Otherwise, only warning messages are displayed when errors are
detected.
Options APPEND Used with option EXEC to indicate that problem file names are
appended to the end of any existing IXERR.EXEC file.
>list ixerr.exec
&1 /PRIVATE/ADDR.BOOK:S &2 &3 &4 &5 &6 &7 &8 &9 &10
>list ixerr.exec
&1 /PRIVATE/ADDR.BOOK:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 /JONAS/DATA.BASE:S &2 &3 &4 &5 &6 &7 &8 &9 &10
DATA BASIC Records in the file are formatted BASIC language records.
DATA BINARY Records in the file may be in any format and are not
checked for consistency.
IXDiag 301
Compare the following three examples to see the effect of this
option:
>ixdiag *.*
/DATA/CHECK.DETAIL:S needs minor repairs
/DATA/EXPENSE.JOURNAL:S could be optimized
THEOS may have been rebooted while this file was being
updated and some space has been lost for that or similar
reasons. This is basically harmless other than being a
waste of disk space and this space can be recovered by
recopying the file by record or by using the SAVE option.
...
EXEC The names of all files that have problems or errors are written
to the file IXERR.EXEC. If APPEND option is not specified, any
existing IXERR.EXEC file is first erased.
>list ixerr.exec
&1 /PRIVATE/ADDR.BOOK:S &2 &3 &4 &5 &6 &7 &8 &9 &10
FILES Indicates that file is an ASCII stream file with each record in
the file specifying a single file name. The file name specifica-
tions in this file may include the path and wild cards.
302 IXDiag
The SELECTED.FILES and SELECTED.EXEC files created by FileList
and the FOUND.EXEC created by Look can be used for this specifi-
cation file (see “The EXEC and FILES Options” on page 239). You
may also create the file with an editor or application program.
Commands
>filelist *.data:a (exec
A SELECTED.EXEC file now exists that lists all of the “data” files
and all files that have been changed since 10/01/2001. The fol-
lowing command checks these files:
NOWAIT Used with DETAILS option to indicate that you want IXDiag to
wait each time that it detects and reports an error in a file.
This option has no effect when DETAILS is not specified.
IXDiag 303
This option is only used when REPAIR or SAVE is used.
REPLACE Used with the SAVE and EXCEPTIONS option to tell IXDiag to
replace any existing savefile or exception-file with the new
data. When REPLACE is not used with SAVE and EXCEPTIONS,
the records are added to any existing savefile or exception-file.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
17297 records copied, 0 records skipped (17297 total records).
SUBDIR Tells IXDiag to check all subdirectories starting with the direc-
tory for file.
>ixdiag *.*
/DATA/CHECK.DETAIL:S needs minor repairs
/DATA/EXPENSE.JOURNAL:S could be optimized
/DATA/MASTER.CONTROL:S needs minor repairs
/DATA/PAYABLES.MASTER:S needs minor repairs
304 IXDiag
VERIFY DATA Tells IXDiag to include in its tests a check to confirm that the
fields in each record of the file are BASIC formatted fields.
VOLUME Tells IXDiag to look for file in all accounts on that drive. file
must be a drive specifier only:
>ixdiag s (volume
PACKAGE\SYSPECT.FILE:S has serious problems
SYSTEM\TELEPHON.NUMBERS needs minor repairs
Commands
When this option is used in combination with the SUBDIR
option, all indexed files in all directories on all accounts are
checked for integrity.
WAIT Used with the DETAILS option to cause IXDiag to wait each time
that it reports an error in a file. In this mode you may request
additional explanation of the error message by using the (F1)
key.
Defaults The following options are in effect by default: DATA BASIC, NOWAIT and
TYPE.
Notes To check all of the files on all of the accounts on all subdirectories on a
disk, log onto the SYSTEM account and use the command:
Cautions A file should not be repaired with the REPAIR option unless it is backed up
first. The data may be lost if there is any problems encountered during the
repair operation.
Restrictions Only indexed files are checked with this command. Keyed, direct and
stream files are excluded.
The file must not be open by any other user. The file is locked by IXDiag
when it checks it.
IXDiag 305
Commands
306 IXDiag
Keyboard Command
The Keyboard command replaces the current keyboard driver with a different or modified
driver.
Commands
number » Language code number (1–9)
name » Simple file name for new keyboard driver program
Notes It is not necessary to use this command unless you have made a change to
one of the keyboard drivers.
Restrictions The keyboard driver name must be a simple name without a path, file-type
or file-drive. The driver must reside in the /THEOS/DRIVER:S directory with a
file-type of BIN.
Keyboard 307
Commands
308 Keyboard
Keyword Command
Commands
2 KEYWORD * ( option
3 KEYWORD
option » NOSORT
PRTnn
SORT
TYPE
>keyword * (nosort
The keywords are shown in mixed case. The uppercase letters in each key-
word indicate the minimum spelling or abbreviation allowed.
>keyword
At this prompt enter either the number of the keyword you want to view or
change, or press (EnterÌ˛), (Esc) or (F9) without a number to exit.
Keyword 309
When a number is entered, the current definition is displayed and you are
asked for the new definition:
>keyword
When the new text for the keyword is entered, press (EnterÌ˛) and you are
prompted for another keyword to change.
Options NOSORT Tells Keyword to output the list of keywords in keyword num-
ber order, not in alphabetically sorted order.
>list sorted.keywords
79 ABbrev
192 ABORT
109 ACCount
253 ADD
179 Alf
193 ALign
310 Keyword
Defaults TYPE and SORT are default options when using Mode 2 .
Cautions This keyword file is used by all of the THEOS commands. Changing a key-
word may affect many commands.
Restrictions You must be logged onto the SYSTEM account and you must have a privilege
level of five.
Commands
Keywords may be a maximum of eight characters in length.
Keyword 311
Commands
312 Keyword
Killfile Command
Commands
2 KILLFILE file ( FILES options
3 KILLFILE ( options
file » file name with optional path; may contain wild cards
options » NOQUERY QUERY
NOTYPE TYPE
Although similar to the Erase command the Killfile command is quite differ-
ent and potentially very dangerous. Killfile erases a file’s directory entry
without deallocating the file’s disk space. You should only use this com-
mand in single-user mode and you should only kill a file if you know that
there are problems with the files allocation.
Operation Mode 1—Attempts to erase file and displays the result of the attempt.
>killfile sample.data
"SAMPLE.DATA:S" erased.
One file erased, 3,840 bytes recovered.
When file is a subdirectory name, the Killfile command will kill the direc-
tory even if it contains files.
Mode 2—file is an ASCII stream file containing one file description per
line. Each file description in file is killed. As each file is killed its file
description is displayed (unless the NOTYPE option is specified).
Killfile 313
This mode of the Killfile command is convenient when one or more sets of
files are repetitively being killed.
>edit daily.kill
work.master:s
work.history:s
work.invoices:s
work.ledger.*:s
temp*.*:s
Commands
sort*.*:s
/programs/program.backlib.*:s
>killfile
Enter file name list, terminate with empty line.
?/SAMPLE.DATA
"/SAMPLE.DATA:S" erased.
?*.zip
...
314 Killfile
Options NOQUERY Tells Killfile to not ask for confirmation before killing each file.
NOTYPE Tells Killfile to not display the results of each file killed on the
standard output device.
Commands
QUERY Tells Killfile to “query” or ask if each file matching the file speci-
fications is to be killed. This is a default option when wild
cards are used. To disable this option use the NOQUERY
option.
>killfile *.backup
Selecting “Yes to All” means yes to this file and all remaining
files are killed without being queried. Respond with (Esc)or (C)
to cancel the kill operation.
TYPE A default option that tells Killfile to display the results of each
file killed on the standard output device. This display can be
redirected.
Killfile 315
Notes After performing a Killfile operation you should always perform a Disk FIX
operation to correct any misallocations that may be been created with the
Killfile operation.
Restrictions Because the purpose of this command is to erase or kill a file that may
have allocation problems, there are no restrictions on what files may be
killed. It does not matter if the file requested is erase-protected, in use by
another user, a directory or library with existing member files, owned by
another account, it can be killed with this command.
316 Killfile
Line Command Filter
This command copies one line of text from the standard input device to the standard output
device.
LINE
Commands
Operation The next line of text from the standard input device is copied to the stan-
dard output device.
In this example the first line of the KEYWORD.HEADER is copied to a file, fol-
lowed by other information appended to that file.
Defaults The standard input and output devices are normally the console keyboard
and display.
Line 317
Commands
318 Line
LineEdit Command
The LineEdit command is a utility program that, unlike WinWrite, edits ASCII text files using
line-edit mode rather than a full-screen editor.
Commands
file » file name with optional path; wild cards not allowed
option » BACKUP
NOBACKUP
Operation This command edits an existing text file or creates a new text file. When
the command is first entered, a message displays indicating whether the
text file is new or an existing file:
>lineedit sample.text
New file "SAMPLE.TEXT".
Edit:
*
or
>ledit system.theos32.devnames
Old file: "SYSTEM.THEOS32.DEVNAMES:S".
Edit:
*
The edit prompt character is the asterisk ( * ) and, when displayed at the
beginning of a line, it indicates that LineEdit is waiting for an editing com-
mand.
LineEdit 319
Cmd Operands Meaning
? Query last command
; Comment
Again Reexecute last "string" command
Bottom Go to bottom of file
CAse [U|L|M] Set case mode Upper, Lower (inverted), Mixed
Change [/frstr/tostr[/ [#lines Global change
Commands
[#occur [#start]]]]]
COlumn Display column ruler
COMbine Append next line to current line
CSI command Execute THEOS command, then return to LINEEDIT
DElete [#lines|/str/] Delete lines
Down [#lines] Go down
DUp [#lines] Duplicate current line
FILe [filename] Save the file, then exit
Find [text] Anchored locate
Get [filename][frct|/ frstr/ Merge from another file
[toct|tostr/]]
Help Ask for help
Input [text] Insert a line or Insert mode
LEngth Ask for size of file
LIst #lines Display lines
Locate [/str[/]] Locate string or Locate again
Modify [#lines] Modify lines
NAme [filename] Change file name
Next [#lines] Go down or locate
Page Display full page and go down
Ut [filename] [/tostr/|ct] Write lines to another file
PUTD [filename] [/tostr/|ct] Write line and delete
Quit [retcode|command] Exit and execute THEOS command
Replace [text] Replace lines
Save [filename] Save file
SPlit [?|/str/] Split current line into two lines
TAbset [list of col numbers] Set tab stops
TOp Go to top of file
Type [#lines] Display lines
Up [#lines|/str/] Go up
VErify [on|off] Verify (display) status
X,Y,Z [#lines|statement| Macro
"filename" [line#]]
320 LineEdit
Options BACKUP A default option that tells LineEdit to make a backup copy of the
prior version of the text file.
When the file is saved with either the SAVE or the FILE edit
commands, LineEdit checks to see if there is a file on disk with
the same name as the file it is about to write to disk. If it does
exist, LineEdit renames that existing file to be a backup file.
The rules used for determining the name of this backup file
Commands
are:
NOBACKUP Tells LineEdit that, when an existing file is saved to disk, the
prior version of any file with the same name is to be over-writ-
ten without renaming it to be a backup of the original.
LineEdit 321
Notes The LineEdit command is provided as a utility that can be used by EXEC
language programs and application programs that need to edit a text file
without operator assistance. WindoWriter, although a far more powerful
program, is a full-screen editor and, as such, requires all of its commands
to be entered from the keyboard. LineEdit, being a line-oriented editor, can
receive all of its commands from a text file or an EXEC program’s &stack
data.
Commands
>list updsyn.exec
lineedit system.theos32.synonym
>updsyn
Old file "SYSTEM.THEOS32.SYNONYM:S".
Edit:
*f DATE
DATE 4
*u 1
CRT 3
*i CUSTOMER 2
*file
"SYSTEM.THEOS32.SYNONYM:S" filed.
Restrictions Only stream files containing ASCII text may be edited with this command.
Use Patch for making changes in other file organizations or contents.
322 LineEdit
List Command
List displays the contents of any data or program file on the standard output device.
Commands
2 LIST - ( option
file » file name with optional path; may contain wild cards
option » BINARY HEAD OLDDATE TRUNC nnn
COMnn HEX PAGE nnn fromline
FILES INDENT nn PRTnn toline
FORMAT NOHEAD TITLE ttt
FROM kkk NUMBERED TO kkk
Operation Mode 1—The file or files specified are displayed on the standard output
device (console).
Mode 2—This mode can be used when standard input has been redirected
(as in a pipe) or when you want to supply the list of files from the keyboard
(be sure to use option FILES).
When the list of files comes from the console keyboard the “-” must be spec-
ified on the command line. Terminate the list with (Ctrl)+(Q).
>list - (file
?system.help32.l*
?system.help32.s*
?(Ctrl)+(D)
The above two commands display all of the help files starting with “L” or
“S.”
List 323
Options BINARY Displays the file in hexadecimal. See “Binary & Hex Displays”
on page 329.
COMnn The display is sent to the attached COMnn device instead of the
standard output device.
FILES Indicates that file is an ASCII stream file with each record in
the file specifying a single file name. The file name specifica-
Commands
tions in this file may include the path and wild cards.
A SELECTED.EXEC file now exists that lists all of the “data” files
and all files that have been changed since 10/01/2000. The fol-
lowing command lists these files:
324 List
These codes are:
Code Meaning
1 Eject page.
+ Do not advance—overprint the previous line. This
can only be done if the printer does not perform an
automatic line advance with each carriage return.
Commands
(Option ALF not specified on printer attachment.)
0 Advance two lines, skipping one blank line.
- Advance three lines, skipping two blank lines.
other All other characters are not printed and cause one
line to advance. By convention, the space character
is used for this purpose.
Table 8: ANSI Forms Control Codes
FROM This option can only be used when file is direct, indexed or
keyed. For direct files, kkk is a number that specifies the first
record number displayed. For indexed and keyed files, kkk is
the key of the first record displayed. Only records whose keys
are greater than or equal to this kkk will be included in the dis-
play.
020: 1QUERY
021: 2NOQUERY
022: 5PRIVATE
...
HEADING A default option that causes the standard page heading to dis-
play. This standard page heading includes the file name on the
left size of the page and the date, time and page number on the
right.
HEX Displays the file in hexadecimal. See “Binary & Hex Displays”
on page 329.
List 325
INDENT nn All lines output are to be indented nn columns.
1 <html>
2 <head>
3 <title> THEOS Help for List Command </title>
4 <BODY>
5 <a name=”TOP”><center><h2><font color=#FF0000>
...
<html>
<head>
<title> THEOS Help for List Command </title>
<BODY>
<a name=”TOP”><center><h2><font color=#FF0000>
...
OLDDATE Causes the date and time used in the page heading to be the
file’s last change date and time. When this option is not used
the current system date and time displays.
PAGE Indicates that the first page displayed is page number nnn.
Note: When the output is to the console, the browse keys can
still be used to display pages before page number nnn.
PRTnn Indicates that List is to print file on the attached printer num-
ber nn.
TITLE The word or quoted term following the keyword TITLE is used
in the heading line instead of the file’s file name.
326 List
TO This option can only be used when file is direct, indexed or
keyed. For direct files, kkk is a number that specifies the last
record number displayed. For indexed and keyed files, kkk is
the key of the last record displayed. Only records whose keys
are less than or equal to this kkk will be included in the dis-
play.
Commands
TRUNCATE Each line output is truncated at column nnn. If used in com-
bination with the INDENT nn option, the truncation is per-
formed after the indent spaces are added.
When TRUNCATE is not used, lines are not truncated and those
lines that are longer than the attached length of the display
device (console or printer) are wrapped to the next line.
List 327
List Displays Most files are displayed as text. For instance:
>list /theos/help/english/cat.hlp
<html>
<head>
<title> THEOS Help for Cat Command </title>
Commands
<BODY>
<a name="TOP"<center><h2><font color=#FF0000>Cat Command</font>
</h2></center>
<pre>
...
This type of display is used by default for all files except programs, which
use the binary display format described next.
The heading line of all displays on the console or printer (not those redi-
rected to a file) shows the file name on the left and the date, time and page
number on the right. This heading line can be suppressed with the
NOHEAD option, and the date can be set to the file’s last change date with
the OLDDATE option. C language source programs can set the left side of
this heading line with the #title directive.
For multiple-page displays, the standard page browsing keys are recog-
nized. Refer to “Multiple-page Display Browsing” on page 79 of the THEOS
Corona Version 5 Operating System Reference. In addition to these stan-
dard keys, you may also use (PageUp) and (PageDown) following a number such
as: (6),(PageDown). This means to advance six pages rather than the default of
one page.
328 List
Binary & Hex Program files do not contain ASCII text data and are always displayed
Displays using the BINARY display format.
Commands
000020: 00000000 b00ac15f 35623e56 061b8161 '....».‰_5b>V...a'
...
This display format can be forced for any file by using the BINARY option.
Data files (direct, indexed and keyed) can use a third type of display
invoked with the HEX option:
KEY:
0000: 41414120 56656E64 696E6720 53706563 'AAA Vending Spec'
0010: 69616C69 73747300 00000000 00000000 'ialists.........'
0020: 00000000 00000000 '........'
DATA:
0000: 041A3132 38323820 536F7574 68776573 '..12828 Southwes'
0010: 74205061 726B2050 6C616365 0400040D 't Park Place....'
0020: 43617374 726F2056 616C6C65 79040243 'Castro Valley..C'
...
or
List 329
This HEX display is similar to the BINARY display except each record is dis-
played separately, with the first column showing the relative location of
the data within the record. For keyed and indexed files, the key is shown
separately from the record. Direct files show the record number and record
length on a line directly above the record contents.
Notes If file is a “typeless” file description, there is no default library defined and
the environment variable FILETYPE is defined, the value of FILETYPE is
Commands
appended to file to form a complete file description with file name and file
type. To list a typeless file, you should specify the file description with a
period terminator. Refer to page 103 for more information about this envi-
ronment variable.
For instance:
>list sample.basic
is identical to:
Restrictions The file must have read access enabled. See “File Access Protection” on
page 145.
The BASIC language compiler has a built-in ability to list BASIC language
source programs.
330 List
Load Command
The Load command loads a program or data file into memory for subsequent usage.
LOAD program...
Commands
program » name of program or file to load into memory
Operation The program is loaded into memory. When program is a simple name, the
following locations are searched:
/THEOS/COMMAND/program.CMD
program.CMD
Notes Any compiled program (organization code “P” or “Program”) may be loaded
into memory. In addition, the /THEOS/CONFIG/DEVNAMES.TXT file may also be
loaded.
Programs are normally loaded into memory when needed and their use
count is set to one. If a program is already in memory because another
user or task is using it, or the program was loaded by this command or the
system start-up process, that copy of the program is used and its use count
is incremented. When a program is no longer needed by a user (program
exit), its use count is decremented and, if zero, the program is unloaded.
Disk Caching Loading programs and certain key data files into memory before they are
needed can increase the performance of your system slightly. However, if
sufficient memory is set aside for disk caching, the performance increase
will be minimal, at best, and may even degrade.
When disk caching is enabled, it is best to not load any programs or files
with this command or Sysgen.
Load 331
Caution Do not make changes to programs or files (with LineEdit, Patch, recompila-
tion, etc.) that have been loaded into memory. Any changes to the files
affect only the disk image of the file and not the loaded version. Before
making changes you should first Unload the program and file.
Do not erase or change the location of a file from disk after it has been
loaded. If this is done, the loaded copy of the file will not be used and
cannot be unloaded except by rebooting the system.
Commands
332 Load
LogName Command
LOGNAME
Commands
Operation The current account name is output to the standard output device.
>logon develop
>logname
DEVELOP
LogName 333
Commands
334 LogName
Logoff Command
Logon Command
The Logoff command logs off of the current account; the Logon command logs onto a new
account.
Commands
1 LOGOFF
Operation Mode 1—You are logged off of the current account. Logging off includes:
All files opened by this user are closed and all file and record locks
are removed. (This is actually done by the system prior to invoking
the Logoff command.)
All screen windows are closed. See wFinish command described on
page 750.
A message displays showing the time and date of the logoff and the
elapsed time that you were logged onto the system, along with the
amount of CPU time used while logged onto the system.
If HISTORY is ON, a record is written to the system history log file
recording the fact that you have logged off of an account. See “Sys-
tem History File” on page 217 of the THEOS Corona Version 5
Operating System Reference.
All privately attached devices (other than the console, slave print-
ers and VDI devices) are detached.
All publicly attached devices are reattached. This includes the
devices attached via Sysgen and those attached by you or other
users with the Attach command with option PUBLIC.
Logoff 335
>logoff
After Logoff completes (and the connection was not terminated because of
the Exit command or the TERM option), it invokes a special mode of the
Logon command that prompts you for the new account name and pass-
Commands
word.
Mode 2—The Logon command has two modes of operation: one invoked by
the Logoff command and the other invoked when Logon is invoked from a
command line.
When Logon is invoked by Logoff, it finds and displays the contents of the
file /THEOS/MENU/language/LOGON.MNU:S. It then displays the Logon form
shown above.
A lateral logon does not clear existing user environment variables, does
not detach private devices and does not reattach public devices. It resets
only the account name and number and the privilege level of the account.
Other system environment variables are changed only if the new account’s
336 Logon
environment definition specifies new settings. The UserName is not
changed unless there is no value for that variable currently.
In both modes of Logon, when the account name and password are properly
entered, the logon process is performed:
Commands
is different than the prior work drive, the work files are copied to
the new work drive.
The system’s time-of-day clock is adjusted for any change in day-
light savings time, if necessary. See “Daylight Savings Time and
Automatic Adjustment” on page 259 of the THEOS Corona Version
5 Operating System Reference.
If the TERM option is in effect, the EXEC program that invoked the
Logon is terminated. When NOTERM is in effect (a default option),
the EXEC program that invoked the Logon command is not termi-
nated.
If HISTORY is ON, a record is written to the system history log file
recording the fact that you have logged onto an account. See “Sys-
tem History File” on page 217. Unsuccessful attempts to log onto
an account are also recorded there.
If a /SYSTEM.LOGON:S file exists it is displayed on the console.
If account is not the system account or a synonym to it, the
/account.LOGON file is displayed on the console.
If a /SYSTEM.REMINDER file exists and there is one or more entries
for today’s date, the reminder messages are displayed.
If account is not the system account or a synonym to it and the
account.REMINDER file exists and there is one or more entries for
today’s date, the reminder messages are displayed. See
“Reminder” on page 479.
If the NOEXEC option is not used, a search is made for an EXEC
program with a file-name or member-name of account. The normal
locations for programs are searched and the environment variable
PATH is used when searching for these logon files. All drives in the
drive search sequence are examined. If an EXEC program is found,
it is executed; otherwise processing continues at the CSI or with
the next statement in the EXEC program that invoked Logon (if
NOTERM is in effect).
Logon 337
Options NOEXEC Do not execute the account EXEC.
NOTERM Do not terminate execution of the EXEC calling the Logon com-
mand. This is a default option.
Notes When the user is connected via a network connection, use the Exit com-
mand to log off and disconnect the user.
Neither the Logoff nor the Logon commands clear the console display. How-
ever, one or more of the displayed files ( /SYSTEM.LOGON:S or
/account.LOGON:S ) may clear the screen by embedding a form-feed code
(^L) in the text file.
You may refresh the display by pressing (Enter) on a blank logon name. This
is useful if you have started a user session on a terminal that was powered
off. When the user turns the terminal on they can press (Enter) to see the
logon prompt.
338 Logon
Look Command
Commands
2 LOOK file ( option pattern ...
3 LOOK pattern
file » file name with optional path; may include wild cards
pattern » text string to look for; may contain “regular expressions”
option » APPEND
EXEC
FILES
Operation Mode 1—Search file for every instance of pattern. When more than one
pattern is specified, each record or line is search for each of the patterns.
Mode 2—Similar to Mode 1 except that file may be a text file containing a
list of files (option FILES) or the result of the search may be output to
FOUND.EXEC rather than displayed on the standard output device.
Mode 3—Similar to Mode 1 except that the files searched are found in the
currently defined default library or, if no default library is defined, all files
using the default FILETYPE.
For all modes, file is examined, record by record, looking for any and all
instances of pattern. An exact match must occur between pattern and the
text in the file. This exact match does not include the case mode of the
characters.
When Look displays its results on the console, it displays every line of the
file that contains pattern. The pattern in the line is highlighted in reverse
video and the line is identified with its line number:
File: /THEOS/HELP/ENGLISH/LOOK.HLP:S
3 <title> THEOS Help for Look Command </title>
17 Unlike other THEOS commands, the options
38 >LOOK SYSTEM. THEOS 32.DEVNAMES ("Wyse"
Look 339
When more than one pattern is specified, it means “or.” For instance:
Options If any of the following options are used, they must be specified at the
beginning of the option list before any pattern is specified.
Commands
APPEND Indicates that, if file contains pattern, the complete path and
file name of file is output to FOUND.EXEC, appending a line to
any existing FOUND.EXEC.
EXEC Indicates that, if file contains pattern, the complete path and
file name of file is output to FOUND.EXEC, similar to the FileList
EXEC option. Any existing FOUND.EXEC file is erased first. Thus,
if no file contains pattern, the FOUND.EXEC will be empty.
&1 /THEOS/HELP/ENGLISH/B3220.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 /THEOS/HELP/ENGLISH/BASIC32.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 /THEOS/HELP/ENGLISH/CHANGE.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 /THEOS/HELP/ENGLISH/COPYFILE.HLP:S &2 &3 &4 &5 &6 &7 &8 &9 &10
...
FILES Indicates that file is an ASCII stream file with each record in
the file specifying a single file name. The file name specifica-
tions in this file may include the path to the file and wild
cards.
340 Look
A SELECTED.EXEC file now exists that lists all help files that
have been changed since 10/01/2001.
Commands
>look found.exec (files "SORT"
File: /THEOS/HELP/ENGLISH/ACCOUNT.HLP:S
40 SORT When used with the TYPE or PRT
...
Notes When one or more options are used, they must be specified before any pat-
tern. If no option is used and the pattern looks like an option, a “null”
option should be used.
The Look command can examine non-text files and it can examine non-
stream data files. When Look opens file it opens it as a stream of bytes and
does not consider the file’s organization. For instance, when file is an
indexed data file it can find character patterns in deleted records. When
file is not a stream text file the location that it reports is the offset from the
beginning of the file, in bytes.
Return Codes The return code is set to zero if file does not contain pattern; otherwise, the
return code is set to one.
Look 341
posed solely of literal characters. This pattern matches only when the text
file contains a sequence of three characters that exactly equals ‘a,’ ‘b,’ and
‘c.’
In addition to the normal ASCII characters, you may specify certain con-
trol characters as literal characters. These control characters must be
specified with the following codes:
Commands
Specification Meaning
342 Look
The following table shows all of the metacharacters allowed in regular
expressions.
Specification Meaning
Commands
\. or \? Any character matches.
\@ Any letter matches (A–Z and a–z).
\# Any digit matches (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0).
\\ Metacharacter escape. This is how a backslant literal
character is specified.
\[ Start character set.
\] End character set.
\{ Start general repeat specification.
\} End general repeat specification.
\* Repeat zero or more times.
\+ Repeat one or more times.
Table 10: Regular Expression Metacharacters
The first two metacharacters are called anchors. These anchor other text
to the beginning or end of the record searched. For instance, the pattern
"\^The"
means that “The” is searched for but only when it occurs at the beginning
of a record. Similarly,
"the\$"
is a pattern that means search for “the” at the end of a record. Note that
this last pattern will not find “the” if there is a space at the end of the line.
Look 343
• Regular Expression Wild Cards
There are three “wild card” metacharacters that allow you to search for
matches on any character (\.), any letter (\@) and any digit (\#). For
example, the pattern:
"THEOS\#86"
Commands
"\[0123456789ABCDEFabcdef\]"
"\[0-9A-Fa-f\]"
which means the set of characters ‘0’ through ‘9,’ ‘A’ through ‘F’ and ‘a’
through ‘f.’ Ranges specified with the hyphen character refer to ranges in
the ASCII collating sequence.
The hyphen does not have a special meaning when it occurs at the begin-
ning or end of a character set specification. Thus, the pattern:
"\[-0-9\]"
The circumflex ( ^ ) is the other character that has special meaning when
used in a character set specification. When the circumflex is used at the
start of the character set specification, it means that it is an exception
set. That is, it is a specification of characters that do not match. For
instance, the pattern:
"\[^A-Z\]"
344 Look
means a match on any character except uppercase letters. When the cir-
cumflex is used in a position other than at the start, it is merely a charac-
ter included in the set.
Commands
instance, the pattern:
means that you want a match on a space, followed by four to six letters, fol-
lowed by a space or period.
Look 345
Commands
346 Look
Lowcase Command Filter
Lowcase copies a file to the standard output device, converting all letters to lowercase.
1 LOWCASE file
Commands
2 LOWCASE
file » file name with optional path; wild cards are not allowed
Command synonym: LC
Operation Mode 1—file is copied to the standard output device with all uppercase
letters converted to lowercase. The original file is unchanged.
>lowcase /Theos/OS/Message/English/synonym.txt
account 3
archive 2
asm32 3
attach 1
...
Lowcase 347
Commands
348 Lowcase
Mailbox Command
The Mailbox command sends a message to another user’s mailbox or retrieves your mes-
sages.
1 MAILBOX user
Commands
2 MAILBOX user text
4 MAILBOX ( option
Operation Mode 1—This is the normal, multi-line mode of the Mailbox command.
When the command is entered, you are prompted to enter one or more
lines of text. To end the “mail,” press (EnterÌ˛) at the beginning of a line
with no text or spaces in it.
>mail shirley
Enter message text terminated by empty line.
Shirley,(EnterÌ˛)
(EnterÌ˛)
The company picnic has been scheduled in August.(EnterÌ˛)
(EnterÌ˛)
Please call me by Friday so we can arrange a planning(EnterÌ˛)
meeting as we have a lot to do in the next two weeks.(EnterÌ˛)
(EnterÌ˛)
>
After a line is entered you cannot edit it. You can prepare a long message
with an editing program and then send it with Mode 3.
Mailbox 349
Mode 2—For short, single-line messages, this mode allows you to specify
the message text on the command line. If the text contains commas, quota-
tion marks or other punctuation characters, you should enclose the entire
message in quotation marks.
>mail dave Please call me when you get in. It's important.
>mail eric "Your package arrived, and it's big. Call me."
Commands
Single-word messages cannot be sent with this mode because Mailbox will
assume that the single word is a file name and it will try to use Mode 3.
Mode 4—This mode retrieves your mail or removes old mail from your
mailbox.
>logon accntg
>mailbox
As each message is displayed you are asked if you want to delete it. If you
respond (Y) then the message is marked as deleted (it is not physically
350 Mailbox
deleted until the system manager uses the PURGE option described below).
Respond with (N) if you do not want it deleted at this time.
Each time that Mode 4 is used without one of the PURGE options, all mail
for your account is displayed whether it has been read before or not. When
a message is read and marked as deleted it is not displayed again.
Options The two PURGE options can be used only when you are logged onto the
Commands
SYSTEM account (id zero) and require a privilege level of five.
PURGE * Removes all mail that has been marked as deleted and all mail
that has been read but not deleted.
Notes Users are notified that there is mail waiting for them when they log onto
the account (see “Logoff” on page 335). They can then use Mode 4 of the
Mailbox command to read their mail.
Mail for all users is saved in the file SYSTEM.MAILBOX:S. This file is created
automatically the first time that Mailbox is used. Mail is only removed from
this file with the PURGE option.
Do not confuse this command with THEO+Mail and the mail sent and
received over the Internet with that command. Mailbox operates on mail
sent by the Mailbox or Msg commands only.
Restrictions The PURGE and PURGE * options require that you be logged onto the
SYSTEM account (account id=0) and that you have a privilege level of five.
Mailbox 351
Commands
352 Mailbox
MakeBoot Command EXEC
MakeBoot creates an Emergency Boot Diskette using the current operating system and
configuration.
MAKEBOOT drive
Commands
drive » optional disk drive attachment letter
Use the normal menu selection keys to select the desired function.
Use existing floppies. Choose this menu item if the diskettes are already
formatted. MakeBoot clears the existing directory and resizes it to gain
some additional space.
Format floppies first. Choose this menu item if the diskettes are not for-
matted. MakeBoot formats the diskettes using the highest capacity avail-
able on the drive. Then it copies the necessary files.
Exit. This menu item exits MakeBoot without modifying the diskette.
Notes MakeBoot requires two diskettes to hold the necessary files for booting the
computer. Be sure that you have these diskettes available before starting
the process.
MakeBoot will ask you to put the first diskette in the drive and then it will
format the diskette (if that option was selected), copy the necessary files to
the diskette and then ask for the second diskette. It then formats that dis-
kette (if selected) and copies the necessary files to that diskette.
A bootstrap loader is written to the first sectors of the first diskette. There
will be some space available on the second diskette and you may copy addi-
tional files and programs if there is sufficient room for them.
MakeBoot 353
MAKEBOOT The files copied to this “Emergency Boot Diskette” include:
Files:
File
Operating system /THEOS/OS/NUCLEUS.SYS
Command string interpreter /THEOS/OS/CSI.SYS
Device drivers /THEOS/DRIVER/CLASS901.SYS
Commands
/THEOS/DRIVER/DEV1.SYS
/THEOS/DRIVER/DEV2.SYS
/THEOS/DRIVER/DEV3.SYS
/THEOS/DRIVER/DEV64.SYS
/THEOS/DRIVER/DEV101.SYS
/THEOS/D RIVER/FORM2.SYS
SYSGEN configuration /THEOS/CONFIG/SYSGEN.CFG
/THEOS/CONFIG/INSTL IST.CFG
/THEOS/CONFIG/L ANGCODE.CFG
Accounting structure /THEOS/CONFIG/ACCOUNT.BIN
System support files /THEOS/OS/L OADER3.SYS
/THEOS/OS/L OADER4.SYS
/THEOS/OS/L OADER5.SYS
/THEOS/OS/PCMCIA.SYS
/THEOS/OS/CLOCK.SYS
/THEOS/CONFIG/DEVNAMES.TXT
/THEOS/OS/RESMGR.SYS
/THEOS/OS/M BR.SYS
/THEOS/OS/L OAD04GB.SYS
/THEOS/OS/L OAD0LFS.SYS
/THEOS/OS/SESSMAN.SYS
/THEOS/OS/WM.SYS
/THEOS/OS/M ESSAGE/ENGLISH/K EYWORD.BIN
/THEOS/OS/M ESSAGE/ENGLISH/M ESSAGE.BIN
/THEOS/OS/SCSI1.SYS
/THEOS/OS/SCSI2.SYS
/THEOS/OS/SCSI3.SYS
/THEOS/OS/SCSI4.SYS
/THEOS/OS/SCSI5.SYS
/THEOS/OS/I2OMSG.SYS
/THEOS/OS/USB.SYS
/THEOS/OS/M ESSAGE/ENGLISH/SYNONYM.TXT
Commands /THEOS/COMMAND/ATTACH.CMD
/THEOS/COMMAND/COPYFILE.CMD
/THEOS/COMMAND/DISK.CMD
/THEOS/COMMAND/FILEL IST.CMD
/THEOS/COMMAND/LOGON.CMD
/THEOS/COMMAND/M OUNT.CMD
/THEOS/COMMAND/SETUP.CMD
/THEOS/COMMAND/SYSTEM.CMD
/THEOS/COMMAND/TBACKUP.CMD
354 MakeBoot
File
Command support files /T HEOS/MENU/ENGLISH/ATTACH.MNU
/T HEOS/MENU/ENGLISH/DISK.MNU
/T HEOS/MENU/ENGLISH/FILELIST.MNU
/T HEOS/MENU/ENGLISH/FORM2.MNU
/T HEOS/MENU/ENGLISH/RESTORE.MNU
/T HEOS/MENU/ENGLISH/SETUP.MNU
/T HEOS/MENU/ENGLISH/TBACKUP.MNU
Commands
/T HEOS/MENU/ENGLISH/TLOGON.MNU
/T HEOS/MENU/ENGLISH/LOADER5.MNU
When this “Emergency Boot Diskette” is booted, there are sufficient com-
mands to format the hard disk, attach different devices, restore from tape,
“system” to the hard disk, etc. It is not intended as a general boot disk.
There may be sufficient space available on the disk to add more com-
mands. If you do, remember to include any support files needed by the
command (such as menus). You should not copy help files to this diskette.
If any significant changes are made to the system on the hard disk, you
should recreate the “Emergency Boot Diskette.” Significant changes would
include an upgrade to the operating system, new or changed account envi-
ronments, hard disk controller change and a change in the main console
configuration or attachment.
Defaults The default drive is F, which is normally the first floppy drive.
Restrictions MakeBoot can only be run if you are logged onto the system account.
The diskette must be 1.44MB. 1.2MB diskettes are too small to hold the
necessary files.
Using the Refer to the section “Booting with the Emergency Boot Diskettes” on page 28
Diskettes THEOS Corona Version 5 Operating System Reference for a description of
how these disks are used.
MakeBoot 355
Commands
356 MakeBoot
Message Command
1 MESSAGE * ( PRTnn
Commands
2 MESSAGE
>message *
0: Logon please: \a
1: Password?
2: Command not found.\n
3: Insufficient memory.\n
...
>message
At this prompt enter either the number of the message you want to view or
change, or press (EnterÌ˛), (Esc) or (F9) without a number to exit.
When a number is entered the current definition is displayed and you are
asked for the new definition:
>message
Message 357
To leave the message unchanged, press (EnterÌ˛), (Esc) or (F9) without any
characters or spaces.
When the new text for the message is entered, press (EnterÌ˛) and you are
Commands
Mode 3—Displays message number nnn on the console (not the standard
output device). If the message uses variables, the operands are used for the
value of these variables. Any missing operands are displayed with an ellip-
sis.
>message 7
Invalid command syntax.
>message 19
File "..." not found.
>message 19 abc.def:g
File "ABC.DEF:G" not found.
Message File Message text may contain plain text, display codes, video attributes, vari-
Syntax able arguments and conditional expressions. Plain text includes all of the
ASCII displayable characters (letters, digits, punctuation, etc.).
• Display Codes
Code Meaning
\a Sound the console bell.
\n Start a new display line.
\t Output spaces to next tab stop.
\\ Output a single backslant character.
358 Message
• Video Attributes
Video attributes such as reverse video, blink, etc. are specified by using
their octal values preceded by a backslant, zero. Some of the common codes
include:
Code Meaning
Commands
\016 Reverse video on.
\017 Reverse video off.
\013 Underline on.
\026 Underline off.
\035 Blink on.
\036 Blink off.
\04 Half intensity on.
\05 Half intensity off.
\0202 Status line start.
\0203 Status line end.
• Variables
Message text may specify that variable information will be inserted at the
time the message is displayed. For instance, message 19 displays as “File
"xxx" not found.” To indicate that the file name is inserted between the
quotation marks, a variable number is used.
• Conditional Expressions
{variable?value1=text1,value1=text2,...,text}
Message 359
that this is the “otherwise” clause and that text is output when the variable
is not one of the previously listed values. An asterisk means that the origi-
nal value of variable is used. For instance, message 105 is defined as:
This message will be displayed three different ways depending upon the
value of the variable zero.
Commands
>message 105 0
No files changed.
>message 105 1
One file changed.
>message 105 2
2 files changed.
As you can see from the second variable expression {0?1=,s}, you can
specify that nothing is output when the variable is a specific value. This
expression states that if variable 0 is a “1,” output nothing; otherwise
output an “s.”
Notes Although the display produced by Mode 1 is similar to the display produced
by the List command, there are two significant differences:
You should not use any of the currently unused message numbers for your
own purposes. All unused numbers are reserved for operating system
usage. As updates to the software require new message text, they are
added to this file. Also, this file is replaced in its entirety whenever the
operating system is installed or updated.
360 Message
Mixer Command
The Mixer command allows you to set the volume for various sound devices and files.
MIXER
Commands
Operation When invoked, the Mixer command displays the Mixer control screen:
Use your mouse or the (TabÌ¢) and (ñÌShift)+(TabÌ¢) keys to position to fields
that you want to change and then enter the desired values. The top line of
values set the left channel volume for the device and the middle line sets
the right channel volume. The bottom check boxes mute or unmute the
devices.
The volume values are set by using the (˚) and (˙) keys or by using the
mouse and clicking on the upper or lower portion of the object. Volume
values range from 0 (off) to 31 (maximum).
Master Controls the volume for all devices. The actual volume for a
specific device is a combination of the value for the device and
the value specified here.
Wave Controls the volume of WAV sounds (see “Play” on page 455)
Midi Controls the volume for playing midi sounds (not supported at
this time).
Mixer 361
CD Controls the volume of the sounds played from an audio CD
(see “CDPlayer” on page 59).
Notes This command only controls the volume of sounds played from the main
Commands
console. Sounds played during a TWS session are controlled by the com-
puter and software on the client system.
Restrictions You must have a sound card configured. Refer to the THEOS Corona Ver-
sion 5 Operating System Installation and Setup Guide for a description of
Setup SndCard.
362 Mixer
MkDir Command
Commands
directory » new subdirectory name; may include path
option » SIZE
Command synonym: MD
>tree
/
>mkdir subdir
>tree
/
subdir
>md subdir/sub
>tree
/
subdir
sub
>mkdir account\subdir
The above command creates the directory SUBDIR in the account named
ACCOUNT.
Options SIZE Specifies the initial size of the new directory. The number of
initial entries is specified following the keyword SIZE.
MkDir 363
cient to hold about 130 files with 8.8 character file names. Use
the SIZE option if you want to create a small directory size or
one that is much larger than the default.
The above two commands will perform the same operation and create the
same directory name.
Defaults If no account name is specified for directory, the new subdirectory will be
owned by the current account. If no path is specified for directory, the new
subdirectory is created as a subdirectory to the current working directory.
Restrictions directory must not be the name of an existing file or subdirectory and it
may not be a member of a library.
directory should not be /PIPE because this is a reserved name used by the
system. You may, however, create a subordinate directory named PIPE,
such as: /PRIVATE/PIPE.
See “Directories and Files” on page 131 of the THEOS Corona Version 5
Operating System Reference for additional information about directories
and subdirectories.
364 MkDir
More Command Filter
More copies a text file to the standard output device with page wait and browse capabilities.
Commands
2 MORE ( nnn
file » file name with optional path; wild cards are not allowed
nnn » number of lines to display per page
Operation Mode 1—Copies file to the standard output device. If standard output is
the console, page-waits are performed and browsing capabilities are
present.
>more /theos/config/devnames.txt
When the console screen is full, More displays its prompt on the last line.
The MORE prompt consists of the word “More” and the amount of the file
that has been displayed so far.
--More--(52%)
At this time you may use any of the browse keys described on page 366.
Multiple files may be specified by listing the file names on the command
line, one file name after the other. When multiple files are listed this way,
the (N) and (P) browse keys are enabled.
Options nnn Specifies the console page depth to use. When this option is not
specified, the console’s attached screen size is used.
The screen size can be changed during the display with the (Z)
browse key.
More 365
Browse Keys When the More prompt is displayed at the bottom of the screen you may
use the special More browse keys.
Key Action
(EnterÌ˛) Display next line of file.
(ÌÌSpaceÌÌ) Display next screenful of file.
Commands
Notes When used in a pipe, More should be the last command in the pipe so that
its output goes to the console and you can browse through the file using
the keyboard.
Defaults The default screen depth is the console’s attached page size.
366 More
Mount Command
Mount tells the operating system to reread the label information from a drive because the
disk might have been changed.
MOUNT drive
Commands
drive » disk drive letter
Operation This program assumes that the disk in the drive might have been changed.
Any current information about drive is disregarded and the disk drive is
instructed to recalibrate its heads. This is a process that moves the read/
write head to its home position. If supported by the drive mechanism and
controller, the heads are moved slowly.
Once the heads are in a known position, the first sectors of the disk are
read and the information is saved.
Notes If a disk is changed and the Mount command is not used, you will receive a
message “Disk drive changed, need “XXXX” -” the next time that drive is
accessed.
Cautions Use the MOUNT command every time that a disk is changed, even if
the new disk has the same format as the prior disk. If the new disk has the
same label as the prior disk, THEOS will not know that the disk has
changed and may use information saved from the prior disk to do writes!
Return Codes This command reads the first sectors of the disk and, depending upon
what it finds, sets the return code as follows:
Restrictions You cannot Mount the S drive. Use the System command instead.
Mount 367
Commands
368 Mount
Move Command
Commands
2 MOVE from-file to-drive ( options
4 MOVE ( options
Operation Mode 1—Each file matching from-file is copied to to-file, similar to the
CopyFile command. Both the from-file and the to-file may use wild card
specifications.
Mode 2—Each file matching from-file is copied to to-drive using the same
file name as the source. A
Mode 3—file must be a text file containing one or more records. Each
record in this file specifies a from-file and either a to-file or a to-drive spec-
ification. For each line in file, a Move is performed. Wild cards may be
used.
Move 369
This mode of the Move command is convenient when one or more sets of
files are repetitively moved. Merely edit a file containing file description
pairs, such as:
>edit daily.files
customer.master:s /prior/customer.master:s
customer.history:s /prior/customer.history:s
general.ledger.*:s /prior/=.=.=:s
check.*:s /prior/=.=
Commands
Mode 4—This is the interactive form of the Move command where you are
prompted to enter a from-file and a to-file or to-drive. This can be repeated
until all of the desired files are specified and moved. The operation is ter-
minated by entering a blank line.
Options KEEP Tells Move to not erase the source file after it is successfully
moved to the destination. With this option specified, the Move
command operates similar to a CopyFile command.
NOQUERY Tells Move to not ask for confirmation before moving each file.
This is a default option when wild cards are not used.
NOTYPE Do not display the results of each file moved on the standard
output device. The general result message (the “nn files cop-
ied.” message displayed prior to exiting Move) is also sup-
pressed with this option.
370 Move
QUERY Tells Move to “query” or ask if each file matching the source file
specifications is to be moved. This is a default option when
wild cards are used.
>move *.data i
Ok to move "CUSTOMER.DATA:S" (Yes,No,All)
Commands
with a (Y) for yes, (N) for no or (A) for all. Responding with (A)
means yes to this file and all remaining files are moved with-
out being queried. Respond with (Esc) to cancel the copy opera-
tion.
If the destination file does not exist, this option has no effect.
TYPE A default option that displays the status message “... moved to
...” after each file is successfully moved.
Move 371
Notes The source or from-file is erased unless the KEEP option is specified.
Defaults The QUERY option is a default if from-file contains wild cards. TYPE is a
default option.
372 Move
Msg Command
Similar to the Mailbox command, Msg sends a message to another user. However, if the user
is logged on, the message is displayed on their console immediately.
Commands
2 MSG user message ( option
3 MSG * ( option
Operation Mode 1—This is the multi-line mode of the Msg command. When the com-
mand is invoked, you are prompted to enter one or more lines of text. To
end the message press (EnterÌ˛) at the beginning of a line with no text or
spaces in it.
>msg Ted
Enter message text terminated by empty line.
Call me as soon as you get back from lunch. Something(EnterÌ˛)
important has come up that changes EVERYTHING!(EnterÌ˛)
(EnterÌ˛)
Msg 373
Mode 2—For short, single-line messages, this mode allows you to specify
the message text on the command line. If the text contains lowercase text,
commas, quotation marks or other punctuation characters that you want
in the message, you should enclose the entire message in quotation marks.
>mail dave Please call me when you get in. It's important.
>mail eric "Your package arrived, and it's big. Call me."
Commands
Options TITLE text Specifies an alternate title for the receiving user’s message
window. The title is displayed in the top frame, centered.
When this option is not used the default title of “ MSG From
your-account (Pid=your-pid) ” is used.
Notes When user is specified with an account name, and more than one user is
logged onto that account, all users logged onto that account receive the
message. When there are no users logged onto the account name, you are
asked if you want to put the message in the user’s mailbox. When this hap-
pens, the operation is identical to the Mailbox command.
374 Msg
Commands
The “Receive messages” field status is ignored in Mode 3 and Mode 4: The
message is sent to all users that are currently logged on.
When a message is sent to an account name and there is more than one
user logged onto that account name, all of those users will receive the mes-
sage.
Msg 375
Commands
376 Msg
Net Command
The Net command controls Corona networking and provides a common interface for many of
the functions and simple clients available Corona.
1 NET
Commands
2 NET ARP -a [ -N if-addr ]
5 NET BROWSE
11 NET SERVER
14 NET IPCFG
Operation Mode 1—NET: Invoke the Net command in interactive mode. In this mode
you are presented with choices allowing you to Ping, Lookup, Trace, IP
Cfg, DNS, WhoIs, Finger and Scan. See “Net Interactive” on page 379.
Mode 2—NET ARP: Display the Address Resolution Protocol table. See
“Net ARP” on page 388.
Net 377
Mode 3—NET ARP: Assign an IP address to a network interface card.See
“Net ARP” on page 388.
Mode 5—NET BROWSE: Browse the local network looking for Network
File System servers. See “Net Browse” on page 390.
Commands
Mode 11—NET SERVER: Show the status of all of the network servers.
This form also allows you to start and stop the servers. See “Net Server” on
page 401.
Mode 12—NET START: Start the network or a specific network server. See
“Net Start” on page 402.
Mode 13—NET STOP: Stop the network, a specific network server or all
network servers. See “Net Stop” on page 402.
Mode 16—NET service: Use one of the TCP/IP simple services. See “Net
service” on page 411.
Restrictions The Net command requires at least a privilege level of one. Higher privi-
lege levels may be required of specific functions of the command.
See also DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
378 Net
Net Interactive Command
The interactive form of the Net command presents the following form
allowing you to use any of functions shown. These functions, for the most
part, are useful in diagnosing problems that you may have with your local
network or with accessing a remote server.
Commands
The Ping button provides a means of testing if a host can be accessed over
the network or whether or not it is responding.
Host Enter the domain name or dotted IP address of the host that
you want to test.
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
For a description of the trace display refer to the Ping command on page
453.
Host Enter the domain name or dotted IP address of the host that
you are interested in.
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
Commands
Host Enter the domain name that you want to inquire about. You
may also enter the dotted IP address.
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
The IPCFG display shows the information for this computer system’s net-
work configuration.
Commands
Domain Enter the domain name that you want to inquire about. You
may also enter the dotted IP address.
Record Select one of the offered records (Address, MX, NS, SOA). The
DNS server identified in the next field (Server) will be queried
for this specific record.
Server Enter the domain name or dotted IP address of the DNS server
that you want queried. It is possible that, if that server does
not know the answer, it might pass the query onto another
DNS server.
This field is initially filled in with the DNS server address that
has been configured for this systems network access.
Go Select this button to perform the query. Note, this button is the
default for this form. This means that if you use the (Enter) key
for any of the other fields, this Go button is selected automati-
cally.
Id................ nnnn
Length............ length of response
Code.............. xxxxxxxxxxxxxxxxxxxxxxxx
QdCount........... number-of-questions
AnCount........... number-of-answer-records
NsCount........... number-of-nameserver-records
ArCount........... number-of-address-records
Commands
Question 1: domain-name
Type: n=record
Class: 1=IN
Following this portion of the reply is the information specific to the query.
That is, information about the domain’s address, mail exchanges, name
servers or start of authority data.
Commands
Host Enter the second-level domain name that you want to inquire
about. A second-level domain name is a name with only two
parts, a .com, .us, .org, etc. (first-level) and the domain name for
the desired entity such as theos, microsoft, ibm, etc. It does not
have any other parts of a URL such as www, ftp, etc.
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
The format and content of the registration database may vary depending
upon the administrator for the first-level domain of the requested domain.
Commands
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
Many mail servers do not support a Finger server or do not have it enabled
for security reasons. Mail servers that do support it might not have
enabled the capability to perform a general request with the “@server”
request.
Commands
Host Enter the second-level domain name that you want to inquire
about. A second-level domain name is a name with only two
parts, a .com, .us, .org, etc. (first-level) and the domain name for
the desired entity such as theos, microsoft, ibm, etc. It does not
have any other parts of a URL such as www, ftp, etc.
Go Select this button to perform the query. This button is also the
default for this form. This means that if you use the (Enter) key
for the Host fields, this Go button is selected automatically.
From Enter the lowest port number that you want scanned.
Known ports only Check this field if you want to limit the scan to the com-
mon, known port numbers. These known port numbers are
listed in the file /THEOS/CONFIG/SERVICES.TXT:S.
When the Go button action is selected, the Host is queried for every port
number between From and To or, if Known ports only is checked, the com-
mon, known port numbers between From and To.
Each port that responds is reported with the server name associated with
that port number.
The Net ARP command displays the Address Resolution Protocol table and allows you to
assign an IP address to a network interface card.
>net arp -a
Interface: 192.168.100
Internet Address Physical Address
192.168.1.105 00-03-47-D5-24-E1
192.168.1.104 00-E0-7D-9D-87-BB
Except for the entries that are manually added with Mode 2, the entries in
the ARP are transitory. They are added each time that a local IP is
resolved into a specific network interface card’s MAC address and then
removed a short time later.
In the above example, the interface card with the MAC address of
00-E0-7D-9D-87-BB is assigned the IP address of 192.168.1.157. If that
card already has an IP address assigned, then this address is added to its
list of addresses.
Commands
In the first example above, the ARP table is searched for any entry of the
address 192.168.1.101. If an entry is found it is deleted from the table.
The associated network interface card is instructed to remove that IP from
its internal list of addresses that it responds to.
The second example is similar to the first except that the ARP table is
searched for an entry that has the IP address of 192.168.1.103 and has
the specific MAC address of 00-1A-C9-9D-45-DF. If an entry is found with
that combination then it is removed from the table and the interface card
is reprogrammed.
Options The only option available with this command is the -N option that might be
used with Mode 1. When it is used the ARP table display is limited to the
entries matching the specified MAC address and interface card.
The Net Browse command scans the local network computers and reports on the systems cur-
rently available for network file system access.
NET BROWSE
Commands
Operation The TNFS client on this system is queried for computers on the network
with network file systems available. The list of computers available is dis-
played.
All systems that have a network file system installed and operating are
reported. There is some latency inherent in the reporting system and it is
possible that a system will be listed that has been powered off for as long
as 45 minutes.
You may get the list of share names available on a system by positioning
the highlight bar to the system’s name and pressing (Enter) or (+). If there
are any shares defined on that system they will be listed. Similarly, you
can remove the display of the share names for a system by pressing the (-)
key when the system name is hightlighted.
The Net Exec command is used from a client workstation connection to a THEOS host and
causes the client system to execute a program.
Commands
program » program to execute on client, with parameters
exec-options » MAXIMIZE NORMAL WAIT
MINIMIZE NOWAIT
Operation Forces the client system to execute program. You must already be con-
nected as a client to a THEOS server to use this mode. NetTerm, Telnet and
THEOS WorkStation Client (TWS) connections can use this command.
Only the first command is proper because that is the format used for spec-
ifying directory paths and drive codes on Windows and DOS systems. The
second command will not edit the desired file.
on the client system as a background task. The Net command returns con-
trol to you as soon as the task is started.
NoWait Tells the THEOS Server to not wait for completion of the pro-
gram on the client system. When executed from the command
line, control returns to the CSI and you may enter another
THEOS command. When executed from an application pro-
gram or an EXEC, control returns to the calling program.
Wait A default option that tells the THEOS Server to wait for com-
pletion of the program on the client system before returning
control to you or the calling program.
Restrictions When the client system is a THEOS 4.x or THEOS Corona system, do not
use the Maximum, Minimum or Normal options.
See also DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
The Net Receive and Net Send commands allow you to receive and send files when a NetTerm
or TWS client connection is made with a THEOS host system or directly from a system con-
nected to a network.
Commands
1 NET RECEIVE file destination-file ( send-rec-options
Operation All transfers are relative to the client system issuing the request. For
instance, a Net Receive means a file is received on the client system; a Net
Send means a file is sent from the client system.
Mode 1—Transfers file from the server to this client. You must already be
connected as a client to a THEOS server and you must be logged onto an
account to use this mode. Client connections are made with the NetTerm or
the THEOS Workstation Client programs. (Because the Telnet protocol does
not support file transfers, connections made with a Telnet client cannot
use the file transfer capabilities of the Net command.)
The file and destination-file can be specified with wild cards. The syntax
and operation of the wild cards is similar to the syntax and operation of
wild cards used with the CopyFile command.
In the above command, all files with a file-type of DATA on the S drive of the
host system are received on the client system. They are received on the
Commands
with the same file-name but the file-type changed to NEWDATA for each file.
In this command, each of the member files of MY.LIBRARY on the host system
are received on the client system into the library YOUR.LIBRARY. The mem-
ber-names are not changed. Obviously, this command could only be used
when the client is NetTerm on a THEOS system as other operating systems
do not have libraries.
The above command sends all files with a file-type of DATA and with a
file-name that starts with FILE on the host system. The files are received on
the client system with the file-name changed to ABC=X where the equal sign
is replaced with the portion represented by the * in the source file-name.
For instance, FILEONE.DATA is received as ABCONEX.DATA, FILE486.DATA is
received as ABC486X.DATA, etc.
The specification of file and destination-file must use the file naming con-
ventions of its operating system. If the destination is a THEOS system
then use THEOS naming conventions; if the destination is a Windows
system then use Windows naming conventions.
When the destination-file is specified with a drive code the file is received
with a file name equal to the source file name but on the designated drive.
When destination-file is omitted, the file is received with the source file
name on its default drive.
Mode 2—Receives a file from some system on the network that is accessi-
ble to this client. The remote system and the file to be transmitted is iden-
tified by the url. The name of the file received is taken from the file name
portion of the url. The file will be received into the current account, cur-
rent working directory on the system drive.
Note that, in the above example, the url specifies the network protocol
(ftp://). This is necessary for two reasons. First, it tells the Net command
Files may only be received from an FTP or HTTP server and the appropri-
ate protocol must be specified in the url. The url must also specify the host
and path of the file to receive. It may specify the account and account pass-
word of the owning account on the remote server. When the account is not
specified the “anonymous” account is used.
Commands
For a complete description of the url syntax and usage, refer to Appendix
D: “File References,” on page 247 in the THEOS Corona Version 5 Operat-
ing System Reference.
Mode 3—Transfers file from this client to the THEOS server (RECEIVE) or
transfers file from the THEOS server to this client (SEND). You must
already be connected as a client to a THEOS server and you must be
logged onto an account to use this mode. Client connections are made with
the NetTerm or the THEOS Workstation Client programs. (Because the Telnet
protocol does not support file transfers, connections made with a Telnet
client cannot use the file transfer capabilities of the Net command.)
The send or receive direction is relative to the client system. Therefore, Net
Receive receives a file from the host on the client; Net Send sends a file
from the client to the host.
Both SEND and RECEIVE allow the file and destination-file to be specified
with wild cards. The syntax and operation of the wild cards is similar to
the syntax and operation of wild cards used with the CopyFile command.
The above command sends all files with a file-type of DATA on the S drive.
The files are received with the file names unchanged.
This command performs the same function as the first command: All files
with a file-type of DATA on the S drive are sent and received with the same
file names.
In the above command, all files with a file-type of DATA on the S drive are
sent to the host system. They are received on the host system with the
same file-name but the file-type is changed to NEWDATA for each file.
In this command, each of the member files of MY.LIBRARY are sent to the
host system and received into the host system’s library YOUR.LIBRARY. The
member-names are not changed.
The above command sends all files with a file-type of data and with a
file-name that starts with file. The files are received on the host system
with the file-name changed to ABC=X where the equal sign is replaced with
the portion represented by the * in the source file name. For instance,
FILEONE.DATA is received as ABCONEX.DATA, FILE486.DATA is received as
ABC486X.DATA, etc.
In this example, all files with a file-type of data are sent to the host sys-
tem. The host system receives these files with the same file-name but the
file-type is changed to NEW= where the equal sign is replaced with the
source file’s file-type wild card component. For instance, FILE1.DATA111 is
received as FILE1.NEW111, FILE486.DATA2002 is received as FILE486.NEW2002.
The specification of file and destination-file must use the file naming con-
ventions of its operating system. If the source is a THEOS system then use
THEOS naming conventions; if the source is a Windows system then use
Windows naming conventions.
When the destination-file is specified with a drive code the file is received
with a file name equal to the source file name but on the designated drive.
When destination-file is omitted, the file is received with the source file
name on its default drive.
Mode 4—Sends a file from this system to a remote system on the network.
The remote system is identified by the url.
The name of the file sent is taken from the file name portion of the url. The
file must be in the current account, current working directory on the
system drive.
Files may only be sent to an FTP or HTTP server and the appropriate pro-
tocol must be specified in the url. The url must also specify the host and
path of the file to send. It may specify the account and account password.
When the account is not specified the “anonymous” account is used.
Options With the exception of Files and Translate, they control the actions to be
taken when the receiving system already has a file with the same file
name.
Commands
Abort Specifies that, if the receiving system has an existing file with
the same name as file, the transfer is to terminate without
replacing this file or attempting to transfer any other files.
Files The files listed in file are sent to or received from the server.
file must be an ASCII stream file containing one or two file
descriptions per line. The SELECTED.FILES and SELECTED.EXEC
files created by the FILELIST command and the FOUND.EXEC cre-
ated by the LOOK command can be used for this specification
file. You may also create the specification file with an editor or
application program.
A file now exists that lists all of the files on the A disk that
have been changed between 10/01/2001 and 10/08/2001. The
following command will transfer these files from the server to
the client system:
NewFile Specifies that, if the receiving system has an existing file with
the same name as file, you are to be asked if it should be
replaced with the new file. The method of asking and the
options available at that time are dependent upon the receiv-
ing system.
Older This option specifies that the file is only transferred if the file
does not exist on the destination or if the time-stamp of the file
Replace This is the default option specifying that, if the receiving sys-
tem has an existing file with the same name as file, that file is
replaced with the file from the sending system.
Skip Specifies that, if the receiving system has an existing file with
Commands
the same name as file, the transfer is to skip this file and con-
tinue with the next file in the list.
Translate When the file being transferred is an ASCII stream file, the
record terminators are to be translated to the receiving sys-
tem’s syntax (CR for THEOS, CRLF for DOS/Windows).
Restrictions This command may only be used when you are connected to the host com-
puter using NetTerm, Telnet or THEOS WorkStation client software.
See also DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
The Net Share and Net Use commands define and maintain the names used by others to
access the TNFS resources on this computer (SHARE) and for this computer to have client
access to the TNFS resources on other computers (USE).
Commands
1 NET SHARE share-name path password access-mode comment
3 NET SHARE
7 NET USE
Operation Mode 1—Defines a share name for a directory on one of the local disks.
This share name is what other computers on the network will see when
they request access to this system’s files. The other systems do not refer to
a disk drive but to a share name on this system.
Mode 5—Similar to Mode 4 except the use name is added with a password.
If the share name is defined on the server system with a password, you
must specify that same password on the use name defined here. This pass-
word is supplied to the remote system when a connection is established
from this client system to the file server system.
Mode 6—This syntax will delete the use name from the list of use names
defined on this client system.
See also DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
The Net Server command examines the servers installed on this system and reports about
their status in a form that also allows you to change the status.
NET SERVER
Commands
Operation The system is examined for each of the possible servers. If a server exists
on the system (its primary program file is found) then the status of that
server is shown. The configuration of the server is examined to determine
how it is normally started and that startup mode is also shown.
Server list box Each server installed on the system is listed along with its
current status and startup mode. Use this area to select a
server that you want to change.
Mode Press this button if you want to change the startup mode of the
selected server. If the server is currently started manually,
pressing this button will change it to start automatically the
next time that the system is booted. If the server is started
automatically, pressing this button will change it to only start
manually.
Restrictions This mode of the Net command requires a privilege level of 3 or better.
The Net Start and Net Stop commands start or stop network servers on this system.
Operation Mode 1—Starts the network or starts one of the network servers installed
on this system.
Mode 2—The network must be started before any of the network servers.
If you attempt to start a server without first starting the network the mes-
sage “Network not operational” is displayed and the return code is set to
one.
Once the network is started, you may start any of the other network serv-
ers installed on this system. See “Servers” on page 403 for a list and
description of these servers.
Commands
Mode 5—Stops all of the servers that are currently running on this sys-
tem. You can perform a Show Servers to see a list of the currently active
network servers.
DNS The Domain Name System server is used by this system and
other systems on the local or wide area network for domain
name to IP number resolution of the various servers on this
local network. Generally, there is only one DNS server enabled
on a local network.
FTP The File Transfer Protocol server is used by this system and
other system on the local or wide area network when they
want to transfer files from this computer using an FTP client
program. Synonyms accepted for FTP include FTPSERVER.
Login The login server is used by this system and other systems on
the local or wide area network when they want to connect to
this system using a NetTerm client or a THEOS WorkStation
client. Synonyms accepted for LOGIN include NETLOGIN.
LPD The Line Printer Daemon server is used by this system and
other systems on the local or wide area network when they
want to access the printers controlled by this computer.
Mail The Mail server is used by this system and other systems on
the local or wide area network to send or receive mail using
this system as the mail server. PostOffice is a synonym name
for this server.
Commands
NetAlive The NetAlive server is used by this system to monitor access to
local or wide area network servers and perform actions when
they start or stop being available to this computer.
NetWork The Network server refers to the TCP/IP and Ethernet server.
It is the software used by all other servers for communication
capabilities and it must be started before any other server.
PrtNet The PrtNet server is used by this system and other systems on
the local or wide area network when they want to access the
printers controlled by this computer.
TapeNet The TapeNet server is used by this system and other systems
on the local or wide area network when they want to use the
tape drives controlled by this computer.
TDB The THEOS DataBase server is used by this system and other
systems on the local or wide area network when they want to
use the THEOS database managed by this computer.
Telnet The Telnet server is used by this system and other systems on
the local or wide area network when they want to connect to
this system using a Telnet client application.
TFTP The Trivial File Transfer Protocol server is used by this system
and other systems on the local or wide area network when they
want to transfer files from this computer using an TFTP client
program.
TNFS The THEOS Network File System server is used by this sys-
tem and other systems on the local or wide area network
TWindows The TWindows server is used by this system and other systems
on the local or wide area network when they want to connect to
this system using a THEOS WorkStation client.
Commands
local or wide area network to access this computer and perform
system and network server maintenance.
To use the START or STOP functions, you must be logged onto the SYSTEM
account (id = zero) and have a privilege level of five.
See also DialNet, FTP, NetTerm, Ping, Quote, Setup, Telnet, THEOS WorkStation Client
The Net IPCFG command display various configuration information about the network.
NET IPCFG
Commands
>net ipcfg
Domain: my.lan
Gateway: 192.168.1.1
DNS: 24.0.53.55
24.0.53.56
The Net function commands display various configuration information about the network and
who is currently connected to the network.
NET function
Commands
function » DISCONNECT PINGALL
PING WHO
Functions Disconnect This function can only be used while you are connected to the
Login Server via a NetTerm or a THEOS WorkStation Client.
>net ping
Name Address
Accounting 192.168.87.12
Executive 192.168.87.15
Administration 192.168.87.63
Net 409
Who All THEOS login servers that this system can access are dis-
played along with the client nodes that are actively connected
to those servers.
>net who
See also DialNet, Exit, NetTerm, Ping, Setup, Telnet, THEOS WorkStation Client
410 Net
Net service Command
The Net service commands establish a client-server relationship between this system (client)
and a TCP/IP Simple Services server.
Commands
2 NET service host parameters
The server-functions refer to the TCP Simple Services that are available
with network operations. These services are standard services available
from most TCP/IP servers.
TCP Simple Services are not necessarily enabled at all times. They may be
enabled automatically if “Enable TCP Simple Services” is checked in the
Setup Net Simple TCP Services (see THEOS Corona Version 5 Operating
System Installation and Setup Guide). They may also be started manually
with the Net Start TCPSERVE function described on page 402.
A host name may be specified following the service name. When host is not
specified the implied host is LOCALHOST, which is the default name of
this computer’s network address. When a host is specified, that host is
used for the TCP Simple Service instead of your system’s TCP server. This
capability is particularly useful for the Time service. By specifying a host
whose time is known to be accurate, you can find out and optionally set
your system to the current time.
ter by one.
>net chargen
!"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQ...
!"#$&’()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQR...
The third example above also specified a host. In this case, that
host’s CHARGEN server was available and it started generat-
ing and sending text strings to this client.
DayTime Displays the current date and time from the server. Although
there is no specific standard for the format of the string
returned, the THEOS DAYTIME service returns it formatted as
day-name, month-name day-number, year time UTC-offset.
>net daytime
Tuesday, November 26, 2001 12:08:15 -0800
Like the other TCP services, this service can get the informa-
tion from another server by specifying a host.
Echo All data sent to the server is echoed back to this client.
>net echo
>This is a test of the TCP/IP echo command.
Commands
<This is a test of the TCP/IP echo command.
Time Displays the time on a network server or gets that time and
sets the time on your system.
>net time
Tue Nov 06 15:22:20 2001
When a host is specified you may also request that this sys-
tem’s date and time be set to the date and time retrieved from
the remote time server. With this form, the remote server is
contacted and that system’s current time is retrieved. That
time is then used to set the system time of this client machine.
>show time
15:26:23 Tuesday, November 06, 2001.
See also DialNet, FTP, NetTerm, Ping, Setup, Telnet, THEOS WorkStation Client
Commands
The NetTerm command establishes a client/server connection between the THEOS system
that you are currently using (client) to another THEOS system that is a server on your net-
work.
Commands
1 NETTERM ( options
Command synonym: NT
Operation Mode 1—Invokes the NetTerm command without connecting to any server.
NetTerm queries the network to find all of the THEOS servers that are con-
nected to the network.
When no other THEOS servers are present on the network, an error mes-
sage displays and the program exits.
NetTerm 415
Commands
Mode 3—Same as Mode 2 except that you are automatically logged onto
account. If that account has a password, you must enter the password
when the connection is established.
CTL Set control mode for this console on the server. Control mode
causes all control characters received to be displayed visually.
For instance, receipt of a CR is displayed as ^M.
416 NetTerm
PRTnn Your printer number PRTnn becomes a slave printer for your
session on the remote server. When this option is not used (and
the NOPRT option is not specified), your lowest numbered,
attached printer becomes the slave printer.
Default When an account name is not defined on the command line (Mode 1 or
Connections Mode 2), the account name specified in your system’s NetTerm configuration
file is used. If no NetTerm configuration file is found, a normal user start is
Commands
performed on the server and you are prompted to “Logon please.”
NetTerm searches your system for the NetTerm configuration file using the
following file specifications:
environ/account.NTCFG
environ/SYSTEM.NTCFG
account.NTCFG
SYSTEM.NTCFG
NetTerm NetTerm configuration files are ASCII text files containing the following
Configuration information:
File
[name1 Server]
Account=account
[name2 Server]
Account=account
etc.
name1, name2 are the names of remote servers that you connect to.
account is the name of the account that you want to automatically log onto
when you connect with that server. For instance:
[Administration Server]
Account=Reports
[Executive Server]
Account=Remote
[Production Server]
Account=Guest
[Development Server]
Account=Programs
When this file is used to connect to the “Development” server, you are
automatically logged onto the account “Programs.”
NetTerm 417
NetTerm Menu Once you are connected to the server, your system is a client to the remote
server. This means that any keys pressed are transmitted to the server as
if you had a terminal directly connected to that system. Text received from
the server is displayed on your console.
When the disconnect is finished, you are presented with the menu of avail-
able servers that was described on page 415.
Send File. Sends a file from this client to the server system. You are
prompted for the file name you want transferred. You may specify any file
on your system that you have access to. Specify the complete path, if neces-
sary.
418 NetTerm
Commands
Unless a different path is specified, the file is received on the server
system into the current account, current working directory. An informa-
tion window and status bar displays during the transfer.
You may also send files to the server by executing the Net Send command
on the server system. This ability is particularly useful for transferring
files under program control.
Receive File. Similar to the “Send File” function described above except
that it transfers a file from the server to this client system.
You may also receive files from the server by executing the Net Receive
command on the server system.
Help. Displays help information about NetTerm. Note that you may press
(F1) with any of the menu items selected to receive addition information
about that specific menu item.
About NetTerm. Displays copyright and version information about the Net-
Term command and displays information about your current connection on
the network:
Shell to OS. Invokes the CSI shell without exiting the NetTerm command.
This is the only way to maintain the connection with the server while exe-
cuting another command on your system from this terminal and session.
Exit. Disconnects from the server and exits NetTerm. This action can also be
performed without the menu by pressing (Break),(X).
Notes When connected to a remote THEOS server, you may execute any pro-
grams on that server that you have access to. While connected, the pro-
grams that you execute have the full resources of the server available to
them. Additionally, they may have access to one of the printers on your
client system if a printer was attached when you established the connec-
tion and you did not use the NOPRT option.
NetTerm 419
Cautions You may execute the NetTerm command on the server. This will attempt to
establish a link to another THEOS server. When this is done you will be
communicating to the second server via the first server.
use the (Break),(B),(B),(X) keys to tell the first server to transmit a (Break),(X) to
the second system.
If you use the NetTerm command on the second system to connect to a third
THEOS server, it is even more confusing.
Restrictions You may only connect to a THEOS server that gives your system permis-
sion to connect to it. Refer to Chapter 5 “Network Security,” starting on page
63 of the THEOS Corona Version 5 Operating System Reference for addi-
tional information about access permissions and security issues.
420 NetTerm
Notes Command
The Notes command displays and maintains a user’s database of notes and messages to
themselves.
1 NOTES
Commands
2 NOTES folder
Operation Mode 1—Using the NOTES directory for the currently set USERNAME, the
notes form is displayed allowing you to view and maintain your notes:
Notes form Notes list box The large area in the form is a list of the currently defined
notes for the Category selected. You can and must select one of
these notes if you want to Open, Print, Send, Remove or Change
it.
Category A drop-down list box that allows you to select a note category.
The available predefined categories include: All, Business, Ideas,
Notes 421
Miscellaneous, Personal, To Do and Unfiled . You may also define
your own categories.
New To create a new note select the New button and the following
Commands
form is displayed allowing you to enter the title and text of the
note. The note is categorized with the currently selected Cate-
gory unless that category is “All,” in which case the new note is
saved as an “Unfiled” category. The category of a note can be
changed after it is created by using the Change function.
When entering the text of the note remember that the first line
of text will also be used as the title for the note and it is what
appears in the Notes list box area of the main Notes form.
422 Notes
Send This button displays another form allowing you to send this
note as an e-mail message to someone:
Commands
You must fill in a valid From and To e-mail address. You may
modify the message body by adding additional lines of text or
changing the note text that is pre-loaded into the body of the
message.
Remove Selecting this button deletes the note that is currently selected
in the Notes list box.
Change You can change an existing note’s category with this button. It
displays the following form allowing you to select the new cate-
gory for the note.
Notes 423
Creating New You can create your own categories by using the “Edit categories” selection
Categories of the Category selection item. When this is selected you are presented
with:
Commands
Just enter your new category name in the “New category” field and press
the “Add” button. You can also delete any of the categories, including the
preset category names.
The “Reset” button allows you to restore the category list to the standard
names. When this is done you are asked to confirm your choice:
When a category name is deleted, any notes that were assigned to that cat-
egory are reclassified as “Unfiled.”
424 Notes
NsLookup Client
The NsLookup client looks up domain names and returns their associated IP address, or
looks up an IP address and returns its domain name.
1 NSLOOKUP domain
Commands
2 NSLOOKUP
>nslookup teleport.com
Server: teleport.com
Address: 192.108.254.10
192.108.254.12
>nslookup www.microsoft.com
Server: www.microsoft.com
Address: 207.68.137.62
207.68.156.53
207.68.156.54
207.68.156.61
207.68.156.16
207.68.156.58
...
Multiple addresses listed for a domain indicate that all of those addresses
are associated with the domain. They refer to different machines at that
site’s location. One may be for their FTP server, another for incoming mail,
etc. Their exact function cannot be determined by this display.
If the DNS server that is being used supports the feature, it is possible
that NsLookup will display multiple lines identifying the Alias domain
names. This is done only if there is a single IP address associated with the
name requested and the DNS server supplied the alias names or the
names have already been cached by the DNS resolver on this system.
NsLookup 425
Mode 2—Enters an interactive mode where you can specify more than one
domain before exiting.
>nslookup
Domain When domain is entered, the name resolver searches the following loca-
Specification tions until a match is found or until all locations have been searched with-
out success:
426 NsLookup
When domain is found in the host names database, the alias entry
is displayed with the host name, dot, your-computer-name. Your-
computer-name is defined in the Setup Net Identification . (See
THEOS Corona Version 5 Operating System Installation and
Setup Guide.)
Commands
>nslookup www.theos-software.com
Server: www.theos-software.com
Address: 207.21.75.100
NsLookup 427
Commands
428 NsLookup
Number Command Filter
Number copies a file to the standard output device, numbering each line as it is copied.
Commands
2 NUMBER
Operation Mode 1—Each file is copied to the standard output device and numbered
as it is copied. Specifying multiple files causes the second and remaining
files to be appended to the first file copied to the standard output device
and the numbering continues without being reset at the beginning of each
file.
>number one.file
1 Line one
2 Line two
3 Line three
Mode 2—Copies the file from the standard input device to the standard
output device, numbering each line as it is copied. When the console is the
standard input device you terminate the input by entering (Ctrl),(D) on a
line by itself.
Number 429
Options start The starting number to use for the first file copied to standard
output. The default starting number is one.
increment This option may only be used in combination with start. Speci-
fies the increment value for each line number used. The
default increment is one.
Defaults start and increment have default values of one and one.
430 Number
Password Command
The Password command allows you to change the password to your account.
PASSWORD
Commands
Operation The current account must have a password. If it does, you are prompted to
enter the existing password to the account.
After entering the current password you are asked to enter the new pass-
word twice to make sure that you did not mistype it.
Notes You cannot remove a password with this command. Only the Account com-
mand can remove the password for an account.
Cautions Remember to make a note of this new password. You will not be able to log
onto this account without this password and the password is not recorded
anywhere in the system in plain text.
Restrictions The account must have a password. If it doesn’t, ask the system adminis-
trator to add the password to the account with the Account command.
The new password must match the current password policies. Password
policies are rules governing passwords such as must contain upper and
lower case characters, must not match any single word in the dictionary,
etc. The policies also define the expiration time for a password. These
polices are maintained by the Account command.
Password 431
Commands
432 Password
Patch Command
The Patch command is a general purpose file and disk maintenance program. With it you
can examine and change any file on the system or any sector of any attached disk.
Commands
2 PATCH drive ( options
Operation Mode 1—With this mode you can view and make changes to file. The file
may be any data or program disk file. file may not be a subdirectory or a
library name.
Refer to “Patching Files” on page 449 for a description of how Patch operates
depending upon the file type (organization).
Mode 2—This mode allows you to view and make changes to the data in a
specific disk sector.
Options BINARY Tells Patch that file is to be treated as a stream of bytes rather
than records or a program.
Caution: You should only use this mode to view files. Essen-
tially, this option tells Patch to ignore the structure of the file.
If you make changes while this option is in effect, you may
change a key (indexed or keyed file) to be unreachable or you
may make records unreadable or programs unloadable.
NOVIDEO Tells Patch to start in the command mode rather than the full-
screen display mode. This option is useful when Patch is being
invoked from an EXEC program that has &STACK data that
automatically updated a file.
Patch 433
Video Display Patch has two basic display modes: full-screen video mode and command
Mode mode. In full-screen video mode the screen is used to display as much as
one sector (256 bytes) of the disk or file at a time.
>patch /theos/config/browscap.txt
Commands
As you can see, this display is very similar to the display used by the List
command when option HEX is specified. The first column shows the rela-
tive location of the data in the file. The middle portion of the screen shows
the hexadecimal values for each byte of the file. And on the right is the
ASCII display of those same data bytes.
In full-screen video mode you can make changes to the data on the screen
or move to display other sectors of the file. The keys that can be used in
this mode are:
434 Patch
Key Meaning
(Quit) Exits Patch without saving changes to the file.
(File) Saves all changes made to the file and exits Patch. Note that
saving changes when the file is direct, indexed or keyed
must be done for each record with the (Save) key, before
selecting another record in the file.
Commands
(Save) Saves all changes made to the record or sector without exit-
ing Patch.
(Home) Position to the first byte of data on this screen. If you are
already positioned on the first byte, then (Home) displays the
first sector of the file or record and positions to the first byte
of that sector.
(End) Position to the last byte of data on this screen. If you are
already positioned on the last byte, then (End) displays the
last sector of the file and positions to the last byte of that
sector.
(Esc) Exits full-screen video mode and switches to command
mode. Pressing (Esc) while in command mode returns to the
full-screen video mode.
(PageDown) Displays the next sector of the file. The cursor does not
move. That is, if you were positioned to the third line, sec-
ond byte of the current sector, you will still be positioned to
the third line, second byte of the new sector.
(PageUp) Displays the previous sector of the file. The cursor does not
move.
(Transpose) Moves the cursor from the ASCII column to the hexadecimal
or column, or vice versa.
(Ctrl)(O)
(˜) Move the cursor in the direction of the arrow. The left and
(¤) right arrow keys move one byte; the up and down keys move
(˚) by one line or 16 bytes. If the arrow key moves you off of this
(˙) sector, the next or previous sector of the file or record is dis-
played. If there is no more file or record available in the
direction desired, the cursor moves to the last or first byte of
the file, as appropriate.
Table 12: Patch Video Mode Commands
Patch 435
Key Meaning
(Find) Allows you to jump to a new location in the file or disk. The
operation of this key depends upon the type of Patch opera-
tion being performed.
Direct, indexed and keyed files: You are asked for the record
key that you want to find.
Commands
Other files: You are asked for the relative location to jump
to (in hexadecimal).
436 Patch
Command The Patch command or NOVIDEO mode provides all of the functionality of
Mode the full-screen mode plus some other important capabilities that are not
easily implemented in a full-screen video mode. In command mode, Patch
displays the PATCH prompt ( / ) indicating that it is ready to accept a
command.
• Expressions
Commands
Most of the Patch commands require an address or data values to be speci-
fied. Although these addresses and data values are normally specified with
a numeric constant, they can be specified with an expression. In Patch, an
expression contains one or more of the following elements:
Numeric Constant
ASCII String Constant
Operator
Variable
Another expression enclosed within parentheses
• Numeric Constants
Patch 437
• Operators
Operator Meaning
Commands
• Variables
variable = expression
438 Patch
For instance:
/a=2000
0x00002000 (hex), 8192 (dec)
/b=a$+1000
0x00003000 (hex), 12288 (dec)
/
Patch When the Patch prompt is displayed the following commands may be used.
Commands
Commands Note that some of the commands have no meaning in certain situations.
For instance, when patching a stream file the KEY command is invalid.
Assemble Command
A address
A
/a 339d2
000339D2: 7470 jz 33a44
000339D4: 8D8551FFFFFF lea eax,(ebp-af)
000339DA: 50 push eax
000339DB: 90 nop
000339DC: 90 nop
000339DD: end
/
In the above example only the boldface text is entered. Patch supplied all of
the other information and assembled the instructions as indicated. To ter-
minate the entry of assembly language instructions, use the end pseudo-op
or merely enter a blank line.
Use one or more spaces to separate the assembly language opcodes from
the operand fields. Any valid Patch expression may be used in the operand.
Patch 439
Calculator
/?abcd
Commands
The calculator always displays the result in both hexadecimal and deci-
mal.
Checksum Command
The CHECK command computes the checksum for the entire file or for a
region specified.
check
check checksum
check address-range
check address-range checksum
/check
Checksum is F602
/check 1000 2000
Checksum is B75E
/check 1000 2000 abcd
Mismatch.
/
Code Command
Most programs have a code segment and a data segment. Initially, when
Patch starts, it assumes that addresses requested and displayed are in the
program’s code segment. This assumption can be changed with the Data
Command. The CODE command returns to the code segment.
Code
440 Patch
Compare Command
C address value-list
For instance:
Commands
/d 1000 100f
001000: E8C70B07 006A0368 FB0F0000 E8BCC707 'ºÍ...j.h....º.Í.'
/c 1000 e8 c7 b
Match.
/c 1000 e8 c7 c
Mismatch.
/
Data Command
Most programs have a code segment and a data segment. Initially, when
Patch starts, it assumes that addresses requested and displayed are in the
program’s code segment. This assumption can be changed with the DATA
command. The Code Command returns to the code segment.
Data
To view or make any changes to the data portion of a program, you must
use the video display mode.
Delete Command
This command is valid only when the file is a direct, indexed or keyed data
file. It deletes the current record from the file.
De
Only the current record is deleted from the file. To get the current record
use the Key Command.
Patch 441
Display Command
D address
D address-range
D
This command displays one or more lines of 16 bytes each, starting with
Commands
/d 2000 200f
002000: 055B3BD8 7E0C8B45 F4488945 F8E95700 '.[;«~..E.H.E.¾W.'
/d 2000
002000: 055B3BD8 7E0C8B45 F4488945 F8E95700 '.[;«~..E.H.E.¾W.'
002010: 0000FF35 3C51FFFF 8B45F448 8D048500 '...5<Q...E.H....'
002020: 0000005B 8B04180F B6400450 8B45080F '...[....Ë@.P.E..'
002030: B640055B 3BD87D09 8B45F440 8945FCEB 'Ë@.[;«}[email protected].ß'
002040: 288B4508 4050FF35 3C51FFFF 8B45F448 '([email protected]<Q...E.H'
002050: 8D048500 0000005B 8B04188B 40055B89 '.......[....@.[.'
002060: 038B45F4 E91F0000 00EB1683 7DF0007E '..E.¾....ß..}..~'
002070: 098B45F4 488945F8 EB078B45 F4408945 '..E.H.E.ß[email protected]'
002080: FCE9CCFE FFFF33C0 8BE55DC2 0400B804 '.¾Ï...3ƒ.•]‚..=.'
002090: 000000E8 34FB0600 8B450C8B 00FF308B '...º4....E....0.'
0020A0: 45088B00 FF308B45 0C8B000F B6400450 'E....0.E....Ë@.P'
0020B0: 8B45088B 000FB640 045B3BD8 7D0B8B45 '.E....Ë@.[;«}..E'
0020C0: 0C8B000F B64004EB 098B4508 8B000FB6 '....Ë@.ß..E....Ë'
0020D0: 400450E8 538A0700 8945FC85 C074088B '@.PºS....E..ƒt..'
0020E0: 45FCE93A 0000008B 450C8B00 0FB64004 'E.¾:....E....Ë@.'
0020F0: 508B4508 8B000FB6 40045B93 2BC38945 'P.E....Ë@.[.+‡.E'
/
End Command
The E command saves the changes that have been made and exits Patch.
Note that when direct, indexed and keyed data files are being patched, the
Put Command must be used to save the changes made to a record.
442 Patch
Fill Command
F address-range value
Unlike the Set Command which can set a series of locations with a string of
data, the F command sets the series of locations to a single value.
Commands
/d 2000 200f
002000: 055B3BD8 7E0C8B45 F4488945 F8E95700 '.[;«~..E.H.E.¾W.'
/f 2000 2008 0
/d 2000 200f
002000: 00000000 00000000 F4488945 F8E95700 '.........H.E.¾W.'
/
Get Command
The G command reads and displays one sector of the disk. This command
is only valid in Mode 2 of Patch (patching disk sectors).
G sector
G
If sector is omitted, the next sector of the disk is read and displayed.
Help Command
The H command displays a brief summary of all of the commands and the
expression operators and elements.
H
(F1)
Key Command
The K command reads a record of a direct, indexed or keyed file. This com-
mand is valid only when patching those types of files.
K key
K
The key must match in type with the type of file. That is, for direct files the
key must be a record number, but for indexed and keyed files the key must
be an alphanumeric string. Indexed and keyed file keys may not contain
the space character.
Patch 443
Length Command
The LEN command displays the length of the file (stream files), the length
of the file and allocated record size (direct, indexed and keyed files), or the
length and type of program (program files). For program files it also allows
you to change the size of the heap and stack space used by the program.
Len
Commands
For instance:
>patch sample.command
/len
Length = 92,824
Code = 0x00012834
Data = 0x00004098
Stack = 0x00002000
Heap = 0x0000C350
Entry = 0x00000140
Type = 32 bit Program
/len stack 3000
/len heap d000
A change to the heap or stack space is only saved when the End Command
is used.
444 Patch
Move Command
The M command copies data from one location in the file, record or sector
to another location.
Commands
length must be within the bounds of the current file or record. This restric-
tion does not apply when patching disk sectors.
This move operation is done as a byte-by-byte copy, not a copy and paste.
Therefore, when the source and destination address ranges overlap, the
result may be undesirable.
The following example wants to copy the first 32 characters of the file to
location 0x10. The first attempt fails because the address ranges overlap.
/d 0 30
000000: 54686973 20697320 6A757374 20612074 'This is just a t'
000010: 65737420 66696C65 20746F20 62652075 'est file to be u'
000020: 73656420 62792074 68652050 41544348 'sed by the PATCH'
000030: 20636F6D 6D616E64 2E0D0D54 68697320 ' command...This '
/m 0 10 20
/d 0 30
000000: 54686973 20697320 6A757374 20612074 'This is just a t'
000010: 54686973 20697320 6A757374 20612074 'This is just a t'
000020: 54686973 20697320 6A757374 20612074 'This is just a t'
000030: 20636F6D 6D616E64 2E0D0D54 68697320 ' command...This '
/
To perform this type of operation properly the move must be done in two
stages. First the overlapped region must be copied and then the remaining
region is copied. If a larger region were copied, there might be several
stages to avoid specifying an overlapped region.
/d 0 30
000000: 54686973 20697320 6A757374 20612074 'This is just a t'
000010: 65737420 66696C65 20746F20 62652075 'est file to be u'
000020: 73656420 62792074 68652050 41544348 'sed by the PATCH'
000030: 20636F6D 6D616E64 2E0D0D54 68697320 ' command...This '
/m 10 20 10
/m 0 10 10
/d 0 30
000000: 54686973 20697320 6A757374 20612074 'This is just a t'
000010: 54686973 20697320 6A757374 20612074 'This is just a t'
000020: 65737420 66696C65 20746F20 62652075 'est file to be u'
000030: 20636F6D 6D616E64 2E0D0D54 68697320 ' command...This '
/
Patch 445
This operation of the M command is not entirely undesirable because it can
be advantageous to repetitively duplicate a region of the file or sector.
/d 0 30
000000: 54686973 20697320 6A757374 20612074 'This is just a t'
000010: 65737420 66696C65 20746F20 62652075 'est file to be u'
000020: 73656420 62792074 68652050 41544348 'sed by the PATCH'
000030: 20636F6D 6D616E64 2E0D0D54 68697320 ' command...This '
/m 0 5 45t
Commands
/d 0 30
000000: 54686973 20546869 73205468 69732054 'This This This T'
000010: 68697320 54686973 20546869 73205468 'his This This Th'
000020: 69732054 68697320 54686973 20546869 'is This This Thi'
000030: 73206F6D 6D616E64 2E0D0D54 68697320 's ommand...This '
The PL command displays and sets the current patch level for a program
file.
PL patch-level
PL
/pl
Old patch level:
New patch level: 40001
/pl 40002
Old patch level: 40001
/
A program’s patch level can also be set or changed with the Change com-
mand described on page 65 and it can be viewed with the FileList command
described on page 229.
446 Patch
Put Command
The P command is the complement of the Get Command and Key Command.
P writes a record or sector back to disk.
P key
P sector
P
Commands
Use the P key when you are patching a direct, indexed or keyed file and
you want to write the current record to the file with a different key. The
key must match the file organization. That is, key must be numeric for
direct files and alphanumeric for indexed and keyed files.
Use the P sector when you are patching disk sectors and you want to write
the current sector to a different location on the disk.
To merely write the current record or sector back to the file or disk in the
same place that it was read, use the P command with no argument.
Quit Command
The Q command exits the Patch command without updating the file or
disk. Any unsaved changes are lost.
Use the End Command or Put Command to save changes before quitting.
Replace Command
R address value-list
Patch 447
Search Command
S address value-list
The file, record or sector is searched, starting at location address, for the
next occurrence of the sequence of values indicated by value-list. The
Commands
If a match is found, its location is displayed and you are asked if you want
to search for the next occurrence. Any response other than (Y) is treated as
(N).
/s 0 'This'
Match at 0x00000000, again? y
Match at 0x0000003B, again? y
/
Set Command
S address
/s 2000
0x00002000: 0F (.)
At this time you may enter a new value, terminate the S command or
advance to the next or prior locations. Entry of (ÌÌSpaceÌÌ), (¤) or (˙) is inter-
preted as a request to advance to the next address. Entry of (˚) backs up to
the prior address.
448 Patch
/s 2000(EnterÌ˛)
0x00002000: 0F (.) 0(ÌÌSpaceÌÌ)
0x00002001: 8B (.) 23(ÌÌSpaceÌÌ)
0x00002002: 5D (]) 14(ÌÌSpaceÌÌ)
0x00002003: 14 (.) 253t-48t(ÌÌSpaceÌÌ)
0x00002004: 81 (.) 0(ÌÌSpaceÌÌ)
0x00002005: FB (.) 'This is a test'(ÌÌSpaceÌÌ)
0x00002013: 95 (.) 0(EnterÌ˛)
/d 2000 2013
Commands
002000: 002314CD 00546869 73206973 20612074 '.#.Ì.This is a t'
002010: 65737400 C083E001 741EA180 C0FFFFF6 'est.ƒ.™.t.¿.ƒ...'
/
Use Command
The USE command tells Patch to use either 16-bit or 32-bit instructions
when using the Assemble Command.
Use 16
Use 32
This command will only be necessary when you are patching disk sectors
(Mode 2). When patching a program file, Patch will know whether the pro-
gram is a 16-bit program or a 32-bit program.
Entry of (Esc) switches Patch from the command mode to the full-screen
video mode or vice versa.
Patching Files How Patch operates depends upon the type of file being patched.
Patching a stream file or using the BINARY option causes Patch to start in
its video display mode. The entire file may be viewed or modified because
all addresses are valid from zero through the length of the file.
You must use the End Command (in command mode) or the (File) or (Save)
commands (in video display mode) to save any changes made to a stream
file.
Patching a direct, indexed or keyed file starts Patch in the video display
mode. You may only view and change one record at a time. The key to a
record cannot be changed except by using the Put Command to write the
record with a different key and the Delete Command to delete the old record
(perform a DE first and then a P with the new key).
Patch 449
Changes made to a record must be saved with the Put Command (in com-
mand mode) or the (Save) command (in video display mode).
• Program Files
Patching a program file causes Patch to start in command mode with the
CODE segment selected.
Commands
You must use the End Command (in command mode) or the (File) or (Save)
commands (in video display mode) to save any changes made to a program
file.
Patching When Mode 2 of Patch is used you can view and change one sector at a time.
Sectors Patch starts out in video display mode. After specifying the first sector
number you may get the next sector of the disk with either the Get Com-
mand (in command mode) or the (PageDown) commands (in video display
mode). In video display mode you may get the prior sector with the (PageUp)
command.
You must use the End Command (in command mode) or the (File) or (Save)
commands (in video display mode) to save any changes made to a sector
before getting a different sector.
450 Patch
Peek Command
The Peek command allows you to see what is displayed on another user’s console.
1 PEEK name
Commands
2 PEEK process
Operation Mode 1—The first user that is logged onto name (other than yourself) is
peeked at.
Notes When you first peek at another user’s console, the current text displayed
on that console is displayed on your console. After this initial display, all
characters that are displayed on that user’s console are also displayed on
your console.
You should always inform the user before peeking at their console. In some
countries it may be illegal to peek at a user’s console without their permis-
sion.
Peek is a good tool to use when training a user on how to use some piece of
software or for technical support when the support person is not near the
user needing assistance. Multiple users can peek at the same console
which is often used in a training class.
Peek 451
Commands
452 Peek
Ping Client
The Ping client allows you to broadcast a “Are you there?” or a “Who’s there?” query to a spe-
cific node or to all nodes on the local intranet.
1 PING
Commands
2 PING address... ( options
3 PING *
4 PING * *
Operation Mode 1—Invokes the interactive or windowed display mode of this com-
mand. This provides the most information about the queried node.
Entry is allowed for the “Host” field only. Enter the dotted IP address for a
node or its name as defined in the host names database. Host names are
defined in the /THEOS/CONFIG/HOSTS.TXT:S file. The “Host Name” and “Host
Id” fields display the name and matching IP address for the specified host.
In this mode, queries are repeatedly sent to the specified node until the
operator terminates the operation with entry of any key, by using the
mouse and selecting the “Stop” button, or when the node fails to respond.
(The “Start” button changes to “Stop” after a host is specified.)
Ping 453
Mode 2—With this form, Ping queries the network one time for a response
from the specified host. The host is a dotted IP address or its name as
defined in the host names database.
>ping accounting
>ping 192.168.87.15
Mode 3—The network is queried for responses from all nodes connected to
the local intranet. This is the same operation performed by the Ping com-
mand.
>ping *
Name Address
Accounting 192.168.87.12
Executive 192.168.87.15
Admin 192.168.87.63
Mode 4—Similar to Mode 3, the network is queried for responses from all
nodes connected to the local intranet. This mode differs in that the net-
work is continuously queried until the operator terminates the program by
pressing (Esc) or (F9). This is the same operation performed by the Net
PingAll command.
Return Code A return code (RC) of zero indicates a successful ping response. An RC of 1
indicates no ping response. An RC of 2 indicates that the address could not
be resolved.
454 Ping
Play Command
The Play command plays WAV files through the system’s sound card.
1 PLAY file
Commands
2 PLAY wildcard-file
3 PLAY
4 PLAY STOP
file » file name with optional path; may contain wild cards
wildcard-file » file name using wildcard specifications with optional path
Operation Mode 1—Play the sound file through the system’s sound card.
Mode 2—If there are any files matching the wildcard-file specification, a
menu of those matching files is displayed. (When no files match the speci-
fication the Play command merely exits.)
>play c*
It is not necessary to specify the file-type unless you want to play wav-
format sound files with a file-type other than WAV.
Play 455
Using the menu, position to the desired sound file and press (EnterÌ˛) to
play the sound. Once Play has initiated playing the sound file it returns to
the menu with the next item highlighted. Only one sound file can play at a
time, therefore requesting a new sound file when a sound is already play-
ing causes the currently playing sound to be stopped and the new sound
started.
>play *.wav
Notes Sound files with a file-type of WAV can also be played by merely entering
the file name at the command prompt:
>play mysound.wav
>play mysound
>mysound.wav
Each of the above commands play the file MYSOUND.WAV through the sys-
tem’s configured sound card. It does this because the /THEOS/CONFIG/
TYPES.CFG:S file defines the open action for a WAV file to use the Play com-
mand to open the file.
Defaults Unless file or wildcard-file explicitly specify a file-type, the file-type used
is always WAV.
Restrictions This command can only play sounds when executed from the main console
or from a TWS connection. When executed from the main console you must
have a sound card configured on the THEOS system. Refer to the Setup
SndCard command. (See THEOS Corona Version 5 Operating System
Installation and Setup Guide.)
456 Play
POP3Test Command
The POP3Test command tests an e-mail account on the email server (POP3 server).
Commands
2 POP3TEST account@host
3 POP3TEST account
Operation Mode 1—The POP3 server at host is contacted and queried about account
mail status. The password is given to the server for validation. The status
returned from the server is displayed on the console.
This mode also updates the POP3Test configuration file with this account,
host and password information. This configuration information is needed
to use Mode 2 or Mode 3.
Mode 2—The POP3Test configuration file is searched and the entry for
account and host is used to contact the POP3 server for this account with
the password read from the configuration file entry.
Mode 3—The POP3Test configuration file is searched and the first entry
matching account is used to contact the POP3 server for this account with
the password read from the configuration file entry. This mode should only
be used if account is unique in the configuration file.
Notes Account names are case-sensitive on some servers. Passwords are case-
sensitive on most servers. To ensure that the account and password that
you provide is the same as the ones given to the host, enclose each of the
arguments in quotation marks.
POP3Test 457
No text is displayed on the console when this command is executed from
an EXEC program or a MultiUser BASIC language program using the
SYSTEM or CSI statement or a C language program using the system()
function.
Return Codes Because this program is frequently invoked from within a program the
return code is set to the number of messages read or an error code. A zero
or positive return code indicates the number of messages waiting for
Commands
RC Error
-1 Invalid command-line arguments
-2 Missing host name
-3 Missing password
-4 Cannot create POP3Test configuration file
-5 Connect failure
-6 Account or password rejected by host
-7 Remote host disconnected with no reply
-8 Cannot resolve host name
-9 Socket error
Restrictions You must have the network started and a Dial-up Networking profile
defined or you an always-on connection to your network.
458 POP3Test
Printer Command
The Printer command is a complement to the CRT command. It tests the printer’s display
capabilities with the attached class code for the printer.
1 PRINTER
Commands
2 PRINTER PRTnn
Use the normal menu selection keys to select the desired tests. These keys
are described in “Using Menus” on page 77.
Options PRTnn Indicates that Printer is to test the attached printer number nn.
When this option is not used the first attached printer is
tested.
Printer 459
Tests: • Test Attributes
460 Printer
• Ripple Pattern
Displays a “ripple pattern” using the entire ASCII character set. This test
can be used to check for dropped characters or improper column align-
ment.
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
Commands
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdef
"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgh
• Column Registration
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
!"#$%&'()*+,-./0123456789:;<=>?ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde
• Line Registration
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""
#####################################################################
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Printer 461
• Line Graphics
à = LI  = UI ´ = RI Á = DI
Commands
• National Characters
Notes The exact appearance of these tests depends upon the capabilities of your
printer and the class code definition.
462 Printer
PutFile Command
The PutFile command copies a file from this system to a DOS-formatted hard disk partition
or diskette.
Commands
2 PUTFILE drive ( CLEAR
This command’s function has been replaced with the DOSDiskA and DOS-
DiskC attachment capability. For information about this capability refer
to the “Attaching DOSDiskA Floppy Disk Drives” on page 32.
Operation Mode 1—Copies the file from this system to a DOS formatted disk.
The DOS-file specification may be just the drive code for the DOS disk.
This is equivalent to specifying =.=:drive. The destination name is the
same as the source file name. Do not use this syntax when the THEOS file
name is not a valid DOS file description. That is, do not copy library mem-
bers or files whose file type is longer than three characters.
PutFile 463
Mode 2—Clears the directory on the DOS formatted diskette.
>putfile f (clear
Enter disk label: DosXfer
Use this mode only when drive is a diskette drive. It is not designed to
clear hard disks or removable hard disks.
Options
Commands
BINARY Tells PutFile that file may contain binary information and it is
not to translate CR to CRLF. Whenever in doubt as to the con-
tent of the file, use this option.
EOF Appends a ^Z to the end of the file. This is the standard DOS
end-of-file mark character.
HIDDEN Sets the “hidden” file attribute on the DOS disk for the files
transferred.
NOQUERY Tells PutFile to not ask for confirmation before copying each
file. This is a default option when wild cards are not used.
QUERY Tells PutFile to “query” or ask if each file matching the file spec-
ifications is to be copied. This is a default option when wild
cards are used.
>putfile readme/*.txt:s f
Ok to copy "/README/LANMAN.TXT:S" (Yes,No,All)
RDONLY Sets the “read only” file attribute on the DOS disk for the files
transferred.
464 PutFile
SUBDIR If the path specified in DOS-file does not exist on the DOS
disk, this option tells PutFile to create the subdirectories that
are missing.
SYSTEM Sets the “system” file attribute on the DOS disk for the files
transferred.
Notes Unless the BINARY option is used, the THEOS end-of-record mark (CR) is
Commands
translated to the DOS end-of-record mark (CRLF).
DOS Partitions The disk drive specified by DOS-file or drive may be an attached remov-
and Disks able disk such as a floppy or removable hard disk, or it may be a partition
on an attached hard disk drive. This disk or partition may be a DOS-for-
matted partition (16-bit FAT) or a Windows 95 disk or partition (32-bit
FAT).
Windows NTFS (NT File System) disks and partitions cannot be accessed
with this command. Disks using Windows NT FAT can be used with this
command.
Cautions THEOS direct, indexed and keyed files should not be transferred with this
command. These file organizations are not usable by the DOS operating
system. To transfer one of these types of files, first translate it into a
normal stream file with the FileType and then copy the resulting file.
The DOS-file must be a valid DOS file description. DOS files have eight
character file names and zero to three character file extensions.
When a path is specified for the DOS-file, the path must already exist on
the DOS disk. The path will only be created if the SUBDIR option is used.
PutFile 465
Commands
466 PutFile
PWD Command
PWD
Commands
Operation The current working directory is displayed on the standard output device.
>pwd
/LETTERS/PERSONAL:S
>show subdir
SUBDIR = /LETTERS/PERSONAL:S
PWD 467
Commands
468 PWD
Quote Client
The Quote client queries a quote server for the next random quotation.
1 QUOTE
Commands
2 QUOTE server
localhost » LOCALHOST
server » network server name or id (may also be localhost)
>quote
The difference between the right word and the almost
right word is the difference between lightning and
a lightning bug.
--Mark Twain
The quote server on this system must be started. The quote server is part
of the TCP Simple Services.
Mode 2—Accesses server and uses its quote server to display a random
quotation from server’s database. server may be specified with:
Restrictions The TCP Simple Services on this system must be enabled and started on
this system to use Mode 1. The Quote server on the remote host must be
enabled and started to use Mode 2.
Quote 469
Examples >quote
Life is so unlike theory.
--Anthony Trollope
>quote
Time is that quality of nature which keeps events
from happening all at once. Lately it doesn’t seem to
be working.
Commands
--Anonymous
470 Quote
Reboot Command
The Reboot command shuts down and then reboots the computer.
1 REBOOT
Commands
2 REBOOT ( option
Operation Mode 1—In this mode, you are presented with the reboot menu and
allowed to select how you want the system rebooted:
Shut down. This selection shuts the computer down by stopping all serv-
ers and users and, if possible, turns the power off. The Shutdown Status is
displayed during this process. This is the same as using the SHUTDOWN
option with Mode 2.
Reboot 471
Restart in THEOS Corona. The default selection. The system is shutdown
by stopping all servers and users and then rebooting the system. A normal
system restart is performed just as if you had pressed the system’s reset
button. This is the same as using the REBOOT, RESET or THEOS option
with Mode 2.
When used with a NetTerm connection to a remote system, you are warned
with the message “You are about to reboot a remote system.”
Options DOS This and the WINDOWS option will boot the DOS or Windows
primary disk partition without displaying the Reboot Menu.
This option is only valid if there is a DOS/Windows primary
partition on the disk drive. If the TYPE option is also specified,
the Reboot Menu is displayed with the “Restart in Windows 98/
ME/2000” item preselected.
LINUX Boots the Linux primary disk partition without displaying the
Reboot Menu. This option is only valid if there is a Linux pri-
mary partition on the disk drive. If the TYPE option is also
specified, the Reboot Menu is displayed with the “Restart in
Linux” item preselected.
NOQUERY Do not display the Reboot Menu. This is a default option when
the Reboot command is invoked from within an EXEC pro-
gram.
QUERY Display the Reboot Menu . This is a default option unless the
Reboot command is invoked from within an EXEC program.
472 Reboot
REBOOT This option, the RESET and the THEOS option reboot the
THEOS Corona primary disk partition without displaying the
Reboot Menu. This is the default option unless DOS, LINUX,
SHUTDOWN, SINGLE or WINDOWS option is used. If the TYPE
option is also specified, the Reboot Menu is displayed with the
“Restart in THEOS Corona” item preselected.
Commands
SHUTDOWN Shuts down the system without displaying the Reboot Menu.
After shutting down the system, this option specifies that the
system is not automatically restarted. If APM (Advanced
Power Manager) is available, the system is powered off. If
APM is not available, a message displays informing you that it
is okay to turn off the system. If the TYPE option is also speci-
fied, the Reboot Menu is displayed with the “Shut down” item
preselected.
SINGLE Reboot the THEOS Corona primary disk partition without dis-
playing the Reboot Menu. Normal shutdown occurs and a flag
in the hard disk’s MBR (Master Boot Record) is set causing the
THEOS Multibooter to automatically boot THEOS Corona in
single-user mode. If the TYPE option is also specified, the
Reboot Menu is displayed with the “Restart in single user” item
preselected.
THEOS This option, the REBOOT and the RESET option reboot the
THEOS Corona primary disk partition without displaying the
Reboot Menu. This is the default option unless DOS, LINUX,
SHUTDOWN, SINGLE or WINDOWS option is used. If the TYPE
option is also specified, the Reboot Menu is displayed with the
“Restart in THEOS Corona” item preselected.
UPDATE Reboot the THEOS Corona primary disk partition without dis-
playing the Reboot Menu. Normal shutdown occurs and a flag
in the hard disk’s MBR (Master Boot Record) is set causing the
THEOS Multibooter to automatically boot THEOS Corona
using the special, pseudo-account SYSUPDAT. Similar to the
SINGLE option, the system is booted in single-user mode.
WINDOWS This and the DOS option will boot the DOS or Windows pri-
mary disk partition without displaying the Reboot Menu. This
option is only valid if there is a DOS/Windows primary parti-
tion on the disk drive. If the TYPE option is also specified, the
Reboot 473
Reboot Menu is displayed with the “Restart in Windows 98/ME/
2000” item preselected.
Cautions This is an extremely dangerous command because other users are termi-
nated without notice. If another user is in the process of updating one or
more files, those files will be inaccurate because the update was not com-
pleted.
474 Reboot
Reboot Menu If the computer has multiple operating systems installed on it, the reboot
menu that is displayed will have additional options than those displayed
on page 471. For instance, a system with both THEOS Corona installed
and Microsoft Windows installed will display the following reboot menu:
Commands
A system with THEOS Corona, THEOS 4.2 and Microsoft Windows
installed on it will display the following reboot menu:
Reboot 475
Shutdown For all reboot options including SHUTDOWN, the Reboot command must
Status first shutdown the operating system. It also saves the main console session
sizes and positions. It can display this shutdown process.
Commands
Users are stopped by issuing a Break,Q request to the user and forcing an
Exit. It is possible that a server or user is busy or “hung” and cannot be
stopped with this process. If this should occur, the “End Task” button can
be pressed to terminate the server or user. The “Restart” button can be
used to shut the system down without going through the process of stop-
ping each server and task.
476 Reboot
Receive Command EXEC
The Receive command is an EXEC language program giving you convenient, command-line
access to the THEO+COM command’s file receive capability.
Commands
file » file name with optional path
options » ASCII TRACE XMODEM XMODEM-1K
COMnn TRACEFILE fn XMODEM-CRC YMODEM
THEOS
Operation Invokes the THEO+COM command in RECEIVE mode. The first attached
COM device is used unless the COMnn option is specified. If no protocol
option is specified, THEOS protocol is used.
>receive updated.stocklst
Receive
Protocol..... THEOS
File name.... UPDATED.STOCKLST:S
File size.... 1,235
Blocks....... 5
Transmitted.. 0%
Byte count... 0
Block count.. 0
File count... 1
Elapsed time. 0:02
Errors....... 0
Message...... Waiting for sender
Progress.....
Receive 477
Options ASCII Use the ASCII file transfer protocol. Essentially, this is no pro-
tocol and should be used only for short text files.
protocol.
TRACEFILE fn Similar to the TRACE option except that the protocol activ-
ity is output to the file fn.
Notes Refer to the THEO+COM Installation and User’s Guide manual for a full
description of the operation of file transfers and the protocols used.
Defaults The first attached COM device is used by default and the THEOS protocol
is the default.
478 Receive
Reminder Command
This command maintains reminder messages that can be displayed when a user logs on to
an account.
REMINDER
Commands
The /SYSTEM.REMINDER and the account.REMINDER files are files accessed when you log onto
an account. These are keyed access files with a calendar date for the key. When you log onto
an account, these files are searched for a record with today’s date. If they are found, the
message text for the date is displayed. Those message records are maintained by this com-
mand.
Operation A search is made for account.REMINDER file where account is the name of
the account that you are currently logged onto. If the file is not found, then
it is created.
>reminder
You may enter a specific date such as 07/04/02, or a “generic date” such as
07/04 without the year. A specific date means that the message appears on
that date only; a generic date means that the message appears every year
on that month and day. See “Notes” on the next page for additional infor-
mation about entering dates.
When a message already exists for the date entered, the message text is
displayed and you can change it. Otherwise, you can enter the new mes-
sage for the date.
>reminder
The message text may be as long as 256 characters, but it cannot contain
any new-line characters or carriage returns. Entry of (EnterÌ˛) terminates
the message text.
Reminder 479
To delete an existing message, replace or add the word “DELETE” to the
beginning of the message text. When the first six characters of a message
are “delete” (uppercase or lowercase), the message is deleted from the file.
To exit from the Reminder command, respond with (EnterÌ˛), (Esc) or (F9) for
the date.
Notes If you are logged onto an account with account number of 0 the
Commands
The delimiters between the date elements are optional and can be any
non-numeric character.
When you log onto a private account a maximum of four reminder mes-
sages may be displayed.
2. The next messaged that might be displayed is the generic date for
today in the /SYSTEM.REMINDER file.
3. Then today’s complete data is searched for in the account.REMINDER
file.
4. The last message that might be displayed will be the generic date
for today in the account.REMINDER file.
For instance:
>logon myaccount
480 Reminder
This message is the myaccount message for any July 4th.
>
Commands
Reminder 481
Commands
482 Reminder
Remote Command
Commands
2 REMOTE REP://acct@server command ( option
Mode 3, Mode 4, Mode 5 and Mode 6 are only valid when invoked from a
TWS console.
Remote 483
If the temporary file is changed, upon exiting the windows-command, the
temporary file is transferred back to the Corona system and replaces the
original version of the Corona-file-desc.
If the temporary file is changed, upon exiting the program the temporary
file is transferred back to the Corona system and replaces the original ver-
sion of the Corona-file-desc.
Options MAXIMIZE When used with Mode 3, Mode 4, Mode 5 or Mode 6, this option
instructs the window’s application to open in a maximized win-
dow.
MINIMIZE When used with Mode 3, Mode 4, Mode 5 or Mode 6, this option
instructs the window’s application to open in a minimized win-
dow.
NOWAIT This option tells the REMOTE command to not wait for the
completion of the execution of the remote command. Also,
when used with Mode 3 or Mode 5, the file is not transferred
back to the Corona system even when the file is changed on the
remote system.
484 Remote
Notes When Corona-file-desc is used (Mode 3 and Mode 5) you must specify the
drive code for the file. It is the colon and drive code at the end of the file
description that identifies it as Corona file description instead of a Win-
dows file description.
The options on this REMOTE command line are not passed as options to the
command or Windows-command. The command may have options speci-
fied but to do so you must enclose the desired command name and its
Commands
options within quotes. For instance:
Restrictions For Mode 1 and Mode 2, the server machine specified by server must, of
course, be accessible from this machine and it must have an ExecNet
server operating on it.
Also for Mode 1 and Mode 2, the command executed must not require a con-
sole keyboard or display. You may, however, invoke commands that use
the printer or other public device:
Mode 3, Mode 4, Mode 5 and Mode 6 are only valid when invoked from a
TWS console.
Remote 485
Commands
486 Remote
Rename Command
Commands
2 RENAME file ( FILES options
3 RENAME ( options
The from-file and to-file may contain wild-card specifications. See “Wild
Card Specifications” on page 138. They may also contain complete or par-
tial path specifications as long as the referenced file or directory is one
that you have access to that location.
Mode 2—file is an ASCII stream file containing two file descriptions per
line. The first file description in the line is treated as a from-file and the
second file description is the to-file. For each line in file, a Mode 1 Rename
is performed.
This mode of the Rename command is convenient when one or more sets of
files are repetitively renamed. Merely edit a file containing file description
pairs, such as:
>edit daily.files
customer.master:s /prior/customer.master:s
customer.history:s /prior/customer.history:s
general.ledger.*:s /prior/=.=.=:s
check.*:s /prior/=.=
Rename 487
Mode 3—This is the interactive mode of the Rename command. Since no
files are specified on the command line you are prompted to enter the file
descriptions to rename.
>rename (noquery
Enter file name list, terminate with empty line.
?MENU.BASIC
Destination file name missing.
?MENU.BASIC PROGRAM.BASIC.=
Commands
Options NOQUERY Indicates that you do not want to be asked for confirmation
before renaming each file. This is a default option when wild
cards are not used.
NOTYPE Tells Rename to not display the results of each file renamed on
the standard output device. The general result message (the
“nn files renamed.” message displayed before exiting Rename)
is also suppressed with this option.
QUERY Tells Rename to “query” or ask if each file matching the file
specifications is to be renamed. This is a default option when
wild cards are used.
488 Rename
To disable this option use the NOQUERY option.
TYPE A default option that tells Rename to display the results of each
file erased on the standard output device. This display can be
redirected.
Commands
"PROGRAM.SOURCE.LEDGER:S" renamed "LEDGER.BASIC:S".
"PROGRAM.SOURCE.MENU:S" renamed "MENU.BASIC:S".
"PROGRAM.SOURCE.REPORTS:S" renamed "REPORTS.BASIC:S".
4 files renamed.
Restrictions You cannot rename a file that is erase, read or write protected.
You cannot rename a file to another drive. Use CopyFile or move Move for
that.
This command renames the file HIS.FILE owned by the account named PRI-
VATE to your account, current working directory, with the name MY.FILE.
When the destination file specification includes a path, that path must
exist. Rename does not create subdirectories.
Rename 489
Commands
490 Rename
Repeat Command EXEC
Commands
command-line » any valid THEOS command
count » number of times to execute command-line
Operation This EXEC program merely repeats the execution of some command one or
more times.
Repeat # 1 of 3
Repeat # 2 of 3
Repeat # 3 of 3
>
Repeat 491
Commands
492 Repeat
Replace Command Filter
The Replace command modifies text files by changing (replacing) existing text strings with a
new text strings.
Commands
2 REPLACE ( option ... from-text to-text ...
Operation Mode 1—The text file is opened and read. Every occurrence of the charac-
ter sequence from-text is replaced with the character sequence to-text. If
there are multiple from-text to-text pairs, then each occurrence of each of
the from-text strings in the file is replaced with the corresponding to-text.
The result is saved using the original file name. No backup copy of the
original file is kept.
Mode 2—Similar to Mode 1 except the source and destination files are
stdin and stdout respectively.
The above command uses the NOCASE option. If you had entered the com-
mand:
it will report a syntax error because the “nocase” token and the “new text”
token are interpreted as from-text arguments but there is no matching to-
text argument for the “new text” token.
NOCASE Indicates that the case mode of the from-text item and the text
in the file should be ignored when looking for matches. The
case of the to-text item is used when text is replaced.
Replace 493
NODATA Indicates that, when a from-text item is replaced in the file, if
the result is a blank line then the line should be deleted from
the file.
Notes The to-text argument may be a null or empty string. To specify an empty
string use a pair of quotation marks with no characters between them.
The return code is set to the total number of instances that from-text was
Commands
Restrictions Because the from-text and to-text are specified with ASCII text strings, the
file should be an ASCII text file. For instance, a MultiUser BASIC source
program file can be used if it was saved with the SAVEA or SAVEU com-
mands.
494 Replace
Restore Command
The Restore command retrieves the “archive copy” of a file, set of files or an entire disk vol-
ume. This command is the complement of the TArchive command.
Commands
2 RESTORE file to-drive ( options
The Restore command only restores files from an archive volume created with the TArchive
command or the Archive command from a THEOS 4.x system. The archive volume contains
special, compressed copies of files. See “TArchive” on page 601.
The TArchive and Restore commands have been replaced with the TBackup command.
Restore 495
Operation Mode 1—Restores all of the files from the archive volume in from-drive to
the disk in to-drive.
>restore tape s
Mode 2—Restores file from the archive volume to the to-drive in the cur-
rent account. Unless one or more options are used to indicate otherwise,
the file in the archive volume must be owned by the current account name.
Commands
>logon private
>logon develop
Source is Disk F
Destination is Disk S
Mount volumes now:
Mode 3—Displays a file listing of the files in the archive volume in from-
drive.
>restore f (show
Filename Filetype Member Dr Date Time Org Protect Size Recl Keyl
496 Restore
>restore f
Filename Filetype Member Dr Date Time Org Protect Size Recl Keyl
Commands
FILE4 12/01/87 05:00 S ..W..... 9895
This mode does not compare the archive volume to its original source disk.
Options ACCOUNT Tells Restore to only restore those files from the archive volume
that are owned by one account. This is a default option when
Mode 2 is used.
ALL Restores files from the archive volume even if the file already
exists on the to-drive and even if the file has erase protection
set. Also see the options NEWFILE, OLDFILE and REPLACE.
Restore 497
ASK This is a default option that instructs Restore to ask the opera-
tor to mount the source and destination volumes and waits for
confirmation that the proper volumes are mounted.
>restore tape s
Source is TAPE1
Destination is Disk S
Mount volumes now:
Commands
CLEAR Tells Restore that, before restoring the first file, the directory of
to-drive is to be cleared. A current directory size is used unless
the SIZE option is also specified.
DRIVE d Used with a multiple disk archive volume to specify that you
want to restore only those files that were archived from drive
d. d may be specified as a drive code or a volume name.
498 Restore
FROM account Tells Restore to only select those files on the archive vol-
ume that were owned by account name account at the time the
archive was created.
LABEL label Tells Restore that the multiple disk/tape archive volume uses
disk/tape labels of label, with each disk/tape of the set incre-
Commands
menting the last character of label. For instance, disk one is
labeled “Mon-1,” disk two is labeled “Mon-2” and so on.
Using this option tells Restore to not restrict the restore to sin-
gle-user operation (the message is still displayed). THIS CAN
BE EXTREMELY DANGEROUS! If another user changes
some files while the restore is being done, the integrity of the
files restored may be lost. Use this option only if you are sure
that all other users are inactive.
NAME name Specifies the name of the archive volume set. When the file-
type is not specified in name the default file-type of ARCHIVE is
used.
When this option is not used the name of the archive volume
must be ARCHIVE.VOLUME01.
NOQUERY An option that tells Restore to not ask for confirmation on each
file being restored. In addition, this option suppresses the
query when a file exists and the REPLACE option is not speci-
fied, as well as the query when a file exists, is protected and
the ALL option is not specified.
Restore 499
With NOQUERY in effect the following questions are never
asked:
OLDER Only restore files if the file does not exist on the destination or
if the existing file on the destination is older than the archived
file.
500 Restore
REPLACE This option tells Restore that it is okay to attempt to restore a
file even if it already exists on the to-drive. When this option is
not used (and the NOQUERY option is not used), an attempt to
restore an existing file causes you to be queried:
Commands
REWIND When source is tape, rewind to start of tape before beginning
the restore operation. This is a default option.
SIZE nnnn Used in conjunction with the CLEAR option. This option tells
Restore what size to make the newly cleared directory on the
to-drive.
SUBDIR Tells Restore to restore the files into the current working direc-
tory. When this option is not used, files are restored to the to-
drive’s root directory.
Restore 501
For instance, the following is a typical display during a full vol-
ume restore:
ACCOUNT: 2=SAMPLES
File: READ.ME
File: SAMPLES.EXEC
Subdirectory: C32
Library: C32.CMD32
Member: C32.CMD32.FINS
Commands
Member: C32.CMD32.PRTF
...
VOLUME Restores the entire archive volume to the to-drive. This is the
default option with Mode 1 and can only be used with Mode 1.
Defaults ASK and TYPE are default options. VOLUME is a default option with Mode
1, ACCOUNT is a default option with Mode 2.
502 Restore
NOSYSFILES When the NOSYSFILES option is specified, the following sets of files are
skipped if found on the archive volume.
Commands
Class code definitions
etc.
Restore 503
Commands
504 Restore
RMCP Command
Similar to the POP3Test command, the RMCP command checks a mail server to see if there
is any mail available for a specified email account.
RMCP user@host
Commands
user » E-mail account name
host » Domain or host of account
Operation Using the Remote Mail Checking Protocall (RMCP) the host is contacted
with user as the account name. The response code received from the mail
server is interpreted and displayed on the console and the return code is
set to reflect this response.
Notes Account names are case-sensitive on some servers. To ensure that the
account that you provide is the same as the ones given to the host, enclose
the argument in quotation marks.
>RMCP "[email protected]"
RMCP 505
Return Codes Because this program is frequently invoked from within a program the
return code is set to specific code reflecting the status of mail for the
user@host.
RC Meaning
0 There is no mail on the server for this account.
1 Some connection error occurred or the server does
Commands
506 RMCP
RmDir Command
The RmDir or Remove Directory command erases a subdirectory and all of its files.
Commands
directory » subdirectory name; may contain path; may contain wild cards
options » NOQUERY
NOSAVE
NOTYPE
QUERY
TYPE
Command synonym: RD
Operation Note: This command does not normally remove directories from disk.
Instead, it moves the requested directory and its files to the recycle bin.
You must use the NOSAVE option to remove the directory from the disk
with this command. Refer to Recycle Bin in the THEOS Corona Version 5
Operating System Reference manual.
RmDir 507
Options NOQUERY Indicates that you do not want to be asked for confirmation
before erasing a subdirectory containing files.
"/SUBDIR1/SUBDIR11/TEST3.FILE:S" erased.
"/SUBDIR1/SUBDIR11:S" erased.
"/SUBDIR1/SUBDIR12:S" erased.
"/SUBDIR1:S" erased.
NOSAVE Causes the directories to be erased from the disk at this time.
When this option is not specified and the drive is an image
drive or hard disk drive, the directories are simply moved to
the recycle bin.
NOTYPE Tells RmDir to not display the results of each file or directory
erased on the standard output device.
>tree
/
subdir1
subdir11
subdir12
subdir2
>tree
/
subdir2
QUERY Tells RmDir to “query” or ask if each directory matching the file
specifications is to be removed. This is a default option when
wild cards are used.
508 RmDir
When the “Ok to remove” question is asked, you may respond
with a (Y) for yes, (N) for no or (A) for all. Responding with (A)
means yes to this directory and all remaining directories are
removed without being queried. Respond with (C) or (Esc) to
cancel the remove operation.
TYPE A default option that tells RmDir to display the results of each
file and directory erased on the standard output device. This
Commands
display can be redirected.
>rmdir *
"/SUBDIR1:S" erased.
"/SUBDIR2:S" erased.
This command does not normally remove the directory or its files from
disk. Instead, it moves the requested directory and files to the recycle bin.
You must use the NOSAVE option to remove the file from the disk with this
command.
Recycle Bin When the NOSAVE option is not used, all of the files erased by this com-
mand are not actually erased. Instead, the file is moved to the recycle bin
which is a special, reserved directory on the SYSTEM account. Should the
need arise, an erased directory and its files can be recovered from this
recycle bin by using the UnErase command. However, due to space limita-
tions, files in the recycle bin are not retained forever.
RmDir 509
Commands
510 RmDir
Route Command
The Route command displays and maintains the routing tables used to establish network
paths to various IP addresses.
1 ROUTE
Commands
2 ROUTE ( PRTnn
The routing table maintained by this command is the internal, memory-resident table. This
table is created dynamically each time that the network is started. It is a combination of
default entries, entries provided by a gateway (if any) and by dynamic network processes
such as DialUp Networking. It is augmented by the routes defined with this command and
by routes defined in the /THEOS/CONFIG/NETROUTE.CFG:S file.
>route
Route 511
Mode 4—Deletes a route definition from the internal routing table.
address are not sent to the network hardware. Instead, they are captured
by the network software and handled internally on this machine.
For instance, the following diagram shows a typical, small LAN with
access to the Internet through an router. The router could be replaced with
a DSL modem or a network modem-sharing device. It could even be a com-
puter with a proxy server and modem connection to an ISP.
.1 .3 .5 .7 .9
.2 .4 .6 .8 .100
router
The .1, .2 etc. references are to the last portion of the IP address of the node.
Each of the THEOS-machine nodes on the LAN can use the default routing
tables generated when the network software is started. These default
routes are identical with the exception that each machine’s routing table
points to its own NIC address.
512 Route
This table specifies:
Line 1: All packets not routed by the other entries are sent to the router at
192.168.100.100 via the NIC addressed at 192.168.100.1.
Line 2: All packets addressed to localhost are sent to the loopback address.
Line 3 and 4: All packets broadcast to the localhost are sent to the loop-
Commands
back address.
Line 5: All packets addressed to this machine (from this machine) are sent
to the loopback address.
Line 6: All packets broadcast to the local network are sent to this network
via the NIC addressed at 192.168.100.1.
Line 7: All packets broadcast to other machines on the subnet are sent to
this network via the NIC addressed at 192.168.100.1.
.1 .3 .5 .7 .9
192.168.100.*
.2 .4 .6 .8 .100
.9 router
192.168.50.*
.1 .2
Route 513
On the .2 machine you would:
Similar commands are done for each of the other machines except the .4
machine itself. On that machine the default routing is already different
because the two NICs were configured in Setup NET. (See THEOS Corona
Version 5 Operating System Installation and Setup Guide.)
Commands
These additional entries tell the network software to “forward” all packets
received for the 192.168.50.* network to that network by transmitting
them via the NIC at 192.168.50.9. No additional routing entries need to be
added on this machine.
514 Route
Initial Routing When the network is first started at boot time or with the NET START
Table NETWORK command, the internal routing tables are initialized to include:
Commands
During the course of operation, additional entries are added and deleted
from the routing table due to transient PPP connections.
Restrictions Routes added or deleted by this command are only defined until the net-
work is restarted by a system reboot.
If you want the changes made with this command to be used the next time
that your network is restarted, you must manually add them to the
/THEOS/CONFIG/NETROUTE.CFG:S file.
Route 515
Commands
516 Route
Script Command
Process and format the text in a file including page headings, paragraph justification, chap-
ters, contents, etc.
Commands
2 SCRIPT filename outfile ( FILE options
Operation Mode 1—Process the text and commands in the file filename and output
the result according to the options specified.
Mode 2—Process the text and commands in the file filename and output
the result to outfile according to the options specified.
Mode 3—Process the text and commands in the file filename and output
the result according to the options specified. If there are any READ com-
mands in filename, they read their values from readfile.
Options Cnn Use printer class code nn for formatting the output.
Script 517
nn mm Only output from page nn through page mm.
The initial definition of the special characters is: . (period) for start of com-
mand, @ for escape, _ for underline, & for boldface.
Script ALIGN Align following text lines to the left or to the right.
Commands
Commands
APPENDIX Start a new appendix.
518 Script
IGUTTER Set inside gutter character.
Commands
INTRODUCTION Begin introduction.
Script 519
REMARK Comment line.
520 Script
TYPE Display text on console.
Variables and . This character is used at the beginning of a line that is a com-
codes mand. The character can be changed with the SETCOMM com-
mand.
Commands
_ This character surrounds text that is to be underlined. Charac-
ter can be changed with the SETUNDERLINE command.
@1 - @99 Variables.
Script 521
Commands
522 Script
See Command Filter
The See command copies a file to the standard output device, making all nonprintable char-
acters visible.
1 SEE file...
Commands
2 SEE
file » file name with optional path; may contain wild cards
Operation Mode 1—Each file in the list of files is copied to the standard output
device. Each nonprintable character in file is displayed with two or three
displayable characters:
Nonprintable character values less than the space character (32) display
with a leading up-caret ( ^ ) followed by the control character. For
instance, a tab character displays as ^I.
The DEL character (value 127) displays as ^?. The end-of-line character
(carriage return) and NULL characters (0) display as a dollar sign ( $ )
unless the file specification is preceded with a minus sign character.
>see system.cmd32.repeat
system.cmd32.repeat:s:
; get type of first argument$
&t = &typ &1$
$
; validate count and command$
&if (&index < 2) | (&t <> N)$
^I&control off$
^Ihelp repeat$
...
See 523
Each file is displayed on the standard output device. The minus sign speci-
fication (Mode 2) can be used to indicate that the end-of-line character is
not displayed as a dollar sign:
>see - system.cmd32.repeat
system.cmd32.repeat:s:
; get type of first argument
&t = &typ &1
Commands
Multiple files can be specified, some without the minus sign specification
and some with:
In the above command, the first three files are output with the dollar sign
character displayed and the last two files are displayed without this char-
acter.
Mode 2—Copies the file from standard input to standard output, display-
ing the nonprintable characters as described above. This mode is normally
used when the See command is part of a pipe.
524 See
Send Command EXEC
The Send command is an EXEC language program that gives you convenient, command-line
access to the THEO+COM command’s file send capability.
Commands
2 SEND file ( FILES options
file » file name with optional path; may contain wild cards
options » ASCII NOEOT TRACEFILE fn XMODEM-1K
COMnn THEOS XMODEM YMODEM
EOT TRACE XMODEM-CRC
Operation Mode 1—Invokes the THEO+COM command in SEND mode. The first
attached COM device is used unless the COMnn option is specified. If no
protocol option is specified, the THEOS protocol is used.
>send updated.stocklst
Mode 2—Similar to Mode 1, except file is an ASCII stream file that con-
tains one file description per line. The SELECTED.FILES and SELECTED.EXEC
files created by FileList and the FOUND.EXEC created by Look can be used for
this specification file (see “The EXEC and FILES Options” on page 239). You
may also create the file with an editor or application program.
A file now exists that lists all of the “data” files and all files that have been
changed since 10/01/2000. The following command sends these files to
another computer connected via a COM attachment:
Send 525
The THEOS protocol must be used in this mode. The files are sent with
NOEOT in effect for all files except the last file, which uses EOT.
Send
Protocol..... THEOS
File name.... MY.DATA:S
File size.... 1,235
Commands
Blocks....... 5
Transmitted.. 0%
Byte count... 0
Block count.. 0
File count... 1
Elapsed time. 0:02
Errors....... 0
Message...... Waiting for receiver
Progress.....
Options ASCII Use the ASCII file transfer protocol. Essentially, this is no pro-
tocol and should be used only for short text files.
The above two commands send the two files to another com-
puter. The other computer used the Receive command only
once because the first file used NOEOT and the transmission
was not terminated.
526 Send
THEOS Use the THEOS SEND/RECEIVE protocol. This is the default
protocol.
TRACEFILE fn Similar to the TRACE option except that the protocol activ-
Commands
ity is output to the file fn.
Notes Refer to the THEO+COM Installation and User’s Guide manual for a full
description of the operation of file transfers and the protocols used.
Defaults The first attached COM device is used by default and the THEOS protocol
is the default.
Send 527
Commands
528 Send
SendMail Client
The SendMail client is a utility program that sends a text file as a mail message to a mail
server on the network. This program is designed with a simple, command-line interface
suitable for usage as a tool in application programs. For a mail client with a more user-
friendly interface, use the TheoMail described on page 653.
Commands
1 SENDMAIL filename ( options
Operation filename is sent to the SMTP Server specified in the THEOS E-mail configu-
ration file (/THEOS/CONFIG/EMAIL). At a minimum, the TO and FROM option
must be specified with valid e-mail addresses.
Options ATTACH Specifies that a file is attached to the message when it is sent.
The file may be a text file or a non-text file such as a program
or binary stream data file. The file must be accessible from the
current account.
SendMail 529
The above command sends the my.message file to both
[email protected] and [email protected].
However, both copies are received with [email protected]
in the “To” field and nothing in the “CC” field. Received mes-
sages never have a “BCC” field. Compare with the CC option
described next.
FILES Indicates that filename is not the name of the file to be mailed,
but is a file that contains a list of files to be mailed. The files
SELECTED.EXEC, SELECTED.FILES and FOUND.EXEC created by the
FileList, Look and FileManager commands can be used for this
purpose.
530 SendMail
For instance, the FileList command is used to create a list of
messages to be sent:
Commands
&1 ABC.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 GENERAL.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10
&1 GEORGE.MESSAGE:A &2 &3 &4 &5 &6 &7 &8 &9 &10
Only the file names in each line are used. Other characters are
ignored.
Assuming that these message files each start with the message
headers necessary to send the message, they can be sent with
this command:
Note that the SELECTED.FILES file created with the FileList com-
mand is only usable when the FD option is used also. For
instance:
FROM Specifies the e-mail address of the author or creator of the mes-
sage. This should be your e-mail address but, in fact, may be
any valid-appearing address. The domain-name of this address
must be valid because most mail servers will perform a DNS
lookup on the domain-name specified.
HTML The text portion of the mail message is already formatted with
HTML tags and SendMail should use the appropriate MIME
headers to indicate this when it sends the message.
RAW This option specifies that the filename already contains all of
the necessary MIME headers and SendMail should send the
message without examination or modification.
SendMail 531
REPLYTO Specifies the e-mail address you want replies sent to. This
should be your e-mail address and should refer to an actual
e-mail account. Use this option when you want replies to a
message to be sent to a different address than the one specified
in the “From” field.
SMTP server This option causes server to be used as the SMTP server
instead of any value that might have been defined in the
SETUP SMTP configuration file.
For instance, the following three commands will each send the
message to [email protected] and yourboss@your-
company.com:
532 SendMail
>sendmail my.message (to [email protected] to
[email protected] from [email protected]
subject "Staff meeting at 1:00"
Commands
Embedded The addressing headers for a message may be specified on the command
Mail Headers line or with embedded headers at the beginning of the message file. For
instance, a message file containing
The Boss.
The Boss.
>sendmail my.message
SendMail 533
The following headers may be embedded at the start of a message file:
To:
Cc:
Bcc:
From:
Subject:
Reply-to:
Commands
Attach:
When used, the mail headers must be the first lines in the file, they must
start on the first column of the line and there must be one or more spaces
following the colon character. A blank line separates the mail headers
from the body of the message. Do not include any blank lines between
embedded mail header lines.
The Attach embedded header is followed with the path to the desired
attachment file. You may use more than one Attach header when you want
to attach multiple files. Wild cards are not permitted.
When a file uses embedded mail headers, do not use any of the following
command-line options: BCC, CC, FROM, REPLYTO, SUBJECT or TO. You
can use the command-line options ATTACH and FILES.
For instance:
[email protected]
[email protected]
The account name portion of the e-mail address must also be valid if the
address is used as a destination address. For instance, addresses specified
with the TO, CC and BCC options are destination addresses. Addresses
specified with the options FROM and REPLYTO should contain valid
account names because they may be used by the recipient as destination
addresses for replies to the message.
Since many account names are cryptic, an e-mail address may include
comment text that specifies a real person’s name or department. When
comment text is included as part of the e-mail address, the actual address
is enclosed within a pair of angle brackets. For instance:
534 SendMail
"John Doe <[email protected]>"
Comment text may appear before or after, or before and after the actual
e-mail address.
Including Text The message file may use an embedded command that causes another text
Files
Commands
file to be included in the message. For instance,
• MESSAGE.TEXT file:
%include /sendmail/staff.distrib%
From: The Boss <[email protected]>
Subject: Weekly Staff Meeting
%include weekly.meeting%
%include 010311.agenda%
We will also be discussing plans for the company picnic and vacation
schedules.
%include signature.files.theboss%
• STAFF.DISTRIB file:
To: Tom <[email protected]>
Cc: Shirley <[email protected]>
Cc: Richard <[email protected]>
Cc: Rebecca <[email protected]>
• WEEKLY.MEETING file:
The weekly staff meeting is scheduled for Wednesday in the
4th floor conference room.
• 010311.AGENDA file:
Agenda for March 11, 2001 meeting:
• SIGNATURE.FILES.THEBOSS file:
John Curtis (J.C.)
President
Widgets, Inc.
SendMail 535
ted by SendMail. The above example transmits as if it contained the
following text:
We will also be discussing plans for the company picnic and vacation
schedules.
The file name referenced in the %include command may include absolute
or relative path specifications as long as the file is still accessible from the
account used to actually send the message.
Notes The E-Mail configuration file is created and maintained with the Setup
Email command which is described in the THEOS Corona Version 5 Oper-
ating System Installation and Setup Guide.
When there are more than 50 addresses in the To, Cc and Bcc fields (com-
mand-line options or in the embedded addressing fields), multiple copies of
the message are sent, 50 addresses per message.
536 SendMail
SendMail The E-Mail Configuration file must have a SMTP Server defined (see Setup
Command SMTP in the THEOS Corona Version 5 Operating System Installation and
Restrictions Setup Guide).
The file name specified for the message text file, and any %include files,
must refer to ASCII text files. These files, and the optional attachment
files, must be accessible from the current account. The file name specifica-
tion may include the path specification.
Commands
Every message must have a “To” field specified with the TO option and a
“From” field specified with the FROM option or embedded mail headers.
SendMail 537
PRINT AT(12,9);
LINPUT USING RPAD(BCC$,60), BCC$
BCC$ = TRIM(BCC$)
PRINT AT(12,10);
LINPUT USING RPAD(REPLYTO$,60), REPLYTO$
REPLYTO$ = TRIM(REPLYTO$)
WINDOW EDIT MSG%, 100, MSG$ ! Get message body
WINDOW SELECT MAIN%, UPDATE ON
PRINT AT(1,23);"Okay to send? ";
Commands
538 SendMail
Session Command
The Session command allows you to control the attributes, position and size of the session
window.
SESSION function
Commands
function » CHANGE FOCUS MOVE SIZE
DISABLE MAXIMIZE RESTORE TITLE
ENABLE MINIMIZE
Options CHANGE OFF Disable session-switching. Applies to the console and all
sessions of this console.
DISABLE attr Disable mouse changes of session attribute. attr may be one
of:
MAXIMIZE
MINIMIZE
MOVE
SIZE
ENABLE attr Enable mouse changes of session attribute. attr may be any
of the ones listed above. The attr are normally enabled by
default are only disabled by a specific call to the Session com-
mand or with an application API call.
FOCUS Make this session the active session. Normally, this would only
be invoked from an EXEC program or by a Force command.
MAXIMIZE Maximize the session to the full console screen size. A maxi-
mized session has no frame and no title displayed.
Session 539
MOVE col row Move the upper-left corner of the session window to col, row
position on the screen.
RESTORE Restore the session window to its normal size and position (not
MINIMIZE or MAXIMIZE).
SIZE width height Set the session width to width columns and the session
height to height lines. Similar to using the Attach command to
Commands
>session size 80 24
TITLE text Set the session title to text. text should be enclosed within quo-
tation marks. When text is not specified (TITLE is the last
option specified on the command line), the title is set to the
default title which is the currently logged on account name.
Defaults The session attributes are enabled when a session is first started. The
position, size and maximize/minimize state are the last values saved when
the system was last shutdown or rebooted.
540 Session
Set Command
The Set command sets and changes system and user-defined environment parameters.
Commands
2 SET user-variable=value
3 SET
>set rdymsg on
>
Because setting the date and time is different than setting other environ-
ment variables, it is described separately, on page 542.
Set 541
Mode 2—Changes a user-defined environment parameter. User-defined
environment parameters may be any name that uses alphanumeric char-
acters, does not contain a space character, and is not the same as a system-
defined environment parameter.
>set username=(EnterÌ˛)
>set
RDYMSG = OFF
MSG = ON
WORK = M
SEARCH = S
DESCRIPTION = System maintenance account
USERNAME = Boss
PROMPT = !14\a!15\ s !4!!\!!5>
CLIST = YES
HOME = /:S
LANGNAME = English
OSVER = 5.0
OSPL = 50099
PROFILE = Office
Date and Time All of the system- and user-defined environment names are assigned
values without any special input form or confirmation response. There are
two exceptions: DATE and TIME.
DATE. Changing this variable changes the system’s date which is used by
the system and application programs. The date may be changed by enter-
ing the new date on the command line:
542 Set
The date is interpreted by the Set command using the currently set DATE-
FORM format.
The date may also be changed by using the Date Selection form:
Commands
Unlike most other parameters, changing the DATE or TIME requires a priv-
ilege level of five and it affects all users on the system.
TIME. Changing this variable changes the current system time. When set-
ting the time you must specify the hours and minutes. You may also spec-
ify the seconds. Since time can be set to the nearest second you are
prompted to press a key when you want the system time set to the speci-
fied time.
Set 543
Notes Environment variables have values that are strings, numeric values or
Boolean values (true/false). Single-word strings are assigned normally:
Multiple word strings are assigned by enclosing the string within quota-
tion marks:
Commands
For variables that are Boolean in nature, some have YES/NO values and
others have ON/OFF values, depending upon their usage. Refer to their
description in the Chapter 7 “User Account Environments” of the THEOS
Corona Version 5 Operating System Reference.
The syntax for assigning values may include the equal sign or you may
omit it. The following commands are both acceptable for the same assign-
ment:
>Set FileType=Basic
Defaults The default or initial values for most of the environment variables are set
during system boot using information from the Sysgen command or when
you log onto an account.
Changing the PRIORITY for your process requires a privilege level of three.
544 Set
Setup Command
The Setup command provides a single command to configure and initialize the major compo-
nents of THEOS Corona and various types of devices.
1 SETUP
Commands
2 SETUP function
Operation Mode 1—Invokes Setup in its menu mode. See “Setup Menu” below.
The above command invokes the configuration program for the DHCP
server.
Setup Menu When Setup is invoked with Mode 1, the Setup Menu is displayed. This
menu is dynamic because only those components installed on your system
are presented in the menu. For instance, if you to not have the DigiBoard
CX software installed on the system, the CX menu item is not offered.
Setup 545
Commands
Use the normal menu selection keys to select the desired function. These
keys are described in “Using Menus” on page 77 of the THEOS Corona Ver-
sion 5 Operating System Reference.
Functions The various functions that can be configured with the Setup command are
described in the THEOS Corona Version 5 Operating System Installation
and Setup Guide.
Setup The Setup command can only be used when you are logged onto the SYSTEM
Command account (account id zero).
Restrictions
Although the Setup command requires only a privilege level of one, some of
the functions may require higher privilege levels.
Although Setup may be invoked from any console, because it primarily con-
figures the system it is intended to be used from the main console. Many
changes in configuration will not be effective until the system is rebooted.
546 Setup
Shell Command
The Shell command is designed to be called from another program. It provides access to the
“CSI shell” so users may temporarily leave a program, enter commands and, upon comple-
tion, return to that program.
Commands
SHELL
Operation The current program’s environment is saved and the CSI Shell is entered.
Upon entry, the CSI clears the currently active window and displays the
reminder message:
If the current prompt string contains the default CSI prompt character
( > ), it is displayed with the blink attribute as a reminder to the operator
that the user is in the CSI Shell and should return back to the calling pro-
gram.
An example usage from a MultiUser BASIC Version 2.1 program might be:
CSI Shell
THEOS® Command SHELL
Type "EXIT" to terminate.
>
Shell 547
Notes As illustrated in the example, the Shell command uses the current window
for its display and input. That window is cleared before Shell displays its
reminder message.
Files are not closed by this command. However, the statement or function
that you use to invoke the command in your program may. For instance, in
a MultiUser Basic language program, if you use the SYSTEM statement to
invoke the Shell command, no files are closed. If you use the CSI statement
Commands
to invoke the Shell command, your files will be closed before invoking the
Shell command.
Use the Exit to exit the shell environment and return to the calling envi-
ronment.
548 Shell
Show Command
The Show command displays the current value of system-parameters, user-variables and
other information about the system.
1 SHOW
Commands
2 SHOW env-name
3 SHOW function
4 SHOW *
Show 549
Operation Mode 1—Invokes the display showing all environment variables, IRQs,
PCI devices, all disks, tapes and other devices. When this mode is used a
form is displayed with a drop-down list of the various devices that it can
show:
Commands
550 Show
Interrupt Request Table (IRQ). Shows the 16 IRQ numbers and the devices
that use these IRQ numbers and the addresses associated with them.
When adding a new device to the computer, this information is useful in
determining which IRQs are available for use by the new device.
Commands
A text-only, non-object display of this information can be obtained by using
the command SHOW IRQ.
Show 551
A text-only, non-object display of this information can be obtained by using
the command SHOW PCI.
Universal Serial Bus (USB). If the system supports USB ports, the hub,
adapter and installed devices are displayed:
552 Show
A text-only, non-object display of this information can be obtained by using
the command SHOW USB.
Disk/CD-ROM devices. This item displays all of the hard disk and CD-
ROM disc devices that are currently connected to the system. These
devices are listed whether they use IDE, SCSI, USB, PCMCIA, I2O or
ATAPI technology.
Commands
A text-only, non-object display of this information can be obtained by using
the command SHOW DISK.
Show 553
SCSI Devices. Shows the SCSI devices (Small Computer System Inter-
face) currently configured on this system.
Commands
The “Rem” column indicates whether or not the device uses removable
media. A text-only, non-object display of this information can be obtained
by using the command SHOW SCSI.
554 Show
A text-only, non-object display of this information can be obtained by using
the command SHOW TAPE.
Commands
The above display reports on the same devices that the Attach command
lists but this display provides different information about those attached
devices. A text-only, non-object display of this information can be obtained
by using the command SHOW DEVICE.
>show search
SEARCH = S
>show fullname
FULLNAME = John Doe
Show 555
Mode 4—Displays the following information:
>show *
ACCOUNT = SYSTEM
USERNUM = 0
PORT = 16
PRIVLEV = 9
LOGON = 15:29:09 09/04/01
ABBREV = ON
Commands
MSG = ON
RDYMSG = OFF
SEARCH = S
WORKVOL = M
SERIAL = 102-12345
IDENT = "TheosServer"
SYNONYM = USER.SYNONYM
SUBDIR = /
LIBRARY =
PATH =
OBJLIB =
COPYLIB =
LINKLIB =
556 Show
Functions CLOCK Displays the current time and date continuously. The time is
updated once per second. Use the (Esc) or (F9) to quit.
>show clock
16:12:24 PST Thursday, January 17, 2002.
Commands
DATE Displays the current time and date, once.
>show date
16:12:24 PDT Monday, April 20, 2002.
Show 557
TIME Displays the current time and date, once. This is synonymous
to the DATE function.
>show time
16:12:24 PDT Monday, April 20, 2002.
You can use the CLOCK function to display the time continu-
ously or the Clock command to display it graphically.
Commands
The buttons “End Task,” “Stop,” “Peek” and “Exit” are only
available if you have sufficient privilege. The privilege level
required for these features is defined in the file /THEOS/CONFIG/
SHOWUSER.CFG:S file, in the entry “ButtonPriv=.” If this file or
entry does not exist then the privilege level required is 5.
558 Show
The “Status & Info” column uses codes for the status condition
of the process:
Code Meaning
* Indicates that this is the process performing the
Show USERS .
E=nn Process is waiting for semaphore nn to be set.
Commands
I Waiting for interrupt. Usually, the program is
waiting for another character from the console.
L Waiting for a locked resource.
N (Break),(Q) is disabled for the process.
O (Break),(O) is in effect for the process.
P Stopped by (Break),(S) or screen pause command.
R The process is running a program.
Z Process is “sleeping.”
When this option is used, the priority for the user (1-7) is dis-
played immediately following the status codes.
>show user 1 2 5 6 7 10
The above command displays the status for the six processes
listed. Any unused process is omitted from the display.
Show 559
VERSION Displays the version and date for the operating system and all
major components installed on your system.
Commands
>show who
ACCOUNT = SYSTEM
USERNUM = 0
PORT = 16
PRIVLEV = 5
LOGON = 15:29:09 01/04/02
Notes When the environment variable LINEGRAPH is set to “N,” the line graphics
used in the display for MEMORY and VERSION are suppressed.
Restrictions The display for Show USER and the Show MEMORY * functions requires a
privilege level of five.
See also Account, Set, Sysgen, Who , WhoAmI
560 Show
ShutDown Command
1 SHUTDOWN
Commands
2 SHUTDOWN ( option
Cautions This is an extremely dangerous command because other users are termi-
nated without notice. If another user is in the process of updating one or
more files, those files will be inaccurate because the update was not com-
pleted.
ShutDown 561
Commands
562 ShutDown
Sleep Command
The Sleep command causes your process to suspend execution for an interval of time or until
a specified time-of-day.
1 SLEEP seconds
Commands
2 SLEEP time-of-day
>sleep 30
>sleep 23:30
Notes Once “sleeping” has started with this command it may only be awakened
early by entry of the (Break),(Q) or by a Force from another user.
The EXEC language has its own &sleep statement, BASIC has its own
SLEEP statement and C has its own sleep function. If you need to put the
process to sleep while executing a program, it is more efficient to use one of
these statements or functions.
Sleep 563
Commands
564 Sleep
Sort Command Filter
This command sorts a stream file using the entire record as a sort key or designated por-
tions of each record as the sort key.
Commands
2 SORT -options +position1 -position2 -field-options -o output infile…
Sort is a filter program and, as such, defaults to using the standard input
device for its input file and the standard output device for its output file. It
is suitable for use in pipes.
The above command sorts the output of the LIST command using dictio-
nary order and then displays the sorted output with the MORE command.
Operation Mode 1—Sorts the infiles into one output file using the entire record as
the sort key.
The above two commands sort the file UNSORTED.DATA. The result of the sort
is output as SORTED.DATA. The first command sorts the file using the sort
order of the ASCII collating sequence. The second command also sorts the
file but it ignores leading blanks in the records and it ignores any charac-
ters outside the range of ASCII characters. It also ignores duplicate
records and outputs the file in reverse sequence.
Sort 565
Mode 2—Sorts the infiles into one file using the designated sort keys for
determining the sort order of the records.
Input Files Sort can sort multiple input files into a single output file. Merely list the
input files on the command line, one after the other.
The sequence of the listed input files does not matter unless the -m option
is used.
If no input file is specified, the standard input device is used for the input
file.
Sort can sort as large an input file or files as will fit in available memory.
Sort Keys Unless otherwise specified, the entire record is used as a sort key. By using
the +position and -position fields, portions of the record can be specified as
the sort key(s).
The format for +position and -position is f.c where f is the number of fields
to skip from the beginning of the record and c is the number of characters
to skip from the beginning of the field. Fields are separated in records with
a tab character. If a different character is used to separate fields, the -t
option must be used to identify the separating character.
For instance, a specification of +3.2 indicates that the sort key starts with
the third character of the fourth field in the record.
This command line states that the file SORT.INPUT is to be sorted using two
keys, one starting with the third character of the fourth field through the
eleventh character of the fourth field and the other using the first 21 char-
acters of the second field.
Each sort key may have its own field-options specified immediately follow-
ing the sort key specifications. For example:
Sort keys that do not have their own field-options use the options specified
for the entire sort. These options are specified before the sort key specifica-
tions.
566 Sort
Options b Ignores leading blanks and other white space characters in the
sort key for comparison purposes.
Commands
John F. Kennedy John F. Kennedy
Sort 567
options to specify that a character other than (Tab) separates
the fields in the record.
u Specifies that only records with unique keys are output. When
this option is not used, records with duplicate sort keys are
output in the sequence that they were found in the input
file(s).
Defaults The default infile is the standard input device and the default outfile is the
standard output device.
568 Sort
Split Command Filter
The Split command splits a stream file into multiple files, each one containing a portion of
the original file.
Commands
2 SPLIT -nnn infile outfile
Operation Both Modes 1 and 2 operate the same. The only difference is that Mode 2 is
“UNIX-like” in syntax.
The infile is read and output in nnn line chunks to the outfile. outfile name
is modified with a two-letter suffix added. The first output file is outfileAA,
the second is outfileAB, and so on.
This command divides the SYSTEM.HISTORY file into 1,000 line chunks. The
first 1,000 lines are written to SYSTEM.HISTAA, the second 1,000 lines are
written to SYSTEM.HISTAB, etc.
Option nnn Specifies the number of lines each output file will contain.
When not specified the default value of 100 is used.
Defaults The default number of lines for each of the output files is 100.
When infile is not specified the input comes from the standard input
device.
Split 569
Commands
570 Split
Spooler Command
1 SPOOLER printer
Commands
2 SPOOLER printer manager-function
4 SPOOLER
Spooler 571
Operation Mode 1—Displays the status of a spooled printer or on all of the spooled
printers.
>spooler 1
Printer #1 "CENTLP1" L80,P58,HPLASER,W8
-- is waiting for work
-- and has form "A" mounted
>spool *
Commands
>spooler 3 stop
>spooler 3
Printer #3 "SIO4" L80,P58,EPSON
-- is stopped
-- and has form "C" mounted
>s list
572 Spooler
Spooler Status When Mode 4 is used and the console is configured for graphics display, the
following form is displayed:
Commands
Printer list box This area displays each of the printers that are currently
configured as spooled printers. The information displayed for
each printer includes the printer number, printer name (see
“Setup Printer” on page 173 of the THEOS Corona Version 5
Operating System Installation and Setup Guide), status, page
and pages, report, report number, account, form device and
attachment parameters.
The values for page, pages, report, report number and account
are only displayed when that printer is printing a report. The
pages value refers to the total number of pages in the report.
Report Pressing this button changes the display to the report listing
form described on page 574.
Start This button can be pressed to start the printer selected in the
Printer list box. If the printer is already started, this button’s
label is “Stop” and, when pressed, stops the selected printer.
Abort If the printer selected in the Printer list box is printing a report
this button is enabled. When pressed, report printing is
aborted.
Form Pressing this button allows you to change the form for the
printer selected in the Printer list box. You are presented with a
maintenance form allowing you to enter up to eight form let-
ters for the selected printer.
Spooler 573
Commands
Report Listing When the Report button is used the display changes to:
Report list box This area displays each of the reports that are currently
queued. Use this area to select the report that you want to per-
form some action on with the buttons displayed on the right.
Each report line shows the report number, account name that
created the report, the report name, creation date, queue let-
ter, printer to be used, pages in report, number of copies
remaining to print and the current status of the report. You
may have to scroll the list left or right to see all of these col-
umns of information.
Status Pressing this button changes the display to the spooler status
form described on page 573.
Order Pressing this button changes the display order of the reports in
the Report list box. There are four orders and each time the but-
ton is pressed the next order is used:
574 Spooler
Report number
Queue letter then report number
Creation date then report number
Account name then report number
Print This button can be pressed to start printing the report selected
in the Report list box. If the report is already printing or has
been printed, this button is disabled.
Commands
Remove/Abort This button is labeled “Remove” or “Abort,” depending
upon the status of the report selected in the Report list box. If
the report is currently being printed the button is labeled
“Abort” and pressing it aborts printing of that report. Other-
wise, the button is labeled “Remove” and pressing it deletes
the selected report from the queue.
Spooler A Spooler Manager is a user who has sufficient privilege and is responsible
Manager for the printers controlled by the print spooler. The following functions are
Functions reserved for users logged onto the SYSTEM account with a privilege level of
five.
>spooler 3
Printer #3 "SIO4" L132,P60,HPLASER,B38400,W8,XON/XOFF
-- is waiting for work
-- and has form "C" mounted
Spooler 575
this function is when you are first installing the system and
want to create a spooler queue library that is larger than the
400 member default size used when the spooler is first
installed by the Sysgen command.
>spooler 4 form r
This command tells the spooler that spooled printer 4 has form
R mounted on it and that it can print any reports in the R
queue. Refer to the description of “Forms and Queues” on page
581 for more information about form specifications.
This command tells the spooler that spooled printer 3 can print
reports in queue A, B, C, D, E, F, G or H.
This command tells the spooler that spooled printer 3 can print
reports in queue A, X, g or $.
576 Spooler
INIT drive This function initializes and starts the print spooler. This ini-
tialization can also be done automatically at boot time if the
“Enable Print Spooler” is set in the system configuration (see
“Sysgen” on page 591).
drive is the disk drive code for the drive containing the /THEOS/
SPOOLER/SYSTEM.SPOOLER library. If drive is not specified, S is
used.
Commands
At least one printer must be attached when this INIT function
is performed. All printers that are currently attached are
transferred to the print spooler. (Slave printers are not trans-
ferred and cannot be spooled.)
>spooler init
>spooler
Printer #1 "CENTLP1" L80,P58,HPLASER,W8
-- is stopped
-- and has form "A" mounted
Printer #2 "SIO3" L80,P58,CANON2
-- is stopped
-- and has form "B" mounted
Printer #3 "SIO4" L80,P58,EPSON
-- is stopped
-- and has form "C" mounted
QUIT This function stops the print spooler. It is the opposite of the
INIT function. You may only stop the spooler if the spooler is
idle (not printing any reports) and the system is in single-user
mode. In this case, single-user mode means that no other pro-
cesss are started.
>spooler quit
>spooler 2 start
Spooler 577
printing on printer, it is finished before that printer is actually
stopped.
>spooler 3 stop
>spooler
Printer #1 "CENTLP1" L80,P58,HPLASER,W8
-- is waiting for work
-- and has form "A" mounted
Commands
VERIFY Verifies that the spooler’s queue file matches the spooled
reports that are in the spooler queue library and that the
spooler queue library matches the spooler queue.
1. Use the QUIT function to stop the spooler (or boot the sys-
tem in maintenance mode).
3. Rebuild the file by using the BUILD nnn drv function. Or, if
the spooler is configured and enabled in the system config-
uration file, reboot the system. The boot process will create
a missing spooler library and queue when it starts the
spooler (see “Setup SysGen” in the THEOS Corona Version
5 Operating System Installation and Setup Guide).
578 Spooler
Functions ABORT Stops printing the current report on the specified printer.
printer must be specified if there is more than one spooled
printer.
Commands
To successfully abort a report may depend upon the printer’s
status and the transmission protocol. If the printer is off-line
or powered off and the transmission protocol requires a
response from the printer, then the report will not abort until
the printer is powered on and made ready to print.
BACKUP pages After the current page of the current report being printed
on printer is printed, the report is backed up pages number of
pages and printing resumes.
Spooler 579
the report. The queue, copies and hold attributes can be speci-
fied in any order and one or more may be omitted, indicating
that that attribute is not changed.
KILL report Removes and deletes spooled report number report. If the
report is currently printing, it must be aborted first with the
ABORT function. The ABORT function will kill the report unless
it is marked as HOLD, in which case you must use the KILL
function to remove it.
>spooler kill *
>spooler kill 2 6 7 33
Removes reports numbered 1, 3, 30, 31, 32, 33, 45, 50, 51, 52,
53, 54 and 55.
580 Spooler
LIST Displays a list of the spooled reports on the standard output
device. The information displayed includes:
Column Content
File The report number.
Acc-name Owning account name.
Rpt-name Report name
Commands
Date Time Date and time report created.
Q Queue of report.
Pages Number of pages in report. This is only an
estimated number based upon the number of
form-feeds in the report.
C Number of copies still to print.
Status Current status of the report. Status messages
include Open, Closed, Printing, Printed, Hold.
Forms and Forms and queues are identified with single-characters. There are 64 pos-
Queues sible forms and queues:
A – Z 26 forms/queues
a – z 26 forms/queues
# $ % & * + - < = > ^ ~ 12 forms/queues
Previous versions of the spooler only supported the first 26 forms and
queues. To provide compatibility with programs and procedures designed
for previous versions of the operating system, form and queue specifica-
tions default to the uppercase form and queue letters.
Spooler 581
To specify one of the lowercase form letters you must enclose the form
within quotation marks. The 12 special character forms may be specified
without quotation marks. For instance:
To specify one of the lowercase queue letters you must enclose the letter in
quotation marks or use the special syntax “QUEUE=$queue.”
Restrictions The functions ABORT, BACKUP, PRINT, ATTACH, FORM, START and STOP
all require a privilege level of one.
For all functions other than BUILD and INIT, the print spooler must be ini-
tialized before the function can be used.
582 Spooler
Start Command
Stop Command
The Start command starts a user, session or background task. The Stop command stops a
user, session or background task.
Commands
2 START process console ( attach-options ACCOUNT name PASSWORD password
4 START command
5 STOP process
Operation Mode 1—Starts a process as a user with console. process must be the
number of an unused memory process. The number of memory processs is
defined in the field “Maximum Number of Tasks” by the Sysgen.
When a user is started with this command, it has all publicly attached
devices available and the privately attached console as specified in this
command. Once the user environment is defined, it executes the Logon
command and awaits the operator’s response to the “Logon please:”
prompt.
Start 583
Mode 2—Identical in operation to Mode 1 except the new user is automat-
ically logged onto account. The PASSWORD parameter is optional and is
used when the account has a password. If the account has no password,
the PASSWORD parameter is ignored.
If the PASSWORD parameter is not used and account has a password, the
Commands
Mode 3—This mode starts a user similar to Mode 1 and Mode 2. However,
when the MODEM keyword is used it tells Start that the user is connected
via a remote modem connection.
A user started with this mode differs from both Mode 1 and Mode 2 in that
the user’s console device is attached with this mode but no initialization
strings are sent for the console class code. A special indicator is set that
Logon uses.
Instead of starting the user with the “Logon please” prompt, the Logon
command programs the modem to auto-answer the telephone line. It then
waits for an incoming call and connection. After the connection is estab-
lished between the two modems Logon then sends the classcode initializa-
tion string and requests that the user logs on.
When the remote user performs a Logoff (not lateral Logon), the connection
is terminated and the modem is reinitialized to wait for the next incoming
call.
The process number used for the new background task is the highest num-
bered process currently available. It has all of the publicly attached
devices available to it but does not have a console display or keyboard.
584 Stop
Mode 5—Stops user process number process. The process must be in the
program Logon. If necessary, use the Force to force the user to Logoff first
before stopping the process.
>stop 20
Process is still active.
>force 20 logoff
Commands
>stop 20
Before using the Force, you should first check to make sure that the user is
not in the process of updating any files.
If the user process was started with a Mode 3 start (modem server), the
modem connection is first terminated before stopping the user.
Notes In Mode 1, Mode 2 and Mode 3, when a process is started with a console on a
serial port, a modem initialization string is sent to the process’s console
port. The specific string of characters transmitted is defined by a file in the
/THEOS/CONFIG/SSYSTEM.MODEM library or by the file /THEOS/CONFIG/
MODEM.CFG. These files can be edited to customize the modem initialization
string to that required by your modems. Refer to “Starting Users” on page 58
for a description of this user startup process. See also “SYSTEM.MODEM
Library” on page 220 .
For compatibility, the Start command accepts the command syntax used in
prior versions:
Defaults New users started with this command always have the devices that are
defined in the system configuration file (see “Sysgen” on page 591) and any
other devices that are publicly attached.
Spooled printers defined by the system configuration file are assigned the
queues defined in that file, other printers are assigned queues in a one-to-
one basis such as queue A to PRT1, queue B to PRT2, etc.
Return Codes The Start command sets the return code to a non-zero value less than 1,000
when an error occurs and to a value greater than 1,000 when the process is
successfully started.
Return values greater than 1,000 specify that the process was started suc-
cessfully and give the specific process number used for the new task. Sub-
tract 1,000 from the return code to produce the process number.
Restrictions The Stop command requires a privilege level of five. Mode 1 and Mode 2 of
the Start command require a privilege level of five.
Stop 585
When attempting to Start a new user or task, the message “All available
tasks are in use” indicates that all processs are already in use. You must
either wait for a process to become availble (another tasks stops) or
increase the number of processs available by setting a larger “Maximum
Number of Tasks” in your system configuration (see “Sysgen” on page 591)
and then reboot.
use by another user or task, the message “Device is attached to user ...” or
“Device ... is already attached to process ...” is displayed. Either choose a
different device for this user or free up the device by stopping the other
users.
586 Stop
SUMode Command
SUMODE
Commands
Operation The system is examined to see if it has only one logged on user (this user).
Return Code Because this program would normally be called from an EXEC program or
other program, the return code is set to indicate the results of the test.
A return code of 1 indicates that one or more processes are still operating.
SUMode 587
Commands
588 SUMode
SysEd EXEC
This command allows you to view and optionally modify some common system configuration
data files.
1 SYSED
Commands
2 SYSED MODIFY
Operation Mode 1—SysEd uses WindoWriter to open the following files in READONLY
mode:
/THEOS/CONFIG/SYSGEN.CFG:S
/THEOS/CONFIG/DEVNAMES.TXT:S
/THEOS/CONFIG/START.CFG:S
/THEOS/CONFIG/MODEM.CFG:S
/THEOS/CONFIG/NET.CFG:S
Mode 2—When MODIFY is specified, SysEd opens the above files without
specifying READONLY and allows you to make changes and save the files.
SysEd 589
Commands
590 SysEd
Sysgen Command
SYSGEN drive
Commands
drive » optional disk drive letter for /THEOS/CONFIG/SYSGEN.CFG file
Operation Maintains the system configuration file on drive. If drive is not specified, S
is assumed. Refer to the THEOS Corona Version 5 Operating System
Installation and Setup Guide for a complete description of the operation of
this configuration program.
The drive parameter is used to change the system configuration file for a
boot disk other than the current system disk. For instance, the Emergency
Boot Floppy.
Notes The system configuration file contains information used when THEOS is
booted. Changes made to the configuration are not effective until the
system is reset or rebooted.
Restrictions The Sysgen command may only be used when you are logged onto the
SYSTEM account (user number 0) with a privilege level of five.
Sysgen 591
Commands
592 Sysgen
System Command
1 SYSTEM
Commands
2 SYSTEM drive
Operation Mode 1—This mode is used when the system disk is a removable disk
drive and you want to change the disk volume in the drive. When the com-
mand is executed, you are prompted with:
Change the disk volume to another valid THEOS system disk and press
(EnterÌ˛).
Mode 2—This mode is used when you want to change the system disk to a
different drive. For instance, after booting from an Emergency Boot Dis-
kette, the System command is used to switch to the hard disk.
>system m
Caution You may change to a non-system disk. That is, you may change to a disk
that does not contain an operating system or its support files. Although
this may be desirable, in this situation there will be some limitations to
the commands that you may execute. Any command that requires a file in
the /THEOS/MENU/language, /THEOS/CONFIG or /THEOS/OS directories will not
execute properly because these libraries are always assumed to be resident
on the current system disk. Since command use files in those directories,
there will not be much that you can do.
Notes You must use this command to change the attachment of the system disk.
The Attach cannot change the S disk assignment.
The System command does not load any programs or files from the new
system disk. Unless they are loaded into memory, it does check for the
presence of the following files: /THEOS/OS.CSI, /THEOS/OS/MESSAGE/lan-
guage/KEYWORD.BIN and /THEOS/OS/MESSAGE/language/MESSAGE.BIN.
If WORK is S, all of the system work files are copied to the new system
disk.
System 593
Restrictions The System command requires a privilege level of five.
594 System
Tail Command Filter
The Tail command displays the ending of a text file on the standard output device.
Commands
2 TAIL file ( options FOLLOW
file » file name with optional path; may contain wild cards
options » +nnn
-nnn
CHARS
FOLLOW
LINE
Operation Mode 1—The last lines or characters of file are output to the standard
output device. When more than one file is specified, the last lines or char-
acters of each of the files are output.
>tail /theos/config/sysgen.cfg
USER1 5:3:7:1 L80,P24,C90,ACCOUNT=SYSTEM
USER2 5:3:7:2 L80,P24,C90
USER3 5:3:7:3 L80,P24,C90
USER4 5:3:7:4 L80,P24,C90
USER5 5:3:7:5 L80,P24,C90
USER6 5:3:7:8 L80,P24,C90
DATEFORM A
NAME "Saturn"
MAXPCB 40
LOWCASE
This mode outputs the tail of a file and then monitors the file for any
growth in the file. When additional data is written to the file by another
user or task, it is displayed and monitoring continues. You must use (Esc)
or (F9) or (Break),(Q) to terminate this command.
Tail 595
Options CHARS Count characters instead of lines.
FOLLOW Use Mode 2 of the Tail command. If multiple files are specified,
only the first file is output and followed.
+nnnn Begin output nnnn lines or characters from the start of the file.
Commands
-nnnn Begin output nnnn lines or characters from the end of the file.
The default is -10.
Notes When multiple files are displayed, each file’s output is identified with a
line displaying the complete path to the file.
A file specification can omit the file type if the environment variable
FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111 of the THEOS Corona Version 5 Operating System Ref-
erence.
596 Tail
Tape Command
1 TAPE
Commands
2 TAPE tape functions
Operation Mode 1—Using the TAP1 device, this mode rewinds to the beginning of the
tape volume and reads the header information. The tape label, the first file
name and its creation date are displayed.
>tape
Tape TAPE1 label "TBACKUP".
Tbackup from system "Production" on Wednesday, January 16, 2002, at 5:22pm.
Data set name: "January 16, 2002 17:22:14"
>
>tape show
Tape TAPE1 label "FRIDAY".
Archived from disk "PRODUCTN" on 12/06/96, at 17:35.
>
Tape 597
Function EJECT If the tape device supports a programmable eject feature, the
tape cartridge is ejected from the tape drive.
>tape format
Commands
>
INIT label A REWIND operation is performed and then it writes a new vol-
ume label without tensioning or formatting the tape.
LABEL A REWIND operation is performed and then all file labels are
displayed and data blocks are counted.
>tape label
VOL1TSC002
HDR1ARCHIVE.DISKTAPE 0001000100000098316 000000
HDR2F0409600128
** Tape Mark **
Number of data blocks = 28917
** Tape Mark **
EOF1ARCHIVE.DISKTAPE 0001000100000098316 028917
EOF2F0409600128
** Tape Mark **
** Tape Mark **
SHOW Reads the next tape header. The header and the file name and
creation date are displayed. If the tape is positioned to the end
of the tape, then “Tape mark” is displayed.
>tape show
Tape TAPE1 label "TBACKUP".
Tbackup from system "Production" on Wednesday, January 16, 2002, at 5:22pm.
Data set name: "January 16, 2002 17:22:14"
>
598 Tape
TENSION A “fast forward” and a “fast rewind” are performed on the tape
to ensure uniform tension throughout the tape volume.
Commands
start and then reading every block on the tape.
>tape verify
Block: 40, length: 0
>
WTM Writes a tape mark on the volume. Every file on the tape is
automatically terminated with a tape mark. The end of a tape
is indicated by two consecutive tape marks.
Notes Before a tape can be used by THEOS, it must be initialized with a tape
label.
Tape 599
Commands
600 Tape
TArchive Command
The TArchive command makes an “archive copy” of a file, a set of files, an entire disk volume
or a set of disk volumes. This is a legacy command. The current version of software that
should be used for archiving and backing up systems is TBackup.
Commands
1 TARCHIVE from-drive to-drive ( options
file » file name with optional path; may contain wild cards
from-drive » drive letter of source drive to archive
to-drive » drive letter of destination drive or logical tape name
options » ACCOUNT FILES NOASK SIZE file
ASK INCREMENTAL NOQUERY SUBDIR
date1 LABEL name NOTYPE TYPE
date2 MULTIUSER QUERY VOLUME
DIFFERENTIAL NAME file SHARE
The TArchive command creates an archive volume that can be used by the Restore com-
mand.
The TArchive and Restore commands have been replaced with the TBackup command as it is
more capable and supports the latest storage devices.
Operation The file or files specified with file or from-drive are copied in a compressed
form to an archive volume on the destination to-drive. The archive
volume created can only be interpreted with the complementary Restore
command described on page 495.
Mode 1—Unless one or more options restrict the file selection, all of the
files on the from-drive are archived to the to-drive. With this mode
VOLUME is a default option.
For instance, the following command archives all files in all accounts in all
subdirectories on the S drive to the drive attached as TAPE1.
>TARCHIVE S TAPE
TArchive 601
Mode 2—The file(s) specified by file are archived to the to-drive. With this
mode ACCOUNT is a default option.
For instance, the following command archives a single file to the floppy
diskette in drive F.
>TARCHIVE CUSTOMER.MASTER F
Commands
The following command archives all of the “master” files in the current
account to the tape drive.
Mode 3—The files listed in file are archived to the to-drive. file must be an
ASCII stream file containing one file description per line. The
SELECTED.FILES and SELECTED.EXEC files created by the FileList command
and the FOUND.EXEC created by the Look command can be used for this spec-
ification file (see “The EXEC and FILES Options” on page 239). You may also
create the specification file with an editor or application program.
A file now exists that lists all of the “data” files and all files that have been
changed since 10/01/2001. The following command will archive these files
to tape:
For instance, the following command archives all files in all accounts in all
subdirectories on the S drive, the A drive and the B drive to the F drive.
>TARCHIVE S A B F
602 TArchive
Options The following options are available with the TArchive command. They can
be used with any of the modes described above, either singly, or in combi-
nations.
ACCOUNT Specifies that only the files owned by the current account are
candidates for archiving. This is a default option when Mode 2
is used.
Commands
Use the VOLUME option to override this default.
For instance:
>tarchive s f
Source is Disk S
Destination is Disk F
Mount volumes now:
date1 The first token that looks like a date is interpreted as a selec-
tion date. Only files with a date stamp greater than or equal to
this date (new files) are candidates for archiving. For instance:
>tarchive s f (10/1/01
With this command only those files on the S drive that have
been changed on or since 10/01/2001 will be archived.
TArchive 603
This command archives only those files on the S drive that
have not been changed since 9/30/2001. The date 1/1/86 is the
earliest date maintained by the THEOS file system and is
interpreted as “from the earliest date.”
DIFFERENTIAL Tells TArchive to include only those files that have their
modified bit set. This is the only option that prevents TArchive
from resetting the modified bit for files that it archives. See
Commands
develop\custom/programs/program.source.sample:s
Account: 4=DEVELOP
Subdirectory: CUSTOM
Subdirectory: PROGRAMS
Library: PROGRAM.SOURCE
Member: PROGRAM.SOURCE.SAMPLE
INCREMENTAL Tells TArchive to include only those files that have their
modified bit set. The modified bit is reset for each file archived.
See “Incremental Archives” on page 609.
LABEL label Specifies that the to-drive’s volume label is set to label. For
instance:
604 TArchive
MULTIUSER Allows TArchive to archive a public drive even though other
users may be logged on and active. Normally, when TArchive is
instructed to perform a full volume archive (option VOLUME)
on a public disk, it requires single-user mode. If other users are
logged onto the system, it displays the message: “Must be sin-
gle user or private volume.”
Commands
single-user operation (the message is still displayed). THIS
CAN BE EXTREMELY DANGEROUS! If another user
changes some files while the archive is being created, the
integrity of the archive is lost.
Use this option only if you are sure that all other users are
inactive.
NAME Specifies that the archive volume file name is to be set to the
token following this option. Additionally, the archive volume
file will only use as much space as needed. None of the existing
files on the to-drive are erased (an implied SHARE option).
For instance:
TArchive 605
NOQUERY A default option that tells TArchive to not ask for confirmation
on each file being archived.
>tarchive s f (query
Source is Disk S
Destination is Disk F
Mount volumes now:
...
SHARE Tells TArchive that the archive volume is to share the space on
the first disk with any existing files. This is a default option
when to-drive is a removable hard disk.
If multiple disks are required they will use the entire disk
space for the archive file.
SIZE file The total size of all of the files selected for archiving is com-
puted and appended to file. This is done before the archive is
created.
SUBDIR Tells TArchive that only files in the current working directory
and all of its subordinate directories are included.
606 TArchive
TYPE A default option that tells TArchive to display each account
name, subdirectory name, library name and file name on the
standard output device (normally the console) as it is being
archived. This display can be redirected.
Commands
ACCOUNT: 2=SAMPLES
File: CHARSET.H
File: LIBS.EXEC
File: MAKE.FILE
File: READ.ME
File: SAMPLES.EXEC
Subdirectory: C32
Library: C32.CMD32
Member: C32.CMD32.FINS
Member: C32.CMD32.PRTF
...
VOLUME Specifies that all accounts, all subdirectories and all files on
the from-drive are to be archived. This option requires that the
from-drive be a private disk volume, that all other users be
logged off or that the MULTIUSER option be used.
Full Volume Full volume archives (option VOLUME in effect) are copies of the entire con-
Archives tents of disks. They should be created on a frequent and periodic basis to
assure yourself of having adequate protection in the case of disk or com-
puter failure. Since a full volume archive contains a copy of every file, sub-
directory and account on a disk, it is the only archive volume that needs to
be accessed if you must restore a system.
TArchive 607
Multivolume Mode 4 of this command archives multiple disk volumes onto a single
Archives archive volume. This allows you to archive your entire system in one oper-
ation. For instance, a system with four hard drives can be archived with
the command:
>tarchive s a b c tape
Should the need ever arise where you want to restore a volume or a file
Commands
from this archive volume, use the DRIVE option of the Restore command.
Differential A differential archive is an archive volume that includes only those files
Archives that have changed since the last full volume archive. For instance, if a disk
contains three files:
PROGRAM.COMMAND
DATA1.FILE
DATA2.FILE
A full volume archive will create an archive volume that contains all of
these files. If DATA1.FILE is changed and a differential archive is performed,
it will create an archive volume that contains only that file. The other files
are not included in this differential archive volume because they have not
changed and there is a current copy of those files in the last full volume
archive.
Should a disk failure occur, the system could be restored by first restoring
the full volume archive and then the last differential archive volume.
608 TArchive
Incremental An incremental archive is an archive volume that includes only those files
Archives that have changed since the last full volume or incremental archive was
created. For instance, in the example used for the differential archive, a
full volume archive is performed and then DATA1.FILE is changed. When the
incremental archive is performed, it creates an archive volume that con-
tains only the DATA1.FILE. When DATA2.FILE is changed and another incre-
mental archive is performed, it creates an archive volume that contains
only the DATA2.FILE. The DATA1.FILE is not included in this archive volume
Commands
because it has not changed since the last incremental archive was created.
Should a disk failure occur, the system could be restored by first restoring
the full volume archive followed by the first incremental archive volume
and then the second incremental archive volume.
Notes The output of the TArchive command is an archive volume. This is a spe-
cial stream file that contains the compressed forms of the archived files
along with their directory entries. This archive volume can be manipulated
like any other file, and it can even be opened and read like any other file.
However, since it is a compressed form of the original files and it contains
the directory entries for the files, it is not usable except by programs that
know how to interpret this information. The Restore command is a pro-
gram that knows how to interpret the information and copy it back to its
original, usable form.
The files in an archive volume are sorted in ascending file name sequence
within account number sequence.
Frequently a file or set of files being archived from hard disk to floppy,
removable hard disk or tape will be larger than the disk or tape. In that
situation the TArchive command will ask you to mount another disk or tape
so that it can continue the archive of the file or files. In this situation each
of the disks or tapes used will contain a single file named ARCHIVE.VOLU-
MEnn (see SHARE option for an exception to this situation).
Unless the DIFFERENTIAL option is used, the modified bit for each file
archived is reset by the archive process.
TArchive 609
Defaults ACCOUNT (Mode 2), ASK, NOQUERY, TYPE, VOLUME (Mode 1 and Mode 4).
Cautions The MULTIUSER option tells the TArchive command to not check whether or
not other users are logged on or active. It does not prevent those other
users from performing operations that change the database being
archived. If another user does change the database during the archive
operation, the integrity of the archive volume is compromised.
Commands
For instance, a disk volume being archived includes a customer master file
with current balance fields and an invoice database. While the archive
volume is being created, another user posts a transaction to the invoice
database before it is included in the archive but after the customer master
file is archived. If the archive volume is ever restored, the invoice database
will not match the current balance fields in the customer master file.
Restrictions Unless the NAME option is used, the destination drive must be an image
drive or some type of a removable mass-storage device such as a floppy dis-
kette, removable hard disk or tape.
610 TArchive
TBackup Command
The TBackup command backs up files to another drive, or restores those files. It can also be
used to verify or compare the backup files to their original source files.
Commands
2 TBACKUP backup ( COMPARE compare-options
TBackup 611
Operation Mode 1—Creates a backup data set on backup of the files specified by file-
spec. Although no options are required, you should specify the SETNAME
for the data set.
1. With a drive code. When this is used, the backup data set is writ-
ten to a file named TBACKUP.VOL00001:backup. The destination vol-
Commands
ume is cleared of all existing files before this data set is created.
>tbackup s tape (backup setname "Weekly backup"
If the data set does not fit on a single volume, subsequent volumes
will be requested and the file names used on those volumes will be
TBACKUP.VOLnnnnn:backup, with nnnnn being a sequential number
incremented for each volume.
The data set must fit in the available space on the destination
drive. If the data set does not fit in the space remaining on that
volume, an error message will display.
With the above command, all files on all drives in the default search
sequence with a file-type of “data,” “program” or “notes ” are backed up to
tape.
file-spec may be omitted, in which case it means that all files on all drives
in the drive search sequence are candidates for the backup. The drive
search sequence is defined in the account environment (see “Account” on
page 13) or by the SEARCH environment variable (see “Set” on page 541).
Unless specifically identified in file-spec the following sets of files are not
backed up with this command:
/SYSTEM.CSI*
/SYSTEM.CSISV*
/SYSTEM.EXEC*
/SYSTEM.PIPE*
/SYSTEM.WORK*
/THEOS/TEMP/SYSTEM.CHIST*
612 TBackup
Mode 2—Compares the contents of a backup data set specified by backup
with the files that it was originally backed up from.
For instance:
Commands
If the source files have been changed since the backup data set was cre-
ated, this compare operation will fail. Remember, in a multiuser environ-
ment, other users may be changing the database during the backup or
between the start of the backup and the comparison operation.
Mode 3—Restores the files from the backup data set to the original loca-
tion of the files.
The DISKMAP option may be used to instruct TBackup to restore the con-
tents of the data set to a drive other than the original source of the backup.
After the restore operation is complete, the A drive will have the file named
S.FILE and the S drive will have the file named A.FILE.
Mode 4—Verifies the readability and integrity of the backup data set
specified by backup. Verifying a data set does not test to see if the data set
is an exact copy of the original file as the Mode 2 compare operation does.
Instead, it does read every byte of the data set, verifies that all of the
checksums are correct, and that every file and “record” in the data set
starts and ends where it should.
TBackup 613
Backup ACCOUNT Only the files owned by the current account are candidates for
Options the backup. This option sets SUBDIR option.
ASK When TBackup is ready to begin writing the backup data, this
option instructs TBackup to ask the operator to mount the des-
tination volume and waits for confirmation that the proper vol-
Commands
ume is mounted.
After you load the proper volume in the disk or tape drive and
acknowledge this message, TBackup looks for an existing file
named TBACKUP.VOLnnnnn. If there is an existing file, TBackup
displays the following information about it:
COMPARE Indicates that, after the backup data set is created, TBackup
should compare the data set against the original files. The
NOASK option is in effect when the comparison starts.
614 TBackup
DIFFERENTIAL Only those files that have their modified bit set are
included in the backup. This is the only option that prevents
TBackup from resetting the modified bit for files that it copies.
See “Differential Backups” on page 629.
Commands
ERROR Specifies that all errors detected during the backup are written
to the indicated file. For instance:
*.data:s
develop\custom/programs/program.source.sample:s
A SELECTED.EXEC file now exists that lists all of the “data” files
and all files that have been changed since 10/01/2001. The fol-
lowing command backs up these files:
FULL The modified bit of a file does not affect whether or not it is
included in the data set. This is a default option that can be
overridden by using the DIFFERENTIAL or INCREMENTAL
option.
TBackup 615
The modified bit is always reset when this option is in effect
and the file is backed up.
INCREMENTAL Tells TBackup to include only those files that have their
modified bit set. The modified bit is reset for each file copied.
See “Incremental Backups” on page 630.
LABEL Specifies that the to-drive’s volume label is set to label. For
Commands
instance:
Use this option only if you are sure that all other users are
inactive and will remain so while the backup is created.
NOEJECT A default option that specifies that the last volume in backup
is not ejected when the backup is complete.
616 TBackup
data set cannot be used for COMPARE, RESTORE or VERIFY
purposes without specifying the exact same password.
PASSWORD Specifies the password to use for encrypting the data set.
When used, the data set cannot be used for COMPARE,
RESTORE or VERIFY purposes without specifying the exact
same password. Passwords may be up to 32 characters in
length, are case sensitive, and may contain spaces and other
Commands
special characters.
SETNAME Specifies the backup data set name. This name may be up to
64 characters in length and it may include letters, digits,
spaces and other punctuation characters. Enclose the data set
name in quotation marks.
The name for a backup data set can be used to ensure that the
proper backup is being used later when it is restored When the
data set is used at a later time, this data set name is displayed
(unless NOASK is in effect). You can specify that the backup
must have the same data set name as specified when you cre-
ated it by using the SETNAME option with the Mode 3 com-
mand.
SUBDIR Tells TBackup that files in the current working directory and
all of its subdirectories are included in the backup.
When not specified, only the files in the current working direc-
tory are included. None of the files in subordinate directories
are included in the backup.
VERIFY Indicates that, after the backup data set is created, TBackup
should verify the readability of the data set. The NOASK option
is in effect when the verify operation starts.
Verifying a data set does not test to see if the data set is an
exact copy of the original file as the COMPARE option does.
Instead, it does read every byte of the data set, verifies that all
of the checksums are correct, and that every file and “record”
in the data set starts and ends where it should.
VOLUME Specifies that file-spec refers to files in all accounts, not just
the current account. The default ACCOUNT option limits file-
spec to files on the current account.
TBackup 617
This option requires a privilege level of five, that you be cur-
rently logged onto the system account, and that the source disk
be a private disk volume or, if it is a publicly attached disk,
that all other users be logged off or that the MULTIUSER option
be used.
WAIT A default option that specifies that TBackup should wait for an
operator response before clearing the status message and exit-
Commands
ing.
date1 The first token that looks like a date is interpreted as a selec-
tion date. Only files with a date stamp greater than or equal to
this date are candidates for the backup. For instance:
With this command only those files on the S drive that have
been changed on or since January 1, 2002 will be backed up.
618 TBackup
Compare ASK This option operates the same as the ASK option on page 614.
Options
DISKMAP Changes the drive codes used during the comparison. For
instance:
Commands
files originally backed up from the S drive are to be compared
with the files on the current D drive.
EJECT This option operates the same as the EJECT option on page
615.
ERROR This option operates the same as the ERROR option on page
615.
LIST Lists the files in the backup to the specified file or device. For
instance, to list the files in the backup to a disk file, use:
NOASK This option operates the same as the NOASK option on page
616.
NOEJECT This option operates the same as the NOEJECT option on page
616.
TBackup 619
PASSFILE Specifies the file name containing an encrypted password. This
password is used to decrypt the data set so that it can be com-
pared against the original data on disk.
The data set must have been created with the exact same pass-
word that is specified here.
PASSWORD Specifies the password to use for decrypting the data set.
Commands
The data set must have been created with the exact same pass-
word that is specified here.
SETNAME This option operates the same as the SETNAME option on page
617.
WAIT Indicates that, after the backup data set is compared and the
status message is displayed, TBackup should wait for an opera-
tor response before clearing the status message and exiting.
620 TBackup
Restore ACCOUNT Restores files matching the file-spec that were backed up from
Options the current account. Compare with the VOLUME option.
>logon data
Commands
from the DATA account are restored.
ASK This option operates the same as the ASK option on page 614.
DISKMAP This option operates the same as the DISKMAP option on page
619.
EJECT This option operates the same as the EJECT option on page
615.
ERROR This option operates the same as the ERROR option on page
615.
FROM Tells TBackup to only select those files on the backup data set
that were owned by account name account at the time the
backup was created. The originating account name is specified
immediately after the FROM keyword.
>logon develop
The above command restores all of the files that were backed
up from the account “PROJECT4” into the current account
“DEVELOP.”
LIST This option operates the same as the LIST option on page 619.
NOASK This option operates the same as the NOASK option on page
616.
NOEJECT This option operates the same as the NOEJECT option on page
616.
NOQUERY A default option that tells TBackup to not ask for confirmation
on each new or existing file being restored.
TBackup 621
To disable this option use the QUERY option.
OLDER Qualifying files are restored only if the backed-up file is older
than the same file on the destination. In other words, files are
restored only if they have been changed since the backup was
made.
The data set must have been created with the exact same pass-
word that is specified here.
PASSWORD Specifies the password to use for decrypting the data set.
The data set must have been created with the exact same pass-
word that is specified here.
622 TBackup
QUERY Tells TBackup that the operator is to be “queried” or asked if
each file matching the selection criteria is to be restored.
Commands
REPLACE This option tells TBackup that it is okay to attempt to restore a
file even if it already exists on the destination drive. When this
option is not used (and the NOQUERY option is not used), an
attempt to restore an existing file causes you to be queried.
SETNAME This option operates the same as the SETNAME option on page
617.
VOLUME Specifies that all of the files on the data set may be restored if
they match the file-spec and other options specified do not
restrict them. Compare with the ACCOUNT option.
WAIT Indicates that, after the backup data set is restored and the
status message is displayed, TBackup should wait for an opera-
tor response before clearing the status message and exiting.
date1 The first token that looks like a date is interpreted as a selec-
tion date. Only files in the backup data set with a date stamp
greater than or equal to this date (new files) are candidates for
restoring. For instance:
With this command only those files in the backup data set with
a file change data of October 1, 2001 or later are restored to the
A drive.
TBackup 623
This command restores only those files from the data set with
a file change date less than or equal to September 30, 2001, are
restored to the A drive. The date 1/1/86 is the earliest date
maintained by the THEOS file system and is interpreted as
“from the earliest date.”
Commands
624 TBackup
Verify Options ASK This option operates the same as the ASK option on page 614.
EJECT This option operates the same as the EJECT option on page
615.
ERROR This option operates the same as the ERROR option on page
615.
Commands
LIST This option operates the same as the LIST option on page 619.
NOASK This option operates the same as the NOASK option on page
616.
NOEJECT This option operates the same as the NOEJECT option on page
616.
The data set must have been created with the exact same pass-
word that is specified here.
PASSWORD Specifies the password to use for decrypting the data set.
The data set must have been created with the exact same pass-
word that is specified here.
SETNAME This option operates the same as the SETNAME option on page
617.
WAIT Indicates that, after the backup data set is verified and the sta-
tus message is displayed, TBackup should wait for an operator
response before clearing the status message and exiting.
TBackup 625
Defaults Mode 1 (BACKUP) defaults are: ASK, FULL, NOEJECT. ACCOUNT is a default
when file-spec specifies a drive code only. NOASK is the default and cannot
be overridden when backup is a file name specification.
Notes Because of the compression algorithm used, some files may be larger than
the original source file. For instance, a backup of a zipped file or a file that
has already been compressed with the Compress command will be larger
than the original file.
Backup Data The output of the TBackup command is a backup data set. This is a spe-
Set cial stream file that contains the compressed forms of the files along with a
catalog of the files on the data set. This data set can be manipulated like
any other file, and it can even be opened and read like any other file. How-
ever, since it is a compressed form of the original files and it contains the
directory entries for the files, it is not usable except by programs that
know how to interpret this information. TBackup is the only supplied pro-
gram that knows how to interpret the information and copy it back to its
original, usable form.
Frequently a file or set of files being backed up from hard disk to floppy or
tape will be larger than a single diskette or tape. In that situation the
TBackup command will ask you to mount another diskette or tape so that it
can continue the backup of the file or files. In this situation each of the dis-
kettes or tapes used will contain a single file named TBACKUP.VOLnnnnn.
Unless the DIFFERENTIAL option is used, the modified bit for each backed-
up file is reset by the TBackup process.
626 TBackup
TBackup TBackup, invoked with Mode 1 (BACKUP) displays the following status
Screens screen while it is collecting information about the files:
Commands
The file counts do not include libraries or directories, only files.
After TBackup has collected all of the file names that it is going to copy, it is
ready to start the first volume of the data set:
After mounting the tape it is read and you are asked to confirm that it is
the proper tape to use:
TBackup 627
TBackup, invoked with Mode 2 (COMPARE), Mode 3 (RESTORE) or Mode 4
(VERIFY), displays screens similar to the following status screen while it is
collecting information and comparing, verifying or restoring files:
Commands
The ECC counts refer to the number of errors detected using the error-cor-
recting checksum fields in the data set.
Full Volume A full volume backup of a drive can be made easily with the TBackup com-
Backups mand by using the VOLUME option and using a file-spec that specifies a
drive-code only.
Multivolume You can backup your entire system in one operation by performing a full
Backups volume backup for all drives on the system. For instance, a system with
four hard drives can be archived with the command:
>show search
SEARCH = SAB
628 TBackup
When the file-spec is omitted, TBackup uses the default search sequence as
the file-spec specification. The above command is identical to:
Should the need every arise where you want to restore the files on this
backup volume, use the restore mode of the TBackup command (Mode 3 ).
Commands
>tbackup tape (restore
When file-spec is omitted with the restore mode, TBackup restores all of the
files in the backup volume to their original locations.
Differential A differential backup is a backup that includes only those files that have
Backups changed since the last full-volume backup. For instance, if a disk contains
three files:
PROGRAM.COMMAND
DATA1.FILE
DATA2.FILE
A full-volume backup will create a backup data set that contains all of
these files. If DATA1.FILE is changed and a differential backup is performed,
it will create a backup data set that contains only that file. The other files
are not included in this differential backup because they have not changed
and there is a current copy of those files in the last full-volume backup.
Should a disk failure occur, the system could be restored by first restoring
the full-volume backup and then the last differential backup.
TBackup 629
Incremental An incremental backup is a backup that includes only those files that have
Backups changed since the last full-volume or incremental backup was created. For
instance, in the example used for the differential backup, a full-volume
backup is performed and then DATA1.FILE is changed. When the incremen-
tal backup is performed, it creates a backup data set that contains only the
DATA1.FILE. When DATA2.FILE is changed and another incremental backup is
performed, it creates a backup data set that contains only the DATA2.FILE.
The DATA1.FILE is not included in this backup because it has not changed
Commands
Should a disk failure occur, the system could be restored by first restoring
the full-volume backup followed by the first incremental backup and then
the second incremental backup.
Cautions The MULTIUSER option tells the TBackup command to not check whether or
not other users are logged on or are active. It does not prevent those other
users from performing operations that change the database being backed
up. If another user does change the database during the backup operation,
the integrity of the backup data set is compromised.
Automated To use the TBackup command for automated backups, be sure that you
Backups have mounted the proper backup volume before the backup is initiated
and use the following options:
630 TBackup
Restrictions When creating a backup data set (Mode 1), the destination media must be
preformatted. If the backup requires more disks or tapes than anticipated,
you can use another session or terminal to format the disk or tape while
TBackup waits for you to confirm that the proper volume is mounted. To do
this, the ASK option must be in effect and the destination drive must be
publicly attached.
When creating a backup (Mode 1) with option VOLUME in effect and the
Commands
drives specified in file-spec are publicly attached, all other users must be
logged off or the MULTIUSER option must be specified. See “Caution” notes
above regarding the MULTIUSER option.
TBackup 631
Commands
632 TBackup
TBrowse Command
The TBrowse command displays and allows you to browse the contents of HTML-encoded
files.
1 TBROWSE url
Commands
2 TBROWSE file
Operation Mode 1—Open the HTML page defined by url and display the hypertext
content.
>tbrowse www.theos-software.com
>tbrowse www.mydomain.com/private/page44.htm
Mode 2—Open the local file and display the hypertext content.
>tbrowse /html_home/webpages/default.htm
TBrowse 633
dow. In this case, a horizontal scroll bar will appear at the bottom
of the window. Use your mouse to scroll left and right.
634 TBrowse
Tee Command Filter
The Tee command copies standard input to standard output and makes additional copies to
a file.
Commands
file » file name with optional path
option » APPEND
Operation The file from the standard input device is copied to both the standard
output device and to file. If multiple files are specified, then multiple
copies are made, one to each file.
The above command line creates a directory listing of the S drive. The list-
ing is piped to the Tee command, which makes a copy of it in the file
FILE.LIST:S and also pipes it to the More command, which displays the direc-
tory listing on the console.
file
Options APPEND The output is appended to the end of file. Without this option,
the output replaces file.
Notes The file specified with this command may have a complete path specifica-
tion, including the account name. However, when file is on another
account, it is created using default attributes which include shared read
and shared write protection. Therefore, the file is created but data cannot
be written to it from non-owning accounts. Use the CREATE environment
variable to set default attributes allowing shared file write access. See
“CREATE” on page 102.
Tee 635
Commands
636 Tee
Telnet Client
The Telnet command establishes a client/server connection between this THEOS system and
a remote Telnet server system. The remote system need not be THEOS-based.
Commands
2 TELNET server port ( options
localhost » LOCALHOST
server » network server name or id (may also be localhost)
port » numeric port number to use for this session
options » ANSI ECHO PCTERM TRACE
CLASSnnn FLOW PCTERM-aa VT100
CTL NOPROXY PROXY VT220
Operation Mode 1—Invokes the Telnet client and connects to server using its stan-
dard Telnet port number (23). Refer to “Server Specification” on page 642 for
information about the server parameter specification.
Mode 2—Invokes the Telnet client and connects to server using its port
number port. Do not use this mode unless you know that the remote server
uses a nonstandard port for Telnet access.
The port value may be specified with a numeric, such as 23, or a name.
The name must be the name of a well-known service, such as FTP, HTTP,
etc. Service names are defined in the file /THEOS/CONFIG/SERVICES.TXT:S.
CLASSnn Emulate a PcTerm with the requested class file. The class code
number is in the range 180–189 or 210–219. The 180 series
does not support intense background colors; the 210 series does
support intense background colors.
Telnet 637
This option tells the Telnet client to echo all outbound charac-
ters. This character-echo might be in addition to the remote
server or the application running on the server. If characters
are displayed twice, then terminate this session and reconnect
without the ECHO option.
638 Telnet
PCTERM
PCTERM-aa Emulate PcTerm terminal display and specified language
keyboard. When -aa is not specified, the current default key-
board definition is used.
-aa Language
-UK English (United Kingdom)
Commands
-FR French
-GR Greek
-IT Italian
-SP Spanish
-SG Spanish, Catalan
-LA Spanish, Latin American
-CF Canadian/French
-BE Belgium/Dutch
TRACE All characters displayed by the Telnet client are also copied to
the file TELNET.TRACE. If FLOW is also specified, those charac-
ters are also copied to this file.
All characters copied to the trace file are copied in CTL mode,
even when the display uses interpreted control codes.
Telnet 639
VT220 Requests VT-220 terminal emulation by the remote server.
(Class code 220 on THEOS Telnet Server.)
Notes Telnet is one of three clients used to connect as a user to another computer
system on the network.
RFC 854. This Telnet client conforms to the standards proposed in RFC
854. That document can be found at many sites on the Internet, including:
http://www.faqs.org/rfcs/
When connected to the remote server, you may execute any programs on
that server that you have access to.
Telnet can connect to a THEOS Login Server only if the THEOS system has
its Login Server started. When connected to a THEOS Telnet Server, you
are emulating a “dumb terminal” connected to the THEOS system. You
will not be able to use your local printer as a slave printer and you cannot
transfer files back and forth with the Net command.
Localhost: For testing purposes, you can connect to your own system’s
Telnet server by using the server name of localhost. This is a reserved host
name that always refers to the client system.
640 Telnet
Console Attachment: When you first connect to the THEOS Telnet Server
your console attachment will have a line and page size that is equal to your
local system’s line and page size. After you logon you may change the con-
sole attachment to another size supported by your local system. If you
change your console screen size during the Telnet session, when you termi-
nate the session your console will be reset to its original width and depth.
Commands
the THEOS Telnet Server, use the (`) key (single back quote). For instance,
to tell the THEOS Telnet Server to abort the program that it is running,
press (`),(Q). To type a back quote that is not interpreted as a break signal,
press (`),(`).
Non-VT220 emulations can use the (Break) key itself to transmit a break sig-
nal.
A Telnet session is terminated and the Telnet program is exited when you
either fail to make a connection to the Telnet Server or, after making the
connection, you use the server’s “log off” command. The name of this com-
mand is dependent upon the server but will generally be LOGOUT, BYE,
QUIT or something similar. Of course, when the server is a THEOS Telnet
Server, use the EXIT command.
Telnet 641
Server Specification
128.100.2.1
headquarters
my-company.com
Restrictions When the remote server is THEOS-based, and the “Allow/Deny” capability
is enabled, your IP address must pass those tests. Other servers may have
similar access restrictions implemented.
Also, when the remote server is a THEOS Login Server, it may have
enabled its “Remote User Security,” in which case you will be required to
enter your network user name and password as defined in the server’s
Setup Net Network User Security database. (See THEOS Corona Version 5
Operating System Installation and Setup Guide.)
642 Telnet
Example This first example shows a successful connection to an ISP.
>telnet ispname.com
Commands
login: cpw
Password:
Other information messages from the remote Telnet server, such as:
>telnet theos
Telnet 643
In this final example, a connection is made to the home office system over
the Internet. The name is defined in your host names database. This
system is THEOS-based and has remote security enabled. (The screen is
cleared before the Network login window is displayed and after you have
successfully entered your user name and password.)
>telnet home-office
Connecting...
Password: [******** ]
HOMEOFFICE>show who
ACCOUNT = REMOTE
USERNUM = 25
PORT = 36
PRIVLEV = 3
LOGON = 11:10:20 11/14/97
HOMEOFFICE>
644 Telnet
Terminal Command EXEC
The Terminal command is an EXEC language program that provides convenient, command-
line access to the THEO_COM command’s terminal emulation capability.
Commands
TERMINAL ( options
Operation This EXEC program merely invokes the THEO_COM command described
described on page 649. It is provided for users upgrading to THEOS
Corona from a prior version of THEOS that might have not included
THEO+COM™.
For operation and usage of this TERMINAL EXEC, refer to the THEO_COM
command or to the THEO+COM Installation and User’s Guide.
Terminal 645
Commands
646 Terminal
TFTP Command
The TFTP command is a Trivial File Transfer Protocol client that provides file transfer capa-
bilities over a network between this client and any TFTP server available on the network.
Commands
2 TFTP SEND host filename remote-filename
host » server
server:port
filename » name of file on local client system containing FTP script
remote-filename » name of file on local client system containing FTP script
server » name or id of TFTP network server (may also be localhost)
port » port number on server for TFTP communication (default is 69)
Operation Mode 1—Receive a file from a TFTP server. This client connects to the
TFTP server located at host and receives the file named remote-filename
from that server and saves it on this system with the name filename. If
remote-filename is not specified then filename is used for requesting the
remote file from the host.
Mode 2—Send a file to a TFTP server. This client connects to the TFTP
server located at host and sends the file named filename from this system
to the remote host. The server is requested to receive the file and save it
with the name remote-filename. If remote-filename is not specified then
filename is used by the server when it saves the file.
Notes TFTP is a simple protocol to transfer files using the Internet User Data-
gram protocol (UDP). Data is sent in fixed-length blocks of 512 bytes. Each
data packet must be acknowledged by the recipient before the next packet
is sent. Most errors will cause termination of the transfer.
Defaults The default port number used by this client is 69. This is a “well-known”
port for TFTP clients and servers. You should only specify a different port
if you know that the server that you are attempting to connect to uses a
different port number.
Restrictions Only sequential files may be sent or received with this client.
TFTP 647
Commands
648 TFTP
THEO+COM Command
Commands
THEO+COM ( options
Operation Invokes THEO+COM in terminal emulation mode. The remote system must
be connected to the first communications port on your system.
Use command-line options or the built-in menu to perform any of the func-
tions supported by THEO+COM or to change the configuration. The built-in
menu is invoked by pressing (Break),(M).
Options ALF Tells THEO+COM to add a line-feed at the end of every line
transmitted. When this option is omitted, CR is used as the
default End-of-Line character.
ASCII Uses the ASCII protocol to send and receive files from the
remote computer system.
THEO+COM 649
C90-C99 Synonym to the PCTERM option.
CTL Sets control mode on. With control mode on every control char-
acter received in terminal emulation mode is displayed as two
characters. For instance, Control-I is displayed as ^I.
EOF= Sets the character used to mark the end of a file transmitted
with the ASCII protocol.
EOT Used with the SEND file option to indicate that the end-of-
transmission character is sent after all of the files are trans-
mitted. This is a default option.
FILES Can be used with the THEOS protocol and the SEND file option.
It indicates that the file contains a list of files to be sent. This
file is typically created by the FileList with its option FILES.
650 THEO+COM
MASTER Use master-mode duplex communications in terminal emula-
tion. Each character typed is displayed on your screen. Each
character received from the remote system is echoed back to
that system.
NOEOT Can be used with the THEOS protocol and the SEND file option.
It indicates that no end-of-transmission character is sent after
the last file is transmitted.
Commands
NOLOGO Suppress the THEO+COM logo and copyright screen.
RECEIVE file Receive file from the communications port. The transmis-
sion protocol is specified with other options or it uses the
default THEOS protocol.
SCRIPT file Execute the Modem Script Language file file. Refer to the
THEO+COM Installation and User’s Guide for a description of
the Modem Script Language.
SEND file Send file on the communications port. The transmission proto-
col is specified with other options or it uses the default THEOS
protocol. file may contain wild cards.
THEOS Use the THEOS protocol to send and receive files from the
remote computer system.
TRACEFILE file Similar to the TRACE option, except the protocol activity
is output to file.
THEO+COM 651
VT100 Emulate a DEC VT100 compatible terminal. C100 may be used
as a synonym to this option.
652 THEO+COM
TheoMail Client
1 THEOMAIL ( option
Commands
2 THEOMAIL mailbox ( option
Operation Mode 1—Invokes the TheoMail client program using the default mailbox
for the account that you are currently logged on to. For information about
mailboxes and default mailboxes, refer to the THEO+Mail User’s Guide
and Reference manual.
Mode 2—Invokes the TheoMail client program using the specified mailbox.
NOPROXY This option invokes TheoMail and tells it to not use any Proxy
Server setting from the SETUP SMTP configuration, even if one
is specified there. You should not use this option unless you
TheoMail 653
have an alternate connection to your SMTP and POP3 servers
available.
Notes If the mailbox has a password defined, you must enter the password for
Commands
Unless the COMPACT option is used, when you start TheoMail the mailbox
database is checked for integrity. If the database is large (tens or hundreds
of megabytes), this may take some time. During this time the copyright
message is displayed which lets you know that has started.
If the database appears corrupt or has a lot of unused space in it, you are
warned about the situation and, after acknowledging the warning, the
database is rebuilt using the same function as the Tools Menu, Compact
menu item. If this happens often it is an indication that something serious
is wrong and you should contact your system administrator.
After TheoMail checks the integrity of the database it checks the Sent and
Deleted folders to see if there are any messages that should be removed.
This is done during TheoMail exit and at startup time just in case TheoMail
was exited abnormally the last time it was used.
TheoMail first checks the Sent Expiration setting. If it is non-zero the mes-
sages in the Sent folder are examined to see if they qualify for deletion.
Any messages in that folder that are older than the Sent Expiration value
are moved to the Deleted folder.
Unless the CHECK or SEND options are specified, if the Check for New Mail
item in the Tools Menu, Options screen (see the THEO+Mail User’s Guide
and Reference manual) specifies a time frequency for automatic mail
checking, mail is checked as soon as TheoMail starts.
When the TheoMail client is invoked from an EXEC program you may use
the &Stack or &BegStack statements to initiate actions by the client pro-
gram without operator input. When TheoMail is invoked with an EXEC it
654 TheoMail
may operate differently depending upon whether there is data on the
EXEC stack and what that data is.
Commands
&Stack Q\
TheoMail mymail
EmailChk mymail
&If &RetCode > 0
EmailGet mymail
&IfEnd
In the above example, the “Q” in the first line is a Control-Q. This can be
entered with WindoWriter by using the Tools menu, Control Characters font.
Enter the letter “Q” and then use Tools menu, Normal Font to return to
normal text input. The above EXEC invokes TheoMail using the “mymail”
mailbox and gets any incoming mail. It then used EmailChk to see if there is
any new mail and, if so, uses the EmailGet to extract that mail to a stan-
dard text file.
If there is data on the EXEC stack but the first character is not a Control-
Q, TheoMail will not try to perform any automatic check for incoming mail
but will instead accept those stacked characters as normal input. For
instance:
&BegStack
[CNTheos Support <[email protected]>
Problem Report
&End
TheoMail mymail
In this example, the “[” character in the first line is a Control-[ or the Esc
character. This EXEC invokes TheoMail and starts the composition of a
new message to THEOS Technical Support. The cursor will be positioned
to the body of the new message, ready for the operator to enter the text.
Defaults The default mailbox used when TheoMail is invoked without specifying a
mailbox is determined by the current account name that you are logged on
to. This relationship between account names and default mailboxes is
defined in Setup Email, which is described in THEOS Corona Version 5
Operating System Installation and Setup Guide.
Restrictions Only one user may use a mailbox at any one time.
TheoMail 655
Commands
656 TheoMail
TIM Command
The TIM command invokes the THEOS Instant Messenger and allows you to communicate
with other users that are in your contact list.
1 TIM
Commands
2 TIM passport password
3 TIM passport
Operation Invokes the THEOS Instant Messenger using either the default passport
account (Mode 1) or the requested account.
Mode 1—This mode starts in one of two ways, depending upon whether or
not the TIM_PROTO and TIM_AUTOLOGIN environment variables are
defined. If these variables are defined then TIM signs onto the default
account. Otherwise, it displays the Sign-In Form allowing you to specify the
protocol, account and options desired for this session.
Mode 2—Invoke TIM and display the sign-in form with passport and pass-
word filled in:
TIM 657
Click on “Ok” to sign in. Refer to User Interface for descriptions of the vari-
ous fields.
Mode 3—Similar to Mode 2 except the password is not typed in the com-
mand line and therefore is never displayed in clear text.
Notes The TIM command uses a central configuration file to maintain the infor-
mation about the passport account to use and the options desired for that
Commands
account. You may have multiple accounts defined and there may be multi-
ple instances of TIM in use on one system at any one time.
During the normal operation of TIM, it may need to open several windows.
Since the software does not know how you want your screen arranged,
each of these windows is initially positioned in the center of your screen.
You should drag the windows to other positions so that you can see each of
the windows on your desktop. The position that you drag them to will be
remembered by TIM during this session.
When the TIM command is exited you are signed off of the passport
account.
Defaults There are two environment variables that can be used by TIM. If these
variables are defined and have values then those values are used as the
defaults. The variables are:
TIM_PROTO Specifies the default protocol to be used by TIM. Set this vari-
able to MSN, TIMP or YAHOO.
For ease of use, these variables can be defined in the Account profile
Before defining these variables refer to “First-time Usage” on the next page.
Restrictions This program requires an internet connection. You must also have an
account on one of the supported protocol servers.
See also FileManager, FTP, Mailbox, Msg, Receive, Send, TFTP, TheoMail
658 TIM
First-time Before using THEOS Instant Messenger for the first time you must have a
Usage passport account. Specifically, in order to use the MSN version 7 protocol
you must have a passport account with the .NET service provided by
Microsoft. If you do not have a passport account or if you want to have an
additional account, use your web browser and connect to
http://www.passport.com and click on the “Sign up for your free .NET
Passport today” link.
Commands
When signing up for the new passport account you are asked for an E-mail
address and a password. The password it is asking for is the password that
you want to use for the passport account and it should not be the same as
your E-mail account password. The E-mail address will be used as your
account name and, although you are not normally sending or receiving E-
mail with TIM, the address must be a valid address at the time that you
sign up for the passport account. After signing up for the account the pass-
port system will send an E-mail message to the account asking the owner
of the account to confirm that they (you) wanted this passport account.
After you have acquired a passport account you can define the environ-
ment variables TIM_PROTO and TIM_AUTOLOGIN.
>set tim_proto=MSN
>set [email protected]
Once this has been done and you invoke TIM it asks you to supply the pass-
word. After that initial sign-in TIM will remember the password for that
account and you can invoke TIM and it will sign into that account automat-
ically.
TIM 659
User Interface When TIM is invoked without the environment variables TIM_PROTO and
TIM_AUTOLOGIN defined or when this default account is bypassed, the TIM
sign-in form is displayed allowing you to specify the protocol, account and
password for that account.
Sign-In Form
Commands
The protocol selected tells TIM where to find the server for
passport names and, at the server, it can find your list of con-
tact names, etc.
Options Select this button to set or change the options associated with
this passport name. This option screen is described on page
661. You cannot change the options until there is a Passport
and a Password defined.
Passport Enter the passport account name. For the MSN V7 protocol,
this is an E-mail account name and domain name. For
instance, [email protected].
660 TIM
Password Enter the password for the passport account. This is a case-
sensitive field and the password is not displayed as you type it.
Be careful to enter it correctly.
When you select the Ok button or the Options button for an account that
has not been saved before, you will be asked if you want to add it to the
database. If you have entered the name and password correctly respond
with a “Yes.” Otherwise, respond with a “No” and you can make the neces-
Commands
sary changes.
The above form is normally only displayed when you are signing in to a
passport name that you have not used before. However, you may display
this screen (to get to the Options button) by signing on to a passport and
then changing your Status to “Offline.” This will cause the above form to
display and you can either sign on to another passport, create a new sign
on or change the options of an existing passport.
TIM Options
The options form is used to configure the various options that can be spe-
cific to an account.
Password This field is used when you need to change the password that
you have saved for this account. Making a change in this field
does not change the password that has been recorded at the
instant messenging protocol server for your account. It only
changes the profile that is saved and used by TIM.
TIM 661
Font Selecting this button invokes the Fonts form described below.
Use EmotIcons When enabled you can send and receive emoticons during
chat conversations.
Show a message when someone logs in If enabled, when one of your regis-
tered contacts signs on a message will be displayed on the
active session of this console.
Download path The path specified in this field is used when you receive a
file. You can either type in the path that you want to use or use
the Browse button to search for the desired location.
Show away after xx minutes When your console is idle for a period of time,
TIM will change your status to “Appear away.” The length of
that time is specified here.
Fonts
The font selection form is used to defined the font used to display the mes-
sage text in the Message history and Message text boxes when chatting with
a contact.
Font This area lists the fonts that are available on this system and
highlights the font that is currently defined as the display font.
You can move this highlight bar to any of the available fonts.
662 TIM
Style The style list box shows the various font styles that are avail-
able with the Font that is currently selected and it highlights
the style that is currently selected.
Size This list box shows the font sizes that are supported by TIM
and highlights the size that is currently selected. The sizes
Commands
range from 8 pts to 72 pts. A point is 1/72 of an inch and is a
standard unit of measurement in typography.
Effects Strikeout Checking this box will display the text with a line
through the characters:
Color This list box shows the colors that are supported by
TIM and shows the currently selected color.
Sample This area displays a sample using the selected Font, Style, Size
and Effects.
Downloads
The Download path in the TIM Options form allows you to specify the loca-
tion where all received files are to be saved. You may either type in the
path or use the Browse button to search for an existing directory to use.
The path specified here is used when you receive a file from a contact
during a chat session (see “XFile” on page 668).
TIM 663
Commands
Connection Options
Use proxy This field must be checked to enable the other fields on this
form and to enable the usage of a proxy server.
Type Use the drop-down list to select the type of proxy server.
Server Enter the IP address of the proxy server that you are using.
664 TIM
Port The default port number is set when the Type of proxy is
selected. You may override that default and set the port to
another value if you wish.
Commands
TIM 665
Using TIM
After you have signed on to your passport account TIM displays the contact
list form:
Commands
Contact list The contact list is the large box in this form. It lists each of the
users that have been defined as your contacts and it shows
each of the “nick names” or “screen names” that the contacts
have defined, along with their current status. When any of
these contacts change their status, you will see this list
updated within seconds.
Nick name This is your “screen name” or nick name. It is the name that
other users on your Contact list will see you as.
666 TIM
Status This field defines your status as others see you.
Commands
The status field is only an indicator to others of what you want
them to see. Except for “Offline,” all of the status labels are
just comments. Changing your status from “Online” to “Away”
or “Busy” does not prevent others from trying to imitate a ‘con-
versation’ with you.
Sort by You can refresh or change the order of the displayed contacts
by selecting this field.
Chat Selecting this button initiates a chat session with the currently
highlighted contact in the Contact list. When the button is
pressed the chat form is displayed (shown on page 668).
Add This button allows you to add another contact to your list.
Block Use this button if you want to block messages from the cur-
rently highlighted contact in the Contact list.
TIM 667
Chatting with a contact
When you select the Chat button or when a user on your Contact list ini-
tiates a chat session with you, the following form is displayed allowing you
to enter messages to be sent to the other user and allowing you to see the
“conversion” as it progresses.
Commands
Message history The top text box is an area that shows the message his-
tory. Every message from the contact to you and every mes-
sage from you to the contact is displayed here. When the list of
messages is longer than the display area a vertical scroll bar
appears. You can you this scroll bar to look back in the conver-
sation.
Message text The bottom text box is the area that you use to type your
message to the contact. When entering the text, do not press
(Enter) until you are ready to send. Although the text might
appear as a long line of characters, when it is sent and when it
is displayed in the Message history field, it is formatted to fit the
area available.
XFile Selecting this button allows you to send a file to the contact
that you are chatting with. Refer to “Sending and Receiving
Files” on page 671 for information about sending and receiving
files with contacts.
Font Selecting this button invokes the Fonts form described on page
662.
668 TIM
EmotIcons
Invite This button allows you to ask another member of your contact
list to join in the chat conversation. When selected you are pre-
sented with a form that allows you to select the contact name
that you want to invite into the conversation. Only the contacts
that are currently signed on are offered.
Commands
Send The “Send” button causes any and all of the text that you have
typed in the Message text field to be sent to the contact. It is
also reformatted and displayed in the Message history field.
Exit This button exits the chat session and offers you a chance to
save the text of the session in a file:
TIM 669
If you choose “Yes” you will be offered the standard file save
dialog box and you can specify the location and name of the file
to save this chat session text.
You can add a new contact to your contact list at any time. Merely select
the Add button when the Contact List form has the focus.
Commands
Email address Enter the email address of the person that you want to add
to your contact list.
Group Select the group that you want this contact listed as.
670 TIM
Sending and Receiving Files
During a chat conversation you can send a file from your system to the
contact’s system by selecting the XFile button of the chat form. When this is
done you are presented with a standard file selection form allowing you to
select the file that you want to send to the other party.
Commands
After the file is selected and the Open button is pressed, a request is sent to
the contact that you are chatting with asking them to either accept the file
transmission or to decline it. At the same time your chat form displays a
message stating that you are waiting for the other party. When they
accept, the file is sent to them and messages are displayed on both chat
forms reporting the progress and status of the transfer.
TIM 671
Commands
A similar but reverse process occurs if the contact wants to send you a file.
After they select the file that they want to send to you a message pops up
asking if you want to accept the file.
672 TIM
Touch Command
Commands
2 TOUCH date file
file » file name with optional path; may contain wild cards
options » DATE reffile date
NOTYPE time
TYPE
date » date in current DATEFORM format
time » time specification using colon delimiters
Operation Mode 1—The date and time-stamp on file is changed and the modified
attribute is set.
If no options are used, the date is set to the current date and time.
>touch example.file
File "EXAMPLE.FILE:S" touched: 10/22/01 10:22:54
One file changed.
Mode 2—The date-stamp for file is changed to date. The time is set to
08:00.
Touch 673
Options DATE reffile Set the date and time of file to the date and time of reffile.
NOTYPE Suppress the display of result messages and the summary line.
TYPE A default option that displays the results of each file changed
and a summary line of the total number of files changed.
Commands
>touch example.*
File "EXAMPLE.BASIC:S" touched: 10/12/01 11:02:22
File "EXAMPLE.INDEXED:S" touched: 10/12/01 11:02:22
File "EXAMPLE.DIRECT:S" touched: 10/12/01 11:02:22
File "EXAMPLE.FILE:S" touched: 10/12/01 11:02:22
File "EXAMPLE.MAIL:S" touched: 10/12/01 11:02:22
File "EXAMPLE.DIRECT1:S" touched: 10/12/01 11:02:22
File "EXAMPLE.COMMAND:S" touched: 10/12/01 11:02:22
7 files changed.
date Set the date of file to date. If time is not specified, the time is
set to 08:00:00.
The earliest date that you can use in the THEOS file system is
01/01/86.
time Set the time of file to time. If date is not specified, date is set to
the current date.
Notes A file specification can omit the file-type if the environment variable
FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111 of the THEOS Corona Version 5 Operating System Ref-
erence manual.
The display of the Touch command (output when option TYPE is in effect),
is output to stderr, not stdout. To redirect this output use the >& operator.
Defaults The current date and time are used unless otherwise specified.
674 Touch
TraceRT Client
The TraceRT client reports the path and the time taken for a message to be sent to and
received from a remote host. “TRACERT” stands for “TRACE ROUTE.”
1 TRACERT server
Commands
2 TRACERT server ( options
Operation Mode 1—Traces the route between you and server, using default options
of RESOLVE, and HOPS 30.
>tracert www.theos-software.com
Tracing route to WWW.THEOS-SOFTWARE.COM (65.45.113.228)
over a maximum of 30 hops.
1 20 ms 10.88.74.1
2 20 ms bb1-ge2-1.potlnd1.or.home.net (65.4.47.1)
3 14 ms c1-pos5-2.ptldor1.home.net (24.7.75.229)
4 23 ms c1-pos1-0.snfcca1.home.net (24.7.64.22)
5 23 ms c2-pos1-0.snjsca1.home.net (24.7.65.161)
6 24 ms above-athome.sjc2.above.net (208.185.175.133)
7 106 ms core4-core3-oc48.sjc2.above.net (208.184.102.198)
8 24 ms pao1-sjc2-oc48-2.pao1.above.net (208.185.175.162)
9 26 ms allegainace-abovenet.allegiancetelecom.com (216.200.249.90)
10 28 ms POS3-0.SNFECAEJ15W.core.algx.net (66.2.95.101)
11 28 ms SNFECAEJ05W.gw.SFO.algx.net (216.99.234.11)
12 33 ms 65-45-94-218.customer.algx.net (65.45.94.218)
13 48 ms WWW.THEOS-SOFTWARE.COM (65.45.113.228)
Trace complete.
Mode 2—Traces the route between you and server, using the specified
options.
1 11 ms 10.88.74.1
2 10 ms 65.4.47.1
3 11 ms 24.7.79.17
4 23 ms 24.7.64.22
5 25 ms 24.7.65.157
6 25 ms 129.250.9.85
7 24 ms 129.250.3.121
8 25 ms 129.250.3.162
9 28 ms 129.250.3.34
10 27 ms 129.250.3.18
Trace complete.
TraceRT 675
Options HOPS count Specifies the maximum number of segments or hops to
report. If server is not reached within this number of hops, the
trace is abandoned. The default number of HOPS is 30.
Notes TraceRT is used to determine how many routers are involved in a particu-
lar connection to a remote site. Often this will explain why access to some
sites appears slow while others are quick to respond. Each router in the
path requires additional time to transmit each packet of data. This is par-
ticularly noticeable when viewing web pages. Many HTML pages require
hundreds of packets of data to be communicated back and forth before the
page is completely displayed on the screen.
TraceRT attempts to trace the route that an IP packet travels between you
and server. It does this by sending a short packet to an unused port on
server. The message is sent as many times as specified with the HOPS
option, or a default value of 30. A field in the header of the packet is used
to cause the packet to fail at each of the routers in the path of the message.
The time displayed by TraceRT for each of the hosts is the round trip time
that it took for the message to get to that router and return to you.
The times reported by TraceRT will be different, almost every time that it
is run. The amount of traffic on the Internet is constantly changing, from
millisecond to millisecond. Heavy traffic causes slow delivery because of
message collisions and retransmissions over each of the various mediums
between you and the destination.
676 TraceRT
Tree Command
1 TREE ( options
Commands
2 TREE path ( options
Operation Mode 1—Starting at the current working directory, the directory tree
structure is displayed on the standard output device.
>pwd
/VERTICAL:S
>tree
/vertical
doc
programs
files
programs
>pwd
/VERTICAL:S
>tree /package
/package
doc
programs
Tree 677
Options NOSORT Causes the directory tree to be displayed in the sequence it is
found on disk. No sorting of the directory names is attempted.
>tree (nosort
/
data
vertical
doc
programs
Commands
files
programs
package
doc
programs
misc
programs
doc
PRTnn Indicates that Tree is to print the current directory tree struc-
ture on the attached printer number nn.
SIZE Includes a count of the files in the subdirectory and the total
disk space used by those files.
>tree (size
/ ............................... (1186, 29012K)
data ......................... (219, 17205K)
misc ......................... (27, 77K)
doc ....................... (2, 16K)
programs .................. (23, 54K)
package ...................... (248, 3162K)
doc ....................... (5, 4K)
programs .................. (240, 3150K)
vertical ..................... (648, 8401K)
doc ....................... (33, 62K)
files .................. (19, 27L)
programs ............... (11, 27K)
programs .................. (413, 4062K)
678 Tree
SORT A default option that sorts the directory tree structure in
alphabetical sequence.
>tree (size
/
data
misc
doc
programs
Commands
package
doc
programs
vertical
doc
files
programs
programs
Notes The line-graphics characters used to show the directory hierarchy are sup-
pressed if the environment variable LINEGRAPH is set to “N.”
Tree 679
Commands
680 Tree
TWS Command
The TWS command allows users of the THEOS WorkStation Client on a Microsoft Windows
system to control the behavior of the client session window or control the Gutenberg slave
printer to the TWS client.
1 TWS function
2 TWS Gutenberg-function
TWS
Gutenberg-function » ALIGN FONT PRINT_WINDOW
BARCODES HAS_FONTS REC_PAGE
CHANGE_AREA IMAGE ROTATE
CHECK_PRINTERLIST_FILE SELECT_AREA
CLOSE MODE SETPOS
COLOR NEW_FILE SIZE
DEFAULT_UNITSPICTURE STYLE
ERASE_FILE PRINT_NEXT_PAGE TEXT_FILE
FIELD PRINT_RECORD
FILE_RECORDSPRINT_TXT
Operation Mode 1—Performs function on the THEOS WorkStation Client session win-
dow.
>tws ontop on
The above commands prevent the operator from disconnecting from the
THEOS Login Server and from changing the focus or size of the window
used by the THEOS WorkStation Client. Additionally, the window will
remain displayed on top of all other windows, even if the Net or Remote com-
mand is used to execute another program.
TWS 681
Mode 2—
Functions These functions are used to control the TWS session and its display win-
dow:
ACCOUNT
CHANGE This option allows you to control whether or not the TWS ses-
sion can lose the focus:
FOCUS Causes the TWS program to become the active window on the
client system. If the session window was minimized, it is
restored to its prior size as it is activated.
FULL The window used by the TWS session is set to full screen. Sim-
ilar to MAXIMIZE except there is no frame, scroll bars, menu
682 TWS
bar, title, etc. The entire screen of the Windows system is used
for the display of the THEOS server session.
MAXIMIZE The window used by the TWS session is set to its largest size.
Commands
ONTOP This option controls whether or not the display of the TWS ses-
sion is on top of all other windows displayed on the Windows’
console, or not:
RECEIVE
RESTORE The TWS session window is restored to its size before being set
to maximized, minimized or full-screen.
SEND
TITLE “title” Change the title used in the THEOS WorkStation Client ses-
sion window.
TWS 683
Gutenberg The following functions are used, generally in an EXEC program, to
Functions format and print reports on the TWS slave printer or to an attached
Gutenberg printer.
684 TWS
ALIGN
Define the text alignment and text background for subsequent text written
to the report.
Commands
align-code » Bit-mapped value indicating text alignment
If print windows are being used and the mode setting of extended is speci-
fied, then the alignment specified here only applies to the currently
selected print window (see “SELECT_AREA” on page 702). If extended is not
specified, which is the default, then the alignment specified here applies to
all windows.
Align codes
Code Meaning
0x0000 0 Left
0x0001 1 Center
0x0002 2 Right
0x0003 3 Justified
0x0008 8 No wrap
0x0020 32 Frame
0x0040 64 Light gray background
0x0080 128 White background
0x00C0 192 Background color
The alignment codes listed above can be combined together by adding the
desired values.
TWS 685
Each time that the align function is used it completely replaces any previ-
ous alignment specifications but it only applies to text that is subsequently
written to the report.
Commands
686 TWS
BARCODES
Commands
text » Text to print
width » Optional width of bar code in units
height » Optional height of bar code in units
units » Optional unit of measurement code
fontname » Optional name of font to use for
The text is printed using the default font for barcodes and size or using the
parameters specified. The default width is 240 decipoints, the height is
proportional to the width, units is decipoints and the fontname is “3 of 9
Barcode.”
You may request the default width, height or units by specifying a value of
zero for the parameter. When a fontname is specified, it should be the
name of a font that conforms to the 3 of 9 barcode character set.
Unit codes
Code Meaning
0x0001 1 Pixels
0x0002 2 Columns and rows
0x0004 4 Millimeters
0x0008 8 Inches
0x0010 16 Decipoints
TWS 687
Multiple barcodes can be printed with one command by enclosing the
string in quotation marks.
688 TWS
CHANGE_AREA
Commands
window » Number of existing window
last-page » Optional last page number to use window
flags » Optional flags to change
To change a defined window, the window must exist on the page that is
currently being built in the report.
A last-page value of zero means that the window exists in all remaining
pages of the report.
Flag codes
Code Meaning
0x0020 16 Link to next window
0x0040 64 Accept links from other windows
0x0080 128 Repeat on all following even numbered pages
0x0100 256 Repeat on all following odd numbered pages
0x0180 384 Repeat on all following pages
0x0200 512 Rows in table are separated
0x0400 1024 Area is a column of a table
TWS 689
CHECK_PRINTER
CLOSE
690 TWS
COLOR
Set the font color for subsequent text output to the report.
TWS COLOR fg bg
Commands
fg » Foreground color code
bg » Background color code
Sets the color of text that is subsequently output to the report. The fore-
ground (fg) and background (bg) colors are specified with RGB values (red.
green, blue), which are normally specified in hexadecimal.
If print windows are being used and the mode setting of extended is speci-
fied, then the colors specified here only applies to the currently selected
print window (see “SELECT_AREA” on page 702). If extended is not speci-
fied, which is the default, then the colors specified here apply to all win-
dows.
Code Color
0x000000 Black
0x000080 Blue
0x008080 Cyan (green+blue)
0x008000 Green
0x404040 Grey
0x0000FF Intense blue
0x00FFFF Intense cyan
0x00FF00 Intense green
0xFF00FF Intense magenta
0xFF0000 Intense red
0xFFFF00 Intense yellow
0x800080 Magenta (red+blue)
0x800000 Red
0x808080 White or light grey
0x808000 Yellow (red+green)
TWS 691
DEFAULT_UNITS
1
When this function is not used the default U/M is decipoints which is ------ of
1 10
a point or --------- of an inch.
720
When the U/M selected is columns and rows, this function may specify the
desired column and/or row values.
692 TWS
FIELD
Commands
field » Field name
mask » String specifying formatting information
xxxx
Name Meaning
PAGE Current page number
DATE Current date
TIME Current time
ENV Environment variable
Mask codes
TWS 693
Field Code Meaning
hh Two-digit hour number, 12-hour format
H Hour number, 24-hour format, one or two digits
HH Hour number, 24-hour format, two digits
m Minute number, one or two digits
Commands
694 TWS
FILE_RECORDS
xxxx »
flags »
Commands
divider »
first »
lines »
xxxx
Flag codes
Code Meaning
0x0400 1024
0x0800 2048
FONT
IMAGE
Output the graphic image file to the report at the current position.
TWS 695
TWS IMAGE filename flags
xxxx
Flag codes
Code Meaning
0x0000 0 Image type is defined by its file extension (BMP,
GIF, JPG, PCX, TIF)
0x0001 1 Image type is BMP
0x0002 2 Image type is JPG
0x0100 256 Scale horizontal width to window width
0x0200 512 Scale vertical height to window width
0x0400 1024 Center the image horizontally in the window
0x0800 2048 Center the image vertically in the window
0x1000 4096 Scale the window to fit the image size
0x8000 32768 File is a local file on the client machine
LIST_FILE
xxxx
MODE
696 TWS
TWS MODE mode-code
xxxx
Commands
Mode codes
Code Meaning
0x0000 0 Portrait orientation
0x0100 256 Landscape orientation
0x0400 1024 Extended windows
0x1000 4096 Duplex horizontal
0x2000 8192 Duplex vertical
NEW_FILE
TWS NEW_FILE
TWS ERASE_FILE
Any existing report that has not been output to the printer (see
“LIST_FILE” on page 696) is cleared and not printed.
TWS 697
PICTURE
window »
x »
Commands
y »
width »
height »
filename »
flags »
xxxx
Flag codes
Code Meaning
0x0000
PRINT_NEXT_PAGE
TWS PRINT_NEXT_PAGE
xxxx
698 TWS
>tws align 0xC8
PRINT_RECORD
Commands
record »
divider »
xxxx
PRINT_TXT
TWS 699
PRINT_WINDOW
xxxx
Flag codes
Code Meaning
0x0001 1 Pixels
0x0002 2 Columns and rows
0x0004 4 Millimeters
0x0008 8 Inches
0x0010 16 Decipoints
0x0020 32 Link to next window
0x0040 64 Accept links from other windows
0x0080 128 Repeat on all following even numbered pages
0x0100 256 Repeat on all following odd numbered pages
0x0180 384 Repeat on all following pages
0x0200 512 Rows in table are separated
0x0400 1024 Area is a column of a table
700 TWS
REC_PAGE
action »
first »
Commands
last »
type »
xxxx
Align codes
Code Meaning
0x0000
ROTATE
Set the rotation angle for text that is subsequently output to the report.
TWS 701
>tws align 0xC8
SELECT_AREA
window »
xxxx
SETPOS
Position the print-head cursor for subsequent text written to the report.
x »
y »
units »
window »
xxxx
Align codes
Code Meaning
702 TWS
Code Meaning
SIZE
Commands
Set the font size for subsequent text output to the report.
xxxx
Unit codes
STYLE
Set the font style for subsequent text output to the report.
xxxx
Style codes
Code Meaning
0x0000 0 Normal
TWS 703
Code Meaning
0x0001 1 Italic
0x0002 2 Boldface
0x0004 4 Underline
0x0008 8 Compressed
Commands
0x0010 16 Double-wide
0x0020 32 Double-high
0x0040 64 Use alternate color
0x0080 128 Crossout
0x0100 256 Transparent background
TEXT_FILE
xxxx
Flags
Code Meaning
0x0001 1 Suppress any CR in the file.
0x0002 2 Suppress any FF in the file.
0x0400 1024 Translate characters in the file into ???
0x0800 2048 Interpret characters as ANSI characters
0x2000 8192 Print the file using client machine application associ-
ated with the file’s extension.
0x4000 16384 The file is printed by the client machine.
704 TWS
Code Meaning
0x8000 32768 File resides on client machine. The filename must
conform to the syntax rules of the client machine.
Notes Although this program can be executed from the command line, it is nor-
Commands
mally used in an EXEC language program or by an application program.
The operator of the THEOS WorkStation Client has on-screen controls
that can control most of these functions and operations.
Restrictions This program is only effective when it is executed in a partition that has a
THEOS WorkStation Client for a console.
TWS 705
Commands
706 TWS
UnErase Command
This command allows you to restore a file that has been previously erased and placed in the
recycle bin.
1 UNERASE
Commands
2 UNERASE drive
Operation Mode 1—Invokes the User Interface of the Unerase command. The drive for
this mode is the first drive in the currently defined search sequence.
Mode 2—Similar to Mode 1, invokes the User Interface of the Unerase com-
mand but the drive for this mode is specified by drive.
Mode 4—Undeletes the requested file. The result of the unerase operation
is displayed or not displayed according to the option in effect.
Options NOTYPE Suppress the display of the unerase attempt for each of the
files specified. The summary line is also suppressed with this
option.
The drive used for Mode 1 is the first drive in the current search sequence.
Normally, this will be the S drive.
Restrictions To view or unerase an erased file you must be logged onto the same
account that owned the file prior to the file being erased.
UnErase 707
For Mode 3, you must be logged on to the SYSTEM account and have a privi-
lege level of 5.
User Interface When Mode 2 or Mode 4 is used, the UnErase command displays the user
interface form. This form allows you to view the files that are in the recycle
bin for a drive and selectively restore them, delete them or clear the entire
recycle bin.
Commands
At the bottom of the form is the information about the file that is currently
highlighted in the list box above. The “Path” refers to the original location
of the file which is also the location that the file would be restored to.
Delete This button will delete the hightlighted file from the recycle
bin. Once a file is deleted this way it cannot be restored or
unerased.
708 UnErase
Sequence You can control the sequence of the recycle bin files displayed
Commands
in the list box. The choices are:
Date ascending Orders the deleted files by the date and time
that they were erased, in ascending sequence.
Date descending Orders the deleted files by the date and time
that they were erased, in descending sequence.
Clear This button allows you to clear or delete all of the files in the
recycle bin. Because this operation cannot be reversed, you are
asked to confirm your request before the files are permanently
removed from the recycle bin.
UnErase 709
Commands
710 UnErase
UnInstall Command
The UnInstall command removes all of the files associated with an installed product.
UNINSTALL
Commands
Operation If there are any products registered with an uninstall control file a menu
displays allowing you to select the product that you want to uninstall:
Select the product by moving the highlight bar to the desired item and
then either click on the “Remove” button or use the (TabÌ¢) key to move to
the “Remove” button and press (EnterÌ˛). All of the files listed in the unin-
stall control file for the selected item are removed from the system, the
uninstall control file for that item is removed and the item is removed from
the menu. Control returns to the menu and you may select another prod-
uct to uninstall or use the “Exit” button to exit the Uninstall command.
Only files listed in the uninstall control file for the selected product are
erased. Sometimes the control file does not list all of the files. For instance,
it is common for a product’s control file to not include the configuration file
for the product. In this situation the configuration file is not erased. This is
UnInstall 711
convenient if you need to reinstall the product at a later time. After rein-
stallation, the prior configuration file is still there and will be used again.
Cautions All of the files registered in the uninstall control file for a product are
erased from the system. There is no backup copy of these files made.
Restrictions The Uninstall command can only remove files for a product that created an
uninstall control file for the product when it was installed on the system.
712 UnInstall
Unique Command Filter
Unique copies standard input to standard output, or copies one file to another, omitting any
duplicated lines.
Commands
2 UNIQUE infile ( options
3 UNIQUE ( options
The examples used in the descriptions that follow use an input file con-
taining:
>list sample.file
Operation Mode 1—Each line in infile is examined and compared to the previous
line. If it is different than the prior line, it is written to outfile.
>unique sample.file
The 1st line.
The 2nd line.
And the third line.
The last line.
Mode 2—This mode is identical to Mode 1 except that the output is writ-
ten to the standard output device.
Unique 713
Mode 3—This mode is normally used in a pipe command-line because the
input file comes from the standard input device and the output is written
to the standard output device.
Options COUNT Each line in the file is output preceded by a count of the num-
ber of consecutive instances of the line. The duplicated
instances of a line are not output.
Commands
DUP The UNIQUE command outputs only one copy of each dupli-
cated line in the file. All unique lines in the input file are not
copied to the output file.
UNIQUE This option causes the Unique command to output only the
unique lines in the file. That is, only the lines that have no
duplicate lines.
>unique sample.file
The 1st line.
The 2nd line.
And the third line.
The last line.
+nnn With this option the first nnn characters of each line are not
used when testing for duplicate lines.
714 Unique
nnn Specifies that the first nnn fields of each line are not used
when testing for duplicate lines. A field is identified by a tab
character or a space character.
Commands
Notes An infile or outfile specification can omit the file type if the environment
variable FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111.
Unique 715
Commands
716 Unique
Unload Command
UNLOAD program
Commands
program » name of program or file to load into memory
You may only Unload a program or data file from memory if it was loaded
with Load or during system startup.
Unload 717
Commands
718 Unload
Unnumber Command Filter
Unnumber copies a file to the standard output device, removing any line number from each
line as it is copied.
1 UNNUMBER file...
Commands
2 UNNUMBER
Operation Mode 1—Each file is copied to the standard output device and unnum-
bered as it is copied. Specifying multiple files causes the second and
remaining files to be appended to the first file copied to the standard
output device.
>unnumber program1.basic
! Program: JULIAN Compute Julian date
! Programmer: Jane Doe
OPTION VERSION 1.1,"Copyright 2001 by ABC Software."
IF CMDARG$(1)=""
GOSUB COMPUTE.JULIAN
ELSE GOSUB COMPUTE.DATE
IFEND
...
Mode 2—Copies the file from the standard input device to the standard
output device, unnumbering each line as it is copied.
Unnumber 719
When a line contains multiple “line numbers,” only the first line number is
removed. For instance:
720 Unnumber
UnZip Command
This command lists, tests or extracts compressed files from a ZIP archive.
1 UNZIP zipfile
Commands
2 UNZIP -options zipfile
Operation Mode 1—The files in the zipfile are restored into the current working
directory.
>unzip cdrom
Archive: CDROM.zip
inflating: diskette.img
inflating: theos.img
inflating: pluspak.exc
inflating: pluspak.instcmp
Because no options are used with this mode, the files are attempted to be
restored whether they exist or not. If a file already exists in the destina-
tion directory you are asked:
When this occurs you must respond with a (Y), (N), (Shift)+(A), (Shift)+(N) or (R).
Mode 2—The files in the zipfile archive are restored according to the
options specified.
Mode 3—The files specified in filelist are extracted from the zipfile
archive according to the options specified.
UnZip 721
Options The following options may be combined into a single specification. For
instance, to request quiet mode (-q) and replace mode (-o) you would spec-
ify -qo.
-j Ignore the paths specified in the zipfile and restore the file into
the current working directory.
>unzip -l cdrom
Archive: CDROM.zip
Length Date Time Name
-------- ---- ---- ----
1474560 02-16-02 10:50 diskette.img
26214400 02-16-02 10:51 theos.img
748 01-30-02 15:29 pluspak.exc
3876 02-16-02 10:48 pluspak.instcmp
-------- -------
27693584 4 files
722 UnZip
-q Quiet mode. This is the equivalent of the NOTYPE option used
by other THEOS commands.
Commands
>unzip -t cdrom.zip
Archive: CDROM.ZIP
testing: diskette.img OK
testing: theos.img OK
testing: pluspak.exc OK
testing: pluspak.instcmp OK
No errors detected in compressed data of CDROM.ZIP.
>unzip -v cdrom
Archive: CDROM.zip
Length Method Size Ratio Date Time CRC-32 Name
-------- ------ ------- ----- ---- ---- ------- ----
1474560 Defl:N 1277225 13% 02-16-02 10:50 76c9056f diskette.img
26214400 Defl:N 21782773 17% 02-16-02 10:51 b480088c theos.img
748 Defl:N 396 47% 01-30-02 15:29 ad55cfc6 pluspak.exc
3876 Defl:N 1435 63% 02-16-02 10:48 a8b548b9 pluspak.instcmp
-------- ------- --- -------
27693584 23061829 17% 4 files
>unzip -z foo
Archive: FOO.zip
UnZip 723
-Z Display the zip file directory. Compare to the -v option.
This option allows you to use additional options that are spe-
Commands
>unzip -Z -1 cdrom
diskette.img
theos.img
pluspak.exc
pluspak.instcmp
-2 Display the file names only but allow and display other
information if the -h, -t or -z sub-option is specified.
>unzip -Z -h cdrom
Archive: CDROM.zip 23062393 bytes 4 files
-l Display the zip file directory in Unix “ls -l” long format.
This display is identical to the plain -Z display. Compare
with the -m and -s sub-option displays.
724 UnZip
-m Display the zip file directory in Unix “ls -l” medium format.
>unzip -Z -m cdrom
Archive: CDROM.zip 23062393 bytes 4 files
S.M...... 2.3 ths 1474560 bx 13% defN 16-Feb-02 10:50 diskette.img
S.M...... 2.3 ths 26214400 bx 17% defN 16-Feb-02 10:51 theos.img
S........ 2.3 ths 748 tx 47% defN 30-Jan-02 15:29 pluspak.exc
S.MW..... 2.3 ths 3876 bx 63% defN 16-Feb-02 10:48 pluspak.instcmp
4 files, 27693584 bytes uncompressed, 23061829 bytes compressed: 16.7%
-s Display the zip file directory in Unix “ls -l” short format.
Commands
>unzip -Z -s cdrom
Archive: CDROM.zip 23062393 bytes 4 files
S.M...... 2.3 ths 1474560 bx defN 16-Feb-02 10:50 diskette.img
S.M...... 2.3 ths 26214400 bx defN 16-Feb-02 10:51 theos.img
S........ 2.3 ths 748 tx defN 30-Jan-02 15:29 pluspak.exc
S.MW..... 2.3 ths 3876 bx defN 16-Feb-02 10:48 pluspak.instcmp
4 files, 27693584 bytes uncompressed, 23061829 bytes compressed: 16.7%
>unzip -Z -t cdrom
4 files, 27693584 bytes uncompressed, 23061829 bytes compressed: 16.7%
>unzip -Z -v cdrom
pluspak.instcmp
UnZip 725
Notes This program, and the Zip program, are implementations of the UnZip and
Zip programs from Info-ZIP. Info-ZIP provides free, portable, high-quality
versions of the Zip and UnZip compressor-archiver utilities that are com-
patible with the DOS-based PKZIP by PKWARE, Inc. This version is avail-
able for most other operating system platforms. Information about
Info-ZIP may be found on the Internet at http://www.info-zip.org/.
726 UnZip
Upcase Command Filter
Upcase copies a file to the standard output device, converting all letters to uppercase.
Upcase can also change the names of files or library members to uppercase-only characters.
1 UPCASE file
Commands
2 UPCASE
3 UPCASE directory
4 UPCASE library
file » file name with optional path; wild cards are not allowed
directory » path to file names
library » library name of member files
Command synonym: UC
Operation Mode 1—file is copied to the standard output device with all lowercase let-
ters converted to uppercase. The original file is unchanged.
>upcase /theos/config/crt.cfg
SCREENSAVER=0
YESSCANCODE=0X15
NOSCANCODE=0X31
RESETLITERAL=OK TO REBOOT? (Y/N)
MOUSE=0
INTELLIMOUSE=FALSE
KEYPADMODE=TRUE
REPEATRATE=30
...
Upcase 727
Mode 3—All of the file names in directory are converted to use uppercase-
only characters. Files in subdirectories of directory and members of librar-
ies in directory are not renamed. This mode of Upcase is not a filter.
>upcase myfiles
/MYFILES/address.basic:S
/MYFILES/browscap.basic:S
/MYFILES/ctr.basic:S
/MYFILES/cust1.basic:S
Commands
/MYFILES/custbrws.basic:S
/MYFILES/custjs.basic:S
/MYFILES/customer.basic:S
/MYFILES/mainmenu.basic:S
/MYFILES/testit.basic:S
>upcase example.library
/EXAMPLE.LIBRARY.customer:T
/EXAMPLE.LIBRARY.cust1:T
/EXAMPLE.LIBRARY.custjs:T
Mode 3 and Mode 4 of the Upcase command are useful when you need to
ensure that the file names are usable when accessed by an operating
system that does not recognize lowercase file names.
728 Upcase
Viewer Command
The Viewer command displays and allows you to browse the contents of text files.
Commands
file » file name with optional path; may contain wild cards
options » FILES NUMBER WINDOW
MAXIMIZE TITLE
>view colors.basic
While viewing the file you can browse the contents with the normal navi-
gation keys of (˜), (¤), (˚), (˙), (Home), (End), (PageUp) and (PageDown).
To terminate viewing of a file press the (Esc) or (F9) key. If multiple files
were specified on the command line then the current file is closed and the
next file is viewed. Use (Break),(Q) to terminate viewing of the current file
and to exit the Viewer command.
Viewer 729
Options FILES Indicates that file is an ASCII stream file with each record in
the file specifying a single file name. The file name specifica-
tions in this file may include the path and wild cards.
A SELECTED.EXEC file now exists that lists all of the “data” files
and all files that have been changed since 10/01/2001. The fol-
lowing command lists these files:
TITLE Allows you to specify the title for the Viewer form. If this option
is not used the title is set to the name of the file being viewed.
When the TITLE option is used, the title text is specified imme-
diately following the TITLE keyword. The title text should be
enclosed within quotation mark characters.
730 Viewer
>view selected.files (title "List of files to view"
Commands
WINDOW This option allows you to specify the initial Viewer form posi-
tion and size. When the option is not used the Viewer form’s ini-
tial position and size comes from the VIEWER.CFG file in Users
and Configuration Files directory.
Notes This command uses a standard form and objects. Refer to Chapter 11 “Ses-
sions, Forms and Objects” in the THEOS Corona Version 5 Operating
System Reference manual for information about manipulating the form’s
size and position.
The Viewer form’s initial position and size is comes from the VIEWER.CFG file
in Users and Configuration Files directory. Any change in this position and
size made during its operation is saved in that file for subsequent usage of
the Viewer command with your UserName.
The text file(s) are viewed in read-only mode. Although you can type char-
acters into the viewer display, no change is made to the actual text file.
Viewer 731
Printing Files You may print the file that you are viewing by pressing the (F8) key while it
is displayed. When this is done you are presented with a form allowing you
to select the printer that you want to use for the printing.
Commands
HTM Files The viewer command can display and navigate files encoded with HTML
tags and hyperlinks. However, the TBrowse is better suited to this task.
Defaults The default TITLE is the name of the file being viewed. The default
WINDOW size and position is the saved values in the /THEOS/USERS/user-
name/VIEWER.CFG:S file.
Restrictions Only stream files can be viewed with this command. Only ASCII text files
will display the contents meaningfully.
732 Viewer
VNC Client Command
The VNC command is the client portion of a VNC client/server protocol. It allows you to be a
“Virtual Network Console” to another system on the network that is running a VNC server.
1 VNC host
Commands
host » IP address or name of machine running VNC server
Operation When VNC is executed you may provide the VNC server host IP address or
name on the command-line. If you do not then you are asked to supply it:
When you do supply the host name or address on the command line you
are not asked to supply it with the above form nor are you allowed to
change the options which are only accessible by selecting the Options
button in that form. (See “Options” on page 735.)
The above display is a VNC connection to a Windows VNC server. The res-
olution of the actual display is much better than shown here because of
scaling and printing limitations.
If you have not checked the View (inputs ignored) option then mouse and
keyboard actions performed in this session of THEOS will be communi-
cated to and will control the remote desktop. To exit from VNC use the
(Break),(Q) sequence.
Commands
Preferred encoding. This set of options determine how this client handles
the graphical data transmitted. Check one of the following encodings and
this client will request that type of encoding from the server. The default
Hextile is potentially the most efficient in transmission bandwidth.
Raw This is the simplest encoding of pixel data. With it, data con-
sists of n pixel values where n is the width times the height of
the rectangle.
Allow CopyRect encoding The copy rectangle encoding is a very simple and
efficient encoding which can be used when the client already
has the same pixel data elsewhere in its framebuffer. You
should always enable this option to optimize data transfer if
and when possible.
Deiconify on Bell
Mouse. The following options control how the mouse on the local console is
interpreted and used by the remote host desktop.
Display. These options control how the VNC viewer displays the desktop of
the remote host system.
Restrict pixels to 8-bit The VNC client normally accepts whatever pixel for-
mat the server offers. This option requests 8-bit true-color pix-
els from the server, which reduces network traffic.
View (inputs ignored) Checking this item prevents you from actually con-
trolling the remote host. Instead, you are allowed view-only
access.
Full-screen mode This option is useful if the local screen is smaller than
the remote host desktop. When not enabled, the larger desktop
is displayed on the local screen with scroll bars on the right
and bottom edges of the display. To view the portions that are
not displayed you must use the mouse to drag the scroll bar
buttons in the direction desired.
With the Full-screen mode option enabled, the scroll bars are
not displayed. Instead, moving the mouse to the edge of the
Notes This VNC client is based upon program code that is copyrighted by AT&T
Laboratories Cambridge and is used under the conditions of the GNU Gen-
eral Public License.
Commands
Cautions The normal cautions apply when accessing a computer that is remote to
yourself. Since you cannot physically see the computer and you may not
have physical access to the computer, do not perform opertions such as
clearing diskettes, tapes, etc. or printing on any of the printers unless you
are sure of the media loaded in the drive or printer.
Restrictions The VNC client may only be used on a VGA display configured for graphics
mode.
This command searches the directory tree of the current account looking for all instances of
a file name.
Commands
file » file name with optional path; may contain wild cards
options » date1
date2
Operation Starting with the root directory of the current account, a search is made
for all files that match file. If file specifies a path, the search starts at that
path. All subdirectories subordinate to the starting search directory are
examined.
>tree /
/
data
abc
doc
programs
files
programs
Programs
Backups
doc
Special
>whereis backups.c
As shown above, when a file is found that matches file, the complete path
to the file is displayed and you are asked: “Continue searching?” You may
select the Yes, No or Go buttons.
WhereIs 739
Selecting the Yes button means that you want to continue the search; the
No button means that you do not want to continue searching and you want
to exit WhereIs without changing anything.
Selecting the Go button means that you want to discontinue the search
and that you want to set your current working directory to the path of the
file found.
Commands
Options date1 Includes a file only if the file’s last change date is greater than
or equal to this date. That is, if the file was changed on or after
this date.
The above command will include in the search only those files
that have been created or changed since October 14, 2001.
date2 Includes a file only if the file’s last change date is less than or
equal to this date. That is, if the file was changed on or before
this date. May only be specified by first specifying the date1
option.
This command includes only those files that have been created
or changed since October 14, 2001, but not any files that were
created or changed after October 30, 2001.
To specify a date2 when you don’t care about date1, use a date
of 1/1/86 for the date1 option. This is the earliest date main-
tained by the THEOS file system.
Defaults Unless a path is specified with file, the search starts with the root direc-
tory of the current account.
Restrictions You may only search for files in the current account.
740 WhereIs
Which Command
The Which command displays the complete path to a program. It searches in the current
directory and in the standard locations for programs.
Commands
file » program name with optional file-type
Operation Search for each of the files specified in the standard program locations
including any defined PATH and user command libraries. This is the same
search locations and search sequence used when file is executed as speci-
fied. As soon as a program file is found matching file its complete path is
displayed.
>which fileman
SYSTEM\Programs/FileManager/FileMan.cmd:s
>which fm makeimg
SYSTEM\Programs/FileManager/FileMan.cmd:s
/Theos/Command/MAKEIMG.EXC:S
Notes The primary purpose of the Which command is to find the location of a pro-
gram when there are multiple files with the same name. For instance,
there may be files in the current account and directory named
MYPROG.COMMAND, MYPROG.CMD, MYPROG.EXEC and there may be a file in the
SYSTEM account named /THEOS/COMMANDS/M YPROG.CMD. When you enter the
command name MYPROG on the command line you may wonder why it
keeps executing a program that you did not expect or executes a different
program depending upon what the current working directory is. The Which
command will report the location and name of the program that is exe-
cuted when the path and/or file extension is not specified.
Which 741
Commands
742 Which
Who Command
WhoAmI Command EXEC
The Who command displays all started user processs and who is logged onto them. The
WhoAmI command displays which account you are logged onto and other information about
yourself.
Commands
1 WHO
2 WHO AM I
3 WHOAMI
Operation Mode 1—The Who command shows all processs that have been started
with consoles attached. For instance, the processs used by the print
spooler, disk cache and network server programs are not displayed.
>who
Who 743
Client Address: 192.168.1.104
The above information was produced when the user was using a network
client as a user to the THEOS system.
>who
1 SYSTEM HELP CRT1:1 C90,L80,P29
2 SYSTEM CSI CRT1:2 C90,L80,P29
3 SAMPLES CSI CRT1:3 C90,L80,P33
4 SYSTEM CSI CRT1:4 C90,L80,P29
5 SYSTEM CSI CRT1:5 C90,L80,P33
6 LOGON CRT1:8 C90,L80,P24
16 PRIVATE WHO NET1 C210,L80,P28,REMOTE=DocSystem
>
744 WhoAmI
WhoIs Command
Queries the Internet domain database regarding registered domain name and users.
1 WHOIS domain
Commands
2 WHOIS "user"
3 WHOIS #handle
Operation Mode 1—Issues a request to the Internet domain database to get the reg-
istered information about a second-level domain name.
>whois theos-software.com
Registrant:
Theos Software (THEOS-SOFTWARE-DOM)
1801 Oakland Blvd, Suite 315
Walnut Creek, CA 94596
US
DNS1.THEOS-SOFTWARE.COM 65.45.113.228
DNS2.THEOS-SOFTWARE.COM 65.45.113.229
NS1.ALGX.NET 216.99.225.30
NS2.ALGX.NET 216.99.225.31
WhoIs 745
Mode 2—Issues a request to the Internet domain database to get the reg-
istered information about a user contact.
Mode 3—Issues a request to the Internet domain database to get the reg-
istered information about a user handle.
Note that, in the Mode 1 example, the administrative contact has a handle
of YGTAWDHKBO:
>whois #ygtawdhkbo
Not all registrars with a WhoIs server support the querying of contact han-
dles.
Notes Although all second-level domains are registered, only the responsible par-
ties to those domains are registered by name and handle.
The format and content of the registration database may vary depending
upon the administrator for the first-level domain of the requested domain.
746 WhoIs
Window Management Commands
These 18 commands are primarily used by EXEC language programs to provide window and
session management control.
1 wBypass mode
Commands
2 wClear window char
3 wClip window clip
4 wClose window
5 wClose ALL
6 wColor window Fg Bg Rfg Rbg
7 wFinish
8 wFrame window frame shadow attribute
9 wInvert window invert
10 wMenu Count Col Row Title Invert Invert Color Fg Bg Rfg Rbg
KEEP window HOT
11 wMove window col row
12 wMsgBox title message type ( WAIT seconds
13 wMsgBox icon title message type ( WAIT seconds
14 wOpen window col row columns rows
15 wRefresh window
16 wRemove window
17 wRestore window file
18 wSave window file
19 wSelect window update display
20 wStat
21 wStat window
22 wStat ?
23 wStat ? window field
24 wSwitch switch
25 wSwitch session
26 wTitle window title top-bottom align attribute
747
align » LEFT
CENTER
RIGHT
attribute » bit-mapped color and attributes
fg bg
bg » background color code or name (black, blue, green, cyan, red,
magenta, yellow and white)
Commands
748
wBypass The wBypass command enables or disables the window manager’s bypass
mode.
>wbypass off
Normally, window manager bypass mode is off, meaning that all charac-
ters sent to the console are intercepted and processed by the window man-
ager. Window manager saves the character and its attributes in the
Commands
appropriate window in memory and transmits the character to the console
if the window is selected and its update status is enabled.
>wbypass on
>wbypass
Bypass mode is not set
wClear The wClear command clears the interior of an open window to a specified
character or to spaces.
>wclear 5
>wclear 8 176
The first command clears window five to spaces. The second clears window
eight, filling it with the “stipple pattern” character. Refer to Appendix G:
“THEOS Character Sets,” starting on page 265 of the THEOS Corona Ver-
sion 5 Operating System Reference manual for a list of characters sup-
ported by THEOS.
The window must be selected or refreshed to see the effects of this com-
mand.
wClip The wClip command changes the text clip attribute of a window. The clip
attribute of a window controls whether text is truncated (clipped) or
wrapped when it flows beyond the right edge of the window.
The initial or default clip attribute is ON, meaning that text is truncated.
749
wClose The wClose command closes and removes the specified window. If that
window is the active window, then the next lower window is selected as the
active window.
>wclose 4
The wClose ALL command selects window zero and then closes and removes
all other open windows.
Commands
>wclose all
wColor Change the interior colors of an open window. The window does not have
to be the active window. The display of the window might not be updated
immediately, unless it is selected with update on.
The colors may be specified with color numbers or with the the color name.
Color names must be completely spelled out.
0 Black 4 Red
1 Blue 5 Magenta
2 Green 6 Yellow
3 Cyan 7 White
wFrame The wFrame command changes an existing window’s frame and shadow
style. The window’s frame and shadow are set to the indicated styles with
the requested colors and attributes.
Both frame and shadow must be specified but the attribute or color of the
frame can be omitted, in which case it is left unchanged. For a description
of the attribute specification, refer to “Frame & Title Attributes” on page 151 of
the THEOS Corona Version 5 Operating System Reference manual.
The changed frame and shadow styles and attributes are not displayed
until the window is selected or refreshed, unless it is the current window.
750
wInvert The wInvert command changes the normal video/reverse video status of the
indicated window. Although this command can be used on color or mono-
chrome displays, it is only effective on monochrome displays. Windows
should be defined with color attributes and invert attributes. The color
attributes are ignored on monochrome displays and the invert attributes
are ignored on the color displays.
>winvert 14 on
Commands
>winvert 23 off
The initial or default invert mode for a window depends upon its window
number. Odd numbered windows default to invert ON, even numbered
windows default to invert OFF.
wMenu The wMenu command can only be used in an EXEC program because it
requires the menu item text to be placed in the EXEC program’s stack
(&BEGSTACK or &STACK statements) before executing the command.
This command displays a menu or choice list on the screen and lets the
operator select one of the items. The count, col and row parameters must
be supplied but the other fields are optional.
&begstack
Item 1
Item 2
Item 3
&end
wmenu 3 5 10
Item 1
Item 2
Item 3
Blank items in the list of menu choices display as a horizontal line. For
instance:
&begstack
Item 1
Item 2
Item 3
Last Item
&end
wmenu 5 5 10
751
Item 1
Item 2
Item 3
Last Item
The window used by wMenu is always double-line framed and has a drop
Commands
col and row specify the upper-left corner of the interior of the window.
The width and height of the menu depend upon the items displayed. The
width of the window is the larger of the longest item in the list and the
length of the menu title. The height of the window is the smaller of the
remaining screen depth minus 4 and count. When the window height is
less than count, a scroll bar is displayed on the right side of the menu
frame.
INVERT Parameter. Use this parameter if the EXEC program may be used
on a monochrome display. It has the same effect on the menu window as
the wInvert command has on user-defined windows.
COLOR Parameters. This parameter defines the colors used for the frame,
title, menu item text and the selection highlight bar. It should be used if
the EXEC program may be used on a color display.
The fg and bg colors are used for the menu item text, the frame and the
title text. rvfg and rvbg colors are used for the selection highlight bar.
When the COLOR phrase is not used and the display is capable of colors,
the default colors are used for the menu window. Refer to “Window Colors
and Invert Status” on page 150 of the THEOS Corona Version 5 Operating
System Reference manual.
When this parameter is not used the menu window is automatically closed
and removed when the operator selects a menu item.
752
Note: The menu window is always opened or reopened when wMenu starts,
even if it is the same window number and menu item list used the last
time that wMenu executed.
HOT Parameter. The HOT parameter tells wMenu that menu items can be
selected using “hot-keys.” When this parameter is used, each item in the
menu list must specify the position of the character used for hot-key selec-
tion of the item. For instance:
Commands
&begstack
6 Item 1
6 Item 2
6 Item 3
&end
wmenu 3 5 10 HOT
Item 1
Item 2
Item 3
In this list, the sixth character of each item is the hot-key character. Char-
acter positions are counted starting with the first non-space character fol-
lowing the hot-key character number. In the above example, the hot keys
are the characters 1, 2 and 3, respectively.
Item Selection. When the menu displays, the selection highlight bar is
positioned on the first item in the menu. You may use the (˚) and (˙) keys
to move the highlight bar up and down. The (Home) and (End) keys move the
highlight bar to the first and last items in the list.
The (ÌÌSpaceÌÌÌ) key advances the highlight bar to the next item. Unlike the
(¤) key, the (ÌÌSpaceÌÌÌ) key wraps from the last item to the first.
You may also position to and/or select an item using a hot-key or soft hot-
key. Hot-keys are enabled with the HOT parameter and are indicated with
underlined characters in the item list. Soft hot-keys are enabled when the
HOT parameter is not used.
When hot-keys are enabled, you may press an underlined character. This
causes the highlight bar to move to the first item containing the under-
lined character. If there is only one item with that hot-key, the item is
automatically selected just as if you had pressed (EnterÌ˛).
When soft hot-keys are enabled, pressing a character positions the high-
light bar to the next item that starts with that character. If there are no
753
more items starting with that character, then the highlight bar moves to
the first item starting with the character.
Selecting an item sets the return code (EXEC &RETCODE variable) to the
selected item’s number. Pressing (Esc) selects no item but exits wMenu, set-
ting the return code to zero.
Commands
wMove The wMove command moves a window to a new location on the screen. col
and row are the column and row numbers of the new location for the
upper-left corner of the interior of the window.
Note that windows can be moved by the operator using a mouse or a vir-
tual mouse.
wMsgBox Display a message box form. A message box form is a form with a title,
message text and optional operator response buttons. For instance:
Icon. This is an optional parameter that can be used to specify that the
message form has a graphical icon displayed on it. There are four icons
available and they are specified with their icon names:
Exclamation
Information
Question
Stop
Title. The text specified in this position is displayed in the title bar of the
form. Although you can specify an empty string, there will always be a
title bar for the form. You should enclose the title text in quotation marks
754
to ensure that it uses the text that you specify rather than just the first
word.
Message. This is the text that is displayed in the body of the form. You
should enclose this text in quotation marks.
Type. This parameter specifies the operator response buttons that are dis-
played in the message box form. It can be specified with a numeric code or
Commands
a mneumonic code.
WAIT seconds. This option allows you to display the message form and, if
there is no response from the operator for seconds amount of time, the
message form clears itself and exits.
755
Return code. The return code is set according to the way that the message
form is exited.
wOpen The wOpen command defines a new window or redefines an existing win-
dow. window refers to the window number of the new or existing window.
col and row are the column number and row number of the upper-left
corner of the interior of the window (excluding the frame and shadow). col-
umns and rows refer to the width and depth of the interior of the window.
>wopen 1 10 5 58 10
>wselect 1
756
>wopen 1 10 5 58 10
>
>wtitle 1 " Window 1 " top center
>wselect 1
Commands
The window may be specified with a question mark. When this is done, the
next available window number is used for the new window. The window
number is returned as the return code of the wOpen command.
This command does not select the new window, it only creates it in mem-
ory.
The color and invert status of the window and its frame are dependent
upon its window number, the capabilities of the console and the setup for
session colors for this console. Refer to “Window Colors and Invert Status” on
page 150 of the THEOS Corona Version 5 Operating System Reference
manual for more information about default colors and invert status.
wRefresh The wRefresh command updates the display of a window on the console
without making it the active window.
This command updates the display of the window interior, frame, title and
shadow. It does not change the order of the window. That is, if the window
is covered by another window, then the portion that is covered is not dis-
played. The wSelect command changes the order of display for a window.
757
wRemove The wRemove command erases the display of a window from the screen.
Any and all windows previously covered by window become visible.
wRestore The wRestore command retrieves a window definition and contents that
were previously saved to disk with the wSave command.
Commands
wrestore 30 sample.copyrite
The above command restores the window saved in the file SAMPLE.COPYRITE
(see wSave command example).
A restored window has all of the attributes of the saved window including:
Window location
Window size
Cursor location
Frame style, attributes and color
Shadow position
Title position, alignment, attributes and color
Clip status
Invert status
Display type (hidden, top or neither)
Interior contents including text, attributes and color
The window is restored with this command but not displayed. You must
use the wRefresh command or the wSelect command to display the new
window on the screen.
758
wSave The wSave command saves a window description and contents to a disk
file.
wopen 1 46 4 30 3
wframe 1 double right 0x17
wclip 1 on
wselect 1 top
color white blue
&crt pon
Commands
&crt 7 1
&type SAMPLE Version 1.0 \
&crt 2 2
&type by ABC Software Corporation \
&crt 7 3
&type All rights reserved \
&crt poff
wselect 1 on top
wsave 1 sample.copyrite
The preceding EXEC statements and commands create a window and fills
it with a copyright notice for the program SAMPLE. This window definition
is saved in the disk file SAMPLE.COPYRITE.
A window definition saved with the wSave command can be used by the
wRestore command, the BASIC language WINDOW RESTORE statement or
the C language wRestore function.
wSelect The wSelect command selects a window as the active window for text dis-
play and operator input, and it defines the display order of the window.
For instance:
wselect 3 on
This command specifies that window number three is the active window,
that it is refreshed and that all text written to the window will appear on
the screen if the window is not overlaid by windows with the TOP
attribute.
Selecting a window always makes it the active window. It also restores the
display attributes in effect the last time that the window was selected.
Specifically, the following attributes are restored: the cursor location,
cursor on/off mode, video attributes (blink, underline, etc.) and normal and
reverse video colors.
The first time that a window is selected, its cursor location is 1,1.
Selecting a window places it on top of all other windows except those that
were last selected with the TOP display mode.
759
Window zero is always open and can be selected with this command but it
cannot be specified as TOP or HIDDEN.
Update ON. Selecting a window with update mode ON means that the
window is refreshed on screen and subsequent text written to this active
window is displayed on the screen. This is the default mode when selecting
a window.
Commands
Update OFF. Selecting a window with update mode OFF means that the
window is not refreshed on screen. Text written to the window is not dis-
played on the screen but it is saved in memory and will appear the next
time that the window is refreshed or selected with update ON status.
Display TOP. Selecting a window with the TOP display attribute causes
the window to be displayed on the screen on top of all other windows,
including other windows marked as TOP. TOP implies an update ON sta-
tus.
>wselect 3 top
The above two commands have identical effects: window three is selected
as the active window, its display order is on top of all other windows, it is
refreshed on screen and subsequent text written to the window appears on
the screen.
760
wStat The wStat command displays the general status for all windows, the com-
plete status for a specific window or it returns the currently active window
number.
>wopen 1 2 2 70 20
Commands
>wopen 2 4 4 68 18
>wopen 3 6 6 66 16
>wstat
0* 80x24 beg=0,0 cur=0,11 order=0 update=1
1 70x20 beg=1,1 cur=0,0 order=-1 update=0
2 68x18 beg=3,3 cur=0,0 order=-1 update=0
3 66x16 beg=5,5 cur=0,0 order=-1 update=0
761
Display Current Window Number. When wStat is invoked with a question
mark, it sets the return code to the current window number. This return
code is easily used in an EXEC program by referencing the &RETCODE
variable.
wstat ?
&type The current window number is &retcode
&curr_window = &retcode
Commands
Specific Window Status. When wStat is given a window number, the com-
plete status of that window is displayed.
>wselect 2
>wstat 2
status: 1
begin col,row: 3,3
width: 68
height: 18
curr col,row: 0,6
cursor: 0
frame-type: 2
shadow-type: 1
title-type: 2
title-align: 2
title-attr: 0x1C5F
frame-attr: 0x1C5F
clip: 1
update: 0
curr-attr: 0x1C5F
order: 0
color: 7,5,7,0
invert: 0
762
Status Element Meaning Codes Used
status Window status 0 = Not open
1 = Open, not active
2 = Open, active
begin col,row Window interior origin, base zero
width Window interior width, base one
Commands
height Window interior height, base one
curr col,row Cursor location, base zero
cursor Cursor display type 0 = Not displayed
1 = Blinking underline
2 = Blinking block
3 = Steady underline
4 = Steady block
frame-type Frame style 0 = None
1 = Single line
2 = Double line
3 = Raised
4 = Sunken
shadow-type Shadow style 0 = None
1 = Right
2 = Left
title-type Title position 0 = None
1 = Top
2 = Bottom
title-align Title alignment 0 = Center
1 = Left
2 = Right
title-attr Bit-mapped value indicating the foreground and
background title colors and the attributes.
frame-attr Bit-mapped value indicating the foreground and
background frame colors and the attributes.
clip Interior text clipping 0 = Off
1 = On
update Update and display 0 = Update OFF
status 1 = Update ON
2 = Update ON, TOP
4 = Update OFF, HIDDEN
763
Status Element Meaning Codes Used
curr-attr Bit-mapped value indicating the current window
interior foreground and background colors and the
attributes.
order Window display Lowest or bottom-most win-
sequence dow is 0. A -1 means win-
dow is not displayed
Commands
Specific Window Field Status. You may get a specific parameter of a spe-
cific window’s status. When wStat is given a question mark followed by a
window number and a status field number, the status of that window’s
field is displayed.
>wstat ? 3 4
>
In the above example, a request is made for the width of window 3. The
return code is set to 30 indicating that that is the width of the window.
Code Field
0 Status
1 Top left column
2 Top left row
3 Width
4 Height
5 Current cursor column
6 Current cursor row
764
Code Field
7 Cursor shape
8 Window frame type
9 Window shadow type
10 Title type
Commands
11 Title alignment
12 Title attributes
13 Frame attributes
14 Text clip
15 Window update mode
16 Current text attribute
17 Window display order
18 Text foreground color
19 Text background color
20 Text reverse video foreground color
21 Text reverse video background color
22 Invert
wswitch OFF
wswitch ON
wswitch 4
765
Note that if you use wSwitch to switch to a session other than the one that
this EXEC program is running on, you will not be able to see any display
from this EXEC. It will continue to execute on its own session.
To determine which session you are using, use the wSwitch command with
a question mark argument. This causes wSwitch to set the return code to
the session number in use by this program.
Commands
wswitch ?
&type My session is &retcode
wTitle The wTitle command defines the title for a window. With this command you
may either specify that a window has no title, or specify the title and its
position and attributes. A window must have a frame in order to have a
title.
>wtitle 3
The above command removes any title that window three might have.
When a title is defined without the top-bottom specified, the default of TOP
is used. When defined without the align parameter specified, the default of
CENTER is used. The attribute for the title can be omitted, in which case it
uses the default attributes of the frame for the title text. For a description
of the attribute specification, refer to “Frame & Title Attributes” on page 151 of
the THEOS Corona Version 5 Operating System Reference manual.
The changed title and attributes are not displayed until the window is
selected or refreshed, unless it is the current window.
Restrictions wOpen and wRestore are the only window management commands that can
create or define a new window. All other commands except wStat operate
on existing, open windows.
See also Session and Chapter 10 “Windows,” starting on page 147 of the THEOS
Corona Version 5 Operating System Reference manual
766
WinWrite Command
The WinWrite command invokes the WindoWriter program, which is a general purpose, full-
screen text editor.
Commands
file » file name with optional path; may contain wild cards
options » FILES NOSHELL READONLY
NOBACKUP PASSWORD
Command synonym: WW
For a complete description of the operation and usage of this program, refer to the
WindoWriter User’s Guide.
Operation WindoWriter is loaded and the first file is opened as the current text file to
edit.
The file specification may contain wild cards and there may be more than
one file specified on the command-line. In either case, the first file is
opened and, when you close that file, the next file is opened, and so on.
Options FILES Indicates that file is an ASCII stream file with each record in
the file specifying a single file name. The file name specifica-
tions in this file may include the path and wild cards.
A SELECTED.EXEC file now exists that lists all of the “text” files
and all files that have been changed since 10/01/2001. The fol-
lowing command edits these files:
WinWrite 767
>ww selected.exec (file
NOBACKUP This option specifies that any and all files saved during this
session will not have a backup version created. This
NOBACKUP option also applies to automatic file-saves per-
Commands
formed by WindoWriter.
NOSHELL This option disables the CSI Shell... item of the File menu of
WindoWriter. This option would normally be used when Win-
doWriter is invoked from an application program. By specifying
NOSHELL, the user is prevented from using WindoWriter to gain
easy access to system commands that might cause problems
for the application.
PASSWORD pw Use pw to access the file using DES private key encryp-
tion. If the file is currently encrypted, the pw is used to decrypt
the file and open it. When the file is saved, pw is used to
encrypt the file.
A file specification can omit the file type if the environment variable FILE-
TYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111 of the THEOS Corona Version 5 Operating System Ref-
erence manual.
768 WinWrite
The keys used while in WindoWriter may differ from the keys used in other
programs. See “Function Key Remapping” in the WindoWriter User’s
Guide.
Commands
Restrictions file must be a stream text file.
WinWrite 769
Commands
770 WinWrite
WordCount Command
Commands
2 WORDCOUNT file... ( FILES options
file » file name with optional path; may contain wild cards
options » BYTES
CHARS
FILES
LINES
WORDS
Operation Mode 1—The file is analyzed and the total number of characters or bytes,
words and lines is counted. The totals of these counts are displayed on the
standard output device.
>wordcount /theos/config/devnames.txt
Omitting file means that the standard input device supplies the text of the
file. This would normally be used in a pipe command-line. When the text
comes from the console keyboard, it is terminated with a (Ctrl)+(D).
>wc
The quick brown fox jumped over the lazy gray dog.
Now is the time for all good men to come to the aid
of their party.
(Ctrl)+(D)
WordCount 771
Multiple files may be specified on the command-line. Each one of the files
is analyzed separately and the totals are displayed. The total for all of the
files is then displayed at the end.
Mode 2—In this mode file is an ASCII stream file containing one file
description per line. Each file description in file is counted. The file
descriptions may contain wild-card specifications.
This mode of the WordCount command is convenient when one or more sets
of files are repetitively being counted. Merely edit a file containing the file
description, such as:
>list daily.counts
system.history:s
*.log:s
772 WordCount
Options BYTES Count and display the total number of bytes in the file. This is
synonymous with the CHARS option.
CHARS Count and display the total number of characters in the file.
This is synonymous with the BYTES option.
Commands
Chars File-name
31,694 /THEOS/CONFIG/DEVNAMES.TXT
LINES Count and display the total number of lines or records in the
file.
Lines File-name
554 /THEOS/CONFIG/DEVNAMES.TXT
WORDS Count and display the total number of words in the file.
Words File-name
14,537 /THEOS/CONFIG/DEVNAMES.TXT
A file specification can omit the file type if the environment variable
FILETYPE is defined.
For more information about the FILETYPE variable, see “Environment Vari-
ables” on page 111 of the THEOS Corona Version 5 Operating System Ref-
erence manual.
Defaults Unless a specific option is specified, CHARS, LINES and WORDS are dis-
played by default.
WordCount 773
Commands
774 WordCount
Zip Command
Commands
2 ZIP -options zipfile filename...
Operation Mode 1—Add the list of files to the archive file zipfile.
Mode 2—Perform the actions specified by options. The zipfile and the list
of filenames may be necessary, depending upon the specific options
requested.
Options The following options may be combined into a single specification. For
instance, to request comments (-c) and move mode (-m) you would specify
-cm.
Zip 775
>unzip -l htms
Archive: HTMS.zip
Length Date Time Name
-------- ---- ---- ----
34262 08-24-00 15:45 beta2.htm
Comment for file one
23593 10-03-00 00:42 beta3.htm
Comment for the second file
34194 03-07-01 11:27 beta4.htm
Commands
-d filelist The list of file names in filelist is deleted from the zipfile.
>unzip -l htms
Archive: HTMS.zip
Length Date Time Name
-------- ---- ---- ----
34262 08-24-00 15:45 beta2.htm
34194 03-07-01 11:27 beta4.htm
21651 08-30-01 11:03 beta5.htm
-------- -------
90107 3 files
>zip -f example
freshening: some.txt (deflated 71%)
776 Zip
-F Examine the archive file and correct any errors found.
>zip -F example
zip: reading examplemenu.command
zip: reading examplescreen.command
zip: reading testgutenberg.command
zip: reading testit.command
zip: reading testprt.command
Commands
-h Display help text.
-j Do not include the path when archiving a file. Compare the fol-
lowing two zips:
-m Each file that is added to the zip archive is deleted from the
source location.
-o Set the date for the zipfile to the date of the newest file added
to the zipfile.
Zip 777
-t mmddyyyy Of the files listed in filelist, only those files with a last
change date on or after the date specified here are added or
updated in the zipfile.
>zip -T mailwavs
test of MAILWAVS.zip OK
Commands
>touch some.file
File "/MYDIRECTORY/SOME.FILE:S" touched: 02/20/2002 10:58:49
One file changed
>zip -u example
updating: some.file (deflated 53%)
778 Zip
.
A zip file may have only one comment. That is, when you are
adding files to an existing zipfile and you specify a comment,
the new comment replaces any comment that the zipfile may
have had in it. However, the comments that may be added on a
file-by-file basis (see the option -c) are not replaced unless the
specific file is replaced.
Commands
-0 Do not compress the files, just store them in the zipfile.
-1 Compress the files into zipfile faster at the expense of the com-
pression factor. That is, it doesn’t make it quite as small as it
would if the -1 option were not used.
Notes This program, and the UnZip program, are implementations of the UnZip
and Zip programs from Info-ZIP. Info-ZIP provides free, portable, high-
quality versions of the Zip and UnZip compressor-archiver utilities that
are compatible with the DOS-based PKZIP by PKWARE, Inc. This version
is available for most other operating system platforms. Information about
Info-ZIP may be found on the Internet at http://www.info-zip.org/.
Zip 779
Commands
780 Zip
A: Contacting THEOS
THEOS Support Services for Resellers and Distributors are designed to pro-
vide the type of assistance best suited to your needs. Support options range
from no-cost / low-cost information services on the World Wide Web to
THEOS on-site training classes, fee-based direct support or an annual sup-
port contract. Depending upon your needs and budget, you may choose any
one of these options or combine several into a custom program suitable to
your requirements.
781
On-line system helps. Virtually all THEOS software has some form of on-
line help available. Because it is the easiest, this should be checked first to
see if it has information or advice about the situation or feature that you
are trying to use.
http://www.theos-software.com/manual/
If the information in the manual does not answer your question then
please inform technical support about that when you contact them.
Internet help desk. For SDK dealers and developers, a knowledge base of
previously reported problems is available on the Internet.
http://helpdesk.theos-software.com
http://www.theos-software.com/support/
If you cannot find the answer in the on-line help system or in the product
manual then check this help desk to see if the problem or question has
been asked by another dealer. If you cannot find a previous report that
addresses the problem then post your query here. It will be answered
promptly and the dialog about your problem will become available in the
future to help other dealers and developers should they encounter a simi-
lar situation.
Attachments can and should be included with your postings when appro-
priate. Typical attachments would be sample code, system configuration
dumps, etc.
If you do not know your support representative’s email address, you can
send your request to:
782
Internet “Dealer Forum” and “Corona Forum”. For SDK dealers and
developers a general dealer-to-dealer forum and a Corona-specific dealer-
to-dealer forum are available on the THEOS web site. These forums
should be monitored by all dealers and can be used by SDK dealers to
inform other dealers about a situation that you have encountered or to
report and ask other dealers about marketing opportunities, application
design questions, hardware availability, etc.
Commands
http://www.theos-software.com/forums/
Internet “Ask THEOS Forum”. For SDK dealers and developers a forum is
available on the THEOS web site that allows you to post questions to
THEOS engineering staff. This forum should be used when you have ques-
tions that THEOS engineering staff or THEOS management might be able
to answer about marketing, future directions of THEOS software, etc.
http://www.theos-software.com/forums/
1-925-935-1177
783
Commands
784