THE BOOK OF THE SYSTEM MANAGER TSS/8 ++++++++++++++++++++++++++++++++++++++++ CRASH PROCEDURES ++++++++++++++++++++++++++++++++++++++++ IT SHALL BE ASSUMED THAT THE SYSTEM MANAGER IS FAMILIAR WITH THE FOLLOWING SOFTWARE: SOFTWARE WHERE TO FIND IT IF YOU DONT HAVE IT RIM LOADER PASTED ON THE EIGHT- IF NOT,THEN IN SYSTEM MANAGERS GUIDE- IF NOT, THEN SEE INTRODUCTION TO PROGRAMMING. BIN LOADER MANY COPIES IN YOUR TAPE LIBRARY RIM AND BIN PROCEDURES IN SYSTEM MANAGERS GUIDE OR INTRODUCTIONTO PROGRAMMING OS/8 BOOTSRAP IN DOCUMENTATION GIVEN YOU LABELED: TSBOOT.DOC. PROCEDURES ARE ALSO COVERED IN THIS PUBLICATION. DISK DIAGNOSTIC COVERED BY BCD AND SOFTWARE BRIEFS. IN ADDITION TO THIS SOFTWARE THE FOLLOWING PROCEDURES ARE ASSUMED TO BE KNOWN TO THE MANAGERS: PROCEDURE WHERE TO LEARN IT WARM START SEE SYSTEM MANAGERS GUIDE INIT START FROM PAPER TAPE SYSTEM MANGERS GUIDE- INTRO TO PROGRAMMING LOAD AND DUMP SYSTEM MANAGERS GUIDE REFRESH AND START " " " TSS/8 BUILD SYSTEM MANAGERS GUIDE LOGID, FORCE, ON OFF, R CAT:L, ETC SYSTEM MANAGERS GUIDE VADIC CONTROL ------ **** WITH THESE PROCEDURES ASSUMED THE FOLLOWING STEPS CAN BE FOLLOWED DURING A CRASH: 1) THE MAJORITY OF CRASHES CAN BE RESTORED BY A WARM START IF THIS PROCEDURE FAILS . . . 2) ASSUME INIT IS FAULTY. THEREFORE LOAD INIT BY OS/8 BOOTSTRAP OR PAPER TAPE. IF THIS FAILS . . . 3) ASSUME MONITOR FAULTY ON DISK. IN THIS CASE BEGIN TO BE SUSPICIOUS OF HARDWARE. HOWEVER, TRY TO RELOAD INIT AND LOAD FROM THE MOST RECENT BACKUP DECTAPES. IF THESE FAIL, RELOAD FROM THE FRESH SYSTEM TAPES. IF THESE FAIL, READ THE FOLLOWING: ******NOTE: AT THIS POINT HARDWARE AND SOFTWARE ARE FAULTY. DO NOT RUIN ANY SYSTEM SAVE TAPES BY SAVING THE SYSTEM!****** IF THIS HAPPENS . . . IT MEANS ----------------- -------- DECTAPES ROCK ENDLESSLY ON LOADING SYSTEM DECTAPE FAILURE - CALL DEC DECTAPES STOP BEFORE LOAD COMPLETE SOME FLAG ERROR IN HARDWARE- CHECK DISK WRITE LOCKOUT SWITCHES- OTHERWISE CALL DEC. MONITOR DOES NOT STAY UP IF ALL CRASH PROCEDURES HAVE BEEN FOLLOWED AND RETRIED- RUN DISK DIAGNOSTIC-IF BAD, CALL DEC. ****THE FOLLOWING SECTIONS INCLUDES SOME OFTEN USED PHONE NUMBERS. WHO PHONE WHAT THEY NEED TO KNOW NIENHUIS, JOHN E. DIRECTOR CAI ESTANCIA 962-3534 1,2 MCLELLAN, GERALD W. V.P CDMHS 675-3348 3 JACOBSON, THOMAS W. V.P CMHS 830-6566 3 KING, JACK F. V.P. NHHS 673-4712 3 EXPLANATION OF CODES: 1- NEED TO KNOW PASSWORDS TO ACCOUNTS #1 & #2 2- NEEDS TO KNOW STATUS OF TSS/8 WHEN TOTAL SYSTEM COLLAPSE HAPPENS. 3- MAY BE USED TO CONTACT COMPUTER TEACHERS AT HIGH SCHOOLS. IN ADDITION THESE PHONE NUMBERS ARE USEFUL. CDMHS 644-1000 NHHS 548-1121 CMHS 545-9431 ENSIGN 548-3418 EHS 642-4850 KAISER 646-1680 LINCOLN 644-2544 REA 548-1151 TEWINKLE 546-9690 DAVIS 545-0497 THE FIREHOUSE 548-9931 P&K BURGERS 646-3586 (ORDERS ACCEPTED FOR PICKUP) AL/COM TIMESHARING NETWORK 1-800-648-3720 (NO TOLL) DIAL A PRAYER 543-2002 DEC 979-2460 JOHN BIRCH HOT LINE 832-0550 ******TELEPHONE PROCEDURES (LEGITIMATE)***** 1) BE KIND AND IDENTIFY YOURSELF. USE YOUR FULL NAME. IF TALKING TO DEC OR AN ADMINISTRATOR THAT YOU KNOW GET TO THE POINT QUICKLY. MAKE SENSE. *****TELEPHONE PROCEDURES (UNDERHANDED)****** !!!!!USE THE ONLY WHEN SPEAKING TO ADMINISTRATORS YOU DO NOT KNOW OR WILL NEVER MEET. IF THERE IS ANY POSSIBILITY THAT THE ADMINISTRATOR KNOWS THAT YOU ARE A STUDENT OR IF THIS IS AN APOLOGETIC PHONE CALL-USE LEGIT PROCEDURES!!!!! 1) SET THE MOOD- CALL FROM THE COMPUTER ROOM OR BETTER STILL A TYPING ROOM; ANYTHING THAT ADDS TO THE BUSINESS ATMOSPHERE. 2) LOWER YOUR VOICE 2 OCTAVES (NOTE TO DAVE WARNER: YOU HAVE A BELIEVABLE PHONE VOICE, DO NOT CHANGE) (THE FIREHOUSE GIRLS LIKE ROUGH MEN; PREFERABLY LUMBERJACKS) 3) AT YOUR DISCRETION ADD MR. TO YOUR NAME. 4) MOST OF THE ADMINSTRATORS YOU WILL CALL WILL ANSWER YOU IN A TONE OF VOICE THAT IMPLIES YOU HAVE TAKEN THEM FROM SOMETHING IMPORTANT (WIFE, MISTRESS, TV, BEER . . .) THEREFORE DISTRACT THEM BEFORE ASKING YOUR QUESTION ("I NEED SOME INFORMATION ON THE NUMBER OF TELETYPES WE SERVE AT YOUR SCHOOL WOULD YOU HAPPEN TO KNOW?") 5) STRESS YOUR VIRTUES. BE WILLING TO SACRIFICE SMALL THINGS TO GAIN AN ADVANTAGE. 6) IF YOU WANT TO SCARE THE CRAP OUT OF 7TH GRADERS WHO ARE SCREWING UP THE SYSTEM ADD A TITLE TO YOUR NAME (COMPUTER SERVICES DIRECTOR) AND TRY TO BECOME [MENTALLY] THE MOST SOUR TEACHER YOU KNOW. 7) COVER EACH OTHER FOR ALIBIS SO THAT IF CERATAIN 7TH GRADERS OR ADMINISTRATORS CALL ANOTHER SYSTEM MANAGER THE WHOLE AFFAIR IS NOT BROKEN OPEN. 8) SOMEWHERE AT DATA PROCESSING THERE IS A MASTER STUDENT DIRECTORY [LAST SEEN IN CONFERENCE ROOM]. USE THIS LINE PRINTER LISTING TO YOUR ADVANTAGE. !!!! USE YOUR BRAINS. IF IT IS BETTER TO BE HONEST, BE HONEST!!!!! +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- SCHEDULES FOR SYSTEM MANAGERS TIME PROCEDURE **** ********* END OF SCHOOL 1973 FIND OUT SCHOOLS WHICH HAVE SUMMER SCHOOLS, PROVIDE SERVICE AND DELETE ALL UNNEEDED ACCOUNTS. SUMMER 1973 PREPARE SYSTEM FOR 1973-74 2 WEEKS BEFORE SCHOOL 1973 GENERATE NEW PASSWORDS INFORM TEACHERS (SEE APPENDIX) CHRISTMAS 1973 NEW PASSWORDS FOR SECURITY TO ALL SCHHOOLS EASTER 1974 SAME AS CHRISTMAS APRIL-MAY 1974 CHOSE NEW MANAGERS AND LEAVE AFTER TRAINING **************************************************************************************************** OBJECTIVES***** RENDER UNTO . . . STUDENTS - - - SAFE AND ADEQUATE FILE STORAGE AND *UPTIME* TEACHERS - - - USAGE REPORTS AND UPTIME,UPTIME,UPTIME! RESEARCH AND DEVELOPMENT - - - THE 8 USED TO FULL CAPABILITIES DEC - - - A RELIABLE MONITOR (EVEN THOUGH YOU MAY CHANGE IT) YOURSELF - - - ALL YOU CAN GET WITHOUT VIOLATING THE ABOVE CAESAR - - - WHAT IS CAESAR'S. SOME NOTES ON . . . ***PATCHING MONITOR*** LEARN XDDT CREATE A 'BASE' SYSTEM, THAT IS, ONE CONSISTING OF A RELIABLE MONITOR (DEC PATCHES TO PREVENT CRASHES), PASSWORDS FOR ONLY ACCOUNTS 1 AND 2, AND ONLY COPY AS PROGRAMMING. SINCE YOU MAY NEVER DELETE FROM A FRESH SYSTEM (DUE TO LOSS OF DISK SEGMENTS), AND IT MAY BECOME NECCESSARY TO MAKE MAJOR DELETIONS ON YOUR EXISTING FRESH SYSTEM, YOU MAY EASILY BUILD A NEW FRESH SYSTEM FROM THE 'BASE SYSTEM' BY ADDING PASSWORDS AND SOFTWARE. THE ONLY MODIFICATIONS ALLOWED ON A FRESH SYSTEM ARE THOSE MADE IN XDDT, LOAD AND RESAVING OVER EXISTING FILES (FOR PATCHING TO SYSTEM PROGRAMS), AND CHANGING PASSWORDS IN LOGID. TEST ALL PATCHES BEFORE IMPLEMENTING THEM IN YOUR FINAL MONITOR. IF THE SYSTEM BECOMES UNRELIABLE DUE TO SOFTWARE, DEC MAY REFUSE TO SERVICE IT UNTIL A STANDARD DEC MONITOR IS RUN ON THE SYSTEM. SUGGESTED PATCHES: TIME LIMIT TO ASSIGNED DEVICES 1700 AUTO SHUTDOWN PRIORITY DECTAPE PATCHES DIRECT RUN (.CAT INSTEAD OF .R CAT) ABILITY TO PUNCH AND READ BIN TAPES AT TERMINAL. ///////////////////////////////////////////////////////////////////////////( *STOP PUSHING!* SOME NOTES ON . . . SYSTEM PROGRAMMING DECIDE IF QUOTA LOGOUT IS NEEDED. IF YOU CAN MAINTAIN ENOUGH DISK BY A WEEKLY REFRESH, RESTORE THE DEC LOGOUT (MAKING SURE IT LEAVES NO PASSWORDS ON DISK!) ATTEMPT TO KEEP THE STUDENT PROGRAMMING FRESH. DO NOT ALLOW PROGRAMS TO BE KEPT ON DISK FOREVER UNLESS THE USER SHOWS SOME INTEREST IN THEM. SOME STUDENTS MAY WISH TO PLACE SOME OF THEIR PROGRAMMING ON ACCOUNT 2. AVOID THE FOLLOWING: GLUT OF ACCOUNT 2 (FREE,BUSY,ETC. INSTEAD OF MASTER SYSTAT) NON DEC COMPATIBLE PROGRAMS (CHANGE IN COPY FORMAT, OR FILE FORMATS) UNLESS THEY ARE SUCH AN IMPROVEMENT THAT DEC CANNOT OBJECT. SUGGESTIONS: USAGE PROGRAM MASTER SYSTAT GRIPE SECURITY ()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()() AN ANALYSIS 99% OF THE PEOPLE ON TSS/8 WILL BE SATISFIED WITH UPTIME AND SAFE FILE STORAGE 1% WANT MORE. WE WILL NOW DEAL WITH THAT 1% WHAT THEY HAVE: SOME OF THE MOST DEVIOUS PROGRAMMING MINDS AND TECHNIQUES. WHAT THE SYSTEM MANAGERS HAVE: SOME OF THE MOST DEVIOUS PROGRAMMING MINDS AND TECHNIQUES. ALL PASSWORDS ABILITY TO SEE ALL (R CAT:L) KEY TO THE 8/I YOU SEE THAT THERE IS VERY LITTLE SEPARATING YOU FROM THE 1% IF ACCOUNT 1 IS EVER LOST OR ANY UNAUTHORIZED PERSON CAN GET TO THE EIGHT, YOU ARE NO LONGER SYSTEM MANAGERS. THEREFORE THE FOLLOWING HISTORICAL INFORMATION IS GIVEN, AND POSSIBLE MEANS TO AVOID PROBLEMS. *****WHAT HAS HAPPENED TO THE BCD***** PASSWORD STEALING PROGRAMS THESE PROGRAMS EITHER IMITATE LOGOUT OR APPEAR ON SYSTAT WITH VERY APPEALING NAMES. WHEN RUN THEY TAKE YOUR PASSWORD AND WRITE IT ON A DISK FILE. TO AVOID THIS DO NOT RUN ANY UNKNOWN PROGRAM AND TYPE ^BS BEFORE LOGGING IN. BLACKMAIL SOME STUDENTS HAVE TRIED TO BLACKMAIL THE MANAGERS BY FINDING A WAY TO CRASH THE SYSTEM. IF SPECIAL PASSWORDS WERE NOT GIVEN THEM THEY WOULD CRASH THE SYSTEM. IN THIS CASE FIND OUT WHAT THEY WERE DOING AND PATCH MONITOR. SHOULD THEY REFUSE AND CONTINUE TO CRASH THE TSS/8, STUDENT AND TEACHER PRESSURE MAY BE TURNED AGAINST THEM, AND THEY MAY BE KICKED OFF THE SYSTEM. LOSS OF ACCOUNT 1 PASSWORD THIS IS DUE TO THE FACT THAT ANYTHING IN YOUR CORE AREA IS NOT ERASED AFTER LOGOUT AND ANOTHER USER MAY READ IT AFTER LOGGING IN. LEAVE NO PASSWORDS ON DISK!. LOSS OF ACCOUNT 1 MAY REQUIRE CHANGING OF ALL PASSWORDS! *****ALLIANCES AND TECHNIQUES******* YOU MAY EXPECT PROBLEMS IN THE FOLLOWING AREAS: UNLIKE OTHER MIDDLE SCHOOLS, LINCOLN HAS A LIBERAL COMPUTER COURSE WHERE STUDENTS MAY DO ANYTHING THEY WISH. IN THIS WAY THEY KNOW MORE AND MAY TRY TO USE THIS AGAINST YOU. IN TIME THEY WILL BECOME FRESHMEN AT CORONA. THUS AN ALLIANCE EXISTS BETWEEN CORONA AND LINCOLN. EVERYBODY AT CORONA WILL KNOW LINCOLN'S PASSWORD AND VICE VERSA. DO NOT ATTEMPT TO REMEDY THIS. THE MIDDLE SCHOOLS WILL LOSE PASSWORDS. IN SOME CASES JOHN NIENHUIS AT ESTANCIA WILL TURN AGAINST YOU. FOR EXAMPLE, IF A STUDENT CAN CRASH THE 8 HE MAY MAKE A LAUGHING STOCK OF YOU BY SAYING YOU CANNOT REMEDY PROBLEMS. IN REALITY YOU MAY NOT KNOW WHAT THE STUDENT IS DOING. IN THE PROCESS OF TRYING TO COMMUNICATE WITH STUDENTS YOU MAY GO EITHER THROUGH NEWS OR SEND OUT MEMOS THROUGH MR. NIENHUIS AT ESTANCIA. WE GIVE THE FOLLOWING EXAMPLE. ***DESIRED COMMUNICATIONS: WE WANT SYSTEM MANAGERS WITH ADEQUATE TRANSPORTATION TO TAKE OVER. ***BY NEWS: WE NEED SYSTEM MANAGERS WITH ADEQUATE TRANSPORTATION. ***BY DISTRICT MEMO: WE WANT SYSTEM MANAGERS WITH CARS WHO RESPECT OTHER USERS, ETC. ETC. *USE NEWS - MAKE IT RELIABLE* ***WE SUGGEST THE FOLLOWING TECHNIQUES*** PASSWORD SECURITY AMONG SCHOOLS KEEP THE SCHOOLS SEPARATE. IT IS EASIER TO TRACE WHERE THINGS ARE COMING FROM IF THE 1% IS LIMITED TO ONE ACCOUNT. TEACH SECURITY TECHNIQUES TO ALL STUDENTS AND CHANGE PASSWORDS AS NEEDED (IN ADDITION TO REGULAR SYSTEM CHANGES). DECEPTION IF YOU WANT INFORMATION FROM A PERSON ON THE EIGHT, LOGIN UNDER A MIDDLE SCHOOL ACCOUNT AND ASK. THEY WILL NORMALLY TALK IN ORDER TO SATISFY THEIR EGO. SELECTIVE DESTRUCTION IF YOU HAVE TO BURN PEOPLE, BURN ONLY THE OFFENDER. DO NOT MAKE ENEMIES BY DESTROYING INNOCENT FILES. DIVIDE AND CONQUER A WEAK ALLIANCE WHERE NOT EVERYBODY TRUSTS EACH OTHER CAN BE BROKEN BY CHARGING THE ENTIRE GROUP WITH SOMETHING. THEY WILL TEAR EACH OTHER APART TRYING TO FIND GUILT. USE NEWS TO YOUR ADVANTAGE. MAKE CHARGES, DROP NAMES, THE USERS WILL DO THE DIRTY WORK FOR YOU. BREED FEAR AN INTERESTING METHOD: A STUDENT MAY HAVE A PROGRAM THAT TAKES UP ALL AVAILABLE DISK, OR IN OTHER WAYS INTERFERES WITH YOUR OBJECTIVES. REPLACE HIS PROGRAM WITH ONE OF YOURS, ONE THAT CREATES SOME HAVOC IN HIS FILE AREA. SUGGESTED WAS TO PROTECT HIS PASSWORD 0, MAKE A PROGRAM TO CHANGE IT FROM HIS ACCOUNT, THAT DELETED ITSELF FROM DISK AND CORE, AND LOGGED HIM OUT. HE CANNOT LOG IN AND WILL NEVER RUN A PROGRAM AGAIN UNTIL HE HAS TOTALLY CHECKED IT. KNOW WHAT IS HAPPENING THIS IS IMPORTANT. THIS WAY NOTHING MAY TAKE YOU BY SURPRISE. SUGGESTED: A LOG FILE; A PROGRAM THAT WRITES LOGINS AND LOGOUTS ON A DISK FILE LIKE THIS: 5001 ON K07 AT 17:45 5001 OFF K07 AT 17:46 MONITOR UPTIME STATISTICS (CPU, CPU/DEV, DEVICE). IF A RECORD IS KEPT OF THIS, SUDDEN UNEXPECTED CHANGES WILL BE NOTED. THIS MAY INDICATE THAT A PASSWORD HAS BEEN LOST AND MORE PEOPLE ARE USING IT THAN SHOULD BE. ALSO NOTE THE RATIO OF CPU/DEV. AN AVERAGE VALUE IS 1-3%. CHANGES TOWARD 6-7% INDICATE CONSTANT LOOPS, POSSIBLE PASSWORD SCANS. PROTECTION IN THE EVENT THAT ACCOUNT 1 OR 2 IS LOST, AND YOU DO NOT KNOW WHAT HAS HAPPENED, STUDENTS MAY ALTER SOFTWARE TO THEIR SPECIFICATIONS. FOR EXAMPLE, QUOTAS MAY BE DROPPED, PASSWORDS CHANGED, SYSTEM PROGRAMS MODIFIED TO STEAL PASSWORDS. IN ADDITION TO THIS, YOU MAY, IN TIME, CREATE 'SENSITIVE' PROGRAMS SUCH AS TELETYPE SLAVERS. SUCH PROGRAMS MAY BE USED AGAINST YOU. THE FOLLOWING ARE SUGGESTED: USE PROTECTION 13 IN YOUR ACCOUNT SERIES, THIS ALLOWS YOU TO WORK WITHIN YOUR SERIES, YET BLOCKS OUT ALL OTHER USERS. REMOVE LOGID AND SUPER FROM DISK AND USE .R XRUN TO RUN THESE PROGRAMS. IT HAS BEEN SUGGESTED THAT CAT BE REMOVED FROM THE SYSTEM AND REPLACED WITH COPY. IT HAS THE FOLLOWING ADVANTAGES - - IF ACCOUNT 1 IS LOST IT IS DIFFICULT TO OBTAIN PASSWORDS - - SYVTEM MANAGERS MAY USE CAT THROUGH XRUN. THE WAYS OF BRIGHT BOYS THERE IS A GREATER CHANCE OF LOSING PASSWORDS 1 AND 2 IF YOU: USE IT AT SCHOOL (YOU MAY CATCH A PASSWORD STEALING PROGRAM, ETC.) WRITE IT DOWN IN ANYPLACE BUT YOU OWN HOME (IF YOU CAN GET IN HERE ANYONE ELSE CAN) LEAVE CAT LISTINGS ON K00. DISTRACTION IN THE EVENT THAT ALL APPEARS LOST, ATTEMPT TO DISTRACT THE PEOPLE DESTROYING THE SYSTEM BY GIVING THEM ANOTHER SYSTEM TO DESTROY. A NUMBER IS THE AL COM TIMESHARING NETWORK ON THE PAGE OF TELEPHONE NUMBERS. *** THESE MEANS MAY SEEM BARBARIC AND ARE BARBARIC. HOWEVER, REALIZE THAT UNTIL SOME USERS MATURE AND BECOME SYSTEM MANAGERS, THEIR ONLY OBJECTIVE IN LIFE IS TO DESTROY A COMPUTER SYSTEM. UNLESS YOUR PASSWORD DEFENSE IS GOOD OR YOU ARE TOTALLY INEPT AS SYSTEM MANAGERS AND PROGRAMMERS, THE PRECEEDING WILL BE OF NO AID AND MAY BE USED AGAINST YOU. WHAT FOLLOWS IS AN EXAMPLE OF INFORMING TEACHERS OF NEW PASSWORDS ][ AND [] ARE EDITING MARKS USED TO FILL INFORMATION. TO THE INSTALLATION AT * ALL HAIL! THIS LETTER IS BEING SENT TO YOU IN ORDER TO FAMILIARIZE YOU WITH THE CHANGES MADE ON THE TSS/8 DURING SUMMER 1972. INCLUDED WITH THIS LETTER ARE PASSWORDS FOR YOUR INSTALLATION (ONE PER TERMINAL) AND PROGRAMMING CHANGE MANUALS (ONE PER TERMINAL). THESE TWO SUBJECTS ARE DISCUSSED FURTHER IN THE FOLLOWING SECTIONS. PLEASE READ THEM CAREFULLY IN ORDER TO PREVENT STUMBLING IN THE DARK. THANK YOU, FRANCIS BOERO BILL FLEISCHMAN LEE SHUCK (OTHERWISE KNOW AS THE BCD) [OR THE OPERATORS OF TSS/8] PASSWORDS OUR MAIN OBJECTIVE IN ISSUING PASSWORDS IS SECURITY. ONLY THE STUDENTS WITHIN YOUR INSTALLATION SHOULD KNOW THESE PASSWORDS. PAST EXPERIENCE HAS SHOWN THAT A BREAKDOWN OF SECURITY LEADS TO 'PRANKS' BY OTHER SCHOOLS [I. E. RIPPING THE PLACE UP]. THEREFORE WE SUGGEST THE FOLLOWING RULES BE FOLLOWED: 1) DO NOT MAKE A POSTER OF YOUR PASSWORDS AND HANG IT UP ON THE WALL. ANYBODY CAN WALK IN AND READ THEM (IT HAS BEEN DONE). 2) IF POSSIBLE ONLY GIVE PASSWORDS ORALLY. 3) DURING OTHER FESTIVITIES (OPEN HOUSE) HAVE THE TERMINALS LOGGED IN BEFORE THE CROWD ARRIVES. THOSE VISITORS THAT APPEAR TOTALLY CONFUSED BY YOUR DEMONSTRATIONS ARE ACTUALLY LOOKING HARD FOR PASSWORDS TO BE TYPED IN. 4) KNOW YOUR INSTALLATION. RECOGNIZE STRANGERS. TWO SETS OF PASSWORDS ARE INCLUDED WITH THIS LETTER. ONE IS A CONTINGENCY PASSWORD DESIGNED TO BE USED BEFORE SCHOOL STARTS FOR USE IN PLANNING CLASS PROGRAMS. THIS PASSWORD IS ASSIGNED THE TOTAL DISK QUOTA OF YOUR INSTALLATION (SEE MANUAL: ALMNAC TS8). AT THE BEGINNING OF SCHOOL IT WILL RENAMED TO YOUR REGULAR PASSWORD AND ITS QUOTA DIVIDED AMONG YOUR TERMINALS. WE INSIST THAT YOU DO NOT DIVULGE YOUR REGULAR PASSWORDS BEFORE SCHOOL STARTS. PROGRAMMING CHANGES AND PROCEDURES PLEASE READ THE MANUAL INCLUDED: ALMNAC TS8. AT THE TIME OF THIS LETTER THE QUOTA PER SCHOOL IS 30 DISK BLOCKS. EACH TERMINAL HAS ITS OWN PASSWORD AND ITS SHARE OF QUOTA. INFORM YOUR STUDENTS OF THE PROGRAMMING CHANGES AND ENCOURAGE THEM TO READ THE MANUAL. FURTHERMORE, TRY TO KEEP STUDENTS FROM DUPLICATING ACCOUNTS IN A MULTI-TERMINAL INSTALLATION. SINCE DISK QUOTA IS DIVIDED EQUALLY DUPLICATION CAN LEAD TO THIS: QUOTA PER ACCOUNT: 10 BLOCKS 3 TERMINAL INSTALLATION ALL THREE USERS LOGGED IN ON ACCOUNT 5733 USER 1 ADDS 6 BLOCKS TO DISK. BEGINS LOGOUT, LOGOUT NOTICES OTHER USERS LOGGED IN DOES --NOT-- CHECK QUOTA. USER 2 ADDS 9 BLOCKS TO DISK TOTAL: 15 LOGS OUT. NO QUOTA ENFORCED SINCE USER 3 STILL LOGGED IN. USER 3 ADDS 3 BLOCKS TO DISK TOTAL:18 TRIES TO LOG OUT. OVER QUOTA. FEARS DELETING OTHERS FILES TO AVOID RETALIATION. FEARS HANGING UP FOR RETALIATION BY OPERATORS. SITS BY TERMINAL ALL NIGHT. ENCOURAGE INDIVIDUAL RESPOSIBILITY BY NOT DUPLICATING ACCOUNTS. YOUR PASSWORDS ARE: CONTINGENCY:[] REGULAR: (ACTIVATED AT BEGINNING OF SCHOOL) ][ SURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVE SURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVE SURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVESURVIVE RESOURCES WHAT FOLLOWS IS A LISTING OF ALL BCD AND DEC DECTAPES. THE FOLLOWING CODES ARE USED: # - OBSOLETE % - OPERATION PROCEDURES FORGOTTEN + - UNKNOWN OR FORGOTTEN ALL ASCII FILES ARE SELF EXPLANATORY AND SHOULD BE SELF DOCUMENTED. BASIC PROGRAMS ON DECTAPE [BCD #1] ARE PART OF AN OLD FOOTBALL ANALYSIS PROGRAM WRITTEN BY STEVE MATT CDMHS. SYSTEM FILES ON BCD DECTAPE #2 WERE CREATED AS BACKUPS IN CASE THE DEC LIBRARY TAPE IS LOST. THE FOLLOWING DATA WAS CORRECT AS OF MAY 11, 1973. SUGGESTIONS: FORTRAN HAS FOUR PARTS ON DISK CONSISTING OF FORT.SAV,FOSL.SAV, FDCOMP.SAV, FOSSIL.SAV. UNLESS ALL PARTS ARE ON DISK FORTRAN WILL NOT RUN. BASIC FROM TIME TO TIME WILL GO FLAKY. RELOADING MAY HELP, OR A RELOAD TO A FRESH SYSTEM. NEWS MAY BE USED IN THE FOLLOWING CIRCUMSTANCES - IF A PROGRAM MUST BE REMOVED (SUCH AS CAT) RENAME NEWS CAT. YOU WILL HAVE TWO NEWS INTERPRETERS ON FILE NOW, ONE CALLED NEWS, GIVING NEWS FROM FILE ABCCBA, AND ONE NAMED CAT (OR WHATEVER), GIVING INFORMATION ON WHAT HAPPENED TO CAT FROM ANOTHER DISK FILE. [THE DISK FILE NAME THAT NEWS READS MAY BE CHANGED BY ALTERING LOCATION 22(8) TO INDICATE THE ACCOUNT OF THE FILE AND LOCATIONS 23-25 TO INDICATE THE NAME. DEVICE-DECTAPE (BCD #1) 500. FREE BLOCKS NAME SIZE DATE LGO9 .ASC 18 8-FEB-73 USERS 2 1-SEP-72 # - SAV FORMAT DELETE 2 1-SEP-72 MOU9 .ASC 12 4-OCT-72 FLIP .BAS 8 8-OCT-72 PIP1 .BAS 4 8-OCT-72 PIP3 .BAS 6 5-OCT-72 PIP2 .BAS 2 8-OCT-72 PIP6 .BAS 6 8-OCT-72 BYE0S7 8 2-MAR-73 # - LEAVES PASSWORDS ON DISK LOO8 .ASC 50 13-NOV-72 TIP1 .BAS 4 3-OCT-72 TIP2 .BAS 4 3-OCT-72 TIP3 .BAS 4 23-OCT-72 PIP7 .BAS 6 8-OCT-72 DEL2 .ASC 10 8-SEP-72 PTF10 .ASC 6 8-SEP-72 REWIND 2 8-SEP-72 % - REWINDS DECTAPES UNDLOG 4 9-SEP-72 + EXAMIN 4 9-SEP-72 + PILOS 6 8-SEP-72 CRUDE MONITOR SYSTAT? PILOT 10 8-SEP-72 DISK WRITING VERSION OF ABOVE (OR VICE VERSA)? GRI22 .ASC 64 18-JAN-73 PASFND 2 8-SEP-72 PASSWORD GENERATOR. SAVE FORMAT. HIT SPACE FOR EACH PASSWORD NEEDED. LOO9 .ASC 50 17-NOV-72 SLAVE .SAV 10 9-JAN-73 TELETYPE SLAVER GRIPE .BIN 12 8-SEP-72 QUOTP5.SAV 46 9-SEP-72 PIP5 .BAS 4 9-OCT-72 QUOTA5.BIN 8 9-SEP-72 QUOTS 6 9-SEP-72 SUPER GRI21 .ASC 62 14-JAN-72 DAT5 22 10-OCT-72 + MORAX 2 6-OCT-72 % - MONITOR PEEK PROGRAM STAT .ASC 8 12-SEP-72 TIP8 .BAS 2 3-OCT-72 TIP2B .BAS 4 16-OCT-72 DEFLIP.BAS 6 16-OCT-72 BASIC .SAV 76 10-OCT-72 ALGBRA.BAS 20 13-NOV-72 PIP4 4 1-OCT-72 LOGOUT.BIN 10 8-FEB-73 LOO10 .ASC 54 20-NOV-72 FLIP2 8 1-OCT-72 OPR1 .ASC 10 1-OCT-72 DFILE 20 3-OCT-72 + 3DTIC .BAS 10 3-OCT-72 MOR11 .ASC 12 4-OCT-72 STATS .SAV 2 13-OCT-72 TIMMAT 4 4-JAN-72 BUSY .SAV 2 24-OCT-72 TIP4 .BAS 6 16-OCT-72 BYE0PC.ASC 50 8-FEB-73 FCN3 .ASC 6 27-SEP-72 TIP5 .BAS 4 16-OCT-72 MES1 .ASC 6 8-SEP-72 LOO11 .ASC 54 21-NOV-72 MSG17 .ASC 64 13-NOV-72 SLA16 .ASC 16 3-DEC-71 NEWS 2 14-JAN-72 DES1 .ASC 22 5-NOV-72 FRE6 .ASC 14 9-SEP-72 OPTION- DEVICE-DECTAPE BCD #2 534. FREE BLOCKS NAME SIZE DATE MOU9 .ASC 12 12-OCT-72 MSG14 .ASC 54 12-OCT-72 DEL2 .ASC 10 12-OCT-72 PTF10 .ASC 6 12-OCT-72 SLA9 .ASC 14 12-OCT-72 SLA8 .ASC 12 12-OCT-72 GRI20 .ASC 62 12-OCT-72 SLA10 .ASC 16 12-OCT-72 SLA11 .ASC 18 12-OCT-72 FRE6 .ASC 14 12-OCT-72 FCN3 .ASC 6 12-OCT-72 DEVI .ASC 16 17-OCT-72 LOO9 .ASC 50 17-NOV-72 LOO12 .ASC 54 23-NOV-72 LOOKUP.SAV 6 23-NOV-72 + ??? FOCAL 32 8-FEB-73 SYSTAT.SAV 10 8-FEB-73 PIP .SAV 20 8-FEB-73 CAT .SAV 12 8-FEB-73 LOGID .SAV 6 8-FEB-73 EDIT .SAV 16 8-FEB-73 DELETE 2 8-FEB-73 PALD .SAV 32 8-FEB-73 LOADER.SAV 10 8-FEB-73 FRECNT 2 8-FEB-73 GRIPE 12 8-FEB-73 ODTHI .SAV 4 8-FEB-73 BUSY 4 8-FEB-73 MOUNT 2 8-FEB-73 BASIC .SAV 76 8-FEB-73 PROT .SAV 2 8-FEB-73 FREE 2 8-FEB-73 QUOTA 2 1-MAR-73 COPY 20 10-FEB-73 FORT .SAV 12 1-MAR-73 LOGOUT 8 8-FEB-73 NEWS 2 1-MAR-73 SUPER 6 8-FEB-73 BAS000.SAV 76 1-MAR-73 FOSL .SAV 14 1-MAR-73 FDCOMP.SAV 32 1-MAR-73 FOSSIL.SAV 20 1-MAR-73 BAS001.SAV 76 1-MAR-73 BYE0S7 8 2-MAR-73 LOOKA2.ASC 58 5-MAY-73 OPTION- ? OPTION- ? OPTION- DEVICE-MASTER DECTAPE: SYSTEM PROGRAMS FROM DEC 330. FREE BLOCKS NAME SIZE DATE BASIC .SAV 76 31-AUG-71 FOCAL .SAV 32 1-APR-70 SYSTAT.SAV 10 6-APR-71 LOGOUT.SAV 12 20-JUL-70 PIP .SAV 20 6-APR-71 CAT .SAV 12 28-SEP-70 PALD .SAV 32 6-APR-71 ODTHI .SAV 4 20-JUL-70 LOADER.SAV 10 20-OCT-70 FORT .SAV 12 2-MAR-70 FOSL .SAV 14 28-SEP-70 FDCOMP.SAV 32 2-MAR-70 FOSSIL.SAV 20 2-MAR-70 LOGID .SAV 6 20-JUL-70 LGOUTX.SAV 8 8-FEB-73 DEMO .SAV 32 1-APR-70 CATLOG.BAS 26 3-MAR-70 GRIPE .SAV 12 8-FEB-73 PLOT .FCL 2 3-MAR-70 BANDIT.BAS 14 3-MAR-70 BLKJAC.BAS 32 3-MAR-70 BUNNY .ASC 56 3-MAR-70 CRAPS .BAS 12 3-MAR-70 EVEN .BAS 16 3-MAR-70 FILMS .BAS 16 3-MAR-70 FTBALL.BAS 30 31-AUG-71 HOSSR .BAS 14 31-AUG-71 GOLF .BAS 24 3-MAR-70 BYE0S4 6 10-OCT-72 BACKUP OF BASIC NELSON.BAS 4 3-MAR-70 NIM .BAS 22 3-MAR-70 ROULET.BAS 26 3-MAR-70 SPORTS.BAS 22 3-MAR-70 TICTAC.BAS 10 3-MAR-70 BASICX 76 23-OCT-72 FACT .BAS 6 3-MAR-70 FACTAL.BAS 30 3-MAR-70 FIBO .BAS 6 3-MAR-70 INVERT.BAS 24 3-MAR-70 MAGIC .BAS 6 3-MAR-70 PRIME .BAS 8 3-MAR-70 INTER .BAS 4 3-MAR-70 PEACE .BAS 14 3-MAR-70 PEACE2.BAS 10 3-MAR-70 SNOOPY.BAS 12 3-MAR-70 WDGAME.ASC 10 3-MAR-70 DATA .ASC 8 3-MAR-70 MATRIX.ASC 6 3-MAR-70 TYPE .ASC 10 3-MAR-70 HAMURS.FCL 10 3-MAR-70 HAMURA.SAV 32 1-APR-70 ROCKES.FCL 8 1-APR-70 ROCKET.SAV 32 1-APR-70 CIVIL .BAS 32 1-APR-70 CRASH .SAV 14 1-APR-70 CATX 12 23-OCT-72 TEST3 .SAV 28 20-JUL-70 COPY .SAV 20 20-JUL-70 EDIT .SAV 16 20-JUL-70 COPYX .SAV 20 8-FEB-73 MORAX 2 8-OCT-72 OPTION-