perm filename ERRATA.BH[S,DOC]5 blob sn#106963 filedate 1974-06-19 generic text, type T, neo UTF8



STANFORD ARTIFICIAL INTELLIGENCE LABORATORY                June, 1974
OPERATING NOTE 54.3 1/2









             M O N I T O R   C O M M A N D   M A N U A L
                        (addenda and errata)



                                 by


                            Brian Harvey









This  document  contains  corrections and  additions  to  the Monitor
Command Manual,  SAILON 54.3, reflecting  improvements in  the system
facilities  as of  the date  above. A  line printer  version  of this
document is available for network users in the file ERRATA.BH[S,DOC].
Note:  page numbers  mentioned  herein refer  to the  XGP  edition of
SAILON 54.3, even in the LPT version of this document.







This work was supported  by the Advanced Research Projects  Agency of
the   Office   of   the   Secretary   of   Defense   under   contract
DAHC15-73-C-0435.
Monitor Command Manual (addenda and errata)                         1


------

The first  sentence of the  third paragraph on  page 4  (section 1.3)
should be replaced as follows:

A vacant terminal should say TAKE ME I'M YOURS! along with a  line of
cryptic  information  on  an  otherwise  blank  screen.   The cryptic
information is the system WHO line, described on page 17.
                   ______ ___ _____


------

The following  lines should be  added to the  device table on  page 7
(section 1.5) The old AD device is still present but not for long.

  IMP      Interface Message Processor for ARPA network connections
  ADC      Analog to digital converter
  DAC      Digital to analog converter


------

Add the following  paragraph to the  description of the  audio switch
escape commands on page 21 (section 2.9):

Your program can control the audio switch selection for your terminal
by UUO.  Although programs cannot in general change the  audio switch
setting for another terminal, there  is a BEEP UUO which can  be used
to  cause any  terminal's  loudspeaker to  be connected  to  the beep
generator for a short time (less than one second).  This is  used by,
e.g., the SEND command to call the recipient's attention to a message
on his screen.  You can permit or refuse such beep connections by UUO
or by escape commands; BREAK B refuses beeps, and ESC B permits them.
Any change to your audio  switch setting by other means (e.g.  ESC U)
also cancels the effect  of BREAK B, so  you must repeat the  BREAK B
command after changing your selection.


------

Add the following paragraph to section 4.2, page 24:

If your core image includes  an upper segment (see page 11),  you can
set  or clear  the write  protection bit  with the  SETUWP  or CLRUWP
commands.  You  cannot clear  write protection  for a  sharable upper
segment if it  is protected against you.   (See the UUO Manual  for a
                                                    ___ ______
complete discussion of upper segment protection.) These commands also
take an optional octal argument, which is used to set  the protection
code for the segment if you are permitted to change the code.
Monitor Command Manual (addenda and errata)                         2


------

Add the following sentence to the description of the START command on
page 25 (section 4.3):

If the octal argument is preceded  by + or -, the number is  added to
or subtracted from the program's normal starting address to determine
the desired starting address.

Also add  the following  sentence to the  description of  the REENTER
command on the same page:

An octal argument preceded by + (optional in this case) or -  will be
added to or subtracted from the reenter address.


------

Add the following sentence to the description of the FORK  command on
page 26 (section 4.4):

If the system's job capacity is used up, so that it is  impossible to
start a new job, your terminal remains attached to the existing job.


------

Add the following sentence to  the description of the command  TIME 0
on page 28 (section 4.6):

It also types the percentage spent in the monitor at interrupt level,
but this information  is provided for  the benefit of  system wizards
and is not particularly meaningful to users.

Also, add  this to  the description  of the  DAYTIME command  on that
page:

If the job has been logged  in since the previous day, dates  (day of
the month) are typed along with the three times.
Monitor Command Manual (addenda and errata)                         3



------

Replace the last paragraph on page 30 and the first paragraph on page
31 (section 5.1, LOGIN) as follows:

It  is  possible to  set  a  password and  file  protection  codes to
restrict access to a particular PPN.  If the PPN you specify to LOGIN
has a password, LOGIN types  Password= and you must type  the correct
password to log in.  Echoing of input characters is turned off so the
password does  not print.   Passwords may  be one  to six  letters or
digits  followed  by  RETURN.   To  protect  files  from unauthorized
access, there is  a protection code  associated with each  file.  The
code specifies the access allowed to the file for its owner  (i.e., a
user logged  in under the  file's PPN), for  other authorized  AI Lab
users, and for guest users who are logged in remotely (from  the ARPA
network, dial-up telephone lines, or campus terminals).  You  can set
the protection code for a  file using the COPY program  (see Appendix
2).  However, you  must use the LOGIN  program to set  the protection
code of your file  directory itself, and the default  protection code
which  is assigned  to new  files created  in your  directory  if the
program writing the file does not specify a value explicitly.  If you
use % as the delimiter between the project and programmer  names when
you  log in,  LOGIN  will give  you  the opportunity  to  change your
password, the file  directory protection, and the  default protection
for new files.  The protection codes are entered as three-digit octal
numbers, with the following meanings:
Monitor Command Manual (addenda and errata)                         4


  Bit      Meaning in directory protection code

  400      password is for remote logins only (see below)
  200      unused
  100      owner may not write files
  040      local users may not change protection of files
  020      local users may not read directory or any files
  010      local users may not write any files
  004      guest users may not change protection of files
  002      guest users may not read directory or any files
  001      guest users may not write any files

  Bit      Meaning in file protection code

  400      don't dump this file (see DART, Appendix 5)
  200      delete protect (see COPY, Appendix 2)
  100      owner may not overwrite this file
  040      local users may not change protection of this file
  020      local users may not read this file
  010      local users may not overwrite this file
  004      guest users may not change protection of this file
  002      guest users may not read this file
  001      guest users may not overwrite this file

If the 400 bit is on in the protection code for a file directory, the
password associated  with that area  is used only  for logins  from a
remote site;  no password will  be required for  local login  on that
PPN.   Except  for the  special  NET,GUE guest  account  (see below),
remote login is not allowed on a PPN which does not have  a password;
thus, if you want  to be able to log  in remotely but do not  want to
have to type a password for  local login, you can set the 400  bit in
your directory's protection  code.  Remote users without  accounts on
the system can log in as NET,GUE (network guest) without  a password.
(Instead, if you log in as NET,GUE you will be asked to type  in your
name.  Any name you give is accepted and stored to identify  your job
as long  as you  remain logged  in; the  FINGER command  (see Section
5.11) will type the name you give to identify you to other users.) It
is possible  to set  up special guest  accounts without  the password
requirement  for use  by specific  AI Lab  project groups;  consult a
system programmer for more information on this.

Users with  access to local  terminals who sometimes  need to  log in
remotely can set a password (with %) for their own PPNs; remote users
who want to establish  their own file directories  should communicate
with  Lester  Earnest.   (Log  in  as  NET,GUE  and  type  MAIL LES.)
Sometimes you may find the system is in maintenance mode, which means
                                        ___________ _____
that the monitor  is being debugged and  the system is  not available
for normal  use.  If you  try to log  in at such  a time you  will be
asked for the maintenance password.
Monitor Command Manual (addenda and errata)                         5


------

Change the reference to APE on page 32 (section 5.1, LOGIN) to NS.


------

Add the  following at  the end  of the  LOGOUT description  (page 33,
section 5.2):

Any of these commands,  when typed at a PTY  which is not owned  by a
TELNET server (that is, not  the virtual terminal of an  ARPA network
user), simply kills the job without running the LOGOUT program.  This
has approximately the effect of KJOB/F.


------

Add the  following to  the table of  E commands  on page  33 (section
5.3):

  READ     edit with E in book mode

Also,  the second  line  of the  table of  compile-type  RPG commands
should be:

  LOAD     compile and load programs


------

Add this to the table of MAIL commands on page 35 (section 5.5):

  PLAN     create plan file for FINGER (see page 40)


------

Add the following  to the description of  FINGER on page  40 (section
5.11):

If the programmer specified as  the argument to FINGER is  not logged
in, the program types the date and time of his last logout.  Also, if
he has created a plan file (with the PLAN command, Appendix 4)  it is
typed.  FINGER will accept  human being names as argument  instead of
programmer names, if desired.
Monitor Command Manual (addenda and errata)                         6



------

Replace the description of SYSTAT on page 40 (section 5.11) with

The SYSTAT command runs the  WHO program (see section 5.9).   The old
SYSTAT program is no longer supported on this system, but the command
name was retained for compatibility with other systems.


------

Delete the sentence beginning "If  you end the command line  with ALT
..." in  the description of  the TELNET command  on page  41 (section
5.12).  The effect formerly achieved by ALT is now used automatically
in all  cases.  Also,  add the following  paragraph after  the TELNET
description:

It  is  possible  to  establish  TELNET-like  connections  to  remote
computers by  using dial-up connections  via the  dataphones normally
used  for  incoming  dial-up lines.   Such  dataphones  are presently
associated with TTY10 and  TTY11; the dataphone on TTY11  includes an
automatic  dialing  circuit.   The  DIAL  command  will  establish an
outgoing dataphone  connection and thereafter  behave like  a TELNET.
The dial command  takes as its argument  either the device name  of a
TTY, in which case you must dial the number you want manually  on the
associated dataphone, or a telephone number in the form

{(ddd)}ddd{-}dddd

where d  represents a digit  and braces enclose  optional characters.
In the latter case,  the telephone number is dialed  automatically on
TTY11's dataphone.


------

Add the following to the end of page 41 (section 5.12):

The NS command runs the News Service program, which allows  access to
news stories which have been received from the Associated  Press news
wire.  The HOT command runs the HOT program, which types A.P. stories
as they come in.  These commands are restricted to local users at the
request  of the  Associated Press.   Full documentation  on  the A.P.
service is contained in the file NS.ME[S,DOC].
Monitor Command Manual (addenda and errata)                         7



------

Add the following to section 6, page 42:

Privileges can be enabled or disabled at any time.  That is, for each
job,  the  monitor  remembers  the privileges  to  which  the  job is
entitled  as  well  as  the ones  which  are  presently  active.  All
privileges to which you are entitled are normally activated  when you
log in, but you may choose to disable any or all for  safety reasons.
The ENABLE and  DISABLE commands, with no  arguments, turn on  or off
all privileges to which you are entitled. These commands may  also be
used with a privilege name as argument, to enable or disable specific
privileges.  If you have  the PRI privilege, you can  enable specific
privileges  to which  you are  not entitled,  except  that privileges
which are  intended only  for specific  programs (XGP  font compiler,
service level monitor) cannot be enabled by any user.

Also, a few system programs intended for general use  require special
privileges.   Such programs  are run  by special  commands (not  R or
RUN), and any attempt to modify your core image while running  such a
program will disable the temporary privileges involved.
Monitor Command Manual (addenda and errata)                         8



------

In the description of the CETV and ETV commands on page  44 (appendix
1),  in the  last line  of the  paragraph numbered  1, the  word "of"
should be "if".  Also, delete the last sentence in the last paragraph
on that page, numbered 3.   (TMPCOR files for each job are  now saved
separately  for  each alias  used  by that  job.)  Add  the following
paragraph at the end of the page:

READ

The READ command starts E  in a special mode, called book  mode, used
                                                     ____  _____
to read  long files over  an extended time  period.  In this  mode, E
does several things differently from the normal editing procedure:

1.  If there is a file  with the name in the READ  command, extension
BKP, and PPN matching that  given in the command, your ALIAS  PPN, or
your login PPN (tried  in that order), it is  used as an RPG  file to
determine where to start editing the specified file.  This "bookmark"
file is not deleted by LOGOUT, so you can continue reading at a later
session.  The  file, if found,  is updated when  you exit from  E; if
there was no BKP file, one  is created on your (alias) area  when you
exit.

2.  A READ  command with no argument  uses RPG (TMPCOR) files  as ETV
does, but the  filename used is different,  so you can  alternate ETV
and READ commands for different files with no confusion.

3.  E does not allow you to modify the file when using book mode.


------

Insert the following  entry in the  table of "filehack  selectors" on
page 58 (appendix 2, COPY):

  PLAN     <pn>.PLN[2,2]       Current user's PLAN file


------

Insert  this sentence  in  the paragraph  about DECtapes  on  page 59
(appendix 2, COPY):

The total file capacity of a DECtape is about 71.4K words.
Monitor Command Manual (addenda and errata)                         9



------

Insert  the  following on  page  60 (appendix  2,  COPY),  before the
"Switches" section:

Spooling pseudo-devices:

COPY  recognizes two  pseudo-device names,  TPL: and  PGX:,  to allow
spooling  of the  output of  some copy  function to  the LPT  or XGP,
respectively.  These device names  may be used only in  output terms,
and may  not be used  with file  names.  COPY creates  a file  on the
[SPL,SYS]  directory  containing  the desired  output,  and  enters a
spooling request  for the  appropriate device.   The file  is deleted
after  spooling.   For  a  standard  COPY  command,  the   effect  is
essentially equivalent to the recommended SPOOL/RECOPY (see page 66);
the main advantage of this capability is for direct spooling  of list
terms, e.g.,

DIRECT TPL:←[*,SYS]

to  spool a  list  of the  [*,SYS]  file directories.   (Note:  It is
claimed that these pseudo-device  names stand for The Pseudo  Lpt and
Pseudo Graphic Xerox-machine respectively.)


------

In the list of COPY switches (page 61, appendix 2), add this entry:

  NOSPACES       NOS  This switch  eliminates spaces at  the end
                      of a line.

Also,  on page  62, add  /REFERENCE and  change the  abbreviation for
/RENAME as follows:

  REFERENCE      REF  This  switch  is like  /SEARCH  below, but
                      includes in the directory listing an extra
                      column containing  the date on  which each
                      file was last read (referenced by LOOKUP).
  RENAME         REN  A rename  is done on  the input  file with
                      the   output  file   information.   /QUIET
                      applies when the output filnam.ext already
                      exists.
Monitor Command Manual (addenda and errata)                        10



------

In the table of spooler switches (page 66, appendix 3), the entry for
/REPEAT should be

  REPEAT=n    Make n copies of the listing.  (REPEAT is NOT sticky,
              and is not allowed in XSPOOL.)


------

Insert  the following  on  page 66  (appendix 3,  SPOOL),  before the
"Delayed Listing" section:

File specifications may be  read from an auxiliary file  by including
in the  command line the  name of the  auxiliary file preceded  by @.
This file may include file names and switches.


------

Add the following to the table of XSPOOL switches, page 68:

  NOXGP    Opposite of /XGP.
  NTNODE=n Sets  the  number  of  text  nodes  allocated  by the
           monitor (see below).
  NVNODE=n Sets the number of vector nodes allocated.

Also add the following at the end of page 68:

Text nodes and vector nodes are units of core storage allocation used
____ _____     ______ _____
by the monitor's XGP service routines.  Generally, you need not worry
about them, but if you  have trouble printing a complex  document the
allocation control switches  may be able to  help you.  See  a system
wizard to find out.

The  /XGP  switch,  when   present,  turns  off  the   usual  default
assumptions  about other  switches;  in particular,  /HEADING  is not
assumed unless it is explicitly used.  Spooling a file with extension
.XGP implies a default of /NONUMBER as well as /XGP.
Monitor Command Manual (addenda and errata)                        11



------

Add the  following paragraphs to  the QSPOOL and  XSPOOL descriptions
(page 69, appendix 3):

The commands QSPOOL/LPT and QSPOOL/XGP will list spool  requests only
for the indicated device.

The commands UNSPOOL/LPT and  UNSPOOL/XGP will list and  delete spool
requests only for the indicated device.  Also, if you run UNSPOOL and
give  the  monitor  REENTER  command,  it  allows  you  the  extended
capabilities described above for the SPL,SYS user.


------

On  page  70  (appendix  4, MAIL),  insert  the  following  after the
description of the GRIPE  command.  Also, add PLAN to  the subheading
on that page.

A  final  special-purpose  command  is  PLAN,  which  creates  a file
intended to describe  your projected whereabouts, travel  plans, etc.
to other users who may look  for you while you are away.   The format
is

PLAN <message>

Unlike the other MAIL  commands, PLAN creates a file  containing only
the message  in the  command rather  than adding  the message  to any
previously created messages.  Also,  if you use a null  message, your
plan file is deleted.  The plan files are read by the  FINGER program
(see page 40).
Monitor Command Manual (addenda and errata)                        12



------

On page 71 (appendix 4, MAIL), insert the following paragraphs before
the one starting "For the SEND command, ...":

The MAIL command also allows the use of destinations at  foreign ARPA
network sites.  This  facility is described  in detail later  in this
appendix.

If there is  a file named OUTGO.MSG  on your (ALIAS) disk  area, MAIL
will save your message at the  front of that file as well  as mailing
it to the specified destinations.

If you do not  know the programmer name for  a user, you can  use his
human being type name instead (first or last name).  The name will be
found in the  file of authorized users,  if it is present  there, and
you will be told the  programmer name for that user to  encourage you
to use it  in the future  (it's faster).  If  there is more  than one
user with the name you give, it tells you all the relevant programmer
names and invites you to try again.

Also, replace the following paragraph with this one:

For the SEND command, there are several special forms of destination:
a job number, the device name of a terminal followed optionally  by a
colon, *  (sends to  all logged-in  users), and  ARPA* (sends  to all
users logged in via the  ARPA network).  Any of these  special forms,
if used, must be the only destination specified.


------

On page 72  (appendix 4, MAIL),  replace the paragraph  starting "The
check for a file..." as follows:

The check  for a  file directory  for the  specified user(s)  is made
before the program asks for  the message if the multi-line  option is
used.  If there are no valid destinations, the program  exits without
doing anything  else.  If  any destinations  are valid,  however, the
program asks if you  wish to continue, and  if so it continues  as if
only  the valid  destinations were  specified.  (Exception:  The list
provided  by  /D  includes  all  specified  destinations,   valid  or
invalid.)  The special case of a command like SEND PRJ,PRG where what
is meant is SEND [PRJ,PRG] will be caught if PRJ is not the name of a
programmer, and  the (probable)  desired effect  is simulated  with a
warning message  given.  Note: in  the case of  SEND, the  only check
made before the message is typed in is the file directory check.  The
check for the user(s) being logged in is not made until later.
Monitor Command Manual (addenda and errata)                        13


------

On page 74  (appendix 4, MAIL), add  this to the paragraph  after the
table of time formats:

A time without a  date may be followed  by an asterisk (*),  in which
case the reminder will be sent every day at the time specified.


------

On  page  74  (appendix  4, MAIL),  in  the  paragraph  starting "The
optional count field..." replace "#ffl" with "#∞".


------

Add  the following  paragraph  above the  last paragraph  on  page 74
(appendix 4, MAIL, description of REMIND command):

Since  the structure  of the  reminder queue  is rather  sensitive to
incorrect  date  and  time information,  the  current  date  and time
according to the monitor  are checked for reasonableness  against the
reminder  file.  If  they are  considered unreasonable,  no reminders
will be  accepted or delivered  until the system  has been up  for at
least five  minutes.  (Hopefully  by then an  incorrect date  or time
entry will have been noticed and corrected.)
Monitor Command Manual (addenda and errata)                        14



------

Add  the following  new  section before  the description  of  the RCV
command on page 75 (appendix 4).

                     MAIL to ARPA network hosts

The  MAIL command  allows mail  to  be sent  to users  at  other ARPA
network sites.   (This service  is not  available to  network guests,
sorry.)

Since the "@" character was already used in MAIL to specify a file to
be read for command arguments,  the character "%" is used  to signify
ARPA site names, e.g., BH%SU-AI not BH@SU-AI.  Site names  can follow
a user name, as above, or can be used alone (followed by a  space) as
a "sticky" site:

MAIL %MIT-AI RG,TK,MINSKY,BH%SAIL,PAPERT

will send the message to RG, TK, MINSKY, and PAPERT at MIT-AI, and to
BH at SAIL.  (Of course, if SAIL is used as the site name the mail is
not actually sent through the network!)

User  names  for  foreign hosts  can  be  of  (essentially) arbitrary
length.  If the name is a string of letters and digits  starting with
a letter, it can simply be typed as is: TEITELMAN % MAXC for example.
(The case of letters is preserved, in case it matters to  the foreign
host.) If the  user name contains  characters other than  letters and
digits, or  starts with a  digit, enclose it  in quotes (")  with two
quotes used to represent a single quote if necessary.  The  host name
cannot contain  any special characters  except hyphen.   Partial site
names are  recognized as  in our  TELNET and  FTP programs.   Also, a
decimal number may be used instead of a host name if necessary.

If  the destination  list in  a MAIL  command includes  PPNs  at SAIL
(which must be enclosed in  square brackets), SAIL is assumed  as the
destination host and should not be specified explicitly, e.g.,

MAIL %AI [1,BH],TK

mails to TK at MIT-AI and [1,BH] at SAIL.  To mail to a PPN somewhere
else, you must say, e.g.:

MAIL "[N900AR00]"%CMU

The outcome of an attempt to send network mail is reported to you, in
a format somewhat like SNDMSG in TENEX.  The possible outcomes are

USER at SITE -- ok
Monitor Command Manual (addenda and errata)                        15


USER at SITE -- refused
USER at SITE -- queued
USER at SITE -- failed

The first case means that the mail was successfully sent.  The second
means that the network connection was made successfully but  the MAIL
command was rejected, possibly because there is no such user  at that
host.

Network mail will be  queued if it cannot  be sent when you  make the
request (remote host  down, etc.) The mail  is queued via  the REMIND
phantom.  The status report  from the MAIL command is  "queued".  The
mail will be retried at  three-hour intervals for three days.   If it
is sent successfully, or if the three days run out and the request is
deleted, you will receive a status report from the REMIND phantom, in
the form of a reminder from yourself saying

ARPA network mail to USER at SITE -- ok

if successful, or

ARPA network mail to USER at SITE -- expired

if not.  The date and time  in the header of this status  report will
be  the  time when  the  message is  actually  sent  successfully (or
deleted).  The date and time in the header of the message sent to the
remote  site  is the  time  when  you originally  tried  to  send the
message.

It is also possible to get a status report saying

ARPA network mail to USER at SITE -- refused

if the connection to the remote host is made but the host refuses the
mail.   This  status  report  will  also  include  any  error message
returned to us by the remote host.

The CANCEL command lists ARPA  mail which you have queued  and allows
you to abort the request.  The listing by CANCEL contains the text of
your message  and the name  of the addressee,  but lists his  site by
number rather than by name.  It also specifies the number of attempts
remaining before the request will be deleted.

It is possible  to get a "failed"  status report from a  network MAIL
command if the program is  unable to enter the request in  the REMIND
queue, for instance because there are no job slots available  for the
phantom.  In this case you  must try again later yourself.   (You can
save the  text of  a long  message you  have typed  in by  giving the
monitor REENTER command after MAIL exits and redirecting the  mail to
yourself.)
Monitor Command Manual (addenda and errata)                        16


Usually if the  mail is refused,  and possibly otherwise,  the remote
host will send us error  messages intended to be helpful to  you.  If
any such messages are received which are not part of the  normal MAIL
sequence, they are typed out along with the status report.   Thus you
can hopefully figure out why the mail was refused.

Mail to foreign hosts  is prefixed with a TENEX-ish  header including
your real name, if known to  the system, and your net address  (PRG @
SU-AI).  Thus recipients should be able to figure out how to reply.

Distribution  list files  as in  MAIL @FILE  can,  naturally, include
network  destinations.  The  /D switch,  which includes  the  list of
addressees  in the  message,  includes network  addressees,  as typed
(e.g., with abbreviated  site names if  that's what you  typed).  The
message header  as sent to  each net addressee  has his site  name in
full, with his user ID as you typed it.


------

Add  the following  entry to  the  table of  RCV options  on  page 76
(appendix 4):

  P        Postpones the decision for a long message (see below)

Also, add the following to the paragraph concerning long  messages on
page 77, starting "It is possible...."

If you  wish, you  may postpone the  decision on  how to  process the
message until after seeing the rest of it, by typing P to  the option
request.  This will type the  remainder of the message and  ask again
for an option.   QP is illegal,  and P is  only legal when  a message
overflows.


------

In the table  of DART monitor commands  on page 78 (appendix  5), the
entries for LOCATE and TLIST should be:

  LOCATE   {<dest>←}{<source>}
  TLIST    {<dest>←}{<source>}
Monitor Command Manual (addenda and errata)                        17



------

Add  the following  after the  second line  on page  88  (appendix 8,
ARPA):

The information  which follows  also applies to  the DIAL  program, a
version of T which uses dial-up telephone connections rather than the
ARPA network.  The  format of the DIAL  command is explained  on page
41.  Another version of T is called PTYJOB, for communicating  with a
pseudo-Teletype; it is not run  with its own monitor command,  but by
R PTYJOB.
Monitor Command Manual (addenda and errata)                        18



------

In the list  of telnet control commands  starting on page  88, change
the entry for ⊗H to <arg>⊗S.  (The ⊗H in the text of that  entry must
also be changed to ⊗S.) The existing entry for ⊗S should now  say "⊗S
(no arg)".  The  following entries should  also be modified  as shown
here:

βE       Begin  local  echoing.   Also attempts  to  turn  off remote
         echoing.    Different    sites   have    different   echoing
         conventions.  Some sites  expect to send back  echoing, some
         do not.  If you find that what you type is not  being echoed
         in a reasonable  time, you may use  this command to  let you
         see what you are typing.  In the DIAL prgram, this makes you
         look like a  half duplex terminal,  and does not  change the
         state of remote echoing.

αβE      Terminate local  echoing.  Also attempts  to turn  on remote
         echoing.   One does  this when  each key  one  types appears
         twice on the console.  Turning off local echoing  will often
         eliminate one copy  of the key.   The DIAL program  does not
         attempt to change the state of remote echoing.

Also add the following new control commands:

βO       Turn on console typeout.  See αβO.

αβO      Turn  off console  typeout.  Useful  when output  is already
         going to  a file  and you don't  want to  waste the  time it
         takes to type out on your console as well.

⊗F       Open output file like βD, but append the text to an existing
         file of the same name.   You are only asked for a  file name
         if you have not previously opened an output file with  βD or
         ⊗F during this session; if you have already named  an output
         file, the new output will be appended to that one.

⊗C       (TELNET only) Send interrupt.  This is the  network protocol
         for "return to monitor" or equivalent.

βC       (DIAL only)  Turn on control  character mode.  In  this mode
         all characters received from the dataphone are typed on your
         console.

αβC      (DIAL only) Turn off control character mode.  In  this mode,
         octal  codes 1-10,  16-37,  and 177  are not  typed  on your
         console when received from the dataphone.
Monitor Command Manual (addenda and errata)                        19


βM       (PTYJOB only)  Enters a mode  in which all  9-bit characters
         you type are sent unchanged  to the PTY except βM,  αβM, βZ,
         and αβZ.  (Of course, if you are in line-at-a-time mode some
         control characters are still interpreted by the  system line
         editor.)

αβM      (PTYJOB  only) Leaves  the above  mode;  meta-characters are
         again interpreted as commands to PTYJOB.

⊗Z       (PTYJOB only) Quotes the following 9-bit character, so it is
         sent to the PTY as is, regardless of the βM mode switch.


------

On the third line of  the FTP description on page 90,  "⊗FTP←" should
be "FTP".


------

In the  description of the  XGP on page  97 (appendix 9),  delete the
reference to  the VERTICAL POSITION  knob.  This knob  may be  in any
position, and should not normally be changed by users.


------

Replace the  last paragraph  on page 100  (appendix 9,  fixing memory
stops) as follows:

Once the  memory is reset,  the computers have  to be  convinced that
nothing bad happened.  To do this on the PDP-10, the USER  MODE light
on the console must  be off.  If it is  on, first turn on  the SINGLE
INSTRUCTION switch on the  console, then push CONTINUE.   This should
turn off the USER MODE  light.  Then turn off the  SINGLE INSTRUCTION
switch.  When the USER MODE light is off, enter 700200 010003  in the
data switches and push the EXECUTE key.  If the MEMORY STOP  light on
the PDP-6  is on,  follow the same  procedure as  on the  PDP-10 with
these exceptions: Instead  of a USER MODE  light on the  console, the
PDP-6 has an EXEC MODE light at the top of the second bay to the left
of the console; this light  must be on for the execute.   Also, there
is  no SINGLE  INSTRUCTION switch  on the  PDP-6; instead,  while the
INSTRUCTION  STOP switch  is  down, push  INSTRUCTION  CONTINUE once.
Finally, push CONTINUE on both machines.
Monitor Command Manual (addenda and errata)                        20



------

Replace the last paragraph on page 101 (appendix 10,  reloading) with
the following:

If  this procedure  fails,  check that  the  NXM STOP  switch  on the
console  is turned  on; then  check the  following  switches, located
inside the second door to the left of the console: JSYS ENB and MAPAC
ENB off, MA TRP OFFSET on.

If the  system loader  tape still  fails, find  the DECtape  with the
current system.  The DECtape will be labeled with the system name and
date.  Mount it on some  DECtape drive.  Find the paper  tape labeled
256K TENDMP or  128K TENDMP, and load  it into the paper  tape reader
(on the  PDP-10).  Stop the  PDP-6.  Press RESET  and READ IN  on the
PDP-10.  The paper tape will be read, and the CTY will  type carriage
return and line feed.  Type n$  where n is the number of  the DECtape
drive and $  is an alt  mode.  The DECtape  should spin for  a while,
then it will stop  and the CTY will  type crlf again.  Type  L$S then
carriage return.   The DECtape will  spin again, followed  by another
crlf.  Type  206$ then G$  to start the  system.  (If  the Librascope
disk is down, type 200$G$ instead.)


------

The following monitor error messages  should be added to the  list in
appendix 11, starting on page 102, in alphabetical sequence:

ILLEGAL ADDRESS FOR ADC-DAC

          The  PDP-6  has  detected  an  illegal  address  which  you
          specified to be used  for some function connected  with the
          ADC or DAC device.  This was not detected when your program
          executed a UUO,  but asynchronously, in the  device service
          program running on the PDP-6.

NO SUCH PRIVILEGE!

          The  privilege  name  specified  in  an  ENABLE  or DISABLE
          command does not exist.

NO UPPER SEGMENT!

          You typed a  SETUWP or CLRUWP  command and your  core image
          does not include an upper segment.
Monitor Command Manual (addenda and errata)                        21



NOT ONE OF YOUR JOBS.

          You typed a KILL command with a job number not belonging to
          your programmer name.

SORRY, PROTECTION FAILURE!

          You typed a SETUWP or CLRUWP command, and are not permitted
          to change the write  protection of your core  image's upper
          segment.

SORRY, YOU CAN'T HAVE THAT PRIVILEGE!

          You typed  an ENABLE command  specifying a  privilege name,
          and  neither  the  privilege  you  specified  nor  the  PRI
          privilege is in the  list associated with your PPN;  or the
          privilege is one which is not permitted to any user (XGP or
          SSL).

USE "KJOB" TO LOG YOURSELF OFF.

          You typed a  KILL command with your  own job number  as the
          argument.

Also,  add  "or  KILL"  after  "ATTACH"  in  the  description  of the
NO SUCH JOB message, and remove the reference to the KILL  command in
the description of the OUT OF BOUNDS message.
Monitor Command Manual (addenda and errata)                        22



------

Add the following to the monitor command summary, pages 118 and 119:

NAME      DESCRIPTION

CLruwp    clear upper segment write protect
DIAl      talk to computer by telephone
DISable   ⊂ disable privileges ⊃
ENable    ⊂ enable privileges ⊃
HOt       read A.P. news wire
NS        read A.P. stories
PLan      create plan file
READ      edit with E in book mode
SETuwp    set upper segment write protect


NAME      PROGRAM   ARGUMENTS   PAGE

CLruwp              {prot}      24
DIAl      DIAL      dv | phone  41
DISable             ⊂ {priv} ⊃  42
ENable              ⊂ {priv} ⊃  42
HOt       HOT       -           41
NS        NS        -           41
PLan      MAIL                  70
READ      E         {fn}        44
SETuwp              {prot}      24


On page 119, the SYSTAT command now runs the WHO program, not SYSTAT.

Also, the following should be  added to the list of  abbreviations on
page 117:

prot            octal protection code
phone           telephone number, format {(ddd)}ddd{-}dddd
priv            privilege name


------

I  am not  in general  trying to  maintain the  index, either  to fix
errors or to add  new entries.  However, one particular  omission has
been mentioned to me several times by irate users:

LOADER switches   54