Gnus Manual Gnus V5.10.2

Total Page:16

File Type:pdf, Size:1020Kb

Gnus Manual Gnus V5.10.2 Gnus Manual Gnus v5.10.2 by Lars Magne Ingebrigtsen Copyright c 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover texts being “A GNU Manual”, and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled “GNU Free Documentation License” in the Emacs manual. (a) The FSF’s Back-Cover Text is: “You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.” This document is part of a collection distributed under the GNU Free Doc- umentation License. If you want to distribute this document separately from the collection, you can do so by adding a copy of the license to the document, as described in section 6 of the license. Contents 1 Starting Gnus 1 1.1 Finding the News .......................... 2 1.2 The First Time ........................... 3 1.3 The Server is Down ......................... 3 1.4 Slave Gnusae ............................. 4 1.5 Fetching a Group .......................... 4 1.6 New Groups ............................. 4 1.6.1 Checking New Groups ................... 5 1.6.2 Subscription Methods .................... 5 1.6.3 Filtering New Groups .................... 6 1.7 Changing Servers .......................... 7 1.8 Startup Files ............................. 8 1.9 Auto Save .............................. 9 1.10 The Active File ........................... 9 1.11 Startup Variables ........................... 10 2 Group Buffer 13 2.1 Group Buffer Format ........................ 14 2.1.1 Group Line Specification .................. 14 2.1.2 Group Mode Line Specification ............... 16 2.1.3 Group Highlighting ..................... 17 2.2 Group Maneuvering ......................... 18 2.3 Selecting a Group .......................... 19 2.4 Subscription Commands ....................... 20 2.5 Group Data ............................. 21 2.6 Group Levels ............................. 21 2.7 Group Score ............................. 23 2.8 Marking Groups ........................... 23 2.9 Foreign Groups ........................... 24 2.10 Group Parameters .......................... 25 2.11 Listing Groups ............................ 31 2.12 Sorting Groups ............................ 32 2.13 Group Maintenance ......................... 34 iii iv 2.14 Browse Foreign Server ........................ 34 2.15 Exiting Gnus ............................. 35 2.16 Group Topics ............................ 35 2.16.1 Topic Commands ...................... 37 2.16.2 Topic Variables ....................... 39 2.16.3 Topic Sorting ........................ 40 2.16.4 Topic Topology ....................... 40 2.16.5 Topic Parameters ...................... 41 2.17 Misc Group Stuff .......................... 42 2.17.1 Scanning New Messages ................... 43 2.17.2 Group Information ..................... 44 2.17.3 Group Timestamp ...................... 45 2.17.4 File Commands ....................... 46 2.17.5 Sieve Commands ...................... 46 3 Summary Buffer 47 3.1 Summary Buffer Format ....................... 48 3.1.1 Summary Buffer Lines .................... 48 3.1.2 To From Newsgroups .................... 52 3.1.3 Summary Buffer Mode Line ................ 53 3.1.4 Summary Highlighting ................... 54 3.2 Summary Maneuvering ....................... 54 3.3 Choosing Articles .......................... 55 3.3.1 Choosing Commands .................... 55 3.3.2 Choosing Variables ..................... 57 3.4 Scrolling the Article ......................... 57 3.5 Reply, Followup and Post ...................... 58 3.5.1 Summary Mail Commands ................. 58 3.5.2 Summary Post Commands ................. 60 3.5.3 Summary Message Commands ............... 61 3.5.4 Canceling Articles ...................... 61 3.6 Delayed Articles ........................... 62 3.7 Marking Articles ........................... 64 3.7.1 Unread Articles ....................... 64 3.7.2 Read Articles ........................ 64 3.7.3 Other Marks ......................... 65 3.7.4 Setting Marks ........................ 66 3.7.5 Generic Marking Commands ................ 68 3.7.6 Setting Process Marks .................... 69 3.8 Limiting ............................... 70 3.9 Threading .............................. 71 3.9.1 Customizing Threading ................... 72 3.9.1.1 Loose Threads .................. 72 3.9.1.2 Filling In Threads ................. 76 v 3.9.1.3 More Threading ................. 76 3.9.1.4 Low-Level Threading ............... 77 3.9.2 Thread Commands ..................... 78 3.10 Sorting the Summary Buffer ..................... 79 3.11 Asynchronous Article Fetching ................... 80 3.12 Article Caching ........................... 82 3.13 Persistent Articles .......................... 83 3.14 Article Backlog ........................... 83 3.15 Saving Articles ............................ 84 3.16 Decoding Articles .......................... 87 3.16.1 Uuencoded Articles ..................... 88 3.16.2 Shell Archives ........................ 88 3.16.3 PostScript Files ....................... 88 3.16.4 Other Files ......................... 89 3.16.5 Decoding Variables ..................... 89 3.16.5.1 Rule Variables .................. 89 3.16.5.2 Other Decode Variables ............. 89 3.16.5.3 Uuencoding and Posting ............. 90 3.16.6 Viewing Files ........................ 91 3.17 Article Treatment .......................... 91 3.17.1 Article Highlighting ..................... 92 3.17.2 Article Fontisizing ...................... 93 3.17.3 Article Hiding ........................ 93 3.17.4 Article Washing ....................... 95 3.17.5 Article Header ........................ 99 3.17.6 Article Buttons ....................... 99 3.17.6.1 Related variables and functions .......... 100 3.17.7 Article button levels ..................... 101 3.17.8 Article Date ......................... 102 3.17.9 Article Display ........................ 103 3.17.10 Article Signature ....................... 103 3.17.11 Article Miscellanea ..................... 104 3.18 MIME Commands .......................... 104 3.19 Charsets ............................... 107 3.20 Article Commands .......................... 108 3.21 Summary Sorting .......................... 108 3.22 Finding the Parent .......................... 109 3.23 Alternative Approaches ....................... 110 3.23.1 Pick and Read ........................ 110 3.23.2 Binary Groups ........................ 111 3.24 Tree Display ............................. 112 3.25 Mail Group Commands ....................... 114 3.26 Various Summary Stuff ....................... 116 3.26.1 Summary Group Information ................ 117 vi 3.26.2 Searching for Articles .................... 117 3.26.3 Summary Generation Commands .............. 118 3.26.4 Really Various Summary Commands ............ 118 3.27 Exiting the Summary Buffer ..................... 118 3.28 Crosspost Handling ......................... 120 3.29 Duplicate Suppression ........................ 121 3.30 Security ............................... 122 3.31 Mailing List ............................. 123 4 Article Buffer 125 4.1 Hiding Headers ........................... 126 4.2 Using MIME ............................ 128 4.3 Customizing Articles ......................... 129 4.4 Article Keymap ........................... 132 4.5 Misc Article ............................. 133 5 Composing Messages 135 5.1 Mail ................................. 136 5.2 Posting Server ............................ 136 5.3 Mail and Post ............................ 137 5.4 Archived Messages .......................... 138 5.5 Posting Styles ............................ 140 5.6 Drafts ................................ 142 5.7 Rejected Articles .......................... 143 5.8 Signing and encrypting ....................... 144 6 Select Methods 145 6.1 Server Buffer ............................. 146 6.1.1 Server Buffer Format .................... 146 6.1.2 Server Commands ...................... 147 6.1.3 Example Methods ...................... 147 6.1.4 Creating a Virtual Server .................. 149 6.1.5 Server Variables ....................... 149 6.1.6 Servers and Methods .................... 150 6.1.7 Unavailable Servers ..................... 150 6.2 Getting News ............................ 151 6.2.1 NNTP ............................ 151 6.2.1.1 Direct Functions ................. 154 6.2.1.2 Indirect Functions ................ 155 6.2.1.3 Common Variables ................ 156 6.2.2 News Spool ......................... 157 6.3 Getting Mail ............................. 158 6.3.1 Mail in a Newsreader .................... 158 6.3.2 Getting Started Reading Mail ................ 159 vii 6.3.3 Splitting Mail ........................ 159 6.3.4 Mail Sources ......................... 161 6.3.4.1 Mail Source Specifiers .............. 161 6.3.4.2 Function Interface ................ 167 6.3.4.3 Mail Source Customization ............ 167 6.3.4.4 Fetching Mail ................... 168 6.3.5 Mail Back End Variables ................... 168 6.3.6 Fancy Mail Splitting ..................... 169 6.3.7 Group Mail Splitting .................... 172 6.3.8 Incorporating Old Mail ................... 174 6.3.9 Expiring Mail ........................ 175 6.3.10 Washing
Recommended publications
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • On the Road to Hades–Helpful Automatic Development Email Summarization
    On The Road to Hades–Helpful Automatic Development Email Summarization Alberto Bacchelli, Michele Lanza, Ebrisa Savina Mastrodicasa REVEAL @ Faculty of Informatics - University of Lugano, Switzerland Abstract—During the development of software systems, pro- Considered the numerous reasons why a programmer might grammers often discuss issues such as structural decisions, start an email conversation with a single colleague or the defects, time management, etc. Especially in distributed devel- entire rest of the team, and that a software project might opment, where most of the discussions among developers take place via email, developers receive daily dozens, if not hundreds, be carried out for several months or years, it is easy to of messages, either personally sent to them or broadcasted by picture the vast amount of produced emails. For example, on mailing lists they are subscribed to. Dealing with these emails the Apache developer mailing list, there were about 4,996 requires developers to spend long time reading voluminous messages in the year 2004 and 2,340 in 2005, and for gcc, amounts of text. these numbers were 19,173 and 15,082 [3]. To maintain A way to solve this problem is summarization: Producing a summary of a text means reducing it to a version based only team coordination and perform work on a software system, on fundamental elements, by removing the parts unnecessary software developers must keep track, read, and understand a for the comprehension. Since researchers presented techniques voluminous amount of electronic communication. This is a for automatically summarizing natural language documents challenge, not only because of the large number of emails– or source code, we are interested in investigating whether it which require time and effort to be read–popping up day after would be possible to also summarize development emails, so that developers could consult small summaries instead of long day in a developer’s mailbox, but also because retrieving threads.
    [Show full text]
  • Police Interactions with the Community on Facebook: an Examination of the Content Of
    Police interactions with the community on Facebook: An examination of the content of the message police communicate with citizens on Facebook, community response, and factors associated with different communication patterns. A dissertation submitted to the Graduate School of the University of Cincinnati in partial fulfillment of the requirements for the degree of Doctorate of Philosophy (Ph.D) in the School of Criminal Justice of the College of Education, Criminal Justice, and Human Services by Bradley Buckmeier 2019 B.A. University of Cincinnati, 2008 M.S. University of Cincinnati, 2009 Dissertation Committee: James Frank, PhD (Chair) Lawrence Travis, PhD Edward Latessa, PhD Charles Klahm, PhD Abstract The nature of interactions between the police and the public has been an important topic in policing research. Social media are a relatively new platform that the police can use to interact with the community. Facebook is a social media website which allows the police to communicate directly with the community and, at the same time, allows the community to respond. Limited research exists about the nature of the interactions the police are having with the community on Facebook. This dissertation will examine police department interactions with the community using Facebook as the means of communication. Specifically, it will examine the nature and content of their messages when communicating with citizens on Facebook, the factors that may be associated with different online communication patterns of the police (i.e., community factors, year of adoption of Facebook) and how the community responds. ii Copyright Notice © Bradley Buckmeier iii Acknowledgments This dissertation marks the end of a long journey in my life that I could not have done alone.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Forming Innovative Learning Environments Through Technology. Conversations in Excellence. INSTITUTION National Catholic Educational Association, Washington, DC
    DOCUMENT RESUME ED 455 828 IR 020 851 AUTHOR Cimino, Carol, Ed.; Haney, Regina M., Ed.; O'Keefe, Joseph M., Ed.; Zukowski, Angela Ann, Ed. TITLE Forming Innovative Learning Environments through Technology. Conversations in Excellence. INSTITUTION National Catholic Educational Association, Washington, DC. ISBN ISBN-1-55833-253-7 PUB DATE 2000-00-00 NOTE 162p. AVAILABLE FROM National Catholic Educational Association, 1077 30th St., NW, Suite 100, Washington, DC 20007-3852 (NCEA members, $17; non-members, $22) .Web site: http://www.ncea.org. PUB TYPE Books (010) Collected Works General (020) EDRS PRICE MF01/PC07 Plus Postage. DESCRIPTORS *Catholic Educators; *Catholic Schools; Computer Assisted Instruction; *Computer Uses in Education; Educational Development; Educational Environment; Educational Practices; *Educational Technology; Elementary Secondary Education; Instructional Innovation IDENTIFIERS Technology Integration ABSTRACT Selected Programs for Improving Catholic Education (SPICE) was initiated in 1996. This venture of the National Catholic Educational Association, in partnership with the Jesuit Institute at Boston College, identifies exemplary Catholic educational programs from around the counLry, and invites the schools and dioceses named to share their ideas and practices in a 3-day gathering called Conversations in Excellence at Boston College. The focus area of SPICE 1999 was "Forming Innovative Learning Environments through Technology." Specifically, the SPICE committee was looking for programs that seamlessly weave the use
    [Show full text]
  • Simon Young from the Slants
    11/23/2010 Slant Eye For The Round Eye: Intervie… Can you have two Asian American Top Chef winners i... We’ve had some mixed responses to our ethnic theme, though for the Xu Yong: Sadly, we never got to most part it has been positive. We’ve had a lot of fans tell us that its know you refreshing to find an Asian artist playing dance rock, that they kind of sing certain songs like “Sakura, Sakura” as an anthem (“We sing for Celtics and Cavs: Game 4 tactics the Japanese and the Chinese and all of the dirty knees…”). It’s an Film: The Warlords amazing feeling to be playing these songs and watching kids sing along First Gas, Then Rice, Now Beer? to every word. M. Night Shyamalan's "The Happening" We had one review recently that took some jabs at us for being Asian; Kiyomi saying that we had self-confidence issues and because of our Asian More on Asian Eyelid Surgery themes. Rather than reviewing our music at all, the entire article Fusion Stories: 10 books for young focused on this – which resulted in a substantial amount of hate mail readers for APA... sent to the publication for their “racist” remarks. Billboard.com Review: Lyrics Born and Everywhere A... Last question. Five things you really miss when you're touring on the road. Kristine Sa: My Last Goodbye Film: Once Upon A Time In Corea 1. Seeing my friends in my hometown or having any semblance of a Google and Supporting disaster “normal” relationship. relief in Myanmar 2.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • What Killed Australian Cinema & Why Is the Bloody Corpse Still Moving?
    What Killed Australian Cinema & Why is the Bloody Corpse Still Moving? A Thesis Submitted By Jacob Zvi for the Degree of Doctor of Philosophy at the Faculty of Health, Arts & Design, Swinburne University of Technology, Melbourne © Jacob Zvi 2019 Swinburne University of Technology All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. II Abstract In 2004, annual Australian viewership of Australian cinema, regularly averaging below 5%, reached an all-time low of 1.3%. Considering Australia ranks among the top nations in both screens and cinema attendance per capita, and that Australians’ biggest cultural consumption is screen products and multi-media equipment, suggests that Australians love cinema, but refrain from watching their own. Why? During its golden period, 1970-1988, Australian cinema was operating under combined private and government investment, and responsible for critical and commercial successes. However, over the past thirty years, 1988-2018, due to the detrimental role of government film agencies played in binding Australian cinema to government funding, Australian films are perceived as under-developed, low budget, and depressing. Out of hundreds of films produced, and investment of billions of dollars, only a dozen managed to recoup their budget. The thesis demonstrates how ‘Australian national cinema’ discourse helped funding bodies consolidate their power. Australian filmmaking is defined by three ongoing and unresolved frictions: one external and two internal. Friction I debates Australian cinema vs. Australian audience, rejecting Australian cinema’s output, resulting in Frictions II and III, which respectively debate two industry questions: what content is produced? arthouse vs.
    [Show full text]
  • 22Nd International Congress on Acoustics ICA 2016
    Page intentionaly left blank 22nd International Congress on Acoustics ICA 2016 PROCEEDINGS Editors: Federico Miyara Ernesto Accolti Vivian Pasch Nilda Vechiatti X Congreso Iberoamericano de Acústica XIV Congreso Argentino de Acústica XXVI Encontro da Sociedade Brasileira de Acústica 22nd International Congress on Acoustics ICA 2016 : Proceedings / Federico Miyara ... [et al.] ; compilado por Federico Miyara ; Ernesto Accolti. - 1a ed . - Gonnet : Asociación de Acústicos Argentinos, 2016. Libro digital, PDF Archivo Digital: descarga y online ISBN 978-987-24713-6-1 1. Acústica. 2. Acústica Arquitectónica. 3. Electroacústica. I. Miyara, Federico II. Miyara, Federico, comp. III. Accolti, Ernesto, comp. CDD 690.22 ISBN 978-987-24713-6-1 © Asociación de Acústicos Argentinos Hecho el depósito que marca la ley 11.723 Disclaimer: The material, information, results, opinions, and/or views in this publication, as well as the claim for authorship and originality, are the sole responsibility of the respective author(s) of each paper, not the International Commission for Acoustics, the Federación Iberoamaricana de Acústica, the Asociación de Acústicos Argentinos or any of their employees, members, authorities, or editors. Except for the cases in which it is expressly stated, the papers have not been subject to peer review. The editors have attempted to accomplish a uniform presentation for all papers and the authors have been given the opportunity to correct detected formatting non-compliances Hecho en Argentina Made in Argentina Asociación de Acústicos Argentinos, AdAA Camino Centenario y 5006, Gonnet, Buenos Aires, Argentina http://www.adaa.org.ar Proceedings of the 22th International Congress on Acoustics ICA 2016 5-9 September 2016 Catholic University of Argentina, Buenos Aires, Argentina ICA 2016 has been organised by the Ibero-american Federation of Acoustics (FIA) and the Argentinian Acousticians Association (AdAA) on behalf of the International Commission for Acoustics.
    [Show full text]
  • I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
    1 I give permission for public access to my thesis and for any copying to be done at the discretion of the archives librarian and/or the College librarian. Emily Merritt 06/22/12 An Analysis of the Discourse of Internet Trolling: A Case Study of Reddit.com Student presenter: Emily Rose Merritt Project advisor: Esther Castro-Cuenca With the proliferation of social media and community discussion and forum websites, interest in understanding and explaining communication on the Internet (with an emphasis on language-based communication) is on the rise. Over time, new genres of interaction have developed that take place primarily or exclusively in online communication, and with them has developed the need to investigate the structure of these interactions, what their function is within conversations and communities, what their place is within certain Internet discourses, and over time what effects they have on communication on and offline. Thus far many of these genres have been deemed at best disruptive and at worst anti-social, but when studied from a judgment-free point of view show high levels of complexity and offer us excellent opportunities to understand how the Internet is shaping and being shaped by new kinds and contexts of communication. One of these genres of interaction that has gained significant fame on some very popular forums and discussion sites is called trolling. Trolling occurs on discussion sites or message boards when a user intentionally posts erroneous or inflammatory information with the intention of provoking a strong reaction out of other users. The objective of this study is to understand the complexities of trolling, as well as some of its functions and outcomes in anonymous online communication.
    [Show full text]
  • And HTML Attachments Are Evil a Radical Solution to Get Rid of Them
    Quoting entire messages (top posting) and HTML atta... http://sax.iasf-milano.inaf.it/~lucio/Procmail/noquoten... Quoting entire messages (top posting) and HTML attachments are evil A radical solution to get rid of them Introduction Download Operation Updates Introduction I was really fed up of receiving mail messages which contain the same text once as plain text and once as HTML (I have just discovered that somebody sends message which even contain an attachment of "multipart/alternative" type, which contains two sub-attachments of which one is HTML ... there is no end to perversion). I was even more fed up of those guys who reply to a message of mine quoting my entire message at the end, instead of snipping only the parts they are really replying to (what is called top posting on Usenet, and heavily and rightfully criticized, and also against netiquette) : bad manner good manner Dear Lucio, Dear Lucio, with reference to your message I with reference to your message I have to say what follows. have to say what follows. On 29 February 2000 Lucio On 29 February 2000 Lucio Chiappetti wrote : Chiappetti wrote : > pinco panco blagulon exarzur > pinco panco blagulon exarzur otzhaxwq sobaka otzhaxwq sobaka > pallino vitelli Bremsstrahlung > pallino vitelli Bremsstrahlung notwithstanding notwithstanding On this I fully agree while I disagree On this I fully agree while I disagree on the rest on the rest >txet emas eht niatnoc hcihw And therefore I do not quote it. segassem liam >gniviecer fo pu def yllaer saw >ohw syug esoht fo pu def erom neve saw I >LMTH sa ecno dna txet nialp sa ecno >and so on and so forth ..
    [Show full text]
  • Webfaction User Guide
    WebFaction User Guide WebFaction is a service of Paragon Internet Group Limited CONTENTS 1 Introduction 3 1.1 Services..................................................3 1.2 The Complete System..........................................4 2 The Control Panel 5 2.1 Log in to the Control Panel.......................................5 2.2 Change Your Control Panel Password..................................5 2.3 What to Do About a Lost Password...................................6 2.4 Two-Step Login.............................................6 3 Finding Details About Your Server9 3.1 Finding Your Server’s Name.......................................9 3.2 Finding Your Server’s Operating System................................9 3.3 Finding Your Server’s IP Address.................................... 10 4 Accessing Your Data 11 4.1 Connecting with SSH.......................................... 11 4.2 Connecting with FTP........................................... 14 4.3 Changing Your FTP or SSH Password.................................. 14 4.4 Additional Users............................................. 15 4.5 Backups................................................. 16 5 Accounts 17 5.1 Plans and Services............................................ 17 5.2 Communicating with WebFaction.................................... 18 5.3 Payments................................................. 19 5.4 Affiliate Program............................................. 23 5.5 Canceling Your Account......................................... 24 6 Domains 25 6.1 Getting
    [Show full text]