Grundkurs Raditex AB Göran Hasse

Total Page:16

File Type:pdf, Size:1020Kb

Grundkurs Raditex AB Göran Hasse Unix Grundkurs Raditex AB Göran Hasse april 1996 PREFACE.TXT G Hasse - Kap 0 Sida 1 - Copyright (c) 1995 Raditex AB I sin strävan att göra nyttig och praktisk kursdokumentation försöker Raditex AB Utbildning ständigt att förbättra dokumentationen. Vi gör en tydlig skillnad mellan facklitteratur och kursdokumentation inom området. Facklitteratur måste vara komplett samt ge en allmän översikt över ett större område. Kursdokumentationen ska belysa det- ta område samt vara specifik. Speciellt ska kursdokumentationen spegla den praktiska vardagen man möter när man arbetar inom ett specifikt område. Detta innebär att kursdokumentation presenterar verkliga konfigura- tionsfiler och ger mängder av praktiska tips och ideer. GPL - © - 1998 - Kap 0 Sida 2 - G Hasse INDEX.TXT INNEHÅLLSFÖRTECKNING ============================ Introduktion 0 En introduktion till öppna system 1 En presentation av Raditex 2 Introduktion om Unix och vad Unix är 3 Vad kostar Unix 4 Unix som skiktat operativsystem 5 Vad vi ska lära oss om Unix-kommunikation 6 Definitionen av öppna system 7 Historien om hur Unix kom till 8 Hjälp i Unix 9 Manualen - 1 10 Manualen - 2 11 Manualen - 3 12 Online Help 13 Hjälp i program Kapitel 1 Att logga in 0 Vad innebär det att logga in 1 Vad som händer vid inloggningen 2 Vilka program används 3 Gemensam inloggningsfil 4 Hur du byter password 5 Hur du loggar ut 6 Övningar: Att logga in och ut 7 Lösningar: Att logga in och ut Kapitel 2 Textredigering 0 Editering av text 1 Editorn vi 1 2 Editorn vi 2 3 Editorn vi 3 4 Editorn vi 4 5 Editorn vi 5 6 Editorn ed 1 7 Editorn ed 2 8 Editorn ed 3 9 Editorn ed 4 10 Automatredigering med ed 11 Exempel: Automatredigering av win.ini 12 Editorn Emacs 1 13 Editorn Emacs 2 14 Editorn Emacs 3 15 Editorn Emacs 4 16 Behandling av text 1 17 Behandling av text 2 18 Behandling av text 3 INDEX.TXT G Hasse - Kap 0 Sida 3 - 19 Behandling av text 4 20 Behandling av text 5 21 Behandling av text 6 22 Övningar: texthantering 23 Lösningar: texthantering Kapitel 3 Filsystemet 0 Hantering av filer i filsystemet 1 Viktiga kataloger i filsystemet 2 Filsystemets struktur 3 Namn på filer 4 Filsystemet 1 5 Filsystemet 2 6 Ägare av filer 7 Gruppen för filen 8 Skydd på filer 1 9 Skydd på filer 2 10 Länkar till filer 1 11 Länkar till filer 2 12 Hur man bygger ett filsystem på floppy 13 Filsystem på maskinen 14 Kontroll av filsystemet 15 Övningar: Filsystemet 16 Lösningar: Filsystemet Kapitel 4 Unix-skalen 0 Introduktion till skalen 1 Bourne shell 2 profile - filen 3 C-shell 4 cshrc - filen 5 Historiken 6 Omgivningsvariabler - 1 7 Omgivningsvariabler - 2 8 Filnamnssubstitution 9 Skyddstecken - 1 10 Skyddstecken - 2 11 Omdirigering - 1 12 Omdirigering - 2 13 Omdirigering - 3 14 Pipes - 1 15 Pipes - 2 16 Göra jobb i bakgrunden 17 Att köra jobb i batch 18 Set 19 Variabler 20 Variabelsubstitution 21 Fånga signaler 1 22 Fånga signaler 2 23 Att göra beräkningar 24 Godkända skal 25 Övnignar: Kommandoskal 26 Lösningar: Kommandoskal - Kap 0 Sida 4 - G Hasse INDEX.TXT Kapitel 5 Unix-kommandon 0 1 Eka text echo 1 2 Head - början av en fil 3 Vilken filtyp vi har att göra med 4 Lista filer 5 Räkna ord i filer 6 Aktuell katalog 7 Söka strängar 1 8 Söka strängar 2 9 Leta efter filer 1 10 Leta efter filer 2 11 Stream editor 12 Hur man använder Awk1 13 Hur man använder Awk2 14 Hur man använder Awk3 15 cut 1 16 cut 2 17 Sortering 1 18 Sortering 2 19 Cpio 1 20 Tar 1 21 Tar 2 22 Programutveckling 1 23 Programutveckling 2 24 Programutveckling 3 25 Kompilering av program 1 26 Kompilering av program 2 27 Att använda Make 28 Utskrifter 1 29 Utskrifter 2 30 Utskrifter 3 31 Utskrifter 4 32 Write 1 33 Övningar: Unix kommandon 34 Lösningar: Unix kommandon Kapitel 6 Script programmering 0 Att göra script 1 Skalprogram 1 2 Skalprogram 2 3 Läsa in data 1 4 Läsa in data 2 5 Kontrollstruktur 1 6 Kontrollstruktur 2 7 Kontrollstruktur 3 8 Kontrollstruktur 4 9 Kontrollstruktur 5 10 Kontrollstruktur 6 11 Övningar: Scripts 12 Lösningar: Scripts INDEX.TXT G Hasse - Kap 0 Sida 5 - Kapitel 7 Kommunikation 0 Kommunikation i Unix 1 Unix kommunikation 1 2 Unix kommunikation 2 3 Unix kommunikation 3 4 Unix kommunikation 4 5 Unix kommunikation 5 6 Sända brev 1 7 Sända brev 2 8 Mail kommandot 1 9 Nyhetssystem 10 Filöverföring Kapitel 8 Administration 0 Grundläggande administration 1 Passordsfilen 2 Gruppfilen 3 Processtabellen 1 4 Processtabellen 2 5 Processtabellen 3 6 Att ta backup 7 Inställningar av terminalen 8 Övningar: Administration 9 Lösningar: Administration Kapitel 9 Att använda X-windows 0 Att använda X-windows 1 Hur man startar X-windows 2 Vad X-servern behöver veta vid start 3 Användarens filer 4 Hur man skapar menyer Kapitel 10 Framtiden 0 Något om framtiden 1 Prognosen för Unix 2 Linux - en föregångare 3 FreeBSD - en BSD dialekt 4 Tjänster på Internet 5 Fria program för Unix - Kap 0 Sida 6 - G Hasse INDEX.TXT *********************************************** INDEX.TXT G Hasse - Kap 0 Sida 7 - STUDIEPLAN UNIX Grundkurs 3 dagar ========================== Raditex AB Box 38 138 21 ÄLTA Tel: 08 - 7730148, Fax: 08 - 7730902 [email protected] Välkomna till Raditex kurs: Unix Grundkurs. Lunchraster är 1 timma. Kafferaster är ca 15 min. ====================================================================== Dag 1 ----- 9:00 START Kapitel 1 - Bakgrund Historia, bakgrund, repetition Öppna system Kapitel 2 - Att logga in Övning - Inloggning 10:15 Kaffe Kapitel 3 - Textredigering Övning - Textredigering 12:00-13:00 LUNCH 13:00 START Kapitel 4 - Filsystemet Övning - Filsystemet 14:30 KAFFE Kapitel 5 - Unix-skalen Övning - Unix-skalen 17:00 SLUT ====================================================================== Dag 2 ----- 9:00 START Kapitel 6 - Unix-kommandon Övning - Unix-kommandon 10:15 KAFFE Kapitel 7 - Script program Övning - Script programmering 12:00-13:00 LUNCH 13:00 START Kapitel 8 - Kommunikation Övning - Kommunikation 14:30 KAFFE - Kap 0 Sida 8 - G Hasse KursPlan.txt forts. Kommunikation 17:00 SLUT ====================================================================== Dag 3 ----- 9:00 START Kapitel 9 - Administration Övning - Administration 10:15 KAFFE forts. Administration 12:00-13:00 LUNCH 13:00 START Kapitel 10 - Att använda X-Window Övning - Använda X-Window Kapitel 11 - Framtiden för Unix 14:30 KAFFE Resurser på Internet Linux FreeBSD 17:00 SLUT ====================================================================== <EOF> INTRO.TXT G Hasse - Kap 1 Sida 9 - - Kap 1 Sida 10 - G Hasse INTRO.TXT Kapitel 1 Introduktion 1.0 Öppna system Vad är öppna system? Många leverantörer påstår att de levererar öppna system. Mark- nadsföringen är aggressiv. Hur ska man veta vad som är öppna sys- tem? Definitionerna på öppna system är förmodligen lika många som användarna av öppna system. GPL - © - 1998 OpenSysIntro.txt G Hasse - Kap 1 Sida 11 - Raditex AB ☞ Unix-utbildning ☞ TCP/IP-utbildning ☞ C och C++ utbildning ☞ Konsulting Raditex AB Box 38 138 21 ÄLTA Tel: 08 - 773 0148 Fax: 08 - 773 0902 email: [email protected] OH-Bild 1 - 1 Anteckningar: © Raditex AB - 1998 - Kap 1 Sida 12 - G Hasse RaditexInfo.txt 1.1 Raditex AB Raditex AB är ett utbildnings- och konsultföretag inom ADB-området. 1.1.1 Unix-utbildning Unix-utbildningen är mycket uppskattad. Speciellt om man förut hållit på med programladdare som MS-DOS är det en befrielse att få ett äkta operativsystem att arbeta med. Det finns såväl en grundkurs som en fortsättningskurs om Unix. 1.1.2 TCP/IP-utbildning Att kunna TCP/IP är ett måste för alla som arbetar med maskiner som hänger ihop i ett större nät. TCP/IP är idag det ENDA prokoll som används för att binda ihop företag över hela världen. Protokollen som från början utvecklades av amerikanska militära or- ganisationer finns idag på alla typer av maskiner. 1.1.3 C och C++ utbildning På standardprogrammet står även C och C++ utbildning. 1.1.4 Företagsanpassad utbildning Raditex kan tillhandahålla företagsanpassad utbildning i kundens lokaler. Vi tar med oss den utrustning som behövs för laborationer och demonstrationer. 1.1.5 Konsultning Raditex kan även anlitas för konsultuppdrag. Vi gör alla typer av sys- temadministrativ konsulting på Unix. GPL - © - 1998 RaditexInfo.txt G Hasse - Kap 1 Sida 13 - Introduktion till Unix ☞ Historia Kort om historien bakom Unix (Och dess framtid.) ☞ Egenskaper Något om Unix-operativets egenskaper. ☞ Beståndsdelar Unix-operativets komponenter och uppbyggnad. ☞ Fönstersystemet X-Window och hur detta används. OH-Bild 1 - 2 Anteckningar: © Raditex AB - 1998 - Kap 1 Sida 14 - G Hasse IntroIntro.txt 1.2 Introduktion till Unix Välkomna till den underbara värld som Unix utgör. Du ska i denna kurs studera Unix lite närmare. Du ska få bekanta dig med några av alla de verktyg som finns i operativsystemet. 1.2.1 Historia Unix är gammalt - nästan för gammalt! Med sina snart 20 år upplevs Unix nästan som lite tråkigt. Samtidigt är åldern en garant för att alla fel är lokaliserade och bort- plockade. Inget operativsystem är naturligtvis felfritt - men Unix är särdeles stabilt och pålitligt. 1.2.2 Egenskaper Unix är som en amöba. Det kan anta alla former. Man kan ha Unix som filserver, som X-Windows client, eller som en databas-maskin. Genom att operativsystemet är konfigurerbart kan man anpassa oper- ativsystemet efter den situation man själv har. 1.2.3 Beståndsdelar Unix upplevs av många som oerhört komplext. Visst - det finns mängder av program i Unix. Kanske för många! Men man behöver ju inte använda alla! Vi ska i kursen gå igenom de viktigaste komponeneterna. Du kommer att få lära dig grundideerna och hur man använder olika verktyg för att göra mer komplexa saker. 1.2.4 Fönstersystemet I kursen ska vi kort beröra hur fönstersystemet X-Windows är uppbyg- gt.
Recommended publications
  • BAKALÁŘSKÁ PRÁCE Na Téma: Etické Aspekty Aktivit Ve Víceuživatelském Virtuálním Prostředí: Srovnání Uživatelský
    Ladislav Zámečník Fakulta humanitních studií Univerzity Karlovy BAKALÁŘSKÁ PRÁCE na téma: Etickéaspekty aktivit vevíceuživatelském virtuálním prostředí: Srovnání uživatelských postojů k danénetiketě Vedoucí práce: PhDr. Daniel Říha, Ph.D. Kralupy nad Vltavou, Praha 2007 1 2 OBSAH PRÁCE Úvod..............................................................................................................................5 Stručné přiblížení zkoumané oblasti .............................................................................5 Cíle bakalářské práce....................................................................................................8 Použité metody..............................................................................................................8 Historie víceuživatelských počítačových her s přehledem jejich charakteristických vlastností.......................................................................................................................9 „Malý“ multi-player ..................................................................................................9 Masivní multi-player a jeho znaky .............................................................................10 Vývoj masivního multi-playeru .................................................................................11 Vybrané etické aspekty MMOG..................................................................................16 Přínosy a nebezpečí vstupu do virtuálního světa pro lidský život mimo něj .......................16
    [Show full text]
  • Cyber-Synchronicity: the Concurrence of the Virtual
    Cyber-Synchronicity: The Concurrence of the Virtual and the Material via Text-Based Virtual Reality A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Jeffrey S. Smith March 2010 © 2010 Jeffrey S. Smith. All Rights Reserved. This dissertation titled Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality by JEFFREY S. SMITH has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Joseph W. Slade III Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT SMITH, JEFFREY S., Ph.D., March 2010, Mass Communication Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality (384 pp.) Director of Dissertation: Joseph W. Slade III This dissertation investigates the experiences of participants in a text-based virtual reality known as a Multi-User Domain, or MUD. Through in-depth electronic interviews, staff members and players of Aurealan Realms MUD were queried regarding the impact of their participation in the MUD on their perceived sense of self, community, and culture. Second, the interviews were subjected to a qualitative thematic analysis through which the nature of the participant’s phenomenological lived experience is explored with a specific eye toward any significant over or interconnection between each participant’s virtual and material experiences. An extended analysis of the experiences of respondents, combined with supporting material from other academic investigators, provides a map with which to chart the synchronous and synonymous relationship between a participant’s perceived sense of material identity, community, and culture, and her perceived sense of virtual identity, community, and culture.
    [Show full text]
  • Universidade Federal De Santa Catarina Departamento De Informática E De Estatística Curso De Pós-Graduação Em Ciência Da Computação
    UNIVERSIDADE FEDERAL DE SANTA CATARINA DEPARTAMENTO DE INFORMÁTICA E DE ESTATÍSTICA CURSO DE PÓS-GRADUAÇÃO EM CIÊNCIA DA COMPUTAÇÃO SISTEMA DE AUTORIA PARA CONSTRUÇÃO DE “ADVENTURES” EDUCACIONAIS EM REALIDADE VIRTUAL Patrícia Cristiane de Souza Florianópolis, fevereiro de 1997 UNIVERSIDADE FEDERAL DE SANTA CATARINA DEPARTAMENTO DE INFORMÁTICA E DE ESTATÍSTICA CURSO DE PÓS-GRADUAÇÃO EM CIÊNCIA DA COMPUTAÇÃO ÁREA DE CONCENTRAÇÃO: SISTEMAS DE CONHECIMENTO SISTEMA DE AUTORIA PARA CONSTRUÇÃO DE “ADVENTURES” EDUCACIONAIS EM REALIDADE VIRTUAL por Patrícia Cristiane de Souza Orientador: Prof. Raul Sidnei Wazlawick, Dr. Dissertação apresentada ao Curso de Pós-Graduação em Ciência da Computação da Universidade Federal de Santa Catarina, como parte dos requisitos exigidos para obtenção do grau de Mestre em Ciência da Computação. Florianópolis, fevereiro de 1997 Sistema de Autoria para Construção de “Adventures” Educacionais em Realidade Virtual Patrícia Cristiane de Souza Esta dissertação foi julgada adequada para a obtenção do título de MESTRE EM CIÊNCIA DA COMPUTAÇÃO na área de concentração Sistemas de Conhecimento e aprovada em sua for final pelo Programa de Pós-Graduação em Ciência da Computação da UFSC. Raul^Smnei Wazlawick Murilo Silva de Camargo - Coordenador do CPGCC/UFSC Banca Examinadora ,ul Sidnei Wazlawick Aguinaldo Robson de Souza iv Não há nada mais difícil de se realizar, nem cujo êxito seja mais duvidoso nem cuja execução seja mais perigosa, do que iniciar uma nova ordem das coisas. Pois o reformista tem como inimigos todos aqueles que lucram com a antiga ordem e tem como defensores não muito entusiastas apenas aqueles que lucram com a nova ordem, sendo essa falta de entusiasmo proveniente em parte do temor aos adversários, que têm as leis a seu favor, e em parte da incredulidade da Humanidade, que não acredita realmente em nada que ainda não tenha experimentado.
    [Show full text]
  • GENDER SWAPPING on the INTERNET Amy S. Bruckman Presented at the Internet Society, San Fransisco, CA, August 1993
    GENDER SWAPPING ON THE INTERNET Amy S. Bruckman Presented at The Internet Society, San Fransisco, CA, August 1993. ABSTRACT In text-based virtual reality environments on the Internet called MUDs, it is possible to pretend to be the opposite gender. In these virtual worlds, the way gender structures basic human interaction is often noticed and reflected upon. This paper introduces MUDs, and then presents a community discussion about gender issues that MUDs inspired. Gender swapping is one example of ways in which network technology can impact not just work practice but also culture and values. I. GENDER SWAPPING ON THE INTERNET On the television show Saturday Night Live, a series of skits concerned a character named Pat, who has no apparent gender. The audience is tempted with the promise of clues. In one episode, Pat gets his or her hair cut. A sign in the salon says that men's haircuts are $7, and women's haircuts are $9. The audience waits in suspense: when Pat goes to pay, his or her true gender will be revealed. The humor of the series lies in the fact that those hopes are constantly foiled; in this instance, Pat leaves $10 and says to keep the change. Gender is so fundamental to human interactions, that the idea of a person without gender is absurd. The audience thinks that surely some clue must reveal Pat's gender, but none ever does. Many who have never seen Saturday Night Live know about Pat.(2) The character has become a kind of cultural icon. Pat's popularity is revealing.
    [Show full text]
  • Aardwolf Mushclient Download
    Aardwolf mushclient download click here to download Download the Aardwolf version of Mushclient and start playing today! Get the Aardwolf MUSHclient Package installer at. Contribute to aardwolfclientpackage development by creating an account on GitHub. Join GitHub today. GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together. Sign up. MUSHclient scripts for Aardwolf MUD. 1, commits · 2 branches · 8 releases · 2 contributors · GPL · Lua %. Lua. Clone or download. This page has download links for two variants of the Aardwolf MUSHclient Package installer. The only difference between them is that the one called the "non-visual base" installer initially loads a different default set of plugins in the Aardwolf world file, eschewing graphical plugins that are incompatible with text to speech. A short video showing how to download and setup Bastmush plugin package for aardwolf using MUSHclient. Shows how to install plugins for the MUD client program "MUSHclient", to help play the game Aardwolf. More. Free Download MUSHclient - Pre - Play Aardwolf on your computer without significant efforts by turning to this MUSH client package that requir. 7. www.doorway.ru you can download them here www.doorway.ru and also look up information related to them. All are written in LUA so that they WILL work on LINUX (using wine 'emulated' mushclient) Enjoy, Onoitsu2 (Venificius on Aardwolf). [Go to top] top Aardwolf Look and scan to. MUSHclient plugins. Aardwolf_Campaign_Noter. This shows your current Aardwolf campaign objectives in a miniwindow. See this forum post for more details: Miniwindow plugin - campaign tracker for See description inside the plugin for more details.
    [Show full text]
  • Collaborative Networked Communication: Muds As Systems Tools
    The following paper was originally presented at the Seventh System Administration Conference (LISA ’93) Monterey, California, November, 1993 Collaborative Networked Communication: MUDs as Systems Tools Remy Evard Northeastern University For more information about USENIX Association contact: 1. Phone: 510 528-8649 2. FAX: 510 548-5738 3. Email: [email protected] 4. WWW URL: http://www.usenix.org Collaborative Networked Communication: MUDs as Systems Tools Rémy Evard – Northeastern University ABSTRACT A systems administration group is only as effective as its internal communication mechanisms. On-line communication has traditionally been managed via electronic mail or news, which are neither real-time nor truly collaborative. Communication tools which let multiple parties work together in real-time have become widespread on the Internet in the last several years. In an effort to keep a physically disjoint systems staff working together effectively, we have explored the use of MUDs as communications tools. By allowing many people to interact in an extensible environment, MUDs have solved many of the problems that we had with on-line communication, and provided many unexpected benefits as well. Introduction related projects each term of the school year as part of a volunteer program, and may put in as much Multi User Dungeons, or MUDs, are widely time as the full-time staff (or perhaps more). used on the Internet as interactive role-playing games. They use valuable network resources, attract With this many people involved in systems pro- unruly users, and are often run by students who jects, coordination and communication become didn’t quite bother to ask the permission of the local essential to making effective progress.
    [Show full text]
  • Gramma -- Alison Mcmahan: Verbal-Visual-Virtual: a Muddy History
    Gramma -- Alison McMahan: Verbal-Visual-Virtual: A MUDdy History http://genesis.ee.auth.gr/dimakis/Gramma/7/03-Mcmahan.htm Verbal-Visual-Virtual: A MUDdy History Alison McMahan In his book, The Rise of the Network Society, Manuel Castells approaches the idea of a networked society from an economic perspective. He claims that “Capitalism itself has undergone a process of profound restructuring”, a process that is still underway. “As a consequence of this general overhauling of the capitalist system…we have witnessed… the incorporation of valuable segments of economies throughout the world into an interdependent system working as a unit in real time… a new communication system, increasingly speaking a universal, digital language” (Castells 1). Castells points out that this new communications system and the concomitant social structure has its effects on how identity is defined. The more networked we are, the more priority we attach to our sense of individual identity; “societies are increasingly structured around a bipolar opposition between the Net and the Self ” (3). He defines networks as follows: A network is a set of interconnected nodes. A node is the point at which a curve intersects itself. What a node is, concretely speaking, depends on the kind of concrete networks of which we speak. Networks are open structures, able to expand without limits, integrating new nodes as long as they are able to communicate within the network…. A network-based social structure is a highly dynamic, open system, susceptible to innovating without threatening its balance. [The goal of the network society is] the supersession of space and the annihilation of time.
    [Show full text]
  • Instalación Y Administración De Servicios De Correo Electrónico
    Servicios de red e internet Instalación y administración de servicios de correo electrónico Raquel Castellanos Crespo Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo INDICE Características del servicio de correo electrónico Elementos del servicio de correo electrónico -Agentes de correo electrónico. - Servidores de correo electrónico. Open relay y Smart host - Clientes de correo electrónico: entorno-DOS, gráficos y navegadores. - Direcciones, cuentas de correo y servidores DNS - Protocolos y servicios de descarga de correo: SMPT, ESMTP, POP, IMAP. Funcionamiento del servicio de correo electrónico Cuentas de correo, alias y buzones de correo Estructura de mensajes de correo electrónico - Cabecera, cuerpo, MIME Monitorización y registros del servicio de correo electrónico Servicio de correo electrónico vía web Correo seguro - Firma digital y cifrado de mensajes Veracidad del correo - Correo basura ("SPAM”) fraude, engaño, cadenas y virus informáticos 2 Servicios de red e internet | Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo Características del servicio de correo electrónico Correo electrónico (correo-e, conocido también como e-mail ), es un servicio de red que permite a los usuarios enviar y recibir mensajes y archivos rápidamente (también denominados mensajes electrónicos o cartas electrónicas) mediante sistemas de comunicación electrónicos. Principalmente se usa este nombre para denominar al sistema que provee este servicio en Internet, mediante el protocolo SMTP, aunque por extensión también puede verse aplicado a sistemas análogos que usen otras tecnologías. Por medio de mensajes de correo electrónico se puede enviar, no solamente texto, sino todo tipo de documentos digitales.
    [Show full text]
  • Mud Connector
    Archive-name: mudlist.doc /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ /_/_/_/_/ THE /_/_/_/_/ /_/_/ MUD CONNECTOR /_/_/ /_/_/_/_/ MUD LIST /_/_/_/_/ /_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/ o=======================================================================o The Mud Connector is (c) copyright (1994 - 96) by Andrew Cowan, an associate of GlobalMedia Design Inc. This mudlist may be reprinted as long as 1) it appears in its entirety, you may not strip out bits and pieces 2) the entire header appears with the list intact. Many thanks go out to the mud administrators who helped to make this list possible, without them there is little chance this list would exist! o=======================================================================o This list is presented strictly in alphabetical order. Each mud listing contains: The mud name, The code base used, the telnet address of the mud (unless circumstances prevent this), the homepage url (if a homepage exists) and a description submitted by a member of the mud's administration or a person approved to make the submission. All listings derived from the Mud Connector WWW site http://www.mudconnect.com/ You can contact the Mud Connector staff at [email protected]. [NOTE: This list was computer-generated, Please report bugs/typos] o=======================================================================o Last Updated: June 8th, 1997 TOTAL MUDS LISTED: 808 o=======================================================================o o=======================================================================o Muds Beginning With: A o=======================================================================o Mud : Aacena: The Fatal Promise Code Base : Envy 2.0 Telnet : mud.usacomputers.com 6969 [204.215.32.27] WWW : None Description : Aacena: The Fatal Promise: Come here if you like: Clan Wars, PKilling, Role Playing, Friendly but Fair Imms, in depth quests, Colour, Multiclassing*, Original Areas*, Tweaked up code, and MORE! *On the way in The Fatal Promise is a small mud but is growing in size and player base.
    [Show full text]
  • WANDERER: a Diko Mud Game Design with Educational Pretensions
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Supervised Undergraduate Student Research Chancellor’s Honors Program Projects and Creative Work Spring 5-1996 WANDERER: A Diko Mud Game Design with Educational Pretensions Anne-Scott Whitmore University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_chanhonoproj Recommended Citation Whitmore, Anne-Scott, "WANDERER: A Diko Mud Game Design with Educational Pretensions" (1996). Chancellor’s Honors Program Projects. https://trace.tennessee.edu/utk_chanhonoproj/195 This is brought to you for free and open access by the Supervised Undergraduate Student Research and Creative Work at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Chancellor’s Honors Program Projects by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. WANDERER: A DikuMUD Game Design with Educational Pretensions Anne-Scott Whitmire June 5, 1996 Abstract WANDERER is the author's conception of the way in which a DikuMUD computer game might be adapted to become an informational resource and potential educational tool. This paper discusses the MUD phenomenon, explains why the author thinks the game has educational potential, and presents a summary of the research which was done in the creation of this prototype of an informational MUD. 2 Introduction During my undergraduate career I became one of many students who are hopelessly addicted to playing a type of Internet-based computer game known as a MUD, or Multi­ User Domain. I began to see a potential in these games for educational use; the design of the games and their attraction for students seemed to make them ideal tools for education.
    [Show full text]
  • 7 Multi-Player Online Role-Playing Games
    7 Multi-Player Online Role-Playing Games Mark Chen; Riley Leary; Jon Peterson; David Simkins This chapter describes multiplayer online role-playing games (MORPGs) where players participate through networked connections to collectively build a narrative or experience with a game that persists independent of who is logged in. We discuss two main traditions of these games (see Chapter 8 for an emerging tradition): 1. Multi-User Dungeons (MUDs), and 2. Massively Multiplayer Online Role-Playing Games (MMORPGs). MUDs and MMORPGs generally allow for a “massive” amount of players—sometimes hundreds, thousands, or tens of thousands of players who simultaneously engage in the same game. Most MUDs and MMORPGs feature worlds where players log in at any time to visit, providing players with a persistent world independent of who is logged in. A variety of agents are at play shaping the multiplayer online RPG form. Creators have introduced novel game systems or narratives while dealing with the affordances of what everyone agrees is an RPG, but creators are also constrained by the technologies of their time rather than inherent limitations in RPGs. There also exists a parallel history in non-digital RPGs and computer role-playing games (CRPGs) that influence the online games. Thus the evolution of MORPGs is not channeled through just one tradition. Thankfully, first-hand accounts of the history of the multiplayer online RPG industry (Bartle, 2010) and first-hand accounts of design and management decisions for specific games (e.g. Morningstar & Farmer, 1991; Curtis, 1996; Mulligan & Patrovsky, 2003) exist. One thing these accounts lack is scrutiny from scholars across multiple disciplines, studying specific player phenomena in online gaming, so this chapter complements the historical timeline with notable scholarly research on player behavior and community engagement.
    [Show full text]
  • Table of Contents
    Table of Contents 1. TrekMUSE, 3:30 AM ................................................................................................ 1 2. Introduction .............................................................................................................. 4 2.1 MUDs, MUSEs, MUSHs, and MOOs ...................................................... 4 2.2 Adventure-Game-Style MUDs ................................................................. 5 2.3 Tiny-Style MUDs ........................................................................................ 7 2.4 Themed MUDs ........................................................................................... 10 2.4.1 Social Hierarchy .......................................................................... 12 2.4.2 Participatory Culture .................................................................. 13 2.5 Methodology ............................................................................................... 13 3. Identity ....................................................................................................................... 17 3.1 From the Virtual to the Real: A Party ...................................................... 17 3.2 From the Virtual to the Real: A Romance ............................................... 23 4. Gender Swapping .................................................................................................... 26 5. Mud Addiction ........................................................................................................
    [Show full text]