Evennia Documentation Release 0.9

Total Page:16

File Type:pdf, Size:1020Kb

Evennia Documentation Release 0.9 Evennia Documentation Release 0.9 The Evennia community Jun 14, 2020 Contents 1 Evennia Introduction 3 1.1 Can I test it somewhere?.........................................4 1.2 Brief summary of features........................................4 1.3 What you need to know to work with Evennia..............................5 2 How To Get And Give Help 7 2.1 How to get Help.............................................7 2.2 How to give Help.............................................7 3 Contributing 9 3.1 Spreading the word............................................9 3.2 Donations.................................................9 3.3 Help with Documentation........................................9 3.4 Contributing through a forked repository................................ 10 3.5 Contributing with Patches........................................ 10 3.6 Contributing with Contribs........................................ 10 4 Soft Code 13 4.1 Examples of Softcode.......................................... 13 4.2 Problems with Softcode......................................... 14 4.3 Changing Times............................................. 14 4.4 Our Solution............................................... 14 4.5 Your Solution............................................... 15 5 Using MUX as a Standard 17 5.1 Documentation policy.......................................... 17 6 Game Planning 19 6.1 Planning (step 1)............................................. 19 6.2 Coding (step 2).............................................. 21 6.3 World Building (step 3)......................................... 22 6.4 Alpha Release.............................................. 22 6.5 Beta Release/Perpetual Beta....................................... 23 6.6 Congratulate yourself!.......................................... 23 7 Installation and setup 25 7.1 Getting Started.............................................. 25 i 7.2 Start Stop Reload............................................. 36 7.3 Choosing An SQL Server........................................ 40 7.4 Apache Config.............................................. 44 7.5 Updating Your Game........................................... 48 7.6 Server Conf................................................ 50 7.7 Online Setup............................................... 52 8 Admin Documentation 61 8.1 Banning.................................................. 61 8.2 IRC.................................................... 64 8.3 RSS.................................................... 65 8.4 Text Encodings.............................................. 66 8.5 Internationalization............................................ 67 8.6 Client Support Grid........................................... 69 9 Builder Documentation 73 9.1 Building Quickstart........................................... 73 9.2 TextTags................................................. 78 9.3 Building Permissions........................................... 83 9.4 Connection Screen............................................ 84 9.5 Batch Processors............................................. 85 9.6 Batch Command Processor........................................ 86 9.7 Batch Code Processor.......................................... 90 9.8 Spawner................................................. 93 9.9 Tutorial World Introduction....................................... 98 10 Developer Basics 101 10.1 Coding Introduction........................................... 101 10.2 Execute Python Code.......................................... 103 10.3 Quirks.................................................. 105 10.4 Licensing................................................. 107 11 Server Components 109 11.1 Directory Overview........................................... 109 11.2 Portal And Server............................................ 110 11.3 Sessions................................................. 111 11.4 Messagepath............................................... 114 11.5 OOB................................................... 118 11.6 Inputfuncs................................................ 121 11.7 Custom Protocols............................................. 125 11.8 Commands................................................ 129 11.9 Command Sets.............................................. 141 11.10 Typeclasses................................................ 147 11.11 Objects.................................................. 152 11.12 Scripts.................................................. 156 11.13 Accounts................................................. 163 11.14 Communications............................................. 165 11.15 Signals.................................................. 167 11.16 Attributes................................................. 169 11.17 Nicks................................................... 177 11.18 Advanced note.............................................. 178 11.19 Tags.................................................... 179 11.20 Locks................................................... 181 11.21 Permissions................................................ 186 11.22 Help System............................................... 190 ii 11.23 TickerHandler.............................................. 192 11.24 MonitorHandler............................................. 194 11.25 EvMenu................................................. 195 11.26 EvMore.................................................. 213 11.27 EvEditor................................................. 214 11.28 Web Features............................................... 217 12 Coding utilities 221 12.1 New Models............................................... 221 12.2 Coding Utils............................................... 225 12.3 Version Control.............................................. 230 12.4 Profiling................................................. 242 12.5 Unit Testing............................................... 245 12.6 Setting up PyCharm........................................... 251 12.7 Using Travis............................................... 257 12.8 Async Process.............................................. 258 13 Tutorials 263 13.1 Python basic introduction........................................ 263 13.2 First Steps Coding............................................ 267 13.3 Tutorial for basic MUSH like game................................... 272 13.4 Adding Command Tutorial........................................ 283 13.5 Adding Object Typeclass Tutorial.................................... 286 13.6 Command Prompt............................................ 288 13.7 NPC shop Tutorial............................................ 291 13.8 Static In Game Map........................................... 296 13.9 Dynamic In Game Map......................................... 303 13.10 Implementing a game rule system.................................... 311 13.11 Turn based Combat System....................................... 316 13.12 Evennia for roleplaying sessions..................................... 325 13.13 Zones................................................... 337 13.14 Command Duration........................................... 338 13.15 Command Cooldown........................................... 345 13.16 Mass and weight for objects....................................... 347 13.17 Default Exit Errors............................................ 349 13.18 Gametime Tutorial............................................ 351 13.19 Coordinates................................................ 356 13.20 Dialogues in events............................................ 362 13.21 A voice operated elevator using events................................. 366 13.22 Add a simple new web page....................................... 374 13.23 Web Tutorial............................................... 376 13.24 Web Character View Tutorial...................................... 378 13.25 Help System Tutorial........................................... 381 13.26 Add a wiki on your website....................................... 389 13.27 Web Character Generation........................................ 394 13.28 Bootstrap & Evennia........................................... 404 13.29 Bootstrap Components and Utilities................................... 406 13.30 Evennia for Diku Users......................................... 408 13.31 Evennia for MUSH Users........................................ 411 14 Appendix 415 14.1 Links................................................... 415 14.2 Default Command Help......................................... 418 14.3 Evennia Devel.............................................. 467 iii iv Evennia Documentation, Release 0.9 This is the manual of Evennia, the open source Python MU* creation system. You should hopefully find all you need to know about coding with, extending and using the code base among these pages. If you have further questions you are welcome to ask them in the Developer online chat or, if you don’t have time to hang around for an answer, on the Mailing list. Please note that this ReadTheDocs version of the documentation is auto-converted from the original documentation found in the Evennia wiki. It represents the wiki as it looked on Saturday March 28, 2020, at 09:29 (GMT+1). The converted version is supplied as a service for those wanting to have access to the documentation in an offline format, on their tablet or printed on paper. The conversion unfortunately means that there are occational
Recommended publications
  • GNU/Linux AI & Alife HOWTO
    GNU/Linux AI & Alife HOWTO GNU/Linux AI & Alife HOWTO Table of Contents GNU/Linux AI & Alife HOWTO......................................................................................................................1 by John Eikenberry..................................................................................................................................1 1. Introduction..........................................................................................................................................1 2. Symbolic Systems (GOFAI)................................................................................................................1 3. Connectionism.....................................................................................................................................1 4. Evolutionary Computing......................................................................................................................1 5. Alife & Complex Systems...................................................................................................................1 6. Agents & Robotics...............................................................................................................................1 7. Statistical & Machine Learning...........................................................................................................2 8. Missing & Dead...................................................................................................................................2 1. Introduction.........................................................................................................................................2
    [Show full text]
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy Et Al
    US007945856B2 (12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy et al. (45) Date of Patent: May 17, 2011 (54) SYSTEMAND METHOD FOR ENABLING (56) References Cited USERS TO INTERACT IN A VIRTUAL SPACE U.S. PATENT DOCUMENTS (75) Inventors: Dave Leahy, Oakland, CA (US); Judith 4.414,621 A 11/1983 Bown et al. Challinger, Santa Cruz, CA (US); B. 4,441,162 A 4, 1984 Lillie 4493,021 A 1/1985 Agrawal et al. Thomas Adler, San Francisco, CA (US); 4,503,499 A 3, 1985 Mason et al. S. Mitra Ardon, San Francisco, CA 4,531,184 A 7/1985 Wigan et al. (US) 4,551,720 A 11/1985 Levin 4,555,781 A 1 1/1985 Baldry et al. (73) Assignee: Worlds.com, Inc., Brookline, MA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 CA 2242626 C 10, 2002 U.S.C. 154(b) by 0 days. (Continued) (21) Appl. No.: 12/353,218 OTHER PUBLICATIONS Andrew Reese et al., Kesami Air Warrior, http://www. (22) Filed: Jan. 13, 2009 atarimagazines.com/startv3n2/kesamiwarrior.html, Jan. 12, 2009. (Under 37 CFR 1.47) (Continued) (65) Prior Publication Data Primary Examiner — Kevin M Nguyen US 2009/0228.809 A1 Sep. 10, 2009 (74) Attorney, Agent, or Firm — Anatoly S. Weiser, Esq.; Acuity Law Group Related U.S. Application Data (57) ABSTRACT (63) Continuation of application No. 1 1/591.878, filed on The present invention provides a highly scalable architecture Nov.
    [Show full text]
  • IBM Unica Campaign: Administrator's Guide to Remove a Dimension Hierarchy
    IBM Unica Campaign Version 8 Release 6 February, 2013 Administrator's Guide Note Before using this information and the product it supports, read the information in “Notices” on page 385. This edition applies to version 8, release 6, modification 0 of IBM Unica Campaign and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Administration in IBM Unica To view system table contents .......27 Campaign ..............1 Working with user tables ..........28 Campaign-related administrative tasks in IBM Unica About working with user tables ......28 Marketing ...............1 Guidelines for mapping user tables .....28 To access data sources from within a flowchart 29 Chapter 2. Managing security in IBM Working with user tables while editing a flowchart ..............29 Unica Campaign ...........3 Working with user tables from the Campaign About security policies ...........3 Settings page .............30 The global security policy .........3 Working with data dictionaries ........39 How Campaign evaluates permissions.....4 To open a data dictionary.........39 Using the Owner and Folder Owner roles . 4 To apply changes to a data dictionary ....40 Guidelines for designing security policies....5 When to use a data dictionary .......40 Security scenarios.............5 Data dictionary syntax..........40 Scenario 1: Company with a single division . 5 To manually create a new data dictionary . 40 Scenario 2: Company with multiple separate Working with table catalogs .........41 divisions...............7 To access table catalogs .........41 Scenario 3: Restricted access within a division .
    [Show full text]
  • Simon Lindh Online Computer Game English Engelska C-Uppsats
    Estetisk-filosofiska fakulteten Simon Lindh Online computer game English A study on the language found in World of Warcraft Engelska C-uppsats Termin: Vårterminen 2009 Handledare: Moira Linnarud Karlstads universitet 651 88 Karlstad Tfn 054-700 10 00 Fax 054-700 14 60 [email protected] www.kau.se Abstract Titel: Online computer game English - A study on the language found in World of Warcraft Författare: Simon Lindh Engelska C, 2009 Antal sidor: 27 Abstract: The aim of this study is to examine the language from a small sample of texts from the chat channels of World of Warcraft and analyze the differences found between World of Warcraft English and Standard English. In addition, the study will compare the language found in World of Warcraft with language found on other parts of the Internet, especially chatgroups. Based on 1045 recorded chat messages, this study examines the use of abbreviations, emoticons, vocabulary, capitalization, spelling, multiple letter use and the use of rare characters. The results of the investigation show that the language of World of Warcraft differs from Standard English on several aspects, primarily in the use of abbreviations. This is supported by secondary sources. The results also show that the use of language is probably not based on the desire to deliver a message quickly, but rather to reach out to people. In addition, the results show that the language found in World of Warcraft is more advanced than a simple effort to try to imitate speech, thereby performing more than written speech. Nyckelord: computer game, World of Warcraft, Internet language, Netspeak, abbreviation, emoticons Table of contents 1.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Technology Innovation and the Future of Air Force Intelligence Analysis
    C O R P O R A T I O N LANCE MENTHE, DAHLIA ANNE GOLDFELD, ABBIE TINGSTAD, SHERRILL LINGEL, EDWARD GEIST, DONALD BRUNK, AMANDA WICKER, SARAH SOLIMAN, BALYS GINTAUTAS, ANNE STICKELLS, AMADO CORDOVA Technology Innovation and the Future of Air Force Intelligence Analysis Volume 2, Technical Analysis and Supporting Material RR-A341-2_cover.indd All Pages 2/8/21 12:20 PM For more information on this publication, visit www.rand.org/t/RRA341-2 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0633-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover: U.S. Marine Corps photo by Cpl. William Chockey; faraktinov, Adobe Stock. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
    [Show full text]
  • Awk, Perl, Etc
    CNAM, spécialité Informatique NSY116- Multimédia & interaction humain-machine (2008-9) Le texte P. Cubaud <[email protected]> 1. Codes, structures (2. Transport, compression, cryptage) 3. Analyse (4. Synthèse) 5. Présentation Bibliographie B. Habert, C. Fabre, F. Isaac De l’écrit au numérique InterEditions, 1998 I.H. Witten, A. Moffat, T.C. Bell Managing gygabytes. Compressing and indexing documents and images Van Nostrand, 1994 Techniques de l’ingénieur série H. section Document numérique (en ligne au CNAM) R. Laufer, D. Scavetta Texte, hypertexte, hypermédia Que-sais-je n°2629 (v2 1995) 1. Codes - Structures Codage des caractères Trois problèmes : • caractère ≠ glyphe • coder ≠ classer • norme ≠ standard Aussi vieux que le télégraphe… et toujours non résolus. 7 bits : American Standard Code for Information Interchange (ASCII, 1967 - puis ISO646 en 1983) 8 bits : ISO-Latin-XXX (ISO 8859-n) Au delà : Unicode (1990, v3 en 2000) et ISO 10646 = Site web unicode: www.unicode.org Une table à garder en attendant… et un outil : iconv MACCROATIAN [numer:~] pcubaud% iconv -l MACROMANIA ANSI_X3.4-1968 ANSI_X3.4-1986 ASCII CP367 IBM367 ISO-IR-6 ISO646-US ISO_646.IRV:1991 US US-ASCII CSASCII MACCYRILLIC UTF-8 MACUKRAINE ISO-10646-UCS-2 UCS-2 CSUNICODE MACGREEK UCS-2BE UNICODE-1-1 UNICODEBIG CSUNICODE11 MACTURKISH UCS-2LE UNICODELITTLE MACHEBREW ISO-10646-UCS-4 UCS-4 CSUCS4 MACARABIC UCS-4BE MACTHAI UCS-4LE HP-ROMAN8 R8 ROMAN8 CSHPROMAN8 UTF-16 NEXTSTEP UTF-16BE ARMSCII-8 UTF-16LE GEORGIAN-ACADEMY UTF-32 GEORGIAN-PS UTF-32BE KOI8-T UTF-32LE MULELAO-1
    [Show full text]
  • Openbsd Gaming Resource
    OPENBSD GAMING RESOURCE A continually updated resource for playing video games on OpenBSD. Mr. Satterly Updated August 7, 2021 P11U17A3B8 III Title: OpenBSD Gaming Resource Author: Mr. Satterly Publisher: Mr. Satterly Date: Updated August 7, 2021 Copyright: Creative Commons Zero 1.0 Universal Email: [email protected] Website: https://MrSatterly.com/ Contents 1 Introduction1 2 Ways to play the games2 2.1 Base system........................ 2 2.2 Ports/Editors........................ 3 2.3 Ports/Emulators...................... 3 Arcade emulation..................... 4 Computer emulation................... 4 Game console emulation................. 4 Operating system emulation .............. 7 2.4 Ports/Games........................ 8 Game engines....................... 8 Interactive fiction..................... 9 2.5 Ports/Math......................... 10 2.6 Ports/Net.......................... 10 2.7 Ports/Shells ........................ 12 2.8 Ports/WWW ........................ 12 3 Notable games 14 3.1 Free games ........................ 14 A-I.............................. 14 J-R.............................. 22 S-Z.............................. 26 3.2 Non-free games...................... 31 4 Getting the games 33 4.1 Games............................ 33 5 Former ways to play games 37 6 What next? 38 Appendices 39 A Clones, models, and variants 39 Index 51 IV 1 Introduction I use this document to help organize my thoughts, files, and links on how to play games on OpenBSD. It helps me to remember what I have gone through while finding new games. The biggest reason to read or at least skim this document is because how can you search for something you do not know exists? I will show you ways to play games, what free and non-free games are available, and give links to help you get started on downloading them.
    [Show full text]
  • Java Bytecode Manipulation Framework
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the OnCommand Performance Manager products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-09632 _A0_ur001 -Copyright 2014 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the ANTLR License • ANTLR, ANother Tool for Language Recognition - 2.7.6 © Copyright ANTLR / Terence Parr 2009 ANTLR License SOFTWARE RIGHTS ANTLR 1989-2004 Developed by Terence Parr Partially supported by University of San Francisco & jGuru.com We reserve no legal rights to the ANTLR--it is fully in the public domain. An individual or company may do whatever they wish with source code distributed with ANTLR or the code generated by ANTLR, including the incorporation of ANTLR, or its output, into commerical software. We encourage users to develop software with ANTLR. However, we do ask that credit is given to us for developing ANTLR. By "credit", we mean that if you use ANTLR or incorporate any source code into one of your programs (commercial product, research project, or otherwise) that you acknowledge this fact somewhere in the documentation, research report, etc... If you like ANTLR and have developed a nice tool with the output, please mention that you developed it using ANTLR. In addition, we ask that the headers remain intact in our source code. As long as these guidelines are kept, we expect to continue enhancing this system and expect to make other tools available as they are completed.
    [Show full text]
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Mysql Globalization Abstract
    MySQL Globalization Abstract This is the MySQL Globalization extract from the MySQL 8.0 Reference Manual. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-27 (revision: 70895) Table of Contents Preface and Legal Notices ............................................................................................................ v 1 Character Sets, Collations, Unicode ........................................................................................... 1 1.1 Character Sets and Collations in General ........................................................................ 2 1.2 Character Sets and Collations in MySQL ......................................................................... 3 1.2.1 Character Set Repertoire ...................................................................................... 5 1.2.2 UTF-8 for Metadata .............................................................................................. 7 1.3 Specifying Character Sets and Collations ......................................................................... 8 1.3.1 Collation Naming Conventions .............................................................................. 8 1.3.2 Server Character Set and Collation ....................................................................... 9 1.3.3 Database Character Set and Collation ................................................................. 10 1.3.4 Table
    [Show full text]