Tomenet-Guide.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Tomenet-Guide.Pdf .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference & key sets (0.2a) Text editing keys (0.2b) Slash command reference (0.2c) IRC bot commands (0.3) Important inscriptions, Word of Recall (0.3a) The auto−inscription feature (0.4) Typical slang/abbreviations (0.5) Some hints and warnings (READ!) (1) Introduction (1.1) What is TomeNET? (Where can I get the latest sources?) (1.1a) Where do I get in contact? (1.1b) How do I set up IRC chat? (1.2) What is a rogue−like game? (1.2a) Where do I find more information about rogue−like games? (1.3) Goal and progress of TomeNET players (1.3a) Sauron, Morgoth and the Nazgul (1.3b) How to encounter the final boss: Morgoth, Lord of Darkness (2) Installation & setup (2.1) Installing/updating TomeNET (2.1a) Installing sound and music packs (2.1b) Audio controls and config options (2.1c) Editing sound and music configuration (2.1d) "Promoting" TomeNET on Steam ;) (2.2) Starting TomeNET and getting to play on an internet server (2.3) Client options (2.3a) Client options configuration files (2.4) Installing voice chat (2.5) Fonts (2.5a) Custom fonts (3) Creating a character & starting to play (3.1) Creating a new character (3.1a) Character modes (3.1b) Body Modifications (3.1c) Character names, collisions and reservations (3.2) The display (user−interface) (3.2a) The encumberment bar (3.3) Behaviour, chat messages and chat modes (3.4) Start−up equipment & how to use it (3.4a) Item basics (3.4b) Item trading rules and exceptions (3.5) Preparing the first time for fighting enemies (3.6) Creating basic macros & inscribing items (IMPORTANT) (3.7) Creating macros for ranged attacks & abilities (spells) (3.7a) Ability codes [contained within (3.7)] (3.7b) Quick’n’dirty macros (3.7c) The macro wizard (3.7d) Specifying directions and targets (3.8) Example macro sets (3.9) Macros with special keys (3.9a) Creating a chat macro for your party (3.9b) Alternative macros: Calling objects by their name (3.10) Experience, level−ups and skill points (3.10a) Experience point table (3.11) Death, ghosts and looting (3.12) Character timeout and account timeout (4) The world (4.1) Running, picking up items, fighting (4.1a) Auto−retaliation (4.2) Level and owner of items (4.3) Dungeon and tower types (4.3a) The jail (4.4) Terrain (4.5) Towns, shops, the dungeons (4.5a) Shops and their services (4.5a2) The casino (4.5b) Towns & town dungeons (4.5c) Dungeons (4.5c2) Example dungeon depth relations (4.5d) Dungeon bosses (4.6) Pits and vaults (4.7) Traps & trap kits (4.7a) Trap kit load effects (4.8) Dungeon, floor & vault feelings (4.9) Navigating on maps (4.10) Houses (4.10a) Player stores (4.11) Malicious effects players can suffer (4.11a) Drain effects (4.12) Malicious effects monsters can suffer (4.13) Extermination orders, events and Ironman Challenge (4.14) In−game time system (4.14a) In−game metrics (4.15) Swimming (4.16) Teleportation (5) Item and monster details (5.1) Melee weapons, brands (5.1a) Melee weapon types (5.2) Ranged weapons, brands (5.2a) Fire−till−kill mode (5.2b) Throwing items (5.3) Slaying vs brands (5.3a) Martial Arts, brands (5.4) Application of attack−affecting item mods (5.5) Weight of weapons and armour (5.6) Resistances & caps, immunities, susceptibilities (5.7) Qualitative classification of items, identifying & selling items (5.7a) Types of identification (5.7b) The EASY_KNOW flag (5.7c) Loot tables, treasure classes (5.8) Special abilities of items (5.9) What does item xxx do exactly? (5.9a) Activatable items (5.9b) Artifacts and artifact resets (5.10) Destruction of items by elemental attacks (5.10a) Equipment damage from elemental attacks (5.11) Monsters (5.11a) Monster flags (5.12) Monster attack mechanism, armour class, damage caps (5.12a) Monster attack types and brands (5.12b) Dispelling/banishing/turning monsters (5.13) Earthquakes (5.14) Curses (5.15) Vampirism (5.16) Invisibility (5.17) How abilities, resistances and boni stack (5.18) Monster auras (5.19) Experience−draining items (5.20) Digging (5.20a) Digging − exact calculation (5.20b) Digging − common example values (5.20c) Digging − further information (5.21) Recharging (5.22) Wraithform (6) Character details (6.1) Attributes (6.2) Skills, opposed skills (6.2a) Maiar initiation effects (6.2b) Demolition charges (6.3) Abilities (6.4) Races (6.5) Classes/professions (6.5a) Start−up blows/round table (BpR) (6.5b) Titles (6.5c) Power levels (6.6) Sanity (or insanity) (6.7) Mimicry details (6.7a) Polymorph rings (6.7b) Useful low−level humanoid forms for weapon−using mimics (6.7c) Druid forms (6.8) Spells and prayers (6.8a) Mimic powers (6.8b) Runes & Runemastery (6.8c) Runespell tables (6.8d) Spell failure rate (6.9) Parties, Iron Teams, guilds (6.9a) Guild halls (6.10) Magic devices, skill and ability (6.11) Parrying and blocking (6.12) Fighting/shooting techniques (6.13) PvP mode (6.14) Miscellaneous character properties (6.15) Character sheet boni page (7) Tactics & strategy (7.1) Preparing the inventory for diving into the dungeon (7.2) Preparing the equipment for diving into the dungeon (7.3) Surviving critical situations (7.3a) When you are stuck (7.4) Spoiler files (7.5) Monster tactics (7.6) Town/dungeon related hints (8) Miscellanous (8.1) ’The Art Not To Die’ (8.2) Character dumps (8.2a) High Score (8.3) Golem creation (8.4) Artifact creation (8.5) Reward item creation (8.6) Alternative ruleset ’Ironman Server’ (8.6a) Special server type ’Arcade Server’ (8.7) Game engine limits (8.8) Troubleshooting (0) Quickstart ============== This chapter is basically the heavily compressed version of chapters (2) which are about installing and chapters (3) which are about logging on and creating a character. If you like to read in more detail, maybe switch to (2) now instead. (0.1) Start & play, character validation, character timeout −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− A warning first, about character timeout: If you do not log in a character at least once every 365 days the system will automatically delete it along with its houses, to keep the database clean. So make sure you don’t let your characters time out this way! (There will be an expiry warning about 60 days before this happens when you log on with any of your characters, to remind you.) If you are using Linux, you will find additional information about how to compile the game under ’(2.1) Installing/updating TomeNET’. −Get the latest client from the project’s main official site www.tomenet.eu. or from https://muuttuja.org/tomenet/ (Mikael’s site, which features a monster−search and other stuff). If you’re on Microsoft Windows, it is recommended to get the installer package instead of the zip archives. Note that the Nullsoft Installer framework (NSIS) TomeNET uses is an open source project (https://sourceforge.net/projects/nsis/), yet annoyingly there are a few badly maintained virus scanners that may give a wrong positive warnings for NSIS. In the past Avira was notorious for it but it seems they fixed it, nowadays it seems to be Acronis instead, at least at the time of writing these lines. Anyway, you can safely ignore those *ahem*. A fun fact: The TomeNET Winwdows version has never seen an actual Windows system but was created purely on Linux. −If you used the installer you will have a TomeNET icon on your desktop to start the game (and another icon for the TomeNET Updater). If you used the ZIP archive instead of the installer, you can run TomeNET from the unzipped folder by either double−clicking ’TomeNET.exe’ or (this is a safe−fail in case your internet provider ever has DNS problems and you cannot connect to the server) by double−clicking ’TomeNET−direct.bat’ to directly connect to official main server’s IP address (37.187.75.24). NOTE: The official main server’s hostname is "europe.tomenet.eu". −You should now see a list of available TomeNET servers (except if you used TomeNET−direct.bat, which will always connect you directly to the first main server). Pick the first official server by pressing ’a’ key.
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Multi-Phase IRC Botnet and Botnet Behavior Detection Model
    International Journal of Computer Applications (0975 – 8887) Volume 66– No.15, March 2013 Multi-phase IRC Botnet and Botnet Behavior Detection Model Aymen Hasan Rashid Al Awadi Bahari Belaton Information Technology Research Development School of Computer Sciences Universiti Sains Center, University of Kufa, Najaf, Iraq Malaysia 11800 USM, Penang, Malaysia School of Computer Sciences Universiti Sains Malaysia 11800 USM, Penang, Malaysia ABSTRACT schools, banks and any of governmental institutes making use of system vulnerabilities and software bugs to separate and Botnets are considered one of the most dangerous and serious execute a lot of malicious activities. Recently, bots can be the security threats facing the networks and the Internet. major one of the major sources for distributing or performing Comparing with the other security threats, botnet members many kinds of scanning related attacks (Distributed Denial-of- have the ability to be directed and controlled via C&C Service DoS) [1], spamming [2], click fraud [3], identity messages from the botmaster over common protocols such as fraud, sniffing traffic and key logging [4] etc. The nature of IRC and HTTP, or even over covert and unknown the bots activities is to respond to the botmaster's control applications. As for IRC botnets, general security instances command simultaneously. This responding will enable the like firewalls and IDSes do not provide by themselves a viable botmaster to get the full benefit from the infected hosts to solution to prevent them completely. These devices could not attack another target like in DDoS [5]. From what stated differentiate well between the legitimate and malicious traffic earlier, the botnet can be defined as a group of connected of the IRC protocol.
    [Show full text]
  • IRC:N Käyttö Yritysten Viestinnässä
    Maarit Klami IRC:n käyttö yritysten viestinnässä Metropolia Ammattikorkeakoulu Insinööri (AMK) Tietotekniikan koulutusohjelma Insinöörityö 3.5.2012 Tiivistelmä Tekijä Maarit Klami Otsikko IRC:n käyttö yritysten viestinnässä Sivumäärä 34 sivua + 2 liitettä Aika 3.5.2012 Tutkinto insinööri (AMK) Koulutusohjelma tietotekniikka Suuntautumisvaihtoehto ohjelmistotekniikka Ohjaaja lehtori Peter Hjort Tässä työssä perehdyttiin IRC:n käyttömahdollisuuksiin yritysten sisäisessä ja ulkoisessa viestinnässä. Työssä verrattiin IRC:tä muihin pikaviestimiin sekä sosiaalisen median tarjoamiin viestintä- ja markkinointimahdollisuuksiin. Eräs tarkastelluista seikoista on yrityksen koon vaikutus siihen, kuinka mittava operaatio IRC:n käyttöönotto yrityksessä on. Työssä on esitetty myös mahdollisuuksia muiden pikaviestimien integroimiseksi IRC:hen. Työ on tehty mielenkiinnosta käyttää IRC:tä viestinnän apuna yrityksissä. Tietoturva on keskeisessä roolissa yritysten toiminnassa, josta johtuen asia on huomioitava myös viestintäjärjestelmien käytöönotossa ja päivittäisessä käytössä. Työssä tietoturvaa on käsitelty sekä tekniseltä että inhimilliseltä kannalta. Työssä yhtenä keskeisenä osana on tutustuttu IRC-bottien hyödyntämiseen yritysten toiminnassa. Osana työtä tehtiin Eggdropilla IRC-botti, jolle perusominaisuuksien laajentamiseksi ohjelmoitiin TCL-ohjelmointikieltä käyttäen halutun toiminnalisuuden toteuttava skripti. Työssä esitellään botin käyttöönoton vaatimat toimenpiteet sekä skriptin totetuttaminen. Lisäksi työssä on esitelty erilaisia bottien toiminnallisuuksia
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Eggdrop IRC-Botti Pelaajayhteisölle
    Eggdrop IRC -botti pelaajayhteisölle Heikki Hyvönen Opinnäytetyö ___. ___. ______ ________________________________ Ammattikorkeakoulututkinto SAVONIA-AMMATTIKORKEAKOULU OPINNÄYTETYÖ Tiivistelmä Koulutusala Luonnontieteiden ala Koulutusohjelma Tietojenkäsittelyn koulutusohjelma Työn tekijä(t) Heikki Hyvönen Työn nimi Eggdrop IRC -botti pelaajayhteisölle Päiväys 15.5.2012 Sivumäärä/Liitteet 29 Ohjaaja(t) Marja -Riitta Kivi Toimeksiantaja/Yhteistyökumppani(t) Pelaajayhte isö Tiivistelmä Tässä opinnäytetyössä luodaan IRC-botti pelaajayhteisön käyttöön. Botin tarkoitus on ylläpitää kuria ja järjestystä pelaajayhteisön IRC-kanavalla. IRC (Internet Relay Chat ) on suomalaisen Jarkko Oikarisen kehittämä pikaviestinpalvelu, jossa ihmiset ympäri maailman voivat kokoontua keskustelemaan itse perustamilleen kanaville. IRC:n suosio on laskenut melkoisesti sen vuoden 2004 saavuttamista huippulukemista. Nykyään suosituimmalla IRC-verkolla on käyttäjiä enää noin 80 000, kun vuonna 2004 niitä oli vielä yli 200 000. Eggdrop on suosituin IRC-botti ja sitä käytetään tässäkin opinnäytetyössä. Eggdropin parhaat ominaisuudet ovat partyline-chat sekä TCL-scripteillä luodut laajennukset. Tässä työssä kerrotaan mitä tarvitaan, jotta saadaan aikaan toimiva IRC-botti. Avainsanat Irc, Eggdrop SAVONIA UNIVERSITY OF APPLIED SCIENCES THESIS Abstract Field of Study Natural Sciences Degree Programme Degree Programme in Computer Science Author(s) Heikki Hyvönen Title of Thesis Eggdrop IRC bot to a gaming community Date 15.5.2012 Pages/Appendices 29 Supervisor(s) Marja-Riitta Kivi Client Organisation /Partners Gaming community Abstract The goal of this thesis was to create an IRC bot for a gaming community. The bot is used to main- tain law and order in the community's IRC channel. IRC (Internet Relay Chat ), developed by Finnish Jarkko Oikarinen, is a real time text messaging protocol where people all around the world can discuss together on channels created by them- selves.
    [Show full text]
  • Resume Documentation Release 1.0.0
    resume Documentation Release 1.0.0 Chris McDonald Jul 08, 2019 Contents 1 Table of Contents 3 1.1 About Me.................................................3 1.2 Technical Skills.............................................3 1.3 Other Skills................................................6 1.4 Projects..................................................7 1.5 Gigs.................................................... 10 1.6 Contact.................................................. 13 i ii resume Documentation, Release 1.0.0 Hi there, my legal name is Chris Mc- Donald but I prefer Wraithan. This is my web resume. I’m looking for a job, but I’m only interested in Portland, OR based jobs or jobs where I could be re- mote from here. Who is he? • A polyglot who enjoys the com- monalities and contrasts of each programming language and plat- form. • A native of Portland, OR, USA. (And is not looking to relocate) • Loves tuning systems for perfor- mance and stability. • A nerd, cyclist, and metal head. Fig. 1: Open Source Bridge 2011. I am a Node.js and Rust hacker. Though I have years of Python devel- opment experience as well. I enjoy en- abling more stable performant software in any way I can. In my spare time, I teach programming, play with hardware, and hack on side projects. I subscribe to a statement I heard in one of the keynotes at PyCon 2012: “When programming stops being fun, I’ll stop doing it.” Contents 1 resume Documentation, Release 1.0.0 2 Contents CHAPTER 1 Table of Contents 1.1 About Me I’m a software developer from Portland, OR. I spend most of my programming time in Node.js and Rust. I spent a significant chunk of my past working in Python, so much so I have a large tattoo of one on my left shoulder! I enjoy exploring programming languages and chatting about them.
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Reconectando a Sociabilidade On-Line E Off-Line: Trajetórias, Poder E Formação De Grupos Em Canais Geográficos No Internet Relay Chat
    Ana Maria Alves Carneiro da Silva Reconectando a sociabilidade on-line e off-line: trajetórias, poder e formação de grupos em canais geográficos no Internet Relay Chat Dissertação de Mestrado apresentada ao Departamento de Sociologia do Instituto de Filosofia e Ciências Humanas da Universidade Estadual de Campinas sob a orientação do Prof. Dr. Thomas Patrick Dwyer Campinas – Novembro 2000 I FICHA CATALOGRÁFICA ELABORADA PELA BIBLIOTECA DO IFCH – UNICAMP Silva, Ana Maria Alves Carneiro da Si 38 r Reconectando a sociabilidade on-line e off-line: trajetórias, formação de grupos e poder em canais geográficos no Internet Relay Chat (IRC) / Ana Maria Alves Carneiro da Silva. -- Campinas, SP : [s.n.], 2000. Orientador: Thomas Patrick Dwyer. Dissertação (mestrado) – Universidade Estadual de Campinas, Instituto de Filosofia e Ciências Humanas. 1. Tecnologia – Aspectos sociais – Brasil. 2. Sociologia. 3. Poder (Ciências Sociais). 4. Sociabilidade. 5. Internet (Redes de Computação) – Brasil. I. Dwyer, Thomas Patrick. II. Universidade Estadual de Campinas. Instituto de Filosofia e Ciências Humanas. III. Título. II Ana Maria Alves Carneiro da Silva Reconectando a sociabilidade on-line e off-line: trajetórias, poder e formação de grupos em canais geográficos no Internet Relay Chat Dissertação de Mestrado apresentada ao Departamento de Sociologia do Instituto de Filosofia e Ciências Humanas da Universidade Estadual de Campinas sob a orientação do Prof. Dr. Thomas Patrick Dwyer. Este exemplar corresponde à redação final da tese defendida e aprovada pela Comissão Julgadora em / /2000. Banca Prof. Dr. Thomas Patrick Dwyer (Orientador) Prof. Dr. Theophilos Rifiotis Prof. Dr. Fernando Lourenço III Resumo Reconectando a sociabilidade on-line e off-line: trajetórias, formação de grupos e poder em canais geográficos no Internet Relay Chat (IRC) O objetivo desta pesquisa foi analisar a sociabilidade e os exercícios de poder no ciberespaço, aprofundando a discussão da bibliografia especializada.
    [Show full text]
  • Global Appeal 2007
    Global Appeal 2007 Strategies and programmes Editorial team The editorial team wishes to acknowledge the outstanding contributions of colleagues at Headquarters and in the Field in the preparation of this document. The team wishes to thank especially Jill Mackechnie and Ian Myles for their help in reviewing all the texts and to Josiane Croset and her team for going out of their way to ensure the timely delivery of accurate financial data. Managing Editor: Maria Clara Martin Editors: Rohini Deshmukh, Kyle Matthews Data Coordinator and Editor: Robert Salin Contributing Editors: Shoko Shimozawa, Miroslav Medic, Joyce Munyao, Anja Papenfuss, Vibha Thapalyal Editorial Assistant: Sylvie Genhart-Maillot Intern: Katherine Meyer Editorial Consultant: Suresh Unny Photographs: Susan Hopper and Anne Kellner at the UNHCR Photolibrary, and UNHCR staff in the Field and in Headquarters. Cartography: Yvon Orand and Jordan Anastassov (Source: UNHCR Geographic Information Systems [GIS], Global Insight Digital Mapping © 1998 Europa Technologies Ltd.) Statistics: Henrik Pilgaard and Tarek Abou Chabake, Field Information and Coordination Support Section. Production Design, production and printing: Multimedia Design and Production, International Training Centre of the ILO, Turin - Italy Disclaimer The maps in this document do not imply the expression of any opinion on the part of UNHCR concerning the legal status of any country, territory, city or area, of its authorities, or the delimitation of frontiers or boundaries. All statistics are provisional and subject to change. UNHCR PO BOX 2500 1211 Geneva 2 Switzerland Tel: +41 22 739 8186 Fax +41 22 739 7358 Email: [email protected] www.unhcr.org Cover photo: Timor-Leste: Moving into a new lightweight emergency tent at the Don Bosco College IDP camp outside Dili.
    [Show full text]
  • Descargar Comunicación Y Pedagogía 246-247
    www.primerasnoticiastv.comp Estad atent@s a esta nueva plataforma de tv on line de la Asociación de Prensa Juvenil. Un espacio de comunicación audiovisual interactiva que trata de informar, formar y entretener, potenciando el periodismo juvenil ciudadano y la participación además de informarte de las novedades de la Asociación de Prensa Juvenil. Por supuesto, estáis invitad@s a colaborar enviando vuestros vídeos y noticias. Para contactar con el equipo de Primeras Noticias tv puedes utilizar el formulario que te facilita el propio programa. Un programa de Subvencionado por C&P DIRECTOR Alejandro Aliaga Alcolea Y duran, duran... CENTRO DE COMUNICACIÓN l Software Libre llegó para quedarse. Por mucho que nos quieran convencer los Y PEDAGOGÍA defensores del software privativo, a la pruebas nos remitimos. Nadie puede negar, Director tras años de implementación en gran parte de las Comunidades Autónomas espa- José D. Aliaga Serrano E ñolas, que el Software Libre está por debajo de los programas de pago en cuanto a presta- ciones, si no todo lo contrario: el empuje dado por la comunidad de Internet les pone, mu- CONSEJO chas veces, por delante. Eso sin hablar de su gratuidad... Además, el Software Libre puede DE REDACCIÓN alargar la vida de nuestros ordenadores. No sólo no cuesta ni un euro, sino que tampoco J. Ignacio Aguaded Gómez hemos de invertir en hardware... Universidad de Huelva Carmen Alba El único problema es que no todo el profesorado está al tanto de esto último. Por ello, Universidad Complutense desde Comunicación y Pedagogía se ha enfocado su especial anual dedicado al Software de Madrid Libre a la reutilización de viejos PCs.
    [Show full text]