Big Dummy's Guide To The Internet by Electronic Frontier Foundation (early reader chapter books .txt) π
When you tell your communications software to capture a screen, it opens a file in your computer (usually in the same directory or folder used by the software) and "dumps" an image of whatever happens to be on your screen at the time.
Logging works a bit differently. When you issue a logging command, you tell the software to open a file (again, usually in the same directory or folder as used by the software) and then give it a name. Then, until you turn off the logging command, everything that scrolls on your screen is copied into that file, sort of like recording on videotape. This is useful for capturing long documents that scroll for several pages -- using screen capture, you would have to repeat the same command for each new screen.
Terminal emulation is a way for your computer to mimic, or emulate, the way other computers put information on the screen and accept commands from a keyboard. In general, most systems on the Net
Read free book Β«Big Dummy's Guide To The Internet by Electronic Frontier Foundation (early reader chapter books .txt) πΒ» - read online or download for free at americanlibrarybooks.com
- Author: Electronic Frontier Foundation
- Performer: 1428042873
Read book online Β«Big Dummy's Guide To The Internet by Electronic Frontier Foundation (early reader chapter books .txt) πΒ». Author - Electronic Frontier Foundation
Hit βbβ to continue
Hahahha⦠fooled u!
4.6 THE FIRST AMENDMENT AS LOCAL ORDINANCE
Usenetβs international reach raises interesting legal questions that
have yet to be fully resolved. Can a discussion or posting that is legal
in one country be transmitted to a country where it is against the law?
Does the posting even become illegal when it reaches the border? And
what if that country is the only path to a third country where the
message is legal as well? Several foreign colleges and other
institutions have cut off feeds of certain newsgroups where Americans
post what is, in the U.S., perfectly legal discussions of drugs or
alternative sexual practices. Even in the U.S., some universities have
discontinued certain newsgroups their administrators find offensive,
again, usually in the alt. hierarchy.
An interesting example of this sort of question happened in 1993,
when a Canadian court issued a gag order on Canadian reporters covering a
particularly controversial murder case. Americans, not bound by the gag
order, began posting accounts of the trial β which any Canadian with a
Net account could promptly read.
4.7 USENET HISTORY
In the late 1970s, Unix developers came up with a new feature: a
system to allow Unix computers to exchange data over phone lines.
In 1979, two graduate students at Duke University in North
Carolina, Tom Truscott and Jim Ellis, came up with the idea of using
this system, known as UUCP (for Unix-to-Unix CoPy), to distribute
information of interest to people in the Unix community. Along with
Steve Bellovin, a graduate student at the University of North Carolina
and Steve Daniel, they wrote conferencing software and linked together
computers at Duke and UNC.
Word quickly spread and by 1981, a graduate student at Berkeley,
Mark Horton and a nearby high school student, Matt Glickman, had
released a new version that added more features and was able to handle
larger volumes of postings β the original North Carolina program was
meant for only a few articles in a newsgroup each day.
Today, Usenet connects tens of thousands of sites around the world,
from mainframes to Amigas. With more than 3,000 newsgroups and untold
thousands of readers, it is perhaps the worldβs largest computer
network.
4.8 WHEN THINGS GO WRONG
When you start up rn, you get a βwarningβ that βbogusnewsgroupsβ are present.
Within a couple of minutes, youβll be asked whether to keep these or
delete them. Delete them. Bogus newsgroups are newsgroups that your
system administrator or somebody else has determined are no longer
needed.
While in a newsgroup in rn, you get a message: βskippingunavailable article.β
This is usually an article that somebody posted and then decided to
cancel.
You upload a text file to your Unix host system for use in aUsenet message or e-mail, and when you or your recipient reads the file,
every line ends with a ^M.
This happens because Unix handles line endings differently than MS-
DOS or Macintosh computers. Most Unix systems have programs to convert
incoming files from other computers. To use it, upload your file and
then, at your command line, type
dos2unix filename filename or
mac2unix filename filename
depending on which kind of computer you are using and where filename is
the name of the file youβve just uploaded. A similar program can prepare
text files for downloading to your computer, for example:
unix2dos filename filename or
unix2mac filename filename
will ensure that a text file you are about to get will not come out
looking odd on your computer.
4.9 FYI
Leanne Phillips periodically posts a list of frequently asked
questions (and answers) about use of the rn killfile function in the
news.newusers.questions and news.answers newsgroups
Comments (0)