Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

theft-server(1p) [debian man page]

THEFT-SERVER(1p)					User Contributed Perl Documentation					  THEFT-SERVER(1p)

NAME
theft-server - CLC-INTERCAL networking SYNOPSIS
theft-server --port=port [options] DESCRIPTION
The theft-server mediates the communication between two CLC-INTERCAL programs with the internet extension. It keeps a list of process IDs running on the current computer so it can provide lists of processes which can be engaged in INTERcal NETworking; it also responds to broadcasts allowing other CLC-INTERCAL programs on the LAN to know there is something happening on this computer. Under normal conditions, the theft-server is started automatically by a CLC-INTERCAL programs with the internet extension (unless one is already running, of course!) because the extension cannot operate without a server on the local computer. However, it is possible to start one manually, for example from a /etc/init.d or /etc/rc.d. If the program is started automatically, it uses defaults for all its configuration; when started manually, it accepts the following options: -pport / --port=port Uses the given port (number or service name) for communications, instead of using the default one from a configuration file. -lseconds / --linger=seconds Waits the specified time for a connection, then exit. The default is 600 (10 minutes). The timeout applies when the program starts and also when all existing connections are closed. This allows the program to be started on demand by CLC-INTERCAL programs, and to auto- matically exit when no longer required (unless more programs start up during the timeout). This function is disabled by setting the timeout to 0 (i.e. -l0); for example, if starting the server from /etc/init.d or equivalent one would disable the timeout. -d / --debug Tells everything it's doing (on Standard Error). Also, prevents the program from detaching from the current terminal and going into the background. BUGS
IPv6 is not yet implemented. perl v5.8.8 2008-03-29 THEFT-SERVER(1p)

Check Out this Related Man Page

INTERCAL::Charset::Hollerith(3pm)			User Contributed Perl Documentation			 INTERCAL::Charset::Hollerith(3pm)

NAME
Charset::Hollerith - allows to use Hollerith string constants in ASCII programs (and v.v.) SYNOPSIS
use Charset::Hollerith qw(hollerith2ascii); my $a = hollerith2ascii "(Hollerith text)"; DESCRIPTION
Charset::Hollerith defines functions to convert between a subset of ASCII and a subset of nonstandard Hollerith (since there isn't such a thing as a standard Hollerith we defined our own variant which is guaranteed to be incompatible with all versions of Hollerith used by IBM hardware - however, for each character code we have used the code used by some (but not all) IBM card reader, if the code exists in Hol- lerith at all, or we have made one up in some logical way (such as overpunching) if no IBM hardware had that particular character. The two functions hollerith2ascii and ascii2hollerith are exportable but not exported by default. They do the obvious thing to their argu- ment. HOLLERITH CHARACTER TABLE
A Hollerith string is a sequence of 12-bit characters; they are encoded as two ASCII characters, containing 6 bits each: the first charac- ter contains punches 12, 0, 2, 4, 6, 8 and the second character contains punches 11, 1, 3, 5, 7, 9; interleaving the two characters gives the original 12 bits. To make the characters printable on ASCII terminals, bit 7 is always set to 0, and bit 6 is set to the complement of bit 5. These two bits are ignored when reading Hollerith cards. Some Hollerith characters (produced by overpunching) can be converted to sequences of ASCII characters; ascii2hollerith will correctly recognise the sequences. The following punched cards document the encoding of characters (the last three symbols at the end nongraphic symbols in ASCII; the previ- ous two symbols correspond to multicharacter sequences): ' !"#$%&()*+,-./:;<=>?@[]^_`{|}~cY0123456789 12 * * * * * * * * * * 12 11 * * * * ** ** * * * 11 0 * * * * **** * * *** 0 1 * * * 1 2 * * * * * 2 3 ** * * * * 3 4 *** * * ** * * * * 4 5 * * * * * * 5 6 * * ** * * 6 7 * *** * * 7 8 * ******** * * ******* * * * * * 8 9 * * * 9 ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrs 12 ********* ********* 12 11 ********* ********* 11 0 ********* * * 0 1 * * ** ** * 1 2 * * * ** ** * 2 3 * * * ** ** 3 4 * * * ** ** 4 5 * * * ** ** 5 6 * * * ** ** 6 7 * * * ** ** 7 8 * * * ** ** 8 9 * * * * * 9 tuvwxyz [] ". NL CR HT 12 * * * 12 11 * 11 0 ******* * * 0 1 * * * 1 2 * * * * 2 3 ** * * * * 3 4 ** * * * * 4 5 ** * * * 5 6 ** * * * 6 7 ** * * * * * 7 8 ** * * * * 8 9 * * * * 9 PLEASE NOTE that versions of CLC-INTERCAL before 1.-94.-2 had a bug which caused a rabbit to be represented as 12-3-2-8 instead of 12-3-7-8. Cards punched with such older versions, and containing rabbits, will need to be copied with one of the rabbit holes moved from row 2 to row 7. COPYRIGHT
This module is part of CLC-INTERCAL. Copyright (C) 2000, 2002, 2006, 2007 Claudio Calvelli, all rights reserved See the files README and COPYING in the distribution for information. SEE ALSO
A qualified psychiatrist. perl v5.8.8 2008-03-29 INTERCAL::Charset::Hollerith(3pm)
Man Page

Featured Tech Videos