[mod.computers.vax] psi log file problem

macmillan%wnre.aecl.cdn%ubc.CSNET@RELAY.CS.NET (John MacMillan) (01/18/87)

When capturing data from the public data network, the LOG file
picks up characters that appear as "R>" when the file is typed
out afterwards. In a dump, these correspond to hex "00523E".

Does anyone know what causes them, and how to get rid of them?
(Short of writing a filter program to remove them afterwards.)

Here is an example:

Dump of file WNRE$CIS:[MACMILLAN]MSG.LOG;1 on 16-JAN-1987 14:09:21.22
File ID (17773,3,0)   End of file block 1 / Allocated 3

Virtual block number 1 (00000001), 512 (0200) bytes

 6D6D6F43 0A0D3E52 000E000D 3E540003 ..T>....R>..Comm 000000
 31206461 65723E54 00092020 3F646E61 and?  ..T>read 1 000010
 203A6465 74736F50 0A0D3E52 0082000D ....R>..Posted:  000020
 38393120 2C343120 6E614A20 20646557 Wed  Jan 14, 198 000030
 20545345 204D5020 37353A35 20202037 7   5:57 PM EST  000040
 67734D20 20202020 20202020 20202020              Msg 000050
 36363137 2D323237 312D414F 544F203A : OTOA-1722-7166 000060
 4C494D43 414D2020 203A6D6F 72460A0D ..From:   MACMIL 000070
 6D202020 20203A4F 540A0D4A 2E4E414C LAN.J..TO:     m 000080
 6A627553 0A0D6A2E 6E616C6C 696D6361 acmillan.j..Subj 000090
 67736D20 74733E52 00256574 2020203A :   te%.R>st msg 0000A0
 73657420 61207369 20736968 540A0A0D ...This is a tes 0000B0
 000D000A 0D2E2E6E 686F4A09 0A0D2E74 t....John....... 0000C0
 00080020 203F6E6F 69746341 0A0D3E52 R>..Action?  ... 0000D0
 20200A0D 3E52000F 0D656772 75703E54 T>purge...R>..   0000E0
 0A0D3E52 000D000A 0D2E6465 67727550 Purged......R>.. 0000F0
 000D3E54 00030020 203F6E6F 69746341 Action?  ...T>.. 000100
 20203F64 6E616D6D 6F430A0D 3E52000E ..R>..Command?   000110
 20200A0D 3E52002F 0D657962 3E540006 ..T>bye./.R>..   000120
 73203030 3120594F 564E4520 73696854 This ENVOY 100 s 000130
 6F632077 6F6E2073 69206E6F 69737365 ession is now co 000140
 00000000 FFFF000A 0D2E6574 656C706D mplete.......... 000150
 00000000 00000000 00000000 00000000 ................ 000160
 00000000 00000000 00000000 00000000 ................ 000170
 00000000 00000000 00000000 00000000 ................ 000180
 00000000 00000000 00000000 00000000 ................ 000190
 00000000 00000000 00000000 00000000 ................ 0001A0
 00000000 00000000 00000000 00000000 ................ 0001B0
 00000000 00000000 00000000 00000000 ................ 0001C0
 00000000 00000000 00000000 00000000 ................ 0001D0
 00000000 00000000 00000000 00000000 ................ 0001E0
 00000000 00000000 00000000 00000000 ................ 0001F0


John MacMillan
Atomic Energy of Canada
Whiteshell Nuclear Research Establishment
Pinawa, Manitoba, Canada R0E 1L0

(204) 753-2311 x2539

jeff@necntc.NEC.COM (Jeff Janock [sys]) (01/20/87)

In article <18*macmillan@wnre.aecl.cdn> macmillan%wnre.aecl.cdn%ubc.CSNET@RELAY.CS.NET (John MacMillan) writes:
>When capturing data from the public data network, the LOG file
>picks up characters that appear as "R>" when the file is typed
>out afterwards. In a dump, these correspond to hex "00523E".
>
>Does anyone know what causes them, and how to get rid of them?
>(Short of writing a filter program to remove them afterwards.)
>
>John MacMillan
>Atomic Energy of Canada
>Whiteshell Nuclear Research Establishment
>Pinawa, Manitoba, Canada R0E 1L0
>
>(204) 753-2311 x2539


There is an easy way:

PSI> set log/nostamp=all

this will stop psi from putting in the send/rec packet marks...

Hope this helps,


Jeff Janock
NEC Electronics Inc.
One Natick Executive Park
Natick, Massachusetts 01760
+1 617 655 8833

ARPA:               jeff%necntc.UUCP@harvisr.harvard.edu
within UUCP domain: jeff@necntc.NEC.COM
should work:        jeff@necntc.UUCP

or if need be:
{decvax | pyramid | husc6 | seismo!mirror | talcott}!necntc!jeff
gatech!gt-eedsp!necntc!jeff