macmillan%wnre.aecl.cdn%ubc.CSNET@RELAY.CS.NET (John MacMillan) (01/18/87)
When capturing data from the public data network, the LOG file picks up characters that appear as "R>" when the file is typed out afterwards. In a dump, these correspond to hex "00523E". Does anyone know what causes them, and how to get rid of them? (Short of writing a filter program to remove them afterwards.) Here is an example: Dump of file WNRE$CIS:[MACMILLAN]MSG.LOG;1 on 16-JAN-1987 14:09:21.22 File ID (17773,3,0) End of file block 1 / Allocated 3 Virtual block number 1 (00000001), 512 (0200) bytes 6D6D6F43 0A0D3E52 000E000D 3E540003 ..T>....R>..Comm 000000 31206461 65723E54 00092020 3F646E61 and? ..T>read 1 000010 203A6465 74736F50 0A0D3E52 0082000D ....R>..Posted: 000020 38393120 2C343120 6E614A20 20646557 Wed Jan 14, 198 000030 20545345 204D5020 37353A35 20202037 7 5:57 PM EST 000040 67734D20 20202020 20202020 20202020 Msg 000050 36363137 2D323237 312D414F 544F203A : OTOA-1722-7166 000060 4C494D43 414D2020 203A6D6F 72460A0D ..From: MACMIL 000070 6D202020 20203A4F 540A0D4A 2E4E414C LAN.J..TO: m 000080 6A627553 0A0D6A2E 6E616C6C 696D6361 acmillan.j..Subj 000090 67736D20 74733E52 00256574 2020203A : te%.R>st msg 0000A0 73657420 61207369 20736968 540A0A0D ...This is a tes 0000B0 000D000A 0D2E2E6E 686F4A09 0A0D2E74 t....John....... 0000C0 00080020 203F6E6F 69746341 0A0D3E52 R>..Action? ... 0000D0 20200A0D 3E52000F 0D656772 75703E54 T>purge...R>.. 0000E0 0A0D3E52 000D000A 0D2E6465 67727550 Purged......R>.. 0000F0 000D3E54 00030020 203F6E6F 69746341 Action? ...T>.. 000100 20203F64 6E616D6D 6F430A0D 3E52000E ..R>..Command? 000110 20200A0D 3E52002F 0D657962 3E540006 ..T>bye./.R>.. 000120 73203030 3120594F 564E4520 73696854 This ENVOY 100 s 000130 6F632077 6F6E2073 69206E6F 69737365 ession is now co 000140 00000000 FFFF000A 0D2E6574 656C706D mplete.......... 000150 00000000 00000000 00000000 00000000 ................ 000160 00000000 00000000 00000000 00000000 ................ 000170 00000000 00000000 00000000 00000000 ................ 000180 00000000 00000000 00000000 00000000 ................ 000190 00000000 00000000 00000000 00000000 ................ 0001A0 00000000 00000000 00000000 00000000 ................ 0001B0 00000000 00000000 00000000 00000000 ................ 0001C0 00000000 00000000 00000000 00000000 ................ 0001D0 00000000 00000000 00000000 00000000 ................ 0001E0 00000000 00000000 00000000 00000000 ................ 0001F0 John MacMillan Atomic Energy of Canada Whiteshell Nuclear Research Establishment Pinawa, Manitoba, Canada R0E 1L0 (204) 753-2311 x2539
jeff@necntc.NEC.COM (Jeff Janock [sys]) (01/20/87)
In article <18*macmillan@wnre.aecl.cdn> macmillan%wnre.aecl.cdn%ubc.CSNET@RELAY.CS.NET (John MacMillan) writes: >When capturing data from the public data network, the LOG file >picks up characters that appear as "R>" when the file is typed >out afterwards. In a dump, these correspond to hex "00523E". > >Does anyone know what causes them, and how to get rid of them? >(Short of writing a filter program to remove them afterwards.) > >John MacMillan >Atomic Energy of Canada >Whiteshell Nuclear Research Establishment >Pinawa, Manitoba, Canada R0E 1L0 > >(204) 753-2311 x2539 There is an easy way: PSI> set log/nostamp=all this will stop psi from putting in the send/rec packet marks... Hope this helps, Jeff Janock NEC Electronics Inc. One Natick Executive Park Natick, Massachusetts 01760 +1 617 655 8833 ARPA: jeff%necntc.UUCP@harvisr.harvard.edu within UUCP domain: jeff@necntc.NEC.COM should work: jeff@necntc.UUCP or if need be: {decvax | pyramid | husc6 | seismo!mirror | talcott}!necntc!jeff gatech!gt-eedsp!necntc!jeff