10/07/88 delete, dl Syntax as a command: dl arguments {-control_args} Function: The delete request lets you delete a file on a remote host. Arguments: file file is the name of the file to be deleted and must be specified in a form acceptable to the host on which it resides. It must be preceded by -name (or -nm) if the file name begins with a "-"; it must be followed by "-at CORRESPONDENT" where CORRESPONDENT must be the name given in the NIT (Network Information Table) to the remote UFT application. It must be enclosed in quotes if it contains spaces or special characters. If the CORRESPONDENT is running on a Multics system, then file can be a "star" name, and all of the files which match the "star" name will be deleted. Control arguments: -at CORRESPONDENT CORRESPONDENT must be the name given in the NIT (Network Information Table) to the remote UFT application. The NIT associates to the UFT correspondent name its DSA network address (session_id and mailbox). -billing STR specifies the accounting identification used by the remote host (not Multics); there is no default. -catalogue , -cat for a non-Multics system, specifies a catalogue file. The -catalogue control argument is required only when the catalogue file for the file description is not implicitly known. must be specified in a syntax acceptable to the host on which the file will resides; it must be enclosed in quotes if it contain spaces or special characters. -no_password, -npw if the -no_password control argument is present the user will not be prompted for a password with a mask. The password will not be used by the remote host to authenticate the submitter. -password, -pw if the -password control argument is present the user will be prompted for a password with a mask. The password may be used by the remote host to authenticate the submitter. For a remote Multics system, the -password control argument is mandatory. (Default) -person STR, -user STR STR specifies the remote user identification used by the remote host on whose behalf the delete is to be executed. This may be used by the remote host for authentication of the job submitter. The default is the Multics user_id of the user who submitted the request. -project STR, -pj STR STR specifies the project identification used by the remote host on whose behalf the delete is to be executed. Examples: The following example illustrates the procedure for deleting a segment, cr_1, on a remote Multics host. dl uft_dest>cr_1 -at dsa.MUL1.FILETRAN ----------------------------------------------------------- Historical Background This edition of the Multics software materials and documentation is provided and donated to Massachusetts Institute of Technology by Group BULL including BULL HN Information Systems Inc. as a contribution to computer science knowledge. This donation is made also to give evidence of the common contributions of Massachusetts Institute of Technology, Bell Laboratories, General Electric, Honeywell Information Systems Inc., Honeywell BULL Inc., Groupe BULL and BULL HN Information Systems Inc. to the development of this operating system. Multics development was initiated by Massachusetts Institute of Technology Project MAC (1963-1970), renamed the MIT Laboratory for Computer Science and Artificial Intelligence in the mid 1970s, under the leadership of Professor Fernando Jose Corbato. Users consider that Multics provided the best software architecture for managing computer hardware properly and for executing programs. Many subsequent operating systems incorporated Multics principles. Multics was distributed in 1975 to 2000 by Group Bull in Europe , and in the U.S. by Bull HN Information Systems Inc., as successor in interest by change in name only to Honeywell Bull Inc. and Honeywell Information Systems Inc. . ----------------------------------------------------------- Permission to use, copy, modify, and distribute these programs and their documentation for any purpose and without fee is hereby granted,provided that the below copyright notice and historical background appear in all copies and that both the copyright notice and historical background and this permission notice appear in supporting documentation, and that the names of MIT, HIS, BULL or BULL HN not be used in advertising or publicity pertaining to distribution of the programs without specific prior written permission. Copyright 1972 by Massachusetts Institute of Technology and Honeywell Information Systems Inc. Copyright 2006 by BULL HN Information Systems Inc. Copyright 2006 by Bull SAS All Rights Reserved