UNIVERSITY OF ARIZONA DECUS Spring, 1986 VAX Tape Copy Submission Coordinated by: Joel M Snyder U of A MIS Dep't Tucson,AZ 85721 (602) 621-2748 JMS@ARIZMIS.BITNET; JMS%ARIZMIS.BITNET@WISCVM.ARPA Description: [.KILLER] Idle Job Killer. You've seen 'em before, you'll see 'em again. This one incorporates the "BREAK BUSTER" program from the previous tape; it can be extracted with little or no pain. THIS WORKS UNDER V4.x AND NOT UNDER V3.x !!! [.CROSS_MAIL] Have a network? Have people not really knowing what node people are on, yet knowing their username? Use CROSS_MAIL nightly for relief of pains associated with this. Essentially, what this program does is take everyone on THIS node (ie, the node that the program is run on) and put an entry in VMSMAIL.DAT on THAT node (CROSS_MAIL.COM asks for a name for THAT node; you'll need to give access control if appropriate) which forwards all mail sent on THAT node to people on THIS node to THIS node. So, assuming that all people have ONE username, and that you have a small network, no one has to know what node people get their mail on; VMSMAIL knows automagically. Make sense? If you don't get it, you probably haven't recognized the problem yet. PLEASE, PLEASE, PLEASE, READ THE .COM FILE BEFORE RUNNING THIS PROGRAM. [.PURGE_MAIL] Deleted a user lately? Wonder what happens to their entry in VMSMAIL.DAT when you do so? I'll tell you -- it sticks around. Forever. And ever. And ever. So, run PURGE_MAIL once a month, and it cleans out any entries in VMSMAIL that don't have usernames in SYSUAF. "But, like, I have special pointers in VMSMAIL." Well, so do we, so a file called XCEPTS (usually in SYS$LIBRARY, but this is driven by a .COM file, so don't worry, you non-hackers you) lists names that SHOULDN'T be deleted. For example, we direct mail sent to SYSTEM to someplace else; there's a corresponding entry in XCEPTS which simply says "SYSTEM," and instructs PURGE_MAIL to leave that one alone. NOTE: Xcepts is an indexed file, and the .COM file which runs MAIL_PURGE tries to deal with that. Thus, if you went and edited the file (which is certainly a legitemite thing to do), the .COM file will try to $ CONVERT the file back. For this reason, there's an FDL file which has to go along with the program. PLEASE, PLEASE, PLEASE, READ THE .COM FILE BEFORE RUNNING THIS PROGRAM.