Netware 5.1 Upgrade

Total Page:16

File Type:pdf, Size:1020Kb

Netware 5.1 Upgrade NOVELL PARTNER CONSULTING SERVICE OFFERINGS NOVELL PARTNERNET CONFIDENTIAL CONSULTANT GUIDE NetWare 5.1 Upgrade ® Table of Contents NetWare 5.1 Upgrade Consulting Guide .................................................................................... 4 Target Audience...........................................................................Error! Bookmark not defined. Terminology......................................................................................................................... 4 Skill Set............................................................................................................................... 4 Purpose ............................................................................................................................... 5 Acknowledgements.......................................................................Error! Bookmark not defined. NetWare 5.1 Training Curriculum ............................................................................................ 6 Curriculum for NetWare 5.1 .................................................................................................... 6 Curriculum for NetWare 5 CNE ............................................................................................... 6 Reference Material ...............................................................................................................10 Books .............................................................................................................................10 AppNotes ........................................................................................................................10 NetWare Connection Articles ..............................................................................................11 Technical Information Documents (TIDs)..............................................................................11 NetWare 5.1 Upgrade Solution Development.............................................................................12 Subprocess 1—Start the Project...............................................................................................13 Task 1—Conduct Initial Engagement Meeting........................................................................14 Task 2—Prepare Preliminary Report.....................................................................................15 Task 3—Review and Deliver Preliminary Report ....................................................................15 Subprocess 2—Perform a Technical Assessment and Impact Study................................................16 Task 1—Analyze Customer’s Current Environment.................................................................16 Task 2—Prepare Technical Assessment/Impact Study Report....................................................47 Task 3—Review and Deliver Technical Assessment and Impact Study Report..............................47 Subprocess 3—Develop Solution Design ..................................................................................48 Task 1—Determine Appropriate Solution Design for the NetWare 5.1 Upgrade ............................49 Task 2—Prepare Solution Design Report...............................................................................68 Task 3—Review and Deliver Solution Design Report ..............................................................68 Subprocess 4—Test Solution Design in the Lab .........................................................................69 Task 1—Plan Prototype......................................................................................................70 Task 2—Build Prototype ....................................................................................................71 Task 3—Test Prototype......................................................................................................72 Task 4—Modify and Retest Prototype as Required ..................................................................96 Task 5—Document Solution Design .....................................................................................96 Task 6—Review and Deliver Solution Design Report to Customer .............................................97 Task 7—(Conditional) Negotiate Pilot WOA..........................................................................97 Subprocess 5—Perform the Pilot .............................................................................................98 Task 1—Identify Pilot Sites ................................................................................................98 Task 2—Prepare Pilot Implementation Plan ...........................................................................99 Task 3—Prepare Pilot Test Plan...........................................................................................99 Task 4—Perform the Pilot ..................................................................................................99 Task 5—Modify Implementation Plan (if appropriate)..............................................................99 Task 6—Document Final Solution Design .............................................................................99 Task 7—Create the Closing Report.......................................................................................99 Task 8—Review and Deliver Final Solution Design and Closing Reports to Customer ...................99 Deploying Novell Distributed Print Services (NDPS) ................................................................101 Subprocess 1—Designing and Implementing NDPS..................................................................106 Page 2 of 317 Novell PartnerNet Confidential 07/24/00 Copyright © 2000 by Novell, Inc. Task 1—NDPS Design.....................................................................................................106 Task 2—NDPS Deployment..............................................................................................109 Subprocess 2—Implementing Internet Printing Protocol (IPP).....................................................114 Subprocess 3—Implementing Line Printer/Line Printer Daemon (LPR/LPD).................................117 Subprocess 4—QMS to NDPS Migration................................................................................119 Subprocess 5—Troubleshooting / Real World Issues.................................................................119 Subprocess 6—Create the NDPS Report .................................................................................119 Subprocess 7—Review and Deliver NDPS Report to Customer...................................................119 Integrating Office 2000 with NetWare 5.1 ...............................................................................121 Subprocess 1—How to Integrate NetWare 5.1 and Office 2000 ...................................................123 Subprocess 2—Creating Web Folders.....................................................................................124 Subprocess 3—Accessing Documents and Web Folders.............................................................129 Subprocess 4—WebDAV and Home Directory (~homedir) ........................................................129 Subprocess 5—Using NDSDAV ...........................................................................................131 Subprocess 6—Create the WebDAV Report ............................................................................137 Subprocess 7—Review and Deliver WebDAV Report to Customer..............................................138 Appendix A—IPX-Dependent Applications Worksheet ............................................................139 Appendix B—CMD Essentials ...............................................................................................140 Appendix C—ACU Client Deployment ...................................................................................167 Appendix D—SLP................................................................................................................181 Appendix E—Double-Byte Compatibility Issues ......................................................................252 Appendix F—NDS HealthCheck “Lite” ..................................................................................254 Appendix G—NetWare 5.1 Rapid Deployment and Standardization Strategies ...........................255 Appendix H—SAP Types ......................................................................................................266 Appendix I—Steps for Transitioning to Pure IP.......................................................................289 Appendix J—Lab Requirements for NetWare 5.1 Upgrade Testing............................................295 Appendix K—What’s New (Included) in NetWare 5.1 ..............................................................297 Appendix L—Time Sync.......................................................................................................299 Appendix M—NetWare/IP....................................................................................................309 Appendix N—NetWare Management Portal............................................................................310 Appendix O—Template Preliminary Report ...........................................................................314 Appendix P—Template Technical Assessment and Impact Study Report....................................317 Page 3 of 317 Novell PartnerNet Confidential 07/24/00 Copyright © 2000
Recommended publications
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • Novell Small Business Suite 6.6
    Novell Confidential Manual (ENU) 21 December 2004 Novell Small Business Suite 6.6 www.novell.com OVERVIEW AND INSTALLATION GUIDE June 27, 2005 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. You may not use, export, or re-export this product in violation of any applicable laws or regulations including, without limitation, U.S. export regulations or the laws of the country in which you reside. Copyright © 2001-2005 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. Novell, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
    [Show full text]
  • Virus Bulletin, October 1994
    ISSN 0956-9979 OCTOBER 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Live and Let Die 2 VIRUS PREVALENCE TABLE 3 NEWS Virus Total Reaches 5000 3 CPAV to Continue 3 Total Anonymity 3 IN THIS ISSUE: IBM PC VIRUSES (UPDATE) 4 To be the best. This months edition brings the biggest CONFERENCE REPORT Virus Bulletin comparative review yet of NLM anti-virus VB 94: The Return to Jersey 6 software (see pp.13-20). Ten products were tested, and the results may cause something of a surprise VIRUS ANALYSES 1. One_Half: The Lieutenant Commander? 9 Conference spotlight. VB 94 recently took place in 2. AntiEXE.A - Missing the Target? 11 Jersey - turn to page 6 for an in-depth report on what happened when. COMPARATIVE REVIEW Half way there? One_Half is a multi-partite virus NLMs in Depth 13 which uses some of the techniques developed by the PRODUCT REVIEW Dark Avenger in Commander_Bomber. As if this were Virex for the PC 21 not enough, it can also encrypt vital parts of the fixed disk. A detailed analysis is given on page 9. END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)1235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers. 2 • VIRUS BULLETIN OCTOBER 1994 EDITORIAL Live and Let Die The Internet seems to have become the symbol of the computing revolution which we are told is going to change our lives forever.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • Novell Zenworks 6.5 Desktop Management Installation Guide May 19, 2006
    Novell Confidential Manual (ENU) 21 December 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATION GUIDE May 19, 2006 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to www.novell.com/info/exports/ for more information on exporting Novell software.
    [Show full text]
  • Counteracting Viruses in MS-DOS Systems
    86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth.
    [Show full text]
  • NOVELL: Success Stories
    COMPANY SOLUTIONS PRODUCTS CONSULTING TRAINING SUPPORT PARTNERS DEVELOPERS my account language download buy search Success Stories > company success home customer success videos search success stories Novell uses Novell solutions undefined success archives submit your success story success stories highlights 1.800.529.3400 local numbers "Novell GroupWise and the Novell file servers are Request Call fantastically reliable and available, so Almabani can always work to its full potential, delivering successful projects on time and to budget." John Lincoln IT Manager Almabani General Contractors Read more COMPANY SOLUTIONS PRODUCTS CONSULTING TRAINING SUPPORT PARTNERS DEVELOPERS my account language download buy search > success stories home Customer Reference Results Almabani Background: Products: Solutions: Learn More: Based in Jeddah, Saudi Arabia, eDirectory 8.5 Nterprise Almabani General Contractors is one of BorderManager > Success Story the region?s leading construction firms. NetWare 6.5 The company is currently executing GroupWise 6.5 Industry: contracts with a combined value in excess of $230 million. Construction Legal | Privacy | Accessibility | Subscribe | Feedback | RSS © 2005 Novell, Inc. All Rights Reserved. Almabani General Contractors www.novell.com SUCCESS STORY Almabani supports its mobile workforce with Novell® technologies. OVERVIEW capabilities and enable project managers Based in Jeddah, Saudi Arabia, Almabani General anywhere in the region to exchange information Contractors is one of the region’s leading easily and reliably. “Novell GroupWise and construction firms. Over its 30-year history, SOLUTION the Novell file servers are Almabani has successfully managed a broad range Using Novell technology, Almabani has transformed fantastically reliable and of construction projects, from high-rise buildings, its infrastructure, creating a secure, flexible available, so Almabani hospitals and bridges to road networks and airports.
    [Show full text]
  • Netware IPX Socket List
    Network Analysis Institute – www.netanalysis.org IPX/SPX Third-Party Assigned Sockets (HEX) All values listed herein are in hexadecimal (0x) format. 8000 NATIONAL ADVANCED SYSTEMS 8001 NATIONAL ADVANCED SYSTEMS 8002 NATIONAL ADVANCED SYSTEMS 8003 COMM DRIVER SPERRY CORP. COMPUTER SYSTEMS 8004 KTA 8005 KTA 8006 KTA 8007 KTA 8008 NOVELL - PROVO 8009 SPERRY TERM EMULATOR TURNBULL AUTOMATIONS 800A PRINT SERVER COMMUNICATION HORIZONS 800B DATA LANGUAGE CORP 800F BATRAM SANTA CLARA SYSTEMS 8010 OFFICE WARE CENTURY ANALYSIS 8011 UPS ELGAR CORP 8012 UPS ELGAR CORP 8013 CHI CORP 8014 INTEL - AMERICAN FORK 8015 COMPASS COMPUTING 8016 COMPASS COMPUTING 8017 COMPASS COMPUTING 8018 COMPASS COMPUTING 8019 COMPASS COMPUTING 801A COMPASS COMPUTING 801B COMPASS COMPUTING 801C COMPASS COMPUTING 801D COMPASS COMPUTING 801E COMPASS COMPUTING 801F NOVELL - SUNNYVALE LATIN AMERI 8020 NOVELL - SUNNYVALE LATIN AMERI 8021 NOVELL - SUNNYVALE LATIN AMERI 8022 NOVELL - SUNNYVALE LATIN AMERI 8023 MCAFEE ASSOCIATES 8024 BLUE LANCE NETWORK INFO SYS 8027 GATEWAY COMMUNICATIONS INC 8028 GATEWAY COMMUNICATIONS INC 8029 GATEWAY COMMUNICATIONS INC 802A FILE SHARING NETLINE INC 802B FILE SHARING NETLINE INC 802C INTEL - AMERICAN FORK 802D INTEL - AMERICAN FORK 802E ICM 802F C-TREE VAP FAIR COM 8030 MICROMIND 8031 MICROMIND 8032 NORTH STAR COMPUTERS 8033 NORTH STAR COMPUTERS 8034 X.25 GATEWAY RSJ SOFTWARE 8035 SANYO ICON INC 8036 DATA ACCESS CORP 8039 NET MANAGEMENT NOVELL - AUSTIN 803A BETA SOFT 803B PHASER SYSTEMS 803C PHASER SYSTEMS Page 1 Network Analysis Institute –
    [Show full text]
  • 76307T970331 Novell 0606 Plrev0307
    Rev 0307 Master License Agreement (MLA) June 2006 Product Availability and Price List Please Note: New Government to Citizen Pricing Part Number Product Description NYS Price List Price Note: For terms of media purchases see Section 5.5.3 of the Master Agreement Novell Linux Desktop 9 Novell Linux Desktop 9 provides a leading end-user productivity environment designed specifically to empower businesses to leverage Linux and open source with confidence. Novell Linux Desktop serves as a general-purpose desktop platform, or can be tailor Note: The media kits listed below contain the Novell Linux Desktop 9 software in the following languages: English, Portuguese, French, Italian, German, Spanish, Simplified Chinese, and Traditional Chinese. Media 892-000380 Novell Linux Desktop 9 w/SP3 CD Software Media Kit Strong Encryption (128+ bit) Multilingual $35.00 $35.00 892-000381 Novell Linux Desktop 9 w/SP3 DVD Software Media Kit Strong Encryption (128+ bit) Multilingual $35.00 $35.00 878-000430 Novell Linux Desktop 9 w/SP3 e-Software Media Kit Strong Encryption (128+ bit) Multilingual Maintenance 877-000137 Novell Linux Desktop 9 1-Device 1-Year Maintenance $37.50 $75.00 877-000268 Novell Linux Desktop 9 1-Device 2-Year Maintenance $67.50 $135.00 877-000269 Novell Linux Desktop 9 1-Device 3-Year Maintenance $94.00 $188.00 Novell Linux Desktop Managed by ZENworks Linux Management Novell Linux Desktop 9 provides a leading end-user productivity environment designed specifically to empower businesses to leverage Linux and open source with confidence. Novell Linux Desktop serves as a general-purpose desktop platform, or can be tailor Note: The media kits listed below contain the Novell Linux Desktop 9 software in the following languages: English, Portuguese, French, Italian, German, Spanish, Simplified Chinese, and Traditional Chinese.
    [Show full text]
  • Product Support Bulletin
    Product Support Bulletin Subject: Apex Plus Hardware and Software Compatibility Lists Date: 4/19/89 PSB No: S-007 Page: 1 of 8 Originator: REM The purpose of this bulletin is to provide a current listing of tested hardware and software for the Apex Plus. All testing was performed by Seiko Epson Japan and the results were supplied to Epson America. This is not an all - inclusive list; there are many hardware options and applications that will work correctly that are not listed. Unless otherwise noted, all tests were conducted with the latest release of the Apex Plus MS - DOS operating system software and ROM BIOS. The products tested were certified in one of three ways: OK - Product works with full functionality NG - Product does not work - see compatibility note * Product works with partial functionality - see compatibility note The information provided does not constitute a guarantee or endorsement of any particular product or any specific use or application. Some of the products on the list may have software or hardware requirements which are not met by the Apex Plus personal computer. Therefore, while EPSON believes the information supplied is accurate, EPSON does not assume any responsibility for use of any of the products on the attached list. EPSON MAKES NO REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS OR’ IMPLIED, WITH RESPECT TO THIS LISTING OR THE PRODUCTS REFERENCED IN THE LIST. EPSON SHALL NOT BE LIABLE FOR ANY LOSS, INCONVENIENCE OR DAMAGE, INCLUDING DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, RESULTING FROM THE USE OR INABILITY TO USE ANY OF THE PRODUCTS LISTED.
    [Show full text]
  • Virus Bulletin, August 1993
    August 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, Network Security Management, UK Advisory Board: Jim Bates, Bates Associates, UK, David M. Chess, IBM Research, USA, Phil Crewe, Ziff-Davis, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Igor Grebert, McAfee Associates, USA, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Dr. Tony Pitt, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Roger Riordan, Cybec Pty, Australia, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Symantec Corporation, USA, Steve R. White, IBM Research, USA, Joseph Wells, Symantec Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS VIRUS ANALYSES 1. Daemaen: Multi-multipartism 9 EDITORIAL 2. 8888 - The Poor Man’s Commander Bomber 12 Crime and Punishment 2 ROGUES’ GALLERY VIRUS PREVALENCE TABLE 3 Keep It To Yourself 14 NEWS Storing Up Trouble 3 PRODUCT REVIEW 40Hex Print DAME Source code... 3 Better CPAV than CPAV? 16 Crown Wins Logic Bomb Case 3 COMPARATIVE REVIEW IBM PC VIRUSES (UPDATE) 4 OS/2 Virus Protection 20 INSIGHT Getting to the Point 7 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England.
    [Show full text]