INTERIX: UNIX Application Portability to Windows NT Via an Alternative Environment Subsystem

Total Page:16

File Type:pdf, Size:1020Kb

INTERIX: UNIX Application Portability to Windows NT Via an Alternative Environment Subsystem INTERIX: UNIX Application Portability to Windows NT via an Alternative Environment Subsystem Stephen R. Walli Softway Systems, Inc. 185 Berry Street, Suite 5514, San Francisco, CA 94107 [email protected] 0. Introduction today. It does this in a price competitive manner with respect to the hardware platforms on which This paper was originally written for and it runs. The problem becomes protecting the presented at the USENIX Windows NT huge investment in applications development over Workshop, Seattle, Washington, August 1997. the past decade or more in UNIX applications. The original paper was presented under the How does one leverage and protect the existing OPENNT name. It has been updated to reflect application base while moving to Windows NT? the current architecture and experience with INTERIX. 2. Alternatives 1. The Problem There are several ways to move existing applications to Windows NT. These range from Walli’s First Law of Applications Portability: the expense of a complete re-write of the Every useful application outlives the platform on application to some form of application port. We which it was developed and deployed. will briefly look at the pros and cons of the following: Application source code portability is one of the • cornerstones of most open systems definitions. a complete re-write of the application to the The intention is that if an application is written to Win32 environment subsystem • a particular model of source-code portability, it the UNIX emulation library approach to can port relatively easily to any platform that porting the application supports the portability model. This model is • the common library strategy for porting often based on source code portability standards applications such as the ISO/IEEE family of POSIX • the Microsoft POSIX subsystem standards [1,2] and ISO/ANSI C[3], and • the INTERIX subsystem specifications that include these standards such as the Open Group's Single UNIX Specification[4]. 2.1A Brief Introduction to the Windows NT Architecture The strength of this model is that the investment in the application's development is not lost in re- Before discussing the alternatives, one must deployment to new architectures. Re-writing the understand a little of the overall Windows NT application to new platforms every five years or architecture[5]. The Windows NT operating so is not an option. There are already too many system was structured such that there is a small new applications to be written in the queue kernel (not unlike the design of Mach) that is without adding the burden of costly re-writes written such that much of the OS is architecture- every few years to address newer faster hardware neutral with the architecture-specific functionality platforms. being provided through the Hardware Abstraction Layer (HAL). Currently businesses are faced with the decision of moving to Microsoft’s Windows NT operating Above the kernel sits subsystems that provide system. Windows NT provides a robust functionality to applications. These subsystems environment to solve many business application are loosely grouped into functional subsystems problems through a host of software development (e.g. the Security subsystem, the I/O subsystem) tools, as well as a platform to run the many that provide basic functionality, and environment Win32-based applications that businesses use subsystems (e.g. Win32 subsystem, the Microsoft POSIX subsystem, the OS/2 subsystem) that Page 1 present a programmatic and user interface to address the lack of interfaces that directly map developers and users. The primary environment the traditional UNIX application interface to subsystem supported by Microsoft, and regarded which they were written. Some of the re-write as the prescribed way to develop applications on may be very straightforward if the use of system Windows NT is the Win32 subsystem. The services was restricted to simple file operations Win32 subsystem is also responsible for (open( ), close( ), read( ), write( )). If the managing the desktop. application depends upon complex signal mechanisms, parent-child relationships (fork( ), Applications programs essentially run as clients of exec( )), or absolute file semantics (hard links, or their respective environment subsystem using a the ability to distinguish files by case alone), then variety of techniques to communicate with the the rewrite strategy becomes more expensive as subsystem when requesting operating system parts of the application must now be re-designed, services. A fast local procedure call (LPC) and then re-written. shared memory are two of the more common methods of communication. When an When one considers a limited number of application is started, the executable image is application programs, this may be an option. If inspected to determine which subsystem will however, one is reviewing a large number of provide the application’s services. applications, the cost of rewriting can become excessive. 2.2Caveat Lector Prior to discussing the alternatives and the 2.4Win32-based UNIX Emulation INTERIX subsystem, it is important to note what Libraries this paper is not about. Win32 and traditional There are a number of Win32-based libraries UNIX applications use different interfaces for emulating the behavior of UNIX system calls and accomplishing the same functions (opening files, libraries. The most common include: creating new processes, etc.). These two • UWIN from AT&T Laboratories operating environments also use different • NuTCracker from Datafocus philosophies with respect to how applications are • Cygwin32 from Cygnus structured when looking at such items as the • Portage from Consensys (Consensys ceased handling of standard I/O streams, the use of file to distribute the product in late 1997.) descriptors, consistent return codes, and process creation relationships and control. Please see Korn [6] for a comparison of these three packages, and for a complete discussion of This paper does not get into religious or the UWIN package. philosophical debate about which OS interface or application architecture may or may not be A set of applications may compile cleanly in this “better” than the other. Neither does it descend environment, but may not run correctly because into “marketing” messages about the rationale for system calls don’t demonstrate the expected providing two different programming and run- semantics. For example, the semantics for fork() time environments on Windows NT. This paper and exec( ) cannot be exactly duplicated with is about solving a very real application respect to the process attributes inherited by the programming problem using a unique strategy child process. NuTCracker and Portage leave a based on the fundamental design of the Windows process “ghost” around, creating a new process, NT OS. when an exec() call is issued. To obviate the need for exact semantics the UWIN project 2.3Application Rewrite to Win32 created a spawn( ) call that replaces the previous There is a family of simple application programs two interfaces with a single interface. that are written to ANSI C and its library specifications and will simply re-compile on the File system semantics are another challenge. The Windows NT operating system in the Win32 Windows NT file system (NTFS) provides subsystem space. almost complete UNIX file system semantics. Group ownership of files, hard links, and filename Most applications present a greater challenge as case sensitivity is all available from NTFS, but are they use some form of system resources. Such not available through the Win32 subsystem. applications require some amount of rewrite to Page 2 All these emulation systems allow for (indeed fulfill the letter of the standard without being may require) the use of Win32 interfaces in the particularly useful to an application. application source code. This is not a feature. In a less experienced development operation it can That said, the Microsoft POSIX subsystem destroy the application’s portability, locking it to passed the breadth of the NIST FIPS 151-2 the hybrid environment. At best it increases the certification process. In fact, the original maintenance cost of the source with an additional OPENNT Commands & Utilities [8] shipped in level of conditional compilation, and the work March 1996 were built on top of a subsystem that may not easily integrate into the existing style of was for the most part the original Microsoft UNIX code. POSIX subsystem. That achievement demonstrated that the environment subsystem 2.5 Common Porting Libraries architecture of Windows NT was flexible and powerful. Depending upon the application space there may be a set of libraries that have already been created that are used as the portability layer. 2.7The INTERIX Subsystem The only requirement here is that the library If the Microsoft POSIX subsystem could be built exists on Windows NT. The library layer then then why not a complete “UNIX” environment becomes the porting exercise. This is a special subsystem? There is nothing in the Open Group case of the normal situation where the application Single UNIX Specification and its attendant source code needs to be ported or re-written. It UNIX 95 [9] brand that can not be implemented is an application structuring issue. on top of the Windows NT kernel. As you will see, this also applies to the graphic environment 2.6The Microsoft POSIX Subsystem of the MIT X11 project. Windows NT supports multiple environment The goals when developing INTERIX were: subsystems by design. One of the original • subsystems was the POSIX subsystem. The To provide a complete porting and runtime Microsoft POSIX subsystem is an exact environment to migrate applications source implementation of the ISO/IEEE POSIX.1 code developed on traditional UNIX systems standard, which includes the ANSI C library by directly to Windows NT. This meant going reference. beyond the standards and specifications (e.g. providing X11R5) as well as providing more Microsoft down-played the POSIX subsystem, than one way to access functionality (e.g. essentially pointing out that it was delivered for determining the next available master conformance to NIST FIPS Pub 151-2 [7] pseudo-terminal).
Recommended publications
  • Exceed® 2006
    Transforming Information into Intelligence™ > Data Sheet Exceed® 2006 Exceed is the most secure and popular PC X server in the market. It allows users to cost-effectively connect powerful Microsoft® Windows® desktops to a wide variety of X Window enabled servers, and access high-end X applications. Exceed is renowned for its performance, stability and user-friendliness. Integrated with a powerful terminal emulation package — HostExplorer,® and the optional security suite — Connectivity Secure Shell,™ Exceed is the most versatile Enterprise Connectivity software available. X Server User Exceed Exceed User > Support for X11R6.8 > Publishes X applications using Xweb Wizard > True Color Desktop sharing feature > Interactive support for password aging events Microsoft Windows Platform, Microsoft Windows Platform, Windows Server 2003/2003 x64 Windows Server 2003/2003 x64 > Local X support — X clients, Window Management, Edition, XP/2000/XP Prof x64 Edition, Edition, XP/2000/XP Prof x64 Edition, Font RGB, XRDB, Xtrace Microsoft Terminal Server Edition, Microsoft Terminal Server Edition, Citrix Presentaion Server for Windows Citrix Presentaion Server for Windows > Extensive Server Visual and multiple color depths Support > Support advanced input devices including SpaceBall 5000 > Support for local and remote Window Managers X connections over X connections over TCP/IP TCP/IP > Double Byte Character Set Support > Multiple monitors and screens support — Up to 8 screens > Remember session information for speedy restart Dial-up (LBX) LAN WAN Secure
    [Show full text]
  • Unit 10: Interoperability
    Unit 10: Interoperability 10.2. Windows 2000 in an UNIX Environment AP 9/01 Windows 2000 in an UNIX Environment • Windows/UNIX Interoperability Strategy • Services For UNIX 2.0 • SFU Future Planning • Microsoft Interix 2.2 AP 9/01 Windows/UNIX Interoperability Microsoft Interoperability Framework • Leverage Existing Network Resources • Simplify Account Management • Leverage Existing UNIX Expertise • Simplify Network Administration AP 9/01 Microsoft Windows Services for UNIX 2.0 (SFU) • Leverage Existing Network Resources – NFS Client, Server, Gateway, PCNFS Server • Simplify Account Management – NIS Migration Wizard, Server, Password Synch, User Name Mapping • Leverage Existing UNIX Knowledge – Core set of utilities based on UNIX • Simplify Network Administration – Telnet Client/Server, ActiveState Win32 PERL, Windows Technology AP 9/01 NFS Support (Leverage Existing Network Resources) UNIX NFS Servers SFU NFS Servers SFU NFS SFU NFS Clients Gateway UNIX NFS Clients AP 9/01 Client for NFS • Seamless access to NFS servers – Access NFS servers using Windows credentials – Maps Windows name to UNIX UID • Integration of NFS with Windows UI – Browsing NFS network, servers and shares • Windows semantics – case sensitivity, 8.3 naming, share locks, access to NFS via DFS, UNC naming, ‘net’ commands AP 9/01 Server for NFS • Allow UNIX clients to access files on Windows servers • File access using UNIX UID/GID – Map UID to a domain users – File access privileges according to mapped user • NFS access with just UNIX sign-on • NFS semantics – Support
    [Show full text]
  • Symantec Data Loss Prevention Installation Guide for Windows
    Symantec Data Loss Prevention Installation Guide for Windows Version 15.7 Last updated: September 15, 2021 Symantec Data Loss Prevention Installation Guide for Windows Table of Contents About this guide...................................................................................................................................7 About updates to the Symantec Data Loss Prevention Installation Guide for Windows......................................... 7 Planning the installation..................................................................................................................... 8 About installation tiers.................................................................................................................................................... 8 About single sign-on....................................................................................................................................................... 8 About hosted Network Prevent deployments............................................................................................................... 9 About Symantec Data Loss Prevention system requirements................................................................................... 9 Symantec Data Loss Prevention required items........................................................................................................10 Standard ASCII characters required for all installation parameters.........................................................................10 Performing a three-tier
    [Show full text]
  • DOCUMENT RESUME Focus on the Customer. New Opportunities for 81P
    DOCUMENT RESUME ED 401 858 HE 029 711 TITLE Focus on the Customer. New Opportunities for Partnering, CAUSE94. Track II. INSTITUTION CAUSE, Boulder, Colo. PUB DATE 95 NOTE 81p.; In: New Opportunities for Partnering. Proceedings of the 1994 CAUSE Annual Conference (Orlando, Florida, November 29-December 2, 1994); see HE 029 709. AVAILABLE FROM CAUSE Information Resources Library, 4840 Pearl East Circle, Suite 302E, Boulder, CO 80303 (Individual papers available to CAUSE members at cost of reproduction). PUB TYPE Reports Descriptive (141) Speeches/Conference Papers (150) EDRS PRICE MF01/PC04 Plus Postage. DESCRIPTORS College Administration; College Libraries; Colleges; *Computer Networks; Computers; Cooperation; Cooperative Programs; Educational Planning; Higher Education; *Information Management; *Information Networks; Information Systems; *Information Technology; Models; *Partnerships in Education; Student Personnel Services; Universities IDENTIFIERS Boston College MA; Campus Wide Information Systems; *CAUSE National Conference; *Customer Relations; Maricopa County Community College District AZ; Southwest Texas State University ABSTRACT Eight papers are presented from the 1994 CAUSE conference track on customer-centered partnering within and among higher education institutions in regard to information resources and technology. The papers include:(1) "Customer-Centered Collaboration: Libraries and IT," which focuses on the use of teams, total quality management, and business process reengineering (Geri Bunker and Barbara Horgan);(2) "Making Order Out of Chaos with a Computerized Lottery," which discusses the use of a class scheduling lottery at the Massachusetts Institute of Technology (Steven Anders Oakland); (3) "Customers as Partners in the Information Technology Planning Process," which describes the development of the Information Technology Planning Project at the University of Minnesota (Linda Jorn and others);(4) "Distance Education: What's Up," which focuses on new trends in distance education (Gene T.
    [Show full text]
  • Perl on Windows
    BrokenBroken GlassGlass Perl on Windows Chris 'BinGOs' Williams “This is your last chance. After this, there is no turning back. You take the blue pill - the story ends, you wake up in your bed and believe whatever you want to believe. You take the red pill - you stay in Wonderland and I show you how deep the rabbit-hole goes.” A bit of history ● 5.003_24 - first Windows port ● 5.004 - first Win32 and Cygwin support, [MSVC++ and Borland C++] ● 5.005 - experimental threads, support for GCC and EGCS ● 5.6.0 - experimental fork() support ● 5.8.0 - proper ithreads, fork() support, 64bit Windows [Intel IA64] ● 5.8.1 - threads support for Cygwin ● 5.12.0 - AMD64 with Mingw gcc ● 5.16.0 - buh-bye Borland C++ Time for some real archaeology Windows NT 4.0 Resource Kit CDROM ActivePerl http://www.activestate.com/perl ● July 1998 - ActivePerl 5.005 Build 469 ● March 2000 - ActivePerl 5.6.0 Build 613 ● November 2002 - ActivePerl 5.8.0 Build 804 ● November 2005 - ActivePerl 5.8.7 Build 815 [Mingw compilation support] ● August 2006 - ActivePerl 5.8.8 Build 817 [64bit] ● June 2012 - ActivePerl 5.16.0 Build 1600 ● Built with MSVC++ ● Can install or use MinGW ● PPM respositories of popular modules ● Commercial support ● PerlScript – Active Scripting engine ● Perl ISAPI Strawberry Perl http://strawberryperl.com ● July 2006 - Strawberry Perl 5.8.8 Alpha 1 released ● April 2008 - Strawberry Perl 5.10.0.1 and 5.8.8.1 released ● January 2009 - first portable release ● April 2010 - 64bit and 32bit releases ● May 2012 - Strawberry Perl 5.16.0.1 released ● August
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Team Unknown ]
    [ Team Unknown ] Code Quality: The Open Source Perspective By Diomidis Spinellis ............................................... Publisher: Addison Wesley Professional Pub Date: April 03, 2006 Print ISBN-10: 0-321-16607-8 Print ISBN-13: 978-0-321-16607-4 Pages: 608 Slots: 2.0 Table of Contents | Index | Author Index Copyright Effective Software Development Series: Scott Meyers, Consulting Editor List of Tables List of Figures Foreword Preface Chapter 1. Introduction Section 1.1. Software Quality Section 1.2. How to Read This Book Further Reading Chapter 2. Reliability Section 2.1. Input Problems Section 2.2. Output Problems Section 2.3. Logic Problems Section 2.4. Computation Problems Section 2.5. Concurrency and Timing Problems Section 2.6. Interface Problems Section 2.7. Data-Handling Problems Section 2.8. Fault Tolerance Advice to Take Home Further Reading Chapter 3. Security Section 3.1. Vulnerable Code Section 3.2. The Buffer Overflow Section 3.3. Race Conditions Section 3.4. Problematic APIs Section 3.5. Untrusted Input Section 3.6. Result Verification Section 3.7. Data and Privilege Leakage Section 3.8. Trojan Horse Section 3.9. Tools Advice to Take Home Further Reading Chapter 4. Time Performance Section 4.1. Measurement Techniques Section 4.2. Algorithm Complexity Section 4.3. Stand-Alone Code Section 4.4. Interacting with the Operating System Section 4.5. Interacting with Peripherals Section 4.6. Involuntary Interactions Section 4.7. Caching Advice to Take Home Further Reading Chapter 5. Space Performance Section 5.1. Data Section 5.2. Memory Organization Section 5.3. Memory Hierarchies Section 5.4. The Process/Operating System Interface Section 5.5.
    [Show full text]
  • Windows Kernel Internals Overview
    Windows Kernel Internals Overview David B. Probert, Ph.D. Windows Kernel Development Microsoft Corporation © Microsoft Corporation 1 Contributors Neill Clift Landy Wang Adrian Marinescu David Solomon Nar Ganapathy Ben Leis Jake Oshins Brian Andrew Andrew Ritz Jason Zions Jonathan Schwartz Gerardo Bermudez Mark Lucovsky Dragos Sambotin Samer Arafeh Arun Kishan Dan Lovinger Adrian Oney © Microsoft Corporation 2 Windows History • Team formed in November 1988 • Less than 20 people • Build from the ground up – Advanced Operating System – Designed for desktops and servers – Secure, scalable SMP design – All new code • Rigorous discipline – developers wrote very detailed design docs, reviewed/discussed each others docs and wrote unit tests © Microsoft Corporation 3 Goals of the NT System • Reliability – Nothing should be able to crash the OS. Anything that crashes the OS is a bug and we won’t ship until it is fixed • Security – Built into the design from day one • Portability – Support more than one processor, avoid assembler, abstract HW dependencies. • Extensibility – Ability to extend the OS over time • Compatibility – Apps must run • Performance – All of the above are more important than raw speed! © Microsoft Corporation 4 Windows Server 2003 Architecture System Processes Applications Environment Service Services Subsystems Controller Alerter Interix WinLogon RPC User Session Application User Event Manager Win32 Mode Logger Subsystem DLLs System NTDLL.DLL Threads Kernel Executive API Mode I/O Manager PnP/Power Processes Virtual Cache Security
    [Show full text]
  • Systemy Operacyjne
    SystemSystem operacyjnyoperacyjny WindowsWindows XPXP • Perspektywa historyczna • Podstawy projektu • Elementy systemu Jądro Egzekutor • Podsystemy środowiskowe • System plików • Interfejs programowy Wiesław Płaczek Systemy Operacyjne: Wykład 13 1 PerspektywaPerspektywa historycznahistoryczna • Sierpień 1981: firma Microsoft wypuściła system operacyjny DOS 1.0 (4000 linii kodu asemblera, 8 KB pamięci) dla pierwszego komputera osobistego (PC) IBM, z mikroprocesorem Intel 8086. • Przez kolejne lata DOS, pomimo pojawiania się kolejnych, ulepszonych wersji, pozostawał w tyle za rozwojem technologicznym sprzętu; np. kolejne procesory Intela: 80286, 80386, 80486, pomimo wielu istotnych jakościowo zmian, były traktowane przez DOS jedynie jako „szybki 8086”. •We wczesnych latach 1980-tych Microsoft rozpoczął prace na graficznym interfejsem użytkownika (graphical user interface – GUI) dla systemu DOS, który mógłby rywalizować z systemem Macintosh – rezultatem tego był GUI o nazwie Windows 3.0 (przed 1990), dalsze wcielenia to Windows 95/98/Me. •W połowie lat 1980-tych Microsoft i IBM rozpoczęły pracę nad wielozadaniowym systemem nowej generacji, o nazwie OS/2, który mógłby w pełni wykorzystać możliwości oferowane przez procesor Intel 80286. • W roku 1988 Microsoft wycofał się z projektu OS/2 i rozpoczął pracę nad własnym systemem, wynajmując do tego Dave’a Cutlera, konstruktora systemu operacyjnego VMS dla komputerów VAX firmy DEC. • Pierwsza wersja nowego systemu o nazwie Windows NT („new technology”) z numerem 3.1 została wypuszczona w roku 1993 (używała GUI Windows 3.1). • Dalszym rozwinięciem systemu Windows NT był Windows 2000 (rok 2000). • Windows XP jest uaktualnieniem Windows 2000 oraz zastępuje Windows 95/98. Wiesław Płaczek Systemy Operacyjne: Wykład 13 2 PodstawyPodstawy projektuprojektu • Windows XP jest wielozadaniowym systemem operacyjnym z wywłaszczaniem, ma organizację 32- lub 64-bitową i jest przeznaczony dla procesorów Intel IA32/IA64, AMD K6/K7 i późniejszych.
    [Show full text]
  • UNIX/Linux Fundamentals – Lecture 1
    UNIX/Linux Fundamentals – Lecture 1 Md Modasshir What will we cover? • Operating system overview • UNIX commands, shell & process mgt. • Scripting languages • Programming tools • Various text editors • X11 & KDE windows env • Basic C/C++ programming and other applications (emacs, gcc-g++, gzip, tar, …) Schedule Lectures – Monday through Friday 08:30 – 10:50am • Quizzes taken at the end of lecture/beginning of 2nd class • Final: Saturday May 14th. • Project due May 14th @ 05:00 pm. Books USC Bookstore Other helpful resources http://safari.oreilly.com Who cares, how do I get an A? • 4 Assignments: 40% • 1 Project: 20% • 4 Quizzes: 20% • Final: 20% Cheating • Don’t Cheating • Don’t • Seriously, don’t Individual Effort • Assignments and quizzes are open book, open notes, open computer/internet! • This is a hands on course designed to familiarize YOU with the unix/linux environment. • You will need these skills in future classes. • Cheat and pay the price later. • Why not learn this stuff now? Our Heroes Ken Thompson Dennis Ritchie Video Games Spark Innovation PDP-7 Space Pilot In the Beginning • UNICS: 1969 – PDP-7 minicomputer • PDP-7 goes away, rewritten on PDP-11 to “help patent lawyers” • V1: 1971 • V3: 1973 (pipes, C language) • V6: 1976 (rewritten in C, base for BSD) • V7: 1979 (Licensed, portable) PDP-11 Derivative Systems • PWB, MERT • BSD: Adds many important features (networking, job control). • AT&T enters the computer business with System III, V Commercial Success • AIX • SunOS, Solaris • Ultrix, Digital Unix • HP-UX • Irix • UnixWare -> Novell -> SCO -> Caldera ->SCO • Xenix: -> SCO • Standardization (Posix, X/Open) Standards and Wars • 1998: POSIX Standard • Unix International vs.
    [Show full text]
  • 7600021981Pricing Sept2010 Pricing
    FF0000State and Local Select 01+000 FF0000Agreement 01S62995 FF0000September 2010 Pricelist 01+000 Microsoft Complete Product Description ERP Dealer Cost Cost (+) Plus or Net (NYS) SLG Cost (+) Model/Part Cost (-) Minus % Select Price Plus or Number Cost (-) Minus % 077-06158 Access 2010 Sngl MVL $ 148.00 $ 121.32 -3.07% $ 117.60 077-02521 Access SNGL LicSAPk MVL $ 234.00 $ 191.64 -3.07% $ 185.76 077-02567 Access Sngl SA MVL $ 86.00 $ 70.32 -3.07% $ 68.16 689-01091 AutoRouteEuro 2010 SNGL MVL $ 25.00 $ 19.92 -3.07% $ 19.31 689-00491 AutoRouteEuro Win32 SNGL LicSAPk MVL $ 40.00 $ 31.44 -3.07% $ 30.47 689-00497 AutoRouteEuro Win32 SNGL SA MVL $ 14.00 $ 11.52 -3.07% $ 11.17 LQD-00017 BingMapsDsktpwECP SNGL SubsVL MVL $ 344.00 $ 282.62 -3.07% $ 273.94 Q56-00348 Entourage 2008 SNGL MVL $ 54.00 $ 43.92 -3.07% $ 42.57 Q56-00342 Entourage SNGL LicSAPk MVL $ 86.00 $ 69.36 -3.07% $ 67.23 Q56-00339 Entourage SNGL SA MVL $ 31.00 $ 25.44 -3.07% $ 24.66 065-07338 Excel 2010 Sngl MVL $ 144.00 $ 118.44 -3.07% $ 114.80 065-03452 Excel SNGL LicSAPk MVL $ 228.00 $ 187.08 -3.07% $ 181.34 065-03516 Excel Sngl SA MVL $ 84.00 $ 68.64 -3.07% $ 66.53 D46-00735 ExcelMac 2008 SNGL MVL $ 167.00 $ 136.80 -3.07% $ 132.60 D46-00225 ExcelMac SNGL LicSAPk MVL $ 264.00 $ 216.24 -3.07% $ 209.60 D46-00255 ExcelMac SNGL SA MVL $ 97.00 $ 79.44 -3.07% $ 77.00 47F-00234 ExprssnEncdrPro 4.0 SNGL MVL $ 38.00 $ 30.60 -3.07% $ 29.66 47F-00232 ExprssnEncdrPro SNGL LicSAPk MVL $ 60.00 $ 48.36 -3.07% $ 46.88 47F-00233 ExprssnEncdrPro SNGL SA MVL $ 22.00 $ 17.76 -3.07% $ 17.21 NKF-00333
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]