The Sunpc 4.2 User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

The Sunpc 4.2 User's Guide SunPC™ 4.2 User’s Guide A Sun Microsystems, Inc. Business 901 San Antonio Road Palo Alto, CA 94303 USA 415 960-1300 fax 415 969-9131 Part No.: 805-2933-10 Revision A, November 1997 Copyright 1997 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. OpenDOS is a trademark of Cadera, Inc. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, AnswerBook, SunDocs, Solaris, OpenWindows, PC-NFS, PC-NFSpro, SunLink, and SunPC are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements. RESTRICTED RIGHTS: Use, duplication, or disclosure by the U.S. Government is subject to restrictions of FAR 52.227-14(g)(2)(6/87) and FAR 52.227-19(6/87), or DFAR 252.227-7015(b)(6/95) and DFAR 227.7202-3(a). DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. Copyright 1997 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303-4900 Etats-Unis. Tous droits réservés. Ce produit ou document est protégé par un copyright et distribué avec des licences qui en restreignent l’utilisation, la copie, la distribution, et la décompilation. Aucune partie de ce produit ou document ne peut être reproduite sous aucune forme, par quelque moyen que ce soit, sans l’autorisation préalable et écrite de Sun et de ses bailleurs de licence, s’il y en a. Le logiciel détenu par des tiers, et qui comprend la technologie relative aux polices de caractères, est protégé par un copyright et licencié par des fournisseurs de Sun. Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque déposée aux Etats-Unis et dans d’autres pays et licenciée exclusivement par X/Open Company, Ltd. OpenDOS est une marque déposée par Caldera, Inc. Sun, Sun Microsystems, le logo Sun, AnswerBook, SunDocs, Solaris, OpenWindows, PC-NFS, PC-NFSpro, SunLink, et SunPC sont des marques de fabrique ou des marques déposées, ou marques de service, de Sun Microsystems, Inc. aux Etats-Unis et dans d’autres pays. Toutes les marques SPARC sont utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc. aux Etats-Unis et dans d’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun Microsystems, Inc. L’interface d’utilisation graphique OPEN LOOK et Sun™ a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun reconnaît les efforts de pionniers de Xerox pour la recherche et le développement du concept des interfaces d’utilisation visuelle ou graphique pour l’industrie de l’informatique. Sun détient une licence non exclusive de Xerox sur l’interface d’utilisation graphique Xerox, cette licence couvrant également les licenciés de Sun qui mettent en place l’interface d’utilisation graphique OPEN LOOK et qui en outre se conforment aux licences écrites de Sun. CETTE PUBLICATION EST FOURNIE "EN L’ETAT" ET AUCUNE GARANTIE, EXPRESSE OU IMPLICITE, N’EST ACCORDEE, Y COMPRIS DES GARANTIES CONCERNANT LA VALEUR MARCHANDE, L’APTITUDE DE LA PUBLICATION A REPONDRE A UNE UTILISATION PARTICULIERE, OU LE FAIT QU’ELLE NE SOIT PAS CONTREFAISANTE DE PRODUIT DE TIERS. CE DENI DE GARANTIE NE S’APPLIQUERAIT PAS, DANS LA MESURE OU IL SERAIT TENU JURIDIQUEMENT NUL ET NON AVENU. Please Recycle Contents Preface xiii 1. What Is SunPC? 1 SunPC Features 1 From the PC User’s Perspective 2 From the Workstation User’s Perspective 2 What’s New in SunPC 4.2 Software 3 Support for Windows 95 3 Support for Long File Names 3 New NDIS Driver 3 What’s Changed in SunPC 4.2 4 System Requirements 4 Software-Only SunPC Sessions 4 How to Proceed 5 2. Getting Started 7 SunPC Installation Package Contents 7 System Requirements 8 SunPC Accelerator Card 8 Upgrading Your Solaris Environment 9 Contents iii About SunPC Drives 9 About Your SunPC 4.2 License 10 3. Installing SunPC Software 11 Installation Overview 11 Basic Installation 12 Upgrade Installation 13 Optional Installation Procedures 14 Installing SunPC 4.2 Software 14 Removing Old SunPC Patches 14 Running the UPGRADE_USERS_RUN_ME_FIRST Script 16 Running the pkgrm Program 16 Running the pkgadd Program 17 Running the sunpc_install Program 18 Updating Your PATH Statement 20 Starting SunPC Software for the First Time 21 Installing Windows 3.11 Software 22 Installing Windows Display Drivers 24 Choosing a Version of HIMEM.SYS, SMARTDRV.EXE, and EMM386.EXE 25 Modifying SYSTEM.INI for Better Windows Performance 26 Installing Windows 95 Software 27 Creating and Configuring a New C: Drive 28 Installing Windows 95 32 Configuring the Network Protocols 38 Removing SunPC Software 40 How to Proceed 40 4. Using SunPC Software 41 SunPC Basics 41 iv SunPC 4.2 User’s Guide • November 1997 Starting SunPC Software 41 Quitting a SunPC Window 42 Closing a SunPC Window 43 Using Command-Line Options 43 The SunPC Window 46 SunPC Menus 46 Using the Emulated Microsoft Mouse 50 Rebooting a SunPC Window 51 Copying and Pasting Text 52 SunPC Drives 53 SunPC Drive Terminology 53 Emulated Hard Drives 53 Extended Drives 57 Diskette Drives 63 CD-ROM Drives 66 Using Printers with SunPC Software 67 Checking Available Printers 67 Setting Up Printer Ports 68 Printing From SunPC Software 70 SunPC Serial Communication 74 Setting Up Serial Communication Ports 74 Using Serial Communication Ports 75 5. SunPC Daily Use 77 Windows 3.11 Daily Use 77 Windows Performance Tips 77 Printing With Microsoft Windows Software 78 Windows 95 Daily Use 79 Contents v Installing Windows 95 Applications 79 Using UNIX Directories With Windows 95 79 Exiting or Restarting Windows 95 80 6. Customizing SunPC Properties 81 Properties Dialog Box 82 Restoring Original Settings 82 Change Bars 83 Creating Multiple Properties Files 83 LPT Port Properties 84 COM Port Properties 85 Setting Display Properties 86 Setting the Display Type 87 Setting the Display Size 88 Setting Drive Properties 89 Setting Miscellaneous Properties 91 Setting Sound Properties 92 Setting Memory Size 93 Setting Auto Pause 99 Setting Solaris Output 100 7. Connecting to PC-Based Networks 103 Configuring the Network Protocols in Windows 95 103 Setting TCP/IP Properties 104 Setting Properties for Other Protocols 105 Configuring Protocols for DOS and Windows 3.11 106 How the SunPC ODI Driver Works 107 The NET.CFG File 108 Changing the Network Interface 109 vi SunPC 4.2 User’s Guide • November 1997 Using Novell NetWare Client Software 110 Modifying CONFIG.SYS and AUTOEXEC.BAT 110 Connecting to a NetWare Server 113 NetWare Tips 114 Other Network Protocols 114 TCP/IP and NetBEUI 115 NDIS 115 WINSOCK.DLL 116 A. Troubleshooting 117 Known Problems With SunPC 4.2 117 NDIS and ODI Drivers Not Usable Concurrently 123 Problems Installing the SunPC 4.2 Package 123 DOS Applications 128 Problems Installing Windows 95 or Windows 95 Applications 133 Installing Windows 95 From the Upgrade CD 133 Installing Windows 95 From the Full Release CD 133 Installing Applications 133 Diskette Drives 134 Displays 136 Emulated Hard Drives 137 Disk Error Messages 138 Extended Drives 139 Fonts 141 Keyboard 142 Mouse 142 Networking 143 Cannot Contact SunPC From the Workstation 143 Contents vii Cannot Connect to Other Systems 143 Printers 146 Starting SunPC Software 150 Swap Space 152 X11R5 Window Server 154 B. SunPC International Support 157 Using an International Keyboard 157 DOS Character Set 158 Code Pages and SunPC Software 159 C. SunPC Performance Tips 171 System Configuration 171 SunPC Configuration 172 Using SunPC Software 174 Windows 3.11 Specific Tips 175 Windows 95 Specific Tips 177 D. Installation Checklists 181 Checklist for a New SunPC Installation 182 Checklist to Upgrade a Previous SunPC Version 183 Checklist to Install Windows 95 184 Glossary 185 viii SunPC 4.2 User’s Guide • November 1997 Figures FIGURE 3-1 SunPC Properties Menu 29 FIGURE 4-1 SunPC Edit menu 47 FIGURE 4-2 SunPC Operations Menu 48 FIGURE 4-3 SunPC Properties Menu 49 FIGURE 6-1 LPT Port
Recommended publications
  • Hieroglyphs for the Information Age: Images As a Replacement for Characters for Languages Not Written in the Latin-1 Alphabet Akira Hasegawa
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-1-1999 Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet Akira Hasegawa Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Hasegawa, Akira, "Hieroglyphs for the information age: Images as a replacement for characters for languages not written in the Latin-1 alphabet" (1999). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Hieroglyphs for the Information Age: Images as a Replacement for Characters for Languages not Written in the Latin- 1 Alphabet by Akira Hasegawa A thesis project submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Printing Management and Sciences in the College of Imaging Arts and Sciences of the Rochester Institute ofTechnology May, 1999 Thesis Advisor: Professor Frank Romano School of Printing Management and Sciences Rochester Institute ofTechnology Rochester, New York Certificate ofApproval Master's Thesis This is to certify that the Master's Thesis of Akira Hasegawa With a major in Graphic Arts Publishing has been approved by the Thesis Committee as satisfactory for the thesis requirement for the Master ofScience degree at the convocation of May 1999 Thesis Committee: Frank Romano Thesis Advisor Marie Freckleton Gr:lduate Program Coordinator C.
    [Show full text]
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • Softwindows™ 95 for UNIX Administrator's Guide (Version 5 of Softwindows
    SoftWindows™ 95 for UNIX Administrator’s Guide (Version 5 of SoftWindows 95) Document Number 007-3221-006 CONTRIBUTORS Edited by Karin Borda and Douglas B. O’Morain Production by Carlos Miqueo © 1998, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. TurboStart and SoftNode are registered trademarks of Insignia Solutions. SoftWindows is a trademark used under license. Silicon Graphics, the Silicon Graphics logo and IRIX are registered trademarks, and Indy, O2, and IRIS InSight are trademarks of Silicon Graphics, Inc. R5000 and R10000 are registered trademarks of MIPS Technologies, Inc. Apple and Macintosh are registered trademarks of Apple Computer, Inc. DEC is a trademark of Digital Equipment Corporation. WinPost is a trademark of Eastern Mountain Software. FLEXlm is a trademark of Globetrotter Software Inc. IBM is a registered trademark and IBM PC and IBM PC/AT are trademarks of International Business Machines Corp. Intel and Pentium are registered trademarks of Intel Corporation.
    [Show full text]
  • SUPPORTING the CHINESE, JAPANESE, and KOREAN LANGUAGES in the OPENVMS OPERATING SYSTEM by Michael M. T. Yau ABSTRACT the Asian L
    SUPPORTING THE CHINESE, JAPANESE, AND KOREAN LANGUAGES IN THE OPENVMS OPERATING SYSTEM By Michael M. T. Yau ABSTRACT The Asian language versions of the OpenVMS operating system allow Asian-speaking users to interact with the OpenVMS system in their native languages and provide a platform for developing Asian applications. Since the OpenVMS variants must be able to handle multibyte character sets, the requirements for the internal representation, input, and output differ considerably from those for the standard English version. A review of the Japanese, Chinese, and Korean writing systems and character set standards provides the context for a discussion of the features of the Asian OpenVMS variants. The localization approach adopted in developing these Asian variants was shaped by business and engineering constraints; issues related to this approach are presented. INTRODUCTION The OpenVMS operating system was designed in an era when English was the only language supported in computer systems. The Digital Command Language (DCL) commands and utilities, system help and message texts, run-time libraries and system services, and names of system objects such as file names and user names all assume English text encoded in the 7-bit American Standard Code for Information Interchange (ASCII) character set. As Digital's business began to expand into markets where common end users are non-English speaking, the requirement for the OpenVMS system to support languages other than English became inevitable. In contrast to the migration to support single-byte, 8-bit European characters, OpenVMS localization efforts to support the Asian languages, namely Japanese, Chinese, and Korean, must deal with a more complex issue, i.e., the handling of multibyte character sets.
    [Show full text]
  • Experimental Evidence on Predatory Pricing Policies
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian Working Paper Hunting unicorns? Experimental evidence on predatory pricing policies Working Paper, No. 258 Provided in Cooperation with: Department of Economics, University of Zurich Suggested Citation: Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian (2017) : Hunting unicorns? Experimental evidence on predatory pricing policies, Working Paper, No. 258, University of Zurich, Department of Economics, Zurich, http://dx.doi.org/10.5167/uzh-138188 This Version is available at: http://hdl.handle.net/10419/173418 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu University of Zurich Department of Economics Working Paper Series ISSN 1664-7041 (print) ISSN 1664-705X (online) Working Paper No.
    [Show full text]
  • Measuring the Effectiveness of Generic Malware Models
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2017 Measuring the Effectiveness of Generic Malware Models Naman Bagga San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Bagga, Naman, "Measuring the Effectiveness of Generic Malware Models" (2017). Master's Projects. 566. DOI: https://doi.org/10.31979/etd.8486-cfhx https://scholarworks.sjsu.edu/etd_projects/566 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Measuring the Effectiveness of Generic Malware Models A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Naman Bagga December 2017 ○c 2017 Naman Bagga ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Measuring the Effectiveness of Generic Malware Models by Naman Bagga APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY December 2017 Dr. Mark Stamp Department of Computer Science Dr. Jon Pearce Department of Computer Science Dr. Thomas Austin Department of Computer Science ABSTRACT Measuring the Effectiveness of Generic Malware Models by Naman Bagga Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family.
    [Show full text]
  • Hard Configurator - Manual Version 4.1.1.1 (July 2019)
    Hard_Configurator - Manual Version 4.1.1.1 (July 2019) Copyright: Andrzej Pluta, @Andy Ful Developer Web Page: https://github.com/AndyFul/Hard_Configurator/ @askalan website about Hard_Configurator: https://hard-configurator.com/ Malwaretips forum thread: https://malwaretips.com/threads/hard_configurator-windows-hardening-con- figurator.66416/ Distribution This software may be freely distributed as long as no modification is made to it. Disclaimer of Warranty THIS SOFTWARE IS DISTRIBUTED "AS IS". NO WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE IT AT YOUR OWN RISK. THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS WHILE USING THIS SOFTWARE. TABLE OF CONTENTS INTRODUCTION ...................................................................... 3 INSTALLATION / DEINSTALLATION ................................... 6 SOFTWARE RESTRICTION POLICIES (SRP) ..................... 8 HOW SRP CAN CONTROL FILE EXECUTION/OPENING.. 10 WHITELISTING BY HASH ................................................... 15 WHITELISTING BY PATH .................................................... 16 WHITELIST PROFILES .......................................................... 17 DESIGNATED FILE TYPES .................................................... 19 DEFAULT SECURITY LEVELS ............................................ 20 ENFORCEMENT ...................................................................... 21 BLOCKING SPONSORS ......................................................... 23 PROTECTING ‘WINDOWS’ FOLDER ................................
    [Show full text]
  • United States Patent (19) 11 Patent Number: 5,987,611 Freund (45) Date of Patent: Nov
    USOO5987611A United States Patent (19) 11 Patent Number: 5,987,611 Freund (45) Date of Patent: Nov. 16, 1999 54 SYSTEM AND METHODOLOGY FOR Postel, J., “RFC 821-Simple Mail Transfer Protocol.” MANAGING INTERNET ACCESS ON A PER Information Science Institute, University of Southern Cali APPLICATION BASIS FOR CLIENT fornia, Aug. 1982, pp. 1-68. COMPUTERS CONNECTED TO THE INTERNET (List continued on next page.) 75 Inventor: Gregor Freund, San Francisco, Calif. Primary Examiner Robert W. BeauSoliel, Jr. Assistant Examiner Stephen C. Elmore 73 Assignee: Zone Labs, Inc., San Francisco, Calif. Attorney, Agent, or Firm John A. Smart 21 Appl. No.: 08/851,777 57 ABSTRACT 22 Filed: May 6, 1997 A computing environment with methods for monitoring access to an open network, Such as a WAN or the Internet, Related U.S. Application Data is described. The System includes one or more clients, each 60 Provisional application No. 60/033,975, Dec. 31, 1996. operating applications or processes (e.g., Netscape Naviga torTM or Microsoft Internet ExplorerTM browser software) (51) Int. Cl." ...................................................... G06F 13/00 requiring Internet (or other open network) access (e.g., an 52 U.S. Cl. .............................................................. 713/201 Internet connection to one or more Web servers). Client 58 Field of Search ............................... 395/18701, 186; based monitoring and filtering of access is provided in 364/222.5, 286.4, 286.5; 711/163; 707/9, conjunction with a centralized enforcement Supervisor. The 10, 203; 713/200, 201 Supervisor maintains access rules for the client-based filter ing and verifies the existence and proper operation of the 56) References Cited client-based filter application.
    [Show full text]
  • JFP Reference Manual 5 : Standards, Environments, and Macros
    JFP Reference Manual 5 : Standards, Environments, and Macros Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817–0648–10 December 2002 Copyright 2002 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Hardening Windows 2000
    Hardening Windows 2000 Philip Cox ([email protected]) Version 1.3 March 14, 2002 Abstract Determining what steps need to be taken to secure a system is one of the most frustrating things that system administrators have to do. This white paper provides a method for getting a Win2K server to a “secure” baseline. From this baseline you can work forward to install additional services. The focus of this white paper is on the Win2K server, but much of the information is applicable to Win2K Professional as well. This paper is excerpted and modified from Chapter 21 of the “Windows 2000 Security Handbook” (ISBN: 0-07- 212433-4, copyright Osborne/McGraw-Hill) authored by Phil Cox and Tom Sheldon (www.windows2000securityhandbook.com). Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2002. All rights reserved. All trademarks used herein are the property of their respective owners. Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2001. Table of Contents Abstract......................................................................................................................................................................1 Table Of Contents......................................................................................................................................................2 The Requirements ......................................................................................................................................................3
    [Show full text]
  • 01001100 01001100 01001100 01001100
    01001100 01001100 01001100 01001100 01010100 01010100 01010100 01010100 01000101 01000101 LTER DATABITS 01000101 01000101 01010010 01010010 01010010 01010010 _______________________________________________________________________________________ Summer 1990 Data Management Newsletter of Long-term Ecological Research Welcome to the summer 1990 issue of DATABITS! This issue features the agenda of the upcoming data manager's meeting, a report on the most recent LTER Coordinating Committee meeting, reports from the sites and some hints on using Unix and MSDOS. From the Sites BNZ-- At BCEF field season has caught up with us, and our efforts are concentrated on data acquisition and storage at a fast and furious pace. -- Phyllis Adams, Bonanza Creek LTER HFR-- A busy field season has begun, with help from summer undergraduates: among other things, we're finishing the current forest inventory, mapping trees for the hurricane pull-down and overstory deadening experiments next fall, and resampling hurricane regeneration plots. Data is entered and analyzed on the computers at the end of each field day. Indoors we're setting up new computers, digitizing GIS overlays, continuing analysis of several GIS projects, and beginning the long task of keyboarding data from the past. -- Emery Boose, Harvard Forest LTER NWT-- Recent construction of our climate database represents a level of accessibility previously unknown. Although these data (38-year record for Niwot Ridge) have been reduced and stored on magnetic tape or floppy disks for several years, difficulties associated with use of the data as stored on these media have discouraged all but the most persistent researchers from resorting to hard copies. The new climate database allows for the rapid creation of files, tailored by individual investigators to meet their parti- cular needs, that are easily loaded into a spreadsheet format.
    [Show full text]
  • Predatory Pricing
    UC Berkeley Law and Economics Workshop Title Predatory Pricing Permalink https://escholarship.org/uc/item/22k506ds Author Edlin, Aaron S Publication Date 2010-02-01 eScholarship.org Powered by the California Digital Library University of California Predatory Pricing 2010 Aaron S. Edlin From the Selected Works of Aaron Edlin; http://works.bepress.com/aaron edlin/74 Aaron Edlin Page 1 12/27/09 Predatory Pricing1 Aaron Edlin Richard Jennings Professor of Law and Professor of Economics, UC Berkeley And National Bureau of Economic Research . Forthcoming, Research Handbook on the Economics of Antitrust Law, edited by Einer Elhauge. Abstract Judge Breyer famously worried that aggressive prohibitions of predatory pricing throw away a bird in hand (low prices during the alleged predatory period) for a speculative bird in the bush (preventing higher prices thereafter). Here, I argue that there is no bird in hand because entry cannot be presumed. Moreover, it is plausibly commonplace that post‐entry low prices or the threat of low prices has anticompetitive results by reducing entry and keeping prices high pre‐entry and post‐predation. I analyze three potential standards for identifying predatory pricing. Two are traditional but have been tangled together and must be distinguished. First, a price‐cost test based on sacrifice theory requires that either price or cost be measured by what I describe as “inclusive” measures. A price‐cost test to prevent the exclusion of equally efficient competitors, by contrast, requires that price and cost be measured by more traditional “exclusive” measures. Finally, I describe a Consumer Betterment Standard for monopolization and consider its application to predatory pricing.
    [Show full text]