Centralpoint Sof!L£Ri!E~ Copy II® PLUS SOFTWARE & DOCUMENTATION COPYRIGHT 1982-1988 Central Point Software, Inc

Total Page:16

File Type:pdf, Size:1020Kb

Centralpoint Sof!L£Ri!E~ Copy II® PLUS SOFTWARE & DOCUMENTATION COPYRIGHT 1982-1988 Central Point Software, Inc CentralPoint Sof!l£rI!e~ COpy II® PLUS SOFTWARE & DOCUMENTATION COPYRIGHT 1982-1988 Central Point Software, Inc. 15220 NW Greenbrier Pkwy/Beaverton, OR 97006 PHONE 503/690-8090 Central Point Software License Statement! This soltware is protected by both United States copyright law and international treaty provisions. Therelore, you must treat this soltware just like a book, with the lollowing single exception. Central Point Soltware authorizes you to make archival copies 01 the soltware lor the sole purpose 01 backing up our software and protecting your investment Irom loss. By saying, "Just like a book," Central Point Software means, lor example that this solt­ ware may be used by any number 01 people and may be Ireely moved lrom one com­ puter location to another, so long as there Is no possibility 01 it being used at one location while it's being used at another. Just like a book that can't be read by two dillerent peo­ ple in two dillerent places at the same time, neither can the soltware be used by two dil­ lerent people in two dillerent places at the same time. WARRANTY With respect to the physical diskette and physical documentation enclosed herein, Central Point Software, Inc. warrants the same to be Iree 01 delects in materials and workmanship lor a period 0160 days Irom the date 01 purehase. In the event 01 notifica­ tion within the warranty period 01 dclects in material or workmanship, Central Point Software will replace the delective diskette or documentation. II you need to return a product, call the Central Point Soltware Service Department to obtain a return autho­ rization number. The remedy lor breach 01 this warranty shall be limited to replacement and shall not encompass any other damages, including but not limited to loss 01 profit, and special, Incidental, consequential, or other similar claims. Central Point Soltware, Inc. specifically disclaims all other warranties, expressed or im­ plied, including but not limited to implied warranties 01 merchantability and fitness lor a particular purpose with respect to defects in the diskette and documentation, and the program license granted herein in particular, and without limiting operation o( the pro­ gram license with respect to any particular appfication, use or purpose. In.no event shall Central Point Software be liable (or any loss of profit or any other commercial damage, including but not limited to special, incidental, consequential or other damages. GOVERNING LAW This statement shall be construed, Interpreted, and governed by the laws of the state o( Oregon. The word Apple and the Apple logo are registered trademarks 01 Apple Computer, Inc. Apple Computer, Inc. makes no warranties, either expressed or implied, regarding the enclosed computer soltware package, its merchantability or its fitness lor any particular purpose. ProDOS is a copyrighted program 01 Apple Computer, Inc. licensed to Central Point Software, Inc. to distribute (or use only in combination with Copy II Plus. Apple Software shall not be copied onto another diskette (except lor archive purposes) or into memory unless as part 01 the execution of Copy II Plus. When Copy II Plus has completed execu­ tion Apple Soltware shall not be used by any other program. ProDOS Copyright 1983-1984 Apple Computer, Inc. Table of Contents Chapter One - Introduction 1 The Utilities 1 The Bit Copy Programs 3 Hardware Requirements & Recommendations 4 Utilities & 5.25 inch Bit Copy Requirements 4 3.5 inch Bit Copy Requirements 5 What You Need to Know 6 About This Manual. 7 Starting Up 8 Differences from Copy II Plus Version 7 10 Chapter Two - Utilities 13 Setting the Date 13 80-Columns 14 The Main Menu 14 PRINTER SLOT 16 CATALOG 17 Selecting Disks 17 Selecting Subdirectories (ProDOS only) 19 NORMAL CATALOG 20 WITH FILE LENGTHS 21 WITH DELETED FILES 22 WITH HIDDEN CHARACTERS 22 COPY 22 COpy FILES 23 Selecting Files 24 Continuing with COPY FILES 26 Created and Modified Dates (ProDOS only) Z7 Converting Files Between DOS 3.3 and ProDOS.. 28 COPY DISK 28 Copying 5.25 inch Disks 29 Copying 3.5 inch Disks 30 Continuing with COPY DISK. 30 COPY DOS (DOS 3.3 disks only) 31 DELETE 31 DELETE FILES 31 DELETE DISK 32 DELETE DOS (DOS 3.3 only) 33 LOCK/UNLOCK FILES ; 34 RENAME 34 RENAME FILES 35 RENAME VOLUME (ProDOS only) 36 ALPHABETIZE CATALOG 36 FORMAT DISK 37 DOS 3.3 Formatting 37 ProDOS Formatting 38 Formatting /RAM 39 VERIFY 40 VERIFY DISK , 41 VERIFY FILES 42 VERIFY DRIVE SPEED (5.25 inch drives only) 43 Adjusting Your Drive Speed 43 VIEW FILES 46 DISK MAP (5.25 inch drives only) 47 CHANGE BOOT PROGRAM (DOS 3.3 only) 48 UNDELETE FILES 49 CREATE SUBDIRECTORY ~ QUIT 51 Large Memory Boards 51 Directory Limitations 53 Chapter Three - Bit Copy...••.•...••..............••.......•....55 Starting Bit Copy 55 Overview - Parameters 56 About This Chapter 57 AUTO COPY 58 Write-Protecting Original Disks 60 Copy Status 61 Errors and Error Numbers 63 Comments , 64 AUTO COPYing again 65 PARTIAL AUTO COPY 65 HD Parameter Entries (3.5" Bit Copy) 67 Helpful Things to Know When Using Bit Copy 67 More Helpful Hints 68 TRY Entries 70 "What Else?" 70 QUIT 71 Updating Copy II Plus 71 Chapter Four - Bit Copy "Technical Tools" 73 MANUAL BIT COpy 73 MANUAL SECTOR COPY 77 NIBBLE EDITOR 79 SECTOR EDITOR 84 Reading Sectors (5.25" Bit Copy) 85 Reading Sectors (3.5" Bit Copy) S7 Moving the Cursor 88 Reading Again 89 Changing Bytes 89 Writing 90 How to Edit a Sector 90 Disassembly 91 Printer Dumps 91 Scan for Bytes 91 Patch 92 How to Set "Patched" Routines 95 Custom Patching 95 HI-RES DISK SCAN 97 Chapter Five - Parameter Entries 101 Sector Edit Parameters .104 LOAD PARM ENTRy 107 EDIT PARM ENTRy 109 CREATE NEW PARM ENTRY 110 SAVE PARM ENTRy 110 RENAME PARM ENTRy 111 DELETE PARM ENTRy 111 Possible Parameter List Errors 112 PRINT PARM FILE 114 Appendix A- Disks and Disk Hardware 115 ProDOS, DOS 3.3, Blocks, Sectors 115 5.25" Disks - Tracks and Sectors 116 3.5" Disks - Tracks, Sectors, Sides, Blocks 117 Disk Hardware - Reading & Writing Bytes, Speed 118 Disk Hardware - 3.5" Drives 122 Contents of a Sector 123 Reading, Writing, and Formatting 126 Hard and Soft Sectors (5.25" disks) 129 Interleave (3.5" disks) 130 Appendix B - Disk Protection Schemes 133 Protection? 133 Perfection? 134 Changed Address and Data Headers .135 Changed Sync Bytes 136 Synchronized Tracks 136 Half Tracks '" 137 An Extra Track? 138 Bit Insertion 138 Nibble Counting 139 Long Tracks 140 Write-Protect Check 140 "Non-sync Sync" ; 141 Spiral Tracks 142 Appendix C - Routines and Parameters 143 Special 5.25 inch Bit Copy Parameters 151 Appendix D - Summary of Parameters 159 Appendix E - Number Conversion Tables 167 Appendix F - Extra Memory 175 Appendix G - Other Products 179 Index 183 Chapter One: Introduction Chapter One - Introduction This manual describes Copy II Plus version 8, which contains th ree distinct application programs: 1. a powerful DOS/proDOS disk utility package. 2. a sophisticated Bit Copy program for 5.25" floppy disk drives. 3. a separate Bit Copy program designed for 3.5" disk drives. The DOS/ProDOS Utilities (which we'll just call the Utilities) allow you to manipulate DOS 3.3 and ProDOS files and disks quickly and easily. The two Bit Copy programs can make backups of valuable software that has been copy-protected, as well as making fast reliable backups of unprotected disks. There are actually two disks in the Copy II Plus package: a 5.25" disk and a 3.5" disk. The 5.25" disk contains the Utilities and the 5.25" Bit Copy program. (There was not enough room on this disk to include the 3.5" Bit Copy program.) The 3.5" disk contains all three programs. The U tiUties With the Utilities, you can: Copy any 16 sector unprotected 5.25 inch disk Copy unprotected 3.5 inch disks Copy files Convert files between DOS and ProDOS formats Catalog a disk Catalog showing file lengths Catalog showing deleted files Delete files Delete all information from a disk Lock or unlock files Rename files Alphabetize the catalog 1 Copy II Plus Disk Utilities Format a disk Verify that the disk is readable Verify that files are readable Check disk drive speed View the contents of files See a map of what files are stored where on the disk Undelete files, to recover files that were accidentally deleted These options work with either DOS 3.3 or ProDOS disks. Because of the inherent differences between DOS and ProDOS, some additional options will work only with DOS disks, and some only with ProDOS disks. The options for DOS disks include: Copy DOS onto a disk Catalog showing any hidden control characters Delete DOS to free up more space for files Change the boot program on the disk The options for ProDOS disks include: View any or all subdirectories without having to type pathnames Rename a volume Create new subdirectories Most of the options listed above are for standard DOS 3.3 or ProDOS disks only. However, the utility options COPY DISK and VERIFY DISK can be used with any 16 sector unprotected disks, including DOS 3.3, ProDOS, SOS, CP1M, and Pascal format disks. Note for Apple /// users: Copy II Plus is designed to work only on Apple II series (or compatible) computers. However, Apple /// SOS stores files exactly like ProDOS. You can use the Copy II Plus Utilities on an Apple II to work with Apple /// SOS disks. 2 Chapter One: Introduction The Utilities can access ProDOS files stored on floppy disks, hard disks, RAMdisks, 3.5 inch disks, and any other ProDOS­ compatible "intelligent" disk devices.
Recommended publications
  • Virus Bulletin, August 1994
    ISSN 0956-9979 AUGUST 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Bigger, By Being Better? 2 VIRUS PREVALENCE TABLE 3 NEWS Central Point Merger Completed 3 Pathogen Author Arrested 3 IBM PC VIRUSES (UPDATE) 4 IN THIS ISSUE: INSIGHT CARO explained. Many people have no idea what Schwartau on Security 6 CARO is, what it does, or how to join it. Everything you ever wanted to know about the organisation but were FEATURE afraid to ask is on pp.8-9. CARO: A Personal View 8 The professionals professional. For the first time VIRUS ANALYSES ever, VB reviews AVP, one of Russias leading virus 1. AntiCMOS - Brain Damage 9 scanners: have researchers behind the former Iron 2. A Pile of Junk? 11 Curtain made as many advances in their work as those in 3. Pure Thoughts 13 the West? FEATURE The Lotus position. Lotus has adopted a novel ap- Epidemic Virus Control 15 proach to the prevention of large-scale virus outbreaks within the company. How effective is its technique, and PRODUCT REVIEWS is it a practical alternative in other companies? See p.15. 1. AVP - A Professional Choice 18 2. NetShield 1.5 21 END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • In Order to Run Software Applications, Computers Must Translate Software
    Introduction to Computers Chapter One Information Technology in Perspective Computers are everywhere: at work, at school, and at home. People use all types and sizes of computers. While some computers sit on top of a desk or on the floor, mobile computers and mobile devices are small enough to carry. Mobile devices, such as many cell phones, often are classified as computers. Computers are a primary means of local and global communication for billions of people. Consumers use computers to correspond with businesses, students with classmates and teachers, and family members with friends and other family members. People use computers to share photos, drawings, documents, calendars, journals, music, and videos. Through computers, society has instant From the computer, you can make a telephone call, meet new friends, share opinions or life stories, book flights, shop, fill prescriptions, file taxes, take a course, receive alerts, and automate your home. Computer is an Electronic device operating under the control of instructions stored in its own memory. Information Technology= Information +technology • Definition of Technology: The application of scientific knowledge to the practical aims of human life. Technology is people using knowledge, tools, and systems to make their lives easier and better • Science deals with the study of phenomena in the natural world (physics, chemistry, geology, • Science deals with "understanding" while technology deals with "doing“ Knowledge chain: data --- Information --- Knowledge Data • Raw facts, a collection of facts from which conclusions may be drawn with different forms such as: text, numbers, images, or thoughts. Information • Processed meaningful data as a result of processing, manipulating and organizing data.
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • Netware 5.1 Upgrade
    NOVELL PARTNER CONSULTING SERVICE OFFERINGS NOVELL PARTNERNET CONFIDENTIAL CONSULTANT GUIDE NetWare 5.1 Upgrade ® Table of Contents NetWare 5.1 Upgrade Consulting Guide .................................................................................... 4 Target Audience...........................................................................Error! Bookmark not defined. Terminology......................................................................................................................... 4 Skill Set............................................................................................................................... 4 Purpose ............................................................................................................................... 5 Acknowledgements.......................................................................Error! Bookmark not defined. NetWare 5.1 Training Curriculum ............................................................................................ 6 Curriculum for NetWare 5.1 .................................................................................................... 6 Curriculum for NetWare 5 CNE ............................................................................................... 6 Reference Material ...............................................................................................................10 Books .............................................................................................................................10 AppNotes
    [Show full text]
  • Virus Bulletin, October 1994
    ISSN 0956-9979 OCTOBER 1994 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford CONTENTS Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, EDITORIAL Network Security Management, UK Live and Let Die 2 VIRUS PREVALENCE TABLE 3 NEWS Virus Total Reaches 5000 3 CPAV to Continue 3 Total Anonymity 3 IN THIS ISSUE: IBM PC VIRUSES (UPDATE) 4 To be the best. This months edition brings the biggest CONFERENCE REPORT Virus Bulletin comparative review yet of NLM anti-virus VB 94: The Return to Jersey 6 software (see pp.13-20). Ten products were tested, and the results may cause something of a surprise VIRUS ANALYSES 1. One_Half: The Lieutenant Commander? 9 Conference spotlight. VB 94 recently took place in 2. AntiEXE.A - Missing the Target? 11 Jersey - turn to page 6 for an in-depth report on what happened when. COMPARATIVE REVIEW Half way there? One_Half is a multi-partite virus NLMs in Depth 13 which uses some of the techniques developed by the PRODUCT REVIEW Dark Avenger in Commander_Bomber. As if this were Virex for the PC 21 not enough, it can also encrypt vital parts of the fixed disk. A detailed analysis is given on page 9. END NOTES & NEWS 24 VIRUS BULLETIN ©1994 Virus Bulletin Ltd, 21 The Quadrant, Abingdon, Oxfordshire, OX14 3YS, England. Tel. +44 (0)1235 555139. /94/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers. 2 • VIRUS BULLETIN OCTOBER 1994 EDITORIAL Live and Let Die The Internet seems to have become the symbol of the computing revolution which we are told is going to change our lives forever.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • Counteracting Viruses in MS-DOS Systems
    86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth.
    [Show full text]
  • Netware IPX Socket List
    Network Analysis Institute – www.netanalysis.org IPX/SPX Third-Party Assigned Sockets (HEX) All values listed herein are in hexadecimal (0x) format. 8000 NATIONAL ADVANCED SYSTEMS 8001 NATIONAL ADVANCED SYSTEMS 8002 NATIONAL ADVANCED SYSTEMS 8003 COMM DRIVER SPERRY CORP. COMPUTER SYSTEMS 8004 KTA 8005 KTA 8006 KTA 8007 KTA 8008 NOVELL - PROVO 8009 SPERRY TERM EMULATOR TURNBULL AUTOMATIONS 800A PRINT SERVER COMMUNICATION HORIZONS 800B DATA LANGUAGE CORP 800F BATRAM SANTA CLARA SYSTEMS 8010 OFFICE WARE CENTURY ANALYSIS 8011 UPS ELGAR CORP 8012 UPS ELGAR CORP 8013 CHI CORP 8014 INTEL - AMERICAN FORK 8015 COMPASS COMPUTING 8016 COMPASS COMPUTING 8017 COMPASS COMPUTING 8018 COMPASS COMPUTING 8019 COMPASS COMPUTING 801A COMPASS COMPUTING 801B COMPASS COMPUTING 801C COMPASS COMPUTING 801D COMPASS COMPUTING 801E COMPASS COMPUTING 801F NOVELL - SUNNYVALE LATIN AMERI 8020 NOVELL - SUNNYVALE LATIN AMERI 8021 NOVELL - SUNNYVALE LATIN AMERI 8022 NOVELL - SUNNYVALE LATIN AMERI 8023 MCAFEE ASSOCIATES 8024 BLUE LANCE NETWORK INFO SYS 8027 GATEWAY COMMUNICATIONS INC 8028 GATEWAY COMMUNICATIONS INC 8029 GATEWAY COMMUNICATIONS INC 802A FILE SHARING NETLINE INC 802B FILE SHARING NETLINE INC 802C INTEL - AMERICAN FORK 802D INTEL - AMERICAN FORK 802E ICM 802F C-TREE VAP FAIR COM 8030 MICROMIND 8031 MICROMIND 8032 NORTH STAR COMPUTERS 8033 NORTH STAR COMPUTERS 8034 X.25 GATEWAY RSJ SOFTWARE 8035 SANYO ICON INC 8036 DATA ACCESS CORP 8039 NET MANAGEMENT NOVELL - AUSTIN 803A BETA SOFT 803B PHASER SYSTEMS 803C PHASER SYSTEMS Page 1 Network Analysis Institute –
    [Show full text]
  • Product Support Bulletin
    Product Support Bulletin Subject: Apex Plus Hardware and Software Compatibility Lists Date: 4/19/89 PSB No: S-007 Page: 1 of 8 Originator: REM The purpose of this bulletin is to provide a current listing of tested hardware and software for the Apex Plus. All testing was performed by Seiko Epson Japan and the results were supplied to Epson America. This is not an all - inclusive list; there are many hardware options and applications that will work correctly that are not listed. Unless otherwise noted, all tests were conducted with the latest release of the Apex Plus MS - DOS operating system software and ROM BIOS. The products tested were certified in one of three ways: OK - Product works with full functionality NG - Product does not work - see compatibility note * Product works with partial functionality - see compatibility note The information provided does not constitute a guarantee or endorsement of any particular product or any specific use or application. Some of the products on the list may have software or hardware requirements which are not met by the Apex Plus personal computer. Therefore, while EPSON believes the information supplied is accurate, EPSON does not assume any responsibility for use of any of the products on the attached list. EPSON MAKES NO REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS OR’ IMPLIED, WITH RESPECT TO THIS LISTING OR THE PRODUCTS REFERENCED IN THE LIST. EPSON SHALL NOT BE LIABLE FOR ANY LOSS, INCONVENIENCE OR DAMAGE, INCLUDING DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, RESULTING FROM THE USE OR INABILITY TO USE ANY OF THE PRODUCTS LISTED.
    [Show full text]
  • Virus Bulletin, August 1993
    August 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding, Network Security Management, UK Advisory Board: Jim Bates, Bates Associates, UK, David M. Chess, IBM Research, USA, Phil Crewe, Ziff-Davis, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Igor Grebert, McAfee Associates, USA, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Dr. Tony Pitt, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Roger Riordan, Cybec Pty, Australia, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Symantec Corporation, USA, Steve R. White, IBM Research, USA, Joseph Wells, Symantec Corporation, USA, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS VIRUS ANALYSES 1. Daemaen: Multi-multipartism 9 EDITORIAL 2. 8888 - The Poor Man’s Commander Bomber 12 Crime and Punishment 2 ROGUES’ GALLERY VIRUS PREVALENCE TABLE 3 Keep It To Yourself 14 NEWS Storing Up Trouble 3 PRODUCT REVIEW 40Hex Print DAME Source code... 3 Better CPAV than CPAV? 16 Crown Wins Logic Bomb Case 3 COMPARATIVE REVIEW IBM PC VIRUSES (UPDATE) 4 OS/2 Virus Protection 20 INSIGHT Getting to the Point 7 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England.
    [Show full text]
  • Optimization and Visualization of Strategies for Platforms
    Optimization and Visualization of Strategies for Platforms, Complements, and Services. by Richard B. LeVine BA, Psychology, State University of New York at Albany, 1980 MS, Computer Science, Union College, Schenectady New York, 1986 SUBMITTED TO THE ALFRED P. SLOAN SCHOOL OF MANAGEMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTERS OF SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2003 ©2003 Richard B. LeVine. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author: Alfred P. Sloan School of Management May 8, 2003 Certified by: Professor James Utterback, Chair, Management of Technology Program Reader Certified by: Professor Michael Cusumano, Sloan Management Review Distinguished Professor of Management Thesis Supervisor Accepted by: David Weber Director, Management of Technology Program 1 of 160 Optimization and Visualization of Strategies for Platforms, Complements, and Services by Richard B. LeVine Submitted to the Alfred P. Sloan School of Management on May 8, 2003, in Partial Fulfillment of the Requirement for the Degree of Masters of Science. Abstract This thesis probes the causal elements of product platform strategies and the effects of platform strategy on a firm. Platform strategies may be driven by internal or external forces, and the lifecycle of a firm and of a platform strategy evolve over time in response to both the needs of the firm and the changes in the external environment. This external environment may consist of a “platform ecology,” in which the platform strategies of firms affect one another.
    [Show full text]