Acronis Os Selector As a Boot Manager

Total Page:16

File Type:pdf, Size:1020Kb

Acronis Os Selector As a Boot Manager User's Guide OS Selector 8.0 Compute with confidence www.acronis.com Copyright © SWsoft, 2000-2002. All rights reserved. Linux is a registered trademark of Linus Torvalds. OS/2 is a registered trademarks of IBM Corporation. UNIX is a registered trademarks of The Open Group. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS YOU MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. The OS Selector (the Software) is copyright © 2000-2002 by SWsoft. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1. The license is to the original purchaser only, and is not transferable without prior written Permission from SWsoft. 2. The Original Purchaser may use the Software on a single computer owned or leased by the Original Purchaser. You may not use the Software on more than a single machine even if you own or lease all of them without the written consent of SWsoft. 3. The Original Purchaser may not engage in, nor permit third parties to engage in, any of the following: A. Providing or permitting use of or disclosing the Software to third parties. B. Providing use of the Software in a computer service business, network, timesharing or multiple user arrangement to users who are not individually licensed by SWsoft. C. Making alterations or copies of any kind in the Software (except as specifically permitted above). D. Attempting to un-assemble, de-compile or reverse engineer the Software in any way. E. Granting sublicenses, leases, or other rights in the Software to others. F. Making copies, or verbal or media translations, of the users guide. G. Making telecommunication data transmission of the software. SWsoft has the right to terminate this license if there is a violation of its terms or default by the Original Purchaser. Upon termination for any reason, all copies of the Software must be immediately returned to SWsoft, and the Original Purchaser shall be liable to SWsoft for any and all damages suffered as a result of the violation or default. Copyright © SWsoft, 2000-2002 3 ENTIRE RISK THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH YOU THE PURCHASER. SWSOFT DOES NOT WARRANT THAT THE SOFTWARE OR ITS FUNCTIONS WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE OR THAT ANY DEFECTS WILL BE CORRECTED. NO LIABILITY FOR CONSEQUENTIAL DAMAGES - IN NO EVENT SHALL SWSOFT OR ITS VENDORS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR THE LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF SWSOFT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4 Table of Contents ABOUT THIS GUIDE ............................................................................................ 9 CHAPTER 1. INTRODUCTION ......................................................................... 11 1.1 ACRONIS OS SELECTOR AS A BOOT MANAGER............................ 11 1.2 ACRONIS OS SELECTOR AS A PARTITION MANAGER.................... 12 1.3 ACRONIS OS SELECTOR KEY FEATURES ...................................... 12 1.4 MAIN DISK ADMINISTRATOR FEATURES....................................... 13 1.5 ACRONIS OS SELECTOR SYSTEM REQUIREMENTS........................ 14 1.6 HOW DOES ACRONIS OS SELECTOR FUNCTION? .......................... 15 1.7 WHAT IS A BOOT CONTEXT?......................................................... 15 CHAPTER 2. BASIC INFORMATION................................................................ 17 2.1 WHAT IS A HARD DISK? ................................................................ 17 2.1.1 HARD DISK ARCHITECTURE .....................................................................17 2.1.2 HOW DOES HARD DISK WORK?................................................................17 2.2 HARD DISK FORMATTING ............................................................. 18 2.2.1 PHYSICAL FORMATTING ...........................................................................18 2.2.2 LOGICAL FORMATTING.............................................................................18 2.3 FILE SYSTEMS................................................................................ 19 2.3.1 FAT16......................................................................................................19 2.3.2 FAT32......................................................................................................20 2.3.3 NTFS........................................................................................................20 2.3.4 LINUX EXT2 .............................................................................................20 2.3.5 LINUX EXT3 .............................................................................................21 2.3.6 LINUX REISERFS ......................................................................................21 2.4 PARTITIONS ................................................................................... 21 2.4.1 WHEN IS IT USEFUL TO HAVE MULTIPLE PARTITIONS? ............................21 2.4.2 PARTITION STRUCTURE ON A HARD DISK.................................................21 2.5 BOOT SEQUENCE ........................................................................... 23 2.5.1 VERY BEGINNING .....................................................................................23 2.5.2 BOOTING WITHOUT THE BOOT MANAGER ................................................23 2.5.3 WHAT DOES THE BOOT MANAGER DO? ....................................................23 2.6 MANAGING PARTITIONS................................................................ 24 2.6.1 SETTING AN ACTIVE PARTITION ...............................................................24 2.6.2 ACCESSING THE SAME FILES FROM MULTIPLE OPERATING SYSTEMS ......24 2.6.3 EFFICIENCY OF DISK SPACE USAGE..........................................................24 2.7 HIDDEN PARTITIONS ..................................................................... 25 2.8 DRIVE LETTERS ............................................................................. 26 2.9 ASSIGNMENT OF LETTERS IN DIFFERENT OPERATING SYSTEMS .. 26 2.9.1 MS-DOS 5.0-6.22, MS-DOS 7.0, WINDOWS 95 (ORIGINAL)...................26 2.9.2 MS-DOS 7.1/8.0, WINDOWS 95 OSR2/98/ME ........................................27 2.9.3 OS/2 .........................................................................................................27 2.9.4 WINDOWS NT/2000/XP............................................................................27 2.10 TROUBLES ARISING FROM CHANGING LETTER ASSIGNMENT ...... 28 2.11 1024 OR 4096 CYLINDER LIMIT .................................................... 28 2.12 64K BOOT CODE LIMIT ................................................................. 30 CHAPTER 3. INSTALLING AND UNINSTALLING ACRONIS OS SELECTOR... 31 3.1 GETTING STARTED ........................................................................ 31 3.2 INSTALLATION............................................................................... 32 3.3 REPAIRING/UPGRADING ACRONIS OS SELECTOR......................... 34 Copyright © SWsoft, 2000-2002 5 CHAPTER 4. BOOT MENU .............................................................................. 35 4.1 BOOTING OPERATING SYSTEMS..................................................... 36 4.2 RUNNING ACRONIS OS SELECTOR TOOLS .................................... 37 4.3 TUNING ACRONIS OS SELECTOR .................................................. 37 CHAPTER 5. ACRONIS OS SELECTOR SETUP ............................................... 39 5.1 AUTOMATIC SETUP OPERATION MODE......................................... 39 5.2 ACRONIS OS SELECTOR SETUP MAIN WINDOW ........................... 40 5.3 TWO VIEW MODES OF CONFIGURATION LIST............................... 42 5.4 MANIPULATING AN OPERATING SYSTEM CONFIGURATION.......... 44 5.4.1 SETTING A DEFAULT CONFIGURATION .....................................................44 5.4.2 COPYING...................................................................................................44 5.4.3 DELETING .................................................................................................44 5.4.4 HIDING .....................................................................................................45 5.4.5 EDITING CONFIGURATION PROPERTIES.....................................................45 5.5 MANIPULATING AN OPERATING SYSTEM...................................... 47 5.5.1 COPYING...................................................................................................47
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Lab 13A: Configuring Disk Compression
    Lab 13A: Configuring Disk Compression Objectives After completing this lab, you will be able to: !" Configure an NTFS volume for compression. !" Move files with the compression attribute set. !" Copy files with the compression attribute set. Prerequisites Before working on this lab, you must have: !" Knowledge of the NTFS file system. !" Knowledge of file compression. Estimated time to complete this lab: 15 minutes 2 Lab 13A: Configuring Disk Compression Exercise 1 Configuring Disk Compression In this exercise, you will enable disk compression and view the effects of compression on the Documents and Settings folder and subfolders. Scenario To provide the maximum storage capacity for your client computers, the IT manager has decided that NTFS disk compression will be enabled for folders on client computers that are low on disk space. You have been tasked with enabling disk compression for specified folders on your client computers. Tasks Detailed steps 1. Log on as Administrator a. Log on as Administrator with the password of password. with the password of b. Open Explorer, and then on the Tools menu click Folder Options. password and configure c. In the Folder Options dialog box, on the View tab, select the Show Microsoft® Windows® Explorer to display encrypted or compressed NTFS files in color check box, and then compressed files and folders click OK. in another color. 2. Compress the Documents a. In the left pane, expand Local Disk (C:), right-click Documents and and Settings folder Settings, and then click Properties. hierarchy. What are the Size and Size on disk values for the Documents and Settings folder? Answers will vary.
    [Show full text]
  • Softnas Deployment Guide for High- Performance SQL Storage
    SoftNAS Deployment Guide for High- Performance SQL Storage Introduction SoftNAS cloud NAS systems are based on an innovative, memory-centric storage architecture that delivers unparalleled NAS performance, efficiency, and value. They incorporate a hybrid disk storage technology that tailors the usage of data disks, log solid- state cache drives (SSDs), and read cache SSDs to the data share's specific needs. Additional features include variable storage record size, data compression, and multiple connectivity options. As a Cloud NAS solution, SoftNAS cloud NAS systems provide an excellent base for Microsoft Windows Server deployments by providing iSCSI or Fibre Channel block storage for Microsoft SQL Server, and network file system (NFS) or server message block (SMB) file storage for Microsoft Windows client access. This document covers the best practices to follow when deploying Microsoft SQL Server on a SoftNAS cloud NAS system. The intended audience is storage administrators and Microsoft SQL Server database administrators. Maintaining High Availability As with any business-critical application, high availability is a crucial design criterion to be considered when deploying a Microsoft SQL Server installation. Microsoft SQL Server 2016 can be installed on local and/or shared file systems, and SoftNAS cloud NAS systems can satisfy both of these options. Local file systems (from the Microsoft Windows Server perspective) are hosted as block volumes—iSCSI and/or Fibre-Channel-connected LUNs and file systems as SMB and/or NFS volumes. High availability starts with the network connectivity supporting the storage and server interconnectivity. Any design for the storage infrastructure should avoid single points of failure. Because many white papers and publications cover storage-area networking and network-attached storage resilience, those topics are not covered in detail in this paper.
    [Show full text]
  • Eyelink 1000 Installation Guide
    EyeLink® 1000 Installation Guide Tower, Desktop, LCD Arm, Primate, and Long Range Mounts Remote, 2000 Hz and Fiber Optic Camera Upgrades Version 1.5.0 Copyright ©2005-2009, SR Research Ltd. EyeLink is a registered trademark of SR Research Ltd., Mississauga, Ontario, Canada Read instructions before use. US Entela Safety Mark: Compliance of this product with UL 60950 3rd Edition, CSA C22.2 No 60950-00-CAN/CSA is certified by Entela, an independent testing body. C Certified CLASS 1 LED DEVICE IEC 60825-1 (Ed. 1.2:2001) CONTACT ADDRESS SR Research Ltd. 5516 Osgoode Main St., Ottawa, Ontario, Canada K0A 2W0 Fax: 613-482-4866 Phone: 613-826-2958 Toll Free: 1-866-821-0731 Email: [email protected] http://www.sr-research.com/ ii © 2005-2009 SR Research Ltd. Table of Contents 1. Introduction ....................................................................................................... 1 1.1 Suggested Equipment Layout ............................................................. 2 2. Installation and System Cabling .................................................................. 4 2.1 Unpacking ......................................................................................... 4 2.2 Display PC Hardware Installation ....................................................... 4 2.3 Setting up the Host PC ....................................................................... 5 2.3.1 Rebuilding the Host PC ............................................................................... 6 2.4 Host PC Wiring .................................................................................
    [Show full text]
  • United States Patent 19 11 Patent Number: 5,907,703 Kronenberg Et Al
    USOO5907703A United States Patent 19 11 Patent Number: 5,907,703 Kronenberg et al. (45) Date of Patent: May 25, 1999 54) DEVICE DRIVER FOR ACCESSING “Compact -Notes,” “Compact,” “Expand,” “Create More COMPUTER FILES Disk Space by Using Disk Compression on NTFS Vol umes,” Microsoft Windows NT 4.0 Help file, 1996. 75 Inventors: Pierre-Michel Kronenberg, Middleton; Mark Nelson and Jean-Loup Gailly, “The Data Compres Derek T. Zahn, Madison, both of Wis. sion Book,” M & T Books, Second Edition 1996, pp. 73 Assignee: Mijenix Corporation, Boulder, Colo. 209-212. Ruediger R. Asche, “The Little Device Driver,” Microsoft Development Network Technology Group. Technical 21 Appl. No.: 08/643,454 Articles: Windows: Drivers, Microsoft Developer Network 22 Filed: May 8, 1996 Library CD, Apr. 1996. 51) Int. Cl. ............................ G06F 15/163; G06F 9/00; “Introduction to Windows 95 Device Drivers,” DDK. Win G06F 9/46 dows 95 Device Driver Kit, Microsoft Developer Network 52 U.S. Cl. .................... 395/681; 395/828; 364/222.81; Library CD, Apr. 1996. 364/955 “DOS/Win32 Installable File System Specifications' DDK. 58 Field of Search ..................................... 395/680, 682, Windows 95 Device Driver Kit, Microsoft Developer Net 395/681 work Library CD, Apr. 1996. “StuffIt SpacerSaver User's Guide,” Aladdin System, Inc., 56) References Cited Sep. 1994, pp. 19-28. U.S. PATENT DOCUMENTS Primary Examiner Lucien U. Toplu 5,414,850 5/1995 Whiting .................................. 395/682 ASSistant Examiner-Peter Stecher 5,457,681 10/1995 Gaddis et al.. 5,572,209 11/1996 Farmer et al. ............................ 341/67 Attorney, Agent, or Firm Arnold White & Durkee 5,628,010 5/1997 Ooishi et al.
    [Show full text]
  • Implementing Hard Drives 10
    All-in-1 / A+ Certification Exm Gde, 6th Ed. / Meyers / 6311-3 CHAPTER Implementing Hard Drives 10 In this chapter, you will learn how to • Explain the partitions available in Windows • Discuss the formatting options • Partition and format hard drives • Maintain and troubleshoot a hard drive From the standpoint of your PC, a new hard drive successfully installed is nothing more than a huge pile of sectors. CMOS sees the drive; it shows up in your autodetect screen and BIOS knows how to talk to the drive; but as far as an operating system is concerned, that drive is unreadable. Your operating system must organize that big pile of sectors so you can create two things: folders and files. This chapter covers that process. Historical/Conceptual After you’ve successfully installed a hard drive, you must perform two more steps to translate a drive’s geometry and circuits into something usable to the system: partition- ing and formatting. Partitioning is the process of electronically subdividing the physical hard drive into groups of cylinders called partitions (or volumes). A hard drive must have at least one partition, and you can create multiple partitions on a single hard drive if you wish. In Windows, each of these partitions typically is assigned a drive letter such as C: or D:. After partitioning, you must format the drive. This step installs a file system onto the drive that organizes each partition in such a way that the operating system can store files and folders on the drive. Several different types of file systems are used in the Windows world.
    [Show full text]
  • LPI 101 – Configure Fundamental BIOS Settings
    – LPI 101 – Configure Fundamental BIOS Settings [3] (Linux Professional Institute Certification) a .˜. /V\ by: Andrew Eager // \\ [email protected] @._.@ $Id: gl1.101.1.slides.tex,v 1.4 2003/05/30 04:56:33 waratah Exp $ aCopyright c 2002 Andrew Eager, Geoffrey Robertson. Permission is granted to make and distribute verbatim copies or modified versions of this document provided that this copyright notice and this permission notice are preserved on all copies under the terms of the GNU General Public License as published by the Free Software Foundation—either version 2 of the License or (at your option) any later version. 1 Configure BIOS Fundamental Settings [3] Objective Candidates should be able to configure fundamental system hardware by making the correct settings in the system BIOS. This objective includes a proper understanding of BIOS configuration issues such as the use of LBA on IDE hard disks larger than 1024 cylinders, enabling or disabling integrated peripherals, as well as configuring systems with (or without) external peripherals such as keyboards. It also includes the correct setting for IRQ, DMA and I/O addresses for all BIOS administrated ports and settings for error handling. 2 Configure Fundamental BIOS Settings [3] Key files, terms, and utilities /proc/ioports /proc/interrupts /proc/dma /proc/pci 3 Configure Fundamental BIOS Settings [3] Resources of interest Large Disk HOWTO by Andries Brouwer http://www.linuxdoc.org/HOWTO/Large-Disk-HOWTO.html 4 The PC Firmware—BIOS Responsible for bring the hardware to a state at which it is ready to boot an Operating System. 5 System reset and initialisation Basic main memory test (RAM) Test the presence of various devices On board peripheral selection Low level device configuration Selection of boot devices Locating an operating system The BIOS may have password access enabled The PC Firmware—BIOS Responsible for bring the hardware to a state at which it is ready to boot an Operating System.
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • Ms-Dos / Pc-Dos Ms-Dos / Pc-Dos Ms-Dos / Pc-Dos Ms
    MS-DOS / PC-DOS CSC414 Forensic Overview: Computer Microsoft Disk Operating System System MS-DOS - PC-DOS was IBM's version for its PC Fundamentals and Programs usually self-contained - Programs were segregated Windows 3.11 - Program files in a single directory - Copy program directory to another system and run it Digital Forensics Center Boot Disks only need three files Department of Computer Science and Statics THINK BIG WE DO - command.com U R I - config.sys http://www.forensics.cs.uri.edu - io.sys MS-DOS / PC-DOS MS-DOS / PC-DOS Single user system File names limited to 8 - Only one program could run at a time characters with 3 character - Terminate and stay resident (TSR) extension programs were an exception - No strong association between file - Utilities, viruses, key-loggers extension and type Simple Operating System - Users could use extension for Environment filename or initials - No shared device drivers - Could not search for .doc for *all* - Device drivers integrated in to programs documents - No shared .dll files (Dynamically Some common applications Linked Library) - No Windows registry - Lotus 1-2-3, Microsoft Multiplan - Each program used a .ini or .cfg file - Word Perfect, Microsoft Word MS-DOS / PC-DOS Windows 3.11 Digital Forensics didn't exist Provided a GUI interface to DOS - No special forensics tools - Not it's own operating system - Had to relay on system tools and - GUI replaces command line interface programs Windows 3.11 - Icons were short-cuts to programs - UNDELETE, UNFORMAT - Files represented as icons or
    [Show full text]
  • 95-156R0.Txt X3T10/95-156 R0 BIOS Types, CHS Translation
    95-156r0.txt X3T10/95-156 R0 BIOS Types, CHS Translation, LBA and Other Good Stuff Version 3+ 11 February 95 by Hale Landis ([email protected]) This is very technical. Please read carefully. There is lots of information here that can sound confusing the first time you read it. ! Introduction (READ THIS!) ! ------------------------- ! Why is an understanding of how a BIOS works so important? The basic reason is that the information returned by INT 13H AH=08H is used by FDISK, it is used in the partition table entries within a partition record (like the Master Boot Record) that are created by FDISK, and it is used by the small boot program that FDISK places into the Master Boot Record. The information returned by INT 13H AH=08H is in cylinder/head/sector (CHS) format -- it is not in LBA format. The boot processing done by your computer's BIOS (INT 19H and INT 13H) is all CHS based. ! Read this so that you are not confused by all the false information going around that says "LBA solves the >528MB problem". ! Read this so that you understand the possible data integrity problem that a WD EIDE type BIOS creates. Any BIOS that has a "LBA mode" in the BIOS setup could be a WD EIDE BIOS. Be very careful and NEVER chage the "LBA mode" setting after you have partitioned and installed your software. History ------- Changes between this version and the preceeding version are marked by "!" at left margin of the first line of a changed or new paragraph.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]
  • Archiving.Pdf
    Archiving Zip. Compression. Stuff like that. Written by Dan Gookin Published by Quantum Particle Bottling Co., Coeur d’Alene, ID, 83814 USA Copyright ©2008 by Quantum Particle Bottling Co., Inc. All Rights Reserved. This work cannot be reproduced or distributed without written permission of the copyright holder. Various copyrights and trademarks may or may not appear in this text. It is assumed that the trademark or copyright is owned by whoever owns it, and the use of that material here is in no way considered an infringement or abuse of the copyright or trademark. Further, there is. Oh, wait. Never mind. I’m just making all this up anyway. I’m not a lawyer. I hate lawyers. For additional information on this or other publications from Quantum Particle Bottling Co., please visit http://www. wambooli.com/ Second Edition December, 2008 Table of Contents Archiving .........................................................................................................2 What the Heck is Archiving? ............................................................................4 Historical Nonsense About Compressed Folders and ZIP Files ..........................5 The Bad Old Modem Days .............................................................................6 Packing Multiple Files Into a Single Library ..................................................6 Better than Library Files, Compressed Archives ............................................7 Enter the ARC file format ..............................................................................8
    [Show full text]