Archiving.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Archiving.Pdf Archiving Zip. Compression. Stuff like that. Written by Dan Gookin Published by Quantum Particle Bottling Co., Coeur d’Alene, ID, 83814 USA Copyright ©2008 by Quantum Particle Bottling Co., Inc. All Rights Reserved. This work cannot be reproduced or distributed without written permission of the copyright holder. Various copyrights and trademarks may or may not appear in this text. It is assumed that the trademark or copyright is owned by whoever owns it, and the use of that material here is in no way considered an infringement or abuse of the copyright or trademark. Further, there is. Oh, wait. Never mind. I’m just making all this up anyway. I’m not a lawyer. I hate lawyers. For additional information on this or other publications from Quantum Particle Bottling Co., please visit http://www. wambooli.com/ Second Edition December, 2008 Table of Contents Archiving .........................................................................................................2 What the Heck is Archiving? ............................................................................4 Historical Nonsense About Compressed Folders and ZIP Files ..........................5 The Bad Old Modem Days .............................................................................6 Packing Multiple Files Into a Single Library ..................................................6 Better than Library Files, Compressed Archives ............................................7 Enter the ARC file format ..............................................................................8 From ARC to PAK to ZIP ...............................................................................9 Enter the Compressed Folder ........................................................................9 ZIP or Zip: What’s the difference?................................................................10 The ZIP Tutorials ...........................................................................................11 Creating a ZIP File Archive ..........................................................................11 Viewing the Archive ....................................................................................14 Adding Files to the ZIP Archive ...................................................................15 Managing Files in the Archive .....................................................................19 Extracting Files from the Archive ................................................................22 After you’re done with the archive, then what? ............................................26 Tutorial Cleanup.........................................................................................26 Drawbacks to ZIP Archives ............................................................................27 Advanced ZIP Archive Stuff ............................................................................28 Creating a ZIP Archive the Awkward Way ....................................................28 Installing a Program from a ZIP Archive ......................................................29 The Compressed Folder as EXE File Syndrome ...........................................30 Folders in ZIP Archives ...............................................................................30 Password Protection ...................................................................................30 E-mailing a ZIP Archive ..............................................................................33 A Few Words About WinZIP ............................................................................34 Blue Compression Archiving ..........................................................................34 Blue History ...............................................................................................34 Activating a file’s Blue Compression attribute .............................................37 It Didn’t Work! ............................................................................................38 Decompressing Blue Compression ..............................................................41 When you shouldn’t use Blue Compression ................................................41 It seems like ZIP archives are a bother with Blue Compression around .......41 ZIP Archives Versus Blue Compression:Pros and Cons ................................42 What the Heck is Archiving? Archiving is a fancy term for storing stuff in your computer. But it’s more than just using the FileSave As command to save a file, or even the Move and Copy commands to shuffle files around. No, archiving is about long term storage. It's about how to keep stuff you need, but may not need that often. Stuff that's too important to throw away — pictures, older documents, correspondence, and stuff like that. Archiving involves these things: Using the basic file commands to save and store your stuff, either on a secondary hard drive or a recordable CD. Storing things in a Compressed Folder or ZIP file. Using Blue Compression in Windows. I've written about the first method for years in my books. There's no point in repeating that information here. So this document is specifically about using Compressed Folders and Blue Compression. Historical Nonsense About Compressed Folders and ZIP Files Computer users have been archiving files for years, since the earliest days of primitive steam-powered computers, through the vacuum tube era, and into the transistor age. Cindy attempts to change archives without damaging her fingernails. Archiving is basically the art of keeping files around without deleting them. In the old days, that could be done by simply disconnecting a disk or tape and putting it into a vault. Today there are much more sophisticated ways of archiving, such as using the ZIP compressed file format. The following sections explain how the ZIP file format came about, why it was necessary, and stuff like that. If you’d rather just start with the tutorials, turn to page 5. The Bad Old Modem Days Another reason to archive is simply to keep files together, primarily for sending over a modem. Popular in movies, acoustic coupler modems such as this cheesy Tandy model from the early 1980s, were a royal pain in the butt to use. For example, go back to the bad old modem days, back before Windows. Back then, files were small say 16K in size on average. But yet the modems were slow. Sending a single file took a long time. That was still okay because most programs were simply one file. As things got more complex, programs would have more parts. Sometimes a single program would consist of five files. You would want to keep them all together when sending them from one computer to another. Rather than resort to unusual names or other weird techniques — stuff that few folks would understand let alone learn — the library file was developed. Packing Multiple Files Into a Single Library A Library File was simply a collection of multiple files. So if you wanted to send five files by modem: ALPHA BETA GAMMA DELTA EPSILON You could stuff them all into a single Library File named ALPHA.LIB. The Library program would create the file. You could then send the single file over the modem instead of the five files. If all went well, nothing was lost. The Library file illustration. On the other end, your pal receives the ALPHA.LIB file. He also has a copy of the Library utility, so he runs that program. In a few moments, the files stored in the ALPHA.LIB Library file are removed, orextracted , from the archive and you’re buddy has the five files he wanted: ALPHA BETA GAMMA DELTA EPSILON Library could be another word for “archive.” Indeed, this document could be called “Making Library files” instead of “Archiving.” But historically Library files were doomed. That’s because a better way to send files was developed: Thecompressed archive. Better than Library Files, Compressed Archives Library files solved one problem: they kept several disparate files together. The problem was that the Library File itself wasn’t compact. In fact, there was no time saving over sending a Library file versus sending all the separate files stored in the Library. The solution was compression. File compression is possible because computer files are composed of binary information, the ones and zeros of song and legend. 0111 0011 0110 1111 0110 1110 1001 0111 In a typical file, a lot of those ones and zeros are repeated over and over. It may seem wasteful, but such a thing is forgivable in a computer because storage isn’t considered a big deal. But when storage space or file size does become a big deal, it’s possible compress that binary information into a small size — just like you compress household garbage in a trash compactor. 0111 0011 0110 1111 0110 1110 1001 0111 Unlike a trash compactor, however, it’s fully possible to de-compress data in a file without losing any of the information. A file that has been compressed and de- compressed is the same as a file that hasn’t been ever compressed. Compression and decompression is made possible thanks to advanced mathematics and encryption stuff that I don’t understand and you don’t care about. The only drawback is that the computer cannot use a file in a compressed state: a text file cannot be read or a graphics file viewed when either is compressed. The file takes up less space, sure. But to use the file as intended, it must be decompressed. Enter the ARC file format Just as the Library files were becoming popular for sending programs and files over the modem, the ARC or Archive file format
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Lab 13A: Configuring Disk Compression
    Lab 13A: Configuring Disk Compression Objectives After completing this lab, you will be able to: !" Configure an NTFS volume for compression. !" Move files with the compression attribute set. !" Copy files with the compression attribute set. Prerequisites Before working on this lab, you must have: !" Knowledge of the NTFS file system. !" Knowledge of file compression. Estimated time to complete this lab: 15 minutes 2 Lab 13A: Configuring Disk Compression Exercise 1 Configuring Disk Compression In this exercise, you will enable disk compression and view the effects of compression on the Documents and Settings folder and subfolders. Scenario To provide the maximum storage capacity for your client computers, the IT manager has decided that NTFS disk compression will be enabled for folders on client computers that are low on disk space. You have been tasked with enabling disk compression for specified folders on your client computers. Tasks Detailed steps 1. Log on as Administrator a. Log on as Administrator with the password of password. with the password of b. Open Explorer, and then on the Tools menu click Folder Options. password and configure c. In the Folder Options dialog box, on the View tab, select the Show Microsoft® Windows® Explorer to display encrypted or compressed NTFS files in color check box, and then compressed files and folders click OK. in another color. 2. Compress the Documents a. In the left pane, expand Local Disk (C:), right-click Documents and and Settings folder Settings, and then click Properties. hierarchy. What are the Size and Size on disk values for the Documents and Settings folder? Answers will vary.
    [Show full text]
  • End-To-End Enterprise Encryption: a Look at Securezip® Technology
    End-to-End Enterprise Encryption: A Look at SecureZIP® Technology TECHNICAL WHITE PAPER WP 700.xxxx End-to-End Enterprise Encryption: A Look at SecureZIP Technology Table of Contents SecureZIP Executive Summary 3 SecureZIP: The Next Generation of ZIP 4 PKZIP: The Foundation for SecureZIP 4 Implementation of ZIP Encryption 5 Hybrid Cryptosystem 6 Crytopgraphic Calculation Sources 7 Digital Signing 7 In Step with the Data Protection Market’s Needs 7 Conclusion 8 WP-SZ-032609 | 2 End-to-End Enterprise Encryption: A Look at SecureZIP Technology End-to-End Enterprise Encryption: A Look at SecureZIP Technology Every day sensitive data is exchanged within your organization, both internally and with external partners. Personal health & insurance data of your employees is shared between your HR department and outside insurance carriers. Customer PII (Personally Identifiable Information) is transferred from your corporate headquarters to various offices around the world. Payment transaction data flows between your store locations and your payments processor. All of these instances involve sensitive data and regulated information that must be exchanged between systems, locations, and partners; a breach of any of them could lead to irreparable damage to your reputation and revenue. Organizations today must adopt a means for mitigating the internal and external risks of data breach and compromise. The required solution must support the exchange of data across operating systems to account for both the diversity of your own infrastructure and the unknown infrastructures of your customers, partners, and vendors. Moreover, that solution must integrate naturally into your existing workflows to keep operational cost and impact to minimum while still protecting data end-to-end.
    [Show full text]
  • Softnas Deployment Guide for High- Performance SQL Storage
    SoftNAS Deployment Guide for High- Performance SQL Storage Introduction SoftNAS cloud NAS systems are based on an innovative, memory-centric storage architecture that delivers unparalleled NAS performance, efficiency, and value. They incorporate a hybrid disk storage technology that tailors the usage of data disks, log solid- state cache drives (SSDs), and read cache SSDs to the data share's specific needs. Additional features include variable storage record size, data compression, and multiple connectivity options. As a Cloud NAS solution, SoftNAS cloud NAS systems provide an excellent base for Microsoft Windows Server deployments by providing iSCSI or Fibre Channel block storage for Microsoft SQL Server, and network file system (NFS) or server message block (SMB) file storage for Microsoft Windows client access. This document covers the best practices to follow when deploying Microsoft SQL Server on a SoftNAS cloud NAS system. The intended audience is storage administrators and Microsoft SQL Server database administrators. Maintaining High Availability As with any business-critical application, high availability is a crucial design criterion to be considered when deploying a Microsoft SQL Server installation. Microsoft SQL Server 2016 can be installed on local and/or shared file systems, and SoftNAS cloud NAS systems can satisfy both of these options. Local file systems (from the Microsoft Windows Server perspective) are hosted as block volumes—iSCSI and/or Fibre-Channel-connected LUNs and file systems as SMB and/or NFS volumes. High availability starts with the network connectivity supporting the storage and server interconnectivity. Any design for the storage infrastructure should avoid single points of failure. Because many white papers and publications cover storage-area networking and network-attached storage resilience, those topics are not covered in detail in this paper.
    [Show full text]
  • The Basic Principles of Data Compression
    The Basic Principles of Data Compression Author: Conrad Chung, 2BrightSparks Introduction Internet users who download or upload files from/to the web, or use email to send or receive attachments will most likely have encountered files in compressed format. In this topic we will cover how compression works, the advantages and disadvantages of compression, as well as types of compression. What is Compression? Compression is the process of encoding data more efficiently to achieve a reduction in file size. One type of compression available is referred to as lossless compression. This means the compressed file will be restored exactly to its original state with no loss of data during the decompression process. This is essential to data compression as the file would be corrupted and unusable should data be lost. Another compression category which will not be covered in this article is “lossy” compression often used in multimedia files for music and images and where data is discarded. Lossless compression algorithms use statistic modeling techniques to reduce repetitive information in a file. Some of the methods may include removal of spacing characters, representing a string of repeated characters with a single character or replacing recurring characters with smaller bit sequences. Advantages/Disadvantages of Compression Compression of files offer many advantages. When compressed, the quantity of bits used to store the information is reduced. Files that are smaller in size will result in shorter transmission times when they are transferred on the Internet. Compressed files also take up less storage space. File compression can zip up several small files into a single file for more convenient email transmission.
    [Show full text]
  • United States Patent 19 11 Patent Number: 5,907,703 Kronenberg Et Al
    USOO5907703A United States Patent 19 11 Patent Number: 5,907,703 Kronenberg et al. (45) Date of Patent: May 25, 1999 54) DEVICE DRIVER FOR ACCESSING “Compact -Notes,” “Compact,” “Expand,” “Create More COMPUTER FILES Disk Space by Using Disk Compression on NTFS Vol umes,” Microsoft Windows NT 4.0 Help file, 1996. 75 Inventors: Pierre-Michel Kronenberg, Middleton; Mark Nelson and Jean-Loup Gailly, “The Data Compres Derek T. Zahn, Madison, both of Wis. sion Book,” M & T Books, Second Edition 1996, pp. 73 Assignee: Mijenix Corporation, Boulder, Colo. 209-212. Ruediger R. Asche, “The Little Device Driver,” Microsoft Development Network Technology Group. Technical 21 Appl. No.: 08/643,454 Articles: Windows: Drivers, Microsoft Developer Network 22 Filed: May 8, 1996 Library CD, Apr. 1996. 51) Int. Cl. ............................ G06F 15/163; G06F 9/00; “Introduction to Windows 95 Device Drivers,” DDK. Win G06F 9/46 dows 95 Device Driver Kit, Microsoft Developer Network 52 U.S. Cl. .................... 395/681; 395/828; 364/222.81; Library CD, Apr. 1996. 364/955 “DOS/Win32 Installable File System Specifications' DDK. 58 Field of Search ..................................... 395/680, 682, Windows 95 Device Driver Kit, Microsoft Developer Net 395/681 work Library CD, Apr. 1996. “StuffIt SpacerSaver User's Guide,” Aladdin System, Inc., 56) References Cited Sep. 1994, pp. 19-28. U.S. PATENT DOCUMENTS Primary Examiner Lucien U. Toplu 5,414,850 5/1995 Whiting .................................. 395/682 ASSistant Examiner-Peter Stecher 5,457,681 10/1995 Gaddis et al.. 5,572,209 11/1996 Farmer et al. ............................ 341/67 Attorney, Agent, or Firm Arnold White & Durkee 5,628,010 5/1997 Ooishi et al.
    [Show full text]
  • Steganography and Vulnerabilities in Popular Archives Formats.| Nyxengine Nyx.Reversinglabs.Com
    Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.| NyxEngine nyx.reversinglabs.com Contents Introduction to NyxEngine ............................................................................................................................ 3 Introduction to ZIP file format ...................................................................................................................... 4 Introduction to steganography in ZIP archives ............................................................................................. 5 Steganography and file malformation security impacts ............................................................................... 8 References and tools .................................................................................................................................... 9 2 Introduction to NyxEngine Steganography1 is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well. Steganography imposes the following data hiding rule: Data must be hidden in such a fashion that the user has no clue about the hidden message or file's existence. This can be achieved by
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • Ms-Dos / Pc-Dos Ms-Dos / Pc-Dos Ms-Dos / Pc-Dos Ms
    MS-DOS / PC-DOS CSC414 Forensic Overview: Computer Microsoft Disk Operating System System MS-DOS - PC-DOS was IBM's version for its PC Fundamentals and Programs usually self-contained - Programs were segregated Windows 3.11 - Program files in a single directory - Copy program directory to another system and run it Digital Forensics Center Boot Disks only need three files Department of Computer Science and Statics THINK BIG WE DO - command.com U R I - config.sys http://www.forensics.cs.uri.edu - io.sys MS-DOS / PC-DOS MS-DOS / PC-DOS Single user system File names limited to 8 - Only one program could run at a time characters with 3 character - Terminate and stay resident (TSR) extension programs were an exception - No strong association between file - Utilities, viruses, key-loggers extension and type Simple Operating System - Users could use extension for Environment filename or initials - No shared device drivers - Could not search for .doc for *all* - Device drivers integrated in to programs documents - No shared .dll files (Dynamically Some common applications Linked Library) - No Windows registry - Lotus 1-2-3, Microsoft Multiplan - Each program used a .ini or .cfg file - Word Perfect, Microsoft Word MS-DOS / PC-DOS Windows 3.11 Digital Forensics didn't exist Provided a GUI interface to DOS - No special forensics tools - Not it's own operating system - Had to relay on system tools and - GUI replaces command line interface programs Windows 3.11 - Icons were short-cuts to programs - UNDELETE, UNFORMAT - Files represented as icons or
    [Show full text]
  • Acronis Os Selector As a Boot Manager
    User's Guide OS Selector 8.0 Compute with confidence www.acronis.com Copyright © SWsoft, 2000-2002. All rights reserved. Linux is a registered trademark of Linus Torvalds. OS/2 is a registered trademarks of IBM Corporation. UNIX is a registered trademarks of The Open Group. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS YOU MAY CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. The OS Selector (the Software) is copyright © 2000-2002 by SWsoft. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1. The license is to the original purchaser only, and is not transferable without prior written Permission from SWsoft. 2. The Original Purchaser may use the Software on a single computer owned or leased by the Original Purchaser.
    [Show full text]
  • Microsoft Windows for MS
    Month Year Version Major Changes or Remarks Microsoft buys non-exclusive rights to market Pattersons Quick & Dirty Operating System from December 1980 QDOS Seattle Computer Products (Developed as 86-DOS) (Which is a clone of Digital Researches C P/M in virtually every respect) Microsoft buys all rights to 86-DOS from Seattle Computer Products, and the name MS-DOS is July 1981 86-DOS adopted for Microsoft's purposes and IBM PC- DOS for shipment with IBM PCs (For Computers with the Intel 8086 Processor) Digital Research release CP/M 86 for the Intel Q3 1981 CP/M 86 8086 Processer Pre-Release PC-DOS produced for IBM Personal Mid 1981 PC-DOS 1.0 Computers (IBM PC) Supported 16K of RAM, ~ Single-sided 5.25" 160Kb Floppy Disk OEM PC-DOS for IBM Corporation. (First August 1982 PC-DOS 1.1 Release Version) OEM Version for Zenith Computer Corporation.. (Also known as Z-DOS) This added support for September 1982 MS-DOS 1.25 Double-Sided 5.25" 320Kb Floppy Disks. Previously the disk had to be turned over to use the other side Digital Research release CP/M Plus for the Q4 1982 CP/M Plus Intel 8086 Processer OEM Version For Zenith - This added support for IBM's 10 MB Hard Disk, Directories and Double- March 1983 MS-DOS 2.0 Density 5.25" Floppy Disks with capacities of 360 Kb OEM PC-DOS for IBM Corporation. - Released March 1983 PC-DOS 2.0 to support the IBM XT Microsoft first announces it intention to create a GUI (Graphical User Interface) for its existing MS-DOS Operating System.
    [Show full text]
  • Blade of Destiny REALMS
    REALMS of ARKANIA Blade of Destiny 1 Passwords Page Line Word Password Page Line Word Password 3 1 3 TRIBES 39 2 1 SPELL 3 4 1 HISTORY 39 4 6 INFORMATION 11 1 4 APPLY 39 5 2 ARCANE 11 6 5 GROUNDS 43 1 7 SOULS 11 9 1 TUNNELS 43 4 4 MISSIONS 14 3 4 UNLIKE 47 1 4 BEST 14 9 2 BUTTON 47 7 2 DIVINE 17 1 7 NEGATIVE 51 2 4 PASSAGE 17 2 1 POSITIVE 51 3 8 VESSELS 17 3 5 SEVEN 51 6 2 HARBOR 20 3 5 LUCK 60 2 6 LIFE 20 5 1 CHARACTER 60 4 1 SOMETIMES 23 1 6 VALUES 63 1 6 PARRY 23 3 8 MISSILE 63 2 2 MOMENTUM 23 7 1 EVENLY 63 7 9 MONSTER 27 1 6 HECTIC 76 1 3 RITUALS 27 6 2 POINTS 76 3 1 PERMANENT 31 2 9 RIVERS 88 1 6 REGULARE 31 5 3 CLICK 88 3 3 STRENGTH 31 7 1 SATISFACTION 88 6 1 LEVEL 35 1 1 LOCATION 94 2 3 HERBS 35 3 4 REPORTS 94 4 3 THEIR 36 1 4 SHAKERS 96 1 3 INFECTION 36 5 3 MEMBER 96 5 5 MATTER 36 9 3 CURRENT 96 9 1 SKILL 2 Table of Contents: Installation ....................................................................................................... 4 1. Before you install ...................................................................................... 4 2. Installing Realms of Arkania ...................................................................... 4 3. Starting Realms of Arkania ........................................................................ 4 4. Music and Sound Effects ........................................................................... 5 5. Main Program or Generation ..................................................................... 5 Troubleshooting .............................................................................................. 6 Adventuring Screen Summary ......................................................................... 8 The Main Screen ...........................................................................................
    [Show full text]