Counteracting Viruses in MS-DOS Systems

Total Page:16

File Type:pdf, Size:1020Kb

Counteracting Viruses in MS-DOS Systems 86-01-35 Counteracting Viruses in MS-DOS Previous screen Systems A. Padgett Peterson Payoff The trapdoors programmed into the first DOS-based personal computers still persist today, providing relatively easy access for viruses and worms. By learning how malicious software exploits these weaknesses, security managers can develop a coordinated defense to counteract virus attacks now and in the future. This article describes how MS-DOS start- up processes can become exposed to viruses, discusses various intrusion methods, and presents techniques for designing a safe computing environment. Problems Addressed Today's personal computers still bear striking similarities to the first units created during the 1970s. All of the trapdoors and loopholes developed by systems experts to permit BIOS-level programming in the early stages of development of these systems are still present today, providing easy access for viruses, worms, logic bombs, and Trojan horses. It is alarming that such low-level programs are no longer being fully documented by manufacturers; they are currently treating as proprietary the techniques that were widely disseminated just a few years ago. Administrators and systems managers who are responsible for the millions of dollars of corporate investment in trusted computing systems typically lack an in-depth understanding of these systems. Unfortunately, penetration techniques, though not readily available, are known to an underground of hackers. Although numerous antivirus products have become available, these products are as available to hackers as to legitimate users. Fortunately, defenses are available to the corporate systems manager that cannot be readily compromised by the individual computer user. A trusted computing environment can be developed that is low in cost and user impact, one that not only has a high degree of reliability but permits natural and easy growth. This article provides a basis for developing such an environment. Focusing on the MS- DOS-based computing environment, the article identifies potential security weaknesses introduced during the development of the IBM PC (and its clones) and the MS-DOS operating system. It reviews methods of intrusion, both current and expected in the near future, and concludes by presenting a set of automated and procedural methods for counteracting these threats. Development of MS-DOS-Based Systems The trapdoors introduced by systems experts in the early development of the personal computer still remain in the most recent versions of MS-DOS-based systems. To fully understand the vulnerability of today's systems to attack by computer viruses, the security specialist must become familiar with the way these systems were developed. The systems most widely used today are based on the design of the Intel 8086 microprocessor, the successor to the Intel 8080 family of microprocessors. When introduced in 1979, the Z-80 and the Intel 8080were the best-known microprocessors; Zylog had also recently announced its 16-bit Z-8000. The reception to the Intel 8086 was lackluster at best, despite Intel's promise to port CP/M to the 8086 (as soon as Digital Research could get around to it) and to provide MASM-86, its macro-assembler. The Air Force had just announced MIL-STD-1750 for 16-bit processors, and the 8086 didn't satisfy this standard. Enter IBM. A large market for microcomputers was forming, and Big Blue did not Previous screen want to miss out. IBM decided to leapfrog its competition, quietly opening a plan in Boca Raton FL to design a new personal computer targeted for introduction in 1981. This computer was originally planned as an 8-bit machine; IBM's EBCDIC coding protocol was abandoned in favor of ASCII. Intel offered IBM its 8088 microprocessor(an 8086 redesigned to accommodate an 8-bit data path) at a price IBM could not refuse, and a deal was made. Because IBM was a bit out of touch with single-tasking environments, it contracted with an outside vendor, Microsoft, for a disk operating system (DOS). Microsoft did not have a suitable operating system but arranged for a reciprocal agreement with Seattle Computer Products for use of Tim Paterson's 86-DOS, a CP/M clone. Microsoft later bought all rights to 86-DOS. Although present-day PC-DOS is much expanded—providing hooks for such functions as the rarely seen Macro-Assembler, Quick-BASIC, FORTRAN, and Pascal—in its underlying architecture, it deviates little from CP/M. In its first personal computers, IBM included a software bit that could be set to make a program executable but not readable or listable—the first copy protection. Hackers quickly learned how to use the BASIC POKE command to defeat this protection, leading to the first shareware (UN.P) and the attitude that it was open season on software: if you could obtain it, it was yours to run. The open season extended to cloning as well, and copies soon proliferated; some were so well executed that the IBM logo even appeared in their BIOS, leading to the first copyright infringement suits. To help market those first personal computers, IBM used an open architecture, supplying applications programmers with in-depth engineering specifications that documented exactly how the computer worked and encouraging them to develop such programs as spreadsheets and word processors. Unfortunately for IBM, the architecture was a bit too open: Microsoft made PC-DOS available to anyone as MS-DOS after changing only a few invisible names, which further heated up the clone wars. Nonetheless, by 1983 the standard created by IBM came to dominate the industry, as it does today. This evolutionary process has led to 486-based machines, with mainframe performance, multiuser networking, and multimegabyte memory. Despite such advances, however, that first IBM PC is still seen in every MS-DOS- based machine today (e.g., 64K-byte segments and a 640K-byte limitation on main memory). From a security perspective, this apparent strength of the IBM PC (and its clones) has become its most dangerous weakness: there have been no significant deletions from the operating system architecture since 1981. This is not to say that extensions have not been added. For example, with the introduction of MS-DOS 2.0 in 1983, the pervasive high-level interrupt INT 21h took over many of the low-level functions of the system. Previously, the BIOS communicated with external devices through the use of 32 basic interrupts, INT 00 through INT 1Fh. Only a few interrupts—for example, INT 10h (the display handler), INT 13h (the disk handler), and INT 16h (the keyboard handler)—had more than one function; all had less than 16. In MS-DOS 3.30, INT 21h has more than 100 functions, replacing nearly every low-level interrupt. The low-level interrupts are still supported, however, though not all are documented in the latest DOS technical manual. Most viruses infect systems through these low-level interrupts for one reason: although interrupts INT 20h through INT FFh are loaded by DOS, the BIOS loads INT 00 through INT 1Fh at boot time. In any IBM PC(or fully compatible microcomputer), these interrupts must be exactly as defined by PC/MS-DOS 1.0. This is why a 1982 Columbia BIOS can run easily with MS-DOS 3.3 and be upgraded to 5.0. This is also why a virus written in 1982 under DOS 1.25 is just as infectious in 1992. A Review of MS-DOS Start-Up Processes Previous screen Because the microcomputer is most vulnerable to infection during start-up, it is important to understand the process that all MS-DOS machines use to wake up, load files, and execute applications. When powered on, the 8086 CPU automatically sets its instruction pointer(IP) to location 0h of memory segment FFFFh, the last segment of memory addressable by the 20 bits available to an 8088/8086microprocessor. (Although the 186, 286, 386, and 486 microprocessors have more bits available, MS-DOS does not recognize them.) This memory area is devoted in every personal computer to the BIOS ROM. The CPU then runs some equipment checks on the system (i.e., the Power-on Self Test [POST] function), zeroing memory while discovering how much available memory is present; stores this amount in the BIOS data table at locations 413h and 414h; defines interrupts 00 through 1Fh in the interrupt table in segment 0, locations 00 to 3FFh; examines even segment addresses from A000 to F000 for ROM extensions; and finally performs an INT 19h to start the DOS boot-up process. This boot process, which is the same one triggered by pressing [CNTRL] [ALT] [DEL] , next attempts to read the first sector (1,024 bytes) of disk drive 0(i.e., drive A—the first diskette drive) into segment 0, locations 7C00h through 7FFFh. If this fails, the BIOS will attempt to read the first sector from drive 2 (i.e., drive C, the fixed disk). Failing this, a true IBM PC will branch to ROM BASIC by executing an INT 18h. Most clones, lacking ROM BASIC, will react to an INT 18h by sending a message requesting a bootable disk; the clone will retry an INT 19h after a keystroke has been entered. Execution is next transferred to the code that was just loaded into location 7C00h. With a hard drive, this information (which is contained in the partition table at physical sector 0) describes the logical disks, including the boot record. The sole purpose of the boot record is to find the first of two operating system files containing the rest of DOS (IBMBIO.COM and IBMDOS.COM for PC-DOS; in MS-DOS, these are IO.SYS and MSDOS.SYS), load them into low memory (just above the 400h table values), and transfer control to the operating system for the rest of the configuration.
Recommended publications
  • An Inside Look at MS-DOS, June 1983, BYTE Magazine
    An Inside Look at MS-DOS The design decisions behind the popular operating system Tim Paterson Seattle Computer Products 1114 Industry Dr. Seattle, WA 98188 The purpose of a personal com- often on the first try. Unfortunately, read-only memory). Both of these puter operating system is to provide many of the software developers tools had been developed in house. the user with basic control of the Seattle Computer talked to in the machine. A less obvious function is to earlier days preferred to simply ig- MS-DOS Organization furnish the user with a high-level, nore MS-DOS. Until the IBM Per- The core of MS-DOS is a device- machine-independent interface for sonal Computer was announced, independent input/output (I/O) han- application programs, so that those these developers felt that CP/M-86 dler, represented on a system disk by programs can run on two dissimilar would be the operating system of the hidden file MSDOS.SYS. It ac- machines, despite the differences in 8086/8088 computers. cepts requests from application pro- their peripheral hardware. Having Other concerns crucial to the grams to do high-level I/O, such as designed an 8086 microprocessor card design of MS-DOS were speed and ef- sequential or random access of named for the S-100 bus and not finding an ficiency. Efficiency primarily means disk files, or communication with appropriate disk operating system on making as much disk space as possi- character devices such as the console. the market, Seattle Computer Prod- ble available for storing data by mini- The handler processes these requests ucts set about designing MS-DOS.
    [Show full text]
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • Virus Bulletin, January 1993
    January 1993 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Richard Ford Technical Editor: Fridrik Skulason Consulting Editor: Edward Wilding Advisory Board: Jim Bates, Bates Associates, UK, Andrew Busey, Datawatch Corporation, USA, David M. Chess, IBM Research, Phil Crewe, Fingerprint, UK, David Ferbrache, Defence Research Agency, UK, Ray Glath, RG Software Inc., USA, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, John Laws, Defence Research Agency, UK, Tony Pitts, Digital Equipment Corporation, UK, Yisrael Radai, Hebrew University of Jerusalem, Israel, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Prof. Eugene Spafford, Purdue University, USA, Dr. Peter Tippett, Certus Corporation, USA, Steve R. White, IBM Research, Dr. Ken Wong, PA Consulting Group, UK, Ken van Wyk, CERT, USA. CONTENTS SCANNER UPDATE 1993 Scanner Shoot-Out 8 EDITORIAL Imageline v. McAfee 2 VIRUS ANALYSES NEWS 1. The CMOS1 Virus 13 2. DOSHUNTER - Search S&S Caught Out 3 And Destroy 15 Chinese Whispers 3 3. Penza - Variations on a Familiar Theme 16 A Rose By Any Other Name 3 PRODUCT REVIEWS IBM PC VIRUSES (UPDATE) 4 1. IBM AntiVirus 18 INSIGHT 2. PC Tools 8 21 Scotland Yard’s Virus Hunters 6 END NOTES & NEWS 24 VIRUS BULLETIN ©1993 Virus Bulletin Ltd, 21 The Quadrant, Abingdon Science Park, Oxon, OX14 3YS, England. Tel (+44) 235 555139. /90/$0.00+2.50 This bulletin is available only to qualified subscribers.
    [Show full text]
  • Introduction to MS-DOS
    1.Introduction to MS-DOS : MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. It was essentially the same operating system that (Bill Gates's) young company developed for IBM as Personal Computer - Disk Operating System in 1981. Most users of either DOS system simply referred to their system as Disk Operating System. Like PC-DOS, MS-DOS was (and still is) a non-graphical line-oriented command- driven operating system, with a relatively simple interface but not overly "friendly" user interface. Its prompt to enter a command looks like this: C:\> MS-DOS does not care about anything called an icon, wallpaper or screen saver. Rather than being considered as a Graphical User Interface (GUI) MS-DOS is what is known as a command-line interface. You type commands on what is called the command line. MS-DOS is a single-user, single-tasking computer operating system. In spite of its very small size and relative simplicity, it is one of the most successful operating systems that has been developed to date. In DOS, a file name consists of eight character followed by a 3 character file extension. The size of a file is restricted to a 4 byte file descriptor, which limits a file’s maximum size to approximately 4 billion characters. The first release of DOS could not read or write to disk drives so users could only read and write to a floppy disc. DOS was not a state of the art operating system, even for its time.
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • Newsletter of Stanford Palo Alto Users Group for PC
    ' mmm ~ I.__ __v_o_i_. _x_•_11_______ J_u_L_v_•_9_9s _________ N_o_ ._1_ __. Q Newsletter of Stanford Palo Alto Users Group for PC Q TABLE OF CONTENTS President's Piece Brain Christopher, SPAUG President 2 ~ New BBS Kendric Smith 2 Banks, Microsoft, and Online Banking Larry Weinberg J Norton DeskTop for Windows Lee Ammons 4 Internet Access in Public Libraries s Renewals 6 Anti-Virus for OS/2 David Varney 7 Why I Like OS/2 Jack Cook 8 Internet SIG 9 Membership Application 10 Resource Center SP AUG 11 ..... Ji GENERAL MEETING McAFEE ASSOCIATES - Latest Anti-Virus Software INCAT SYSTEMS - YAMAHA Recordable CD-ROM WATERGATE SOFTWARE - PC Doctor for IRQ Conflicts WEDNESDAY. JULY 26, 7:3 PM SPAUG NOW HAS A Conference ON A LOCAL First Class BBS. Nick Chinn. the Sysop (system operator) of Dead Winners Dog Party.has kindly provided space on his BBS for A new adventure is a click away for prize an interactive Conference for SPAUG. All you need winners at the June General Meeting. Del Philpott is a computer with a modem. Just dial (415) 968- and Clark Moore both won Pixar's Typestry. Frank 7919. You will see a few introductory screens of Kimbel and Bill McElhrney won Ares software information and be prompted to enter a User ID and Font Minder and Font Chameleon . Larry Turpen a password. New users will be prompted lo fill out won the Better Homes & Garden's Healthily a registration form. Cooking. After logging on, go to Conferences and select BBS Closed SPAUG. You can read what has been posted by other, and you can post your own material that you On July 5th, the Board of Directors feel will be of interest to others in the PC unanimously voted lo close the SPAUG BBS.
    [Show full text]
  • MS-DOS Lecture
    MS-DOS 2017 University of Babylon College of Engineering Electrical Department Learning Basics of MS-DOS Assis. Lec. Abeer Abd Alhameed | 1 MS-DOS 2017 Outcomes: By the end of this lecture, students are able to: Define the MS-DOS system Log in MS-DOS commands system Display MS-DOS information on your computer Type basic commands of MS-DOS system (view directory contents, change directory, make directory) Assis. Lec. Abeer Abd Alhameed | 2 MS-DOS 2017 Learning of MS-DOS Basics: Definition - What does Microsoft Disk Operating System (MS- DOS) mean? The Microsoft Disk Operating System (MS-DOS) is an operating system developed for PCs (personal computers) with x86 microprocessors. It was the first widely-installed operating system in personal computers. It is a command-line-based system, where all commands are entered in text form and there is no graphical user interface. The Command Prompt: When you first turn on your computer, you will see some information flash by. MS-DOS displays this information to let you know how it is configuring your computer. You can ignore it for now. When the information stops scrolling past, you'll see the following: C:\> This is called the command prompt or DOS prompt. The flashing underscore next to the command prompt is called the cursor. The cursor shows where the command you type will appear. Typing a Command: This section explains how to type a command at the command prompt and demonstrates the "Bad command or file name" message. • To type a command at the command prompt 1. Type the following at the command prompt (you can type the command in either uppercase or lowercase letters): nul If you make a typing mistake, press the BACKSPACE key to erase the mistake, and then try again.
    [Show full text]
  • Computing :: Operatingsystems :: DOS Beyond 640K 2Nd
    DOS® Beyond 640K 2nd Edition DOS® Beyond 640K 2nd Edition James S. Forney Windcrest®/McGraw-Hill SECOND EDITION FIRST PRINTING © 1992 by James S. Forney. First Edition © 1989 by James S. Forney. Published by Windcrest Books, an imprint of TAB Books. TAB Books is a division of McGraw-Hill, Inc. The name "Windcrest" is a registered trademark of TAB Books. Printed in the United States of America. All rights reserved. The publisher takes no responsibility for the use of any of the materials or methods described in this book, nor for the products thereof. Library of Congress Cataloging-in-Publication Data Forney, James. DOS beyond 640K / by James S. Forney. - 2nd ed. p. cm. Rev. ed. of: MS-DOS beyond 640K. Includes index. ISBN 0-8306-9717-9 ISBN 0-8306-3744-3 (pbk.) 1. Operating systems (Computers) 2. MS-DOS (Computer file) 3. PC -DOS (Computer file) 4. Random access memory. I. Forney, James. MS-DOS beyond 640K. II. Title. QA76.76.063F644 1991 0058.4'3--dc20 91-24629 CIP TAB Books offers software for sale. For information and a catalog, please contact TAB Software Department, Blue Ridge Summit, PA 17294-0850. Acquisitions Editor: Stephen Moore Production: Katherine G. Brown Book Design: Jaclyn J. Boone Cover: Sandra Blair Design, Harrisburg, PA WTl To Sheila Contents Preface Xlll Acknowledgments xv Introduction xvii Chapter 1. The unexpanded system 1 Physical limits of the system 2 The physical machine 5 Life beyond 640K 7 The operating system 10 Evolution: a two-way street 12 What else is in there? 13 Out of hiding 13 Chapter 2.
    [Show full text]
  • Wikipedia: Design of the FAT File System
    Design of the FAT file system A FAT file system is a specific type of computer file system architecture and FAT a family of industry-standard file systems utilizing it. Developer(s) Microsoft, SCP, IBM, [3] The FAT file system is a legacy file system which is simple and robust. It Compaq, Digital offers good performance even in very light-weight implementations, but Research, Novell, cannot deliver the same performance, reliability and scalability as some Caldera modern file systems. It is, however, supported for compatibility reasons by Full name File Allocation Table: nearly all currently developed operating systems for personal computers and FAT12 (12- many home computers, mobile devices and embedded systems, and thus is a bit version), well suited format for data exchange between computers and devices of almost FAT16 (16- any type and age from 1981 through the present. bit versions), Originally designed in 1977 for use on floppy disks, FAT was soon adapted and FAT32 (32-bit version used almost universally on hard disks throughout the DOS and Windows 9x with 28 bits used), eras for two decades. Today, FAT file systems are still commonly found on exFAT (64- floppy disks, USB sticks, flash and other solid-state memory cards and bit versions) modules, and many portable and embedded devices. DCF implements FAT as Introduced 1977 (Standalone the standard file system for digital cameras since 1998.[4] FAT is also utilized Disk BASIC-80) for the EFI system partition (partition type 0xEF) in the boot stage of EFI- FAT12: August 1980 compliant computers. (SCP QDOS) FAT16: August 1984 For floppy disks, FAT has been standardized as ECMA-107[5] and (IBM PC DOS 3.0) ISO/IEC 9293:1994[6] (superseding ISO 9293:1987[7]).
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • A Look at Video Binders 18 Daetron 29 Cameras, Vcrs, and a Sound Converter
    *.4 October 1984 Canada's Magazine for Electronics & Computing Enthusiasts A Lookat video Cameraslind VCRs Project Bonanza 0.3, Ten short oiler_ lbw Video Distrib Amp Rqpiace boX with a video am *IR Immo. *14 .10101t 71. 10 1 2 - 3 - 2 0 Computer Review: 5 74 3 70924 EXCELTRONIXTORONTO HAMILTON OTTAWA 319 College 72 James St. N. 217 Bank Some prices will go up October, 30th, 1984 1(416)921-8941 1(416)522-4124 1(613)230-9000 Gemini 10X Peripherals 3" Drive for your Apple Apple Compatable to be released soon at an Interface for your Apple unbelievable low price! 1 year warranty e435.00 120 Day Warranty CSA Approved ". 16K RAM Card 554.95 Systems Z80 Card $52.00 Apple //c $1549 5" Monitors Crn 559 Parallel Printer Card $65.00 Apple Macintosh from $3195 (Brand new open frame from Electrohome) RO x 24 Video with soft switch card .$84.00 128K Card - 64K of RAM $117.0010 Meg Hard Disk 128K Card - 128K of RAM $185.00Drive & Controller 51498 KEPCO Heavy Duty EPROM Programmer (with software) .569.00 which plugs right into your machine Switching Power Supply (programs 2716, 2732, 2764) (90 watts max.) Serial Card 579.00 Modem Card $199.00 115V or 220V provision filter and fuse SYSTEM MATE * on board, provides you with +5, PREVENT DOWNTIME, YOTRECIPI°;LIETA + 12, -12, gives you enough power Disk Drives to handle your system plus several for your Apple 5245 LOST DATA, CIRCUIT 585.00 drives with 3.8A on + 12 1 Year Warranty Special price DAMAGE,SERVICING.
    [Show full text]