A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University

Total Page:16

File Type:pdf, Size:1020Kb

A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support. Therefore, any reasonalble acknowledge­ ment could only be a partial list of all those who stood by me during this protracted ordeal. The mere listing that I do provide is, at best, an unworthy expression of the extent of their contribution, and in no way could totally express my deepest and sincerest gratitude. I would first and foremost like to thank Dr. Edwin Kay, ) my advisor, for taking on this project with me, despite the fact that for the past six months we have lived on opposite . " . I sides of the continental U.S. I would especially like to thank Dr. Green for his invaluable assistance. Those two hours he spent with me one August morning not only elimi­ nated my apprehension toward manipulating the Apple II's hardware, but also rescued this project from its nearly. lethal quagmire and set it onto a steady course to comple­ tion. I would also like to express my appreciation to Lois Swigart, the secretary for the Psychology Department, for her • • • -111- .' 'l support and assistance with the numerous administative duties and dealings necessitated by my work. I would like to acknowledge the following people for their technical assistance: Samuel Gulden, Dr. Martin Richter, Dr. George Shortess, Dr. s. Lloyd Williams,_Dr.···- Richard Kimbal, Dr. Abdulah Hakawati, Dr. Leroy Tusher, Dr. James Gimple, Frank da Cruz, Peter Floriani, Steve Lidie, William Reynolds, Phillip Goldman, Steve Corbesero, William Mirth, Timothy Foley, Blair Bernhardt, Mark Miller, Deborah McCauley, and last but not least my brother, Frank F. Francisco III. In addition I would like to thank my parents, family and friends for their moral and, in \he case of my father, his financial support, with special thanks to John-Austen McCauley, J. Jeffery Briggs, David Masters, and Dr. John Wydila. Finally I wish to dedicate this work to those who remain. -1v-I TABLE OF CONTENTS Abstract 1 Introduction 3 Chapter 1: Background 6 Chapter 2: The Kermit Protocol 12 Overview 12 System Requirements 13 Terminal Emulation 15 File Transfer 17 Packet Format 30 Negotiations 41 File Types 48 Optional Feature 53 Chapter 3: File Structures 56 Apple II 57 DEC-20 60 Cyber 66 Chapter4: Implementation 74 Conclusion 126 0 Bibliography 127 Appendix A: KERMIT User's Manual 129 Appendix B: Illustrative Programs ·143 . Biography of Author 150 -v- ' ' LIST OF FIGURES 1. Text file transfer from the DEC-20 to the Apple II (File includes line numbers) 29 ,:.. 2. Kermit.packet structure 31 3. Subfields of an Initial Packet Data field 31 4. Packet checksum calculation in binary 38~ 5. Send Initiate Packet breakdown a. DEC-20 49 b. Cyber 50 c. Apple II 51 6. Line structure of an Apple Pascal file 58 7. File structure of an Apple Pascal file 59 8. File transfer from the Apple to the DEC-20 61 9. Line structure of a DEC-20 text file 62 10. File structure of a DEC-20 text file a. including line numbers 64 b. without line numbers 64 c. line numberless file transfer from the DEC-20 65 11. Line structure of a Cyber text file 67 12. File structure of a Cyber text file 70 a. including line numbers ' . b. without line numbers 70 -v1-• 13. File transfers from the Cyber a. without line numbers 71 b. including line numbers 72 14. Externally defined assembly-language procedure 77 15. External variable refe{ence and definition 82 16. External reference routing mechanisms a. control routing routine 83 b. external referencing macros 84 17. Apple Kermit corporate structure 86 18. Table of line addresses for Apple II screen memory 90 19. Screen manipulation routine 92 20. ACIA registers and related routines 97 21. Pascal/Assembly-language linking structures 101 22. Stack safety routine 105 23. Keyboard input routine 107 24. Portion of Adjust Baud routine 109 25. File data to packet data transformation 113 26. File creation routine 118 27. Automatic packet response routine 121 • • -Vll- ABSXRACT Developed by Bill Catchings and Frank da Cruz in the early 1980's, the Kermit protocol provides a means for two computers to exchange files, regardless of any dissimilar­ ities in hardware or software design, using standard tele­ communications equipment. The pr9tocol is implemented through the use of programs running on each of the comput­ ers involved in the commu~ication. These programs encode their system-specific data structures to a Kermit normal­ ized form when sending a file and translate this Kermit normalized form back again when receiving a file. In ad­ dition the file is broken down into small segments, called packets, and further encoded with self descriptive infor­ mation in an effort to maximize data integrity. With this simple design, all that is required to link any two comput­ ers together is to implement a Kermit protocol program on each of them and have access to a standard communication line. The paper centers around the development and imple- mentation of such a Kermit file transfer protocol program for the Pascal operating system on the Apple II series personal computers. The Kermit protocol itself is pre­ sented, and its packetizing process for file transfer ex­ amined. The history of the Kermit protocol is traced from its humble origins at Columbia University to its current -1- ' I international status. The dissimilar file structures of the three computers~involved in the intended communication (the DEC-20, Cyber and Apple II) are also discussed with regard to how these structures affect file transfers using . ,. ~ the Kermit protocol. Finally, an overview of the Pascal and 6502 assembly-language hybrid program, designed to im­ plement the Kermit protocol, is presented. t 0 -2- ' / .... INTRODUCTION The word "protocol" is derived from the Greek word "protokollon" ( "protos" meaning firs~ and "kollan" meaning to glue together). Protokollon referred to the first sheet of a papyrus roll which bore the data of man­ ufacture and other pertinent facts about the contents to follow. The Merriam-Webster Dictionary defines protocol as "a preliminary memorandum of diplomatic negotiation [or] a code of diplomatic or military etiquette and precedence." As it applies to computer communications, a protocol de­ fines the nature of the communication, specifying how to send, receive, and interpret the information or data that is being exchanged. Just as it was important for the Clas­ sical Greeks to read the "protokollon" first before the rest of the document, so is it imperative that computers are aware of the protocol before communication between them can be established. Today there are hundreds of distinct computer brands, each with its own hardware and software designs. Even the so-called "look-alikes" must be different in some way in order not to violate patent laws. Despite this, the de­ mands of today's information age require that computers ex- . change information quickly, efficiently, and reliably no ; matter what company produces them. For this reason, ther~ are<:~ numerous protocols designed for computer communica- -3- \ ,: -, tions. The Kermit file transfer protocol is just one of them. Unlike most, Kermit does not require additional ex­ pensive hardware devices, but relies solely on the most in­ expensive and readily available medium for data transfer today: the asynchronous telecommunications line. This protocol is carried out by two Kermit programs • running on a computer at either end of a serial communi­ cation line. A file on the computer designated as the sender is broken down into discrete segments called pack­ ets, encoded with control and signaling characters, and sent to the designated receiving computer, using an ASCII character-oriented transmission. The receiving computer ,,,,~- then reconstructs the file, interpreting the received pack­ ets and control characters in accordance with the Kermit protocol and with regard to its own internal structure. All that is necessary for any two computers to communicate, no matter how dissimilar, is to have programs designed to implement the Kermit protocol running on each of them and an asynchronous communication line running between them. There are a mulitiude of Kermit programs written for every type of computer from the largest mainframe to the smallest personal computer. At Lehigh University alone there exist Kermit programs for both the Cyber and DEC-20 mainframes as well as Kermit programs for the Zenith, IBM, and various other personal computers and micros.
Recommended publications
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • Oral History Interview with John Brackett and Doug Ross
    An Interview with JOHN BRACKETT AND DOUG ROSS OH 392 Conducted by Mike Mahoney on 7 May 2004 Needham, Massachusetts Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute John Brackett and Doug Ross Interview 7 May 2004 Oral History 392 Abstract Doug Ross and John Brackett focus on the background of SofTech and then its entry into the microcomputer software marketplace. They describe their original contact with the University of California at San Diego (UCSD) and licensing the p-System which had been developed there. They discuss the effort required to bring the program to production status and the difficulties in marketing it to the sets of customers. They talk about the transition from 8 bit to 16 bit machines and how that affected their market opportunities. They conclude with a review of the negotiations with IBM and their failure to get p-System to become a primary operating environment. That, and the high performance of Lotus 1-2-3, brought about the demise of the p- System. [John Brackett requested that the following information from Wikipedia, the free encyclopedia, be provided as an introduction to this oral history interview: “UCSD p-System or UCSD Pascal System was a portable, highly machine independent operating system based upon UCSD Pascal. The University of California, San Diego Institute for Information Systems developed it in 1978 to provide students with a common operating system that could run on any of the then available microcomputers as well as campus DEC PDP-11 minicomputers. UCSD p- System was one of three operating systems (along with PC-DOS and CP/M-86) that IBM offered for its original IBM PC.
    [Show full text]
  • Altair CP/M 2.2AT Ver 1.1 IOBYTE Implementation
    Altair CP/M 2.2AT Ver 1.1 CP/M 2.2AT supports an Altair 8800 computer with both an Altair and Tarbell floppy controller installed. Drives A & B are Altair drives 0 & 1. Drives C & D are Tarbell drives 0 & 1. The boot drive is always Altair drive 0. The Altair controller can be either the 8" or the 5.25" (mini-disk) controller as selected by conditional assembly. The BIOS uses track buffering to improve disk performance. Compared to a non-buffered BIOS, perfor- mance of program with substantial disk I/O improves by 25% to 75%. For the Altair drives, the same disk layout used by the original versions of Altair CP/M 1.4 and 2.2 is used. For the Tarbell controller, the standard IBM SSSD soft-sectored format is used. This BIOS provides full IOBYTE support to allow use of a variety of standard Altair I/O boards. See IOBYTE below. During cold boot, the BIOS looks for a Teletype on the console port and if detected (based on baud rate), subsequently follows any CR to the console device with a NULL to give the Teletype carriage time to reach the left margin. The send null flag (SNDNULL) is located immediately following the MODE and IOBYTE in memory so it can be over-ridden if needed. This BIOS adds a disk select timeout for the Altair 8" floppy so if a non-present or empty drive is select- ed, it will eventually timeout. To still allow the operator time to insert a disk, close the door, and wait for the drive enable one-shot to expire, the default timeout is set to seven seconds.
    [Show full text]
  • Call-A.P.P.L.E. Magazine 1982-8
    Call-A.P.P.L.E. Magazine • August 1982 ~.I~~c!)~-A ~ - ...P. P. L. E. APPLE PUGETSOUND PROGRAM LIBRARY EXCHANGE A W .. shinglon 51 .. 11.' Non-Profit Corpordlion Call-A.P.P.L.E. Magazine Issue Year 1982 Issue Month August Apple Pugetsound Program Library Exchange I Page 0001 of 0090 Call-A.P.P.L.E. Magazine • August 1982 II Volume V, Number 8 £L 75 UK, A Call -A.P.P.L.E. TECHNIQUE: Garbagemen Strike Page 9 A Call -A.P.P.L.E. APPLECATION: Total Recall PagelS A Call -A.P.P.L.E. REVIEW: BASIS 108 ... An Alternative Page 23 A Call -A.P.P.L.E. REVIEW: Spelling Programs Page 31 Apple Pugetsound Program Library Exchange Page 0002 of 0090 Call-A.P.P.L.E. Magazine • August 1982 H, II II Volume V, Number 8 August 1982 52.50 (53.00 Canada, £1. 75 UK. A Call -A.P.P.L.E. TECHNIQUE: Garbagemen Strike Page 9 A Call -A.P.P.L.E. APPLECATION: Total Recall PagelS A Call -A.P.P.L.E. REVIEW: BASIS 108 ... An Alternative Page 23 A Call -A.P.P.L.E. REVIEW: Spelling Programs Page 31 Apple Pugetsound Program Library Exchange Page 0003 of 0090 Call-A.P.P.L.E. Magazine • August 1982 THE PROWRITER COMETH. (And It Cometh On Like Gangbusters.) Evolution. It's InevItable. An eternal venty. Just when you thInk you've got it knocked. and you're resting on your laurels. some­ body comes along and makes a dinosaur out of you.
    [Show full text]
  • The Kermit File Transfer Protocol
    THE KERMIT FILE TRANSFER PROTOCOL Frank da Cruz February 1985 This is the original manuscript of the Digital Press book Kermit, A File Transfer Protocol, ISBN 0-932976-88-6, Copyright 1987, written in 1985 and in print from 1986 until 2001. This PDF file was produced by running the original Scribe markup-language source files through the Scribe publishing package, which still existed on an old Sun Solaris computer that was about to be shut off at the end of February 2016, and then converting the resulting PostScript version to PDF. Neither PostScript nor PDF existed in 1985, so this result is a near miracle, especially since the last time this book was "scribed" was on a DECSYSTEM-20 for a Xerox 9700 laser printer (one of the first). Some of the tables are messed up, some of the source code comes out in the wrong font; there's not much I can do about that. Also (unavoidably) the page numbering is different from the printed book and of couse the artwork is missing. Bear in mind Kermit protocol and software have seen over 30 years of progress and development since this book was written. All information herein regarding the Kermit Project, how to get Kermit software, or its license or status, etc, is no longer valid. The Kermit Project at Columbia University survived until 2011 but now it's gone and all Kermit software was converted to Open Source at that time. For current information, please visit the New Open Source Kermit Project website at http://www.kermitproject.org (as long as it lasts).
    [Show full text]
  • Pascal Quick Guide
    PPAASSCCAALL -- QQUUIICCKK GGUUIIDDEE http://www.tutorialspoint.com/pascal/pascal_quick_guide.htm Copyright © tutorialspoint.com PPAASSCCAALL -- OOVVEERRVVIIEEWW Pascal is a general-purpose, high-level language that was originally developed by Niklaus Wirth in the early 1970s. It was developed for teaching programming as a systematic discipline and to develop reliable and efficient programs. Pascal is Algol-based language and includes many constructs of Algol. Algol 60 is a subset of Pascal. Pascal offers several data types and programming structures. It is easy to understand and maintain the Pascal programs. Pascal has grown in popularity in the teaching and academics arena for various reasons: Easy to learn. Structured language. It produces transparent, efficient and reliable programs. It can be compiled on a variety of computer platforms. Features of the Pascal Language Pascal has the following features − Pascal is a strongly typed language. It offers extensive error checking. It offers several data types like arrays, records, files and sets. It offers a variety of programming structures. It supports structured programming through functions and procedures. It supports object oriented programming. Facts about Pascal The Pascal language was named for Blaise Pascal, French mathematician and pioneer in computer development. Niklaus Wirth completed development of the original Pascal programming language in 1970. Pascal is based on the block structured style of the Algol programming language. Pascal was developed as a language suitable for teaching programming as a systematic discipline, whose implementations could be both reliable and efficient. The ISO 7185 Pascal Standard was originally published in 1983. Pascal was the primary high-level language used for development in the Apple Lisa, and in the early years of the Mac.
    [Show full text]
  • March-April 1992 23 Lsi
    HE NSIDE TORIES Breaking the rules Teamwork, including a "Vulcan mind-meld," produced amazing results on a new family of HP computers. Passing the test Ned Barnholt, vice president and general manager of the Test and Measurement Organization, talks about the unfolding T&M revolution, page 6 Three parts, one whole 11 Chinese people in Hong Kong, Taipei and Bejing talk openly about a day when they'll be part of one vast, reunited country. Ifyou print them, they will come 14 We asked for your photos and (whew!) did you send them-more than 100 in all. Some of the best are included in this photo feature. Play it again, Len 18 HP Labs' Len Cutler gave up a promising musical career to be<.:ome the father ofthe world-famous HP atomic clock. Your Turn 21 page 22 It's another world 22 What has 75 countries, 60 currencies and is one of the most volatile parts of the world? HP's International Sales Branch. Letter from John Young 26 , .~ . .... ~ . ~ ExtraMeasure 28 ,. M.~.- .. r··'. m~ MEASURE ; lS ~ .' \\; . :'! Editor: Associa1e edilOfs: Graphic designer: Circulation: ., ." ... ., \. .' • Jay Coleman' Cornelio Bayley Thorncs J Brown Tricia Neal Chan On the cover: Jianhua Qi,- a BeHy Gerord' personnel rep In China Hewlett­ Packard's Beijing office, captures Measure is published six times a year for employees and associates of Hewlett-Packard Company. 11 is produced the beauty and majesty of the by Caporate Communications. Employee Communicalions Depanment. Mary Anne Easley. rncnager. Address Chinese Opera in Beijing with this correspondence 10 Measure. Hewlett-Packard Company, 2OBR.
    [Show full text]
  • Imperial College of Science and Technology, University of London, Department of Computing
    Imperial College of Science and Technology, University of London, Department of Computing. HIGH EFFICIENCY, CHARACTER-ORIENTED, LOCAL AREA NETWORKS by Martin Cripps This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy and the Diploma of Imperial College of Science and Technology, January 1988. For Clare Attempt the end His reasons are as two grains of wheat but never stand to doubt hid in two bushels of chaff. nothing's so hard You shall seek all day ere you find them but search and when you have found them will find it out they are not worth the search. Robert Herrick (1591-1674) William Shakespeare (1564-1616) 1 ABSTRACT This thesis explores the problem of interconnecting character-oriented devices over local area networks by investigating significant aspects of hardware, software, protocol and operational factors. It proposes effective and efficient solutions which were tested during a full-scale experiment The results of that experiment demonstrate convenient, cost-effective and reliable operation. The novelty of this investigation arises from its character-oriented approach. Much work has been carried out by others on local area networks which transfer blocks of data efficiently, however, a large majority of installed devices operate on a character-by-character basis and will continue so to do for some considerable time. This study is approached through analysis of the low efficiency of international standard networks for this class of device which defines the scope of this work. An original analysis of the potential mechanisms which can be used to give high efficiency and low delay for this class of transfer is then derived.
    [Show full text]
  • The Macintosh Programmer's Workshop
    The Macintosh Programmer’s Workshop Richard J. Meym and Jeff W. PaIrish,Apple Computer me Macintosh hen the Apple Macintosh was ming), a shell command language, and a introduced, it was clear that language for automating program builds. development WApple needed to provide acom- Originally developed for the Macintosh environment combines plete softwaredevelopmen t environment Plus, MPW now also runs on the Macin- for both itself and third-party developers. tosh SE and 11. a gPaphica1 intehce, The result was the Macintosh Program- This article focuses on the programde- Unix-like command mer’s Workshop.’ MPW includes a com- velopment environment rather than on IangUNe, and prehensive set of programming tools and the tools in that environment. Innovations handles several languages. It also com- not covered here include C and Pascal ex- immediate command bines the graphical interface common to tensions for extended-precision IEEE execution in any all Macintosh applications, a command floating-point numbers, tools to compile window. Here’s how language similar to the Unix shell lan- and decompile Macintosh resources (data guages, and Smalltalk’simmediate execu- structures used to describe menus, win- it works. tion of commands in any window. dows,and dialogues), and the MacApp ob Innovative features include an inte- ject-oriented generic application. grated command and editing language, redirection of input and output to win- History dows and to selected text in windows, a When the Macintosh was introduced in graphical interface for each command, January 1984, most software for it was writ- and userdefined menus, which associate ten using the Lisa Workshop, acrossdevel- shell commands with menu items.
    [Show full text]
  • The New Iphone SE Our Meetings
    The offcial journal of the Wellington Macintosh Society Inc Volume 37.04 – April 2020 Come to one of The new iPhone SE our meetings Online Monday 27 April 7:00 pm for 7:30 pm Subject: Catch-up, Q&A, Contact methods Online Monday 4 May 7:00 pm for 7:30 pm Subject: Picking a new Mac notebook iPad Group TBA Help Desk TBA Apple has reused the “iPhone SE” name to introduce a new iPhone with a low price and design similar to the iPhone models, but with the latest technology inside. Where to find us Due to the COVID-19 pandemic, we will not be able to hold physical meetings under alert level 4 or 3, and they may not be practical under alert level 2. In the meantime we will be running online meetings via Zoom, normally on the same monthly schedule as our Wellington meeting: the evening of the last Monday each month. Meeting invitations will be sent to members via email. If non-members or former members would like to attend a meeting on a trial basis, please email [email protected]. The Birth of the Wellington Apple Users INSIDE The President Writes p2 David’s Tech Guide p3 Group p10 Apple’s 44th birthday p5 Committee Contact Details p12 The Birth of iOS p8 CAPITAL APPLE – APRIL 2020 PAGE 1 The president writes ... With all these disruptions, there is now an opportunity to look at our vision for the future and to work out where we should be going. Looking back to the founding of the group in 1984, it was the young early adopters of computers that banded together in a mutual self help manner, as there was little support available.
    [Show full text]
  • IJREISS Volume2, Issue 6(June 2012) ISSN: 2250-0588 A
    IJREISS Volume2, Issue 6(June 2012) ISSN: 2250-0588 A COMPARATIVE STUDY OF DIFFERENTIATION BETWEEN MACINTOSH AND WINDOWS OPERATING SYSTEM Nandita Goyal Bhatnagar Department of CSE, ABES College, Ghaziabad, Uttar Pradesh, INDIA Vishal Gupta Department of CSE, G. B. Pant Engineering College, Pauri, Uttarakhand, INDIA Anubha Chauhan Department of CSE, G. B. Pant Engineering College, Pauri, Uttarakhand, INDIA ABSTRACT In this paper, we're comparing Apple computers running Macintosh and computers running the Windows operating system. We also show the timeline of different releases of both types of systems. By this comparison, the usability and effectiveness of these computers are judged in different scenarios. Also, this paper contains the term PC which stands for personal computer and could apply to Macs, Windows machines and computers running other operating systems alike, we're using it in the common vernacular as shorthand for a Windows machine. Keywords- Operating System, Apple Macintosh, Windows, Security. International Journal of Research in Engineering, IT and Social Sciences www.indusedu.org 77 IJREISS Volume2, Issue 6(June 2012) ISSN: 2250-0588 I. INTRODUCTION The Macintosh or Mac, is a series of personal computers (PCs) designed, developed, and marketed by Apple Inc. The first Macintosh was introduced by Apple's then-chairman Steve Jobs on January 24, 1984; it was the first commercially successful personal computer to feature a mouse and a graphical user interface rather than a command-line interface. The company continued to have success through the second half of the 1980s, first primarily because of the sales of the Apple II series remained strong even after the introduction of the Macintosh, only to see it dissipate in the 1990s as the personal computer market shifted toward the "Wintel" platform: IBM PC compatible machines running MS-DOS and Microsoft Windows.
    [Show full text]
  • (TIL) Apple II Articles
    ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Apple II Computer Family Technical Information ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Apple Technical Information Library (TIL) Apple II Articles ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Date March 1997 ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Source Compuserve Apple II Computer Family Technical Information Apple Technical Information Library (TIL) Apple II Articles : March 1997 : 1 of 681 ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ================================================================================ DOCUMENT March 1997 A2TIL.Catalog ================================================================================ Apple ][ Articles from the Apple Technical Information Library March 1997 -- David T. Craig ([email protected]) Columns: 1 - File name 2 - Pages (assumes 60 lines per page) 3 - Lines 4 - Longest line length 5 - Article title A2TIL001.TXT 6 358 84 Apple Tech Info Library Overview: How to Search for Articles A2TIL002.TXT 2 102 75 16K RAM / Language Cards: Alternate Suppliers A2TIL003.TXT 2 105 79 80-Column Text Card: Applesoft Control Codes (11/96) A2TIL004.TXT 1 31 78 80-Column Text Cards: Apple II & II Plus Compatibility (11/96) A2TIL005.TXT 1 27 76 Access II and Apple IIc Plus: No 40-Column Mode A2TIL006.TXT 1 15 77 Access II: Does Not Support VT100 Line Graphics A2TIL007.TXT 1 52 76 Access II: Specifications (Discontinued) A2TIL008.TXT 1 48 78 Apple 3.5 Drive: Description
    [Show full text]