The Apple CP/M Book Marray Arnow the Apple CPIM Book the Apple CP/M Book Murray Arnow, Ph.D

Total Page:16

File Type:pdf, Size:1020Kb

The Apple CP/M Book Marray Arnow the Apple CPIM Book the Apple CP/M Book Murray Arnow, Ph.D The Apple CP/M Book Marray Arnow The Apple CPIM Book The Apple CP/M Book Murray Arnow, Ph.D. Scott, ForeSDlan and CODlpany Glenview, Illinois London ISBN 0-673-18068-9 Copyright © 1985 Scott. Foresman and Company. All Rights Reserved. Printed in the United States of America. Library of Congress Cataloging in Publication Data Arnow, Murray. The Apple CP/M book. Includes index. 1. CP/M (Computer operating system) 2. Apple II (Computer)-Programming. 3. Apple II Plus (Computer)­ Programming. 4. Apple lIe (Computer)-Programming. I. Title. QA76.76.063A76 1985 001.64'2 85-2393 ISBN 0-673-18068-9 1 2 3 4 5 6 7-RRC-90 89 88 87 86 85 Apple II and Apple lIe are trademarks of Apple Computer, Inc. CP/M, ZSID, ED, DDT, STAT, PIP, and CP/M 2.0 Interface Guide are copyrighted by Digital Research, Incorporated. SoftCard and Premium SoftCard lIe are trademarks of Microsoft Corporation. WordStar is a trademark and is copyrighted by MicroPro International Corporation. 8080 and 8085 are trademarks of Intel Corporation. Z-80 is a trademark of Zilog, Incorporated. Pascal is a trademark of the UCSD Board of Regents. Diablo is a trademark of Xerox Corporation. Notice of Liability The information in this book is distributed on an "As Is" basis, without warranty. Neither the author nor Scott, Foresman and Company shall have any liability to customer or any other person or entity with respect to any liability, loss. or damage caused or alleged to be caused directly or indirectly by the programs contained herein. This includes, but is not limited to, interrupion of service, loss of data, loss of business or anticipatory profits, or consequential damages from the use of the programs. Preface The intent of this book is to introduce the Apple II, Apple II Plus, or Apple lIe computer user to the world of CP/M. The book is meant primarily to be a tutorial on CP/M and in this sense does not deviate greatly from the large library of books on that subject. This book differs in detail from the others in that the examples used and explanations given are aimed toward Apple users. It is assumed that the Apple user has a working knowledge of Apple DOS; when possible, comparisons are made to Apple DOS. There are many examples and detailed descriptions to aid those with less experience. Some of the explanations require a rudimentary knowledge of binary numbers. Appendix A gives an elementary review of binary numbers. There is a distinction between disk and diskette used throughout this book. An 8-inch floppy disk is called a disk. A 5IA-inch floppy disk is called a diskette. This com plies with standard usage. This distinction may seem artificial to an Apple user, but it is necessary. CP/M was first developed for 8-inch disk drives. The understanding of how CP/M works is directly related to this fact. The needs of advanced users are not ignored. A description of the Microsoft BIOS is included, with suggestions on modifications. It is assumed, however, that the advanced user has some programming skills at the assembly-language level and that he or she is familiar with the physical layout of the Apple. I have tried to make each chapter self-contained so that the reader need not search through the book whenever a new term or concept is introduced. The problem with such an approach is that it makes some repetition inevitable. My teaching experience has shown me, however, that, although repetition can be boring to some, it is often welcomed by others when unfamiliar material is introduced. Contents 1 Introduction 1 What Is CP/M? 1 Why Use CP/M? 2 2 Getting Started 4 Installing the CP/M Card 4 The A> Prompt 5 The Directory 5 Making Copies 6 A QUick Look at the System 6 3 The Structure of CPIM 9 The Memory Organization 9 The CCP 10 The Transient Command File 18 A Summary of CCP Built-in and Miscellaneous Commands 19 A Summary of CCP Line-Edit Commands 20 4 Fundamentals 21 The CP/M Concept 21 CP/M Devices 22 The Microsoft Use of Physical Devices 25 Disk I/O 25 5 The STAT Utility 29 Disk Space 29 File Size and Parameters 30 Altering File or Disk Status 31 Physical Device Assignments 32 Disk Parameters 33 User Areas 34 The STAT Help Command 35 A Summary of STAT Commands 35 8 The PIP Utility 37 Copying Files 37 File Concatenation 38 Error Conditions 39 Swapping Disks 39 The CCP Command Line 40 Copying Files to a Device 40 PIP Parameters 42 Special PIP Devices 48 A Summary of PIP Assignments 49 7 The SUBMIT Utility 52 8 The DDT Utility 55 Loading a Disk File into Memory 55 Saving Data to a Disk File 56 More on Loading a File 57 Displaying Memory 58 DDT Commands for the Nonexpert 59 DDT Commands for the Advanced User 61 9 The ED Program 69 Loading or Creating an ED File 69 Editing Text 70 An Example 72 ED Command-Mode Instructions 74 ED Insert-Mode Commands 79 Error Messages 79 10 The BIOS 81 BIOS Functions 81 The Microsoft Vector Jump Table 85 Other CP/M Requirements 87 Zero-Page BIOS Requirements 90 The Standard Microsoft SoftCard 91 Peripheral Cards 94 11 The Microsoft Version 2.20B BIOS 97 The BIOS Map 97 The CPM56.COM Map 101 The CPM56 Diskette Map 102 CPM56 Card Driver Entry Points 103 12 The Microsoft Version 2.23 BIOS 104 The BIOS Map 105 The CPM60.COM Map 110 The CPM60 Diskette Map III CPM60 Card Driver Entry Points 112 13 Patching the Microsoft Standard SoftCard BIOS 113 Squashing Microsoft Version 2.20B Bugs 113 Squashing Microsoft Version 2.23 Bugs 115 Using Other Slots for the Printer 115 Stopping the Printer from Double-spacing 119 Adding XON/XOFF Handshaking 120 14 The Microsoft Premium SoftCard lie (2.28 BIOS) 122 The Comparison to Earlier BIOS Versions 122 The PS lIe Hardware and Software'Configuration 123 PS lIe Standard 6502 BIOS Calls 128 The 6502 BIOS 135 The Z-80 BIOS 140 The PS lIe Diskette Map 143 15 Uploading and Downloading 144 Appendix A: Binary Numbers 147 The Definition of a Binary Number 147 The Hexadecimal Number 148 Converting Decimal to Hexadecimal Notation 149 More Definitions 150 Appendix B: ASCII 151 Appendix C: A Primer on Diskettes 155 The Physical Diskette 155 Sector Skewing 156 The CP/M Diskette 157 Appendix D: The CPIM RWTS (Versions 2.20B and 2.23) 159 Index 161 Introduction II What Is CP/M? CP/M is a copyrighted name belonging to Digital Research, Incorporated; it stands for Control Program for Microprocessors. CP/M is an operating system (aS). The term operating system is computer jargon for the collection of programs used by a computer to communicate with the world. This world as seen by a computer is its hardware, such as the keyboard, the display device, the printer, the disk drives, and any other devices that may be plugged in. A good operating system should permit the computer user to easily access the hardware. The disk drive is a special piece of hardware and in general requires a great deal of attention. The disk drive is used to read information from or write information to a magnetic disk placed in the drive (refer to Appendix C for a detailed description of disks and disk drives.) The disk may be thought of as a chalkboard where information can be written and saved or erased, as required. The problem with a disk is that, although information can be saved on it at arbitrary physical locations, these arbitrary locations cannot be random. This means that there must be a plan to putting information on a disk. Without a plan, the computer could never retrieve anything saved on a disk. Information is usually stored on a disk in physical segments calledfiles. The file locations are stored in a special disk area called the directory. Whenever new information is written to a disk, the as must create a file and put the address of its location in the directory. If the information is to be retrieved, then the as uses the directory data to find the file and read its contents back to the computer. An as must also be able to delete files, add information to a previously created file, and read a specified segment of information from a file. CP/M is an operating system that has become the de facto standard for computers using the Intel 8080 or 8080-compatible microprocessors. It is virtually impossible to find a computer using the Intel 8080, Intel 8085, or Zilog Z-80 microprocessor that doesn't feature CP/M as its as. Consequently, there is currently a tremendous inventory of programs, both commercial and in the public domain, available to the user. The 1 2 • Introduction remarkable thing about these programs is that they can run, with a few noted exceptions, on any computer operating under CP/M. The reason for this is the machine-independent structure of CP/M; details of the CP/M's internal workings are covered later in this book. II Why Use CP/M? As an Apple owner you are probably wondering what justification there is for installing a CP/M operating system in your computer. There are three reasons serious Apple users such as business people and programmers should consider. The first reason is that you can tap into a source of program material not available under Apple DOS.
Recommended publications
  • CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
    CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru­ mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas­ tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math­ ias Payer.
    [Show full text]
  • Go Forth with TTL !
    Go Forth with TTL ! The Gigatron TTL Color Computer Forth for a Very Unusual Processor Ken Boak SV Fig. Forth Day 2019 . In September of 1975, MOS Technology launched the 6502 at the Wescon75 Computer Conference in San Francisco. Chuck Peddle and his team had created a very lean, stripped down, small die cpu. Costing just $25, the 6502 was a fraction of the cost of its nearest competitor. At that time the Intel 8080 was $360 and the Motorola 6800 was $175 . The 6502 was clearly a disruptive usurper. 25 year old, HP Engineer, Steve Wozniak, realised that this new microprocessor would be a game-changer and went on to incorporate it into the small computer he was developing. That machine went on to become the Apple I. In 1975 7400 TTL was the “Bread and Butter” of logic design: 7400 series TTL integrated circuits were developed in the early 1960’s. Initially quite expensive so mainly used in Military and Aerospace applications. By the early 1970’s TTL had become a versatile family of standardised, low cost,. easy to use logic. Typically about $1 per device. 7400 series logic was widely used in the design of minicomputers, including the PDP-11, the Data General Nova 1200 and later models of PDP-8. TTL was a viable, faster and cheaper processing solution than the emerging 8-bit microprocessors such as MOS 6502, Intel 8080 and the Motorola 6800. Essential Reading 16-bit TTL CPU board from Data General Nova 1200 The Gigatron TTL Computer – What is it? Started as a Hackaday.io project in Spring 2017 by Marcel van Kervinck of The Hague, Netherlands.
    [Show full text]
  • Exploring Software Inefficiency With
    ZeroSpy: Exploring Software Inefficiency with Redundant Zeros Xin You∗, Hailong Yang∗y, Zhongzhi Luan∗, Depei Qian∗ and Xu Liuz Beihang University, China∗, North Carolina State University, USAz State Key Laboratory of Mathematical Engineering and Advanced Computing, Wuxi, Chinay fyouxin2015,hailong.yang,07680,[email protected]∗, [email protected] Abstract—Redundant zeros cause inefficiencies in which the 1 for(int i=0;i<1000;++i) { 2 A[i] = 0; B[i] = i; zero values are loaded and computed repeatedly, resulting in 3 } 4 ... unnecessary memory traffic and identity computation that waste 5 for(int i=0;i<1000;++i) memory bandwidth and CPU resources. Optimizing compilers 6 I C[i] = A[i]-B[i]; is difficult in eliminating these zero-related inefficiencies due to Listing 1. An example code working on redundant zeros, where all variables are 32-bit integers. limitations in static analysis. Hardware approaches, in contrast, optimize inefficiencies without code modification, but are not enough to fulfill the computation, which yields better cache widely adopted in commodity processors. In this paper, we 1 propose ZeroSpy - a fine-grained profiler to identify redundant usage and vectorization potentials . zeros caused by both inappropriate use of data structures and Actually, a larger number of real-world applications (e.g., useless computation. ZeroSpy also provides intuitive optimization deep neural network and high-efficiency video coding) have guidance by revealing the locations where the redundant zeros already been reported to contain a significant amount of happen in source lines and calling contexts. The experimental redundant zeros and achieved significant speedup from the results demonstrate ZeroSpy is capable of identifying redundant zeros in programs that have been highly optimized for years.
    [Show full text]
  • File Scavenger User Guide
    File Scavenger® Version 3.2 Comprehensive Data Recovery Tool For Microsoft® Windows® 7, Vista, XP, 2008, 2003, 2000 and NT User’s Guide Revision: 4 Date: September 2010 QueTek® Consulting Corporation COPYRIGHT © Copyright 1998-2010. This document contains materials protected by International Copyright Laws. All rights reserved. No part of this manual may be reproduced, transmitted or transcribed in any form and for any purpose without the express written permission of QueTek® Consulting Corporation. TRADEMARKS Companies and products mentioned in this manual are for identification purpose only. Product names or brand names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. NOTICE Reasonable effort has been made to ensure that the information in this manual is accurate. QueTek® Consulting Corporation assumes no liability for technical inaccuracies, typographical, or other errors contained herein. QueTek® Consulting Corporation provides this manual “as is” without warranty of any kind, either express or implied, including, but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall QueTek® Consulting Corporation be liable for any loss of profits, or for direct, indirect, special, incidental or consequential damages arising from any defect or error in QueTek® Consulting Corporation’s products or manuals. Information in this manual is subject to change without notice and does not represent a commitment on the part of QueTek® Consulting Corporation. User Guide - ii LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY PRIOR TO PURCHASING THE LICENSE CODE TO UNLOCK FILE SCAVENGER®.
    [Show full text]
  • User's Manual Undelete® for Windows
    User’s Manual Undelete® for Windows® Up-to-the-minute Data Protection® July 2007 This document describes the installation and operation of the Undelete file recovery solutions. It applies to the Server, Desktop Client, Professional and Home Editions of Undelete and is intended for Windows users and system managers. Revision/Update Information: This is a revised manual Software Versions: Undelete 5.0 Server Edition Undelete 5.0 Professional Edition Undelete 5.0 Home Edition Undelete 5.0 Desktop Client Operating Systems: Windows Server 2003 Windows XP Windows 2000 Diskeeper Corporation, Burbank, California ________________________ July 2007 _________ © 2000 — 2007 by Diskeeper Corporation The Software described in this document is owned by Diskeeper Corporation and is protected by United States copyright laws and international treaty provisions. Therefore, you must treat the Software like any other copyrighted material (e.g. a book or musical recording) except that you may either (a) make one copy of the Software solely for backup or archival purposes, or (b) transfer the Software to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the user documentation provided with the Software, except for your own authorized use. RESTRICTED RIGHTS LEGEND The software and documentation are provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 as applicable.
    [Show full text]
  • 6502 Introduction
    6502 Introduction Philipp Koehn 18 September 2019 Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1 some history Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1971 2 • First microprocessor on an integrated circuit: Intel 4004 • 4-bit central processing unit, 12 bit address space (4KB) Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1975 3 • MOS Technology 6502 • Dominant CPU in home computers for a decade (Atari, Apple II, Nintendo Entertainment System, Commodore PET) Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1977 4 • Atari 2600 • Video game console: Pong, Pac Man, ... connected to TV Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1980 5 • Commodore VIC20 • 1 MHz, 5KB RAM, BASIC, 3.5KB RAM, 176x184 3 bit color video Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 1982 6 • Commodore C64 • 64KB RAM, 320x200 4 bit color video Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 Commodore C64 7 • BASIC programming language, but serious programs written in assembly • No fancy stuff like multi-process, user accounts, virtual memory, etc. • Machine itself had no mass storage - had to buy tape drive, then floppy disk drive, machine was obsolete once hard drives came around Philipp Koehn Computer Systems Fundamentals: 6502 Introduction 18 September 2019 BASIC Demo 8 • Commands get executed (just like Python interpreter)
    [Show full text]
  • Download a Sample
    Preface Like many American kids in 1979, I woke up to find that Santa had left a brand new Atari VCS1 under the tree (thanks, Mom and Dad, for paying Santa’s invoice!). This was a pretty big deal for a six- year-old who could tell you the location and manufacturer of every standup arcade cabinet within a five mile radius. Having an “arcade in your home” wasn’t just a thing you saw on Silver Spoons, it was now a real thing. The sights and sounds that jumped o↵ of our little Panasonic color TV probably deserve a gigantic run-on sentence worthy of Dylan Thomas, as my brother and I bounced tiny pixellated missiles o↵ of walls in Combat, combed through the perplexing game modes of Space Invaders, battled angry duck-like dragons in Adventure, and became Superman as we put flickering bad guys in a flickering jail. These cartridges were opaque obelisks packaged in boxes with fantastically unattainable illustrations, available at K-Mart for $30 or so. You could tell these species of video games weren’t related to arcade games, though they had a unique look-and-feel of their own. We also had an Apple ][ by this time, so I tried to fit all of these creatures into a digital taxonomy. Atari games had colors and fast motion, but not as much as arcade games, and they never were as complex as Apple ][ games. What made them tick? Why were Activision games so much more detailed? Would the missile still blow up your spaceship if you turned the TV o↵? (Turns out the answer is yes.) 1 It wasn’t sold as “Atari 2600” until 1982.
    [Show full text]
  • The Ultimate C64 Overview Michael Steil, 25Th Chaos Communication Congress 2008
    The Ultimate C64 Overview Michael Steil, http://www.pagetable.com/ 25th Chaos Communication Congress 2008 Retrocomputing is cool as never before. People play Look and Feel C64 games in emulators and listen to SID music, but few people know much about the C64 architecture A C64 only needs to be connected to power and a TV and its limitations, and what programming was like set (or monitor) to be fully functional. When turned back then. This paper attempts to give a comprehen- on, it shows a blue-on-blue theme with a startup mes- sive overview of the Commodore 64, including its in- sage and drops into a BASIC interpreter derived from ternals and quirks, making the point that classic Microsoft BASIC. In order to load and save BASIC computer systems aren't all that hard to understand - programs or use third party software, the C64 re- and that programmers today should be more aware of quires mass storage - either a “datasette” cassette the art that programming once used to be. tape drive or a disk drive like the 5.25" Commodore 1541. Commodore History Unless the user really wanted to interact with the BA- SIC interpreter, he would typically only use the BA- Commodore Business Machines was founded in 1962 SIC instructions LOAD, LIST and RUN in order to by Jack Tramiel. The company specialized on elec- access mass storage. LOAD"$",8 followed by LIST tronic calculators, and in 1976, Commodore bought shows the directory of the disk in the drive, and the chip manufacturer MOS Technology and decided LOAD"filename",8 followed by RUN would load and to have Chuck Peddle from MOS evolve their KIM-1 start a program.
    [Show full text]
  • Operating System
    OPERATING SYSTEM INDEX LESSON 1: INTRODUCTION TO OPERATING SYSTEM LESSON 2: FILE SYSTEM – I LESSON 3: FILE SYSTEM – II LESSON 4: CPU SCHEDULING LESSON 5: MEMORY MANAGEMENT – I LESSON 6: MEMORY MANAGEMENT – II LESSON 7: DISK SCHEDULING LESSON 8: PROCESS MANAGEMENT LESSON 9: DEADLOCKS LESSON 10: CASE STUDY OF UNIX LESSON 11: CASE STUDY OF MS-DOS LESSON 12: CASE STUDY OF MS-WINDOWS NT Lesson No. 1 Intro. to Operating System 1 Lesson Number: 1 Writer: Dr. Rakesh Kumar Introduction to Operating System Vetter: Prof. Dharminder Kr. 1.0 OBJECTIVE The objective of this lesson is to make the students familiar with the basics of operating system. After studying this lesson they will be familiar with: 1. What is an operating system? 2. Important functions performed by an operating system. 3. Different types of operating systems. 1. 1 INTRODUCTION Operating system (OS) is a program or set of programs, which acts as an interface between a user of the computer & the computer hardware. The main purpose of an OS is to provide an environment in which we can execute programs. The main goals of the OS are (i) To make the computer system convenient to use, (ii) To make the use of computer hardware in efficient way. Operating System is system software, which may be viewed as collection of software consisting of procedures for operating the computer & providing an environment for execution of programs. It’s an interface between user & computer. So an OS makes everything in the computer to work together smoothly & efficiently. Figure 1: The relationship between application & system software Lesson No.
    [Show full text]
  • (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes
    Minnesota Journal of Law, Science & Technology Volume 7 Issue 2 Article 13 2006 Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes Andrew Moerke Mason Follow this and additional works at: https://scholarship.law.umn.edu/mjlst Recommended Citation Andrew M. Mason, Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes, 7 MINN. J.L. SCI. & TECH. 777 (2006). Available at: https://scholarship.law.umn.edu/mjlst/vol7/iss2/13 The Minnesota Journal of Law, Science & Technology is published by the University of Minnesota Libraries Publishing. MASON_FINAL_UPDATED 6/7/2006 6:39:12 PM Throwing Out the (Electronic) Trash: True Deletion Would Soothe E-Discovery Woes * Andrew Moerke Mason Electronic discovery (e-discovery) consumes time, money, and resources like few other aspects of modern-day litigation. Deleted data, metadata, backup data, and other intangible forms of information make e-discovery more complex and contentious than traditional discovery.1 Computer users generate and retain electronic documents with ease, leading to significantly greater amounts of data than in a paper-only world.2 E-discovery’s volume and complexity increase litigation costs and complicate discovery disputes between parties, draining both party and judicial resources. More vexing than other areas of e-discovery, e-discovery of deleted data demands expensive forensic techniques, dampens business productivity, and holds no guarantee of yielding evidence. Parties anguish over whether deleted files on a computer hard drive could contain information critical to a © 2006 Andrew Moerke Mason. * J.D. expected 2007, University of Minnesota Law School; B.S. 1999, University of California, Berkeley.
    [Show full text]
  • Encase Forensic Version 6.18.0.59
    EnCase Forensic Version 6.18.0.59 Test Results for Deleted File Recovery and Active File Listing Tool (Revised) June 23, 2014 This report was prepared for the Department of Homeland Security Science and Technology Directorate Cyber Security Division by the Office of Law Enforcement Standards of the National Institute of Standards and Technology. For additional information about the Cyber Security Division and ongoing projects, please visit www.cyber.st.dhs.gov. June 2014 Test Results for Deleted File Recovery and Active File Listing Tool: EnCase Forensic Version 6.18.0.59 Revised Contents Introduction ......................................................................................................................... 1 How to Read This Report ................................................................................................... 1 1 Results Summary .......................................................................................................... 2 1.1 FAT ........................................................................................................................ 3 1.2 ExFat ...................................................................................................................... 3 1.3 NTFS ...................................................................................................................... 3 1.4 ext ........................................................................................................................... 3 1.5 HFS+ .....................................................................................................................
    [Show full text]
  • W65C02S Microprocessor DATA SHEET
    The Western Design Center, Inc. February 2004 W65C02S Data Sheet W65C02S Microprocessor DATA SHEET WDC ã The Western Design Center, Inc., 2003. All rights reserved The Western Design Center, Inc. February 2004 W65C02S Data Sheet WDC reserves the right to make changes at any time without notice in order to improve design and supply the best possible product. Information contained herein is provided gratuitously and without liability, to any user. Reasonable efforts have been made to verify the accuracy of the information but no guarantee whatsoever is given as to the accuracy or as to its applicability to particular uses. In every instance, it must be the responsibility of the user to determine the suitability of the products for each application. WDC products are not authorized for use as critical components in life support devices or systems. Nothing contained herein shall be construed as a recommendation to use any product in violation of existing patents or other rights of third parties. The sale of any WDC product is subject to all WDC Terms and Conditions of Sales and Sales Policies, copies of which are available upon request. Copyright Ó1981-2004 by The Western Design Center, Inc. All rights reserved, including the right of reproduction, in whole, or in part, in any form. The Western Design Center, Inc. W65C02S Data Sheet 2 The Western Design Center, Inc. W65C02S Data Sheet TABLE OF CONTENTS 1 INTRODUCTION................................................................................................................................................................................5
    [Show full text]