386 Manual Book

Total Page:16

File Type:pdf, Size:1020Kb

Load more

386 MANUAL BOOK SYSTEM CHECKLIST Before proceeding any futher~ make sure that everythi ng you have purchased is in good physical cond~tion. If a nything i s obviously damaged or missing~ contact your dealer immediatl y . c .: Carefully unpack the s ystem unit~ keyboard~ cable s ~ d i skette i : : MS-DOS and System Utilities Diskette~ one c o py o f this manual and two keys . Check that the items listed b e l ow a re in your possesion and in g o od condition VE d E s ~ SYSTEM CHECKUST NDTE Ke ep al l pac kag i ng material and b o xes. You Nill nee d t he m for r epack i ng ano t her location . ABOUT CAHCE The idea of cache memory is that some active portion of the low speed memory is stored in duplicate~ in higher-speed cache memory. Whwn a memory request is generted~ the request is first presented to main memory. Thus~ a cache ma i n board is designed to perform as a very efficient hierarchical memory system~ while the memory devices needed is a v ery low-cost. Following, is the detailed specification of this SPM386 / CACHE main board. 2 SPECIFICATIONS * Standard AT Size * 100% IBM PC/AT Compatible * Support 80486 CPU Running at 20/25/33/50 in 1X clock * Support 80386 CPU Running at 33/40 in 2X clock * Support 80387 Coprocessor * Support cache size 64/128/256 KB * Support two banka DRAM with memory size up to 32MB * Support mixable 256 KB/1MB/4Mb DRAM moduls * Programable DRAM wait States * Supoort 256 Kb or 384 KB relocation to the top of DRAM memory * Support sophisticated shadow RAM for video and system BIOS. * Supoort fast gate A20 and fast CPU reset to optimize OS/2 operations. * Syncronous AT bus clock with programable clock (divided b 2,3,4,5,6,7,8) * Support parity generation and checking * 4-layer PCB with surface mounting technologi * support 6 AT Slots * Supoort 1 MCA slot for 486 local bus add-on cards TABLE OF . CONTENTS 1 . INTRODUCTION LOOK AT _ :86 L Main Board User's Manu a 1 page 1-1 to 1-2. 2. MEMORY CONFIGURATION Look at 386 L Main Board user's Manual page 2-1 to 2-3 3. JUMPER SETTIKG AKD CO~NECTORS Look. at .386 t~ > Main Board user's Manual page 3-1 to 3-4 4 . SYSTEM I?\STALATION Look at :861 Main Board user's Manual page 4-1 to 4-2 5. BUILT-IN BIOS SETUP PROGRAM Look at 386t 1lai n Board user's Manual page 5-1 to 5-lS 4 Your computer unit i s available for 115V or 230V of vo ltage CONN selection. The power selector switch is situated o n the front side of the power supply in the system unit. Slide the power Befo selector switch to the correct voltage setting. Make sure oper that the voltage option selected matches the power source. mC:t.rk prin CONNECTING YOUR SYSTEM lang prop Before installing your system, check that the power source is c1nd properly ground e d~ and confirm that the monitor and all the peripherals have been turned off. A pp CONNECTING THE MONITOR If y If your mon itor is a monochrome display, your system must be para installed with a Monochrome Display Adaptet- or a video dis- pl<.:<.y adc:'•. pt.E~t ·- +. 1-•i'<.t. ,__.,__,:i..JJ .;:,-.. monocht~ome :-:,c:;nitc:.:ot·-·. 1. Connecting monochrome monitor Orient the system unit s o that you have access to the rear panel. Connect the power and signal cables to their proper connectors on the rear panel. A SE If y seri ·'- -·· ' '' the video monitor only if the monitor is rated and set for t he same .,/C) 1 t C:•. •;i F: ·:::: 1.. i. p p ] .i (? d 1... j:· t. hE.· C C.• !TI p U. t E· ,.-· ~- \,. S:- ·1.: i;7: iT1 .. I ·f t . he iTJ C• r; .i t. CJ r- .i t7, r- a. -l::.(·?:.* cJ ·r •::• t- cl i ·f ·f r2 :'-t.::·! ··~ t \/C) 1 t-::1.(1 e C• r- h -~- =· t=\ c! .::_ ·f ·f e r-=:·n t t -~./ p;::f! of pluu :i.. ·!::. :~.: · ··u'. .!.!.d b·:=.· c:c•nn·=.·c: tec:l d j_;-- ·· e=-t:J. ·y' teo E•. r.. ;b -=•ppr-o p t- j_ a. t E• c: :.i. r ·· c: lJ :: t:. .. Othe comp tor-. CONNECTING THE PRINTER Before proceeding, determine your printer type from is operation manual. Several different types are currently marketed. You can choose from parallel, serial, or graphics printers. If .you need to print doc uments in Europea n langguage, you will need a printer which can do the job properly. This manual will show y ou how to interface parallel and serial printers. A PARALLEL PRINTER If you have a parallel printer, i~ must be connectPd to the parallel printer connector. lJJAF:t~ I NG ~ Connecting a parallel printer to the serial (RS-232) connector will cause permaner t damage to the system unit A SERIAL PRINTER - . ... ~~- .. If you use a serial printer, 1 be connected to the serial (RS-232) interfac~ connected. ~~~-"----m m~~ / }_' ., ~ .. <::::::::::::~ j!t11 : ~ Other serial (RS-232) devi c es suc h a s: modem~ terminal or host computer can also be connected to ~ he serial (RS-232) connec­ tor·. OONNECUNG THE ~.R SOlillCH i d First, connect the PfJ\·H:! r· cord to the :.:;y:.:;tem tmit. · Plug one d end of the power c.or·d to the system unit, and the other· E.·nu d to a grounded wall outlet. Make sure that the power· to th1..· system nn.l t is not on Lha. L the head pr·otection ::-;heet i~; n,-move fr·orn the dif;kc!t Le dr-ive. I LOADING THE OOS SYSTEM DJSKELfE A n c Insert the OOS syst.1:."!! into Lbe dc:i.ve A: . If you havf~ a Har·disk and the ros iB al h:·eady loaded in to it, then you n'-"ed not insert the DOS r~y;-';tf:UJ dL:kette into drivt! A:. TURNING ON THE rowER INPUT Turn on the power of the Video mrJrLi.tor ( if you monitor· i s not a monochrome display monitm· ) . 0 Turn on the power of your.· :.:;ystem urtit. Do not press any e keyboard key is pr·e<:~sE:d ·j _ ;~:.mediat.elly after· power-on, a key- board er·ror massage wilJ. displa.yed. f SOME SYSTEM MESSAGES After turning on the syst.em pm.Jt~r, you will see fo1}uwing message ; I t (Look at US3486 Main Board User-s Manual) Page 4-4 to 4-6. T b 7 if you didn, t insert the system diskette or· o.ny bo()table disktte or any boatable diskette in dr·ive A: , and no har·d disk with resident [:OS it: avai lubh:. thi::; ruensage will be displayed : Non-system disk or disk error Replace disk and a1..rike any key Inser·t the system diskeU:.E:· or ;_my bootablf.~ dii:!lwt te ln drive A: and press any key. If your· syBtern ·.i.E~ <-J net-:~ one that has not yet been configticed, or- when :it baa beeo -jnc"<Yn' ectly configured, the rnessa.get-> \.Jill be c.lisplayed (Look at US3486 Main Board Uuur~ u Manual) page 4-7 to 4- 10 Other BIOS self test c~ r-r. · or mc!ssage may be displayed. For example, whenever- you conf:i.@ .H'( :~d the memor·y size deffcr·mrL form that installed in the sy0tern. You 1-1ill s1~·e : MmllRY SIZE ERROR - RUN -SETUP If there no second hur·d djsk installed, but in the conLi.gnr·a­ ti.on you specifi a second l:v.. rr-d disk, you will see : ERROR ENOOUNTERED INITIALIZING HARD DRIVE 1 The folowing erro-r- mF:.ssu.ge i~; displayed only lofhenuver.· the battery is low_, or when you .st;H·t the computer w:i.th hHtter-y not connected. co CMOS RAM ERROR~ CHECK BATTERY/RUN SETUP Press the function key Fl. The following message is displayed CH Current date is Sun 7-05-1987 If Enter new date (mm-dd-yy):_ co If you do not wish to change the date~ press Enter. To enter Af the current date~ type the month~ date~ then y ear~ and press th Enter. Only numbers are accepted; t yping any other character th will cause the operating system to prompt you to reenter the te date. The nmointh~ date and year should each be separated by Bu II " / " CJr- II da sy re You will then see th ~ fo llowi ng time promft di Current time is 0:00:55.28 n- Enter new time : cu If you wish to enter the correct time, the format is hour:minute:second.hundredth of a second The version numbe r of the MS - DOS operating system you are using and other message will then be displa. The Dos prompt "A>" .. If your hard disk C h asa been installed DOS~ when the error 11 11 messa.ges a.ppeat- !' r·~-ec.:;s;. F J.. <:<.1-tCI tt-·te DDS wi 11 pr-ompt C> • CONFIGURING YOUR SYSTEM CHECKING THE BATTRY WITH SETUP If you have reached here successf ully~ you are now ready to configure the system unit. After configuration~ the confiqurasi parameters are stored in the memory of the computer.
Recommended publications
  • Dell Inspiron 7391 Setup and Specifications

    Dell Inspiron 7391 Setup and Specifications

    Inspiron 7391 2n1 Setup and Specifications Regulatory Model: P113G Regulatory Type: P113G001 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 2019 - 07 Rev. A00 Contents 1 Set up your Inspiron 7391 2n1.........................................................................................................4 2 Views of Inspiron 7391 2n1............................................................................................................ 6 Right........................................................................................................................................................................................6 Left.......................................................................................................................................................................................... 6 Base......................................................................................................................................................................................... 7 Display....................................................................................................................................................................................
  • BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions

    BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions

    BEA TUXEDO Reference Manual Section 5 - File Formats and Data Descriptions BEA TUXEDO Release 6.5 Document Edition 6.5 February 1999 Copyright Copyright © 1999 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation is subject to and made available only pursuant to the terms of the BEA Systems License Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy the software except as specifically allowed in the agreement. This document may not, in whole or in part, be copied photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior consent, in writing, from BEA Systems, Inc. Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the BEA Systems License Agreement and in subparagraph (c)(1) of the Commercial Computer Software-Restricted Rights Clause at FAR 52.227-19; subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (d) of the Commercial Computer Software--Licensing clause at NASA FAR supplement 16-52.227-86; or their equivalent. Information in this document is subject to change without notice and does not represent a commitment on the part of BEA Systems. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. FURTHER, BEA Systems DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE, OR THE RESULTS OF THE USE, OF THE SOFTWARE OR WRITTEN MATERIAL IN TERMS OF CORRECTNESS, ACCURACY, RELIABILITY, OR OTHERWISE.
  • INT 09H (9) Keyboard

    INT 09H (9) Keyboard

    INT 09h (9) Keyboard The keyboard generates an INT 9 every time a key is pushed or released. Notes: This is a hardware interrupt (IRQ 1) activated by the make or break of every keystroke. The default INT 9 handler in the ROM reads the make and break scan codes from the keyboard and converts them into actions or key codes as follows: ş For ASCII keys, when a make code is encountered, the ASCII code and the scan code for the key are placed in the 32-byte keyboard buffer, which is located at 0:41Eh. The ASCII code and scan code are placed in the buffer at the location addressed by the Keyboard Buffer Tail Pointer (0:041Ch). The Keyboard Buffer Tail Pointer is then incremented by 2, and if it points past the end of the buffer, it is adjusted so that it points to the beginning of the buffer. ş If Ctrl, Alt, or Shift has been pressed, the Shift Status (0:0417h) and Extended Shift Status (0:0418h) bytes are updated. ş If the Ctrl-Alt-Del combination has been pressed, the Reset Flag (0:0472h) is set to 1234h and control is given to the power-on self test (POST). Because the Reset Flag is 1234h, the POST routine bypasses the memory test. ş If the Pause key sequence has been entered, this interrupt enters an indefinite loop. The loop is broken as soon as a valid ASCII keystroke is entered. (The PC Convertible issues an INT 15h, Service 41h (Wait on External Event), to execute its pause loop.) ş If the Print Screen key sequence is entered, an INT 05h (Print Screen) is executed.
  • Networking Telnet

    Networking Telnet

    IBM i Version 7.2 Networking Telnet IBM Note Before using this information and the product it supports, read the information in “Notices” on page 99. This edition applies to IBM i 7.2 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Telnet................................................................................................................... 1 What's new for IBM i 7.2..............................................................................................................................1 PDF file for Telnet........................................................................................................................................ 1 Telnet scenarios...........................................................................................................................................2 Telnet scenario: Telnet server configuration.........................................................................................2 Telnet scenario: Cascaded Telnet
  • Security in Ordinary Operating Systems

    Security in Ordinary Operating Systems

    39 C H A P T E R 4 Security in Ordinary Operating Systems In considering the requirements of a secure operating system,it is worth considering how far ordinary operating systems are from achieving these requirements. In this chapter, we examine the UNIX and Windows operating systems and show why they are fundamentally not secure operating systems. We first examine the history these systems, briefly describe their protection systems, then we show, using the requirements of a secure operating system defined in Chapter 2, why ordinary operating systems are inherently insecure. Finally, we examine common vulnerabilities in these systems to show the need for secure operating systems and the types of threats that they will have to overcome. 4.1 SYSTEM HISTORIES 4.1.1 UNIX HISTORY UNIX is a multiuser operating system developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs [266]. UNIX started as a small project to build an operating system to play a game on an available PDP-7 computer. However, UNIX grew over the next 10 to 15 years into a system with considerable mindshare, such that a variety of commercial UNIX efforts were launched. The lack of coherence in these efforts may have limited the market penetration of UNIX, but many vendors, even Microsoft, had their own versions. UNIX remains a significant operating system today, embodied in many systems, such as Linux, Sun Solaris, IBM AIX, the various BSD systems, etc. Recall from Chapter 3 that Bell Labs was a member of the Multics consortium. However, Bell Labs dropped out of the Multics project in 1969, primarily due to delays in the project.
  • AXEL Platine Terminal Ethernet TCP/IP Models

    AXEL Platine Terminal Ethernet TCP/IP Models

    AXEL Platine Terminal Ethernet TCP/IP Models User's Guide May 1997 - Ref.: TCPUE105/701-2 The reproduction or the translation of this material, in part or whole, is strictly prohibited. For additional information, please contact: AXEL Zone d'activité d'Orsay-Courtabœuf 16 Avenue du Québec BP 728 91962 LES ULIS Cedex France Tel.: (33) 1 69 28 27 27 Fax: (33) 1 69 28 82 04 The information in this document is subject to change without notice. AXEL assumes no responsibility for any errors that may appear in this document. All trademarks and registered trademarks are the property of their respective holders. © - 1995-1997 - AXEL - All Rights Reserved. 1 - TCP/IP SET-UP ..........................................................................................1 2 - TERMINAL SET-UP ...................................................................................4 2.1 - GENERAL FEATURES.........................................................................5 2.1.1 - Enter Terminal Set-Up Mode ..........................................................5 2.1.2 - Set-Up Screens ..............................................................................6 2.1.3 - Predefined Set-Up..........................................................................6 2.1.4 - Local and Global Parameters .........................................................6 2.1.5 - Exit Set-Up.....................................................................................7 2.2 - SCREEN...............................................................................................8
  • The Gold Standard for Patent Brokerage™

    The Gold Standard for Patent Brokerage™

    The Gold Standard for Patent Brokerage™ A proven record of success with more than 2500 patents sold. Executive Summary for the Sale of Enterprise Malware Removal & Restoration patent portfolio by Google 29 Assets Total · Full Patent Brokerage · Strategic IP Advisory EXECUTIVE SUMMARY FOR THE SALE OF Enterprise Malware Removal & Restoration Solutions By GOOGLE 29 TOTAL ASSETS EXECUTIVE SUMMARY FOR THE SALE OF Enterprise Malware Removal & Restoration Solutions 12 Families, 13 US Patents & their 16 family members in 8 other Jurisdictions Priority Issue Expiry Bwd/ Fwd Patent Number Patent Title Date Date Date Citations FAMILY 1 Discrete, background determination of the adequacy of Aug 19, Jun 8, Aug 18, US 6748544 10/41 security features of a computer system 1999 2004 2019 FAMILY 2 US 7114184 Oct 27, (This patent has been System and method for restoring computer systems damaged Mar 30, Sep 26, mapped against 2022 15/85 by a malicious computer program 2001 2006 representative (PTA 576) industry offerings) System and method for restoring computer systems damaged Mar 30, Aug 23, EP1374017 by a malicious computer program 2001 2006 System and method for restoring a computer system which has Mar 30, Jul 26, DE60214147 been damaged by a malicious computer program 2001 2007 System and method for restoring a computer system which as Mar 30, ZA 200306411 been damaged by a malicious computer program 2001 System And Method For Restoring Computer Systems Mar 30, Dec 3, IL157542 Damaged By A Malicious Computer Program 2001 2007 System And Method For Restoring Computer Systems Mar 30, IL157542D0 Damaged By A Malicious Computer Program 2001 FAMILY 3 Oct 26, Method and apparatus for multicast delivery of program Aug 25, Jan 4, US 7865723 2028(PTA1 6/17 information 2004 2011 172) Method and apparatus for multicast transmission of program Aug 25, Jan 26, DE102005039361 2/0 information 2004 2017 FAMILY 4 Sep 30, Sep 11, Sep 19, US 8266684 Tokenized resource access 18/35 2008 2012 2030 © 2018 Tangible IP, LLC.
  • Lenovo Ideapad 310 Ideapad 310-14ISK Ideapad 310-15ISK Ideapad 310 Touch-15ISK User Guide

    Lenovo Ideapad 310 Ideapad 310-14ISK Ideapad 310-15ISK Ideapad 310 Touch-15ISK User Guide

    Lenovo ideapad 310 ideapad 310-14ISK ideapad 310-15ISK ideapad 310 Touch-15ISK User Guide lmn ReadRead thethe s safetyafety notice noticess and and important important tip tipss in in the the includedincluded manual manualss before before u usingsing your your computer. computer. Notes • Before using the product, be sure to read Lenovo Safety and General Information Guide first. • The latest electronic compliance and environmental information are available from the Lenovo compliance information Web sites. - To view compliance information go to: http://www.lenovo.com/ compliance - To download environmental information go to: http://www.lenovo.com/ ecodeclaration • Some instructions in this guide may assume that you are using Windows® 10. If you are using another Windows operating system, some operations may be slightly different. If you are using other operating systems, some operations may not apply to you. • The features described in this guide are common to most models. Some features may not be available on your computer or your computer may include features that are not described in this user guide. • The illustrations used in this manual are for Lenovo ideapad 310-14ISK unless otherwise stated. • The illustrations in this manual may differ from the actual product. Please refer to the actual product. Regulatory Notice • For details, refer to Guides & Manuals at http://support.lenovo.com. First Edition (January 2016) © Copyright Lenovo 2016. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Contents Chapter 1.
  • Lenovo Ideapad

    Lenovo Ideapad

    Lenovo ideapad 320 ideapad 320-17IKB/ideapad 320H-17IKB/ ideapad 320L-17IKB/ideapad 320R-17IKB/ ideapad 320E-17IKB/ideapad 320-17ISK/ ideapad 320H-17ISK/ideapad 320L-17ISK/ ideapad 320R-17ISK/ideapad 320E-17ISK User Guide lmn ReadRead thethe s safetyafety notice noticess and and important important tip tipss in in the the includedincluded manual manualss before before u usingsing your your computer. computer. Notes • Before using the product, be sure to read Lenovo Safety and General Information Guide first. • The latest electronic compliance and environmental information are available from the Lenovo compliance information Web sites. - To view compliance information go to: http://www.lenovo.com/compliance - To download environmental information go to: http://www.lenovo.com/ecodeclaration • Some instructions in this guide may assume that you are using Windows® 10. If you are using another Windows operating system, some operations may be slightly different. If you are using other operating systems, some operations may not apply to you. • The features described in this guide are common to most models. Some features may not be available on your computer or your computer may include features that are not described in this user guide. • The illustrations used in this manual are for Lenovo ideapad 320-17IKB unless otherwise stated. • The illustrations in this manual may differ from the actual product. The screenshots of operating system are for reference only. Please refer to the actual product. Regulatory Notice • For details, refer to Guides & Manuals at http://support.lenovo.com. First Edition (February 2017) © Copyright Lenovo 2017. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No.
  • The Linux Operating System

    The Linux Operating System

    T HE L INUX O PERATING S YSTEM William Stallings Copyright 2008 This document is an extract from Operating Systems: Internals and Design Principles, Sixth Edition William Stallings Prentice Hall 2008 ISBN-10: 0-13-600632-9 ISBN-13: 978-0-13-600632-9 http://williamstallings.com/OS/OS6e.html M02_STAL6329_06_SE_C02.QXD 2/22/08 7:02 PM Page 94 94 CHAPTER 2 / OPERATING SYSTEM OVERVIEW of the System V kernel and produced a clean, if complex, implementation. New fea- tures in the release include real-time processing support, process scheduling classes, dynamically allocated data structures, virtual memory management, virtual file sys- tem, and a preemptive kernel. SVR4 draws on the efforts of both commercial and academic designers and was developed to provide a uniform platform for commercial UNIX deployment. It has succeeded in this objective and is perhaps the most important UNIX variant. It incorporates most of the important features ever developed on any UNIX system and does so in an integrated, commercially viable fashion. SVR4 runs on processors ranging from 32-bit microprocessors up to supercomputers. BSD The Berkeley Software Distribution (BSD) series of UNIX releases have played a key role in the development of OS design theory. 4.xBSD is widely used in academic installations and has served as the basis of a number of commercial UNIX products. It is probably safe to say that BSD is responsible for much of the popularity of UNIX and that most enhancements to UNIX first appeared in BSD versions. 4.4BSD was the final version of BSD to be released by Berkeley, with the de- sign and implementation organization subsequently dissolved.
  • Emulator User's Reference

    Emulator User's Reference

    Personal Communications for Windows, Version 14.0 IBM Emulator User's Reference SC31-8960-04 Personal Communications for Windows, Version 14.0 IBM Emulator User's Reference SC31-8960-04 Note Before using this information and the product it supports, read the information in “Notices,” on page 225. Fifth Edition (May 2019) This edition applies to Version 14.0 of Personal Communications (program number: 5639–I70) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1989, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures .............. vii Printer Sessions (3270 and 5250) ....... 25 PDT Files (3270 and 5250) ......... 25 Tables ............... ix PFT Migration ............ 26 Using PDT Files ............ 26 Windows print driver for VT host printing ... 27 About This Book........... xi Double-Byte Character Support....... 27 Who Should Read This Book......... xi Collecting Print Jobs (5250 Printer Session) .... 28 How to Use This Book ........... xi Printing to Disk ............. 29 Command Syntax Symbols ........ xi Workstation Profile Parameter for Code Page ... 29 Where to Find More Information ....... xii | Knowledge Center ........... xii Chapter 5. Key Functions and Online Help ............. xii Personal Communications Library...... xii Keyboard Setup ........... 31 Related Publications .......... xiii Default Key Function Assignments ...... 31 Contacting IBM............ xiii Setting the 3270 Keyboard Layout Default ... 31 Support Options ........... xiv Default Key Functions for a 3270 Layout ... 31 Setting the 5250 Keyboard Layout Default ... 34 Default Key Functions for a 5250 Layout ... 34 Part 1. General Information ..... 1 Default Key Functions for the Combined Package 36 Setting the VT Keyboard Layout Default ..
  • Supporting a Trusted Path for the LINUX Operating System

    Supporting a Trusted Path for the LINUX Operating System

    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2000-06 Supporting a Trusted Path for the LINUX operating system Bartram, Scott A. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/32937 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS SUPPORTING A TRUSTED PATH FOR THE LINUX OPERATING SYSTEM by Scott A. Bartram June 2000 Thesis Advisor: Cynthia E. Irvine Co-Advisor: Paul C. Clark Approved for public release; distribution is unlimited. 20000818 067 ---~-·-·------~- REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT TYPE AND DATES COVERED June 2000 Master's Thesis 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Supporting A Trusted Path For The Linux Operating System 6. AUTHOR(S) Bartram, Scott A. 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING Naval Postgraduate School ORGANIZATION REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING I MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING I MONITORING AGENCY REPORT NUMBER 11.