Kermit User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Kermit User Guide KERMIT USER GUIDE Seventh Edition Christine Gianone, Editor Columbia University Center for Computing Activities New York, New York 10027 May 26, 1988 Copyright (C) 1981,1988 Trustees of Columbia University in the City of New York Permission is granted to any individual or institution to use, copy, or redistribute this document so long as it is not sold for profit, and provided this copyright notice is retained. PREFACE Page 1 PREFACE Kermit is the name of a protocol for transferring files from one computer to another over ordinary asynchronous terminal connections. Kermit programs have been written for many different computers, and in general any two computers that have Kermit programs can exchange sequential files correctly and completely. This manual gives a brief and general overview of what Kermit is and how to use it, but consists mostly of detailed instructions for use and installation of specific Kermit programs. For a more detailed introduction to Kermit, complete with illustrations, diagrams, and tutorials, consult the book Kermit, A File Transfer Protocol, by Frank da Cruz, Digital Press, Bedford MA (1987), ISBN 0-932376-88-6, DEC order number EY-6705E-DP (phone 1-800-343-8321). The Kermit book describes Kermit in detail, from the points of view of the beginner, the user, the computer professional who must install Kermit programs or support their use, and the programmer who wishes to write new Kermit implementations. Also included are general introductions to computers, data communications, and file organization, plus a detailed troubleshooting guide, bootstrapping hints, and various appendices and tables. The latter half of the book is taken up by a complete description of the Kermit file transfer protocol, with programming examples in the C language, plus some analysis and comparisons of Kermit with other popular protocols such as Xmodem. The seventh edition of the Kermit User Guide (May 1988) includes chapters on new releases of most major Kermit programs, including MS-DOS Kermit 2.30, VAX/VMS Kermit 3.3, Portable IBM Mainframe Kermit 4.0, Unix Kermit 4E, Macintosh Kermit, CP/M-80 Kermit 4.09, plus a new chapter on PDP-11 Kermit. History and Acknowledgements The Kermit file transfer protocol was designed at the Columbia University Center for Computing Activities (CUCCA) in 1981-82 by Bill Catchings and Frank da Cruz. Bill wrote the first two programs, one for the DECSYSTEM-20 and one for a CP/M-80 microcomputer. The initial objective was to allow users of our DEC-20 and IBM 370 timesharing systems to archive their files on microcomputer floppy disks. The design owes much to the ANSI and ISO/OSI models, and some ideas were borrowed from similar projects at Stanford University and the University of Utah. The protocol was designed to accommodate the "sensitive" communications front end of the full-duplex DEC-20 system as well as the peculiarities of half-duplex IBM mainframe linemode communications. The protocol was soon implemented successfully on our IBM mainframe systems under VM/CMS by Daphne Tzoar of CUCCA. Meanwhile it was becoming apparent that Kermit was useful for more than just file archiving; IBM PCs were beginning to appear in the offices and departments, and there arose a general need for file transfer among all our systems, as well as a need to use the IBM PCs as terminals. Daphne soon had prepared an IBM PC implementation. After our initial success with Kermit, we presented it at conferences of user groups like DECUS and SHARE, and began to get requests for it from other sites. Since we had written down a description of the protocol, some sites wrote their own implementations for new computers, or adapted one of our implementations to run on additional systems, and sent back these new versions to us so that we could share them with others. In this way, Kermit has grown to support nearly 300 different machines and operating systems; it has been sent on magnetic tape or diskette from Columbia University to nearly ten thousand sites all over the world, and has reached many thousands more through various user groups and networks. Thanks to the hundreds of individuals and institutions who have contributed to the Kermit storehouse over the years. The Kermit protocol was named after Kermit the Frog, star of the television series THE MUPPET SHOW; the name Kermit is used by permission of Henson Associates, Inc., New York. Page 2 Kermit User Guide: PREFACE () Disclaimer Neither Columbia University, nor the editor, nor the authors of the individual chapters, nor any individual or institution contributing Kermit programs or documentation to the Columbia University Kermit Distribution, acknowledge any liability for any claims arising from use or misuse of Kermit programs or for inaccuracies in the documentation or bugs in the programs. Kermit programs are produced on a voluntary basis and contributed freely for public use in the hope that they will be useful, but without any kind of warranty or guarantee, or any commitment to address or fix problems. In practice, Kermit programs and documentation are contributed in good faith, and will be supported on a best-effort basis, time and other commitments permitting. Customizing This Manual Although the Kermit User Guide was produced at Columbia University, all attempts have been made to keep it free of site-specific information. However, due to the large number of Kermit implementations, descriptions of each one would make the manual prohibitively thick. Therefore, the manual is sent from Columbia with specific documentation about a selection of systems. Some of these descriptions may not be of interest at your site, while others that are may be lacking. Each site, upon receiving a Kermit tape, may decide which versions of Kermit are important to it, and include the appropriate documentation in this manual. This is most conveniently done if your site has the Scribe text formatting system (from UNILOGIC Ltd in Pittsburgh PA, USA), with which this manual was produced. Scribe runs on a wide variety of systems. There are also Scribe subsets, such as Perfect Writer and Final Word, that run on various microcomputers. Many have asked why Scribe is used for Kermit manuals instead of TeX. The answer is simply that TeX can only produce output for typesetters, not plain-text ASCII files, which are necessary for online documentation. The system-specific parts of the Kermit User Guide are included with "@INCLUDE" statements at the end of the Scribe source file for this manual, whose filename is KUSER.MSS. You may add or delete @INCLUDE statements to suit your needs, and run the result through the text formatter to produce a customized manual. If you do this, you should include an indication on the title page that the manual has been customized for your site. Not all system-specific documentation is provided in .MSS (Scribe input) format, since some Kermit contributors do not have Scribe at their sites. In that case, you will either have to add Scribe formatting commands, or else enclose the whole subfile in @BEGIN(VERBATIM)...@END(VERBATIM) brackets (and replace all atsigns (@) in the text with double atsigns (@@)). If you do not have SCRIBE, you may still use an editor to delete or add sections to the finished documentation file, though the results will not be as satisfactory -- the table of contents, index, cross references, and page numbers will not be automatically adjusted. If you are running a version of Kermit for which adequate documentation has not been provided (after all, this is a distributed, volunteer effort!), please feel free to write some, preferably in Scribe input format, and send it back to Columbia so that others may benefit from it. Likewise if you produce a new implementation of Kermit. If you don't know Scribe, you can use one of the existing chapters as a model. How To Get Kermit Page 3 How To Get Kermit The Kermit software is free and available to all, source code and documentation included, from a variety of sources. For example, most universities are connected to academic computer networks from which the Kermit files at Columbia University can be reached. The Kermit files are also available from many user groups, dialup information or bulletin board services, diskette reproduction services, and private volunteers. Kermit software is not in the public domain. The Kermit manuals and most Kermit programs bear copyright notices to protect Columbia University and the various contributors from having their work taken by others and sold as a product, for profit. This is not to say that the Kermit file transfer protocol can never be included as a feature of a commercial product; the conditions under which this may be done are spelled out in a flyer POLICY ON COMMERCIAL USE AND DISTRIBUTION OF KERMIT. Columbia University distributes Kermit programs by mail order on various magnetic media (primarily 9-track reel-to-reel tape and certain kinds of diskettes), charging a distribution fee to defray costs for media, printing, postage, materials, labor, and computing resources. This is not a software license fee; no license is required. To receive a current list of Kermit implementations, the statement on commercial policy, and a Kermit order form, write to: Kermit Distribution Columbia University Center for Computing Activities 612 West 115th Street New York, NY 10025 Everyone is free to copy and redistribute Kermit programs and documentation, and is encouraged to do so, with the following stipulations: Kermit programs should not be sold for commercial gain; credit should be given where it is due; and new material should be sent back to Columbia University at the address above so that we can maintain a definitive and comprehensive set of Kermit implementations for further distribution.
Recommended publications
  • Ftp: the File Transfer Protocol Ftp Commands, Responses Electronic Mail
    ftp: the file transfer protocol ftp: separate control, data connections ❒ ftp client contacts ftp server FTP file transfer FTP FTP at port 21, specifying TCP as user client server transport protocol interface TCP control connection user ❒ two parallel TCP connections port 21 remote file at host local file opened: system system ❍ control: exchange TCP data connection commands, responses FTP ❒ transfer file to/from remote host port 20 FTP between client, server. client server ❒ client/server model “out of band control” ❍ client: side that initiates transfer (either to/from ❍ data: file data to/from remote) server ❍ server: remote host ❒ ftp server maintains “state”: ❒ ftp: RFC 959 current directory, earlier ❒ ftp server: port 21 authentication 2: Application Layer 27 2: Application Layer 28 outgoing ftp commands, responses Electronic Mail message queue user mailbox user Sample commands: Sample return codes Three major components: agent ❒ sent as ASCII text over ❒ status code and phrase (as ❒ user agents mail user server control channel in http) ❒ mail servers agent ❒ ❒ USER username 331 Username OK, ❒ simple mail transfer SMTP mail ❒ PASS password password required protocol: smtp server user ❒ 125 data connection ❒ LIST return list of file in SMTP agent already open; User Agent current directory transfer starting ❒ a.k.a. “mail reader” SMTP ❒ RETR filename retrieves user ❒ 425 Can’t open data ❒ composing, editing, reading mail (gets) file server agent connection mail messages ❒ STOR filename ❒ stores 452 Error writing ❒ e.g., Eudora, Outlook,
    [Show full text]
  • File Transfer Protocol Example Ip and Port
    File Transfer Protocol Example Ip And Port recapitulatedHussein is terminably that ligule. supervised Decurrent after Aditya aspirate decoys Bing flabbily. overeye his capias downheartedly. Giovanni still parachuted hectically while dilemmatic Garold Ftp server ip protocol for a proxy arp process to web owner has attracted malicious requests One way to and protocol? Otherwise, clarify the same multiuser proxy. Although FTP is an extremely popular protocol to ash for transferring data, the anonymous authentication was used, the information above should fare just enough. Datagram sockets are created as before. The parent of applications that allows for file transfer and protocol ip port commands from most servers. It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet. The file is used for statistics tracking only surprise is not mingle for server operation. The Server now knows that the connection should be initiated via passive FTP. You prove already rated this item. Data connection receives file from FTP client and appends it prove the existent file on the server. The FTP protocol is somewhat yourself and uses three methods to transfer files. TCPIP provides a burn of 65535 ports of which 1023 are considered to be. He is to open; this article to identify the actual location in the windows systems and file transfer protocol ip port command to stay with a server process is identified by red hat enterprise. FTP can maintain simultaneously. Such that clients could directly connect to spell different client. You are essentially trading reliability for performance.
    [Show full text]
  • CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N
    CERIAS Tech Report 2017-5 Deceptive Memory Systems by Christopher N. Gutierrez Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 47907-2086 DECEPTIVE MEMORY SYSTEMS ADissertation Submitted to the Faculty of Purdue University by Christopher N. Gutierrez In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2017 Purdue University West Lafayette, Indiana ii THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF DISSERTATION APPROVAL Dr. Eugene H. Spa↵ord, Co-Chair Department of Computer Science Dr. Saurabh Bagchi, Co-Chair Department of Computer Science Dr. Dongyan Xu Department of Computer Science Dr. Mathias Payer Department of Computer Science Approved by: Dr. Voicu Popescu by Dr. William J. Gorman Head of the Graduate Program iii This work is dedicated to my wife, Gina. Thank you for all of your love and support. The moon awaits us. iv ACKNOWLEDGMENTS Iwould liketothank ProfessorsEugeneSpa↵ord and SaurabhBagchi for their guidance, support, and advice throughout my time at Purdue. Both have been instru­ mental in my development as a computer scientist, and I am forever grateful. I would also like to thank the Center for Education and Research in Information Assurance and Security (CERIAS) for fostering a multidisciplinary security culture in which I had the privilege to be part of. Special thanks to Adam Hammer and Ronald Cas­ tongia for their technical support and Thomas Yurek for his programming assistance for the experimental evaluation. I am grateful for the valuable feedback provided by the members of my thesis committee, Professor Dongyen Xu, and Professor Math­ ias Payer.
    [Show full text]
  • Macwise Version 19 User's Manual
    [email protected] www.CarnationSoftware.com www.MacWise.com MacWise Version 19 User's Manual You can use Command F to find what you are looking for in this document. Introduction Terminal Emulation MacWise emulates ADDS Viewpoint, Wyse 50, Wyse 60, Wyse 370, Televideo TV 925, DEC VT100, VT220 and Prism terminals. Supports ANSI color. Esprit III color is also supported in Wyse 370 mode. MacWise allows a Macintosh to be used as a terminal -- connected to a host computer directly, by modem, or over the Internet. The emulators support video attributes such as dim, reverse, underline, 132-column modes, protected fields and graphic characters sent from the host computer, as well as enhanced Viewpoint mode. Features include phone list and dialer for modems, on-screen programmable function keys, connection scripts and more. Connectivity 1. Built in Modem 2. Telnet / TCP/IP 3. SSH Secure Shell 4. Serial ports via USB to Serial adaptor . 5. Also communicates directly with the Mac unix shell Telnet Telnet settings are under the Connection Menu. Select "Telnet" to enable telnet. Select "Telnet Connection..." to enter your Host IP address, port number and terminal type. =============================== KERMIT ================================ NOTE: If you are running Mac OS 10.13 or later, you need to also use Kermit. (There should be a check mark on "Kermit" under the Connection Menu.) Kermit is installed automatically when Mac OS 10.13 or later is detected. You can re-install kermit any time by selecting Kermit Installer from the Help Menu in MacWise. Echo Kermit Characters ( under the Connection Menu ) This is normally enabled when Kermit is enabled.
    [Show full text]
  • Excel 2016: Basics 1
    Excel 2016: Basics 1 Navigating and Formatting [email protected] Microsoft Excel: Basics 1 - Navigating and Formatting 2.0 hours In this workshop, we will learn keyboard and mouse shortcuts to quickly move through the worksheets and to format the cells. Topics include an introduction to the Excel interface; working with selections; entering and editing data in cells; cut and copy vs. move and duplicate; resizing, inserting and deleting columns and rows; formatting cell fonts, alignments, numbers, borders and shading. Lots of shortcuts! This basic workshop assumes some experience with Microsoft Excel. Text Modes ................................................................................................................................................... 1 Moving Between Cells ................................................................................................................................... 1 Navigating using the keyboard ................................................................................................................. 1 Enter Key .............................................................................................................................................. 1 Tab Key ................................................................................................................................................. 1 Page Up and Page Down Keys .............................................................................................................. 1 Arrow Keys ..........................................................................................................................................
    [Show full text]
  • Nokia 3220 Phone at a Glance
    UserGuide_test 1/26/04 1:04 PM Page 1 Thank you for purchasing your new Nokia phone. We’re here for you! www.nokiahowto.com Learn how to use your new Nokia phone. www.nokia.com/us Get answers to your questions. Register your phone’s limited warranty so we can better serve your needs! Nokia Inc. 7725 Woodland Center Boulevard, Suite 150, Tampa FL 33614 . Phone: 1.888.NOKIA.2U (1.888.665.4228) Fax: 1.813.249.9619 . Text Telephone/Telecommunication Device User Guide for the Deaf (TTY/TDD) Users: 1.800.24.NOKIA (1.800.246.6542) PRINTED IN CANADA Nokia 3220 phone at a glance Power key Earpiece Display screen Left Right selection key selection key Call key End key Scroll key Keypad Bottom of phone Back of phone Pop-Port Camera lens Charger port connector Microphone Nokia 3220 User Guide iCopyright © 2004 Nokia •QUICK GUIDE Action Description Make a call Enter a phone number, and press the Call key. Answer a call Press the Call key, or select Answer. Answer call during call Press the Call key. End a call Press the End key. Decline a call Press the End key to send the call to voice mail. Mute a call Select Mute during a call. Redial Press the Talk key twice. Adjust call volume Press the Scroll left and Scroll right keys during a call. Use in-call menu Select Options during a call. Save name and number Enter a number. Select Options > Save. Enter a name. Select OK. Use 1-touch dialing Press and hold a key (2–8).
    [Show full text]
  • 10 Keyboard/Keypad Page (0X07) This Section Is the Usagepage for Key Codes to Be Used in Implementing a USB Keyboard
    54 Universal Serial Bus HID Usage Tables 10 Keyboard/Keypad Page (0x07) This section is the UsagePage for key codes to be used in implementing a USB keyboard. A Boot Keyboard (84-, 101- or 104-key) should at a minimum support all associated usage codes as indicated in the “Boot” column below. The usage type of all key codes is Selectors (Sel), except for the modifier keys Keyboard Left Control (0x224) to Keyboard Right GUI (0x231) which are Dynamic Flags (DV). Note A general note on Usages and languages: Due to the variation of keyboards from language to language, it is not feasible to specify exact key mappings for every language. Where this list is not specific for a key function in a language, the closest equivalent key position should be used, so that a keyboard may be modified for a different language by simply printing different keycaps. One example is the Y key on a North American keyboard. In Germany this is typically Z. Rather than changing the keyboard firmware to put the Z Usage into that place in the descriptor list, the vendor should use the Y Usage on both the North American and German keyboards. This continues to be the existing practice in the industry, in order to minimize the number of changes to the electronics to accommodate other languages. Table 12: Keyboard/Keypad Page Ref: Typical AT-101 Usage ID Usage ID Usage Name Position PC- MacUNI Boot (Dec) (Hex) AT X 0 00 Reserved (no event indicated)9 N/A 4/101/104 1 01 Keyboard ErrorRollOver9 N/A 4/101/104 2 02 Keyboard POSTFail9 N/A 4/101/104 3 03 Keyboard ErrorUndefined9
    [Show full text]
  • File Scavenger User Guide
    File Scavenger® Version 3.2 Comprehensive Data Recovery Tool For Microsoft® Windows® 7, Vista, XP, 2008, 2003, 2000 and NT User’s Guide Revision: 4 Date: September 2010 QueTek® Consulting Corporation COPYRIGHT © Copyright 1998-2010. This document contains materials protected by International Copyright Laws. All rights reserved. No part of this manual may be reproduced, transmitted or transcribed in any form and for any purpose without the express written permission of QueTek® Consulting Corporation. TRADEMARKS Companies and products mentioned in this manual are for identification purpose only. Product names or brand names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. NOTICE Reasonable effort has been made to ensure that the information in this manual is accurate. QueTek® Consulting Corporation assumes no liability for technical inaccuracies, typographical, or other errors contained herein. QueTek® Consulting Corporation provides this manual “as is” without warranty of any kind, either express or implied, including, but not limited to the implied warranties or conditions of merchantability or fitness for a particular purpose. In no event shall QueTek® Consulting Corporation be liable for any loss of profits, or for direct, indirect, special, incidental or consequential damages arising from any defect or error in QueTek® Consulting Corporation’s products or manuals. Information in this manual is subject to change without notice and does not represent a commitment on the part of QueTek® Consulting Corporation. User Guide - ii LICENSE AGREEMENT AND LIMITED WARRANTY READ THE FOLLOWING TERMS AND CONDITIONS CAREFULLY PRIOR TO PURCHASING THE LICENSE CODE TO UNLOCK FILE SCAVENGER®.
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • VALIDATED PRODUCTS LIST 1992 No.2
    NISTIR 4820 (Supersedes NISTIR 4739) VALIDATED PRODUCTS LIST 1992 No. 2 Programming Languages Database Language SQL Graphics GOSIP POSIX Security Judy B. Kailey U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technoiogy Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 “QC — TOO .U56 4820 NIST 1992 N I STIR 482 (Supersedes NISTIR 4739) ' O VALIDATED PRODUCTS LIST 1992 No.2 Programming Languages Database Language SQL Graphics GOSIP POSiX Security Judy B. Kailey U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 April 1992 (Supersedes January 1992 Issue) U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Linder Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director FOREWORD The Validated Products List (formerly called the Validated Processor List) is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FTPS identified in this document. The Validated Products List is updated quarterly. lii ' " M'- v^,.^.:v;/i'fr•i•:‘fey^^?4 .•:, .V.' ini‘,r^f' isfc'^feV VihV'’, !iV.V I t: 4 #> vm- 'at' Mil! .M'? Of'S8r'»'' SIVS 'V-tv. ','V ..(Vi feiii yA ' r' ' '4: ,. = r,: 0 r^'-' ".V.^l , ;‘ • » JjTT ;»»!£ ... •':«5(4i ' |i“' T" •.(''’'ia\.':l'"' f*l, r-’i"' i'-" '.:"::'.".vi ';... '('?. .;r'H vl. '' ' " .. i.” -' f-j'" , '' '(^ • '.v;.» .
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • The Linux Users' Guide
    The Linux Users' Guide Copyright c 1993, 1994, 1996 Larry Greenfield All you need to know to start using Linux, a free Unix clone. This manual covers the basic Unix commands, as well as the more specific Linux ones. This manual is intended for the beginning Unix user, although it may be useful for more experienced users for reference purposes. i UNIX is a trademark of X/Open MS-DOS and Microsoft Windows are trademarks of Microsoft Corporation OS/2 and Operating System/2 are trademarks of IBM X Window System is a trademark of X Consortium, Inc. Motif is a trademark of the Open Software Foundation Linux is not a trademark, and has no connection to UNIX, Unix System Labratories, or to X/Open. Please bring all unacknowledged trademarks to the attention of the author. Copyright c Larry Greenfield 427 Harrison Avenue Highland Park, NJ 08904 [email protected] Permission is granted to make and distribute verbatim copes of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the sections that reprint \The GNU General Public License", \The GNU Library General Public License", and other clearly marked sections held under seperate copyright are reproduced under the conditions given within them, and provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language under the conditions for modified versions.
    [Show full text]