Using an Apple II Microcomputer for Real-Time Control in a Behavioral Laboratory

Total Page:16

File Type:pdf, Size:1020Kb

Using an Apple II Microcomputer for Real-Time Control in a Behavioral Laboratory Behavior Research Methods & Instrumentation 1983, Vol. 15(2),158-166 SESSION IV TECHNICAL ISSUES IN SYSTEM DESIGN STUDENT COMPETITION AWARD Using an Apple II microcomputer for real-time control in a behavioral laboratory WINFORD A. GORDON, DON FOREE, and DAVIn A. ECKERMAN University ofNorth Carolina, ChapelHill, North Carolina 27154 This report describes the hardware and software developed to implement an Apple II (48 KB) as a real-time control device for operant experiments. The hardware has a straightforward design, so that it is readily understandable and can be built by individuals with only minimal experience in the use of integrated circuits and other electronic components. The software routines listed below represent an approach to controlling and handling the data generated by an operant experiment. Using these routines, we are able to record each response and experi­ mental event, the time of the occurrence, and the conditions at that time. The advent of microprocessor systems has made THE INTERFACE EXPANSION real-time computer control broadly available. Yet, lack­ ing the electronic skills needed to interface a micro­ The first element in the system is the AIO serial­ processor with laboratory equipment, many researchers parallel interface card, which has two 8-bit parallel are reluctant to implement a computer control system. ports and two serial ports. Since we do not use the Commercially produced hardware and software systems serial ports in this application, the expansion circuit are available, but the cost of these systems is often could be adapted to any device that provides two prohibitive. We have developed a control system that is 8-bit parallel ports. The AIO card is inserted into one of straightforward and inexpensive. It is our hope that the main board slots in the Apple II to provide input this description will help others who lack extensive and output (I/O) lines. We use one of the ports for experience in programming or circuit design to imple­ output and the other for input. Each port is represented ment microprocessor control of laboratory experiments. in the Apple as a single memory location and can be Our laboratory is equipped with an Apple II micro­ accessed by using a PEEK or POKE from APPLESOFT processor configured with 48-KB memory, an AIO BASIC, by using a free union variant record in PASCAL, serial-parallel interface card (SSM Microproducts, Inc.), or by using the load or store command in an assembly a Mountain Hardware Apple clock, and a single disk language routine. drive. The sections below describe the hardware expan­ With this card, additional interfacing logic is required sion we built for the AIO parallel interface and our in order to control more than eight devices. The first software approach. system described below is a simple, inexpensive circuit that expands the output of the interface to as many as 48 separate devices. It is not uncommon for laboratory studies to require such an array ofoutputs. Our operant This system was developed and documented as part of the studies of stimulus control, for example, require at least dissertation research of Winford A. Gordon. The work was partially supported by Public Health Service Grant MH-14269, 36 output lines to operate the 12 stimulus lamps in the awarded to the experimental psychology program of the Uni­ three in-line projectors that display the training and test versity of North Carolina. There was also support from the stimuli. We also need output lines to present reinforce­ Smith Research Fund of the University of North Carolina and ment and operate the chamber houselight. The circuit from a Sigma Xi grant in aid of research. Reprints of this described here meets these specific needs: It operates paper and program listings can be obtained by writing David A. Eckerman, Department of Psychology, UNC-Chapel Hill, all 36 stimulus lamps, although only one at any time, Chapel Hill, North Carolina 27154. and it operates the houselight and hopper at any time. 158 Copyright 1983 Psychonomic Society, Inc. REAL-TIME CONTROL 159 Our circuit recognizes logical combinations of the Table 2 8 bits in the interface port. Bits 0-3 are combined to Output Code for the Apple II AID Card in Slot 4 Output Port 49312 ($COAO) specify a value between 1 and 16. Since we have only = 12 stimulus lamps in each projector, we use only values CXJTPUT GlUJP 1-12. The value in interface port Bits 0-3 determines CXJTPUT # I. B C which of the 12 lamps in the projector is potentially 0 16 ($10) 32($20) 48($30) enabled. Bits 4 and 5 produce four mutually exclusive 1 17($11) 33 ($21) 49($31) 2 18($12) 34($22) 50 ($32) states: OFF, ENABLE PROJECTOR A, ENABLE 3 19($13) 35($23) 51 ($33) PROJECTOR B, or ENABLE PROJECTOR C. Thus, 4 20($14) 36 ($24) 52 ($34) these 2 bits turn on the selected lamp in the selected 5 21 ($15) 37 ($25) 53 ($35) 6 22($16) 38($26) 54($36) projector. Bits 6 and 7 are operated independently to 7 23 ($17) 39($27) 55 ($37) control the houselight and the reinforcement hopper, C 24 ($18) 40 ($28) 56($38) respectively. Table 1 shows how these 8 bits from the 9 25 ($19) 41 ($29) 57 ($39) AIO card are combined to provide the number of out­ 10 26 ($IA) 42 ($2A) 58 ($3A) 11 27 ($IP) 43 ($2Bl 59 ($38) puts we use. 12 28 ($IC) 44($2C) GO($3C) As an example of how these combinations work, consider that placing the value 19 in the output port Note- To use either of the independent lines, add 64 ($40) for turns on Lamp 3 in Projector A, whereas placing the Line 7 or 128 ($80) for Line 8 to the values listed above. value 35 in this location turns on Lamp 3 in Projector B. The binary representation of these values reveals that the lowest 4 bits (Bits 0-3), which select the lamp, are and out of the AIO card are passed through standard equivalent, but Bits 4 and 5, which select the projector, optoisolators (Radio Shack 76-1628) to protect the differ. In binary notation, these values are 000100 II Apple from any circuit overloads. The light-emitting vs.00100011. diode (LED) in the optoisolators is driven by the 5-V Table 2 lists the code that would be used to produce signal from the Apple, and the phototransitors switch the various outputs of our interface system. Decimal a 5-V signal generated by an external power supply. values are listed, with their hexadecimal equivalents. The second power source is needed if the Apple is to be These values would be given in a table for the table completely isolated and protected from circuit over­ lookup, as described in the software section. loads; it also avoids potential problems with power The interface hardware can be described as having demands on the Apple power supply. three stages (see Figure I). Stage 1 involves optoisolation Stage 2 in the circuit contains the logic needed to of the computer from the interface. The eight lines in create the additional output lines. All signals in this stage are standard 5-V transistor-transitor logic (TTL) signals. The outputs of Optoisolators 0-3 are passed into Table I Logical Combinations of Eight Lines to Yield 38 Outputs a 4-line-to-16-line decoder (LS74154). The decoder ---~-_. provides 16 discrete outputs: one output is grounded, AIO ooTPUT or "pulled low," for each of the possible configurations LINE # LINE # o --) of Bits 0-3. These outputs are inverted (LS7404), so 1 --) LINES 0-3 aHlINE that the grounded output becomes a 5-V signal, and o ---) 2 ---) L(X;ICALLY 'TO QlliATE passed into Stage 3 of the circuit. The outputs ofOpto­ 3 --) 12 LINES FOR 'IllE isolators 4 and 5 are logically combined with inverters 1 ---) 4 ---) STHlJLUS LAMPS llJ 5 ---) THE 'IllREE IIDJECTORS and a set of two-leg AND gates (LS7408). A different 2 ---) 6 ---) THIS IS DONE WITH gate produces a 5-V output for each of three conditions 7 ---) A 4-'I\f-16 LINE of Optoisolators 4 and 5: on/off, off/on, and on/on. The 3 ---) 8 ---) DEaIDER IC C(XIlBINED 9 ---) VlITH AN INVERTER outputs of Optoisolators 6 and 7 are passed directly to 10 ---) Stage 3. 11 ---) Stage 3 consists of 17 additional optoisolators. The input to these optoisolators is the 5-V TTL signal gen­ 12 ---) A LINFS 5 ~ID 6 4 ---) CO/EINE '10 ENABLE erated in Stage 2. The output is a 12-V signal that 13 --) B a'IE OF WE 'llIREE operates NPN power transistors (Radio Shack 76-2042). 5 ---) PRCDECTORS The power transistors switch the 28 V needed to operate 14 --) C the laboratory equipment we use. In our application, 6 ---) 15 ---) WRNS 01 'IllE HOOSE the equipment consists of small incandescent bulbs and LICHT relay coils. Figure 2 details the circuit between the transistors, relays, and bulbs. The maximum power 7 ---) 16 ---) RAISES WE rcco HOPPER demand placed on our 28-V power supply never exceeds 1.5 A. 160 GORDON, FOREE, AND ECKERMAN n IGll 11 III ~ Itit I 74154 II 7404 I.I 7 ""I IJ I J I J W c.,~ L!~ ", I II r v1 n II II 1" 7404 1 L 7404 1 I ~I I~ \J _ .J A. pp~ ., ..0 i' AIO ILt=vLj" POR " 1 1& - - - - - '2 API'lE " GNO bfi ,A -R~~RI GND = + +5V = V 470 = RI 4700 = R2 IOK=R3 (RESISTANCE IN OHMS) Figure 1.
Recommended publications
  • DOCUMENT RESUME Basic Programming II
    DOCUMENT RESUME ED 280 432 IR 012 568 TITLE Basic Programming II: Course Guide; Revised Edition; INSTITUTION Hawaii State Dept; of Education; Honolulu; Office of Instructional Services; REPORT NO RS-86-9863 PUB DATE Jun 86 NOTE 205p; PUB TYPE Guides Classroom Use Guides (For Teachers) (052) Computer Programs (101) Reports Descriptive (14I) EDRS PRICE MFOI/PC09 Plus Postage; DESCRIPTORS Business Education; Classification; Computer Graphics; *Computer Literacy; Computer Science Education; Course Descriptions; *Course Objectives; Ethics; *Learning Activities; Mathematics Instruction; *Microcomputers; *Programing; Programing Languages;_Resource Materials; Secondary Education; State Curriculum Guides; *Teaching Methods IDENTIFIERS *BASIC Programing Language ABSTRACT This guide is designed to provide teachers with guidelines and suggested activities for teaching a one-semester advanced programming course7-BASIC Programming II--for the ninth through twelfth gradesAlthough primarily oriented toward _ mathematics_the guide does offer sample applications in_business that also_address the needs of students with_a variety of_academic_ backgrounds._Intended to serve as a framework of goals and activities upon which the teacher can organizei_build, and expand his or her course, the_guide provides a course description, course requirements, a course outline, a syllabus, course management considerations, sample_activities and programs, and suggested resources. The activities include teaching strategies for introducing_concepts, developing specific skills,
    [Show full text]
  • A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
    Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in­ formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support.
    [Show full text]
  • Oral History Interview with John Brackett and Doug Ross
    An Interview with JOHN BRACKETT AND DOUG ROSS OH 392 Conducted by Mike Mahoney on 7 May 2004 Needham, Massachusetts Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute John Brackett and Doug Ross Interview 7 May 2004 Oral History 392 Abstract Doug Ross and John Brackett focus on the background of SofTech and then its entry into the microcomputer software marketplace. They describe their original contact with the University of California at San Diego (UCSD) and licensing the p-System which had been developed there. They discuss the effort required to bring the program to production status and the difficulties in marketing it to the sets of customers. They talk about the transition from 8 bit to 16 bit machines and how that affected their market opportunities. They conclude with a review of the negotiations with IBM and their failure to get p-System to become a primary operating environment. That, and the high performance of Lotus 1-2-3, brought about the demise of the p- System. [John Brackett requested that the following information from Wikipedia, the free encyclopedia, be provided as an introduction to this oral history interview: “UCSD p-System or UCSD Pascal System was a portable, highly machine independent operating system based upon UCSD Pascal. The University of California, San Diego Institute for Information Systems developed it in 1978 to provide students with a common operating system that could run on any of the then available microcomputers as well as campus DEC PDP-11 minicomputers. UCSD p- System was one of three operating systems (along with PC-DOS and CP/M-86) that IBM offered for its original IBM PC.
    [Show full text]
  • Call-A.P.P.L.E. Magazine 1982-8
    Call-A.P.P.L.E. Magazine • August 1982 ~.I~~c!)~-A ~ - ...P. P. L. E. APPLE PUGETSOUND PROGRAM LIBRARY EXCHANGE A W .. shinglon 51 .. 11.' Non-Profit Corpordlion Call-A.P.P.L.E. Magazine Issue Year 1982 Issue Month August Apple Pugetsound Program Library Exchange I Page 0001 of 0090 Call-A.P.P.L.E. Magazine • August 1982 II Volume V, Number 8 £L 75 UK, A Call -A.P.P.L.E. TECHNIQUE: Garbagemen Strike Page 9 A Call -A.P.P.L.E. APPLECATION: Total Recall PagelS A Call -A.P.P.L.E. REVIEW: BASIS 108 ... An Alternative Page 23 A Call -A.P.P.L.E. REVIEW: Spelling Programs Page 31 Apple Pugetsound Program Library Exchange Page 0002 of 0090 Call-A.P.P.L.E. Magazine • August 1982 H, II II Volume V, Number 8 August 1982 52.50 (53.00 Canada, £1. 75 UK. A Call -A.P.P.L.E. TECHNIQUE: Garbagemen Strike Page 9 A Call -A.P.P.L.E. APPLECATION: Total Recall PagelS A Call -A.P.P.L.E. REVIEW: BASIS 108 ... An Alternative Page 23 A Call -A.P.P.L.E. REVIEW: Spelling Programs Page 31 Apple Pugetsound Program Library Exchange Page 0003 of 0090 Call-A.P.P.L.E. Magazine • August 1982 THE PROWRITER COMETH. (And It Cometh On Like Gangbusters.) Evolution. It's InevItable. An eternal venty. Just when you thInk you've got it knocked. and you're resting on your laurels. some­ body comes along and makes a dinosaur out of you.
    [Show full text]
  • David T. Craig 941 Calle Mejia # 509, Santa Fe, New Mexico 87501 Home (505) 820-0358 Compuserve 71533,606
    ------------------------------------------------------- David T. Craig 941 Calle Mejia # 509, Santa Fe, New Mexico 87501 Home (505) 820-0358 CompuServe 71533,606 ------------------------------------------------------- Mr. Jef Raskin 8 Gypsy Hill Pacifica CA 94044 Re: Canon Cat and SwyftCard information Dear Mr. Raskin: Enclosed is a photocopy of the Canon Cat article that I wrote for the Historical Computer Society. The printed article is much better than the draft that you saw. Thanks for your help. Unfortunately, I was unable to obtain copies of all of your various articles concerning the Cat and Information Appliance. I did finally receive your LEAP paper from my local public library via inter-library loan, but the library could not locate your Venture Vulture paper. I received the LEAP paper after I had sent the final Cat paper for publication so was not able to correctly document LEAP's technology. In an e-mail to me from at least a month ago you said that if I sent you an envelope large enough for a SwyftCard and return postage that you would send me one. Please use the envelope that I've sent this letter in for this purpose. You should also find here self-sticking stamps for the postage and a mailing label with my mailing address. I would also very much like, if possible, to obtain a user's manual for the SwyftCard. From your comments in Microsoft's book Programmers at Work this manual seems to be very well written. There is no rush in returning this envelope so please take your time. I am slowly updating my Cat paper to add a correct description of LEAP and more information about the people behind the Cat and its hardware and software.
    [Show full text]
  • Pascal Quick Guide
    PPAASSCCAALL -- QQUUIICCKK GGUUIIDDEE http://www.tutorialspoint.com/pascal/pascal_quick_guide.htm Copyright © tutorialspoint.com PPAASSCCAALL -- OOVVEERRVVIIEEWW Pascal is a general-purpose, high-level language that was originally developed by Niklaus Wirth in the early 1970s. It was developed for teaching programming as a systematic discipline and to develop reliable and efficient programs. Pascal is Algol-based language and includes many constructs of Algol. Algol 60 is a subset of Pascal. Pascal offers several data types and programming structures. It is easy to understand and maintain the Pascal programs. Pascal has grown in popularity in the teaching and academics arena for various reasons: Easy to learn. Structured language. It produces transparent, efficient and reliable programs. It can be compiled on a variety of computer platforms. Features of the Pascal Language Pascal has the following features − Pascal is a strongly typed language. It offers extensive error checking. It offers several data types like arrays, records, files and sets. It offers a variety of programming structures. It supports structured programming through functions and procedures. It supports object oriented programming. Facts about Pascal The Pascal language was named for Blaise Pascal, French mathematician and pioneer in computer development. Niklaus Wirth completed development of the original Pascal programming language in 1970. Pascal is based on the block structured style of the Algol programming language. Pascal was developed as a language suitable for teaching programming as a systematic discipline, whose implementations could be both reliable and efficient. The ISO 7185 Pascal Standard was originally published in 1983. Pascal was the primary high-level language used for development in the Apple Lisa, and in the early years of the Mac.
    [Show full text]
  • Retrocomputer Magazine
    Jurassic News Retrocomputing: Buon compleanno tre scuole di Spectrum! pensiero, un solo movimento C R La storia del BASIC A Y 1 Le mostre Torino: Steve Jobs 1955-2011 Bertiolo 2012 Apple Club: il miniBASIC Trento: Era domani Retrocomputer Magazine Anno 7 - Numero 41 - Maggio 2012 Collophon I dati editoriali della rivista Jurassic News Jurassic News Rivista aperiodica di Retrocomputer Jurassic News Coordinatore editoriale: Tullio Nicolussi [Tn] E’ una fanzine dedicata al retro- Redazione: computing nella più ampia accezione del [email protected] termine. Gli articoli trattano in generale dell’informatica a partire dai primi anni Hanno collaborato a questo numero: ‘80 e si spingono fino ...all’altro ieri. Besdelsec [Bs] Lorenzo [L2] La pubblicazione ha carattere Sonicher [Sn] puramente amatoriale e didattico, tutte Salvatore Macomer [Sm] Lorenzo Paolini [Lp] le informazioni sono tratte da materiale Giovanni [jb72] originale dell’epoca o raccolte su Internet. Antonio Tierno Cecilia Botta Normalmente il materiale originale, Moira Bertolini anche se “giurassico” in termini Felice Pescatore informatici, non è privo di restrizioni di Luca Papinutti utilizzo, pertanto non sempre è possibile Damiano Cavicchio Massimo Cellini riportare per intero articoli, foto, schemi, listati, etc…, che non siano esplicitamente Diffusione: liberi da diritti. La rivista viene diffusa in formato PDF via Internet agli utenti E’ possibile che parti del materiale registrati sul sito: pubblicato derivi da siti internet che non sono citati direttamente negli articoli. www.jurassicnews.com. Questo per la difficoltà di attribuzione del Contatti: materiale alla fonte originale; eventuali [email protected] segnalazioni e relative notifiche sono benvenute. Copyright: I marchi citati sono di copyrights La redazione e gli autori degli dei rispettivi proprietari.
    [Show full text]
  • The Macintosh Programmer's Workshop
    The Macintosh Programmer’s Workshop Richard J. Meym and Jeff W. PaIrish,Apple Computer me Macintosh hen the Apple Macintosh was ming), a shell command language, and a introduced, it was clear that language for automating program builds. development WApple needed to provide acom- Originally developed for the Macintosh environment combines plete softwaredevelopmen t environment Plus, MPW now also runs on the Macin- for both itself and third-party developers. tosh SE and 11. a gPaphica1 intehce, The result was the Macintosh Program- This article focuses on the programde- Unix-like command mer’s Workshop.’ MPW includes a com- velopment environment rather than on IangUNe, and prehensive set of programming tools and the tools in that environment. Innovations handles several languages. It also com- not covered here include C and Pascal ex- immediate command bines the graphical interface common to tensions for extended-precision IEEE execution in any all Macintosh applications, a command floating-point numbers, tools to compile window. Here’s how language similar to the Unix shell lan- and decompile Macintosh resources (data guages, and Smalltalk’simmediate execu- structures used to describe menus, win- it works. tion of commands in any window. dows,and dialogues), and the MacApp ob Innovative features include an inte- ject-oriented generic application. grated command and editing language, redirection of input and output to win- History dows and to selected text in windows, a When the Macintosh was introduced in graphical interface for each command, January 1984, most software for it was writ- and userdefined menus, which associate ten using the Lisa Workshop, acrossdevel- shell commands with menu items.
    [Show full text]
  • QUICK REFERENCE CARD an Error Message Is Given If a DOS Command INIT X [,Vv] [,Ss] [,Dd] Quantity Is Too Large Or Too Small
    DOS COMMAND PARAMmRS HOUSEKEEPING COMMANDS QUICK REFERENCE CARD An error message is given if a DOS command INIT X [,Vv] [,Ss] [,Dd] quantity is too large or too small. Initializes a blank diskette to form a slave On this card, DOS commands are grouped into diskette. Assigns greeting program name X these 5 categories: and volume number v (if specified). SAVEs ALL FILES the BASIC program currently in memory, under Housekeeping commands: file name X. INIT LOAD DELETE VERIFY MAXFILES Parameter As shown Min Max CATALOG RUN LOCK MON Slot SAVE RENAME UNLOCK NOMON ,Ss S1 S7 Drive ,Dd D1 D2 CATALOG [, Ss] [,Dd] Displays volume number and all files on a Volume ,Vv V0 V254 Access Commands: * diskette, with each file's type and sector FP INT PRil INil CHAIN * Using v0 is like omitting the Vv parameter. length. * indicates a LOCKed file. the diskette's volume number is ignored. • Sequential Text File Commands: Type Description (How created) OPEN READ APPEND EXEC Smallest volume number INIT will actually assign to a diskette is 1. I Integer BASIC program file (SAVE) CLOSE WRITE POSITION A Applesoft BASIC program file (SAVE) T Text File (OPEN, then WRITE) Random-Access Text File Commands: SEQUENTIAL TEXT FILES B Binary memory-image file (BSAVE) OPEN CLOSE READ WRITE Parameter Machine-Language File Commands: As shown Min Max Byte SAVE X [,Ss] [,Dd] [,Vv] BLOAD BRUN BSAVE ,Bb Bill B32767 Relative Field * ,Rp Rill R32767 Stores current BASIC program onto diskette, under file name X. Overwrites any previous NOTATION AND SYNTAX * With EXEC, always relative to field Ill.
    [Show full text]
  • Enhancing Applesoft Using Ampersand Routines
    Behavior Research Methods, Instruments, & Computers 1988, 20 (2), 224-230 Enhancing Applesoft using ampersand routines DOUGLAS B. EAMON University of Wisconsin-Whitewater, Whitewater, Wisconsin Machine language routines, which can provide many useful and unusual applications for BASIC, run faster than BASIC and usually occupy less memory than comparable BASIC routines. Ex­ amples of two types of easy-to-use enhancements to Applesoft BASIC are described. The first type consists of integrated collections of enhancements and extensions that are used as a group. A second type allows program developers to select only those routines that are desired. Features available in several sets of such routines are discussed. Applesoft BASIC's ampersand (&) jump feature gives tor or BLOADing the routines each time the program is the programmer an easy and fast way to connect machine run). language routines to BASIC. When the Applesoft inter­ There are two major approaches to development of preter encounters an "&," it does an immediate and un­ commercially available ampersand utilities. In the first, conditional jump to location $3F5 (decimal 1013). This the routines are provided as an integrated and insepara­ feature, originally described as being "intended for the ble collection. A second approach is to provide routines computer's internal use only" and "not a proper that may be individually selected and added to programs. APPLESOFT command" (Apple Computer, 1978, The major advantage ofthe first approach is that it is pos­ p. 123), has become the favorite procedure for execut­ sible to provide many functions with less memory, since ing machine language routines from a running Applesoft the utilities usually share subroutines.
    [Show full text]
  • Automated Malware Analysis Report for $06A896BA.Xls
    ID: 191155 Sample Name: $06A896BA.xls Cookbook: defaultwindowsofficecookbook.jbs Time: 00:38:32 Date: 21/11/2019 Version: 28.0.0 Lapis Lazuli Table of Contents Table of Contents 2 Analysis Report $06A896BA.xls 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Analysis Advice 5 Mitre Att&ck Matrix 6 Signature Overview 6 Networking: 6 System Summary: 6 Hooking and other Techniques for Hiding and Protection: 6 HIPS / PFW / Operating System Protection Evasion: 6 Behavior Graph 7 Simulations 7 Behavior and APIs 7 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 8 Yara Overview 8 Initial Sample 8 PCAP (Network Traffic) 8 Dropped Files 8 Memory Dumps 8 Unpacked PEs 8 Sigma Overview 8 Joe Sandbox View / Context 8 IPs 8 Domains 8 ASN 8 JA3 Fingerprints 8 Dropped Files 8 Screenshots 9 Thumbnails 9 Startup 9 Created / dropped Files 9 Domains and IPs 9 Contacted Domains 10 URLs from Memory and Binaries 10 Contacted IPs 10 Static File Info 10 General 10 File Icon 10 Static OLE Info 10 General 10 OLE File "$06A896BA.xls" 10 Indicators 10 Summary 11 Document Summary 11 Streams 11 Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096 11 General 11 Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096 11 General 11 Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 15728 11 General 11 Copyright Joe Security LLC 2019 Page 2 of 13 Network Behavior 12 Code Manipulations
    [Show full text]
  • (TIL) Apple II Articles
    ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Apple II Computer Family Technical Information ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Apple Technical Information Library (TIL) Apple II Articles ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Date March 1997 ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– Source Compuserve Apple II Computer Family Technical Information Apple Technical Information Library (TIL) Apple II Articles : March 1997 : 1 of 681 ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– ================================================================================ DOCUMENT March 1997 A2TIL.Catalog ================================================================================ Apple ][ Articles from the Apple Technical Information Library March 1997 -- David T. Craig ([email protected]) Columns: 1 - File name 2 - Pages (assumes 60 lines per page) 3 - Lines 4 - Longest line length 5 - Article title A2TIL001.TXT 6 358 84 Apple Tech Info Library Overview: How to Search for Articles A2TIL002.TXT 2 102 75 16K RAM / Language Cards: Alternate Suppliers A2TIL003.TXT 2 105 79 80-Column Text Card: Applesoft Control Codes (11/96) A2TIL004.TXT 1 31 78 80-Column Text Cards: Apple II & II Plus Compatibility (11/96) A2TIL005.TXT 1 27 76 Access II and Apple IIc Plus: No 40-Column Mode A2TIL006.TXT 1 15 77 Access II: Does Not Support VT100 Line Graphics A2TIL007.TXT 1 52 76 Access II: Specifications (Discontinued) A2TIL008.TXT 1 48 78 Apple 3.5 Drive: Description
    [Show full text]