Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Introduction Introduction WHO THIS BOOK IS FOR There’s no question that you’ll get some good out of this WHY WE WROTE THIS BOOK book no matter how much of a Mac expert you are. DP: Everybody who’s ever worked Heck, even if you throw away the book, the accompany- with a Mac already knows that you ing 600 MB of spectacular software will make you discard a file by moving its icon to mighty glad you picked it up. the Trash can, that you select text by dragging across it, and that you end But we may as well admit that this book completely the day by choosing Shut Down skips over the basics of using a Macintosh. If you don’t from the Special menu.The world already know how to point and click, open windows, doesn’t need another book to define insert a disk, use a menu, and open a control panel, you scroll bar. should take a moment to play with the animated pro- JS: So when we started writing gram called either Mouse Practice or Macintosh Basics this book, we worked from one that came with your Mac. Read a manual. Read Macs For simple, overarching concept: Under Dummies, a really good beginner’s book from IDG no circumstances would we define Books (written by one of your present authors). Do scroll bar. whatever you have to do. DP: Instead, we decided to tell As a matter of fact, here are the terms we’re going to secrets: secrets about how a Mac really be tossing around without any definition: works, secrets that software program- Ô-key, Ú menu, backup copy, click, control panel, mers buried in programs but forgot to cursor, Delete key, desktop, double-click, File menu, tell the manual writer, secrets that floppy disk, folder, font, hard drive, icon, K (kilobyte), answer some of the most frequently keyboard, launch a program, MB (megabyte), menu, asked (and seldom answered) quest- ions about Macintosh computing, menu command, monitor, mouse, numeric keypad, secrets such as how to recover a file Option key, point, quit a program, Return key, spacebar, after you’ve dragged it to the Trash — scroll bar, System 7, title bar (of a window), Trash. and emptied the Trash. xxxi xxxii Macworld Mac SECRETS, 4th Edition JS: Or what would happen if you didn’t On the other hand, this book doesn’t go to the choose Shut Down and just switched the very technical ends of the Mac universe, either. It Mac off.What are you supposed to do doesn’t talk about programming in C language or when you try to select text, but the mouse using DAL or hooking up to a mainframe. And we seems jerky, sticky, and out of control? And what about those times when your Mac wouldn’t tell you what you can accomplish by appears to be going just plain berserk — going inside your Mac with a soldering gun — when turning the machine off doesn’t even if we knew. even turn it off? This book is for everybody in the middle — DP: All those elusive, mystical Ô-Option- everybody who’s no longer impressed by the way Shift-Tab-Question Mark key sequences that the Trash can bulges when something’s in it, but are whispered at little-known user groups… wouldn’t mind knowing how to change a file’s icon or unlock the hidden 5MB of storage space on JS: The little animated surprises that lurk inside commercial programs… every hard drive. DP: The trick to connecting two Macs together with a piece of phone wire, or getting your PowerBook safely through SECRETS OF THIS BOOK the X-ray machine, or making your icons invisible to prying eyes… The biggest secret to getting the most out of this book is understanding its structure. Each topic is JS: …at last, it’s all been collected into divided into halves.The first part is a general discus- one substantial paperback written by a sion, like a miniarticle. It’s followed by the Secrets: couple of former college roommates. undocumented, often never-before-published hints DP: Is there anything else you think we and tips for pushing your Mac to its max. should mention? JS: Do the words free software mean anything to you? DP: Good point.We’ve included an PART BY PART incredible stash of great programs on a Here’s how the primary book sections are broken CD-ROM at the end of the book. down: JS: We were both sick of reading books PART I: SYSTEM SOFTWARE REVEALED unearths insider that tell you about some great software and then send you to your local user group information about the free software you got with or store to find it. So we decided from the your Mac — namely, the System software that fills outset that this book would be different. If that black System CD-ROM or that mound of we mention something you need, we white System disks. But we won’t mention only the included it with the book. Finder (and aliases and labels and Trash and the DP: And not only shareware.We’ve also Desktop file), but also the important Installer, your included commercial software, from actual control panels, your Apple menu, and all those software companies such as Adobe, Claris, Apple Extras. And, best of all, this part identifies all the System-folder clutter you can throw out. Introduction xxxiii PART II: SECRETS OF THE MACHINE takes you into the Dantz Development, Abbott Systems, Now actual mechanics of the Mac. You won’t go so far in Software, MicroFrontier, Affinity, and Nova that you’ll need a degree in electrical engineering; Development. And we’ve even thrown in a you’ll just learn enough of the inner workings to be couple of programs written especially for this book — totally exclusive software. All useful. This part, for example, actually gives a this adds up to a book that delves into the decent explanation of how to use virtual memory. inner workings of the machine, the It includes a Disk Chapter, a Memory Chapter, and hardware behind the hardware, the raw special coverage of the Power Macs, Performas, code, the… and PowerBook laptops. Chapters 12 and 13 even JS: Wait a minute, this isn’t going to be contain detailed Mac-by-Mac model descriptions one of those horribly dry, technical, IBM- so that you’ll know what you bought, how it can be style books that probes the depths of upgraded, and how much technology has marched programming and discusses things like — on since you bought your machine. like DIP switches, is it? PART III: APPLICATION SECRETS covers the programs DP: DIP switches won’t even be you probably use in day-to-day work: major play- mentioned. ers such as ClarisWorks, Word, Excel, and JS: So then why is there a “DIP Switch” FileMaker, as well as software like ResEdit that can entry in the index? help make the Mac more yours. This part is a DP: Because you just said DIP Switches. whole book-within-a-book, with enough expert Once you say it, it goes in the index. Now insight to make you say “Wow” at least once per it’s part of the book. page. JS: Just because I said it. PART IV: ATTACHMENTS is about everything you DP: Yes! That’s how indexes work. So, attach to your computer — printers (and, there- anyway, we think this book will show you fore, fonts), modems (and, therefore, the Internet how to get the most from your Mac and and America Online), scanners, CD-ROM players, increase the… NuBus and PCI cards, and networks. At the end of JS: So if I say “DOS,” suddenly DOS is in this part is a troubleshooting chapter that, among the index? other things, contains our Rule of Three: a trou- bleshooting trick that solves about 99 percent of DP: Right, so quit saying stuff like that. typical mysterious Mac crashes and odd behaviors. I’m trying to finish this obligatory introductory section… PART V: THE SECRETS SOFTWARE VAULT describes the dozens of fantastic programs that come with this JS: What about AUTOEXEC.BAT? And COM1? And RS-422 port? book. They come, by the way, on a CD-ROM. If you don’t have a CD-ROM drive, the publisher will DP: Stop it! Stop it! send you floppy disks, free, containing the best of JS: Just checking. this software. Call IDG Books at 800-434-3422. DP: Shall we begin? JS: Let’s. xxxiv Macworld Mac SECRETS, 4th Edition SIDEBARS Along the way, we intend to spice things up with special minitopics: MACINTOSH SECRET TRUE FACT A Macintosh Secret has,we True Facts,however,may not end suppose,much in common with happily.These are fun tidbits a regular Hint or Trick or Tip.But from the world of high-powered to qualify for its own special Silicon Valley politics:tales of sidebar,a Macintosh Secret must Apple intrigue or Adobe have particular juiciness,a warfare,and other trivia. surprising element,or special pertinence to the discussion at hand. CASE HISTORY Case Histories are true stories from real life,reflecting the DIALOGUE genuine agony of trying to solve As you can imagine, writing a tightly a computer problem as deadlines integrated book like this is difficult loom.Of course,we’ve selected for one person.We found that it may only stories with happy endings. even be tougher for two; sometimes we (JS and DP) simply couldn’t agree.
Recommended publications
  • Issue #63, July 2000 Starting Our SIXTH Year in Publishing!
    Issue #63, July 2000 Starting our SIXTH year in publishing! 64a Page 1 Wed, Jul 2000 Cover by: Bill Perry [email protected] Published by My Mac Productions 110 Burr St., Battle Creek, MI 49015-2525 Production Staff Tim Robertson • [email protected] Publisher / Creator / Owner Editor-in-Chief Adam Karneboge • [email protected] Webmaster / Contributing Editor Roger Born • [email protected] Website Edior Barbara Bell • [email protected] Director, Public Relations •Jobs & Woz • Inspiration Artwork Created by: •Mike Gorman• [email protected] •Bill Perry• [email protected] •Tim Robertson• [email protected] •Adam Karneboge• [email protected] This Publication was created with: DOCMaker v4.8.4 http://www.hsv.tis.net/~greenmtn & Adobe Acrobat 4.0 http://www.adobe.com 64a Page 2 Wed, Jul 2000 Other Tools: Adobe Photoshop 5.5, 5.0.1 ColorIt! 4.0.1 BBEdit Lite ClarisWorks 5.0 Microsoft Word 98 GraphicConverter Snapz Pro 2.0 SimpleText Netscape Communicator 4.6.1 Internet Explorer 4.5 Eudora Pro 4.0.2 FileMaker Pro 4.0v3 QuickKeys 4.0 and the TitleTrack CD Player (To keep us sane!) Website hosted by Innovative Technologies Group Inc. http://www.inno-tech.com My Mac Magazine ® 1999-2000 My Mac Productions. All Rights Reserved. 64a Page 3 Wed, Jul 2000 http://www.inno-tech.com http://www.smalldog.com http://www.megamac.com 64a Page 4 Wed, Jul 2000 Advertising in My Mac = Good Business Sense! With over 500,000 website visits a month and thousands of email subscribers, You just can't go wrong! Send email to [email protected] for information.
    [Show full text]
  • Mac OS 8 Update
    K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS.
    [Show full text]
  • Shareware Solutions II
    SharewareShareware SolutionsSolutions IIII An Exciting Apple II Journey Into The Future Volume 3, Issue 1 Spring, 1996 Heard It Through The Grapevine Hard Drive Give Away following e-mail message: The There was also quite a bit of dis- winner of the HD is Keith Saga- cussion about Brutal Deluxes Everyone whose subscription low. We threw all of the papers System 6.0.2 update, and Oliv- was current at the end of Febru- into the air, then we threw a ier admitted that his program- ary, 1996 was automatically en- dart at one. There were three ming partner suffered from a tered into the Hard Drive Give names hit by the dart, but only hard drive crash and that much Away Contest, and the winner one was legible, so Keith was of the work had been lost. of that contest is Keith Saga- the winner. low, a IIGS owner from Central The freewheeling online chat Valley, New York. Keith is now Thanks to Tony Diaz for do- session was attended by more the proud owner of a 120 Mega- nating the drive. Thanks to Auri than 30 people, and a good time byte Focus Hard Drive. for acting as an intermediary to seemed to be had by all. Steve Wozniak. Thanks to Woz From the time the contest was for choosing the winner. But Upon his return to France, Oliv- announced in the last issue un- most of all, thanks to all of you ier started work on the next Bru- til the time that Keith received for supporting Shareware Solu- tal Deluxe release, a IIGS game his hard drive, several unexpect- tions II.
    [Show full text]
  • Volume 4, Number 7 July 1, 1998 [email protected]
    About This Particular Macintosh™ 4.07: About the personal computing experience™ Volume 4, Number 7 July 1, 1998 Send requests for free subscriptions to: [email protected] Cover Art ©1998 Jamal Ghandour <[email protected]> We need new cover art every month! Write to us! Contributors Scott R. Boveia Scott Byers Martin Cox Simon Edison Jamal Ghandour Edward Goss [email protected] Tom Iovino Staci Trekles Robert Paul Leitao Robert Madill Mike Shields Michael Tsai Marc Zeedar Macintosh users like you Please write for ATPM! Check out the Guidelines Editorial Staff Publishers - Michael Tsai & Robert Paul Leitao Editor - Michael Tsai Managing Editor - Robert Paul Leitao Opinionated Associate Editor - Mike Shields Reviews Editor- Robert Madill Copy Editor - Christopher Turner Shareware Reviews Editor - Vacant Interviews Manager - Vacant Publicity Manager - Kyle Alexander Page o’ Linker - Vacant Welcome Author - Robert Paul Leitao List Server Manager - Michael Tsai Webzingers - Michael Tsai, Evan Trent Beta Testers - The Staff Columnists Jamal Ghandour Edward Goss Tom Iovino Robert Paul Leitao Mike Shields Michael Tsai Artwork & Design Graphics Director - Jamal Ghandour Layout/Design - Michael Tsai Blue Apple Icon Designs - Marc Robinson Typewriter-Style Section Headers - RD Novo The Tools Anarchie AppleWorks BBEdit DOCMaker Emailer Illustrator Kai’s PowerTools LetterRip Myrmidon Nisus Writer Online Army Knife Photoshop ResEdit Snapz Pro StuffIt The Fonts Carbonated Gothic Cheltenham Cloister Foundation Frutiger Garamond Geneva Gill Sans Helvetica Isla Bella Marydale Where to Find ATPM Online and downloadable issues are available at the ATPM Web Page: < h t t p : / / w w w . a t p m . c o m > and via anonymous FTP at: < f t p : / / f t p .
    [Show full text]
  • Emailer and a Review of Owen Linzmayer's Book, the Mac Bathroom Reader
    to About Thiiis Partiiiculllar Maciiintosh® 1.06 September 6th, 1995 WELCOME TO THE six-month mark, celebrated in brand-new relationships, brand-new puppies, and brand-new publications. ATPM has been continuously published for six months. Yowza, indeed. Yes, the changes have slowed. You'll note only a few, minor changes from the last issue of ATPM to this one. A by-line here, a title tweak there. You see, I got that job I was looking for, and I've gone and lost almost all of the free time in which I used to write the magazine. But do not despair, faithful readers. ATPM is reaching the point where it can begin to publish itself. Sort of. Roughly speaking, ten percent of this issue was written by someone other than myself, and that means less time required of me for each issue. Ultimately, this will lead to a broader, more timely publication. I hope. If you're interested in helping, let me know how. Whatever you do, please do continue to write and submit your work. See the endnotes. In this issue you'll find an evolution of last month's news column: a regular feature called AppleSauce. Now, that's not sauce as in "saucy," but rather sauce as in... well... you'll see. This month's issue also features a review of Claris Emailer and a review of Owen Linzmayer's book, The Mac Bathroom Reader. In addition, the new shareware reviews debut with a contribution from Brian Bergstrand (I hope he'll write for ATPM again).
    [Show full text]
  • ED369393.Pdf
    DOCUMENT RESUME ED 369 393 IR 054 782 TITLE EPIEgram: The Newsletterof Systemic Change, 1992-1993. INSTITUTION Educational Products InformationExchange Inst., Hampton Bays, NY. PUB DATE 93 NOTE 146p.; For the 1991-1992 issue,see ED 353 959. AVAILABLE FROMSterling Harbor Press, P.O. Box28, Greenport, NY 11944 ($65.00/year). PUB TYPE Collected Works Serials(022) Book/Product Reviews (072) JOURNAL GIT EPIEgram: The Newsletterof Systemic Change; v19n1-9 1992-93 EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Computer Networks; Computer Software Evaluation; *Courseware; Educational Change; Educational Innovation; Educational Resources; '*Educational Technology; Elementary Secondary Education; Ethics; Hypermedia; Information Networks; Multimedia Instruction; Research and Development IDENTIFIERS Information Age; Information Infrastructure ABSTRACT The EPIEgram newsletter contains information about educational materials and technology for elementary secondary education. In addition to the continuing feature, "The Educational Software Selector" (TESS), the nine issues contain articles on evaluating educational technology; school reform; publishing; multimedia; hypermedia; the information superhighway; the national information infrastructure; educational ethics; and computer networks. (JLB) Reproductions supplied by EDRS are the best that can be made * from the original document. * ******************;.********************************************** U.S. DEPARTMENT OF EDUCATION Office of Educationar Researcn and Improvement EDUCATIONAL RESOURCES INFORMATION CENTER IERICI C TOM document has been reproduced as received I rom tne person or organization originating it C Minor changes nave peen made to improve reCor0OUCLOO Qualify Points of view or opirnons stated in thi5d0Co men) CO not necessarity represent official OEM position or O0r.cy EPIEgram: The Newsletter of Systemic Change, 1992-1993 (Nc "PERMISSION TO REPRODUCE THIS r.11; P.Pr1"1 MT1 MATERIAL HAS BEEN GRANTED BY J.
    [Show full text]
  • Spamsieve 2.1.4 Manual
    SpamSieve 2.1.4 Manual Michael Tsai c-command.com April 15, 2004 Contents 1 Introduction 6 1.1 What Is SpamSieve? ............................... 6 1.2 Identifying Spam ................................. 6 1.3 Integration ..................................... 7 1.4 Main Features ................................... 8 1.5 Why Choose SpamSieve? ............................. 9 2 Installing and Updating 10 2.1 Requirements ................................... 10 2.2 Updating From a Previous Version ....................... 11 2.3 Installing SpamSieve ............................... 11 2.4 Uninstalling SpamSieve .............................. 11 3 Using SpamSieve With Your E-Mail Client 12 3.1 Apple Mail .................................... 13 3.1.1 Installing on Mac OS X 10.3.x ...................... 13 3.1.2 Installing on Mac OS X 10.2.x ...................... 14 3.1.3 Training SpamSieve ............................ 16 3.1.4 Manually Processing Messages ...................... 16 3.2 Emailer ...................................... 17 3.2.1 Installing ................................. 17 3.2.2 Training SpamSieve ............................ 19 3.2.3 Manually Processing Messages ...................... 19 3.3 Entourage ..................................... 19 3.3.1 Installing ................................. 19 3.3.2 Training SpamSieve ............................ 21 3.3.3 Manually Processing Messages ...................... 22 3.3.4 IMAP Accounts .............................. 22 3.3.5 Advanced Rules .............................. 22 3.4 Eudora 6
    [Show full text]
  • Instalación Y Administración De Servicios De Correo Electrónico
    Servicios de red e internet Instalación y administración de servicios de correo electrónico Raquel Castellanos Crespo Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo INDICE Características del servicio de correo electrónico Elementos del servicio de correo electrónico -Agentes de correo electrónico. - Servidores de correo electrónico. Open relay y Smart host - Clientes de correo electrónico: entorno-DOS, gráficos y navegadores. - Direcciones, cuentas de correo y servidores DNS - Protocolos y servicios de descarga de correo: SMPT, ESMTP, POP, IMAP. Funcionamiento del servicio de correo electrónico Cuentas de correo, alias y buzones de correo Estructura de mensajes de correo electrónico - Cabecera, cuerpo, MIME Monitorización y registros del servicio de correo electrónico Servicio de correo electrónico vía web Correo seguro - Firma digital y cifrado de mensajes Veracidad del correo - Correo basura ("SPAM”) fraude, engaño, cadenas y virus informáticos 2 Servicios de red e internet | Instalación y administración de servicios de correo electrónico Servicios de red e internet Raquel Castellanos Crespo Características del servicio de correo electrónico Correo electrónico (correo-e, conocido también como e-mail ), es un servicio de red que permite a los usuarios enviar y recibir mensajes y archivos rápidamente (también denominados mensajes electrónicos o cartas electrónicas) mediante sistemas de comunicación electrónicos. Principalmente se usa este nombre para denominar al sistema que provee este servicio en Internet, mediante el protocolo SMTP, aunque por extensión también puede verse aplicado a sistemas análogos que usen otras tecnologías. Por medio de mensajes de correo electrónico se puede enviar, no solamente texto, sino todo tipo de documentos digitales.
    [Show full text]
  • Use the Mouse (PDF)
    Computers for Beginners: Use the Mouse FEB 2020 JB Learning Outcomes In this Class You Will: 1. Observe proper techniques of mouse handling and movement 2. Learn how to operate mouse buttons and scroll wheel 3. Review parts of the keyboard including Letters, Numbers, Backspace, Enter, etc. 4. Practice clicking and dragging 5. Identify and understand various shapes of mouse Pointers/Cursors 6. Demonstrate understanding of techniques through completion of Mouse Tutorials 7. Review Mouse movements such as open, close, minimize, maximize and moving of open windows on desktop 2 Pre-class Questions What do you know about the Computer Mouse? What are you hoping to learn in this class? Write your answer below then turn to the person beside you and discuss (3 min) ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ ___________________________________________________________________________ What other topics would you be interested in learning about? _______________________________________________________________________________________ _______________________________________________________________________________________ _______________________________________________________________________________________ _______________________________________________________________________________________ 3 Mouse - similar to a keyboard, a mouse helps the user communicate with the
    [Show full text]
  • Tips for Survivors of High-Tech Abuse and Stalking
    TTiippss ffoorr SSuurrvviivvoorrss ooff HHiigghh--TTeecchh AAbbuussee aanndd SSttaallkkiinngg If you are experiencing High-Tech Domestic Violence, Sexual Violence or Stalking: 1. Trust Your Instincts 2. Talk about Safety with Advocates & Other Supporters 3. Save and Document Everything 1. Trust Your Instincts Does the person know too much about your activities or things you’ve only told a few people? If you think you’re being monitored by an abuser, you probably are. Are you followed around town, even to new places? Abusers and perpetrators frequently stalk and follow their victims to work, school, etc, but if they show up to places you’ve never been before, perhaps they are using a global positioning device or other monitoring technique. Is the stalker comfortable with technology? Use computers? Willing to go to any effort to maintain control of you? Technology is getting easier to use and cheaper to access. Abusers are incredibly persistent and creative. 2. Talk about Safety with advocates and other supporters Are you in or ending a relationship with someone who might be dangerous or stalking you? In domestic violence situations, stalking is common during the relationship, when trying to end the relationship, and often occurs long after the relationship is over. Are you considering ending an abusive If you or someone you know is in relationship? Trying to stop the abuse can danger, please call 911, or your be a very dangerous time, but there are steps local or regional hotline for you can take to try to increase your safety. support. In the U.S. you can also Specially trained advocates at a local call the National Domestic program or regional/national hotline can help Violence Hotline at 1-800-799- you plan for safety and discuss options.
    [Show full text]
  • Cyberdog 2.0 User’S Manual 001.© ,TOC 2/19/97 11:53 AM Page 2
    000.Cover 2/19/97 11:53 AM Page 1 Getting Started WithCyberdog 2.0 User’s Manual 001.© ,TOC 2/19/97 11:53 AM Page 2 K Apple Computer, Inc. © 1997 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. Your rights to the software are governed by the accompanying software license agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 http://www.apple.com Apple, the Apple logo, AppleShare, AppleTalk, HyperCard, Mac, Macintosh, MacTCP, OpenDoc, PlainTalk, Power Macintosh, and QuickTime are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Cyberdog and Finder are trademarks of Apple Computer, Inc. PowerPC and the PowerPC logo are trademarks of International Business Machines Corporation, used under license therefrom. Simultaneously published in the United States and Canada. 001.© ,TOC 2/19/97 11:53 AM Page 3 3 Contents 1 Introduction to Cyberdog 7 About the Internet 8 World Wide Web 9 E-mail 9 Newsgroups 9 FTP 10 Telnet 10 About
    [Show full text]
  • Name: Miramax Company
    Downloaded from: justpaste.it/serial-c C3 Systems RSVP v1.0 : s/n: 4959382452 C-Mold 3D Quickfill v98.5 : Name: MiRaMaX Company: TheForceTeam s/n: 00000000000992 C.B.S.O v2.6 : p/w: SYSTEM CA CliPPeR v5.30 build 32? : s/n: 085511-432164 Name: MarQuiS De SoiR+e Company: UCF CA Clipper v5.30 build 32x : s/n: 085511-732209 name: bit miXer compa:THHG CA Simply Accounting v3.0a for Windows: s/n: 1021602-52559 CA Simply Accounting v4.0b for Windows: s/n: 1020602-212703 CA Visual Object v1.0 for Windows : s/n: 1062301-96825 CA-Clipper for DOS : s/n: FCD101080 CA-Clipper ToolKit for Windows : s/n: FTK201021 CA-Clipper v2.0 for Windows : s/n: FCW201169 CA-Clipper v5.3 for Windows : s/n: 1055110-23047 CA-DBfast 2.0 / win ,os/2 : 026220D30200 CA-REALIZER 2.0 / win, os/2 : 1064100-20010 Cable Management Systems v2.01 for Windows: s/n: CMS94DA0066 CaBook v1.10 : Name: CORE CMT Key: 167X3L-A6CI1 Cache and Cookie Washer for Netscape 4.x v2.03 : s/n: NS-100-000-105 Key: B719-5E7C Cache Bomber v1.0 : Code: tj100753 CacheCompactor v4.0 : Name: TheForceTeam s/n: 78920--7467829 Cache Compactor v4.16 : Name: Warp s/n: 789206-1921042 Cache Compactor v5.0b1 : Name: Blackstar Company: TRPS98 s/n: 78920S39351936 Cache Compactor v5.0b2 : Name: Blackstar Company: TRPS98 s/n: 78920S39351936 Cache Explorer Netscape v1.32 : Name: CoKeBoTtLe99 s/n: SFJHTKJO Cachet : CM0000045VPM or CM0000567VOM CacheX Internet Explorer v2.00 : Name: CoKeBoTtLe99 s/n: RFJHTKJO Cactus Workbench v3.7 : s/n: 003232323 Cactus Workbench v3.72 : s/n: 003232323 Cactus Workbench v3.72c : s/n:
    [Show full text]