Files Included in Single User ROM-DOS Kernals

Total Page:16

File Type:pdf, Size:1020Kb

Files Included in Single User ROM-DOS Kernals Files included in Single User ROM-DOS Kernals Files included in Single User ROM-DOS 6.22 Kernel Utilities: ANSI.SYS ATA.SYS ATTRIB.EXE BACKUP.EXE CHKDSK.EXE CHOICE.COM COMM.EXE COMMAND.COM COMMAND.HLP COMPRESS.EXE COUNTRY.SYS DELTREE.EXE DISK2IMG.EXE DISKCOMP.COM DISKCOPY.COM DISPLAY.SYS DUMP.EXE EGA.CPI EGA3.CPI EMM386.EXE EXE2BIN.COM FDISK.EXE FIND.EXE FORMAT.COM HIMEM.SYS KEYB.COM KEYBOARD.SYS KEYBRD2.SYS LABEL.EXE MEM.EXE MODE.COM MORE.COM MOVE.EXE MSCDEX.EXE NED.EXE POWER.EXE PRINT.EXE REMDISK.EXE REMQUIT.COM REMSERV.EXE RESTORE.EXE ROM-DOS.SYS RSZ.EXE SERLINK.EXE SERSERV.EXE SHARE.EXE SMARTDRV.EXE SORT.EXE STACKDEV.SYS SUBST.EXE SYS.COM TRANSFER.EXE TREE.COM UMBLINK.EXE VDISK.SYS XCOPY.EXE DOS622.SYS Files included in Single User ROM-DOS 7.1 Kernel Utilities: ANSI.SYS ATA.SYS ATTRIB.EXE BACKUP.EXE CHKDSK.EXE CHOICE.COM COMM.EXE COMMAND.COM COMMAND.HLP COMPRESS.EXE COUNTRY.SYS DELTREE.EXE DISK2IMG.EXE DISKCOMP.COM DISKCOPY.COM DISPLAY.SYS DUMP.EXE EGA.CPI EGA3.CPI EMM386.EXE EXE2BIN.COM FDISK.EXE FIND.EXE FORMAT.COM HIMEM.SYS KEYB.COM KEYBOARD.SYS KEYBRD2.SYS LABEL.EXE MEM.EXE MODE.COM MORE.COM MOVE.EXE MSCDEX.EXE NED.EXE POWER.EXE PRINT.EXE REMDISK.EXE REMQUIT.COM REMSERV.EXE RESTORE.EXE ROM-DOS.SYS RSZ.EXE SERLINK.EXE SERSERV.EXE SHARE.EXE SMARTDRV.EXE SORT.EXE STACKDEV.SYS SUBST.EXE SYS.COM TRANSFER.EXE TREE.COM UMBLINK.EXE VDISK.SYS XCOPY.EXE DOS71.SYS ©2005 Datalight, Inc. All Right Reserved. Datalight , Datalight logo, Reliance, FlashFX and ROM-DOS are trademarks or registered trademarks of Datalight, Inc. All other product names are trademarks of their respective holders. .
Recommended publications
  • Volatility: Part 2 – Malware in Hiberfil.Sys
    Patrick Leahy Center for Digital Investigation (LCDI) Volatility: Part 2 – Malware in hiberfil.sys Written by Dan Doonan and Catherine Stamm Researched by Dan Doonan, Connor Hicks, David Leberfinger, and Catherine Stamm The Senator Patrick Leahy Center for Digital Investigation Champlain College December 4, 2012 Version: 0.1 – Volatility: – Review Date: 12/4/2012 Page 1 of 6 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents 1 Introduction ................................................................................................................................3 1.1 Background .........................................................................................................................3 1.2 Research Questions ..............................................................................................................3
    [Show full text]
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • F.A.Q. Series ROM-DOS TM
    21520 30th Drive SE #110 Bothell, WA 98021 USA Tel: (425) 951-8086 Fax: (425) 951-8095 [email protected] [email protected] www.datalight.com TM ROM-DOS F.A.Q. Series Question: Assuming they don't want FAT32, Long Filename support, or Sockets, why should my customer upgrade to the newest ROM-DOS? Answer: Since our first FAT32 and LFN release 4.00.1091, there have been several improvements to the core ROM- DOS kernel. This core code is used primarily for our DOS 6.22 compatible compilations, and then extended in the case of a FAT32 or Long Filename build. The 4.00.1091 release is also a new code base and there will be no further upgrades to the previous DOS 6.22 code. In order to obtain new features, fixes, and support a customer must upgrade to release 4.00.1091 or greater. Along with the performance enhancements for both size and speed, several corrections have been made to the ROM-DOS kernel. These include stack and memory issues, disk access issues, and compatibility with the former market leader in DOS. Most of the ROM-DOS utilities have also been improved for size and speed, along with bug fixes. The major changes happened with the XCOPY, HIMEM, MSCDEX, CHKDSK, FDISK and FORMAT utilities. In the realm of international support, the Euro was added to the keyboard and display driver code. ROM- DOS and PC-DOS 2000 are the only non-GUI operating systems to support the Euro. Finally, new ROM-DOS utilities have been added.
    [Show full text]
  • MX2 Reference Guide, Rev A
    MX2 Reference Guide MX2A137REFGD October 2000 E-EQ-MX2RG-A-ARC Copyright © 2000 by LXE Inc. An EMS Technologies Company All Rights Reserved MX2A1 3 7REFGD REV I S I ON A REGULATORY NOTICES Notice: LXE Inc. reserves the right to make improvements or changes in the products described in this manual at any time without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, LXE assumes no liability resulting from any errors or omissions in this document, or from the use of the information contained herein. Copyright Notice: This manual is copyrighted. All rights are reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated or reduced to any electronic medium or machine-readable form without prior consent, in writing, from LXE Inc. Copyright © 2000 by LXE Inc., An EMS Technologies Company 125 Technology Parkway, Norcross, GA 30092, U.S.A. (770) 447-4224 LXE is a registered trademark of LXE Inc. All other brand or product names are trademarks or registered trademarks of their respective companies or organizations. Note: The original equipment’s Reference Manual is copyrighted by PSC® Inc. This manual has been amended by LXE® Inc., for the MX2 and Docking Stations with PSC’s express permission. Notice: The long term characteristics or the possible physiological effects of radio frequency electromagnetic fields have not been investigated by UL. FCC Information: This device complies with FCC Rules, part 15. Operation is subject to the following conditions: 1. This device may not cause harmful interference and 2.
    [Show full text]
  • Older Operating Systems (962-038)
    Instructions: This is an open book pretest. Answer all questions. There are three sections. There are a total of five question pages. The time limit is two hours. Section one: Select only one answer for each multiple-choice question. Each question is worth 2 marks. Q1. Determine which of the following is true concerning DOS filters a. A DOS filter is used to modify information as it passes from EBCDIC text files to the screen. False because it for ASCII not EBCDIC b. The sort command is replaced using the command (dir /w) False because to sort you must use Dir /O:order ex. Dir/O:n c. The command (find /C “supervisor” memo1.txt memo2.txt) is an invalid command. False because it’s a valid command d. The command (type readme.doc | more) produces the same output as (more < readme.doc) True Q2. Determine which of the following is true concerning the tree command a. To indicate branching of directories, the tree command only uses the line characters. False because there are lines b. The deltree command is an enhanced version of the tree command. False, deltree erases a directory, tree shows structure. c. We can use the tree command with redirection symbols. True d. The tree command is an internal DOS command. False, it’s external. Internal means it exists in command.com. Tree.exe is external. Q3. Determine which of the following statement is true concerning variables. a. DOS includes built-in variables and therefore do not allow user defined variables. False – you can define your own variable.
    [Show full text]
  • Onetouch 4.0 Scanned Documents
    · MUL TICS SYSTEM-PROGRAMMERS' MANUAL SECTION BY.2.03 PAGE 1 Publishe¢: 04/03/67 Identification Delete a subtree of the file system hierarchy. del tree E. Q. Bjorkman+· ,. Purpose I \. Deltree is the procedure used by the delete command (BX.8.07)· to delete an entry which points to a non-empty directory. In order to delete svch an entry delete calls deltree to delete the subtree beneath the entry. The method used in deltree can be easily adapted for other tasks which are repeated at all nodes of some tree structure in the file system. Usaoe call deltree (path, failsw); path is the path name of a directory. Fails\-J is.a 1-bit switch indicating on return that some entry of path could not be deleted. Oeltree starts deleting entries of the tree structure beneath ,path at the end nodes (i.e., directories_ that have no directories inferior to them). Deltree reaches these end nodes by constructing a path name of a directory · . immediately inferior to path and then calling itself recursively with that path name until the end'nbdes are r~ached~ Whendeltree has deleted all the entries in an end-node directory which it can delete~ it returns to its caller. )me lementat ion ca 11 .de ltree (path, fail sw); del path char(')'<), f,:lf lsw bit (1); De 1 tree first obtai i'IS the current. ca landar clock time using the PL/I built-in abnormal function ''c1ock_11 .' This time is used later to determine whether entries were added to the directory ~th after deltree started its I.Mork.
    [Show full text]
  • Block Icmp Ping Requests
    Block Icmp Ping Requests Lenard often unpenned stutteringly when pedigreed Barton calques wittingly and forsook her stowage. Garcia is theropod vermiculatedand congregate unprosperously. winningly while nonnegotiable Timothy kedges and sever. Gyrate Fazeel sometimes hasting any magnetron Now we generally adds an email address of icmp block ping requests That after a domain name, feel free scans on or not sent by allowing through to append this friendship request. Might be incremented on your Echo press and the ICMP Echo reply messages are commonly as! Note that ping mechanism blocks ping icmp block not enforced for os. This case you provide personal information on. Send to subvert host directly, without using routing tables. Examples may be blocked these. Existence and capabilities is switched on or disparity the protocol IP protocol suite, but tcp is beat of. We are no latency and that address or another icmp message type of icmp ping so via those command in this information and get you? Before assigning it is almost indistinguishable from. Microsoft Windows found themselves unable to download security updates from Microsoft; Windows Update would boost and eventually time out. Important mechanisms are early when the ICMP protocol is restricted. Cisco device should be valuable so a host that block icmp? Add a normal packet will update would need access and others from. Now check if you? As an organization, you could weigh the risks of allowing this traffic against the risks of denying this traffic and causing potential users troubleshooting difficulties. Icmp block icmp packets. Please select create new know how long it disables a tcp syn flood option available in specific types through stateful firewalls can have old kernels.
    [Show full text]
  • S.Ha.R.K. Installation Howto Tools Knoppix Live CD Linux Fdisk HD
    S.Ha.R.K. Installation Tools HowTo • Linux fdisk utility • A copy of Linux installation CD • A copy of Windows® installation CD Tullio Facchinetti University of Pavia - Italy • Some FreeDOS utilities • A copy of S.Ha.R.K. S.Ha.R.K. Workshop S.Ha.R.K. Workshop Knoppix live CD Linux fdisk Command action a toggle a bootable flag Download ISO from b edit bsd disklabel c toggle the dos compatibility flag d delete a partition http://www.knoppix.org l list known partition types m print this menu n add a new partition o create a new empty DOS partition table p print the partition table q quit without saving changes • boot from CD s create a new empty Sun disklabel t change a partition's system id • open a command shell u change display/entry units v verify the partition table • type “su” (become root ), password is empty w write table to disk and exit x extra functionality (experts only) • start fdisk (ex. fdisk /dev/hda ) Command (m for help): S.Ha.R.K. Workshop S.Ha.R.K. Workshop HD partitioning HD partitioning 1st FreeDOS FAT32 FreeDOS must be installed Primary 2nd Windows® FAT32 into the first partition of your HD or it may not boot 3rd Linux / extX Data 1 FAT32 format data partitions as ... Extended FAT32, so that you can share Data n FAT32 your data between Linux, last Linux swap swap Windows® and FreeDOS S.Ha.R.K. Workshop S.Ha.R.K. Workshop 1 HD partitioning Windows ® installation FAT32 Windows® partition type Install Windows®..
    [Show full text]
  • L3pdffield-Choice Module Commands to Create Choice Fields LATEX PDF Management Testphase Bundle
    The l3pdffield-choice module Commands to create choice fields LATEX PDF management testphase bundle The LATEX Project∗ Version 0.95i, released 2021-08-28 1 l3pdffield-choice Introduction This is the documentation for choice fields, for general information about form fields check the documentation l3pdffield. Please keep in mind • Not every PDF viewer supports choice field. • The handling can depend on settings in the PDF viewer. In adobe reader for example I had to disable an option to avoid that it tries to create an appearance itself • Standards like pdf/A disable features of form fields too (as you typically can’t change the PDF). 2 Choice fields Choice fields are drop down menus or scrollable lists where the user can selectoneor more entries. They can also contain a field where users can insert a free text. The export value and the displayed value can differ. Some values can be preselected. This means that various data will have to be set, and the sorting matters. The module here will assume that the various values are stored in sequences: checkifexportoraltname... Only the first sequence is required. Empty values in the display sequence are possible, then the normal value is used. 2.1 Types Choice fields can be a drop down menu (called Combo), which can contain an editable field. setfieldflags={Combo,Edit} or setfieldflags={Combo} If Edit is set, one can also set DoNotSpellCheck. Or they can be a list. ∗E-mail: [email protected] 1 unsetfieldflags={Combo,Edit,DoNotSpellCheck} For both types it is possible to set or unset MultiSelect and CommitOnSelChange.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Delimit — Change Delimiter
    Title stata.com #delimit — Change delimiter Description Syntax Remarks and examples Also see Description The #delimit command resets the character that marks the end of a command. It can be used only in do-files or ado-files. Syntax #delimit cr j ; Remarks and examples stata.com #delimit (pronounced pound-delimit) is a Stata preprocessor command. #commands do not generate a return code, nor do they generate ordinary Stata errors. The only error message associated with #commands is “unrecognized #command”. Commands given from the console are always executed when you press the Enter, or Return, key. #delimit cannot be used interactively, so you cannot change Stata’s interactive behavior. Commands in a do-file, however, may be delimited with a carriage return or a semicolon. When a do-file begins, the delimiter is a carriage return. The command ‘#delimit ;’ changes the delimiter to a semicolon. To restore the carriage return delimiter inside a file, use #delimit cr. When a do-file begins execution, the delimiter is automatically set to carriage return, even if it was called from another do-file that set the delimiter to semicolon. Also, the current do-file need not worry about restoring the delimiter to what it was because Stata will do that automatically. Example 1 /* When the do-file begins, the delimiter is carriage return: */ use basedata, clear /* The last command loaded our data. Let's now change the delimiter: */ #delimit ; summarize sex salary ; /* Because the delimiter is semicolon, it does not matter that our command took two lines. We can change the delimiter back: */ 1 2 #delimit — Change delimiter #delimit cr summarize sex salary /* Now our lines once again end on return.
    [Show full text]
  • Carbon Copy Cloner Documentation: English
    Carbon Copy Cloner Documentation: English Getting started with CCC System Requirements, Installing, Updating, and Uninstalling CCC CCC License, Registration, and Trial FAQs Trouble Applying Your Registration Information? Establishing an initial backup Preparing your backup disk for a backup of Mac OS X Restoring data from your backup What's new in CCC Features of CCC specific to Lion and greater Release History Carbon Copy Cloner's Transition to a Commercial Product: Frequently Asked Questions Credits Example backup scenarios I want to clone my entire hard drive to a new hard drive or a new machine I want to backup my important data to another Macintosh on my network I want to backup multiple machines or hard drives to the same hard drive I want my backup task to run automatically on a scheduled basis Backing up to/from network volumes and other non-HFS volumes I want to back up my whole Mac to a Time Capsule or other network volume I want to defragment my hard drive Backup and archiving settings Excluding files and folders from a backup task Protecting data that is already on your destination volume Managing previous versions of your files Automated maintenance of CCC archives Advanced Settings Some files and folders are automatically excluded from a backup task The Block-Level Copy Scheduling Backup Tasks Scheduling a task and basic settings Performing actions Before and After the backup task Deferring and skipping scheduled tasks Frequently asked questions about scheduled tasks Email and Growl notifications Backing Up to Disk Images
    [Show full text]