DAVE 2.5 Manual

Total Page:16

File Type:pdf, Size:1020Kb

DAVE 2.5 Manual Network Your Macintosh With Wintel PCs DADAVEVE TM for Macintosh Copyright, Warranty and Trademark Notices This manual and the software it describes are Copyright © 1996-1999 by Thursby Software Systems, Inc., All Rights Reserved. The software described is furnished under license and may be used or copied only in accordance with the terms of such license. A copy of that license is included in Appendix A of this manual. Thursby Software Systems, Inc. (TSS) warrants that at the time of delivery of the original software supplied to the Licensee, and for a period of ninety (90) days thereaf- ter, that the original software will perform in accordance with the specifications described in this manual. TSS does not warrant that the Software will meet all of Licensee’s requirements or will operate uninterrupted or error-free. The extent of TSS’s liability under this warranty shall be limited to supplying, as soon as practicable, Code Corrections which TSS determines to be necessary, provided that written notice of a claimed problem is received by TSS within the warranty period. If after repeated efforts, TSS is unable to make the software operate as warranted, the Licensee may discontinue the DAVE license(s) and receive a refund of the License Fee(s) paid. THURSBY SOFTWARE SYSTEMS, INC. MAKES NO WARRANTIES, EITHER EXPRESSED OR IMPLIED, REGARDING THE ENCLOSED COMPUTER SOFT- WARE PACKAGE, ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS. THERE MAY BE OTHER RIGHTS THAT YOU MAY HAVE WHICH VARY FROM STATE TO STATE. THURSBY SOFTWARE SYSTEMS, INC. 5840 W. Interstate 20 Arlington, Texas 76017 U.S.A. http://www.thursby.com Internet support: [email protected] Internet sales: [email protected] DAVE, TSS, TSStalk, and COPStalk are trademarks of Thursby Software Systems, Inc. Apple, AppleShare, AppleTalk, Macintosh and MacTCP are registered trademarks and Mac is a trademark of Apple Computer, Inc. Adobe and PostScript are registered trademarks of Adobe Systems, Inc. Microsoft, Windows, Windows 95 and Windows NT are registered trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners. Contents Chapter 1: Introduction 9 What is DAVE? 10 DAVE Requirements 11 How to Get Additional Support 12 Installation Road Map 13 Chapter 2: Installation 15 Installing the Software 16 DAVE Setup Assistant 17 Chapter 3: Configuration 19 Host Configurations 20 Configuring Windows 95 or 98 on the Network 20 Configuring Windows NT 24 Sharing Resources on Windows 25 TCP/IP Configuration Method 1 (Wizard) 25 TCP/IP Configuration Method 2 (Manual) 27 Configuring Open Transport TCP/IP 30 About TCP/IP 32 About IP Addresses 32 Configuring TCP/IP 32 Subnet Masks 33 Limitations 33 PPP Configuration 34 Samba for UNIX 34 RAS 35 Browsing 37 Chapter 4: Using DAVE 39 Accessing Files stored on Windows computers 40 Sharing a Windows folder with other computers 40 Using DAVE to find shared folders on the network 41 About Workgroups 41 Mounting a shared folder on the desktop. 42 Mounting a shared folder when browsing is slow 42 Sharing your files with Windows computers 43 About Share-Level access control 48 Sharing a folder with Share-level security 48 Starting the DAVE Sharing Service 49 Sharing a printer with Windows computers 50 Logging into a Windows NT Domain 51 Why do some servers still ask me for a password 51 Logging off the network 52 Logging on at boot time 52 Changing you Network password 53 Receiving Pop-Up Messages 53 Sending Pop-up Messages 54 Chapter 5: Technical Information 57 How DAVE Client Works with the Mac OS 58 How DAVE Client Works with NetBIOS 58 How DAVE Client Stores Apple Files 58 How DAVE Sharing Stores PC Files 59 Name Translation 59 Dragging Items to the Desktop 60 Desktop Database Information 60 Copying Macintosh Files From Server to Server 60 Further Information 61 Chapter 6: DAVE Client 63 Using Resources on Other Computers 64 Finding Other Computers on the Network 64 Mounting Shared Resources 65 The Entire Network 67 Mounting Shared Resources at System Startup 69 Disabling “Mounting at Startup” 70 Adding and Removing Shared Resources 71 Shared Resource Options 73 Unmounting Resources 74 Mount Manually 74 Using Aliases 75 Using an Alias to Automatically Mount 75 Using Private Aliases on Your Desktop 76 Changing DAVE Client Settings 76 Making a List of Commonly Used Servers 77 Naming Mounted Resources 78 Browse Services 79 Choosing an Editor Application 79 Determining Your DAVE Client Version 80 Using the Trash on a Shared Resource 80 RESOURCE.FRK Folder 81 Share names that may not appear in the list 81 About the “Desktop Database” 82 Chapter 7: DAVE Utility 85 DAVE 86 Browsing 86 Types of View Windows 86 Arranging View Windows 87 Refreshing A View 88 Viewing Hidden Items 88 Copying and Moving Files 89 File Name Conversion 90 Controlling What Gets Copied 90 Edit Menu 91 Copying Text Files 92 Converting Files into BinHex or MacBinary 92 Drop Folders 93 Renaming Files and Folders 93 Deleting Files and Folders 93 Mounting Using Browsing 94 Creating Folders 94 Getting Properties 94 Using Bookmarks 94 Domain Log on 95 Domain Logoff 95 Command Pallette 96 Information Window 97 Mounting Manually 97 Entering the Server and Share Name 97 Mounting by IP, DNS or NetBIOS 99 “Disable auto-refresh” button 98 “Disable desktop database” button 98 “Use Alternative Credentials” 98 Domain Options 98 Mounting at Boot with DAVE Client 99 Domain Printers 99 Popup Messages 99 Warning Messages 101 Sending Messages 101 AppleScript 102 Chapter 8: DAVE Sharing 103 Required Components 104 DAVE Sharing Extension 104 DAVE Sharing 105 Share-level/User-level Access Control 105 DAVE Sharing - Share-level 106 User-level Sharing 108 Sharing Removable Media 110 Using DAVE Sharing in a Macintosh Only Network 111 DAVE Sharing and File Names 111 Checking to see who is using your shared folders 112 Logging Sharing Activity in a File 112 Allowing DAVE Sharing to use more Resources 113 Sharing a PostScript Printer 113 Sharing Desktop Printers 113 Sharing Non-Desktop Printers 114 DAVE Sharing Print Queue Status 115 Shutdown DAVE Sharing 116 Type and Creator Information 116 Chapter 9: DAVE Printing 117 Selecting a Shared Printer From the Chooser 118 If DAVE Desktop Printing is Installed 119 If DAVE Print Client is installed 120 Selecting a Printer From the DAVE Print Client 121 Binary Printing 125 Determining Your Computer’s Current Zone 127 Selecting Your New Printer 127 Chapter 10: NetBIOS Control Panel 129 NetBIOS Control Panel 130 Using the NetBIOS Main Control Panel 131 Info Button 132 Admin Button 133 Name Field 133 Workgroup Field 133 Description Field 133 Transport Protocol Pull-down Menu 134 WINS Check Box 134 Primary WINS Field 134 Secondary WINS Field 134 DHCP Check Box 135 Locking NetBIOS Settings 135 Information Panel 136 Local Names Table 136 Sessions Table 137 Remote Names Table 138 Name Lookup 139 License 140 Administrator Panel 141 Administrator Options 142 Text Conversion 148 Chapter 11: Control Strip and Location Manager 149 About the Control Strip 150 DAVE Control Strip Module 150 DAVE Location Manager 150 Setting up Multiple DAVE Locations 151 Chapter: Troubleshooting 153 Connecting Windows to Macintosh 154 Connecting Macintosh to a Windows 154 Printing to non-PostScript printers 166 Can I turn off AppleTalk and still use DAVE? 167 Numbered Errors: 169 Appendix A: Software License Agreement 175 Appendix B: Support and Maintenance 199 Appendix C: Glossary 201 Appendix D: Additional Software 209 Chapter 1 Introduction 9 How to Use This Manual This manual is organized in increasingly more detailed sections. Users may only need to read Chapter 2 - Installation to begin using DAVE. Although DAVE is very intuitive, additional information is provided in the chapters that follow. If you are setting up a peer-to-peer network, refer to the Installation Roadmap section later in this chapter. Systems Administrators can find detailed technical information in the Technical Information Chapter and in Chapter 10 - NetBIOS Control Panel. In addition, Chap- ter 12 - Troubleshooting gives a step-by-step method for diagnosing problems. If you find a term or acronym that you are not familiar with, refer to the Glossary. What is DAVE? DAVE enables Macintosh users to access Microsoft net- works and associated file and print services. DAVE pro- vides Macintosh users with the ability to mount shared directories on Windows NT (Server and Workstation), Windows 95, Windows 98, Windows 2000, and other Macintosh computers. In addition, Windows users have the ability to use Macintosh file and printer resources. DAVE provides full peer-to-peer file and PostScript print sharing with both PC and Macintosh systems. DAVE gives both Macintosh and PC users simultaneous read and write access to files stored on remote computers without first requiring users to down- load or copy the files to a local drive. 10 You will see a number of acronyms in this manual, one that you will see often is “CIFS”. DAVE communicates with other systems using what is known as CIFS protocols. CIFS stands for Common Internet File System and is a Microsoft standard method for sharing data and resources. This protocol is also known as Server Message Block (SMB). For traditional Macintosh users, you can think of CIFS as being roughly equivalent to AppleShare, and TCP/IP as being similar to AppleTalk. DAVE Requirements DAVE requires the following hardware and software: ❐ Any Macintosh with a 68030 or higher processor ❐ Mac OS 7.6 and later versions with a minimum of 16 megabytes of RAM ❐ Apple’s Open Transport TCP/IP v1.1.1 or later ❐ Any hardware required to useTCP/IP ❐ CD ROM Drive DAVE requires at least one of the following systems: ❐ Windows NT Workstation or Server version 4.0 or later or Windows 2000 ❐ Windows 95 or 98 ❐ Other CIFS Compliant Servers (e.g., Samba) ❐ Another Macintosh running DAVE 11 How to Get Additional Support If you are having trouble getting DAVE to operate properly, please refer to Chapter 12: Troubleshooting.
Recommended publications
  • OES 2 SP3: Novell CIFS for Linux Administration Guide 9.2.1 Mapping Drives from a Windows 2000 Or XP Client
    www.novell.com/documentation Novell CIFS Administration Guide Open Enterprise Server 2 SP3 May 03, 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Service Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
    [Show full text]
  • Shared Resource Matrix Methodology: an Approach to Identifying Storage and Timing Channels
    Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels RICHARD A. KEMMERER University of California, Santa Barbara Recognizing and dealing with storage and timing channels when performing the security analysis of a computer system is an elusive task. Methods for discovering and dealing with these channels have mostly been informal, and formal methods have been restricted to a particular specification language. A methodology for discovering storage and timing channels that can be used through all phases of the software life cycle to increase confidence that all channels have been identified is presented. The methodology is presented and applied to an example system having three different descriptions: English, formal specification, and high-order language implementation. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General--se- curity and protection; D.4.6 ]Operating Systems]: Security and Protection--information flow controls General Terms: Security Additional Key Words and Phrases: Protection, confinement, flow analysis, covert channels, storage channels, timing channels, validation 1. INTRODUCTION When performing a security analysis of a system, both overt and covert channels of the system must be considered. Overt channels use the system's protected data objects to transfer information. That is, one subject writes into a data object and another subject reads from the object. Subjects in this context are not only active users, but are also processes and procedures acting on behalf of the user. The channels, such as buffers, files, and I/O devices, are overt because the entity used to hold the information is a data object; that is, it is an object that is normally viewed as a data container.
    [Show full text]
  • Mac OS 8 Update
    K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS.
    [Show full text]
  • Transport Interfaces Programming Guide
    Transport Interfaces Programming Guide Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, CA 94043-1100 U.S.A. Part No: 802-5886 August 1997 Copyright 1997 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, SunSoft, SunDocs, SunExpress, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • WINDOWS® 8.1 in DEPTH Copyright © 2014 by Pearson Education, Inc
    Windows® 8.1 Brian Knittel Paul McFedries 800 East 96th Street Indianapolis, Indiana 46240 WINDOWS ® 8.1 IN DEPTH Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a Editor-in-Chief retrieval system, or transmitted by any means, electronic, mechanical, photo- Greg Wiegand copying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information con- Executive Editor tained herein. Although every precaution has been taken in the preparation of Rick Kughen this book, the publisher and author assume no responsibility for errors or omis- sions. Nor is any liability assumed for damages resulting from the use of the Development Editor information contained herein. Todd Brakke ISBN-13: 978-0-7897-5281-9 Managing Editor ISBN-10: 0-7897-5281-6 Sandra Schroeder Library of Congress Control Number: 2014930138 Printed in the United States of America Senior Project Editor Tonya Simpson First Printing: March 2014 Trademarks Copy Editor All terms mentioned in this book that are known to be trademarks or service Cheri Clark marks have been appropriately capitalized. Que Publishing cannot attest to the Senior Indexer accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Cheryl Lenser Windows is a registered trademark of Microsoft Corporation. Technical Editor Warning and Disclaimer Karen Weinstein Every effort has been made to make this book as complete and as accurate as Editorial Assistant possible, but no warranty or fitness is implied.
    [Show full text]
  • IBM Cognos Analytics - Reporting Version 11.1
    IBM Cognos Analytics - Reporting Version 11.1 User Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • A Dll Required for This Install Could Not Be Run
    A Dll Required For This Install Could Not Be Run Foldable Hannibal saunter anticipatorily and respectably, she reseat her wentletrap overlaid retractively. Which Arne igniting butso cheap berrying that her Dickie instruments triturated flying. her tanists? Analyzed Giovanne still encyst: salt and Circassian Whitby outface quite fervently This product was an option, microsoft distributed dll required dll for could not a install the problem for fixing the table doe Will not a install could be run this dll required for what is solved by multiple rows into boot. How to resolve my case, code and performance cookies and this dll for install a could not be run in. Any solution is required actions, hardware failure and be. If he're running Windows installation as the repair source or sale you're using Windows from a. Thank you for safe prompt response. A DLL required for this installation to complete could not be run. Does this solution from your pc scan with windows installer on target system is this tool in any proposed solutions to use windows updates about how did run a this dll required for could not install be. Reddit on the respective owners in this dll for a required. Set properties are you hate cookies may not a install be run this dll required for instant savings! Could not initialized handler. Your pc and framework, dll could not be able to customize it? Qgis also for this issue, dll required for could not a install it is a time i run. Fix problems installing Chrome Google Chrome Help.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Blue Coat SGOS Command Line Interface Reference, Version 4.2.3
    Blue Coat® Systems ProxySG™ Command Line Interface Reference Version SGOS 4.2.3 Blue Coat ProxySG Command Line Interface Reference Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback about the documentation: [email protected] Copyright© 1999-2006 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxySG™, ProxyAV™, CacheOS™, SGOS™, Spyware Interceptor™, Scope™, RA Connector™, RA Manager™, Remote Access™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Permeo®, Permeo Technologies, Inc.®, and the Permeo logo are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC.
    [Show full text]