Index of Commands

Total Page:16

File Type:pdf, Size:1020Kb

Index of Commands INDEX OF COMMANDS In this index of commands, anything between square brackets indicates an alternative or a facultative addition to the command in question; "x:" and "y:" mean the designation of a drive; "{text}" stands for a string of cha­ racters or a certain formula; "{file}" for a file or a group of files; "{name}" for the name of a sub-directory; and "{channel}" for an input or output channel. ATTRIB [+r] [x:]{file} 65 [-r] BACKUP x:[{file}] y:[/d][/m][/s] 92, 180 BASIC [[x:]{file}] 156 BASICA [[x:]{file}] 156 BREAK [ON] 127 [OFF] CD [[x:]\{name}] 86 CHOIR [[x:]\{name}] 86 CHKDSK [[x:]{file}][/f][/v] 32, 62 CLS 19 COMP [ [x: ]{file}] [ [y: ]{file}] 60 COPY {channel} [x:]{file} 55, 117, 176 [x:]{file} {channel} {channell} {channel2} [[x:][{filel}[+[y:][{file2}]]]] [y:][{file3}][/v] CTTY {channel} 124 DATE [{text}] 20, 130 DEBUG [[x:]{file}] 72 DEL [x:]{file} 61 DIR [[x:]{name}][/p][/w] 28 DISKCOMP [x:] [y:] 37 DISKCOPY x: [y:][/1] 34 200 MS-DOS AND PC-DOS - A PRACTICAL GUIDE ECHO [ON] 147 [OFF] [{text}] EDLIN [x:]{file} 96 ERASE [x:]{file} 61 FDISK 80 FIND[/c][/n][/v] "{text}" [x:]{file} 73 FORMAT [x:][/1][/8][/b][/s][/v] 38, 81, 169 [/4] GOTO {text} 150 GRAPHICS [{text}[/r][/b]] 135 GWBASIC [[x:]{file}] 157 IF [NOT] EXIST [x:]{file} {command} 149 KEYB {text} 173 LABEL [x:] {text} 43 MD [x:]\{name} 83 MKDIR [x:]\{name} 83 MODE {channel}{text} 120, 122, 172 {text} {channel1}={channel2} MORE <[x: ]{file} 54 PATH [\;]\{name1}[;\{name2} ••• ] 90 PAUSE [{text}] 147 PRINT [x:]{file1}[/c][/p] [[y:]{file2}[/c][/p]][/t] 136, 158 {text} PROMPT [ {text} ] 133, 152 RD [x:]\{name} 85 RMDIR [x:]\{name} 85 RECOVER [x:][{file}] 64 REM {text} 146 INDEX OF COMMANDS 201 REN [x:]{namel} {name2} 52 RESTORE x: y:[{file}][/s] 93 SET [{text}] 153 SORT [/{text}] <[x:]{filel}] [>[y:]{file2}][/r] 142 SYS [x:] 44 TIME [{text}] 20, 130 TREE [x:] 88 TYPE [x:]{file} 51 VER 19 VERIFY [ON] 54 [OFF] VOL [x:] 19 INDEX OF NAMES AND CONCEPTS .$$$ - 97 ·c - 51, 11, 98, 121 Cancel function - 71 Active drive - 17, 29, 35, 153 Carriage return - 70, 71 Active line - 102, 106, 112 - character - 70 Adapter - 119 CD command - 86, 87 Address - 72 Central Processing Unit - 13, 17, 26 Alternate mode - 75 Centronics - see Parallel channel ALT key - 16, 18, 75 CHDIR command - see CD command ANSI - 67, 75 Chip - 25 ANSI.SYS - 132, 133 CHKDSK command - 32, 42, 43, 47, APPEND command - 179 49, 62, 63 Apple II - 10 CLS command - 19, 157 Arrow keys - 105 Clusters - 63 ASCII - 67, 75 Colour/graphics adapter - 119, 121 - characters - 72 Colour monitor - 120, 121 - code - 67, 70, 165 .COM- 53 - file - 53, 166 COMl: device - 59, 122 - table - 68, 69, 70, 75, 164 Command - 17, 49 ATTRIB command - 65 - line - 17, 22 AUTOEXEC.BAT - 122, 134, 139, 148 COMMAND.COM - 44, 48, 49 AUX: - 119, 122 COMP command - 60 Compatibles - 10, 13 BACKUP command - 92, 93, 176, 180 CON: device - 58, 59 Backspace - 70 CONFIG.SYS file - 126, 181 - key - 18, 50, 105 Console - 58, 124 Bad sector - see Sector Control .BAK - 53, 99 - codes - 70 .BAS - 53, 166 - instructions - 18, 51, 70, 71 BASIC - 10, 15, 25, 47, 155 COPY command - 55, 59 - Advanced Disk - 156 COPY CON: command - 49, 50, 58, 95 - cassette - 15, 156 Country code - 130, 173 - Disk - 156 CPU - see Central Processing Unit BASICA - 155, 156 CTRL key - 16, 18, 70 .BAT - 53 CTTY device - 124 Batch file - 53, 145 Cursor - 16 Baud rate - 124 Binary Date - 20, 21, 23 - digits - 32 - current - 20 - system - 67 - invalid - 23 - value - 67 DATE command - 20, 21, 148 BIOS - see ROM BIOS DEBUG command - 72 Bit - 32 DEL Boot - 79, 82 - command - 49 .<BREAK> - 98, 127 - key - 18, 104 BREAK key - 127, 176 Delete - 61, 91, 115 Buffer - 22, 127, 129 Density - 25 Byte - 27, 32, 47 Device - 119, 126 - driver - 119, 122, 181 204 MS-DOS AND PC-DOS - A PRACTICAL GUIDE DIR command - 28, 29, 43, 49 Extension - 29, 47, 53 Directory - 28 F1 key - 22, 104, 107, 108 - current - 88 F2 key - 23, 104, 108 - root - 83 F3 key - 22, 23, 104, 105, 108, 110 Disk drive - see Drive F4 key - 23, 107, 110 DISKCOMP command - 37 F5 key - 108, 110 DISKCOPY command - 33, 35, 36, 37 F6 key - 96, 113 Disk - 25 FAT - see File Allocation Table - double-density - 27 FC command - 17 4 - double-sided - 27, 34 FDISK command - 80 - floppy - 26 FF - see Formfeed - flexible - 26 File Allocation Table - 47, 48 - fixed - 25 File - 47, 126 - hard - 10, 15, 25, 79, 92 - ASCII - 53 - single-sided - 34, 36 - backup - 99 - source - 34 - batch - 53 - system - 34 - name - 29 - target - 34 - program - 47 - virtual - see RAM disk - size - 29, 47 - Winchester - see hard disk - system - 33, 44, 45, 47, 48 Disk Operating System - 13 Filter - 139 Drive - 13, 14, 26, 27, 91, 181 FIND command - 73, 112, 144 - double density - 27 Fixed disk - see Disk - double-sided - 27, 36 Flexible disk - see Disk - high capacity - 27, 40 Floppy disk - see Disk - high density - 27 FOR command - 163 - single-sided - 27 FORMAT command - 38, 81, 169 - type - 27 Formfeed - 67, 71 - quad density - 27, 40 Function keys - 16, 22, 23, 104, .DOC- 53 132, 134 DOS - 10, 13, 14 - Partition - 80 Gates, Bill - 155 Double-sided - see Disk GOTO command - 150 DSDD- 27 Graphics - 121, 135, 167 DSQD- 27 - adapter - 120 - mode - 121 ECHO command - 147 GW-BASIC - 155, 157, 167 Editing keys - 22 EDLIN command - 50, 95 AH - 18, 70, 105 Electronic disk - see RAM disk Hard copy - 107 END key- 16 Head crash - 79 End of file-symbol - 58, 71 Hercules graphics card - 121 ENTER key - 14, 16 Hexadecimal value - 67, 70, 72, 132 Epson printer - 165 Hidden files - 33, 43, 44, 48, 49 ERASE command - 49, 61 High Capacity - see Drive Error messages - 11, 15, 16, 18 High Density - see Drive ESC- 70 HOME key - 16 - character - 164 .<HOME> - 157 - code - 132, 164 - key - 16, 18, 50, 105 IBM - 10, 13 .EXE - 53 - colour printer - 135 EXIT command - 149 - compatibles - 14 Extended character set - 75, 76, 77, - graphics printer - 135 173 - PC - 10, 13, 15, 79 INDEX OF NAMES AND CONCEPTS 205 IBMBIO.COM - 33 Modem - 13, 125 IBMDOS.COM - 33 Monitor - 13 IF EXIST command - 149 - adjustment - 120 Initialising - 38 - colour - 120 Input channel - 59, 119 - monochrome - 120 INS key - 16, 104 MORE command - 54, 140 Installable device drivers - 126 Mouse - 13 Intel MS-DOS - 9, 13, 16 - 8086 - 10 - Generic - 169, 174 - 8088 - 10 - system disk - 48 Interface - 1 7 - version - 10, 169 Interrupt function - 127, 176 Italics - 165 NEXT command - 163 Non-contiguity - 62 Joystick - 13 Norton Utilities - 61 NUL: - 69 Kb - see Kilobyte Numeric keypad - 16, 75 Kemeny, John G. - 155 NUM LOCK key - 16 Key bar - 159 KEYB command - 173 Operating system - see System Keyboard - 13, 16, 49, 74, 132, 173 Output channel - 59, 119 - European- 74, 129, 173 Overlay file - 53 - layout - 129 .OVR - 53 -QWERTY 16 Keypad - 16 4 p - 51, 71 Kilobyte - 32 Parallel channel - 59, 122, 123 Kurtz, Thomas E. - 155 Parameter - 30 Path - 90, 179 Label - 19, 33, 42, 150 PATH command - 88 LF - see Line feed PAUSE command - 147 Line editor - 95 PC - see Personal Computer Line printer - 159 PC-DOS - 9, 13, 16, 169, 171 Line feed - 67 PC Jr - 10 - function - 71 PC AT - 10, 27, 40, 79, 170 LOAD - 167 PC XT - 10, 79 Loading the system - 14, 82 Personal Computer - 10, 13 Loop - 163 PG DN key- 16 LPRINT command - 159, 164 PG UP key- 16 LPTI: - 59, 123 Pipeline - 139, 144 LPT2: - 59 Plotter - 13 LPT3: - 59 Printing - 51, 58, 136, 137, 158, 160 Mb - see Megabyte PRINT command - 137 MD command - 83, 86, 87 Printer - 122, 159, 164 Megabyte - 32 - daisywheel - 122 Memory- 32 - dot-matrix - 122, 165 - expansion - 129 - instruction - 71, 164 Menu - 80 - laser - 122 Microprocessor - 13 - parallel - 122 Microsoft - 10, 32, 155, 169 - serial - 122 MITS Altair - 155 PRN: device - 58, 59, 123 MKDIR command - see MD command Processor - 16 MODE command - 120, 121, 122, 124, Program - 155 172 Programming language - 155 206 MS-DOS AND PC-DOS - A PRACTICAL GUIDE PROMPT command - 133, 152 STEP command - 163 Prompt - 15, 17, 133, 134, 139, 152 Storage PRT SC key - 16, 51, 135 - media - 25 PS/2 - 79, 134 - capacity - 27, 32, 38, 82 Sub-directory - 83, 84, 86, 87, 91 Quick Unerase - 61 SUBST command - 91 QWERTY- 16 Syntax error - 158 SYS command - 44, 53 RAM - see Random Access Memory System - 13, 14, 15, 47, 71, 157 - disk - 128 - disk - 14, 17, 34, 48 - size - 128, 129 - files - 32, 45 Random Access Memory - 25, 32, 119 - version - 19 RD command - 85 Read-only file - 65 TAB key - 16, 71, 105 Read-Only Memory - 25, 156 Tape streamer - 79 RECOVER command - 64 Target - see Disk Redirecting - 140 Text REM command - 146 - file - 47, 50 Remote control - 124 - mode - 120, 121 REN command - 51, 99 TIME command - 20, 148 REPLACE command - 178 Tracks - 26 RESET procedure - 18 TREE command - 88, 89 RESTORE command - 92, 93, 180 Tree structure - 88 RETURN key - 14, 16, 50 TYPE command - 49, 51, 140 RMDIR command - see RD command .TXT - 53 ROM - see Read-Only Memory ROM BIOS - 25, 82 UnErase - 61 Root directory - 83, 86, 88, 90 Unformat - 170 RUN command - 167 Utility - 48, 49, 126 As - 71 Variable - 151, 162 Screen - 120, 158 VDISK - 128 - dump - 135 VER command - 19, 54 - editor - 95 Verifying - 54, 55 SCROLL LOCK key - 16 Version - 19 Search - 112 Virtual disk - see RAM disk - path - 90 VOL command - 19, 43 Seattle Computer Products - 10 Volume - see Label Sector - 26, 27 - bad - 33 Wildcard - 31, 52 - size - 27 Winchester - see Disk Serial Wordprocessing - 50 - channel - 122 WordPerfect - 95 - printer - 122 WordStar - 95 SET command - 153 SHIFT keys - 16 XCOPY command - 36, 176 Single-sided - see Disk SORT command - 139, 142 Az - 51, 71, 96, 113 Sound - 172 Source - see Disk Space - 142 Spacebar - 16 Speed - 172 SSDD - 27 .
Recommended publications
  • Customizing and Extending Powerdesigner SAP Powerdesigner Documentation Collection Content
    User Guide PUBLIC SAP PowerDesigner Document Version: 16.6.2 – 2017-01-05 Customizing and Extending PowerDesigner SAP PowerDesigner Documentation Collection Content 1 PowerDesigner Resource Files.................................................... 9 1.1 Opening Resource Files in the Editor.................................................10 1.2 Navigating and Searching in Resource Files............................................ 11 1.3 Editing Resource Files........................................................... 13 1.4 Saving Changes................................................................13 1.5 Sharing and Embedding Resource Files...............................................13 1.6 Creating and Copying Resource Files.................................................14 1.7 Specifying Directories to Search for Resource Files.......................................15 1.8 Comparing Resource Files........................................................ 15 1.9 Merging Resource Files.......................................................... 16 2 Extension Files................................................................18 2.1 Creating an Extension File.........................................................19 2.2 Attaching Extensions to a Model....................................................20 2.3 Exporting an Embedded Extension File for Sharing.......................................21 2.4 Extension File Properties......................................................... 21 2.5 Example: Adding a New Attribute from a Property
    [Show full text]
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • Active@ UNDELETE Documentation
    Active @ UNDELETE Users Guide | Contents | 2 Contents Legal Statement.........................................................................................................5 Active@ UNDELETE Overview............................................................................. 6 Getting Started with Active@ UNDELETE.......................................................... 7 Active@ UNDELETE Views And Windows...................................................................................................... 7 Recovery Explorer View.......................................................................................................................... 8 Logical Drive Scan Result View..............................................................................................................9 Physical Device Scan View......................................................................................................................9 Search Results View...............................................................................................................................11 File Organizer view................................................................................................................................ 12 Application Log...................................................................................................................................... 13 Welcome View........................................................................................................................................14 Using
    [Show full text]
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • Networker Jukebox Control Command Nsrjb
    Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent.
    [Show full text]
  • TRSDOS 6.2 to LS-DOS 6.3.0 Manual Update
    LS-DOSÔ 6.3 UPDATE FOR TRSDOSâ 6.2.X The LS-DOS 6.3 release is an upgrade for the TRSDOS 6.2 operating system. Several important changes have been made to extend and enhance the operating system and its utilities. The date ranging has been expanded to accept dates through the year 1999. Files will now carry a modification time as well as a date. The DATECONV/CMD program is provided to translate version 6.2 or earlier disks to the 6.3 style dating. The user password has been eliminated from the system. The owner password still remains. The library command ID was added to display a customer service number. Several enhancements have been made to BASIC. The new DISKCOPY/CMD program will duplicate 5" double density floppy disks. Because the LS-DOS 6.3 update is a series of enhancements to TRSDOS 6.2, the primary documentation remains the 6.2 manual and Technical Reference manual. If you have a version of TRSDOS earlier than 6.2, you can obtain the manuals from Radio Shack under the catalog numbers 26-0316 (TRSDOS Version 6 [6.2 DOS manual and disk]), 26-2110 (Model 4/4D [6.2] Technical Reference Manual), or 26-1117 (6.2 DOS manual only). This documentation should be treated as an addendum to the TRSDOS 6.2 information. LS-DOS 6.3 installation instructions Before performing the upgrade, it is recommended that you make several backup copies of the 6.3 master disk. The simplest way to do this is to boot your system using the 6.3 diskette, insert a blank diskette to receive the copy in drive 1, and type the command: DISKCOPY :0 :1 When the copy finishes, you can insert another destination diskette and make another copy.
    [Show full text]
  • Experimental Evidence on Predatory Pricing Policies
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian Working Paper Hunting unicorns? Experimental evidence on predatory pricing policies Working Paper, No. 258 Provided in Cooperation with: Department of Economics, University of Zurich Suggested Citation: Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian (2017) : Hunting unicorns? Experimental evidence on predatory pricing policies, Working Paper, No. 258, University of Zurich, Department of Economics, Zurich, http://dx.doi.org/10.5167/uzh-138188 This Version is available at: http://hdl.handle.net/10419/173418 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu University of Zurich Department of Economics Working Paper Series ISSN 1664-7041 (print) ISSN 1664-705X (online) Working Paper No.
    [Show full text]
  • Measuring the Effectiveness of Generic Malware Models
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2017 Measuring the Effectiveness of Generic Malware Models Naman Bagga San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Bagga, Naman, "Measuring the Effectiveness of Generic Malware Models" (2017). Master's Projects. 566. DOI: https://doi.org/10.31979/etd.8486-cfhx https://scholarworks.sjsu.edu/etd_projects/566 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Measuring the Effectiveness of Generic Malware Models A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Naman Bagga December 2017 ○c 2017 Naman Bagga ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Measuring the Effectiveness of Generic Malware Models by Naman Bagga APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY December 2017 Dr. Mark Stamp Department of Computer Science Dr. Jon Pearce Department of Computer Science Dr. Thomas Austin Department of Computer Science ABSTRACT Measuring the Effectiveness of Generic Malware Models by Naman Bagga Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • Falcon DOS Portable Terminals Advanced User's Guide
    ! " #$% & " ' ()**%++,,,&% & " !"# $ $ % &' $ % ( ( % )*+ (*,' (% $ )(+ $ - !!. !!/$ 0 1 2 + + 2 3'4 0 5 -../ .+ 0 % &6 (*, % $ & & &/,( % & & ( &/,( 0 &(*, % & ! "#$%#$&#'%#'&( !! ! )!* 0 $ $ 0 3&7 4 8 $ 9 8 % 2 $ : $ 1 0 ; < $ ; * $ , . % $ / ) = ) $ # 0 , $ # 0 ( ( " & > 0 & > ? ! % , < 9 $ ; 0 ++ . 0 + = 0 & 2
    [Show full text]