Microsoft Windows 95 Resource Kit

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Windows 95 Resource Kit Microsoft ® Windows ™ 95 Resource Kit Essential Technical Information for Anyone Installing or Supporting Microsoft Windows 95 Microsoft Windows 95 Beta-1 The information discussed in this guide is based on features and functionality present either in the Beta-1 release of Windows 95, or planned for a future release. The discussion of Windows 95 herein, does not represent a commitment on the part of Microsoft for providing or shipping the features and functionality discussed in the final retail product offerings of Windows 95. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Microsoft Corporation. © 1994 Microsoft Corporation. All rights reserved. Printed in the United States of America. 1 2 3 4 5 6 7 8 9 Microsoft, MS, and MS-DOS are registered trademarks and Windows, the Windows logo, Windows NT and Microsoft At Work are trademarks of Microsoft Corporation. Document No. xxxx-xxxxx 3+ is a registered trademark of 3Com Corporation. 3+Open is a trademark of 3Com Corporation. 3+Share is a registered trademark of 3Com Corporation. 3Com is a registered trademark of 3Com Corporation. ArcNet is a registered trademark of Datapoint Corporation. AS/400 is a registered trademark of International Business Machines Corporation. Banyan is a registered trademark of Banyan Systems, Inc. COMPAQ is a registered trademark of Compaq Computer Corporation. CompuServe is a registered trademark of CompuServe, Inc. DCA is a registered trademark of Digital Communications Associates, Inc. DEC is a registered trademark of Digital Equipment Corporation. DeskJet is a registered trademark of Hewlett-Packard Company. Epson is a registered trademark of Seiko Epson Corporation, Inc. EtherExpress is a trademark of Intel Corporation. EtherLink is a registered trademark of 3Com Corporation. Everex is a trademark of Everex Systems, Inc. ExecJet is a registered trademark of International Business Machines Corporation. GEnie is a trademark of General Electric Corporation. Hercules is a registered trademark of Hercules Computer Technology, Inc. Hewlett-Packard is a registered trademark of Hewlett-Packard Company. IBM is a registered trademark of International Business Machines Corporation. Intel is a registered trademark of Intel Corporation. Kodak is a registered trademark of Eastman Kodak Company. LaserJet is a registered trademark of Hewlett-Packard Company. Linotronic is a trademark of Linotype AG and its subsidiaries. Logitech is a trademark of Logitech, Inc. Lotus is a registered trademark of Lotus Development Corporation. Lotus Notes is a registered trademark of Lotus Development Corporation. Mac is a registered trademark of Apple Computer, Inc. Macintosh is a registered trademark of Apple Computer, Inc. Micro Channel is a registered trademark of International Business Machines Corporation. NEC is a registered trademark of NEC Corporation. NetWare is a registered trademark of Novell, Inc. Novell is a registered trademark of Novell, Inc. Okidata is a registered trademark of Oki America, Inc. Olivetti is a registered trademark of Ing. C. Olivetti. Operating System/2 and OS/2 are registered trademarks of International Business Machines Corporation. OS/400 is a registered trademark of International Business Machines Corporation. PaintJet is a registered trademark of Hewlett- Packard Company. Panasonic is a registered trademark of Matsushita Electric Co., Ltd. Pathworks is a trademark of Digital Equipment Corporation. PC-NFS is a registered trademark of Sun Microsystems, Incorporated.System/360 is a trademark of International Business Machines Corporation. PC/XT is a trademark of International Business Machines Corporation. Personal Computer AT is a registered trademark of International Business Machines Corporation. Personal Computer XT is a trademark of International Business Machines Corporation. Personal System/1 is a trademark of International Business Machines Corporation. Personal System/2 is a registered trademark of International Business Machines Corporation. Philips is a registered trademark of Philips International B.V. PostScript is a registered trademark of Adobe Systems, Inc. Quietwriter is a registered trademark of International Business Machines Corporation. Rumba is a registered trademark of Wall Data Incorporated. SatisFAXtion is a registered trademark of Intel Corporation. SCSI is a registered trademark of Security Control Systems, Inc. Sound Blaster is a trademark of Creative Technology Ltd. Sound Blaster Pro is a trademark of Creative Technology Ltd. Stacker is a trademark of STAC Electronics. Sun Microsystems is a registered trademark of Sun Microsystems, Inc. TCS is a registered trademark of Eurotherm International P.L.C. Tektronix is a registered trademark of Tektronix, Inc. Texas Instruments is a registered trademark of Texas Instruments, Inc. ThinkJet is a registered trademark of Hewlett-Packard Company. TokenExpress is a trademark of Intel Corporation. Toshiba is a registered trademark of Kabushiki Kaisha Toshiba. Triumph is a registered trademark of Triumph Adler AG. TrueType is a registered trademark of Apple Computer, Inc. Tulip is a registered trademark of Tulip Computers International, BV. Unisys is a registered trademark of Unisys Corporation. UNIX is a registered trademark of UNIX Systems Laboratories. Vectra is a registered trademark of H-P Company. Video Seven is a trademark of Headland Technology, Inc. VINES is a registered trademark of Banyan Systems, Inc. VMS is a registered trademark of Digital Equipment Corporation. WANG is a registered trademark of Wang Laboratories. Western Digital is a trademark of Western Digital Corporation. WYSE is a registered trademark of Wyse Technology. Xerox is a registered trademark of Xerox Corporation. XGA is a registered trademark of International Business Machines Corporation. XT is a trademark of International Business Machines Corporation. Zenith is a registered trademark of Zenith Data Systems Corporation. All other trademarks, marked and not marked, are the property of their respective owners. Beta-1 3 Table of Contents Welcome to Windows 95.............................................................................................1 New and Improved................................................................................................................................ 1 Features for End-Users .................................................................................................................... 2 Features for MIS Professionals ........................................................................................................ 3 How to Use This Document .................................................................................................................. 4 Windows 95 Corporate Evaluation Process.......................................................................................... 5 Areas Still Under Construction.......................................................................................................... 6 Chapter 1 Windows 95 Setup ....................................................................................9 Pre-Installation Considerations ........................................................................................................... 10 Setting Up Windows 95 Beta-1 ........................................................................................................... 11 Setup Options................................................................................................................................. 11 Local Versus Network Installation................................................................................................... 12 Upgrading from Windows to Windows 95....................................................................................... 13 Uninstalling Windows 95..................................................................................................................... 13 About the Setup Process .................................................................................................................... 14 Plug and Play Hardware Detection................................................................................................. 15 Setup Modularization...................................................................................................................... 17 Modifying the Boot Track................................................................................................................ 17 Run Once........................................................................................................................................ 18 Setup Failure Detection and Recovery........................................................................................... 18 Converting Program Manager Groups............................................................................................ 19 Windows 95 Configuration Options..................................................................................................... 19 System Policy Editor......................................................................................................................
Recommended publications
  • CI7BM Series Full-Size Socket 370 All-In-One CPU Card Version 1.0D
    CI7BM Series Full-Size Socket 370 All-in-one CPU Card Version 1.0D Industrial CPU Card PC-Based Computer Boards for Industrial Automation User’s Manual Copyright Notice This publication is protected by copyright and all rights are reserved. No part of it may be reproduced or transmitted by any means or in any form, without prior consent of the original manufacturer. The information in this document has been carefully checked and is believed to be accurate. However, the original manufacturer assumes no responsibility for any inaccuracies that may appear in this manual. In no event will the original manufacturer be liable for direct, indirect, special, exemplary, incidental, incidental or consequential damages resulting from any defect or omission in this manual, even if advised of possibility of such damages. The material contained herein is for informational purposes only. Acknowledgments Award is a registered trademark of Award Software International, Inc. IBM and PS/2 are trademarks of International Business Machines Corporation. C&T is a trademark of Chips and Technologies Inc. Intel and Pentium are registered trademarks of Intel Corporation. Microsoft Windows is a registered trademark of Microsoft Corporation. All other product names or trademarks are properties of their respective owners. ii CI7BM User’s Manual Contents CI7BM Series Comparison Table Model CI7BM CI7BM+ CI7BMV Processor Intel Pentium II Intel Pentium II Intel Pentium II Processor Socket Socket 370 Socket 370 Socket 370 Chipset Intel 440BX Intel 440BX Intel 440BX BIOS
    [Show full text]
  • Why Os/2 Failed: Business Mistakes Compounded by Memory Prices
    Mountain Plains Journal of Business and Economics Volume 10 Issue 1 Article 4 Date Published: 10-1-2009 Why Os/2 Failed: Business Mistakes Compounded By Memory Prices Eric G. Swedin Weber State University Davis Follow this and additional works at: https://openspaces.unk.edu/mpjbt Part of the Business Commons Recommended Citation Swedin, E. G. (2009). Why Os/2 Failed: Business Mistakes Compounded By Memory Prices. Mountain Plains Journal of Business and Economics, 10(1). Retrieved from https://openspaces.unk.edu/mpjbt/ vol10/iss1/4 This Case Study is brought to you for free and open access by OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. It has been accepted for inclusion in Mountain Plains Journal of Business and Economics by an authorized editor of OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. For more information, please contact [email protected]. 36 WHY OS/2 FAILED: BUSINESS MISTAKES COMPOUNDED BY MEMORY PRICES ERIC G. SWEDIN WEBER STATE UNIVERSITY DAVIS ABSTRACT In 2006, IBM ended their support of OS/2, closing the book on an ambitious effort to create a modern operating system for the personal computer. IBM and Microsoft released the OS/2 operating system in December 1987 to replace the primitive DOS with a more sophisticated, preemptive multitasking operating system for personal computers. This article argues that OS/2 failed because of the U.S.-Japan Semiconductor Trade Agreement of 1986, subsequent accusations of DRAM chip dumping by the United States, and the resulting tariffs on Japanese memory chips, led to a memory chip shortage that drove up memory prices.
    [Show full text]
  • Page 1 of 3 How to Enable NTLM 2 Authentication 2/8/2012 Http
    How to enable NTLM 2 authentication Page 1 of 3 Article ID: 239869 - Last Review: January 25, 2007 - Revision: 4.7 How to enable NTLM 2 authentication System Tip This article applies to a different version of Windows than the one you are using. Content in this article may not be relevant to you. Visit the Windows 7 Solution Center This article was previously published under Q239869 SUMMARY Historically, Windows NT supports two variants of challenge/response authentication for network logons: • LAN Manager (LM) challenge/response • Windows NT challenge/response (also known as NTLM version 1 challenge/response) The LM variant allows interoperability with the installed base of Windows 95, Windows 98, and Windows 98 Second Edition clients and servers. NTLM provides improved security for connections between Windows NT clients and servers. Windows NT also supports the NTLM session security mechanism that provides for message confidentiality (encryption) and integrity (signing). Recent improvements in computer hardware and software algorithms have made these protocols vulnerable to widely published attacks for obtaining user passwords. In its ongoing efforts to deliver more secure products to its customers, Microsoft has developed an enhancement, called NTLM version 2, that significantly improves both the authentication and session security mechanisms. NTLM 2 has been available for Windows NT 4.0 since Service Pack 4 (SP4) was released, and it is supported natively in Windows 2000. You can add NTLM 2 support to Windows 98 by installing the Active Directory Client Extensions. After you upgrade all computers that are based on Windows 95, Windows 98, Windows 98 Second Edition, and Windows NT 4.0, you can greatly improve your organization's security by configuring clients, servers, and domain controllers to use only NTLM 2 (not LM or NTLM).
    [Show full text]
  • Windows 95, Windows 98, Windows 98SE, and Windows ME Courtesy of Nashville Home Linux Solutions
    Important information for users of Windows 95, Windows 98, Windows 98SE, and Windows ME courtesy of Nashville Home Linux Solutions FACT: As of July 2006, Microsoft has officially ended support for Windows 95, Windows 98, Windows 98SE, and Windows ME (Millennium Edition). What does this mean for you? Microsoft©s end-of-support announcement means that users of Windows 95, 98, and ME will no longer receive security updates, bug fixes, and other patches for their computer©s operating system. It also means that future releases of Microsoft software (such as Media Player, Internet Explorer, and Outlook Express) will no longer support these operating systems. Users of these versions of Windows will not benefit from enhanced features and security in these new versions. Why should I be concerned? Windows 95, 98, and ME are based around the DOS operating system, an inherently insecure operating system. Users of DOS-based Windows will become increasingly at risk for viruses, spyware, malware, and system intrusions as new holes and exploits are discovered in these operating systems and the older software that runs on them. In addition, software vendors (including makers of anti-virus and other security products) will be phasing out support for these operating systems now that Microsoft has ended its support. If you are connecting your DOS-based Windows operating system to the Internet, you need to take action to secure your computer. What are my options? If you would like to continue to operate on your current hardware, you have a few options available to you: 1. Upgrade Windows Microsoft©s only currently-available Windows workstation operating system is Windows XP (Home or Professional).
    [Show full text]
  • Windows 95 and Window 98® Operating System
    ® Windows 95 and Window 98® Operating System Microsoft Base Cryptographic Provider FIPS 140-1 Documentation: Security Policy September 20, 2000 11:33 AM Abstract This document specifies the security policy for the Microsoft Base Cryptographic Provider (RSABASE) as described in FIPS PUB 140-1. CONTENTS INTRODUCTION .......................................................................... 1 SECURITY POLICY...................................................................... 2 SPECIFICATION OF ROLES ........................................................ 3 SPECIFICATION OF SERVICES................................................... 4 CRYPTOGRAPHIC KEY MANAGEMENT ..................................... 9 SELF-TESTS .............................................................................. 11 MISCELLANEOUS...................................................................... 12 FOR MORE INFORMATION ....................................................... 13 { TC "INTRODUCTION" \F SP }INTRODUCTION Microsoft Base Cryptographic Provider (RSABASE) is a FIPS 140-1 Level 1 compliant, general- purpose, software-based, cryptographic module. Like other cryptographic providers that ship with nternet Explorer 5.1 or later, RSABASE encapsulates several different cryptographic algorithms in an easy-to-use cryptographic module accessible via the Microsoft CryptoAPI. It can be dynamically linked into applications by software developers to permit the use of general-purpose FIPS 140-1 Level 1 compliant cryptography. Cryptographic Boundary The Microsoft
    [Show full text]
  • Starburn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started
    StarBurn Software Technical Reference Series StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started April 18, 2016 StarBurn Software www.starburnsoftware.com Copyright © Rocket Division Software 2001-2016. All rights reserved. Copyright © StarBurn Software 2009-2016. All rights reserved. StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started Page 1 of 13 StarBurn Software Technical Reference Series INTRODUCTION .................................................................................................. 4 KEY BENEFITS ..................................................................................................... 5 KEY FEATURES .................................................................................................... 7 SUPPORTED PLATFORMS .................................................................................. 11 SYSTEM REQUIREMENTS................................................................................... 12 CONTACTS........................................................................................................ 13 StarBurn CD/DVD/Blu-Ray/HD-DVD Toolkit: Getting Started Page 2 of 13 StarBurn Software Technical Reference Series COPYRIGHT Copyright © Rocket Division Software 2001-2016. All rights reserved. Copyright © StarBurn Software 2009-2016. All rights reserved. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written
    [Show full text]
  • Windows 95 & NT
    Windows 95 & NT Configuration Help By Marc Goetschalckx Version 1.48, September 19, 1999 Copyright 1995-1999 Marc Goetschalckx. All rights reserved Version 1.48, September 19, 1999 Marc Goetschalckx 4031 Bradbury Drive Marietta, GA 30062-6165 tel. (770) 565-3370 fax. (770) 578-6148 Contents Chapter 1. System Files 1 MSDOS.SYS..............................................................................................................................1 WIN.COM..................................................................................................................................2 Chapter 2. Windows Installation 5 Setup (Windows 95 only)...........................................................................................................5 Internet Services Manager (Windows NT Only)........................................................................6 Dial-Up Networking and Scripting Tool....................................................................................6 Direct Cable Connection ..........................................................................................................16 Fax............................................................................................................................................17 Using Device Drivers of Previous Versions.............................................................................18 Identifying Windows Versions.................................................................................................18 User Manager (NT Only) .........................................................................................................19
    [Show full text]
  • Lantastic® for Dos User's Manual
    LANTASTIC® FOR DOS USER’S MANUAL Instructions for basic networking and day-to-day use #9860 Edition 2_pdf [1/14/00 – RK] Manual Writers/Editors: Rhonda Knotts ■ Elizabeth Kane Online Writers/Editors: Rhonda Knotts ■ Elizabeth Kane Designer: Rhonda Knotts CONTENTS Chapter 1. Introducing LANtastic for DOS......................................1 Welcome to LANtastic 8.0............................................................................ 1 Finding the information you need ................................................................ 1 Using the online Help................................................................................... 4 Where to go for technical support................................................................ 4 Chapter 2. Using Shared Drives.......................................................5 Using LANtastic’s DOS-based interface......................................................... 5 Making a new drive connection ................................................................... 6 Using an existing drive connection............................................................... 8 Logging in and out of servers....................................................................... 9 Shutting down your server ......................................................................... 10 Chapter 3. Using Printers...............................................................11 Making a new printer connection............................................................... 11 Using an existing printer connection
    [Show full text]
  • Restoring from a Backup with Image for Windows
    User’s Guide TERABYTE UNLIMITED 10220 Lazy Bear Street Las Vegas, NV 89131 http://www.TeraByteUnlimited.com ASP Member Copyright © 1996-2007 by TeraByte Unlimited, All Rights Reserved. Trademarks BootIt, PHYLock, and TBIView are trademarks of TeraByte Unlimited. Microsoft, MS, MS-DOS and Windows are registered trademarks of Microsoft Corporation. IBM, PC-DOS and OS/2 are registered trademarks of the International Business Machines Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Technical Support Policy Technical support is provided online. Software and documentation updates are available at www.terabyteunlimited.com. • The Image for Windows home page, with software and documentation update information, and support resources, can be found at www.terabyteunlimited.com/imagew.html. • A support knowledge base for all TeraByte Unlimited products, including Image for Windows, can be found at www.terabyteunlimited.com/kb. Registered users can email their questions to [email protected], if no suitable resolution is found via the aforementioned support resources. If the issue is not resolved via email, telephone support may be provided. Unregistered users will be provided technical support and product information through email only. In all cases, TeraByte Unlimited reserves the right to refuse any communication method that would incur a cost. Ombudsman Statement This program is produced by a member of the Association of Shareware Professionals (ASP). ASP wants to make sure that the shareware principle works for you. If you are unable to resolve a shareware-related problem with an ASP member by contacting the member directly, ASP may be able to help.
    [Show full text]
  • Unit 5 Windows 2000/XP History, and Data Management
    Unit 5 Windows 2000/XP History, and Data Management Copyright © 2002 Heathkit Company, Inc. All rights reserved. Microsoft Windows98 Microsoft WindowsMe Microsoft Windows 2000 Professional Microsoft WindowsXP 2 Windows 2000/XP or Windows 9x (95/98/Me)? Windows 9x Windows 2000/XP Runs on today’s Runs on “nearly any hardware, doesn’t run old hardware” well or at all on marginal hardware Secure, more difficult to Open, easy to configure configure Supports lots of Device support somewhat devices limited, so far 3 Windows XP or Windows 9x? If you need: Choose: Reliable, solid security Windows 2000/XP “Crash-proof” system Windows 2000/XP Support for older/slower Windows 9x machines Easy setup and configuration Windows 9x Support for that older scanner, Windows 9x CD Writer, NIC, Video, etc. 4 The Windows Business Consumer Universe 1990 Windows 3.1 Windows NT 3.51 Windows for Workgroups Windows NT 4 Windows 95 Windows 98 Windows 2000 Windows Me Today Windows XP Pro/Home 5 The Windows Business Consumer Universe 1990 Windows 3.1 Windows NT 3.51 Windows for Workgroups Windows NT 4 Windows 95 Windows 98 Windows 2000 Windows Me Today Windows XP Pro/Home 6 The TheWindows Windows Business Universe Consumer Universe 1990 Windows 3.1 Windows NT 3.51 Windows for Workgroups Windows NT 4 Windows 95 Windows 98 Windows 2000 Windows Me Today Windows XP Pro/Home 7 Windows XP Flavors • Windows XP Professional • Windows XP Home • Windows 2003 Server • Windows 2003 Enterprise Server • Windows 2003 Datacenter Server 8 Windows Package Types • Upgrade • Full Version
    [Show full text]
  • Remoteboot of Windows 95/98 from Os/2 Warp Server
    REMOTEBOOT OF WINDOWS 95/98 FROM OS/2 WARP SERVER MICHO DURDEVICH Abstract. We explain how to set up diskless Windows 95/98 workstations that remote boot from OS/2 Warp Server, using the 802.2 RIPL Service. We present several different configurations of Windows RIPL clients, and discuss a couple of interesting problems appearing in the game. The basics of the OS/2 Warp Server RIPL Service is presented, too. 1. Introduction This article is devoted to studying a very interesting way of integrating Windows with OS/2 Warp Server working environment. We shall explain in detail how to set up a remote boot diskless workstation to load Windows 95/98 (together with the appropriate applications) directly from an OS/2 Warp Server. This opens an exciting new possibility to extend IBM’s and Serenity Systems’ OS/2-based managed client philosophy to Win32 platforms. In other words, we are going to set up RIPL (Remote Initialization and Program Load) for Win95/98 clients. The main strategy used here is relatively straightfor- ward. The first real-mode phase of Win95/98 boot process is essentially a plain DOS. The transition to protected-mode regime occurs during the second boot phase, when the graphical part is loaded. Accordingly, our Win95/98 client will be under- stood, from the OS/2 Warp Server viewpoint, as a DOS client. This client will be configured appropriately, so it will be able to RIPL a full-blown version of Windows. It should be noted however, that this is not a documented feature of Windows nor OS/2.
    [Show full text]
  • Lantastic ® Troubleshooting Manual
    LANTASTIC® TROUBLESHOOTING MANUAL Solutions to common networking problems Edition 2_PDF [1/10/00 – RK] ©1999-2000, Artisoft, Inc. Writers/Editors: . Elizabeth Kane ! Artisoft Technical Support Troubleshooting Team ! Rhonda Knotts Designers: . Rhonda Knotts ! Elizabeth Kane CONTENTS CHAPTER 1. TROUBLESHOOTING YOUR NETWORK.........................................................1 Where to find your solution.................................................................................................................1 Troubleshooting techniques ...............................................................................................................2 Isolating the problem....................................................................................................................... 2 Identifying the source ...................................................................................................................... 3 Testing the problem ........................................................................................................................ 3 Using Technical Notes............................................................................................................. 4 If you don’t find a solution...................................................................................................................4 Online Help systems ....................................................................................................................... 5 LANtastic Online Library ................................................................................................................
    [Show full text]