PC Magazine Utilities manual


        *==============================================================*
        |                                                              | 
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        |                   The PC Magazine Utilities                  |
        |                                                              |
        |                           Volume I                           |
        |                                                              |
        |         Copyright (C) 1986 Ziff-Davis Publishing Co.         |
        |                                                              |
        |        Manual assembled and edited by Craig L. Stark         |
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        |                                                              |
        *==============================================================*





          ATTR (Attribute)                       Charles Petzold
          Command                                          No. 1

          ______________________________________________________

          Purpose:  ATTR.COM permits display and modification of
                    the archive, system, hidden, and read-only
                    file attributes.

          Format:   ATTR
                      or
                    ATTR *.*
                      or
                    ATTR [+A|-A] [+S|-S] [+H|-H] [+R|-R]
                    [d:][path]filename[.ext]

          Remarks:  Entering ATTR without any parameters, as in
                    the first format shown above, produces a help
                    display (essentially identical to the third
                    form above) that shows which file attributes
                    can be changed.

                    ATTR.COM permits the use of the global ? and
                    * characters (as in the second format above).
                    Entering ATTR filename displays a specific
                    file's attributes.  For example,

                         ATTR IBMBIO.COM

                    returns the display

                         IBMBIO.COM    Arc     Sys Hid R-O

                    showing that the Archive, System, Hidden, and
                    Read-Only bits of the attribute byte are set
                    for this file.

                    When wildcards are used to list the
                    attributes of all the files in a directory,
                    subdirectory names are shown as Dir (between
                    the Arc and Sys in the example above).
                    Unlike the DOS DIR command, ATTR lists hidden
                    files, whether sought by specified filename
                    or through a *.* listing.  However, ATTR does
                    not show Volume names or the dot and double-
                    dot entries in subdirectories.

                    The syntax for changing file attributes is
                    indicated in the third format above.  After
                    typing ATTR (and a space) you simply precede
                    the file specification with a plus or minus
                    sign, followed by the letter A (Archive), S
                    (System), H (Hidden), or R (Read-Only).  A
                    plus sign turns on the specified attribute; a
                    minus sign turns it off.  More than one
                    attribute can be changed at once, and the
                    attribute-designating letters may be entered




                                 Page -1-

                    in any order and in upper- or lowercase.  No
                    space may be used between the plus or minus
                    and the letter that follows it, however.

          Example:  To convert the file 85TAX.WKS to hidden and
                    read-only, you would enter

                    ATTR +H +R 85TAX.WKS

                    Since DOS itself normally sets the Archive
                    bit, entering

                          ATTR 85TAX.WKS

                    would produce the display

                         85TAX.WKS     Arc         Hid R-O

                    Since the Hidden attribute has been set,
                    however, the  DIR command will produce the
                    message, "File not found."  And since the
                    Read-Only flag has also been set, a DEL
                    command will produce the message, "Access
                    denied."

                    Notes:

                    1.   Requires DOS 2.0 or later.

































                                 Page -2-


          BAC (Backup Directory)                  John Dickinson
          Command                                          No. 2
          _______________________________________________________

          Purpose:  Backs up all (or selected) files in a
                    directory to hard or floppy disks, permitting
                    disk changes when target disks become full.

          Format:   BAC [d:][path]filename[.ext] [d:][path]

          Remarks:  Unlike the DOS COPY command, BAC.COM permits
                    you to change (formatted) target disks when
                    backing up files to disk.  Furthermore, it
                    only backs up files whose date stamp is later
                    than those of identically named files on the
                    target disk.  Unlike BACKUP, BAC does not
                    change the setting of the archive bit.  Also,
                    files copied with BAC.COM are fully usable at
                    all times; they do not need first to go
                    through a RESTORE process.

                    BAC.COM supports the use of global (* and ?)
                    characters in filenames and extensions.  It
                    does not, however, permit you to REName files
                    during copying.

          Example:  You are working at a PC AT with a hard disk
                    drive (C:) on which you keep your copy of
                    BAC.COM, and you want to back up all the .DOC
                    files stored on a 1.2-Mb floppy disk (drive
                    A:) onto  regular 360K disks (drive B:).
                    Since these .DOC files will require
                    approximately 600K, you must have two
                    formatted blank floppy disks ready to use in
                    drive B:.  From the C> prompt you enter

                         BAC A: *.DOC B:

                    When the first target disk in drive B: is
                    full, you will be prompted to change disks.

                    Notes:

                    1.   BAC.COM compares the date stamps of
                         identically named files and will not
                         overwrite a newer version with an older
                         one.  This may cause files to be skipped
                         if you omit to keep your date/time
                         current.

                    2.   Requires DOS 2.0 or later.










                                 Page -3-


          Browse                                 Charles Petzold
          Command                                          No. 3

          _______________________________________________________

          Purpose   Permits scrolling forward and backward
                    throughout a file without use of a word
                    processing program.

          Format:   BROWSE [d:][path]filename[.ext] [/W]

          Remarks:  The DOS TYPE command does not permit you to
                    scroll ahead or go back to previously
                    displayed material in a file.  It also exits
                    at the first instance of Ctrl-Z (ASCII 26,
                    conventionally used as an End-of-File
                    marker), making it impossible to scan binary
                    (e.g. .COM) files for error messages,
                    copyright notices, and the like.

                    BROWSE.COM overcomes these shortcomings,
                    giving you the chance to go immediately to
                    the top or to the end of a file (the Home and
                    End keys, respectively), to the succeeding or
                    previous screen (PgUp and PgDn), or to move
                    up or down a line at a time (Up Arrow or Down
                    Arrow).  To return to DOS, simply press the
                    Escape key or Ctrl-Break.

                    Wide displays, e.g. a spreadsheet file, are
                    not broken at 80 columns, as with TYPE.
                    BROWSE ignores carriage returns (ASCII 13),
                    breaking lines only on line feeds (ASCII 10).
                    The Right Arrow key scrolls the display to
                    the right in eight-character increments (see
                    Note 3 below) to view wide displays; the Left
                    Arrow key returns you immediately to column
                    zero.

                    BROWSE expands tab characters (ASCII 9) to
                    the next eight-character boundary, but does
                    no other character processing unless the /W
                    parameter is specified.  Use of the /W option
                    permits using BROWSE with WordStar files.

                    Notes:

                    1.   BROWSE can run under TopView or Windows;
                         specify "writes directly to screen" in
                         the .PIF and use the default 52K memory
                         requirement.  (The program actually
                         requires only approximately 33K to run.)
                         For the TopView PIF, specify that the
                         program intercepts Interrupt 23h.

                    2.   BROWSE is compatible with the IBM
                         monochrome, CGA, and EGA displays, and




                                 Page -4-

                         will even run in the EGA 43-line mode.
                         Files prepared with word-processors that
                         employ a one-line-per-paragraph format
                         (such as Microsoft Word and XyWrite) may
                         to require excessive right scrolling,
                         however.

                    3.   BROWSE.COM can be patched with DEBUG so
                         that its right-scroll jumps by more than
                         the default eight characters.  The
                         address to patch is 10F in the .COM
                         file.  After entering DEBUG BROWSE.COM
                         type

                              E 10F

                         and the default value (08h) will appear.
                         Type the desired hexadecimal number (28
                         for a 40-column increment; 50 for an 80-
                         column increment) and press <Enter>.
                         Then type W<Enter> to write to the disk
                         and Q<Enter> to quit DEBUG.

                    4.   Requires DOS 2.0 or later.





              THERE IS NO PAGE 5 OR 6 

              - - - - - - - - - - - -


































                                 Page -7-


          DDIR (Double Directory)                Charles Petzold
          Command                                          No. 5

          _______________________________________________________

          Purpose:  Displays all (or selected) directory entries
                    in double columns, sorted in alphabetical
                    order.

          Format:   DDIR [d:][path][filename[.ext]]

          Remarks:  If no parameters are specified, DDIR will
                    list all files in the current directory.  Use
                    of the global characters ? and * in the
                    filename and extension parameters is
                    supported.

                    If more than one screenful (50 entries) is
                    required, the display pauses at the bottom,
                    showing the message, "Press any key to
                    continue."

                    Notes:

                    1.   Because DDIR.COM loads a secondary
                         command processor, it will not operate
                         under the Run option of WordStar and
                         possibly with some other programs that
                         normally allow calling up external
                         programs.  For the same reason, it
                         cannot be automatically reinvoked using
                         the F3 key when at the DOS command
                         level.

                    2.   Requires DOS 2.0 or later.


























                                 Page -8-


          DELZ (Delete file entirely)             Steven Holzner
          Command                                          No. 6

          _______________________________________________________

          Purpose:  Allows you to delete a file absolutely by
                    writing over the sector(s) it occupies.

          Format:   DELZ

                    then

                    DEL/Z [d:][path][filename[.ext]]

          Remarks:  DOS does not delete files by overwriting
                    them.  Rather, the sectors used by the
                    "erased" file are simply made available for
                    use by subsequently written files.  Until
                    they are so used, however, the original file
                    can be recovered with UNDEL.COM (included in
                    these utilities) or by using a comparable
                    commercial product.

                    Because it overwrites the sectors used by a
                    file, DELZ provides complete deletion.  A
                    memory-resident utility, it attaches itself
                    to DOS when loaded, normally as a command
                    entered through your AUTOEXEC.BAT file.
                    Thereafter, until you reboot, it provides a
                    /Z (for "zero out") option for the DEL
                    command.

          Example:  The disk from which you boot up your PC on
                    drive A: has a copy of DELZ.COM on it, and
                    the disk in drive B: has a file called
                    TAXCHEAT.85 that you wish to ensure is
                    completely obliterated.  From the A> prompt
                    you enter DELZ to load the command into
                    memory.  Then you enter

                         DEL/Z B:TAXCHEAT.85

                    Even if the TAXCHEAT.85 file is unerased, its
                    original contents will now be unrecoverable.
                    (The contents of that file will, in fact, be
                    the machine language code of DELZ.COM
                    itself.)

                    Notes:

                    1.   The Z in DEL/Z must be typed uppercase.
                         The use of the global characters ? and *
                         is supported.








                                 Page -9-

                    2.   Because of possible conflicts with other
                         memory-resident programs and utilities,
                         you must check whether DELZ can be
                         installed on your own system.  While
                         SideKick has caused no reported
                         difficulties, running XyWrite II or III,
                         with or without its XYKBD.COM file, is
                         impossible after DELZ is made resident.

                    3.   The use of DELZ.COM is likely to be
                         reasonably infrequent, but sometimes it
                         will be absolutely necessary.  If you
                         find at those times that co-residency
                         conflicts prevent putting it in your
                         AUTOEXEC.BAT file, you may wish to keep
                         a bootable disk (formatted with the /S
                         option) with a copy of DELZ.COM and an
                         AUTOEXEC.BAT file that loads the
                         program.  If you then boot up from this
                         disk you can destroy any file(s) you
                         wish, remove the DELZ disk, and reboot
                         your computer normally.

                    4.   Requires DOS 2.0 or higher.






































                                 Page -10-


          DISKSCAN                               Charles Petzold
          Command                                          No. 7

          ______________________________________________________

          Purpose:  Locates and identifies disk errors on hard
                    and floppy disks, Bernoulli Boxes or other
                    similar storage devices.

          Format:   DISKSCAN [d:]

          Remarks:  The DOS "Abort, Retry, Ignore?" and the
                    CHKDSK "x lost clusters found" messages tend
                    to appear after it is too late to save
                    possibly valuable data.  Regular use of
                    DISKSCAN will show when a hard disk is
                    beginning to go bad--for example, when a
                    specific sector or two in an as-yet
                    unallocated cluster has become unusable since
                    the disk was formatted.  (DOS marks and does
                    not use bad clusters it finds while
                    formatting.  DISKSCAN reports these "Flagged
                    as bad.")

                    DISKSCAN error messages include:

                    CRC Error: Data checksum as recalculated
                         during read does not agree with checksum
                         stored on disk when written.
                    Sector Not Found: Sector boundary created
                         during formatting is no longer readable.
                    File Alloc. Table and Can't Read FAT: Very
                         serious error:  Back up what you can
                         with COPY and reformat disk before
                         trying to put files back on it.
                    Boot Sector:  If this sector of a hard disk
                         goes bad, put a DOS disk in drive A: and
                         issue SYS C: command.  Then COPY
                         COMMAND.COM C:.  This will put a fresh
                         copy of the system files on drive C:.
                         If this does not work, boot up again
                         from the external DOS floppy disk, back
                         up all hard disk files, and reformat the
                         hard disk.
                    Root Directory:  Errors here could keep you
                         from later being able to load a file or
                         save updates to it.  CHKDSK will
                         probably indicate unallocated cluster
                         chains or cross-linked files, and you
                         may have to use CHKDSK/F to save what
                         you can.
                    Unallocated:  As yet, not serious, as the bad
                         sector is not being used.  When it is,
                         though, and you try to save a file with
                         this sector, you'll get an "Abort,
                         Retry, Ignore" message.  Select "Ignore"
                         to save what you can, then REName the




                                 Page -11-

                         file and save again under the new name.
                         Use RECOVER filename with the original
                         file; this will cause DOS to flag its
                         cluster(s) as bad.  (DISKSCAN does not
                         enter the bad cluster numbers in the
                         File Allocation Table; FORMAT and
                         RECOVER do.)  Then delete the original
                         (RECOVERed) filename and check the
                         second version you saved (under the new
                         name) to see how much (if any) of it is
                         usable.
                    Used by file: While DISKSCAN reports the bad
                         sector number, it does not do a cross-
                         check to see which of your files is
                         using that sector.  You may be able to
                         identify this by issuing the command

                              SWEEP COPY *.* NUL

                         When COPY encounters the file with the
                         bad sector it will report "Abort, Retry,
                         Ignore."  Note the bad file and press
                         "I" to continue.
                    Read Fault and General Failure:  The sectors
                         so designated are bad, but the errors
                         reported don't fall into any of the
                         above categories.

                    Notes:

                    1.   Requires DOS 2.0 or higher.































                                 Page -12-


          DOORS                                   John Dickinson
          Command                                          No. 8

          ______________________________________________________

          Purpose:  Permits switching between two simultaneously
                    connected displays without leaving an
                    application program and thereby losing the
                    contents of the alternate screen.

          Format:   DOORS        (loads memory-resident program)
                    <Alt-Right Shift>  (toggles between screens)

          Remarks:  When the second screen display is invoked by
                    pressing Alt-Right Shift, DOORS begins by
                    copying the first screen to the second.  The
                    first screen display remains resident on that
                    monitor, for reference, but the focus of your
                    work shifts to the second screen, on which
                    you may continue working.  If you then
                    subsequently switch back to the first monitor
                    (by pressing Alt-Right Shift again), the
                    second monitor's current contents will remain
                    on its display but will initially be copied
                    to the first monitor.

                    Since the monochrome display cannot support
                    40-column text or color graphics modes, DOORS
                    can only be used with your color monitor set
                    for 80-column text mode.  In addition to
                    switching between monochrome and color text
                    modes, however, DOORS permits you to store
                    a screen from either a monochrome or a high-
                    resolution EGA text display to the other 
                    monitor, though you must toggle back to re-
                    sume your work on the display from which 
                    you started.

                    Notes:

                    1.   DOORS.COM may not work with
                         "compatibles" that do not use the same
                         keyboard interrupt structure as the PC.
                         Further, as with all memory-resident
                         software, it may not be compatible with
                         all programs.

                    2.   Requires DOS 2.0 or later.













                                 Page -13-


          DOS-EDIT                               Charles Petzold
          Command                                          No. 9

          ______________________________________________________

          Purpose:  Permits moving to, editing, and reentering
                    on-screen DOS commands without retyping.

          Format:   DOS-EDIT     (loads memory-resident program)
                         then
                    <Up Arrow>           (enables DOS-Edit keys)
                    <Left Arrow>                   (cursor left)
                    <Right Arrow>                 (cursor right)
                    <Up Arrow>                       (cursor up)
                    <Down Arrow>                   (cursor down)
                    <Backspace>          (destructive backspace)
                    <Ins>              (insert/overwrite toggle)
                    <Del>                     (delete character)
                    <PgDn>               (delete to end of line)
                    <PgUp>                  (cursor to column 1)
                    <Home>          (cursor to initial column #)
                    <Esc>           (exit edit mode, no changes)
                    <End>           (transfer text line right of
                                 cursor to end of original line)
                    <Enter>   (like <End>, plus execute command)

          Remarks:  When loaded, normally through your
                    AUTOEXEC.BAT file, an initial Up Arrow
                    keypress activates the DOS-EDIT mode.
                    (Thereafter, the Up Arrow functions as a
                    normal cursor arrow key.)  If you move the
                    cursor down to the original line, you will
                    leave the DOS-EDIT mode (e.g., the Left Arrow
                    key will once again delete characters).

          Example:  A typical use of DOS-EDIT is to correct a
                    long command line in which you made a typing
                    error.  Simply move the cursor up to the mis-
                    typed line, correct the mistake (using the
                    appropriate keys listed under FORMAT), press
                    Home (to position the cursor to pick up the
                    whole of the line), then Enter.

                    A less obvious example occurs if you have
                    just done a DIR listing and want to run a
                    program.  Move the cursor up and just to the
                    right of the program name.  Press PgDn to
                    delete the extension and the rest of the
                    line, PgUp to position the cursor to pick up
                    the whole command name, then Enter.

                    Note:

                    1.   DOS-EDIT is a memory-resident program,
                         and so may cause conflicts with some
                         other memory-resident software programs.
                         Such problems can frequently be solved
                         by changing the order in which the
                         several memory-resident programs are
                         loaded.   DOS-EDIT should be loaded
                         before ASSIGN.COM and before SideKick,
                         for example.
                                 Page -14-


          FREE                                       Art Merrill
          Command                                         No. 10

          ______________________________________________________

          Purpose:  FREE.COM reports the number of unallocated
                    bytes on a floppy or hard disk.

          Format:   FREE [d:]

          Remarks:  FREE is in many respects a companion program
                    to SIZE.COM:  the latter tells you how much
                    storage space you must have to make your
                    copies, the former tells you how much you do
                    have.

                    The information provided by FREE.COM is, of
                    course, available with the DOS commands
                    CHKDSK and DIR.  Where a large group of files
                    is involved, however, the DOS commands are
                    very slow in operation;  FREE is almost
                    instantaneous.

                    Notes:

                    1.   Requires DOS 2.0 or later.
































                                 Page -15-


          KEEPER                                  Steven Holzner
          Command                                         No. 11

          ______________________________________________________

          Purpose:  Stores and displays the last ten commands
                    entered for immediate reexecution without
                    retyping.

          Format:   KEEPER       (loads memory-resident program)
                    <Ctrl-N>            (toggles window display)

          Remarks:  KEEPER can store command lines of up to 50
                    characters each in length.  After loading,
                    normally via your AUTOEXEC.BAT file, and
                    pressing Ctrl-N (the default trigger key; see
                    Option 1), the last 10 command lines are
                    shown in a window in the upper right-hand
                    corner of the display.  If you wish to
                    execute one of the commands shown, move to
                    its line with the Up Arrow and Down Arrow
                    keys;  the line currently selected blinks.
                    Pressing Ctrl-N again will reissue a blinking
                    command or, if no stored command line has
                    been selected, will return the display to
                    normal.

                    Notes:

                    1.   KEEPER is not compatible with a number
                         of application programs (e.g., XyWrite)
                         that take over the keyboard interrupts.


          Option 1: The default trigger key is Ctrl-N.  Should
                    this be inconvenient, you can use the
                    KEEPER.BAS program to recreate KEEPER.COM
                    with a different trigger key.  From the DOS
                    prompt simply enter

                         BASIC KEEPER

                         and the program will prompt you for your
                    choice of trigger key.  After the KEEPER.COM
                    file is created in this way, it is a regular
                    DOS command and is not run under BASIC.















                                 Page -16-


          KEY-FAKE                               Charles Petzold
          Command                                         No. 12

          ______________________________________________________

          Purpose:  Supplies the series of keystrokes needed to
                    initialize an application program on boot-up.

          Format:   KEY-FAKE ["xyz"] [nn] [0] [@F]
                    Programname

                    Characters typed within a pair of single or
                    double quotes ("xyz") are normal ASCII-
                    character keystrokes.  Numbers (nn) not in
                    quote marks are ASCII decimal codes, e.g., 13
                    (Enter), 26 (Ctrl-Z), or 27 (Esc).  Numbers
                    preceded by @ are the extended ASCII decimal
                    codes (128 through 255) generated by the Alt
                    keys, cursor keys, Ins and Del keys, and the
                    Function keys (e.g., @61 is the F3
                    keystroke).  The 0 is used with programs that
                    check the keyboard buffer (it tells such
                    programs the buffer is clear, so the programs
                    will treat the succeeding keystroke
                    separately).

          Remarks:  KEY-FAKE is of greatest use in batch files
                    used to call up application programs.  For
                    example, to enter Lotus's 1-2-3 and set it
                    for File Retrieve, the following .BAT file
                    would be appropriate:

                    CD \LOTUS
                    KEY-FAKE 0 13 0 13 0 13 0 13 0 13 "/FR"
                    LOTUS

                    This takes you past the necessary initial
                    carriage returns and /FR command without
                    having to type them in each time.

                    Similarly, if each time you enter BASICA you
                    want to have a blue border, blue background,
                    and yellow letters, you would create a batch
                    file, B.BAT, containing the lines

                    KEY-FAKE "COLOR 14,1,1" 13 "CLS" 13
                    BASICA

                    Notes:

                    1.   The keystroke sequence stored by KEY-
                         FAKE is limited to 124 characters and
                         must be on one continuous command line.
                         Keystrokes not supported by PC BIOS
                         (e.g., Alt-Home) cannot be stored.

                    2.   Programs such as XyWrite II that get
                         keyboard information directly from the
                         hardware keyboard interrupt will bypass
                         KEY-FAKE.  KEY-FAKE will also not work
                         well when you are on-line using a
                         communications program.
                                 Page -17-


                    3.   KEY-FAKE is memory resident, but can be
                         executed multiple times in the same
                         session without reloading.  However, if
                         nested batch files cause it to be re-
                         invoked before its initially stored
                         keystroke sequence has been exhausted,
                         the remaining initial keystrokes will be
                         lost.





















































                                 Page -18-


          LOCATE                                  Steven Holzner
          Command                                         No. 13

          ______________________________________________________

          Purpose:  Searches all files in the current and the
                    root directories of a drive for all
                    occurrences of any specified sequence (e.g.,
                    a word or phrase) of up to 20 ASCII
                    characters. Additional search paths and/or
                    drives may be specified by using Option 1.

          Format:   LOCATE searchstring

          Remarks:  In addition to returning the path(s) and
                    filename(s) of the file(s) in which the
                    requested string is found, LOCATE puts
                    searchstring into a context of up to 20
                    immediately surrounding characters.

                    LOCATE.COM is case sensitive;  the string to
                    be found must be typed exactly.  The program
                    does, however, strip "high-order" (non-ASCII)
                    bits from searchstring, so it can be used,
                    for example with WordStar document files.

                    Note:

                    1.   Requires the use of DOS 2.0 or later.

          Option 1: Normally, if LOCATE does not find the
                    requested string either in the current
                    directory or in the disk's root directory, it
                    simply exits.  It does not automatically
                    search every subdirectory on every drive.

                    You can extend the search range, however, by
                    preparing a simple ASCII file that specifies
                    additional paths and/or drives.  The name of
                    this file must be PATH.DAT, and it must be
                    located in the root directory (usually C:\
                    for hard disks, A:\ for floppies).  An
                    example of such a PATH.DAT file would be

                    \WORK
                    \LEVEL1
                    \A:

                    Each line in the PATH.DAT file must end with
                    a carriage return and specifies an additional
                    path (or drive) for LOCATE to check before it
                    exits.  The PATH.DAT file can be up to 300
                    bytes in length, and incorrectly specified
                    entries are ignored.

                    The use of Option 1 will, of course, slow
                    down the overall speed of the search.




                                 Page -19-

                      
          LOCK (and UNLOCK)                       Steven Holzner
          Commands                                        No. 14

          ______________________________________________________

          Purpose:  Encrypts a file, rendering it unreadable to
                    anyone who does not know the user-chosen
                    passphrase.  Complementarily, using the same
                    passphrase, de-encrypts the file.

          Format:   LOCK [d:][path]filename[.ext] [d:][path]
                    [filename][.ext]
                                 or
                    UNLOCK [d:][path]filename[.ext] [d:][path]
                    [filename][.ext]

          Remarks:  The user-selected passphrase can be up to 64
                    characters in length; the programs prompt you
                    to supply it.  Files to be LOCKed and
                    UNLOCKed must be less than 62K in length.  If
                    you do not supply new filenames for the
                    locked and unlocked files, the programs use
                    the default filename FILE.LOC.

          Example:  You have a file of student course evaluations
                    named CONFY on drive C: that you wish to mail
                    to a colleague in encrypted form.  You put a
                    formatted floppy disk in drive A:, and at the
                    C> prompt you enter

                         LOCK CONFY A:CRIMSON

                    When the program asks for a passphrase, you
                    enter VERITAS.

                    The CRIMSON file on the disk will be
                    unreadable.  When your colleague--who must,
                    of course, be told the passphrase you have
                    used--puts the disk in his machine, he types

                         UNLOCK CRIMSON GUIDE

                    When prompted, he supplies the passphrase
                    VERITAS, and his file GUIDE will be identical
                    to your original file CONFY.

                    Notes:

                    1.   LOCK and UNLOCK do not delete any files,
                         original or encoded.

                    2.   Requires DOS version 2.0 or later.









                                 Page -20-


          LPTPORT                                 John Dickinson
          Command                                         No. 15

          _______________________________________________________

          Purpose:  Permits alternate use of two parallel
                    printers (e.g., letter- and draft-quality
                    units) with software that is normally limited
                    to using LPT1:.

          Format:   LPTPORT

          Remarks:  Certain software, e.g., the PC-DOS Shift-
                    PrtSc routine, does not recognize a command
                    such as

                    A>MODE LPT1:=LPT2:

                    To use such software with two different
                    printers normally requires changing physical
                    connections.

                    LPTPORT.COM provides a software toggle that
                    interchanges the internal DOS I/O addresses
                    of LPT1: and LPT2:.  After entering the
                    LPTPORT command, a second printer, connected
                    to LPT2:, will receive program output
                    nominally directed to LPT1:.  Entering the
                    LPTPORT command a second time restores the
                    original port assignments.

                    Notes:

                    1.   Certain internal print-spooling
                         programs, such as those supplied with
                         add-on memory board cards, read the port
                         address assignments at boot-up time and
                         do not thereafter look at the low-memory
                         area of DOS to find them.  With such
                         programs you will have to run LPTPORT
                         before the print spoolers are loaded in
                         order to change the effective port
                         assignments.


















                                 Page -21-


          MONOGRAF.DRV                           Charles Petzold
          Lotus's 1-2-3 (Version 1A) driver               No. 16

          ______________________________________________________

          Purpose:  Displays 1-2-3 bar and stacked-bar graphs on
                    a monochrome monitor.

          Format:   COPY MONOGRAF.DRV [drive:][path] GD.DRV

                    Note: the [drive:] and [path] above refer to
                    your Lotus system disk or subdirectory path.
            
                    Note also:  When using MONOGRAF, specify
                    Color, not Black-and-White, from the 1-2-3
                    graph options menu.

          Remarks:  Displaying the numbers in a 1-2-3 worksheet
                    in graph form normally requires using either
                    a color/graphics adaptor (CGA) and monitor
                    or--for users who have only a monochrome
                    system--the use of a Hercules (or equivalent)
                    card.

                    MONOGRAF.DRV is installed in 1-2-3 just as if
                    it were a Lotus-supplied GD (graphics driver)
                    program.

                    Notes:

                    1.   MONOGRAF can display only bar or
                         stacked-bar graphs.

                    2.   To display graphs, use Function key 10,
                         as the Lotus manual directs.  Use this
                         key only in the Worksheet mode, not in
                         conjunction with the 1-2-3 PrintGraph
                         program.  You can, however, use Shift-
                         PrtSc to print out the screen display on
                         any printer that can handle the IBM
                         text-graphics character set.




















                                 Page -22-


          MOVE                                    Steven Holzner
          Command                                         No. 17

          ______________________________________________________

          Purpose:  Allows rapid selection and copying of files
                    to or from a double-sided floppy disk, a
                    RAMdisk, or the current subdirectory of a
                    hard disk.

          Format:   MOVE [d:]filename[.ext] d:

          Remarks:  MOVE.COM was written to be compatible with
                    all versions of PC-DOS (including 1.1), and
                    so does not support pathnames.

          Example:  When you enter a command such as

                         MOVE A:*.BAS B:

                    each filename on the root (or current)
                    directory of drive A: that has a .BAS
                    extension will be displayed in the form

                    Copy filename.BAS (Y/N)?

                    If you strike Y, the file will immediately be
                    copied to drive B: and the next appropriate
                    filename will be displayed.  If you strike N,
                    the file will not be copied, and the next
                    appropriate filename will be presented.  The
                    program terminates with a simple return to
                    the DOS prompt when no appropriate files
                    remain to be considered.



























                                 Page -23-


          NO                                     Charles Petzold
          Command                                         No. 18

          ______________________________________________________

          Purpose:  Excludes specified files in a subdirectory
                    from the action of a command.

          Format:   NO filespec Command [parameter]

          Remarks:  NO.COM is designed for situations in which
                    you want to apply a command such as DELete or
                    COPY to all the files in a directory except
                    one or two (or a class of) files.  For
                    example,

                         NO *.BAS COPY *.* A:

                    copies all the files in your current
                    subdirectory to drive A: except for those
                    that have a .BAS extension.

                    To exclude more than one file (or category)
                    you must use a separate NO command for each
                    on the command line.  Thus,

                         NO *.ASM NO *.COM DEL *.*

                    deletes all files in the current directory
                    except those with .ASM or .COM extensions.

                    Notes:

                    1.   NO.COM should not be used in conjunction
                         with the PC-DOS BACKUP and RESTORE
                         commands.  This is because NO operates
                         by temporarily setting the "hidden" file
                         attribute bit on the files to be
                         excluded from the main command, then
                         unhiding the files after the main
                         command has been executed.  Since the
                         DOS BACKUP/RESTORE operation acts on
                         hidden and unhidden files alike, NO.COM
                         cannot be used to exclude files from
                         BACKUP/RESTORE.  RESTORE, indeed, will
                         restore the supposedly excluded files as
                         hidden, overwriting the originals.

                    2.   While NO.COM provides full path support
                         (and so requires the use of DOS 2.0 or
                         later), it is a good policy when using
                         NO to use CHDIR to make the directory
                         that contains the files on which you
                         wish to operate the current directory.

                         For example, suppose you are in your
                         root directory, one of whose subdirec-
                         tories is \BASIC.  If you were to enter
                         the command

                              NO *.BAS DEL \BASIC\*.*

                                 Page -24-

                         you would not delete all the files in
                         the \BASIC subdirectory except those
                         with a .BAS extension, as you might have
                         intended to do.  To do this from the
                         root directory you would have had to
                         enter

                              NO \BASIC\*.BAS DEL \BASIC\*.*

                         This complete filespec would tell NO
                         that it had to protect files in the
                         \BASIC, not in the current (i.e., root)
                         directory.

                         If you follow our recommendation and
                         enter

                              CD \BASIC
                              NO *.BAS DEL *.*

                         thus making \BASIC your current
                         directory before you start deleting, you
                         will then clean out all but the .BAS
                         files, just as you intended.

                    3.   Should a parity check error, power
                         outage, or system crash occur during the
                         brief period between the times NO hides
                         and subsequently unhides the protected
                         files, those files will subsequently
                         seem to have disappeared.  They are not
                         lost; only hidden from a DIR listing.
                         Use ATTR.COM (included in this set of
                         utilities) to change their hidden
                         status.



























                                 Page -25-


          NPAD (Notepad)                          Steven Holzner
          Command                                         No. 19

          ______________________________________________________

          Purpose:  Creates an on-screen window in which to keep
                    notes while working in other programs.

          Format:   NPAD         (loads memory-resident program)
                    <Ctrl-N>            (toggles notepad on/off)

          Remarks:  The NPAD notepad holds 10 lines of 25
                    characters each.  The window is toggled on
                    and off in the upper right corner of the
                    screen.  Toggling the window off does not
                    eliminate its contents, but pressing the
                    Delete key while the window is on-screen
                    does.  Single characters may be deleted with
                    the backspace, and the carriage return is
                    also recognized.  No provision for storing
                    the contents of the notepad as a file are
                    available, however.

                    Option 1: NPAD.COM can be modified by using
                    DEBUG.  The ASCII and scan codes for the
                    default trigger key (Ctrl-N) are 0Eh and 31h,
                    respectively, and are located at the offset
                    addresses xxxx:0336 and xxxx:0337.  To change
                    these to use the reverse apostrophe (grave
                    accent), you would enter

                         DEBUG NPAD.COM

                    and

                         -E 336

                    DEBUG will respond with

                    xxxx:0336  0E.

                    and you simply type in the new ASCII code, in
                    this case, 60 (the hex value of decimal 96).

                    After entering E 337 and getting the response

                    xxxx:0337  31.

                    you type in the new scan code 29 (41 decimal)
                    for the grave accent.  Other ASCII and scan
                    codes are given in the BASIC and in the DOS
                    Technical Reference manuals.

                    The two locations to examine and change for
                    the NPAD colors are 02FF and 0413, which have
                    a default value of 70h (112 decimal).  On a
                    color monitor this produces a white (7)
                    background with black (0) characters.  For
                    red letters on white you would change the 70h
                    to 74h (116 decimal) at these two locations.

                                 Page -26-

                    The colors to which NPAD resets its portion
                    of the screen on exit are set by the value at
                    xxxx:0350h.  The default value is 07 (white
                    characters on a black background).  For white
                    letters on a dark blue background, change the
                    07 to 17h (23 decimal); for dark blue letters
                    on white, use 71h (113 decimal) at this location.

                    When you have made the changes you want, at
                    the DEBUG hyphen prompt enter W and then Q.

                    Notes:

                    1.   NPAD is a memory-resident program that
                         must scan the keyboard interrupts.  It
                         will conflict with applications programs
                         (e.g., XyWrite) that themselves
                         commandeer the keyboard interrupts.












































                                 Page -27-


          ONEKEY                                  Steven Holzner
          Command (after running .BAS version)            No. 20

          ______________________________________________________

          Purpose:  Reassigns a designated series of keystrokes
                    to a user-selected keystroke.

          Format:   ONEKEY

          Remarks:  ONEKEY is a memory-resident keyboard macro
                    program.  While written in assembly language,
                    it is presented here with a BASIC interface
                    that need be run only once, but which
                    facilitates entering the trigger keys you
                    want to use and the sequences of keystrokes
                    they will replace.  ONEKEY will accept up to
                    30 different trigger keys, each of which will
                    replace up to 50 keystrokes.

                    When you load and run ONEKEY.BAS in BASIC,
                    you will prompted to "Type the key to be
                    replaced."  This will be a key you use as a
                    trigger:  Ctrl-N, Alt-Z, F1, or the like.
                    When you enter this key, you will be
                    prompted, "The command that replaces this key
                    is."  Here you enter the string of keystrokes
                    the selected trigger key will execute.
                    Remember to include all necessary carriage
                    returns, spaces, and control characters, just
                    as you would enter them at the keyboard.
                    When you type Ctrl-End (not a carriage
                    return) to terminate this sequence, you'll be
                    prompted for the next trigger key, and so on.

                    When you have typed in as many macros as you
                    want, type Ctrl-End when asked for a trigger
                    key.  It takes BASIC about half a minute to
                    create the ONEKEY.COM file.

                    Once created, ONEKEY is a regular DOS
                    command;  you enter it at the DOS prompt (or
                    as a line in your AUTOEXEC.BAT file), not
                    from BASIC.

                    Notes:

                    1.   Memory-resident utilities such as ONEKEY
                         are often incompatible with programs
                         (XyWrite is one) that themselves take
                         over the keyboard interrupts.  You must
                         simply experiment to see if ONEKEY can
                         be used with your software.

                    2.   Requires DOS 2.0 or later.






                                 Page -28-


          PR (Print)                              John Dickinson
          Command                                         No. 21

          ______________________________________________________

          Purpose:  Prints the standard ASCII files of program
                    listings according to a standard formatted
                    style.

          Format:   PR [d:][path]filename[.ext]

          Remarks:  PR.COM formats the program listing into 80
                    columns, expands ASCII tabs, adds a seven-
                    line header and a blank footer, and prints 55
                    lines of the listing on each 66-line page.
                    The header contains the filename, page
                    number, and date and time the program was
                    last saved.

                    Notes:

                    1.   The listings photoreproduced in PC
                         Magazine's Programming/Utilities column
                         are printed using PR.COM.

                    2.   Requires use of DOS 2.0 or later.



































                                 Page -29-


          PRSWAP                                  John Dickinson
          Command                                         No. 22

          ______________________________________________________

          Purpose:  Converts IBM text-graphics characters into
                    ASCII characters that can be printed by non-
                    graphics printers.

          Format:   PRSWAP

          Remarks:  The IBM text-graphics characters (non-
                    standard ASCII 176-223 and 254) programmers
                    often use to make their screen displays look
                    more attractive cannot be handled by many
                    printers.  PRSWAP.COM is a memory-resident
                    program that translates these characters into
                    presentable-looking ASCII substitutes.

                    PRSWAP should be loaded only once until you
                    power down or hit Ctrl-Alt-Del.  If you
                    intend to use it regularly, the best place to
                    put it is in your AUTOEXEC.BAT file.






































                                 Page -30-


          PUSHDIR (and POPDIR)                       John Friend
          Commands                                        No. 23

          ______________________________________________________

          Purpose:  Provides a way to return automatically to
                    your current directory after running programs
                    that require directory changing.

          Format:   PUSHDIR
                    [CD \AltDir\ProgName]
                    POPDIR

          Remarks:  While PUSHDIR and POPDIR can be entered
                    directly from the DOS prompt, their primary
                    application is in batch files.  For example,
                    suppose you create a file named 12.BAT that
                    consists of the following four lines:

                         PUSHDIR
                         CD\LOTUS
                         123
                         POPDIR

                    Suppose also that 12.BAT, PUSHDIR.COM, and
                    POPDIR.COM are either in your root directory
                    or in a subdirectory on the PATH specified in
                    your AUTOEXEC.BAT file.  Assume, finally,
                    that you are currently in your word
                    processing subdirectory (\WP), but need some
                    information from a 1-2-3 spreadsheet.  If you
                    now enter

                         12<CR>

                    from the DOS prompt, PUSHDIR stores the \WP
                    (your current directory) on its stack and DOS
                    changes to the \LOTUS subdirectory and runs
                    1-2-3.  When you exit from 1-2-3, you would
                    normally be left in the \LOTUS subdirectory.
                    A DOS CD command in 12.BAT after the 123 line
                    could return you to a specified directory
                    every time you terminated 1-2-3, of course.
                    But POPDIR returns you to whatever
                    subdirectory you were in when you invoked 1-
                    2-3--in this case, to your \WP subdirectory.

                    PUSHDIR can accommodate up to six levels of
                    directories on its stack, permitting
                    considerable programming flexibility in
                    constructing batch files.

                    Notes:

                    1.   PUSHDIR and POPDIR require DOS 2.0 or
                         later.





                                 Page -31-


          QUICKEYS                                   Leo Forrest
          Command                                         No. 24

          ______________________________________________________

          Purpose:  Accelerates the "typematic" repeat rate of a
                    PC or XT keyboard.  A built-in subprogram is
                    included that instantly clears the keyboard
                    buffer to prevent sending excess accumulated
                    keystrokes to the display.

          Format:   QUICKEYS     (loads memory-resident program)
                    <Alt-Shift>         (clears keyboard buffer)

          Remarks:  While the keystroke repetition rate of the PC
                    AT is adjustable, that of the XT and the PC
                    is fixed at approximately nine keystrokes per
                    second.  When QUICKEYS is loaded (normally
                    through your AUTOEXEC.BAT file), the
                    repetition speed is approximately doubled.
                    Successive loadings of QUICKEYS (each
                    requires about 672 bytes of memory) can be
                    used to increase the keyboard speed still
                    further, if desired.

                    Notes:

                    1.   QUICKEYS is a memory-resident program
                         that inserts itself both into the timer
                         tick and keyboard interrupt routines.
                         It is not compatible with some other
                         memory-resident software and with
                         programs that appropriate the keyboard
                         interrupts.



























                                 Page -32-


          RED (Redirect)                          John Dickinson
          Command                                         No. 25

          _______________________________________________________

          Purpose:  Transfers one (or more) file(s) from one
                    subdirectory to another without requiring the
                    use of COPY and ERASE.

          Format:   RED [d:][path]filename[.ext] [d:][path]

          Remarks:  Like the DOS COPY command, RED.COM supports
                    the use of the global characters ? and * in
                    specifying the desired source files.

                    Unlike COPY, however, RED.COM does not permit
                    renaming a file during the transfer process.
                    (This is why it is unnecessary to supply a
                    target filename.)  Furthermore, RED requires
                    that the source and target drives be the
                    same.  You cannot, therefore, remove a set of
                    files from drive C: by trying to REDirect
                    them to drive A:.

          Example:  Before submitting your income tax you
                    calculated it under several different
                    methods, contained in files named ROUGH1.DAT
                    through ROUGH6.WKS.  These are all in the
                    subdirectory \IRS on drive C:, and you want
                    to move them all to a sub-subdirectory (which
                    you have created) called \1985TAX\DRAFTS.
                    From the C> prompt enter

                         \IRS\ROUGH?.* \1985TAX\DRAFTS

                    and all six files will be moved out of \IRS
                    and into \1985\DRAFTS.

                    Note:

                    1.   Requires DOS 2.0 or later.




















                                 Page -33-


          RENDIR (Rename Directory)               John Dickinson
          Command                                         No. 26

          ______________________________________________________

          Purpose:  Permits renaming subdirectories directly,
                    without creating a new directory, moving the
                    contents of the old one into it, and then
                    removing the old directory.

          Format:   RENDIR [d:][path]oldname[.ext] newname[.ext]

          Remarks:  PC-DOS has always provided a REName command
                    for filenames, but not for directories.  A
                    bug in DOS 3.0 permits you to use the
                    immediate mode of BASIC to

                         NAME olddir AS newdir

                    but this bug has been removed from subsequent
                    DOS versions.  RENDIR.COM permits renaming
                    directories in DOS 3.0 and later.

                    While RENDIR allows you to change the name of
                    a directory on another drive than your
                    current one, it does not permit you to
                    transfer a directory to another drive by
                    RENDIRing it.  Thus, for example, if you are
                    on drive C: and have a directory on drive D:
                    named \TAXES, from the C> prompt you can

                         RENDIR D:\TAXES \TAXES85

                    You cannot, however

                         RENDIR D:\TAXES C:\TAXES85

                    Furthermore, you should not use RENDIR to try
                    to change the name of the subdirectory you
                    are currently in.

                    Notes:

                    1.   Unlike RENAME, RENDIR does not support
                         use of the ? and * wildcard characters.

                    2.   Requires DOS 3.0 or higher.














                                 Page -34-


          SETUP                                     Jeff Prosise
          Command                                         No. 27

          ______________________________________________________

          Purpose:  Permits menu-oriented selection and immediate
                    transmission of printer control codes from
                    within a running application program.

          Format:   SETUP            (loads command into memory)
                    <Ctrl-Right Shift>          (activates menu)
                    <[Shift]<Fx>      (selects [deselects] mode)
                    <Esc>            (activates selection(s) and
                                 returns to application program)

                    Fx is a Function key (F1 through F10) that
                    sends the required control sequence to the
                    printer.  Shift-Fx toggles the selected
                    printer mode off.

          Remarks:  After loading SETUP (normally via your
                    AUTOEXEC.BAT file), the printer mode
                    selection menu program is displayed by
                    pressing the Ctrl-Right Shift key
                    combination.  This can be done from within
                    application programs that do not take over
                    the keyboard interrupts; the application is
                    simply suspended until you leave SETUP by
                    pressing the Esc key.  (Application programs
                    such as XyWrite III that do take over the
                    keyboard interrupts can be used with
                    SETUP.COM if they themselves provide the
                    option of temporarily returning to DOS
                    control.)

                    Printer permitting, more than one mode can be
                    selected at once by pressing additional
                    function keys.  The default printer choices
                    are for the Epson RX/FX series.  Option 1
                    shows how to modify the program for other
                    printers.

                    Notes:

                    1.   SETUP.COM is a memory-resident program
                         (approximately 3K in length), and so is
                         subject to conflicts with other memory-
                         resident software.  Several users have
                         reported that it is incompatible with
                         Prokey, for example.  Similarly, while
                         SETUP.COM is compatible with SideKick,
                         the combination of SuperKey and SideKick
                         has been reported to be incompatible.

          Option 1: If you have access to an IBM or Microsoft
                    macro assembler, the easiest way to modify
                    SETUP for other printers (or to use LPT2: or
                    LPT3: instead of LPT1:) is to call up the
                    SETUP.ASM file (included with these
                    utilities) in any ASCII word processor.  You
                    can then make your modifications and
                    reassemble the file.
                                 Page -35-


                    Even if you do not have a macro assembler and
                    must therefore use DEBUG.COM to modify
                    SETUP.COM directly, print out and read the
                    SETUP.ASM file.  It is heavily commented, and
                    will give you a good idea of how the
                    different menu strings and printer control
                    strings are organized.  Note, however, that
                    the specific values shown in SETUP.ASM are in
                    decimal notation; values entered via DEBUG
                    must be in hexadecimal notation.

                    The following offset addresses, not those
                    originally published in PC Magazine, should
                    be used:

                    The menu color attributes (4F and 70) are at
                    offsets xxxx:013F and xxxx:0140.

                    To change the port number from LPT1: to LPT2:
                    (or LPT3:) change the default 00 at xxxx:0C7A
                    and at xxxx:0C84 to 01 (or 02).

                    The start of the menu text table (532 bytes,
                    beginning with C9) is at offset xxxx:0151.
                    The "P" in PRINTER SETUP MENU" is at
                    xxxx:0172.

                    The printer control strings themselves begin
                    at xxxx:09A1.  Each function key (and each
                    shifted function key, with the exception of
                    F19 and F20) can be assigned a string up to
                    16 bytes long.  Each string must include a
                    delimiter of FF (255 decimal) that marks the
                    end of the string.  The beginning of the
                    string for each successive function key
                    starts at an address that is a multiple of 16
                    bytes above the base address (xxxx:09A1) of
                    the table.  You must pad the strings with
                    zeros for any locations that are not used by
                    actual control codes, so that each string
                    begins on a 16-byte boundary.




















                                 Page -36-


          SIZE (and ATSIZE)                          Art Merrill
          Command(s)                                      No. 28

          ______________________________________________________

          Purpose:  Calculates the storage requirements of a file
                    or group of files, based on the number of DOS
                    clusters necessary to make floppy disk and
                    hard disk copies.

          Format:   SIZE [d:]     (all files, default directory)
                       or
                    SIZE [d:][path]filename[.ext]

          Remarks:  DOS stores files in fixed-length allocation
                    units called "clusters."  For floppy disks,
                    the cluster size is 1024 bytes (two 512-byte
                    sectors); for the PC and XT 10-Mb hard disk
                    the cluster size is 4084 bytes.  On such a
                    hard disk, whether a file is one byte or 4Kb
                    in actual length (as reported by DIR), it
                    requires the same amount (one cluster) of
                    storage space.  The PC AT's 20-Mb hard disk
                    is less wasteful in handling small files;
                    its minimum set-aside (cluster size) is 2048
                    bytes.  AT users should use ATSIZE.COM.

                    Entered without parameters, SIZE (or ATSIZE)
                    returns the number of bytes used by all files
                    in the current directory, the amount of space
                    required to copy them to a standard (360K)
                    floppy disk, and the amount of space required
                    for hard disk storage.

                    Entering B:SIZE returns the same information
                    for a disk in drive B:.  Pathnames and
                    wildcards are supported, so you could enter

                         SIZE \PROG\*.COM

                    to learn the number of .COM files, their
                    total size and storage requirements,
                    contained in your \PROG subdirectory.

                    Notes:

                    1.   Requires DOS 2.0 or later.














                                 Page -37-


          SNAPSHOT                                Steven Holzner
          Command (after running .BAS version)            No. 29

          ______________________________________________________

          Purpose:  Saves your current screen and up to three
                    additional prefabricated screens for
                    immediate display without leaving an
                    application program.

          Format:   SNAPSHOT     (loads memory-resident program)
                    <Ctrl-N>             (stores current screen)
                    <Ctrl-F>            (displays stored screen)
                    <Ctrl-A>             (displays screen A.DAT)
                    <Ctrl-B>             (displays screen B.DAT)
                    <Ctrl-C>             (displays screen C.DAT)

          Remarks:  SNAPSHOT is a memory-resident utility that is
                    incompatible with programs (such as XyWrite)
                    that take control of the keyboard interrupts.
                    While written in assembly languge, it is
                    presented here with a BASIC interface that
                    need be run only once, but which facilitates
                    entering the trigger keys you will use to
                    store the current screen, recall it, and to
                    recall up to three screens you can prepare
                    with an ASCII word processor and store under
                    the filenames A.DAT, B.DAT, and C.DAT.

                    When you load and run SNAPSHOT.BAS under
                    BASIC you will be prompted for the required
                    key selections.  Thereafter the program will
                    create SNAPSHOT.COM (it takes about two
                    minutes), which is a regular DOS command.


          Option 1: If your regular word processor is WordStar,
                    before running SNAPSHOT.BAS you should edit
                    it as follows:

                    1. In line 30, change the checksum shown from
                    51461 to 51462.

                    2. In line 430, change the third number (just
                    to the left of the -2) from 0 to 1.

                    The purpose of these changes is to provide a
                    "stripper" function so that WordStar files
                    will be readable from other applications.












                                 Page -38-


          STATLINE                                    John Socha
          Command                                         No. 30

          ______________________________________________________

          Purpose:  Displays 26th-line status indicators for the
                    NumLock, CapsLock, and ScrollLock toggle keys
                    on IBM monochrome, CGA, and Compaq monitors.

          Format:   STATLINE     (loads memory-resident program)

          Remarks:  STATLINE converts the normal 25-line text
                    mode display into 26 lines, using the
                    additional line to show a # sign for NumLock,
                    an up arrow for CapsLock, and a double-
                    pointed arrow for ScrollLock.

                    On a monochrome display, where insufficient
                    memory is available for a full 26th line,
                    two-thirds of that line is used by STATLINE;
                    the remainder echoes the first portion of the
                    top line of the regular display.

                    This utility is not compatible with the IBM
                    enhanced graphics adapter (EGA) and is best
                    suited for use with the color graphics
                    adapter (CGA) and with Compaq displays.

                    Notes:

                    1.   STATLINE is a memory-resident utility
                         and is known to be incompatible with a
                         number of keyboard macro programs.
                         Assembly language programmers will be
                         particularly interested in the extensive
                         discussion of the problems of co-
                         residency contained in the original
                         article (PC Magazine, Volume 5 Number
                         13), and in the .ASM listing that shows
                         how to reprogram the 6845 video
                         controller.




















                                 Page -39-


          SWEEP                                  Charles Petzold
          Command                                         No. 31

          ______________________________________________________

          Purpose:  Causes a command to be successively executed
                    in every subdirectory on a hard disk.

          Format:   SWEEP Command [parameter(s)]

          Remarks:  SWEEP starts from the current directory.  In
                    order to use SWEEP to extend the range of a
                    command to all the subdirectories on a disk,
                    use CD (if necessary) to make the root
                    directory your current directory.  From the
                    root directory, the command

                         SWEEP DIR

                    will display the listings, by subdirectory,
                    of every non-hidden file on the disk.  To
                    erase all the .BAK files on a disk you need
                    only get into the root directory and issue
                    the command

                         SWEEP DEL *.BAK

                    SWEEP itself will not accept parameters other
                    than its command.  Thus, if you are on drive
                    C: and wish a directory of all files on drive
                    D: to be sent to your printer, you must first
                    make drive D: the current drive before you
                    issue the command

                         SWEEP DIR > LPT1

                    (In this case you would either need a copy of
                    SWEEP.COM on drive D: or else drive D: would
                    have to be listed on your PATH.)

                    SWEEP can execute .BAT file commands (and
                    even non-DOS commands, such as LOCATE.COM).
                    A useful file called CLEAN.BAT might consist
                    of the three lines

                    DEL *.BAK
                    DEL *.TMP
                    DEL *.OBJ

                    From the root directory, if you then enter

                         SWEEP CLEAN

                    all .BAK, .TMP, and .OBJ files will be erased
                    from the disk.

                    Notes:

                    1.   Requires DOS 2.0 or later.


                                 Page -40-


          UNDEL (Undelete)                        Steven Holzner
          Command                                          No.32

          ______________________________________________________

          Purpose:  Recovers files on double-sided floppy disks
                    that have been accidentally deleted.

          Format:   UNDEL [d:]filename[.ext]

          Remarks:  Unless special measures are taken, DOS does
                    not overwrite the contents of a file when it
                    deletes the file.  Rather, DOS simply changes
                    the first letter of the filename to E5 in its
                    directory table and unassigns the second (and
                    subsequent) clusters for the file from its
                    file allocation table.  When no files have
                    been subsequently stored to disk that would
                    use the deallocated clusters, the deleted
                    file can usually be recovered intact by
                    UNDEL.COM.

                    As an aid to recovery of ASCII files, the
                    UNDEL command may be given as

                    UNDEL/A [d:]filename[.ext]

                    The /A parameter is designed to provide a
                    display of each proposed cluster to be
                    recovered before it is actually included in
                    the undeleted file.  With late versions of
                    PC-DOS, however, the use of the /A parameter
                    has been found to return the error message,
                    "File Not Found Deleted".  In such cases,
                    entering UNDEL without the added parameter is
                    normally sufficient to recover the complete
                    file without loss.

                    Notes:

                    1.   UNDEL should not be used on 8-sector
                         disks (such as the distribution copy
                         of this disk), but only on 9-sector,
                         double-sided floppies.

                    2.   Requires the use of DOS 2.0 or later,
                         but the command does not recognize
                         pathnames.













                                 Page -41-


          VTREE (Visual Tree)                    Charles Petzold
          Command                                         No. 33

          ______________________________________________________

          Purpose:  Provides a visual representation of the tree-
                    structured subdirectories on a hard or floppy
                    disk.

          Format:   VTREE [d:]

          Remarks:  VTREE can display up to the full DOS limit of
                    32 levels of nested subdirectories.  Its
                    output may be redirected to a printer, but it
                    employs IBM "text-graphics" characters that
                    many printers cannot properly handle.  With
                    such printers, run PRSWAP.COM (included in
                    these utilities) before VTREE.

                    Notes:

                    1.   Requires DOS 2.0 or later.







































                                 Page -42-


          WAITASEC (and SCROLL)                  Charles Petzold
          Command(s)                                      No. 34

          ______________________________________________________

          Purpose:  Uses the single-keystroke ScrollLock key to
                    halt a fast-scrolling display; then allows
                    you to scroll backwards, recalling previous
                    screens.

          Format:   WAITASEC     (loads memory-resident program)
                    <ScrollLock>             (activates command)

          Remarks:  WAITASEC is a memory-resident program that is
                    normally loaded through your AUTOEXEC.BAT
                    file.  Thereafter, alternately pressing and
                    releasing the ScrollLock key will halt and
                    restart a scrolling display, e.g., a lengthy
                    DIR listing.

                    While holding down the ScrollLock key to
                    freeze the display, if you also press one of
                    the cursor movement keys (Home, Up Arrow,
                    PgUp, End, Down Arrow, or PgDn), the display
                    will not resume scrolling when you release
                    the ScrollLock key.  Thereafter, the Up and
                    Down arrow keys move the display by one line,
                    the PgUp and PgDown move it by 25 lines, and
                    the Home and End keys take you to the
                    beginning and end of the stored screen
                    memory.  Pressing any non cursor key at this
                    point deactivates the stored mode, and the
                    original scrolling resumes.

                    Notes:

                    1.   WAITASEC will not work with an 80-column
                         color/graphics display if an unmodified
                         PC-DOS ANSI.SYS has been loaded.  (The
                         ANSI.SYS that comes with various
                         versions of MS-DOS does not cause
                         problems with WAITASEC.)  To run with
                         IBM's ANSI.SYS, make a copy
                         (MODANSI.SYS) of the original ANSI.SYS
                         and use DEBUG to patch the copy as
                         follows:

                         DEBUG MODANSI.SYS
                         E 29D 90 90
                         E 2A1 90 90
                         W
                         Q

                         Put the modified MODANSI.SYS in your
                         CONFIG.SYS file in place of ANSI.SYS.






                                 Page -43-


                    2.   Because of the way they handle TTY
                         output, certain EGA cards will not
                         permit WAITASEC to scroll backwards.
                         This problem can often be cured by
                         adding MODANSI.SYS, as above.

                    3.   WAITASEC does not save your current
                         display screen.  To save your current
                         display, before beginning a scroll,
                         enter the complementary SCROLL command,
                         and everything on the screen will scroll
                         off the top and be captured in the
                         WAITASEC buffer.

                    4.   While WAITASEC has been found compatible
                         with XyWrite III (XYKBD.COM loaded) on a
                         PC AT, as with other memory-resident
                         programs, unforeseen hardware and
                         software incompatibilities may be
                         encountered.









































                                 Page -44-


          WHERE (File Locator)                     Kiyoshi Akima
          Command                                         No. 35

          ______________________________________________________

          Purpose:  Searches all directories on a particular
                    drive and lists the paths of entries that
                    match the specified filename.

          Format:   [d:][path]WHERE [filename[.ext]]

          Remarks:  WHERE uses normal DOS filename specifications
                    to locate files.  Omitting a filename and
                    extension after the command defaults to WHERE
                    *.* and will list all non-hidden files on
                    your disk.

          Example:  The command WHERE *.BAT will find all
                    your batch files.  WHERE MO*.* would uncover
                    MODE.COM and MORE.COM and any other filename
                    that begin with MO.

                    Notes:

                    1.   Although submitted to us by Mr. Akima,
                         this program has its roots in one
                         originally written by John Socha.


































                                 Page -45-


          XDEL                                    Ronald Czapala
          Command                                         No. 36

          ______________________________________________________

          Purpose:  Successively presents each filename in your
                    current directory for single-keystroke file
                    deletion or retention.

          Format:   XDEL [d:][file.ext]

          Remarks:  If no parameters are specified with XDEL, the
                    default filename *.* is used.  Both the
                    global characters ? and * may be used in
                    selecting the files to be presented.

                    The program produces an on-screen menu of
                    keystroke choices, as follows:

                    <F1> - deletes current file displayed
                    <PgDn> - skips current file displayed
                    <Home> - restarts file display
                    <Esc> - returns to DOS

                    Note:

                    1.   Although XDEL.COM requires DOS 2.0 or
                         later, you must use CHDIR (CD) if
                         necessary to make a subdirectory your
                         current directory.
                             






























                                 Page -46-


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS