D:\turbodos_bitsaver_temp\turboDos1.4_Users_Guide_Jun84.pdf 6.074 KB PDF Document 24.06.2018 23:25:30 24.06.2018 23:28:07 24.06.2018 23:28:07 13 300 Log On 302 On most multi-user systems, you must "log on" by entering a valid user identification, passworo, and possibly other information: 303 TurboDOS 1.4x, Copyright 1984 etc. System log on Enter user id: BARBARA Enter password: SHAZAM Enter activity: PAYROLL 5A} In the example above (and throughout the remainder of this document), underlines are used to indicate the items you need to key in. The rest is displayed by TurboDOS. After you have typed each response, you have to press the RETURN (or ENTER) key on your keyboard before TurboDOS will process the item. The 'iJay TurboDOS validates user id's and passwords is described later on (see the details of the LOGON command). The date and time are not requested if the system clock was previously set. The activity description is requested only if a system log file has been set up. As soon as you get through the log-on procedure successfully, TurboDOS displays its "command prompt" to let you know it's ready to accept your first command. Remember that the "5A}" prompt tells you that user number 5 and drive A are currently selected. Next, we'll learn how to enter commands. 305 1-7 308 **Page 17 ** 2402 Syntax LOGON Explanation 2404 ---.-.---- 2406 The LOGON command provides password-type security for the purpose of protecting private file libraries and preventing unauthorized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: userid,{password},uu{P},{d:},{cmdline} ------------------------------where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A-P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON co 2407 **Page 119 ** 2409 mmand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the following effects: • • • • • access to global files is enabled "nn" sets current user number "p" sets privileged user (if present) "d:" sets current drive (if present) "cmdline" is executed (if present) 2406 The LOGON command provides password-type security for the purpose of protecting private file libraries and preventing unauthorized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: userid,{password},uu{P},{d:},{cmdline} ------------------------------where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A-P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON co 2407 **Page 119 ** 2409 mmand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the following effects: • • • • • access to global files is enabled "nn" sets current user number "p" sets privileged user (if present) "d:" sets current drive (if present) "cmdline" is executed (if present) 2411 5-46 2414 **Page 120 ** 2421 Explanation (Con tinued) 2423 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automatically records your log-on in that file. In this case, LOGON prompts you for an activity descr iption, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and immediately after each LOGOFF. 2425 Example 31A}LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Payroll 5C} 2427 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2429 Patch Points 2423 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automatically records your log-on in that file. In this case, LOGON prompts you for an activity descr iption, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and immediately after each LOGOFF. 2425 Example 31A}LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Payroll 5C} 2427 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2429 Patch Points 2431 Z8Q I 3496 TurboOOS 1.4 User's Guide 3498 GLOSSARY (Continued) 3500 Copyright 1984 by Software 2000, Inc. All rights reserved. hashed directory: A directory format that uses a sophisticated technique to make directory look-up much faster than possible with a linear directory. Hashed directories are especially suited for use on hard disks with big directories. hexadecimal: Numeric notation using base 16, which is often a convenient way to represent non-textual information. The sixteen hexadecimal digits are represented by the characters 0-9 and A-F. incremental backup: An efficient backup procedure whereby backup copies are made only of files which have been created or modified since the last backup cycle. ( See "archived a ttr ibute".) kilobyte: Unit of information consisting of 1,024 bytes and abbreviated by the letter "K". Each page of this document contains about 3K of information. (See "byte".) linear directory: A simple directory format compatible with CP/M and suitable for use on floppy disks. (See "hashed directory".) local command: A command which requires direct access to disk drive and controller hardware, and consequently may be executed only in the proc~ssor to which the disk is attached. log-off: Procedure for terminating a console session on a multiuser system. After log-off, a log-on is required before your console can be used again. (See "log-on".) log-on: Procedure for starting a console session on a multi-user system. You must identify yourself by entering your user-id and possibly a security password before TurboDOS will allow you to make use of the computer. loosely-coupled network: Multi-processor system in which the various processors are physically separated (often built into user consoles), and connected with some sort of communications path. manual queuing: Submitting files for background printing by using the QUEUE command. 3502 A-6 3505 **Page 168 ** 3525 TurboOOS 1.4 User's Guide 3527 GLOSSARY (Continued) 3529 Copyright 1984 by Software 2000, Inc. All rights reserved. password: A security code used to validate a user-id during the log-on procedure. (See "log-on", "user-id".> peripheral device: A hardware device attached to a microcomputer for purposes of input or output of information. Typical peripheral devices include disk drives, consoles and printers. print job: A unit of printed output, generally the output produced by one application program. print queue: ground. A list of print jobs to be printed in the back- 3531 printer: Hardware device that produces printed hardcopy of textual information. privileged log-on: A user who has logged-on successfully to a privileged user-id, enabling him to access various protected commands and features of TurboDOS. program: Instructions for performing a processing task, coded so that they can be interpreted by the computer hardware. prompt: Symbol displayed on the console by a program to advise you what to do next. queue: See "print queue". 3533 random-access memory (RAM): The primary high-speed mem~ry of a microcomputer, used to hold programs in execution and data being processed. read-after-write: When writing data to disk, immediately reading it back to make sure it was recorded properly. read-only attribute: File attribute which designates that a file may be read but not modified or deleted. This helps you protect important files against accidental distruction. A drive may also be set read-only. record: Grouping of related data within a file. often refers to a block of data 128-bytes long. In TurboDOS, 3613 INDEX 3614 (Continued) 3616 Copyright 1984 by Software 2000, Inc. All rights reserved. hard disk, 1-3, 2-11 hard-sectored, 2-13 hardware, 1-5 hashed directory, 2-18, 5-31, 5-33 hexadecimal file dump, 5-30 incremental backup, 2-24 kilobyte, 1-5, 2-3 LABEL command, 2-15, 2-16, 5-44 linear directory, 2-18, 5-33, 5-33 local command, 4-8 lock file, 2-26 record, 2-26 log-on, 1-6, 1-7 LOGOFF command, 5-45 LOGON command, 4-7, 5-46 loosely-coupled network, 1-5 manual queuing, 3-4, 3-8, 5-53 manual spooling, 3-4, 3-7 map (allocation), 2-16, 2-17 MASTER command, 4-9, 5-48 master processor, 5-48 megabyte, 1-5 memory banks, 4-11 memory management, 4-9 memory size, 1-5 MP/M, 1-2 multi-processor, 1-5 nested do-files, 4-6, 5-27 networking, 1-2, 1-5, 4-8 non-banked memory, 4-10 not ready error, 2·20 offline (printing to), 3-7 operating system, 1-1 parameters in do-files, 4-5 password, 1-7, 5-46 performance, 1-3 permissive sharing, 2-26 PRINT command, 3-6, 5-50 print job, 3-3, 3-10 queue, 1-4, 4-4 routing, 3-6, 5-50 spooling, 1-4 PRINTER command, 3-9, 5-52 printing methods, 3-1 direct, 3-1, 3-6 spooled, 3-2 to console, 3-7 to offline, 3-7 privileged log-on, 2-22, 5-46 processing batch, 4-3 command, 4-1 prompt, 1-6 PRTWIN command, 5-54 PUTLDR command, 5-56 queue assignment, 3-9, 5-52 print, 1-4, 3-3 QUEUE command, 3-8, 5-53 queuing manually, 3-4, 3-8, 5-53 random-access memory, 4-9 read error, 2-19 read-after-write, 1-3 read-only attribute, 2-23, read-only drive, 2-24, 5-65 RECEIVE command, 5-59 record locks, 2-26 recovery options, 1-4, 2-19 reliability, 1-3 remote console, 4-9, 5-48 RENAME command, 2-8, 5-60 3618 B-3 3621 **Page 175 ** D:\turbodos_bitsaver_temp\turboDos1.4_mast16bInst_85_OCR.pdf 2.052 KB PDF Document 25.06.2018 05:11:00 25.06.2018 05:11:00 25.06.2018 05:11:00 5 157 0/S Name Renamed to SLV1270.SYS 0SSLAVEC.SYS 0SSLAVEC.SYS SLV1270.SYS SLV1270.SYS 0SSLAVEC.SYS PRT1270.SYS 0SSLAVED.SYS PRT1270.SYS 0SSLAVED.SYS PRT1270.SYS 0SSLACED.SYS 159 Circuit 1 Slave Suffix Table = CCCDDD (in STDMASTR only) Circuit 1 Slave Type List The slave type list for the 1 270 Z-80B boards defaults to "02,02,02,02,02,02,02,02,02,02,02,02,02,02,02,02" for all 1270 slaves. 12^0 16-bit slaves are identified by a type code of "3" in this table. The circuit 1 slave type list serves the same function as the circuit 0 slave type list does for the older slaves, except with values of 2 and 3 instead of 0 and 1 . Compatibility Flag The details about the compatibility flag are found in the __m __& M 6 __l£j2£JiaiDJB.§Hl3__fluids". L/F normally sets this value to B0. 161 Console Switching Value In 810 and 1610 multi-user system, the first slave MPU is connected through the master CPU to the internal terminal. Software is used to switch the terminal through the Master to the first slave board. Note: This value should only be changed if your system is a multi-user series 810 or 1610. If so, the value is 04. In all other cases, this point should be set to 00. Auto-Search Drive All TurboDOS commands are programs with a .COM or .CMD file extension. When a user types in a command, the operating system looks on the drive it is presently using for the .COM or .CMD file. If it doesn't find it on that drive, it will look on the disk drive identified as the auto-search drive. Normally, therefore, the disk drive that the system booted from is used. Setting this point to a value of 255 will set the AutoSearch drive to default to the system boot drive. Automatic Log-On User Number This point indicates which user area the system will go to after booting up. If the sign-bit is set, it will go to a privileged user area. For single users on the master operating system, this point is set to 80, which means that the system comes up in privileged user 0. In slave operating systems, this point is set to FF, which brings the system to privileged user area 31. This user area contains the programs to run the log-on and password routines. 163 9 166 **Page 14 ** 384 **Page 33 ** 386 SECTION 5 388 THE USERID.STS FILE The file USERID.SYS is used by TurboDOS to allow users to log off and log on the system. The file is placed in user area 31 for 8bit slaves and user area 30 for 16-bit slaves. This file contains the user name, password, and user area and drive for the user to be logged on to. A flag can also be set which allows the user to be logged on as a privileged user. A privileged user is allowed to move between user areas and to attach to the master. The following is the syntax for entries in the USERID.SYS file: namel,name2,user area privileged flag>,drive, Where: namel = User Name name2 = User Password P = privileged user 390 Example: SYSTEM,SYSTEM,OP,A, ÜSER1,USER1,3,A, ACCOUNT,PASSWORD,0,C, SAM, ,i l ,D SYSTEM logs on to 0A, privileged Userl logs on to 3A Account logs on to 0C User Sam has no password 392 Any type of text editor or word processor can be used to edit this file. When editing this file use a non-document mode. This will keep any special control characters from being hidden into the file that could cause problems. It is important that this file be placed i n the proper user areas or the system will not let you log on. 386 SECTION 5 388 THE USERID.STS FILE The file USERID.SYS is used by TurboDOS to allow users to log off and log on the system. The file is placed in user area 31 for 8bit slaves and user area 30 for 16-bit slaves. This file contains the user name, password, and user area and drive for the user to be logged on to. A flag can also be set which allows the user to be logged on as a privileged user. A privileged user is allowed to move between user areas and to attach to the master. The following is the syntax for entries in the USERID.SYS file: namel,name2,user area privileged flag>,drive, Where: namel = User Name name2 = User Password P = privileged user 390 Example: SYSTEM,SYSTEM,OP,A, ÜSER1,USER1,3,A, ACCOUNT,PASSWORD,0,C, SAM, ,i l ,D SYSTEM logs on to 0A, privileged Userl logs on to 3A Account logs on to 0C User Sam has no password 392 Any type of text editor or word processor can be used to edit this file. When editing this file use a non-document mode. This will keep any special control characters from being hidden into the file that could cause problems. It is important that this file be placed i n the proper user areas or the system will not let you log on. 394 29 D:\turbodos_bitsaver_temp\turbodos_logon_finder.pdf 93 KB PDF Document 25.06.2018 09:44:20 25.06.2018 09:33:00 25.06.2018 09:33:00 35 7 17 18 19 9 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 11 D:\turbodos\turboDos1.4_Users_Guide_Jun84.pdf 6.074 KB PDF Document 24.06.2018 23:25:30 24.06.2018 23:28:07 24.06.2018 23:28:07 24 156 Copyright 1984 by Software 2000, Inc. All rights reserved. 158 COMMANDS (Continued) 160 LABEL Command • LOGOFF Command LOGON Command • MASTER Command PRINT Command • PRINTER Command PRTWIN Command PUTLDR Command QUEUE Command • RECEIVE Command RENAME Command RESET Command . SEND Command . SET Command • SHOW Command • TST490 Command TSTF930 Command TSTW Command . TYPE Command • VERIFY Command WALT Command XON Command • • Glossary Index . • 162 • • • • • • . • • • . • 164 • • . • • 300 Log On 302 On most multi-user systems, you must "log on" by entering a valid user identification, passworo, and possibly other information: 303 TurboDOS 1.4x, Copyright 1984 etc. System log on Enter user id: BARBARA Enter password: SHAZAM Enter activity: PAYROLL 5A} In the example above (and throughout the remainder of this document), underlines are used to indicate the items you need to key in. The rest is displayed by TurboDOS. After you have typed each response, you have to press the RETURN (or ENTER) key on your keyboard before TurboDOS will process the item. The 'iJay TurboDOS validates user id's and passwords is described later on (see the details of the LOGON command). The date and time are not requested if the system clock was previously set. The activity description is requested only if a system log file has been set up. As soon as you get through the log-on procedure successfully, TurboDOS displays its "command prompt" to let you know it's ready to accept your first command. Remember that the "5A}" prompt tells you that user number 5 and drive A are currently selected. Next, we'll learn how to enter commands. 305 1-7 308 **Page 17 ** 1194 Copyright 1984 by Software 2000, Inc. All rights reserved. 1196 Automatic Loading 1198 TurboDOS provides a simple means for automatically loading any program or executing any sequence of commands at initial start-up (cold start), or whenever a program terminates (warm start). You could use this feature to cause automatic execution of an application function menu program or the LOGON command, for example. Autoload at cold-start takes place only if a file named COLDSTRT.AUT is present on the start-up disk. Autoload at warm-start takes place only if a file named WARMSTRT.AUT is present on the current disk. 1200 Program Autoload 1202 To cause a program or command to be loaded automatically, simply make a copy of the .COM or .CMD file under the name COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For instance, for automatic LOGON operation, copy LOGON.COM (or .CMD) to \vARMSTRT.AUT under user 31. To cause a command or string of commands to be executed automatically, use the AUTOLOAD command to capture the desired command string in a file called AUTOLOAD.AUT. Then rename this file to COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For example, to automatically set the system date and then execute a BASIC program called MENU at each cold-start: OA}AUTOLOAD DATE SETIBASIC MENU Autoload file created. OA}RENAME AUTOLOAD. AUT COLDSTRT.AUT OA:AUTOLOAD.AUT renamed OA:COLDSTRT.AUT OA} Note that a newly-created .AUT file does not take effect until the next cold-start. 1198 TurboDOS provides a simple means for automatically loading any program or executing any sequence of commands at initial start-up (cold start), or whenever a program terminates (warm start). You could use this feature to cause automatic execution of an application function menu program or the LOGON command, for example. Autoload at cold-start takes place only if a file named COLDSTRT.AUT is present on the start-up disk. Autoload at warm-start takes place only if a file named WARMSTRT.AUT is present on the current disk. 1200 Program Autoload 1202 To cause a program or command to be loaded automatically, simply make a copy of the .COM or .CMD file under the name COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For instance, for automatic LOGON operation, copy LOGON.COM (or .CMD) to \vARMSTRT.AUT under user 31. To cause a command or string of commands to be executed automatically, use the AUTOLOAD command to capture the desired command string in a file called AUTOLOAD.AUT. Then rename this file to COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For example, to automatically set the system date and then execute a BASIC program called MENU at each cold-start: OA}AUTOLOAD DATE SETIBASIC MENU Autoload file created. OA}RENAME AUTOLOAD. AUT COLDSTRT.AUT OA:AUTOLOAD.AUT renamed OA:COLDSTRT.AUT OA} Note that a newly-created .AUT file does not take effect until the next cold-start. 1204 Command Autoload 1206 4-7 2377 In a multi-user system, the LOGOFF command lets you terminate your session. LOGOFF 2379 Explanation 2381 Executing the LOGOFF command has the following effects: · current user number is set to 31 · current drive is set to system disk · access to global files is inhibited The library for user number 31 normally contains only the LOGON command file and the USERID.SYS validation file (see LOGON command). Consequently, no further activity can be performed until a successful LOGON has taken place. If the file SYSLOG.SYS is also present in the user 31 library, then LOGOFF automatically records the log-off in that file. 2383 Examples 5C}LOGOFF 3lA} 2385 Error Messages Unable to log off 2389 TurboDOS 1.4 2391 COMMANDS 2392 LOGON Command 2394 Userls Guide 2396 Copyright 1984 by Software 2000, Inc. All rights reserved. 2394 Userls Guide 2396 Copyright 1984 by Software 2000, Inc. All rights reserved. 2397 LOGON Command 2399 In a multi-user system, the LOGON command lets you start a new console session. 2400 - - 2396 Copyright 1984 by Software 2000, Inc. All rights reserved. 2397 LOGON Command 2399 In a multi-user system, the LOGON command lets you start a new console session. 2400 - - 2402 Syntax LOGON Explanation 2399 In a multi-user system, the LOGON command lets you start a new console session. 2400 - - 2402 Syntax LOGON Explanation 2404 ---.-.---2406 The LOGON command provides password-type security for the purpose of protecting private file libraries and preventing unauthorized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: userid,{password},uu{P},{d:},{cmdline} ------------------------------where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A-P), and "cmdline" is any 14 **Page 2 ** 16 47 48 49 18 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 20 70 71 72 73 74 75 76 77 78 79 80 81 22 valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON co 2402 Syntax LOGON Explanation 2404 ---.-.---2406 The LOGON command provides password-type security for the purpose of protecting private file libraries and preventing unauthorized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: userid,{password},uu{P},{d:},{cmdline} ------------------------------where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A-P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON co 2407 **Page 119 ** 2409 mmand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the following effects: • • • • • access to global files is enabled "nn" sets current user number "p" sets privileged user (if present) "d:" sets current drive (if present) "cmdline" is executed (if present) 2414 **Page 120 ** 2416 TurboDOS 1.4 User's Guide 2418 COMMANDS LOGON Command (Continued) 2419 Copyright 1984 by Software 2000, Inc. All rights reserved. 2421 Explanation (Con tinued) 2419 Copyright 1984 by Software 2000, Inc. All rights reserved. 2421 Explanation (Con tinued) 2423 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automatically records your log-on in that file. In this case, LOGON prompts you for an activity descr iption, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and immediately after each LOGOFF. 2425 Example 31A}LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Payroll 5C} 2427 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2421 Explanation (Con tinued) 2423 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automatically records your log-on in that file. In this case, LOGON prompts you for an activity descr iption, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and immediately after each LOGOFF. 2425 Example 31A}LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Payroll 5C} 2427 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2429 Patch Points 3613 INDEX 3614 (Continued) 3616 Copyright 1984 by Software 2000, Inc. All rights reserved. hard disk, 1-3, 2-11 hard-sectored, 2-13 hardware, 1-5 hashed directory, 2-18, 5-31, 5-33 hexadecimal file dump, 5-30 incremental backup, 2-24 kilobyte, 1-5, 2-3 LABEL command, 2-15, 2-16, 5-44 linear directory, 2-18, 5-33, 5-33 local command, 4-8 lock file, 2-26 record, 2-26 log-on, 1-6, 1-7 LOGOFF command, 5-45 LOGON command, 4-7, 5-46 loosely-coupled network, 1-5 manual queuing, 3-4, 3-8, 5-53 manual spooling, 3-4, 3-7 map (allocation), 2-16, 2-17 MASTER command, 4-9, 5-48 master processor, 5-48 megabyte, 1-5 memory banks, 4-11 memory management, 4-9 memory size, 1-5 MP/M, 1-2 multi-processor, 1-5 nested do-files, 4-6, 5-27 networking, 1-2, 1-5, 4-8 non-banked memory, 4-10 not ready error, 2·20 offline (printing to), 3-7 operating system, 1-1 parameters in do-files, 4-5 password, 1-7, 5-46 performance, 1-3 permissive sharing, 2-26 PRINT command, 3-6, 5-50 print job, 3-3, 3-10 queue, 1-4, 4-4 routing, 3-6, 5-50 spooling, 1-4 PRINTER command, 3-9, 5-52 printing methods, 3-1 direct, 3-1, 3-6 spooled, 3-2 to console, 3-7 to offline, 3-7 privileged log-on, 2-22, 5-46 processing batch, 4-3 command, 4-1 prompt, 1-6 PRTWIN command, 5-54 PUTLDR command, 5-56 queue assignment, 3-9, 5-52 print, 1-4, 3-3 QUEUE command, 3-8, 5-53 queuing manually, 3-4, 3-8, 5-53 random-access memory, 4-9 read error, 2-19 read-after-write, 1-3 read-only attribute, 2-23, read-only drive, 2-24, 5-65 RECEIVE command, 5-59 record locks, 2-26 recovery options, 1-4, 2-19 reliability, 1-3 remote console, 4-9, 5-48 RENAME command, 2-8, 5-60 3618 B-3 3621 **Page 175 ** 3655 COpy 3657 *COPYF DATE DELETE DIR 3659 source dest ioptions A - archived only *FMTW B multi-disk files C change media LABEL E erase R replace files LOGOFF Snn - source user # LOGON X - non-existibg YIN - confirm MASTER source: dest: PRINT (SET) file ioption yIN - confirm file ioption yIN confirm L print filename (a 3660 **Page 176 ** 3662 rg-list) drive ioption L - print D:\turbodos\turboDos1.4_8086impl_Jun84_OCR.pdf 2.741 KB PDF Document 25.06.2018 09:18:47 25.06.2018 04:56:29 25.06.2018 04:56:29 3 406 Example 408 In the following example, TLINK is used to link a single-user TurboDOS system for an IBM Personal Computer, using the modules listed in OSMASTER.GEN and patches in OSMASTER.PAR, creating the executable file OSMASTER.SYS. 410 0A)TLINK OSMASTER. SYS,~M Copyright 1984, Software 2000, Inc. * ; Single-user without spooling for * IBM Personal Computer with 256K RAM standard single-user pkg. STDSINGL seldom-used CP/M functions CPMSUP IBM PC console driver CONIPC IBM PC serial list driver LSTACA IBM PC initialization NITIPC IBM PC floppy disk driver DSKIPC IBM PC 256K mem spec table MSTIPC IBM PC real-time clock drvr RTCIPC Pass 1 LCLUSR LCLTBL CMDINT AUTLOD SGLUSR etc. Pass 2 LCLUSR LCLTBL CMDINT AUTLOD SGLUSR etc. Processing parameter file: ; Patches for single-user w/o spooling OSMLEN - 1024 ;dynamic memory area (16K) 0x1000 ;but limit to first 64K OSMTOP 0x80 logon to user 0 privileg. AUTUSR number of disk buffers 8 NMBUFS OxlA end-of-print character EOPCHR search drive A 1 SRHDRV direct printing mode PRTMOD 0 Writing output file A:OSMASTER.SYS 0A> 412 2-5 415 **Page 24 ** 452 CONTBL 454 Attention character. May be patched to another character if the default value of CTRL-S is needed by application programs. A common choice is zero (NUL), which al- lows the console BREAK key to be used as an attention key. AUTUSR = OxFF AUTLOG 456 Automatic log-on user number. Default value of OxFF requires that user log-on via LOGON command. If automatic log-on desired at cold-start, patch AUTUSR to the desired user number (0-31), and set the sign-bit if a privileged log-on is desired. Generally patched to 0x80 in single-user systems to cause automatic privileged log-on to user zero. 458 2-7 461 **Page 26 ** 24 82 83 84 85 86 87 88 27 **Page 3 ** 66 190 191 192 193 68 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 70 Command .................... . 5 - 8 2 WALT C o m m a n d .......................... 5-84 XON Com m a n d ............................ 5-86 G l o s s a r y ............................ A-l I n d e x ................................ B-l 125 APPENDICES 128 **Page 10 ** 236 SOME BASICS Getting Started (Continued) Copyright 1984 by Software 2000, Inc. All rights reserved. 238 Log On 240 On most multi-user systems, you must "log on" by entering a valid user identification, password, and possibly other information: TurboDOS 1.4x, Copyright 1984 etc. System log on Enter user id: BARBARA Enter password: SHAZAM Enter activity: PAYROLL 5A> In the example above (and throughout the remainder of this document), underlines are used to indicate the items you need to key in. The rest is displayed by TurboDOS. After you have typed each response, you have to press the RETURN (or ENTER) key on your keyboard before TurboDOS will process the item. The way TurboDOS validates user id's and passwords is described later on (see the details of the LOGON command). The date and time are not requested if the system clock was previously set. The activity description is requested only if a system log file has been set up. . As soon as you get through the log-on proce- dure successfully, TurboDOS displays its "command prompt" to let you know it's ready to accept your first command. Remember that the "5A}" prompt tells you that user number 5 and drive A are currently selected. Next, we'll learn how to enter commands. 242 1-7 245 **Page 17 ** 1157 TurboDOS 1.4 User's Guide 1159 PROCESSING Automatic Loading 1161 Copyright 1984 by Software 2000, Inc. All rights reserved. Automatic Loading TurboDOS provides a simple means for automa- tically loading any program or executing any sequence of commands at initial start-up (cold start), or whenever a program termi- nates (warm start). You could use this fea- ture to cause automatic execution of an ap- plication function menu program or the LOGON command, for example. Autoload at cold-start takes place only if a file named COLDSTRT.AUT is present on the start-up disk. Autoload at warm-start takes place only if a file named WARMSTRT.AUT is present on the current disk. Program Autoload To cause a program or command to be loaded automatically, simply make a copy of the .COM or .CMD file under the name COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For instance, for automatic LOGON operation, copy LOGON.COM (or .CMD) to WARMSTRT.AUT under user 31. To cause a command or string of commands to be executed automatically, use the AUTOLOAD command to capture the desired command string in a file called AUTOLOAD.AUT. Then rename this file to COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For example, to automatically set the system date and th 71 **Page 5 ** 73 en execute a BASIC program called MENU at each cold-start: QA>AUTOLOAD DATE SET I BASIC MENU Autoload file created. OA)RENAME AUTOLOAP.AUT COLDSTRT,AD-T 0A:AUTOLOAD.AUT renamed OA:COLDSTRT.AUT 0A> Note that a newly-created .AUT file does not take effect until the next cold-start. 1163 Command Autoload 1165 4-7 2180 TurboDOS 1.4 User's Guide 2182 COMMANDS LOGOFF Command 2184 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGOFF Command Syntax I LOGOFF Explanation Executing the LOGOFF command has the follow- ing effects: . current user number is set to 31 . current drive is set to system disk . access to global files is inhibited The library for user number 31 normally con- tains only the LOGON command file and the USERID.SYS validation file (see LOGON com- mand). Consequently, no further activity can be performed until a successful LOGON has taken place. If the file SYSLOG.SYS is also present in the user 31 library, then LOGOFF automatically records the log-off in that file. Examples I I 5 0 LOGOFF 31 A) In a multi-user system, the LOGOFF command lets you terminate your session. 2186 Error Messages 2188 I I Unable to log off 2190 5-45 2192 TurboDOS 1.4 User’s Guide 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri- vate file libraries and preventing unauthor- ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2192 TurboDOS 1.4 User’s Guide 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri- vate file libraries and preventing unauthor- ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2199 **Page 119 ** 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2199 **Page 119 ** 2201 P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON com- mand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the fol- lowing effects: . . . . . access to global files is enabled "nn" sets current user number "P" sets privileged user (if present) "d :" sets current drive (if present) "cmdline" is executed (if present) 2203 5-46 2206 **Page 120 ** 2206 **Page 120 ** 2208 TurboDOS 1.4 User's Guide 2210 COMMANDS LOGON Command (Continued) 2211 Copyright 1984 by Software 2000, Inc. All rights reserved. 2213 Explanation (Continued) 2211 Copyright 1984 by Software 2000, Inc. All rights reserved. 2213 Explanation (Continued) 2215 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automa- tically records your log-on in that file. In this case, LOGON prompts you for an activity description, and records it in the log entry. It is common practice to 70 Command .................... . 5 - 8 2 WALT C o m m a n d .......................... 5-84 XON Com m a n d ............................ 5-86 G l o s s a r y ............................ A-l I n d e x ................................ B-l 125 APPENDICES 128 **Page 10 ** 236 SOME BASICS Getting Started (Continued) Copyright 1984 by Software 2000, Inc. All rights reserved. 238 Log On 240 On most multi-user systems, you must "log on" by entering a valid user identification, password, and possibly other information: TurboDOS 1.4x, Copyright 1984 etc. System log on Enter user id: BARBARA Enter password: SHAZAM Enter activity: PAYROLL 5A> In the example above (and throughout the remainder of this document), underlines are used to indicate the items you need to key in. The rest is displayed by TurboDOS. After you have typed each response, you have to press the RETURN (or ENTER) key on your keyboard before TurboDOS will process the item. The way TurboDOS validates user id's and passwords is described later on (see the details of the LOGON command). The date and time are not requested if the system clock was previously set. The activity description is requested only if a system log file has been set up. . As soon as you get through the log-on proce- dure successfully, TurboDOS displays its "command prompt" to let you know it's ready to accept your first command. Remember that the "5A}" prompt tells you that user number 5 and drive A are currently selected. Next, we'll learn how to enter commands. 242 1-7 245 **Page 17 ** 1157 TurboDOS 1.4 User's Guide 1159 PROCESSING Automatic Loading 1161 Copyright 1984 by Software 2000, Inc. All rights reserved. Automatic Loading TurboDOS provides a simple means for automa- tically loading any program or executing any sequence of commands at initial start-up (cold start), or whenever a program termi- nates (warm start). You could use this fea- ture to cause automatic execution of an ap- plication function menu program or the LOGON command, for example. Autoload at cold-start takes place only if a file named COLDSTRT.AUT is present on the start-up disk. Autoload at warm-start takes place only if a file named WARMSTRT.AUT is present on the current disk. Program Autoload To cause a program or command to be loaded automatically, simply make a copy of the .COM or .CMD file under the name COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For instance, for automatic LOGON operation, copy LOGON.COM (or .CMD) to WARMSTRT.AUT under user 31. To cause a command or string of commands to be executed automatically, use the AUTOLOAD command to capture the desired command string in a file called AUTOLOAD.AUT. Then rename this file to COLDSTRT.AUT or WARMSTRT.AUT as appropriate. For example, to automatically set the system date and th 71 **Page 5 ** 73 en execute a BASIC program called MENU at each cold-start: QA>AUTOLOAD DATE SET I BASIC MENU Autoload file created. OA)RENAME AUTOLOAP.AUT COLDSTRT,AD-T 0A:AUTOLOAD.AUT renamed OA:COLDSTRT.AUT 0A> Note that a newly-created .AUT file does not take effect until the next cold-start. 1163 Command Autoload 1165 4-7 2180 TurboDOS 1.4 User's Guide 2182 COMMANDS LOGOFF Command 2184 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGOFF Command Syntax I LOGOFF Explanation Executing the LOGOFF command has the follow- ing effects: . current user number is set to 31 . current drive is set to system disk . access to global files is inhibited The library for user number 31 normally con- tains only the LOGON command file and the USERID.SYS validation file (see LOGON com- mand). Consequently, no further activity can be performed until a successful LOGON has taken place. If the file SYSLOG.SYS is also present in the user 31 library, then LOGOFF automatically records the log-off in that file. Examples I I 5 0 LOGOFF 31 A) In a multi-user system, the LOGOFF command lets you terminate your session. 2186 Error Messages 2188 I I Unable to log off 2190 5-45 2192 TurboDOS 1.4 User’s Guide 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri- vate file libraries and preventing unauthor- ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2192 TurboDOS 1.4 User’s Guide 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri- vate file libraries and preventing unauthor- ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2199 **Page 119 ** 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A2199 **Page 119 ** 2201 P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON com- mand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the fol- lowing effects: . . . . . access to global files is enabled "nn" sets current user number "P" sets privileged user (if present) "d :" sets current drive (if present) "cmdline" is executed (if present) 2203 5-46 2206 **Page 120 ** 2206 **Page 120 ** 2208 TurboDOS 1.4 User's Guide 2210 COMMANDS LOGON Command (Continued) 2211 Copyright 1984 by Software 2000, Inc. All rights reserved. 2213 Explanation (Continued) 2211 Copyright 1984 by Software 2000, Inc. All rights reserved. 2213 Explanation (Continued) 2215 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automa- tically records your log-on in that file. In this case, LOGON prompts you for an activity description, and records it in the log entry. It is common practice to 76 **Page 6 ** 78 209 210 211 212 213 214 215 216 217 218 82 220 221 222 223 84 224 225 226 227 228 229 230 231 232 233 234 86 make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and imme- diately after each LOGOFF. 2217 Example 3lA>LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Pavrol1 50 2219 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2213 Explanation (Continued) 2215 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automa- tically records your log-on in that file. In this case, LOGON prompts you for an activity description, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and imme- diately after each LOGOFF. 2217 Example 3lA>LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Pavrol1 50 2219 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2221 Patch Points 3194 INDEX (Continued) 3196 Copyright 1984 by Software 2000, Inc. All rights reserved. 3198 hard disk, 1-3, 2-11 hard-sectored, 2-13 hardware, 1-5 hashed directory, 2-18, 5-31, 5-33 hexadecimal file dump, 5-30 incremental backup, 2-24 kilobyte, 1-5, 2-3 LABEL command, 2-15, 2-16, 5-44 linear directory, 2-18, 5-33, 5-33 local command, 4-8 lock file, 2-26 record, 2-26 log-on, 1-6, 1-7 LOGOFF command, 5-45 LOGON command, 4-7, 5-46 loosely-coupled network, 1-5 manual queuing, 3-4, 3-8, 5-53 manual spooling, 3-4, 3-7 map (allocation), 2-16, 2-17 MASTER command, 4-9, 5-48 master processor, 5-48 megabyte, 1-5 memory banks, 4-11 memory management, 4-9 memory size, 1-5 MP/M, 1-2 multi-processor, 1-5 nested do-files, 4-6, 5-27 networking, 1-2, 1-5, 4-8 non-banked memory, 4-10 not ready error, 2^20 offline (printing to), 3-7 operating system, 1-1 3200 parameters in do-files, 4-5 password, 1-7, 5-46 performance, 1-3 permissive sharing, 2-26 PRINT command, 3-6, 5-50 print job, 3-3, 3-10 queue, 1-4, 4-4 routing, 3-6, 5-50 spooling, 1-4 PRINTER command, 3-9, 5-52 printing methods, 3-1 direct, 3-1, 3-6 spooled, 3-2 to console, 3-7 to offline, 3-7 privileged log-on, 2-22, 5-46 processing batch, 4-3 command, 4-1 prompt, 1-6 PRTWIN command, 5-54 PUTLDR command, 5-56 queue assignment, 3-9, 5-52 print, 1-4, 3-3 QUEUE command, 3-8, 5-53 queuing manually, 3-4, 3-8, 5-53 random-access memory, 4-9 read error, 2-19 read-after-write, 1-3 read-only attribute, 2-23, read-only drive, 2-24, 5-65 RECEIVE command, 5-59 record locks, 2-26 recovery options, 1-4, 2-19 reliability, 1-3 remote console, 4-9, 5-48 RENAME command, 2-8, 5-60 3202 B-3 3215 reserved tracks, 2-16, 5-9 RESET command, 5-62 user-id, 1-7 user number, 2-21, 5-1 user number copy to/from different, 5-16 directory of different, 5-24 USERID.SYS, 5-45, 5-46 VERIFY command, 4-8, 4-12, 5-82 volume label, 2-16, 2-17, 5-44 WALT command, 5-84 warm start, 4-7 WARMSTRT.AUT, 4-7, 5-47 wild card characters, 2-4, 2-7, 2-8, 2-18, 5-16, 5-23, 5-57, 5-60, 5-64, 5-66 Winchester disk, 2-13 word processor, 2-6 write error, 2-19 Z80 microprocessor, 1-5 Z80 memory non-banked, 4-10 banked, 4-11 3217 B-4 3219 TurboDOS 1.4 User's Guide AUTOLOAD BANK BATCH BOOT ?BUFFERS command bank number ERASEDIR command-string FIFO source destination FIXDIR (Nnn Sss) nn - number ss - size drive-list ;option M - Military time R - Read and siplay date and time S - Set time V - View always source dest ;options A - archived only ?FMTW B - multi-disk files C - change media LABEL E erase LOGOFF R - replace files Snn - source user # X - non-existibg LOGON Y/N - confirm MASTER source: dest: PRINT (SET) file ;option Y/N - confirm file ;option Y/N - confirm L print filename (arg-list) drive ;option L - print FIXMAP FMTF CHANGE ?CLOCK DUMP 3221 QUICK REFERENCE GUIDE filename ;option L - print drive: f ilename drive: drive: drive: ?option C - CP/M sectors T - TurboDOS sectors S - single-density D - double-density 1 single-sided 2 - double-sided V - Verify only 4 - 4 0 cylinders (5") 8 - 8 0 cylinders (5") drive: label-name 3223 COPY D:\turbodos\turboDos1.4_8086pgmr_Jun84_OCR.pdf 6.323 KB PDF Document 25.06.2018 05:07:43 25.06.2018 05:07:42 25.06.2018 05:07:42 1 3099 -BSS-J-.™, AL = 0 if successful -1 if request invalid 3101 Explanation 3103 The Log-On/Log-Off function is provided to support log-on security via the LOGON and LOGOFF commands. To log-on, this function is called with the desired user number in register DL (with bit 7 set if a privileged log-on is desired), an 3104 **Page 154 ** 3106 d with the desired current drive in register DH (or -1 for no change in current drive). To log-off, the function is called with DX set to OxFFFF. After a log-off, another log-on request is not honored until a warm-start or C-function 0 (System Reset) has occurred. NOTE: W h e n this function is called from a resident system process, the argument in DH is ignored. D:\turbodos_bitsaver_temp\turboDos1.4_Users_Guide_Jun84_OCR.pdf 4.176 KB PDF Document 25.06.2018 09:25:54 25.06.2018 05:21:06 25.06.2018 05:21:06 14 236 SOME BASICS Getting Started (Continued) Copyright 1984 by Software 2000, Inc. All rights reserved. 238 Log On 240 On most multi-user systems, you must "log on" by entering a valid user identification, password, and possibly other information: TurboDOS 1.4x, Copyright 1984 etc. System log on Enter user id: BARBARA Enter password: SHAZAM Enter activity: PAYROLL 5A> In the example above (and throughout the remainder of this document), underlines are used to indicate the items you need to key in. The rest is displayed by TurboDOS. After you have typed each response, you have to press the RETURN (or ENTER) key on your keyboard before TurboDOS will process the item. The way TurboDOS validates user id's and passwords is described later on (see the details of the LOGON command). The date and time are not requested if the system clock was previously set. The activity description is requested only if a system log file has been set up. . As soon as you get through the log-on proce­ dure successfully, TurboDOS displays its "command prompt" to let you know it's ready to accept your first command. Remember that the "5A}" prompt tells you that user number 5 and drive A are currently selected. Next, we'll learn how to enter commands. 242 1-7 245 **Page 17 ** 2192 TurboDOS 1.4 User’s Guide 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri­ vate file libraries and preventing unauthor­ ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A- 2199 **Page 119 ** 2194 COMMANDS LOGON Command 2196 Copyright 1984 by Software 2000, Inc. All rights reserved. LOGON Command Syntax I LOGON Explanation The LOGON command provides password-type security for the purpose of protecting pri­ vate file libraries and preventing unauthor­ ized access to the system. The LOGON command prompts you interactively to enter your user-id, and validates whatever you enter against a validation file called USERID.SYS in the user 31 library. This file is an ordinary text file which may be created with any text editing program, and contains an entry of the following format for each valid user-id: I userid,{password),uu{P},(d:},{cmdline} In a multi-user system, the LOGON command lets you start a new console session. 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A- 2199 **Page 119 ** 2201 P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON com­ mand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the fol­ lowing effects: . . . . . access to global files is enabled "nn" sets current user number "P" sets privileged user (if present) "d :" sets current drive (if present) "cmdline" is executed (if present) 2198 where "userid" and "password" are up to eight characters in length, "uu" is a user number (0-30), "d:" is a drive letter (A- 2199 **Page 119 ** 2201 P), and "cmdline" is any valid TurboDOS command line. If your user-id has an associated password specified in USERID.SYS, then the LOGON com­ mand prompts you to enter a password, and validates it. If your user-id and password are both found to be valid, then the log-on succeeds. A successful log-on has the fol­ lowing effects: . . . . . access to global files is enabled "nn" sets current user number "P" sets privileged user (if present) "d :" sets current drive (if present) "cmdline" is executed (if present) 2203 5-46 2206 **Page 120 ** 2213 Explanation (Continued) 2215 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automa­ tically records your log-on in that file. In this case, LOGON prompts you for an activity description, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and imme­ diately after each LOGOFF. 2217 Example 3lA>LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Pavrol1 50 2219 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2221 Patch Points 2215 If the system date and time have not been set since start-up, LOGON prompts for and sets the date and time. If the file SYSLOG.SYS is present in the user 31 library, then the LOGON command automa­ tically records your log-on in that file. In this case, LOGON prompts you for an activity description, and records it in the log entry. It is common practice to make a copy of the LOGON command under the name WARMSTRT.AUT in the user 31 library, which causes LOGON to be executed automatically at start-up and imme­ diately after each LOGOFF. 2217 Example 3lA>LOGON System log on Enter user id: Barbara Enter password: Shazam Enter date: 15 Apr 84 Enter time: 14:25:30 Enter activity: Pavrol1 50 2219 Error Messages Invalid user id Incorrect password Invalid date Unable to log on 2221 Patch Points 2223 _ Z80 1 8086 103H CS+4 3080 GLOSSARY (Continued) 3082 Copyright 1984 by Software 2000, Inc. All rights reserved. 3084 hashed directory: A directory format that uses a sophisticated technique to make directory look-up much faster than possible with a linear directory. Hashed directories are especially suited for use on hard disks with big directories. hexadecimal: Numeric notation using base 16, which is often a convenient way to represent non-textual information. The sixteen hexadecimal digits are represented by the characters 0-9 and A-F. incremental backup: An efficient backup procedure whereby backup copies are made only of files which have been created or modified since the last backup cycle. (See "archived attribute".) kilobyte: Unit of information consisting of 1,024 bytes and abbreviated by the letter "K". Each page of this document con­ tains about 3K of information. (See "byte".) linear directory: A simple directory format compatible with CP/M and suitable for use on floppy disks. (See "hashed directory".) local command: A command which requires direct access to disk drive and controller hardware, and consequently may be executed only in the processor to which the disk is attached. log-off: Procedure for terminating a console session on a multi­ user system. After log-off, a log-on is required before your console can be used again. (See "log-on".) log-on: Procedure for starting a console session on a multi-user system. You must identify yourself by entering your user-id and possibly a security password before TurboDOS will allow you to make use of the computer. loosely-coupled network: Multi-processor system in which the various processors are physically separated (often built into user consoles), and connected with some sort of communications path. , manual queuing: Submitting files for background printing by using the QUEUE command. 3086 A-6 3089 **Page 168 ** 3110 GLOSSARY (Continued) 3112 Copyright 1984 by Software 2000, Inc. All rights reserved. 3114 password: A security code used to validate a user-id during the log-on procedure. (See "log-on", "user-id".) peripheral device: A hardware device attached to a microcomputer for purposes of input or output of information. Typical peri­ pheral devices include disk drives, consoles and printers. print job: A unit of printed output, generally the output pro­ duced by one application program. print queue: ground. A list of print jobs to be printed in the back­ 3116 printer: Hardware device that produces printed hardcopy of tex­ tual information. privileged log-on: A user who has logged-on successfully to a privileged user-id, enabling him to access various protected commands and features of TurboDOS. program: Instructions for performing a processing task, coded so that they can be interpreted by the computer hardware. prompt: Symbol displayed on the console by a program to advise you what to do next. queue: See "print queue". 3118 random-access memory (RAM): The primary high-speed memory of a microcomputer, used to hold programs in execution and data being processed. read-after-write: When writing data to disk, immediately reading it back to make sure it was recorded properly. read-only attribute: File attribute which designates that a file may be read but not modified or deleted. This helps you protect important files against accidental distruction. A drive may also be set read-only. record: Grouping of related data within a file. often refers to a block of data 128-bytes long. In TurboDOS, 3196 Copyright 1984 by Software 2000, Inc. All rights reserved. 3198 hard disk, 1-3, 2-11 hard-sectored, 2-13 hardware, 1-5 hashed directory, 2-18, 5-31, 5-33 hexadecimal file dump, 5-30 incremental backup, 2-24 kilobyte, 1-5, 2-3 LABEL command, 2-15, 2-16, 5-44 linear directory, 2-18, 5-33, 5-33 local command, 4-8 lock file, 2-26 record, 2-26 log-on, 1-6, 1-7 LOGOFF command, 5-45 LOGON command, 4-7, 5-46 loosely-coupled network, 1-5 manual queuing, 3-4, 3-8, 5-53 manual spooling, 3-4, 3-7 map (allocation), 2-16, 2-17 MASTER command, 4-9, 5-48 master processor, 5-48 megabyte, 1-5 memory banks, 4-11 memory management, 4-9 memory size, 1-5 MP/M, 1-2 multi-processor, 1-5 nested do-files, 4-6, 5-27 networking, 1-2, 1-5, 4-8 non-banked memory, 4-10 not ready error, 2^20 offline (printing to), 3-7 operating system, 1-1 3200 parameters in do-files, 4-5 password, 1-7, 5-46 performance, 1-3 permissive sharing, 2-26 PRINT command, 3-6, 5-50 print job, 3-3, 3-10 queue, 1-4, 4-4 routing, 3-6, 5-50 spooling, 1-4 PRINTER command, 3-9, 5-52 printing methods, 3-1 direct, 3-1, 3-6 spooled, 3-2 to console, 3-7 to offline, 3-7 privileged log-on, 2-22, 5-46 processing batch, 4-3 command, 4-1 prompt, 1-6 PRTWIN command, 5-54 PUTLDR command, 5-56 queue assignment, 3-9, 5-52 print, 1-4, 3-3 QUEUE command, 3-8, 5-53 queuing manually, 3-4, 3-8, 5-53 random-access memory, 4-9 read error, 2-19 read-after-write, 1-3 read-only attribute, 2-23, read-only drive, 2-24, 5-65 RECEIVE command, 5-59 record locks, 2-26 recovery options, 1-4, 2-19 reliability, 1-3 remote console, 4-9, 5-48 RENAME command, 2-8, 5-60 3202 B-3 3205 **Page 175 **