OCLC Micro: Volume 5 Issue 1

Subjects:

Table of contents

DUBLINes

If you use a Wyse PC (M310 Workstation) you have a useful, and potentially dangerous, command available on your system: the LOCK command. LOCK allows the system user to secure the…

DOS‐tips

Mark Bendig

Here's something we should have mentioned long ago. Say you want to copy a file from the disk in Drive A to the disk in Drive B. You enter COPY A:MYFILE B: as usual, but to your…

NETWORds

Lotus Development Corp. and Ziff Communications Co. have teamed up to develop a CD‐ROM application called Computer Library, available from Ziff Communications Co., One Park Ave.…

Booting Up

Hardin Brothers

Discusses the booting up process of IBM‐PCs. Considers the functionof IO.SYS or IBMBIO.COM in initializing hardware and loading MS‐DOS, andthe MS‐DOS file processes that lead to…

NeXT and the Library Workstation

Edward J. Valauskas

Considers what the NeXT computer can offer libraries as analternative to conventional mainframe‐PC‐terminal systems for sorting,storing, and displaying bibliographic information…

ALIX Files Download to Librarians′ PCs

Erik Delfino, Bruce Miller

Discusses the Automated Library Information Exchange electronicbulletin board, and the body of text and program it provides tolibrarians, with examples of ALIX messages. Considers…

Viruses: No Small Pox

Examines computer “virus” programs and how they can beavoided. Describes how virus programs work, and suggests preventivemethods to avoid them entering a computer through…

Batch Files for 〈F〉unction Key Definitions

John R. Likins

Describes a batch file, J.BAT, to quickly load a set of functionkeys. Provides examples of general cataloguing and customized functionkey definitions for library work.

Selecting Printers and Modems

Vern Buis

Discusses the suitability and characteristics of various printerand modem types for OCLC library applications. Considers the featuresand suitability of daisy wheel, dot matrix…

System Security

George Rowcliffe

Considers various ways of maintaining the confidentiality andintegrity of information stored in computer. Discusses key lockmechanisms, shell systems, file encryption, command…

Not for Novices: Another BASIC Input Technique

Mark Bendig

One of the most important aspects of programming in BASIC or any other language involves the interaction between the program and its user. For a typical microcomputer, the…

ISSN:

8756-5196

Online date, start – end:

1985 – 1992

Copyright Holder:

Emerald Publishing Limited