@L}5 _$% l0$)$$Hȱ$ UhL" `e$$%`$%`  R@W!( L(1   Y I`  d  Ld M * @  $ % CC$$)%1 Udߥ$9%: !0 S$% DD˙`  }J)Lr 23QRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRE|뀢󀀀|ARRRRRRRRRRRRRRRRRRRRRRRRRRRRRRD|'raphicsdumpmode}||($writeprotection|ARRRRRRRRRRRRRRRRRRRRRRRRRRRRRRD|($port(igh3peed3)/||0arallelprinterp}ort||23modemport||0rinterlinefeeds||0rinteris0rowriter||-)/compatibili}tymode|ARRRRRRRRRRRRRRRRRRRRRRRRRRRRRRD||ZRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRC0[1 '0} ;0 0 T0 0 u0 0`@1A1B1C1 1 1` 12 1` 1 } 1`@1A1B1C1`Xi7YiD1L1 ,1 ,1`=T1 :1L0=1D1L1ȱȱ }`4XiYi`i ii(i`/./&& @0D1L1ȱȱbBlack Box Status (BBS)----------------------This small program will show theswitch status of the "Black Box".Press any k }ey to quit.FrankensteinP.O. Box 1648800 AD FranekerHolland will show theswitch status of the "Black Box".Press any kA"'L'N Usr Cmd 1 ; Usr Cmd 2 ; } Usr Cmd 3 ; Usr Cmd 4 ;} Usr Cmd 5 ; } O3""""##L4$$Niҭ%NiӮ#L##н#Ѡ JD i(ҥi#L#`8#i н#iѥ }i?ҥ iӠ;L4$Бɛ i Х iѠ (H) hhh` Z`X$Ls$L{$L$L$L$L$L$L$L$Ld$Hh}HLi$` BLVJKBLVH` s$`D$Eh)0I L{$HI BLVHIBLVUT`L$UT`L$UT`UT}`BLVS:X$X$` &HH I$L% D%EHI B V $ Dh ؠ &0 ) F$ &LM%)} F$L|% Press a key.nD%E HI B V $ I$L% }D%E%HI B V $ I$h`SL&L<&}- The CTH Browser can ONLYD&E"HI B V $}L&be used with Sparta Dos!!!dD&EHI B V $ F$ F$L&Hit RESETD&E HI B V} $L&HIhX F$ F$L$'Remove cartridges and try again.D'E!HI B V $l F$ F$L}v'Loading The CTH Browser...[D'EHI B V $` & &]/&ԍҭ& & &}&jjjj) &Њ&jjjjLa&)  &Ҭ&Э*&Ч&L,&Ї&Њ@ԩҩ"ԩ}``ULl' F lDXE =$ $L\'Ӎj') `Ӎk' D@EHtIB V(i &)i@ & :$ $k}'ө3@& &&&& &j'Ӣ :$ $ Z` G DXE =$ $Ӎj') `Ӎk' D@EHtI}B V(i &)i@ & :$ $k'ө3@& &&&& &j' Z` :$ $ :$ $0 :$ $@ :$ $}oЍ /jR @$ $`>R(V(S(W(X(Y(Z(NS(nR(R(X(S(Y(Z(X(.Y(8V(X(T(W(Y(U(}`R(.S(R(.S(R(.S(R(V(S(W(R(.S(R(.S(V(mR(R(W(mS(S(`R(.S(R(.S(R(V(S(W(R(.S(V(mR(R(W(mS(S(`R(V(S(W(}R(.S(R(mV(V(S(mW(W(R(.S(R(.S(V(mR(R(W(mS(S(` }!}bahaaaoooaaPVIBWFGPVOE"}UIFUIFTFDSFUNFTTBHFPUNBOZQFPQMFXPVMEIBWFCPUIFSFEUPTDSPMMEPXOUIJTGBS#} XBOUUPUIBOLUIFGPMMPXJOHQFPQMFZXJGF VOFGPSQVUUJOHVQXJUINFUFW$}FBSEFOGPSTIBSJOHIJTSPVUJOFXJUINF PIODPXFOGPSBMMIJTIFMQGVMJOTJHIUBOEBMMU%}IFCFUBUFTUFSTBOEVTFSTPGMPTFSP PNFGPSJOTQJSJOHNFUPHPPOXJUIUIJTQSPKFDU&}'}(})}*}+}^5y5^Щ)Ѡi`,}^5^5y;-}.}IJTQSPHSBNXBTBTTFNCMFEVTJOHUIFBDSPTTFNCMFSWFSTJPOIFIBSEXBSFQMBUG/}PSNVTFEXBTBO XJUILPGBMBDLPY JOUFSGBDFUXPFBHBUFIBSEESJWFTEEJUJPOBM0}TPGUXBSFUPPMTJODMVEFBDVTUPNJ[FEWFSTJPOPGQBSUBPTQBUDIFEUPWFSTJPODQOBQTIPU 1}BOEBDVTUPNJ[FEWFSTJPOPGXIJDIBMMPXTNFUPHFUUPUIFNFOVCZTJNQMZUZQJOHPSIJUB JOTU2}SVUJPOFTVSFUPDIFDLPVUUIFPUIFSGJOFTPGUXBSFUJUMFTGSPN OUFSQSJTFTTVDIBT3}OBQTIPUN IJTTPGUXBSFQSPEVDUDPVMEOPUIBWFCFFOE4}FWFMPQFEXJUIPVUUIFVTFPGOBQTIPUIJTJTCFDBVTFOBQTIPUTBWFENBOZIVOESFETPGNBOIPVSTEVSJOHUIF5}DPVSTFPGEFWFMPQJOHUIF SPXTFS XPVMEOPUIBWFVOEFSUBLFOTVDIBQSPKFDUXJUIPVUOBQTIPUBUNZT6}JEF7}8}^Щ5Ѡi`^;^;C%3ource|#opy|$estination9}|#7$|#loser|3wap|""30(/.%4o|).&/.|  (ome|:}$ir|(ours%nterprises|0rotect|$ays0resents|5nprotect|倀|3et0ath|";}aud|$etails||%xecute|# |2un|"y4om<}(unt|!ll||$elete||2ead||3how0=}ic||0lay3nd|6ersion|!2#"atch||5sr#md|>}|5sr#md||5sr#md||5sr#md|?}|5sr#md|RRRRRRRRRRRRXRRRRRRRRRRRXRRRRRRRRRRRRR%QRRRRRRRRRRRRRRRRRRRE|0ath2eques@}tor|QRRRRRRRXRRRRRRRRRRRRRRRRRRRXRRRRRRRE|)nputpath |ZRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRCA} `ԩЩ>/Щ ?o` 0 oЎЎЎЎЎЎЎТ"/`?m????i? MC?B} CL)C C 9C?L)C C 9C CL)C C 9C C 9C?L)C CL)C C 9C ?L)C C} CL)C  C 9C?L)C  CL)C  C 9C?L)C C 9C CL)C C 9C C 9C?L)CD} CL)C C 9C ?L)C CL)C C 9C?L)C CL)C C 9C?L)C C 9C CL)CE} C 9C C 9C?L)C CL)C C 9C ?L)C CL)C C 9C?L)C CL)C CF} 9C?L)C C 9C Ю?L)C# C 9C Ю?Т 9C?L)C  CL)C C 9C! Ю?L)C"G} Ю?L)C Ю?Т 9C" Ю?L)C$ Ю?L)C Ю?Т 9C% Ю?L)C&? Ю?L)C? Ю?H}Т 9C' Ю?L)C Ю?L)C?Ќ`?Ќ `?Ќ `?Ќ `?`?H?i?h`I}쭛? i?i ?i???̙?`COh5Dh6DhhhhhJ}hhCLCхօϢׅͥ؅ͅmCͥ΅iΤϱː аȐѬCHˑhкдМ5DLAK} LWDi@L~D`LdD8 L~DɀLnDL~DL{D8 L~DL~D`@LDi LD`LD8@LDɀLDLDLDi LDLD8@LDLL}D`YTLrE`LDb.^)\TL)EDi R(DiS(S(D R(DU`HH HHR(DHS(DH O`D8 R(DS(M}S() R(^U`HH HHR(DHS(DH O`LyEb:^5\TɀLEwEi R(xEiS(S(vE R(uE U`HH N}HHR(wEHS(xEH O`wE8 R(xES(S(5 R(^ U`HH HHR(wEHS(xEH O`РL(Fx1FLAFO}*+=-LWFLqFИ` И` И`U lX`ʎR(S( (^mR(ԩ)mS(բ,P}X: >LFHXlXh) D lX 쩛lX` I$LG Path needs '>', press a keyDFE"HQ}I B V $ I$LzG WDGE"HI B V $`V R}X`ʎR(S( (^mR(ԩ5mS(բ,X: >LFHXXh) D X 쩛X` ?R ZULI FlXLJ}S} F$ lDXE =$ $JJ C$} HLdIT Hh F$JiJJiJ¢ :$ $ lZ ZT} sLHТ I$LHԯǽDHEHI B V $x LTILkJ [JhhhLHU}LH C$-LkJ=LTIɛ [JhhhLH F$LHJJ} F$` I$LI嬠ԯǽpDIEHIV} B V $  C$UhLHhL:J ? GXLJ} F$ DXE =$ $ C$} W}HLdIT Hh F$Ӣ :$ $ lZ Z sLH`` &BJKlDXE V $l8lmX}m)ml %BJKlDXE V $} F$JJ` lZ Z Z [`QRRRRRRRRRRRRRRRRRREY}|#7$2equestor|QRRRXRRRRRRRRRRRRRRRRRRXRRRE|"ackward&orward|ZRRRRRRRRRRRRRRRRRRRRRRRRRRCLKF ZFKZ}HHJHJHHJH O ???? o?xFFK ? ???? o? BK ? ???? o?[}4LK C$+ x*xɛLLLK lZ ZULGMKFLLULLʎR(S( (\}^mR(Щ)mS(Ѡ $LL(X: >LL D) .X>X*X.X*X詛XL[`L M(X: >LL]}` LLL LLL*X.X*X詛XX(L[KFLMVLLʎR(S( (^mR(Щ5mS(Ѡ $LL(^}X: >LL D) .X>X*X.X*X詛XL[LM(X: >LL` MLL MLL*X_}.X*X詛XX(L[`'N IN U N # Z w VTL>N :$ $L[NK:XDNE =$ $j8j @$ `}$ I$ F$ F$X$NY%NѥjiөЅҢБLNji`LNHH^;H_a};H`H;H OYTHYT UhYT`LSSUhTThUTTThhhNhNhR(S( ($NmR(ҭ%NmS(he҅ҩeӅӭNNNNБNb}NNN mNХiѥi(ҥiӠLL`TYT[TZT\T F  C$ (b- \TYTULT= \TYTULT+c}[TLT*[TLThhL(ɛ U1:LcLVT[TYTLTLVTYTZT]T[T]T\T\TLU DLVT Z[TYT\TZT Z`L!U d}5b$NЭ%NѭZTR(S( (R(eЅХmS(ѭYT LUi ХiѠ LUiХiѠ LULUҠԠˮ´IЈ`e}ЩUѩdҩWӠХiХiU`LtWUcVf}VcWg}tWkXYTLW wLWLWLWҠԠ UZTh}UUIUZTL1c` UZT UVIVZTL1c` ?ZTL[LhX LHLKLaLlL& L\n LnLi}oLq LtL'vLvvLvLx LL# Z` Z`L/YXXXXD1:*.*XYD2:*.*/Y[HH>H>HH>H Z j}O  I$ULY _ǝDXE(HIB VR I$ F$X X lZ ZL[ _k}DXE(HIB VR I$ F$X X lZ ZL[iZjZ$Nԭ%Nթ֩Oנԑ֥iԥil}եi֥i׭iZ8iZjZjZjZ``iZjZԩOխ$N֭%Nנԑ֥iԥiեi֥i׭iZ8iZjZjZjZm}`LZ ??YT ? ?LZ??ZT? ????????? o?`L[[c b(XlXXXULn}v] 5_[[ :$ $&NL` :$ $ 8` lDXE =$ $^Щ)Ѣ D[EHIB V _D[i[[io}[[ХiХi .ХiХi L\^) b :$ $[t HH[H[H^H)HH C[R([S( ( p}_ lDXE =$ $ ^D)ER(HS(I B V䩛 F$ :$ $ -] ]`DIR.INFUL^HH HH^H)H O Z`q}[R([S( (R(^Щ)Ѡ JDХiХiѭR(8R(S(S(S(` n_[[ :$ $&NL` :$ $ 8` DXEr} =$ $^Щ5Ѣ D[EHIB V _D[i[[i[[ХiХi .ХiХi L]s}^5 b :$ $[ HH[H[H^H5HH C[R([S( (X*]Xɛ DXE =$ $ ^D5Et}R(HS(I B V䩛 F$ :$ $ ^ ^`HH HH^H5H O Z`[R([S( (R(^Щ5Ѡ JDХiХiѭR(8u}R(S(S(S(`L:_^Щ)Ѡ8_9_8_9_U`Ls_^Щ5Ѡq_r_q_r_v}V`FREE SECTORS[F [٧_ 8``,X`,X`UL`(lX>:Ƚ]lXɛ`(Xw}>:Ƚ]Xɛ`UL``(lX>:Ƚ`lXɛ`(X>:Ƚ`Xɛ`*.*UL`^Щ)Ѡɛx}LD_` JDL`ҠԠƮԮϮé^Щ5ѠɛL}_` JDX$ULWa _ 5_ lDXE =$ y}$L[ ^D)EHIB V ` ] :$ $X$`X$ _ n_ DXE =$ $L] ^D5EHIz}B V ` ] :$ $`&NLa I$LaON DaEHI B V $&N Z` I$LaOFFDaEHI{} B V $&N Z`HЩh`ZT`YT`L|bة^ԩ)խUR(S( (R(eԅԭS(eՅՠI `ة^ԩ5խ UR(|}S( (R(eԅԭS(eՅՠI `ULbU]T^D)D` U_T^wE5xE`^Щ)Ѡ `^Щ5Ѡ }}`zcUL(c _ cL[ _ cL[tcLuctcYTHUHYT WVIVhUhYT`VHYT WhVhYT`tc`D1:*.*ULc~}ycX`ycX`ULc*oXqX.pXrX`*XX.XX`ce8p``p8}<<<>~>(ʔF D  $6J^rXȩ p q :$ $ q sLo lZ Z I$LpK:DpE =$ $}&NHU&NV [U&NV [h&Noo` i?Х iѠoɛ i Х iѠ`H) h`QRRRR}RRRRRRRRRRRRRRE|$/37indow|QRRRXRRRRRRRRRRRRRRRRRRXRRRE||ZRRRRRRRRRRRRRRRRRRRRR}RRRRRCHH$qH%qH&HqH O I$ ?`L|rD3:>UTT>ARCyrXxULhu^5qɛ{r Z }I$LrInput dest-DrE HI B V $DqEHIB V lZ{rȢq ɛȌ{r Bs{r}lX{rɛ Bsii FlX s`hh8^yr5zr{ryrm{ryrzrizr LsD1:ARC.BAT}DsE =$ $} ^D5EyrHzrI B V :$ $ Z [UV [VU`ULtU`U`V`V`ULh}u FlXLt sLqt :$ $ !BJKlDXE V $LtlX.lX +BJKlD}XE V $LtLdu I$LtOne moment, updating directory...DtE!HI B V $&NH&N [ I$}L=u DuE!HI B V $h&N Z` I$Lu- Function only works on }lefttDuE#HI B V $ C$ I$Lu ӝDuE%HI} B V $ I$ Z`ULhu FlXLov s :$ $ #BJKlDXE V $L'v [ Z`ULhu FlXLv }s :$ $ $BJKlDXE V $Lvv [ Z`]TH_T]Th_TUH UUh U[H[H[[[[h[h[ЩUѩҩ}VӠHґhlЩXѩҩXөDžԩXթ֩XנHґhұH֑h-^Щ)ѩ^ҩ5ӢHґhUH}U b ]UVHV b ]hVhU`H,h`hhh,FKYTZTLaL iw iw ` _ i!Х iѠЙX}ɛU [ i x i!x ` _ i!Х iѠЙXɛUV [VU`x ULhu Z ? :$ }$ 8` lDXE =$ $L}} F$LPy쭱笛+DyE%HI B V $Ly}xDyEHI B V $ F$LyPress any key.DyEHI B V $ C$} YDxEHIB VLx}LC} F$ F$ ~_DxEHI B V ~gDxEHI B V ~} F$ ~ xx D FڭZxԭ[x آx0Lz)xٝDxEHI B V $ xx D Fڭ\xԭ}]x آx0Lz)x^x + F$L${ F$ٝDxEHI B V $ F$ F$ ~Yx) P F$Ln{ ~}Yx) H F$L{ ~Yx) A F$L{ ~Yx) F F$L{ ~Yx) E F$L{ ~Yx) S F$L{ ~Yx)@ D F$L{ ~Yx)} x F$L{ ~ F$ !~ F$ ~ x0xx D Fڭmxԩ آx0L7|)xٝDxEHI B V} $: F$ x0xx D Fڭnxԩ آx0L|)xٝDxEHI B V $: F$ x}0xx D Fڭoxԩ آx0L})xٝDxEHI B V $ F$Ly F$LU}OD}E}HI B V $ F$ F$L}EOFD}EHI B V $L}Press a key.D}E HI B V} $ C$ :$ $ lZ Z` ` C$hhLC}`. F$`L;~ &D~EHI B V }$ x0xx D Fڭkxԩ آx0L~)xٝDxEHI B V $L~-D~EHI} B V $ x0xx D Fڭjxԩ آx0L)xٝDxEHI B V $LM-KD}EHI B V $ x0xx D Fڭlxԩ آx0L)xٝDxEHI B V $`}ULhu^Щ)ѠL IХiХiLUIU ]`` :$ $X$LFD1:>BROWSER.CFG6DE} =$ $LD"E HIB VD"E@HIB VOD"E HIB V[D"E@H}IB VD"E HIB VD"E@HIB VD"E HIB VD"E@HI}B V3D#E HIB V?D#E@HIB VLׂ# F$ F$LNo BROWSER.CFG file found.}DEHI B V $ F$ F$LCreating it!DE HI B V $ :$ $LED1:>BROWSER.CFG}5DE =$ $D"E|HI B V :$ $ F$ F$LNow press RESET and reload.DEH}I B V $LԂ :$ $X$`'N V :$ $ F$ F$LNow press RESET and reload.DEH2CTH HD BROWSER (C) 1991BY Tom HuntDocs for Beta Ver. .5______________________________________Note : This program is se }t up to work with Sparta Dos 3.2d ONLY. It may or may not work with any other dos.______________________________________SE }CTION 0.0.0WHAT IT IS______________________________________ The CTH HD BROWSER was especially designed to facilitate } navagation through your hard drive(s). It can be used for general perusing, or for serious file maintenance. It can be used }to quickly clean up your drives of un-needed files. It is especially quick after it has created it's database of .INF files. }It features high speed scrolling menus, keyboard or joystick control, and has features that make it a natural companion to a }hard drive. It can, however, be used with floppy drives also.______________________________________SECTION 1.0.0HOW IT WO }RKS______________________________________ You may load the CTH HD BROWSER, (henceforth referred to as "the browser"), } with optional parameters on the command line. It will accept one or two parameters, which are for the initial paths of the d }irectories that will be displayed. Legal inputs would be like the following example-D1:>BROWSER D1:>*.* D5:>*.*orD1:BRO }WSER D1:*.* D2:*.* The following line would not be legal-D1:BROWSER D1: D2:SECTION 1.0.1 Once the browser is } loaded, you will see your screen divided into three columns. If you did not use the optional parameters on the command line, } you will see an advertisement for the CTH BBS in the right column, and the title and copyright notice in the left column. Th }e default filepath is "D1:>*.*" for the left column, and "D2:>*.*" for the right column. You may display a directory at this }point by pressing the down-arrow (without holding down CONTROL), and selecting Dir by pressing RETURN. Directories are automa }tically sorted for display. The actual directory on the disk isn't. The browser can also be controlled by a joystick plugged }into port 0 (the first port, not the second). When using a joystick, press the fire button to choose a fuction, or to hightli }ght/de-highlight a file. When using a joystick for scrolling through the files, press and hold the fire button to access the }high-speed mode.SECTION 1.0.2 If you did use parameters on the command line, the browser will immediatly load in the d }irectories from the drive path(s) specified.SECTION 1.0.3 The function column is the one in the middle. The leftmost c }olumn is the "Source" column, and the rightmost one is the "Destination" column.SECTION 1.0.4 There is a three-step pr }ocess that must be done in order to preform a function.1) First you must highlight either the Source or the Destination at }the top of the screen. When a function is choosen, the browser will preform that function ONLY upon the file(s) highlighted u }nder the one (Source or Destination) that is highlighted.2) Next you must highlight the filename(s) of the file(s) you want } to preform a function on.3) After the file(s) is/are highlighted, you may then go to the middle column and choose a functi }on. Not all functions work with version .5, and not all functions work in both of the file columns. Some work only on the lef }tmost column.SECTION 1.0.5 This program will attempt to create and use .INF files. These files are used for speedy di }sk directories. This isn't anything new, because this technique is used on other computer systems, too. When the program does } not find a .INF file in the path it is accessing, it will create one. From that point on, if you ever need to update a .INF }file, you must turn that function off by toggling the .INF ON/OFF, and then choose Dir. A new .INF file will be created. Afte }r this, you should turn the .INF function back on. A situation like this would occur if new files were added to a directory b }y some program/action other than the browser.SECTION 1.0.6 To leave the browser, just press the ESCAPE key._________ }_____________________________SECTION 2.0.0THE FUNCTIONS______________________________________ Copy currently only w }orks copying files from the Source column to the Destination column. You must first pull-up the directory of the source direc }tory under the Source column. Next you pull-up the directory of the destination under the Destination column. Then you must h }ighlight the files you want copied, under the Source column. Then you must be sure that Source is highlighted, and then go to } the function column and choose Copy. The Copy function accesses Sparta's internal copy function. This means if an error occu }rs, the program will probably drop to the D1: prompt. If you try to copy a file that is too large for the destination, or try } to copy to a file that is protected, this will occur. A RESET is usually all that's necessary, then delete the partial desti }nation file.SECTION 2.1.0 You use the CWD function in order to navigate through your directories. To CWD into a direct }ory, highlight the directory and then choose the CWD function. You will be presented with a requestor window that has two opt }ions- BACKWARDS and FORWARDS. Choose FORWARD to go into the directory highlighted. When you want to go backward, and leave a }directory, you would simply choose BACKWARD. Of course, as with all the other functions, this function operates upon either t }he Source or Destination columns, depending upon which is highlighted, and which directory is highlighted underneith them. Th }ere is a shortcut for this function. You simply double-click upon the directory you want to get into, using either the joysti }ck button or the RETURN key.SECTION 2.2.0 The Swap function will swap the contents of the Source and Destination colu }mns. This proves useful especially when wanting to preform a function that only works on files in the Source column.SECTION } 2.3.0 For more information about how to use the .INF ON/OFF function, see "HOW IT WORKS".SECTION 2.4.0 For more }information about how to use the DIR function, see "HOW IT WORKS".SECTION 2.5.0 The Protect and Unprotect functions on }ly operate upon files in the Source column.SECTION 2.6.0 For more information about how to use the Set Path function, }see "HOW IT WORKS". There is a shortcut to this function. You simply press the number key of the drive you want to access. Le }gal inputs are the numbers 1-9.SECTION 2.7.0 The Details function will show detailed information about the files in th }e Source column. The information is displayed on two lines for each file. The first line contains the following information- }Filename, First Sector Map, File Size, and Attributes The second line displays the time and date stamp.SECTION 2.7. }1 Some explaination is necessary about the above mentioned info. First, whenever a filesize is encountered that is grea }ter than 65,535, a plus-sign (+) appears to the left of the file size, and the number displayed must be added to 65,535 to ge }t the correct filesize. This method is accurate for file sizes up to 131,069 bytes in size.SECTION 2.7.2 Also, the fi }le attribute bits are displayed in this manor. A period (.) means that that particular bit isn't set. P=Protected, H=Hidden, }A=Archive, F=File, E=Erased, S=Subdirectory, D=Defragmented. I first read about the defragmented bit in Charles Hughes' DIRT }documentation.SECTION 2.8.0 Execute and Run are for running batch files and .COM files, respectivly. These functions }operate upon files in either the Source or Destination columns.SECTION 2.9.0 The All function will highlight/de-highli }ght all the entries in the source column. The various functions may complain after choosing ALL. They need a bit more logic i }n order to skip over the subdirectories when processing multiple files.SECTION 2.10.0 The Delete function will only op }erate on files in the source column. It will work in multi-file mode.SECTION 2.11.0 The Read command filters out the t }he clear-screen character. It converts ascii CR/LF's to Atari EOL's. It can function on files in either the Source or Destina }tion columns, and operates in multi-file mode.SECTION 2.12.0 Picture files MUST use the following extenders- .MIC for } Micro Painter, .MP for MagniPrint, and .PIC for Koala pictures. It can load both compressed and uncompressed Koala pictures. } The program looks at the extenders, and will try to load it in according to the extender used. This function will operate on } files in either the Source or Destination columns. This function does not operate in multi-file mode, and does not de-highli }ght the file after displaying it.SECTION 2.13.0 Digitized ASP sounds can be listened to by using the Play Snd function }. Parrot and Parrot QXL generated files work with this, also. Note: This function uses one of XE's extended ram banks ON AN E }XPANDED MACHINE, to store the digitized sound data. In other words, this function will not work with computers with less than } 192k of ram. However, since it only uses one of the extended ram banks, you can still use a ramdisk if you configure it to n }ot use the XE's extended ram banks. This function will be expanded upon in the future to run on stock 130 XE's. This function } does not operate in multi-file mode, and does not de-highlight the file after playing it.SECTION 2.14.0 The ARC Batch } only operates upon files highlighted in the Source column. It will create a batch file on D1: named ARC.BAT. You will be pro }mpted for the destination filename, which is the name of the .ARC file which will be produced by this batch file. This batch }file, when executed, will automaticly run your ARC utility and arc all the files you had highlighted in the Source column. It } must find your arc program in the following path- D3:UTT>ARC.COM.SECTION 2.14.1 For those of you who have never used }batch files with Super ARC, by Bob Puff, this is how it operates. You highlight D1:ARC.BAT file in the Source column, then ch }oose the Execute function. Alternatly, at the D1: Sparta Dos prompt, type in "-D1:ARC". If you have your ARC program in the p }ath previously specified, you will be looking at the main menu of the Super ARC program. You may now change the various ARCin }g parameters if you desire. Then press A to return control back to the batch file, which will initiate the actual ARCing proc }ess. When the last file specified is ARCed, you may either type in a RETURN to close the .ARC file, or type in any additional } files you might want included.______________________________________SECTION 2.15.0THE USR COMMANDS_____________________ }_________________ The User commands (Usr Cmd 1, 2, etc...) are special functions that you may define. You may have up }to five of them. They may be any legal function that can be typed into the Sparta Dos command line. You may define your own s }pecial functions by creating a special configuration file, named BROWSER.CFG. The browser looks for this file upon initializa }tion. If the browser does not find this file, it will automatically create it for you. This file must be kept on D1:. To inst }all your own user commands, you must customize it, and it must be in the correct format.SECTION 2.15.1 For instance, i }n my own personal BROWSER.CFG file, I have set the first two Usr functions to automatically load and run TextPro and BobTerm, } respectivly.SECTION 2.15.2 The format for this configuration file is as follows-Function name- 11 characters }plus RETURNActual Function- Any length up to 63 characters, plus RETURNSECTION 2.15.3 If you create a BR }OWSER.CFG file, there MUST be five pairs of these, regardless of whether you use all five, or not.SECTION 2.15.4 If y }ou do not use all 5 of the User Commands, you should place either spaces, or " Usr Cmd x " in the unused function names. This } text will be displayed in the browser's menu, whether or not it's an active function. You must also place a semi-colon in an }y of the unused actual function's entries.SECTION 2.15.5 Here is a sample BROWSER.CFG. If you are using Textpro to re }ad this file, you might want to press control-O right now in order to see the true spaces in this example. Textpro D3:>U }TT>TEXTPRO Bobterm D3:>UTT>BOBTERM Usr Cmd 3 ; Usr Cmd 4 ; Usr Cmd 5 ;______________________________________ } Send suggestions and bug reports to me at-The Closer To Home BBS419-368-4413300/1200/2400 baudConference #0__________ }____________________________Create date 08/08/91Tom Hunte BBS419-368-4413300/1200/2400 baudConference #0__________ > Codebuster is a delightful toolfor the experienced ATARI hacker. Itis a disassembler that will load anyDOS file into a }buffer and displaythe contents as ASCII, hex, or6502 instructions. It will write outthis same file as a binary load file.}More than one file may be loaded intothe buffer and then rewritten out asone combined file. It will read boot files, but} it won't write out boot files.Press to go on to the nextpage or enter a 'Q' to exit HELP.The next few screen}s contain theformats of the commands availablein this program. All of the commandsare entered through the standard OSinpu}t routines and thus must befollowed by pressing the key.The commands are entered as singlecharacters followed by th}e requiredand/or optional positionalparameters. All addresses must beentered in hex (hhhh). All othernumbers will be in d}ecimal (dddd).Codebuster does not check for validhex or decimal numbers.Here are all the commands available:ttach,} oot, hange, isplay, nter,ind, elp, ist, emory, pen, ead,end, nopen, irtual, rite, eit,ero, labels, comp}ress, lister options, et utPlace holders * , -Filenames do not need the "D:".ttach labels to the disassemb }ly.AThis will turn on the label attachinglogic. Entering the command a secondtime will turn it off. However thelabels !}must first be ntered.Read the oot file.B ddddThe decimal number is the max numberof sectors to load. If none iss"}pecified all the sectors in the bootfile will be loaded.hange memoryC hhhh hhhhhhhhhhhhhhhhhhhhhhhorC hhhh 'abScef#}gh...'Change the contents of memory at hhhhto the hex string or the ASCIIstring. Remember you will be changinga virtual $}address which should relateto a section of code in the codebuffer. You can change memoryanywhere in the machine so becare%}ful. Using a place holder in theaddress will change memory at thelast found address.isplay the contents of memory.D&} hhhh ddddDisplay memory at address hhhh forthe next dddd bytes. This will be avirtual memory address unless a isenter'}ed to turn off virtualaddressing. If only a 'D' is enteredthe next default number of bytes willbe displayed. A place holde(}r may beused for the address to change thedefault number of bytes withoutchanging the address.nter the label file.)}E filename.extEnter the standard named DOS file tobe used to build a table for thelabel attacher. Each entry must havea *}$ to start the hex value.LABEL = $hhhh ;commentsorLABEL EQU $hhhh ;commentsThe labels will be placed at the endof +}the program moving the user codebuffer up in memory. If you werelooking at some code it will be over-written and the virtu,}al addressingwill be incorrect.ind a stringF (F,A) hhhhhhhhhhhhhhhhhhhhorF (F,A) 'abcdefghijThe second F tells c-}odebuster to findthe first occurance in the codebuffer. If it is not specified thenext occurance will be searched for.The.} A requests codebuster to start atthe front of the buffer and find ALLoccurances of the string. When theend of the buffer /}is reached amessage is printed and the findpointer is reset to the front of thebuffer.et sectors from the diskG hhh0}h dddd hhhhGet dddd sectors starting with sectorhhhh (first hhhh) and put them atvirtual address (second hhhh). If noadd1}ress is given put sectors atbottom of code buffer. If no count ofsectors is given get 1. If no sectoris given get the firs2}t sector.ist machine language code.L hhhh ddddList machine language code beginningat hex hhhh for the next ddddin3}structions. If the number ofinstructions is entered it becomesthe new default. The standard defaultis a full screen (21). 4}If only an 'L'is entered the next default number ofinstructions will be listed. A placeholder may be used in the addressf5}ield to change the default withoutchanging the address.Display the emory location and thesize of the user code buffer6}.MThis probably is of little use to youbut it helped me during developmentand I didn't have the heart to takeit out.7}pen the listing disk file.O filename.extThis is the file where all output canbe sent with the end command. Thefil8}e must be opened before issuinga isplay or ist command with sendpointing to the disk. Once it is openyou may leave it op9}en and end theoutput to the screen or the disk.When you are done you must close(nopen) the file before output canbe sen:}t to another file. Many otherscreen messages will go to this filelike the boot file record and binaryload file load ranges;}.ut sectors to the diskP hhhh dddd hhhhPut dddd sectors starting at sectorhhhh (first hhhh) from the virtualaddres<}s (second hhhh). If no addressis given put sectors from the bottomof the code buffer. If no count ofsectors is given put 1=}. If no sectoris given put to the first sector.ead a binary load file into memory.R filename.extAs each block of b>}inary load file isencountered the program will promptyou for a response. This allows youto skip, load, or concantenatecer?}tain portions of a binary file. Arange that is loaded is placed at thebottom of the buffer. If you load asecond load range@} it will overwritethe first and the virtual addressingwill be set to that of the secondload range.You may also concanA}tenate a loadrange if it will fit in the buffer.A concantenated load rangewill be placed in the bufferaccording to the viB}rtual addresssetting.For example if the front of thebuffer was set to virtual address$5000 and you tried to concantenateC}a load range of $4000 Codebusterwould not allow you to because thatwould place the load range belowthe buffer in the progD}ram area.The address could also be to high.That is beyond the top of free RAM.end output to screen, printer, diskS E}Dend output to the open disk file.S Pend output to the printer.S Send output to the screen only.This cancels F}end printer and enddisk.Output can be sent to the printer andthe disk at the same time.This entire help file may beG} printedby ending it to the printer.nopen the listing disk file.UThis file must be closed in order tosave anythiH}ng written to it beforeleaving CODEBUSTER. If you leave withan eit it will close this file foryou, but if you just systemI} reset thefile will be lost. Sorry about thesilly name. I needed the "C" for thechange function.Set irtual addressinJ}g.V hhhhIf a "V" is entered by its selfvirtual addressing will be turned offand you will be looking at realaddresses. K}If an address is enteredthe start of the code buffer can bereferenced by the address you gave.It is like relocating code L}inmemory. The program starts up withvirtual turned off, or in real mode.rite binary fileW filename.ext lo-addr hi-aM}ddr run-addr init-addr alt-addrThis command will create a binaryload file from the code buffer. Youmust specify the stN}art and end of theblock of memory to write. You mayspecify an alternate address(changing the virtual address will dothe sO}ame thing). Either run and olinit addresses may be specified.Place holding characters may be usedon run-addr and init-addrP}.eit the CODEBUSTER.XThis will close the listing file andreturn you to DOS.ero out the user code buffer.ZQ}This will zero out all of theaddresses specified in the emorycommand. When looking at a section ofcode the zeros will heR}lp identifywhere the code ends. invoke the internal label processor% filename.extThe input file is an assembly lisS}tingfrom CODEBUSTER. Create the file bypening a listing file, listing somecode and nopening the listing file.Then give T}the label processorthe file name The labeler willgather up all references and then verify which ones are internal andconvU}ert all internal addresses tolabels. All undefined opcodes areconverted to AMAC DB commands. Toggle the compress optiV}on@This will place MEDIT tab charactersin and shorten the the output fromthe labeler. It is a space savingfeature.W}Lister options list found address - 1 list found address display found addressWhen "finding" ASCII or hex stringsX}these options determine how to tellyou where the string is. The addessmay be displayed or listed. Listingminus one will alY}low you to see theinstruction that is associated withimmediate values or addresses ininstructions. Listing or displayingtZ}he address found allows you to seeASCII strings or assemblerinstructions.This program is public domain andtherefore f[}ree for the giving and getting. My best wishes to allfellow hackers.Don't forget - Who ya gonna call .... \} `````````````` `` `Ҡ` `` `````````````` x 9GLH D: W000 ! LK WZVEMABHSRDLOUX?%FC@-=+GP\<32'N3^}(-41)&W"BB27:8@wAg4444/0 T ` m n "` '`BDE'HI V_}0ޢ (0`ppB0!BA !} by Tom Wells`} Use a ? for helpTRPAMMY #X!Y! BD!EHI V 2 0!1rX!( 2r!a}( 2:G "`ok... BD"EHI V`##$$$$%Z%%%%n&&&    5 >b} R?ee  ?    D ;""<"" ' "> "   Щ`8 c}#. `:G" $ # % 8$ $ % % $ % Q  #L<# #!  #0 #L#  #0 w#d}) w#`ii`ii`ii`& "! '?>  #=  # '?> #= e} #`D` >ii`A4 >ii`#4 'G '?> D= E l$5) 0ȭ( ȭ' >f}ii`' ( ) ( i( ) i) L|$ح( )' ( JJJJ( ' 0' `$4 $ $ " >ii`5g}` ! & `$4 % $ " >ii`& ȱ! `(4$5 $ Q% ",Xȑ)ȑ >ii`6q}bBBS COMb BBS DOCb BROWSER COMbeBROWSER DOCbGCODEBUSTHLPbQ]CODEBUSTCOMbLABELS b%DOS SYSb*DUP SYSb RAMDISK COMB(DIR INF`(4$5 $ Q% "),ȑYȑ >ii`$4 % $ ",Xȑ >ii`$4 % $ ",Yȑ >r}ii`$4 '?> D= EI急8倅L!&eiii8吅呅 '?> 5= 6 '?>s} 7= 8 >ii`$4 $ $ ",Xȑ >ii`$4 $ Q% ",Yȑ >ii`(4$5 % t}Q% ") >ii`* , + - 5 > R?ee  ?, * - + U'8, , - - Lu}2'`` '8吅呅 '?> (= ) '?> *= + '?> (= ) '( >iiv}`}~ ' `.( '`" # :G B/ 0 (0 B V䥊`0BDE(HIw} V ;Т   ʽ  '$ R?ȑii # 0L( #" ix}" # i# L-(labeling now onlabeling now off. . (( 2`. (( 2` B/ `0 f-1 2  ,y} C`0 f- + * QS L3CL *0 f- JDLA)iiŁŀLE)8倅偅$ % $ iz}$ % i% 8倅偅0BDE$ H% I V JDLA) ',LE)8倅偅$ % $ i$ % i% e{}e M,2 1 3 4 Lu)eeYʼnXň M,Lu)0BDE$ H% I V JDLA)LE)Load Ra|}nge = $ - $oad oncatenate kip uit2 '?> *= *1 '?> *= *4 '?> *= *3 '?> *= }}**( > *( 2`entry point = $init point = $ -T+1 0=0 f-1 '?> i+= ~}j+2 '?> g+= h+X+( >`l+1 0<0 f-1 '?> += +2 '?> += +p+( >`6,(} 2`virtual addressing set#\,( 2`load range beyond buffer, skipping,( 2 Q`L1 2 ȑ}0BDE}DD}EEHI V JD 8--( 2`not binary load file. uit oadfile loaded at} virtual $0000ii}H}I`0B1D E0 HI V`appended file1 A2 : }-( 23 $ 4 % 0 f-1 3 2 4 $ 1 % 2 `9  ?9 5 6 7 8 c.9 9 L. c.5 i5 6} i6 7 i7 8 i8 9 ֠ȱ8倅偅 "/`5 6 7 8 R@1  Y}`5 6 7 8 P1  Y`# of sectors = init address = $boot continuation = $} '?= .> .ȱii '?= /> / '?= /> / '?= /> / '?= /> /.}( >.( >/( >`9 5 : 6 7 8 Lt0 R?00000( 2`5 }6 U ?00 9 : 5 R?ee0( 2`7 8 c.5 i5 6 i6 6 05 }0!7 i7 8 i8 9 ƭ: : Lt0`address below bufferinvalid sector number9 5 : 6 7 8 L1 R?}00000( 2`5 6 U ?00 9 : 5 R?ee0(} 2`7 8 .5 i5 6 i6 6 05 0!7 i7 8 i8 9 ƭ: : L1` (P6DS; < [2i2(} 2`; 2( 2`< BfD2EJ V JD [2`2( 2` B V`P:output sent only to screenoutp}ut sent to paperoutput sent to disk B(DE%HI V` B [2l virtual addressing off  R?8倅}偅 ',`2( 2`free memory $addr range $ - $8 '?> 13= 23 '?> /3}= 03"3( 2 '?> A3= B3 '?> C3= D3 '?> I3= J3 '?> K3= L343( 2`code buffer zeroed}恦XY L43( 2`labeler compression onlabeler compression offf4f4N4(} 2`f474( 2`+find listing option reset 44( 2`D:CODEBUST.HLPno help file} Help Screen}@BĝD4EJ V 4( 2@ B V` BD4E&HI V@B(DE&HI V0(ɠ >L}K5 QL-5TTACH OOT HANGE ISPLAY NTER IND ELP IST EMORY PEN EAD END NOPENIRTUAL RITE ERO EIT LABELE}RLIST FOUND-1 LIST FOUND DISP FOUNDET UT COMPRESSV (addr) S (D,P,S)E filename O filenameR filename } % filenameB (max # of sectors)D [addr] (# of bytes)C hex or char stringL [addr] (# of instructions)F (F,A) (he}x or char pattern)G (hex sec #) (# of sec) (buff addr)P (hex sec #) (# of sec) (buff addr)W filename lo-addr hi-addr [run-}addr] [init-addr] (alt-adr)(optional), < * , X - /required>[ * , x - /optional]Valid place holders are * , X - }BD5E9HI V`gathering referencesverifying internalassigning labelsF G :G +C/ ` 9 kC EC I: kC E}C C)8( 2 C kC C D C 8" # ) 2` : ; 

R?J R?P }(= ) '?> *= +;? '?> A= B:F}:F}:FiE/ʈ` ? B(DE%HI V< &} B(DE%HI V JDL?; & B(DE%HI V JDL?``%( `詛(` = JJJJ> = )}= = ii@=  ` ?B :/B B D B C E D ` ?E )E D E E C )D B D D }8E E D D L?` B L?? eiB ` @  @`F L6@A} @ ޽'" @` N@`@ 9B C B :/B B B C @Ȍ@LS@ @`'" L@}@ @`end of buffer reached݀5@򥒅ii ?A @`iiYXЧ}@( 2`4=#- U'`8  "`  "` LB > R?ee T'}" ZB` B`need source string for changeneed address and string for changeA( 2`"A( 2` 5B }C B :/B B B C LB tB`' " tB`HH U'hh`   𩛙}  BD EJ V/ 0 ` JD B ` B V`   𩛙 0BD EJ V/ 0` JD C`0} B V`   𩛙 @BD EJ V/ 0` JD kC`@ B V`D:CODEBUST.TMPPBvDCEJ V} / JD C`P B V`@B(DE(HI V`D:CODEBUST.TMP,LW0 Cɛ P BԝDCE V JD`}@!BD E V JD`I/O error number iiإ)i0HDJJJJi0GDi0FD5D( 2`}            }             ???A}DCANDASLBCCBCSBEQBITBMIBNEBPLBRKBVCBVSCLCCLDCLICLVCMPCPXCPYDECDEXDEYEORINCINXINYJMPJSRLDALDXLDYLSRNOPORAPHAPHPPLAPLPROLRORRTI}RTSSBCSECSEDSEISTASTXSTYTAXTAYTSXTXATXSTYA ##%## ####('(((-(*!$!! }!!+)&)) )/)0201620102018070  43  5 } ,,,",,,.,, 620102018070  43  5 6;------Operating System Equates ------; FOR THE CODEBUSTERCOLDST=$244WARMST=$8CRITIC=$42HATABS=$31ATABMAP}=$2A3FILDAT=$2FDFILFLG=$2B7VPRCED=$202VPRCD2=$203VINTER=$204VINTR2=$205VBREAK=$206VBREK2=$207VKEYBD}=$208VKEYD2=$209VSERIN=$20AVSERN2=$20BVSEROR=$20CVSERR2=$20DVSEROC=$20EVTIMR1=$0210VTIM12=$0211VTI}MR2=$0212VTIM22=$0213VTIMR4=$0214VTIM42=$0215OLDROW=$5AOLDCOL=$5BOLDCL2=$5CTXTROW=$290TXTCOL=$291T}XTCL2=$292LMARGN=$52RMARGN=$53SCRFLG=$2BBRAMSIZ=$2E4CHAR=$2FACDTMV1=$0218CDTM12=$0219VVBLKI=$0222V}VBLI2=$0223VVBLKD=$0224VVBLD2=$0225ATACHR=$2FBAPPMHI=$000ESOUNDR=$41DSTATS=$0303DCOMND=$302DUNIT=$3}01DBUFLO=$304DBUFHI=$305SSFLAG=$2FFSHFLOK=$2BEINVFLG=$2B6PRNBUF=$3C0PBUFSZ=$1EDSKINV=$E453DAUX1=$0}30ADAUX2=$030BDOSVEC=$0ADOSVC2=$0BDOSINI=$0CDOSIN2=$0DPOKMSK=$10BRKKEY=$11RTCLOK=$12RTCLK2=$13RTC}LK3=$14CDTMV2=$021ACDTMV2=$021BCDTMV3=$021CCDTMV3=$021DCDTMV4=$021ECDTMV4=$021FCDTMV5=$0220CDTMV5=$}0221CDTMF3=$022ACDTMF4=$022CCDTMF5=$022ECDTMA1=$0226CDTMA1=$0227CDTMA2=$0228CDTMA2=$0229VIMIRQ=$0216}VIMIR2=$0217VDSLST=$0200VDSLS2=$0201SRTIMR=$022BSDMCTL=$022FSDLSTL=$0230SDLSTH=$0231SSKCTL=$0232GPRIO}R=$026FPADDL0=$0270STICK0=$0278STICK1=$0279STRIG0=$0284STRIG1=$0285SHFLK=$02BEPCOLR0=$02C0PCOLR1=$0}2C1PCOLR2=$02C2PCOLR3=$02C3COLOR0=$02C4COLOR1=$02C5COLOR2=$02C6COLOR3=$02C7COLOR4=$02C8COLRSH=$4FDRK}MSK=$4ECOLCRS=$55COLCR2=$56ROWCRS=$54CRSINH=$2F0ATRACT=$4DDINDEX=$57SAVMSC=$58RAMTOP=$6AMEMLO=$0}2E7MEMLO2=$02E8MEMTOP=$02E5MEMTP2=$02E6CHACT=$2F3CHBAS=$2F4CH=$02FCICCOM=$0342ICSTA=$0343ICBAL=$03}44ICBAH=$0345ICBLL=$0348ICBLH=$0349ICAX1=$034AICAX2=$034BCIOV=$E456SIOV=$E459SETVBV=$E45CXITVBV=$E}462SYSVBV=$E45FOSRETN=$E474CLICK=$FCD8;---------Hardware Registers ---------HPOSP0=$D000HPOSP1=$D001HPOSP2}=$D002HPOSP3=$D003M0PF=$D000HPOSM0=$D004P0PF=$D004P1PF=$D005P2PF=$D006P3PF=$D007P0PL=$D00CP1PL=$}D00DP2PL=$D00EP3PL=$D00FM0PL=$D008SIZEP0=$D008SIZEP1=$D009SIZEP2=$D00ASIZEP3=$D00BSIZEM=$D00CGRAFP0}=$D00DTRIG0=$D010GRAFM=$D011COLPM0=$D012COLPF0=$D016COLPF1=$D017COLPF2=$D018COLBK=$D01APRIOR=$D01BV}DELAY=$D01CGRACTL=$D01DHITCLR=$D01ECONSOL=$D01FPOT0=$D200AUDF1=$D200AUDF2=$D202AUDF3=$D204AUDF4=$D2}06AUDC1=$D201AUDC2=$D203AUDC3=$D205AUDC4=$D207AUDCTL=$D208ALLPOT=$D208KBCODE=$D209STIMER=$D209RANDOM}=$D20APOTGO=$D20BIRQEN=$D20EIRQST=$D20ESKCTL=$D20FSKSTAT=$D20FPORTA=$D300PORTB=$D301DMACTL=$D400CH}ACTL=$D401DLISTL=$D402DLISTH=$D403HSCROL=$D404VSCROL=$D405PMBASE=$D407CHBASE=$D409WSYNC=$D40AVCOUNT=}$D40BNMIEN=$D40ENMIRES=$D40FNMIST=$D40FPBCTL=$D303PACTL=$D302E=$D407CHBASE=$D409WSYNC=$D40AVCOUNT=Nd M * @  $ % CC$$)%1 Udߥ$9%: !0 S$%} DD˙`  }J)Lr J  ((  p L ()   J}L= ( L 0q A    IB JC;? D W } LL  ` W )LA!  ߰")-݆ p" } $G@LL 08`Q")<2Q0 -G$Ș݆ UL# ; p8(()(0ʥ)NQ`}$GȘ݆LU )L ݆ L GȘ ݆LL )W>Z   HH)H }p h  hyhy D L> L JJ    ! LA*` BF}7'8  M HN H` 8 Z  \LdJJ!"! GFE@F (!L}EE !E^ ^ E E7EȩEdE/EȩE  D} .L }  ;F d  ;?F7F? ( .   Z D LL d } . D  L    p  E` , d)  D L) 0BM݊L݉} ML  N݆ L NLML [ TEqEHȱEqEh 0Gȹ G} HLL GɛL  LFREE SECTORS G) *Gȩ GȽG GȌ*jj >G} C8jJ3j2CD( C202C ԠBX` N 1? l LlD:RAMDISK}.COMLu L1 L ;LHL  T`  `8  ɐ     `TU } L ? .  t`GBJ ~DEHI B V0dV}QDEHI VF9 ,0 ,0 s0hhL  L` H hDHEh}DEL8HI4 0 HI,0 0  9 .G VLO},0 L4*IJ`llD1:AUTORUN.SYSNEED MEM.SAV TO LOAD THIS FILE.D8:MEM.SAV J y08 B|DEHI} V0 0`B;DEL`?<0LV`@ʆ v s? F0Ξ05: [ BDEHI} VY8 B V  @  /DE `E:D8:DUP.SYSERROR-SAVING USER MEMORY ON DISKTYPE Y TO }STILL RUN DOS B;DE J  (` 9 V⪍ ઍ  -}LLu ÝDEHILV 9 .l 9 .l  `` s$B BH}I|DE V BLV nB,DE JLV B V BLVDEIʩ BꭝLu } 3E:}DISK OPERATING SYSTEM II VERSION COPYRIGHT 1984 ATARI CORP.A. DISK DIRECTORY I. FORMAT DISKB. RUN CARTRIDG!}E J. DUPLICATE DISKC. COPY FILE K. BINARY SAVED. DELETE FILE(S) L. BINARY LOADE. RENAME FILE M. RUN AT ADDRES!}SF. LOCK FILE N. CREATE MEM.SAVG. UNLOCK FILE O. DUPLICATE FILEH. WRITE DOS FILES P. FORMAT SINGLEL !N'!}#"&))9(&*)/h)''-&؆莟R'S  vL/ˢ L }Insert DOS 2.0s, type Y Λx !}DEfHI 1莏#q! @ y0ɛ8A0,' ȅ 1 1ild! 1L!NO SUCH ITEMSELECT!} ITEM OR FOR MENU! 0 .z:*{}.|{ 1 0 0JB 18L%|DL!}%DIRECTORY--SEARCH SPEC,LIST FILE?[# 0 0 &|D3" 1L!NOT A DISK FILEN !B 1L!E# 1 !BD!}ED:}:1BJ|DE 1DEBHI 1 h0ߢ 0.!}  0?詛 1 y0YЛ 1 ;#L" ;#L! BL1TYPE "Y" TO DELETE...DELETE FILE SPEC!}COPY--FROM, TO?OPTION NOT ALLOWED739 FREE SECTORS COPYING---D1:COPY32.COMl# 0|D .L/%#!}##JB|DE 1BHID#E 1#0: B 1L!#͑### B 1#c$0SY"}S1}:## # # .#Ƚ# # 𩛙## 1,#PD#ELJ- <.BJD#E "}1 1HH 0hh|DL%1}:̳# L% #D#EL% 1 0 . .0O% 1L!WILD CARDS NOT A"}LLOWED IN DESTINATION 0 <.|K L :::: :Lr:::IEL[::i:iIIL[:`:i::i&$}::L:`L{:w:w: C`L:L: D8:MEM.SAV: 8| 9 '9`L:L: D:DUP.SYS:̩ 8&%} x:ɀL: '9`88 |9Y:X: '9L); D8:DUP.SYS; 8::88 9 '98? :`;WL`; 9&&}Ln; ` :Y;Y;L;L;)} Setting Up ATARI 130XE Ram Disk; 9L; ; -9  &'} L;D8:; :9 :Y;L