NETWORKER2% ' @]READ.ME.FIRSTP %" >t  Wp ;SWl ace, which would typically be either a dialup connection, or an Ethernet connection, such as connecting to your LAN through an Uthernet or Uthernet2 card. NetWorker2 also requires Hierarchic, and the Undo Manager, v1.0.2 or later to be installed. Copies of both are provided in the Archive folder. Installation - This is simplicity itself. Either run the Installer on the disk, and select which items you wish to install and where, or follow these step-by-step instructions: 1. From the NetWorker2 Archive folder, copy NetWorker2, and the NetW.Logs and NetW.Data folders to a working folder of your choice. Optionally you can just run NetWorker2 directly from the original Archive folder. You can delete the Undo.Manager folder and the Changes text file if you wish. 2. If you do not already have Hierarchic, or the Undo Manager v1.0.2 installed, copy Hierarchic to the CDEVs folder, and Tool132 from the Undo.Manager folder to the Tools folder in your System folder, and reboot. If you do not already have !Help! installed on your IIgs, copy the Help NDA, and the entire Help.Files folder, from the Help folder in the Archive, to the Desk.Accs folder in the System folder. If you already have !Help! installed, then just copy the NetWorker2 folder from the Help.Files folder in the Archive, to the Help.Files folder in the Desk.Accs folder. Running NetWorker2 Double click NetWorker2 to run the program. Alternatively, you can create an alias of NetWorker2, and put it on your desktop for easier access.  H H H^ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ,C ~ExpressLoadN'H,~directhG@,mainDH,>~direct?@,;mainNCopyright Apple Computer, Inc. 1987-1990 Apple IIGS Installer V1.2V1.00V1.10K{^"*)#Hh`h`````"hZ" ) `" 0BB1c0"   o   "  (" " ")` ^ 4"H"h ^"HH ^H " ;[j+hfhhjiH^H@^H"y :"""``"HH"h^h^^ɀ@jiHH^H"nn";E8H#``44````"h"᭍^H"9" ""᭍^HjiH"d^HjiH" I^H" 6" '"^HjiH", H *"hbhbh Haa"`>L@\XH LAbout the Installer...\VH .>L File \H LQuit\*QqH .>L Edit \DH LUndo\V*ZzH LCut\*XxH LCopy\*CcH LPaste\V*VvH LClear\H HH-" "HH-" "HH-" ""H"h*"`) 5V`-/%'13"E> +dHH^H "h7h9HH^H "hX`hZ`"a +֭0 0"A"H"h SCRIPT e ȾHJOV`-i/iHڭZ`HX`H"Z`HX`H (h\`h^`\`m- ^`m/-i-/i/0 0%)'+0 0;m%i%m''Hڭ9H7H"9H7H (hh m) m+ 0;;Ȁ0ȢH)Xh)R @3"V` 8 +*%)'+V` mV`1m%%m''Hڭ9H7H"9H7H (hh HHm1 m3Hڭ+H)H+" ȥ  55V` )e i eȀʭ9H7H "9H7H (hR`hT`Z`HX`H "Z`HX`H (h\`h^`T`HR`H^`H\`HV`:H"ozV`:H"R`T` 00`8` 1:SCRIPTS:^N+ " v l l l l l%e2>eKWe]ienznzI~~I v]a laO fbnbubzbEbJbObZb33333333 K^[ U'"HH"7"c:"="g:"="Ki:"``"lc:"="lg:"="~i:"``" "#,m^HH"o^)HH"q^)HH":"BB",d`0"HiH:"bb" HiH:"#b#b"0"+:"Y="D:"Y="m:"=" /+k ;[K,d`0HHU"i#H::H:" )@8qq8HHiHH ";" H H"(-0"."HHT"6"2 )(7"."HHT"6"+ ;i k( ( R2R2HH== "zHH""(" R2R2"11E R2R2 + 2 2Hbb"hiH#b#b"hiHHHHWHUH[HYH]HaH_H " hhip9H7H (h!h#V` HHHH "hH (hh 4ȷHHHH-- "hH (hh 4ȷHHHH^^mm2H 2H "hhdd `8` &f`1^d`HH""dd ,^P f` /,^p ,+HNs^s^"h Eк " v2 + U',d`06U"αHiH:"R2R2"iU"ιHiH:"__"3`^)u^  " "`<" > +`" >HHb`H``H "h``hb`M``R```i m\`m^` ^0^^>0"?"}AX"BR""C7k" @"X?8 $^9k" @"/D,8 $^&k" @"K8n> > >"?,d` U'6H > >"? > $h8`,>J 1,t8a>a>0>a>a>5>"H]>]>"h > $`Ozgw>>n( `" >`8H8H"ᜀ88`0>>^0`Reading Writing &OHH"HH<< "hX8 H" ] b H{,z80 {Hk8|8JHhhH &"h0 Ⱦhh08 +H {Hh8k 3H8H8 H88"` HH H0 : K&^^KK:Kȷ K K0 KK0 8K :ʈʎK0^ ^ ʎK0K KWH (hihi0K K0 J0K K08 0 J+ 88"8(F D +8M0 HKH0H HK#HHK)iiHڭ^H " hh +K K h KhK hhH (hihi0KK0 J 88"8!FD 88 +8A8!9"!9"!9 -98  v8x8v8KKh h0hKh 0h hh `8`8H8H (hh )~k,t80"?@88,t8"HH"8hKhK08HH"zKKKKRRHHZڭ^HHH "z +888H8H "ᭂ8H8H (hh 8H8H "ᭆ8H8H (h;;h;;*V,t8A*V)@$9^9^9" 9 n] R $^ P]*V@ +99999" 9e88e 88"888 +邏8989"988 +i99"S8 +c88HH^H "[9h]9 +.H (h8S9h8U9"@"888 +"S0^H^:^Ȁ^0^8^8" 888 +邕0h^08Q9"AW9"#Q9 S9iS9U9iU9W9"#Q9]9H[9H";e8e 8)ie8e 8 >W,t80"@"A R)<:0=:<:0)8m8):0::09^9^9" 9 n]*Vv99999" 9<:H<:H" G88 +Ă>,t80"@" X;88 +d; F;f;H;h;J;j;L;l;N;R;R;Z;;;" ;L888 +R̈́;R͂;R͂;R;R8nR" ;88 +邂l;" ;88 +]8R;R;͊;;8nRh;;;;;;;m;;;;m;;;;;;" ;88 +" ;88 +9^9^9" 91" @;E88 +,t80"A" ;88 +u,R S;;;;;;;" ;88 +9" ;88 +l;c" ;88 +;;<;;;;" ;88 +" ;88 +邴:H:H" G88 +݂D8 +;88 8 8 : 88"8&D88 +䪭8+ H8H88 h8h Ν8 ) 8 IH8 88H8H"HS" Sh(k,^PpY)X^)4)^)^ @^"H"hSH1"SS" " "" S" S" SSS S" S" SSS" S" S``;;;899999" 9" ;LM88 +˂9^9^9" 9;;;;" ;88 +邼" ;88 +邢9^9^9" 9" ;88 +Ђol;`99999" 9" ;88 +Ђ-9^9^9" 9" ;88 +Ђ;;;;;;;;R;R;;;;;;<99999" 9" ;LM88 +˂9^9^9" 9;;;;" ;88 +M" ;88 +39^9^9" 9" ;88 +Ђ`.V.V4W WVV)i8n4W W0.V̯V1.Va{)ߍ8Va{)͟8ۭ.VͯV0`08`),V`): 0::-32W0a{)Ȍ0W2W,V Ȍ2W0W݂6W)H6W,4W0=99.V.V9)H+"0: /08W:W8ȷ)_>8 )__ʊ h?>?>>?> K;8[' n)+' );i&'+hhhhhk-nnnnapppqpplppp p 5q q p bqU" bqS" Dw F sZڀYtYt iH H " pnn "pp&"F: nq"nn&"``` p p#ȥ%)d):8:Z iHȊzЈ ):ȀȥF qddH nq"hFi 8 < >>wB{iH"eiDHHHFH "h<w@H"h,< p8 iJJ)2 4 ȗ ȗȗHHHH2H 8 H "@HH "h(hȗ` p q` p#%ȗ q n`````` iH :::H:"`)` ` ppp` `""""`6"8"H"h) ,"`z{i HZ`zHHHZ iHcȷ`*HH"` p r rd Ls ]s H sh sH"h ur(ȷ) 0n`< p(ȷ 0HH"i,iH bq bq" ""`< pi,iHHH" bq bq "` 5q q< p bqU" bqS"De F: sZڀYtYt iH H " pnn "pp&" nq"nn&" De `{iH "`d< pDe  0  0`F De ͩ``:< pDe  De  H"h)  bqV"` ) t) AtCt``wutuGvuv# 0 30 3333331333333330 333303030333330 0 YUU  )vHd "zHHHHZH "hvhhh$ȷ kwkw)H vh)ww-wHI-wvhvCwwvswȷuwȷ:wwȷ:yw?wH"h)ޭୱ έЭҭԭ֭حڭ܂H chȷ󪈈ކ୅H chȷ } eΆР҆Ԡ ֆؠ چܥ8pI>ލ ΍Ѝҍԍ֍؍ڍ܍H chޗȥ󭅀H ch } e·Зҗȥԗ֗ȥؗ ڗȥܗ{i+;ik ;8[i8pI׭٭ AH chȷ񪈈׆٭H chȷ 8pIܭޭ AH chȷ񪈈܆ޭH chȷ dѧ)ͧ)ϥ8pIͅ˂υ˥8pI 0 % ɨ)ӥɨ)ե8apI 0 z8pI 0% 8 8apI 0 z8pI 0% 8 ɂ8pIтт х  % 8pI {i+;ik ;8[iߥeߠ8"z d 8pI  p8pIHH"|h8pIH"|h8pI0  "zߥeߠ8މ d "z{i+;ik ;8[i8ߥJߥeߥ8pI: "~8pI*"z"z"z: "~{i+;ik]nh`t`z` `R`n`4``ar {N^A+Qw AUYfbcgnbquubzbEbJbObZbx``=Bbb#bMqaR2R2= R2,R2=bV#b3-j^mCs^}R2_(%1)I=`Ube sw`Ec3-p96 %=U`1`Idam!!-#$K$$$$$%$&.&,/&7='^'-(8(R2J(m(_@)`)b)R2))#b*_*********+*`*`+a+(+(+k.+^+4+7V+Z+l++p++t++x+++d+`+d+++k-,jeL,Ze,,,,,,,-,)-,`-Ye-i5-A-A-kl-nep-xet-ex-e|-e-e-e-e-f-$f-8f-Bf-Vf-of-f-f-f-f-f-g-'g-=g-Lg-eg-{g-g-g-g-g-#h-Oh-ph-h-h-h-i...,/.7//:/J/>/b/B/z/V/`n/`/ta/Q0/10Y0A011i1i1Nj1j1j1{1+22-22O2%2Q221P3-323#24444444^5^5_\5_5^5^6&6h6>6v6`6D6~6666i7n7p7^z7^89)9_9B;:\;<:;<:;:;:=> =>1=>a.>aB>]>k>w>o>>>`>>?<?Ik)@kb@|?|@y@?@f?DAo?A^A8ABA8 BB9B8_B9B8B9CCCCCCCCCDC|iDkiD+D+DldD9oD9D3HDGE^F9PFGGhH3HI^I8YJ8J!9J!9L^L9L9L9M8=M9dMSM8MSN^N8@NQ9bNQ9O^&O9GO9RO9]O<:hOGOX;O;$P;IP;P;P;P^P9 Q@;1Q;mQ;Q;Q;Q;Q; R:RGpR8RSSSSSSSSSSSSSSST9 T9T;8T^CT9YT;sT;T^T9T;T9T9T;U^U9U;oU9zU9U;U^U9U;U;V^ V9V;DW.VWWVX9X.VbX8W]8]8]8^P<*^s^nnYtnnnpnnrYtsnsp-snAtwuEttItuMtGvQtuUtvwkwyswyvEyswKyv|ywy9wyswyvywUbqw} Uims~ +/FJau (+6KOZos+!&-18@DOSW[_cfkntz} CFS\behkntw{~  $(,/3>BFJNQUY]amv{{!%@JPTerv GJP[^dgk")/49@ORYhknt2 !(6AEJX_m| $,/2AOa{  &*59=D|!%37BEHLS]cguy"  #(+.19>DGOS^dos' 69CGMSV_jnqty| -03 u})-4?CFRUfnx #(+17EVY $-IMZ^ehl""&1>AGQU`cgk~"$'*/@CFNQTWfilt|  #'+ov~'08;>ADGJNR[^ag{~0 !$036>ADJMTW_irz 1:=H]aehorv|) *158;>ADIUX]behkpsvy|  #/ALUkpw~ .1;LQjmp & *036:EIMVZeimqtx{" !$,/25DGJRZmsv ).18HNQWZgk,03>ADJWZ`oru}/ +.19PSV_bfinrx~&#8;>FKSVY\_betwz "%6=@EOch|.4GTW!!$'/25;HKNQ`cfz}/ "%(0369>t   p * Zcfghijklmnopqrstuvwxyz{|}~nop in advance -- please contact via email by sending mail to: spectrumdaddy@speccie.uk There is no guarantee that the right to redistribute this material will be granted. The contents of this document may not be reprinted in part or in whole. Credits My thanks go to Andrew Roughan for his forbearance as I tried to make various obscure Marinetti calls work for me. Contents Preface Welcome to NetWorker2 Welcome An Internet exploration tool Setup NetWorker2 - Internet Explorer Requirements Installation Legal Contact What does NetWorker2 do? The Menus Apple & File Menu Edit Menu View Logs Net Commands Preferences Set Preferences Functions Using NetWorker2 Ping Lookup Traceroute Whois Port Scan Explorer Explorer examples Edit Command Files Extras Common Ports RFCs Help Problems Other Information Preface Welcome The Internet is a much misunderstood system. It was original conceived as a way to seamlessly connect different terminals running on different operating systems, and so was designed to be failsafe and as foolproof as possible to program and use. Underneath the surface, the Internet is in the main controlled by simple text commands, which are normally invisible to the user. An Internet exploration tool Why a new Internet tool? It was at KFest '96 when I first realised that underneath all the bells and whistles of your friendly web browser, email, or file transfer program, the Internet actually operated by means of an interchange of commands in plain English text. Your local computer sends out the text commands, and receives corresponding text responses from the target host. This simple concept opened up a whole new set of possibilities for my programming skills, and for instance, enabled me to use the existing Spectrum scripting language to build the many now historic applications that could be plugged in as scripts to Spectrum itself. The first of these script sets was Spectrum Internet Suite (SIS), for which Geoff Weiss wrote the scripts, and I wrote the HTML display engine. I think it was the first more or less WYSIWYG web browser to be produced for the IIgs. The first version of SAFE was also built as a Spectrum script set, along with its companions SAM and COG. Both SAFE and SAM have since gown up into stand-alone applications. The original Networker application was written as a tool to let you explore the Internet manually, letting you send text commands, and see what was being returned. As such, it only had a narrow audience, so I have decided to bring it up to date as NetWorker2, and in addition to the original split window Explorer function, add Ping, Lookup, TraceRoute, Whois and Port Scan functions. To avoid confusion with the original application, NetWorker has now been renamed as the more comprehensive NetWorker2. You may be a developer who wants to try out internet commands before you start writing an application, you may just be curious as to how the internet works, or you may want to lookup information using the other functions. Whatever your interests, I am sure at some point you will find Networker2 a useful tool. Check out some of my other contributions to the IIgs family on my web site: http://speccie.uk NetWorker2 is Freeware and Copyright (c) 2008-2018 Ewen Wannop NetWorker2 - Internet Explorer Setup Requirements You will need either a real IIgs, the emulator Sweet16 (3.0 or later), or an emulator that supports Marinetti 3.0. You must be running System 6.0.1 or 6.0.4, and have Marinetti 3.0 or later installed. Marinetti must be configured for your internet interface, which would typically be either a dialup connection, or an Ethernet connection, such as connecting to your LAN through an Uthernet or Uthernet2 card. NetWorker2 also requires Heirarchic and the Undo Manager, v1.0.2 or later to be installed. Copies of both are supplied within the Archive folder. To obtain NetWorker2, and the UNDO Manager, or if necessary an Uthernet or Sweet16 Link Layer, as well as any of my other software: http://speccie.uk To obtain the latest version of the Marinetti TCP/IP stack: http://www.apple2.org/marinetti/ To find out about, and order an Uthernet card: http://www.a2retrosystems.com/ Installation This is simplicity itself. 1. From the NetWorker2 Archive folder, copy NetWorker2, and the NetW.Logs and NetW.Data folders to a working folder of your choice. Optionally you can just run NetWorker2 directly from the original Archive folder. You can delete the Undo.Manager folder and the Changes text file if you wish. 2. If you do not already have Hierarchic, or the Undo Manager v1.0.2 installed, copy Hierarchic to the CDEVs folder, and Tool132 from the Undo.Manager folder to the Tools folder in your System folder, and reboot. If you do not already have !Help! installed on your IIgs, copy the Help NDA, and the entire Help.Files folder, from the Help folder in the Archive, to the Desk.Accs folder in the System folder. If you already have !Help! installed, then just copy the NetWorker2 folder from the Help.Files folder in the Archive, to the Help.Files folder in the Desk.Accs folder. Note: These files may be updated with each release of NetWorker2. Legal NetWorker2 is Freeware, and may be distributed freely, provided the archive stays intact, no alterations are made to it, and full attribution is always made to the author Ewen Wannop. NetWorker2 may not be sold in any form, but may be included in other distributed archives, provided you first seek my permission. Contact For any communication relating to SAFE2, for bug reports, or for technical support, please contact: spectrumdaddy@speccie.uk For my Home Pages, Spectrum updates, Spectrum itself, and all my other software: http://speccie.uk/ What does NetWorker2 do? NetWorker2 consists of six functions, Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. Ping checks how long it takes for a packet of data to get to a target host, and an acknowledgement is returned. This is a measure of how fast or slow a particular connection may be, and when multiple servers are available, is useful for diagnosing which server is fastest. Lookup returns the named URL for a dotted server address, or the dotted address for a named URL. Normally this is done internally as a DNS lookup in an application whenever it asks for a destination address. Traceroute steps through all the many nodes your packets will take to get to the host server. At each step, a response time is given, and the name of the node is displayed. Whois looks up a URL and returns registry information for that address. As not all domain names may be linked to a particular registrar, there is a choice of six different registrars to choose from. Port Scan checks which ports are open on the target server. This gives an indication of how secure that server may be. Explorer is the function that was the core of the original Networker. You will see two windows when you select this function. You can open a connection to a host in either window, and you will see in that window what you send, and what you receive displayed as a scrolling text display. The bottom window can also open active as well as passive ports, so if you plan to explore an FTP server, you can use the bottom window as the data port, while the top window would be your command port. To make it easier to issue repetitive commands, you can build text command files that will display as an hierarchic command menu. Examples are supplied that talk you through opening an FTP link to the asimov.com site, and a web link to www.apple.com, and a connection to the Giganews Usenet server. Other internet services, such as POP3 and SMTP, can also be accessed with the appropriate commands. Refer to the pages below, and the associated RFCs for more details on how to do that. Menus The Menus Apple Menu About NetWorker2 File Menu Net Info Functions > Ping Lookup Traceroute Whois Port Scan Explorer Connect TCP/IP Disconnect TCP/IP Save Text As Save Selection As Quit Edit Menu Undo Redo Cut Copy Paste Clear Select All Clear Top Clear Bottom Clear Text Set Preferences Edit Command Files View Logs Menu View Top Log View Bottom Log View Log Net Commands Menu One > Menu Two > Menu Three > Menu Four > Apple Menu About NetWorker2 Opens a small window showing the NetWorker2 Version number. Click anywhere on the window to close it. File Menu Net Info Displays a window that shows the local IP Address, the last Host IP address and Ports accessed, and the primary and auxiliary DNS addresses with their descriptive domain names. Functions > There are six functions available from the Functions sub-menu. These are the core functions of NetWorker2: Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. Please refer to the relevant sections below for more details on how these functions work, and what they do. Connect TCP/IP & Disconnect TCP/IP The state of these two menu items will depend on whether Marinetti is currently connected or not. If you have a permanent connection to a LAN, or the Internet, then you will probably have already configured the Link Layer in Marinetti to connect at boot. If however you are using a dialup connection using the PPP or SLIP Link Layers, then you may have told Marinetti to only connect on demand. At any time, you can toggle your TCP/IP connection with these two menu items. If you are currently connected to a host, you will be asked to confirm that you wish to disconnect from the host before TCP/IP can be disconnected. As NetWorker2 will automatically connect TCP/IP when needed, and as additionally you can tell NetWorker2 in its preferences dialog to always disconnect TCP/IP when you close a host connection, you may not ever need to use these two menu items. Save Text As If there is text in any of the active TextEdit windows, this will let you save the entire text from the window to a file of your choice. Save Selection As If there is selected text in any of the active TextEdit windows, this will let you save the selected text from the window to a file of your choice. Note: A Teach file preserves the coloured highlighting of any commands you have sent using the Explorer function Note: The optional log file saves text in a different format, with markers to show what has happened. It saves all sessions as a sequential file. Quit When you are finished exploring the Internet, this will close all open connections, optionally disconnect TCP/IP, quit NetWorker2, and return to the Finder. Edit Menu Undo, Redo, Cut, Copy, Paste, Clear & Select All These seven commands are active in the LineEdit controls that are used for setting up URLs etc. in the various Functions and dialogs, and also in the Edit Net Commands editor window. They use the Undo Manager to handle the Undo and Redo options. Clear Top Clears the text from the Top window of the Explorer function. It is immediate, and you will not be asked to confirm this operation. Clear Bottom Clears the text from the Bottom window of the Explorer function. It is immediate, and you will not be asked to confirm this operation. Clear Text Clears the text from one of the five Ping, Lookup, Traceroute, Whois, and Port Scan function windows. It is immediate, and you will not be asked to confirm this operation. Set Preferences Sets up the various Preferences for NetWorker2. Please refer to the pages below for more details on how to use the Set Preferences options. Edit Commands File Allows you to edit the Command Files for use with the Explorer function. Please refer to the pages below for more details on how to use these files with the Explorer function. View Logs NetWorker2 optionally keeps Log files from the data you will see in the main windows when you use one of the six functions. These files can be viewed later from the three menu options. The entries in the log file are time and date stamped, so you can easily follow the sequence of events. If you press the Clear Log File button, after confirming you want to Clear the text in the file will be cleared, and the View window will be closed returning you to the current Function. View Top Log This displays the log file from the Top window of the Explorer function. View Bottom Log This displays the log file from the Bottom window of the Explorer function. View Log This displays the log file from the Ping, Lookup, Traceroute, Whois, and Port Scan windows. Net Commands SAFE2 allows you to set up multiple Command files for use with the Explorer function. If these files are correctly structured, they will display in the four sub menus as menu items, listing the commands that you have created. Sample files are provided with NetWorker2. Please refer to the pages on Net Commands below, for further details on how to edit and use these files. Menu One > Menu Two > Menu Three > Menu Four > Preferences Set Preferences Hang up on Disconnect if checked, will automatically Disconnect after each function has been completed. If you are using an always connected Ethernet connection, you may wish to leave this box unchecked. Override default DNS servers if checked, will use the Main and Aux DNS servers set in the two LineEdit boxes instead of the DNS servers set within the TCPIP Control Panel. Keep Data log files if checked, will keep the extensive data returned from the Ping, Lookup, Traceroute, Whois, and Port Scan functions in the NetWG.Log file. This file can be viewed using the View Log menu command. A timed record of ports being opened, commands you send, and responses from the host will be kept. Note: At the turn of each month, the log file file will be renamed to show the month and year it was created, and a fresh log file will be started. Keep Explorer Data log files if checked, will keep the extensive data returned from the two windows of the Explorer function in the NetWT.Log and NetWB.Log files. These files can be viewed using the View Top Log and View Bottom Log menu commands. A timed record of ports being opened, commands you send, and responses from the host will be kept. Note: At the turn of each month, the log file files will be renamed to show the date they were created, and a fresh log file will be started. The files will be renamed as NetWG.Log.MonYY, NetWT.Log.MonYY, and NetWB.Log.MonYY. Mon represents the month and YY the year that the file was created. Limit incoming data to Explorer display and log files The default setting is for all the data that is generated to be displayed and saved within the two Explorer windows and log files. As a great deal of data may be returned from the Explorer function, if a value between 1 and 65535 is given in either the Top window or Bottom window LineEdit boxes, displayed and saved data will be limited to the sizes given in the boxes. A value of 0 will keep all data. Main DNS Server If Override default DNS servers is checked, the Main DNS Server address supplied in this box will be used instead of the default Main DNS server supplied in the TCPIP Control Panel. Aux DNS Server If Override default DNS servers is checked, the Aux DNS Server address supplied in this box will be used instead of the default Aux DNS server supplied in the TCPIP Control Panel. Note: The default addresses supplied by the NetWorker2 application are for the public Google DNS servers. Paths for Explorer Command files To give you greatest flexibility in using the Explorer function, you can keep multiple Command files that build the hierarchic Command menus. Any four files may be in use at the same time. Enter the full path in the four boxes, or Set a file using the standard file dialog. Functions PING Ping sends a Ping command to Port 7 on a target server. If the server responds, then the time that was taken for the response to get to the server and return will be displayed. By sending a multiple number of Pings, you can see how stable the connection to a target host server is. A maximum of 9999 Pings can be sent. Note: Not all hosts may respond to the Ping command. If you get no response after a few seconds, click the Stop button to cancel the request. Note: The IIgs internal clock has an accuracy of 1/60th of a second, so displayed response times will not be as accurate as if the same command was used with a modern computer. Lookup Lookup uses the assigned DNS servers to either return the dotted IP Address for a named server, or the the server's domain name from the dotted IP Address. This is the same function that an application will use when making a connection to a target server. Note: As many dotted IP Addresses may point to the same domain server, a reverse lookup with a dotted IP Address that was returned from an initial domain lookup, may not always return the same domain address. The example above, shows forward and reverse lookups for google.com, apple.com, and juiced.gs. You will see that the domain name on the reverse lookup is not always the same as may have originally been given for a domain name lookup. Traceroute Traceroute shows you the path that your data is taking to get to a host server. Although you may make a direct connection to a server, your data will hop its way across several nodes on the Internet to get to its destination. The dotted IP Address, and the domain name of the server for each node is displayed, along with the response time to get to and from that node. Along with Ping, Traceroute is a useful diagnostic to help you decide which server is the fastest for you to use when you have the choice of multiple servers. Note: The IIgs internal clock has an accuracy of 1/60th of a second, so displayed response times will not be as accurate as if the same command was used with a modern computer. Note: Due to how TCP/IP interfaces with a computer's network when NetWorker2 is running within an emulator, both the Ping and Traceroute functions may not actually work correctly with an emulated IIgs such as Sweet16, as the computer tends to change the packets on the way through. For both these functions, you will be asked if you wish to Continue to see if it will work, or to Cancel. If however you select Don't Ask, it will Continue, and you will not be asked the question again. Whois Whois looks up a Whois domain registry entry for a supplied IP address or domain name, and returns the information for that name. As a domain name might be registered in any one of a number Whois registries, a popup menu lets you choose between seven of the main Whois registries. Alternatively, you can enter a different Whois domain registry in the LineEdit box to the right of the popup menu, and select Alternative Whois server" from the popup menu, to use that one instead of one of the popup menu choices: You can find lists of further Whois registries here: https://www.icann.org/resources/pages/listing-2012-02-25-en https://www.nirsoft.net/whois_servers_list.html Port Scan Port Scan scans for open ports on a target server. This is most useful for checking computers on your own LAN (Local Area Network), to see which ports are open, and so which might be vulnerable to attack. If you do not define the range of ports to scan, all 65534 possible ports will be scanned. This may take a very long time indeed, so press the Stop button if you have checked enough ports. Note: If checking ports on an external server, be aware that too many port scans, may result in the server thinking they are under a DOS (Denial Of Service) attack, and shut you out, or blacklist you. Explorer Explorer is the Internet exploring function, that was the substance of the original NetWorker application released back in 2008. The structure of the original application has not been altered in the Explorer function, other than to increase the command file menu items to four, and to support the Undo Manager. How to Use Explorer Explorer lets you open a port to a host to which you can send text commands. This is very similar to a Telnet session. The Internet actually is controlled by text commands, to which a host may return either a numbered and informative response, or data that may have been requested. Sometimes the data will be sent back through the same port that the command was initiated from, and sometimes, as in the case of an FTP session, through a second port that is opened as needed. To initiate a connection, you must first open a port to the target host in the URL LineEdit. You will need to specify the URL for the host, and the port you wish to open. Once the port has been opened, you may see data being sent back immediately from the host, perhaps to welcome you, to tell you what parameters it needs, or you may see nothing, and have to initiate commands yourself to get things going. There are no hard and fast rules, but certain types of connection do usually require the same sequence of events. The session windows: Both windows have the same main elements, with the addition of an Active button in the bottom window. Reading from top to bottom, and left to right, we have the URL LineEdit entry box. Port LineEdit entry box. Active button (bottom window only). Three traffic light buttons, red, amber, and green. TextEdit display box for responses. LineEdit Command entry box. Square green start button. To make a connection, type the URL in the top LineEdit entry box, and the target port in the Port LineEdit entry box. Alternatively, you can add the port number to the URL, separated by a colon like this: ftp.apple.asimov.net:21 Note: If a port number has been added to the URL, Networker will ignore any number in the LineEdit Port entry box. Click the green start button for the window to initiate a connection. If the connection is successful, the traffic lights will change from red to amber to green. Once you are connected, you can type valid commands in the Command entry box, pressing the green start button to send the command. You will see your commands echoed in red in the Display box, and any responses from the host shown in black. Note: If you have selected a command from the Net Command Menu, and it used one of the C control commands, the command will start automatically without the need of pressing the green start button. To close a connection, click any of the traffic light buttons. The lights will change from green to red. If the host closes the connection, you will see the traffic lights automatically change to red. Active and passive ports: When requesting data in an FTP session, you must open a second port to receive the data. The bottom window has been designed to make this easier for you. There are two ways to open a data port, either by requesting a URL and port number from the host by a PASV (passive) command, or by opening an active port at your end, and telling the host the URL and port number to connect to. Some firewalls may not allow active ports to be opened. Opening a passive port: If you send the PASV command to a host, it will respond with a message such as this: 227 Entering Passive Mode (198,202,148,2,150,86) The first four numbers within the brackets are the IP Address of the port, and the last two numbers are the port number itself. If you have issued the PASV command from the top window, simply click in the number within the brackets when it is displayed, and click in the bottom URL LineEdit box. Networker will then automatically parse the number, transfer the IP Address and Port number to the bottom window, and open the port. Typically you would then issue an FTP LIST or RETRieve command, after which you should see the resulting data displayed in the bottom window. In most cases, you will then see the port for the bottom window close automatically once the data has been received. Opening an Active port: To open an Active port, you must first have a port opened in the top window, and be ready to send a PORT command to the host. Click the Active button in the bottom window, and a port will be opened in listening mode, and its IP Address and port number will be parsed and sent by means of a PORT command through the top window port. Typically you would then issue an FTP LIST command, or a command to RETRieve a file. Refer to the Examples section for further details. Examples: Three command files have been provided to get you going, and show you how Networker is used in practise. The first example connects to an FTP server, retrieves a directory listing, and then retrieves a file. The second command file connects to a web server, and retrieves the Index page. The third connects to a Usenet server, and retrieves two group headings. You will find these three examples displayed in the Net Commands Menus. Descriptions have been added to the menus as dimmed items. They are not displayed in the examples below. (Commands1.txt) Command file connecting to an FTP server: 1. {MBIV}FTP Commands: 2. {C*}ftp.apple.asimov.net:21 3. {C*}USER anonymous^MPASS anon@somewhere.com^MCWD /pub/apple_II^M 4. {C*}TYPE A^MPASV 5. {C*}LIST 6. {C*}TYPE I^MPASV 7. {C*}RETR site_index.txt 8. {C*}QUIT^M Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to Port 21 (FTP) of the Asimov server using the top window. This opens a command port to the FTP server. Nothing will appear on screen once the green traffic light shows you are connected, though with some servers you may get a welcome message. Line 3 - Logs in to the server and moves to the target folder. There are actually three commands within this command line, noted by the ^M separators. The ^M is translated by Networker into a line break. The first part issues the USER command, with anonymous as the name. The second part issues PASS with a pseudo email address as password. The third part issues CWD to change the working directory to /pub/apple_II. Line 4 - To list a directory, we must first open a second port to receive the data from the listing. This command is in two parts, the first part sends TYPE A to tell the host to send only text data. The second part sends PASV, to ask for a port to be opened to send that data. The host will respond with a message saying it is entering passive mode, and gives the IP address and port number for the port it has opened. Click anywhere in the IP Address within the brackets when it is displayed, and then click in the bottom URL LineEdit box. Networker will automatically parse the IP Address, transfer the IP Address and Port number to the bottom window, and open the port. You will see the bottom traffic light go green, showing it has connected and is waiting for data. Line 5 - Sends the LIST command from the top window to request the current directory to be listed. You should see the directory listing appear in the bottom window, and the bottom traffic light turn to red as the host closes down the passive port after the data has been sent. Line 6 - This is another two part command, first telling the host we want binary data by sending TYPE I. The second part again asks for a passive port, by sending PASV. As before, click anywhere in the IP Address within the brackets when it is displayed, and then click in the bottom URL LineEdit box. Networker will automatically parse the number, transfer the IP Address and Port number to the bottom window, and open the port. The bottom window should again show the green traffic light. Line 7 - We now need to send a retrieve command, to tell the host to send the target file to the port we opened in the bottom window. This command sends the RETR command with the target filename. You should see the data from the file appearing in the bottom window. Note: Be wary of retrieving large files, as you might overrun memory space, unless you have limited the display of incoming data to the windows and log files as described in the Set Preferences section. Line 8 - You can always shut down a session by clicking the traffic light buttons, but some servers, such as FTP servers, like to be closed down cleanly by a QUIT command. In fact clicking the traffic light buttons, will send a QUIT for you. You should see the traffic lights for the top window turn red when the Port is closed and you have disconnected. Note: You will see commands you send to the server displayed in red on screen, with any returned data displaying in black. Connecting to an web server: 1. {MBIV}Web Commands: 2. {C*}ozkfest.net:80 3. {C*}GET /index.html HTTP/1.1^MUser-Agent: Mozilla/2.0 (Compatible; NetWorker2 2.0; IIgs)^MHost: ozkfest.net^MPragma: no-cache^MAccept: */*^M^M (Commands2.txt) Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to port 80 (web) of the ozkfest.net web server. The traffic lights will go green, but you will see nothing on screen at this point. Line 3 - This is a complex command line split into four parts. The GET command in the first part, instructs the server that you wish to retrieve the pages using HTTP 1.1 protocol. In the absence of a path, which may optionally including a target filename, the host will return the Index.html file for the root directory. You could optionally have included a folder or a full path such as this: GET /afile/ or GET /afile/home/styles/itunes.css The second part tells the server the name of program communicating with it. The server can use that information to tailor its responses if it wishes. The third part sends the base URL of the target server. The fourth and fifth parts tells the server to send the latest version of the file. After sending this command, you should see the HTML text for the Index.html page returned and displayed in the top window. Note: Web servers expect you to simply close the connection when you are done. Click the traffic lights to do this. Note: You need to send a double 'return' at the end of the command line requesting the page. Connecting to a Usenet compatible NNTP news server: 1. {MBIV}Usenet Commands: 2. {C*}news.giganews.com:119 3. {C*}AUTHINFO USER loginname^MAUTHINFO PASS password^M 4. {C*}GROUP alt.binaries.multimedia.classical.vocalmusic 5. {C*}HEAD 1735 6. {C*}GROUP alt.binaries.nl.motorfiets.ducati.nospam 7. {C*}ARTICLE 1737 8. {C*}QUIT (Commands3.txt) Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to port 119 (NNTP) of the news.giganews.com news server. The traffic lights will go green. Line 3 - Login to the news server first sending the user name, and then the password. Line 4 - Select the group alt.binaries.multimedia.classical.vocalmusic as the target. Line 5 - Return the header for message number 1735. Line 6 - Select the group alt.binaries.nl.motorfiets.ducati.nospam. Line 7 - Request article 1737 to be returned. Line 8 - Quit and close the connection. To use this command file example, you may wish to change the address and port to that of your own news server in Line 2. You will also need to change loginname and password to those of your news server account. Edit Commands File Selecting this menu item, allows you to open a file that will be used for one of the four Command menus, and so create or edit the commands within that file. You can optionally Save As the edited text to a new file name, thus allowing you to create more files as needed. If you create a new file, and wish to make it active in a Net Commands menu, you will have to go to the Set Preferences command and select the new file for use within the desired Net Commands menu. Note: As saving new file, may change the contents of one of the Net Commands menu files, the two menus will be redrawn to reflect any possible changes. Essentially a Commands file is just a way of letting you easily enter repetitive or complex commands that you might wish to send to either of the two windows. Examples are given in the default files for accessing an FTP server, and a web site. You will have to refer to the Internet RFCs for more details on any other type of Internet service you may wish to use. To let you control how the menus look, and how the commands operate, you may precede each entry with a control string. You may also embed a ^M to give a carriage return break within a command string. The control strings are constructed in this way: {B} = menu displayed in Bold {I} = menu displayed in Italic {V} = menu displayed with a dividing line {D} = menu dimmed and disabled {C(character)} = displays the character to the left of the menu description {M} = display as menu item only, any command on the same line is ignored There are two special instances of the C control: {C*} = send the command directly to the top window {C+} = send the command directly to the bottom window Note: You can use more than one of these controls within the control string. Note: Refer to the example files supplied to see how these commands work in practice. Note: The last line of the file must have a return as a line end. View Top Log and View Bottom Log Opens one of the two Explorer log files. You can view the sessions that relate to that window, and select and copy text to the clipboard. No other editing is allowed. If you wish to edit the files further, use a word processor such as Teach or Hermes. View Log Opens the log file for the Ping, Lookup, Traceroute, Whois, and Port Scan functions. You can view the session that relates to those functions, and select and copy text to the clipboard. No other editing is allowed. If you wish to edit the file further, use a word processor such as Teach or Hermes. Net Commands Menu: Menus One & Two These menus are displayed from the contents of the four files you selected in Set Preferences. The default path for the four command files is Commands1.txt, Commands2.txt, Commands3.txt and Commands4.txt in the NetW.Data folder. With the cursor active in the required box, select an item from either of the four menus. It will either be entered into the box, or sent immediately, depending on the contents of any control string in the line. See 'Edit Commands File' for more details of the possible controls: {M} = ignore this menu entry {C*} = send the command directly to the top window {C+} = send the command directly to the bottom window Note: Long commands will be truncated within the menu display, but will be correctly sent to the target window. Extras Common Ports: FTP = 21 Web = 80 Usenet (NNTP) = 119 POP3 mail = 110 SMTP mail = 25 RFCs (Request For Comments) You can get RFCs that describe how the internet works from many online sources. This is a good start: http://www.rfc-archive.org/ Specific RFCs: FTP: RFC 959 Web HTTP: RFC 2616 Usenet NNTP: RFC 3977 SMTP Mail: RFC 5321 POP3 Mail: RFC 1939 Help Online Help is available if you have installed the optional !Help! desk accessory, and its Help files, to the Desk.Accs folder. Problems Hopefully you will have none, but if you do, and they cannot be answered by reading these notes, please contact me on: spectrumdaddy@speccie.uk Other information Check for the latest version of Marinetti: http://www.apple2.org/marinetti/ If you do not already know about Spectrum, please drop by my home pages, and read more. Apart from all the other wonderful things it does, Spectrum offers many useful tools for processing files, such as post processing text files that you have received, that may have obstinate formatting. Spectrum is now Freeware, and amongst my other applications, is now available from my web site: http://speccie.uk Someone once said to me, 'Spectrum does everything!' NetWorker2 (c) 2008-18 Ewen Wannopd   DDDDDD; $ xv x lE ls l> l l l? xlz l $ $E 'x l $? !$2 $ x ? x< xg $T $ xb  y  o  x l  : J l`xk l  #f  m   l 1   l L O ` l xl   )  C ( 5   f  xl <        ; q$   0 l`  _ $    ] 00  X 0` 0 x  0 00 q Z 3 0h l  0 J T @ l l/ %l  0 n xlH ln 0v x x 0 x2 "0 09 "xNETW.DATAv% ' ['COMMANDS1.TXT|E% E% COMMANDS2.TXT# # COMMANDS3.TXT%8%7FINDER.DATAɷp( p% *NETW.PREFSB % % {MBIV}FTP Command example: {MD}Open port to host {C*}ftp.apple.asimov.net:21 {MD}Send username and password {C*}USER anonymous^MPASS anon@somewhere.com^MCWD /pub/apple_II^M {MD}Set up for directory list {C*}TYPE A^MPASV {MD}Ask for directory listing {C*}LIST -a {MD}Set up for file transfer {C*}TYPE I^MPASV {MD}Retrieve for file {C*}RETR site_index.txt {MD}Close port {C*}QUIT^M {MBIV}Web Commands: {MD}Open port to host {C*}ozkfest.net:80 {MD}Ask for Index page {C*}GET /index.html HTTP/1.1^MUser-Agent: Mozilla/2.0 (Compatible; NetWorker 1.0; IIgs)^MHost: ozkfest.net^MPragma: no-cache^MAccept: */*^M^M {MBIV}Usenet Commands: {MD}Open port to host {C*}news.giganews.com:119 {MD}Send username and password {C*}AUTHINFO USER loginname^MAUTHINFO PASS password^M {MD}Select a group to look for messages {C*}GROUP alt.binaries.multimedia.classical.vocalmusic {MD}Get heading for article 1735 {C*}HEAD 1735 {MD}Select a group to look for messages {C*}GROUP alt.binaries.nl.motorfiets.ducati.nospam {MD}Get heading for article 1737 {C*}ARTICLE 1737 {MD}Close port {C*}QUIT Q>j0Y* COMMANDS1.TXT3 COMMANDS2.TXT : COMMANDS3.TXT@  NETW.PREFS9:NetW.Data:Commands1.txt9:NetW.Data:Commands2.txt9:NetW.Data:Commands3.txtNETW.LOGSv% ' ['FINDER.DATAɼcE% p% NETWB.LOG+% % NETWG.LOG,% % NETWT.LOG(% % 'gf09*B NETWG.LOG NETWT.LOG NETWB.LOG*** NetWorker2 Dec 2018 Bottom Logfile *** *** NetWorker2 Dec 2018 General Logfile *** *** NetWorker2 Dec 2018 Top Logfile *** L'ppdos!R>U,C ~ExpressLoadU  ,E Main 0E Main K{|;|"el" cl"H"h "VH"h| |""HH|H "h|h|"* _lal݆ ('||   |H"h|6" 6" ݆ (H'H6"hH6 "hF}t-# R>HHH^HHHzHZ\   6T" |" . (&"H"hH"hԭF}) ;<|6"" Zn" jnn nB 0HHnHnH|H "hh HH "  nnnnnn" n^nnem" n" cm(=n͎n5 1͠q* HHqnHnH)" HH" HH"" n qU (" n}|H"HH)"hh   H H9")" )H+"HH"h|h|HHC""9""H"h " tH \ ($|H"HH""oJ;z=Z "HH"oJ7z9Z$ " RQ"H"h*" U>|^}YJ}".} -=} } i4 706""R} :&L}!.} -=} } &6 E16""HH | H+H?d"h0  K|H,"|*"P  8 |H " 8| N8| O8| O8| O%.<<'U))33J]]`f#gg]h-ij)n3`| | | | } }}}""᭼} } } }% 0"᭼}}}} 0"` 1" 1"`Hڼ0 H0"H1"h"ۭ|l |l| |D}H8|H |"hD}l|l |`{HH"h0|)|| |x}8}G` A{X"` "᜼||}|H|HCu;"u)u+"H|H|HY="hIq|H|H[|;"|))H||)H ("hq,""`HH|H|HX0""HH|H|HK0"h|h| 4F}) ;< < >*HH|H|HX0""ᠶ }f}}h} }N}}P} qUHH|H|HX0""HH|H|HX0" "||}}}}d} DH|H}H }H`}H@6#"h].} &3H}H }Hlj6X" lj 7}|H|H"" 2 {FHH|H|HN1"h.}H|H6*"|HH%"h}h }6""HH:|5d"h|H,"N |}>6""H.}H6+"h}|Г}HH%"h"}h$} }m{}}m{} 00 sec | dH &"{H{H '"{ HHi H &" +" &3)}|H|H"" 2 D|'|q͸qW,".} w= " ;=LNy{ .}00|d HHi;H &"}d HHiLH &"HHHH}H}H}H "h{h{h{h{HHHH{H{H "h{h{hHHd "hHH "h{z{H{Hy '"{d HHiH &" &30W}|H|H""}|H|H""}|H|H"" 2 F D}H}H|H|H"%"HH|H|HN0""HH|H|HN0" "HH|H|HX1"hHH|H|HK0"(" U> A"`8"}}{$} }{2HHHHH "h{h{hHH "hHH "h{z` A{E"` "᜼||H|HCv;"v)v+"HH|H|HE0""HH|H|HB0"h|h|F}) ;< < > ,"; }f}}h} qU|6"|N}|P}}+ +" D v Ȋv - ȩ> ȌH}H }HHi H6X"hm &3 H}|H|H""}|H|H"" 2 E?N} }P}}5} s@.}J}:} D G+ +" v v - >  Ɂh 0j} &||ȷ  |||. |ʎ &3 H}|H|H""}|H|H"" 2 E}H}H"," ".} w= DHH|H|HE0""HH|H|HB0"(" U> A"`H f}Hg}Hh}Hi}H 6X"h|0 .ڮ| ||ڮ| E 0 +"W  +"H"h j}:}H )i Hi j}6&"HH:| d"h<|. H|)|}8`6""H:}H6'"h6""HH:}H6("h}h}}H}H "᭲}}  ` A{F"` "᜼||}|H|HCw;"w)w+"HH|H|HF0""HH|H|HB0"h|h| 4F}) ;< < >*HH|H|HF0""ᠶ }f}}h} qUHH|H|HF0""HH|H|HF0" "<}6"<}N}>}P}5} s@S.}:} }N}}P}}|d} DH|HP}HN}H`}H@6#"h.}HP}HN}H6X"hi*{ &3{H}|H|H""}|H|H"" 2 EHH|H|HO1"h.}H}H66".}H|H6*"HH%"h}h }6""HH:|5d"h|H,"O|}HH%"h*}h,}8*}},} }, |}}MzHH.}H6("h}h} }V}H}H "HH}H}H"hz.,HH%"h"}h$}}}   )^} Z}ȷ \}}H}H"ʍ -/0004} dH &"H\}HZ}H6X"hi) { {H{H. '"{ HHi4H &" .  {Z}f}\}h} G Ɂh 0j} &||ȷ  |||. |ʎ &3{H}|H|H"" H}|H|H""H,m{H8{H}|H|H"" 2 F^} |}} ," &3}|H|H"" 2.} w=:}.} w= E D}H}H|H|H"%"HH|H|HO0""HH|H|HO0" "HH|H|HF1"hhHH|H|HB0"(" U> A"`ʍ@} dH? &" &3?}|H|H"" 2- A{T"` "᜼|}}H}HCy;"y)y+"}H}HQ|;"|)aH||)H ("hFq}H}HS|;"|) H||)H ("hq,""`H}H}HP="hqHH}H}HK0"h|h| 4HH}H}HT0""F}) ;< < > ,"} qU }f}}h} }N}}P}} D E &3>}|H|H""HP}HN}H[6X"h [ V}|H|H"" 2HH}H}HT0""HH}H}HT0" "HH}H}HN1"h}}q q}q}6""HH:|5d"hN |}z}} n@.} w= } d 'H &" jE &3}|H|H"" 2}}q͊} 4," " E D}M &3n}|H|H"" 2}H}H|H|H"%"HH}H}HN0""HH}H}HN0" "HH}H}HT1"hHH}H}HK0"(" U> A"` A{L"` "᜼||H|HCx;"x)H|H|HM="hqA|H|Hb~;"~)~+" ) HH +"HH|H|HL0""HH|H|HK0"h|h| 4F}) ;< < > ,"q~z+"x +" qU)+} }N}}P}N}f}P}h} s@.}J}|}~}}}HH|H|HL0""HH|H|HL0" "HH|H|HN1"h D . &3}|H|H""xx)H}|H|H""}|H|H"" 2 :H+" +"i  E 8/Y~} |}X6""H.}H}61"h} } &3}|H|H"" 2," ".} w= D}H}H|H|H"%"HH|H|HN0""HH|H|HN0" "HH|H|HL1"hHH|H|HK0"(" U> A"` A|{ f " =HH}H}H0"hh    : x" B|);: | 2HH'"hh"}&!H ah  Z- , x" ""`$#%J} *5 i4'&(R} L} 7 &6Жr}H}H?"}H}H?"`}H}H?"}H}H?"||HH}H}H0"""|t}|v}|x}|z}8||{|| {{z|  -8|{|{{|i{|i{{H{H{H{HHH}H}H0"""HH"~HH}H}H0"" "hh ~( ~ {~~)~{ {Hm{{{i{hm{{{i{{H{H{H{HHH}H}H0"""8{{|  HH% |HHH}H}H0"" "hh >1v}Ht}Hz}Hx}HHH}H}H0"""!} d 'H 00 &"}H}H:"}H}H:" Z-"`Z|Do%%q9","H uY"h zh`q qUz`HH"HH}&a"h|h||H|H"HH|H|HH1"h|h|HH |=d"hխ|H|H"᭠|H|H "᭜|H|H ""`KHH""k||||||J}| -=||R}L}| -=||#{|{ C'${|{ C'%{|{ C'&{|{ C''{|{ C'({|{HH}H}H{H0"hh  @{ HH%"` (` _> U>F}0 h "#{{ C'${{ C'}H}H;")H  ("h2}}H}H;"F}) ;<\ >W}2}} }N}}P}N}f}P}h} s@/.}J}T} DHH}H}H0"(" 3,""lL}.} "+" .HH}H}H0"h|h| . D D O=L}HH}H}H0"("HH}H}H0"hh   H H" M>R}J},"`F}) ;< " m:F}) ;<}}H}H;" >]}2}}b}d} }N}}P}N}f}P}h} s@/.}L}V} DHH}H}H0"(" 3,"" m:2}X}2}X}HH6"hN}hP}0 0HP}HN}H)|i iH6X"hm||, |2})Hd ʎ||i iHZ &"|m||, |2})Hd ʎ||i iHZ &"|m|i|  ., | 2}R}J}.} .T}R}' d ʎ~R}H~ &"᭜|H|H~:"HP}HN}H~6"h|H|H~:"HH}H}H0"h|h| . E CH|H@6#"hK8}d}HR}H67"H8}H6N"hHH}H}H0"("< A"`L}R} &"`6""L}H8}H6O"h`L}HL}H}61"h} GAR}V} D" &` "&{{ C''{{ C'}H}H;")H  ("h2}`L}={{HH}H}H0"""8{{~{{ `HH%~HH}H}H0"" "hh ~@/() ~㘍 >}N' d ʎ~}H~ &"᭜|H|H~:"H}H }H~6"h|H|H~:" 7HH}H}H0"("` ;<,"`H6 "h  F} <`F}}6"6"6'6""H6 "hHH6"h  <8` F} <`J} L}  (` _>H6 "h'6" 66"F}F})1"0"`0"1"`HH}61"h }`8`.}` -=} }.}J} 70L} E1HH6/"hHH%"h|h||ix||i|HH%"h| t|HH | @d"hN?"p: |.|)(6"".} -=68`} wH.}H60"h8.}H6$"(`J} L}&q! < "}J} i4L} &6"`}4}6}|{{{{}0 @,|:. |ی} : ; .: ;낟{ .8{{{8{{ۊ8{{{:0|{ {{{{{$H m{iHڭ{H ("h|H m{iHڭ{H ("h |4}0H6Y"16}H6H"h }6 "*` A }6!"% }/#8`4} }6}}` }6 "8`H(:| "h:|H|)<|.Ţ6""႖ A A.}d}H|HP}HN}H}`}H@6#"h 6 GAэ.}HH6,"h O=8`6""H.}H}61"h6ح}  .>8` GAH}`%A6""HH%"h}h }<HHH< "hm}} }i }`6""HH%"h }M}HH(:| "h2:|H|) <|.H:|H>|H<|H"h`h8`H"h` AH|H@6#"h 6# GA؍0}H}H67"H0}H6N"h<%A8`6"".}H0}H6O"h%.}H.}H}61"h} GAH}<%A` B6""H.}H}61"h} }}=~}S}-~}FH.}HHH}6."h/} } B" ICh B}H}H "} }8`<'C6""H"hHH%"h&}h(}<HHH< "hm&}&}(}i(}`6""HH%"h(} &}}h8`HH:| d"hN<|.H|)`|}h8` , G  H+" +"in nn C,+ e,& ,! , GVw+"< GՈw+"HP}HN}Hv6"h: u}H &"-nfnnD C, e, , Gnnn e, ,q<ncnnq" C,,n才nnq C,`q e,q , Gnnn Gn nnn0n n ) nyq` C, GnnnX`q C, Gnnn7q C, Gnnnqnnnqnnnqnnn G{nnn Gn nn G8{nn,m{nqj n;nnhqP C, Gn nnHq0 C,Vn0nn G Gnnn`q> C,:q4 e,T}' q% ,V} Gnnn Gq`}H}H "᭲}} nnn n`HH}H}H"hnhnnOnGnmn|nmn|8|G| G  8nnnn 2A"A)An<nnn|i" m^m$nnem&n(n*n" "n" n%|H,"hH q( ƅ q(" cm`F (nnnr H I H "(`|5HH?"z`ZHHHH5HHH "` "  qJ pJ ""oJ`s I`"H`􎌢Y"h8` s I`x(PsJ!"!8`3H1 H "  IH-H+H"3H1H"h(`HZڢ "h`{H%"h{HH4"HH("HH"hh QJRJ(""H1 "h"{H "H{H%"h(`\ ;[K ȷ ȷ ٵJ 芅 +z hHZ khierarchicWqn+"" m VN`HH}&a"h|h||H|H"" glHHlHlH|H "h|h||H|H "᭦|| kmmmlomlqm" llimem" gm" cm |H|HHH|H|H+0"" """᭨|H|H"HH | H,H=d"h|H,"ᭈ|H "း)3;[*С|H"᭜|H|H " RQ"`HH|H|H+0"hh   )@mHH|H|H+0"" "HHmHmH|H "h|h||H|H "᭦|| {m}mHH}mH{mHmHmHHHHHH|H|H+0"" "hh" l" l)" lmymem" wm" cm|H|H"Ⴊkp+"|l |l| |qHqHpk"l|l |kn % (|l |l| |xwqk"l|l |k8`" mn n::nknkn n`,"8`qmm(rmmsmm tmmHHHH&"*"h|HH&"hh  " mmmmem" m" mbm" cm| {! M3*+|}m  m  ~H ~ +"᭺| P0cJ}.HH}H}H0"hh   P.} .T}HH}H}H0"h|h| . EaL}.HH}H}H0"hh   PL.} .V}HH}H}H0"h|h| . E"` ` |ȷ ||H|H"|H|H"~~)H|H|H"`Pqmm gR|| Qrmm gR||Rsmm gR||Stmm gR||`emEHHHH"H "oJ ":H"H" HH"m'" mmmmemm" m "" mp|HHHHH. "ᭈ|H "hhHH "  " m" m~ GTHHHH. "ᭈ|H "hhHH "   +"m GT|em " cmH"H"h*""`~  L{H  :}~Ȁ{~~MBI V DC ~ޮ{ |--  | &m| ~ \ Ƚ~ ~H \H ȭ ȩ ȗ HHHH"H "oJ "H HH"H" i. i`" n+FD " Jn`" n" nnnem" n" cm`HH"HH}&a"h|h||H|H"q' d ʎ~qH~ &"᭜|H|H2~:"q' d ʎ~qH~ &"᭜|H|H3~:"q~q~+"᭜|H|H:~:"r~r~+"᭜|H|H?~:"s~s~+"᭜|H|Hd~:"t~t~+"᭜|H|Hf~:"᭢qH|H|H0<"᭤qH|H|H1<"᭬qH|H|HJ<"᭾qH|H|Ha<"HqHqH~6"h|H|H_~:"HqHqH~6"h|H|H`~:"HH | H,H=d"h|H,"ᭈ|H "း54*9>GceЉ,"||H|H2~;"H~~)H ("hq|H|H3~;"H~~)H ("hq|H|H:~;"~)~" mN~q+"᭜|H|H?~;"~)~" m~r+"᭜|H|Hd~;"~)~" m~s+"᭜|H|Hf~;"~)~" ma~t+"H|H|H0="hqH|H|H1="hqH|H|HJ="hqH|H|Ha="hq|H|H_~;"H~6H"h~ }~6 " }q}q|H|H`~;"H~6H"h3 }~6 " }q}qqq6"3 qU RQ|H"᭜|H|H ""`q q:nqn \_|H|H:n:"Or r:nrn \|H|H?n:"s s:nsn \ڭ|H|Hdn:"t t:ntn \|H|Hfn:"ႉ|l |l| |" mxwqk"l|l |k+" mn n::nknkn nn`8`l{HH&"" "{ { G (`kp +"|l |l| |HH""qHqHpk""l|l |k`3l5lll||" llll" l " llymeml+HHlHH|HH&"" "hh""HH7l" "hlh!l!lHlH""{!lHlH" "{ {)HHlHH|!lHlH" "hh!lHlH" "`lHlH "᭨|H|H "HHlHlH"hmhmll {m}m" wm" cmn "HH|H  "h3lh5ll5lH3lH("Hn "hlH%"hl|H|H "5lH3lHp "lH "HlH%"h w (l!lHlH" "3l 5l5lH3lH"l llHlH"᭦| ||H|H"` "|6"F})sHH"HH}&a"h|h||H|H" | |f}n}h}p}`}r}5}|N}f}|P}h} s@ f).}J}:} G@:}.} w= e}H}H" %" i| |w|N}f}|P}h}5} s@ f2.}:}|f}|h} G@:}.} w= e}H}H" "%"" i|H|H ""n}f}p}h}r}`}HH"HH}&a"h|h||H|H"F})HH|H|Hh1"hCHHH6"X6X"hi,(HH|H|H 1"hH}HH|H|H!1"h=Hh}Hf}H6X"hi2ێHH|H|H1"h`}HH|H|H͏1"hQ d 'Hȏڊi) &"HH|H|H}1"hb}HH|H|Hn1"hb ׬d} b}g d 'Ziڊi+: &"HH|H|H1"h|6"H|H|H6X"hi/ܐH|H|Hr6X"hi1=HH|H|H1"hHH|H|H􂑢1"hHH|H|H1"hHH|H|H呢1"h"HH |d"hGЭ|H|H ""` Ɂh 0j} &||ȷ  |||. |ʎ `v (`| | q b% =k`HH}&a"h|h||H|H"|H|HCu:"᭸q dH|| &"|H|H[|:"᭶qIH|H|HY<"᭶qH|H|HZ<"}} AS =k| |`HH}&a"h|h||H|H"HH|H|HE1"hh|H|HCv:"}} A| | q b% =k`HH}&a"h|h||H|H"HH|H|HF1"hh|H|HCw:"}} A =k| |`HH}&a"h|h||H|H"HH|H|HL1"hhq H|H|HM<"}H}HCx:"}H}Hbz:"}} AI =k} }`HH}&a"h}h}}H}H"HH}H}HT1"hhqH}H}HP<"}H}HCy:"᭲q d 'H|| &"}H}HQ|:"᭴q d 'H|| &"}H}HS|:"HH}H}HC0"("}} A՛ =k} }`HH}&a"h}h}}H}H""}H}H?"}H}H?" Aj9̪q`ql}q qUl}} _> U>||H|H"ᭈ|H"8l} |||| ZH "`kn&Untitled Commands.txt2#t nnnPETnnlhm nn~  ppppqpWq 2q ?q?q?qqB ?qdq&9:NetW.Logs:NetWA.Log9:NetW.Logs:NetWA.Log.Jan18 9:NetW.Logs9:NetW.Data:NetW.Prefs 9:NetW.Data9:NetW.Data:DebugSelect Commands File... q Save as... 9:NetW.Data:Commands1.txt9:NetW.Data:Commands2.txt9:NetW.Data:Commands3.txt/ |   \@ PORT 54~Do you really want to Quit?~#2~^#154~Do you really want to Disconnect TCP/IP?~#3~^#254~The Log File could not be found~^#054~The File could not be saved~^#054~The disk is full. Quit and resolve~^#054~We had a GS/OS error. Quit and resolve~^#054~Do you really want to clear the file?~#2~^#154~The File Path is too long~^#054~The text window is empty. Continue?~#2~^#154~This function may not work with an emulator~Don't ask~#6~^#154~There was a connection problem~^#054~Requires System 6.0.1 or later~^#054~Requires Marinetti 2.0.1 or later~^#054~Requires Undo Manager v1.0.2 or later~^#054~Requires Hierarchic CDev to be installed~^#0.Jan.Feb.Mar.Apr.May.Jun.Jul.Aug.Sep.Oct.Nov.Dec*** NetWorker2 Jun 2018 General Logfile *** *** NetWorker2 Jun 2018 Top Logfile *** *** NetWorker2 Jun 2018 Bottom Logfile *** *** Local connection * Connected to: Port: * Disconnected * Data received: * Data sent: [Data truncated] * Sent PORT command: {B}Net Commands not Defined *** Whois Query: *** Lookup Query: *** Port Scan started to: *** Port Scan ended * Port Scan started * Port Scan ended *** Ping started PING 28 data bytes * icmp_seq=12345 ttl=64 time= 12345.12 sec > 24 hours * Ping started * Total: pings sent, echoes received * Round trip average: 12345.123 sec * Ping ended *** Ping ended * Open TCP port: *** Traceroute started * Traceroute to *** Traceroute ended * ( 12345.12 sec * * in-addrarpa  QUITName not foundServer not found‹ыwhois.internic.netwhois.networksolutions.comwhois.arin.netwhois.ripe.netwhois.apnic.netwhois.nic.ad.jpwhois.iana.orgQUIT BSS:Hierarchic"Please locate the Hierarchic CDev:*:System:CDevs:Hierarchic62~The Hierarchic CDev has not been loaded yet. You must load it to use NetWorker2.~#5~Locate...~^Load  #,,JLRFCBLocal IP Address: 999.999.999.999  #3JLRFCBLocal IP Address: Offline & 0ߎ2JLRFCBLast Host IP Address: 999.999.999.999 & 0C:JLRFCBHost IP Address: Not Logged In 3 =)JLRFCBLast Ctl Port: 12345 3 =-JLRFCBLast Ctl Port: None @ J>+JLRFCBLast Data Port: *12345 @ J.JLRFCBLast Data Port: None M W/JLRFCBPrimary DNS Address: 999.999.999.999 g qA1JLRFCBAuxiliary DNS Address: 999.999.999.999 Z dJLRFCB" t ~JLRFCB" jJJLRFCBNetWorkerFCB v FCB%|m?ISP6~_z2w,{FWpi .<@FL\l҂h$;69b݆݆B.v|Fq o\$h|Gq |+}} |Zuouu||u$ ljA P } :|{       } ; LH ys  0 }  }  }3vHvN|+ @ d t}}+  }}]  W  :|ww<}_}}}#:|h.4n~} },}!0}?1?@}yy||||>} [DVS}:|Qkz}n}x~~8@~zx }x}}  , 2 r }  }"|"|#~$  % 0%K%%u%}& &H & |'&(|)/q)}&#*O:+ |F+,+S,u,,,~q-~u. .}.~. / 0}0È1È2}"4}(4}R4}|44^5u5 596?6/78 J8 8  9~+9~A9~`9~7:}:: :{:{";~;~;~;~<~X<}<0=}= |d? ? ??? }??? }*@ }=@:|@}jA:|=B}yB}B}pC:|C C CC C DV#Dw;DՈADw]DvxDDfDDcD0EEE EEEEEF'Fg}&gvg}&?hwxh}&hxizHi}&iyi|j|?j|ej|j}& !"#$  | j  z     "!"&! F! f! !(!6!" ""(" H" h" "("6"##8#V#(~#"#6"##$($6$(%^$(&$('$(($()$(*&%(+l%6,%"-%".%"/&"0*& 1J& 2j& 3& 4&(5&(6&7#8'"96':r' ;N%>'?' @.("Ar("B(6C( D )"E.)FL)Gj)(H)"I)J) K)6L$*MB*&Nh*(O*(P* Q* R*"S+ T:+XX+Yv+ Z+ [+ \+"]+"^,"_<, `\, a|, b, cT'd' e'f( gP("h(",,,,,,,, , ,  , , --P/`/ p/ / / / - //-I-PH-Qr-Rs-t-u-- --- --  -  -  -  2- ]-[.]. f. o.------...*. <.J.}............ /// /!/"/#"/ $-/%0/&D/'J/(K/)/*0+0,0 . 0/0"030 1=02>03?04@0]0 q0 0 "0* #0> $ 1 P#1 Q51 RG1 SY1 k1& 1. 1 1 1 1 1 2 2 !2 /2 =2 K2 Y2 g2 u2 2 2 2 2 3 3 3 3 3 3 2 2 2 3 3 3 3 3 +3 93 G3 U3 c3 q3 3 2 2 3 4- H4 f4- 4' 4- 4 ~5& 5^ 63 566 k6; 6 6 !7; \7 y7> 78 77 6 7 ; ; &8Pv8P8P9Pf9P9P:PV:P:P:PF;Pp;B;\)H</*w<+j=    ffff`ff`ff`ff`ff DDDD@DD@DD@DD@DD fn?UTO?UDOFfϻ?TDofnϸ?DFfψ?Dwonω?Gwoϙ?wvoϙ?wfoϑ???333333333333? fffn fff ffn ff fn f nꪭ  ꪭ  ꪭ  DFfnDffFfnfffnꨈfnꨈꨈઈਈ('&%$# "7)*+;a]^,-./01f?d:`_324568c9e>g@hAJBCDGIHbKCDMKCSRDPQ[KCDXYZ  #  -& p 8pO^[p Q`\| 0  PtDp `i# `i-]&kp]kp[p `| 0 jtDp]I^_i6 !p  <v0 < pt &p7( p  #= Q  $S g  %h |  &`=jQ  '`Sjg  (`hj|  )V0Ss *~0; +dtap , u& -3 >^ .C Mc3 /Q [{60 !1$.2B~Op3P~]p 4l0 5^06  8b m;9o|co|:o,|pdo|p>e?,pfp @q |( gq|  A ( h  BtDpCp! D;Et"Ft# G0$ H 'I J$ .% K#tDpL t& Mp N t 0( Ot 0( P )Q!p* R  'S*!^p+T t,X t.Y/Zx0[z p1 \ > ]CMA8 ^Q[=7_BJOp2`PJ]p3a!4b!p! Net Commands GoActive Clear Top Clear BottomEdit Commands FileSet PreferencesOKMenu One{*r00000150Menu Three{*r00000152Menu Two{*r00000151Menu Four{*r00000153Functions{*r00000200Net InfoPingLookup TracerouteWhois Port ScanExplorer View Log Clear TextUndoCutCopyPasteClearRedo Select 1qp0G*BFONTSN HELP HIERARCHIC5B UNDO.MANAGERFONTSv% ' \'*SHASTON.16' VR9R9&()*+,-./012Shaston p98? ~8~?p?p~?~??~~8L0~ ? 0x `0a0< 0@`` > x`|?;p8q8p??8xw8pp ~~8@? x3> 99x88pxp8~0`<pq88>8p??p803f9~99?pxq;;?x?pp8s888 ?88ppp`Æs9<8q<<ٙ?p?<qÎ8x<?p8>>N88|~?p0Ü8@x8p<x?p߁?qÎ8<8p~s???wspy88?>>81;p88}8ap88`g?`~1Á?&np88?x81p8<8p~s???pq ?ρ8Àp>|a8 8~ 38`n?03~?1N~ps88p??8xyp~8x8ps???9s?8À??;88c> 7?0a`~|?9~`psww8????8????À??yǀ0 0&g?30 }3<8g8qp;p??p?<p~=??8=À ?>`!?}yÜ8?~p<8~~p~p;p?p?8 ~88?ǜ߾}p@?|@8 ~}}}???~~~}}À ?p>|?c#A?|?78p??~p?88 0|??p?8?  0px?*8888888888888;ER^lz}*6BEIR^gs &2>JWcp|&2>HT`is $/;>JZZfr~'3:BJR^jv  +5FKS_o}&:FRUaq| (49>HVbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbp                   HELPv% ' \'FINDER.DATA4L p%8 3THELP5&.W9 3HELP.FILES[$ % 3:.z$"* HELP.FILES BHELP8!BppdosXO,C ~ExpressLoadO <89 ,main1B<8,;main<8@! !Help!\H**KH5"*55)5h7/5277$$<"775Ha!a!"5k5"@ @k5`H"h5 5 5 5m5"hm5o5q5m5"hm5 o5q5m5""hm5 "o5q5m5HH5Hc5c5> >t   ,?Z)+*Y* !Help! 69:;<=>?@ABCDEFGHIJKLMNOPQRSTUVW"h{5h}5"`5`5H"}5H{5H"5H"5H"5`K " "k iH"h)9696 HH//// "h5h55H5HK" 6 6 L   T H5H5H"h 65H5H" &$555"kK5555=6=65H5H""H5H5H"h-6H5H5H"h/655H5H "ᭁ5H"ᭃ5H"ᭅ5H"᜕55555"kKZ  zki=.. ;[51HH"᭓5H5H" 6  T "+` HH;[HH"᭓5H5H"!6!6 "H66#6H!6H5H5Hi"h66 655"5 5""hh+`5H5H"HH ;[ ȷ  !6ȷ#6 )MH#6H!6H5H5H&"h I#6H!6H5H5H" H%6%6#6H!6H5H5H"h%6ͯ5 '6ͱ5w jͫ5 '6ͭ5e cX͟5 '6͡5S Fͧ5 '6ͩ5 _4ͣ5 '6ͥ5/ W"͗5 '6͙5 = ͛5'6͝5 &$ +hh`HH5H5H/" ;[iim/+hh`HH"᭓5H5H"8s/o/168q/m/365H5H'" 16H8s/o/16h8161636H8q/m/36h83636  m/m/5H5H\"bHH"᭓5H5H"HHQ5HO5H#6H!6H5H5H")6z)6D m/m/5H5H\" 6 76H56H5H5H"%""`HH"᭓5H5H"H#6H!6H'6H%6H"h"`HH"᭓5H5H"H#6H!6H'6H%6H"h"HH22a"h6h6HH77d"hխ6H6H ""`HH"᭓5H5H"H#6H!6H'6H%6H"h"HH--a"h6h6HH77d"h%6H6HQ.Q.;"Q.)#Ы6H6H """`6H6H """ &$ Q.)Q.Q.r6r6+"=6=6k6k65H5H"" "_M6o6 o6"`H(77 "h7.7)4H5H5H"h6HH5H5H" h T","H11Y"h`HH"᭓5H5H"H#6H!6H'6H%6H"hH5H5H"h 6 6 6 T "`H5H5H"h86H-H-''H-iH+"" &`&Y&" W&g&6'''mH-'iH'H+"J-J-''H-H+"'mH-i':'''+++"h-h-'m''iH+"'i'HH"᭓5H5H"H#6H!6H'6H%6H"h "`368q/m/3636168s/o/1616mo/s/mm/q/8036080360801608/036/083036308\036\08`036`08/36/8/36/8/16/8/16/8/36/8/16/8/16/ HH;[5556ȷ76hh+[5[5 "S5S5"᭡5H5H "᭥5H5H "᭩5H5H "᭱5H5H "᭭5H5H " L [5[5"`HH5H5H}/}/1"h5h5HH5H5H//1"h5h5HH5H5H)0)01"h5h5HH5H5HV0V01"h5h5HH5H5H 0 01"h5h5`ɀB2/F2f2j2r22/00200/0\030`0/ //1////1/;/=/?/?A/"m/o/q/8s/Q5`"B2^F2f24j22J2>/0020F0/0\030`0/H//b////b/;/=/?/A/"m/o/q/ps/2Q5` ;[HH"᭓5H5H"HH55+"H55_"h"+`hhh&$hh!h5)V5@N)_X&C!A,5H5H""`5H5H""`GF H5H5H55)"h`H-H-''d+"" & &`"H11Y"h8`&!&&" &`5 55H5H "ᭃ5H"X16HH "h6h6HH5H5H001"h5h55H5H9""' &+6 ') '+6 ''))+"525H5H''+"')'+65" & '-'ɀ@)_- H-H-''d+"" &&Y&I6" W& g&I6 HHHHI6H2 "ᭃ5H "6z6I6K6H-H-''d+"" &&Y&R1" W&g&" & 'ɀ@)_-' R16 ''_1_1#+" '##^1 HH;[66P1P1mI6mK6H2+"hh+I6i2I6K6iK6R1=R1600 ?"႒ HH;[66E6G6hh+8R1:=6?6=6A6E6I6G6K6HI6i@K6iHI6iK6iHڢ"hcK6HI6H''2+"I6i2K6iHڭK6HI6H2+"''I6i2K6iH2+"I6i2I6K6iK6A6T?6:8R1=6?6 HH;[E6G6i iȗi2i=6ح6E6G66hh+E6I6G6K6K6HI6H ?"I6i2I6K6iK6?6Э+6 -66k6m66H5H5H" "6H6H9"h65 55H5H "ᭅ5H"HH "h6h6HH5H5H001"h5h55H5H9"R16" &Y&&HH&H&H5H "6z6+ h$&&00&&&&" &66  X1   '   '''  ''_1_1"+" '""^1 ^1 HH25H "6z6 h$iZ1i\1P1P16H6H2("6H6H?"R1R100?"᭭5 H"h5+6h/6H5H5H"e5H5H''#+"H''')H ("h 6(iH5H5H"5H5H"᭝5H5H%"6H6H9"ᭁ5H"R166' 6&`)  66`H"h66HH6H%"hfh0h''06H5H5H"`066ж8`A)_[ NPX1`SDO:D0U&V@IBX X1`-H-H-++ +"''+m++iH'H+"'m++--+m++H+"+iB+" -3--" -!&-&-''-H-H+"ᭌ-'- !&" &`H5H5H"h 6+6` 686" &Y&&HH&H&H5H "6z6+ h$&&00&&&&" &66    '  ' ' '6 5H" W'm+'''m+'iH'H+"++''+H+"'m+'" & F JF&&& &5HH&H&H5H "z h$&&&&&&" &666&PS&ETKH'' "5HH"z666//5H5H"#"&H&H&H&H6H6H6H5H5H" "//5H5H"$"5+655 Q 5H5H%"555H "55H"+6'):'):'):8``*0:`040:` HHHH;[55*)5H5H""᭭5H5H""* hhhh+` HHHH;[55*)5H5H""᭭5H5H""m-m-5H5H""''5H5H""o-o-5H5H""* hhhh+`HH5<i5 > iHگ)H )"hW6Y6HHڭ5H5H""5H5Hr6r6+"M6k6m6q6)ɀq6` x O6S6U6W6Y6=6?6;6 =6m_6E6?6ma6G6m6  E6k6t8k6=6E6m6?6G6a6E6_6 [6M]6[6mE6M]6mG6) O[6m_6E6]6ma6G6 T$a;6s6 T$ S6U6(;6;6q6= ;6)8S6;6S6U6U68M;6MOO;6S6W6U6Y6MOO)G6 ME6O)]6 M[6w HHHH;[S6k6U6m6g6i6c6e6c6e6_6 a6hhhh+8=6_6=6?6a6?6=6m_6=6?6ma6?6c6 e6 !D I 8`Y6HW6H=6=6A6A65H5H" "Y6HW6H5H5H"%"o6$Y6HW6HY6HW6H5H5H"" I `E6E6=6=65H5H""W6m=6Y6m?6HW6mq6m=6Y6m?6Hڭ5H5H"" I ` HHHH;[55 ) hhhh+` HHHH;[55 ) hhhh+` HHHH;[550c62e6c6e6c6e6 HHHH;[c6g6e6i6c6e6c6e6_6 a6i[6i]6hhhh+` K;[dK D: !#5&5H5H" "HH"h+  zzzzzk5 5 5 5 5 5 5 5 5 5`5 5 5"' &H-H-++ +"''+m++iH'H+"'m++--+m++H+"+i-+" --&-" & "5- !&" &`" -p=6=6 #`5=6 #S5" -B''66-: 6 H+"6565" -8`''77-:"" 7 H+"7575" -'''7'7-:ɀ &7 H+"&75&75`" -.-:#')$H''8-H $"h`8`K &$k5H5H"᭓5H5H"᭓5H5H"`{a[A-M6` HH;[ hh+`  33> 333 3>3>0 33>0 33>0 3>0 30 3>0 30 30 0 0 33?0 ?0 0  ''''& '*:System:Desk.Accs:Help.Files:Index "" was not found. &-"'+:Subject.Alias:DataP ..C:!. Find Text 1../$pQ. !0. Find !0(/CancelN1$"pbtG>HbK^1 .0Q0FfFind /F0~0Gg+ ,b0 ,f0 1161C1 Subject:  Topic: Tell me more about !Help!... ^153~!Help! is sorry but it could not find any Help Files in your Desk.Accs folder.~^#013~The string was not found...~^#0!Help!P 1"^R2^22Y4t$2p ^iJ02 OK!Help! was designed by Dave Hecker and written by Ewen Wannop. It blossomed from an idea suggested by Lee Sheppard. !Help! is copyrighted 1995-98 by Ewen Wannop, but the original archive may be distributed freely to others, compliments of Seven Hills Solutions Specialists. Seven Hills Solutions Specialists make lots of great software for your Apple IIGS computer... please contact us for a FREE catalog, then buy some of our software so we can continue making more! :) Seven Hills Solutions Specialists 1254 Ocala Road Tallahassee, FL 32304 Technical help: support@sevenhills.com Everything else: sales@sevenhills.com Z2_Seven Hills~!Help!~WannopHelp v01.06 - by Ewen Wannop Copyright Ewen Wannop 1996-98 @ !.5K7Q$^7ha!#c5//J5P=6[!6i6f%6m/m/27-7Q.kQ.qr6=6k67/ 1 H- ' & W& ' '. J-4 '\ 'b +u h- ' [5 S5? [5Z }/| / )0 V0 055[5jH-p'&1&0C&c'i)'&H-'&W&cH-i'&W&&'_1P1c0'+'0&#&'_1P1,0z''H-+!'/+O-]+--&-'&&R&''+'!&&'/:/m-'o-vr6=6A6E6=63"&8"H->"+Q"'_"+"-"+"-"&"&"-#-%#'+#6U#6`#-i#'o#7#7#-#'#'7#&7#-$'%&'a&'&'&'&&&'-&--'-+- .-..!.!.1.%..)./M.Q.../(/3/1i/$#01C0Q0p0~0000001010611C1Z1^1L2R2R2^2V222222&3>FNTadkx}&15AMaep{+ (+05DGMSVZfjvz~#&),/2LP^losw{*!%6?CPT_ilptx(?SWcfimpsvz!$(369?CMQmq}AEaequ $>B[`nt 2GKW[eivz! #17=ILSY_ex|8"%),/369=@CGJMQTW[^aehkoruy|""-1FORUX[^gjmpsvy|$'*.16:EQV 08@HQY#+;ATX[jvy| (.4BORXlrx "'+6:EIe7YZ Copyright 1995-98 by Ewen Wannop A universal Help and information system for all desktop programs. A freeware New Desk Accessory brought to you by the courtesy of: Seven Hills Solutions Specialists 1254 Ocala Road Tallahassee, FL 32304 Technical help: support@sevenhills.com Everything else: sales@sevenhills.com Internet: SevenHills@aol.com `!Help!Copyright 1995-98 Ewen WannopSpectrum. A freeware New Desk Accessory brought to you by the courtesy of Seven Hills Software Corporation 2310 Oxford Road Tallahassee, FL 32304-3930 America Online, AppleLink, GEnie: SevenHills CompuServe: 75300,1743 Internet: SevenHills@aol.com HELP.FILESv% ' 3'FINDER.DATA\]( p%8 [HELP]$ % [NETWORKER2y % [VENDORS%$ % [GFt$3*VENDORS NETWORKER2 BHELPHELPv% ' ['FINDER.DATA^dAp4]ZHELP.NOTESP_M ETW9 ]INDEXs)A'A']]SUBJECT.ALIASPtA>t  Op$L]0DD`cdefghijklmnopr Apple IIGS computer... please contact us for a FREE catalog, then buy some of our software so we can continue making more! :) What is !Help! !Help! is a universal Help and information system for the IIgs desktop. We realised that every time a new program for the IIgs was written, a new Help system had to be devised. !Help! was designed to let programmers stop reinventing the wheel, and simply use one universal solution. Once !Help! has been installed, it is simple to add new items to its Subject menu either manually or from your installer. Although !Help! was designed as a Help system for programs, it is equally at home as an information system. We provide a sample Help file, in addition to this file, to show how this is done. The limits of what !Help! can do are only limited by your imagination. Display you favorite recipes, error messages, thoughts for the day, telephone numbers or memorandums. You can copy any part of the text from a !Help! display, so why not put you favorite signatures, or ASCII art, into a !Help! file, and then paste it to the modem when you are next in conference! Using !Help! The actual files you see displayed are normal Teach or Text files. The control files can also be Teach or Text, and are the only files that need special construction. You can select a Subject and a Topic to view using the Popup menus. If you want to find some specific text within the current Subject, just click the Find button or press OA-F. To find the next occurrence of the string, click the + button, or press OA-G. Setting up your own !Help! files Within the folder *:System:Desk.Accs: create a folder called Help.Files. Within this folder put folders for each Subject or program for which you have !Help! files available. The names of these folders are used to build the Subject menu within !Help!. If a file Subject.Alias is found in the target folder, then the first 34 characters from that file are used instead to build the Subject name. These folders would normally be created when installing the target program. Within these program folders put an 'Index' file constructed in the following way: Start: Nothing or blank lines at start Entry: MenuFlags (see list) Name for the Menu Item (34 max) Full path to the file on disk (508 max) At least one blank line to space to next item Further Entries: As above End: Optional blank line or lines to finish Note that this will normally be a full path to the !Help! files. This means the files can be placed anywhere on disk, including the Help.Files folder. It would then be necessary to use :System:Desk.Accs:Help.Files:ProgName: to point to a file within the Help.Files folder for a specific ProgName. If only a partial path is given, then the prefix :System:Desk.Accs:Help.Files:SUBJECT: is added. The MenuFlags (these follow the normal Menu conventions): N = normal (removes other flags) P = normal (removes other flags) S = shadow O = outline D = disable item U = underscore V = divider bar I = italics B = bold X = XOR highlight When !Help! is called from the Apple Menu, it builds the Subject Menu and attempts to set it to the currently running program, by matching the name of the program to the folder name. If that fails, it is set to the first item on the Subject list. The Topic Menu is then built from the Index file from the selected Subject folder, and the first entry from the Topic Menu is called up and displayed. If no Index file is available None Available is displayed. If !Help! is called from the same program as before, it attempts to open the same Topic file and got to the same position within that Topic. Programming !Help! with IPC Calls A program can control the !Help! NDA by the use of IPC calls. Send IPC calls to: $8000 = (to "Seven Hills~!Help!" stopAfterOne) DataIn: dc i2'4' number of parameters in this block dc i2'Action' dc i4'Subject' dc i4'Topic' dc i4'TargetString' DataOut: dc i2'recvCount' Action = 1 (Are you there). This call is simply accepted, no other parameters needed. = 2 (Open !Help! NDA) Primary call. = 3 (Close !Help! NDA) No other parameters needed. = 4 (Open !Help! NDA) Help Menu call. For the Open Action command 2 only: Subject = Pointer to pString, max 15, for a program/folder name within the Subject Menu. The string is not case sensitive. Topic = Pointer to pString, 34 max, for a Topic name within the Topic Menu. The string is case sensitive. (Note that if the pString parses out to a valid decimal number, and the number is of a valid item in the Topic menu [range 1 to numitems] that item will be selected.) TargetString = Pointer to a target string, 128 max. That string will be searched for and the text will be scrolled to the first occurrence of that string. The string is case sensitive. (Note that if the pString parses out to a valid decimal number, the display will be scrolled to that point in the text, or to the end, if that is less than the decimal number.) If any of the passed pointers are zero, or are not valid, then the default settings are used. This would be the current program, the first item on the Topic Menu, and the start of any text. For the Open Action command 4 only: Subject = Pointer to a pString representing the name of the current application. The string is not case sensitive. Topic = The ID of the selected Menu (2 bytes). TargetString = The ID of the selected Menu Item (2 bytes). Note: Command 4 allows programs, through the use the _MenuGlobal option, to send the IDs of a selected Menu Item to !Help!. !Help! will pick up the name of the current application to select the target folder. Subject need only point to a suitable identifying string that might be displayed in later versions of !Help!. !Help! will then use the passed Menu IDs to cross reference a file called Data in the target folder. This file should be constructed as follows. The entries do not use quotes, and must be an exact match, with no leading or trailing spaces. The entries within the file are similiar to Command 2: Start: Empty line(s) to start Entry: $0000 MenuID, Hex value with $ identifier $0000 MenuItemID, Hex value with $ identifier Subject Program/folder name within the Subject Menu (15 chars max) Topic Topic name within the Topic Menu (34 chars max) TargetString Search string or decimal position within file (128 chars max or decimal number) At least one empty line to space to next item Further Entries: As above End: Empty line or line(s) to finish arQ  @ $   ! N Setting up and using !Help! Help.Notes u pPTEpdosvAbout !Help!wx>>t  p6<@  _NETWORKER2v% ' ['FINDER.DATAzF p%, yUHELP0P{%! ET%! yUHELP1P%" ET%" yVHELP10P%' ET% yVHELP11P %( ET% yVHELP12P%( ET%( yVHELP13P%) ET% yVHELP14P%* ET% yVHELP15P%* ET% yUHELP2P %# ET%# yUHELP3P %# ET% yUHELP4P %$ ET% y?>2$*5HELP15a5HELP142HELP11o5HELP13aHELP10E5BHELP12nBHELP9oUBHELP8eHELP5rUHELP7nUHELP4oUHELP6huBHELP3luHELP2ruHELP1euHELP0hBINDEXe SUBJECT.ALIAS ~pPTEpdosl NetWorker2 Manual Dedicated to the memories of Joe Kohn 1947-2010 and Ryan Suenega 1967-2011 NetWorker2 is Freeware and Copyright (c) 2008-2018 Ewen Wannop NetWorker2 and its supporting documentation may not be printed, copied, or distributed for profit. Distributing and/or archiving is restricted while in an electronic form. Any free distribution must be given permission by Ewen Wanno>ȡ>t  lp` #SW@<|p in advance -- please contact via email by sending mail to: spectrumdaddy@speccie.uk There is no guarantee that the right to redistribute this material will be granted. The contents of this document may not be reprinted in part or in whole. Credits My thanks go to Andrew Roughan for his forbearance as I tried to make various obscure Marinetti calls work for me.}9 $0sD$pPTEpdosContents Preface Welcome to NetWorker2 Welcome An Internet exploration tool Setup NetWorker2 - Internet Explorer Requirements Installation Legal Contact What does NetWorker2 do? The Menus Apple & File Menu Edit Menu View Logs Net Commands Preferences Set Preferences Functions Using NetWorker2 Ping Lookup Traceroute Whois Port Scan Explorer Explorer examples Edit Command Files Extras Common Ports RFCs Help Problems Other Info>8>t  gp XD#SW@0rmation $E$s $> $ $$<D$?pPTEpdosExamples: Three command files have been provided to get you going, and show you how Networker is used in practise. The first example connects to an FTP server, retrieves a directory listing, and then retrieves a file. The second command file connects to a web server, and retrieves the Index page. The third connects to a Usenet server, and retrieves two group headings. You will find these three examples displayed in the Net Commands Menus. Descriptions have been added to the menus as dimmed items. They are>8>t  'p 4#SW@0 not displayed in the examples below. (Commands1.txt) Command file connecting to an FTP server: 1. {MBIV}FTP Commands: 2. {C*}ftp.apple.asimov.net:21 3. {C*}USER anonymous^MPASS anon@somewhere.com^MCWD /pub/apple_II^M 4. {C*}TYPE A^MPASV 5. {C*}LIST 6. {C*}TYPE I^MPASV 7. {C*}RETR site_index.txt 8. {C*}QUIT^M Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to Port 21 (FTP) of the Asimov server using the top window. This opens a command port to the FTP server. Nothing will appear on screen once the green traffic light shows you are connected, though with some servers you may get a welcome message. Line 3 - Logs in to the server and moves to the target folder. There are actually three commands within this command line, noted by the ^M separators. The ^M is translated by Networker into a line break. The first part issues the USER command, with anonymous as the name. The second part issues PASS with a pseudo email address as password. The third part issues CWD to change the working directory to /pub/apple_II. Line 4 - To list a directory, we must first open a second port to receive the data from the listing. This command is in two parts, the first part sends TYPE A to tell the host to send only text data. The second part sends PASV, to ask for a port to be opened to send that data. The host will respond with a message saying it is entering passive mode, and gives the IP address and port number for the port it has opened. Click anywhere in the IP Address within the brackets when it is displayed, and then click in the bottom URL LineEdit box. Networker will automatically parse the IP Address, transfer the IP Address and Port number to the bottom window, and open the port. You will see the bottom traffic light go green, showing it has connected and is waiting for data. Line 5 - Sends the LIST command from the top window to request the current directory to be listed. You should see the directory listing appear in the bottom window, and the bottom traffic light turn to red as the host closes down the passive port after the data has been sent. Line 6 - This is another two part command, first telling the host we want binary data by sending TYPE I. The second part again asks for a passive port, by sending PASV. As before, click anywhere in the IP Address within the brackets when it is displayed, and then click in the bottom URL LineEdit box. Networker will automatically parse the number, transfer the IP Address and Port number to the bottom window, and open the port. The bottom window should again show the green traffic light. Line 7 - We now need to send a retrieve command, to tell the host to send the target file to the port we opened in the bottom window. This command sends the RETR command with the target filename. You should see the data from the file appearing in the bottom window. Note: Be wary of retrieving large files, as you might overrun memory space, unless you have limited the display of incoming data to the windows and log files as described in the Set Preferences section. Line 8 - You can always shut down a session by clicking the traffic light buttons, but some servers, such as FTP servers, like to be closed down cleanly by a QUIT command. In fact clicking the traffic light buttons, will send a QUIT for you. You should see the traffic lights for the top window turn red when the Port is closed and you have disconnected. Note: You will see commands you send to the server displayed in red on screen, with any returned data displaying in black. Connecting to an web server: 1. {MBIV}Web Commands: 2. {C*}ozkfest.net:80 3. {C*}GET /index.html HTTP/1.1^MUser-Agent: Mozilla/2.0 (Compatible; NetWorker2 2.0; IIgs)^MHost: ozkfest.net^MPragma: no-cache^MAccept: */*^M^M (Commands2.txt) Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to port 80 (web) of the ozkfest.net web server. The traffic lights will go green, but you will see nothing on screen at this point. Line 3 - This is a complex command line split into four parts. The GET command in the first part, instructs the server that you wish to retrieve the pages using HTTP 1.1 protocol. In the absence of a path, which may optionally including a target filename, the host will return the Index.html file for the root directory. You could optionally have included a folder or a full path such as this: GET /afile/ or GET /afile/home/styles/itunes.css The second part tells the server the name of program communicating with it. The server can use that information to tailor its responses if it wishes. The third part sends the base URL of the target server. The fourth and fifth parts tells the server to send the latest version of the file. After sending this command, you should see the HTML text for the Index.html page returned and displayed in the top window. Note: Web servers expect you to simply close the connection when you are done. Click the traffic lights to do this. Note: You need to send a double 'return' at the end of the command line requesting the page. Connecting to a Usenet compatible NNTP news server: 1. {MBIV}Usenet Commands: 2. {C*}news.giganews.com:119 3. {C*}AUTHINFO USER loginname^MAUTHINFO PASS password^M 4. {C*}GROUP alt.binaries.multimedia.classical.vocalmusic 5. {C*}HEAD 1735 6. {C*}GROUP alt.binaries.nl.motorfiets.ducati.nospam 7. {C*}ARTICLE 1737 8. {C*}QUIT (Commands3.txt) Taking this example line by line: Line 1 - A descriptive line displayed in Bold, Italic, with a dividing line, and as a menu item only. Line 2 - Connect to port 119 (NNTP) of the news.giganews.com news server. The traffic lights will go green. Line 3 - Login to the news server first sending the user name, and then the password. Line 4 - Select the group alt.binaries.multimedia.classical.vocalmusic as the target. Line 5 - Return the header for message number 1735. Line 6 - Select the group alt.binaries.nl.motorfiets.ducati.nospam. Line 7 - Request article 1737 to be returned. Line 8 - Quit and close the connection. To use this command file example, you may wish to change the address and port to that of your own news server in Line 2. You will also need to change loginname and password to those of your news server account.  X$`  0 x $0$ q Z3 $eD.8pPTEpdosEdit Commands File Selecting this menu item, allows you to open a file that will be used for one of the four Command menus, and so create or edit the commands within that file. You can optionally Save As the edited text to a new file name, thus allowing you to create more files as needed. If you create a new file, and wish to make it active in a Net Commands menu, you will have to go to the Set Preferences command and select the new file for use within the desired Net Commands menu. Note: As saving >8>t  cp (#SW@< new file, may change the contents of one of the Net Commands menu files, the two menus will be redrawn to reflect any possible changes. Essentially a Commands file is just a way of letting you easily enter repetitive or complex commands that you might wish to send to either of the two windows. Examples are given in the default files for accessing an FTP server, and a web site. You will have to refer to the Internet RFCs for more details on any other type of Internet service you may wish to use. To let you control how the menus look, and how the commands operate, you may precede each entry with a control string. You may also embed a ^M to give a carriage return break within a command string. The control strings are constructed in this way: {B} = menu displayed in Bold {I} = menu displayed in Italic {V} = menu displayed with a dividing line {D} = menu dimmed and disabled {C(character)} = displays the character to the left of the menu description {M} = display as menu item only, any command on the same line is ignored There are two special instances of the C control: {C*} = send the command directly to the top window {C+} = send the command directly to the bottom window Note: You can use more than one of these controls within the control string. Note: Refer to the example files supplied to see how these commands work in practice. Note: The last line of the file must have a return as a line end.  $$0$J$T$=$D6(TpPTEpdosXView Top Log and View Bottom Log Opens one of the two Explorer log files. You can view the sessions that relate to that window, and select and copy text to the clipboard. No other editing is allowed. If you wish to edit the files further, use a word processor such as Teach or Hermes. View Log Opens the log file for the Ping, Lookup, Traceroute, Whois, and Port Scan functions. You can view the session that relates to those functions, and select and copy text to the clipboard. No other editing is allowed. >>t  XpL #SW@0If you wish to edit the file further, use a word processor such as Teach or Hermes.  $ ,$D$&pPTEpdosdNet Commands Menu: Menus One & Two These menus are displayed from the contents of the four files you selected in Set Preferences. The default path for the four command files is Commands1.txt, Commands2.txt, Commands3.txt and Commands4.txt in the NetW.Data folder. With the cursor active in the required box, select an item from either of the four menus. It will either be entered into the box, or sent immediately, depending on the contents of any control string in the line. See 'Edit Commands Fi>8>t  dpX ,#SW@<le' for more details of the possible controls: {M} = ignore this menu entry {C*} = send the command directly to the top window {C+} = send the command directly to the bottom window Note: Long commands will be truncated within the menu display, but will be correctly sent to the target window. % $0kD2@pPTEpdosExtras Common Ports: FTP = 21 Web = 80 Usenet (NNTP) = 119 POP3 mail = 110 SMTP mail = 25 RFCs (Request For Comments) You can get RFCs that describe how the internet works from many online sources. This is a good start: http://www.rfc-archive.org/ Specific RFCs: FTP: RFC 959 Web HTTP: RFC 2616 Usenet NNTP: RFC 3977 SMTP Mail: RFC 5321 POP3 Mail: RFC 1939 Help Online Help is available if you have installed the optional !Help! desk accessory, and its Help files, to the Desk.Accs folder. >8>t  gp xЭ#SW@H  H$0n$<v$ 0$D$pPTEpdosProblems Hopefully you will have none, but if you do, and they cannot be answered by reading these notes, please contact me on: spectrumdaddy@speccie.uk Other information Check for the latest version of Marinetti: http://www.apple2.org/marinetti/ If you do not already know about Spectrum, please drop by my home pages, and read more. Apart from all the other wonderful things it does, Spectrum offers many useful tools for processing files, such as post processing text files that you have >8>t  pt 4#SW@0received, that may have obstinate formatting. Spectrum is now Freeware, and amongst my other applications, is now available from my web site: http://speccie.uk Someone once said to me, 'Spectrum does everything!' NetWorker2 (c) 2008-18 Ewen Wannop   $ 2"$$9# D$ pPTEpdosPreface Welcome The Internet is a much misunderstood system. It was original conceived as a way to seamlessly connect different terminals running on different operating systems, and so was designed to be failsafe and as foolproof as possible to program and use. Underneath the surface, the Internet is in the main controlled by simple text commands, which are normally invisible to the user. An Internet exploration tool Why a new Internet tool? It was at KFest '96 when I first realised that underneath all >$>t  op Э#SW@Hthe bells and whistles of your friendly web browser, email, or file transfer program, the Internet actually operated by means of an interchange of commands in plain English text. Your local computer sends out the text commands, and receives corresponding text responses from the target host. This simple concept opened up a whole new set of possibilities for my programming skills, and for instance, enabled me to use the existing Spectrum scripting language to build the many now historic applications that could be plugged in as scripts to Spectrum itself. The first of these script sets was Spectrum Internet Suite (SIS), for which Geoff Weiss wrote the scripts, and I wrote the HTML display engine. I think it was the first more or less WYSIWYG web browser to be produced for the IIgs. The first version of SAFE was also built as a Spectrum script set, along with its companions SAM and COG. Both SAFE and SAM have since gown up into stand-alone applications. The original Networker application was written as a tool to let you explore the Internet manually, letting you send text commands, and see what was being returned. As such, it only had a narrow audience, so I have decided to bring it up to date as NetWorker2, and in addition to the original split window Explorer function, add Ping, Lookup, TraceRoute, Whois and Port Scan functions. To avoid confusion with the original application, NetWorker has now been renamed as the more comprehensive NetWorker2. You may be a developer who wants to try out internet commands before you start writing an application, you may just be curious as to how the internet works, or you may want to lookup information using the other functions. Whatever your interests, I am sure at some point you will find Networker2 a useful tool. Check out some of my other contributions to the IIgs family on my web site: http://speccie.uk NetWorker2 is Freeware and Copyright (c) 2008-2018 Ewen WannopDD  $z0$0<0<@0D$ pPTEpdosNetWorker2 - Internet Explorer Setup Requirements You will need either a real IIgs, the emulator Sweet16 (3.0 or later), or an emulator that supports Marinetti 3.0. You must be running System 6.0.1 or 6.0.4, and have Marinetti 3.0 or later installed. Marinetti must be configured for your internet interface, which would typically be either a dialup connection, or an Ethernet connection, such as connecting to your LAN through an Uthernet or Uthernet2 card. NetWorker2 also requires Heirarchic and the Undo >h>t  p *4#SW@HManager, v1.0.2 or later to be installed. Copies of both are supplied within the Archive folder. To obtain NetWorker2, and the UNDO Manager, or if necessary an Uthernet or Sweet16 Link Layer, as well as any of my other software: http://speccie.uk To obtain the latest version of the Marinetti TCP/IP stack: http://www.apple2.org/marinetti/ To find out about, and order an Uthernet card: http://www.a2retrosystems.com/ Installation This is simplicity itself. 1. From the NetWorker2 Archive folder, copy NetWorker2, and the NetW.Logs and NetW.Data folders to a working folder of your choice. Optionally you can just run NetWorker2 directly from the original Archive folder. You can delete the Undo.Manager folder and the Changes text file if you wish. 2. If you do not already have Hierarchic, or the Undo Manager v1.0.2 installed, copy Hierarchic to the CDEVs folder, and Tool132 from the Undo.Manager folder to the Tools folder in your System folder, and reboot. If you do not already have !Help! installed on your IIgs, copy the Help NDA, and the entire Help.Files folder, from the Help folder in the Archive, to the Desk.Accs folder in the System folder. If you already have !Help! installed, then just copy the NetWorker2 folder from the Help.Files folder in the Archive, to the Help.Files folder in the Desk.Accs folder. Note: These files may be updated with each release of NetWorker2. Legal NetWorker2 is Freeware, and may be distributed freely, provided the archive stays intact, no alterations are made to it, and full attribution is always made to the author Ewen Wannop. NetWorker2 may not be sold in any form, but may be included in other distributed archives, provided you first seek my permission. Contact For any communication relating to SAFE2, for bug reports, or for technical support, please contact: spectrumdaddy@speccie.uk For my Home Pages, Spectrum updates, Spectrum itself, and all my other software: http://speccie.uk/ ' $0?$!02$0$ <$<?$ <<$ <g$0T$0$D:0pPTEpdosWhat does NetWorker2 do? NetWorker2 consists of six functions, Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. Ping checks how long it takes for a packet of data to get to a target host, and an acknowledgement is returned. This is a measure of how fast or slow a particular connection may be, and when multiple servers are available, is useful for diagnosing which server is fastest. Lookup returns the named URL for a dotted server address, or the dotted address for a named URL. Normally this is d>h>t  op #SW@0one internally as a DNS lookup in an application whenever it asks for a destination address. Traceroute steps through all the many nodes your packets will take to get to the host server. At each step, a response time is given, and the name of the node is displayed. Whois looks up a URL and returns registry information for that address. As not all domain names may be linked to a particular registrar, there is a choice of six different registrars to choose from. Port Scan checks which ports are open on the target server. This gives an indication of how secure that server may be. Explorer is the function that was the core of the original Networker. You will see two windows when you select this function. You can open a connection to a host in either window, and you will see in that window what you send, and what you receive displayed as a scrolling text display. The bottom window can also open active as well as passive ports, so if you plan to explore an FTP server, you can use the bottom window as the data port, while the top window would be your command port. To make it easier to issue repetitive commands, you can build text command files that will display as an hierarchic command menu. Examples are supplied that talk you through opening an FTP link to the asimov.com site, and a web link to www.apple.com, and a connection to the Giganews Usenet server. Other internet services, such as POP3 and SMTP, can also be accessed with the appropriate commands. Refer to the pages below, and the associated RFCs for more details on how to do that.   b$$y$$ o$$D$yUHELP5P%$ ET% yUHELP6P%% ET% yUHELP7P %% ET% yUHELP8P%& ET%& yUHELP9P%& ET% yINDEX#%8 %8 ySUBJECT.ALIAS$%7 <%7 y pPTEpdoslMenus The Menus Apple Menu About NetWorker2 File Menu Net Info Functions > Ping Lookup Traceroute Whois Port Scan Explorer Connect TCP/IP Disconnect TCP/IP Save Text As Save Selection As Quit Edit Menu Undo Redo Cut Copy Paste Clear Select All Clear Top Clear Bottom Clear Text Set Preferences Edit Command Files >h>t  lp` #SW@<View Logs Menu View Top Log View Bottom Log View Log Net Commands Menu One > Menu Two >What does NetWorker2 do? NetWorker2 consists of six functions, Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. Ping checks how long it takes for a packet of data to get to a target host, and an acknowledgement is returned. This is a measure of how fast or slow a particular connection may be, and when multiple servers are available, is useful for diagnosing which server is fastest. Lookup returns the named URL for a dotted server address, or the dotted address for a named URL. Normally this is done internally as a DNS lookup in an application whenever it asks for a destination address. Traceroute steps through all the many nodes your packets will take to get to the host server. At each step, a response time is given, and the name of the node is displayed. Whois looks up a URL and returns registry information for that address. As not all domain names may be linked to a particular registrar, there is a choice of six different registrars to choose from. Port Scan checks which ports are open on the target server. This gives an indication of how secure that server may be. Explorer is the function that was the core of the original Networker. You will see two windows when you select this function. You can open a connection to a host in either window, and you will see in that window what you send, and what you receive displayed as a scrolling text display. The bottom window can also open active as well as passive ports, so if you plan to explore an FTP server, you can use the bottom window as the data port, while the top window would be your command port. To make it easier to issue repetitive commands, you can build text command files that will display as an hierarchic command menu. Examples are supplied that talk you through opening an FTP link to the asimov.com site, and a web link to www.apple.com, and a connection to the Giganews Usenet server. Other internet services, such as POP3 and SMTP, can also be accessed with the appropriate commands. Refer to the pages below, and the associated RFCs for more details on how to do that. What does NetWorker2 do? NetWorker2 consists of six functions, Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. Ping checks how long it takes for a packet of data to get to a target host, and an acknowledgement is returned. This is a measure of how fast or slow a particular connection may be, and when multiple servers are available, is useful for diagnosing which server is fastest. Lookup returns the named URL for a dotted server address, or the dotted address for a named URL. Normally this is done internally as a DNS lookup in an application whenever it asks for a destination address. Traceroute steps through all the many nodes your packets will take to get to the host server. At each step, a response time is given, and the name of the node is displayed. Whois looks up a URL and returns registry information for that address. As not all domain names may be linked to a particular registrar, there is a choice of six different registrars to choose from. Port Scan checks which ports are open on the target server. This gives an indication of how secure that server may be. Explorer is the function that was the core of the original Networker. You will see two windows when you select this function. You can open a connection to a host in either window, and you will see in that window what you send, and what you receive displayed as a scrolling text display. The bottom window can also open active as well as passive ports, so if you plan to explore an FTP server, you can use the bottom window as the data port, while the top window would be your command port. To make it easier to issue repetitive commands, you can build text command files that will display as an hierarchic command menu. Examples are supplied that talk you through opening an FTP link to the asimov.com site, and a web link to www.apple.com, and a connection to the Giganews Usenet server. Other internet services, such as POP3 and SMTP, can also be accessed with the appropriate commands. Refer to the pages below, and the associated RFCs for more details on how to do that.' $ 0$ 0$ 0$0:$ 0"$ 0b$0$0y$0$ 0o$0$ 0b$0$0y$0$ 0o$0$D$ pPTEpdosApple Menu About NetWorker2 Opens a small window showing the NetWorker2 Version number. Click anywhere on the window to close it. File Menu Net Info Displays a window that shows the local IP Address, the last Host IP address and Ports accessed, and the primary and auxiliary DNS addresses with their descriptive domain names. Functions > There are six functions available from the Functions sub-menu. These are the core functions of NetWorker2: Ping, Lookup, Traceroute, Whois, Port Scan, and Explorer. P>h>t  Op x<#SW@Hlease refer to the relevant sections below for more details on how these functions work, and what they do. Connect TCP/IP & Disconnect TCP/IP The state of these two menu items will depend on whether Marinetti is currently connected or not. If you have a permanent connection to a LAN, or the Internet, then you will probably have already configured the Link Layer in Marinetti to connect at boot. If however you are using a dialup connection using the PPP or SLIP Link Layers, then you may have told Marinetti to only connect on demand. At any time, you can toggle your TCP/IP connection with these two menu items. If you are currently connected to a host, you will be asked to confirm that you wish to disconnect from the host before TCP/IP can be disconnected. As NetWorker2 will automatically connect TCP/IP when needed, and as additionally you can tell NetWorker2 in its preferences dialog to always disconnect TCP/IP when you close a host connection, you may not ever need to use these two menu items. Save Text As If there is text in any of the active TextEdit windows, this will let you save the entire text from the window to a file of your choice. Save Selection As If there is selected text in any of the active TextEdit windows, this will let you save the selected text from the window to a file of your choice. Note: A Teach file preserves the coloured highlighting of any commands you have sent using the Explorer function Note: The optional log file saves text in a different format, with markers to show what has happened. It saves all sessions as a sequential file. Quit When you are finished exploring the Internet, this will close all open connections, optionally disconnect TCP/IP, quit NetWorker2, and return to the Finder. Edit Menu Undo, Redo, Cut, Copy, Paste, Clear & Select All These seven commands are active in the LineEdit controls that are used for setting up URLs etc. in the various Functions and dialogs, and also in the Edit Net Commands editor window. They use the Undo Manager to handle the Undo and Redo options. Clear Top Clears the text from the Top window of the Explorer function. It is immediate, and you will not be asked to confirm this operation. Clear Bottom Clears the text from the Bottom window of the Explorer function. It is immediate, and you will not be asked to confirm this operation. Clear Text Clears the text from one of the five Ping, Lookup, Traceroute, Whois, and Port Scan function windows. It is immediate, and you will not be asked to confirm this operation. Set Preferences Sets up the various Preferences for NetWorker2. Please refer to the pages below for more details on how to use the Set Preferences options. Edit Commands File Allows you to edit the Command Files for use with the Explorer function. Please refer to the pages below for more details on how to use these files with the Explorer function. View Logs NetWorker2 optionally keeps Log files from the data you will see in the main windows when you use one of the six functions. These files can be viewed later from the three menu options. The entries in the log file are time and date stamped, so you can easily follow the sequence of events. If you press the Clear Log File button, after confirming you want to Clear the text in the file will be cleared, and the View window will be closed returning you to the current Function. View Top Log This displays the log file from the Top window of the Explorer function. View Bottom Log This displays the log file from the Bottom window of the Explorer function. View Log This displays the log file from the Ping, Lookup, Traceroute, Whois, and Port Scan windows. Net Commands SAFE2 allows you to set up Command files for use with the Explorer function. If these files are correctly structured, they will display in the four sub menus as further sub menus, listing the commands that you have created. Three sample files are provided with NetWorker2. Please refer to the pages on Net Commands below, for further details on how to edit and use these files. Menu One > Menu Two > Menu Three > Menu Four > DD. $0k< 0< 0<#0f< 0<0<0m<0<0< <10< 0< 0< 0<0<0< < 0L<0O<0`< <D$ pPTEpdosPreferences Set Preferences Hang up on Disconnect if checked, will automatically Disconnect after each function has been completed. If you are using an always connected Ethernet connection, you may wish to leave this box unchecked. Override default DNS servers if checked, will use the Main and Aux DNS servers set in the two LineEdit boxes instead of the DNS servers set within the TCPIP Control Panel. Keep Data log files if checked, will keep the extensive data returned from the Ping, Lookup, Tracerout>h>t  p x&#SW@<e, Whois, and Port Scan functions in the NetWG.Log file. This file can be viewed using the View Log menu command. A timed record of ports being opened, commands you send, and responses from the host will be kept. Note: At the turn of each month, the log file file will be renamed to show the month and year it was created, and a fresh log file will be started. Keep Explorer Data log files if checked, will keep the extensive data returned from the two windows of the Explorer function in the NetWT.Log and NetWB.Log files. These files can be viewed using the View Top Log and View Bottom Log menu commands. A timed record of ports being opened, commands you send, and responses from the host will be kept. Note: At the turn of each month, the log file files will be renamed to show the date they were created, and a fresh log file will be started. The files will be renamed as NetWG.Log.MonYY, NetWT.Log.MonYY, and NetWB.Log.MonYY. Mon represents the month and YY the year that the file was created. Limit incoming data to Explorer display and log files The default setting is for all the data that is generated to be displayed and saved within the two Explorer windows and log files. As a great deal of data may be returned from the Explorer function, if a value between 1 and 65535 is given in either the Top window or Bottom window LineEdit boxes, displayed and saved data will be limited to the sizes given in the boxes. A value of 0 will keep all data. Main DNS Server If Override default DNS servers is checked, the Main DNS Server address supplied in this box will be used instead of the default Main DNS server supplied in the TCPIP Control Panel. Aux DNS Server If Override default DNS servers is checked, the Aux DNS Server address supplied in this box will be used instead of the default Aux DNS server supplied in the TCPIP Control Panel. Note: The default addresses supplied by the NetWorker2 application are for the public Google DNS servers. Paths for Explorer Command files To give you greatest flexibility in using the Explorer function, you can keep multiple Command files that build the hierarchic Command menus. Any four files may be in use at the same time. Enter the full path in the four boxes, or Set a file using the standard file dialog.  $0$0$0)$0$0C$0($50$0$0$0f$ 0$D$  BpPTEpdos Functions PING Ping sends a Ping command to Port 7 on a target server. If the server responds, then the time that was taken for the response to get to the server and return will be displayed. By sending a multiple number of Pings, you can see how stable the connection to a target host server is. A maximum of 9999 Pings can be sent. Note: Not all hosts may respond to the Ping command. If you get no response after a few seconds, click the Stop button to cancel the request. Note: The IIgs internal clock has>x>t   p PJ#SW@H  an accuracy of 1/60th of a second, so displayed response times will not be as accurate as if the same command was used with a modern computer. Lookup Lookup uses the assigned DNS servers to either return the dotted IP Address for a named server, or the the server's domain name from the dotted IP Address. This is the same function that an application will use when making a connection to a target server. Note: As many dotted IP Addresses may point to the same domain server, a reverse lookup with a dotted IP Address that was returned from an initial domain lookup, may not always return the same domain address. The example above, shows forward and reverse lookups for google.com, apple.com, and juiced.gs. You will see that the domain name on the reverse lookup is not always the same as may have originally been given for a domain name lookup. Traceroute Traceroute shows you the path that your data is taking to get to a host server. Although you may make a direct connection to a server, your data will hop its way across several nodes on the Internet to get to its destination. The dotted IP Address, and the domain name of the server for each node is displayed, along with the response time to get to and from that node. Along with Ping, Traceroute is a useful diagnostic to help you decide which server is the fastest for you to use when you have the choice of multiple servers. Note: The IIgs internal clock has an accuracy of 1/60th of a second, so displayed response times will not be as accurate as if the same command was used with a modern computer. Note: Due to how TCP/IP interfaces with a computer's network when NetWorker2 is running within an emulator, both the Ping and Traceroute functions may not actually work correctly with an emulated IIgs such as Sweet16, as the computer tends to change the packets on the way through. For both these functions, you will be asked if you wish to Continue to see if it will work, or to Cancel. If however you select Don't Ask, it will Continue, and you will not be asked the question again. Whois Whois looks up a Whois domain registry entry for a supplied IP address or domain name, and returns the information for that name. As a domain name might be registered in any one of a number Whois registries, a popup menu lets you choose between seven of the main Whois registries. Alternatively, you can enter a different Whois domain registry in the LineEdit box to the right of the popup menu, and select Alternative Whois server" from the popup menu, to use that one instead of one of the popup menu choices: You can find lists of further Whois registries here: https://www.icann.org/resources/pages/listing-2012-02-25-en https://www.nirsoft.net/whois_servers_list.html Port Scan Port Scan scans for open ports on a target server. This is most useful for checking computers on your own LAN (Local Area Network), to see which ports are open, and so which might be vulnerable to attack. If you do not define the range of ports to scan, all 65534 possible ports will be scanned. This may take a very long time indeed, so press the Stop button if you have checked enough ports. Note: If checking ports on an external server, be aware that too many port scans, may result in the server thinking they are under a DOS (Denial Of Service) attack, and shut you out, or blacklist you. Explorer Explorer is the Internet exploring function, that was the substance of the original NetWorker application released back in 2008. The structure of the original application has not been altered in the Explorer function, other than to now support the Undo Manager.   $<0$0$0 $0$0$ 0$0$0 $;0q<0$0$0$0D$ =pPTEpdos!How to Use Explorer Explorer lets you open a port to a host to which you can send text commands. This is very similar to a Telnet session. The Internet actually is controlled by text commands, to which a host may return either a numbered and informative response, or data that may have been requested. Sometimes the data will be sent back through the same port that the command was initiated from, and sometimes, as in the case of an FTP session, through a second port that is opened as needed. To initiate a c>h>t  p p#SW@T onnection, you must first open a port to the target host in the URL LineEdit. You will need to specify the URL for the host, and the port you wish to open. Once the port has been opened, you may see data being sent back immediately from the host, perhaps to welcome you, to tell you what parameters it needs, or you may see nothing, and have to initiate commands yourself to get things going. There are no hard and fast rules, but certain types of connection do usually require the same sequence of events. The session windows: Both windows have the same main elements, with the addition of an Active button in the bottom window. Reading from top to bottom, and left to right, we have the URL LineEdit entry box. Port LineEdit entry box. Active button (bottom window only). Three traffic light buttons, red, amber, and green. TextEdit display box for responses. LineEdit Command entry box. Square green start button. To make a connection, type the URL in the top LineEdit entry box, and the target port in the Port LineEdit entry box. Alternatively, you can add the port number to the URL, separated by a colon like this: ftp.apple.asimov.net:21 Note: If a port number has been added to the URL, Networker will ignore any number in the LineEdit Port entry box. Click the green start button for the window to initiate a connection. If the connection is successful, the traffic lights will change from red to amber to green. Once you are connected, you can type valid commands in the Command entry box, pressing the green start button to send the command. You will see your commands echoed in red in the Display box, and any responses from the host shown in black. Note: If you have selected a command from the Net Command Menu, and it used one of the C control commands, the command will start automatically without the need of pressing the green start button. To close a connection, click any of the traffic light buttons. The lights will change from green to red. If the host closes the connection, you will see the traffic lights automatically change to red. Active and passive ports: When requesting data in an FTP session, you must open a second port to receive the data. The bottom window has been designed to make this easier for you. There are two ways to open a data port, either by requesting a URL and port number from the host by a PASV (passive) command, or by opening an active port at your end, and telling the host the URL and port number to connect to. Some firewalls may not allow active ports to be opened. Opening a passive port: If you send the PASV command to a host, it will respond with a message such as this: 227 Entering Passive Mode (198,202,148,2,150,86) The first four numbers within the brackets are the IP Address of the port, and the last two numbers are the port number itself. If you have issued the PASV command from the top window, simply click in the number within the brackets when it is displayed, and click in the bottom URL LineEdit box. Networker will then automatically parse the number, transfer the IP Address and Port number to the bottom window, and open the port. Typically you would then issue an FTP LIST or RETRieve command, after which you should see the resulting data displayed in the bottom window. In most cases, you will then see the port for the bottom window close automatically once the data has been received. Opening an Active port: To open an Active port, you must first have a port opened in the top window, and be ready to send a PORT command to the host. Click the Active button in the bottom window, and a port will be opened in listening mode, and its IP Address and port number will be parsed and sent by means of a PORT command through the top window port. Typically you would then issue an FTP LIST command, or a command to RETRieve a file. Refer to the Examples section for further details."DD   $0$_0<0$0$0$0$]00H0$0D$NV Introduction Help0 N Contents Help1 NV Preface Help2 N Installation Help3 NV What does it do Help4 N Menu List Help5 NV Menu descriptions Help6 N Preferences Help7 NV Functions Help8 N How to use Explorer Help9 N Explorer examples Help10 N Edit Commands files Help11 N View Log files Help12 NV Commands menu Help13 N Extras Help14 N Appendix Help15 NetWorker2 Internet ToolVENDORSv% ' ['FINDER.DATA&NA;p%8 %INDEX''AA%+VENDOR.LIST(S ApA%Q^0$*BINDEX  VENDOR.LIST N Jim Nichol's Vendor List Vendor.List )*+,-./----------------------------------------------------------------------- APPLE2 VENDOR LIST * by Jim Nichol, Compuserve 72747,3016 * Rev 9-12-96 ----------------------------------------------------------------------- The company's _primary_ business is: S = Software (Commercial or Shareware) H = Hardware and Accessories (New) P = Parts for Apple // Repair, and Used Hardware - some do repairs M = Magazine or Newsletter publisher for Apple //'s * = Has Catalog ----------------------------------------------------------------------- - - P - A+ Technologies, Tracy A. Cook 75624,2402, 800-2APPLE2 S H - - *ABC Direct, David Hardaway 214-306-5494, abcdirect@aol.com - H P - *Alltech Electronics 619-724-2404 - - - M The Apple Blossom, Steve Cavanaugh, s.cavanaugh1@genie.com - - P - Apple Resource Center 209-832-4300 - - - M The AppleWorks Gazette 100316.14@compuserve.com or h.katz@genie.com S - - - *AV Systems, Inc. 805-681-9595, Adrian Vance, Compuserve 70415,1420 - - P - B&D Computer Repair 312-735-9010, Larry Beyer, Fixes hard drives S - - - *Byte Works 505-898-8183 - OFFICIAL Apple System Software/Manuals S - - - Caloke Industries, Dept. SK, PO Box 18477, Raytown, MO 64133 S H - - Charlie's Appleseeds 619-566-1297 S - P - Creative Solutions 513-429-5759 - - - M Eamon Adventurer's Guild 910-766-7490, Tom Zuchowski 71214,1670 S - - - EGO Systems 615-332-2087, Diz@genie.com (formerly published GS+) S H - - Fas-Track, 7030 Huntley Rd Bldg C, Columbus,OH 43229, 800-927-3936 S - - - InTrec 602-992-5515, Proterm telcom software, Jerry Cline 75300,735 - - P - ISR 800-458-6778 Fix floppy drives $15 labor, plus parts if req'd - - P - Jameco Electronics 800-831-4242 S - - M Juiced.GS, 74111,1743, m.jones145@genie.com IIGS-specific news S - - - *Kitchen Sink Software, Inc. 800-235-5502/614-891-2111 Compuserve 73142,1367 S - - - *Laureate Learning Systems 800-562-6801 Special Ed talking software S - - - MECC, 6160 Summit Dr. North, Minneapolis, MN 55430, 800-685-MECC - H P - *Memory Plus Distributors 602-820-8819, Fred Cortazzo S - - - Merit Audio Visual, Ben Weintraub 800-753-6488 S - - - Orange Cherry Software 800-672-6002 S H - - Other World Computing 800-275-4576 (formerly LRO) - - P - Pre-Owned Electronics 800-274-5343 or 617-275-1600 S H - - *Quality Computers 800-777-3642/sales@qualitycomp.com CIS 72133,3245 - H - - Sequential Systems 800-759-4549 or 303-666-4549, seqjoea@aol.com S - - - Seven Hills Software, IIGS-specific, Genie SEVENHILLS or CIS 75300,1743 S - - M Shareware Solutions II, Joe Kohn, Compuserve 76702,565 - - P - *Shreve Systems 800-227-3971 or 318-424-9777 S - - M *Softdisk Publishing, 606 Common, Shreveport, LA 71101, 800-831-2694 - - P - *Sun Remarketing 800-821-3221 S - - - Sunburst 800-337-3457 or 914-747-3310 S - - M TEXAS II, newsletter for AppleWorks 5.1, Bev Cadieux 75757,3722 S - - - United Software 708-416-7459, Mousetalk & AE Pro telcom, 76004,1430 S - - - *Vernier Software 503-297-5317, science software/sensors, catalog S - - - *Vitesse 800-777-7344, 818-813-1270V -1273Fax ----------------------------------------------------------------------- Ask for free catalogs where available! A listing here is not _necessarily_ an endorsement. ----------------------------------------------------------------------- HIERARCHICv% ' \']DEVELOPER.DOCP1 ET 0FINDER.DATAPf%6 p%6 0ZHIERARCHICQ(W9 W9 0WREAD.MEPy  ET 043pPTEpdosN^Hierarchic menus Written by Etienne Petitjean U.S. version maintained by Richard Bennett Documentation by Etienne Petitjean & Richard Bennett Version 1.6.3 Copyright (c) 1991-92 BrainStorm Software Copyright (c) 1997 Seven Hills Solution Specialists _________________________________________________________________ SETUP Hierarchic menus function exactly like classic menus managed by the Menu Manager. If an application uses a main event loop while looping on _TaskMaster and if the user selects an item in>Py>t  ^pT wv]@256789:;<=>?@ABCDEFGHIJKLM a hierarchic menu, the identity will be sent back into the TaskRecord as in classic menus. They are totally transparent to an application. To use hierarchic menus in an application, you have to call a procedure which checks to see if Hierarchics driver code is present in memory. Sample : StartHierarchic pha pha pea #0 PushLong #InputRecord _MessageByName ply plx bcc :GetTheMessage rtl :GetTheMessage lda #0 pea #2 phy pha pha pha pha ldx MyID phx pha pha pha _NewHandle bcc :Message plx plx plx plx rtl :Message lda 1,s sta DataPtr lda 3,s sta DataPtr+2 _MessageCenter ldy #2 lda [DataPtr] sta DataPtr2 lda [DataPtr],y sta DataPtr2+2 ldy #$19 lda [DataPtr2],y xba sta EntryToH+2 dey dey lda [DataPtr2],y sta EntryToH+1 pei DataPtr+2 pei DataPtr _DisposeHandle lda #1 EntryToH jml $ffffff InputRecord = * da #{InputRecordEnd-InputRecord} str 'BSS:Hierarchic' InputRecordEnd = * StartHierarchic is the point of entry for the verification of the presence of hierarchic menus. This routine is also going to initiate StartUp of the hierarchic menus. StartHierarchic must be called by a JSL. This function must only be called once for each application. EntryToH will be the entry point for all calls to hierarchic menus. It must be called by a JSL. HIERARCHIC FUNCTION CALLS Hierarchic menus require several calls. Each call number must be passed into the Accumulator. They are detailed below: *1=StartUp: this call occurs directly when you call the StartHierarchic function. You do not have to call it directly. * 2=ShutDown : this call must be executed when an application that has used the hierarchic menus is quitted. Sample : lda #2 jsl EntryToH * 3=Version : This call returns the version number of Hierarchic. There is also a French version 1.7, written by Vincent Hemeury, which includes a number of speed improvements, but is still a PIF, and does not include any bug fixes from 1.6.3. Sample: pha ;pushes a word for the result Lda #3 ;call number jsl EntryToH pla ;the version number is returned on the stack * 4=NewHierarchic : this call is used to create a hierarchic menu. It functions the same way as _NewMenu2. You first stack two words for result, one word to specify the kind of structure you use a pointer (0), handle (1) or resource (2) and you then stack the structure of the menu. Going back from this call stacks a LongWord corresponding to the handle of the menu created. sample : pha ;LongWord for result pha pea #0 ;0= pointer PushLong #Structure ;the structure is the same than the Lda #4 ;one used by _NewMenu2 jsl EntryToH pla sta NewMenu pla ;the result is the handle of the sta NewMenu+2 ;menu created * 5=DisposeHierarchic : this routine must be called to dispose hierarchic menus created. Every hierarchic menus created by an application must absolutly be disposed before leaving the application. sample : PushLong NewMenu Lda #5 jsl EntryToH !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $01 = No menus recorded in the hierarchic menus !!! $02 = Menu not found. * 6=GetDelay : The notion of delay is the same as in the management of hierarchic menus in the Macintosh. This function allows you to know what delay is used by the current application. The returned delay corresponds to 60ths of a second. sample : pha ;stacks a word for the result Lda #6 ;call number jsl EntryToH pla ;delay in 60ths of a second * 7=SetDelay : this call is used to tell hierarchic menus the delay wanted for an application. The number to stack is always in 60ths of a second. sample : pea #60 ;forces the delay to 1 second Lda #7 jsl EntryToH * 8=GetLastSelect : this call returns the identity of the last item selected in a hierarchic menu. For an application whose principal loop loops on _TaskMaster, you do not need to use this call since the identity of the selected item is returned automatically. sample : pha ;stacks a word for result Lda #8 jsl EntryToH pla ;contains the ID of the last selection * 9=GetMenuHandle : this call is used to get the handle of a hierarchic submenu. The parameters to pass are: the principal menu to which the submenu is attached whose handle you want to get and the submenus identity. sample: pha ;stacks a LongWord for result pha PushLong NewMenu ;handle of the main menu pea #10 ;identity of the submenu lda #9 jsl EntryToH pla ;the handle of the submenu is returned pla ;The carry is set if an error occured !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $01 = No menus recorded in the hierarchic menus !!! $02 = Menu not found. * A=SetMenuToCustom : this call is used to transform a menu normally managed by the MenuManager into a menu managed by the hierarchic menus. This can be useful for some utilities which would add submenus in the menus of applications not belonging to it (Cf: Kangaroo). sample : pea #1 ;identity of the menu to transform lda #$0a jsl EntryToH !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $02 = Menu not found. * B=RetrieveCustom : this call has the inverse effect of the previous one. It retires to the menu the procedure which allowed it to be managed by the hierarchic menus. The menu will go back to being managed by the MenuManager. sample: pea #1 ;identity of the menu to retransform lda #$0b jsl EntryToH !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $01 = No menus recorded in the hierarchic menus !!! $02 = Menu not found. * C=GetMainMenuID : (when the user has selected an item from a hierarchic submenu) this call gets the identity of the main menu from which the selection came and also the identity of the item from this main menu which pointed to the selected submenu. sample : pha ;stacks a LongWord for result pha lda #$0c jsl EntryToH pla ;item id pla ;menu id * D=GetMenuColors : this call is used to get the standard colors defined in a main hierarchic menu. The result obtained is in the following form: Oxyz -> z= the standard color of menu items. -> y= the background color of the MenuStringTitle. -> x= the standard background color of menu items. sample : pha ;Word for result PushLong NewMenu ;Handle of the menu lda #$0d jsl EntryToH pla ;The result is stacked. !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $01 = No menus recorded in the hierarchic menus !!! $02 = Menu not found. * E=SetMenuColors : this call is used to force the standard colors of a main hierarchic menu. sample : pea #$0eee ;stacks the desired colors PushLong NewMenu ;handle of the menu lda #$0e jsl EntryToH !!! Internal errors of the hierarchic menus that can be returned !!! for this call are: !!! $01 = No menus recorded in the hierarchic menus !!! $02 = Menu not found. * F=GetInitialDelay : The returned delay corresponds to 60ths of a second. * NOTE: This call is new in 1.6.3 [RJB] sample : pha ;stacks a word for the result lda #$F ;call number jsl EntryToH pla ;delay in 60ths of a second * 10=SetInitialDelay : The number to stack is always in 60ths of a second. * NOTE: This call is new in 1.6.3 [RJB] sample : pea #60 ;forces the delay to 1 second Lda #$10 jsl EntryToH USING HIERARCHIC MENUS In order to use all the functions of hierarchic menus, you have to add to the end of the string of a menu item the symbol { followed by the different functions which can recognize the hierarchic menus: -> cXXX : c means that the item is going to be in color and the XXX corresponds to the colors that you want to put on the item. The first X corresponds to the color of the CheckMark, the second X corresponds to the color of the item and the last X corresponds to the color of the keyboard equivalent. X varies from $0 to $f. It is possible to define different colors for each item from a hierarchic menu. c must always be lower case. -> bX : b means that the item is going to have a background color. X corresponds to the background color. X varies between $0 and $f. It is possible to define a different background for each item in a hierarchic menu. b must always be in lower case. -> iYXXXXXX : i means that you are going to have a small icon for an item from the hierarchic menu. When the menu is designed, this icon will be placed in front of the string. Y specifies if the icon is a pointer p, a handle h or a resource r. The X will be the pointer, the handle, or the resource identity. Where you are pointing to an icon in a resource, you have to give the complete identity of the resource, 8 bytes. Otherwise, for a pointer or a handle, there will be only 6 bytes. i must always be in lower case. sample : Pointer : ip012000 Handle : ihE06E00 Resource : ir00000001 In the case where you are using icons which are in a pointer or in a handle, you will not be able to put the pointer or the handle directly in the string. Therefore will have to use the instruction _Long2Hex. The same principle will be used if an item points to a hierarchic submenu which is a handle or a pointer. sample : PushLong #IconDefinition PushLong #MenuItemString+9 pea #6 _Long2Hex MenuItemString str 'Hello{ipXXXXXX' -> *YXXXXXX : * means that this item is going to point to a hierarchic submenu. Y specifies if the submenu is a pointer p, a handle h, or a resource r. The X will be the pointer, the handle, or the identity resource of the submenu. As for the icons, 8 bytes are necessary for an identity resource and 6 bytes are necessary if it is a pointer or a handle. The menu structure to which you are going to point is identical to the one that you will send to _NewMenu2 when you want to create a menu. sample : a menuitem string which uses the functions of hierarchic menus. -> str 'Hello{c555bEir00000006pr00000008'. This means that the item will have a checkmark, the string and the keyboard equivalent of color $5, the background color $e, an icon in a resource whose resource identity is $00000006 and that the item is pointing to a hierarchic submenu which is in a resource whose identity is $00000008. The hierarchic menus also allow an icon to be shown in the bar menu in place of a string, and standard colors to be defined in a hierarchic menu. To do that, you will have to put corresponding information in the Menutitlestring of a menu. -> for an icon, same principle as for an icon in a menu item : iYXXXXXX. -> to define standard menu colors : cXXX. The first X corresponds to the standard color of the menu items. The second X corresponds to the background color of the MenutitleString and the last X corresponds to the standard background color of the menu items. If you do not want to specify the standard color of the menu items, do not put anything at all. Attention - An item which is pointing to a hierarchic submenu cannot have a keyboard equivalent. - A hierarchic submenu must have a null MenutitleString. - Hierarchic submenus can have keyboard equivalents. NB: Before any use of hierarchic menus you are advised to look at the application example using them and to look at the source Merlin 16+, all of which are furnished with this documentation. MANUAL LOADING Some applications offer an option to load Hierarchic from any GS/OS location, allowing these applications to use Hierarchic without requiring the user to install it permanently on boot. Previous versions of Hierarchic were permament inits, making it easy to install by calling _InitialLoad2 and calling the load point. From 1.6.3 onwards, Hierarchic is a self contained CDev. To load Hierarchic from another location, locate the Hierarchic CDev, open its resource fork, call the following code, then close the resource fork. LOADHI ~GetCodeResConverter ;Get address of OMF code resource converter LDA 3,S PHA LDA 3,S PHA PEA $8017 PEA %01 _ResourceConverter ;Install it for rType $8017 ~LoadResource #$8017;#1 ;Load the Hierarchic driver code PLA STA HANDLE PLA STA HANDLE+2 ;...and save the handle in DP LDA [HANDLE] ;Deref it into a self mod JSL STA >:MOD+1 LDY #1 LDA [HANDLE],Y STA >:MOD+1+1 PEA $8017 PEA %00 _ResourceConverter ;Remove the OMF resource code converter ~DetachResource #$8017;#1 ;Detach the resource ~GetNewID #$3100 ;Get a new ID for inits PLA LDY #6 STA [HANDLE],Y ;Make it an init :MOD JSL 0 ;Call its load point (self mod) =END= 3O  .    1qp$<*B DEVELOPER.DOCREAD.ME HIERARCHICRppdosS&!HTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxIn; HierarchicRichard Bennettanv1.6.3d2Brings hierarchical menus to the Apple IIGS.c Hierarchic7Copyright (c) 1991-1997, Seven Hills Software SolutionsaIn!H޷~I++p"$$!"" C% h( >2p ;DL}H)I*,  ^   ) 6  (uJLRFCBDrag delay:JLRFCBInitial delay: '4?3<3 ?3?3??<0?<>33>><3 <3>33>33>JLRFCBHierarchical menus for the AppleIIGS. FCB FCBOriginally written by EtiennePetitjean, for BrainStormSoftwareInc. FCB FCBCopyright (c) 1996-1997, Seven Hills Solution Specialists FCBhttp://www.sevenhills.com/ applesoftware/;5,A Hierarchic5 K X } 3* ") % )@lLeHH"zhlLe,XHڢ "lhhLeXHڢ "lh(h*Le((*(""ڠZZZXHZZZ "lhhhLe hhHH"z8h >He "h)HHe "hHf "h)HHf "hT  3l%XH"HH""+8k+k Kl 3(* 3l+k}l3P`P`c`RRLZ`` T`T 3hh*( "᣺((l-ilȷi *(""L*( "᣺B((l-ilȷi B*(""LBDDB`@HHH"h h l9  "  ȗȷ)  ""L HHH" z l H HL @ ;BdD Dljh 3h  hhhL  "   LHZ***) /) {Lȷ*ĒL :::: hȷj 0@D&   h hhh 0hi hD:L ""`   3h hhL  "   LqHZ***) /) {L_ȷ*ĒL_ :::: ȷ 0   hhh h 0hi h:L ."`jhbHH"lhhLɀdHHbHhHjH>"l zLZڢ "    I# b1 0H l#HH*("hiH*("l#H  ""` ."d dL*( "( (:  ȥȩȗȗȗd@x@@4 @@6@ȩ*(""  "  ȩȷ  ""H`  3h  hhhL  "   L,HZȷ***) /)L {Lȷ*ĒL ȷ) r hpLbHHeHڢ %"zHHbHZڢ>"lhh 6 0 ȥ   h hhh 0hi hl:L; ""`h h  ZHK 3 *H(H "(( ixȌ  "    I# b1 0 ""d@x@@4 @@6@@ȷȷ ȷ ȷ @*(""ZR@ 3hz+"H K 3[*H(H "((ȭȭ ȭ ȭ *(""LR 3+ H HkHZ K 3 Å 3+zh\*Z(ڢ "((L{ Z@ ȥ hiOhh:HH*("hBh@eiHZB8@H+"B8H*("*(""`HZ K 3+zh\HZ KPL   3ŅDž)L *Z(ڢ "((\L 냼 ÅHH"hhHH" "B ""HHZڢ"h@8,JJ^@HH"L HH@*" " (^Z ȷ  "   )/&\  i ""zБL hhBiH" ""L ȗȷ) "" "B ȥȄB""""  hhL ""J*("" 3+zh\H K 3+HKk  "   L HZ***) Ȍ/) {L ȷ*ĒL :: Hڢ " ) "" 0    hh "h h^ 0hi h:L<  ""`HH"h)xJJJJ)46)!JJJJ)!h` )HH"zh 8HHH"J` q ѩM â"J` )L "l`n `ڽ@ "h>(ZZZHX HZZ "hhh`Bhi`ХXڽ " L) (h8حX H"`BXH"`@ "`BڭXH"`XH@ "`XHB@ "` DB `BHh:̥D w`H "hh`ڧ @HX Hڢ "hh`@`>H ">`H> >h\hkHH"zh`BSS:WCM started  u  *(JVG*^N^HJ hkh\HJh hhkh\HJh hhkh\HJh   hhhhkh\HJhkh\HJhhkh\44& @ 7 44H"h "H"h H"hH"h "H "h "` """`BSS:Hierarchic( Hierarchic v1.6.3""33DDUUffww!#b+UUUU3?<0<3<<<?3< <030 3<03<3<33 033DDD@3DDDO*( ">< ""  "  <<B(( " iLUȌNȷNȷ)XȷLȷ)xz|JJJJ)4)6ȷ 7Ƞ((NȭNȥXȥLd@x@@4 @@6@ȥ*(""" ""><"" 3+;ik )(ȷ@88 N N@XHH"hhɀ(dd2s[Yi q )~ȷ`@dNdLNBXFB8 db s3iHiH"H"H"H"H"H" H""""BHi |bv`p@nȷȷ^))***) Ȍ %1 x2 2 _2 )dF 1i  s3)-j 3HHiHH:"<"CC2"U"KK2"hhLvLd e|J |Hr  8rJmH "de|mp| dJe|Hi H:"᥄x H"Ԑ" W3mpm͔ 2 =3""᥎0[[SS8diHH"LXnB)Hz H"8Hi H:"""᥀>H| H""Hi H:""^T ~)'CC2"U"KK2"^)@'i HH:"6"<"@i @i i  0h:0L"""""`zzi ڊeN i Lȷ***) Ȍ %1` P)-X  N`x fXNWN eNPH譂)`B) { !ȷ*Ē  FLD  H 0h` 0`dldXd PHH"hh0ȷ2ɀdHH"hhHH "hh  tHH"zaȷ HH"hh688  ȷ5`djPȗ8`HZZH))H"hz***) Ȍ %1 )dF 1 W3mpjj 0hi h:L (d2ejj͔8j"HH "zZڢ " ::8@i @ XPlNl""` ) 5 5 p!H"h"":HH"hhɀdRZ@  I#B)@ 0`J b1 14HxH) !x!4"4 3pv W3mT"v `#3H"x H"H::H:" =3" )'CC2"U"KK2"hxh4 0` ***)  %1`pmHHHr  8rJmH "pH;"`dTPHHHHH #P` ):@ i  )L):`N ` -`6"Z`R` )`T) J)7"S"La%CC2"S"KK2"La%@ @ ,h@ @@`V"@eN i )o***) Ȍ %1 )TdFddbd`ddd 2 x2 1v8d mJ Hr  8rJmH " 0 )`)`)TT 3)`8T: 0 "<<  ȣȣȣ@eN i LH6HxH zx|b`6@H" "ȷ HHH"XNHRN%HHHHHHF"  " '" ""FhhhhhhhNhRhNhX"hhhh h"hhxz|h6hVL<<:ZL'R`" 0~ "ڭ~HHڭiHiHڢ"h""h"" )o ):@L@$ ) T`dRdVRV   ` * * o+`: % 3)A` 0L)V.R)Z$H * 38hLR *`V8VV 0Z ";4L(*% *VHV *dVhV *VL(%  ` 3VL)VV*% V 䔰VL(z<<@: vȷrȷxȷtzv9x5r1t-!:864fd *df468:Z *`@@LW)V 䔰VL(V̘К`V @V *dVL(VHԜT:864fdPVHHH:H #ʎVPdf468:T *`z `:864fd`<<: ȷȷȷ`d8ej͔%@Ɯi8j!I@88j ej :ele͖ l`R`L`8JJdJ f+8dHHHiHXHڢ "lh4h6`446N-4M-2:J-"JdJie0:8I-Bf@ -6" "dH,"iHH:"HH<"d H,"HiH<"6"d`V \:864fd6J-4I-:N-8M-@fB -HH64""` HH "h-[h"+dfM-e@M-O-iO-I-eBI-K-iK- -["+`dBXZL/dZ PNP@LN8 i @eNi hN Bdh LU.@NZL/NeNPL/NNeN:i hi 8NeNPBsskkZhhhhL.Zdb s3iHiH"8  i N*Z0NodBRNPcdBi hi h4ZHHg"~"᭠HHh"@hi@ h@)\ 0 "1,̾:L-:L-L` 0ZdL`//// 0ȷfhh` 0ȷ "fhh` 0HHȷHڢ"hhǜ)3) Q0ȷhh`Y0h0~0g0ȷ`ȷ`HH(ȷHڢ"hh`fHH""`᪯`" 0~ڭ~HHڢ"h""h""`dDdHvp/)8`F { 8`ȄDH!` DFL1c@87)xz|ȷ@87)4ȷ@87)6 ` 0 ) |Y2 DFLV2i ) HphHHeHڢ %"hzr p!hHHZH"hzd prv!`02$22 DF ` * ` DFL2c@87)ȷ@87)ȷ@87) ` DFL2b@87 )`b `8H)   H"hmpm͔0ə0)"eH`8H"eH`8HH"eHh``b6 3T"`H z0"`z;8[:Z`z;iZ`፼፺`J`J 3Zڢ""HHZڢ"h@H"@*"HH "MHZȷ Hڢ "  ȩ ȷ  ""zh:г"" 3`ZHK::H"h"hz\HK h\ H)<"`?~  RX^CK[ShCuK"#C!#.#Kd$t$C$$K$%1'(+-,--J.sP.k.)/33)3)333z444F $47BPS_osw|%e 7ANQky#&.:JUckx| +?DRf~>x$,4KTaf>ADGJMPSmx{~$1<@CM]djmpt{%5;gqw"%4;ARWb~!+.1:@HUhtx|& !$'*4CGT\( %+.6EHKNZdglorux{ "',AD$+/48=ADGKORVY\`dg -38>KP\_cflpty#0CT\gky0U[^dgmpv} #&-07:MS^ehp$ ",69EK -0]u ,@HCDEV HCDEV K;8  [ ! +;ik9:999999=9` b LHH4"HH("HH"h(""H1 "h" `  YHHH0""HH0""HH0" "HH0" "` ȷ HHH 0""HHH 0""Hf "He "h l`"* )` `H"hFHHH"z`ZHHHHFHHH "`"   D C"`\BSS:HierarchicH"BH"Bh`H"B"B`Box, box, box...K _H H H" 9:4 *% 8 i  H H"᫣zzzk#%')+-/1357E~ -4yBrBfB^BH|pPTEpdos Hierarchic v1.6.3 by Richard Bennett Copyright (c) 1996-1997 Seven Hills Solution Specialists This is a minor update to Hierarchic. There are a couple of bug fixes, plus some changes which were only released in a French only version 1.6.2. The last official non-French release, was version 1.6.1. There is also a French version 1.7, written by Vincent Hemeury, which includes a number of speed improvements, but no bug fixes or CDev conversion. INSTALLATION Do NOT delete your existing Hierarchic INIT! IF>Py>t   p v6w]@Tz}~ YOU OWN SPECTRUM: Move the Hierarchic INIT out of the System.Setup folder, and put it into the Spectrum folder. Spectrum does not yet know about the Hierarchic CDev, so if you shift-boot the computer, Spectrum wont be able to load it. If you move the Hierarchic INIT into the Spectrum folder, when Spectrum notifies you that Hierarchic is not loaded, you can click Locate and open the Hierarchic INIT (not the CDev). IF YOU DO NOT OWN SPECTRUM: In the Finder, highlight the Hierarchic INIT (inside the System.Setup folder), then get Icon Info. Click the Inactive checkbox. If you happen to discover a problem with the CDev version of Hierarchic, you can inactivate the CDev, then reactivate the INIT version. Please report any Hierarchic problems to: support@sevenhills.com You can also visit our Web site (SIS recommended): http://www.sevenhills.com/applesoftware/ CHANGES 1.6.3 - 3rd July 1997 - If an application accidentally called _MenuKey while there were no menus (or _TaskMaster called _MenuKey because the tmMenuKey bit was incorrectly set), then Hierarchic would follow a non-existent chain, searching 65536 random handles for Hierarchic menu records. Fixed. Thanks to Sean Craig for reporting this. - The CDA interface is now a CDev. (New code is available for developers wanting to autoload Hierarchic from other (ie. non-*:System:CDevs:) folders) - The PIF is now loaded from the CDevs resource fork. - Edited rIcon to make it CDev and _ShowBootInfo preferred size. - Some new requests have been added, for programmers. - Now works with Gus. - Some speed improvements. 1.6.2 - ? (French only release) - Dimmed items with dividers also dimmed the dividers. Fixed. - Now supports more than 256 items. 1.6.1 - ? (Last U.S. release) =END= {DD $ $ 0H(  <<6(<0  f UNDO.MANAGERv% ' \'FINDER.DATAɄR$p% ]READ.ME.FIRSTP$ >t  _p <;SW  ese features into your own programs. http://speccie.uk H l<zT<^U,C ~ExpressLoadU XC@DD,E main GXC0E main XC W   V|^Y v 'H` "h'H""HH)"hh)" "HH"' :%#'#'#':#'k e ;8["d'$0'0S'lM'O''HH' H' H +"Z  H H8"z !' G S' "h;i+;it e ;8["d%'K'  ' "h;i+;o%'5 oZȷ  H HH1"8"z ֩ ` e ;8["d%' =+'7/Q' 9'ȯ;' WX ȗGE) )K A A)5+M'  "h;i+;o%'7pM'  )Ы ='ȷ?'M'Q'%?');'='9' O'_ G'iȗiG' O'ZY+'0  ] e ;8["d%' =     0  ~    N    e ;8["d =+'0   ] z "h;i+;i e ;8["d =  "h;i+;i\ i`ZȷDG'ȷ:I' %" a&zZȷHH"z` e ;8["d  K' o"h;i+;i e ;8["dHH"h S'}HHH3"hh  # '' )' '')' L     "h;i+;i)ȯ'' ȯ)' iiC`' 0`' ' Z H1"z ` e ;8["dڿ'K''' ' hi0ԭ'H""h;i+1 e ;8["d !6   ! S' ȷ 'Ȋi0#)Ȋi옠)Zȥ ȥ0 hi`hHihHi 80HHH "hhi80HHH "h"h;i+;i Y'HW'HU'HS'k#'hU'hW'hY'کS'`h) 8k e ;8["d%' =V+'09U*/)(()!)@ ) ) A)_Z  X 0C ~V A Y e ;8[%'"dHH" S'|! r)Z!ȥ ȷbhiڠiS'#Zei!ȥȩȩȩ ȗO'hi)i i qHHHH"h-'h/'S-'JHH""H'HH0"h iȥȥ"Z S'"GG'I' %" % " )&S'ɠ iȥȥHH "U&W&-'Y&/'[&+&S&?&" Q&" =&HH""ႎ e ;8[ %'"d k)Zȥ ȷhiک!#S''hi)i)?: H ciS' ȷ!ȷ#Hh0HH#H!H0"h "!G'#I' %" &" )&+&C&?&HH'&H%&HH "!#L#H!H "%&I&'&K&!#E&G&" A&" =&(S'#H!H""#H!H"")@  Z" a&zȗȗ 8ŗ "ႆZM'O'&YO'+'"   ] z8,+'  K! $ `i S'`+'`!XM'+'0 )'H''H""` ])'H''H""` z lCM'+'05)'H''H""`)'H''H""`S'`VM'+'0 ")'H''H"` ])'H''H""`HH"h`'' z}''H'H"HH'H'H!'H "h'h''H'H "'')'<) 'ȯ')'H''H%"`AM'+'0)'H''H"`)'H''H""`M'O'`+'0% `S'`M'+'0E 0C.C.C.CZگ)'H''H")'H''H"`@ ]BC>C!@C, -'ȷ /'n 1'ȷ 3'r 5'ȷ 7'['!HHڢ"h A'A' H1"[' H0"+'_' -'/' XH1" GH0"]'*+'[' -'/' H1" H0"]'4+'['3'7'1'5' bH1" QH0"]'4+'_'3'7'1'5' H1" H0"['&" H0" H1"[''# H0" H1"M'`K')sک))G' )A )I'Zڿ) %" a& )H)H")) )ziiiu`Q'!'''ȯ)'  i q iQ''')' !'*C,C .Cȷ0CHH,CiH'H "hg'hi'S'` ȯg'Ȋi'i'Hg'H "   g' i'*C H H+"HH i iH,CH+"i'Hg'H""`Q'!'''ȯ)'  i q iQ''')' !'2CnCȷ@CȷBCDCȷFCHC)'H''H" "HC4CJC6CPC8CRC:CVC TCHH4Co8Ci6Co:CHگ'H "hg' hi'S'` ȯg'Ȋi'i'Hg'H "2C H H+"HH io8C o:CHگ6CH4CH i iHگ)'H''H" "hhi'Hg'H""` ES' ȗȗ88hg'hi'""`HH'H "hg'hi' ȯg' ȯi'i'Hg'H "g'G'i'I' %2C H H+"i'Hg'H""HHs'w')'H''H" "hhu'Hs'H "s'u'U&W&4CY&6C[&ETP& "" )&8Hu'Hs'H"y'Hw'H"i'Hg'H"hW+&S&?&" Q&" =&HH'H  "ho'hq''q'Ho'H("H& "h+&H%"h{'y'Hw'H "q'Ho'Hp "+&H "H{'H%"hy'Hw'H"u'Hs'H""` "" %" m&ls&w&", u&X" &LHHHH&H&H&H "ha'hc'he'VCc' TCa'` 8`Q'!'''ȯ)'  i q iQ''')' !'CCȷ Cȷ"Cȷ&C'ȷSCRIPT V1.10 Rr NetWorker 2 Components The script NetWorker 2 Components installs the necessary file to use NetWorker 2. The selected disk must be a startup disk.\\ ~* ~:::Workspace::: 1 Components:Undo.Manager:Tool132 System:Tools:Tool132 ~:::Workspace::: 1 Components:Fonts:Shaston.16 System:Fonts:Shaston.16 ~:::Workspace::: 1 Components:Hierarchic:Hierarchic System:CDevs:Hierarchic ~:::Workspace::: 1 Components:Help:Help System:Desk.Accs:Help ~:::Workspace::: 1 Components:Help:Help.Files:Help:Index System:Desk.Accs:Help.Files:Help:Index ~:::Workspace::: 1 Components:Help:Help.Files:Help:Subject.Alias System:Desk.Accs:Help.Files:Help:Subject.Alias ~:::Workspace::: 1 Components:Help:Help.Files:Help:Help.Notes System:Desk.Accs:Help.Files:Help:Help.Notes ~:::Workspace::: 1 Components:Help:Help.Files:Vendors:Index System:Desk.Accs:Help.Files:Vendors:Index ~:::Workspace::: 1 Components:Help:Help.Files:Vendors:Vendor.List System:Desk.Accs:Help.Files:Vendors:Vendor.List ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Index System:Desk.Accs:Help.Files:NetWorker2:Index ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Subject.Alias System:Desk.Accs:Help.Files:NetWorker2:Subject.Alias ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help0 System:Desk.Accs:Help.Files:NetWorker2:Help0 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help1 System:Desk.Accs:Help.Files:NetWorker2:Help1 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help2 System:Desk.Accs:Help.Files:NetWorker2:Help2 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help3 System:Desk.Accs:Help.Files:NetWorker2:Help3 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help4 System:Desk.Accs:Help.Files:NetWorker2:Help4 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help5 System:Desk.Accs:Help.Files:NetWorker2:Help5 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help6 System:Desk.Accs:Help.Files:NetWorker2:Help6 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help7 System:Desk.Accs:Help.Files:NetWorker2:Help7 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help8 System:Desk.Accs:Help.Files:NetWorker2:Help8 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help9 System:Desk.Accs:Help.Files:NetWorker2:Help9 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help10 System:Desk.Accs:Help.Files:NetWorker2:Help10 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help11 System:Desk.Accs:Help.Files:NetWorker2:Help11 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help12 System:Desk.Accs:Help.Files:NetWorker2:Help12 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help13 System:Desk.Accs:Help.Files:NetWorker2:Help13 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help14 System:Desk.Accs:Help.Files:NetWorker2:Help14 ~:::Workspace::: 1 Components:Help:Help.Files:NetWorker2:Help15 System:Desk.Accs:Help.Files:NetWorker2:Help15 ~~'gf$(* COMPONENTSB NETWORKER2SCRIPT V1.10 XR Application: NetWorker 2 The script Application: NetWorker 2 installs the necessary file to run the NetWorker 2 application.\\ ~* ~:::Workspace::: 1 NetWorker2:Finder.data NetWorker2:Finder.data ~:::Workspace::: 1 NetWorker2:NetWorker2 NetWorker2:NetWorker2 ~:::Workspace::: 1 NetWorker2:Manual NetWorker2:Manual ~:::Workspace::: 1 NetWorker2:Changes NetWorker2:Changes ~:::Workspace::: 1 NetWorker2:NetW.Logs:Finder.data NetWorker2:NetW.Logs:Finder.data ~:::Workspace::: 1 AllAbout NetWorker2QuitConnect TCP/IPDisconnect TCP/IP View Top LogView Bottom Log@ File  Edit View Logs SaveCancelEdit Net Commands Save Text AsSave Selection AsHang up on disconnectKeep Explorer Data log filesSaveCancelClear Log FileSetSave AsLookup TracerouteOKKeep Data log filesWhoisStopwhois.nic.ad.jpwhois.apnic.netwhois.ripe.netwhois.arin.netwhois.networksolutions.comwhois.internic.netwhois.iana.orgAlternative Whois server ->>Only test ports between Port ScanPing!Send an unlimited number of pings Send onlyOverride default DNS Servers#$  "  #  $ PPQQR S  '  ZzXxCcVv@GgHhAa@ Qq        Yy@!@Ii112233445566 @  @     JLRFCBURL:JLRFCBPort:FCBJLRFCBURL:JLRFCBPort:FCBJLRFCBNetwork Info:JLRFCBNetWorker2 Log FileJLRFCB(Trip the light fantastic) Explore the Internet by hand NetWorker2 TCP/IP Utility Copyright 2008-18 Ewen WannopFCBJLRFCBPreferences:JLRFCBLimit incoming data to Explorer display and log files:FCBJLRFCBTop window:FCBJLRFCBBottom window:FCBJLRFCBPaths for Explorer Command Files:JLRFCBOne:JLRFCBThree:JLRFCBTwo:JLRFCBFour:JLRFCB(ex. 10.0.2.1 or www.example.com)JLRFCBandJLRFCBPlease wait, looking for DNS serversJLRFCBMain DNS Server:FCBJLRFCBAux DNS Server:FCBP B[\P  P  P  P   P   P V(  Pq  P 9z P  P ~  \@ ``@  " NetWorker2Copyright 2008-18 Ewen Wannop NetWorker2 2.0.0 A handy and useful Internet Tool for the IIgs Freeware - May not be sold Technical help: spectrumdaddy@speccie.ukI  NetWorker2E NetW.*H  NetW.Data'<)IHH'H'H"hh'H'H"HH "''HH'H'H"h&Ch(CHH&Ci(CiHگ'H "hg'hi' ȯg'Ȋi'i'Hg'H "ᯃ' '  g' i'C H H+"HH i iH&CH+"i'Hg'H"" HH"(`E'ȷȷHH"\HH "HH*C)")'H''H")'H''H"iiH,CH)'H''H"HH"".CH0CH)'H''H"`E'ȷȷHH"HH "G'I' %HH2C)")'H''H"E'0Kio8Co:CHگ6CH4CHiiHگ)'H''H" "ႛ "HH6CH4CH'H "hs'hu'S'`u'Hs'H "s' u' E& G&4CI&6Cp6CK&" )&$+&C&?&" A& " =&8S'" a&"" =&u'Hs'H""`H%"h{'H& "h?&HH"hw'hy' u'Hs'Hy'Hw'H)'H''H" "y'Hw'H"u'Hs'H"?&H "H{'H%"hFCHDCH)'H''H"%">CHRVZ^bfj 8CHUZejw| <@Gcl #,8AIPTXhpy"+15[ajptz~(dswAEKgkt}@LQ^dmu "&*.26:@OS[_e{"'9fk 6;INZ`hquy} %/4^nrw &16>KPU_cko{6;PUpv| P\a 05:?T 6;DINZ`hquy}27>CQV[`lq}\af| %@JQUYbn-7cioy Xp'4AN[hx~-`q|7Mr &1