language:
Find link is a tool written by Edward Betts.searching for Disk Copy 23 found (32 total)
alternate case: disk Copy
Security Account Manager
(1,040 words)
[view diff]
case mismatch in snippet
view article
find links to article
the SYSKEY function in Windows NT 4.0. When SYSKEY is enabled, the on-disk copy of the SAM file is partially encrypted, so that the password hash valuesList of Apple II application software (463 words) [view diff] case mismatch in snippet view article find links to article
editor Design Your Own Home - home design (GS) Disk Muncher - disk copy Diversi Copy - disk copy (GS) DOS.MASTER - DOS 3.3 -> ProDOS utility Edisoft - textDiskcopy (681 words) [view diff] case mismatch in snippet view article find links to article
diskette drive, diskcopy can be done by typing the source drive only. The disk copy program will prompt to insert the second (target) diskette once it finishesTurboDOS (524 words) [view diff] no match in snippet view article find links to article
CHANGE Checks disk is not in use and flushes cache prior to removing a disk. COPY File copy. DATE Display or set system date and time. DELETE File deleteYo Ho (A Pirate's Life for Me) (894 words) [view diff] case mismatch in snippet view article
written for the US America's Cup yachting team. 1986: Quick Nibble, a disk copy program for the Amiga computer, plays a sample of the song on its titleIchitaro (word processor) (1,484 words) [view diff] case mismatch in snippet view article
Allow the use of ATOK from other applications 2 May 1986 3 June 1987 No disk copy protection from this version 4 April 1989 Three minor versions exist,Elite (video game) (6,546 words) [view diff] no match in snippet view article
used as part of the protection system, created by Rob Northen. This BBC disk-copy-protection was also used by Superior Software in its Exile game. AcornsoftTime Machine (macOS) (2,043 words) [view diff] case mismatch in snippet view article
interface; Time Machine presents each backup to the user as a complete disk copy. Time Machine on HFS+ volumes creates multiple hard links to unmodifiedIT disaster recovery (2,424 words) [view diff] case mismatch in snippet view article find links to article
is a backup is completed. It halts update processing while a disk-to-disk copy is completed. The backup copy reflects the earlier version of the copyInstant Music (software) (403 words) [view diff] case mismatch in snippet view article
real music without much effort. Webster's only criticism was the key disk copy protection. AmigaWorld gave Instant Music a 1986 Editor's Choice AwardKing's Quest I (2,690 words) [view diff] case mismatch in snippet view article find links to article
releases of the 128 KB and 256 KB versions use different forms of on-disk copy protection. 1984, Apple IIe and IIc: Based on the self-booting PC/TandyWhere in the U.S.A. Is Carmen Sandiego? (1986 video game) (1,964 words) [view diff] case mismatch in snippet view article
only educational but also loads of fun". Macworld criticized the key-disk copy protection, which requires one of the game disks to be inserted even ifAmiga software (5,506 words) [view diff] no match in snippet view article find links to article
similar technique involved writing to normally-unused sectors of the disk. Copy software called "nibble" copiers appeared that could exactly reproduceCommodore 1541 (3,667 words) [view diff] no match in snippet view article find links to article
the correct error message is returned. The general idea is that simple disk-copy programs are incapable of copying the errors. When one of these errorsCommodore REU (1,136 words) [view diff] case mismatch in snippet view article find links to article
for the REU as a RAM disk, as did the C128's version of CP/M, and some disk copy programs used the REU to facilitate high-speed copying with a single diskKaizo (2,690 words) [view diff] case mismatch in snippet view article find links to article
commercial success, it included on its floppy disk a demo feature to modify a disk copy of Super Mario Bros., turning it into a ROM hack called Tonkachi MarioIBM PC compatible (8,206 words) [view diff] case mismatch in snippet view article find links to article
It was so much faster that it quickly surpassed Context MBA's sales. Disk copy-protection schemes, in common use at the time, worked by reading nonstandardHome computer (11,862 words) [view diff] case mismatch in snippet view article find links to article
systems some advanced capabilities – a utility program could sideload a disk copy routine onto the drive and return control to the user while the driveBit nibbler (1,280 words) [view diff] case mismatch in snippet view article find links to article
and was replaced by the IBM PC and its clones. Part of the Fast Hack'em disk copy software was a nibbler used to produce copies of copy protected CommodoreManiac Mansion (7,270 words) [view diff] case mismatch in snippet view article find links to article
Apple versions due to lack of disk space, so those instead used an on-disk copy protection. There were two separate versions of the game developed forBooting (11,363 words) [view diff] case mismatch in snippet view article find links to article
was also extremely flexible and supported a wide range of customized disk copy protection mechanisms. (See Software Cracking: History.) Some operatingLotus 1-2-3 (7,006 words) [view diff] case mismatch in snippet view article find links to article
limited to CGA graphics. The early versions of 1-2-3 also included a disk copy protection. While 1-2-3 was hard-disk installable, it required insertionList of Mysticons episodes (1,975 words) [view diff] case mismatch in snippet view article find links to article
to enter the Celestial Forge, so they can harness it into the Dragon Disk copy. Meanwhile, Dreadbane uses the blue Codex spellbook to perfect his work