1997 Sep 11 JMKFLS.DO Files by James Main Kenney Filenames with .BA extensions are for BASIC programs for 8-bit Kyocera-made notebooks: those designated "for Tandy" run interchangeably without modification on the Tandy Radio Shack TRS-80 Model 100, Tandy 102, and Tandy 200; those designated "for NEC" run on the NEC PC-8201A and probably on the untested NEC PC-8300. These programs are distributed as untokenized ASCII files with the appropriate .DO extensions required for loading. Filenames with .BAS extensions are for BASIC programs that run under Microsoft GW-BASIC which came with MS-DOS 3 and 4, and under Microsoft QBASIC, which came with MS-DOS 5 and 6. Note that GW-BASIC 3.22, the version used, will run at 50 MHz under MS-DOS 6.22/Windows 3.11. The .BAS programs are distributed as untokenized ASCII files that may be read in any computer. (In a Kyocera notebook the filenames must be shortened to six characters or fewer and the extensions changed from .BAS to .DO). Filenames with .EXE extensions are for executable programs (compiled from the .BAS versions) that run directly under MS-DOS/Windows, and have run under MS-DOS 6.22/Windows 3.11 at 50 MHz. Filenames with .ICO extensions are for Windows icons, and have been used with Windows 3.11. Filenames with .DO or .DOC extensions are for doc(umentation) files or info files and are ASCII text that can be read in any computer. -------------------------------------------------------------------------------- JMKCHK.DO (for all) A list of the sizes, full checksums, and cyclically weighted sums for the files described here, as generated by CHECKALL/CHKALL/CHKSUM. BOOKS.DO (for all) A Kyocera notebook bibliography. Incorporates the Club 100 listing. CFRJMK 2.0: CFRT20.BA (CFRJMK T2.0 for Tandy) CFRN20.BA (CFRJMK N2.O for NEC) CFRJMK20.BAS (CFRJMK M2.0 for GW-BASIC and QBASIC) CFRJMK20.EXE (compiled version of CFRJMK20.BAS for MS-DOS/Windows) CFRJMK20.ICO (Windows icon for CFRJMK20.EXE) CFRJMKAI.ICO (alternative icon with "key") CFR2D1.DO (doc 1 for CFRJMK 2.0: General Description) CFR2D2.DO ( " 2 " " " : How it Works: The Algorithm) CFR2D3.DO ( " 3 " " " : Built-in Tests) CFR2D4.DO ( " 4 " " " : Operating Instructions A) CFR2D5.DO ( " 5 " " " : Operating Instructions B) CFR2DG.DO (supplementary doc for CFRJMK 2.0 true-random keytext generator) High-security encryption program of great flexibility, with built-in true-random keytext generator and tests for randomness and correlation. Unlimited key size permits unbreakable "one-time" encryption. Ciphertext produced by one version can be decrypted by any of the others using the same key. CHECKALL/CHKALL/CHKSUM: CHKALL.BA (CHKALL 2.0 for Tandy and NEC) CHKSUM.BA (CHKSUM 3.0 " " " " ) CHKDOC.DO (doc for CHKALL.BA and CHKSUM.BA) CHKALL20.BAS (CHECKALL 2.0 for GW-BASIC and QBASIC) CHKALL20.EXE (compiled version of CHKALL20.BAS for MS-DOS/Windows) CHKALL20.ICO (Windows icon for CHKALL20.EXE) CHKALL20.DOC (doc for CHKALL20.BAS/.EXE) Displays and appends to a file the size, full checksum, and cyclically weighted sum (and mnemonic characters for the latter two) of any text file (or other files, using CHECKALL). This allows the detection of file modification or corruption independent of date and time, which are not attached to filenames by Kyocera notebooks. Cyclically weighted sum is sensitive to most transpositions (which do not change the checksum). All versions generate the same numbers for the same (text) file moved between computer types. The 39-column format for the optional output data file is identical for all versions; see JMKCHK.DO as an example. Using CHKALL or CHECKALL, files can be checked individually, or all of the files present in a selected path whose names are listed in a selected file can be automatically checked. (For CHKALL, "path" can be Booster Pak, TPDD, or cassette, etc.) Before appending data to a file, the data file is checked for the presence of identical data, preventing the appearance of duplicates and making it easy to detect changes. If high 8-bit characters are in the file checked, a count of their number is displayed and filed. (For a text file, they indicate possible corruption.) CHECKALL has provision for searching for files with extensions different from those in the file list. CHKSUM is an updated compatible older program retained for its small size and ease of use; it only checks files whose names are directly entered manually; it can save data to a file in the same format as CHKALL and CHECKALL, and now checks for duplicate data and provides a count of high 8-bit characters. CHARACTER COUNTER: CHRCNT.BA (for Tandy and NEC) CHRCOUNT.BAS (for GW-BASIC and QBASIC) CHRCOUNT.EXE (compiled version of CHRCOUNT.BAS for MS-DOS/Windows) CHRCOUNT.ICO (Windows icon for CHRCOUNT.EXE) Counts the number of occurrences in a text file of every character and prints the counts to a file (COUNTS.DO or COUNTED.CHR). May be useful in testing ciphers. CLEAR.BA (for NEC) CLEARD.DO (doc for CLEAR.BA) Facilitates the clearing of RAM for .CO files by scrolling through a list of filenames; also allows direct numerical entry, and clearing to 62336. COMP-T.BA (for Tandy) COMP-N.BA (for NEC) COMP-D.DO (doc for COMP-T.BA and COMP-N.BA) Compares two text files using adjacent horizontally scrolling lines; can be set to stop on differences or ignore them; lines can be moved individually to realign, or together. Control is entirely by the arrow (cursor) keys, together with SHIFT for skips and CTRL for restarts. FINDALL/FNDALL: FNDALL.BA (for Tandy and NEC) FNDDOC.DO (doc for FNDALL.BA) FINDALL.BAS (for GW-BASIC and QBASIC) FINDALL.EXE (compiled version of FINDALL.BAS for MS-DOS/Windows) FINDALL.ICO (Windows icon for FINDALL.EXE) FINDALL.DOC (doc for FINDALL.BAS/.EXE) Searches for one or more strings either in individually selected files or, automatically, in all of the files present in a selected path whose names are listed in a selected file. (For FNDALL.BA, "path" can be Booster Pak, TPDD, or cassette, etc.) The name of each file containing at least one string, and the strings it contains, are appended to a data file after a check is made for the presence of identical data already in the file. FINDALL has provision for searching for files with extensions different from those in the file list. FONT.DO (for all, but of special interest for NEC) A listing of bytes 1 - 255, and bytes 129 - 169 with a 255 prefix used by NEC BASIC as dual tokens for certain keywords; may be used to elucidate NEC BASIC and demonstrate operation of VOYEUR. HIMEM1.BA (for Tandy Model 100 and Tandy 102) HIMEM2.BA (for Tandy 200) HIMEMD.DO (doc for HIMEM1.BA and HIMEM2.BA) Facilitates the setting of HIMEM by scrolling through a list of .CO filenames; also allows direct numerical entry, and setting HIMEM = MAXRAM. ICONS.DO (doc for the following Windows icons which are in the form of pictures of the Kyocera notebooks et al.; these are for use by Microsoft Windows only) TANDY100.ICO (Tandy Model 100 icon) TANDY200.ICO (Tandy 200 icon) NEC8201A.ICO (NEC 8201A icon) CLUB100A.ICO (Tandy Model 100 icon with "CLUB 100" on keys) CLUB100B.ICO (Tandy 200 icon with "CLUB 100" on keys) CLUB100C.ICO (NEC 8201A icon with "CLUB 100" on keys) TANDY4.ICO (Tandy Model 4 icon) COMPNEWS.ICO (Tandy Model 4 icon with "COMP NEWS" on screen) CN80.ICO (Tandy Model 4 icon with "CN 80" on screen) CNPC.ICO (Tandy Model 4 icon with "CN PC" on screen) NOTEBKBK.ICO (Modern notebook icon -- black) NOTEBKBR.ICO (Modern notebook icon -- brown) NOTEBKGY.ICO (Modern notebook icon -- gray) KEYNUM.BA (for Tandy and NEC) KEYPRESS.BAS (for GW-BASIC and QBASIC) Displays the byte generated by pressing any key or combination of keys. PRIMES.BA (for Tandy and NEC) Generates prime numbers above an entered starting value and below 32767. RNDMGN.BA (for Tandy and NEC) RNDMGD.DO (doc for RNDMGN.BA) Generates true random characters in any selected range with ASCII values between 1 and 255, using the "human randomness" of key presses to interrupt a displayed flow of pseudorandom characters. May be useful for ciphers or games. TANDY#.DO (for all) A list of known Tandy products for catalog numbers in the 26-3800 and 26-3900 series, used for Model 100, 102, 200, and 600 items. TOKENS.BA (for Tandy) Prints to a file (KEYWDS.DO) a list of all BASIC tokens (bytes from 128 to 255) and the keywords they represent (and also the characters used for these bytes). TUNNEL.BA (for Tandy) A dynamic graphics tutorial display ("Time Tunnel") produced by a very short program using the LINE function to generate boxes. TWINKL.BA (for Tandy) Similar to TUNNEL.BA, showing how the LINE generated boxes can produce a dynamic (and outrageously extravagant) title frame which automatically adjusts to a range of title lengths. VOYEUR 2.0: VYRT20.BA (VOYEUR T2.0 for Tandy) VYRTD0.DO (doc 0 for VYRT20.BA: Introduction) VYRTD1.DO ( " 1 " " : Operating Instructions Part 1) VYRTD2.DO ( " 2 " " : " " " 2) VYRTD3.DO ( " 3 " " : " " " 3) VYRTD4.DO ( " 4 " " : Cold-Start Recovery Procedures) VYRTD5.DO ( " 5 " " : Development Notes) VYRN20.BA (VOYEUR N2.0 for NEC) VYRND0.DO (doc 0 for VYRN20.BA: Introduction) VYRND1.DO ( " 1 " " : Operating instructions Part 1) VYRND2.DO ( " 2 " " : " " " 2) VYRND3.DO ( " 3 " " : " " " 3) VYRND4.DO ( " 4 " " : Cold-Start Recovery Procedures) VYRND5.DO ( " 5 " " : Development Notes) A "dump" program for exploring computer memory, VOYEUR can translate the BASIC tokens in .BA files into the keywords they represent, and binary numbers into decimal. By printing these to a text file, VOYEUR can convert a "dead" .BA file remaining in RAM after a cold start into an accurate .DO listing. WORDS.BA (for Tandy and NEC) WORDSD.DO (doc for WORDS.BA) Counts words and other text parameters and calculates "fog factors". Can provide the number of occurrences of any character.